Logging In

Users working at the lowest level - public - can read some data. To be able to write data, and read non-public data, you must establish an identity and select a role.


Applications require your identity to obtain payment, to protect your personal data, to keep commercial confidentiality, or for other reasons.

You establish an identity when an identity provider verifies that you are an identified member of an online community. Some applications have their own identity providers. Others may trust third-party identity providers, such as Google.

You can have more than one identity, with more than one provider. You select the identity that you will use, and its provider, depending on the application you want to use.

Identity providers could be social networks, corporations, governments, or other organizations that have a concept of membership that they are able to verify online. Currently, they are mostly social networks. Soda uses the Oauth protocol (version 2) to establish identities. This protocol is widely supported by social networks as identity providers.

To establish an identity, click the user button at the top of the page. If you have previously established an identity, you may then be able to re-establish it by clicking the login button. Alternatively, you can choose one of the identity providers registered on a connected source.You will be redirected to the provider's website to establish your identity, then redirected back to the Soda system, in accordance with the Oauth protocol. The provider may ask for your password, or other credentials. These are processed by the provider and not shared with Soda. If you have established your identity with that provider fairly recently, there may be no need to re-enter your credentials. The process generally works smoothly and quickly.

The administrator of a source can register identity providers on it.

You can have more than one identity, with one or with several providers. You can only use one of them at once, but you can switch between them quite easily.


When you have established an identity, you can select a role.

Roles are access levels. They are represented by items, which are stored in sources. The administrator of the source containing the item representing a role can determine which identities can claim the role, or can delegate this determination to an identity provider.