Security

MFA and Password Policies for Your Cloud-Native Apps with App ID and Updated Pricing

Share this post:

IBM Cloud App ID

If you are a developer building an application, IBM Cloud App ID makes it very easy to add user authentication. You can add authentication with few lines of code and forget about managing infrastructure to scale with your user base.

What’s new?

We are introducing new capabilities to give you the option to strengthen the security of each authentication: multi-factor authentication (MFA) and advanced password policies. Both of these capabilities strengthen authentications for App ID’s Cloud Directory. Cloud Directory is App ID’s scalable user registry that lets users sign up through your application and then sign in with the credentials that they set (email and password or username and password). In addition to Cloud Directory, App ID supports enterprise sign-in (by federating SAML-based identity providers or custom ones) and social sign-in (Facebook and Google).

These advanced security features have an additional pricing component. When you enable either one of these features (or both) from the App ID console, each authentication event is charged also as an advanced security event. See the pricing section in the catalog page for more details. Note that these features are not available in App ID’s Lite plan or in App ID instances created before March 14, 2018.

Multi-factor authentication and advanced password policies

Multi-factor authentication

Multi-factor authentication (MFA) for Cloud Directory authentications offers email-based MFA to start. If you turn MFA on, users will be challenged to provide a one-time code they receive via email, in addition to their password, any time they sign in. Note that if you are using enterprise sign-in with SAML 2.0 or social login, you can enable MFA in the identity provider you are using, which is separate from MFA for Cloud Directory authentications described here.

Advanced password policies

When you enable the advanced password policy feature, you can enforce more secure passwords for Cloud Directory. In the App ID console, configure a set of rules that user passwords must conform to, including things like the number of times a user can try to sign in without getting locked out and the number of times a password can’t be repeated.

This advanced policy is separate from the basic ability to set a required password strength in App ID.

We will follow up with more blogs detailing these new features. We encourage you to start exploring in the meantime.

Feedback and support

As always, we’d love to hear your feedback and questions. Get help for technical questions at Stack Overflow with the ibm-appid tag. For non-technical questions, use IBM developerWorks with the appid tag. For defect or support needs, use the Support section in the IBM Cloud menu. To get started with App ID, check it out in the IBM Cloud Catalog.

Offering Manager - Cloud Developer Services - Security

Beery Holstein

Offering Manager - IBM Cloud App ID

More Security stories
April 9, 2019

Track Your Cloud Activities Using IBM Cloud Activity Tracker with LogDNA

With IBM Cloud Activity Tracker with LogDNA, you can improve the security monitoring of your application by setting alerts for user access patterns and gain greater trackability for how your Cloud Service and Cloud Account is being used, configured, and accessed.

Continue reading

March 29, 2019

Adding Sign In to Multicloud Applications Without Code Changes

In this post, we will explore a proof of concept illustrating how we can leverage identity federation using a single IBM Cloud App ID instance along with common operational patterns, such as Kubernetes and Istio, to create a centralized identity and access management model that can transparently secure applications/services across cloud environments.

Continue reading

March 28, 2019

Sign In Your App Users With Any Identity Provider Using App ID

We're going to explain App ID’s custom identity flow and walk you through an example of how you can use it to integrate a third-party identity provider with App ID—specifically, LinkedIn.

Continue reading