OAuth is open authentication protocol to protect the resources. It is the industry standard protocol for authorization
It is authorization framework enables a third party application to obtain limited access to an HTTP service, either behalf of a resource owner or by allowing the third party application to obtain access on its behalf.
High level Steps:
- Register a Trusted application in Identity Cloud Service(IDCS)
- Extract the client id, client secret & scope
- Obtain the access token
- Hit the rest endpoint using access token
Detailed steps:
Login to IDCS
Activate
Select Oauth and provide username as client id and password as client secret.
No comments:
Post a Comment