How to get more information of the user ?

Visual-Guard Identity server provide user information method. Url: https://<your VG Identity Server>/connect/userinfo This method return many information like VGToken, user information, profile of the user, roles, permissions and etc… Inside of your get http you need insert Authorization with bearer

How to authenticate a Visual Guard User?

To authenticate a Visual Guard user, you need a POST request

How to use Identity Server API ?

The VGIdentityServer documentation provides comprehensive information on how to use the VGIdentityServer API. The document is organized into various sections, each detailing a specific functionality of the API. One of the main sections is the “Authenticate” folder, which contains all

OAuth 2.0 & OpenID Connect

Visual Guard Identity Server adheres to the OAuth 2.0 and OIDC standards, providing secure and reliable user authentication and authorization services.  What is OAuth 2.0? OAuth 2.0 is an authorization framework that allows applications to access protected resources on behalf

How to get a security token ?

The VG Identity Server provides various methods to obtain a security token, granting access to your VG application. Here’s how to get started: 1. Define Platform Authentication: Before requesting a token, your VG application requires a configured platform authentication. This

How to migrate from VGServer ?

The VGServer has been replace by Visual-Guard Identity Server. VG Identity Server works with the bearer Token, the VGToken, which is contained inside of the claims. We need to authenticate from VG Identity Server The API has been updated.Please refer

Granted Groups

Visual Guard allows you to edit the Groups assigned to the role. To edit the group follow the steps below: Note: Besides using the below method to edit the group you can use the following shortcut methods to grant, revoke a group

Granted users

Visual Guard allows you to edit the roles assigned to the user. To edit the users follow the steps below: Note: Besides using the below method to edit the user you can use the following shortcut method to grant, revoke a user

Audit Activities

Audit activities entail monitoring and logging user interactions, access attempts, and system modifications within an application, enabling comprehensive tracking for compliance, security, and troubleshooting purposes. Administrators can configure audit activities to record specific events or behaviors, ensuring accountability and facilitating

Edit User