![]() In your browser, navigate to the Agora web demo.įill in the App ID, and Channel with the same values that you used to call the token generation method.Ĭopy the Video Calling uid authentication token from the terminal and paste it into the Token box.Ĭonnect to the same channel from another device to confirm that everything works. Use the token to connect to a Video Calling channel. The code generates a Video Calling and prints it to the terminal. Set channelName to the name of the channel to join and expirationTimeInSeconds to the validity duration of the token in seconds.įor the purpose of this test, set uid equal to zero. In the sample code, set the variables appId, and appCertificate to values from Agora Console. The following diagram shows the authentication call flow between your app, your authentication system and Agora SD-RTN™: Agora SD-RTN™ validates the token and adds the user to the channel. The app then sends this token to Agora SD-RTN™ with the request to join a channel. Your authentication system uses Agora libraries to generate a token specific to the channel, then sends it to your app. When a user attempts to connect to an Agora channel, your app requests a token from your authentication system. The integration of Agora token generation and authentication in your security infrastructure provides an additional level of security while allowing you to retain control of the overall authentication process. This guide helps you integrate Agora token generation libraries into your authentication system. In order to build a seamless authentication process for your users, you need to integrate token generation into your identity management system. All Agora core products are protected using token security. A token is a dynamic key that is generated from a given set of inputs. Agora SD-RTN™ uses digital tokens to authenticate users and their privileges before they can access Video Calling. In Agora SD-RTN™, this key level of security is implemented in the form of token authentication. ![]() Authentication is the act of validating the identity of each user before they access a system. ![]()
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |