📄️ Instances
Instance Structure
📄️ Organizations
More about how to configure your organization read our organization guide.
📄️ Projects
To learn how to set up a project read this console guide here.
📄️ Applications
Applications are the entry point to your project. Users either login into one of your clients and interact with them directly or use one of your APIs. All applications share the roles and authorizations of their project.
📄️ Granted Projects
Organization Grant
📄️ Users
Types of users
📄️ Managers
Notes:
📄️ Setting and Policies
Settings and policies are configurations of all the different parts of the instance or an organization. For all parts we have a suitable default in the instance.
📄️ Actions
By using ZITADEL actions, you can manipulate ZITADELs behavior on specific Events.
📄️ Actions v2
By using ZITADEL actions V2, you can manipulate ZITADELs behavior on specific API calls, events or functions.
📄️ Audit Trail
ZITADEL provides you with an built-in audit trail to track all changes and events over an unlimited period of time.
📄️ Console
The ZITADEL console is a web-based interface designed to facilitate the management and administration of ZITADEL resources and configurations.
📄️ Custom domain
A ZITADEL custom domain refers to the ability for organizations to personalize the authentication experience by using their own domain name rather than the default ZITADEL domain.
📄️ External user grant
ZITADEL's external user grant is a feature that allows you to grant access to projects within your organization to users from other organizations.
📄️ Identity Brokering
Link social logins and external identity providers with your identity management platform allowing users to login with their preferred identity provider.
📄️ Passkeys
ZITADEL's passkeys feature enables passwordless authentication, offering a smoother and more secure login experience for your users. This document explains the essential details for developers.
📄️ Self Service
ZITADEL allows users to perform many tasks themselves.
📄️ Opaque tokens
In the context of application security, robust authentication mechanisms are essential for safeguarding sensitive data and ensuring user trust.