Skip to content

Commit 71e283f

Browse files
committed
fix broken links under api security.
1 parent bdd0ba1 commit 71e283f

File tree

11 files changed

+15
-14
lines changed

11 files changed

+15
-14
lines changed

en/docs/api-security/key-management/authentication/grant-types/client-credentials-grant.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -103,4 +103,4 @@ If you want to **disable the Client Credentials grant type** in the API-M instan
103103

104104
### Refresh Token grant type - supported or not
105105

106-
The Client Credentials grant type **does not support** the Refresh Token grant type. This grant type does not issue a refresh token which can be used to obtain new access tokens using the [refresh token grant]({{base_path}}/learn/api-security/oauth2/grant-types/refresh-token-grant/).
106+
The Client Credentials grant type **does not support** the Refresh Token grant type. This grant type does not issue a refresh token which can be used to obtain new access tokens using the [refresh token grant]({{base_path}}/api-security/key-management/authentication/grant-types/refresh-token-grant/).

en/docs/api-security/key-management/authentication/grant-types/refresh-token-grant.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ The refresh token grant can be used when the current access token is expired or
66

77
This refresh token needs to be kept private, similar to the access token. When using this token, keep in mind that it issues the access token without a user interaction.
88

9-
#### Flow
9+
## Flow
1010

1111
After an access token is generated, sometimes you might have to renew the old token due to expiration or security concerns. You can renew an access token using a refresh token, by issuing a REST call to the Token API with the following parameters.
1212
A refresh token has to be obtained before using it with a grant type such as the authorization code or password grant type. Using the obtained refresh token, you can obtain a new access token along with a renewed refresh token without having to go through any other additional steps.
@@ -22,7 +22,7 @@ The diagram below illustrates the refresh token grant flow.
2222
- [Option 1](#option-1)
2323
- [Option 2](#option-2)
2424

25-
### Generating a new access token and refresh token
25+
## Generating a new access token and refresh token
2626

2727
To use this grant type, you need a refresh token, using which you can get a new access token and a refresh token. This can be done by issuing a REST call to the Token API through a REST client like cURL, with the following parameters:
2828

@@ -70,11 +70,11 @@ The above REST response grants you a renewed access token along with a refresh t
7070
refresh_token_validity = 3600
7171
```
7272

73-
### Revoking a refresh token
73+
## Revoking a refresh token
7474

7575
After issuing an access token and refresh token, a user or an admin can revoke it in case of theft or a security violation. You can do this by calling the Revoke API using a utility like cURL. The Revoke API's endpoint URL is <https://localhost:9443/oauth2/revoke>.
7676

77-
#### Option 1
77+
### Option 1
7878

7979
The parameters required to invoke the following API are as follows:
8080

@@ -118,7 +118,7 @@ The parameters required to invoke the following API are as follows:
118118
< Server: WSO2 Carbon Server
119119
```
120120

121-
#### Option 2
121+
### Option 2
122122

123123
The parameters required to invoke the following API are as follows:
124124

en/docs/api-security/key-management/key-manager-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -163,7 +163,7 @@ For deployments with millions of users and high token generation rates, consider
163163
- Need to reduce database load and improve TPS (Transactions Per Second)
164164

165165
### Choose Grant Types Based on Application Architecture
166-
Map [OAuth2 grant types]({{base_path}}/api-security/keymanagement/authentication/grant-types/overview/) to your application types: use client credentials for service-to-service, authorization code for web applications, and password grant only for highly trusted internal applications. Avoid the implicit grant type in production environments.
166+
Map [OAuth2 grant types]({{base_path}}/api-security/key-management/authentication/grant-types/overview/) to your application types: use client credentials for service-to-service, authorization code for web applications, and password grant only for highly trusted internal applications. Avoid the implicit grant type in production environments.
167167

168168
### Implement Comprehensive Scope Management
169169
Use [OAuth2 scopes]({{base_path}}/api-security/runtime/authorization/oauth2-scopes/fine-grained-access-control-with-oauth-scopes/) to implement fine-grained access control from the beginning. Design your scope hierarchy to match your API resource structure and business permissions. Implement scope whitelisting to prevent privilege escalation.

en/docs/api-security/key-management/third-party-key-managers/overview.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,4 +27,3 @@ Organizations can configure multiple Key Managers within a single tenant, allowi
2727
### Custom Integration
2828
- **[Custom Key Manager]({{base_path}}/api-security/key-management/third-party-key-managers/configure-custom-connector/)**: Build connectors for proprietary authorization servers
2929
- **[Global Key Manager]({{base_path}}/api-security/key-management/third-party-key-managers/configure-global-key-manager/)**: Cross-tenant key manager configuration
30-
- **[Application Scopes]({{base_path}}/api-security/key-management/third-party-key-managers/application-scopes/)**: Fine-grained application scope management

en/docs/api-security/key-management/tokens/encrypting-oauth2-tokens.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -37,6 +37,6 @@ Follow the steps below to enable OAuth2 token encryption
3737
!!! tip
3838

3939
- If you use a [Distributed API Manager setup]({{base_path}}/install-and-setup/deploying-wso2-api-manager/distributed-deployment/understanding-the-distributed-deployment-of-wso2-api-m) , the changes must be made on both the Developer Portal and Key Manager nodes.
40-
- If you use WSO2 Identity Server [(WSO2 IS) as the Key Manager setup]({{base_path}}/install-and-setup/deploying-wso2-api-manager/ThirdPartyKeyManager/configuring-wso2-identity-server-as-a-key-manager/) , you need to make changes in both WSO2 IS and WSO2 API Manager.
40+
- If you use WSO2 Identity Server [(WSO2 IS) as the Key Manager setup]({{base_path}}/api-security/key-management/third-party-key-managers/configure-wso2is-connector/) , you need to make changes in both WSO2 IS and WSO2 API Manager.
4141

4242

en/docs/api-security/key-management/tokens/token-expiration.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ Application access tokens have a fixed expiration time, which is set to 60 minut
88
token_validation.app_access_token_validity = 10000
99
```
1010

11-
For more information about changing the default token expiration time, see [Changing the Default Token Expiration Time](../../../consume/manage-application/generate-keys/obtain-access-token/changing-the-default-token-expiration-time/).
11+
For more information about changing the default token expiration time, see [Changing the Default Token Expiration Time]({{base_path}}/api-developer-portal/manage-application/generate-keys/obtain-access-token/changing-the-default-token-expiration-time).
1212

1313
Also take the **time stamp skew** into account when configuring the expiration time. The time stamp skew is used to manage small time gaps in the system clocks of different servers. For example, let's say you have two Key Managers and you generate a token from the first one and authenticate with the other. If the second server's clock runs 300 seconds ahead, you can configure a 300s time stamp skew in the first server. When the first Key Manager generates a token (e.g., with the default life span, which is 3600 seconds), the time stamp skew is deducted from the token's life span. The new life span is 3300 seconds and the first server calls the second server after 3200 seconds.
1414

en/docs/api-security/runtime/authorization/api-authorization.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,4 +4,6 @@ Nowadays, most of the enterprise applications are built with a collection of RES
44

55
- [Fine Grained Access Control Using Scopes]({{base_path}}/api-security/runtime/authorization/oauth2-scopes/fine-grained-access-control-with-oauth-scopes/)
66

7-
- [Fine Grained Access Control Using XACML]({{base_path}}/api-security/runtime/authorization/role-based-access-control-using-xacml/)
7+
- [Fine Grained Access Control Using XACML]({{base_path}}/api-security/runtime/authorization/role-based-access-control-using-xacml/)
8+
9+
- [Fine Grained Access Control Using Application Scopes]({{base_path}}/api-security/runtime/authorization/oauth2-scopes/application-scopes/)

en/docs/api-security/key-management/third-party-key-managers/application-scopes.md renamed to en/docs/api-security/runtime/authorization/oauth2-scopes/application-scopes.md

File renamed without changes.

en/docs/get-started/about-this-release.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -79,7 +79,7 @@ For more information on WSO2 API Manager, see the [overview]({{base_path}}/get-s
7979

8080
Application scopes provide fine-grained control over permissions at the application level, enhancing security and flexibility. These scopes are configured as allowed scopes for specific applications and can only be selected from the subscribed scopes (scopes available from all subscribed APIs).
8181

82-
**[Learn more]({{base_path}}/api-security/key-management/third-party-key-managers/application-scopes/)**
82+
**[Learn more]({{base_path}}/api-security/runtime/authorization/oauth2-scopes/application-scopes/)**
8383

8484
## Improvements
8585

en/mkdocs.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -385,6 +385,7 @@ nav:
385385
- Overview: api-security/runtime/authorization/api-authorization.md
386386
- Role-based Access Control Using XACML: api-security/runtime/authorization/role-based-access-control-using-xacml.md
387387
- Fine Grained Access Control with OAuth Scopes: api-security/runtime/authorization/oauth2-scopes/fine-grained-access-control-with-oauth-scopes.md
388+
- Application Scopes: api-security/runtime/authorization/oauth2-scopes/application-scopes.md
388389
- Scope Whitelisting: api-security/runtime/authorization/oauth2-scopes/scope-whitelisting.md
389390
- API Request Response Schema Validation:
390391
- JSON Schema Validator: api-security/runtime/api-request-response-schema-validation/json-schema-validator.md
@@ -429,7 +430,6 @@ nav:
429430
- Configure a Custom Key Manager: api-security/key-management/third-party-key-managers/configure-custom-connector.md
430431
- Configure the Global Key Manager: api-security/key-management/third-party-key-managers/configure-global-key-manager.md
431432
- Configure the Azure AD as a Key Manager: api-security/key-management/third-party-key-managers/configure-azure-ad-key-manager.md
432-
- Application Scopes: api-security/key-management/third-party-key-managers/application-scopes.md
433433

434434
- API Gateway:
435435
- Universal Gateway:

0 commit comments

Comments
 (0)