To develop any website or APP, whether it is social applications such as WeChat and Weibo, pan entertainment applications such as Tiaoyin and NetEase Cloud Music, e-commerce applications such as Taobao and JD, or even enterprise applications such as Feishu and SalesEase, we need to manage the identity of users, Just as the first step after clicking on APP is to register or log in first. When developing the login registration module, the following scenario requirements are usually encountered: Multiple login methods Password login, mobile phone verification code login, code scanning login and third-party social account login. For most consumer apps, you can log in with your mobile phone number or WeChat.
Personalized landing page After logging in, users have different preferences for colors and pages. Some people like the hard and simple black and cold color system, while some people like the bright and lively warm color system. This requires APP personalized landing pages to add brand image to strengthen brand recognition in users' minds.

Flexible device control If users need to log in to multiple devices at the same time, such as APP and Web, the product needs to be able to control users' online status and solve the problem of concurrent login. User behavior analysis of the system When enterprises grow users, they often do data analysis (AARRR) on users' access behavior - they need to know where our customers come from (user acquisition), how our users experience the product (user activation), what the renewal rate is (user retention), how to make customers introduce (recommended dissemination), and how to evaluate the user registration, login Multidimensional analysis of data such as user activity and user retention rate in each time cycle.

Secure identity authentication For some APP with high security requirements, such as financial management, banking and other systems involving property, when changing equipment or in other places, some additional authentication is required, such as ID card information, fingerprints, etc. APP with higher security even requires manual verification and audit.
Single sign on SSO across applications In the early stage of enterprise development, there may be only a few systems, such as OA system, financial system, online collaboration platform, etc. At this time, it is not difficult to manage accounts and passwords. But when an enterprise has dozens, hundreds, or thousands of applications, if employees re-enter accounts and passwords every time they log in to a system, it will waste time, cause unfriendly experience, and at the same time, it is easy to leak passwords. This requires multiple internal system functions accessed by one account, so that employees do not need to remember all passwords, You can log in directly without looking for a password anywhere. On the other hand, enterprises can easily control employees' access to applications and data, ensure that only authorized employees can access corresponding information, and improve system and data security.

Real time identity information synchronization Within an enterprise, there will be multiple systems that carry the identity management of employees, such as the department to which employees belong and the job level. How to keep employee identity synchronized in different systems, so as to uniformly manage employee information is crucial. For example, the company uses Feishu and WeChat as its internal office software at the same time, so employees need to synchronize in real time between different applications, otherwise it will cause confusion in permission management, miss important information, and affect the normal operation of work.

The above requirements are common but also shallow, and are only part of user identity and access management. For many enterprises specializing in identity, these modules have been developed for more than ten years and continue to work and iterate, only to build the tip of the iceberg of user identity and access management. With the acceleration of enterprise digital transformation and cloud deployment, the dimensions and boundaries of enterprise information security are becoming more and more complex. As the first door, identity authentication and access rights management bear a very critical mission.
As mentioned earlier, All applications are inseparable from user management 。 Taking Netease Cloud Music as an example, the user management module includes: mobile phone number, WeChat, QQ, Weibo and other registration, login methods, multi terminal (Web side, App side, Web side) login, as well as service protocol configuration, forgotten password, account retrieval and other related functions. To complete a basic account registration and login function, it takes up to a few weeks of development time for a front-end engineer and a back-end engineer.
After developing the user management module, Netease Cloud Music also needs to develop the membership system, core music player, live broadcast, community business, etc., which requires at least a medium-sized team for more than half a year. So, is there a stable and secure identity authentication scheme that allows developers to focus on the development of enterprise core business modules without the tedious steps of developing identity infrastructure? For example, Netease Cloud Music focuses on the core "music" function, Flying Book focuses on the core "collaboration" function, and Dithering focuses on the core "video" function. Authoring provides SDKs of all mainstream programming languages, which are open 1000+ API On top of API, we put forward a new development concept - Hyper Component. Authoring makes the login box in the form of a component, and only needs five Line code can quickly integrate the Guard universal login component, and one click configuration 20+ Social login mode. Just A few seconds , the identity system can be built. In addition, we also provide a cross platform componentized solution, which supports seamless login experience of web, iOS and Android.

In addition, adhering to the developer centered design concept, in 2022, Authing will launch a permanent free version, up to 8000 MAU, with basic authentication, identity source connection, user management and application management capabilities.
As a developer, how can we actually build a login system? Welcome to click Link The Authing developer documentation has very detailed practical methods.