Authorization and management of personal data

From Wiki Amber.aero
Jump to navigation Jump to search

W1hen passing by the url address where the terminal is located, an unauthorized user sees the authorization form.

Auth 1 1.png Auth 1 2.png

The terminal uses a two-factor authorization, so the procedure itself takes place in two stages. On the first - user must enter his login and password in the corresponding fields. The second step is to confirm authorization with a special code, which will be sent to the user's e-mail.

  1. User fills in authorization parameters - enters login and password.
  2. The terminal sends a request to verify the authorization data to the host.
  3. If the verification is successful, the following steps are executed.
  4. The terminal generates a verification code (lifetime 5 min).
  5. The terminal generates and sends an email containing the code to the email address associated with the user's account.
  6. The terminal displays the form for entering the code to the user.
  7. You can resend the code (steps 1 and 2 will repeat).
  8. User enters the code.
  9. The terminal checks the entered and generated code for coincidence.

If the check is successful, the user is authorized.

After authorization user enters his personal account page with main sections:

  1. Start page.
    • Search for a new flight.
    • Search of the previously created order.
  2. A section for working with queues.
    • The list of queues with the counter of events waiting to be processed.
    • And the list of events of each queue for processing.
  3. Account data.
    • You can view the personal data of the account ONLY.
    • Password change.
    • Signing out from an account.

Personal account information

User data is returned in response to successful authorization. Set of parameters available:

  • First name
  • Last name
  • Phone
  • Email

Password change dialog

  1. User requests to change a password.
  2. Terminal displays form for changing password.
  3. User enters old and new password, repeats new password.
  4. The terminal sends a request for data verification (login and old password) to Amber.
  5. If the verification is successful, the following steps are performed. If the verification reveals an error in the entered data - the user will see a corresponding validation message.
  6. The terminal generates a verification code (lifetime 5 min).
  7. The terminal generates and sends an email with the code to the email linked to the user's account.
  8. The terminal shows the user the form for entering the code.
  9. The code can be resent.
  10. The user enters the code.
  11. The terminal checks if the entered code matches the generated code.
  12. If the check is successful, the following steps are performed.
  13. Terminal sends a request to Amber to save a new password.
  14. Sends a notification of password change to the user's email address.

Password recovery

You can recover your password by contacting the Amber support team. A techsupport employee changes the password and sends it to the cashier operator via email.

See also