This is an example architecture for a typical SaaS product. To illustrate it, a fictional organization and project is used.
The Timing Company has a product called Time. They have two environments, the development and the production environment. In this case Time uses authentication and authorizations from ZITADEL. This means that the users and also their authorizations will be managed within ZITADEL.
An organization is the ZITADEL resource which contains users, projects, applications, policies and so on. In an organization projects and users are managed by the organization. You need at least one organization for your own company in our case "The Timing Company". As next step grate an organization for each of your costumers.
The idea of projects is to have a vessel for all components who are closely related to each other.
In this use case we would have two different projects, for each environment one. So lets call it "Time Dev" and "Time Prod". These projects should be created in "The Timing Company" organization, because it is the owner of the project.
In the project you will configure all your roles and applications (clients and APIs).
You can configure
check roles on authentication on the project, if you want to restrict access to users that have the correct authorization for the project.
To give a customer permissions to a project, a project grant to the customers organization is needed (search the granted organization by its domain). It is also possible to delegate only specific roles of the project to a certain customer. As soon as a project grant exists, the customer will see the project in the granted projects section of his organization and will be able to authorize his own users to the given project.
To give a user permission to a project an authorization is needed. All organizations which own the project or received a grant are able to authorize users. It is also possible to authorize users outside the own company if the exact login name of the user is known.
There are some different use cases how the login should behave and look like:
- Restrict Organization
With the primary domain scope the organization will be restricted to the requested domain, this means only users of the requested organization will be able to login. The private labeling (branding) and the login policy of the requested organization will be set automatically.
More about the Scopes
- Show private labeling (branding) of the project organization
You can configure on project-level which branding should be shown to users.
In the default the design of the instance will be shown, but as soon as the user is identified, the policy of the users organization (if specified) will be triggered.
If the setting is set to
Ensure Project Resource Owner Setting, the private labeling of the project organization will always be triggered.
The last possibility is to show the private labeling of the project organization and as soon as the user is identified the user organization settings will be triggered.
For this the Allow User Resource Owner Setting should be set.
More about Private Labeling