Skip to content

pingInboundAuthorisation ​

Assumes the user exists and is sync'ed to LDAP.

Returns an OAuth 2.0 access token that can be used to:

  1. Login to SAM to retrieve a SAM auth token.
  2. Obtain an OpenToken for use with Outbound SSO (SAML and hopefully OIDC).

Request ​

http
POST /as/token.authorize

Parameters ​

ParameterTypeRequiredDescription
grant_typeStringYesThe OAuth grant type. Hard-code to password for username/password check against LDAP.
scopeStringYesThe scope of the OAuth grant. Hard-code to sso.
client_idStringYesThe name of the client for user authentication from client app. Returned by getLoginScheme API.
client_secretStringYesThe secret of the client for user authentication from client app. Returned by getLoginScheme API.
usernameStringYesUser's email address e.g. test.outbound.auth.int@yopmail.com
passwordStringYesUser's password e.g. Pa55word

Response ​

200 OK ​

SAMPLE RESPONSE

json
{
  "access_token": "eyJhbGciOiJSUzI1NiIsImtpZCI6ImsxIn0.eyJzY29wZSI6WyJzc28iXSwiY2xpZW50X2lkX25hbWUiOiJhcHBfY2xpZW50IiwiYWdpZCI6InJJTm9HNmVjSkly....G1CHBO2JD6g",
  "refresh_token": "R3UIEY7U1IcUVooSMR4DIWY5BKwkecNgK3t7L3Exq4",
  "token_type": "Bearer",
  "expires_in": 7199
}

Errors ​

ExceptionDescription
Aaron TODOSee Error Definitions

Example cURL ​

bash
curl -s -k -X POST "https://test-idp.interact.technology:9031/as/token.oauth2" \
 -d "grant_type=password&scope=sso&client_id=app_client&client_secret=6ELZDjXilGEYg8w9Np8oOiVS85RGx6L0D2zx2qb4njssW5ig3FKretR7QDJl1iBE&username=test.outbound.auth.int@yopmail.com&password=Pa55word"