Optional
. Default scopes are applied automatically, while optional scopes can be requested by clients on a case-by-case basis to extend the permissions granted by the user. In recent versions of Keycloak this should appear as a dropdown menu option, as shown in the images above. In older releases of Keycloak this may need to be set explicitly in a separate tab, as show on the image below.APIs
menu in the Tyk Dashboard:
Policies
menu in the Tyk Dashboard:
Add API Access Rights
section:
Public key
and pol
fields blank, they will be filled automatically by the Enterprise portal.
Scope name
field (the default value is “scope”).
Claim field
and select the product policy.
Claim field
and select the plan policy, then save the API.
OAuth2.0 Providers
menu section. In that section, you need to configure the connection settings to the IdP and define one or more types (configurations) of OAuth 2.0 clients. For instance, you can define two types of OAuth 2.0 clients:
Identity provider
dropdown list. Different IdPs have slightly different approaches to DCR implementation, so the portal will use a driver that is specific to your IdP. If your IdP is not present in the dropdown list, select the Other
option. In that case, the portal will use the most standard implementation of the DCR driver, which implements the DCR flow as defined in the RFC.
Then you need to specify the connection settings: the initial access token and the well-known endpoint. If your Identity Provider uses certificates that are not trusted, the portal will not work with it by default. To bypass certificate verification, you can select the SSL secure skip verify
checkbox.
The below example demonstrates how to achieve that with Keycloak and Okta in the tabs below.
Client Types
section and click on the Add client type
button.
To configure a client type, you need to specify the following settings:
SAVE CHANGES
button.
API Products
menu and select the particular API product you want to use for the DCR flow. Next, go to the ‘App registration configs’ section and enable the ‘Enable dynamic client registration’ checkbox.
After that, specify the scope for this API product. You should have at least one scope that was created in the Prerequisites for getting started. If you need to specify more than one scope, you can separate them with spaces.
Finally, select one or multiple types of clients that were created in the Create client configurations section of this guide to associate them with that product.
Dynamic Client Registration
tab in the product’s view. Scope to policy mapping for the selected API/s will be automatically configured using the scope defined in the Scopes
field.Plans
menu section and specify the OAuth2.0 scope to use with each plan. You should have at least one scope that was created in the Prerequisites for getting started. If you need to specify more than one scope, you can separate them with spaces.
Advanced settings (optional)
colapsible section in the plan’s view. Scope to policy mapping for the plan will be automatically configured using the scope defined in the Scopes
field.Redirect URLs
field. If you have multiple redirect URI, you can separate them with commas.Select a client type
section.Submit request
button.Access requests
menu in the portal, select the access request and approve it by clicking on the Approve
button.
My Dashboard
section in the developer portal, select the application, and copy the OAuth 2.0 credentials.
curl
:
{client_id}:{client_secret}
.
As a result, you should receive a JWT access token containing the required scopes: