Authing DocsDocuments
Concept
workflow
Guides
Development Integration
Application integration
Concept
workflow
Guides
Development Integration
Application integration
Old Version
Guides
  • Quick start

  • Authenticate the user

  • Authority management for users

  • Authorization

  • Manage user accounts

  • Manage User Directory

  • Management Application

  • Become a source of federal authentication identity

  • Connect to an external identity provider (IdP)

  • Open up WeChat ecology
  • Migrate users to Authing

  • Management organization

  • Expandable capabilities

  • Audit Log

  • Configure security information

  • Configure user pool information

  • Deployment plan

  • Frequently Asked Questions FAQs

¶ Use Guide Overview

Update Time: 2025-06-11 08:01:00
Edit

Welcome to the guide, here will officially open your development tour in Authing!

Here, you will primarily learn two things:

  1. Integrated authentication, we will guide you to quickly integrate authentication functions in your application step by step by step.
  2. Manage resources, how to manage resources in Authing, such as applications, roles, user directory, configuration, and more.

Before you officially start development, we recommend you to understand Authing, and Authing A few core concepts:UserPool、Application、Certification and Authority Differences.

¶ Integrated certification into your application

Recommended first reading Quick Start: Certified Your First User, you will learn about integration Authing, help you quickly get started.

After that, you can read the guidelines in accordance with the subject:

  1. Certification for users

    • the most basicAccount password authentication、Mobile phone number verification code authentication
    • How to access social login certification
    • How to access scan code login authentication
    • How to verify in a small program
    • Realize single sign-on (SSO)
    • Implement single sign-on on the mobile
    • How to integrate multi-factor authentication
    • Extend the certification process:
      • Add user custom fields
      • IdToken adds custom fields
      • Certification using custom databases
      • Use Pipeline to expand the authentication process
      • Use WebHook to listen to authentication events
  2. Permission management

    • Select the appropriate permissions model
    • Integrated RBAC permission model to your application
    • Integrated ABAC permission model to your application
    • Use rights group management privilege resources
    • Manage resource rights
  3. Authorize

    • User license resource authorization
    • Machinery (M2M) Authorization
  4. Manage user account

    • Understand the interpretation of all fields
    • Understand how administrator creates an account
    • Learn how to manage user accounts, such as modifying user information, binding MFA, etc .
    • Learn how to bind accounts
    • ...
  5. Call the WeChat Ecological Account System, call the WeChat Ecological Account System.

¶ Manage your resources in Authing

Recommended first reading Console overview,You will find it quickly Authing what functions have a console that helps you generally understand Authing.

After that, you can read the guidelines in accordance with the subject:

  1. Manage user directory

    • Learn what the user directory configuration items;
    • Learn how to add custom user fields;
    • Learn how to search for a user;
    • Learn how to use LDAP user directory。
  2. Management Applications

  3. Become a federal identity authentication source

  4. Connect an external source identity(Identity Provider)

    • Configuring socialization Login
    • Configuration standard protocol identity provider
    • Use custom databases
  5. Management organization

    • Create or import organization;
    • Management organization;
    • Management member life cycle;
    • Management devices;
  6. View audit log

  7. Configuring Security Information

    • Configure Web security zone
    • Configuring password strength
  8. Configuring user pool information

    • Modify Userpool information
    • Configuring your mail service and templates
    • Configuring short message service

¶ Learn privatization deployment scenarios

If you need privatization deployment Authing, please read the following guidelines:

  • Basic deployment mode;
  • Docker deployment mode;
  • Kubernetes deployment mode.
  • Integrated certification into your application
  • Manage your resources in Authing
  • Learn privatization deployment scenarios

User identity management

Integrated third-party login
Mobile phone number flash check (opens new window)
Universal login form component
Custom authentication process

Enterprise internal management

Single Sign On
Multi-factor Authentication
Authority Management

Developers

Development Document
Framework Integration
Blog (opens new window)
GitHub (opens new window)
Community User Center (opens new window)

Company

400 888 2106
sales@authing.cn
16 / F, Block B, NORTH STAR CENTURY CENTER, Beijing(Total)
room 406, 4th floor, zone B, building 1, No. 200, Tianfu Fifth Street, Chengdu(branch)

Beijing ICP No.19051205-1

© Beijing Steamory Technology Co.