May 9, 2019 By Anton Aleksandrov 2 min read

We are happy to share that we started to publish a series of video tutorials explaining how to add user authentication and access control into your apps using IBM Cloud App ID.

IBM Cloud App ID is a service that lets developers to easily add authentication, authorization, and user profile services to apps and APIs running on IBM Cloud. Using App ID SDKs and APIs, you can get a sign-in flow working in minutes. Enable social log-in through Google and Facebook, enterprise log-in through SAML, or add username/email/password sign-in using App ID’s scalable user registry—Cloud Directory. Instrument your apps with App ID to ensure authorized users have access to only what they should have access to. The app experience is custom, personalized, and, most importantly, secure.

Video tutorials

The tutorials explain various concepts behind adding authentication and access control capabilities into your apps, demonstrate various patterns, and are accompanied by simple, easy-to-understand sample applications. We’re looking forward to publish more tutorials in future, covering most common scenarios and use-cases we see App ID is used for.

We begin with a core set of tutorials, explaining the basic authentication and access control concepts and demonstrating how to instrument your applications.

We recommend you subscribe to the playlist and enjoy new tutorials as we publish them.

Try it out

We’d love to hear from you with feedback and questions. Get help for technical questions at Stack Overflow with the ibm-appid tag. For non-technical questions, use IBM developerWorks with the appid tag. For defect or support needs, use the support section in the IBM Cloud menu. To get started with App ID, check it out in the IBM Cloud Catalog.

Looking for more technical information about App ID? Get the latest copy of our technical white paper, which covers a wide range of topics, including an overview of the App ID service, our development and operations principles, App ID usage patterns, and explanation of App ID capabilities.

More from Security

How to build a successful risk mitigation strategy

4 min read - As Benjamin Franklin once said, “If you fail to plan, you are planning to fail.” This same sentiment can be true when it comes to a successful risk mitigation plan. The only way for effective risk reduction is for an organization to use a step-by-step risk mitigation strategy to sort and manage risk, ensuring the organization has a business continuity plan in place for unexpected events. Building a strong risk mitigation strategy can set up an organization to have a…

Leveraging CISA Known Exploited Vulnerabilities: Why attack surface vulnerability validation is your strongest defense 

5 min read - With over 20,000 Common Vulnerabilities and Exposures (CVEs) being published each year1, the challenge of finding and fixing software with known vulnerabilities continues to stretch vulnerability management teams thin. These teams are given the impossible task of driving down risk by patching software across their organization, with the hope that their efforts will help to prevent a cybersecurity breach. Because it is impossible to patch all systems, most teams focus on remediating vulnerabilities that score highly in the Common Vulnerability…

How SOAR tools can help companies comply with the latest SEC cybersecurity disclosure rules

3 min read - In July 2023, the Securities and Exchange Commission (SEC) voted to adopt new cybersecurity rules and requirements for all publicly listed companies to address risks. Among the new rules were updated requirements for filing Form 8-K as well as new disclosure obligations for Form 10-K.  Under the new rule, public companies will be required to report on Form 8-K within four business days after the company determines it has experienced a material cybersecurity incident. The filed Form 8-K must describe:…

How financial institutions can deliver value from investment in digital operational resilience

2 min read - The Digital Operational Resilience Act (DORA) is a landmark piece of legislation in the European Union (EU) that is designed to help fortify the operational resilience of the financial sector, making it fit for purpose in the digital age. DORA has several objectives, including to comprehensively address information and communications technology (ICT) risk management in the financial services sector and harmonize the ICT risk management regulations that already exist in individual EU member states. Building the requisite level of digital…

IBM Newsletters

Get our newsletters and topic updates that deliver the latest thought leadership and insights on emerging trends.
Subscribe now More newsletters