Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

After an access token is generated, sometimes you might have to refresh or renew the old token due to expiration or security concerns. You use the refresh token grant when the current access token is expired or when a new access token is needed. With this grant type, the refresh token acts as credentials that are issued to the client by the authorization server. Issuing a refresh token is optional. If the authorization server issues a refresh token, it is included when issuing an access token. Refresh tokens are issued for all other grant types other than the implicit grant as recommended by the OAuth 2.0 specification. 

Tip

Tip: Be sure to keep the refresh token private, similar to the access token as this token issues access tokens without user interactions.

To use this grant type, you need a refresh token, using which you can get a new access token along with and a new refresh token. Given below is how to get a token:

  1. The <RefreshTokenValidityPeriod> element is in seconds. By default, it is valid for one day. You can configure this accordingly. 
  2. The <RenewRefreshTokenForRefreshGrant> element is by default set to true.

    Info

    The refresh token is renewed when the refresh grant is used to get an access token. A new refresh token is issued with a new expiry time and the previous refresh token is then inactive and can no longer be used.

    If this element is set to false, unless the refresh token has expired, the same refresh token is returned.

Code Block
languagexml
themeEclipse
		<!-- Validity period for refresh token -->
		<RefreshTokenValidityPeriod>84600</RefreshTokenValidityPeriod>
		...
        <!-- Enable renewal of refresh token for refresh_token grant -->
        <RenewRefreshTokenForRefreshGrant>true</RenewRefreshTokenForRefreshGrant>

Try out scenario

Run the following cURL command to try out the refresh token grant. 

...

languagepowershell

 This can be done by issuing a REST call to the Token API through a REST client like cURL, with the following parameters: 

  • The Token API URL is https://gateway.api.cloud.wso2.com/token.
  • payload - "grant_type=refresh_token&refresh_token=<retoken>". Replace the <retoken> value with the refresh token that you have.
  • headers - Authorization :Basic <base64 encoded string of consumer-key:consumer-secret>, Content-Type: application/x-www-form-urlencoded. Replace <base64-encoded string-of-consumer-key:consumer-secret> as appropriate.          

For example, the following cURL command can be used to access the Token API and grant a refresh token.

Code Block
curl -k -d "grant_type=refresh_token&refresh_token=<refresh_token><retoken>" -H "Authorization: Basic <Base64Encoded(Client_Id:Client_Secret)>SVpzSWk2SERiQjVlOFZLZFpBblVpX2ZaM2Y4YTpHbTBiSjZvV1Y4ZkM1T1FMTGxDNmpzbEFDVzhh" -H "Content-Type: application/x-www-form-urlencoded" https://localhost:9443/oauth2/tokenhttps://gateway.api.cloud.wso2.com/token

When you use the refresh grant to get a new access token, the refresh token is renewed by default. The new refresh token has a new expiry time and the previous refresh token becomes inactive.

Revoking access tokens

After issuing an access token, a user or an admin can revoke it in case of theft or a security violation. You can do this by calling the Revoke API using a REST Client. The Revoke API's endpoint URL is https://gateway.api.cloud.wso2.com/revoke. The parameters required to invoke this API are as follows:

  • The token to be revoked
  • Consumer key and consumer secret key. Must be encoded using Base64 algorithm

For example:

Code Block
curl -k -d "token=<access-token-to-be-revoked>" -H "Authorization: Basic Base64Encoded(Consumer-key:consumer-secret)" https://gateway.api.cloud.wso2.com/revoke
Tip
Even after revoking a token, it might still be available in the API Gateway cache to consumers until the cache expires in approximately 15 minutes.