User Authentication

Content

Overview

Most end users interacting with ULM will follow a standard authentication flow to open a session on service provider's application. User authentication is required in order to access most protected ULM resources (e.g., authentication is required to access most ULM APIs and certain Processes).

Authentication Methods and Protocols

Below are the two primary user authentication methods provided by ULM Cloud:

ULM Cloud also supports a variety of additional authentication protocols to open and maintain user sessions, including:

Note: Support for additional authentication methods are roadmapped for a near-future release, including:

  • Device based authentication (auto-log in a profile based on device mapping).
  • Network based authentication (home network for a given subscription).
  • One Time Passwords (OTP) via email and SMS.
  • Biometrics (e.g, fingerprint, voice recognition, retinal scan).

Revision History

Version Description
2020.11 Added this topic.