This process validates the JWT token sent in and returns information about it including the logged in user. Note that usually the token is passed as a cookie since /auth/verify/login sets the cookie. This needs to be called for every non logged in page for page tracking. Secret Hmac Required. Cache Time 1 Hour.
POST
/Auth/Verify/Token
curl \
--request POST 'https://api.wrtm.io/v1.0/Auth/Verify/Token' \
--header "X-ApiKey: $API_KEY" \
--header "X-ApiDate: $API_KEY" \
--header "X-ApiHmac: $API_KEY" \
--header "Content-Type: application/json" \
--data '{"Href":"https://www.whyreadthemanual.com/login","Token":"base 64 encoded stuffs"}'
Request examples
{
"Href": "https://www.whyreadthemanual.com/login",
"Token": "base 64 encoded stuffs"
}
Response examples (200)
{
"Valid": 1,
"Custno": 0,
"Logind": 0,
"Parent": 0,
"LoginIp": "",
"Message": "Check out our <a href='./abc'>great Thanksgiving sale</a>!",
"LastName": "",
"FirstName": "",
"LoginTime": "",
"PrevLogin": ""
}
Response examples (401)
{
"Valid": 0,
"Expires": -3600,
"Message": "Token expired 33 minutes ago",
"Username": ""
}