Understanding how Auth0 can be leveraged to meet your identity and access management needs requires visualization of your proposed - or in many cases existing - architecture. You will use this model as the basis for reference as you progress through the configuration steps. Auth0 accounts and tenants form the basis for the grouping and structuring of Auth0 assets.
|Tenants||What settings are available to tenants.|
|Applications||How to configure your applications to use Auth0.|
|APIs||What settings are available for APIs.|
|Single Sign-On||What Single Sign-on (SSO) is and how it works.|
|Attack Protection||How Auth0 detects attacks, protects your application, and provides alerts for suspicious behavior.|
|SAML||How Auth0 works with the Security Assertion Markup Language (SAML) protocol.|