Embedded Manager Access - Managed Login
#
1. URL Format
#
Required Parameters:
platform XX timestamp 1768998470 hmac a1b2c3d4... 2. HMAC Signing Specification
#
Algorithm: HMAC-SHA256
Shared Secret: A secret key will be provided to you securely during onboarding. This should be stored securely and never exposed client-side.
Signature Generation Process:
- Collect all query parameters except
hmac - Sort parameters alphabetically by key
- Concatenate as
key=valuepairs separated by a pipe (|) character - Generate HMAC-SHA256 hash using your shared secret
- Encode the result as lowercase hexadecimal
Example:
Given these parameters:
platform=XX[email protected]timestamp=1768998470
Step 1: Sort alphabetically by key:
Step 2: Build the signature base string:
Step 3: Generate HMAC-SHA256:
3. Code Example (TypeScript)
#
4. Timestamp & Expiry
#
TTL: Signed URLs are valid for 5 minutes (300 seconds) from the timestamp.
Validation: Our server will reject requests where:
current_time - timestamp > 300(URL expired)timestamp > current_time + 60(timestamp too far in future, allows 60s clock drift)
Recommendation: Generate URLs immediately before use rather than caching them.
5. Error Handling
#
If the signature is invalid, expired, or any required parameters are missing, the iframe will display a user-friendly error state indicating something went wrong. No redirects will occur in this case.
6. Security Considerations
#
- HTTPS is required — the iframe URL must be loaded over HTTPS. HTTP requests will be rejected.
- Never expose the shared secret in client-side code or logs
- Generate URLs server-side immediately before embedding
- URL-encode parameter values that may contain special characters
Custom
About Plugins