BXI Software
Product
  • Welcome to BXI Software
  • Overview
    • Details
    • Database Overview
  • Features Overview
  • User
    • Certified Staff
    • Address Book
  • DIGITAL ATL
    • Overview
    • Login
    • Main Dashboard
    • ATL Dashboard
      • Flight Details
    • Features
  • Product Guides
    • Sales Management
      • New Trip
      • Edit and copy TRIP
      • Page
    • Aircraft Management
    • Technical Area
      • ATL
  • Fundamentals
    • Getting starter
      • Step 1 - Creating your Fleet
      • Step 2 - User Management
        • Role Description
        • Maintainer
  • BROKER BXI APPLICATION
    • BXI - Broker
    • User Manual
      • Authentication
      • Flight Calendar
      • Flight Details
      • Import Excel File
      • Send PNL
    • Technical Documentation
      • Authentication
      • Dashboard
      • Passenger List
        • Flight Details
        • Passenger List
        • Import Excel File
        • Send PNL
        • Push Passenger List
  • Use Cases
    • 🎨For Designers
    • 🖥️For Developers
      • Crew Counter Command
  • BXI Pilot App Mobile
    • ❓FAQ & Support
      • 📝Setting permissions
      • 🧑Inviting Members
Powered by GitBook
On this page
  1. BROKER BXI APPLICATION
  2. Technical Documentation

Authentication

Authentication in our system occurs through the JWT (JSON Web Token) protocol, ensuring a secure and reliable experience for authorized users. To access the system's functionalities, airline company brokers must authenticate via a POST request to https://mydomain.belevensoftware.com/api/login, providing their login credentials in the form of a JSON object. The request must include the following information:

// Authentication Payload
{
    "username": "my_username",
    "password": "my_best_password"
}

Where "username" represents the broker's username and "password" is their associated password. These data are securely sent to the server for user identity verification. Upon successful authentication, the server generates a JWT token containing user information and their access session. The JWT token is then returned to the client and should be included in subsequent requests as an authentication mechanism. This token has an expiration time and must be periodically updated to keep the user session active. In the event of unauthorized access or token expiration, the system will prompt the user to reauthenticate to continue accessing protected resources. The use of the JWT protocol offers numerous advantages, including secure data transmission, system scalability, and efficient user session management. With this robust and reliable authentication system, we ensure the protection and integrity of our users' sensitive information while using the platform. Authentication Example:

// Authentication Example
curl --location --request POST 'https://mydomain.belevensoftware.com/api/login' \
--header 'Content-Type: application/json' \
--data-raw '{
    "username": "my_username",
    "password": "my_best_password"
}'

An example for testing real authentication

// Authentication link test
curl --location --request GET 'https://mydomain.belevensoftware.com/api/broker/v0/entrypoint' \
--header 'Authorization: Bearer XXXXXX'
PreviousTechnical DocumentationNextDashboard

Last updated 1 year ago