Authing DocsDocuments
Concept
workflow
Guides
Development Integration
Application integration
Concept
workflow
Guides
Development Integration
Application integration
Old Version
Guides
  • Quick start

  • Authenticate the user

  • Authority management for users

  • Authorization

  • Manage user accounts

  • Manage User Directory

  • Management Application

  • Become a source of federal authentication identity

  • Connect to an external identity provider (IdP)

  • Open up WeChat ecology
  • Migrate users to Authing

  • Management organization

  • Expandable capabilities

    • Use Webhook to monitor user events
    • Custom authentication process (Pipeline)

  • Audit Log

  • Configure security information

  • Configure user pool information

  • Deployment plan

  • Frequently Asked Questions FAQs

  1. Guides
  2. /
  3. Expandable capabilities
  4. /
  5. Custom authentication process (Pipeline)

¶ Custom authentication process(Pipeline)

Update Time: 2025-05-14 08:32:28
Edit

¶ Introduction

Authing Pipeline is a set of user-defined JavaScript codes running in the cloud, allowing developers to extend and customize Authing capabilities.

Authing Pipeline functions are all user-definable, and we also provide a rich function template (opens new window)to help developers get started quickly.

Pipeline is a set of functions. The difference from ordinary Hooks is that the function data in the entire pipeline can be transferred to each other to achieve the same effect as an industrial pipeline. This design pattern can make the developer's custom function more modular and easy to manage.

The back-end of Authing Pipeline uses a serverless architecture, and all user-defined codes run in the cloud to ensure isolation between different tenants, and at the same time, it can be elastically scaled, which not only ensures security, but also improves operating efficiency.

¶ Application scenarios

With the help of Authing Pipeline,developers can achieve the following functions:

  • Whitelist mechanism: such as the whitelist of registered mailbox suffixes, the whitelist of registered IPs, etc.
  • Event notification: such as sending group notification after user registration, notification of user login IP exception, etc.
  • Permission control: such as adding users to a user group based on their mailbox after logging in.
  • Extended user fields: add custom metadata to the requesting user.
  • Custom token: For example, add custom fields to the token.
  • ... and more, the imagination is endless.

Let's create your first Pipeline function!

Prev: Use Webhook to monitor user events Next: Create your first Pipeline function
  • Introduction
  • Application scenarios

User identity management

Integrated third-party login
Mobile phone number flash check (opens new window)
Universal login form component
Custom authentication process

Enterprise internal management

Single Sign On
Multi-factor Authentication
Authority Management

Developers

Development Document
Framework Integration
Blog (opens new window)
GitHub (opens new window)
Community User Center (opens new window)

Company

400 888 2106
sales@authing.cn
16 / F, Block B, NORTH STAR CENTURY CENTER, Beijing(Total)
room 406, 4th floor, zone B, building 1, No. 200, Tianfu Fifth Street, Chengdu(branch)

Beijing ICP No.19051205-1

© Beijing Steamory Technology Co.