Notes

⚠️ Critical Requirements and Constraints

👤 User State Prerequisites

  • Required States: User must be in CREATED or RESET state before activation
  • CREATED State: Newly enrolled users who haven't completed initial activation
  • RESET State: Existing users whose credentials have been reset by administrator
  • Invalid States: ACTIVE, BLOCKED, or DELETED users cannot use activation flow

🎫 Token Management Requirements

  • Single Use Limitation: Each token can only be consumed once successfully
  • No Reuse: Consumed tokens cannot be used again for activation attempts
  • New Token Required: Failed or interrupted activations require new token generation
  • Token Expiration: Tokens have limited lifetime and expire automatically

🚫 Page Refresh Restrictions

  • Critical Limitation: Page refresh during activation process invalidates token
  • User Education: Users must be warned against refreshing browser pages
  • Error Recovery: Refresh-caused errors require new token to restart process
  • Session Management: Activation process maintains state without page refreshes

🔧 System Configuration Dependencies

  • Factor Availability: Available second factors controlled by system configuration
  • Registration Settings: allowed.reg.factors determines user options
  • Admin Override: System administrators control which factors users can register
  • Dynamic Options: User sees only factors enabled in current configuration

🔗 Integration and Cross-Platform Notes

📱 Mobile App Integration

  • Password Reuse: Web activation password can be used for mobile app login
  • Configuration Dependent: Mobile password usage depends on REL-ID system settings
  • Applicable Flows: Password works in mobile flows where user password is supported
  • Consistency: Same password policies apply across web and mobile platforms

🔄 Process Flow Integration

  • Enterprise Workflow: Activation can be embedded in larger onboarding processes
  • Redirect Flexibility: Configurable redirect URIs support various integration patterns
  • Token Generation: Enterprise systems can generate tokens via API calls
  • Status Tracking: Enterprise can monitor activation completion through system APIs

🛠️ Administrative Considerations

📊 Configuration Impact on User Experience

Configuration SettingUser ImpactAdministrative Control
password = falseNo password option shownForces passwordless activation
smsOtp = falseSMS not available as 2FALimits second factor choices
emailOtp = falseEmail not available as 2FALimits second factor choices
rememberMe = falseNo browser saving optionIncreases security, reduces convenience
securityQA = trueAdditional Q&A setup requiredAdds recovery method

🔍 Reference Documentation

  • Module Configuration: See REL-ID Gateway Manager Admin Manual for detailed configuration options
  • Registration Factors: Refer to Module Config Management section for allowed.reg.factors
  • Authentication Settings: Check Auth Server module configurations for factor controls

🚨 Troubleshooting and Error Scenarios

Token-Related Issues

IssueCauseResolution
Token InvalidToken expired or already usedGenerate new token
Token Not FoundMalformed URL or system errorVerify token generation process
Access DeniedUser not in correct stateCheck user status in system

Configuration-Related Issues

IssueCauseResolution
No 2FA OptionsAll second factors disabledEnable at least one registration factor
Password Required But DisabledConfiguration mismatchAlign password settings with requirements
Factor Registration FailsCommunication service issuesCheck SMS/Email service configuration

User Experience Issues

IssueCauseResolution
Page Refresh ErrorUser refreshed during activationGenerate new token and restart
Factor Verification FailsCommunication delays or user errorProvide resend options and clear instructions
Redirect FailsInvalid or unreachable redirect URIVerify redirect URI configuration

📋 Best Practices for Implementation

🎯 User Experience Optimization

  • Clear Instructions: Provide step-by-step guidance throughout activation
  • Error Prevention: Warn users about page refresh restrictions upfront
  • Progress Indicators: Show users where they are in the activation process
  • Help Resources: Provide contact information for activation support

🔒 Security Recommendations

  • Token Lifetime: Use appropriate token expiration periods (not too long, not too short)
  • Factor Diversity: Enable multiple second factor options for user choice
  • Policy Enforcement: Implement strong password policies aligned with security requirements
  • Monitoring: Track activation success rates and common failure points

🔧 System Administration

  • Configuration Testing: Validate configuration changes in test environment
  • User Communication: Notify users of changes to available activation options
  • Support Preparation: Train support staff on activation process and common issues
  • Analytics: Monitor activation metrics to identify improvement opportunities