When the call is received by identity policy host 602, policy selector 612 may be configured to select and retrieve the specified identity policy set forth in the call from policies stored in memory 626 based on the policy ID. The retrieved identity policy may be provided to and used by policy executor 614 to execute the user authentication process. For example, the specified identity policy may define a verification UI with which the user is required to interact at user device 604 via UI 606 for the sign up or sign in actions. This verification UI may be provided to application 620 and then to user device 604, or may be provided directly to user device 604 in embodiments. The verification UI may provide the user options to login/sign in using social media accounts or using a username/email and a password. For sign up, the verification UI may provide the user options to enter information required by the application service provider to create an account (e.g., an email address for email verification, and/or user information such as a password, a name, a screen name, gender, country of residence, date of birth, etc.). Additionally, the user may be required to agree to terms of service to sign up and create an account.
The user may then further interact with the verification UI to indicate the sign in/sign up information has been entered via the verification UI causing a token request and an identity claim to be provided to identity policy host 602, e.g., via application 620. As shown in