Understanding how Auth0 can be leveraged to meet your identity and access management needs requires visualization of your proposed - or in many cases existing - architecture. You will use this model as the basis for reference as you progress through the configuration steps. Auth0 accounts and tenants form the basis for the grouping and structuring of Auth0 assets.
At Auth0, a tenant is a logically-isolated group of users who share common access with specific privileges to a single software instance. No tenant can access the data of another tenant, even though multiple tenants might be running on the same machine. Tenant, in general, is a term borrowed from software multi-tenant architecture. See Tenant Settings to learn how to configure the various settings related to your tenant.
Understanding where your applications fit within your organization is also important. After you create your Auth0 account and configure your tenant(s), you register and configure application(s). For example, it could be a native application that executes on a mobile device, a single-page application that executes on a browser, or a regular web application that executes on a server. See Application Settings to learn how to register and configure your applications.
Auth0 can detect attacks and stop malicious attempts to access your application such as blocking traffic from certain IPs and displaying CAPTCHA. See Attack Protection for details.
SAML configuration options
Auth0 supports the Security Assertion Markup Language (SAML) protocol and can serve as the identity provider, the service provider, or both (for testing purposes). See SAML Configuration Options for details.