Authenticator API

For bots and other on-premise processes to authenticate. Once\nauthenticated, the bot will be able to use the methods described in\nserviceAPI.yaml and agentAPI.yaml.\n\nConnections to the servers will be over\nclient authenticated TLS, the servers for this API will perform the\nauthentication by inspecting the certificate presented by the\nSSLSocketClient.\n\nThere will be two implementations of this API, one on your Pod\nand one on the Key Manager. In order to fully authenticate,\nan API client will have to call both of these implementations\nand pass both of the session tokens returned as headers in all\nsubsequent requests to the Symphony API.\n
More information: https://helloreverb.com
Contact Info: hello@helloreverb.com
Version: current
All rights reserved
http://apache.org/licenses/LICENSE-2.0.html

Access

Methods

[ Jump to Models ]

Table of Contents

  1. post /v1/authenticate/extensionApp
  2. post /v1/authenticate
  3. get /v1/app/pod/certificate
Up
post /v1/authenticate/extensionApp
Authenticate a client-extension application (v1AuthenticateExtensionAppPost)
Based on the application's SSL client certificate presented by the TLS layer, it authenticates the client-extension\napplication and return a symphony verification token.\n

Consumes

This API call consumes the following media types via the Content-Type request header:

Request body

authRequest (required)
Body Parameter — application generated token

Return type

ExtensionAppTokens

Produces

This API call produces the following media types according to the Accept request header; the media type will be conveyed by the Content-Type response header.

Responses

200

OK.

400

Request object is invalid

401

Client is unauthorized to access this resource

403

Forbidden to access this endpoint .

500

Server error, see response body for further details.

Up
post /v1/authenticate
Authenticate. (v1AuthenticatePost)
Based on the SSL client certificate presented by the TLS layer, authenticate\nthe API caller and return a session token.\n

Return type

Token

Produces

This API call produces the following media types according to the Accept request header; the media type will be conveyed by the Content-Type response header.

Responses

200

OK.

400

Client error.

403

Forbidden: Certificate authentication is not allowed for the requested user.

500

Server error, see response body for further details.

Up
get /v1/app/pod/certificate
Retrieve the certificate that can be use to validate the JWT token obtain\nthrough the extension application authentication flow.\n (v1AppPodCertificateGet)

Return type

PodCertificate

Produces

This API call produces the following media types according to the Accept request header; the media type will be conveyed by the Content-Type response header.

Responses

200

OK

401

Client is unauthorized to access this resource

500

Server error, see response body for further details.

Up

Models

[ Jump to Methods ]

Table of Contents

  1. AuthenticateRequest
  2. Error
  3. ExtensionAppTokens
  4. PodCertificate
  5. Token

AuthenticateRequest Up

appToken
String application generated token

Error Up

code
Integer
message
String

ExtensionAppTokens Up

appId
String Application ID
appToken
String This token generated by the application when calling authentication endpoint\n
symphonyToken
String This token generated by Symphony and should be used by the application to verify that it's talking to Symphony.\n
expireAt
Long unix timestamp when the token expired

PodCertificate Up

certificate
String Certificate in PEM format

Token Up

name
String The name of the header in which the token should be presented on subsequent\nAPI calls.\n
token
String The token which should be passed. This should be considered opaque data by\nthe client. It is not intended to conatain any data interpretable by the\nclient. The format is secret and subject to change without notice.\n