tyk_analytics.conf
and make sure that a proper oauth_redirect_uri_separator
parameter is set. You can use the following value:
.well-known/openid-configuration
endpoint of your OpenID Connect Provider metadata. Typically found as "jwks_uri"
. Please see the spec https://openid.net/specs/openid-connect-discovery-1_0.html#ProviderConfigurationResponse for further information."client_id"
and for Policy Field Name use "pol"
.
Click “Save” and switch to the “Policies” button under “System Management”. Once in this section, click on “Create a Policy” and call it “Gluu Policy”. Use the default values for this one. Remember to select the previously created “Gluu API” in the access rights section. You will also need to set an expiration setting for the keys.
After the policy is ready, switch back to the API settings and make sure that the API is using the appropriate policy:
https://gluu-server/
Client Registration Endpoint: OpenID Connect client registration endpoint. The value we use is https://gluu-server/oxauth/restv1/register
This value is found in your well-known discovery document as registration_endpoint
. The well-known location URL is typically https://gluu-server/.well-known/openid-configuration
(replace “gluu-server” with your hostname).
Initial Registration Access Token: the token that’s used to register new clients, this was generated in the early steps of the guide.
"token_endpoint"
.
For this example use the following: https://gluu-server/oxauth/restv1/token
Your Postman request should contain the following body, where "client_id"
and "client_secret"
are the values you got from the developer portal:
"access_token"
and use it to access your “Gluu API”, this request will be proxied by Tyk: