AuthenticateHandoff
Authenticate the user with a custom Authentication Handoff.
caution
Make sure you've initialized the brainCloud library before authenticating.
| Service | Operation |
|---|---|
| authenticationV2 | AUTHENTICATE |
Method Parameters
| Parameter | Description |
|---|---|
| handoffId | The id for the given handoff, which maps to its externalId under the hood. |
| securityToken | The security token used to verify the handoff |
Usage
http://localhost:3000
- C#
- C++
- Objective-C
- Java
- JavaScript
- Dart
- Roblox
- Cloud Code
- Raw
string handoffId = "handoffId";
string securityToken = "securityToken";
SuccessCallback successCallback = (response, cbObject) =>
{
Debug.Log(string.Format("Success | {0}", response));
};
FailureCallback failureCallback = (status, code, error, cbObject) =>
{
Debug.Log(string.Format("Failed | {0} {1} {2}", status, code, error));
};
_bc.AuthenticationService.AuthenticateHandoff(
handoffId, securityToken, successCallback, failureCallback);
const char* handoffId = "handoffId";
const char* securityToken = "securityToken";
_bc->getAuthenticationService()->authenticateHandoff(
handoffId,
securityToken,
this);
NSString* handoffId = @"handoffId";
NSString* securityToken = @"securityToken";
BCCompletionBlock successBlock; // define callback
BCErrorCompletionBlock failureBlock; // define callback
[[_bc authenticationService]
authenticateHandoff:handoffId
securityToken:securityToken
completionBlock:successBlock
errorCompletionBlock:failureBlock
cbObject:nil];
String handoffId = "handoffId";
String securityToken = "securityToken";
this; // implements IServerCallback
_bc.getAuthenticationService().authenticateHandoff(handoffId, securityToken, this);
public void serverCallback(ServiceName serviceName, ServiceOperation serviceOperation, JSONObject jsonData)
{
System.out.print(String.format("Success | %s", jsonData.toString()));
}
public void serverError(ServiceName serviceName, ServiceOperation serviceOperation, int statusCode, int reasonCode, String jsonError)
{
System.out.print(String.format("Failed | %d %d %s", statusCode, reasonCode, jsonError.toString()));
}
var handoffId = "handoffId";
var securityToken = "securityToken";
_bc.authentication.authenticateHandoff(handoffId, securityToken, result =>
{
var status = result.status;
console.log(status + " : " + JSON.stringify(result, null, 2));
});
var handoffId = "handoffId";
var securityToken = "securityToken";
ServerResponse result = await _bc.authenticationService.authenticateHandoff(handoffId:handoffId, securityToken:securityToken);
if (result.statusCode == 200) {
print("Success");
} else {
print("Failed ${result.error['status_message'] ?? result.error}");
}
local handoffId = "handoffId"
local securityToken = "securityToken"
local callback = function(result)
if result.statusCode == 200 then
print("Success")
else
print("Failed | " .. tostring(result.status))
end
end
_bc:getAuthenticationService():authenticateHandoff(handoffId, securityToken, callback)
// N/A
// N/A
JSON Response
{
"data": {
"vcPurchased": 0,
"experiencePoints": 100,
"refundCount": 0,
"playerSessionExpiry": 60,
"server_time": 1464621990155,
"experienceLevel": 0,
"currency": {
"credits": {
"purchased": 0,
"balance": 12211,
"consumed": 133,
"awarded": 12344
}
},
"abTestingId": 8,
"statistics": {
"gamesWon": 0
},
"id": "323e861-b749-4ce4-a57a-175232e21b5d",
"createdAt": 1459439058035,
"profileId": "323e861-b749-4ce4-a57a-175232e21b5d",
"newUser": "false",
"xpCapped": false,
"sent_events": [],
"timeZoneOffset": -5,
"playerName": "",
"vcClaimed": 0,
"parentProfileId": null,
"rewards": {
"rewardDetails": {},
"rewards": {},
"currency": {}
},
"countryCode": "ca",
"loginCount": 16,
"emailAddress": "test@email.com",
"previousLogin": 1464621979514,
"incoming_events": [],
"lastLogin": 1464621990118,
"languageCode": "en",
"pictureUrl": null,
"sessionId": "v3grtg3ve0a089pekk8lneuk8k",
"amountSpent": 0
},
"status": 200
}
Common Error Code
Status Codes
| Code | Name | Description |
|---|---|---|
| 40206 | MISSING_IDENTITY_ERROR | The identity does not exist on the server and forceCreate was false [and a profileId was provided - otherwise 40208 would have been returned]. Will also occur when forceCreate is true and a saved [but un-associated] profileId is provided. The error handler should reset the stored profile id (if there is one) and re-authenticate, setting forceCreate to true to create a new account. A common cause of this error is deleting the user's account via the Design Portal. |
| 40207 | SWITCHING_PROFILES | Indicates that the identity credentials are valid, and the saved profileId is valid, but the identity is not associated with the provided profileId. This may indicate that the user wants to switch accounts in the app. Most often an app will pop-up a dialog confirming that the user wants to switch accounts, and then reset the stored profileId and call authenticate again. |
| 40208 | MISSING_PROFILE_ERROR | Returned when the identity cannot be located, no profileId is provided, and forceCreate is false. The normal response is to call Authenticate again with forceCreate set to true. |
| 40217 | UNKNOWN_AUTH_ERROR | An unknown error has occurred during authentication. |
| 40307 | TOKEN_DOES_NOT_MATCH_USER | The user's password is incorrect. |