User Tools

Site Tools


documentation:architecture

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
Next revision Both sides next revision
documentation:architecture [2018/06/26 11:42]
tjotov
documentation:architecture [2018/06/26 13:57]
tjotov [R1]
Line 3: Line 3:
 {{:documentation:aducid-architecture-overview.png?400|}} {{:documentation:aducid-architecture-overview.png?400|}}
  
-This chapter describes internal functionality of ADUCID. It is a foundation of[[integration:start|No-code integration]]+This chapter describes internal functionality of ADUCID. It is a foundation of [[integration:start|No-code integration]]
  
 ===== Target application ===== ===== Target application =====
Line 24: Line 24:
 AIM is controlled by the target application using the R4 interface. Using this interface, it also provides services for working with user data. AIM is controlled by the target application using the R4 interface. Using this interface, it also provides services for working with user data.
  
-Using the R3 interface, it communicates with the client part of ADUCID<sup>®</sup>  . +Using the R3 interface, it communicates with the client part of ADUCID<sup>®</sup>.
- +
-Another part of AIM is the provider of cryptographic services (AIM Crypto Provider) that can be implemented through different manners - e.g. as a software library or hardware device (HSM, etc.).+
  
  
 ==== SQL database ==== ==== SQL database ====
-SQL database is used to store ADUCID identites, events and licensing logs.+SQL database is used to store ADUCID identites, events and licensing logs. The default SQL DB is Postgress but can be replaced with any JPA compatible DB.
  
 ==== Admin applications ==== ==== Admin applications ====
  
-ADUCID comes with a set of support applications. All admin applications require a particular role, proofing and personal factor (first admin gets these automatically).+See [[documentation:admin-applications|Admin applications]]
  
-=== PeigAdmin === 
-PeigAdmin is a PEIG management tool. It also shows statistics and licensing. 
- 
-=== UserAdmin === 
- 
-UserAdmin is similar to PeigAdmin but also manages proofing data. 
- 
-=== SecAdmin === 
-SecAdmin is meant to configure security parameters of ADUCID AIM (encryption algorithms, key length, expiration periods etc.) 
  
 ==== Proofing applications ==== ==== Proofing applications ====
Line 55: Line 44:
 see [[:documentation:client|PEIG]] see [[:documentation:client|PEIG]]
  
- 
-===== PEIG proxy QR code ===== 
- 
-PEIG can act as super secure feature for QR code authentication. In this case PEIG authentication is turned off (but PEIG is running). QR code is not server by AIM-proxy but rather created by PEIG-proxy module. This is one of most secure setups in ADUCID topology (see Binding documentation for details) and definitely secure than displaying QR code using browser. 
  
 ===== Interfaces ===== ===== Interfaces =====
Line 66: Line 51:
 ==== R1 ==== ==== R1 ====
  
-R1 is an application interface handled by customer application itself. In mobile application integration R1 is encapsulated in Papi (PEIG API).+R1 is an application interface handled by customer application itself. 
 +  * Between browser and PEIG it's represented by URI call 
 +  * In mobile application integration R1 is encapsulated in PEIG API 
 +  * On Unix R1 can be accessed via 
  
 ==== R2 ==== ==== R2 ====