With authentication a remote will discard events received by its listener when logged in. In addition this triggers an authenticated request to get data from the communication service using user permissions. The problem with this is that when the state of the communication service changes in the mean time a newer state is received and thus the one that triggered the request is skipped.
Since the state of the communication service has to change quickly the issue can be reproduced in simulation mode. It has to be tested if this is also relevant for the real system.
With authentication a remote will discard events received by its listener when logged in. In addition this triggers an authenticated request to get data from the communication service using user permissions. The problem with this is that when the state of the communication service changes in the mean time a newer state is received and thus the one that triggered the request is skipped.
Since the state of the communication service has to change quickly the issue can be reproduced in simulation mode. It has to be tested if this is also relevant for the real system.