GSTN API Invocation
When you invoke gstn API you need to take care of populating the headers correctly, creating the request payload, encrypting the payload and wrapping it in an envelope and then processing the responses (which usually require further decryption activities).
We are demonstrating 4 sample call logs (1 OTP call, 1 for an Authentication, 1 sample gstr1 save call and 1 sample gstr1 get b2b call) for your review to understand what the request / response payloads will look like
Before that, you will be required to encrypt some files during authentication with the GSTN public key. Please note below the correct public key to use.
Let us start with a sample call to authentication.