Getting started with Beyond Identity

Welcome to Developer Docs

Welcome to the Beyond Identity Developer docs! The place where you can find all of our Product guides for the Secure Customer product which focuses on Customer Identity and Access Management (CIAM).

These guides are intended to provide the information and tools needed to start a passwordless journey with Beyond Identity. If you run into any issues or have any feedback for us along the way please let us know, we welcome your feedback!

About Beyond Identity

Beyond Identity provides the strongest authentication on the planet, eliminating passwords completely for customers at registration, login, and recovery, as well as from your database.

Unique to Beyond Identity, customers never have to pick up a second device to enroll or authenticate, passwords are completely eliminated from user flows and your database, and you can implement risk-based access controls using granular user and device risk captured in real-time.

Backed by a cloud-native architecture, our platform reliably handles enterprise workloads and usage spikes for always-on services. Our range of SDKs found on this docs site allow developers to get up and running quickly with Beyond Identity. All SDKs use industry standard protocols (OIDC/OAuth2.0) and include a sample app.

Get started today with building a world-class passwordless experience for your customers by implementing Beyond Identity in your mobile and web applications.

How it Works

Beyond Identity leverages an innovative implementation of asymmetric cryptography that is foundational to TLS to completely eliminate passwords from the customer experience and your database.

Instead of passwords, Beyond Identity authenticates customers with two strong factors -- "something you are" from the device biometric and "something you own" from the private key -- without requiring a second device.

During enrollment, the user receives a binding token via email that prompts the creation of unique, device-bound credential with private key generated and stored in the TPM and public key sent to the Beyond Identity Cloud.

During authentication, Beyond Identity issues a challenge signed by the private keys in the device’s hardware TPM, evaluates user and device security risk in real-time, and makes a risk-based access decision based on your security requirements.

What’s Next
Did this page help you?