Detailed Flow: User Authentication and Data Retrieval
  • 03 Oct 2024
  • 1 Minute to read
  • Dark
    Light
  • PDF

Detailed Flow: User Authentication and Data Retrieval

  • Dark
    Light
  • PDF

Article summary

When an end-user attempts to log in, the following flow will occur:

1. User Login Request:

• The end-user enters their username and password on the application (e.g., "IVR").

• The application sends a request to the API Manager containing the following details such as Username, Password and Application Name.

2. API Manager Authentication:

• The API Manager forwards the request to the appropriate Cross Identity API for authentication.

• Cross Identity processes the request and returns an authentication status.

3. Fetching User Group Information:

• If the authentication status is "Success" the API Manager can invoke another Cross Identity API to retrieve the user's associated groups.

• This information helps determine the user's roles and permissions within the application.

4. Fetching User Attributes:

• The API Manager can also call a separate API to obtain specific user attributes, such as email, department, or any custom attributes defined in Cross Identity.

5. Fetching Authorized Applications:

• Finally, the API Manager can invoke the relevant API to get a list of applications the user is authorized to access, ensuring the user has the correct permissions for the requested application.

Example API Calls:

• Authentication API: /api/authenticate

• Group Retrieval API: / api/user-roles

• Attribute Retrieval API: /api/user-details

• Authorized Applications API: /api/authorized-applications


Was this article helpful?