KuppingerCole Report
Executive View
By Graham Williamson

Auth0 Authentication Service

A perennial problem for programmers is the need to authenticate users. In some cases, there is no infrastructure to support access control and in many cases there is no single identity repository of user data to be used as an authentication source. In a federated environment there are multiple identity providers to accommodate and problems are compounded when members of the public are accessing applications with varying levels of assurance. Auth0 is a service that can help.
By Graham Williamson
gw@kuppingercole.com

Content of Figures

  1. Figure 1

1 Introduction

Let’s spare a thought for software developers who are commissioned to develop programs but often without the necessary support infrastructure. They ...

Login Free 30-day Select Access Get full Access

2 Product Description

Auth0 is a managed service based in the USA but it can reside on a local Cloud service provider’s facilities and it can be installed as an on-premis ...

Login Free 30-day Select Access Get full Access

2.1 The Identity Providers

An essential component of an Auth0 environment is an identity provider. Auth0 must know where to find the identity data to be used in authentication e ...

Auth0 does provide SSO for applications in a customer’s Auth0 instance. SSO must be activated per-application and for a highly sensitive application ...

Login Free 30-day Select Access Get full Access

2.2 The Authentication Event

As expected the options available for an Authentication event are substantial.

Within an Auth0 environment an application is seen as a “client”. ...

Login Free 30-day Select Access Get full Access

2.3 Application Programmable Interface (API)

In order to deploy a rich authentication environment Auth0 provides an authentication API that supports a set of programming libraries and Login Widge ...

Login Free 30-day Select Access Get full Access

2.4 Programmer Support

The support provided to software developers by Auth0 is extensive. The website is full of sample code, detailed descriptions of APIs and software deve ...

Login Free 30-day Select Access Get full Access

3 Strengths and Challenges

The major strength of Auth0 is its support for programmers which can’t help but reduce programming and software support costs. Auth0 can support mul ...

Login Free 30-day Select Access Get full Access

Copyright

©2020 KuppingerCole Analysts AG all rights reserved. Reproduction and distribution of this publication in any form is forbidden unless prior written permission. All conclusions, recommendations and predictions in this document represent KuppingerCole´s initial view. Through gathering more information and performing deep analysis, positions presented in this document will be subject to refinements or even major changes. KuppingerCole disclaim all warranties as to the completeness, accuracy and/or adequacy of this information. Even if KuppingerCole research documents may discuss legal issues related to information security and technology, KuppingerCole do not provide any legal services or advice and its publications shall not be used as such. KuppingerCole shall have no liability for errors or inadequacies in the information contained in this document. Any opinion expressed may be subject to change without notice. All product and company names are trademarksTM or registered® trademarks of their respective holders. Use of them does not imply any affiliation with or endorsement by them.

KuppingerCole Analysts support IT professionals with outstanding expertise in defining IT strategies and in relevant decision-making processes. As a leading analyst ompany, KuppingerCole provides first-hand vendor-neutral information. Our services allow you to feel comfortable and secure in taking decisions essential to your business.

KuppingerCole, founded back in 2004, is a global, independent analyst organization headquartered in Europe. We specialize in providing vendor-neutral advice, expertise, thought leadership, and practical relevance in Cybersecurity, Digital Identity & IAM (Identity and Access Management), Cloud Risk and Security, and Artificial Intelligence, as well as for all technologies fostering Digital Transformation. We support companies, corporate users, integrators and software manufacturers in meeting both tactical and strategic challenges and make better decisions for the success of their business. Maintaining a balance between immediate implementation and long-term viability is at the heart of our philosophy.

For further information, please contact clients@kuppingercole.com.

top