Report errors or omissions

 

Manage applications

Identity as a Service provides secure access to cloud, legacy, and on-premise applications. Adding an application to Identity as a Service configures that application for single sign-on (SSO) access through Identity as a Service.

Attention: For IDaaS clients, including the Enterprise Service Gateway, that connect to IDaaS, you must configure your firewall to allow connections to your IDaaS account. IDaaS uses HTTPS on port 443.

Attention: If you configure the Identity as a Service Portal application with the User Login authentication flow not selected, you can access user login authentication to the IDaaS Administration portal using the URL https://<tenant>.<locale>.trustedauth.com/#/?action-admin.

Role permission requirementsRole permission requirements

To integrate applications with Identity as a Service, a user must have a role with at least the following permissions:

Full access (indicated when All is selected) for Applications Management

View-level access to User Attribute Management

View-level access to Application Template Management

See Create and assign roles for more information on role permissions.

Note: A user with the required Applications Management and User Attribute Management permissions but not the Application Template Management permissions cannot edit the settings of an application.

This section provides instructions to add generic SAML, OIDC and OAuth, RADIUS, and API applications. There are also a number of integrations with complete instructions to add a list of configured applications to Identity as a Service. See the Technical Integration Guides for more information.

To find a specific list of integrated applications, on the Applications List page, click the button that applies to the type of application you want to view or edit.

Topics in this section:

Integrate SAML applications

Integrate OIDC and OAuth applications

Integrate RADIUS applications

Integrate API applications

Edit and delete applications