no-authentication
.
tyk_analytics.conf
and make sure that a proper oauth_redirect_uri_separator
parameter is set. This sets the character that separates multiple redirect uri’s to ;
.
tyk_analytics.conf
, remember to restart the service to apply the change.
dcr
scope in order to authenticate the DCR endpoint. A workaround is to configure the DCR endpoint to use no-authentication. A proxy API can be configured in such a way that Tyk will proxy the DCR request to the Curity Identity Server and a static token used to authenticate the DCR proxy API.
no-authentication
should only be accessible by Tyk.dcr
. Make sure the API Listen Path is set to /dcr/
.
Set the Target URL to the DCR endpoint of the Curity Identity Server (Ex. https://idsvr.example.com/token-service/oauth-registration).
In the Authentication section, set Authentication Mode to Authentication Token
.
curity-api
:
facade-oauth-registration
.
Set the Target URL to http://httpbin.org
.path
and Target URL
for this API doesn’t matter and will never be used.JSON Web Token (JWT)
..well-known/openid-configuration
endpoint as it’s a required value. The below cURL command can get the "jwks_uri"
value directly.facade-oauth-registration
) from the list. Then switch to the Configurations tab. Name the policy facade-policy
. Select an expiry and click Create Policy
.Navigate back to System Management → APIs, click facade-oauth-registration
, scroll down to the Authentication section and select the newly created policy in the Default Policy setting. Click Update
to save the changes.Add Key
. Switch to the Choose API
tab. Select the previously created DCR
API. Under 2. Configurations
give the key an alias and set an expiry. Then click Create Key
.Key Hash
and Key ID
as they will be needed later.OAuth Facade API
and select the facade-policy
.Override global settings
. Then scroll down to the Dynamic Client Registration for portal APIs section and toggle the switch to enable. Configure as pictured below:Config parameter | Description | Value |
---|---|---|
Providers | The IDP vendor | Other |
Grant Types | What grant types the DCR client will support | Client Credentials and/or Authorization Code |
Token Endpoint Auth Method | How the client authenticates against the IDPs token endpoint | Client Secret - Post |
Response Types | OAuth 2.0 response types that will be used by the client. | Token and/or Authorization Code |
Identity Provider Host | The Base URL of the IDP | Ex. https://idsvr.example.com |
Client Registration Endpoint | The proxy DCR endpoint created previously | Ex. https://tyk-gateway/dcr/ |
Initial Registration Access Token | Token to authenticate the DCR endpoint | Add the DCR Key ID created in previous step |
http://<host>:3000/portal
) and open the OAuth clients page. Start the wizard by clicking Create first Oauth Client.;
), then click Create.https://oauth.tools/callback/code
and the App version of OAuth.tools requires app://oauth.tools/callback/code
.