Actions101
- š¤ Chatting Actions
- š„ļø Sessions Actions
- š Auth Actions
- š¼ļø Screenshot Actions
- š¢ Channels Actions
- š¢ Status Actions
- š¬ Chats Actions
- š¤ Contacts Actions
- š„ Groups Actions
- ā Presence Actions
- š·ļø Labels Actions
- š Observability Actions
Overview
This node is designed to interact with an authentication service to retrieve a QR code associated with a specified session. It is useful in scenarios where a user needs to authenticate or link a session via a QR code, such as in two-factor authentication setups or session validation processes. For example, it can be used to generate a QR code image or raw data that can be scanned or processed by an authentication app or system.
Use Case Examples
- Generating a QR code image for a user session to enable login via scanning.
- Retrieving raw QR code data for custom processing or display in a user interface.
Properties
| Name | Meaning |
|---|---|
| Session | The name of the session for which the QR code is requested. This is a required string input that identifies the session context. |
| Format | The format in which the QR code should be returned. Options include 'Image' for a visual QR code image or 'Raw' for raw QR code data. |
| Request Options | Additional request configuration options such as batching, SSL certificate validation, proxy settings, and request timeout. These options control how the request to get the QR code is made and handled. |
Output
JSON
qrCode- The QR code data returned by the node, either as an image or raw data depending on the selected format.
Dependencies
- Requires an API key credential or authentication token to access the authentication service.
Troubleshooting
- If the session name is incorrect or missing, the node will fail to retrieve the QR code. Ensure the session name is valid and provided.
- If the request times out, consider increasing the timeout setting or checking network connectivity.
- SSL certificate validation errors can be bypassed by enabling the 'Ignore SSL Issues' option, but this should be used with caution due to security risks.
- Proxy settings must be correctly configured if a proxy is required for network access.