Join this online group to communicate across IBM product users and experts by sharing advice and best practices with peers and staying up to date regarding product enhancements.
This article explains how to implement OpenID on API gateway for OKTA authorization server
It is assumed that readers of this article know how to set up APIs in API gateway.
Active tenant subscription on Webmethods.io API Gateway
Configure the API in API gateway.
Create Application and associate API with application.
Refer the link to create API GitHub - SoftwareAG/webmethods-api-gateway: Repository hosting developer tutorials, code samples, custom policies, CI/CD scripts and more to enable developers develop faster with API Gateway
Active account for OKTA
OpenID Connect (OIDC) is a thin layer that sits on top of OAuth 2.0 that adds login and profile information about the person who is logged in.
Establishing a login session is often referred to as authentication, and information about the person logged in (i.e. the Resource Owner) is called identity.
When an Authorization Server supports OIDC, it is sometimes called an identity provider, since it provides information about the Resource Owner back to the Client.
OpenID Connect supports the following authentication flows
The Implicit Flow is required for apps that have no “back end” logic on the web server, like a Javascript app.
The Authentication (or Basic) Flow is designed for apps that have a back end that can communicate with the IdP away from prying eyes.
The Resource Owner Password Grant does not have an login UI and is useful when access to a web browser is not possible.
The Client Credentials Grant is useful for machine to machine authorization.
For More info please follow below link: An Illustrated Guide to OAuth and OpenID Connect | Okta Developer
**API Name:** CheckBedAvailability
Before Configuring the Authorization server, we need to understand couple of terminologies
Introspection is the way to authenticate the token. It is sub divided into 2 parts
Add Authorization Server
Grant Type : Authorization code Call Back url: https://oauth.pstmn.io/v1/callback Authorise URL: We can get the from the metadata provided by OKTA Access Token URL: We can get the from the metadata provided by OKTA Client ID: We can get the from the metadata provided by OKTA Client Secret: We can get the from the metadata provided by OKTA Scope: openid State: Any random alphanumeric value Client Authentication: Send Client credentials in Body