B2B architecture
Architecture
B2B apps typically use a multi-tenant architecture. In these applications, users own their accounts and manage their identity and authentication, with involvement from other parties like businesses or organizations. End-user identities are often not individual consumers but employees or collaborators within a business organization.
B2B features
The Organizations feature is ideal for multi-tenant SaaS and B2B apps, supporting teams, organizations, and companies as clients.
Logto supports SP-initiated SSO with SAML and OIDC, connecting to providers like Okta, Azure AD, and Google Workspace.
Generic features
Various authentication methods: password, passwordless, and social sign-in.
Authenticator app, Passkey, Backup codes. Allow users to enable MFA independently.
Use Logto Account API to develop account settings and user profile pages for your end-users.
Define roles and assign corresponding permissions to control user actions.
Manage user identities in Logto Console or Logto Management API.
Allow users to authorize third-party apps themselves.
Connect your requirements to Logto’s support toolkit
This architecture includes three main parties involved in the management scenario. Depending on your specific needs and objectives, all or only some of these parties may be involved.
We’ve summarized common use cases, highlighting the key objectives of each user managing tasks and the related products and APIs we offer. You can map your needs to our services to get started quickly.
Users | Goal | Logto products and APIs |
---|---|---|
Developers | Manage and safeguard the user identity pool and work directly with the identity database. | |
Organization admin | Self-service organization management with custom features, giving organization admins full control over identity management. | |
End user/Organization member | Manage their own system-level authentication and personal information. |
Related resources
Use Logto for various business models' identity systems
Logto's authorization system and its use in identity management scenarios