Skip to main content

B2C architecture

Architecture

In consumer applications, users fully own their accounts and control their identity and authentication, with no involvement from other “middle-layer” parties like businesses or organizations. This is the key distinction between B2C and B2B identity architectures.

Build your B2C identity system

Connect your requirements to Logto’s support toolkit

This architecture includes two main parties involved in the management scenario. Depending on your specific needs and objectives, all or only some of these parties may be involved.

We’ve summarized common use cases, highlighting the key objectives of each user identity managing tasks and the related products and APIs we offer. You can map your needs to our services to get started quickly.

UsersGoalLogto products and APIs
DevelopersManage and safeguard the user identity system and work directly with the identity database.
End user/ConsumersManage their own authentication and personal information.

Use Logto for various business models' identity systems

Logto's authorization system and its use in identity management scenarios