Blackberry file browser api




















Post as a guest Name. Email Required, but never shown. The Overflow Blog. Stack Gives Back Safety in numbers: crowdsourcing data on nefarious IP addresses. Featured on Meta. New post summary designs on greatest hits now, everywhere else eventually. Related 1. The application on the device redirects the user to a web browser, where users must enter their BlackBerry IoT Platform credentials. Note : If it's the first time the user has logged in using the device, the BlackBerry IoT Platform handles the background activity of creating the device entity automatically.

The user is redirected to an authorization page. From here, the user must authorize the application to access profile information from the BlackBerry IoT Platform. If the user clicks Allow access , then the page is redirected to the callback URL that was provided earlier. The callback URL contains the authorization code. However, if the user doesn't give consent, an error occurs.

After the application receives the authorization code, it sends the authorization code back to the BlackBerry IoT Platform to exchange it for an access token. As part of the exchange process, the BlackBerry IoT Platform sends an access token to the application.

If the access token expires, the application receives a error Unauthorized , and it must go through the process to request a new authorization code, accept the authorization code, and exchange the authorization code for a new access token. It isn't necessary for users to re-enter their login credentials.

To handle authentication and authorization, applications must show the login page from the BlackBerry IoT Platform in a browser. Applications must use the BlackBerry IoT Platform login webpage to authenticate the user's credentials.

The scope parameter specifies the permissions that a user grants to the application. In particular, you'll want to use this parameter to allow your application to inherit the capabilities of the logged in user. You can use the state parameter to prevent cross-site request forgery on your application.

Typically, for web applications, the callback URL is located on the same server as where the application resides. If you previously passed a value with the state parameter, you should verify that the returned value matches what's put at the callback URL.

After you get an authorization code, your application must exchange the authorization code for an access token. Because the authorization code is valid for an extremely short period, it's recommended that you exchange your authorization code for an access token as soon as possible. Also included is other information you might find useful that include:.

In device-based authentication, no users are required to authenticate. This scenario is useful in manufacturing use cases where the device can be installed at the factory with the following:. Note : As part of your deployment flow, you must generate a private key and CSR. You download the certificate and put it on your device. For example, you could flash the information to a file on the device. Some of the cookies are necessary for proper functioning of the site, while others are to help us understand how you use it.

Read more here about our cookies, and how you can opt out. By continuing to use this site you accept our use of cookies. Critical Event Management. Browse to the location in which you wish to Move or Copy your file, press the menu key and select Paste to place the file in this location. You can also use the File Explorer to hide or unhide files and folders. Hidden items will not appear within your main Pictures, Music or Videos applications from the Home Screen, but can be viewed or opened using the file explorer.

What do you use the File Explorer for on your BlackBerry smartphone?



0コメント

  • 1000 / 1000