10,730
edits
Line 2: | Line 2: | ||
This is a technical description of the steps that are performed during a [[synchronization]]. | This is a technical description of the steps that are performed during a [[synchronization]]. | ||
== Connection == | == Connection to the CRM server == | ||
Security note: All communication is over https, some users additionally use VPN. | Security note: All communication is over https, some users additionally use VPN. | ||
Step 1: Authentication | |||
* | * Usually requires login and password. (OAuth2 is multi-factor authentication and can use e.g. supplementary email verification) | ||
* Result: Security token | * Result: Security token (tokens expire after a few hours) | ||
Step 2: WhoAmI -> SystemUserId, OrganizationId, BusinessUnitId | |||
Security token is included in every following server request. Based on it server decides | Security token is included in every following server request. Based on it server decides |