Set up your login flow
Set up your subscription with Auth0 and register your apps. Test it out and see how user identity flows right into your applications. Sign in with social logins, corporate accounts, or whatever you desire.
With Criipto Permit you invite your customers, partners, and suppliers to use your apps. They will use Criipto to control who should get access to your apps and to what extent.
Or use the Criipto Permit API to automate the entire onboarding process as your business customers show up on your doorstep.
Once onboarded, your B2B customers will onboard their employees and manage their permissions to access your applications.
Criipto provides a self-service web application for you and your customers to onboard and manage organizations and their users.
If you use a service like Auth0 for authentication you grant us access to your Auth0 tenant, and we’ll take care of the rest.
The service may also be integrated directly into your application authentication flow. Or if you use Microsoft Azure AD, Criipto will keep it in sync with user permissions.
Set up your subscription with Auth0 and register your apps. Test it out and see how user identity flows right into your applications. Sign in with social logins, corporate accounts, or whatever you desire.
Once you sign up for Criipto Permit, you will authorize Criipto to work with your Auth0 subscription to read data – applications and users – and write rules.
For each application, you set up all the roles/permissions that you use for access control in your code.
You are now open for business. From Criipto Permit, you may invite partners, customers, and others to use your chosen applications with the relevant role subsets.
Partners then invite their employees and users the same way.
You have everything up, and you’re open for business. As the owner and provider of applications, you invite partners, customers, and others to use your applications with the eligible roles you choose.
Through the Criipto Permit UI – possibly iframed into your web application – partners and customers invite and manage their users. Users are always managed as part of one or more organizations.
Users sign into mobile apps, web applications, and access your APIs. Their login information – their tokens – carry a collection of user information including their exact permissions as assigned by their organization.
The value of your applications grow as customers gain confidence in their ability to manage their own users and the permissions they are granted.
Pricing depends on the number of enterprises and users you are handling and the
level of activity and admin you need. Get in touch and we will help you identify your
needs.
Drop us a line and let us know how we can help you or visit our
Copenhagen office.