Console Overview
The console is where you manage and configure all GenAuth resources. This article will help you learn how to use the GenAuth console to improve your productivity!
In the GenAuth console you can configure and modify GenAuth resources, users and other information.

INFO
Overview of the console
The following will introduce each module of the console from top to bottom according to the navigation menu on the left side of the console:
Module Description Overview Display various statistics of the system and users, including:
- Display the total number of applications.
- Display the total number of users.
- Display login and new user statistics.
- View the number of user logins, changes in the number of logins, application login information, user distribution and other statistics over a period of time in a variety of graphical methods. Application You can configure single sign-on (SSO) in the Application module, including:
- Integrate third-party applications.
- As a service provider (SP), integrate APP into GenAuth:
- You can configure basic application information, default page display, and integrate OIDC / SAML2 / CAS / OAuth 2.0 / protocol for the application.
- Configure login method.
- Perform access authorization.
- Customize application login box, security rules, and identity branding.
- Perform tenant configuration.
- As an identity provider (IDP), it provides external authentication. Identity source management Connect to third-party identity sources, support applications to authenticate and authorize login through third-party identity sources, and support customer-defined databases to store user data, as follows:
- Connect to enterprise identity sources (OIDC, SAML, office applications such as DingTalk, WeChat for Enterprise).
- Configure social login.
- Customize database. User Management Manage all organization and user information in the system, including:
- Create and manage users.
- Create and manage user groups.
- Create and manage organizations.
- Create synchronization tasks to achieve upstream/downstream synchronization of organization information and user information.
- Use LDAP protocol to view, modify, add and delete user information.
- Configure registration whitelist. After enabling, only users in the whitelist can register. Permission management Refined permission management based on resources, RBAC (Role-Based Access Control) and ABAC (Attribute-Based Access Control), including:
- Add and manage resources, and configure resource operation types.
- Add and manage roles, assign users and organizations to roles, and authorize resource operations for roles.
- Grant resource access, modification and other permissions to certain subjects through certain authorization rules. Security Settings Configure security policies for the development process, password settings, and two-factor authentication, including:
- Configure user pool-level basic, registration, and login security rules. Security domains (Allowed Origins) are URLs that are allowed to make requests to the GenAuth API from JavaScript (usually used with CORS). By default, the system allows you to use all URLs (*). This field allows you to enter additional origins if needed. You can separate multiple valid URLs by line, and use wildcards at the subdomain level (for example: https://*.sample.com. . ) Query strings and hash information are not considered when validating these URLs. If query strings and hash information are included, the system will automatically ignore the entire domain name.
- Customize password strength, encryption method, and password rotation policy.
- Configure user pool-level secondary authentication. Branding You can customize the login panel and configure information completion according to different corporate brand requirements.
- Configure the login box style.
- Upload custom CSS.
- Configure login registration user agreement.
- Configure message email and SMS reminders. Automation GenAuth's Pipeline, Webhook, and custom password functions greatly improve the flexibility and scalability of the authentication process, enabling users to automatically handle complex scenarios.
- Pipeline
- Webhook Audit log You can view user operation logs and administrator logs here. Settings Edit or delete user pools, modify development environment variables, etc.:
- User pool basic information settings
- Expense managementService upgrades and order details can be viewed here.
- Extended fields
- Environment variablesEnvironment variables are a set of Key-Value pairs (similar to operating system environment variables). You can manage some constant values in environment variables for use in scenarios such as Pipeline, SAML field mapping, and custom data.
- Collaborative administratorInvite users in the user pool or developers in GenAuth's official user pool to help you manage the user pool. Authorized developers will see the user pool on the user pool list page.