Skip to content

Commit 1f0db38

Browse files
committed
fix broken links.
1 parent c51a3ce commit 1f0db38

13 files changed

+29
-29
lines changed

en/docs/api-gateway/api-gateways-with-dedicated-backends.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
# Gateways with Dedicated Backends
22

3-
We can extend the [multiple gateway environments]({{base_path}}/manage-apis/deploy-and-publish/api-gateway/maintaining-separate-production-and-sandbox-gateways) feature by utilizing parameterized endpoint capabilities of WSO2 API Manager to have each gateway point to a different back-end endpoint. Universal Gateway is the actual runtime of the APIs that are developed and published from the API Publisher. WSO2 API Manager is capable of publishing APIs to different Gateways where API users connect to those Universal Gateways in order to do the actual API calls through the applications to which they are subscribed.
3+
We can extend the [multiple gateway environments]({{base_path}}/api-gateway/maintaining-separate-production-and-sandbox-gateways) feature by utilizing parameterized endpoint capabilities of WSO2 API Manager to have each gateway point to a different back-end endpoint. Universal Gateway is the actual runtime of the APIs that are developed and published from the API Publisher. WSO2 API Manager is capable of publishing APIs to different Gateways where API users connect to those Universal Gateways in order to do the actual API calls through the applications to which they are subscribed.
44

55
However, the API Publisher can only provide a single static endpoint for an API in the implementation. Therefore, the API call is directed to a single endpoint in whichever Gateway the API is deployed in, as depicted in the diagram below.
66

@@ -18,7 +18,7 @@ Follow the steps below to configure a parameterized endpoint as the API endpoint
1818

1919
[![Dedicated backend definition]({{base_path}}/assets/img/learn/dedicated-backend-def.png)]({{base_path}}/assets/img/learn/dedicated-backend-def.png)
2020

21-
3. Save and [publish]({{base_path}}/manage-apis/deploy-and-publish/publish-on-dev-portal/publish-an-api) the API.
21+
3. Save and [publish]({{base_path}}/api-design-manage/deploy-and-publish/publish-on-dev-portal/publish-an-api) the API.
2222

2323
4. Navigate to the `<API-M_HOME>/repository/deployment/server/synapse-configs/default/sequences` directory of each Gateway and create the following sequence.
2424

en/docs/api-gateway/federated-gateways/aws/deploy-on-aws-api-gateway.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ Follow the instructions given below to configure AWS API Gateway as a Federated
4343

4444
`https://localhost:9443/admin`
4545

46-
2. Register a third party KM following instructions in WSO2 documentation. In this guide we will setup Auth0 as the KM following the guide [Configure Auth0 as a Key Manager]({{base_path}}/administer/key-managers/configure-auth0-connector/).
46+
2. Register a third party KM following instructions in WSO2 documentation. In this guide we will setup Auth0 as the KM following the guide [Configure Auth0 as a Key Manager]({{base_path}}/api-security/key-management/third-party-key-managers/configure-auth0-connector/).
4747

4848
## Step 4 : Create and Design API
4949

en/docs/api-gateway/federated-gateways/overview.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ Deploy and manage APIs on Amazon Web Services API Gateway. WSO2 API Manager come
2929
- OAuth 2.0 security via Lambda Authorizer
3030
- Centralized management through WSO2 API Manager
3131

32-
[Learn more about AWS API Gateway deployment]({{base_path}}/manage-apis/deploy-and-publish/federated-gateways/aws/deploy-on-aws-api-gateway/)
32+
[Learn more about AWS API Gateway deployment]({{base_path}}/api-gateway/federated-gateways/aws/deploy-on-aws-api-gateway/)
3333

3434
### Azure API Gateway
3535
Deploy and manage APIs on Microsoft Azure API Management Service. The built-in Azure gateway connector facilitates deployment and discovery of APIs on Azure infrastructure.
@@ -51,7 +51,7 @@ Discover and manage APIs deployed on Kong Gateway. WSO2 API Manager supports bot
5151
- Support for Kong Kubernetes and Standalone modes
5252
- Unified management through WSO2 API Manager Control Plane
5353

54-
[Learn more about Kong Gateway integration]({{base_path}}/manage-apis/deploy-and-publish/federated-gateways/kong/kong-standalone/discover-apis-on-kong-gateway/)
54+
[Learn more about Kong Gateway integration]({{base_path}}/api-gateway/federated-gateways/kong/kong-standalone/discover-apis-on-kong-gateway/)
5555

5656
### Envoy Gateway
5757
Discover and manage APIs deployed on Envoy Gateway in Kubernetes environments.
@@ -61,7 +61,7 @@ Discover and manage APIs deployed on Envoy Gateway in Kubernetes environments.
6161
- Kubernetes-native integration
6262
- Centralized API governance
6363

64-
[Learn more about Envoy Gateway integration]({{base_path}}/manage-apis/deploy-and-publish/federated-gateways/EnvoyGateway/eg-k8s/discover-apis-on-eg-gateway-in-kubernetes/)
64+
[Learn more about Envoy Gateway integration]({{base_path}}/api-gateway/federated-gateways/EnvoyGateway/eg-k8s/discover-apis-on-eg-gateway-in-kubernetes/)
6565

6666
## Gateway Modes
6767

@@ -75,7 +75,7 @@ Federated gateways can operate in different modes depending on your requirements
7575

7676
If you need to integrate with a third-party gateway that is not supported out-of-the-box, WSO2 API Manager provides the flexibility to create custom gateway agents. This allows you to extend the federated gateway capabilities to any external gateway.
7777

78-
[Learn more about configuring custom gateway agents]({{base_path}}/manage-apis/deploy-and-publish/federated-gateways/configure-custom-gateway-agent/)
78+
[Learn more about configuring custom gateway agents]({{base_path}}/api-gateway/federated-gateways/configure-custom-gateway-agent/)
7979

8080
## Architecture Benefits
8181

en/docs/api-gateway/gateway-policies.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -55,7 +55,7 @@ Follow the instructions provided below to create a gateway policy:
5555
[![Save individual policy data]({{base_path}}/assets/img/deploy/gateway/global-polices-add-header-policy.png){: style="width:90%"}]({{base_path}}/assets/img/deploy/gateway/global-polices-add-header-policy.png)
5656

5757
!!!note
58-
All the policies listed for addition as global policies are [common policies]({{base_path}}/manage-apis/design/api-policies/create-policy/).
58+
All the policies listed for addition as global policies are [common policies]({{base_path}}/api-design-manage/design/api-policies/create-policy/).
5959

6060
5. After saving the dropped policy, you should now be able to view the associated **Add Header** policy indicated by the initials **AH**.
6161

@@ -95,4 +95,4 @@ To undeploy a global policy from any gateway environment, simply click on the cl
9595

9696
You can engage policies with APIs and their resources:
9797

98-
[Attaching API Policies]({{base_path}}/manage-apis/design/api-policies/attach-policy/)
98+
[Attaching API Policies]({{base_path}}/api-design-manage/design/api-policies/attach-policy/)

en/docs/api-gateway/mutual-ssl-between-api-gateway-and-backend.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -110,7 +110,7 @@ Now both the backend service and API Manager are configured to use default key s
110110

111111
You can do the following to test your mutual SSL configurations
112112

113-
1. [Create an API]({{base_path}}/manage-apis/design/create-api/create-rest-api/create-a-rest-api)
114-
2. [Publish the API]({{base_path}}/manage-apis/deploy-and-publish/publish-on-dev-portal/publish-an-api)
115-
3. [Subscribe to the API]({{base_path}}/consume/manage-subscription/subscribe-to-an-api)
116-
4. [Invoke the API]({{base_path}}/consume/invoke-apis/invoke-apis-using-tools/invoke-an-api-using-the-integrated-api-console)
113+
1. [Create an API]({{base_path}}/api-design-manage/design/create-api/create-rest-api/create-a-rest-api)
114+
2. [Publish the API]({{base_path}}/api-design-manage/deploy-and-publish/publish-on-dev-portal/publish-an-api)
115+
3. [Subscribe to the API]({{base_path}}/api-developer-portal/manage-subscription/subscribe-to-an-api)
116+
4. [Invoke the API]({{base_path}}/api-developer-portal/invoke-apis/invoke-apis-using-tools/invoke-an-api-using-the-integrated-api-console)

en/docs/api-gateway/policies/adding-a-class-mediator.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -55,7 +55,7 @@ public class SimpleClassMediator extends AbstractMediator {
5555

5656
Then we can export this class as a jar file and add as a library to `<API-M_HOME>/repository/components/lib` directory.
5757

58-
By referring to this class with the fully qualified class name in a class mediator, we can create a new policy. Considering the below file content structure, you can create your own content and save as a `.xml` file. We will make use of this `.xml` file (i.e. policy file) when creating the policy (refer to [Create a Policy]({{base_path}}/manage-apis/design/api-policies/create-policy/) for further details). Thus created policy can then be attached to either the request flow or response flow of any API operation (refer [Attach Policies]({{base_path}}/manage-apis/design/api-policies/attach-policy/) for further details).
58+
By referring to this class with the fully qualified class name in a class mediator, we can create a new policy. Considering the below file content structure, you can create your own content and save as a `.xml` file. We will make use of this `.xml` file (i.e. policy file) when creating the policy (refer to [Create a Policy]({{base_path}}/api-design-manage/design/api-policies/create-policy/) for further details). Thus created policy can then be attached to either the request flow or response flow of any API operation (refer [Attach Policies]({{base_path}}/api-design-manage/design/api-policies/attach-policy/) for further details).
5959

6060
!!! example
6161
```xml

en/docs/api-gateway/policies/adding-a-non-blocking-send-operation.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,4 +21,4 @@ Let's create a new policy using the example provided below. Go ahead and create
2121
</sequence>
2222
```
2323

24-
Let's assume that the policy file that you created by considering the example above is `addNonBlockingSend.xml`. We will next create a policy using this policy file. You can refer to [Create a Policy]({{base_path}}/manage-apis/design/api-policies/create-policy/) to learn more about how to achieve this. When creating the policy, make sure to only select the `Request` flow when filling out the general details of the create policy form. Thus created policy can then be attached to the request flow of any API operation (refer [Attach Policies]({{base_path}}/manage-apis/design/api-policies/attach-policy/) for further details).
24+
Let's assume that the policy file that you created by considering the example above is `addNonBlockingSend.xml`. We will next create a policy using this policy file. You can refer to [Create a Policy]({{base_path}}/api-design-manage/design/api-policies/create-policy/) to learn more about how to achieve this. When creating the policy, make sure to only select the `Request` flow when filling out the general details of the create policy form. Thus created policy can then be attached to the request flow of any API operation (refer [Attach Policies]({{base_path}}/api-design-manage/design/api-policies/attach-policy/) for further details).

en/docs/api-gateway/policies/passing-a-custom-authorization-token-to-the-backend.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ Here's a summary:
2626
</sequence>
2727
```
2828

29-
2. Log in to the **API Publisher**, create a new REST API with the information given in the table below by following the instructions in [Create a REST API]({{base_path}}/manage-apis/design/create-api/create-rest-api/create-a-rest-api/).
29+
2. Log in to the **API Publisher**, create a new REST API with the information given in the table below by following the instructions in [Create a REST API]({{base_path}}/api-design-manage/design/create-api/create-rest-api/create-a-rest-api/).
3030

3131
| Field | Sample Value |
3232
|---------------|----------------------|
@@ -35,7 +35,7 @@ Here's a summary:
3535
| Version | 1.0.0 |
3636
| Endpoint | http://wso2cloud-custom-auth-header-sample-1-0-0.wso2apps.com/custom-auth-header/validate-header |
3737

38-
3. Navigate to the **API Configurations** --> **Policies** tab. Create a new policy with the information given in the table below by following the instructions in [Create a Policy]({{base_path}}/manage-apis/design/api-policies/create-policy/).
38+
3. Navigate to the **API Configurations** --> **Policies** tab. Create a new policy with the information given in the table below by following the instructions in [Create a Policy]({{base_path}}/api-design-manage/design/api-policies/create-policy/).
3939

4040
| Section | Field | Sample Value |
4141
|---------------------------|-------------------|-----------------------|
@@ -47,7 +47,7 @@ Here's a summary:
4747
| Gateway Specific Details | Policy File | `tokenExchange.xml` file you created |
4848
| Policy Attributes | N/A | N/A |
4949

50-
4. Next, find the **Custom Authorization Token** policy that you just created by following Step 3, from the `Request` tab of the policy list. Drag and drop this policy to the desired API operation(s) by following the instructions in [Attach Policies]({{base_path}}/manage-apis/design/api-policies/attach-policy/).
50+
4. Next, find the **Custom Authorization Token** policy that you just created by following Step 3, from the `Request` tab of the policy list. Drag and drop this policy to the desired API operation(s) by following the instructions in [Attach Policies]({{base_path}}/api-design-manage/design/api-policies/attach-policy/).
5151

5252
[![Custom Authorization Token Policy]({{base_path}}/assets/img/design/api-policies/custom-authorization-token-policy.png)]({{base_path}}/assets/img/design/api-policies/custom-authorization-token-policy.png)
5353

@@ -60,7 +60,7 @@ Here's a summary:
6060
5. Go to the **Developer Portal**, subscribe and obtain a token to invoke the published API.
6161

6262
!!! tip
63-
Follow the instructions in [here]({{base_path}}/consume/manage-application/generate-keys/generate-api-keys/#generating-application-keys) to generate an application access token.
63+
Follow the instructions in [here]({{base_path}}/api-developer-portal/manage-application/generate-keys/generate-api-keys/#generating-application-keys) to generate an application access token.
6464

6565
6. Install any REST client in your machine. We use [cURL](http://curl.haxx.se/download.html) here.
6666

en/docs/api-gateway/policies/removing-specific-request-headers-from-response.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ To remove request headers from responses for per API or globally, add the name o
1414
``` bash
1515
<property name="CustomTransportHeader" scope="transport" action="remove"/>
1616
```
17-
Check out [Changing the Default Mediation Flow of API Requests]({{base_path}}/manage-apis/deploy-and-publish/deploy-on-gateway/api-gateway/message-mediation/changing-the-default-mediation-flow-of-api-requests) to learn on how to
17+
Check out [Changing the Default Mediation Flow of API Requests]({{base_path}}/api-gateway/message-mediation/changing-the-default-mediation-flow-of-api-requests) to learn on how to
1818
add the above mediation policy per API or globally.
1919

2020
## Handling Error Responses

en/docs/api-gateway/policies/revoke-one-time-tokens-policy.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
# Revoke One Time Tokens Policy
22

3-
The [JWT access tokens]({{base_path}}/manage-apis/design/api-security/oauth2/access-token-types/jwt-tokens/) issued in the Gateway can be used to access the dedicated API resource as many times as the user needs. However, if the application developer wants to restrict this ability by providing only one chance to access the resource then One Time Token can be used. One Time Token is a JWT that will be revoked after single usage. This feature is **only available for JWT access tokens**.
3+
The [JWT access tokens]({{base_path}}/api-security/key-management/tokens/jwt-tokens/) issued in the Gateway can be used to access the dedicated API resource as many times as the user needs. However, if the application developer wants to restrict this ability by providing only one chance to access the resource then One Time Token can be used. One Time Token is a JWT that will be revoked after single usage. This feature is **only available for JWT access tokens**.
44

55
## Workflow
66

@@ -22,14 +22,14 @@ The high level workflow of revocation of One Time Tokens is illustrated below.
2222
2323
## Enabling One Time Tokens
2424
25-
This feature is only supported for the [Regular Gateway and the Request flow]({{base_path}}/manage-apis/design/api-policies/overview/). In order to enable this feature for the JWTs, two conditions need to be fulfilled.
25+
This feature is only supported for the [Regular Gateway and the Request flow]({{base_path}}/api-design-manage/design/api-policies/overview/). In order to enable this feature for the JWTs, two conditions need to be fulfilled.
2626
2727
1. Attach the ‘Revoke One Time Token’ policy to the required API resource
2828
2. Add the relevant scope to the JWT
2929
3030
### Attach the ‘Revoke One Time Token’ policy
3131
32-
This step can be done by following the steps listed [here]({{base_path}}/manage-apis/design/api-policies/attach-policy/). The below diagram shows which policy to select. You can apply the policy to the whole API or a designated API resource depending on the use case.
32+
This step can be done by following the steps listed [here]({{base_path}}/api-design-manage/design/api-policies/attach-policy/). The below diagram shows which policy to select. You can apply the policy to the whole API or a designated API resource depending on the use case.
3333
3434
The policy has one attribute called scope. If a JWT in your application has the same scope that is mentioned in the policy, it will be identified as a One Time Token. The default value of the scope is “OTT”. However, this can be changed to any name the user prefers.
3535

0 commit comments

Comments
 (0)