Features Details

Graph-Based User Journeys

Visually design and deploy highly customizable, dynamic login and registration flows as graphs, adapting the user experience in real-time.

Graph-Based User Journeys

Introduction:

Traditional identity systems force you into rigid, linear authentication flows. This one-size-fits-all approach fails to adapt to user context, risk, or preference, leading to a clunky and frustrating user experience. Authentication shouldn't be a simple pass/fail checkpoint; it should be a dynamic and s journey.

The graph-based flow engine is the core of GoAM, fundamentally changing how you build user experiences. By representing login and registration as a visual graph of nodes, you gain complete control to craft dynamic, stateful, and context-aware user journeys. This model allows you to A/B test flows, branch logic based on real-time data, and precisely tailor every step of the user's interaction.

Use Case Example

An online service can implement adaptive authentication. The graph can check the user's context, such as their IP address or device. If a user logs in from a known, trusted device, they can be logged in instantly. If they log in from a new location, the graph automatically routes them to an additional MFA step, like an email OTP, balancing security and convenience.

A global application can design a registration flow that first asks for the user's country. Based on their selection, the graph branches to show region-specific UIs, collect the correct data fields, and present the appropriate data privacy consent forms (like GDPR for EU users or CCPA for users in California), ensuring global compliance.

Offer Your Users Secure and Easy Login Experiences

Ready to elevate your very first user touchpoint? Contact us today and transform your business with better user experiences.

AirTide Webflow template Image
Our Blog

Blogs & Articles

Swiss E-ID: Issuing Credentials
Technology
6 min read

Swiss E-ID: Issuing Credentials

A technical walkthrough on Swiss E-ID credential issuance. This guide details setting up the swiyu-issuer service, issuing a custom VC via OID4VCI, and testing a verifier security flaw by spoofing a betaid-sdjwt credential.
Swiss E-ID Beta, a First Look
Technology
10min read

Swiss E-ID Beta, a First Look

In this post we explore how the verification process of the Swiss E-ID works with the swiyu wallet and break down the OID4VP (OpenID) request codes used to check credentials. Step-by-step we go through the steps for developers to build their own local proof-of-concept (PoC) verifier using Docker, including how to register a DID in the SWIYU system. Finally, we analyze the communication flow and discuss a potential security weakness found during testing.