Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fix: Updates proxy concept page images #81

Merged
merged 5 commits into from
Feb 21, 2023
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
8 changes: 5 additions & 3 deletions docs/concepts/what-is-the-proxy.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -25,15 +25,15 @@ This makes it easy to share sensitive data with a third party without needing to

### How It Works

![Outbound Proxy Diagram](/img/concepts/proxy-outbound.png)

Your system initiates an outbound HTTP request to the [Ephemeral Proxy](/docs/api/proxies/ephemeral-proxy)
or a [Pre-Configured Proxy](/docs/api/proxies/pre-configured-proxies) instance hosted by Basis Theory.

To include sensitive data in your request, you include token identifiers within [expressions](/docs/expressions) included in the request.
These are patterns of the form `{{<tokenId>}}`, where `<tokenId>` is the id of a token created within your Basis Theory tenant.
The request is transformed by evaluating each expression and substituting the resulting plaintext values within the request.
Finally, the transformed request is delivered to the configured destination URL.

![Outbound Proxy Diagram](/img/concepts/outbound-proxy.png)
Finally, the transformed request containing sensitive data is delivered to the configured destination URL.

The Proxy terminates the inbound TLS connection from your servers and initiates a new TLS connection to the destination in order to
guarantee secure transmission of your sensitive token data.
Expand All @@ -53,6 +53,8 @@ and substitute non-sensitive token identifiers into the request payload before i

### How It Works

![Inbound Proxy Diagram](/img/concepts/proxy-inbound.png)

You [pre-configure](/docs/api/proxies/pre-configured-proxies) a proxy instance, which provides you a unique URL to this
proxy that can be shared with a third party integrator. The third party can then make HTTP requests to this URL that pass
through the proxy before being forwarded on to your system.
Expand Down
Binary file removed static/img/concepts/outbound-proxy.png
Binary file not shown.
Binary file added static/img/concepts/proxy-inbound.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added static/img/concepts/proxy-outbound.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.