3. 3
In this webinar...
● Conventional logins and its drawbacks.
● Bring Your Own Identity (BYOI) - Social Logins
● Direct integrations and its limitations.
● Identity Hub as a Solution
● Demo
7. ● Above registration form :)
● New set of credentials to remember.
● Or risk sharing credentials between applications.
● Follow up email verification after the registration.
Problem with conventional sign-in/sign-up
7
● Less user attraction.
● Risk of users sharing the credentials with other less secure applications.
● Have to address security concerns of the login forms.
as an App owner...
as a user...
8. Bring Your Own Identity (BYOI)
An identity external to your system | A set of credentials maintained by someone else
8
10. 10
Social Logins
● Possess a huge user base due to the
nature of their business.
● Along with a considerable set of
demographics on each user.
● They facilitate playing the Identity
Provider role for your applications.
11. Do you need an Identity Hub to integrate social
logins into your application?
11
No
12. 12
Challenges in Social Login Integration
● Managing multiple social logins.
● New social networks.
● Legacy applications (no support for open standard protocols)
● Addressing security vulnerabilities.
● Common regulatory compliance.
● Central governance for application authentication, authorization and user
management.
● Planning for the nth
application.
● SSO between applications.
15. 15
How can an Identity Hub help avoiding those issues?
● De-couple social IDP management from application logic.
● Easily extensible.
● Cross protocol single sign-on.
● Dynamic Application and Identity Provider registrations.
● Up-to-date security vulnerability addressing.
● Delegation of addressing regulatory compliances.
● Central governance for application authentication, authorization and user
management.
● Delegation of CIAM functionality to a dedicated server.
17. 17
WSO2 Identity Server as an Identity Hub
● Just In Time provisioning (JIT)
● Single Sign-On (SSO)
● Multi-option login
● Multi-factor login
● Adaptive authentication
● User claim/role transformation