Authing is a serious, developer-centric identity cloud platform that was carefully designed by serious people and re-engineered twice before being brought to market. Through knowledge-based content marketing and word of mouth, Authing has attracted over 10,000 developers and fortune 500 companies, who have embedded Authing in over 20,000 applications. Today, millions of users are authenticated by Authing every day to access their desired applications.

Some people confuse Authing with Identity Access Management (IAM) or Single Sign On (SSO), but the two are not comparable. While traditional IAM addresses the issue of employee authentication, Authing attracts companies that value users and employees and want to achieve their vision through the ultimate user experience. They also had the foresight to recognize early on in the development of a product the importance of having a developer-centric identity hub, whether it’s the rapid growth of users, the rapid growth of applications, or even both the fragmentation of identity, data, and permissions. Authing is the only powerful tool to help them solve these problems once and for all, giving early adopters the confidence to invest time and money in Authing.

IAM’s way of thinking to solve the identity problem is to adapt and transform in the way of project. In Authing’s opinion, this belongs to drinking dove to quench thirst; Authing’s solution is to transform the underlying mindset from the developer’s perspective. This enables Authing to become a de facto standard faster because Authing is knowledge-based, reusable, and embedable, just as Authing is positioned as a reusable identity infrastructure. Not only is it reusable in terms of functionality, but also in terms of skill points that programmers move from job to job, Authing has become a plus for developers on their resumes.

User value and employee value are the two most influential factors that can create value for enterprises in the current society. Employees create and market products for the company to generate revenue; Users, as consumers, place orders, or create content, or consume content, generating social value for the enterprise.

As a result, Authing’s positioning as a safe product is slightly off.

Authing actually defines and opens up a new market. In this market, customers manage their teams with “user thinking”. For example: **1) Start to pay attention to elite talents as value users; 2) Start valuing people as much as user experience; 3) Conduct team research and analysis just like conducting customer return visits. ** In the final analysis, it is all about dealing with human issues — serving users well can create business barriers; And good management of staff, can enhance the competitiveness of the team.

Ultimately, Authing wants to build the next generation of computing infrastructure that is people-centric and identity-centric. This infrastructure will address the pervasive problem of data silos at the bottom of identity architecture. Authing is a new identity interconnection standard that computers can understand, which will lead to the exploration of new and unknown possibilities. The purpose of connected identity is to shape connections so that people and machines can find and read identities on the Internet. Through connected identity, people can analyze him and find similar identities.

To understand Authing, we should not simply understand it from the identity industry, but from the development of the computing industry. This is also why Authing did not hire people from traditional IAM manufacturers. After practice, Authing’s team was convinced that people who only knew IAM could not do well in Authing’s products. The person who can do Authing’s product well will be a multi-disciplinary person with a deep understanding of computing, cloud, art and developers.

Authing’s computational philosophy

# 1 Computing must be business oriented

Business-oriented computing can be a bit abstract. To take a concrete example, in a rapidly expanding enterprise, where staff growth is very rapid, how to manage the budget is the chief concern of the CFO. In the beginning, the CFO could still do some simple arithmetic to estimate the budget. Later, with the increase of staff levels, the salary and treatment began to be stratified. At this time, the budget management would be confused, and at this time, the demand for refined management began to appear.

The startup CFO is always about two things: spending money and receiving money. In the early stage, money is spent on investors, which is a single dimension and relatively simple, counted as 1; Later, income will be combined to spend together, at this time the dimension becomes diverse, marked as 1 + 1; If income diversification occurs again, the dimension becomes 1 + (2^n), where the complexity of spending increases exponentially with income diversification; Of course, if the staffing structure and marketing budget change, it becomes (2^n)^2, and the complexity is too high to understand. If the CEO emphasizes that “all the money the company makes needs to be reinvested,” it is critical for the CFO to see a dynamic change in spending and receiving trends that determine how the company expands within its secure boundaries.

In view of this problem, financial alumni association has two ways to solve the problem:

Pull out dozens of very professional financial statements and let CFO make decisions by studying these complex professional statements; Pull out charts with business results to visually display the change trend of key indicators in each month and quarter (for example, budget burn chart of each team, and each chart is the result of seven or eight tables). In the case of accurate data, CFO can make decisions directly after seeing the charts without thinking;

Obviously, the second option is more of a hassle for the CFO, which facilitates rapid decision-making and thus rapid expansion of the company. This is business-oriented computing, all business results oriented.

I also want to point out that computing is everywhere. It’s not just programmers. All industries do it, it’s just the difference between using Python and Excel. The successful calculation is based on the understanding and familiarity with the business and the business-oriented calculation and sublimation of the calculation.

Second: the business-oriented core is people-centered and identity-centered

The CFO’s example illustrates what business-oriented computing is, which is essentially centered on the needs of the business side. When it comes to the business side, the business side is the people itself, and the supplier side is people-oriented and business-oriented computing. Not only is the supply side business-oriented, but the CFO’s spending decisions involve a lot of people decisions. For example, in a technology company, after marketing costs, the biggest impact on the budget results is personnel compensation; Even when marketing costs are not taken into account, the CFO’s most important metric when approving a marketing campaign is how many people the campaign brings to the table (in ToC, nominal traffic; In ToB, business opportunity), and ultimately how many people have paid to convert to assess the ROI of the overall campaign.

The CFO belongs to the leader. Employees and users do not belong to the leader, but their experience is still important. In the ToC industry, people like to talk about user experience; In the ToB industry, people like to talk about customer success; And all HR is concerned about employee welfare; All ceos focus on employee productivity. The key to achieving overall efficiency improvement is to pay attention to the needs of each individual, and the key to understanding individual needs is to give an individual identity. According to Authing’s experience, this identity needs to meet the following two requirements:

1. A consistent identity network

2. Identity information has a clear meaning

This will bring many benefits, such as:

When hiring, interviewers want to fully understand and verify the person’s performance at the previous company. Interviewers can dig deeper and deeper to get information, but they can’t prevent candidates from lying. The best way to do this is for the candidate to give the interviewer access to data on their performance and behavior at the previous company. The best candidates are willing to share their best stuff with the interviewer, and this needs to be status-centric.

Such as:

0) Citizen Alice (A) has an identity. Similarly, a university (U) has an identity. A’s employer (E) also has an identity. 1) A is registered as A student of U and must provide her identity, which will enable A to receive A certificate after graduation from university. 2) A shall retain the authorization of U until graduation. U maintains all information of A until A graduates. This information includes courses, grades, teachers, etc. Such information is not publicly accessible, and only USER A has read and write permission. 3) A asks U for A certificate after graduation from university. A asks for A copy of the certificate so she can share it with A third party. U generates A summary of the certificate and sends it to A. The certificate is digitally signed by U using asymmetric encryption. 4) Shared diplomas. Now that A has received A copy of her diploma, she can share it with anyone. For example, grant their employer E access to the diploma. 5) Check the validity of your diploma. If E wants to check the validity of diploma A, E must check U’s signature on that diploma. E This is done by extracting the signature from the diploma, determining the authority (U).

This kind of identity-centric computing will reduce a lot of the application gap, and in Singapore it has been running for 18 years.

Number three: The greatest computing disruption has resulted in computing decoupling

Once upon a time, people built their own computer room, when the flow peak comes, people hurriedly from all over the country to transfer the machine, plug in the network cable, plug in the hard disk; Later, with the cloud, technology companies decoupled from the boring computer room and only needed to concentrate on their core business, all server resources were handed over to the cloud to maintain, just like farmers in the south do not need to worry about the water shortage problem, all the water is handed over to the cloud, which undoubtedly brought about the acceleration of innovation.

In the old days, people created their own identities. When traffic peaks, people rush to check the responsiveness of registered interfaces, add caching, load, and modify code. Later, with the identity cloud, technology companies were optimised to decoupled from annoying code-level links, leaving traffic peaks to professional identity clouds, which undoubtedly kept engineers more focused on contributing to the core business.

The identity cloud is to cloud computing what units of measurement are to the real cloud. Weather scientists predict weather based on cloud measurements, and identity-centric businesses predict user and employee behavior based on identity. Weather scientists don’t need to build clouds, just observe them, because units of measurement are always there; Authing is the missing unit of measurement in cloud computing, as companies move to the cloud without a metric that can observe and understand user behavior.

Decoupling has been a major concern in the computing industry for decades, and Github has grown thanks to the decoupling of common libraries. The more complex the business of human society, the more common libraries will appear. All successful computing infrastructure is about decoupling, Docker decouples applications from operating systems, acoustic networks decouples applications from real-time communication, and Authing decouples identity from data.

In a people-centered, identity-centric market, identity decoupling is an important change that every enterprise needs to undergo. Enterprises may think that identity decoupling is not a high priority or urgent. However, in order To make a successful enterprise, it is necessary To list the important and non-urgent things on the to-do list. The urgent things are handled by others.

Fourth: Revolutionize computing by making small changes

Authing is not only a product, but also a doctrine. Its core is that the underlying architecture determines the superstructure. Authing’s mission is to eliminate identity barriers between applications and fundamentally solve the ubiquitous problem of computing islands, thereby saving society the waste of resources caused by data convergence.

Authing appears to be an identity cloud, essentially redefining the relationship between people, data and applications. Authing establishes rules through the underlying architecture, making people the core and identity the center.

Throughout history, humans have been animals of tools, and Authing believes that the best tools inspire the greatest creativity in humans.

Authing is positioned as a productivity technology company for computing infrastructure. The mission of steam Memory, the main body of Authing, is to provide a platform for people to innovate through productivity technology. Authing is a product successfully commercialized as steam Memory develops computing infrastructure. Authing’s mission is to remove identity barriers between applications. Authing’s vision is to connect people and applications around the world.

Authing’s computing philosophy is people-centered and identity-centered. Authing has brought about the decoupling of computing, and this change in decoupling has revolutionized computing.