Skip to content

Admin Console

The IDToken Console is the operator dashboard for id3 Technologies staff and authorized partners. It provides centralized management of the IDToken authentication ecosystem.

Without the console, all admin operations require raw API calls or direct database queries. The console replaces this with a professional, auditable interface for:

  • Enrollment oversight and token revocation
  • Real-time session monitoring
  • Audit trail analysis and export
  • Trust infrastructure health monitoring
  • Operator management
RolePermissionsTypical User
Super AdminFull access: revoke tokens, manage operators, configure systemid3 platform team
OperatorRevoke tokens, view enrollments, view audit logs for own actionsid3 support staff, authorized partners
AuditorRead-only: view enrollments, audit logs, analyticsCompliance officers, security reviewers

All roles authenticate via IDToken itself (dogfooding) — operators enroll with their own VDS credential and are assigned admin roles.

Real-time operational overview with widgets:

WidgetDataRefresh
System healthGET /health30s poll
Auth success rate (24h)Audit log aggregation5 min
Active sessionsRedis session count10s poll
Enrollments (total/active/revoked)Database count5 min
Auth volume chart (7 days)Time series5 min
Recent failuresAUTH_REJECT, VDS_VERIFY_FAIL eventsReal-time WebSocket
VDS trust statusTrust cache TTL, cert expiry5 min

A live session ticker shows AUTH_INITIATE, AUTH_APPROVE, AUTH_REJECT events in real time with color-coded status badges.

  • List view — sortable, filterable table: tokenId, deviceId, trustLevel, status, date
  • Search — by tokenId (partial match) or deviceId
  • Filters — trust level, status (active/revoked), date range
  • Detail view — all enrollment fields, session history, audit trail, VDS metadata
  • Revoke button — confirmation modal with reason picker (lost_device, compromised, expired_document, user_request)
  • Bulk export to CSV
  • Live view — real-time feed of pending sessions (WebSocket), with countdown timers
  • History view — paginated table, filterable by status, tokenId, date range, serviceId
  • Detail view — full session lifecycle (initiated, approved/rejected/expired), timing, client info

Searchable, read-only view of the immutable audit trail:

  • Full-text search across event_type, tokenId, sessionId
  • Multi-select event type filter
  • Token and session drill-down (click any ID for full history)
  • Timeline visualization for specific tokenIds
  • Export filtered results to CSV

Event color coding:

ColorEvents
GreenENROLL, AUTH_APPROVE, VDS_VERIFY_OK
RedAUTH_REJECT, VDS_VERIFY_FAIL, REVOKE
YellowAUTH_EXPIRE, VDS_TEST_CERT
BlueAUTH_INITIATE

Operational view of the VDS PKI trust infrastructure:

  • Governance List — last fetch time, signature status, next refresh
  • Scheme List — IAC, last fetch, TSL pointers, cache TTL
  • TSL status — per-TSL: URL, last fetch, CA count, freshness
  • Certificate inventory — cached signing certs with validity, expiry countdown, UsageList
  • VRL status — last fetch, revoked VDS count, distribution point
  • Alerts — cert expiring within 30 days (yellow), expired (red), stale trust list (warning)
SettingDescription
Operator managementAdd/remove operators, assign roles
Rate limit tuningAdjust auth/enroll rate limits at runtime
CORS originsManage allowed origins list
Trust cacheForce-refresh trust lists, clear certificate cache
Service ProvidersRegister SAML SPs, upload metadata, configure attribute mapping
System infoServer version, uptime, Node.js version, connected services
  • No direct database access — all data flows through the auth server admin API
  • HttpOnly cookies — admin JWT stored securely (SameSite=Strict)
  • CSRF protection — Astro server endpoints validate the Origin header
  • Role-based route guards — Astro middleware checks the JWT role claim
  • Audit trail — all admin actions logged (ADMIN_REVOKE, ADMIN_OPERATOR_CREATE, etc.)
  • No sensitive data in browser — OTP values, private keys, raw VDS payloads never sent to the console