This document describes how developers configure secrets with scopes and validity for client authentication.
You can use a client ID and a secret to authenticate when REST API calls (Invitation REST API, User management REST API, Password Service Rest API, and Forgot Password REST API) to the tenant of Identity Authentication are used. The client ID and secret can also be used in the OpenID Connect scenarios of Identity Authentication.
The client ID is in the universally unique identifier (UUID) format. For example, 1ab7c243-5de5-4530-8g14-1234h26373ab
.
The User ID and a password (secret) to authenticate the client (relying party) in the OpenID Connect scenario must be encoded using the "application/x-www-form-urlencoded" encoding algorithm.
-
Access the tenant's administration console for Identity Authentication by using the console's URL.
The URL has the following pattern:
https://<tenant ID>.accounts.ondemand.com/admin
Tenant ID is an automatically generated ID by the system. The first administrator created for the tenant receives an activation e-mail with a URL in it. This URL contains the tenant ID. For more information about your tenants, see Viewing Assigned Tenants and Administrators.
If you have a configured custom domain, the URL has the following pattern:
<your custom domain>/admin
. -
Under Applications and Resources, choose the Applications tile.
-
Choose the application that you want to edit.
Type the name of the application in the search field to filter the list items, or choose the application from the list on the left.
If you don’t have a created application in your list, you can create one. For more information, see Create a New Application.
-
Choose the Trust tab.
-
Under Application APIs, choose Client Authentication.
You can see the Client ID generated for the chosen application.
-
Choose the Add button in the Secrets section.
-
Provide the required info in the pop up.
Description
This field is optional.
Expire in
You can choose from three options:
- 1 year
- 2 years
- Never
Scope
- Application - Secrets with Application scope are used to update the Application configurations.
- Application Users - select this option to generate a secret to authenticate when REST API calls (Invitation REST API, User management REST API, Password Service Rest API, and Forgot Service REST API) are used.
- OpenID - select this option to generate a secret to authenticate in the OpenID Connect scenario.
By default all options are selected. Your secret can be used for all scopes.
-
Save your configuration.
A pop up with the generated credentials appears. Make sure that you save the client secret for the client ID. You will need it for the API authentication, but you will not be able to retrieve it from the system later.
Once your secret is generated you can see a table with your secrets and information about them. You can generate up to 20 client secrets per application.
Related Information
Configure Certificates for API Authentication