Skip to main content

Token usage scheme

An authorization token is used to call the Inspector Cloud Camera from a third-party application. This is the unique identifier of the calling application.

  • Inspector Cloud mobile app — IC Camera mobile app on Android or iOS device.
  • 3rd party mobile app — a third-party mobile app on the same device.
  • Inspector Cloud backend — backend services of the Inspector Cloud application.
  • 3rd party backend — backend services of a third-party mobile application.

How it works

  1. Token request. To get a new token via the API, the backend of a third-party mobile application executes a POST request.
  2. Update token info. When receiving a token request, the Inspector Cloud backend adds a new token so that the IC Camera application can use it.
  3. Token transfer. The IC backend transfers the token to the backend of a third-party mobile application.
  4. Adding a token. The backend of a third-party mobile application transfers the token to a third-party mobile application via a secure communication channel. Additionally, you need to take measures against access to the token, which will be stored in a third-party mobile application.
  5. Calling a DeepLink. A third-party mobile application uses a new token to call IC Camera. You can log in to IC Camera with any of the valid tokens, as well as in offline mode. In the DeepLink API, the token is passed by the DeepLinkConst.Parameters.TOKEN.

The token received in the POST request can also be used to execute API requests.