Features Details

Custom Extension

Integrate Identityplane effortlessly with your existing systems. We ensure compatibility and smooth transitions, so you can enhance your business operations without disruption.

Custom Extension

Introduction:

No identity platform can anticipate every unique business requirement or future integration. Organizations often find themselves locked in by their IAM vendor, unable to connect to a proprietary internal system or implement a specific piece of business logic. A modern platform must be extensible by default, not as an extra.

GoAM is architected to be a platform you build on, not one you work around. Its custom node architecture provides a powerful "plug-in" model, allowing your developers to write their own Go code and inject it directly into the authentication graph. This ensures GoAM never becomes a bottleneck and can adapt to any integration challenge.

GoAM is built for extensibility. If a specific integration or piece of business logic isn't available out of the box, you can easily add it by creating a custom node. These nodes plug directly into the authentication graph, allowing you to introduce any logic you need.

This means new authentication methods, API calls to internal risk engines, custom consent collection steps, or unique business logic can be added without modifying the core system. This node-based extensibility ensures GoAM can adapt to your specific requirements, both now and in the future.

Use Case Example

An e-commerce company can create a custom node that, after a successful login, makes a real-time API call to an internal fraud-detection service. Based on the risk score returned, the graph can decide to either grant access immediately, require an additional verification step, or temporarily lock the account.

A large enterprise needs to integrate with a legacy, on-premise HR database that doesn't support modern protocols. They can build a custom node that securely queries this database during the login flow to verify a user's employment status or department, enforcing access policies based on data from any system.

Offer Your Users Secure and Easy Login Experiences

Ready to elevate your very first user touchpoint? Contact us today and transform your business with better user experiences.

AirTide Webflow template Image
Our Blog

Blogs & Articles

Swiss E-ID: Issuing Credentials
Technology
6 min read

Swiss E-ID: Issuing Credentials

A technical walkthrough on Swiss E-ID credential issuance. This guide details setting up the swiyu-issuer service, issuing a custom VC via OID4VCI, and testing a verifier security flaw by spoofing a betaid-sdjwt credential.
Swiss E-ID Beta, a First Look
Technology
10min read

Swiss E-ID Beta, a First Look

In this post we explore how the verification process of the Swiss E-ID works with the swiyu wallet and break down the OID4VP (OpenID) request codes used to check credentials. Step-by-step we go through the steps for developers to build their own local proof-of-concept (PoC) verifier using Docker, including how to register a DID in the SWIYU system. Finally, we analyze the communication flow and discuss a potential security weakness found during testing.