- 03 Oct 2024
- 1 Minute to read
- Print
- DarkLight
- PDF
Detailed Flow: User Authentication and Data Retrieval
- Updated on 03 Oct 2024
- 1 Minute to read
- Print
- DarkLight
- PDF
When an end-user attempts to log in, the following flow will occur:
1. User Login Request:
• The end-user enters their username and password on the application (e.g., "IVR").
• The application sends a request to the API Manager containing the following details such as Username, Password and Application Name.
2. API Manager Authentication:
• The API Manager forwards the request to the appropriate Cross Identity API for authentication.
• Cross Identity processes the request and returns an authentication status.
3. Fetching User Group Information:
• If the authentication status is "Success" the API Manager can invoke another Cross Identity API to retrieve the user's associated groups.
• This information helps determine the user's roles and permissions within the application.
4. Fetching User Attributes:
• The API Manager can also call a separate API to obtain specific user attributes, such as email, department, or any custom attributes defined in Cross Identity.
5. Fetching Authorized Applications:
• Finally, the API Manager can invoke the relevant API to get a list of applications the user is authorized to access, ensuring the user has the correct permissions for the requested application.
Example API Calls:
• Authentication API: /api/authenticate
• Group Retrieval API: / api/user-roles
• Attribute Retrieval API: /api/user-details
• Authorized Applications API: /api/authorized-applications