On Sun, Feb 14, 2016 at 6:52 PM, Hariprasath Thanarajah < [email protected]> wrote:
> Hi All, > > Now I am working on to creating the IS authenticator for oneID. In the > initial stage i have followed their documentations to understand the > concept. > > oneID is a platform designed to make secure digital transactions easy for > you and your users. With oneID, unique secret keys are generated for each > user, and those keys are stored securely on the user's device. > > Flow of oneID authentication for IS: > > [image: Inline image 1] > > > (i) User invokes the OneID authenticator to validate a user using oneID. > How does this happen? What's the path between User and the IS Authenticator? > (ii)OneID IS authenticator will send request to do this operation. > (iii)OneID ask the permission through mobile application. > (iv)Allow the user to access via oneID. > (v)OneID IS authenticator will get the response from OneID. > > -- > > > *Thank you and Regards**Hariprasath Thanarajah* > Associate Software Engineer | WSO2 > E: [email protected] > M: +94752806528 > > > _______________________________________________ > Architecture mailing list > [email protected] > https://mail.wso2.org/cgi-bin/mailman/listinfo/architecture > > -- Thanks & Regards, Dulanja Liyanage WSO2 Inc.
_______________________________________________ Architecture mailing list [email protected] https://mail.wso2.org/cgi-bin/mailman/listinfo/architecture
