Core Concepts
User Identity
Decentralized User Management
Learn how social.plus handles user identity without storing personal data
Learn how social.plus handles user identity without storing personal data
User Operations
Profile & Repository Management
Query, search, and manage user profiles and metadata
Query, search, and manage user profiles and metadata
User Roles & Permissions
Access Control
Implement role-based permissions and moderation privileges
Implement role-based permissions and moderation privileges
How social.plus User Management Works
Decentralized Approach: social.plus SDK does not store or manage personal user data. Instead, users are represented by unique identifiers that you control.
Key Principles
1
Your Data, Your Control
social.plus doesn’t store user profiles, emails, or personal information. You maintain full control over your user data in your own systems.
2
Unique User Identifiers
Every user is represented by a unique
userId
- typically your database primary key or another immutable identifier.3
Role-Based Permissions
Assign roles and permissions through your admin panel, giving users different privileges and access levels.
4
Query & Search Capabilities
Use social.plus repositories to query user information and perform searches across your user base.
Implementation Workflow
Your Application Handles:
- User signup/registration
- Email verification
- Profile creation
- User data storage
- Unique user ID
- Display name
- Optional roles
- Optional metadata
Benefits of This Architecture
Privacy & Compliance
Privacy & Compliance
Data Sovereignty: Your user data stays in your systems, making GDPR/CCPA compliance easier.Security: No sensitive user data is stored in social.plus systems, reducing security risks.Control: You maintain full control over user privacy settings and data access.
Scalability & Performance
Scalability & Performance
No Migration Required: Integrate social.plus without migrating existing user data.Flexible Architecture: Works with any user management system or database.Performance: Optimized queries without the overhead of managing user profiles.
Development Efficiency
Development Efficiency
Quick Integration: Add social features without rebuilding user management.Existing Infrastructure: Leverage your current user systems and processes.Custom Logic: Implement your own user management rules and workflows.
What You’ll Learn
User Identity
How user IDs work and best practices for user identification
User Operations
Querying, searching, and managing user data with repositories
Roles & Permissions
Implementing role-based access control and moderation privileges
Safety Features
Implementing user reporting, blocking, and community safety measures
Best Practices
Proven patterns for scalable user management in social applications
Quick Start
Ready to implement user management? Follow this sequence:- User Identity - Understand how user identification works
- User Operations - Learn to query and manage user data
- Roles & Permissions - Set up access control
- (Content Moderation page pending)
Common Use Cases
Typical Setup:
- Users register in your app
- User ID = database primary key
- Roles: admin, moderator, verified, standard
- Features: posts, comments, likes, follows
- Profile updates in your system
- Social interactions via social.plus
- Content moderation for community safety