Line 1: | Line 1: | ||
− | =Authentication Flow= | + | =Web Services Authentication Flow= |
__NOTOC__ | __NOTOC__ | ||
Genesys Web Services authentication is performed in the following sequence: | Genesys Web Services authentication is performed in the following sequence: |
Revision as of 17:16, February 26, 2015
Web Services Authentication Flow
Genesys Web Services authentication is performed in the following sequence:
1. Salesforce Authentication
- Enters here if a request contains two specific headers (Salesforce Session ID and Salesforce Identity URL).
- If successful, the user is authenticated and execution flow proceeds to the authorization stage.
- If authentication headers are not present or authentication fails, execution flow proceeds to the next step.
2. Oracle Service Cloud Authentication
- Only enters here if a request contains specific headers (RNURL, RNSID, RNUSERNAME).
- If successful, the user get authenticated and execution flow proceeds to the authorization stage.
- If authentication headers are not present or authentication fails, execution flow proceeds to the next step.
3. Configuration Server (CME) Authentication
- Enters here if a request contains basic authentication header and CME authentication is enabled for this contact center.
- If successful, user is authenticated and execution flow proceeds to the authorization stage.
- If authentication headers are not present, CME authentication is disabled, or authentication fails, execution flow proceeds to the next step.
4. Genesys Web Services Authentication
- Enters here if a request contains basic authentication header.
- If successful, user is authenticated and execution flow proceeds to the authorization stage.
- If authentication headers are not present or authentication fails, execution flow proceeds to the next step.
5. Security Assertion Markup Language (SAML) Authentication
- Enters here if SAML is enabled and configured.
- An attempt is made to authenticate user through the standard SAML authentication flows.
- If successful, the user is authenticated and execution flow proceeds to the authorization stage.
- If not successful, the user receives an anonymous authentication, which means this users is only given access to unprotected endpoints.
Comments or questions about this documentation? Contact us for support!