Please enable JavaScript.
Coggle requires JavaScript to display documents.
Identity - Coggle Diagram
Identity
Connected app
Basic info
Oauth setting
Callback URL
Digital signature for JWT
Oauth scope ( API , OpenId)
Oauth settings ( like ID token param)
SAML setting
Mobile app
Pin protect
Oauth settings and scope
Device settings like OS supported, device etc
Enable push notifications
Canvas app
Access method(signed req or Oauth)
Location
Lifecycle class
SAML initiated method
Rotate consumer id and key
Restrict only trusted IP to connected app
Oauth access policy for 3rd party Connected app
All users may self authorize
Admin approved users can authorise
Tokens
Access token
Auth code
Refresh token
Auth servers
ID token
MFA
Enable MFA on user /org
Waive MFA for certain users
Enable session security setting to enable MFA (High assurance)
Use IDP MFA(SSO in high assurance)
Enable Built-In Authenticators for Identity Verification
SMS ( need license)
Temp verification code
OIDC
Auth provider
Consumer id
Consumer secret
scope
callBack URL in target (like fb)
Login widget for JainRain
Nonce/state
Avoid replay attack
Registration handler
Create/update user
Salesforce manager Auth provider
Login page
Mydomain for internal
Exp setting for community
expid ( for different exp site like BE and FR)
Code_challenge
Code_verifier
SSO
IDP chaining
SP Initiated
Isssuer Id(IDP)
Authenticate certificate
IDP logni URL
Relay state
Entitiy id ( generally MyDomain)
SAML identity type
Federation id
Username/id
ACS URL ( SAM assertion is sent here)
IDP initiated
JIT provisioning
SAMLJIT handler
Autprov and deprov using SCIM
Single logout
Network security
Http/Https
SSL
TLS/M-TLS
Port 8443
Enforce M-TLS permission
raise ticket when ESB is client
master key with cert
Identity License
Identitiy only
External identity only
Identity Verification Credits Add-On License
Delegated admin
MyDomain not req
SOAP endpoint webservice
is SSO enabled user permission
Identity connect
Connect with AD
Update user
Deprov user - session revoked
SF as IDP
SAML
Enable identity provider
ACS URL (from SP)
Connectd app
OIDC
connected app
allow access to unique identity (OIDC)
JWT
X/509 certificate
SSo chaining
IDP as authentication hub for multi org