On Sun, Feb 14, 2016 at 6:52 PM, Hariprasath Thanarajah <
[email protected]> wrote:

> Hi All,
>
> Now I am working on to creating the IS authenticator for oneID. In the
> initial stage i have followed their documentations to understand the
> concept.
>
> oneID is a platform designed to make secure digital transactions easy for
> you and your users. With oneID, unique secret keys are generated for each
> user, and those keys are stored securely on the user's device.
>
> Flow of oneID authentication for IS:
>
> [image: Inline image 1]
>
>
> (i) User invokes the OneID authenticator to validate a user using oneID.
>

How does this happen? What's the path between User and the IS Authenticator?


> (ii)OneID IS authenticator will send request to do this operation.
> (iii)OneID ask the permission through mobile application.
> (iv)Allow the user to access via oneID.
> (v)OneID IS authenticator will get the response from OneID.
>
> --
>
>
> *Thank you and Regards**Hariprasath Thanarajah*
> Associate Software Engineer | WSO2
> E: [email protected]
> M: +94752806528
>
>
> _______________________________________________
> Architecture mailing list
> [email protected]
> https://mail.wso2.org/cgi-bin/mailman/listinfo/architecture
>
>


-- 
Thanks & Regards,
Dulanja Liyanage
WSO2 Inc.
_______________________________________________
Architecture mailing list
[email protected]
https://mail.wso2.org/cgi-bin/mailman/listinfo/architecture

Reply via email to