Changes for page 2. Authenticating with your OIDC client and fetch collab user info
Last modified by messines on 2021/06/08 17:32
Summary
-
Page properties (1 modified, 0 added, 0 removed)
-
Attachments (0 modified, 0 added, 2 removed)
Details
- Page properties
-
- Content
-
... ... @@ -6,7 +6,7 @@ 6 6 7 7 The client is confidential with a secret, you obtain it throught the registering oidc client tutorial above. 8 8 9 -[[image:Screenshot 2020-07-15 at 17.47.12.png ||height="453" width="664"]]9 +[[image:Screenshot 2020-07-15 at 17.47.12.png]] 10 10 11 11 12 12 The whole authentication flow presented here is based on the official OAuth2 rfc describe in the section 4.1 ... ... @@ -13,8 +13,6 @@ 13 13 14 14 [[https:~~/~~/tools.ietf.org/html/rfc6749#section-4.1>>https://tools.ietf.org/html/rfc6749#section-4.1]] 15 15 16 -[[image:Screenshot 2020-07-15 at 18.32.14.png||height="410" width="474"]] 17 - 18 18 == Authentication flow == 19 19 20 20 === Authorization Code Grant === ... ... @@ -44,8 +44,7 @@ 44 44 In the request you can see a scope **parameter** 45 45 46 46 * **openid : **This scope is required in oidc, it contains basic information of the user such as it username, email and full name. 47 -* **group **( optional ) **: **This scope is provided by our service, if you add it to your authorization code grant request, the futur access token generated will be able to read which units and groups the logged user belongs, it can be very important for your application. You can notice on the screenshot in the abstract section that **Consent required **is **on, **it means that at loggin time, the user will be asked if he allow your application to access there unit and group membership 48 -* **team **( optional ) **: **Very same than group, but for collab, with this scope your application will know in which collab the authenticated user belong 45 +* **group **( optional ) **:** 49 49 50 50 ==== Response ==== 51 51 ... ... @@ -59,88 +59,4 @@ 59 59 ))) 60 60 61 61 62 -=== Access Token Request === 63 - 64 -==== Request ==== 65 - 66 -Now that you have the **authorization** **code, **you can reach the **/token **endpoint and fetch the user access token 67 - 68 -/POST : https:/iam.ebrains.eu/auth/realms/hbp/protocol/openid-connect/token 69 - 70 -with params 71 - 72 -* grant_type : authorization_code 73 -* code : //f3f04f93-hbp-482d-ac3d-demo.turtorial.7122c1d9-3f7e-4d80-9c4f-dcd244bc2ec7// 74 -* redirect_uri : [[https:~~/~~/www.getpostman.com/oauth2/callback>>https://www.getpostman.com/oauth2/callback]] 75 -* client_id : community-apps-tutorial 76 -* client_secret : your client secret obtained during client creation 77 - 78 -[[image:Screenshot 2020-07-15 at 18.20.34.png]] 79 - 80 - 81 -==== Response ==== 82 - 83 -200 OK 84 - 85 -(% class="box" %) 86 -((( 87 -{ 88 - "access_token": "eyJhbGciOiJSUzI1NiIsInR5cCIgOiAi...pP5vaNwvvsaNGEA", 89 - "expires_in": 604773, 90 - "refresh_expires_in": 604773, 91 - "refresh_token": "eyJh...vC5eIR1rNhRJ4d8", 92 - "token_type": "bearer", 93 - "id_token": "eyJ...YOwdQ", 94 - "not-before-policy": 0, 95 - "session_state": "76e553bf-ba2e-45b6-8c6c-c867772b40ec", 96 - "scope": "openid" 97 -} 98 -))) 99 - 100 -You get a response containing the access token and others 101 - 102 -== Access user info == 103 - 104 -Now that your application got the access token of your user, it's really easy to fetch user info 105 - 106 -(% class="box infomessage" %) 107 -((( 108 -/GET https:/iam.ebrains.eu/auth/realms/hbp/protocol/openid-connect/userinfo 109 -))) 110 - 111 -and just provide the access token as **Authentication** header 112 - 113 -[[image:Screenshot 2020-07-15 at 18.28.28.png||height="161" width="566"]] 114 - 115 - 116 -As response you will have a json with all the information on the logged user, for my user 117 - 118 -(% class="box" %) 119 -((( 120 -{ 121 - "sub": "fa2db206-3eb4-403c-894a-810ebaba98e1", 122 - "unit": [ 123 - "/collab-devs", 124 - "/collab-team", 125 - "/all/institutions/switzerland/epfl", 126 - "/all/projects/hbp/consortium/SGA2/SP05", 127 - "/all/projects/hbp/consortium/SGA3/WP6/T6_11" 128 - ], 129 - "roles": { 130 - "jupyterhub": [ 131 - "feature:authenticate" 132 - ], 133 - "xwiki": [ 134 - "feature:authenticate" 135 - ], 136 - "team": [ 137 - "collab-collaboratory-community-apps-editor" 138 - ], 139 - "group": [ 140 - "group-collaboratory-developers", 141 - "unit-all-projects-hbp-consortium-sga2-sp05-administrator" 142 - ] 143 - }, 144 - "mitreid-sub": "305862" 145 -} 146 -))) 59 +
- Screenshot 2020-07-15 at 18.28.28.png
-
- Author
-
... ... @@ -1,1 +1,0 @@ 1 -XWiki.messines - Size
-
... ... @@ -1,1 +1,0 @@ 1 -58.4 KB - Content
- Screenshot 2020-07-15 at 18.32.14.png
-
- Author
-
... ... @@ -1,1 +1,0 @@ 1 -XWiki.messines - Size
-
... ... @@ -1,1 +1,0 @@ 1 -161.8 KB - Content