The main window of the customer's B2B platform
Posted: Wed Jan 22, 2025 6:03 am
Logging out of the account also occurs via a link created on the backend. When you click the “Log out of account” button, you log out of the B2B platform account, then the user is redirected to Keycloak, where they log out automatically.
The functionality of registration and password kenya telegram number database recovery was not implemented - Keycloak is entirely responsible for this.
Note that access to the 1C-BUS administrative part via the standard authorization form is also possible. This capability is required so that the exchange with 1C remains accessible and is performed without problems.
Our module is not universal. To integrate Keycloak with other systems on Bitrix, it will have to be modified depending on the user's work scenarios. Because of them, the logic of redirects, authentication and account logout, the logic of user creation, etc. may change. Now the modification for Keycloak lives inside the platform module and works only in the context of a specific integration.
If it is important for you to correctly and promptly provide and revoke access to closed resources for your clients or employees and you consider keycloack as a tool that can solve your problems - fill out the form below. We have experience implementing keycloak as a full-time authorization broker. We will discuss your wishes, draw up an implementation plan, integrate and support the entire life of the project.Introduction
In this article, we want to talk about what the wholesale business is currently facing (many challenges and changes that require adaptation, as well as process optimization) and what it is betting on in its development.
Traditional approaches to working with wholesale buyers are not as effective as before, so companies are switching to new technologies and strategies - building B2B sales systems.
The functionality of registration and password kenya telegram number database recovery was not implemented - Keycloak is entirely responsible for this.
Note that access to the 1C-BUS administrative part via the standard authorization form is also possible. This capability is required so that the exchange with 1C remains accessible and is performed without problems.
Our module is not universal. To integrate Keycloak with other systems on Bitrix, it will have to be modified depending on the user's work scenarios. Because of them, the logic of redirects, authentication and account logout, the logic of user creation, etc. may change. Now the modification for Keycloak lives inside the platform module and works only in the context of a specific integration.
If it is important for you to correctly and promptly provide and revoke access to closed resources for your clients or employees and you consider keycloack as a tool that can solve your problems - fill out the form below. We have experience implementing keycloak as a full-time authorization broker. We will discuss your wishes, draw up an implementation plan, integrate and support the entire life of the project.Introduction
In this article, we want to talk about what the wholesale business is currently facing (many challenges and changes that require adaptation, as well as process optimization) and what it is betting on in its development.
Traditional approaches to working with wholesale buyers are not as effective as before, so companies are switching to new technologies and strategies - building B2B sales systems.