You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: en/docs/api-security/design-time/configuring-api-security-audit.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -81,7 +81,7 @@ You need to add the API Token and Collection ID properties inside the configurat
81
81
#### Enable Audit API for a single tenant
82
82
83
83
!!! tip
84
-
For more information on creating a tenant, see [Managing Tenants]({{base_path}}/administer/product-administration/multitenancy/introduction-to-multitenancy/).
84
+
For more information on creating a tenant, see [Managing Tenants]({{base_path}}/administer/multitenancy/managing-tenants/).
85
85
86
86
1. Navigate to the Admin Console [https://localhost:9443/admin](https://localhost:9443/admin) and sign in with your tenant credentials.
Copy file name to clipboardExpand all lines: en/docs/api-security/key-management/applications/provisioning-out-of-band-oauth-clients.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -80,7 +80,7 @@ Follow the instructions below to provision the out-of-band OAuth2 client that yo
80
80
81
81
5. Create an application.
82
82
83
-
For more information, see [Create Application]({{base_path}}/consume/manage-application/create-application).
83
+
For more information, see [Create Application]({{base_path}}/api-developer-portal/manage-application/create-application).
84
84
85
85
6. Click on the respective application to view the credential details.
86
86
@@ -105,10 +105,10 @@ Now you have successfully mapped an out-of-band OAuth client to an application.
105
105
106
106
## Step 4 - Invoke an API
107
107
108
-
1. [Subscribe to an API]({{base_path}}/consume/manage-subscription/subscribe-to-an-api) via this application.
108
+
1. [Subscribe to an API]({{base_path}}/api-developer-portal/manage-subscription/subscribe-to-an-api) via this application.
109
109
110
110
2. Obtain an access token for it.
111
111
112
-
You cannot obtain an access token from the Developer Portal for the provisioned applications. You need to use the command line (cURL). For more information, see [Obtain Access Token]({{base_path}}/consume/manage-application/generate-keys/obtain-access-token/overview-of-access-tokens).
112
+
You cannot obtain an access token from the Developer Portal for the provisioned applications. You need to use the command line (cURL). For more information, see [Obtain Access Token]({{base_path}}/api-developer-portal/manage-application/generate-keys/obtain-access-token/overview-of-access-tokens).
113
113
114
-
3. [Invoke the API]({{base_path}}/consume/invoke-apis/invoke-apis-using-tools/invoke-an-api-using-the-integrated-api-console).
114
+
3. [Invoke the API]({{base_path}}/api-developer-portal/invoke-apis/invoke-apis-using-tools/invoke-an-api-using-the-integrated-api-console).
Copy file name to clipboardExpand all lines: en/docs/api-security/key-management/authentication/grant-types/client-credentials-grant.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ For a detailed explanation on this grant type, go to the [WSO2 IS documentation]
6
6
7
7
## Flow
8
8
9
-
The client can request an access token using only its client credentials with this grant type. It is similar to the [resource owner password credentials grant]({{base_path}}/manage-apis/design/api-security/oauth2/grant-types/password-grant) type, except in this case, only the client’s credentials are used to authenticate a request for an access token.
9
+
The client can request an access token using only its client credentials with this grant type. It is similar to the [resource owner password credentials grant]({{base_path}}/api-security/key-management/authentication/grant-types/password-grant) type, except in this case, only the client's credentials are used to authenticate a request for an access token.
Copy file name to clipboardExpand all lines: en/docs/api-security/key-management/authentication/grant-types/jwt-grant.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -114,7 +114,7 @@ Now you have a registered identity provider and as well as a service provider wi
114
114
115
115
1. Obtain a JWT from the service provider.
116
116
117
-
Use the following sample cURL command to obtain a JWT from the service provider inside WSO2 IS that we configured in [Step 1](#step-1-obtain-a-jwt-from-an-external-identity-provider). Note that, you can use any `grant_type` when sending the request. For more information, see [OAuth2 Grant Types]({{base_path}}/manage-apis/design/api-security/oauth2/grant-types/overview/).
117
+
Use the following sample cURL command to obtain a JWT from the service provider inside WSO2 IS that we configured in [Step 1](#step-1-obtain-a-jwt-from-an-external-identity-provider). Note that, you can use any `grant_type` when sending the request. For more information, see [OAuth2 Grant Types]({{base_path}}/api-security/key-management/authentication/grant-types/overview/).
Copy file name to clipboardExpand all lines: en/docs/api-security/key-management/authentication/grant-types/password-grant.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -16,7 +16,7 @@ The diagram below illustrates the resource owner password credentials grant flow
16
16
17
17
- A valid user account in the API Developer Portal. You can self sign up if it is [enabled by an admin]({{base_path}}/reference/customize-product/customizations/customizing-the-developer-portal/enabling-or-disabling-self-signup/).
18
18
- A valid consumer key and consumer secret pair. Initially, these keys must be generated through the API Developer Portal by clicking **GENERATE KEYS** on the **Production Keys** tab of the application.
19
-
- A running API Gateway instance (typically an API Manager instance should be running). For instructions on API Gateway, see [Components]({{base_path}}/getting-started/basic-architecture/#api-gateway).
19
+
- A running API Gateway instance (typically an API Manager instance should be running). For instructions on API Gateway, see [Components]({{base_path}}/get-started/key-concepts/).
20
20
21
21
- If the Key Manager is on a different server than the API Gateway, change the server URL (host and ports) of the Key Manager accordingly by adding following configuration in `<APIM_HOME>/repository/conf/deployment.toml` file.
- Avalid SAML2 assertion. For instructions on how to configure WSO2 API Manager with SAML2, see [Configuring API Manager for SSO]({{base_path}}/develop/extending-api-manager/saml2-sso/configuring-single-sign-on-with-saml2/)
57
+
- Avalid SAML2 assertion. For instructions on how to configure WSO2 API Manager with SAML2, see [Configuring API Manager for SSO]({{base_path}}/reference/customize-product/extending-api-manager/saml2-sso/configuring-single-sign-on-with-saml2/)
58
58
59
59
60
60
In this example, **WSO2 Identity Server 5.7.0** is used as the IdP to get a SAML token and the API Manager is used as the OAuth server.
Copy file name to clipboardExpand all lines: en/docs/api-security/key-management/identity/obtaining-user-profile-information-with-openid-connect.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -13,7 +13,7 @@ The following two options are available to obtain the actual user information.
13
13
14
14
Follow the instructions below to obtain user profile information with OpenID connect with WSO2 API Manager.
15
15
16
-
1. Obtain a token using password grant type and `openid` scope. For more information on token generation with password grant type, see [Password Grant Type]({{base_path}}/manage-apis/design/api-security/oauth2/grant-types/password-grant/). The format of thecurlcommand and a sample is given below :
16
+
1. Obtain a token using password grant type and `openid` scope. For more information on token generation with password grant type, see [Password Grant Type]({{base_path}}/api-security/key-management/authentication/grant-types/password-grant/). The format of thecurlcommand and a sample is given below :
Copy file name to clipboardExpand all lines: en/docs/api-security/key-management/third-party-key-managers/configure-custom-connector.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -484,4 +484,4 @@ When registering a third-party Identity Provider as a Key Manager in the Admin P
484
484
!!! tip
485
485
If you want to generate the tokens with scopes, make sure that those scopes are defined in the Authorization Server.
486
486
487
-
6. You can now use the generated token to [invoke an API]({{base_path}}/consume/invoke-apis/invoke-apis-using-tools/invoke-apis-using-tools/invoke-an-api-using-the-integrated-api-console).
487
+
6. You can now use the generated token to [invoke an API]({{base_path}}/api-developer-portal/invoke-apis/invoke-apis-using-tools/invoke-an-api-using-the-integrated-api-console).
Copy file name to clipboardExpand all lines: en/docs/api-security/key-management/third-party-key-managers/configure-global-key-manager.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -23,7 +23,7 @@ Follow the steps given below to configure the Global Key Manager
23
23
24
24
[]({{base_path}}/assets/img/administer/global-keymanager/add-global-key-manager.png)
25
25
26
-
6. Add the Global Key Manager configurations. Refer to the [configurations]({{base_path}}/administer/key-managers/overview/#configuring-key-managers-with-wso2-api-m) of the key manager that needs to be added as the global key manager
26
+
6. Add the Global Key Manager configurations. Refer to the [configurations]({{base_path}}/api-security/key-management/third-party-key-managers/overview/#configuring-key-managers-with-wso2-api-m) of the key manager that needs to be added as the global key manager
27
27
28
28
[]({{base_path}}/assets/img/administer/global-keymanager/add-global-key-manager-configurations.png)
29
29
@@ -66,7 +66,7 @@ Let's look at a scenario where a single access token generated for an applicatio
66
66
67
67
5. Sign in to the WSO2 API Publisher (`https://<hostname>:9443/publisher`) using the super tenant’s admin credentials
68
68
69
-
6. [Create an API]({{base_path}}/manage-apis/design/create-api/create-rest-api/create-a-rest-api/) (Eg: SampleAPI)
69
+
6. [Create an API]({{base_path}}/api-design-manage/design/create-api/create-rest-api/create-a-rest-api/) (Eg: SampleAPI)
70
70
71
71
[]({{base_path}}/assets/img/administer/global-keymanager/sample-api-creation.png)
72
72
@@ -77,13 +77,13 @@ Let's look at a scenario where a single access token generated for an applicatio
77
77
78
78
[]({{base_path}}/assets/img/learn/api-subscription-availability.png)
79
79
80
-
8. [Deploy the API]({{base_path}}/manage-apis/deploy-and-publish/deploy-on-gateway/deploy-api/deploy-an-api/)
80
+
8. [Deploy the API]({{base_path}}/api-design-manage/deploy-and-publish/deploy-on-gateway/deploy-api/deploy-an-api/)
81
81
82
82
9. Sign in to the WSO2 API Publisher (`https://<hostname>:9443/publisher`) using the new tenant’s (abc.com) admin credentials and repeat Steps 5 - 7
83
83
84
84
10. Sign in to the super tenant's Developer Portal using the super tenant’s admin credentials (`https://<hostname>:9443/devportal`)
85
85
86
-
11. [Create an application]({{base_path}}/consume/manage-application/create-application/) (Ex: SampleApp)
86
+
11. [Create an application]({{base_path}}/api-developer-portal/manage-application/create-application/) (Ex: SampleApp)
@@ -95,11 +95,11 @@ Let's look at a scenario where a single access token generated for an applicatio
95
95
96
96
14. Click **GENERATE ACCESS TOKEN** to generate an application access token. Make sure to copy the generated JWT access token that appears so that you can use it in the future.
97
97
98
-
15. Go to the Developer Portal landing page, select the SampleAPI and [Subscribe]({{base_path}}/consume/manage-subscription/subscribe-to-an-api/#subscribe-to-an-existing-application) to the SampleApp
98
+
15. Go to the Developer Portal landing page, select the SampleAPI and [Subscribe]({{base_path}}/api-developer-portal/manage-subscription/subscribe-to-an-api/#subscribe-to-an-existing-application) to the SampleApp
99
99
100
100
[]({{base_path}}/assets/img/administer/global-keymanager/subscribe-sample-api-to-sample-app.png)
101
101
102
-
16. [Try Out the API]({{base_path}}/consume/invoke-apis/invoke-apis-using-tools/invoke-an-api-using-the-integrated-api-console/) with the access token generated using the Global Key Manager
102
+
16. [Try Out the API]({{base_path}}/api-developer-portal/invoke-apis/invoke-apis-using-tools/invoke-an-api-using-the-integrated-api-console/) with the access token generated using the Global Key Manager
103
103
104
104
A Successful response indicates that an API of the super tenant can be invoked using an access token generated for an application using the Global Key Manager.
0 commit comments