• 欢迎访问搞代码网站,推荐使用最新版火狐浏览器和Chrome浏览器访问本网站!
  • 如果您觉得本站非常有看点,那么赶紧使用Ctrl+D 收藏搞代码吧

Testing WSO2 Identity Server OAuth 2.0 support with Curl

mysql 搞代码 4年前 (2022-01-09) 21次浏览 已收录 0个评论

WSO2 Identity Server adds OAuth 2.0 support from it’s very next release. Hopefully by the end of this August. OAuth Core specification supports four grant types. 1. Authorization Code Grant (authorization_code) 2. Implicit Grant 3. Resourc

WSO2 Identity Server adds OAuth 2.0 support from it’s very next release. Hopefully by the end of this August. OAuth Core specification supports four grant types.

1. Authorization Code Grant (authorization_code)
2. Implicit Grant
3. Resource Owner Pas本文来源gaodai#ma#com搞@@代~&码*网2sword Credentials Grant (password)
4. Client Credentials Grant (client_credentials)

In this blog post we only talk about last two grant types – since those can be directly executed via curl.

First you need to download the WSO2 Identity Server 4.0.0 server from here.

1. Start the server
2. Login with admin/admin
3. Main/Manage/OAuth/Register New Application

4. Select OAuth 2.0
5. Give an Application Name and any Callback Url [need not to be real for this case]

6. Once you click on “Add” you will be taken to the OAuth Management page
7. Click on the application you just created.

8. Copy the values of Client Id and Client Secret — we need these values later.


Now lets see how we get an access token from Identity Server via curl.


This is how it works under Resource Owner Password Credentials grant type.

This is useful when the end user or the resource owner trusts the application. I will not talk about the advantages and disadvantages of this grant type here – will have another blog post on that. Anyway this is a grant type you should use with extra care.

$ curl –user Client_Id:Client_Secret -k -d “grant_type=password&username=admin&password=admin” -H “Content-Type:application/x-www-form-urlencoded” https://localhost:9443/oauth2/token

You need to replace Client_Id:Client_Secret with your values…

The response would be something like…

{“token_type”:”bearer”,
“expires_in”:3600,
“refresh_token”:”d78e445a78c9bdce17f349068495ebe”,
“access_token”:”3a1d3e2983fafc73eec3f894cb6eb4″}

Now you can use this access_token to access the protected resource.

Let’s how to execute curl to get an access_token with Client Credentials Grant type. Here the client becomes the resource owner. Almost similar to 2-legged OAuth we talked under OAuth 1.0.

curl –user Client_Id:Client_Secret -k -d “grant_type=client_credentials&username=admin&password=admin” -H “Content-Type:application/x-www-form-urlencoded” https://localhost:9443/oauth2/token

You need to replace Client_Id:Client_Secret with your values…

The response would be.

{“token_type”:”bearer”,
“expires_in”:3600,

“access_token”:”9cdd18286e27dd768b74577276f217be”}



http://blog.facilelogin.com/2012/08/testing-wso2-identity-server-oauth-20.html



搞代码网(gaodaima.com)提供的所有资源部分来自互联网,如果有侵犯您的版权或其他权益,请说明详细缘由并提供版权或权益证明然后发送到邮箱[email protected],我们会在看到邮件的第一时间内为您处理,或直接联系QQ:872152909。本网站采用BY-NC-SA协议进行授权
转载请注明原文链接:Testing WSO2 Identity Server OAuth 2.0 support with Curl

喜欢 (0)
[搞代码]
分享 (0)
发表我的评论
取消评论

表情 贴图 加粗 删除线 居中 斜体 签到

Hi,您需要填写昵称和邮箱!

  • 昵称 (必填)
  • 邮箱 (必填)
  • 网址