api-connectors | Libraries for connecting to the BitMEX API | REST library
kandi X-RAY | api-connectors Summary
kandi X-RAY | api-connectors Summary
A few simple connectors for connecting to the BitMEX API, which conforms to the [Swagger] spec. Connectors in the clients directory are autogenerated. Connectors in the official-* directory are written or vetted by BitMEX employees to showcase various features.
Support
Quality
Security
License
Reuse
Top functions reviewed by kandi - BETA
Currently covering the most popular Java, JavaScript and Python libraries. See a Sample of api-connectors
api-connectors Key Features
api-connectors Examples and Code Snippets
Community Discussions
Trending Discussions on api-connectors
QUESTION
I have an user flow with an API connector. I'm using the "before sending the token" api connector to retrieve the user's role in my database and then sending it back in the token as extension_Role.
Everything works fine when I'm doing the normal flow, which for me is:
- Sign-up
- Disconnect
- Sign-in
This works fine because in the sign-up I manually enter the email and in the sign-in I also manually enter the email. In both those cases, I have the email claim received by my C# backend api connector.
Where it gets tricky is when I'm going to another website, using the same user flow, but with SSO activated. This means that it won't trigger me to enter my credentials again, but it will try to log me in in the background. When it's doing that, I still have my C# backend called, but this time there is not email. This is the received JSON:
...ANSWER
Answered 2021-Oct-08 at 12:36• It is because when you are logging into another website, it is an untrusted domain and even though the claims in the backend C# json file are hidden after authenticating through SSO, the claims output in the token received are encrypted while the email claim attribute is omitted while other claim attributes are still present in the token received even though being hidden/encrypted.
• So, the email claim attribute might be returned null in the json file as its value in the column might be missing or unknown. So, when an element is null, either the key-value pair regarding the email attribute is omitted and returns a value that corresponds to the Azure AD B2C claim data type. Thus, since the email claim attribute is a string type, it returns empty string as “” just as the email attribute is unseen in the authentication token received.
• Also, add the below claim to the custom policy output claims so that you will be able to get email as an attribute in response token as may be your custom policy might allow you to signup/sign in through multiple attribute claim types and you might not be getting email claim when using other claim types other than email.
Community Discussions, Code Snippets contain sources that include Stack Exchange Network
Vulnerabilities
No vulnerabilities reported
Install api-connectors
Support
Reuse Trending Solutions
Find, review, and download reusable Libraries, Code Snippets, Cloud APIs from over 650 million Knowledge Items
Find more librariesStay Updated
Subscribe to our newsletter for trending solutions and developer bootcamps
Share this Page