“Client Authentication” section on page 2-1 - Cisco
Recommend Documents
Nov 19, 2013 ... Third-party XMPP clients and applications can also be ... Cisco provides
collaboration clients for the following mobile devices: Android, BlackBerry, and ...
interface with SOAP, REST, or BOSH (based on the Cisco AJAX XMPP Library
Internet banking might be the prime example; with it comes the added challenge of .... In contrast to one-time codes, authentication based on public-key cryptography .... protected client PC by means of a virus or a Trojan horse (see Figure 2c).
C H A P T E R. 11-1. Cisco Unified Communications Manager Administration
Guide. OL-24919-01. 11. LDAP System Configuration. In Cisco Unified ...
Introducing Client/Server Telnet. Cisco IOS for S/390 provides Client Telnet
facilities that let TSO and VTAM users access your network through the Telnet ...
The Cisco implementation of TCP header compression is an adaptation of a
program developed by ... This manual supplements the information provided in
accompanying documentation for the ..... 50 MB hard disk space. ..... The VPN
3002 hardware clien
BC-481. Cisco IOS Bridging and IBM Networking Configuration Guide ... To
enable a local service access point (SAP) on the NCIA server for use by DSPUs,
use ...
VPN Client User Guide for Windows, Release 5.0â explains to Windows VPN Client users how to install the ..... System u
The BFD Single-Hop Authentication feature enables authentication for single-hop
Bidirectional Forwarding .... 3. bfd-template single-hop template-name.
In addition, the Cisco VPN 3002 scales easily to tens of ... parameters and
manual configurations required at both .... Reset switch: resets unit to factory
defaults.
approaches, all such defenses ultimately rely on client-side heuristics to automatically detect cookies con- ...... force more expressive client-side security policies.
The IPICS Mobile Client is an application for the Apple iPhone that allows you to
use an iPhone to interact with other participants in a Cisco IP Interoperability.
users and unique client certificates provides for precise client traceability. We show ... 2383 in the iOS 10.2.1 and macOS 10.12.3 security updates released on .... PNSes became the most prominent way to notify applications about service ..... us th
we analyze Apache's mod_ssl implementation on the server side and the most
..... tion where self-signed root CA certificates trusted by the server and their ...
show how stateless authentication protocols and the client puzzles of Juels and. Brainard can ..... and the signature can be omitted if the potential DOS attacks.
Apr 27, 2018 - Abstract. Client-server computing is the analytical development of compatible programming with significant supposition and the detachment of ...
Apr 27, 2018 - The (Hassan et al., 2017) claim that their scheme is well designed and secure against all known .... The server decrypts Q4, Q7, Q8 and ai.
Aug 9, 2012 ... IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE. OR LIMITED ....
Java Requirement 2-36. Browser ... Installing Start Before Logon Components (
Windows Only) 3-14. Start Before ...... ASA if you expect connectivity from Android
or A
Sales partners who sell new technology or who create implementation .... to corporate-managed PCs, such as laptops and desktops. Today .... 1. Set up initial primary engine. 2. Set up the secondary engine. 3. Configure certificate trust list. 4.
skills to VLAN troubleshooting, the. Networking ... content, online assessment,
student perfor- mance tracking ... based organizations, and other educational
programs ... multiple, advanced, IP routing protocols such as OSPF,. EIGRP, and
BGP.
Jul 25, 2013 ... memory requirements for Cisco Unified SRST and Cisco Unified SIP SRST ...
Prerequisites for Configuring Cisco Unified SCCP SRST, page 14.
Jun 26, 2017 - except Verifiers operated by the Credential Service Provider (CSP); ...... that are used remotely may als
Aug 24, 2013 - or Petroleum Exploration or Geochemistry or Geological Technology or Geophysical Technology www.employmen
1997 Microchip Technology Inc. DS31021A page 21-1. 8-bit A/D. Con vertor. 21.
M. Section 21. 8-bit A/D Converter. HIGHLIGHTS. This section of the manual ...
This is best explained by example: A 12 month fixed-term AST with rent paid weekly ... (4) By e-mail or Fax â though t
“Client Authentication” section on page 2-1 - Cisco
Cisco CSR 1000V Series Cloud Services Router REST API Management
Reference ... The Cisco CSR1000V RESTful API authentication works as follows:.
2
CH A P T E R
Client Authentication •
Overview
•
Resource Summary for Client Authentication
•
Token Service Resource
•
Token Resource
Overview The REST API authentication works as follows: •
The authentication uses HTTPS as the transport for all the Cisco REST API access.
•
Clients perform authentication with this service by invoking a POST on this resource with HTTP Basic Auth as the authentication mechanism. The response of this request includes a token-id. Token-ids are short-lived, opaque objects that represents client’s successful authentication with the token service.
•
Clients then access other APIs by including the token id as a custom HTTP header “X-auth-token”. If this token is not present or expired, then API access will return an HTTP status code of “401 Unauthorized”
•
Clients can also explicitly invalidate a token by performing a DELETE operation on the token resource.
•
The username/password for the HTTPS session should be configured with privilege 15.
Resource Summary for Client Authentication HTTP Method Resource
URL (BaseURL)
GET
POST
PUT
DELETE
token-id
/api/v1/auth/token-services
Y
Y
N
N
/api/v1/auth/token-services/{opaque-token-id}
Y
N
N
Y
Cisco IOS XE REST API Management Reference Guide
2-1
Chapter 2
Client Authentication
Token Service Resource
Token Service Resource The token service resource represents the authentication service that allows clients to perform authentication and obtain a token-id.
Authenticate and Create a New Token The initial HTTP request is performed by clients to authenticate and obtain a token so that it can invoke other APIs. The HTTP POST response contains an ‘opaque’ URL to be used for HTTP GET and DELETE requests.
Resource URI
Verb
URI
POST
/api/v1/auth/token-services
Example JSON Request POST /api/v1/auth/token-services Accept: application/json
JSON Response 200 OK Content-Type: application/json { "kind": "object#auth-token", "token-id": "1ZA23BC", "link":http://host/api/auth/token-services/johnDoe, "expiry-time": "00:15:00" } In subsequent API accesses, the token-id must appear as a custom HTTP header for successful invocation of APIs. X-auth-token: {token-id}
Cisco IOS XE REST API Management Reference Guide
2-2
Chapter 2
Client Authentication Token Resource
For example: X-auth-token: "12a23bc"
Retrieve Active Tokens Resource URI
Verb
URI
GET
/api/v1/auth/token-services
Example JSON Request GET /api/v1/auth/token-services X-auth-token: "1za23bc" Accept: application/json
JSON Response 403 Access Denied
Token Resource A token represents successful authentication of a client.
History
Release
Modification
IOS XE 3.10
Introduced for the CSR1000V platform
IOS XE 3.14
Introduced for ASR1001-X and ASR1002-X platforms
Properties
Properties
Type
Required for POST and PUT
kind
string
Not applicable Must be “object#auth-token”
token-id
string
Not applicable Authentication token that must be included as a custom HTTP header X-auth-token value in all API requests
link
string
Not applicable Token resource URL.
expiry-time
string
Not applicable Idle period in hh:mm:ss format.
Description
Cisco IOS XE REST API Management Reference Guide
2-3
Chapter 2
Client Authentication
Token Resource
JSON Representation of a Token { "kind": "object#auth-token", "token-id": "{string}", "link": "{string}", "expiry-time": "{string}" }
Retrieve Token Details Resource URI
Verb
URI
GET
/api/v1/auth/token-services/{opaque-token-id}
Example JSON Request GET /api/v1/auth/token-services/johnDoe X-auth-token: "1za23bc" Accept: application/json
Invalidate a Token Typically tokens automatically expire after 15 minutes. However, clients can perform explicit invalidation of a token by doing a DELETE on the token resource.