Intro

The Identity Hub is a centralized system that enables administrators to configure and manage all aspects of identity service.

Key Features for Hub Administrators

Entities

  • User Management: Create, update, and deactivate user accounts from a centralized interface.

  • Organization Management: Manage multiple organizations within the system, ensuring appropriate access and permissions for each.

  • SCIM Management: Implement and manage System for Cross-domain Identity Management (SCIM) for user provisioning and management.

Security

Access Control

  • OAuth Management: Configure and manage OAuth authorization settings for secure access to applications.

  • JWKS Management: Handle JSON Web Key Sets (JWKS) for signing and encrypting tokens to enhance security.

  • OAuth2 Metadata Management: Manage OAuth2 metadata for clients and authorization servers to streamline integration.

  • OAuth Client Management: Configure and manage OAuth clients, controlling their permissions and settings.

  • Protected Resource Management: Define and manage resources that require protection through access controls.

  • Audit Log Management: Monitor user activities and changes with detailed audit logs for compliance and oversight.

  • Account Recovery Management: Assist end-users in recovering their accounts if they forget their credentials or become locked out.

  • Account Registration Management: Oversee the registration process, ensuring it meets organizational standards and compliance requirements.

  • Application Access Control: Manage access to multiple applications and control which users can use single sign-on (SSO).

  • Consent Management Administration: Configure and manage consent settings for data sharing and privacy preferences on behalf of end-users.

  • Data Access Request Management: Handle user requests for accessing personal data, data exports, and account deletions to ensure compliance with data protection regulations.

  • Identity Verification Configuration: Set parameters for identity verification processes, enhancing security during user access.

  • Notifications and Alerts Setup: Configure notifications and alerts for important events, such as account lockouts or suspicious activities.

  • Profile Management Control: Assist in managing end-user profiles, allowing for updates and changes to personal information.

  • Session Management Oversight: Monitor and manage user sessions to ensure account security and mitigate potential security risks.

  • Reporting and Analytics Tools: Generate reports on user activity, access patterns, and system performance for informed decision-making.

  • Integration Management: Manage integrations with third-party applications and services to ensure seamless connectivity and data flow.

  • Authentication Management: Set and manage authentication methods, including multi-factor authentication (MFA) and passwordless options.

  • Authentication Policies Configuration: Enforce authentication methods for end-users, such as passkeys, biometrics, and passwords.


Last updated