Integrate easily extending flexibly and individually

Integration from cidaas with OAuth2.0, OpenID Connect, SAML and plugins

cidaas social login

cidaas can be added to any application in just a few minutes.
Here are a few examples!

 
 
cidaas.loginWithBrowser();

cidaas.loginCallback().then(function(response) {
    // your success code here            
}).catch(function(ex) {
    // your failure code here 
});
 
 
 
var extraParams = Dictionary<String, String>()
extraParams[scopes]="offline_access phone"
cidaas.loginWithBrowser(delegate: self, extraParams
: extraParams) { switch $0 { case .success(let successResponse): // your success code here break case .failure(let error): // your failure code here break } }
 
 
cidaas.loginWithBrowser(yourActivityContext,
"NullableColorParameterInColorCode",
new EventResult<AccessTokenEntity>() { @Override public void success(AccessTokenEntity result) { //Your Success Code } @Override public void failure(WebAuthError error) { //Your Failure Code } });
 
<?php 
    $provider->loginWithBrowser();
?>

<?php 
$parameters = $provider->loginCallback();
if (array_key_exists('code', $parameters)) {
    $loginResultCode = $parameters['code'];     
}
?>
login integration with cidaas

With cidaas we provide out-of-the-box a modern, innovative access control and identity management as a service. Based on OAuth2.0 and OpenID Connect, cidaas can be integrated flawlessly into your solutions.

xamarin
xamarin
python
php
node-js
javascript
Java
IOS
ionic
Flutter
cordova
aspnet
android

How does OAuth2.0 and OpenID Connect work?

With OAuth2.0 it is possible to secure your APIs in a standardized way and authorize access. OpenID Connect builds on the OAuth2.0 standard and extends its capabilities to identity management. The access token is a central element of these standards. After a successful authentication event, an access token is issued for an application. The graphic illustrates the flow.

cidaas sdk integration

This is how you start integrating cidaas into your platform:

  • 01

    In OAuth2.0 there are so-called clients, these represent an application (mobile app, single page application, etc.). To make your application known to cidaas, it is necessary to create a new app in the Admin UI of cidaas. This is possible in the App Settings tab. You can find detailed information about apps in cidaas here

  • 02

    To integrate the login & registration, an Authz URL is required. How to create an Authz URL is explained here

  • 03

    After a user has successfully logged in or registered, cidaas will redirect to your application using the Redirect URL. The redirect URL is included in the Authz URL created in step 02. It must first be stored as a permitted URL in the app settings.

  • 04

    Depending on which flow you have chosen (token or code), you will receive a token or code as a parameter in the redirect URL. In the code flow, the code is exchanged for a token in an API call. Once you have a token, you have completed the authentication process and can use this token to access other applications and cidaas.

In our Dokumentation you will find instructions with illustrations on how to integrate cidaas quickly and easily in a few steps.

We also provide numerous SDKs and Interceptors to easily integrate cidaas into the different platforms.

Integration into your existing AD/LDAP systems

cidaas offers the possibility of integrating AD, LDAP and ADFS. So, you have the possibility to integrate your employees and legacy systems in the first step and finally get a smooth transition to the de facto standard OpenID Connect and OAuth2.