PIPES - com.phenixidentity~phenix-pipes
This article describes one of the core modules, PIPES.
View ArticleAuthentication API - com.phenixidentity~phenix-api-authenticate
This article describes one of the core modules, auth-http.
View ArticleStore - com.phenixidentity~phenix-store-json
Store is a module which is a core piece that is required in all installations. Â The store module is responsible for the system configuration. All modules needing any kind of persistant configuration...
View ArticleReplay cache - com.phenixidentity~phenix-replay-cache
This article describes one of the core modules, auth-http.
View ArticleFiles & Folders
This article gives a description about key files and folders within PhenixID Server. Files or folders not mentioned in this article is still a part of the system and should be left alone.Â
View ArticleSigning - com.phenixidentity~phenix-crypto
This article describes one of the core modules, auth-http.
View ArticleOpen ID discovery - com.phenixidentity~phenix-oidc-discovery
This article describes one of the core modules, auth-http.
View ArticleWhat to expect
This document provides an overview of the system architecture and the technical key components of the PhenixID Server platform. The goal is to give the reader a deeper understanding of how PhenixID...
View ArticleThe basics
PhenixID server is built on JAVA and is completely self contained. For each PhenixID release the JAVA version will be updated to the latest official version. Supported plattforms are Windows 64 bit and...
View ArticleThe modular system
Instead of pushing a monolithic system on to a customer, PhenixID server has a "only install what you need" approach. System functions are divided into smaller pieces, modules. Each module provides a...
View ArticleFunctionality
PhenixID server ships with lots of functionality. Many functions are exposed through the web based config UI but just as much are not. In this article you will get a brief run through on the built in...
View ArticleSystem flow - a typical request
This article explains the internal flow of an authentication request made by a Firewall, typically a VPN login. Please note that this is a logical explanation. No configuration is explained here.
View ArticleBootstrapping - the start up
Regardless of platform, the startup process of PhenixID Server is the same.
View ArticlePhenixID Data model
This article explains the data model used. As an administrator of the system, you need to understand the data model to be able to configure the system.
View Article