Resource Identity Token Generation

In order to authenticate or communicate with users or machines using HexaEight Authentication, the resource owner who is a user needs to assign a identity for his resource. The resource owner will follow the process as outlined below:


%%{init: { 'theme': 'forest' } }%% graph LR Resource-Owner-aka-User--> |Generates And Uses| EMail-Identity-Token EMail-Identity-Token -->|To Generate | Resource-Identity-Tokens
%%{init: { 'theme': 'forest' } }%% graph LR Resource-Owner-aka-User -->|Uses | Domain-Resource-Identity-Token Resource-Owner-aka-User -->|Uses | Generic-Resource-Identity-Token Domain-Resource-Identity-Token -->|To Generate | Domain-Resource-Login-Tokens Generic-Resource-Identity-Token -->|To Generate | Generic-Resource-Login-Tokens

HexaEight Provides two methods

To generate Resource Login Tokens.

Method 1 (Newer Method): Use This Tool

  • This tool can run on various operating systems including Windows, Linux, Mac, and Raspberry Pi devices.

Method 2 (Older Method That uses API Keys): Legacy and No Longer Used

  • This webpage allows you to enter your own password, and in turn generates a login token that you can copy and use in combination with the password on any host, machine, application or program along with an API key which implements HexaEight Authentication. This method is being phased out since this option does not provide unlimited usage. The newer method allows for unlimited usage and generation of machine and client tokens for a fixed fee every month.

Upon successful generation of Resource Login Tokens, you will need to assign Login Tokens by using HexaEight Libraries, Executable modules or Plugin Modules

Each of the above options accept the Resource LoginToken, Resource Name, Resource Password in order to establish Resource Identity and communicate successfully with HexaEight Platform as well as other with other resources