The Identity Hub is a centralized system that enables administrators to configure and manage all aspects of identity service.
Entities
User Management: Create, update, and deactivate user accounts from a centralized interface.
Organization Management: Manage multiple organizations within the system, ensuring appropriate access and permissions for each.
SCIM Management: Implement and manage System for Cross-domain Identity Management (SCIM) for user provisioning and management.
Security
Access Control
OAuth Management: Configure and manage OAuth authorization settings for secure access to applications.
JWKS Management: Handle JSON Web Key Sets (JWKS) for signing and encrypting tokens to enhance security.
OAuth2 Metadata Management: Manage OAuth2 metadata for clients and authorization servers to streamline integration.
OAuth Client Management: Configure and manage OAuth clients, controlling their permissions and settings.
Protected Resource Management: Define and manage resources that require protection through access controls.
Audit Log Management: Monitor user activities and changes with detailed audit logs for compliance and oversight.
Account Recovery Management: Assist end-users in recovering their accounts if they forget their credentials or become locked out.
Account Registration Management: Oversee the registration process, ensuring it meets organizational standards and compliance requirements.
Application Access Control: Manage access to multiple applications and control which users can use single sign-on (SSO).
Consent Management Administration: Configure and manage consent settings for data sharing and privacy preferences on behalf of end-users.
Data Access Request Management: Handle user requests for accessing personal data, data exports, and account deletions to ensure compliance with data protection regulations.
Identity Verification Configuration: Set parameters for identity verification processes, enhancing security during user access.
Notifications and Alerts Setup: Configure notifications and alerts for important events, such as account lockouts or suspicious activities.
Profile Management Control: Assist in managing end-user profiles, allowing for updates and changes to personal information.
Session Management Oversight: Monitor and manage user sessions to ensure account security and mitigate potential security risks.
Reporting and Analytics Tools: Generate reports on user activity, access patterns, and system performance for informed decision-making.
Integration Management: Manage integrations with third-party applications and services to ensure seamless connectivity and data flow.
Authentication Management: Set and manage authentication methods, including multi-factor authentication (MFA) and passwordless options.
Authentication Policies Configuration: Enforce authentication methods for end-users, such as passkeys, biometrics, and passwords.