Skip to main content

Device Management

Overview

In this section, we will introduce you to the device management of cidaas.

Thereby we have two perspectives:

Perspective 1: Verification

Users and verification methods play an essential role for cidaas. In the verification methods, procedures are important where possession and inherence are concerned. cidaas provides multiple device-bound authentication methods like FIDO2, TouchID, Push and many more.

To manage, add, and delete devices is important for example, when switching laptop or mobile phone or even when having an authentication method set up on two devices, the user might want to select the device currently available.

Perspective 2: Login and Device Bound Logout

Also, during the login process devices play an important role. A user might log in across several different devices. Taking into account that a user might be logged in even on static devices like TVs, Fridges and many more, they would like to manage and log out on specific devices purposely from a profile page.

Users can view and manage their active devices from their profile page, where they can see all devices where they are currently logged in and selectively log out from specific devices.

Developer perspective

APIDescriptionLink
Create a new deviceThis API will activate the cidaas device managementLink
Get the list of devices of the userThis API allows you to return all devices the user has an active session.Link
Remove user from the deviceThis API will logout the user for a particular deviceLink
  1. When a user accesses the authorization service domain, the device is created.
  2. After a successful login, this device will be assigned to the user.
  3. AWhen accessing the profile UI, a user a user is now able to view their devices.
  4. Clicking on Logout will trigger a logout for the session of this device.

Need Support?

Please contact us directly on our support page