Synchronization steps: Difference between revisions

Jump to navigation Jump to search
Line 4: Line 4:
== Connection to the CRM server ==
== Connection to the CRM server ==


Security note: All communication is over https, some users additionally use VPN.
Security note: All communication is over HTTPS, some users additionally use VPN.


Step 1: Authentication  
Step 1: Authentication  
* Usually requires login and password. (OAuth2 is multi-factor authentication and can use e.g. supplementary email verification)
* Usually requires login and password. (OAuth2 is multi-factor authentication and can use, e.g., supplementary email verification)
* Result: Security token (tokens expire after a few hours)
* Result: Security token (tokens expire after a few hours)


Step 2: WhoAmI -> SystemUserId, OrganizationId, BusinessUnitId
Step 2: WhoAmI -> SystemUserId, OrganizationId, BusinessUnitId


Security token is included in every following server request. Based on it server decides
Security token is included in every following server request. Based on the token, server decides:
* Which client actions are allowed
* Which client actions are allowed
* Which server records are visible to the server
* Which server records are visible to the server
...
* ...


== Uploading local changes ==
== Uploading local changes ==

Navigation menu