Skip to content

Local User

Local User

Once signed in, a user may consult its profile attributes and possibly change his authentication means, like passwords, 2 factor authentication etc... (if managed by the APIO core platform).

Profile

Details

PropertyDescription
UsernameThe user's username. (refer to the IdP username if the user is managed by an external IdP)
FirstnameThe user's first name.
LastnameThe user's last name.
Mobile numberThe user's mobile number.
EmailThe user's email address.
SystemWhether the user has the system level flag.
ProfileThe user's profile.
UI ProfileThe user's UI profile.
Registered onThe date the user was registered.
LanguageThe user's language. (may differ from the language set in the IdP)
TimezoneThe user's timezone.
RolesThe user's roles for manual actions to be assigned on the platform.
PropertiesThe user's properties.
New passwordThe user's new password.
Confirm new passwordThe user's new password confirmation.
Current passwordThe user's current password. (mandatory when changing current password)
M2M tokenThe user's API token.
2FA optionThe user's 2FA option.
PasskeysThe user's passkeys to be used for Passwordless authentication (Webauthn).

DANGER

M2M tokens should be treated as passwords. They are used to authenticate the user to the APIO core platform.
If a token is lost or compromised, it should be removed or a new one should be generated.
As a security measure, the token can be generated for a fixed period of time using an expiry date.

Callbacks

When a user represent another system, that system may need to be called back when a workflow (triggered by that user) is completed or blocked for further action.

Trusted Loc.

When 2FA is enabled (either globally or per user), the user may consult and manage his trusted devices and locations.

Login attempts

The user may consult the 5 last login attempts made on his account whether they were succesful or not.

IP Whitelist

The user may consult and manage his IP whitelist. This list is used to restrict the IP addresses from which the user can sign in. This is especially useful when the user is an external system (the traffic always come from the same ip network).