Authing DocsDocuments
Concept
Guides
Development Integration
Application integration
Concept
Guides
Development Integration
Application integration
Old Version
Guides
  • Quick start

    • Authenticate your first user

      • Use the hosted login page to complete the authentication
      • Use the embedded login component to complete the authentication
      • Use API & SDK to complete authentication
      • Verify user credentials (token)
      • Authority management for users
      • Realize logout
      • Next you may need
    • Access methods for different types of applications

      • Integrate Authing in traditional Web App
      • Integrate in Single Page Application (SPA) Authing
      • Integrate in mobile terminal (iOS, Andriod) Authing
    • Console overview
  • Authenticate the user

    • Use account password authentication
    • Use SMS verification code authentication
    • Use social login authentication
    • Use scan code login authentication

      • Use self-built App to scan the code to log in to the website

        • Complete interface list
        • Custom configuration items
      • Use the mini program to scan the code to log in to the website
    • Certify in Mini Program
    • Implement single sign-on (SSO)
    • Single sign-on on the mobile terminal
    • Multi-factor authentication (MFA)

      • MFA of one-time password (TOTP) based on timestamp algorithm
      • MFA based on SMS verification code
      • MFA based on email verification code
      • Access MFA through SDK
    • Extend the authentication process

      • Add user-defined fields
      • IdToken add custom field
      • Use a custom database to authenticate users
      • Use Pipeline to extend the authentication process
      • Use Webhook to monitor authentication events
    • Personalize the guard
  • Authority management for users

    • Choose the appropriate permission model
    • Integrate RBAC permission model into your application system
    • Integrate ABAC permission model into your application system
    • Use permission group management permission resources
    • Manage resource permissions
  • Authorization

    • Inter-application authorization for user permission
    • M2M authorization
  • Manage user accounts

    • User field interpretation
    • Administrator create account
    • Manage user accounts
    • Binding account
    • Manage user's custom data
    • View user's login history
    • View the user's geographic location
    • Enhance account security
    • Manage user login status
    • Control which applications users can access
    • User groups
  • Manage User Directory

    • User Directory Configuration Item
    • Add custom user field
    • Search users
    • Use LDAP user directory
  • Management Application

    • Create Application
    • Configure login and registration method
    • Add registration agreement
    • Customize login box style
    • Become a source of federal authentication identity
    • Enable multi-factor authentication
    • Sub-account management
    • Implement single sign-on between applications
    • Manage user login status
  • Become a source of federal authentication identity

    • Become an OpenID Connect Identity Source
    • Become OAuth2.0 Identity Source
    • Become a SAML2 identity source
    • Become a CAS Identity Source
  • Connect to an external identity provider (IdP)

    • Social Identity Provider

      • WeChat QR Code on PC
      • Mini Program QR Code on PC
      • WeChat Official Accounts QR Code
      • Mobile App Use WeChat Login
      • Mobile App Use WeChat Mini Program Login
      • WeChat Web Page
      • WeChat Mini Program
      • Tencent QQ
      • Sina Weibo
      • GitHub
      • Facebook
      • Twitter
      • Google
      • Apple Mobile
      • Apple Web
      • Alipay
      • Slack
      • Gitee
      • GitLab
      • Baidu
      • NetEase YIDUN
      • QingCloud
      • Instagram
      • LinkedIn
    • Enterprise Identity Provider

      • WeCom Self-built App QR Code
      • WeCom Self-built App QR Code Login(Delegated Development Mode)
      • WeCom Service Provider App QR Code
      • WeCom Mobile
      • DingTalk H5 Micro Application (Internal Development)
      • Feishu Marketplace App
      • Feishu Custom App
      • Windows AD
      • Azure AD
      • OIDC
      • OAuth 2.0
      • LDAP
      • SAML
      • CAS
      • WeLink
    • Custom database

      • Configure database connection and scripting
      • Lazy migration of users to Authing
      • Fully use a custom database to save user data
      • Best Practice
  • Open up WeChat ecology
  • Migrate users to Authing

    • Use SDK to import users
    • Configure custom password function
    • Import users from corporate WeChat, DingTalk and other third-party identity sources
  • Management organization

    • Create or import an organization
    • Management organization
    • Manage member life cycle
    • Use LDAP protocol to open organization data to the outside world
  • Expandable capabilities

    • Use Webhook to monitor user events
    • Custom authentication process (Pipeline)

      • Create your first Pipeline function
      • Pipeline API Reference
      • Pipeline application scenario
      • Pipeline User Object
      • Pipeline Context Object
      • Use environment variables in Pipeline
      • Available Node Modules
      • How to debug
      • FAQ
      • Private deployment
    • Configure custom password function
  • Audit Log

    • Audit of user behavior
    • Audit of Administrator Behavior
  • Configure security information

    • Configure Web Security Domain
    • Configure password strength
    • Configure registration frequency limit
    • Configure the limit on the number of failed login attempts
  • Configure user pool information

    • Modify user pool basic information
    • Configure mail service and template
    • Configure SMS service and template
    • Add user pool collaboration administrator
    • Developer Configuration
  • Deployment plan

    • Basic deployment mode
    • Docker deployment mode
    • Kubernetes deployment mode
    • Custom Domain Name Configuration Scheme
  • Frequently Asked Questions FAQs

    • How to get user pool ID
    • How to get the application ID
    • How to verify user credentials (token)
    • Join table Authing in the local user and your business data
    • Impact of disabling third-party cookies on Authing
    • How to deploy a transit proxy server
  1. Guides
  2. /
  3. Connect to an external identity provider (IdP)
  4. /
  5. Custom database

¶ Overview of Integrating Customized Databases

Update Time: 2022-06-27 15:55:52
Edit

Using customized databases can satisfy these use cases:

  • Use your own databases to store user information: You can use your own database to store user information. In this mode, Authing won't store any user information.
  • Migrate user information to Authing with lazy migration: In lazy migration mode, all user information will be stored in your database at the beginning. When a user try to login through Authing, the Authing will search and authenticate the user in the database with customized script and will migrate this user to Authing if authenticate succeeds. When this user login Authing at the second time, he/she will be authenticated with Authing's database. After all users in your database at least login to Authing for one time, the migration is completed. More details can be found in document of achieving lazy migration with customized database.

You can setup customized databases with these methods: Go to the Authing Console (opens new window) then find Connect IdP - Customized Database to setup customized database connection. More details can be found in document about how to setup customized database.

¶ How it Works

As the figure shows below, you can setup customized database and get users' identity information through Legacy Database in the Authing authentication flow. The flow will be a little bit different according to different user cases.

drawing

There are two ways to setup customized database to fit different user cases:

  • Migrate user information to Authing with lazy migration: In lazy migration In lazy migration mode, all user information will be stored in your database at the beginning. When a user try to login through Authing, the Authing will search and authenticate the user in the database with customized script and will migrate this user to Authing if authenticate succeeds. When this user login Authing at the second time, he/she will be authenticated with Authing's database. After all users in your database at least login to Authing for one time, the migration is completed. More details can be found in document of achieving lazy migration with customized database.
  • Only use customized databases to store user information: You can use your own database to store user information. In this mode, Authing won't store any user information. However you need to deploy scripts for user management to make the system work normally.

¶ Operating Environment

The current operating environment for Authing customized database script is an isolated sandbox instance based on node 12 environment.

¶ The npm Module

The npm module has several ways to connect databases like Client, axios, bcrypt and lodash, etc.

  • bcrypt (opens new window): The bcrypt can be used to encrypt and validate passwords, which is also our recommanded way to encrypt passwords and is convenient to use:
const isPasswordValid = await bcrypt.compare(password, user.password);
if (!isPasswordValid) {
  throw new Error("wrong password");
}
  • axios (opens new window): The axios is the most common network request library in Node.JS.
  • lodash (opens new window) v4.
  • pg (opens new window): The Node PostgresQL Driver.
  • mongodb (opens new window): The Node Mongodb Driver.
  • mysql2 (opens new window): The Node MySQL Driver.
  • mssql (opens new window): The Node Sql Server Driver.

¶ Add Authing IP Address to Your Whitelist

If the server that your script tries to access has a firewall, please add these IP addresses to its whitelist: 140.179.19.50 and 52.80.250.250. You can also get Authing external IP address from this API: https://core.authing.cn/api/v2/system/public-ips (opens new window).

Prev: WeLink Next: Configure database connection and scripting
  • How it Works
  • Operating Environment
  • Add Authing IP Address to Your Whitelist

User identity management

Integrated third-party login
Mobile phone number flash check (opens new window)
Universal login form component
Custom authentication process

Enterprise internal management

Single Sign On
Multi-factor Authentication
Authority Management

Developers

Development Document
Framework Integration
Blog (opens new window)
GitHub (opens new window)
Community User Center (opens new window)

Company

400 888 2106
sales@authing.cn
16 / F, Block B, NORTH STAR CENTURY CENTER, Beijing(Total)
room 406, 4th floor, zone B, building 1, No. 200, Tianfu Fifth Street, Chengdu(branch)

Beijing ICP No.19051205-1

© Beijing Steamory Technology Co.