Detail Flow Diagram
  • 29 Jan 2024
  • 1 Minute to read
  • Dark
    Light
  • PDF

Detail Flow Diagram

  • Dark
    Light
  • PDF

Article summary

The following flow diagrams explain the detailed flow of WAM:

Flow diagram 1: When a user tries to access the WAM-protected application

Step 1: User attempts to access the application directly by clicking the URL (for example, https://myapp.com) in a browser.

Step 2: User’s request is intercepted by the WAM agent deployed on the application server.

Step 3: WAM agent routes the request to CI.

Step 4: User specifies the credentials logs into CI and initiates SSO to the application.

Flow diagram 2: When a user is trying to log into the Cross Identity, and then trying to log in to the application.

Step 1: User logs in to Cross Identity with a valid credential to display the CI Home page.

Step 2: User accesses the application onboarded on the CI Home page as an SSO application.

Step 3: WAM Agent internally validates the cookies and the Session ID of CI, and checks if the session is valid and ready for an end-user to access the application.

Step 4: After proper validation, a user accesses the application successfully.


Was this article helpful?

What's Next