Skip to main content

SlashID

Let's discover SlashID in less than 10 minutes.

Getting Started

Welcome to the SlashID developer hub. You'll find comprehensive guides and documentation to help you start working with SlashID as quickly as possible, as well as support if you get stuck. Let's jump right in!

Introduction

SlashID is a composable identity platform with two modules, Access and Gate.

Access is our Identity Provider. With Access, you can build secure, flexible authentication and user management in minutes. Access has five characteristics that make its architecture unique:

  1. Availability - Access is globally available, serverless, and has built-in fallback email and SMS providers. This means you can use Access to authenticate users and manage their identities without worrying about spiky traffic, latency issues affecting user experience, or deliverability guarantees for transactional messages.
  2. Security - Access's data store is exfiltration-resistant and protects you not just from credential stuffing and ATO attacks but also from the latest OAuth2 issues such as unsafe use of implicit grant flows and untrusted claims. Access also provides you with a secure, private, and encrypted user profile store that you can use to store user data and manage user identities.
  3. Compliance - Access enforces data residency. Access is built to comply with the most stringent data protection regulations such as GDPR, CCPA, and HIPAA. Access ensures that you can manage identities while adhering to data protection and residency requirements.
  4. Risk-based, full identity lifecycle - Access doesn't just authenticate users; it also profiles risk and performs identity resolution on anonymous users. This enables you to increase your user conversion and retention rates using progressive profiling while keeping bad actors away and enforcing risk-based access decisions.
  5. Event-based architecture with granular analytics - Identity data is at the core of data analysis, customer support, sales, and marketing. Access emits events for every identity operation, allowing you to build your own analytics and workflows through our built-in connectors and webhooks.

Gate is our identity-based traffic authorizer for APIs and workloads. With Gate, you can perform authentication, authorization, and other mission-critical identity operations at the edge of your infrastructure with a few simple config files.

Jump here to learn more about Access and here to learn more about Gate.

Feedback

Spotted an error or something missing? Let us know!