Stop building your users' management back-office. Cryptr relieves you from all of the heavy lifting of user administration for your web application and provides a complete back-office to customize the user authentication & account experience for your users without adding lines of code.
We believe an authentication as a service provider needs to ease your pain and not only on the authentication part. Cryptr brings you a fully-featured Back Office Admin dedicated to managing your customers' access and security policies and usable by your entire team (tech, customer service, etc.).
Easily edit your user fields, such as first names, last names, address ... etc.
Powerful filtering, sorting and grouping give you the freedom to organize your work the way you want.
View your users by company. Create a specific login page per company with dedicated authentication settings, each enterprise's users will be stored in a clean separated environment.
You can handle many applications with one authentication system. Get a single source of truth. See only users who provided authorization to an application.
You can handle many applications with one authentication system. Get a single source of truth. See only users who provided an authorization to an application.
You don't want your users to access certain parts: you need an RBAC. Role-based access control systems assign access and actions based on a person's role in your applications. Everyone who has this role has the same set of stock rights.
In addition to standardized user profile information, you can add metadata to store information that is unique to you.
In addition to using the dashboard, you can retrieve, create, update or delete users, groups and rights using our management API for your end users. Any action you can take in the dashboard, you can do in our API, and more.
Edit your access decision policy yourself, based on the role to which the user is associated. A role usually stems from the structure of a business or the need for your application. Users performing similar functions can be grouped under the same role, roles can themselves be grouped into groups. Easily centralize your access authorizations with Cryptr.
Our software architecture allows your software to serve multiple client organizations (enterprise) from a single API. It is opposed to a multi-instance architecture where each client organization has its own instance of software (and / or hardware) installation 2. Each customer organization has its own login portal and its own users, in its own database.
Customize your API connection and self-hosted white-label user services. Cryptr allows developers to modify their login portals, registration and emails without the need for a single line code. Change your colors and edit your texts directly in graphql. You can also specify the url of your logo, add your legal links.