Application Settings

This section describes how Apps can be created, edited and deleted easily in the cidaas Administrator Dashboard.

Before you work on the required configuration settings, it is important to understand what app types suit your business channel.

Which App Type should I choose?

Choosing the app/grant type will depend on your specific use case, the client app's trustworthiness, and the user experience that you want for your users. Hence, this selection needs careful consideration. It is important to note that some grant types are more secure than the others.

Please refer to the diagram below and identify which OAuth 2.0 grant type flow you need to implement.

How do I create an App?

To create an App, navigate to the cidaas Administrator dashboard -> Apps -> App Settings on the left navigation menu.

All the Apps that have been created are listed here. cidaas provides a filter / option to select the app type from either Single-Page Application or Regular Web Application.

Note: cidaas supports OpenID Connect and OAuth2 standard across all App Types.

Creating an App


1. Go to the Administrator dashboard -> Apps -> App Settings.

2. Click on the Create New App button.

3. Click on the Create App button. This will display the app details screen.

4. Enter the app name and click any app from the list that include:

  1. Single Page Web app
  2. iOS Mobile App
  3. Android Mobile App
  4. Regular Web App
  5. Non-Interactive Client
  6. Windows Mobile App
  7. Device

App Details

This is where all the basic information about your application such as app name, app type, redirect URLs, allowed logout URLs, website, logo, company details, etc. are entered.

5. Enter App name, for example: Books - Angular, jQuery, react-js (your business name).

6. Enter App logo URL, for example:This logo will appear in several areas, including the list of applications in the Dashboard, as well as things like customized consent forms.

7. The Administrator can change the App type from Android Mobile App, to any other app type (iOS Mobile App, Windows Mobile App, Single Page WebApp and Device).

8. Select scope from the drop-down list.

cidaas provides Default Scopes that you can select from.

To define new scopes refer to Scope Management.

9. Click on the hyperlink to Import scopes from scope groups, as shown below.

For more information click on Scope Groups.

Reference Link What is Scope

10. Select hosted page group from the drop down.

By default, cidaas provides Hosted Pages.

11. Enter the redirect URL- This is the URL of the landing page. Once the user is successfully authenticated, and redirected to this URL. User can specify multiple valid URLs here, separated by whitespace (typically to handle different environments such as QA or testing).

12. Enter the Allowed Logout URL User can specify multiple valid URLs here.


Reference Link: Redirect URL.

Company Details

Enter company details here.

13. Company Name- Enter the company name to be displayed while using the selected app.

14. Company Address - Enter the company address that is to be displayed while using this app.

15. Website URL - Provide the business site URL.

16.Terms and Conditions URL- This link will be rendered automatically in login/registration pages, if the Terms URL is configured.

17. Privacy Policy URL - This link will be rendered automatically in login / registration pages, if the privacy policy URL is configured.


Advance Settings

In addition to the App Settings, cidaas allows you to configure advance settings for OAuth, Token payloads, social login providers, and more.

These settings should be configured to define the OAuth response types and origins.

To access the Advance Settings option, you need to follow these steps.


1. Under Apps List, click on the Edit button under the Actions column.

2. This will navigate to the Edit App page where you can see the Advance Settings button at the bottom left-hand corner.

Accessing the options under Advance Settings


1. Click on the Advance Settings button to view a similar screen.

2. Here you will find the following sections.

OAuth2 Settings

This Advance setting lets you configure the

  1. Response Types (code, Token, or Token id).
  2. Grant Types (implicit, Authorization Code, password, refresh tokens, or client credentials).
  3. Allowed Web Origins (URLs or Redirect URLs from where a cidaas login page is shown in an iframe).
  4. Allowed Origins (URL(s) to be mapped to the CORS Header Field ‘Access-Control-Allow-Origin’ that allow(s) the browser and web server to communicate about which requests are allowed across domains).

Under the Advance Settings list, click on theOAuth2 Settings tab.

To configure the settings under this section, please follow these steps.

1. From the drop-down list for Response Types.

Click on the checkbox of the desired option(s) (multiple checkbox can be selected).

In the Response Types Step by Step window that appears on the top right-hand corner, click OK to continue.

2. From the drop-down list for [grant types](/manage-applications/app-settings/single-page-webapp.md/#Grant_Types), click on the checkbox of the desired option(s) **(multiple checkbox can be selected).**

In the Grand Types Step by Step window that appears on the top right-hand corner, click OK to continue.

3. Enter allowed origins and allowed web origins URLs in their respective input textboxes.

In the Allowed Web Origin and Allowed Origin Step by Step window that appears on the top right-hand corner, click OK to continue.

4. Finally, click on the Save button to complete the OAuth2 Settings.

This will display the following success confirmation window.

Click on OKAY to close this window.

Congratulations! your OAuth2 settings have been completed successfully on cidaas.

Token Settings

This advance setting lets you configure the values for Access, ID, and Refresh tokens in your app.

Under the Advance Settings list, click on the Token Settings tab.

Definitions
  • Token- It is an object that is used to make security decisions and to store tamper-proof information about some system entity.

  • Access Token - An access token is an object that contains the security credentials for a login session and identifies the user, the user's groups, the user's privileges, and, in some cases, a particular application. It encapsulates the security identity of a process or thread.

  • ID Token - An ID token is a security token that contains claims about the Authentication of an End-User by an Authorization Server when using a Client, and potentially other requested Claims. The ID Token is represented as a JSON Web Token (JWT).

  • Refresh Token - A Refresh Token represents the credentials used to obtain access tokens. Refresh tokens are issued to the client by the authorization server and are used to obtain a new access token when the current access token becomes invalid or expires, or to obtain additional access tokens with identical or narrower scope.

The following fields can be configured under Token Settings.

  1. Additional Access Token Fields- The additional fields that will be added to the access token payload.
  2. Access Token Expires in (Seconds)- This field lets you set the time until which the Access Token will remain active and valid.
  3. ID Token Expires in (Seconds)- This field lets you set the time until which the ID Token will remain active and valid.
  4. Refresh Token Expires in (Seconds)- This field lets you set the time until which the Refresh Token will remain active and valid.
  5. You can set this token to Never Expires which means this token will remain perpetually active and valid.

To configure the settings under this section, please follow these steps.

1. From the drop-down list for [ Additional Access Token](/site-map/frequently-asked-questions-faqs.md/#what-is-additional-access-token) Fields , select the required parameter(s) by clicking the relevant checkbox individually, or select the checkbox for Select All . An Additional Access Token Fields Step-by-step Help window appears. Click on the OK button to confirm.

2. Then, provide the input for the Access Token Expires in (Seconds) value.
Note You can configure expiry time for Access Tokens and ID Tokens as needed. The default value set is 86400 seconds (1 day).


If you don't want this token to expire, check the Never Expire checkbox.


You will see that when you change the value for this parameter, the default value (1 day) gets automatically converted to the hours, minutes, and seconds equivalent.

An Additional Access Token Fields Step-by-step Help window appears when you attempt to change the default input for the Access Token Expires in (Seconds) value.

Click on the OK button to confirm.

3. Next, provide the input for the ID Token Expires in (Seconds) value.


Note The default value set for this parameter is 86400 seconds (1 day).

If you don't want this token to expire, check the Never Expire checkbox.


You will see that when you change the value for this parameter, the default value (1 day) gets automatically converted to the hours, minutes, and seconds equivalent.


An ID Token Expires Step-by-step Help window appears when you attempt to change the default input for the ID Token Expires in (Seconds) value.

Click on the OK button to confirm.

4. Finally, provide the input for the Refresh Token Expires in (Seconds) value.


Note This input field gets disabled for user input (greyed out) when the Never Expire checkbox is selected and gets enabled for user input when this checkbox remains unselected.



If you don't want this token to expire, check the Never Expire checkbox.

You will see that when you change the value for this parameter, the hours, minutes, and seconds equivalent value automatically shows up below the textbox.


A Refresh Token Expires Step-by-step Help window appears when you attempt to change the default input for the Refresh Token Expires in (Seconds) value.

Click on the OK button to confirm.

5. Finally, click on the Save button to save the changes.

The following Success Confirmation Window appears.

Click on OKAY to close this window.

Congratulations! your Token Settings have been completed successfully on cidaas.

You can upload or define your consent policy for your end-user. There may be multiple policies that you want to show based on the context.

Cidaas provides you a Consent Management framework that allows for this, including the feature to maintain multiple versions of the same policy.

By default, cidaas has a standard template that is displayed to your end-users.

You can also change your login consent by making a selection from the drop-down list that appears for Select Login Consents under the Consent Management Advance Settings panel.

Under the Advance Settings list, click on the Consent Management tab.

The steps to configure this setting include:

1. Select the desired option or options from the the drop-down list as shown below.

2. A Consent Page step-by-step help window appears when you start selecting the options for Select Login Consents.

Click on OK to confirm the selection(s) made.


3. Finally, click on the Save button to save the changes.

The following Success Confirmation Window appears.


Click on OKAY to close this window.

Congratulations! your Consent Management settings have been completed successfully on cidaas.

Login Providers

This Advance option lets you select the Providers for the options mentioned below that you would like to display to your users on your Login page.

Under the Advance Settings list, click on the Login Providers tab.

The options available for this setting include:

  1. Allowed Providers

    Here, cidaas lets you select Social Providers like Facebook, Google, etc. that you want to Enable (display) on your Login page.

  2. Custom Login Providers

    Here, you can select any Custom Login Providers (including private login providers) to be enabled (available) on your Login page.

  3. SAML Providers

    Here, you can select an IAM SAML 2.0 identity service provider to be enabled (available) on your Login page.

  4. Active Directory Providers

    This advance setting on cidaas lets you select the Directory Server provider(s) to be enabled (available) on your Login page for Directory and Access Management services.

Here's how you can set each Login Provider on your login page.

1. Select the desired option or options for the desired Provider type from the the drop-down list as shown below. Allowed Providers

You can also click on the Select All option to select all the Allowed (Social) Providers on cidaas to be displayed on your login page.

Clicking on Unselect All will help you unselect all the selected options.

You can search for a specific Allowed Provider from the list by clicking on the search icon and typing in the provider name. This will return any matching results or display the text Select from allowed fields.

Custom Login Providers

You can also click on the Select All option to select all the Custom Login Providers on cidaas to be displayed on your login page.

You can also unselect all the selections that you have made.

A Response Types step-by-step help window appears. Click on OK to continue.

You can search for a specific Custom Login Provider from the list by clicking on the search icon and typing in the provider name. This will return any matching results or display the text Select from allowed fields.

SAML Providers

You can also click on the Select All option to select all the SAML Providers on cidaas to be displayed on your login page.

You can also unselect all the selections that you have made.

A Response Types step-by-step help window appears. Click on OK to continue.

You can search for a specific SAML Provider from the list by clicking on the search icon and typing in the provider name. This will return any matching results or display the text Select from allowed fields.

Active Directory Providers

You can also click on the Select All option to select all the Active Directory Providers on cidaas to be displayed on your login page.

You can also unselect all the selections that you have made.

A Response Types step-by-step help window appears. Click on OK to continue.

You can search for a specific Active Directory Provider from the list by clicking on the search icon and typing in the provider name. This will return any matching results or display the text Select from allowed fields.

2. After selecting the relevant options for the Provider(s) listed, click on the Save button to save the changes.

The following Success Confirmation Window appears.


Click on OKAY to close this window.

Congratulations! your Login Providers settings have been completed successfully on cidaas.

Guest Login

This Advance Settings option is useful for apps where you would like to create a temporary user session on your application or share some content with your users without them having to create a permanent account.

cidaas enables Guest Login without registering on our platform, so that, your users/customers can access the guest login dashboard and the basic functionalities on your application without the need to Register .

Enabling Guest Login is very easy on cidaas .


Steps to Access the Guest Login Option

1. Click on Apps -> App Settings in the Dashboard (left) menu.

2. Then, click on the Edit button of the app you wish to enable Guest Login for under Apps List .

3. Scroll down the App Settings page and click on the Advance Settings button.

4. Then, scroll down the Advance Settings list, and click on the Guest Login option.

This advance setting is available as a toggle switch on cidaas which you can enable (switch on) or Disable(switch off) by simply clicking on the switch icon.


Steps to Enable/Disable Guest Login

1. Under Advance Settings, go to Guest Login and click on the tab to expand the window.


By default, this switch is Disabled (turned off). When this switch is disabled, it means the Guest Login is not activated or available on the Sign-in page of your portal and this option will not appear.

2. To turn on this switch, click on the icon next to the Enable Guest Login label.

This will activate Guest Login on the login form/page on your portal and also display the following fields to set up the Groups and Roles for the Guest Login feature.


3. For Cidaas, either click on the Select All checkbox to select all the user roles or select the required user role(s), individually.

A Response Types Step-by-step help window appears. Click on OK to continue.


You can also search for a particular User Role from the list by using the Search option here.


4. For Cidaas Admin, either click on the Select All checkbox to select all the user roles or select the required user role, individually.

A Response Types Step-by-step help window appears. Click on OK to continue.


You can also search for a particular User role from the list by using the Search option here.


5. Next, in the Search by Group Name textbox, either type in a name or click on an item from the drop-down list.

Then, either click on the Select All checkbox to select all the group names in the list or select the required group name, individually.

A Response Types step-by-step help window appears. Click on OK to continue.


You can also search for a particular User Group from the list by using the Search option here.


You can assign roles to multiple User Groups by clicking on the + button, or remove any role-User Group associations by clicking on the - button next to the Select drop-down list.


6. Finally, click on the Save to save the changes made to the Guest Login Advance Settings.


This will display the following Success Confirmation Window which completes the process.


Click on OKAY to close this window.

Congratulations! your Guest Login settings have been completed successfully on cidaas.

Registration Fields

This Advance Settings option lets you define which fields shall be set as Allowed and Required during registration.

It also lets you enable or disable mobile number verification and email verification during user regstration on your platform (front-end).

Here are the steps to set the Field type and enable/disable mobile and email verifications.

1. Under Advance Settings, go to Registration Fields and click on the tab to expand the window.


Here, you will see the Allowed Fields, Required Fields, Mobile number verification required, and the Email verification required options.

1. For the Allowed Fields option, select the value from the drop-down list by clicking the checkbox of the relevant list item.

This option allows you to select the fields allowed to be displayed on your user Registration form.


You can also select all the fields by checking the Select All option from the drop-down list.

You can unselect all the fields selected by you by checking the Unselect All checkbox.

Note Only the fields selected by you for Allowed Fields will be displayed on the registration page. If no fields are selected for Allowed Fields at the app level, the system, by default takes the enabled registration fields from the registration setup.

Example

A search option lets you search for a particular field from the list.

A step-by-step help window appears when you select a value from the Allowed Fields drop-down list.

Click on OK to confirm. Then click on the Save button to save the changes to Allowed Fields.

This will display the following Success Confirmation Window

Click on OKAY to close this window.

2. For the Required Fields option, select the value from the drop-down list by clicking the checkbox of the relevant list item.

This option allows you to select the input fields that shall be set as mandatory (to be filled in by the user) without which the registration cannot be completed.


You can also select all the fields by checking the Select All option from the drop-down list.

You can unselect all the fields selected by you by checking the Unselect All checkbox.

A search option lets you search for a particular field from the list.

A step-by-step help window appears when you select a value from the Required Fields drop-down list.

Click on OK to confirm. Then click on the Save button to save the changes to Required Fields.

This will display the following Success Confirmation Window

Click on OKAY to close this window.

Congratulations! your Registration Fields settings have been completed successfully on cidaas.

Captcha Settings

This Advance Settings option lets you set the CAPTCHA you want to display on your application's login pages.

You could then map the created CAPTCHAs to appropriate pages of your application.

Under the Advance Settings list, click on theCaptcha Settings tab.

Here are the steps to select and set the CAPTCHA.

1. Under Advance Settings, go to Captcha Settings and click on the required option from the drop-down list.


You can also search for a required value in the search textbox that appears below the drop-down list box.



2. A Captcha Settings step-by-step help window appears when you select an option for Captcha Settings from the drop-down list.


Click on OK then, click on the Save button to save the selection made.



The following Success Confirmation Window appears when the Captcha Settings are saved successfully.



Click on OKAY to close this window.

Congratulations! your Captcha Settings have been completed successfully on cidaas.

Password Policy Settings

This Advance Settings option lets you select the Password Policy that you want to apply to your login page and other related pages where passwords are used.

Each Password Policy Setting option is given a name based on the purpose it serves or a functionality.

Under the Advance Settings list, click on thePassword Policy Settings tab.

Here are the steps to change the Password Policy Setting on your web application.

1. Under Advance Settings, go to Password Policy Settings and click on the required option from the drop-down list.



You can also search for a required value in the search textbox that appears below the drop-down list box.



2. A Password Policy Settings step-by-step help window appears when you select an option from the drop-down list.


Click on OK then, click on the Save button to save the selection made.



The following Success Confirmation Window appears when the Password Policy Settings are saved successfully.



Click on OKAY to close this window.

Congratulations! your Password Policy Settings have been completed successfully on cidaas.

Template Group Settings

This Advance Settings option lets you select the Template Group that you want to apply to your login page and other related pages where cidaas' IAM services are used.

By default, cidaas' standard template is displayed to your end-users.

You can change this under Template Group Settings.

Under the Advance Settings list, click on theTemplate Group Settings tab.

Here are the steps to change your Template Group.

1. Under Advance Settings, go to Template Group Settings and click on the required option from the drop-down list next to the label Template Group:

The pre-selected value in this list will be Default which means the default template will be applied currently.



You can also search for a required value in the search textbox that appears below the drop-down list box.


2. Once you have selected the value from the drop-down list by clicking on it, the selected value gets loaded into the drop-down list.


Then, click on the Save button to save the selection made and apply the selected Template Group.


The following Success Confirmation Window appears next.


Click on OKAY to close this window.

Congratulations! your Template Group Settings have been completed successfully on cidaas.

Bot Detection

This Advance Settings option on cidaas lets you Enable or Disable Bot Detection (checking if the user is human or a robot) on the login page of your application and set the type of Captcha Bot.

Enabling Bot detection, mitigates scripted attacks or credential stuffing attacks by detecting if a sign-in request is coming from a bot. It provides protection against certain attacks adding a little friction to legitimate users.

Under the Advance Settings list, click on the Bot Detection tab.

Here are the steps to enable/disable this option on cidaas.

1. Click on the Bot Detection tab to expand the window.


By default, this switch is Disabled (turned off). When this switch is disabled, it means the Bot Detection check will not be done on the login page of your application.

2. To enable the option, turn on this switch by clicking on the icon next to the Enable Bot Detection: label.

This will enable Bot Detection and display the Captcha Bot selection drop-down.

Click on the drop-down list arrow and select the Captcha Bot type.

This will display the Response Types step-by-step help window.

Click OK to continue.

Finally, click on the Save button to save the settings done by you.

The following Success Confirmation Window is displayed indicating that the Bot Detection settings done by you will appear on your application's login page.

Click on OKAY to close this window and complete the process.

Congratulations! your Bot Detection settings have been completed successfully on cidaas.

Authentication

This Advance Settings option on cidaas lets you Enable or Disable Two-Factor Authentication (2FA) and set the Authentication Modeon the login page of your application.

Two-factor authentication (2FA) , sometimes referred to as two-step verification or dual-factor authentication, is a security process in which users provide two different authentication factors to verify themselves. This process is done to better protect both the user's credentials and the resources the user can access.

Enabling 2FA on your app's login page will strenghten access protection to the users' account. With 2FA, access is granted to the application only after successfully presenting two or more pieces of evidence to an Authentication Mechanism.

Enabling 2FA ensures protection against certain attacks and a frictionless sign-in experience to the user.

On cidaas, the available Authentication Mechanisms include:

  1. EMAIL- Authentication done by sending a verification link or OTP to the user's registered email id.

  2. BACKUP CODE - 8-digit codes generated via Authenticator apps like Google Authenticator or Microsoft used to complete secure sign-in.

  3. FACE (biometrics-based facial recognition)- The user authenticates with their face as their credential to securely access their account.

  4. FIDO2 - Helps authenticate using FIDO2 cryptographic login credentials for mobile and web applications.

  5. FIDOU2F- Helps users securely access any number of online services with one single security key instantly without the need for drivers or client software.

  6. IVR - Interactive Voice Response is an automated phone system technology that allows incoming callers to access information via a voice response system of pre-recorded messages without having to speak to an agent, and to utilize menu options via touch tone keypad selection or speech recognition.

  7. PASSWORD- This enables authentication using an account password (created and registered on the app by the user).

  8. PATTERN- Allows the user to login by drawing a pattern on the screen rather than entering his user id and password.

  9. PUSH - This is a mobile-centric authentication whereby the service provider sends the user a notification over the most secure communication channel. The user responds to an action request to verify their identity and access the service.

  10. SEALONE - This enables strong 2FA by Seal One AG directly on the user's smartphone or tablet. Your users can sign in using a Simple and intuitive operation like providing their fingerprint.

  11. SECURITY QUESTION - Also known as secret question, the Authentication Mechanism lets your users set answers to two or more secret questions (something only known to them). Your application will then authenticate the user (provide access) based on the correct answer(s) provided and deny access when the wrong answer is provided for each set security question.

  12. SMS - Enabling this Authentication Mechanism will send a code (one-time secure pin) to the user's phone via SMS which the user must furnish on your app as proof of their identity.

  13. TOTP- This settings lets your app send a time-based one-time password to the user to be used for 2FA with the help of an algorithm that uses the current time as a source of uniquenes.

  14. TOUCHID- This is exclusive to iPhones and iOS devices where electronic fingerprint recognition, designed and released by Apple Inc. is used.

  15. VOICE- Also known as Voice Recognition , this biometric authentication mechanism enables access using speech as the primary identification mode. Here, a user's voice is verified locally against a recorded instance and a token is sent to the service provider when there is a match. The SP then grants application access to the user.

Steps to set 2FA and the Authentication Mechanism


Under the Advance Settings list, click on the Authentication tab.

1. First, click on the Always ask for 2FA switch to enable Two-factor Authentication.

You can leave this switch as it is (disabled) if you do not want to have Two-Factor Authentication option on the login page of your app.

By default, this switch is Disabled (turned off).

2. Turning on the Always ask for 2FA: switch will display the 2FA step-by-step help window.

Click on OK to continue.

3. Next, select the Authentication Mechanism from the drop-down list next to the Authentication: label by checking the box of the relevant option.

You can individually select multiple options or click on the Select All checkbox to select and enable all the Authentication Mechanisms on your app's login page.

Click on Unselect All to unselect the selections made

You can also search for an Authentication Mechanism from the list using the Search option. Here, you need to type the name of the desired Authentication Mechanism which will return the result(s) if found.

If not match is found, you will see the Select from allowed fields text.

3. Finally, click on the Save button to save the Authentication Settings configured by you.</p>

The following Success Confirmation Window is displayed indicating that the 2FA settings done by you for the selected Authentication Mechanism will be enabled (available) on your application's login page.

Click on OKAY to close this window and complete the process.

Congratulations! your Authentication settings have been completed successfully on cidaas.

Remember Me

This Advance Settings option on cidaas allows the user to check the Remember Me option in the login page of your web application.

Checking the Remember Me option lets the user sign in the next/consecutive time without having to re-enter the user name and password

Under the Advance Settings list, click on the Remember Me tab.

Here are the steps to enable/disable the Remember Me option on cidaas.

1. Click on the Remember Me tab to expand the window.


By default, this switch is Disabled (turned off). When this switch is disabled, it means the Remember Me option is not activated or available on your application.

2. To enable the option, turn on this switch by clicking on the icon next to the Make remember me as selected in login page: label.

This will activate the option where the user will be able to view and select the Remember Me option on the login page of your web application.

Next, click on the Save button to save the settings done by you.

The following Success Confirmation Window is displayed indicating that the Remember Me checkbox and text will appear on your web application's login page.

Click on OKAY to close this window and complete the process.

Congratulations! your Remember Me settings have been completed successfully on cidaas.

Success Page

This Advance Settings option on cidaas allows you to set the Login Success Page which your user will be redirected to after successfully logging in to the application.

Under the Advance Settings list, click on the Success Page tab.

Here are the steps to enable/disable the Success Page option on cidaas.

1. Under Advance Settings, go to Success Page and click on the tab to expand the window.


By default, this switch is Disabled (turned off). When this switch is disabled, it means the Success Page feature is not activated or available on your application.

2. To enable the option, turn on this switch by clicking on the icon next to the Enable Login Success Page: label.

This will activate the option where the user will be redirected to your Login Success Page after successfully signing in through the sign-in page.

Next, click on the Save button.

The following Success Confirmation Window is displayed indicating that the Success Page will appear on your web application when the user's sign-in is successful.

Click on OKAY to close this window and complete the process.

Congratulations! your Success Page Settings have been completed successfully on cidaas.

Encryption Settings

JSON Web Encryption (JWE) is an IETF standard providing a standardised syntax for the exchange of encrypted data.

Along with JSON Web Signature (JWS), it is one of the two possible formats of a JWT (JSON Web Token).

The JWE (JSON Web Encryption) specification standardises the representation of encrypted content in a JSON-based data structure.

This Advance Settings option on cidaas allows JWE-enabled encryptions on your platform when the Enable/Disable switch is turned on.

Under the Advance Settings list, click on the Encryption Settings tab.

Here are the steps to enable/disable the JWE Encryption Settings feature on your portal using cidaas.

1. Under Advance Settings, go to Encryption Settings and click on the tab to expand the window.


By default, this switch is Disabled (turned off). When this switch is disabled, it means the JWE encryption settings is not activated or available on your application.

2. To enable JWE encryption, turn on this switch by clicking on the icon next to the JWE Enabled label.

This will activate JWE encryption.

A JWE Enabled step-by-step help window will appear when the switch is turned on.

Click on OK to confirm.

Then, click on the Save button.

The following Success Confirmation Window is displayed.

Click on OKAY to close this window and complete the process.

Congratulations! your Encryption Settings have been completed successfully on cidaas.

Frequently Asked Questions

How to create Android App

How to create IOS Mobile App

How to create Windows Mobile App

How to create Single Page App

How to create Regular WebApp

How to create Non- Interactive Client

How Scopes Configured in cidaas



results matching ""

    No results matching ""