📄️ Get started
This section gives a quick walkthrough on how to register your account, create your first application and issue your
📄️ Access management
Access management is a critical component of information security that involves ensuring only authorized users have access to specific resources, systems or information.
📄️ Fine-grained access control
Access management in an application often requires a hierarchy to effectively manage user access to different resources. This
📄️ Multi-tenancy
Multi-tenancy refers to a software architecture principle where a single instance of a software application serves
📄️ Domain modeling
In Akkess, we use the concepts of actors and nodes to model hierarchical access control.
📄️ Application firewall
Background
📄️ Tenants, Applications and Accounts
The Akkess IAM management has three main entities to keep track of: accounts, applications and tenants.
📄️ Identity provider abstraction
Background
📄️ Multiple instances and SSO
Problem
📄️ Idp OAuth 2.0 code flow setup
Overview
📄️ Issue IAM token
Issue token request - Bearer token
📄️ Validate IAM token
Token validation steps
📄️ Use IAM token to check permission
Introduction
📄️ Domain model integrity
Problem
📄️ Deployment
Akkess is deployed as a set of microservices and can be deployed on any container supported environment.
📄️ A project example
Background