Authentication
There are several options available to verify the identity of an individual using the . The authentication options are:
Jigx User Manager
When a user logs into the app on a mobile device, they need to be registered in and assigned a account. This can either be through an email invitation, registering at http://manage.jigx.com/register, or requesting to join an organization on the app's . user manager uses AWS Cognito for Authentication. Passwords are encrypted and cannot be read by users in Cloud.
When the user signs in, the credentials are matched in Cloud, and if valid, a token is returned to the device, where it is stored in the device keychain. All subsequent calls are made using the token in an SSL tunnel.
Jigx User Manager with Secondary credentials
Jigx user manager with Secondary credentials or authentication providers. This requires users to sign in with their user credentials and secondary credentials such as Microsoft or Salesforce. Secondary credentials are set up on a solution using OAuth. The OAuth is referenced by name in the REST (OAuth) function call.
An organization is configured for auto provisioning or a per-user invite, requiring administrative approval. The AAD or Okta configuration is stored in AWS-secured storage in Cloud. When the user signs in, the configuration for the organization is retrieved and sent to the mobile device. The configuration information runs the user through an OAuth loop with the configured external IDP, AAD, or Okta.
When auto-provisioning is enabled, if the user is validated by AAD or Okta and does not yet exist in the organization, will automatically create the user and do the necessary token creation and assignment. If the user exists in the Cloud and is authenticated successfully by AAD or Okta, the user is assigned a token for all subsequent calls. If the organization does not enable auto-provisioning, the user can request access, which needs to be approved by an administrator. Once approved, the user will be provisioned in .
Data flow with REST
- Jigx fetches the solution definition with a valid Jigx token.
- Function calls are made to the REST-enabled cloud service using the Cloud as a proxy, for example, for IP Allowlisting. The function calls can use OAuth, secrets, and tokens, but not basic authentication. OAuth configuration, secrets, tokens, and basic authentication are securely encrypted and stored in AWS. They are not user readable and are only used when the function call is made by a device with a valid token. The result is processed in the Cloud, including all function transforms, continuation, and error transforms, and sent to the device. The data is never stored in the Cloud and is only ever kept in memory while the function is executing. Function calls can be made directly from the device to the REST-enabled cloud service using the local execution model.
- OAuth configuration, secrets, and tokens are stored in the secure keychain on the device when the solution definition is synced. The result is processed on the device, including all function transforms, continuation, and error transforms, and the result is stored in SQLite on the device. The data never travels through the Cloud. SQL Server is currently not supported for local on-device execution.
Data flow with Microsoft SQL
- Jigx function calls are made from the device to SQL Azure or Microsoft SQL Server, using the Cloud as a proxy, for IP Allowlisting. The function calls use the connection configuration stored as a secure encrypted secret in Cloud on AWS. The SQL credentials are never sent to the mobile device. Once saved, the SQL credentials are not user readable and are only used by the Cloud when the function call is made by a device with a valid token. The result is processed in the Cloud, including all function transforms, continuation, and error transforms, and sent to the device. The data is never stored in the Cloud and is only ever kept in memory while the function is executing.
Single Sign-on (SSO)
Single Sign-On (SSO) authenticates the user against a 3rd Party Identity Provider (IDP). When a user logs into the app, checks if SSO is enabled for the organization, the check is based on the domain of the emails linked to the organization. Next, the OAuth configuration is checked to see if it points to the same domain. The OAuth redirect URL is verified for a match against the app configuration. The user is then authenticated against the 3rd party IDP. If the user is a match in and the 3rd party IDP, a access token is generated, and the user is granted access to the app. SSO is enabled in on an organizational level. The diagram below explains the SSO flow. See the Single Sign-On (SSO) and OAuth Configurations sections to learn how to enable SSO and OAuth.