November 27, 2017 By Carmel Schindelhaim
Beery Holstein
3 min read

New in App ID – Let Users Sign-up and Sign-in to your Apps with an Email and Password

We are excited to launch our newest IBM Cloud App ID feature, Cloud Directory, that makes it easy for you to add user sign-up and sign-in to your mobile and web apps. Cloud Directory provides you with a user registry for your apps that scales with your user base, and includes simple ways to authenticate users to your apps using email and password. Cloud Directory has pre-built functionality for enhanced security and self service, like email verification, and password reset.

More broadly, App ID is an authentication and profiles service for developers to help you easily add authentication to your apps, and secure access to your APIs and app back-ends running on IBM Cloud. With App ID SDKs and APIs, you can get a sign-in flow working in minutes, enable social log-in through Google and Facebook, and add email/password sign-in. Use the the App ID User Profiles feature to store information about your users, like their app preferences, and leverage that info to build custom app experiences.

With Cloud Directory, let users sign-up directly from your app. Then, users have the option to sign-in with the email address and password that they set, or sign-in through external identity providers like Facebook and Google. Use pre-built functionality for email verification, and password reset. Configure the workflow to suit your needs, like to allow users to use your app for a period of time before they verify their email address. Take advantage of Cloud Directory client side APIs to allow users to change their password whenever they need to, or to log-out of your app.

App ID’s Cloud Directory includes a prebuilt sign-up and sign-in UI widget that you can use in your app, and a UI to let users reset their passwords. You can customize the logo and color scheme. If you want use your own branding, replace the default Cloud Directory sign-in UI with your own.

Cloud Directory integrates easily with App ID’s User Profile service, just as App ID’s social log-in functionality does. You can store data about users who choose to log-in with an email and password, and use that data to personalize their app experience. Also, users can start using your app anonymously, and when they do decide to sign-up or log-in, their saved attributes will carry over from their anonymous profile.

All this functionality is designed to save a lot of time you might otherwise spend writing custom code to build authentication flows, and time getting into the weeds of different security protocols and standards. App ID is built with the latest security standards, like OAuth2, OIDC, and SCIM, and allows you to easily meet security and privacy requirements to handle user data and sensitive info like passwords. Also, by enabling self service flows through App ID, you reduce help-desk traffic, which is always a good thing!

We’d love to hear from you with feedback and questions. Get help for technical questions at Stack Overflow, with the ‘ibm-appid’ tag. For non technical questions, use IBM developerWorks, with the ‘appid’ tag. For defect or support needs, use the support section in the IBM Cloud menu.

Also, for those of you who used Mobile Client Access (MCA) previously, some of you may have used the custom authentication feature of MCA to use a User Repository that you built yourself to manage users for your apps. If so, you might want to go check out Cloud Directory.

To get started with App ID, check it out in the IBM Cloud Catalog

– The App ID team

More from Security

Data privacy examples

9 min read - An online retailer always gets users' explicit consent before sharing customer data with its partners. A navigation app anonymizes activity data before analyzing it for travel trends. A school asks parents to verify their identities before giving out student information. These are just some examples of how organizations support data privacy, the principle that people should have control of their personal data, including who can see it, who can collect it, and how it can be used. One cannot overstate…

How to prevent prompt injection attacks

8 min read - Large language models (LLMs) may be the biggest technological breakthrough of the decade. They are also vulnerable to prompt injections, a significant security flaw with no apparent fix. As generative AI applications become increasingly ingrained in enterprise IT environments, organizations must find ways to combat this pernicious cyberattack. While researchers have not yet found a way to completely prevent prompt injections, there are ways of mitigating the risk.  What are prompt injection attacks, and why are they a problem? Prompt…

Building the human firewall: Navigating behavioral change in security awareness and culture

4 min read - The latest findings of the IBM X-Force® Threat Intelligence Index report highlight a shift in the tactics of attackers. Rather than using traditional hacking methods, there has been a significant 71% surge in attacks where criminals are exploiting valid credentials to infiltrate systems. Info stealers have seen a staggering 266% increase in their utilization, emphasizing their role in acquiring these credentials. Their objective is straightforward: exploit the path of least resistance, often through unsuspecting employees, to obtain valid credentials. Organizations…

IBM Newsletters

Get our newsletters and topic updates that deliver the latest thought leadership and insights on emerging trends.
Subscribe now More newsletters