Log in to devices1、Pre-operations (1)Search for devices Search the device through the search interface and obtain basic information about the device: IP address, SN (product serial number), product name, etc.2、Post-operations In each subsequent request, it is necessary to include the Token sent during login in the request header. The name of the request header is "Authorization", and the value is the Token sent during login.3、Prevent brute force login After three consecutive failed attempts, users must wait 60 seconds before trying again.4、Flowchart