Show PingOne Authorize App Permissions in Token
Number of APIs: 22
This activity shows you how to create a custom resource and how to use PingOne Authorize endpoints to create application roles and permissions to associate with the custom resource. The custom resource configuration includes a setting to show application permissions as a claim in the access token.
The following operations are supported by the PingOne APIs:
- Create an application
- Create a custom resource
- Create PingOne Authorize application resources, roles, and permissions
- Create a sign-on policy
- Create login sign-on policy action
- Create a user
- Initiate an authorize request
- Use flow APIs to complete the login actions
- Use the token request to get an access token for the custom resource
- Use the token introspection endpoint to show application permissions in the access token
Prerequisites
You must have the
PING_ONE_AUTHORIZEcapability in the Bill of Materials (BOM) for your environment to run the PingOne Authorize requests to create application resources, application roles, and application permissions.Get an access token from the worker application you created in Getting Started with the PingOne APIs. If you prefer to get a token from a different worker application in an alternate sandbox environment, run the token request endpoint using the client ID and client secret of your chosen worker app to authenticate the request. See GET a Worker Application Access Token.
Workflow order of operations
To get an access token for the custom resource, the following tasks must be completed successfully:
Make a
POSTrequest to/environments/{{envID}}/applicationsto add a new application to the specified environment.Make a
GETrequest to/environments/{{envID}}/applications/{{appID}}/secretto return the new application'ssecretattribute, which is needed for the token request.Make a
POSTrequest to/environments/{{envID}}/resourcesto define the custom resource.Make a
POSTrequest to/environments/{{envID}}/resources/{{resourceID}}/scopesto define a scope for the custom resource.Make a
POSTrequest to/environments/{{envID}}/applications/{{appID}}/grantsto create a new resource access grant for the application.Make a
POSTrequest to/environments/{{envID}}/resources/{{customResourceID}}/applicationResourcesto create the application resource.Make a
POSTrequest to/environments/{{envID}}/applicationResources/{{appResourceID}}/permissionsto create the application resource permission.Make a
POSTrequest to/environments/{{envID}}/applicationRolesto create an application role.Make a
POSTrequest to/environments/{{envID}}/applicationRoles/{{appRoleID}}/permissionsto assign an application resource permission to the specified role.Make a
POSTrequest to/environments/{{envID}}/signOnPoliciesto create a new sign-on policy.Make a
POSTrequest to/environments/{{envID}}/signOnPolicies/{{signOnPolicyID}}/actionsto define the login action associated with this sign-on policy.Make a
POSTrequest to/environments/{{envID}}/applications/{{appID}}/signOnPolicyAssignmentsto associate the sign-on policy with the application.Make a
POSTrequest to/environments/{{envID}}/populationsto create a new population.Make a
POSTrequest to/environments/{{envID}}/usersto create a user who will be assigned to the new population.Make a
POSTrequest to/environments/{{envID}}/users/{{userID}}/passwordto set the new user's password.Make a
POSTrequest to/environments/{{envID}}/users/{{customResourceUserID}}/applicationRolesto assign the application role to a user.Make a
GETrequest to/{{envID}}/as/authorizeto obtain an authorization grant. This request starts the authorization flow.Make a
GETrequest to/{{envID}}/flows/{{flowID}}to initiate the sign-on flow.To complete the login action, make a
POSTrequest toGET /{{envID}}/flows/{{flowID}}and provide the user's login credentials.Make a
GETrequest to/{{envID}}/as/resume?flowId={{flowID}}to call the resume endpoint and return the auth code.Make a
POSTrequest to/{{envID}}/as/tokento exchange the auth code for an access token.To verify that the token includes the application permissions, make a
POSTrequest toGET /{{envID}}/as/introspectto view the application permission claim in the token.
-
Step 10: Create a sign-on policy POST {{apiPath}}/environments/{{envID}}/signOnPolicies
-
Step 2: Get the application secret GET {{apiPath}}/environments/{{envID}}/applications/{{customResourceAppID}}/secret
-
Step 20: Call the resume endpoint GET {{authPath}}/{{envID}}/as/resume?flowId={{flowID}}
-
Step 8: Create an application role POST {{apiPath}}/environments/{{envID}}/applicationRoles
-
Step 11: Create the login sign-on policy action POST {{apiPath}}/environments/{{envID}}/signOnPolicies/{{customResourcePolicyID}}/actions
-
Step 12: Assign the sign-on policy to the web application POST {{apiPath}}/environments/{{envID}}/applications/{{customResourceAppID}}/signOnPolicyAssignments
-
Step 13: Create a population POST {{apiPath}}/environments/{{envID}}/populations
-
Step 14: Create a user POST {{apiPath}}/environments/{{envID}}/users
-
Step 6: Create an application resource POST {{apiPath}}/environments/{{envID}}/resources/{{customResourceID}}/applicationResources
-
Step 1: Create a web application POST {{apiPath}}/environments/{{envID}}/applications