{"_id":"5a0b0d9b04d0d600269f1384","category":{"_id":"5a0b0d9b04d0d600269f1376","version":"5a0b0d9b04d0d600269f1373","project":"573c7e3b9eef3a0e00b51c58","__v":0,"sync":{"url":"","isSync":false},"reference":false,"createdAt":"2016-09-13T19:58:29.432Z","from_sync":false,"order":2,"slug":"itegration-guide","title":"Integration Guide"},"user":"573c7e0afe58321900f1b97d","parentDoc":null,"project":"573c7e3b9eef3a0e00b51c58","version":{"_id":"5a0b0d9b04d0d600269f1373","project":"573c7e3b9eef3a0e00b51c58","__v":1,"createdAt":"2017-11-14T15:36:59.500Z","releaseDate":"2017-11-14T15:36:59.500Z","categories":["5a0b0d9b04d0d600269f1374","5a0b0d9b04d0d600269f1375","5a0b0d9b04d0d600269f1376","5a0b0d9b04d0d600269f1377","5a0b0d9b04d0d600269f1378"],"is_deprecated":false,"is_hidden":false,"is_beta":false,"is_stable":true,"codename":"","version_clean":"2.0.0","version":"2.0"},"githubsync":"","__v":0,"updates":[],"next":{"pages":[],"description":""},"createdAt":"2016-09-13T19:57:58.914Z","link_external":false,"link_url":"","sync_unique":"","hidden":false,"api":{"results":{"codes":[]},"settings":"","auth":"required","params":[],"url":""},"isReference":false,"order":0,"body":"As noted, the steps required to implement Privakey involve:\n1.\tRegistering on [Privakey.com ](https://www.privakey.com)to be a Relying Party\n2.\tEnabling the open source OpenID Connect Protocol on your service\n3.\tDeveloping interfaces and controls for Registration, Login, and possibly Account Recovery and Administration\n\nIn this section we discuss each of these steps in detail.  \n\n[block:callout]\n{\n  \"type\": \"info\",\n  \"body\": \"This overview will provide information on enabling Privakey as a User-Opt in option.  The large variety of options for managing user access and account provisioning available to services precludes us from outlining all options.  However, the implementation details for a User-Opt-In model covers all of the core concepts for implementing Privakey.  If you opt for a different implementation method, you will need to adjust your approach accordingly.  Where possible, considerations for alternate models are discussed.\",\n  \"title\": \"Important Note:\"\n}\n[/block]","excerpt":"","slug":"implementation-details","type":"basic","title":"Implementation Details"}

Implementation Details


As noted, the steps required to implement Privakey involve: 1. Registering on [Privakey.com ](https://www.privakey.com)to be a Relying Party 2. Enabling the open source OpenID Connect Protocol on your service 3. Developing interfaces and controls for Registration, Login, and possibly Account Recovery and Administration In this section we discuss each of these steps in detail. [block:callout] { "type": "info", "body": "This overview will provide information on enabling Privakey as a User-Opt in option. The large variety of options for managing user access and account provisioning available to services precludes us from outlining all options. However, the implementation details for a User-Opt-In model covers all of the core concepts for implementing Privakey. If you opt for a different implementation method, you will need to adjust your approach accordingly. Where possible, considerations for alternate models are discussed.", "title": "Important Note:" } [/block]