Authentication
Reltio helps you to perform authentication operations for a user.
Overview
Authentication is the process or action of verifying the identity of a user or process. It is the act of validating whether users are who they claim to be. For example, to log in to an application, the username and password entered are authenticating factors. You are allowed to access the application only if you provide valid username and password.
Authentication methods
Authentication methods of Reltio Connected Data Platform include:
-
Authentication service
-
Client credentials
-
OAuth2/OpenID Connect (OIDC) Single Sign On (SSO)
-
SAML Single Sign On (SSO)
Authentication Scenarios
The authentication scenarios in Reltio Connected Data Platform include:
Unique user identification
Reltio uses email addresses as unique identifiers for users. Each customer creates email-based user accounts for their organization's Reltio tenants. You use a user's email address to assign a specific set of roles to a given user, so an email address can be used only once. If you use the same email address for another user account, the new user receives this error message when they try to log in:
This login is already in use by another customer. Please use a different account.Access Tokens
In Reltio, the user has to obtain tokens to be authenticated. The following topics help you to understand more about accessing tokens: