This site contains the documentation that is relevant to older WSO2 product versions and offerings.
For the latest WSO2 documentation, visit https://wso2.com/documentation/.
Use OAuth2 Protected Backends
WSO2 API Cloud allows you to expose your backend APIs as managed and secured APIs. API Cloud supports Basic and Digest OAuth protocols for securing backend APIs. However, there can be situations where back-ends are secured with OAuth2. This tutorial shows you how to integrate WSO2 API Cloud with a backend secured with OAuth2.
Before you begin...
- Create and publish an API.
Go to the API Store (
http://api.cloud.wso2.com/store/?tenant=<tenant_name>
). Subscribe to and invoke the API. You will get an error from the backend saying credentials are missing in the request. This is beacuse we are not passing the access token required for accessing the backend.
Follow the steps given below to do the configurations for generating and passing an access token to the backend.
Copy the following sequence and save it as an xml file.
<?xml version="1.0" encoding="UTF-8"?> <sequence name="simple-token-gen" trace="disable" xmlns="http://ws.apache.org/ns/synapse"> <property description="access_token" expression="get-property('registry', 'local:/api-backend-credentials/pizzaOrderingAPI/access_Token')" name="access_token" scope="default" type="STRING"/> <property description="generated_time" expression="get-property('registry','local:/api-backend-credentials/pizzaOrderingAPI/generated_Time')" name="generated-time" scope="default" type="LONG"/> <property description="client_credentials" name="app-client-auth" scope="default" type="STRING" value="{base64encoded(clientKey:clientSecret)}"/> <property expression="json-eval($)" name="message-body" scope="default" type="STRING"/> <property expression="get-property('axis2','REST_URL_POSTFIX')" name="resource" scope="default" type="STRING"/> <filter description="" xpath="get-property('SYSTEM_TIME') - get-property('generated-time') > {token expiry time} or get-property('access_token') = ''"> <then> <payloadFactory media-type="xml"> <format> <soapenv:Envelope xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/"> <soapenv:Body> <root xmlns=""> <grant_type>client_credentials</grant_type> </root> </soapenv:Body> </soapenv:Envelope> </format> <args/> </payloadFactory> <header expression="fn:concat('Basic ', get-property('app-client-auth'))" name="Authorization" scope="transport"/> <header name="Content-Type" scope="transport" value="application/x-www-form-urlencoded"/> <property description="messageType" name="messageType" scope="axis2" type="STRING" value="application/x-www-form-urlencoded"/> <property description="REST_URL_POSTFIx" name="REST_URL_POSTFIX" scope="axis2" type="STRING" value=""/> <call blocking="true"> <endpoint name="token"> <http method="post" uri-template="{token-endpoint-url}"/> </endpoint> </call> <property expression="get-property('resource')" name="REST_URL_POSTFIX" scope="axis2" type="STRING"/> <property description="generated Time Setter" expression="get-property('SYSTEM_TIME')" name="local:/api-backend-credentials/pizzaOrderingAPI/generated_Time" scope="registry" type="LONG"/> <property description="generated_token" expression="json-eval($.access_token)" name="generated-access-token" scope="default" type="STRING"/> <property description="new Token setter" expression="get-property('generated-access-token')" name="local:/api-backend-credentials/pizzaOrderingAPI/access_Token" scope="registry" type="STRING"/> <header expression="fn:concat('Bearer ', get-property('generated-access-token'))" name="Authorization" scope="transport"/> <payloadFactory media-type="json"> <format> $1 </format> <args> <arg evaluator="xml" expression="get-property('message-body')"/> </args> </payloadFactory> </then> <else> <header expression="fn:concat('Bearer ', get-property('access_token'))" name="Authorization" scope="transport"/> </else> </filter> </sequence>
- Replace the place holders with corresponding values.
{base64encoded(clientKey:clientSecret)}
- The client key and client secret, separated by a colon and base64 encoded.- {token expiry time} - The token expiry time of the backend authorization server.
{token-endpoint-url}
- The token endpoint URL of the backend authorization server.
- Create "/_system/local/api-backend-credentials/pizzaOrderingAPI/" directory path in the registry.
- Log in to the API Publisher.
- Select your API and click Edit.
Go to the Implement tab and select Enable Message Mediation. - Click Upload In flow and upload the saved sequence file.
- Save and publish the API.
You can now successfully invoke your API.