# User Manual

Document Version Content Revision Revised By Revision Date
V1.0 Initial Draft Guochenghao 2023-09-01

# Table of Contents

# Goals

  • Address user difficulties: reduce usage costs

image

  • Address the complexity of service integration: reduce interaction costs

image

  • Address the issue of excessive deployment configurations: reduce deployment costs

image

# Page Display

# Application List

img.png

# User Management

image

# Personal Information

image

# Token Management

image

# Features

# Application Management

  • View existing applications
  • Search for available services on the local area network
  • Edit application information
  • Manage application roles

# User Management

  • Add users
  • Edit user information
  • Set user enable/disable status
  • Set user roles

# Account Management

  • Maintain personal information
  • Bind management accounts

# Token Management

  • Add new tokens
  • Delete tokens

# API

https://console-docs.apipost.cn/preview/1a52b8b93925675e/55922c519a517dd9

# Hardware and Operating System Requirements

Hardware Requirements Recommended Specifications
Processor (CPU) >= i5-10500,arm or x84-64
Memory(RAM) >= 16G
Disk(DISK) >= 512G,SSD recommended
Operating System Recommended Version
Windows >= Win10
Macos >= 12.1
Ubuntu >= 20.04
Browser Recommended Version
chrome >= 90.0.4430
edge >= 90.0.818.8

# Authentication Process - Authorization Code Grant

     +--------+                               +---------------+
     |        |--(A)- Authorization Request ->|   Resource    |
     |        |                               |     Owner     |
     |        |<-(B)-- Authorization Grant ---|               |
     |        |                               +---------------+
     |        |
     |        |                               +---------------+
     |        |--(C)-- Authorization Grant -->| Authorization |
     | Client |                               |     Server    |
     |        |<-(D)----- Access Token -------|               |
     |        |                               +---------------+
     |        |
     |        |                               +---------------+
     |        |--(E)----- Access Token ------>|    Resource   |
     |        |                               |     Server    |
     |        |<-(F)--- Protected Resource ---|               |
     +--------+                               +---------------+
  • A The client sends an authorization request to the resource owner;
  • B The resource owner agrees to the client's authorization and returns an authorization code;
  • C The client uses the authorization code to request a token from the authorization server;
  • D The authorization server verifies the client's identity, and upon successful authentication, issues a token;
  • E The client uses the issued token to request resources from the resource server;
  • F The resource server verifies the token's validity and returns the resource information to the client.

# Authentication Process - Resource Owner Password Credentials Grant

     +----------+
     | Resource |
     |  Owner   |
     |          |
     +----------+
          v
          |    Resource Owner
         (A) Password Credentials
          |
          v
     +---------+                                  +---------------+
     |         |>--(B)---- Resource Owner ------->|               |
     |         |         Password Credentials     | Authorization |
     | Client  |                                  |     Server    |
     |         |<--(C)---- Access Token ---------<|               |
     |         |    (w/ Optional Refresh Token)   |               |
     +---------+                                  +---------------+
  • A The resource owner provides the username and password to the client.

  • B The client uses the username and password to request a token from the authorization server.

  • C The authorization server verifies the client and resource owner credentials, and if valid, returns the token.

# Service Discovery - Scope of Use

  • Enabled on the local area network
  • Disabled on the public network

If the service discovery feature is enabled, the application list page displays the service status field, and the list automatically refreshes every 5 seconds.
If the service discovery feature is disabled, the application list page does not display the service status field, and the list does not refresh automatically.

# Service Discovery - Principle

Uses SSDP to search for services. Upon discovering a service, the following actions are executed:

  1. Automatically search for available devices on the local area network.

If there are no services in application management, automatically create a new application.
If there are n services in application management, iterate through them to find the first service without a bound IP to auto-bind.
If there are n services in application management, and no bindable IP services are found, automatically create a new application.

  1. Application List

Unwanted services can be set to ignore.
Ignored applications can be restored to the application list by clicking 'Add Service - Ignored List' and then clicking 'Restore'.