Log-in using OIDC

Logs into a tenant using the JWT Token through the Open ID Connect (OIDC) authorization.

Base URL:

https://{tenant url}/api/rest/authentication/login

When providing the "role" parameter, you need to provide the internal name of the role and not the display name. For example, Admin is the internal name of the role Administrator.

To differentiate a JWT Token from a Session ID, check the format of the generated ID, if the ID contains a tenant url, it is a Session ID and if it does not contain tenant url, it is a JWT Token.

If the log-in API is executed successfully, the application generates a JWT Token. Follow the below steps to execute an endpoint:

1.Create a new request in the Postman application.

2.Enter the following information in the Authorization tab:

Set the option as Bearer Token in the Type field.

Enter the generated JWT Token in the Token field.

3.Enter the endpoint request payload details and click the Send button or press the ENTER key.

Unsuccessful Response