a sneak peak of what we're building for Auth10...

The Problem

Your company has 20+ apps (web, desktop, web services), 100+ of users (some are employees others are external people that work for you), different platforms (.NET, SharePoint, PHP, Java, node.js, etc.), different authentication and authorization implementations (AD, LDAP)…managing who can access what and how is complicated and getting worse with the addition of cloud based apps and mobile growth.

One Step Ahead

Claims based identity and identity federation are mature and proven solutions for these challenges. Standards like SAML, OAuth and WS-Federation are being adopted more widely, but many have just given up: too many levers, too many options, too intricate and obscure technologies. It still requires a very deep understanding of what’s really going on to successfully deploy a solution based on this architecture.


Auth10 hides all this complexity and provides a higher abstraction layer on top of the core building blocks of claims based identity. It allows you quickly define and configure your applications, the users of those applications regardless of who they are and how they prove their identity; and finally connect both with a policy that defines what they can do. And because Auth10 has an end to end knowledge of all components involved, it can easily pinpoint issues, helping you troubleshoot in minutes what before took long hours of trial and errors.


The Dashboard gives you a consolidated view of all your applications and users within your organization and your partners. In one view you can easily identify who can access what and if there are any problems:


Every time you create an app, choose from the catalog of application types (SharePoint 2010 and ASP.NET initially) to tailor and accelerate the federated identity configuration time. Claims enabling an app (like SharePoint) can take days for those new to the subject. Auth10 automates this and will claims enable SharePoint in minutes.

User groups

Every time you identify a logical group of users (your employees or vendors, managed identities or not), choose from the catalog of authentication types (ADFS, Facebook and Google initially) to tailor and accelerate the federated identity setup time for those identity providers.


Create and connect applications with group of users and define rules to satisfy application access control requirements

Rule templates

Quickly connect applications with user groups with different access control strategies by clicking on one of the templates (passthrough and custom initially)


Browse detailed statistics for all your applications. Analyze who, when and what applications have been accessed.


Quickly identify problems with the Auth10 Probing Tools, troubleshoot interactions between the applications and identity providers by looking at all interactions between components. Use Auth10 Probing Tools to extract meaningful error messages.


Published: April 30 2012

blog comments powered by Disqus