{"id":30266,"date":"2021-08-24T10:17:36","date_gmt":"2021-08-24T09:17:36","guid":{"rendered":"https:\/\/multisite.korebots.com\/v9-0\/uncategorised-ja\/user-authorization-and-assertion\/"},"modified":"2021-08-24T10:18:32","modified_gmt":"2021-08-24T09:18:32","slug":"user-authorization-and-assertion","status":"publish","type":"post","link":"https:\/\/multisite.korebots.com\/v9-0\/uncategorised-ja\/user-authorization-and-assertion\/","title":{"rendered":"SDK \u30bb\u30ad\u30e5\u30ea\u30c6\u30a3"},"content":{"rendered":"<section class=\"l-section wpb_row height_auto\"><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row via_grid cols_1 laptops-cols_inherit tablets-cols_inherit mobiles-cols_1 valign_top type_default stacking_default\"><div class=\"wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><p>Kore.ai \u30dc\u30c3\u30c8 \u30d7\u30e9\u30c3\u30c8\u30d5\u30a9\u30fc\u30e0\u306f\u3001\u30e1\u30c3\u30bb\u30fc\u30b8\u306e\u63a5\u7d9a\u3068\u4ea4\u63db\u304c\u8a31\u53ef\u3055\u308c\u305f\u30af\u30e9\u30a4\u30a2\u30f3\u30c8\u306e\u307f\u3092\u53d7\u3051\u5165\u308c\u307e\u3059\u3002SDK \u30a2\u30d7\u30ea\u3092 \u30dc\u30c3\u30c8 \u30d3\u30eb\u30c0\u30fc \u30c4\u30fc\u30eb\u306e Kore.ai \u30dc\u30c3\u30c8 \u30d7\u30e9\u30c3\u30c8\u30d5\u30a9\u30fc\u30e0\u306b\u767b\u9332\u3057\u3001\u30af\u30e9\u30a4\u30a2\u30f3\u30c8\u306e\u8cc7\u683c\u60c5\u5831\u3092\u53d6\u5f97\u3059\u308b\u5fc5\u8981\u304c\u3042\u308a\u307e\u3059\u3002\u305d\u3046\u3059\u308b\u3068\u3001\u30af\u30e9\u30a4\u30a2\u30f3\u30c8\u306e\u8cc7\u683c\u60c5\u5831\u3092\u4f7f\u7528\u3057\u3066\u3001\u30e6\u30fc\u30b6\u30fc\u3001\u30dc\u30c3\u30c8\u3001\u30dc\u30c3\u30c8 \u30d7\u30e9\u30c3\u30c8\u30d5\u30a9\u30fc\u30e0\u306e\u9593\u306e\u30a2\u30d7\u30ea\u3068\u30b3\u30df\u30e5\u30cb\u30b1\u30fc\u30b7\u30e7\u30f3\u306e\u3084\u308a\u53d6\u308a\u3092\u627f\u8a8d\u3059\u308b\u3053\u3068\u304c\u3067\u304d\u307e\u3059\u3002<\/p>\n<\/div><\/div><div class=\"w-separator size_small with_line width_default thick_1 style_solid color_border align_center\"><div class=\"w-separator-h\"><\/div><\/div><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><h2><span class=\"ez-toc-section\" id=\"SDK_%E3%81%AE%E5%AE%89%E5%85%A8%E6%80%A7%E3%82%92%E7%A2%BA%E4%BF%9D%E3%81%99%E3%82%8B\"><\/span>SDK \u306e\u5b89\u5168\u6027\u3092\u78ba\u4fdd\u3059\u308b<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Kore.ai SDK \u3092\u4f7f\u7528\u3059\u308b\u3068\u3001Kore.ai \u30dc\u30c3\u30c8 \u30d7\u30e9\u30c3\u30c8\u30d5\u30a9\u30fc\u30e0\u3068\u306e\u5b89\u5168\u306a\u5bfe\u8a71\u3092\u4f5c\u6210\u3067\u304d\u307e\u3059\u3002Kore.ai SDK \u30e9\u30a4\u30d6\u30e9\u30ea\u306f\u3001Web \u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u3084\u30e2\u30d0\u30a4\u30eb\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u306b\u7d44\u307f\u8fbc\u3080\u3053\u3068\u3067\u3001Kore.ai \u30dc\u30c3\u30c8\u3068\u30c1\u30e3\u30c3\u30c8\u3092\u3059\u308b\u30e6\u30fc\u30b6\u30fc\u306b\u4ee3\u308f\u3063\u3066\u3001Kore.ai \u30dc\u30c3\u30c8 \u30d7\u30e9\u30c3\u30c8\u30d5\u30a9\u30fc\u30e0\u3068\u306e\u9593\u3067 HTTPS \u901a\u8a71\u3084Web \u30bd\u30b1\u30c3\u30c8\u63a5\u7d9a\u3092\u884c\u3046\u3053\u3068\u304c\u3067\u304d\u307e\u3059\u3002\u8b58\u5225\u60c5\u5831\u3092\u78ba\u7acb\u3057\u3001\u5b89\u5168\u306aWeb \u30bb\u30c3\u30b7\u30e7\u30f3\u3092\u958b\u59cb\u3059\u308b\u305f\u3081\u306b\u306f:<\/p>\n<ul>\n<li>\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3 SDK \u306f\u3001\u30e6\u30fc\u30b6\u30fc\u306e\u8b58\u5225\u60c5\u5831\u306b\u7f72\u540d\u3057\u3066 Kore.ai \u30dc\u30c3\u30c8 \u30d7\u30e9\u30c3\u30c8\u30d5\u30a9\u30fc\u30e0\u306b\u9001\u4fe1\u3059\u308b\u5fc5\u8981\u304c\u3042\u308a\u307e\u3059\u3002<\/li>\n<li>Kore.ai \u30dc\u30c3\u30c8 \u30d7\u30e9\u30c3\u30c8\u30d5\u30a9\u30fc\u30e0\u306f\u3001\u4ee5\u4e0b\u3092\u4f7f\u7528\u3057\u3066\u3001\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u3068\u306e\u4fe1\u983c\u95a2\u4fc2\u3092\u78ba\u7acb\u3059\u308b\u305f\u3081\u306b\u7f72\u540d\u3092\u691c\u8a3c\u3057\u307e\u3059\u3002\n<ul>\n<li><strong>JSON Web Token (JWT)<\/strong> \u30fc Kore.ai \u30dc\u30c3\u30c8 \u30d7\u30e9\u30c3\u30c8\u30d5\u30a9\u30fc\u30e0\u306b\u30e6\u30fc\u30b6\u30fc\u306e\u8b58\u5225\u60c5\u5831\u3092\u9001\u4fe1\u3059\u308b\u969b\u306b\u4f7f\u7528\u3057\u307e\u3059\u3002<\/li>\n<li><strong>\u30d9\u30a2\u30e9\u30fc \u30c8\u30fc\u30af\u30f3<\/strong> \u30fc \u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3 SDK \u304c JWT \u3092\u5f8c\u7d9a\u306e\u30b3\u30fc\u30eb\u306b\u4f7f\u7528\u3059\u308b\u30d9\u30a2\u30e9\u30fc \u30c8\u30fc\u30af\u30f3\u3068\u4ea4\u63db\u3057\u307e\u3059\u3002<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/div><\/div><div class=\"w-separator size_small with_line width_default thick_1 style_solid color_border align_center\"><div class=\"w-separator-h\"><\/div><\/div><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><h3><span class=\"ez-toc-section\" id=\"About_JWT\"><\/span>About JWT<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Kore.ai uses the JWT (JSON Web Token) mechanism to handle the authentication.<\/p>\n<h4>JWT Flow<\/h4>\n<p>The following diagram depicts a typical\u00a0JWT flow in Kore.ai Bots Platform.<br \/>\n<a ref=\"magnificPopup\" href=\"\/wp-content\/uploads\/sites\/22\/JWT-simplified-1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-16999\" src=\"\/wp-content\/uploads\/sites\/22\/JWT-simplified-1.png\" alt=\"\" width=\"719\" height=\"465\" \/><\/a><\/p>\n<h4>JWT Tokens<\/h4>\n<p>JSON Web Tokens\u00a0consist of three parts separated by dots &#8221; . \u00a0&#8221; as:<\/p>\n<ul>\n<li>Header<\/li>\n<li>Payload<\/li>\n<li>Signature<\/li>\n<\/ul>\n<p>using the\u00a0<code>hhhhh.ppppp.sssss<\/code> syntax where h represents the header, p the payload, and s representing the signature.<\/p>\n<h4>JWT Header<\/h4>\n<p>The JWT Header\u00a0defines the token type, which is JWT, and the security algorithm, for example,<\/p>\n<pre class=\"lang:default decode:true \">{\r\n   \"alg\": \"HS256\",\r\n   \"typ\": \"JWT\"\r\n}<\/pre>\n<p>The JWT type can be one of:<\/p>\n<ul>\n<li><b>HS256 (HMAC with SHA-256)\u00a0<\/b>&#8211; This algorithm uses a <strong>Secret Key<\/strong> to sign\u00a0the token. The\u00a0<strong>Secret Key<\/strong> is generated when the app is registered in Bot Builder\u00a0when defining the Web\/Mobile Client channel for your bot.<\/li>\n<li><b>RS256 (RSA signature with SHA-256)<\/b> &#8211; This is an RSA public\/private key based algorithm to sign and verify the token. The client <strong>Public Key<\/strong> is defined when the app is registered in the Bot Builder tool on the Kore.ai Platform. The client app signs the token using a <strong>Private Key<\/strong>, and the Kore.ai Bots Platform verifies this token using the <strong>Public Key<\/strong>.<\/li>\n<\/ul>\n<p>To use these JWT types for your bot, you need to register your application and select the algorithm type. For more information about using JWT, see\u00a0 <a href=\"https:\/\/tools.ietf.org\/html\/rfc7519\">https:\/\/tools.ietf.org\/html\/rfc7519<\/a> and <a href=\"https:\/\/jwt.io\/introduction\/\">https:\/\/jwt.io\/introduction\/<\/a>.<\/p>\n<h4>JWT Payload<\/h4>\n<p>The SDK client needs to assert the\u00a0user by generating unique JSON\u00a0Web Token using your app registration credentials created in Bot Builder when you defined the Web\/Mobile Client channel for your bot and the identity of your\u00a0app user.<br \/>\nThe following example shows a\u00a0sample payload used\u00a0to generate the JWT.<br \/>\n<strong>Sample Header<\/strong><\/p>\n<pre class=\"toolbar:1 lang:default decode:true\">{\r\n    \"alg\": \"HS256\",\r\n    \"typ\": \"JWT\"\r\n}<\/pre>\n<p><strong>Sample Payload<\/strong><\/p>\n<pre class=\"toolbar:1 lang:default decode:true\">{\r\n    \"iat\": 1466684723,\r\n    \"exp\": 1466684783,\r\n    \"jti\": \"1234\",               \/\/or kore_jti\r\n    \"aud\": \"https:\/\/idproxy.kore.ai\/authorize\",\r\n    \"iss\": \"cs-xxxxxxxxxx-1234\", \/\/or kore_iss\r\n    \"sub\": \"john.doe@achme.com\", \/\/or kore_sub\r\n    \"isAnonymous\": false,\r\n    \"identityToMerge\": \"anonymoususer1@test.com\" \/\/to map anonymous user\r\n}<\/pre>\n<p>The following table describes the parameters for the JWT Header and Payload.<\/p>\n<table>\n<thead>\n<tr>\n<th>Parameter<\/th>\n<th>Description<\/th>\n<th>Type<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td>alg<\/td>\n<td>A drop-down list of security algorithms. One of:<\/p>\n<ul>\n<li><b>RS256<\/b> &#8211; Select to enable the <b>Public Key<\/b> field. The <b>Public Key<\/b> is used by the Kore.ai Bots Platform to authenticate the client application.<\/li>\n<li><b>HS256<\/b> &#8211; Select to generate a Secret Key, and a Client ID. The Client ID is required for SDK initialization, and the Secret Key used by the Kore.ai Bots Platform to authenticate the client application.<\/li>\n<\/ul>\n<\/td>\n<td>string<\/td>\n<\/tr>\n<tr>\n<td>typ<\/td>\n<td>The token type. For JSON Web Token, enter <b>JWT<\/b>.<\/td>\n<td>string<\/td>\n<\/tr>\n<tr>\n<td>iat<\/td>\n<td>The date\/time that the token was issued. This value should be in seconds.<\/td>\n<td>integer<\/td>\n<\/tr>\n<tr>\n<td>exp<\/td>\n<td>The date\/time that the token expires. This value should be in seconds.<\/td>\n<td>integer<\/td>\n<\/tr>\n<tr>\n<td>jti<\/p>\n<p>or kore_jti<br \/>\n(optional)<\/td>\n<td>A <em>jti claim<\/em> which can be used to prevent replay attacks:<\/p>\n<p>&#8220;<em>The &#8220;jti&#8221; (JWT ID) claim provides a unique identifier for the JWT. The identifier value MUST be assigned in a manner that ensures that there is a negligible probability that the same value will be accidentally assigned to a different data object; if the application uses multiple issuers, collisions MUST be prevented among values produced by different issuers as well. The &#8220;jti&#8221; claim can be used to prevent the JWT from being replayed. The &#8220;jti&#8221; value is a case-sensitive string. Use of this claim is OPTIONAL.<\/em>&#8221; (<a href=\"https:\/\/tools.ietf.org\/html\/rfc7519#section-4.1.7\" target=\"_blank\" rel=\"noopener noreferrer\">ref<\/a>)<\/p>\n<p>NOTE: Use\u00a0<em>kore_jti<\/em> to bypass the pre-populated value for\u00a0<em>jti<\/em> with Kore specific values<\/td>\n<td>string<\/td>\n<\/tr>\n<tr>\n<td>aud<\/td>\n<td>The audience that the token is intended for. For Kore.ai, the audience is https:\/\/idproxy.kore.com\/authorize.<\/td>\n<td>string<\/td>\n<\/tr>\n<tr>\n<td>iss<\/p>\n<p>or kore_iss<\/td>\n<td>The ClientID of the client application. The ClientID is generated when the app is registered in the Kore.ai Bot Builder.<\/p>\n<p>NOTE: Use\u00a0<em>kore_iss<\/em>\u00a0to bypass the pre-populated value for\u00a0<em>iss<\/em> with Kore specific values<\/td>\n<td>string<\/td>\n<\/tr>\n<tr>\n<td>sub<\/p>\n<p>or kore_sub<\/td>\n<td>The token subject which is represented by the email ID or phone number for users who are logged in the client application system. For anonymous users, the client app can generate a unique random ID and assign that ID to this field.<\/p>\n<p>NOTE: Use\u00a0<em>kore_sub<\/em>\u00a0to bypass the pre-populated value for\u00a0<em>sub<\/em> with Kore specific values<\/td>\n<td>string<\/td>\n<\/tr>\n<tr>\n<td>isAnonymous<\/td>\n<td>When set to <code>true<\/code>, the user is an anonymous user for the client application system. Anonymous users are not persisted on the Kore.ai Platform. Default setting is <code>false<\/code>.<\/td>\n<td>boolean<\/td>\n<\/tr>\n<tr>\n<td>identityToMerge<\/td>\n<td>The anonymous Identity that needs to be merged into known user<br \/>\n<a href=\"\/docs\/bots\/sdks\/kore-ai-web-sdk-tutorial\/#Passing_Mapped_Identities_webSDK\" target=\"_blank\" rel=\"noopener noreferrer\">refer here<\/a> for details<\/td>\n<td>string<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h4>jti Validations<\/h4>\n<p>In case jti claim is passed as part of the JWT payload, the platform performs the following validations:<\/p>\n<ol>\n<li>Expiry to be less than or equal to 1 hour: In case of failing to meet this requirement the following response is sent:\n<pre class=\"toolbar:1 lang:default decode:true\">{\"errors\":[{\"msg\":\"error verifying the jwt: if \\\"jti\\\" claim \\\"exp\\\" must be &lt;= 1 hour(s)\",\"code\":401}]}<\/pre>\n<\/li>\n<li>Restricts replay of XHR: The following response is sent in case of non-compliance:\n<pre class=\"toolbar:1 lang:default decode:true\">{\"errors\":[{\"msg\":\"error verifying the jwt: possibly a replay\",\"code\":401}]}<\/pre>\n<\/li>\n<\/ol>\n<h4>Hosting the JWT Generation Web Service<\/h4>\n<p>The Kore.ai SDK libraries and UI widgets are integrated directly into your client applications, and you will need to generate the JWT from your server.<\/p>\n<ul>\n<li>For the Web SDK, the SDK\u00a0libraries are run from the user\u2019s browser.<\/li>\n<li>For\u00a0mobile SDKs, the SDK\u00a0libraries are run from a user\u2019s mobile phone.<\/li>\n<\/ul>\n<p>You\u00a0need to host the JWT generation as a REST web service for security because the <strong>Client Secret<\/strong> or <strong>RSA Private Key<\/strong> is required for JWT generation and should not be hosted at the client application. You can make the REST web service directly available to SDK libraries or have your application call the JWT generation web service at the backend to make the JWT available to the SDK libraries.<br \/>\nWhen making the JWT generation web service available to the SDK libraries, you should keep the <strong>Client ID<\/strong>, <strong>Client Secret<\/strong>, and any key expiration logic on the server-side and expect only the user ID from the client.<br \/>\nThere are several\u00a0open-source libraries available to generate JWT, for example,<\/p>\n<ul>\n<li>NodeJS &#8211; <a href=\"https:\/\/github.com\/auth0\/node-jsonwebtoken\">https:\/\/github.com\/auth0\/node-jsonwebtoken<\/a><\/li>\n<li>Java &#8211; <a href=\"https:\/\/github.com\/auth0\/java-jwt\">https:\/\/github.com\/auth0\/java-jwt<\/a><\/li>\n<li>.Net\u00a0&#8211; <a href=\"https:\/\/github.com\/jwt-dotnet\/jwt\">https:\/\/github.com\/jwt-dotnet\/jwt<\/a><\/li>\n<\/ul>\n<p>To generate credentials for your clients, you must register your client app in the Bot Builder tool. For more information, see <a href=\"\/docs\/bots\/advanced-topics\/sdks\/sdk-app-registration\/\">SDK App Registration<\/a>.<br \/>\nYou can also try out our tutorial using a Kore.ai sample bot, a test application, and configuring your localhost server for JWT generation. For more information, see the\u00a0<a href=\"\/docs\/bots\/advanced-topics\/sdks\/kore-ai-web-sdk-tutorial\/\">Kore.ai Web SDK Tutorial<\/a>.<\/p>\n<\/div><\/div><div class=\"w-separator size_small with_line width_default thick_1 style_solid color_border align_center\"><div class=\"w-separator-h\"><\/div><\/div><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><h2 id=\"JWE\"><span class=\"ez-toc-section\" id=\"JSON_Web_Encryption_JWE\"><\/span>JSON Web Encryption (JWE)<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>JWT is used to send user identity in a secure form by signing the payload using the Secret Key(HS-256 algorithm) or RSA Private Key(RS-256 algorithm). There can be a requirement to send additional user data along with user identity in JWT and make them available in the dialog execution context. This additional data may be sensitive information. Hence we need to send in encrypted form. <strong>JWE(JSON Web Encryption)<\/strong> is an IETF standard, which provides a way to send the JWT in an encrypted form.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Generating_JWE\"><\/span>Generating JWE<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>JWE token has five parts:<\/p>\n<ul>\n<li>Header,<\/li>\n<li>JWE Encrypted Key (CEK),<\/li>\n<li>Initialization Vector,<\/li>\n<li>Cipher Text, and<\/li>\n<li>Authentication Tag<\/li>\n<\/ul>\n<h4>Header<\/h4>\n<p>Header part can have the following attributes:<\/p>\n<ul>\n<li><strong>alg<\/strong>: defines the algorithm for content key wrapping<br \/>\nFollowing algorithms are supported:<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li><em>RSA-OAEP<\/em>,<\/li>\n<li><em>RSA1_5<\/em><\/li>\n<\/ul>\n<\/li>\n<li><strong>enc<\/strong>: defines the algorithm for content encryption<br \/>\nFollowing algorithms are supported for content encryption:<\/p>\n<ul>\n<li><em>A128CBC-HS256<\/em><\/li>\n<li><em>A128GCM<\/em><\/li>\n<li><em>A256GCM<\/em><\/li>\n<\/ul>\n<\/li>\n<li><strong>kid<\/strong>: Key Id of Kore Platform\u2019s public key. This will be displayed when you enable JWE bot builder<\/li>\n<li><strong>typ<\/strong>: This will have JWT as a value since the wrapped content is JWT<\/li>\n<\/ul>\n<p>Below is the decoded sample JWE header:<br \/>\n<code>{<br \/>\n\"alg\": \"RSA-OAEP\",<br \/>\n\"enc\": \"A128CBC-HS256\",<br \/>\n\"kid\": \"k-ffb4hty69-750a-44af-91c1-de0bvcf6a\",<br \/>\n\"typ\": \"JWT\"<br \/>\n}<\/code><\/p>\n<h4>JWE Encrypted Key (CEK)<\/h4>\n<p>A symmetric key is generated to encrypt the payload using the algorithm specified in \u201c<em>enc<\/em>\u201d field of the header. This key is encrypted using <em>Kore.ai Public Key<\/em> using the algorithm specified in \u201c<em>alg<\/em>\u201d field of the header.<\/p>\n<h4>Initialization Vector<\/h4>\n<p>This is used in the encryption of the payload (JWT).<\/p>\n<h4>Cipher Text<\/h4>\n<p>This contains encrypted JWT payload. This is encrypted using the algorithm specified in \u201c<em>enc<\/em>\u201d field of the header using the initialization vector.<\/p>\n<h4>Authentication Tag<\/h4>\n<p>The Authentication tag is generated when authenticated encryption is performed using the algorithm specified in \u201c<em>enc<\/em>\u201d field of the header. This is used during decryption to ensure integrity.<br \/>\n<em>Kore.ai public key<\/em> will be displayed in JWK format when you enable JWE option while creating an SDK app. You can use this in your client library to generate JWE.<br \/>\n<a ref=\"magnificPopup\" href=\"\/wp-content\/uploads\/sites\/22\/JWE1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-20152\" src=\"\/wp-content\/uploads\/sites\/22\/JWE1.png\" alt=\"\" width=\"1027\" height=\"577\" \/><\/a><br \/>\nFor more information about JWE, refer to <a href=\"https:\/\/tools.ietf.org\/html\/rfc7516\">https:\/\/tools.ietf.org\/html\/rfc7516.<\/a><\/p>\n<\/div><\/div><div class=\"w-separator size_small with_line width_default thick_1 style_solid color_border align_center\"><div class=\"w-separator-h\"><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\n","protected":false},"excerpt":{"rendered":"Kore.ai \u30dc\u30c3\u30c8 \u30d7\u30e9\u30c3\u30c8\u30d5\u30a9\u30fc\u30e0\u306f\u3001\u30e1\u30c3\u30bb\u30fc\u30b8\u306e\u63a5\u7d9a\u3068\u4ea4\u63db\u304c\u8a31\u53ef\u3055\u308c\u305f\u30af\u30e9\u30a4\u30a2\u30f3\u30c8\u306e\u307f\u3092\u53d7\u3051\u5165\u308c\u307e\u3059\u3002SDK \u30a2\u30d7\u30ea\u3092 \u30dc\u30c3\u30c8 \u30d3\u30eb\u30c0\u30fc \u30c4\u30fc\u30eb\u306e Kore.ai \u30dc\u30c3\u30c8 \u30d7\u30e9\u30c3\u30c8\u30d5\u30a9\u30fc\u30e0\u306b\u767b\u9332\u3057\u3001\u30af\u30e9\u30a4\u30a2\u30f3\u30c8\u306e\u8cc7\u683c\u60c5\u5831\u3092\u53d6\u5f97\u3059\u308b\u5fc5\u8981\u304c\u3042\u308a\u307e\u3059\u3002\u305d\u3046\u3059\u308b\u3068\u3001\u30af\u30e9\u30a4\u30a2\u30f3\u30c8\u306e\u8cc7\u683c\u60c5\u5831\u3092\u4f7f\u7528\u3057\u3066\u3001\u30e6\u30fc\u30b6\u30fc\u3001\u30dc\u30c3\u30c8\u3001\u30dc\u30c3\u30c8 \u30d7\u30e9\u30c3\u30c8\u30d5\u30a9\u30fc\u30e0\u306e\u9593\u306e\u30a2\u30d7\u30ea\u3068\u30b3\u30df\u30e5\u30cb\u30b1\u30fc\u30b7\u30e7\u30f3\u306e\u3084\u308a\u53d6\u308a\u3092\u627f\u8a8d\u3059\u308b\u3053\u3068\u304c\u3067\u304d\u307e\u3059\u3002 SDK \u306e\u5b89\u5168\u6027\u3092\u78ba\u4fdd\u3059\u308b Kore.ai SDK \u3092\u4f7f\u7528\u3059\u308b\u3068\u3001Kore.ai \u30dc\u30c3\u30c8 \u30d7\u30e9\u30c3\u30c8\u30d5\u30a9\u30fc\u30e0\u3068\u306e\u5b89\u5168\u306a\u5bfe\u8a71\u3092\u4f5c\u6210\u3067\u304d\u307e\u3059\u3002Kore.ai SDK \u30e9\u30a4\u30d6\u30e9\u30ea\u306f\u3001Web \u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u3084\u30e2\u30d0\u30a4\u30eb\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u306b\u7d44\u307f\u8fbc\u3080\u3053\u3068\u3067\u3001Kore.ai \u30dc\u30c3\u30c8\u3068\u30c1\u30e3\u30c3\u30c8\u3092\u3059\u308b\u30e6\u30fc\u30b6\u30fc\u306b\u4ee3\u308f\u3063\u3066\u3001Kore.ai \u30dc\u30c3\u30c8 \u30d7\u30e9\u30c3\u30c8\u30d5\u30a9\u30fc\u30e0\u3068\u306e\u9593\u3067 HTTPS \u901a\u8a71\u3084Web \u30bd\u30b1\u30c3\u30c8\u63a5\u7d9a\u3092\u884c\u3046\u3053\u3068\u304c\u3067\u304d\u307e\u3059\u3002\u8b58\u5225\u60c5\u5831\u3092\u78ba\u7acb\u3057\u3001\u5b89\u5168\u306aWeb \u30bb\u30c3\u30b7\u30e7\u30f3\u3092\u958b\u59cb\u3059\u308b\u305f\u3081\u306b\u306f: \u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3 SDK \u306f\u3001\u30e6\u30fc\u30b6\u30fc\u306e\u8b58\u5225\u60c5\u5831\u306b\u7f72\u540d\u3057\u3066 Kore.ai \u30dc\u30c3\u30c8 \u30d7\u30e9\u30c3\u30c8\u30d5\u30a9\u30fc\u30e0\u306b\u9001\u4fe1\u3059\u308b\u5fc5\u8981\u304c\u3042\u308a\u307e\u3059\u3002 Kore.ai \u30dc\u30c3\u30c8 \u30d7\u30e9\u30c3\u30c8\u30d5\u30a9\u30fc\u30e0\u306f\u3001\u4ee5\u4e0b\u3092\u4f7f\u7528\u3057\u3066\u3001\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u3068\u306e\u4fe1\u983c\u95a2\u4fc2\u3092\u78ba\u7acb\u3059\u308b\u305f\u3081\u306b\u7f72\u540d\u3092\u691c\u8a3c\u3057\u307e\u3059\u3002 JSON Web Token (JWT) \u30fc Kore.ai \u30dc\u30c3\u30c8 \u30d7\u30e9\u30c3\u30c8\u30d5\u30a9\u30fc\u30e0\u306b\u30e6\u30fc\u30b6\u30fc\u306e\u8b58\u5225\u60c5\u5831\u3092\u9001\u4fe1\u3059\u308b\u969b\u306b\u4f7f\u7528\u3057\u307e\u3059\u3002 \u30d9\u30a2\u30e9\u30fc \u30c8\u30fc\u30af\u30f3 \u30fc \u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3 SDK \u304c JWT \u3092\u5f8c\u7d9a\u306e\u30b3\u30fc\u30eb\u306b\u4f7f\u7528\u3059\u308b\u30d9\u30a2\u30e9\u30fc \u30c8\u30fc\u30af\u30f3\u3068\u4ea4\u63db\u3057\u307e\u3059\u3002 About...","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[79],"tags":[],"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/multisite.korebots.com\/v9-0\/wp-json\/wp\/v2\/posts\/30266"}],"collection":[{"href":"https:\/\/multisite.korebots.com\/v9-0\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/multisite.korebots.com\/v9-0\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/multisite.korebots.com\/v9-0\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/multisite.korebots.com\/v9-0\/wp-json\/wp\/v2\/comments?post=30266"}],"version-history":[{"count":32,"href":"https:\/\/multisite.korebots.com\/v9-0\/wp-json\/wp\/v2\/posts\/30266\/revisions"}],"predecessor-version":[{"id":30347,"href":"https:\/\/multisite.korebots.com\/v9-0\/wp-json\/wp\/v2\/posts\/30266\/revisions\/30347"}],"wp:attachment":[{"href":"https:\/\/multisite.korebots.com\/v9-0\/wp-json\/wp\/v2\/media?parent=30266"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/multisite.korebots.com\/v9-0\/wp-json\/wp\/v2\/categories?post=30266"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/multisite.korebots.com\/v9-0\/wp-json\/wp\/v2\/tags?post=30266"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}