Overview
This command in the Authentication adapter, can be used to verify a new User or Application. The command can also be used to verify other attributes as well as to increase security in some parts of the application. Examples of when to use for security could be to avoid that a user needs to have login with normal credentials. Instead the user enters the code that is related to the e-mail adress.
Architecture diagram
Payload example
Request
{ "Code": "123456", "Email": "user@example.com"}JSON Schema
3 properties
Codestring
requiredVerification code
Usernamestringnull
Emailstring<email>
requiredEmail address of the user