Skip to content

Commit

Permalink
Add use cases overview (#3346)
Browse files Browse the repository at this point in the history
  • Loading branch information
mooreds authored Oct 25, 2024
1 parent c2f6794 commit c83d8e4
Show file tree
Hide file tree
Showing 10 changed files with 75 additions and 0 deletions.
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
If you have APIs that others are building on top of, use FusionAuth to manage user data, and want to allow your users to delegate access to their data accessible via your APIs, FusionAuth can handle the full OAuth grant, including custom scopes and customization of access tokens.

In this case, FusionAuth is part of your API strategy, handling user consents and access token generation.
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
Transparently allow users to log in once and switch between your different applications. As you add more applications, they’ll be able to move between them, similar to the GSuite of products, where you can transparently access Google Calendar, Google Drive, and Gmail even though they are on different domains.

This works with both mobile and web applications. You can limit users to a subset of applications and assign different roles per application.
Original file line number Diff line number Diff line change
@@ -0,0 +1,8 @@
Easily offload authentication and add features with configuration rather than coding. The user who logs in could be a consumer (b2c) or a business user (b2b). Features include:

* adding a "Log in with Google" or "Log in with SAML" button
* multi-factor authentication (MFA) via SMS, time based one time passwords (TOTP) or email
* login with a one-time password (OTP) or magic links
* passkeys
* self-service registration and profile management
* verification of user account ownership using email messages
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
Safely manage your users' third party API tokens in one place. Add new social or enterprise providers as needed. Secure the refresh tokens and other credentials for social providers like Google, Instagram, YouTube, Facebook, Microsoft, and more.

FusionAuth handles the integrations and your engineering team uses one API to retrieve tokens across all social providers.
Original file line number Diff line number Diff line change
@@ -0,0 +1,7 @@
Offer a SaaS software package, where your customers have consumers as customers or users.

With this case, users typically access your SaaS solution using hostnames tied to customers: `customerA.yoursaas.com` and `customerB.yoursaas.com`, or `yoursaas.customerA.com` or `yoursaas.customerB.com`.

You can have each customer's users isolated, so that customer A's users are distinct from customer B's users. The users belonging to customer A will be logically isolated and separate from the users of customer B. You can customize the login screens, password rules, allowed login methods (including social login), and security settings of each of your customers. This is common if you are private labeling your software.

Or you can allow end users to switch between customers, like a user can do with GitHub organizations. Each user can have different permissions for each customer. This is useful if there are cross cutting users like contractors, who might work with more than one customer account.
Original file line number Diff line number Diff line change
@@ -0,0 +1,7 @@
Offer a SaaS software package, where your customers have business employees as customers or users.

With this case, users typically access your SaaS solution using hostnames tied to customers: `customerA.yoursaas.com` and `customerB.yoursaas.com`, or `yoursaas.customerA.com` or `yoursaas.customerB.com`. They may also use an Org Id input form, like the AWS console, which then directs the user to the correct location.

Businesses typically have their own employee directory using tools like Okta, Azure AD, and Google Workspace. They want to control access to your application automatically using tools like SCIM or SAML/OIDC just-in-time provisioning.

You can have each customer's users isolated, so that customer A's users are distinct from customer B's users. The users belonging to customer A will be logically isolated and separate from the users of customer B. You can customize the login screens and identity provider settings of each of your customers. You can translate between the roles at the customer and within your application using our reconcile lambdas. This is common if you are private labeling your software.
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
Use FusionAuth as a rock solid user data store, but take control of the login workflows, the user experience, and other aspects of the authentication experience. You have complete control over the location of the data and how your users log in. This can be helpful if you have stringent UX or unique workflow requirements.

Use the Login API and other APIs to create your own user interfaces. FusionAuth is a simple, secure datastore with unlimited profile data, search capabilities, and security built in.
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
If you ship software to install in private clouds or data centers, FusionAuth can be a lightweight identity broker allowing you to easily add support for your customer’s identity providers. This lets your software easily integrate into your customer's environment.

Leverage FusionAuth's documentation on how to configure connections to Azure AD, Okta and more. Your engineering team uses the FusionAuth APIs and SDKs to get user and role data.
Original file line number Diff line number Diff line change
@@ -0,0 +1,5 @@
Manage authentication and permissions for software programs using the client credentials grant and access tokens. More secure than static API keys, with fine grained permissions and service identity built in.

Self-host FusionAuth and embed it into your Kubernetes cluster, on-prem data center or other environment.

FusionAuth can scale to hundreds of millions of entities (APIs, devices) and you can manage the entire solution via language specific SDKs.
33 changes: 33 additions & 0 deletions astro/src/content/docs/get-started/use-cases/index.mdx
Original file line number Diff line number Diff line change
@@ -0,0 +1,33 @@
---
title: Overview
topOfNav: true
description: An overview of FusionAuth Use Cases.
section: get started
subcategory: use cases
---
import AuthServiceDescription from 'src/content/docs/get-started/use-cases/_auth-service-description.mdx';
import AppSuiteDescription from 'src/content/docs/get-started/use-cases/_app-suite-description.mdx';
import B2B2CDescription from 'src/content/docs/get-started/use-cases/_b2b2c-description.mdx';
import B2B2EDescription from 'src/content/docs/get-started/use-cases/_b2b2e-description.mdx';
import M2MCommunicationDescription from 'src/content/docs/get-started/use-cases/_m2m-communication-description.mdx';
import IdentityBrokerDescription from 'src/content/docs/get-started/use-cases/_identity-broker-description.mdx';
import AuthorizationHubDescription from 'src/content/docs/get-started/use-cases/_authorization-hub-description.mdx';
import DataStoreDescription from 'src/content/docs/get-started/use-cases/_data-store-description.mdx';
import APIConsentsPlatformDescription from 'src/content/docs/get-started/use-cases/_api-consents-platform-description.mdx';

As a flexible developer tool, FusionAuth can be used in many different ways. We've even heard of customers using us for localized email template management. But there are a few key use cases that FusionAuth particularly shines at, and this section outlines them.


| Use Case Name | Description |
|------------|------------|
| Auth as a service | <AuthServiceDescription /> |
| App suite | <AppSuiteDescription /> |
| Business to business to consumer (b2b2c) | <B2B2CDescription /> |
| Business to business to employee (b2b2e) | <B2B2EDescription /> |
| Machine to machine communication (m2m) | <M2MCommunicationDescription /> |
| Identity broker | <IdentityBrokerDescription /> |
| Authorization hub for social | <AuthorizationHubDescription /> |
| API user consents and delegated access | <APIConsentsPlatformDescription /> |
| Data store | <DataStoreDescription /> |


0 comments on commit c83d8e4

Please sign in to comment.