Search
K

Configure applications

Applications provide powerful tools and follow a declarative model that lets Maverics define a desired end state to control user access to apps. Maverics applications proxy apps, determine which identity systems should be used to authenticate users or provide attributes, extend those identity systems by managing sessions or evaluating and enforcing policies, and map attributes to headers that legacy on-premises or cloud-hosted apps need to allow access.
Maverics supports several types of applications including header-based, OIDC-based, SAML-based, and custom JSON code.