Join this online group to communicate across IBM product users and experts by sharing advice and best practices with peers and staying up to date regarding product enhancements.
Authenticating webmethods.io API Gateway APIs using OKTA as authorization server for OAuth mechanism
This article explains how to implement OAuth 2.0 on the webMethods.io API Gateway for OKTA authorization server
It is assumed that readers of this article know how to set up API’s on API gateway.
OAuth 2.0 is the industry-standard protocol for authorization. OAuth 2.0 focuses on client developer simplicity while providing specific authorization flows for web applications, desktop applications, mobile phones, and living room devices.
The OAuth 2.0 spec has four important roles:
For More info please follow the below link: https://developer.okta.com/docs/concepts/oauth-openid/
**API Name:** CheckBedAvailability
• Open the API CheckBedAvailability. • Navigate to the policy • Click on Identify & Access policy.
Before Configuring the Authorization server, we need to understand a couple of terminologies:
Introspection: Introspection is the way to authenticate the token. It is subdivided into 2 parts
Grant Type: Authorization code Call Back url: https://oauth.pstmn.io/v1/callback Authorise URL: We can get the from the metadata provided by OKTA Access Token URL: We can get the from the metadata provided by OKTA Client ID: We can get the from the metadata provided by OKTA Client Secret: We can get the from the metadata provided by OKTA State: Any random alphanumeric value Client Authentication: Send Client credentials in Body
Click on generate token
Click on use token
Submit the request
We have mapped the scope too. Do i need to select Dynamic client registration in this case and if yes what should be the client registration url ?and in
Application . If i click on generate credentials i get the below error after i click on update. I am not sure where to pass the grant_type in the application.
hi @parre.abhijith , Only condition we get invalid token is when it is not mapped with the scope . Can you please verify once again. Scope and API should be mapped. I dint see any other reason for this failure until its valid token
Regards Vikash Sharma
Hi Vikash
The article is brilliant. I have a question can the same be implemented using Azure for validating the tokens.
we are able to generate the tokens from Azure but when we add Azure as external authorizer and when we try to validate the APIs it is throwing errors related to token expiry but the token is still valid.