... | ... | @@ -28,13 +28,11 @@ version 1 we will get the following URL: |
|
|
|
|
|
- As a previous step to obtaining the token, you must have the security
|
|
|
|
|
|
certificate and that the IP is on the allowed list.
|
|
|
certificate and that **the IP is on the allowed list**.
|
|
|
|
|
|
- The cn of the user registered in the system must be sent as a parameter.
|
|
|
- The **cn** that is contained in the certificate that is used is the one that the application uses to check if it exists in the user registry.
|
|
|
|
|
|
<u>{baseUrl}/v1/token?<mark>cn=prueba</mark></u>
|
|
|
|
|
|
<img src="https://i.loli.net/2021/03/24/jAPwrbJnsd6e7zH.png" title="" alt="2021-03-24-13-25-45-image.png" data-align="center">
|
|
|
> {baseUrl}/v1/token
|
|
|
|
|
|
- If the authentication is valid, a response is obtained with the date and time when it was generated, when it expires and the token itself.
|
|
|
|
... | ... | |