Example flow for unauthenticated callers

The following diagram identifies the flow of authentication and authorization information for unauthenticated callers. Colors are used in the following ways:

  • Orange - credentials information
  • Blue - endpoint access information
  • Green - resource access information
  • Red - proxy user and session user information

Some values are used to determine multiple types of access. These values initially appear as black (when they do not apply to a single type of access), and then later appear in one or more specific colors (to reflect the value is being used at that point in the process for a specific type of access).

In the following example, an API call is triggered by an unauthenticated caller.


Authentication flow for unauthenticated callers
  1. The caller application sends the API request to PolicyCenter. The call includes no JWT, and no authentication information in the header.
  2. Because the call has no authentication header, PolicyCenter grants endpoint access as defined in the Unauthenticated.role.yaml API role file. (This provides access to metadata endpoints. This also provides access to endpoints that can be used to create a new account. This is part of the anonymous auth flow.)
  3. Because the call has no authentication header, PolicyCenter grants resource access as defined in the unauthenticatedUser.role.yaml API role file. (This provides no access to existing business resources.)
  4. To determine which proxy user to assign to the session, PolicyCenter calls the RestAuthenticationSourceCreator plugin. The call has no authentication header. So, the plugin returns the proxy user for unauthenticated users: uauser.
  5. PolicyCenter processes the request.
    1. The session user is the proxy unauthenticated user: uauser.
    2. The endpoint access is defined by Unauthenticated.role.yaml.
    3. The resource access is defined by unauthenticatedUser access.yaml.
  6. PolicyCenter provides the response to the initial call.