This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision | ||
documentation:advanced:start [2018/06/27 14:52] tjotov |
— (current) | ||
---|---|---|---|
Line 1: | Line 1: | ||
- | ====== Advanced concepts ====== | ||
- | |||
- | ===== ADUCID standard operations ===== | ||
- | |||
- | The fundamental element of ADUCID®’s activity is an **operation**. The target application requests AIM to perform an operation, AIM along with PEIG® then perform the operation and make the result available to the application. The application can then use the result of the operation (e.g. use a positive authentication result to grant access to information to a specific user in the scope of that user’s assigned rights, or use a negative result to deny access). Standard applications only use the " | ||
- | |||
- | |Unordered List ItemInitialization of an identity |II |Identity Initialization |" | ||
- | |Use of an identity |IU |Identity Use |" | ||
- | |Change in an identity |IC |Identity Change |" | ||
- | |Termination of an identity |IE |Identity End |" | ||
- | |Reparative change of an identity |RC |Reparative Identity Change |" | ||
- | |Reparative initialization |RI |Reparative Identity Init |" | ||
- | |Extended Use |XUSE | | |Advanced operation to create replicas, display dialogs and work with personal factor. | | ||
- | |||
- | ===== Binding ===== | ||
- | |||
- | The issue of authentication results from linking the target application together with the protection of the data channel between the client and server part of the target application. This is called “binding”. | ||
- | |||
- | Different user scenarios exist for how to link a target application to ADUCID authentication. They have different user and security features. It is possible to take snapshot of a QR code by using a mobile phone, when the QR code is displayed on a workstation screen to log in, or it is possible to use PEIG from hard disk of the same workstation where the web browser is running, or it is possible to use a web browser on a mobile phone or tablet. | ||
- | |||
- | The AIM security manager can select what binding scenarios will be supported by AIM and what scenarios will be disabled. This is possible through the AIM “binding mode” attribute configuration. | ||