Hm @fabienne do you know of the top of your head if we have a distinc permission for the self-management for console? I think we had but I can't find it
I wonder how I can simply stop the users from my B2C Org to access the console so that they don't accidentally break their login. Should I put a middleware for my reverse proxy and block out all requests where the header x-zitadel-orgidx-zitadel-orgid equals the B2C Org id?
ZITADEL includes a console that allows Managers to configure all resources. All uses, including end-users, by default, view and manage their profile information.
Oh, I think it just clicked... Zitadel is using its own auth engine to service the console in the default project and I can just work with access + roles from there. Thank you @fabienne !
If someone runs into this section and is a slow thinker like me: 1) Create a role "console-access" in the default project 2) Grant the default project with the "console-access" role to your company org 3) Give your IAM Owner / Org Owner the "console-access" role 4) Profit
So with ZITADEL you also get a hosted login ui, this login ui can be used for all your applications and users, per default a lofin just checks authentication and not also authorization
with the default and organization settings, you can configure what login possiblities the user have. e.g username password, 2fa, sso, etc. and also branding