Introduction - Complex Authentication
- 15 Nov 2022
-
DarkLight
-
PDF
Introduction - Complex Authentication
- Updated on 15 Nov 2022
-
DarkLight
-
PDF
Article summary
Did you find this summary helpful?
Thank you for your feedback
With the many different types of authentication, most of them can be handled by the adapter by changing:
- IAP Service Instance Configuration for the adapter in IAP Admin Essentials - authentication section
- Endpoint Configuration for the adapter in the /adapter-home-dir/entities/.system directory
- .action.json
- request and response schemas
- callProperties in the reqObj within adapter.js
This section covers more complex examples of authentication that still use a two-step authentication where a token is received and used in subsequent steps. Some of these may be more common than others, but Itential is providing them to show how you can make modifications to support different ways to authenticate.
Of note, there are still some forms of authentication that are not currently supported. As these methods are implemented, changes are made to support them. In the meantime, if you experience any problems after making changes to the above areas, don’t hesitate to contact the Itential Adapters Team – we’re here to help.
Was this article helpful?