• Skip to Search
  • Skip to Content
  • Skip to Side Navigation
Getting StartedSDK ReferenceGlossary
  • Home
  • Getting Started
  • SDK Reference
  • Portal
  • How-To
  • Troubleshooting
  • FAQs
  • Reference
  • Glossary
Getting Started
  • Basic Demo
  • Advanced Demo
  • Real-Time Use Cases
  • Ingest Options
  • Workflow
  • Getting Started with WebSDK 2.0
  • WebSDK 2.0 Logging and Error Handling
  • Mobile App Demos
  • Training Videos

Workflow

Our workflow restricts access to your streams to only the clients that you explicitly authorize. It is the responsibility of your application to authorize your clients accordingly and provide them with EdgeAuth tokens generated with our EdgeAuth libraries.

The recommended approach is to use our channel and room API and manage access for your users based on channels/rooms.

Using our EdgeAuth libraries you can create tokens:

  1. To publish to a channel/room

  2. To view a channel/room

  3. To access live streams via HLS/DASH

  4. Any other type of access. Please contact your primary Phenix technical support contact so we can advise you on the best way to use EdgeAuth tokens for your use case.

In addition, when you create EdgeAuth access tokens you can associate tags with each them, for example, to map users to your internal accounting system or to generate billing reports for your customers. These tags will be available for filtering and as an output column when you generate usage reports.

Channel Viewing Workflow

In order to provision your users to access your channels:

  1. Create an EdgeAuth token which is configured to access the channel for each individual user or, alternative at your discretion, groups of users.

  2. Pass that token from your backend to the user's device.

  3. Use one of our SDKs to access the channel with the EdgeAuth token.

  4. Monitor the client-side APIs for when you need to provide a new token to the SDK, for example, when the token expired.

The integrity of the workflow depends on not disclosing your application secrets to your users. Thus, it is mandatory that all interactions with the EdgeAuth libraries are only performed on trusted devices (e.g., your backend). Please contact us immediately if you believe that your application credentials have been exposed to unauthorized parties.
Page Content
    Copyright 2023 © Phenix RTS
    Privacy Policy | Terms of Service
    v2023-01-31T21:25:10