Resource Identity Token Generation
In order to authenticate or communicate with users or machines using HexaEight Authentication, the resource owner who is a user needs to assign a identity for his resource. The resource owner will follow the process as outlined below:
HexaEight Provides two methods
To generate Resource Login Tokens.
Method 1 (Newer Method): Use This Tool
- This tool can run on various operating systems including Windows, Linux, Mac, and Raspberry Pi devices.
Method 2 (Older Method That uses API Keys): Legacy and No Longer Used
- This webpage allows you to enter your own password, and in turn generates a login token that you can copy and use in combination with the password on any host, machine, application or program along with an API key which implements HexaEight Authentication. This method is being phased out since this option does not provide unlimited usage. The newer method allows for unlimited usage and generation of machine and client tokens for a fixed fee every month.
Upon successful generation of Resource Login Tokens, you will need to assign Login Tokens by using HexaEight Libraries, Executable modules or Plugin Modules
-
HexaEight Libraries are HexaEight JWT Library And HexaEight ASK Client Library"
-
Executable Modules like HexaEight Token Server And HexaEight Middleware
-
Plugin Modules like HexaEight Authentication Plugins
Each of the above options accept the Resource LoginToken, Resource Name, Resource Password in order to establish Resource Identity and communicate successfully with HexaEight Platform as well as other with other resources