You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/MAC-Token-Based-Authentication.md
+33-31Lines changed: 33 additions & 31 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -25,7 +25,7 @@ Creating a quick, low-value payment from an iPhone app.
25
25
26
26
## Creating a Token
27
27
28
-
In order to create a new token, the client application must call a PowerAuth Standard RESTful API endpoint `/pa/v3/token/create`.
28
+
In order to create a new token, the client application must call a PowerAuth Standard RESTful API endpoint `/pa/v4/token/create`.
29
29
30
30
This endpoint must be called with a standard PowerAuth authentication code. It can be any type of authentication code - 1FA or 2FA. The token then implicitly carries the information about the authentication code it was issued with. Using the PowerAuth authentication code assures the authenticity and integrity of the data sent during the request.
31
31
@@ -37,8 +37,8 @@ The decrypted response data payload contains the following raw response format:
@@ -48,30 +48,32 @@ The client stores both `token_id` and `token_secret` in a suitable local storage
48
48
49
49
## Using the Tokens
50
50
51
-
When using MAC Token-Based Authentication, the authentication of the RESTful API calls is achieved by computing a `token_digest`digest value on the client side that can be later validated on the server side. The algorithms for calculation and verification of the digest are, in principle, the same.
51
+
When using MAC Token-Based Authentication, the authentication of the RESTful API calls is achieved by computing a `token_digest` value on the client side that can be later validated on the server side. The algorithms for calculation and verification of the digest are, in principle, the same.
52
52
53
-
The `token_digest` value is computed using the following algorithm:
53
+
The `token_digest` value is computed from the following input:
54
54
55
-
```java
56
-
// '$timestamp' is a Unix timestamp in milliseconds (to achieve the required time
57
-
// precision) converted to a string and then to byte[] using UTF-8
58
-
// encoding
59
-
// '$version' is the protocol version, represented as UTF-8 bytes of the version string
Copy file name to clipboardExpand all lines: docs/Temporary-Encryption-Keys.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -68,7 +68,7 @@ The client app should process the response by verifying the signature and checki
68
68
Besides [End-to-End Encryption](./End-To-End-Encryption.md) itself, the introduction of temporary encryption key impacts all use-cases that implicitly rely on data encryption, such as:
69
69
70
70
- New activations (using all supported methods)
71
-
- Obtaining and changing activation name from the mobile app.
71
+
- Obtaining and changing activation name from the mobile app
0 commit comments