9,315
edits
Line 4: | Line 4: | ||
== Connection to the CRM server == | == Connection to the CRM server == | ||
Security note: All communication is over | Security note: All communication is over HTTPS, some users additionally use VPN. | ||
Step 1: Authentication | Step 1: Authentication | ||
* Usually requires login and password. (OAuth2 is multi-factor authentication and can use e.g. supplementary email verification) | * Usually requires login and password. (OAuth2 is multi-factor authentication and can use, e.g., supplementary email verification) | ||
* Result: Security token (tokens expire after a few hours) | * Result: Security token (tokens expire after a few hours) | ||
Step 2: WhoAmI -> SystemUserId, OrganizationId, BusinessUnitId | Step 2: WhoAmI -> SystemUserId, OrganizationId, BusinessUnitId | ||
Security token is included in every following server request. Based on | Security token is included in every following server request. Based on the token, server decides: | ||
* Which client actions are allowed | * Which client actions are allowed | ||
* Which server records are visible to the server | * Which server records are visible to the server | ||
... | * ... | ||
== Uploading local changes == | == Uploading local changes == |