- 29 Jan 2024
- 1 Minute to read
- Print
- DarkLight
- PDF
Detail Flow Diagram
- Updated on 29 Jan 2024
- 1 Minute to read
- Print
- DarkLight
- PDF
The following flow diagrams explain the detailed flow of WAM:
Flow diagram 1: When a user tries to access the WAM-protected application
Step 1: User attempts to access the application directly by clicking the URL (for example, https://myapp.com) in a browser.
Step 2: User’s request is intercepted by the WAM agent deployed on the application server.
Step 3: WAM agent routes the request to CI.
Step 4: User specifies the credentials logs into CI and initiates SSO to the application.
Flow diagram 2: When a user is trying to log into the Cross Identity, and then trying to log in to the application.
Step 1: User logs in to Cross Identity with a valid credential to display the CI Home page.
Step 2: User accesses the application onboarded on the CI Home page as an SSO application.
Step 3: WAM Agent internally validates the cookies and the Session ID of CI, and checks if the session is valid and ready for an end-user to access the application.
Step 4: After proper validation, a user accesses the application successfully.