All Products
Search
Document Center

Identity as a Service:Custom applications

Last Updated:Nov 19, 2025

Many enterprises use various custom applications to support their unique business processes. Administrators can add these custom applications in IDaaS. Developers can then integrate them by following the documentation that IDaaS provides.

Procedure

Many enterprises use various custom applications to support their unique business processes. Administrators can add these custom applications in IDaaS. Developers can then integrate them by following the documentation that IDaaS provides.

  1. Go to Applications and click Add Application.

  2. Select the Custom Applications tab and click Add Custom Application to begin configuring the custom application.

Integration layers of custom applications

IDaaS lets you integrate the identity systems of custom enterprise applications at three layers. We recommend that you review the integration requirements for each layer in descending order:

Integration layer

Description

Value

Layer 1: Unified logon

This layer implements single sign-on (SSO). By integrating the OpenID Connect (OIDC) protocol, configuring application accounts, and granting application permissions, you can enable enterprise accounts in IDaaS to use SSO to log on to applications.

Developer documentation: Integrate a custom application with SSO.

Employees can use a single account to access all applications.

This provides unified authorization, management, and behavior auditing.

Layer 2: Unified accounts

This layer implements account synchronization. By connecting to the IDaaS synchronization API, you can break down identity silos.

Developer documentation: Integrate a custom application with account synchronization.

This lets you modify account information in a single location, and the changes take effect everywhere. This process makes management fast and convenient, and significantly reduces inefficient work.

Layer 3: Unified permissions (Not supported yet)

This layer implements permission hosting. By connecting to the standard and flexible role-based access control (RBAC) model of IDaaS, you can host permissions, such as in-app roles, menus, and features, in IDaaS for unified authorization management.

This provides fine-grained access control and unifies the management of information access permissions across the enterprise.

This reduces the high development costs associated with creating complex permission systems for custom applications.