Skip to content

Commit e29eb32

Browse files
committed
refer to application views not the admin in the docs, fixes #43
1 parent f1760d3 commit e29eb32

File tree

2 files changed

+9
-6
lines changed

2 files changed

+9
-6
lines changed

docs/rest-framework/getting_started.rst

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -106,9 +106,12 @@ Now run `python manage.py syncdb`, login to admin and create some users and grou
106106
Step 3: Register an application
107107
-------------------------------
108108

109-
To obtain a valid access_token first we must register an application.
109+
To obtain a valid access_token first we must register an application. DOT has a set of customizable
110+
views you can use to CRUD application instances, just point your browser at:
110111

111-
From the admin go to *oauth2_provider* > *applications* > *Add Application*. Fill the form with the following data:
112+
`http://localhost:8000/o/applications/`
113+
114+
Click the button `New Application` and fill the form with the following data:
112115

113116
* User: *your current user*
114117
* Client Type: *confidential*

docs/tutorial/tutorial_01.rst

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -69,7 +69,7 @@ redirect value. Django provides more information on `login templates here
6969

7070
<input type="hidden" name="next" value="{{ next }}" />
7171

72-
As a final step, make a syncdb, start the internal server and login into the admin with your credentials.
72+
As a final step, make a syncdb, start the internal server and login with your credentials.
7373

7474
Create an OAuth2 Client Application
7575
-----------------------------------
@@ -78,7 +78,7 @@ identified. This operation is usually done manually by a developer, who asks for
7878
:term:`Authorization Server` and gets access to some sort of backoffice where she can register her application, which
7979
will act as a :term:`Client` (or :term:`Application` in the Django OAuth Toolkit lingo).
8080
Let's perform exactly this operation.
81-
In the admin, section `Oauth2_Provider`, add an Application instance.
81+
Point your browser to `http://localhost:8000/o/applications/` and add an Application instance.
8282
`Client id` and `Client Secret` are automatically generated, you have to provide the rest of the informations:
8383

8484
* `User`: the owner of the Application (tipically a developer), could be the current logged in user.
@@ -116,8 +116,8 @@ to the authorization page.
116116

117117
Authorize the application
118118
+++++++++++++++++++++++++
119-
When the user clicks the link, she is redirected to your (possibly local) :term:`Authorization Server`. If you're not logged in
120-
in your Django admin, at this point you should be prompted for username and password. This is because the authorization
119+
When the user clicks the link, she is redirected to your (possibly local) :term:`Authorization Server`.
120+
If you're not logged in, at this point you should be prompted for username and password. This is because the authorization
121121
page is login protected by django-oauth-toolkit. Login, then you should see the not so cute form user can use to give
122122
her authorization to the client application. Flag the *Allow* checkbox and click *Authorize*, you will be redirected
123123
again on the consumer service.

0 commit comments

Comments
 (0)