There are multiple flexible options to combine your product with the
UDiTH Portal. You can find code examples at:
https://github.com/caxperts/upv-webservices-integration For specific use-cases it is possible to directly handle the OpenID
Connect authentication and use its multitude of options directly. The BBV WebRTC integration package supports directly setting an
access token without using the integrated automatic login. This is
demonstrated here in the login-popup flow:
https://github.com/caxperts/upv-webservices-integration/tree/main/browserbasedviewing-api-samples/webrtc-integration-sample
By calling setAccessTokenCall, you can pass the token directly. The
original part of the sample regarding popups and account handling is not
required for this use case. Please note that the token must be updated
in case the token is expired. The JWT token has a lifetime property. Using this approach it is possible to highly customize the
product. By utilizing keycloaks service accounts it is possible to request a
specific user authentication without the regular user login flow. This
is commonly used for machine-to-machine scenarios. An access token can be obtained using the standard OpenID Connect
“Client Credentials Grant” flow. Access control Clients using the “Client Credentials Grant” will automatically have
a service account user created in Keycloak. In this case, for the client
“example-client” a user named “service-account-example-client” is
created. After calling “ForceSynchronize” on the UWS application side this
account is available in the UWS admin UI as well. Here you can configure
the fine grained access rights for the account. The user group can be assigned the permission on specific models.
Advanced integration options
Authentication

Example: Service accounts



How to create a service
account

