Skip to content

Commit c51a3ce

Browse files
committed
fix broken links in api security.
1 parent 056d894 commit c51a3ce

24 files changed

+51
-51
lines changed

en/docs/api-security/design-time/configuring-api-security-audit.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -81,7 +81,7 @@ You need to add the API Token and Collection ID properties inside the configurat
8181
#### Enable Audit API for a single tenant
8282

8383
!!! tip
84-
For more information on creating a tenant, see [Managing Tenants]({{base_path}}/administer/product-administration/multitenancy/introduction-to-multitenancy/).
84+
For more information on creating a tenant, see [Managing Tenants]({{base_path}}/administer/multitenancy/managing-tenants/).
8585

8686
1. Navigate to the Admin Console [https://localhost:9443/admin](https://localhost:9443/admin) and sign in with your tenant credentials.
8787

en/docs/api-security/key-management/applications/provisioning-out-of-band-oauth-clients.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -80,7 +80,7 @@ Follow the instructions below to provision the out-of-band OAuth2 client that yo
8080

8181
5. Create an application.
8282

83-
For more information, see [Create Application]({{base_path}}/consume/manage-application/create-application).
83+
For more information, see [Create Application]({{base_path}}/api-developer-portal/manage-application/create-application).
8484

8585
6. Click on the respective application to view the credential details.
8686

@@ -105,10 +105,10 @@ Now you have successfully mapped an out-of-band OAuth client to an application.
105105

106106
## Step 4 - Invoke an API
107107

108-
1. [Subscribe to an API]({{base_path}}/consume/manage-subscription/subscribe-to-an-api) via this application.
108+
1. [Subscribe to an API]({{base_path}}/api-developer-portal/manage-subscription/subscribe-to-an-api) via this application.
109109

110110
2. Obtain an access token for it.
111111

112-
You cannot obtain an access token from the Developer Portal for the provisioned applications. You need to use the command line (cURL). For more information, see [Obtain Access Token]({{base_path}}/consume/manage-application/generate-keys/obtain-access-token/overview-of-access-tokens).
112+
You cannot obtain an access token from the Developer Portal for the provisioned applications. You need to use the command line (cURL). For more information, see [Obtain Access Token]({{base_path}}/api-developer-portal/manage-application/generate-keys/obtain-access-token/overview-of-access-tokens).
113113

114-
3. [Invoke the API]({{base_path}}/consume/invoke-apis/invoke-apis-using-tools/invoke-an-api-using-the-integrated-api-console).
114+
3. [Invoke the API]({{base_path}}/api-developer-portal/invoke-apis/invoke-apis-using-tools/invoke-an-api-using-the-integrated-api-console).

en/docs/api-security/key-management/authentication/grant-types/client-credentials-grant.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ For a detailed explanation on this grant type, go to the [WSO2 IS documentation]
66

77
## Flow
88

9-
The client can request an access token using only its client credentials with this grant type. It is similar to the [resource owner password credentials grant]({{base_path}}/manage-apis/design/api-security/oauth2/grant-types/password-grant) type, except in this case, only the clients credentials are used to authenticate a request for an access token.
9+
The client can request an access token using only its client credentials with this grant type. It is similar to the [resource owner password credentials grant]({{base_path}}/api-security/key-management/authentication/grant-types/password-grant) type, except in this case, only the client's credentials are used to authenticate a request for an access token.
1010

1111
[![OAuth Client Credentials]({{base_path}}/assets/img/learn/oauth-client-credentials-diagram.png){: style="width:60%"}]({{base_path}}/assets/img/learn/oauth-client-credentials-diagram.png)
1212

en/docs/api-security/key-management/authentication/grant-types/jwt-grant.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -114,7 +114,7 @@ Now you have a registered identity provider and as well as a service provider wi
114114

115115
1. Obtain a JWT from the service provider.
116116

117-
Use the following sample cURL command to obtain a JWT from the service provider inside WSO2 IS that we configured in [Step 1](#step-1-obtain-a-jwt-from-an-external-identity-provider). Note that, you can use any `grant_type` when sending the request. For more information, see [OAuth2 Grant Types]({{base_path}}/manage-apis/design/api-security/oauth2/grant-types/overview/).
117+
Use the following sample cURL command to obtain a JWT from the service provider inside WSO2 IS that we configured in [Step 1](#step-1-obtain-a-jwt-from-an-external-identity-provider). Note that, you can use any `grant_type` when sending the request. For more information, see [OAuth2 Grant Types]({{base_path}}/api-security/key-management/authentication/grant-types/overview/).
118118

119119
=== "Format"
120120
``` java

en/docs/api-security/key-management/authentication/grant-types/overview.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -5,11 +5,11 @@ In OAuth2, the term **Grant Type** refers to the way for a client application to
55

66
WSO2 API Manager supports following grant types including the basic grant types offered by OAuth2 framework.
77

8-
- [Password Grant]({{base_path}}/manage-apis/design/api-security/oauth2/grant-types/password-grant)
9-
- [Client Credentials Grant]({{base_path}}/manage-apis/design/api-security/oauth2/grant-types/client-credentials-grant)
10-
- [Authorization Code Grant]({{base_path}}/manage-apis/design/api-security/oauth2/grant-types/authorization-code-grant)
11-
- [Refresh Token Grant]({{base_path}}/manage-apis/design/api-security/oauth2/grant-types/refresh-token-grant)
12-
- [JWT Grant]({{base_path}}/manage-apis/design/api-security/oauth2/grant-types/jwt-grant)
13-
- [SAML Extension Grant]({{base_path}}/manage-apis/design/api-security/oauth2/grant-types/saml-extension-grant)
14-
- [Kerberos OAuth2 Grant]({{base_path}}/manage-apis/design/api-security/oauth2/grant-types/kerberos-oauth2-grant)
15-
- [NTLM Grant]({{base_path}}/manage-apis/design/api-security/oauth2/grant-types/ntlm-grant)
8+
- [Password Grant]({{base_path}}/api-security/key-management/authentication/grant-types/password-grant)
9+
- [Client Credentials Grant]({{base_path}}/api-security/key-management/authentication/grant-types/client-credentials-grant)
10+
- [Authorization Code Grant]({{base_path}}/api-security/key-management/authentication/grant-types/authorization-code-grant)
11+
- [Refresh Token Grant]({{base_path}}/api-security/key-management/authentication/grant-types/refresh-token-grant)
12+
- [JWT Grant]({{base_path}}/api-security/key-management/authentication/grant-types/jwt-grant)
13+
- [SAML Extension Grant]({{base_path}}/api-security/key-management/authentication/grant-types/saml-extension-grant)
14+
- [Kerberos OAuth2 Grant]({{base_path}}/api-security/key-management/authentication/grant-types/kerberos-oauth2-grant)
15+
- [NTLM Grant]({{base_path}}/api-security/key-management/authentication/grant-types/ntlm-grant)

en/docs/api-security/key-management/authentication/grant-types/password-grant.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ The diagram below illustrates the resource owner password credentials grant flow
1616

1717
- A valid user account in the API Developer Portal. You can self sign up if it is [enabled by an admin]({{base_path}}/reference/customize-product/customizations/customizing-the-developer-portal/enabling-or-disabling-self-signup/).
1818
- A valid consumer key and consumer secret pair. Initially, these keys must be generated through the API Developer Portal by clicking **GENERATE KEYS** on the **Production Keys** tab of the application.
19-
- A running API Gateway instance (typically an API Manager instance should be running). For instructions on API Gateway, see [Components]({{base_path}}/getting-started/basic-architecture/#api-gateway).
19+
- A running API Gateway instance (typically an API Manager instance should be running). For instructions on API Gateway, see [Components]({{base_path}}/get-started/key-concepts/).
2020

2121
- If the Key Manager is on a different server than the API Gateway, change the server URL (host and ports) of the Key Manager accordingly by adding following configuration in `<APIM_HOME>/repository/conf/deployment.toml` file.
2222

en/docs/api-security/key-management/authentication/grant-types/saml-extension-grant.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -54,7 +54,7 @@ A sequence diagram explaining the above flow would be as follows:
5454
[apim.key_manager]
5555
configuration.ServerURL = "<key-manager-server-url>"
5656
```
57-
- A valid SAML2 assertion. For instructions on how to configure WSO2 API Manager with SAML2, see [Configuring API Manager for SSO]({{base_path}}/develop/extending-api-manager/saml2-sso/configuring-single-sign-on-with-saml2/)
57+
- A valid SAML2 assertion. For instructions on how to configure WSO2 API Manager with SAML2, see [Configuring API Manager for SSO]({{base_path}}/reference/customize-product/extending-api-manager/saml2-sso/configuring-single-sign-on-with-saml2/)
5858

5959

6060
In this example, **WSO2 Identity Server 5.7.0** is used as the IdP to get a SAML token and the API Manager is used as the OAuth server.

en/docs/api-security/key-management/identity/obtaining-user-profile-information-with-openid-connect.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ The following two options are available to obtain the actual user information.
1313

1414
Follow the instructions below to obtain user profile information with OpenID connect with WSO2 API Manager.
1515

16-
1. Obtain a token using password grant type and `openid` scope. For more information on token generation with password grant type, see [Password Grant Type]({{base_path}}/manage-apis/design/api-security/oauth2/grant-types/password-grant/). The format of the curl command and a sample is given below :
16+
1. Obtain a token using password grant type and `openid` scope. For more information on token generation with password grant type, see [Password Grant Type]({{base_path}}/api-security/key-management/authentication/grant-types/password-grant/). The format of the curl command and a sample is given below :
1717

1818
=== "Format"
1919
``` bash

en/docs/api-security/key-management/third-party-key-managers/configure-custom-connector.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -484,4 +484,4 @@ When registering a third-party Identity Provider as a Key Manager in the Admin P
484484
!!! tip
485485
If you want to generate the tokens with scopes, make sure that those scopes are defined in the Authorization Server.
486486

487-
6. You can now use the generated token to [invoke an API]({{base_path}}/consume/invoke-apis/invoke-apis-using-tools/invoke-apis-using-tools/invoke-an-api-using-the-integrated-api-console).
487+
6. You can now use the generated token to [invoke an API]({{base_path}}/api-developer-portal/invoke-apis/invoke-apis-using-tools/invoke-an-api-using-the-integrated-api-console).

en/docs/api-security/key-management/third-party-key-managers/configure-global-key-manager.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ Follow the steps given below to configure the Global Key Manager
2323

2424
[![Add Global Key Manager]({{base_path}}/assets/img/administer/global-keymanager/add-global-key-manager.png)]({{base_path}}/assets/img/administer/global-keymanager/add-global-key-manager.png)
2525

26-
6. Add the Global Key Manager configurations. Refer to the [configurations]({{base_path}}/administer/key-managers/overview/#configuring-key-managers-with-wso2-api-m) of the key manager that needs to be added as the global key manager
26+
6. Add the Global Key Manager configurations. Refer to the [configurations]({{base_path}}/api-security/key-management/third-party-key-managers/overview/#configuring-key-managers-with-wso2-api-m) of the key manager that needs to be added as the global key manager
2727

2828
[![Add Global Key Manager Configurations]({{base_path}}/assets/img/administer/global-keymanager/add-global-key-manager-configurations.png)]({{base_path}}/assets/img/administer/global-keymanager/add-global-key-manager-configurations.png)
2929

@@ -66,7 +66,7 @@ Let's look at a scenario where a single access token generated for an applicatio
6666

6767
5. Sign in to the WSO2 API Publisher (`https://<hostname>:9443/publisher`) using the super tenant’s admin credentials
6868

69-
6. [Create an API]({{base_path}}/manage-apis/design/create-api/create-rest-api/create-a-rest-api/) (Eg: SampleAPI)
69+
6. [Create an API]({{base_path}}/api-design-manage/design/create-api/create-rest-api/create-a-rest-api/) (Eg: SampleAPI)
7070

7171
[![Sample API Creation]({{base_path}}/assets/img/administer/global-keymanager/sample-api-creation.png)]({{base_path}}/assets/img/administer/global-keymanager/sample-api-creation.png)
7272

@@ -77,13 +77,13 @@ Let's look at a scenario where a single access token generated for an applicatio
7777

7878
[![Relationship between the API's visibility and subscription availability]({{base_path}}/assets/img/learn/api-subscription-availability.png)]({{base_path}}/assets/img/learn/api-subscription-availability.png)
7979

80-
8. [Deploy the API]({{base_path}}/manage-apis/deploy-and-publish/deploy-on-gateway/deploy-api/deploy-an-api/)
80+
8. [Deploy the API]({{base_path}}/api-design-manage/deploy-and-publish/deploy-on-gateway/deploy-api/deploy-an-api/)
8181

8282
9. Sign in to the WSO2 API Publisher (`https://<hostname>:9443/publisher`) using the new tenant’s (abc.com) admin credentials and repeat Steps 5 - 7
8383

8484
10. Sign in to the super tenant's Developer Portal using the super tenant’s admin credentials (`https://<hostname>:9443/devportal`)
8585

86-
11. [Create an application]({{base_path}}/consume/manage-application/create-application/) (Ex: SampleApp)
86+
11. [Create an application]({{base_path}}/api-developer-portal/manage-application/create-application/) (Ex: SampleApp)
8787

8888
[![Sample App Creation]({{base_path}}/assets/img/administer/global-keymanager/sample-app-creation.png)]({{base_path}}/assets/img/administer/global-keymanager/sample-app-creation.png)
8989

@@ -95,11 +95,11 @@ Let's look at a scenario where a single access token generated for an applicatio
9595

9696
14. Click **GENERATE ACCESS TOKEN** to generate an application access token. Make sure to copy the generated JWT access token that appears so that you can use it in the future.
9797

98-
15. Go to the Developer Portal landing page, select the SampleAPI and [Subscribe]({{base_path}}/consume/manage-subscription/subscribe-to-an-api/#subscribe-to-an-existing-application) to the SampleApp
98+
15. Go to the Developer Portal landing page, select the SampleAPI and [Subscribe]({{base_path}}/api-developer-portal/manage-subscription/subscribe-to-an-api/#subscribe-to-an-existing-application) to the SampleApp
9999

100100
[![Subscribe SampleAPI to SampleApp]({{base_path}}/assets/img/administer/global-keymanager/subscribe-sample-api-to-sample-app.png)]({{base_path}}/assets/img/administer/global-keymanager/subscribe-sample-api-to-sample-app.png)
101101

102-
16. [Try Out the API]({{base_path}}/consume/invoke-apis/invoke-apis-using-tools/invoke-an-api-using-the-integrated-api-console/) with the access token generated using the Global Key Manager
102+
16. [Try Out the API]({{base_path}}/api-developer-portal/invoke-apis/invoke-apis-using-tools/invoke-an-api-using-the-integrated-api-console/) with the access token generated using the Global Key Manager
103103

104104
A Successful response indicates that an API of the super tenant can be invoked using an access token generated for an application using the Global Key Manager.
105105

0 commit comments

Comments
 (0)