Updated on 2025-08-14 GMT+08:00

Overview

Application Scenarios

After an application is developed using Huawei Cloud Astro Zero, the system presets a default login page for the application. Users can log in to the application through the default login page. You can also customize a login page for your application using Huawei Cloud Astro Zero. The system authenticates a portal user by comparing the user information entered on the login page, such as the user name, password, and mobile number, with the portal user information stored in the system. Then, the system allocates resources and access permissions to the portal user based on configurations.

For example, customize a login page, as shown in Figure 1, enter the username and password, and click the login button. The login is completed by calling the user login flow through the custom login widget. Before customizing the login page, learn about Portal User Login Methods and Portal User Login Mechanism.

Figure 1 Custom login page

Portal User Login Methods

A portal user can log in to Huawei Cloud Astro Zero in the background or frontend.

  • When a portal user logs in to the background, the system uses the custom flow to call the login script, query the login account and password, and check whether the current login account and password are correct.
  • Before a portal user logs in to the frontend, you need to develop a login widget and upload it to the advanced page, and configure the widget bridge data on the advanced page. Enter the login account and password on the login page, the system then calls the user login flow.

Portal User Login Mechanism

The service logic implementation process is as follows:

  1. The system calls the script for verifying account and password to query the login account and password and check whether the current login account and password are correct.
  2. If the account or password is incorrect, the system indicates that there is incorrect account or password. If the account and password are correct, the system checks whether a verification code is required.
  3. If no verification code is required, the login operation is performed. If a verification code is available, the system checks whether the verification code is correct.
  4. If the verification code is correct, the login operation is performed. If the verification code is incorrect, the verification fails.