Authing DocsDocuments
Concept
Guides
Development Integration
Application integration
Concept
Guides
Development Integration
Application integration
Old Version
Guides
  • Quick start

    • Authenticate your first user

    • Access methods for different types of applications

    • Console overview
  • Authenticate the user

  • Authority management for users

  • Authorization

  • Manage user accounts

  • Manage User Directory

  • Management Application

  • Become a source of federal authentication identity

  • Connect to an external identity provider (IdP)

  • Open up WeChat ecology
  • Migrate users to Authing

  • Management organization

  • Expandable capabilities

  • Audit Log

  • Configure security information

  • Configure user pool information

  • Deployment plan

  • Frequently Asked Questions FAQs

  1. Guides
  2. /
  3. Quick start

  4. /
  5. Console overview

¶ Console Overview

Update Time: 2022-05-14 09:29:46
Edit

The console is where you can manage manage all aspects of your Authing resource and configuration.

In Authing Console (opens new window), you can configure and modify Authing's resources, users and other information.

Console Overview

The following table contains a brief overview of the different Console pages and what you can do on each:

SectionDescription
Overview

Application Entrance:

  1. 1. Try Your Login Box.
  2. 2. Add an Identity Provider.
  3. 3. Create an Application.

You can check users' Login Activities, such as:

  1. The total number of users.
  2. The number of users increased today.
  3. The number of users who registered and logged in within seven days.
Application

You can create and manage applications, such as:

  1. Integrating the OIDC protocol for the application.
  2. Integrating the OAuth 2.0 protocol for the application.
  3. Integrating the SAML protocol.
  4. Modifying the default page display configuration.
  5. Adding custom CSS to configure multi-factor authentication.
Connection

You can connect to third-party identity sources, such as:

  1. Configure social login.
  2. Connect to Enterprise Identity Sources (OIDC, SAML).
Users & Roles

You can manage all users in the system, such as:

  1. Viewing/modifying user's basic information.
  2. Viewing login history, login location and original JSON data.
  3. Setting user groups and user roles.
  4. Creating an organization.
Privilege Management

You can focus on resources, based on PBAC for fine-grained authorization management, such as:

  1. View and add resources.
  2. View and add policies.
  3. Authorize policies for users, roles, groups, and organizations.
Dvelopers

You can find the API, SDK you need for development.

  1. API.
  2. Quick integration.
  3. Web UI.
  4. SDK.
Rules & Hooks

You can find Pipeline, Webhook, and custom password functions to enhance the flexibility and scalability of the authentication process.

  1. Pipeline;
  2. Webhook;
  3. Custom password function.
Audit Logs

You can view user operation logs and administrator logs.

Billing

You can upgrade service and check order details.

Laboratory

You can configure the application panel and create related synchronization tasks.

Configuration

You can edit or delete user pools, modify the configuration of the message service:

  1. User pool information.
  2. Security information.
  3. Message service.
  4. Extended fields.
  5. Collaboration administrators.

¶ Application

¶ Application list

Application list

¶ Application Details

In this page, you can configure the OIDC protocol, the OAuth2.0 protocol and the SAML protocol, modify the application display configuration, etc.

Application Details

¶ Social Login

社会化身份源

¶ Connections

Authing can connect to Social Logins, Enterprise Connections and Custom Databases Connections.

¶ Social Login

Social Login

¶ Enterprise Connections

Enterprise Connections

¶ Custom Databases

Custom Databases

¶ Users & Roles

¶ Users

Users

¶ User Detail

User Detail

¶ Groups

Groups

¶ Organization's Directory

Organization's Directory

¶ Registration Whitelist

Registration Whitelist

¶ LDAP

LDAP

¶ Privilege Management

Privilege Management

¶ Developers

You can find necessary information such as API and SDK for development on the Developers page.

SDK

¶ Rules & Hooks

Authing's Pipeline, Webhook, and custom password functions can greatly enhance the flexibility in the authentication process and empower users to automate complex scenarios.

¶ Pipeline

Pipeline

¶ Webhook

Webhook

¶ Custom Password Encryption

¶ Audit Logs

You can view the recent user activity log and administrator activity log.

¶ User Activity Logs

User Activity Logs

¶ Administrator Activity Logs

Administrator Activity Logs

¶ Billing

¶ Subscription

Subscription

¶ Payment

Payment

¶ Laboratory

¶ Application Panel

Application Panel

¶ Sync Center

Sync Center

¶ Configuration

¶ Basic Settings

Basic Settings

¶ Security Informatio

  1. Security Domain (CORS).
  2. JWT Expiration Time.
  3. Prohibiting the registration.
  4. Frequent registration restrictions.
  5. Limitation of failed logins.
  6. Set New Registered Email Default To be Verified.

The security domain is the URL that allows requests from JavaScript to the Authing API (usually used with CORS). By default, the system will allow you to use all URLs (). If required, this field allows you to enter other sources. You can separate multiple valid URLs line by line, and use wildcards at the subdomain level(For example:https://*.sample.com)。 (opens new window) to verify these URLs without considering the query string and hash information, if you bring the query The string and hash information system will automatically ignore the entire domain name.

Security Domain

¶ Message Service

¶ Email Templates

There are four types of email templates can be configured in the email template:

  1. Welcome Email :This email will be sent if the user registers with the email.
  2. Verification Email : If the user registers with the email, a verification email will be sent to the user to verify the email, and the user can click the link to complete the verification.
  3. Change Password : This email will be sent when the user requests to change the password, with a verification code attached to the email, and the user needs to fill in this verification code to complete the password modification.
  4. Reset password : When the user forgets the password, the system will send this password reset email, with a verification code attached to the email, and the user will be able to reset the password after submitting the verification code and new password.

Email Templates

¶ Third-party Email Providers

You can customize the mail server on this page.

Third-party Email Providers

For more information:

配置邮件服务和模版

¶ SMS Verification Service

SMS verification allows users to log in with a one-time password sent to their phone in the form of SMS. Currently, SMS template modification is not supported.

SMS Verification

Prev: Integrate in mobile terminal (iOS, Andriod) Authing Next: Authenticate the user
  • Application
  • Connections
  • Users & Roles
  • Groups
  • Privilege Management
  • Developers
  • Rules & Hooks
  • Audit Logs
  • Billing
  • Laboratory
  • Configuration

User identity management

Integrated third-party login
Mobile phone number flash check (opens new window)
Universal login form component
Custom authentication process

Enterprise internal management

Single Sign On
Multi-factor Authentication
Authority Management

Developers

Development Document
Framework Integration
Blog (opens new window)
GitHub (opens new window)
Community User Center (opens new window)

Company

400 888 2106
sales@authing.cn
16 / F, Block B, NORTH STAR CENTURY CENTER, Beijing(Total)
room 406, 4th floor, zone B, building 1, No. 200, Tianfu Fifth Street, Chengdu(branch)

Beijing ICP No.19051205-1

© Beijing Steamory Technology Co.