OAuth 2
Adaptix supports only the authorization_code, refresh_token and client_credentials grant types.
Authorization
Step One - Obtain Authorization Code
Redirect the user to the authorize endpoint oauth/v2/authorize
:
The state is optional but recommended to prevent CSRF attacks. It should be a uniquely generated string and stored locally in session, cookie, etc. to be compared with the returned value.
Note that the redirect_uri should be URL encoded.
As of 1.1.2, Adaptix does not leverage OAuth2 scopes.
The user will be prompted to login. Once they do, Adaptix will redirect back to the URL specified in redirect_uri with a code appended to the query.
It may look something like:
https://your-redirect-uri.ai?code=UNIQUE_CODE_STRING&state=UNIQUE_STATE_STRING
The state returned should be compared against the original to ensure nothing has been tampered with.
Step Two - Replace with an Access Token
Obtain the value of the code from Step One then immediately POST it back to the access token endpoint oauth/v2/token
with:
The response returned should be a JSON encoded string:
This data should be stored in a secure location and used to authenticate API requests.
Refresh Tokens
The response's expires_in
is the number of seconds the access token is good for and may differ based on what is configured in Adaptix. The code handling the authorization process should generate an expiration timestamp based on that value. For example <?php $expiration = time() + $response['expires_in']; ?>
. If the access token has expired, the refresh_token should be used to obtain a new access token.
By default, the refresh token is valid for 14 days. - If your application requests a new access token using the refresh token within 14 days, no user interaction is needed. Your application gets both a new access token and a new refresh token (which is valid for another 14 days after it's issued); - If your application does not request a new token using the refresh token within 14 days, user interaction is required in order to get new tokens.
The refresh token's expiration time is configurable through Adaptix's Configuration.
The application should monitor for a 400 Bad Response
response when requesting a new access token and redirect the user back through the authorization process.
To obtain a new access token, a POST should be made to the access token's endpoint oauth/v2/token
using the refresh_token
grant type.
The response returned should be a JSON encoded string:
Client Credentials
The Client Credentials grant is used when applications request an access token to access their own resources, not on behalf of a user.
To obtain a new access token, a POST should be made to the access token's endpoint oauth/v2/token
using the client_credentials
grant type.
The response returned should be a JSON encoded string:
Authenticating the API Request
Authenticating the API request with OAuth2 is easy. Choose one of the following methods that is appropriate for the application's needs.
Authorization Header
By using an authorization header, any request method can be authenticated.
However, note that this method requires that the server Adaptix is installed on passes headers to PHP or has access to the apache_request_headers()
function. apache_request_headers()
is not available to PHP running under fcgi.
Method Specific
The access token can also be appended to the query or included in the body of a POST.