This site contains the documentation that is relevant to older WSO2 product versions and offerings.
For the latest WSO2 documentation, visit https://wso2.com/documentation/.

Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

Version 1 Next »

The Authorization Code Grant is one of the grant types in the OAuth 2.0 specification. For more information about this grant type, see  Authorization Code Grant.

Before you begin, you must first  set up the sample webapp. 

This section demonstrates the Authorization Code Grant with PKCE and without PKCE. 

The Proof Key for Code Exchange (PKCE) is a specification supported by WSO2 Identity Server to mitigate code interception attacks. See Mitigating Authorization Code Interception Attacks to configure PKCE for an OAuth application.

Running the application (without PKCE) 

  1. Visit the URL http://localhost:8080/playground2/oauth2.jsp to start the application.

  2. Enter the following details and click Authorize .

    Authorization Grant Type: Authorization Code
    Client ID: (the client id received at the application registration)
    Callback URL: http://localhost:8080/playground2/oauth2client
    Authorize Endpoint: https://localhost:9443/oauth2/authorize

    1.png


  3. Log in with the user credentials.
    2.png

  4. Click Approve to consent to this action.

    3.png
  5. Provide the following details and click on Get Access Token.

    Callback URL: http://localhost:8080/playground2/oauth2client
    Access Token Endpoint: https://localhost:9443/oauth2/token
    Client Secret: (client secret received at the application registration)

    If you have configured the service provider in a tenant, you have to add the tenant domain as a query parameter to the access token endpoint.

    If the tenant domain is wso2.com, access token endpoint will be as follows.

    4.png

  6. At this point the application receives the Access Token. Enter the introspection endpoint (i.e, https://localhost:9443/oauth2/introspect) and click Get TokenInfo to get the token information.

     Click here for more information on OAuth 2.0 Token Introspection

    OAuth 2.0 Token Introspection defines a protocol that allows authorized protected resources to query the authorization server to determine the set of metadata for a given token that was presented to them by an OAuth Client. This metadata includes whether or not the token is currently active (or if it has expired or otherwise been revoked), what rights of access the token carries (usually conveyed through OAuth 2.0 scopes), and the authorization context in which the token was granted (including who authorized the token and which client it was issued to). Token introspection allows a protected resource to query this information regardless of whether or not it is carried in the token itself, allowing this method to be used along with or independently of structured token values.

  7. Now you should be able to see the access token information as seen below, as long as the provided access token is valid. 

Running the application (with PKCE) 

  1. Visit the URL http://localhost:8080/playground2/oauth2.jsp to start the application.

  2. Enter the following details and click Authorize.

    Authorization Grant Type: Authorization Code
    Client ID: (the client id received at the application registration)
    Callback URL: http://localhost:8080/playground2/oauth2client
    Authorize Endpoint: https://localhost:9443/oauth2/authorize
    Use PKCE: Yes 
    PKCE Challenge Method:

     

  3. Log in with the user credentials.
    2.png

  4. Click Approve to consent to this action.

    3.png
  5. Provide the following details and click on Get Access Token.

    Callback URL: http://localhost:8080/playground2/oauth2client
    Access Token Endpoint: https://localhost:9443/oauth2/token
    Client Secret: (client secret received at the application registration)
    PKCE Verifier: (this will be populated using the value generated in step 1) 

    If you have configured the service provider in a tenant, you have to add the tenant domain as a query parameter to the access token endpoint.

    If the tenant domain is wso2.com, access token endpoint will be as follows.

     

  6. At this point the application receives the Access Token. Enter the introspection endpoint (i.e, https://localhost:9443/oauth2/introspect) and click Get TokenInfo to get the token information.

     Click here for more information on OAuth 2.0 Token Introspection

    OAuth 2.0 Token Introspection defines a protocol that allows authorized protected resources to query the authorization server to determine the set of metadata for a given token that was presented to them by an OAuth Client. This metadata includes whether or not the token is currently active (or if it has expired or otherwise been revoked), what rights of access the token carries (usually conveyed through OAuth 2.0 scopes), and the authorization context in which the token was granted (including who authorized the token and which client it was issued to). Token introspection allows a protected resource to query this information regardless of whether or not it is carried in the token itself, allowing this method to be used along with or independently of structured token values.

  7. Now you should be able to see the access token information as seen below, as long as the provided access token is valid. 

Related Topics
  • No labels