Log-in using OIDC
Logs into a tenant using the JWT Token through the Open ID Connect (OIDC) authorization.
Base URL:
https://{tenant url}/api/rest/authentication/login

Here is an example to log-in to a tenant using the OIDC authorization.
URL |
https://{tenant url}/api/rest/authentication/login |
Method |
POST |
Request Payload |
{ "tenant" :"{tenant url}", "username" :"{name of the user}", "password" :"{password set for the user}", "role" :"{user role to log-in to the application}" } |
Status Code |
200 |
• When providing the "role" parameter, you need to provide the internal name of the role and not the display name. For example, Admin is the internal name of the role Administrator.
• To differentiate a JWT Token from a Session ID, check the format of the generated ID, if the ID contains a tenant url, it is a Session ID and if it does not contain tenant url, it is a JWT Token. For more information, see OpenID Connect Configuration.

"eyJ0eXAiOiJKV1QiLCJhbGciOiJSUzI1NiIsIng1dCI6ImEzck1VZ01Gdjl0UGNsTGE2eUYzekFrZnF1RSIsImtpZCI6ImEzck1VZ01Gdjl0UGNsTGE2eUYzekFrZnF1RSJ9.
eyJpc3MiOiJodHRwczovL2lzbS1pbm5vdmEtdGVuYW50MS5pdmFudGljbG91ZGRldi5jb20vT0lEQyIsImF1ZCI6Imh0dHBzOi8vaXNtLWlubm92YS10ZW5hbnQxLml2YW50aWN
sb3VkZGV2LmNvbS9PSURDL3Jlc291cmNlcyIsImV4cCI6MTU1MjU0Nzc4NiwibmJmIjoxNTUyNTQ0MTg2LCJjbGllbnRfaWQiOiJyZXN0TG9naW5FbmRQb2ludCIsInNjb3BlIj
oib3BlbmlkIiwic3ViIjoiaXNtLWlubm92YS10ZW5hbnQxLml2YW50aWNsb3VkZGV2LmNvbSNBVGF5bG9yIzU5RkNBUEw2MjNUUTZVUjM1TEpUOUNTM1BQRERSTzFNIiwiYXV0a
F90aW1lIjoxNTUyNTQ0MTg2LCJpZHAiOiJpZHNydiIsImlzbV9zaWQiOiI1OUZDQVBMNjIzVFE2VVIzNUxKVDlDUzNQUEREUk8xTSIsImFtciI6WyJwYXNzd29yZCJdfQ.Mmb8a
x45sH2GWut1KZJ7tt6gWb_IkJ2IT2DNNFSzaAyMwtuLO3AeX9oQwVLuKSJ7yq2gGNNJ2TZJp-WCSNxKYvB1uZ6FFnoGMNyueBGP1HXYUXRGNUzWjKAKfuwejy7Dun1J68WCX4zx
lVhjE2YDBWlW_l60hJuyr9fQ2ACkHMSFJKSZLbo4X8KBXVpmUGeYNOFNm7BA9Q3pTv_z8O35F8jmSOOQNu49kCC3mHHF_xkm6UgBpXfZOQbAFxyvuPca0URvI1i2JQ4NbNgk6s2
HlnUI11CBGWgInSjw-TX_Kd7gB9HwbFLLDWZVrIYsexOU-OcipQdimBQR9vd9uPv-GA"
If the log-in API is executed successfully, the application generates a JWT Token. Follow the below steps to execute an endpoint:
1.Create a new request in the Postman application.
2.Enter the following information in the Authorization tab:
•Set the option as Bearer Token in the Type field.
•Enter the generated JWT Token in the Token field.
3.Enter the endpoint request payload details and click the Send button or press the ENTER key.
Unsuccessful Response

Scenario: Trying to log-in to a tenant with invalid user name, password or role.
https://{tenant url}/api/rest/authentication/login
Code | ISM_4000 |
Description | Bad Request |
Message |
[ "Unhandled system exception: Invalid Parameters." ] |
HTTP STATUS CODE |
400 |