Accelbyte IAM features enables you to control user access to critical information within your resources by regulating access to systems or networks based on the roles of each accounts you are managing. These features will easily help you to manage your user access and management like performing a specific task such as adding a role to a user or client, banning a user and many other administrative tasks. In doing so, this service offers you features as follows:
Authentication and Authorization In general, Accelbyte IAM helps you to easily and securely authenticate your users, especially when you have a large number of users. Thus, by providing an easy integration toward 3rd party applications, you will have a better authentication access that fits your needs such as making it easier for your user to access your resources.The right authorization helps you to ensure who is authorized and has permission to use particular resources. Especially, there are important yet sensitive information such as password, email addresses and many more crucial data to be securely maintained. Accelbyte IAM provides you with the technology to manage the data according to your policy as well as giving you flexibility.
Clients Management The clients management helps you to have a better client management by easily managing your clients permissions and roles.
Accounts Management The account management is a functionality that helps you easily manage your user accounts. This feature will help you to organize each of the accounts status, roles and other administrative tasks. For example, you can grant an entitlement to a user or ban a user to use particular features in your game.
Roles Management The roles management feature helps you to easily organize your user roles by updating anything related to roles. Here, the roles are defined by the job competency, authority and responsibility within the management.
Each of the features can be implemented using a direct access or API gateway implementation, so you need to fully understand about AccelByte Authentication and Authorization before getting to the how to use these endpoints.