Authentication Workflow
Frontdown uses user authentication as the foundation for its security model. The system ensures that only authenticated users can interact with their environments.
sequenceDiagram participant Client participant API as REST API participant Keepass as Keepass System participant Auth as Auth System participant DB as Database Client->>API: 1. Login request API->>Auth: 2. Validate credentials Auth->>DB: 3. Query user data DB-->>API: 4. Return Keepass cipher API->>Keepass: 5. Decrypt Keepass cipher Keepass-->>API: 6. Return Keepass key API->>Keepass: 7. Encrypt Keepass key Keepass-->>API: 8. Return encrypted key API-->>Client: 9. Return JWT token
- 1. Login: The user logs in with their credentials.
- 2. Validate credentials: The system validates the user’s credentials.
- 3. Query user data: The system queries the database for the user’s data.
- 4. Return Keepass cipher: The system returns the Keepass cipher.
- 5. Decrypt Keepass cipher: The system decrypts the Keepass cipher.
- 6. Return Keepass key: The system returns the Keepass key.
- 7. Encrypt Keepass key: The system encrypts the Keepass key.
- 8. Return encrypted key: The system returns the encrypted key.
- 9. Return JWT token: The system returns a JWT token to the client.
Last updated on