Unify and manage your data

Authentication

Reltio helps you to perform authentication operations for a user.

Overview

Authentication is the process or action of verifying the identity of a user or process. It is the act of validating whether users are who they claim to be. For example, to log in to an application, the username and password entered are authenticating factors. You are allowed to access the application only if you provide valid username and password.

Authentication methods

Authentication methods of Reltio Data Cloud include:

  • Authentication service

  • Client credentials

  • OAuth2/OpenID Connect (OIDC) Single Sign On (SSO)

  • SAML Single Sign On (SSO)

  • Multi-Factor Authentication (MFA)

Note: Reltio Data Cloud also provides Authentication API, User Management API, and Role Management APIs with Authentication Service.

Authentication Scenarios

The authentication scenarios in Reltio Data Cloud include:

Unique user identification

Reltio uses email addresses as unique identifiers for users. Each customer creates email-based user accounts for their organization's Reltio tenants. You use a user's email address to assign a specific set of roles to a given user, so an email address can be used only once. If you use the same email address for another user account, the new user receives this error message when they try to log in:

This login is already in use by another customer. Please use a different account.

Access Tokens

In Reltio, the user has to obtain tokens to be authenticated. The following topics help you to understand more about accessing tokens: