API's, plug-ins and more
Securely integrate applications and microservices into the IAM environment.The smooth integration of IAM services and functions is the ultimate goal.
With us, everyone finds the right connection.
Simply because we rely on modern interfaces like REST and on important standards like OpenID Connect or SAML.
So it is no hurdle for us to link, for example, an appointment scheduling software, a content management system or business intelligence / analytics tools for marketing tasks with Login-Master.
Login-Master
– Connection options at a glance
SSO / Login / Identification
Login-Master’s SSO module is based on Keycloak. To integrate the login function for Internet applications, we offer services and components that build upon Keycloak. There are ready-made components for this purpose:
- Adapter (alternatively a provisioning adapter to work without Keycloak)
- Gatekeeper
- Extension (SecuRole®, the authorisation framework)
- Plug-ins (Postident-Adapter, connection for content management systems like WordPress)
Keycloak itself is based on modern standard protocols, such as OpenID Connect and OAuth2. Login-Master is compatible with Red Hat SSO (the commercial SSO solution) or alternative SSO solutions. For login and single sign-on, we rely on proven and widely used standards.
Find our more about:
Keycloak – Open Source Identity and Access Management
SecuRole® – Dynamic authorisations via the authorisation framework
Postident – Online identification via Deutsche Post (German postal service)
Back-end
We provide REST interfaces for connecting Login-Master modules to web applications and microservices. The following modules and functions can be connected via REST:
- MyProfile Application
- User management
- …
Learn more about our modules: MyProfile Application (online soon) – User management
Front-end
We work with Javascript to display our standard masks in Login-Master. You can customise these as needed in terms of content or graphics.
You can easily connect your own masks and GUIs to the Login-Master backend via REST interfaces. This way you can also use Login-Master as Whitelabel Software and keep your corporate identity or the original look and feel of your web application.
To get an idea of the masks and areas in the Login-Master front-end, book a Live-Demo with us. Or discuss a Whitelable solution with us: Contact
Standard technologies
- SQL databases
- LDAP (AD) directories für user management
- Import and export of data in standard formats
- Login-Master protocols based on OIDC & SAML
Plug-ins
For more than 65% of all content management systems* used worldwide, we offer a great add-on at a low price. We offer plug-ins for connecting Login-Master to
- WordPress (use of all Login-Master functions, incl. SSO for your CMS)
- TYPO 3 (upon request)
- Sitecore (upon request)
Postident adapter is an additional plug-in for the easy integration of safe online identification with Keycloak or Login-Master.
*Source: Statista
Login-Master and its components
… are the result of combining user lifecycle components – long in use at Germany’s largest telecommunications provider – with the best SSO solution on the market. Ultimately, we achieved this thanks to our 20 years of IAM development and consulting experience. No one can catch up to us that quickly.
With Login-Master, you rely on state-of-the-art technology that provides all the relevant interfaces for easy integration of your services on the internet. With us, you can count on extensive knowledge in the digital IAM world.
Convinced or would you like to hear more?
If we have piqued your curiosity, and you now know what you need, then get in touch with us. You’ll find our contact form below.
If you’d like to get a better understanding of what Login-Master offers, then please register for a Live Demo. Upon request, we’ll send you the technical details for Login-Master.
On the page “Integration” you will find instructions on how to connect Login-Master to new or legacy applications.
Integrate IAM easily.
Add value to your internet services with easily integrated IAM components. For the security of your users’ data and your applications. Let’s talk about it.