TOC's from many pages

By ErichSteinboeckErichSteinboeck

Description

Here's a half-baked solution for discussion thread “TOC's from many pages displayed on one?

Although this allows you to pull in the TOC's, they aren't linking to their respective pages (but to the current page instead) and fold/unfold only works for the first TOC.

Code

[[module ListPages category="code" limit="9" order="pageEditedDesc"]]
[[table]][[row]]
[[cell]][[[%%page_unix_name%%]]][[/cell]][[/row]]
[[row]]
[[cell]]
[[div style="display : none"]]
[[include %%page_unix_name%%]]
[[/div]]
[[toc]]
[[/cell]][[/row]][[/table]]
[[/module]]

In action

best-english-speaking-institute-in-pitampura-delhi

Founded in 1997,

Oxford School of English
https://oxfordschoolofenglish.in/
is one of the most trusted names in English language training in Pitampura and professional skill development. Over the past two decades, it has successfully trained and empowered more than one lakh students, professionals, and aspirants in English communication,

IELTS
https://oxfordschoolofenglish.in/ielts-coaching-near-me.php

, personality development, and career-focused learning. The institute prides itself on combining expert faculty, innovative teaching methods, and practical learning tools to ensure students not only master language skills but also gain the confidence to apply them in real-life situations. Oxford is committed to bridging the gap between academic knowledge and practical communication needs, making its programs highly relevant for career growth, global opportunities, and personal excellence. With a strong foundation in trust, experience, and results,

Oxford School of English

https://oxfordschoolofenglish.in/english-speaking-course-pitampura.php

continues to shape confident communicators, future leaders, and successful professionals across industries. It stands as a symbol of quality education and lasting transformation.

Table of Contents
menu

Description

put description what kind of problem does the solution solve and how

Code

put the code here

In action

link to the implemented solution (on some site?) or put a working example here

Rate this solution

If you think this solution is useful — rate it up! Or dump it otherwise.

scp-676767
rating: +1+x

Item #: SCP-676767

Object Class: Safe

Special Containment Procedures: SCP-676767 should be placed in a solid tungsten cube of 5 by 5 by 5 meters
Description: SCP-676767 is a silver coloured dildo made of an unknown material that resembles metal. SCP-676767 maintains an average temperature of 80 degrees Celsius. Under certain conditions, SCP-676767 can reach temperatures of up to 3200 degrees Celsius; however, the trigger for this temperature change remains unknown. When SCP-676767 heats up, it causes the rest of the room to be the same temperature as itself.

Addendum: SCP-676767 was originally found in an apartment building unit in New York, USA. Local authorities received a call from one of the unit's neighbours about how they haven't heard from the family staying at the unit for about 2 weeks. They had repeatedly tried to contact the family, but to no avail. They had tried entering the unit, but the door was locked, which is why they requested help from the authorities. 2 police officers were dispatched to the scene. Upon entering, they were met with a sudden increase in temperature, causing one of the police officers to perish and heavily injuring the other police officer. It was then that MTF Epsilon-9 "Fire Eaters" intervened, capturing the object and bringing it over to be contained at Site-19. The surviving officer was given amnestics along with the next-door neighbours.

Table of Contents
playwright-automation-training-in-hyderabad

playwright online training + Description

put description what kind of problem does the solution solve and how
"Boost your automation testing career with the Playwright Automation Training in Hyderabad and flexible Playwright Online Training options. Our specialized course empowers you to master Playwright, the modern testing framework for web apps, enabling cross-browser, reliable end-to-end automation. Learn how to write robust scripts in JavaScript, TypeScript, or Python, automate UI testing, handle dynamic elements, generate reports, and integrate Playwright into CI/CD pipelines. Designed by industry experts, the training combines practical, hands-on sessions and real-time projects, ensuring you gain job-ready skills. Whether you’re a fresher entering the world of testing or a seasoned professional looking to upgrade your toolkit, our Playwright Automation Training in Hyderabad and online batches offer personalized mentorship, flexible schedules, and placement assistance. Gain confidence to crack interviews and work on live enterprise projects. Enrol today and elevate your skills with Playwright Online Training and in-person classes for a successful automation career!
"

Code

put the code here

In action

link to the implemented solution on a Wikidot site or put a working example here

Table of Contents
let-s-go

Description

put description what kind of problem does the solution solve and how

Code

put the code here

In action

link to the implemented solution on a Wikidot site or put a working example here

Table of Contents
drmao-166

[[module CSS]] table.wikitable { border-collapse: collapse; } [[/module]]

Included page "component:thaumiel-header" does not exist (create it now)

平行宇宙提示
-start-
'''项目编号:''' SCP-166
'''代号:''' "神性依存者"
'''项目等级:''' Thaumiel
'''修订权限:''' 5/166级(O5-██特批)
-end-

== 特殊收容措施 ==
{| class="wikitable scp-table"
! 措施类别 !! 执行标准
|-
| '''收容单元''' || Site-19神性共生区(单元Φ-166)
|-
| '''环境控制''' ||

  • 仿修道院花园(含白玫瑰丛)
  • 湿度恒定60%±5%
  • 晨昏周期光照系统

|-
| '''隔离要求''' || 与SCP-CN-9961收容区距离≥200m(铅锑合金+现实稳定锚隔离墙)
|}

=== 生理维系协议 ===
1. 营养供给:
* 仅接受SCP-CN-9961提供的"桂花源质"
* 样本经γ射线消杀后机械臂传递
2. 供给周期:每周3次
3. 后续处理:
* SCP-CN-9961进入6小时休眠
* MTF-甲戌-9961提升至一级戒备

=== 亲子互动条款 ===
{| class="wikitable scp-table"
! 要求 !! 执行方案 !! 目的
|-
| 认知滤网激活 || SCP-001佩戴逆模因项圈 || 屏蔽"父亲""诞生"等词汇
|-
| 监护机制 || SCP-2599全程陪同 || 抑制情绪波动
|-
| 空间隔离 || 互动区与SCP-CN-9961单元物理隔绝 || 防止血缘模因共振
|}

== 描述 ==
SCP-166为需持续接触神性实体以维持稳定的女性人形实体。

{| class="wikitable scp-table"
! 特性 !! 表现 !! 关联证明
|-
| '''过敏豁免''' || 仅对SCP-CN-9961体液无过敏反应 || 接触时皮质醇↓72%
|-
| '''现实锚定''' || 玫瑰念珠转化为齿轮玫瑰合金 || 成分与SCP-CN-9961锈蚀同源
|-
| '''跨实体共生''' || 分离时双方同步生理代偿 || 参见实验CN-166-γ
|}

=== 母性本能与风险 ===

  • '''SCP-001纽带:'''
      • 互动时鹿角分泌金色花蜜
      • SCP-001摄入后现实稳定半径扩大至50m
      • SCP-001受伤→触发"荆棘暴走"(事故166-Ψ)
  • '''认知威胁:'''
      • 暗示"剥夺亲子权"→哮喘发作
      • 伴随逆向宗教化现象(墙体浮现倒十字架)

== 附录 ==
=== 事故166-Ψ:强制分离试验 ===

过程: O5-██命令暂停亲子接触30天
时间线:

  • 第7天:收容间退化为17世纪修道院残垣(含SCP-001涂鸦)
  • 第15天:SCP-CN-9961突破收容(损失MTF队员██名)

终结条件: SCP-001紧急送入单元,双方拥抱后异常终止

O5决议
"血缘模因纽带不可切割——试图隔离等于在核弹上玩积木。"
O5决议|签名=O5-██
-start-
'''永久禁止强制分离实验'''
-end-

== 跨项目关联声明 ==
{{Collapsible
|title= 权限4/166级 » 动态平衡体系
|content=

  • 共生三角关系:

{| class="wikitable"
! 节点 !! 依存目标
|-
| SCP-166 || SCP-CN-9961的神性
|-
| SCP-001 || SCP-166的母性
|-
| SCP-CN-9961 || SCP-001的稳定力
|}
FinalWarning
破坏任一节点将触发ZK级神性崩溃情景
FinalWarning
}}

== 脚注 ==
[注] Thaumiel等级依据《异常项目战术应用条例》第3条:对具备逆转K级情景能力且需特殊共生维系的实体适用

FinalWarning
"她既是拴住猛兽的锁链,也是点燃世界的火星——而钥匙正握在那孩子手中。"
―Dr. ███
FinalWarning

== 档案状态 ==

  • 受'''玫瑰-锈蚀协议'''保护
  • 未授权访问将触发SCP-CN-9961惩戒机制

O5批注
"我们以母爱驯化神明,却忘了神的孩子终将觉醒。"
―O5-█
O5批注

Table of Contents
8175

Item #: SCP-8175

Object Class: Euclid

Special Containment Procedures: SCP-8175 is to be contained in a reinforced 5m x 5m x 5m bio-containment enclosure at Site-77, including hybrid flowers and an artificial hive to produce honey. The enclosure must be constructed with double-layered mesh resistant to insect penetration and equipped with a remote pollen and nectar delivery system to eliminate the need for direct human interaction.

Personnel entering SCP-8175’s chamber for research or maintenance must wear a mask to protect against airborne pollen contaminants, full-body protective gear rated against insect stings, and ensure no skin is exposed. In the event of a sting, affected personnel are to be placed under medical observation and, if necessary, transferred to Psychological Acclimatization Unit Gamma-4 for reintegration counseling and optional cosmetic adjustment therapy.

Requests for voluntary exposure to SCP-8175 require approval from at least two Level 4 personnel and a complete psychiatric evaluation.

Description:SCP-8175 is a single instance of an anomalous insect resembling Apis mellifera (Western honey bee), but instead of the typical yellow and black coloration, it has bright pink coloration. SCP-8175 shows no signs of aging, illness, or typical hive behavior, and appears to require no queen or colony support.

When SCP-8175 stings a human subject, the victim undergoes an immediate and permanent biological sex change within approximately 2 to 5 minutes. This transformation includes full chromosomal restructuring (e.g., XX to XY or vice versa), secondary sexual characteristics, hormonal balance, and internal anatomy. In all recorded cases, the subject’s new appearance conforms to a culturally idealized version of physical attractiveness.

stages of Envenomation/ingestion
#Stage 1: Envenomation or Ingestion (0–30 seconds post-exposure): In the event of a sting, the site of envenomation experiences intense localized pain, significantly more severe than that of a non-anomalous bee sting. Subjects report a burning sensation accompanied by rapid swelling and redness.
In cases of SCP-80085-B ingestion, subjects describe the substance as “intensely sweet,” followed by a spreading sensation of numbness throughout the body, typically beginning in the mouth and extremities.
# Stage 2: Systemic Onset (30–60 seconds post-exposure): Symptoms escalate rapidly. Subjects exhibit signs of disorientation, lightheadedness, and a sensation described as “loopy” or euphoric. Heart rate increases markedly.
In sting victims, a spreading burning sensation from the sting site is reported. In ingestion cases, a warmth localizes in the abdomen and digestive tract. Pupils often dilate, and subjects may experience shortness of breath or blurring vision.
# Stage 3: Neuromorphic Transition (60–180 seconds post-exposure): Subjects enter a semi-conscious or fully unconscious state. Electroencephalogram (EEG) scans show irregular activity consistent with an altered dream state or induced dissociation.
During this phase, full anatomical restructuring begins:

  • Skeletal system undergoes rapid reshaping (e.g., bone elongation/shortening)
  • Muscle tissue is redistributed to align with stereotypical secondary sexual traits of the opposite sex the person started as
  • Internal organ systems shift position or are replaced entirely
  • Hair growth, vocal cord reconfiguration, and fat distribution change to match culturally idealized forms of the gender they are becoming

Notably, subjects retain no memory of this transformation period, even under hypnosis or memetic recall testing.
# Stage 4:Stabilization and Awakening (180–300 seconds post-exposure): Transformation completes. The body begins to cool and stabilize physiologically. Subjects regain consciousness gradually, often in a state of emotional overwhelm.
Initial reactions vary, with reports ranging from panic to euphoric crying. Psychological effects emerge shortly after and persist over the following hours to weeks.(Pheromone expression begins during this stage and becomes increasingly pronounced during recovery.)

The process is non-reversible through conventional or anomalous medical means(not even to reexposure to 8175), with the exception of one recorded case involving SCP-████. Any hormonal treatments or surgical interventions performed post-transformation behave as if the individual was born their new sex.

Subjects typically report a brief euphoric state following the transformation, followed by varying degrees of identity confusion, social disorientation, or body image adjustment challenges. Long-term psychological outcomes vary and are monitored by the Foundation, assumed to be un anomalous.

Addendum 8175-A – Discovery Log:SCP-8175 was discovered in [REDACTED], Georgia after local police responded to a disturbance at a bar. A woman claiming to be a 25-year-old man named William Taylor stated she had been stung by a "weird-ass bee" and soon after transformed. Initial Foundation involvement occurred after additional reports surfaced of missing individuals allegedly returning as new people of the opposite sex. The anomaly was traced to a community garden where SCP-8175 was observed pollinating hybrid roses.

Initial containment resulted in three personnel undergoing unintentional transformations. Following incident 8175-01, standard insect containment protocols were revised.
Personnel changed by 8175:

Addendum 8175-B – Notable Incident Log:
Incident 8175-02: Agent Robbeca stewart was the first to go in looking for 8175 she accidentally angered 8175 and got sung on the neck. Before she was 5,5 and 140 lbs after she was 6,6 215lbs. She was distraught with her condition after containing SCP-8175. Reintroducing 8175 to her did not work. she shaved her body hair and now is going to continue her life transitioning as a transwoman.

Incident 8175-03: Agent Steven James was after robecca he witnessed her getting stung panicked and swung his net at 8175 missed and was stung on his hand. Before: blond 6ft 220lbs. After: 5,6 120lbs. Steven now Stephanie said she could care less and is content with the outcome.

Incident 8175-04: Agent Jackson Bryant was the last he witnessed both his partners get stung, approached carefully trying to sneak up on 8175 he was noticed and got stung but put fish net over 8175 capturing it before anyone else could be stung. Jackson before was 6,7 240lbs after is now 5,6 150lbs. He has stated on multiple occasions he is pissed he got stung and now is transitioning as a trans man.

Incident 8175-07: Dr. ██████ was exposed to particles of pollen affected by SCP-8175 during routine observation. Upon recovery and psychological review, Dr. ██████ declined amnestic treatment and requested reassignment under a new identity, citing “finally feeling like myself.”

Addendum 8175-a - Behavioral Disposition and Target Bias
SCP-8175 displays an anomalous capacity for behavioral discrimination between individuals based on psychological and ideological bias and traits, specifically in relation to gender identity and attitudes toward transgender individuals.

Subjects with documented transphobic ideologies—established via psychological profiles, disciplinary history, or recorded verbal expressions—exhibit a statistically significant increase in aggressive interactions with SCP-8175. Behaviors include:

  • Persistent pursuit within enclosure boundaries
  • Unprovoked stinging attempts, regardless of protective equipment
  • Sustained high-frequency wing vibration (hypothesized to signal agitation)

Transformation occurs normally post-envenomation. In several cases, post-transformation psychological distress was exacerbated by the subject’s preexisting beliefs, often necessitating extended monitoring or reassignment.

Test Log 8175-TB-04 : Subject:D-12845 (history of verbal abuse targeting transgender inmates)
Procedure: Passive exposure within enclosure
Result: SCP-8175 initiated stinging within 20 seconds. Full transformation occurred. Subject became verbally combative and required sedation.
Note: SCP-8175 exhibited repeated circling behavior post-event, interpreted as continued hostility.

Empathetic Behavior Toward Transgender and Gender-Dysphoric Individuals:
SCP-8175 demonstrates markedly gentler behavior toward individuals who identify as transgender or who present symptoms of gender dysphoria. Recorded behaviors include:

  • Gentle hovering near the face or chest
  • Non-aggressive landings on exposed skin
  • Voluntary retreat without initiating contact

Notably, some transgender individuals have undergone complete biological transformation without direct stinging or ingestion of SCP-8175-B. These cases appear to be triggered by airborne bioactive compounds emitted by SCP-8175.
Chemical analysis of SCP-8175's enclosure atmosphere during passive transformation events reveals elevated concentrations of airborne micro-particles, including:

  • Modified pollen spores (unique protein structure not found in Apis mellifera)
  • Pheromone-like secretions emitted through abdominal glands

These compounds appear to react with neurochemical markers associated with gender dysphoria. In subjects who subconsciously or consciously desire gender transition, exposure to this ambient chemical blend may trigger a full transformation sequence without physical contact.
Test Log 8175-TB-11
Subject: D-15620 (pre-transition transgender male, voluntarily opted into test)
Procedure: 10-minute seated exposure, no physical contact with SCP-8175 permitted
Result: Subject reported warmth and dizziness. Full transformation began at 90 seconds and completed within 5 minutes. No physical contact or ingestion occurred.
Note: Subject was emotionally stable post-transformation and described the experience as “affirming.” Pollen saturation within the test chamber was measured at 4.2x baseline.

Addendum 8175-C – SCP-8175-B Production and Effects:

One test conducted by Dr. R. Brookes sought to determine whether SCP-8175 could produce honey. A selection of hybrid flowers was introduced into the enclosure, alongside an artificial hive. After seven days, SCP-8175 had produced approximately one teaspoon of honey, indicating a rate approximately 12 times more efficient than a standard honey bee.

The honey, designated SCP-8175-B, was bright pink with a potent sweet floral scent. SCP-8175 appeared visibly more energetic and less aggressive after its production. Dr. Brookes was tasked with disposing of the sample, but accidentally ingested a portion after removing her protective suit prematurely and falling face-first into the container.

Witnesses escorted Dr. Brookes to medical care as the transformation occurred. She was heard repeating, “Finally, I’m free,” through tears right before losing consciousness and entering stage 3. A 12-week psychological review confirmed enhanced emotional stability and resolution of previously undisclosed gender dysphoria. Before she was 6,2 200lbs and displayed rather evident secondary sex traits associated with that of a man. Post-incident, Dr. Brookes measured 5’3”, weighed 108lbs, and displayed complete biological conversion. Team members have colloquially referred to her as a “bombshell brunette.” She described SCP-8175-B as tasting like extremely sweet honey, but “twice as pleasant.”

Addendum 8175-D – Field Deployment Experiment:

Test Designation: SCP-8175–T13Lead Subject: Dr. R. Brookes (formerly Robert Brookes)Objective: Evaluate long-term psychological, operational, and sociocultural outcomes of a transformed individual during undercover infiltration.

Dr. Brookes volunteered for a covert assignment with MTF Psi-9 (“Honeytrap”), targeting a cult that only accepted biologically female members. Under the alias “Rebecca Halley,” she integrated into the cult within six days, gathering intelligence on anomalous rituals. The operation led to the arrest of 17 members and the recovery of multiple artifacts.(one of witch being SCP-█████

Psychological assessments noted increased empathy, confidence, and social maneuverability. Observers informally noted a heightened tendency to agree with or support Dr. Brookes’ input. A follow-up investigation into behavioral anomalies was initiated.

Addendum 8175-E – Secondary Effect Discovery: Pheromonal Influence

SCP-8175-induced transformations were found to result in trace pheromonal emissions capable of influencing social perception.

Test Designation: SCP-8175–P01 Subject: D-2281 (transformed via SCP-8175 sting, Day 14)Supervisor: Dr. H. DenzikObjective: Determine if transformed individuals emit subliminal biochemical cues affecting others.

D-2281 interacted with three control groups in scripted tasks. Across all groups, D-2281 was rated as more trustworthy and persuasive than baseline recordings. Airborne compound analysis revealed low-level biochemical emissions released during emotional states. These appear to mildly enhance social attraction and likability.

"So not only does it change your gender and crank up the hotness dial, it turns you into a walking charisma buff. We’re officially one glitter effect away from anime nonsense."— Dr. Halvorsen

Use of transformed individuals in public-facing roles is restricted pending further review by the Ethics Committee.

Note: Cross-species and cross-containment testing of SCP-8175 and SCP-8175-B are ongoing. Unauthorized consumption of SCP-8175-B is grounds for disciplinary review.

Table of Contents
scp-8001-prototype

Description

Item #: SCP-XXXX
Object Class: Safe
Security Clearance Level: 3

—-

Special Containment Procedures:
SCP-XXXX has been removed from the original kindergarten facility in [REDACTED] and fully reconstructed within a standard 12 m x 12 m containment chamber at Site-██. All original elements (walls, flooring, toys, furniture) have been arranged precisely as found. The room is to be monitored through one-way bulletproof glass. Personnel are not permitted to enter SCP-XXXX except for approved experiments involving D-Class or cognitively tested juvenile subjects.

Entry points must remain electronically locked at all times. Should a child within SCP-XXXX manifest "special powers," immediate sedation protocols are to be enacted, and termination authorized if necessary. The use of amnestics or SCP-based memory alteration requires prior approval.

—-

Description:
SCP-XXXX is a fully furnished children's playroom, originally discovered in a kindergarten in [REDACTED], measuring 10 m x 10 m x 10 m. The room contains a variety of typical children's toys, including plastic weapons, toy armor, capes, cardboard crowns, action figures, rockets, and costumes.

Anomalous effects occur only when at least two human subjects under the age of 12 (or developmentally delayed individuals exhibiting comparable behavior) are present simultaneously. Once the subjects begin imaginative roleplay, their fictional "powers" may manifest lethally—though only within the context of the imagined narrative.

Toys do not physically change, but still exhibit deadly effects (e.g., a visibly plastic toy gun may fatally shoot someone). The boundary between reality and imagination is completely blurred for the involved children.

Upon a "victory" in the narrative, the winning child often displays signs of psychological fulfillment or a sense of righteous justice. Following any incident, subjects are treated with amnestics—with inconsistent success. Termination has been required in multiple cases.

—-

Discovery Log:
SCP-XXXX came to the Foundation's attention on ██/██/20██ when a child fatally "shot" another during play with a visibly non-functional toy pistol. The surviving child stated, "I destroyed the evil." After administering Class-B amnestics to all witnesses (including parents) and shutting down the kindergarten under the pretense of a gas leak, SCP-XXXX was secured.

—-

Experiment Log – SCP-XXXX

Experiment A-1
Subjects: Two D-Class personnel
Result: No anomalous activity after three hours. All toys remained inert. One D-Class subject reported a "nostalgic, childlike feeling." No further effects observed.

—-

Experiment A-2
Subjects: One male child (age 7), one D-Class personnel
Result: The child willingly played the "hero"; the D-Class was assigned the role of the "villain." No physical anomalies occurred. Toys remained inert. D-Class expressed boredom.

—-

Experiment A-3
Subjects: Two children (male 6, female 8)
Roles: "Fire Queen" vs. "Super Cowboy"
Result: The boy’s plastic weapon caused actual gunfire. The girl emitted real flames from her hands. Evacuation attempts failed—children were unresponsive. The boy died from burns. Amnestics were ineffective on the girl. Subject was terminated.

—-

Experiment A-4
Subjects: One boy (9) and one cognitively impaired D-Class
Roles: "Knight" vs. "Wizard"
Result: The child killed the D-Class with a plastic sword. The child then breached containment, killed three security personnel and Dr. [REDACTED] before being terminated.

—-

Experiment A-5
Subjects: Infant, girl (age 5), puppy
Roles: Girl: "Witch" / Puppy: presumed "Laser Dog"
Result: Puppy killed by an energy blast. Girl showed extreme resistance to termination. Termination was successful only via deployment of SCP-076 (Abel). The infant remained unharmed and non-anomalous.

—-

Experiment A-6
Subjects: Boy (age 7, prior SCP-8001 exposure), girl (age 8)
Roles: Girl: "Flower Girl" / Boy: "Dragon Hybrid"
Result: The boy refused to participate but was forcibly placed inside. Within seconds, his body disintegrated into dust. The dust formed a new toy weapon. Girl was terminated.

—-

Closing Statement by Dr. ██████:

“This room manifests the fantasy and moral structures of children in lethal form. The question isn't if they'll become dangerous, but when they believe they're right. And when a child believes they're the hero… they'll kill anything in their way.”

put description what kind of problem does the solution solve and how

Code

put the code here

In action

link to the implemented solution on a Wikidot site or put a working example here

Table of Contents
breadcrumbs-md

Description

put description what kind of problem does the solution solve and how

Code

http://archive.today/02uJm

http://archive.today/2022.11.30-021322/http://rpcauthority.wikidot.com/security-clearance-levels?fbclid=IwAR1JrsHYkShe5JQm4secmGSpBniuyry8JSQdIzP53Dt3Mj0bXoD9SqRlRXY

[archive.today link](http://archive.today/02uJm)

<a href="http://archive.today/02uJm">
 <img style="width:300px;height:200px;background-color:white" src="/02uJm/8963bc1c0ddebb4a17ad1467e9620e4cc13206ca/scr.png"><br>
 Security &amp; Clearance Levels - RPC Authority<br>
 archived 30 Nov 2022 02:13:22 UTC
</a>

{{cite web
 | title       = Security & Clearance Levels - RPC Authority
 | url         = http://rpcauthority.wikidot.com/security-clearance-levels?fbclid=IwAR1JrsHYkShe5JQm4secmGSpBniuyry8JSQdIzP53Dt3Mj0bXoD9SqRlRXY
 | date        = 2022-11-30
 | archiveurl  = http://archive.today/02uJm
 | archivedate = 2022-11-30 }}

modules:

[[module NaviBar]] - Wikidot's branded top bar
[[module FooterBar]] - Wikidot's Interesting Sites
[[module LoginStatus]] - Sign in/Create account button or User logged in
[[module PageOptionsBottom]] - Page options: edit, tags etc.
[[action_area]] - Indicates the position on the page that PageOptionsBottom will use when it needs to display additional content, e.g. a file upload form. It's needed for correct functioning of PageOptionsBottom module

[[module AdModuleAboveContent]] - Ad box for Pro users
[[module AdModuleBelowContent]] - Ad box for Pro users
[[module AdModuleAboveSidebar]] - Ad box for Pro users
[[module AdModuleBelowSidebar]] - Ad box for Pro users
[[module AdModuleBelowFooter]] - Ad box for Pro users
[[module Ad label="custom_location"]] - Ad box for Pro users (custom location support)

[[site_name]] - Site title, former <h1>
[[site_subtitle]] - Site subtitle, former <h2>
[[content]] - It's rather obvious, content of the page
[[search_box]] - Box for searching within a site
[[site_locked]] - Information about a lock on the site
[[page_title]] - Page title
[[]] - Breadcrumbs elements
[[tags]] - Displays list of tags
[[topbar]] - Top navigation
[[sidebar]] - Side navigation, displayed if enabled
[[ssl_warning]] - Warning about disabled SSL if Pro+ subscription expires
[[page_not_exists]] - Information displayed when page does not exist
[[license_text]] - License text (set up in Admin Panel)
[[footer]] - Inserts footer, default or custom
Possible if statement in layouts
[[if name]]
if code ...
[[/if]]

[[if !name]]
if code ...
[[/if]]

[[if name]]
if code ...
[[else]]
else code ...
[[/if]]
List of available if statements:

[[if site_subtitle]]
[[if site_locked]]
[[if page_title]]
[[if Breadcrumbs
AUTH0.crt GET https://dev-780m0w5r8jhyhts8.us.auth0.com/authorize? audience=API_IDENTIFIER& scope=SCOPE& response_type=code& client_id=OTGv6UTlGzeyNfHLW3b8sZYfihcMQT96& redirect_uri=undefined& state=STATE POST https://dev-780m0w5r8jhyhts8.us.auth0.com/oauth/token Content-Type: application/x-www-form-urlencoded grant_type=authorization_code&client_id=OTGv6UTlGzeyNfHLW3b8sZYfihcMQT96&client_secret=YOUR_CLIENT_SECRET&code=AUTHORIZATION_CODE&redirect_uri=undefined RESPONSE SAMPLE: HTTP/1.1 200 OK Content-Type: application/json { "access_token":"eyJz93a...k4laUWw", "refresh_token":"GEbRxBN...edjnXbL", "id_token":"eyJ0XAi...4faeEoQ", "token_type":"Bearer", "expires_in":86400 } GET https://dev-780m0w5r8jhyhts8.us.auth0.com/authorize? audience=API_IDENTIFIER& scope=SCOPE& response_type=code& client_id=OTGv6UTlGzeyNfHLW3b8sZYfihcMQT96& redirect_uri=undefined& code_challenge=CODE_CHALLENGE& code_challenge_method=S256 RESPONSE SAMPLE HTTP/1.1 302 Found Location: undefined?code=AUTHORIZATION_CODE POST https://dev-780m0w5r8jhyhts8.us.auth0.com/oauth/token Content-Type: application/x-www-form-urlencoded grant_type=authorization_code&client_id=OTGv6UTlGzeyNfHLW3b8sZYfihcMQT96&code_verifier=CODE_VERIFIER&code=AUTHORIZATION_CODE&redirect_uri=undefined RESPONSE SAMPLE: HTTP/1.1 200 OK Content-Type: application/json { "access_token":"eyJz93a...k4laUWw", "refresh_token":"GEbRxBN...edjnXbL", "id_token":"eyJ0XAi...4faeEoQ", "token_type":"Bearer", "expires_in":86400 } Authorization: Bearer <token> model schema 1.1 type user type group relations define member: [user] type folder relations define can_create_file: owner define owner: [user] define parent: [folder] define viewer: [user, user:, group#member] or owner or viewer from parent type doc relations define can_change_owner: owner define owner: [user] define parent: [folder] define can_read: viewer or owner or viewer from parent define can_share: owner or owner from parent define viewer: [user, user:, group#member] define can_write: owner or owner from parent latest STORE ID:01HZJKP769XKTTTCYJJGTCT0MF model schema 1.1 type user type domain relations define member: [user] type folder relations define can_share: writer define owner: [user, domain#member] or owner from parent_folder define parent_folder: [folder] define viewer: [user, domain#member] or writer or viewer from parent_folder define writer: [user, domain#member] or owner or writer from parent_folder type document relations define can_share: writer define owner: [user, domain#member] or owner from parent_folder define parent_folder: [folder] define viewer: [user, domain#member] or writer or viewer from parent_folder define writer: [user, domain#member] or owner or writer from parent_folder type team relations define member: [user, user:, team#member] type team relations define member: [user, user:, team#member] [// Anne is directly related to the product team as a member { "user": "user:anne", "relation": "member", "object": "team:product", "_description": "Anne is directly related to the product team as a member" }] [// Everyone (*) is directly related to the product team as a member { "user": "user:", "relation": "member", "object": "team:product", "_description": "Everyone (*) is directly related to the product team as a member" }] [// Members of the contoso team are members of the product team { "user": "team:contoso#member", "relation": "member", "object": "team:product", "_description": "Members of the contoso team are members of the product team" }// Anne is a member of the contoso team { "user": "user:anne", "relation": "member", "object": "team:contoso", "_description": "Anne is a member of the contoso team" }] type document relations define editor: [user] define viewer: [user] or editor define can_rename: editor [// Anne is an editor of the new-roadmap document { "user": "user:anne", "relation": "editor", "object": "document:new-roadmap", "_description": "Anne is an editor of the new-roadmap document" }] anne is a viewer of document:new-roadmap [// Anne is a viewer of the new-roadmap document { "user": "user:anne", "relation": "viewer", "object": "document:new-roadmap", "_description": "Anne is a viewer of the new-roadmap document" }] anne has a can_rename relationship with document:new-roadmap only if anne has an editor relationship with the document: anne is an editor of document:new-roadmap [// Anne is an editor of thew new-roadmap document { "user": "user:anne", "relation": "editor", "object": "document:new-roadmap", "_description": "Anne is an editor of thew new-roadmap document" }] model schema 1.1 type user type folder relations define viewer: [user, folder#viewer] type document relations define parent_folder: [folder] define viewer: [user] or viewer from parent_folder type document relations define viewer: [user] or viewer from parent_folder [// planning folder is the parent folder of the new-roadmap document { "user": "folder:planning", "relation": "parent_folder", "object": "document:new-roadmap", "_description": "planning folder is the parent folder of the new-roadmap document" }// anne is a viewer of the planning folder { "user": "user:anne", "relation": "viewer", "object": "folder:planning", "_description": "anne is a viewer of the planning folder" }] Anne is a viewer of the new-roadmap document (direct relationship) [// anne is a viewer of the new-roadmap document { "user": "user:anne", "relation": "viewer", "object": "document:new-roadmap", "_description": "anne is a viewer of the new-roadmap document" }] type document relations define viewer: [user] or editor [{ "user": "user:anne", "relation": "editor", "object": "document:new-roadmap" }] anne is a viewer of document:new-roadmap [{ "user": "user:anne", "relation": "viewer", "object": "document:new-roadmap" }] type document relations define viewer: authorized_user and editor [{ "user": "user:anne", "relation": "editor", "object": "document:new-roadmap" }] AND anne is an authorized_user of document:new-roadmap: [{ "user": "user:anne", "relation": "authorized_user", "object": "document:new-roadmap" }] type document relations define viewer: [user] but not blocked [{ "user": "user:anne", "relation": "viewer", "object": "document:new-roadmap" }] AND anne is not blocked from document:new-roadmap; the following relation tuple does not exist: [{ "user": "user:anne", "relation": "blocked", "object": "document:new-roadmap" }] name: "doc" relation { name: "owner" } relation { name: "editor" userset_rewrite { union { child { _this {} } child { computed_userset { relation: "owner" } } }}} relation { name: "viewer" userset_rewrite { union { child { _this {} } child { computed_userset { relation: "editor" } } child { tuple_to_userset { tupleset { relation: "parent" } computed_userset { object: $TUPLE_USERSET_OBJECT # parent folder relation: "viewer" }}} }}} In the Okta FGA DSL, it becomes: model schema 1.1 type doc relations define owner: [user] define editor: [user] or owner define viewer: [user] or editor or viewer from parent In the Okta FGA JSON, it becomes: { "schema_version": "1.1", "type_definitions": [ { "type": "doc", "relations": { "owner": { "this": {} }, "editor": { "union": { "child": [ { "this": {} }, { "computedUserset": { "relation": "owner" } } ] } }, "viewer": { "union": { "child": [ { "this": {} }, { "computedUserset": { "relation": "editor" } }, { "tupleToUserset": { "tupleset": { "relation": "parent" }, "computedUserset": { "relation": "viewer" } } } ] } } }, "metadata": { "relations": { "owner": { "directly_related_user_types": [ { "type": "user" } ] }, "editor": { "directly_related_user_types": [ { "type": "user" } ] }, "viewer": { "directly_related_user_types": [ { "type": "user" } ] } } } } ] } model schema 1.1 type doc relations define viewer: [user] or editor or viewer from parent import ulid = require('ulid'); const time = ulid.decodeTime(id); ulid() // 01ARZ3NDEKTSV4RRFFQ69G5FAV 01AN4Z07BY 79KA1307SR9X4MV3 |----------| |----------------| Timestamp Randomness 48bits 80bits ttttttttttrrrrrrrrrrrrrrrr where t is Timestamp (10 characters) r is Randomness (16 characters) ttttttttttrrrrrrrrrrrrrrrr where t is Timestamp (10 characters) r is Randomness (16 characters) ENCODING:0123456789ABCDEFGHJKMNPQRSTVWXYZ import { monotonicFactory } from 'ulid' const ulid = monotonicFactory() // Assume that these calls occur within the same millisecond ulid() // 01BX5ZZKBKACTAV9WEVGEMMVRZ ulid() // 01BX5ZZKBKACTAV9WEVGEMMVS0 If, in the extremely unlikely event that, you manage to generate more than 280 ULIDs within the same millisecond, or cause the random component to overflow with less, the generation will fail. import { monotonicFactory } from 'ulid' const ulid = monotonicFactory() // Assume that these calls occur within the same millisecond ulid() // 01BX5ZZKBKACTAV9WEVGEMMVRY ulid() // 01BX5ZZKBKACTAV9WEVGEMMVRZ ulid() // 01BX5ZZKBKACTAV9WEVGEMMVS0 ulid() // 01BX5ZZKBKACTAV9WEVGEMMVS1 ... ulid() // 01BX5ZZKBKZZZZZZZZZZZZZZZX ulid() // 01BX5ZZKBKZZZZZZZZZZZZZZZY ulid() // 01BX5ZZKBKZZZZZZZZZZZZZZZZ ulid() // throw new Error()! 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | 32_bit_uint_time_high | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | 16_bit_uint_time_low | 16_bit_uint_random | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | 32_bit_uint_random | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | 32_bit_uint_random | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ curl -L 'https://login.auth0.com/api/v2/resource-servers' \ -H 'Accept: application/json' curl -L 'https://login.auth0.com/api/v2/resource-servers' \ -H 'Accept: application/json' import ( "http://gopkg.in/auth0.v5 " "http://gopkg.in/auth0.v5/management " ) m, err := management.New(domain, management.WithClientCredentials(5brrKDHYvFA30fTtLgRXoBP4rgQwDa7v, E-NkvzK439KTkXPawYLEcFkJR0loHQtxErlHEHJ1YlpID-xPUa3LWEskoVPwSaju)) if err != nil { // handle err } c := &management.Client{ Name: auth0.String("Client Name"), Description: auth0.String("Long description of client"), } err = m.Client.Create(c) if err != nil { // handle err } fmt.Printf("Created client %s\n", c.ClientID) npm install auth0-lock <!-- Latest patch release (recommended for production) --> <script src="https://cdn.auth0.com/js/lock/12.5.1/lock.min.js"></script> import { Auth0Lock } from 'auth0-lock'; const lock = new Auth0Lock('{5brrKDHYvFA30fTtLgRXoBP4rgQwDa7v}', '{http://dev-780m0w5r8jhyhts8.us.auth0.com }'); Auth0LockPasswordless import { Auth0LockPasswordless } from 'auth0-lock'; const lock = new Auth0LockPasswordless('{5brrKDHYvFA30fTtLgRXoBP4rgQwDa7v}', '{http://dev-780m0w5r8jhyhts8.us.auth0.com }'); Logging In Configure a listener for the authenticated event to retrieve an access token and call show to display the Lock widget. <button id="login">Click to Login</button> lock.on('authenticated', function (authResult) { lock.getUserInfo(authResult.accessToken, function (error, profileResult) { if (error) { // Handle error return; } accessToken = authResult.accessToken; profile = profileResult; // Update DOM }); }); // Show the widget when the login button is clicked document.getElementById('login').addEventListener('click', () => { lock.show() });. { "sub": "google-oauth2|113478536691329380621", "given_name": "keith", "family_name": "bieszczat", "nickname": "grateful345i", "name": "keith bieszczat", "picture": "https://lh3.googleusercontent.com/a/ACg8ocKPVtS-ilmMuKeyJZ3n5Q2knlM-mfWIKCV15ZYhjN9p1IXepw=s96-c", "locale": "en", "updated_at": "2024-06-04T21:35:35.209Z" } GitHub Identifier con_RdboyCuwWp1zE1Js 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 665d3535559cf53ada0c0fb9 ID 665d3535559cf53ada0c0fb9 https://dev-780m0w5r8jhyhts8.us.auth0.com/api/v2/5brrKDHYvFA30fTtLgRXoBP4rgQwDa7 GLOBAL CLIENT ID: DLT0ckbjQNVoS3fWzd99HyEY0rXC1Gab GLOBAL CLIENT SECRET: I1i3Q7__hG4am80OAHxnLAREzMYwF2sxmQbJsf1EPD3KdxGUd6rOSv6gfMq7mN3- CLIENT ID : Client ID 5brrKDHYvFA30fTtLgRXoBP Application name: Foundation MIB Corporate 4rgQwDa7v Domain: http://dev-780m0w5r8jhyhts8.us.auth0.com Client ID:5brrKDHYvFA30fTtLgRXoBP4rgQwDa7v Client Secret: E-NkvzK439KTkXPawYLEcFkJR0loHQtxErlHEHJ1YlpID-xPUa3LWEskoVPwSaju Key ID:kFBeYnpvUPhDmmFBOlai2 -----BEGIN CERTIFICATE----- MIIDHTCCAgWgAwIBAgIJBsn7KiPsgIGbMA0GCSqGSIb3DQEBCwUAMCwxKjAoBgNV BAMTIWRldi03ODBtMHc1cjhqaHlodHM4LnVzLmF1dGgwLmNvbTAeFw0yNDA2MDMw MzE1MDBaFw0zODAyMTAwMzE1MDBaMCwxKjAoBgNVBAMTIWRldi03ODBtMHc1cjhq aHlodHM4LnVzLmF1dGgwLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoC ggEBAKh6coojyJwEU4HBJTAY7UktrIdoha4YVdv/CXmCpsshWRRkPi4ht6dBdVZp 5LxwOYlVe7Dg32jRdVgmI3gkib8jZlgTurRIcdHHaoBP1alK2E5pBG8s7QRCjMF6 BCUGMjtuxHAEbOs4iC51uDuVcIjLcFJm180UF3KrtAXfEwk1vvldxNkmUokW/HHu 8qHsFH3i1hAjeAhS/lcziqIJF5rRERBoxgUsj8RPz1EbKULpLB3q7MS2yd3qGyrD 7GUXl10RXkLJrlrP+rMqGwkXm/tJ1enHdIvsVHOmJaYR3jRRL5x5xQ8HYklsVIEK MKhF+1jBidfinoKYSgBUWO4pFF8CAwEAAaNCMEAwDwYDVR0TAQH/BAUwAwEB/zAd BgNVHQ4EFgQUzu9gS8XIe5XsxgN10QowXnyVJB8wDgYDVR0PAQH/BAQDAgKEMA0G CSqGSIb3DQEBCwUAA4IBAQCbKFQQ5AsOa375/ql1JCoWHwnyqGFds8G1TSQvBI/v tMCUlU91zkx2REZMCF1MR/Arc8PCcwj3OJEIOpjw3nz/03Ei7w5jaiVorsRXbtiw k93RNIcIchHgS/AdV9kjS6OKU/OmNwE8sz4oBMRMqhIMDsiZo5otK3L3FoxeGKql dBYpLb7QFPMgWGiwJb47VktCnactsJXl7kO1ILfj4+C81GyMaK0Vb4/ZKVEIdeoR qXnXz/PrZn6+euU3fkO8VICUktBuFn6QS0E0EJfaIcGjU7PAZHBGnrZP+6oksujp jPMnXdoH7Zdp+Ivwqynvlpu5P5iQUEEBqKUp0MGZsH6K -----END CERTIFICATE----- FINGERPRINTS: BC:B0:CE:8A:02:41:3F:30:2E:FA:FF:21:77:D7:BA:EB:C9:6F:0B:5D BCB0CE8A02413F302EFAFF2177D7BAEBC96F0B5D curl --request GET \ --url 'https://{dev-780m0w5r8jhyhts8.us.auth0.com}/api/v2/keys/signing' \ --header 'authorization: Bearer {yourMgmtApiAccessToken}' curl --request GET \ --url 'https://{yourDomain}/api/v2/keys/signing/{yourKeyId}' \ --header 'authorization: Bearer {yourMgmtApiAccessToken}' // server.mjs import { createServer } from 'node:http'; const server = createServer((req, res) => { res.writeHead(200, { 'Content-Type': 'text/plain' }); res.end('Hello World!\n'); }); // starts a simple http server locally on port 3000 server.listen(3000, '127.0.0.1', () => { console.log('Listening on 127.0.0.1:3000'); }); // run with node server.mjs curl -O https://nodejs.org/dist/vx.y.z/SHASUMS256.txt grep node-vx.y.z.tar.gz SHASUMS256.txt | sha256sum -c - gpg --keyserver hkps://keys.openpgp.org --recv-keys 4ED778F539E3634C779C87C6D7062848A1AB005C curl -O https://nodejs.org/dist/vx.y.z/SHASUMS256.txt.sig gpg --keyserver hkps://keys.openpgp.org --recv-keys 4ED778F539E3634C779C87C6D7062848A1AB005C # Beth Griggs gpg --keyserver hkps://keys.openpgp.org --recv-keys 141F07595B7B3FFE74309A937405533BE57C7D57 # Bryan English gpg --keyserver hkps://keys.openpgp.org --recv-keys 74F12602B6F1C4E913FAA37AD3A89613643B6201 # Danielle Adams gpg --keyserver hkps://keys.openpgp.org --recv-keys DD792F5973C6DE52C432CBDAC77ABFA00DDBF2B7 # Juan José Arboleda gpg --keyserver hkps://keys.openpgp.org --recv-keys CC68F5A3106FF448322E48ED27F5E38D5B0A215F # Marco Ippolito gpg --keyserver hkps://keys.openpgp.org --recv-keys 8FCCA13FEF1D0C2E91008E09770F7A9A5AE15600 # Michaël Zasso gpg --keyserver hkps://keys.openpgp.org --recv-keys C4F0DFFF4E8C1A8236409D08E73BC641CC11F4C8 # Myles Borins gpg --keyserver hkps://keys.openpgp.org --recv-keys 890C08DB8579162FEE0DF9DB8BEAB4DFCF555EF4 # Rafael Gonzaga gpg --keyserver hkps://keys.openpgp.org --recv-keys C82FA3AE1CBEDC6BE46B9360C43CEC45C17AB93C # Richard Lau gpg --keyserver hkps://keys.openpgp.org --recv-keys 108F52B48DB57BB0CC439B2997B01419BD92F80A # Ruy Adorno gpg --keyserver hkps://keys.openpgp.org --recv-keys A363A499291CBBC940DD62E41F10027AF002F8B0 # Ulises Gascón curl --request POST \ --url 'https://{dev-780m0w5r8jhyhts8.us.auth0.com}/oauth/token' \ --header 'content-type: application/x-www-form-urlencoded' \ --data grant_type=client_credentials \ --data client_id=DLT0ckbjQNVoS3fWzd99HyEY0rXC1Gab \ --data client_secret=YOUR_CLIENT_SECRET \ GET https://{yourDomain}/authorize? response_type=code|token& client_id={yourClientId}& connection=CONNECTION& redirect_uri={https://yourApp/callback}& state=STATE& ADDITIONAL_PARAMETERS GET https://{yourDomain}/authorize? response_type=code|token& client_id={yourClientId}& connection=CONNECTION& redirect_uri={https://yourApp/callback}&scope=openid%20profile%20email& state=STATE --data audience=YOUR_API_IDENTIFIER GET https://{yourDomain}/authorize? response_type=code|token& client_id={yourClientId}& connection=CONNECTION& redirect_uri={https://yourApp/callback}& state=STATE GET https://{dev-780m0w5r8jhyhts8.us.auth0.com}/v2/logout? client_id={yourClientId}& returnTo=LOGOUT_URL GET https://{yourDomain}/oidc/logout? post_logout_redirect_uri=LOGOUT_URL& id_token_hint=ID_TOKEN_HINT POST https://{yourDomain}/oauth/token Content-Type: application/json { "grant_type" : "http://auth0.com/oauth/grant-type/passwordless/otp", "client_id": "{DLT0ckbjQNVoS3fWzd99HyEY0rXC1Gab}", "client_secret": "YOUR_CLIENT_SECRET", // for web applications "otp": "CODE", "realm": "email|sms" //email or sms "username":"USER_EMAIL|USER_PHONE_NUMBER", // depends on which realm you chose "audience" : "API_IDENTIFIER", // in case you need an access token for a specific API "scope": "SCOPE", "redirect_uri": "REDIRECT_URI" } POST https://{dev-780m0w5r8jhyhts8.us.auth0.com}/dbconnections/signup Content-Type: application/json { "client_id": "{yDLT0ckbjQNVoS3fWzd99HyEY0rXC1Gab}", "email": "EMAIL", "password": "PASSWORD", "connection": "CONNECTION", "username": "johndoe", "given_name": "John", "family_name": "Doe", "name": "John Doe", "nickname": "johnny", "picture": "http://example.org/jdoe.png" "user_metadata": { plan: 'silver', team_id: 'a111' } } RESPONSE SAMPLE: { "_id": "58457fe6b27...", "email_verified": false, "email": "test.account@signup.com", "username": "johndoe", "given_name": "John", "family_name": "Doe", "name": "John Doe", "nickname": "johnny", "picture": "http://example.org/jdoe.png" } GET https://{yourDomain}/authorize?audience=API_IDENTIFIER& scope=SCOPE& response_type=code& client_id={yourClientId}& redirect_uri={https://yourApp/callback}& code_challenge=CODE_CHALLENGE& code_challenge_method=S256 RESPONSE SAMPLE HTTP/1.1 302 Found Location: {https://yourApp/callback}?code=AUTHORIZATION_CODE Edit file curl --request POST \ --url 'https://dev-780m0w5r8jhyhts8.us.auth0.com/oauth/token' \ --header 'authorization: Basic {yourApplicationCredentials}' \ --header 'content-type: application/x-www-form-urlencoded' \ --data grant_type=refresh_token \ --data 'client_id=OTGv6UTlGzeyNfHLW3b8sZYfihcMQT96' \ --data 'refresh_token={yourRefreshToken}' curl --request POST \ --url 'https://dev-780m0w5r8jhyhts8.us.auth0.com/oauth/token' \ --header 'content-type: application/x-www-form-urlencoded' \ --data grant_type=refresh_token \ --data 'client_id=OTGv6UTlGzeyNfHLW3b8sZYfihcMQT96' \ --data 'client_secret={I1i3Q7__hG4am80OAHxnLAREzMYwF2sxmQbJsf1EPD3KdxGUd6rOSv6gfMq7mN3-}' \ --data 'refresh_token={yourRefreshToken}' { "access_token": "eyJ...MoQ", "expires_in": 86400, "scope": "openid offline_access", "id_token": "eyJ...0NE", "token_type": "Bearer" } function (user, context, callback) { if (context.protocol === 'oauth2-refresh-token'){ return callback(null, user, context); } // Add MFA logic callback(null, user, context); } https://dev-780m0w5r8jhyhts8.us.auth0.com/authorize? audience={API_AUDIENCE}& scope=offline_access& response_type=code& client_id=OTGv6UTlGzeyNfHLW3b8sZYfihcMQT96& redirect_uri=undefined& state={OPAQUE_VALUE} curl --request POST \ --url 'https://dev-780m0w5r8jhyhts8.us.auth0.com/oauth/token' \ --header 'content-type: application/x-www-form-urlencoded' \ --data grant_type=authorization_code \ --data 'client_id=OTGv6UTlGzeyNfHLW3b8sZYfihcMQT96' \ --data 'client_secret={I1i3Q7__hG4am80OAHxnLAREzMYwF2sxmQbJsf1EPD3KdxGUd6rOSv6gfMq7mN3-}' \ --data 'code={yourAuthorizationCode}' \ --data 'redirect_uri=undefined' { "access_token": "eyJz93a...k4laUWw", "refresh_token": "GEbRxBN...edjnXbL", "token_type": "Bearer" } function(user, context, callback) { // add custom claims to Access Token and ID Token context.accessToken['http://foo/bar'] = 'value'; context.idToken['http://fiz/baz'] = 'some other value'; // change scope context.accessToken.scope = ['array', 'of', 'strings']; callback(null, user, context); } GET https://dev-780m0w5r8jhyhts8.us.auth0.com/userinfo Authorization: 'Bearer {eyJhbGciOiJSUzI1NiIsInR5cCI6IkpXVCIsImtpZCI6ImtGQmVZbnB2VVBoRG1tRkJPbGFpMiJ9.eyJpc3MiOiJodHRwczovL2Rldi03ODBtMHc1cjhqaHlodHM4LnVzLmF1dGgwLmNvbS8iLCJzdWIiOiI4eHV1elZnZnBwNDBLNGtNMVhORFJwSDFqRk1pdUpBREBjbGllbnRzIiwiYXVkIjoiaHR0cHM6Ly9kZXYtNzgwbTB3NXI4amh5aHRzOC51cy5hdXRoMC5jb20vYXBpL3YyLyIsImlhdCI6MTcxNzUzMDY3MCwiZXhwIjoxNzE3NjE3MDcwLCJndHkiOiJjbGllbnQtY3JlZGVudGlhbHMiLCJhenAiOiI4eHV1elZnZnBwNDBLNGtNMVhORFJwSDFqRk1pdUpBRCJ9.lTNbQQKn1ihZH42u0nUnR6OCGaRfiCsxonXWttVVZ2SbzuVEl7WgtSmNmoaSWLQemZYVRDgDrjO51jkylCpSeN6vyxbY-sKmS7nd9h8qpRmYe25klUxGwiU2gCfq7Yvvp2pKZ63m94seajovRKqnywpoc5m7U7J1F0J371PgRtGREz-ax6vBGpA_LWjfgmHQbQdV98zpRN91J5frNZcTe6HxKV06LBFP3dl6sqBxAfkiuTQAQFumtWatheVvqA7hHszgbuA2FY5dY6wrX4JSHjVsHmTElelj0UhptWfZccZWm5OpRqBfaykgJWpo49lBxw-4K6vYzGRhdCSrFuQZkA}' POST https://dev-780m0w5r8jhyhts8.us.auth0.com/mfa/challenge Content-Type: application/json { "client_id": "OTGv6UTlGzeyNfHLW3b8sZYfihcMQT96", "client_secret": "I1i3Q7__hG4am80OAHxnLAREzMYwF2sxmQbJsf1EPD3KdxGUd6rOSv6gfMq7mN3-", "mfa_token": "MFA_TOKEN", "challenge_type": "oob|otp" } GET https://dev-780m0w5r8jhyhts8.us.auth0.com/samlp/OTGv6UTlGzeyNfHLW3b8sZYfihcMQT96? connection=CONNECTION GET https://dev-780m0w5r8jhyhts8.us.auth0.com/samlp/metadata/OTGv6UTlGzeyNfHLW3b8sZYfi GET https://dev-780m0w5r8jhyhts8.us.auth0.com/wsfed/OTGv6UTlGzeyNfHLW3b8sZYfihcMQT96 GET https://dev-780m0w5r8jhyhts8.us.auth0.com/wsfed/FederationMetadata/2007-06/FederationMetadata.xml POST https://dev-780m0w5r8jhyhts8.us.auth0.com/oidc/register Content-Type: application/json { "client_name": "YOUR-NEW-CLIENT-NAME", "redirect_uris": [], "token_endpoint_auth_method": "I1i3Q7__hG4am80OAHxnLAREzMYwF2sxmQbJsf1EPD3KdxGUd6rOSv6gfMq7mN3-" } RESPONSE SAMPLE: { "client_name": "My Dynamic Client", "client_id": "8SXWY6j3afl2CP5ntwEOpMdPxxy49Gt2", "client_secret": "Q5O...33P", "redirect_uris": [ "https://client.example.com/callback", "https://client.example.com/callback2" ], "client_secret_expires_at": 0 } GET https://dev-780m0w5r8jhyhts8.us.auth0.com/authorize? audience=API_IDENTIFIER& scope=SCOPE& response_type=code& client_id=OTGv6UTlGzeyNfHLW3b8sZYfihcMQT96& redirect_uri=undefined& state=STATE RESPONSE SAMPLE HTTP/1.1 302 Found Location: undefined?code=AUTHORIZATION_CODE&state=STATE POST https://dev-780m0w5r8jhyhts8.us.auth0.com/oauth/tokenContent-Type: application/x-www-form-urlencoded grant_type=authorization_code&client_id=OTGv6UTlGzeyNfHLW3b8sZYfihcMQT96&client_secret=YOUR_CLIENT_SECRET&code=AUTHORIZATION_CODE&redirect_uri=undefined RESPONSE SAMPLE: HTTP/1.1 200 OK Content-Type: application/json { "access_token":"eyJz93a...k4laUWw", "refresh_token":"GEbRxBN...edjnXbL", "id_token":"eyJ0XAi...4faeEoQ", "token_type":"Bearer", "expire" POST https://dev-780m0w5r8jhyhts8.us.auth0.com/oauth/token Content-Type: application/x-www-form-urlencoded grant_type=authorization_code&client_id=OTGv6UTlGzeyNfHLW3b8sZYfihcMQT96&code_verifier=CODE_VERIFIER&code=AUTHORIZATION_CODE&redirect_uri=undefined RESPONSE SAMPLE: HTTP/1.1 200 OK Content-Type: application/json { "access_token":"eyJz93a...k4laUWw", "refresh_token":"GEbRxBN...edjnXbL", "id_token":"eyJ0XAi...4faeEoQ", "token_type":"Bearer", "expires_in":86400 } OST dev-780m0w5r8jhyhts8.us.auth0.com/oauth/par Content-Type: 'application/x-www-form-urlencoded' audience={https://yourApi/}& response_type=code|code id_token& client_id={yourClientId}& redirect_uri={https://yourApp/callback}& state=STATE& scope=openid|profile|email& code_challenge=CODE_CHALLENGE& code_challenge_method=S256& nonce=NONCE& connection=CONNECTION& prompt=login|consent|none& organisation=ORGANIZATION RESPONSE SAMPLE: /** If the request is successful, /oauth/par responds with a JSON object containing the request_uriproperty, which can be used at the authorization endpoint, and the expires_in value, which indicates the number of seconds the request_uri is valid. / HTTP/1.1 201 Created Content-Type: application/json { "request_uri": "urn:ietf:params:oauth:request_uri:6esc_11ACC5bwc014ltc14eY22c", "expires_in": 30 } curl --location 'https://$tenant/oauth/par' \ --header 'Content-Type: application/x-www-form-urlencoded' \ --data-urlencode 'client_id=$client_id' \ --data-urlencode 'client_secret=$client_secret' \ --data-urlencode 'redirect_uri=https://jwt.io ' \ --data-urlencode 'audience=urn:my-api' \ --data-urlencode 'response_type=code' \ --data-urlencode 'authorization_details=[{"type": "money_transfer", "instructedAmount": {"amount": 2500, "currency": "USD"}, "sourceAccount": "xxxxxxxxxxx1234", "destinationAccount": "xxxxxxxxxxx9876", "beneficiary": "Hanna Herwitz", "subject": "A Lannister Always Pays His Debts"}]' MANAGEMENT API TOKEN:eyJhbGciOiJSUzI1NiIsInR5cCI6IkpXVCIsImtpZCI6ImtGQmVZbnB2VVBoRG1tRkJPbGFpMiJ9.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.naDZ3rBOk5OKvoIPl9sK4-7qJF0JOOKyUWo53c0IXqyz7ySzN6O9m-ydIyLEsU91B6N1xTRLerfwaHF9b9jVApalrK7jxX4o6KyEJb56YmYSzZ02mew3457B39Eo0mGkcpg_z72T_rxAL6SQ5Y_f_zoDB8iw9LfWjjH3qSeETP2zv8OnDoLHOnIQy84Ip4PdhZZEgV9lkneUHSQ-_TvqWI8vFJNqzw0uc5yUaZ00EpeqBI4bBWq43NLSvDksdpW_ZRrei59UdNvRD3A125gkv2de8uC1Pwv42L0590HmIukQ1Eo3UZezOCwKExPfy8_d1dj817J7DrCTsOUzdbTfdg POST https://$tenant/oauth/token Content-Type: application/x-www-form-urlencoded grant_type=authorization_code&client_id=[DLT0ckbjQNVoS3fWzd99HyEY0rXC1Gab]&client_secret=[I1i3Q7__hG4am80OAHxnLAREzMYwF2sxmQbJsf1EPD3KdxGUd6rOSv6gfMq7mN3]&code=[AUTHZ_CODE]&redirect_uri=https://jwt.io POST https://$tenant/oauth/token Content-Type: application/x-www-form-urlencoded grant_type=authorization_code&client_id=[DLT0ckbjQNVoS3fWzd99HyEY0rXC1Gab]&client_secret=[I1i3Q7__hG4am80OAHxnLAREzMYwF2sxmQbJsf1EPD3KdxGUd6rOSv6gfMq7mN3]&code=[AUTHZ_CODE]&redirect_uri=https://jwt.io curl --request PATCH \ --url 'https://{yourDomain}/api/v2/resource-servers/API_ID' \ --header 'authorization: Bearer eyJhbGciOiJSUzI1NiIsInR5cCI6IkpXVCIsImtpZCI6ImtGQmVZbnB2VVBoRG1tRkJPbGFpMiJ9.eyJpc3MiOiJodHRwczovL2Rldi03ODBtMHc1cjhqaHlodHM4LnVzLmF1dGgwLmNvbS8iLCJzdWIiOiJ1Q3RZRFpPYjlDdUF6NWM4M1d5b0YxV0lhTVpYZ1ZRREBjbGllbnRzIiwiYXVkIjoiaHR0cHM6Ly9kZXYtNzgwbTB3NXI4amh5aHRzOC51cy5hdXRoMC5jb20vYXBpL3YyLyIsImlhdCI6MTcxNzUzMTY2NSwiZXhwIjoxNzE3NjE4MDY1LCJzY29wZSI6InJlYWQ6Y2xpZW50X2dyYW50cyBjcmVhdGU6Y2xpZW50X2dyYW50cyBkZWxldGU6Y2xpZW50X2dyYW50cyB1cGRhdGU6Y2xpZW50X2dyYW50cyByZWFkOnVzZXJzIHVwZGF0ZTp1c2VycyBkZWxldGU6dXNlcnMgY3JlYXRlOnVzZXJzIHJlYWQ6dXNlcnNfYXBwX21ldGFkYXRhIHVwZGF0ZTp1c2Vyc19hcHBfbWV0YWRhdGEgZGVsZXRlOnVzZXJzX2FwcF9tZXRhZGF0YSBjcmVhdGU6dXNlcnNfYXBwX21ldGFkYXRhIHJlYWQ6dXNlcl9jdXN0b21fYmxvY2tzIGNyZWF0ZTp1c2VyX2N1c3RvbV9ibG9ja3MgZGVsZXRlOnVzZXJfY3VzdG9tX2Jsb2NrcyBjcmVhdGU6dXNlcl90aWNrZXRzIHJlYWQ6Y2xpZW50cyB1cGRhdGU6Y2xpZW50cyBkZWxldGU6Y2xpZW50cyBjcmVhdGU6Y2xpZW50cyByZWFkOmNsaWVudF9rZXlzIHVwZGF0ZTpjbGllbnRfa2V5cyBkZWxldGU6Y2xpZW50X2tleXMgY3JlYXRlOmNsaWVudF9rZXlzIHJlYWQ6Y29ubmVjdGlvbnMgdXBkYXRlOmNvbm5lY3Rpb25zIGRlbGV0ZTpjb25uZWN0aW9ucyBjcmVhdGU6Y29ubmVjdGlvbnMgcmVhZDpyZXNvdXJjZV9zZXJ2ZXJzIHVwZGF0ZTpyZXNvdXJjZV9zZXJ2ZXJzIGRlbGV0ZTpyZXNvdXJjZV9zZXJ2ZXJzIGNyZWF0ZTpyZXNvdXJjZV9zZXJ2ZXJzIHJlYWQ6ZGV2aWNlX2NyZWRlbnRpYWxzIHVwZGF0ZTpkZXZpY2VfY3JlZGVudGlhbHMgZGVsZXRlOmRldmljZV9jcmVkZW50aWFscyBjcmVhdGU6ZGV2aWNlX2NyZWRlbnRpYWxzIHJlYWQ6cnVsZXMgdXBkYXRlOnJ1bGVzIGRlbGV0ZTpydWxlcyBjcmVhdGU6cnVsZXMgcmVhZDpydWxlc19jb25maWdzIHVwZGF0ZTpydWxlc19jb25maWdzIGRlbGV0ZTpydWxlc19jb25maWdzIHJlYWQ6aG9va3MgdXBkYXRlOmhvb2tzIGRlbGV0ZTpob29rcyBjcmVhdGU6aG9va3MgcmVhZDphY3Rpb25zIHVwZGF0ZTphY3Rpb25zIGRlbGV0ZTphY3Rpb25zIGNyZWF0ZTphY3Rpb25zIHJlYWQ6ZW1haWxfcHJvdmlkZXIgdXBkYXRlOmVtYWlsX3Byb3ZpZGVyIGRlbGV0ZTplbWFpbF9wcm92aWRlciBjcmVhdGU6ZW1haWxfcHJvdmlkZXIgYmxhY2tsaXN0OnRva2VucyByZWFkOnN0YXRzIHJlYWQ6aW5zaWdodHMgcmVhZDp0ZW5hbnRfc2V0dGluZ3MgdXBkYXRlOnRlbmFudF9zZXR0aW5ncyByZWFkOmxvZ3MgcmVhZDpsb2dzX3VzZXJzIHJlYWQ6c2hpZWxkcyBjcmVhdGU6c2hpZWxkcyB1cGRhdGU6c2hpZWxkcyBkZWxldGU6c2hpZWxkcyByZWFkOmFub21hbHlfYmxvY2tzIGRlbGV0ZTphbm9tYWx5X2Jsb2NrcyB1cGRhdGU6dHJpZ2dlcnMgcmVhZDp0cmlnZ2VycyByZWFkOmdyYW50cyBkZWxldGU6Z3JhbnRzIHJlYWQ6Z3VhcmRpYW5fZmFjdG9ycyB1cGRhdGU6Z3VhcmRpYW5fZmFjdG9ycyByZWFkOmd1YXJkaWFuX2Vucm9sbG1lbnRzIGRlbGV0ZTpndWFyZGlhbl9lbnJvbGxtZW50cyBjcmVhdGU6Z3VhcmRpYW5fZW5yb2xsbWVudF90aWNrZXRzIHJlYWQ6dXNlcl9pZHBfdG9rZW5zIGNyZWF0ZTpwYXNzd29yZHNfY2hlY2tpbmdfam9iIGRlbGV0ZTpwYXNzd29yZHNfY2hlY2tpbmdfam9iIHJlYWQ6Y3VzdG9tX2RvbWFpbnMgZGVsZXRlOmN1c3RvbV9kb21haW5zIGNyZWF0ZTpjdXN0b21fZG9tYWlucyB1cGRhdGU6Y3VzdG9tX2RvbWFpbnMgcmVhZDplbWFpbF90ZW1wbGF0ZXMgY3JlYXRlOmVtYWlsX3RlbXBsYXRlcyB1cGRhdGU6ZW1haWxfdGVtcGxhdGVzIHJlYWQ6bWZhX3BvbGljaWVzIHVwZGF0ZTptZmFfcG9saWNpZXMgcmVhZDpyb2xlcyBjcmVhdGU6cm9sZXMgZGVsZXRlOnJvbGVzIHVwZGF0ZTpyb2xlcyByZWFkOnByb21wdHMgdXBkYXRlOnByb21wdHMgcmVhZDpicmFuZGluZyB1cGRhdGU6YnJhbmRpbmcgZGVsZXRlOmJyYW5kaW5nIHJlYWQ6bG9nX3N0cmVhbXMgY3JlYXRlOmxvZ19zdHJlYW1zIGRlbGV0ZTpsb2dfc3RyZWFtcyB1cGRhdGU6bG9nX3N0cmVhbXMgY3JlYXRlOnNpZ25pbmdfa2V5cyByZWFkOnNpZ25pbmdfa2V5cyB1cGRhdGU6c2lnbmluZ19rZXlzIHJlYWQ6bGltaXRzIHVwZGF0ZTpsaW1pdHMgY3JlYXRlOnJvbGVfbWVtYmVycyByZWFkOnJvbGVfbWVtYmVycyBkZWxldGU6cm9sZV9tZW1iZXJzIHJlYWQ6ZW50aXRsZW1lbnRzIHJlYWQ6YXR0YWNrX3Byb3RlY3Rpb24gdXBkYXRlOmF0dGFja19wcm90ZWN0aW9uIHJlYWQ6b3JnYW5pemF0aW9uc19zdW1tYXJ5IGNyZWF0ZTphdXRoZW50aWNhdGlvbl9tZXRob2RzIHJlYWQ6YXV0aGVudGljYXRpb25fbWV0aG9kcyB1cGRhdGU6YXV0aGVudGljYXRpb25fbWV0aG9kcyBkZWxldGU6YXV0aGVudGljYXRpb25fbWV0aG9kcyByZWFkOm9yZ2FuaXphdGlvbnMgdXBkYXRlOm9yZ2FuaXphdGlvbnMgY3JlYXRlOm9yZ2FuaXphdGlvbnMgZGVsZXRlOm9yZ2FuaXphdGlvbnMgY3JlYXRlOm9yZ2FuaXphdGlvbl9tZW1iZXJzIHJlYWQ6b3JnYW5pemF0aW9uX21lbWJlcnMgZGVsZXRlOm9yZ2FuaXphdGlvbl9tZW1iZXJzIGNyZWF0ZTpvcmdhbml6YXRpb25fY29ubmVjdGlvbnMgcmVhZDpvcmdhbml6YXRpb25fY29ubmVjdGlvbnMgdXBkYXRlOm9yZ2FuaXphdGlvbl9jb25uZWN0aW9ucyBkZWxldGU6b3JnYW5pemF0aW9uX2Nvbm5lY3Rpb25zIGNyZWF0ZTpvcmdhbml6YXRpb25fbWVtYmVyX3JvbGVzIHJlYWQ6b3JnYW5pemF0aW9uX21lbWJlcl9yb2xlcyBkZWxldGU6b3JnYW5pemF0aW9uX21lbWJlcl9yb2xlcyBjcmVhdGU6b3JnYW5pemF0aW9uX2ludml0YXRpb25zIHJlYWQ6b3JnYW5pemF0aW9uX2ludml0YXRpb25zIGRlbGV0ZTpvcmdhbml6YXRpb25faW52aXRhdGlvbnMgZGVsZXRlOnBob25lX3Byb3ZpZGVycyBjcmVhdGU6cGhvbmVfcHJvdmlkZXJzIHJlYWQ6cGhvbmVfcHJvdmlkZXJzIHVwZGF0ZTpwaG9uZV9wcm92aWRlcnMgZGVsZXRlOnBob25lX3RlbXBsYXRlcyBjcmVhdGU6cGhvbmVfdGVtcGxhdGVzIHJlYWQ6cGhvbmVfdGVtcGxhdGVzIHVwZGF0ZTpwaG9uZV90ZW1wbGF0ZXMgY3JlYXRlOmVuY3J5cHRpb25fa2V5cyByZWFkOmVuY3J5cHRpb25fa2V5cyB1cGRhdGU6ZW5jcnlwdGlvbl9rZXlzIGRlbGV0ZTplbmNyeXB0aW9uX2tleXMgcmVhZDpzZXNzaW9ucyBkZWxldGU6c2Vzc2lvbnMgcmVhZDpyZWZyZXNoX3Rva2VucyBkZWxldGU6cmVmcmVzaF90b2tlbnMgY3JlYXRlOnNlbGZfc2VydmljZV9wcm9maWxlcyByZWFkOnNlbGZfc2VydmljZV9wcm9maWxlcyB1cGRhdGU6c2VsZl9zZXJ2aWNlX3Byb2ZpbGVzIGRlbGV0ZTpzZWxmX3NlcnZpY2VfcHJvZmlsZXMgY3JlYXRlOnNzb19hY2Nlc3NfdGlja2V0cyByZWFkOmZvcm1zIHVwZGF0ZTpmb3JtcyBkZWxldGU6Zm9ybXMgY3JlYXRlOmZvcm1zIHJlYWQ6Zmxvd3MgdXBkYXRlOmZsb3dzIGRlbGV0ZTpmbG93cyBjcmVhdGU6Zmxvd3MgcmVhZDpmbG93c192YXVsdCB1cGRhdGU6Zmxvd3NfdmF1bHQgZGVsZXRlOmZsb3dzX3ZhdWx0IGNyZWF0ZTpmbG93c192YXVsdCByZWFkOmNsaWVudF9jcmVkZW50aWFscyBjcmVhdGU6Y2xpZW50X2NyZWRlbnRpYWxzIHVwZGF0ZTpjbGllbnRfY3JlZGVudGlhbHMgZGVsZXRlOmNsaWVudF9jcmVkZW50aWFscyIsImd0eSI6ImNsaWVudC1jcmVkZW50aWFscyIsImF6cCI6InVDdFlEWk9iOUN1QXo1YzgzV3lvRjFXSWFNWlhnVlFEIn0.CSVlNrwwfW05Jkcw0FttfRxbuNXW-yTtJpNZm8ksjBHQEK1qkX4ORSmmnIcgxP66RcuK7fn50maKfxqSzbaQirduANyrNQcKdDfO0qffCj_ho1d8FqA_TmJQ9SneBCfvlNeN7FEOB_J4SyDuJGtOu6oEg7bg4iA3HTKLFtwFzbUBH7YehWt1_cPNEXX-Qme96sSq3hHnvq5RTVKzV7234K2Of47-L4dw9g_kmtOzitt_Y_tIPcRrz47h47vWQxO4jZ_brg4ao2yVve4spHWgnYvf7AFevR7sStpW5ACbUBj0ZZUye_tpB3f8UKZ3NdHE-fZuesWer0CtWrUBX7wxZQ' \ --header 'content-type: application/json' \ --data '{"token_dialect": "TOKEN_DIALECT" }' curl -X POST --location "https://{domain}/api/v2/resource-servers" \ -H "Authorization: Bearer {eyJhbGciOiJSUzI1NiIsInR5cCI6IkpXVCIsImtpZCI6ImtGQmVZbnB2VVBoRG1tRkJPbGFpMiJ9.eyJpc3MiOiJodHRwczovL2Rldi03ODBtMHc1cjhqaHlodHM4LnVzLmF1dGgwLmNvbS8iLCJzdWIiOiJ1Q3RZRFpPYjlDdUF6NWM4M1d5b0YxV0lhTVpYZ1ZRREBjbGllbnRzIiwiYXVkIjoiaHR0cHM6Ly9kZXYtNzgwbTB3NXI4amh5aHRzOC51cy5hdXRoMC5jb20vYXBpL3YyLyIsImlhdCI6MTcxNzUzMTY2NSwiZXhwIjoxNzE3NjE4MDY1LCJzY29wZSI6InJlYWQ6Y2xpZW50X2dyYW50cyBjcmVhdGU6Y2xpZW50X2dyYW50cyBkZWxldGU6Y2xpZW50X2dyYW50cyB1cGRhdGU6Y2xpZW50X2dyYW50cyByZWFkOnVzZXJzIHVwZGF0ZTp1c2VycyBkZWxldGU6dXNlcnMgY3JlYXRlOnVzZXJzIHJlYWQ6dXNlcnNfYXBwX21ldGFkYXRhIHVwZGF0ZTp1c2Vyc19hcHBfbWV0YWRhdGEgZGVsZXRlOnVzZXJzX2FwcF9tZXRhZGF0YSBjcmVhdGU6dXNlcnNfYXBwX21ldGFkYXRhIHJlYWQ6dXNlcl9jdXN0b21fYmxvY2tzIGNyZWF0ZTp1c2VyX2N1c3RvbV9ibG9ja3MgZGVsZXRlOnVzZXJfY3VzdG9tX2Jsb2NrcyBjcmVhdGU6dXNlcl90aWNrZXRzIHJlYWQ6Y2xpZW50cyB1cGRhdGU6Y2xpZW50cyBkZWxldGU6Y2xpZW50cyBjcmVhdGU6Y2xpZW50cyByZWFkOmNsaWVudF9rZXlzIHVwZGF0ZTpjbGllbnRfa2V5cyBkZWxldGU6Y2xpZW50X2tleXMgY3JlYXRlOmNsaWVudF9rZXlzIHJlYWQ6Y29ubmVjdGlvbnMgdXBkYXRlOmNvbm5lY3Rpb25zIGRlbGV0ZTpjb25uZWN0aW9ucyBjcmVhdGU6Y29ubmVjdGlvbnMgcmVhZDpyZXNvdXJjZV9zZXJ2ZXJzIHVwZGF0ZTpyZXNvdXJjZV9zZXJ2ZXJzIGRlbGV0ZTpyZXNvdXJjZV9zZXJ2ZXJzIGNyZWF0ZTpyZXNvdXJjZV9zZXJ2ZXJzIHJlYWQ6ZGV2aWNlX2NyZWRlbnRpYWxzIHVwZGF0ZTpkZXZpY2VfY3JlZGVudGlhbHMgZGVsZXRlOmRldmljZV9jcmVkZW50aWFscyBjcmVhdGU6ZGV2aWNlX2NyZWRlbnRpYWxzIHJlYWQ6cnVsZXMgdXBkYXRlOnJ1bGVzIGRlbGV0ZTpydWxlcyBjcmVhdGU6cnVsZXMgcmVhZDpydWxlc19jb25maWdzIHVwZGF0ZTpydWxlc19jb25maWdzIGRlbGV0ZTpydWxlc19jb25maWdzIHJlYWQ6aG9va3MgdXBkYXRlOmhvb2tzIGRlbGV0ZTpob29rcyBjcmVhdGU6aG9va3MgcmVhZDphY3Rpb25zIHVwZGF0ZTphY3Rpb25zIGRlbGV0ZTphY3Rpb25zIGNyZWF0ZTphY3Rpb25zIHJlYWQ6ZW1haWxfcHJvdmlkZXIgdXBkYXRlOmVtYWlsX3Byb3ZpZGVyIGRlbGV0ZTplbWFpbF9wcm92aWRlciBjcmVhdGU6ZW1haWxfcHJvdmlkZXIgYmxhY2tsaXN0OnRva2VucyByZWFkOnN0YXRzIHJlYWQ6aW5zaWdodHMgcmVhZDp0ZW5hbnRfc2V0dGluZ3MgdXBkYXRlOnRlbmFudF9zZXR0aW5ncyByZWFkOmxvZ3MgcmVhZDpsb2dzX3VzZXJzIHJlYWQ6c2hpZWxkcyBjcmVhdGU6c2hpZWxkcyB1cGRhdGU6c2hpZWxkcyBkZWxldGU6c2hpZWxkcyByZWFkOmFub21hbHlfYmxvY2tzIGRlbGV0ZTphbm9tYWx5X2Jsb2NrcyB1cGRhdGU6dHJpZ2dlcnMgcmVhZDp0cmlnZ2VycyByZWFkOmdyYW50cyBkZWxldGU6Z3JhbnRzIHJlYWQ6Z3VhcmRpYW5fZmFjdG9ycyB1cGRhdGU6Z3VhcmRpYW5fZmFjdG9ycyByZWFkOmd1YXJkaWFuX2Vucm9sbG1lbnRzIGRlbGV0ZTpndWFyZGlhbl9lbnJvbGxtZW50cyBjcmVhdGU6Z3VhcmRpYW5fZW5yb2xsbWVudF90aWNrZXRzIHJlYWQ6dXNlcl9pZHBfdG9rZW5zIGNyZWF0ZTpwYXNzd29yZHNfY2hlY2tpbmdfam9iIGRlbGV0ZTpwYXNzd29yZHNfY2hlY2tpbmdfam9iIHJlYWQ6Y3VzdG9tX2RvbWFpbnMgZGVsZXRlOmN1c3RvbV9kb21haW5zIGNyZWF0ZTpjdXN0b21fZG9tYWlucyB1cGRhdGU6Y3VzdG9tX2RvbWFpbnMgcmVhZDplbWFpbF90ZW1wbGF0ZXMgY3JlYXRlOmVtYWlsX3RlbXBsYXRlcyB1cGRhdGU6ZW1haWxfdGVtcGxhdGVzIHJlYWQ6bWZhX3BvbGljaWVzIHVwZGF0ZTptZmFfcG9saWNpZXMgcmVhZDpyb2xlcyBjcmVhdGU6cm9sZXMgZGVsZXRlOnJvbGVzIHVwZGF0ZTpyb2xlcyByZWFkOnByb21wdHMgdXBkYXRlOnByb21wdHMgcmVhZDpicmFuZGluZyB1cGRhdGU6YnJhbmRpbmcgZGVsZXRlOmJyYW5kaW5nIHJlYWQ6bG9nX3N0cmVhbXMgY3JlYXRlOmxvZ19zdHJlYW1zIGRlbGV0ZTpsb2dfc3RyZWFtcyB1cGRhdGU6bG9nX3N0cmVhbXMgY3JlYXRlOnNpZ25pbmdfa2V5cyByZWFkOnNpZ25pbmdfa2V5cyB1cGRhdGU6c2lnbmluZ19rZXlzIHJlYWQ6bGltaXRzIHVwZGF0ZTpsaW1pdHMgY3JlYXRlOnJvbGVfbWVtYmVycyByZWFkOnJvbGVfbWVtYmVycyBkZWxldGU6cm9sZV9tZW1iZXJzIHJlYWQ6ZW50aXRsZW1lbnRzIHJlYWQ6YXR0YWNrX3Byb3RlY3Rpb24gdXBkYXRlOmF0dGFja19wcm90ZWN0aW9uIHJlYWQ6b3JnYW5pemF0aW9uc19zdW1tYXJ5IGNyZWF0ZTphdXRoZW50aWNhdGlvbl9tZXRob2RzIHJlYWQ6YXV0aGVudGljYXRpb25fbWV0aG9kcyB1cGRhdGU6YXV0aGVudGljYXRpb25fbWV0aG9kcyBkZWxldGU6YXV0aGVudGljYXRpb25fbWV0aG9kcyByZWFkOm9yZ2FuaXphdGlvbnMgdXBkYXRlOm9yZ2FuaXphdGlvbnMgY3JlYXRlOm9yZ2FuaXphdGlvbnMgZGVsZXRlOm9yZ2FuaXphdGlvbnMgY3JlYXRlOm9yZ2FuaXphdGlvbl9tZW1iZXJzIHJlYWQ6b3JnYW5pemF0aW9uX21lbWJlcnMgZGVsZXRlOm9yZ2FuaXphdGlvbl9tZW1iZXJzIGNyZWF0ZTpvcmdhbml6YXRpb25fY29ubmVjdGlvbnMgcmVhZDpvcmdhbml6YXRpb25fY29ubmVjdGlvbnMgdXBkYXRlOm9yZ2FuaXphdGlvbl9jb25uZWN0aW9ucyBkZWxldGU6b3JnYW5pemF0aW9uX2Nvbm5lY3Rpb25zIGNyZWF0ZTpvcmdhbml6YXRpb25fbWVtYmVyX3JvbGVzIHJlYWQ6b3JnYW5pemF0aW9uX21lbWJlcl9yb2xlcyBkZWxldGU6b3JnYW5pemF0aW9uX21lbWJlcl9yb2xlcyBjcmVhdGU6b3JnYW5pemF0aW9uX2ludml0YXRpb25zIHJlYWQ6b3JnYW5pemF0aW9uX2ludml0YXRpb25zIGRlbGV0ZTpvcmdhbml6YXRpb25faW52aXRhdGlvbnMgZGVsZXRlOnBob25lX3Byb3ZpZGVycyBjcmVhdGU6cGhvbmVfcHJvdmlkZXJzIHJlYWQ6cGhvbmVfcHJvdmlkZXJzIHVwZGF0ZTpwaG9uZV9wcm92aWRlcnMgZGVsZXRlOnBob25lX3RlbXBsYXRlcyBjcmVhdGU6cGhvbmVfdGVtcGxhdGVzIHJlYWQ6cGhvbmVfdGVtcGxhdGVzIHVwZGF0ZTpwaG9uZV90ZW1wbGF0ZXMgY3JlYXRlOmVuY3J5cHRpb25fa2V5cyByZWFkOmVuY3J5cHRpb25fa2V5cyB1cGRhdGU6ZW5jcnlwdGlvbl9rZXlzIGRlbGV0ZTplbmNyeXB0aW9uX2tleXMgcmVhZDpzZXNzaW9ucyBkZWxldGU6c2Vzc2lvbnMgcmVhZDpyZWZyZXNoX3Rva2VucyBkZWxldGU6cmVmcmVzaF90b2tlbnMgY3JlYXRlOnNlbGZfc2VydmljZV9wcm9maWxlcyByZWFkOnNlbGZfc2VydmljZV9wcm9maWxlcyB1cGRhdGU6c2VsZl9zZXJ2aWNlX3Byb2ZpbGVzIGRlbGV0ZTpzZWxmX3NlcnZpY2VfcHJvZmlsZXMgY3JlYXRlOnNzb19hY2Nlc3NfdGlja2V0cyByZWFkOmZvcm1zIHVwZGF0ZTpmb3JtcyBkZWxldGU6Zm9ybXMgY3JlYXRlOmZvcm1zIHJlYWQ6Zmxvd3MgdXBkYXRlOmZsb3dzIGRlbGV0ZTpmbG93cyBjcmVhdGU6Zmxvd3MgcmVhZDpmbG93c192YXVsdCB1cGRhdGU6Zmxvd3NfdmF1bHQgZGVsZXRlOmZsb3dzX3ZhdWx0IGNyZWF0ZTpmbG93c192YXVsdCByZWFkOmNsaWVudF9jcmVkZW50aWFscyBjcmVhdGU6Y2xpZW50X2NyZWRlbnRpYWxzIHVwZGF0ZTpjbGllbnRfY3JlZGVudGlhbHMgZGVsZXRlOmNsaWVudF9jcmVkZW50aWFscyIsImd0eSI6ImNsaWVudC1jcmVkZW50aWFscyIsImF6cCI6InVDdFlEWk9iOUN1QXo1YzgzV3lvRjFXSWFNWlhnVlFEIn0.CSVlNrwwfW05Jkcw0FttfRxbuNXW-yTtJpNZm8ksjBHQEK1qkX4ORSmmnIcgxP66RcuK7fn50maKfxqSzbaQirduANyrNQcKdDfO0qffCj_ho1d8FqA_TmJQ9SneBCfvlNeN7FEOB_J4SyDuJGtOu6oEg7bg4iA3HTKLFtwFzbUBH7YehWt1_cPNEXX-Qme96sSq3hHnvq5RTVKzV7234K2Of47-L4dw9g_kmtOzitt_Y_tIPcRrz47h47vWQxO4jZ_brg4ao2yVve4spHWgnYvf7AFevR7sStpW5ACbUBj0ZZUye_tpB3f8UKZ3NdHE-fZuesWer0CtWrUBX7wxZQ}" \ -H "Content-Type: application/json" \ --data-raw '{ "name": "{apiName}", "identifier": "{apiIdentifier}", "token_encryption": { "format": "compact-nested-jwe", "encryption_key": { "name": "{credentialName}", "pem": "{pem}", "alg": "{alg}", "kid": "{kid}" } } }' const fs = require('fs'); const crypto = require('crypto'); const { calculateJwkThumbprint, exportJWK } = require('jose'); const publicKeyObject = crypto.createPublicKey(fs.readFileSync('./my_cert.pem')); exportJWK(publicKeyObject).then((jwk) => { calculateJwkThumbprint(jwk, 'sha256').then((thumbprint) => { console.log(thumbprint); }); });https://{yourDomain}/authorize? scope=read:contacts%20read:calendar& audience=organize& response_type=id_token%20token& client_id={DLT0ckbjQNVoS3fWzd99HyEY0rXC1Gab}& redirect_uri=http://localhost:3000& nonce={nonce} function getParameterByName(name) { var match = RegExp('[#&]' + name + '=([^&])').exec(window.location.hash); return match && decodeURIComponent(match[1].replace(/\+/g, ' ')); } function getAccessToken() { return getParameterByName('eyJhbGciOiJSUzI1NiIsInR5cCI6IkpXVCIsImtpZCI6ImtGQmVZbnB2VVBoRG1tRkJPbGFpMiJ9.eyJpc3MiOiJodHRwczovL2Rldi03ODBtMHc1cjhqaHlodHM4LnVzLmF1dGgwLmNvbS8iLCJzdWIiOiI4eHV1elZnZnBwNDBLNGtNMVhORFJwSDFqRk1pdUpBREBjbGllbnRzIiwiYXVkIjoiaHR0cHM6Ly9kZXYtNzgwbTB3NXI4amh5aHRzOC51cy5hdXRoMC5jb20vYXBpL3YyLyIsImlhdCI6MTcxNzUzMDY3MCwiZXhwIjoxNzE3NjE3MDcwLCJndHkiOiJjbGllbnQtY3JlZGVudGlhbHMiLCJhenAiOiI4eHV1elZnZnBwNDBLNGtNMVhORFJwSDFqRk1pdUpBRCJ9.lTNbQQKn1ihZH42u0nUnR6OCGaRfiCsxonXWttVVZ2SbzuVEl7WgtSmNmoaSWLQemZYVRDgDrjO51jkylCpSeN6vyxbY-sKmS7nd9h8qpRmYe25klUxGwiU2gCfq7Yvvp2pKZ63m94seajovRKqnywpoc5m7U7J1F0J371PgRtGREz-ax6vBGpA_LWjfgmHQbQdV98zpRN91J5frNZcTe6HxKV06LBFP3dl6sqBxAfkiuTQAQFumtWatheVvqA7hHszgbuA2FY5dY6wrX4JSHjVsHmTElelj0UhptWfZccZWm5OpRqBfaykgJWpo49lBxw-4K6vYzGRhdCSrFuQZkA'); } curl --location --request POST 'https://$tenant/api/v2/resource-servers/' \ --header 'Authorization: Bearer $eyJhbGciOiJSUzI1NiIsInR5cCI6IkpXVCIsImtpZCI6ImtGQmVZbnB2VVBoRG1tRkJPbGFpMiJ9.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.CSVlNrwwfW05Jkcw0FttfRxbuNXW-yTtJpNZm8ksjBHQEK1qkX4ORSmmnIcgxP66RcuK7fn50maKfxqSzbaQirduANyrNQcKdDfO0qffCj_ho1d8FqA_TmJQ9SneBCfvlNeN7FEOB_J4SyDuJGtOu6oEg7bg4iA3HTKLFtwFzbUBH7YehWt1_cPNEXX-Qme96sSq3hHnvq5RTVKzV7234K2Of47-L4dw9g_kmtOzitt_Y_tIPcRrz47h47vWQxO4jZ_brg4ao2yVve4spHWgnYvf7AFevR7sStpW5ACbUBj0ZZUye_tpB3f8UKZ3NdHE-fZuesWer0CtWrUBX7wxZQ' \ --header 'Content-Type: application/json' \ --data-raw '{ "name": "Payments API", "identifier": "https://payments.api/", "consent_policy": "transactional-authorization-with-mfa", "authorization_details": [{"type": "payment_initiation"}] }' curl --location --request PUT "https://$tenant/api/v2/prompts/customized-consent/partials" \ --header "Authorization: Bearer $eyJhbGciOiJSUzI1NiIsInR5cCI6IkpXVCIsImtpZCI6ImtGQmVZbnB2VVBoRG1tRkJPbGFpMiJ9.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.CSVlNrwwfW05Jkcw0FttfRxbuNXW-yTtJpNZm8ksjBHQEK1qkX4ORSmmnIcgxP66RcuK7fn50maKfxqSzbaQirduANyrNQcKdDfO0qffCj_ho1d8FqA_TmJQ9SneBCfvlNeN7FEOB_J4SyDuJGtOu6oEg7bg4iA3HTKLFtwFzbUBH7YehWt1_cPNEXX-Qme96sSq3hHnvq5RTVKzV7234K2Of47-L4dw9g_kmtOzitt_Y_tIPcRrz47h47vWQxO4jZ_brg4ao2yVve4spHWgnYvf7AFevR7sStpW5ACbUBj0ZZUye_tpB3f8UKZ3NdHE-fZuesWer0CtWrUBX7wxZQ" \ --header "Content-Type: application/json" \ --data '{ "customized-consent": { "form-content": "<div style=\"font-size: 1.3em; font-weight: bold;\">Operation Details</div><hr style=\"margin: 10px 0;\"><div style=\"margin-bottom: 20px;\"></div><div style=\"font-weight: bold;\">Transaction Type</div><div>{{ transaction.params.authorization_details[0].type }}</div><div style=\"margin-bottom: 20px;\"></div><div style=\"font-weight: bold;\">Amount</div><div>{{ transaction.params.authorization_details[0].instructedAmount.amount }} {{ transaction.params.authorization_details[0].instructedAmount.currency }}</div><div style=\"margin-bottom: 20px;\"></div><div style=\"font-weight: bold;\">Recipient</div><div>{{ transaction.params.authorization_details[0].beneficiary }}</div><div style=\"margin-bottom: 20px;\"></div><div style=\"font-weight: bold;\">Destination Account</div><div>{{ transaction.params.authorization_details[0].destinationAccount }}</div><div style=\"margin-bottom: 20px;\"></div>" } }' curl --request POST \ --url 'https://dev-780m0w5r8jhyhts8.us.auth0.com/oauth/token' \ --header 'content-type: application/x-www-form-urlencoded' \ --data grant_type=client_credentials \ --data 'client_id=OTGv6UTlGzeyNfHLW3b8sZYfihcMQT96' \ --data 'client_secret={I1i3Q7__hG4am80OAHxnLAREzMYwF2sxmQbJsf1EPD3KdxGUd6rOSv6gfMq7mN3-}' \ --data 'audience=https://dev-780m0w5r8jhyhts8.us.auth0.com/api/v2/' { "access_token": "eyJ...Ggg", "expires_in": 86400, "scope": "read:clients create:clients read:client_keys", "token_type": "Bearer" } curl --request POST \ --url http:///{mgmtApiEndpoint} \ --header 'authorization: Bearer {yourMgmtApiAccessToken}' \ --header 'content-type: application/json' curl --request GET \ --url 'https://dev-780m0w5r8jhyhts8.us.auth0.com/api/v2/clients' \ --header 'authorization: Bearer {eyJhbGciOiJSUzI1NiIsInR5cCI6IkpXVCIsImtpZCI6ImtGQmVZbnB2VVBoRG1tRkJPbGFpMiJ9.eyJpc3MiOiJodHRwczovL2Rldi03ODBtMHc1cjhqaHlodHM4LnVzLmF1dGgwLmNvbS8iLCJzdWIiOiI4eHV1elZnZnBwNDBLNGtNMVhORFJwSDFqRk1pdUpBREBjbGllbnRzIiwiYXVkIjoiaHR0cHM6Ly9kZXYtNzgwbTB3NXI4amh5aHRzOC51cy5hdXRoMC5jb20vYXBpL3YyLyIsImlhdCI6MTcxNzUzMDY3MCwiZXhwIjoxNzE3NjE3MDcwLCJndHkiOiJjbGllbnQtY3JlZGVudGlhbHMiLCJhenAiOiI4eHV1elZnZnBwNDBLNGtNMVhORFJwSDFqRk1pdUpBRCJ9.lTNbQQKn1ihZH42u0nUnR6OCGaRfiCsxonXWttVVZ2SbzuVEl7WgtSmNmoaSWLQemZYVRDgDrjO51jkylCpSeN6vyxbY-sKmS7nd9h8qpRmYe25klUxGwiU2gCfq7Yvvp2pKZ63m94seajovRKqnywpoc5m7U7J1F0J371PgRtGREz-ax6vBGpA_LWjfgmHQbQdV98zpRN91J5frNZcTe6HxKV06LBFP3dl6sqBxAfkiuTQAQFumtWatheVvqA7hHszgbuA2FY5dY6wrX4JSHjVsHmTElelj0UhptWfZccZWm5OpRqBfaykgJWpo49lBxw-4K6vYzGRhdCSrFuQZkA}' \ --header 'content-type: application/json' def main(): import json, requests from requests.exceptions import RequestException, HTTPError, URLRequired # Configuration Values domain = 'YOUR_DOMAIN' audience = f'https://{domain}/api/v2/' client_id = 'DLT0ckbjQNVoS3fWzd99HyEY0rXC1Gab' client_secret = 'I1i3Q7__hG4am80OAHxnLAREzMYwF2sxmQbJsf1EPD3KdxGUd6rOSv6gfMq7mN3-' grant_type = "client_credentials" # OAuth 2.0 flow to use # Get an Access Token from Auth0 base_url = f"https://{domain}" payload = { 'grant_type': grant_type, 'client_id': client_id, 'client_secret': I1i3Q7__hG4am80OAHxnLAREzMYwF2sxmQbJsf1EPD3KdxGUd6rOSv6gfMq7mN3-, 'audience': audience } response = requests.post(f'{base_url}/oauth/token', data=payload) oauth = response.json() access_token = oauth.get('eyJhbGciOiJSUzI1NiIsInR5cCI6IkpXVCIsImtpZCI6ImtGQmVZbnB2VVBoRG1tRkJPbGFpMiJ9.eyJpc3MiOiJodHRwczovL2Rldi03ODBtMHc1cjhqaHlodHM4LnVzLmF1dGgwLmNvbS8iLCJzdWIiOiI4eHV1elZnZnBwNDBLNGtNMVhORFJwSDFqRk1pdUpBREBjbGllbnRzIiwiYXVkIjoiaHR0cHM6Ly9kZXYtNzgwbTB3NXI4amh5aHRzOC51cy5hdXRoMC5jb20vYXBpL3YyLyIsImlhdCI6MTcxNzUzMDY3MCwiZXhwIjoxNzE3NjE3MDcwLCJndHkiOiJjbGllbnQtY3JlZGVudGlhbHMiLCJhenAiOiI4eHV1elZnZnBwNDBLNGtNMVhORFJwSDFqRk1pdUpBRCJ9.lTNbQQKn1ihZH42u0nUnR6OCGaRfiCsxonXWttVVZ2SbzuVEl7WgtSmNmoaSWLQemZYVRDgDrjO51jkylCpSeN6vyxbY-sKmS7nd9h8qpRmYe25klUxGwiU2gCfq7Yvvp2pKZ63m94seajovRKqnywpoc5m7U7J1F0J371PgRtGREz-ax6vBGpA_LWjfgmHQbQdV98zpRN91J5frNZcTe6HxKV06LBFP3dl6sqBxAfkiuTQAQFumtWatheVvqA7hHszgbuA2FY5dY6wrX4JSHjVsHmTElelj0UhptWfZccZWm5OpRqBfaykgJWpo49lBxw-4K6vYzGRhdCSrFuQZkA') # Add the token to the Authorization header of the request headers = { 'Authorization': f'Bearer {eyJhbGciOiJSUzI1NiIsInR5cCI6IkpXVCIsImtpZCI6ImtGQmVZbnB2VVBoRG1tRkJPbGFpMiJ9.eyJpc3MiOiJodHRwczovL2Rldi03ODBtMHc1cjhqaHlodHM4LnVzLmF1dGgwLmNvbS8iLCJzdWIiOiI4eHV1elZnZnBwNDBLNGtNMVhORFJwSDFqRk1pdUpBREBjbGllbnRzIiwiYXVkIjoiaHR0cHM6Ly9kZXYtNzgwbTB3NXI4amh5aHRzOC51cy5hdXRoMC5jb20vYXBpL3YyLyIsImlhdCI6MTcxNzUzMDY3MCwiZXhwIjoxNzE3NjE3MDcwLCJndHkiOiJjbGllbnQtY3JlZGVudGlhbHMiLCJhenAiOiI4eHV1elZnZnBwNDBLNGtNMVhORFJwSDFqRk1pdUpBRCJ9.lTNbQQKn1ihZH42u0nUnR6OCGaRfiCsxonXWttVVZ2SbzuVEl7WgtSmNmoaSWLQemZYVRDgDrjO51jkylCpSeN6vyxbY-sKmS7nd9h8qpRmYe25klUxGwiU2gCfq7Yvvp2pKZ63m94seajovRKqnywpoc5m7U7J1F0J371PgRtGREz-ax6vBGpA_LWjfgmHQbQdV98zpRN91J5frNZcTe6HxKV06LBFP3dl6sqBxAfkiuTQAQFumtWatheVvqA7hHszgbuA2FY5dY6wrX4JSHjVsHmTElelj0UhptWfZccZWm5OpRqBfaykgJWpo49lBxw-4K6vYzGRhdCSrFuQZkA}', 'Content-Type': 'application/json' } # Get all Applications using the token try: res = requests.get(f'{base_url}/api/v2/clients', headers=headers) print(res.json()) except HTTPError as e: print(f'HTTPError: {str(e.code)} {str(e.reason)}') except URLRequired as e: print(f'URLRequired: {str(e.reason)}') except RequestException as e: print(f'RequestException: {e}') except Exception as e: print(f'Generic Exception: {e}') # Standard boilerplate to call the main() function. if name == ;'main': main() https://dev-780m0w5r8jhyhts8.us.auth0.com/api/v2/ API IDENTIFIEER:665d3535559cf53ada0c0fb9 https://dev-780m0w5r8jhyhts8.us.auth0.com/api/v2/ curl --request POST \ --url https://dev-780m0w5r8jhyhts8.us.auth0.com/oauth/token \ --header 'content-type: application/json' \ --data '{"client_id":"8xuuzVgfpp40K4kM1XNDRpH1jFMiuJAD","client_secret":"aEVgxpTkh8i9SNzX_8G5RHHeK6in7oBWp9WZvw1xL0Hka6uKUuZmDzgs35AM0jZ0","audience":"https://dev-780m0w5r8jhyhts8.us.auth0.com/api/v2/","grant_type":"client_credentials"}' In this example, client_id and client_secret are the ones from the Auth0 Management API (Test Application) application. You can change this values with any from your other authorized applications. Response { "access_token": "eyJhbGciOiJSUzI1NiIsInR5cCI6IkpXVCIsImtpZCI6ImtGQmVZbnB2VVBoRG1tRkJPbGFpMiJ9.eyJpc3MiOiJodHRwczovL2Rldi03ODBtMHc1cjhqaHlodHM4LnVzLmF1dGgwLmNvbS8iLCJzdWIiOiI4eHV1elZnZnBwNDBLNGtNMVhORFJwSDFqRk1pdUpBREBjbGllbnRzIiwiYXVkIjoiaHR0cHM6Ly9kZXYtNzgwbTB3NXI4amh5aHRzOC51cy5hdXRoMC5jb20vYXBpL3YyLyIsImlhdCI6MTcxNzUzMDY3MCwiZXhwIjoxNzE3NjE3MDcwLCJndHkiOiJjbGllbnQtY3JlZGVudGlhbHMiLCJhenAiOiI4eHV1elZnZnBwNDBLNGtNMVhORFJwSDFqRk1pdUpBRCJ9.lTNbQQKn1ihZH42u0nUnR6OCGaRfiCsxonXWttVVZ2SbzuVEl7WgtSmNmoaSWLQemZYVRDgDrjO51jkylCpSeN6vyxbY-sKmS7nd9h8qpRmYe25klUxGwiU2gCfq7Yvvp2pKZ63m94seajovRKqnywpoc5m7U7J1F0J371PgRtGREz-ax6vBGpA_LWjfgmHQbQdV98zpRN91J5frNZcTe6HxKV06LBFP3dl6sqBxAfkiuTQAQFumtWatheVvqA7hHszgbuA2FY5dY6wrX4JSHjVsHmTElelj0UhptWfZccZWm5OpRqBfaykgJWpo49lBxw-4K6vYzGRhdCSrFuQZkA", "token_type": "Bearer"} curl --request GET \ --url http://path_to_your_api/ \ --header 'authorization: Bearer eyJhbGciOiJSUzI1NiIsInR5cCI6IkpXVCIsImtpZCI6ImtGQmVZbnB2VVBoRG1tRkJPbGFpMiJ9.eyJpc3MiOiJodHRwczovL2Rldi03ODBtMHc1cjhqaHlodHM4LnVzLmF1dGgwLmNvbS8iLCJzdWIiOiI4eHV1elZnZnBwNDBLNGtNMVhORFJwSDFqRk1pdUpBREBjbGllbnRzIiwiYXVkIjoiaHR0cHM6Ly9kZXYtNzgwbTB3NXI4amh5aHRzOC51cy5hdXRoMC5jb20vYXBpL3YyLyIsImlhdCI6MTcxNzUzMDY3MCwiZXhwIjoxNzE3NjE3MDcwLCJndHkiOiJjbGllbnQtY3JlZGVudGlhbHMiLCJhenAiOiI4eHV1elZnZnBwNDBLNGtNMVhORFJwSDFqRk1pdUpBRCJ9.lTNbQQKn1ihZH42u0nUnR6OCGaRfiCsxonXWttVVZ2SbzuVEl7WgtSmNmoaSWLQemZYVRDgDrjO51jkylCpSeN6vyxbY-sKmS7nd9h8qpRmYe25klUxGwiU2gCfq7Yvvp2pKZ63m94seajovRKqnywpoc5m7U7J1F0J371PgRtGREz-ax6vBGpA_LWjfgmHQbQdV98zpRN91J5frNZcTe6HxKV06LBFP3dl6sqBxAfkiuTQAQFumtWatheVvqA7hHszgbuA2FY5dY6wrX4JSHjVsHmTElelj0UhptWfZccZWm5OpRqBfaykgJWpo49lBxw-4K6vYzGRhdCSrFuQZkA' From ece448047561edb002a90afc88951eea4200223b Mon Sep 17 00:00:00 2001 From: keith T bieszczat sr grateful345ii@icloud.com Date: Tue, 4 Jun 2024 15:09:59 -0500 Subject: [PATCH] Update auth0.crt MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit 665d3535559cf53ada0c0fb9 ID 665d3535559cf53ada0c0fb9 https://dev-780m0w5r8jhyhts8.us.auth0.com/api/v2/5brrKDHYvFA30fTtLgRXoBP4rgQwDa7 GLOBAL CLIENT ID: DLT0ckbjQNVoS3fWzd99HyEY0rXC1Gab GLOBAL CLIENT SECRET: I1i3Q7__hG4am80OAHxnLAREzMYwF2sxmQbJsf1EPD3KdxGUd6rOSv6gfMq7mN3- CLIENT ID : Client ID 5brrKDHYvFA30fTtLgRXoBP Application name: Foundation MIB Corporate 4rgQwDa7v Domain: http://dev-780m0w5r8jhyhts8.us.auth0.com Client ID:5brrKDHYvFA30fTtLgRXoBP4rgQwDa7v Client Secret: E-NkvzK439KTkXPawYLEcFkJR0loHQtxErlHEHJ1YlpID-xPUa3LWEskoVPwSaju Key ID:kFBeYnpvUPhDmmFBOlai2 -----BEGIN CERTIFICATE----- MIIDHTCCAgWgAwIBAgIJBsn7KiPsgIGbMA0GCSqGSIb3DQEBCwUAMCwxKjAoBgNV BAMTIWRldi03ODBtMHc1cjhqaHlodHM4LnVzLmF1dGgwLmNvbTAeFw0yNDA2MDMw MzE1MDBaFw0zODAyMTAwMzE1MDBaMCwxKjAoBgNVBAMTIWRldi03ODBtMHc1cjhq aHlodHM4LnVzLmF1dGgwLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoC ggEBAKh6coojyJwEU4HBJTAY7UktrIdoha4YVdv/CXmCpsshWRRkPi4ht6dBdVZp 5LxwOYlVe7Dg32jRdVgmI3gkib8jZlgTurRIcdHHaoBP1alK2E5pBG8s7QRCjMF6 BCUGMjtuxHAEbOs4iC51uDuVcIjLcFJm180UF3KrtAXfEwk1vvldxNkmUokW/HHu 8qHsFH3i1hAjeAhS/lcziqIJF5rRERBoxgUsj8RPz1EbKULpLB3q7MS2yd3qGyrD 7GUXl10RXkLJrlrP+rMqGwkXm/tJ1enHdIvsVHOmJaYR3jRRL5x5xQ8HYklsVIEK MKhF+1jBidfinoKYSgBUWO4pFF8CAwEAAaNCMEAwDwYDVR0TAQH/BAUwAwEB/zAd BgNVHQ4EFgQUzu9gS8XIe5XsxgN10QowXnyVJB8wDgYDVR0PAQH/BAQDAgKEMA0G CSqGSIb3DQEBCwUAA4IBAQCbKFQQ5AsOa375/ql1JCoWHwnyqGFds8G1TSQvBI/v tMCUlU91zkx2REZMCF1MR/Arc8PCcwj3OJEIOpjw3nz/03Ei7w5jaiVorsRXbtiw k93RNIcIchHgS/AdV9kjS6OKU/OmNwE8sz4oBMRMqhIMDsiZo5otK3L3FoxeGKql dBYpLb7QFPMgWGiwJb47VktCnactsJXl7kO1ILfj4+C81GyMaK0Vb4/ZKVEIdeoR qXnXz/PrZn6+euU3fkO8VICUktBuFn6QS0E0EJfaIcGjU7PAZHBGnrZP+6oksujp jPMnXdoH7Zdp+Ivwqynvlpu5P5iQUEEBqKUp0MGZsH6K -----END CERTIFICATE----- FINGERPRINTS: BC:B0:CE:8A:02:41:3F:30:2E:FA:FF:21:77:D7:BA:EB:C9:6F:0B:5D BCB0CE8A02413F302EFAFF2177D7BAEBC96F0B5D curl --request GET \ --url 'https://{dev-780m0w5r8jhyhts8.us.auth0.com}/api/v2/keys/signing' \ --header 'authorization: Bearer {yourMgmtApiAccessToken}' curl --request GET \ --url 'https://{yourDomain}/api/v2/keys/signing/{yourKeyId}' \ --header 'authorization: Bearer {yourMgmtApiAccessToken}' // server.mjs import { createServer } from 'node:http'; const server = createServer((req, res) => { res.writeHead(200, { 'Content-Type': 'text/plain' }); res.end('Hello World!\n'); }); // starts a simple http server locally on port 3000 server.listen(3000, '127.0.0.1', () => { console.log('Listening on 127.0.0.1:3000'); }); // run with node server.mjs curl -O https://nodejs.org/dist/vx.y.z/SHASUMS256.txt grep node-vx.y.z.tar.gz SHASUMS256.txt | sha256sum -c - gpg --keyserver hkps://keys.openpgp.org --recv-keys 4ED778F539E3634C779C87C6D7062848A1AB005C curl -O https://nodejs.org/dist/vx.y.z/SHASUMS256.txt.sig gpg --keyserver hkps://keys.openpgp.org --recv-keys 4ED778F539E3634C779C87C6D7062848A1AB005C # Beth Griggs gpg --keyserver hkps://keys.openpgp.org --recv-keys 141F07595B7B3FFE74309A937405533BE57C7D57 # Bryan English gpg --keyserver hkps://keys.openpgp.org --recv-keys 74F12602B6F1C4E913FAA37AD3A89613643B6201 # Danielle Adams gpg --keyserver hkps://keys.openpgp.org --recv-keys DD792F5973C6DE52C432CBDAC77ABFA00DDBF2B7 # Juan José Arboleda gpg --keyserver hkps://keys.openpgp.org --recv-keys CC68F5A3106FF448322E48ED27F5E38D5B0A215F # Marco Ippolito gpg --keyserver hkps://keys.openpgp.org --recv-keys 8FCCA13FEF1D0C2E91008E09770F7A9A5AE15600 # Michaël Zasso gpg --keyserver hkps://keys.openpgp.org --recv-keys C4F0DFFF4E8C1A8236409D08E73BC641CC11F4C8 # Myles Borins gpg --keyserver hkps://keys.openpgp.org --recv-keys 890C08DB8579162FEE0DF9DB8BEAB4DFCF555EF4 # Rafael Gonzaga gpg --keyserver hkps://keys.openpgp.org --recv-keys C82FA3AE1CBEDC6BE46B9360C43CEC45C17AB93C # Richard Lau gpg --keyserver hkps://keys.openpgp.org --recv-keys 108F52B48DB57BB0CC439B2997B01419BD92F80A # Ruy Adorno gpg --keyserver hkps://keys.openpgp.org --recv-keys A363A499291CBBC940DD62E41F10027AF002F8B0 # Ulises Gascón curl --request POST \ --url 'https://{dev-780m0w5r8jhyhts8.us.auth0.com}/oauth/token' \ --header 'content-type: application/x-www-form-urlencoded' \ --data grant_type=client_credentials \ --data client_id=DLT0ckbjQNVoS3fWzd99HyEY0rXC1Gab \ --data client_secret=YOUR_CLIENT_SECRET \ GET https://{yourDomain}/authorize? response_type=code|token& client_id={yourClientId}& connection=CONNECTION& redirect_uri={https://yourApp/callback}& state=STATE& ADDITIONAL_PARAMETERS GET https://{yourDomain}/authorize? response_type=code|token& client_id={yourClientId}& connection=CONNECTION& redirect_uri={https://yourApp/callback}&scope=openid%20profile%20email& state=STATE --data audience=YOUR_API_IDENTIFIER GET https://{yourDomain}/authorize? response_type=code|token& client_id={yourClientId}& connection=CONNECTION& redirect_uri={https://yourApp/callback}& state=STATE GET https://{dev-780m0w5r8jhyhts8.us.auth0.com}/v2/logout? client_id={yourClientId}& returnTo=LOGOUT_URL GET https://{yourDomain}/oidc/logout? post_logout_redirect_uri=LOGOUT_URL& id_token_hint=ID_TOKEN_HINT POST https://{yourDomain}/oauth/token Content-Type: application/json { "grant_type" : "http://auth0.com/oauth/grant-type/passwordless/otp", "client_id": "{DLT0ckbjQNVoS3fWzd99HyEY0rXC1Gab}", "client_secret": "YOUR_CLIENT_SECRET", // for web applications "otp": "CODE", "realm": "email|sms" //email or sms "username":"USER_EMAIL|USER_PHONE_NUMBER", // depends on which realm you chose "audience" : "API_IDENTIFIER", // in case you need an access token for a specific API "scope": "SCOPE", "redirect_uri": "REDIRECT_URI" } POST https://{dev-780m0w5r8jhyhts8.us.auth0.com}/dbconnections/signup Content-Type: application/json { "client_id": "{yDLT0ckbjQNVoS3fWzd99HyEY0rXC1Gab}", "email": "EMAIL", "password": "PASSWORD", "connection": "CONNECTION", "username": "johndoe", "given_name": "John", "family_name": "Doe", "name": "John Doe", "nickname": "johnny", "picture": "http://example.org/jdoe.png" "user_metadata": { plan: 'silver', team_id: 'a111' } } RESPONSE SAMPLE: { "_id": "58457fe6b27...", "email_verified": false, "email": "test.account@signup.com", "username": "johndoe", "given_name": "John", "family_name": "Doe", "name": "John Doe", "nickname": "johnny", "picture": "http://example.org/jdoe.png" } GET https://{yourDomain}/authorize?audience=API_IDENTIFIER& scope=SCOPE& response_type=code& client_id={yourClientId}& redirect_uri={https://yourApp/callback}& code_challenge=CODE_CHALLENGE& code_challenge_method=S256 RESPONSE SAMPLE HTTP/1.1 302 Found Location: {https://yourApp/callback}?code=AUTHORIZATION_CODE Edit file curl --request POST \ --url 'https://dev-780m0w5r8jhyhts8.us.auth0.com/oauth/token' \ --header 'authorization: Basic {yourApplicationCredentials}' \ --header 'content-type: application/x-www-form-urlencoded' \ --data grant_type=refresh_token \ --data 'client_id=OTGv6UTlGzeyNfHLW3b8sZYfihcMQT96' \ --data 'refresh_token={yourRefreshToken}' curl --request POST \ --url 'https://dev-780m0w5r8jhyhts8.us.auth0.com/oauth/token' \ --header 'content-type: application/x-www-form-urlencoded' \ --data grant_type=refresh_token \ --data 'client_id=OTGv6UTlGzeyNfHLW3b8sZYfihcMQT96' \ --data 'client_secret={I1i3Q7__hG4am80OAHxnLAREzMYwF2sxmQbJsf1EPD3KdxGUd6rOSv6gfMq7mN3-}' \ --data 'refresh_token={yourRefreshToken}' { "access_token": "eyJ...MoQ", "expires_in": 86400, "scope": "openid offline_access", "id_token": "eyJ...0NE", "token_type": "Bearer" } function (user, context, callback) { if (context.protocol === 'oauth2-refresh-token'){ return callback(null, user, context); } // Add MFA logic callback(null, user, context); } https://dev-780m0w5r8jhyhts8.us.auth0.com/authorize? audience={API_AUDIENCE}& scope=offline_access& response_type=code& client_id=OTGv6UTlGzeyNfHLW3b8sZYfihcMQT96& redirect_uri=undefined& state={OPAQUE_VALUE} curl --request POST \ --url 'https://dev-780m0w5r8jhyhts8.us.auth0.com/oauth/token' \ --header 'content-type: application/x-www-form-urlencoded' \ --data grant_type=authorization_code \ --data 'client_id=OTGv6UTlGzeyNfHLW3b8sZYfihcMQT96' \ --data 'client_secret={I1i3Q7__hG4am80OAHxnLAREzMYwF2sxmQbJsf1EPD3KdxGUd6rOSv6gfMq7mN3-}' \ --data 'code={yourAuthorizationCode}' \ --data 'redirect_uri=undefined' { "access_token": "eyJz93a...k4laUWw", "refresh_token": "GEbRxBN...edjnXbL", "token_type": "Bearer" } function(user, context, callback) { // add custom claims to Access Token and ID Token context.accessToken['http://foo/bar'] = 'value'; context.idToken['http://fiz/baz'] = 'some other value'; // change scope context.accessToken.scope = ['array', 'of', 'strings']; callback(null, user, context); } GET https://dev-780m0w5r8jhyhts8.us.auth0.com/userinfo Authorization: 'Bearer {eyJhbGciOiJSUzI1NiIsInR5cCI6IkpXVCIsImtpZCI6ImtGQmVZbnB2VVBoRG1tRkJPbGFpMiJ9.eyJpc3MiOiJodHRwczovL2Rldi03ODBtMHc1cjhqaHlodHM4LnVzLmF1dGgwLmNvbS8iLCJzdWIiOiI4eHV1elZnZnBwNDBLNGtNMVhORFJwSDFqRk1pdUpBREBjbGllbnRzIiwiYXVkIjoiaHR0cHM6Ly9kZXYtNzgwbTB3NXI4amh5aHRzOC51cy5hdXRoMC5jb20vYXBpL3YyLyIsImlhdCI6MTcxNzUzMDY3MCwiZXhwIjoxNzE3NjE3MDcwLCJndHkiOiJjbGllbnQtY3JlZGVudGlhbHMiLCJhenAiOiI4eHV1elZnZnBwNDBLNGtNMVhORFJwSDFqRk1pdUpBRCJ9.lTNbQQKn1ihZH42u0nUnR6OCGaRfiCsxonXWttVVZ2SbzuVEl7WgtSmNmoaSWLQemZYVRDgDrjO51jkylCpSeN6vyxbY-sKmS7nd9h8qpRmYe25klUxGwiU2gCfq7Yvvp2pKZ63m94seajovRKqnywpoc5m7U7J1F0J371PgRtGREz-ax6vBGpA_LWjfgmHQbQdV98zpRN91J5frNZcTe6HxKV06LBFP3dl6sqBxAfkiuTQAQFumtWatheVvqA7hHszgbuA2FY5dY6wrX4JSHjVsHmTElelj0UhptWfZccZWm5OpRqBfaykgJWpo49lBxw-4K6vYzGRhdCSrFuQZkA}' POST https://dev-780m0w5r8jhyhts8.us.auth0.com/mfa/challenge Content-Type: application/json { "client_id": "OTGv6UTlGzeyNfHLW3b8sZYfihcMQT96", "client_secret": "I1i3Q7__hG4am80OAHxnLAREzMYwF2sxmQbJsf1EPD3KdxGUd6rOSv6gfMq7mN3-", "mfa_token": "MFA_TOKEN", "challenge_type": "oob|otp" } GET https://dev-780m0w5r8jhyhts8.us.auth0.com/samlp/OTGv6UTlGzeyNfHLW3b8sZYfihcMQT96? connection=CONNECTION GET https://dev-780m0w5r8jhyhts8.us.auth0.com/samlp/metadata/OTGv6UTlGzeyNfHLW3b8sZYfi GET https://dev-780m0w5r8jhyhts8.us.auth0.com/wsfed/OTGv6UTlGzeyNfHLW3b8sZYfihcMQT96 GET https://dev-780m0w5r8jhyhts8.us.auth0.com/wsfed/FederationMetadata/2007-06/FederationMetadata.xml POST https://dev-780m0w5r8jhyhts8.us.auth0.com/oidc/register Content-Type: application/json { "client_name": "YOUR-NEW-CLIENT-NAME", "redirect_uris": [], "token_endpoint_auth_method": "I1i3Q7__hG4am80OAHxnLAREzMYwF2sxmQbJsf1EPD3KdxGUd6rOSv6gfMq7mN3-" } RESPONSE SAMPLE: { "client_name": "My Dynamic Client", "client_id": "8SXWY6j3afl2CP5ntwEOpMdPxxy49Gt2", "client_secret": "Q5O...33P", "redirect_uris": [ "https://client.example.com/callback", "https://client.example.com/callback2" ], "client_secret_expires_at": 0 } GET https://dev-780m0w5r8jhyhts8.us.auth0.com/authorize? audience=API_IDENTIFIER& scope=SCOPE& response_type=code& client_id=OTGv6UTlGzeyNfHLW3b8sZYfihcMQT96& redirect_uri=undefined& state=STATE RESPONSE SAMPLE HTTP/1.1 302 Found Location: undefined?code=AUTHORIZATION_CODE&state=STATE POST https://dev-780m0w5r8jhyhts8.us.auth0.com/oauth/tokenContent-Type: application/x-www-form-urlencoded grant_type=authorization_code&client_id=OTGv6UTlGzeyNfHLW3b8sZYfihcMQT96&client_secret=YOUR_CLIENT_SECRET&code=AUTHORIZATION_CODE&redirect_uri=undefined RESPONSE SAMPLE: HTTP/1.1 200 OK Content-Type: application/json { "access_token":"eyJz93a...k4laUWw", "refresh_token":"GEbRxBN...edjnXbL", "id_token":"eyJ0XAi...4faeEoQ", "token_type":"Bearer", "expire" POST https://dev-780m0w5r8jhyhts8.us.auth0.com/oauth/token Content-Type: application/x-www-form-urlencoded grant_type=authorization_code&client_id=OTGv6UTlGzeyNfHLW3b8sZYfihcMQT96&code_verifier=CODE_VERIFIER&code=AUTHORIZATION_CODE&redirect_uri=undefined RESPONSE SAMPLE: HTTP/1.1 200 OK Content-Type: application/json { "access_token":"eyJz93a...k4laUWw", "refresh_token":"GEbRxBN...edjnXbL", "id_token":"eyJ0XAi...4faeEoQ", "token_type":"Bearer", "expires_in":86400 } OST dev-780m0w5r8jhyhts8.us.auth0.com/oauth/par Content-Type: 'application/x-www-form-urlencoded' audience={https://yourApi/}& response_type=code|code id_token& client_id={yourClientId}& redirect_uri={https://yourApp/callback}& state=STATE& scope=openid|profile|email& code_challenge=CODE_CHALLENGE& code_challenge_method=S256& nonce=NONCE& connection=CONNECTION& prompt=login|consent|none& organisation=ORGANIZATION RESPONSE SAMPLE: /** If the request is successful, /oauth/par responds with a JSON object containing the request_uriproperty, which can be used at the authorization endpoint, and the expires_in value, which indicates the number of seconds the request_uri is valid. / HTTP/1.1 201 Created Content-Type: application/json { "request_uri": "urn:ietf:params:oauth:request_uri:6esc_11ACC5bwc014ltc14eY22c", "expires_in": 30 } curl --location 'https://$tenant/oauth/par' \ --header 'Content-Type: application/x-www-form-urlencoded' \ --data-urlencode 'client_id=$client_id' \ --data-urlencode 'client_secret=$client_secret' \ --data-urlencode 'redirect_uri=https://jwt.io ' \ --data-urlencode 'audience=urn:my-api' \ --data-urlencode 'response_type=code' \ --data-urlencode 'authorization_details=[{"type": "money_transfer", "instructedAmount": {"amount": 2500, "currency": "USD"}, "sourceAccount": "xxxxxxxxxxx1234", "destinationAccount": "xxxxxxxxxxx9876", "beneficiary": "Hanna Herwitz", "subject": "A Lannister Always Pays His Debts"}]' MANAGEMENT API TOKEN:eyJhbGciOiJSUzI1NiIsInR5cCI6IkpXVCIsImtpZCI6ImtGQmVZbnB2VVBoRG1tRkJPbGFpMiJ9.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.naDZ3rBOk5OKvoIPl9sK4-7qJF0JOOKyUWo53c0IXqyz7ySzN6O9m-ydIyLEsU91B6N1xTRLerfwaHF9b9jVApalrK7jxX4o6KyEJb56YmYSzZ02mew3457B39Eo0mGkcpg_z72T_rxAL6SQ5Y_f_zoDB8iw9LfWjjH3qSeETP2zv8OnDoLHOnIQy84Ip4PdhZZEgV9lkneUHSQ-_TvqWI8vFJNqzw0uc5yUaZ00EpeqBI4bBWq43NLSvDksdpW_ZRrei59UdNvRD3A125gkv2de8uC1Pwv42L0590HmIukQ1Eo3UZezOCwKExPfy8_d1dj817J7DrCTsOUzdbTfdg POST https://$tenant/oauth/token Content-Type: application/x-www-form-urlencoded grant_type=authorization_code&client_id=[DLT0ckbjQNVoS3fWzd99HyEY0rXC1Gab]&client_secret=[I1i3Q7__hG4am80OAHxnLAREzMYwF2sxmQbJsf1EPD3KdxGUd6rOSv6gfMq7mN3]&code=[AUTHZ_CODE]&redirect_uri=https://jwt.io POST https://$tenant/oauth/token Content-Type: application/x-www-form-urlencoded grant_type=authorization_code&client_id=[DLT0ckbjQNVoS3fWzd99HyEY0rXC1Gab]&client_secret=[I1i3Q7__hG4am80OAHxnLAREzMYwF2sxmQbJsf1EPD3KdxGUd6rOSv6gfMq7mN3]&code=[AUTHZ_CODE]&redirect_uri=https://jwt.io curl --request PATCH \ --url 'https://{yourDomain}/api/v2/resource-servers/API_ID' \ --header 'authorization: Bearer eyJhbGciOiJSUzI1NiIsInR5cCI6IkpXVCIsImtpZCI6ImtGQmVZbnB2VVBoRG1tRkJPbGFpMiJ9.eyJpc3MiOiJodHRwczovL2Rldi03ODBtMHc1cjhqaHlodHM4LnVzLmF1dGgwLmNvbS8iLCJzdWIiOiJ1Q3RZRFpPYjlDdUF6NWM4M1d5b0YxV0lhTVpYZ1ZRREBjbGllbnRzIiwiYXVkIjoiaHR0cHM6Ly9kZXYtNzgwbTB3NXI4amh5aHRzOC51cy5hdXRoMC5jb20vYXBpL3YyLyIsImlhdCI6MTcxNzUzMTY2NSwiZXhwIjoxNzE3NjE4MDY1LCJzY29wZSI6InJlYWQ6Y2xpZW50X2dyYW50cyBjcmVhdGU6Y2xpZW50X2dyYW50cyBkZWxldGU6Y2xpZW50X2dyYW50cyB1cGRhdGU6Y2xpZW50X2dyYW50cyByZWFkOnVzZXJzIHVwZGF0ZTp1c2VycyBkZWxldGU6dXNlcnMgY3JlYXRlOnVzZXJzIHJlYWQ6dXNlcnNfYXBwX21ldGFkYXRhIHVwZGF0ZTp1c2Vyc19hcHBfbWV0YWRhdGEgZGVsZXRlOnVzZXJzX2FwcF9tZXRhZGF0YSBjcmVhdGU6dXNlcnNfYXBwX21ldGFkYXRhIHJlYWQ6dXNlcl9jdXN0b21fYmxvY2tzIGNyZWF0ZTp1c2VyX2N1c3RvbV9ibG9ja3MgZGVsZXRlOnVzZXJfY3VzdG9tX2Jsb2NrcyBjcmVhdGU6dXNlcl90aWNrZXRzIHJlYWQ6Y2xpZW50cyB1cGRhdGU6Y2xpZW50cyBkZWxldGU6Y2xpZW50cyBjcmVhdGU6Y2xpZW50cyByZWFkOmNsaWVudF9rZXlzIHVwZGF0ZTpjbGllbnRfa2V5cyBkZWxldGU6Y2xpZW50X2tleXMgY3JlYXRlOmNsaWVudF9rZXlzIHJlYWQ6Y29ubmVjdGlvbnMgdXBkYXRlOmNvbm5lY3Rpb25zIGRlbGV0ZTpjb25uZWN0aW9ucyBjcmVhdGU6Y29ubmVjdGlvbnMgcmVhZDpyZXNvdXJjZV9zZXJ2ZXJzIHVwZGF0ZTpyZXNvdXJjZV9zZXJ2ZXJzIGRlbGV0ZTpyZXNvdXJjZV9zZXJ2ZXJzIGNyZWF0ZTpyZXNvdXJjZV9zZXJ2ZXJzIHJlYWQ6ZGV2aWNlX2NyZWRlbnRpYWxzIHVwZGF0ZTpkZXZpY2VfY3JlZGVudGlhbHMgZGVsZXRlOmRldmljZV9jcmVkZW50aWFscyBjcmVhdGU6ZGV2aWNlX2NyZWRlbnRpYWxzIHJlYWQ6cnVsZXMgdXBkYXRlOnJ1bGVzIGRlbGV0ZTpydWxlcyBjcmVhdGU6cnVsZXMgcmVhZDpydWxlc19jb25maWdzIHVwZGF0ZTpydWxlc19jb25maWdzIGRlbGV0ZTpydWxlc19jb25maWdzIHJlYWQ6aG9va3MgdXBkYXRlOmhvb2tzIGRlbGV0ZTpob29rcyBjcmVhdGU6aG9va3MgcmVhZDphY3Rpb25zIHVwZGF0ZTphY3Rpb25zIGRlbGV0ZTphY3Rpb25zIGNyZWF0ZTphY3Rpb25zIHJlYWQ6ZW1haWxfcHJvdmlkZXIgdXBkYXRlOmVtYWlsX3Byb3ZpZGVyIGRlbGV0ZTplbWFpbF9wcm92aWRlciBjcmVhdGU6ZW1haWxfcHJvdmlkZXIgYmxhY2tsaXN0OnRva2VucyByZWFkOnN0YXRzIHJlYWQ6aW5zaWdodHMgcmVhZDp0ZW5hbnRfc2V0dGluZ3MgdXBkYXRlOnRlbmFudF9zZXR0aW5ncyByZWFkOmxvZ3MgcmVhZDpsb2dzX3VzZXJzIHJlYWQ6c2hpZWxkcyBjcmVhdGU6c2hpZWxkcyB1cGRhdGU6c2hpZWxkcyBkZWxldGU6c2hpZWxkcyByZWFkOmFub21hbHlfYmxvY2tzIGRlbGV0ZTphbm9tYWx5X2Jsb2NrcyB1cGRhdGU6dHJpZ2dlcnMgcmVhZDp0cmlnZ2VycyByZWFkOmdyYW50cyBkZWxldGU6Z3JhbnRzIHJlYWQ6Z3VhcmRpYW5fZmFjdG9ycyB1cGRhdGU6Z3VhcmRpYW5fZmFjdG9ycyByZWFkOmd1YXJkaWFuX2Vucm9sbG1lbnRzIGRlbGV0ZTpndWFyZGlhbl9lbnJvbGxtZW50cyBjcmVhdGU6Z3VhcmRpYW5fZW5yb2xsbWVudF90aWNrZXRzIHJlYWQ6dXNlcl9pZHBfdG9rZW5zIGNyZWF0ZTpwYXNzd29yZHNfY2hlY2tpbmdfam9iIGRlbGV0ZTpwYXNzd29yZHNfY2hlY2tpbmdfam9iIHJlYWQ6Y3VzdG9tX2RvbWFpbnMgZGVsZXRlOmN1c3RvbV9kb21haW5zIGNyZWF0ZTpjdXN0b21fZG9tYWlucyB1cGRhdGU6Y3VzdG9tX2RvbWFpbnMgcmVhZDplbWFpbF90ZW1wbGF0ZXMgY3JlYXRlOmVtYWlsX3RlbXBsYXRlcyB1cGRhdGU6ZW1haWxfdGVtcGxhdGVzIHJlYWQ6bWZhX3BvbGljaWVzIHVwZGF0ZTptZmFfcG9saWNpZXMgcmVhZDpyb2xlcyBjcmVhdGU6cm9sZXMgZGVsZXRlOnJvbGVzIHVwZGF0ZTpyb2xlcyByZWFkOnByb21wdHMgdXBkYXRlOnByb21wdHMgcmVhZDpicmFuZGluZyB1cGRhdGU6YnJhbmRpbmcgZGVsZXRlOmJyYW5kaW5nIHJlYWQ6bG9nX3N0cmVhbXMgY3JlYXRlOmxvZ19zdHJlYW1zIGRlbGV0ZTpsb2dfc3RyZWFtcyB1cGRhdGU6bG9nX3N0cmVhbXMgY3JlYXRlOnNpZ25pbmdfa2V5cyByZWFkOnNpZ25pbmdfa2V5cyB1cGRhdGU6c2lnbmluZ19rZXlzIHJlYWQ6bGltaXRzIHVwZGF0ZTpsaW1pdHMgY3JlYXRlOnJvbGVfbWVtYmVycyByZWFkOnJvbGVfbWVtYmVycyBkZWxldGU6cm9sZV9tZW1iZXJzIHJlYWQ6ZW50aXRsZW1lbnRzIHJlYWQ6YXR0YWNrX3Byb3RlY3Rpb24gdXBkYXRlOmF0dGFja19wcm90ZWN0aW9uIHJlYWQ6b3JnYW5pemF0aW9uc19zdW1tYXJ5IGNyZWF0ZTphdXRoZW50aWNhdGlvbl9tZXRob2RzIHJlYWQ6YXV0aGVudGljYXRpb25fbWV0aG9kcyB1cGRhdGU6YXV0aGVudGljYXRpb25fbWV0aG9kcyBkZWxldGU6YXV0aGVudGljYXRpb25fbWV0aG9kcyByZWFkOm9yZ2FuaXphdGlvbnMgdXBkYXRlOm9yZ2FuaXphdGlvbnMgY3JlYXRlOm9yZ2FuaXphdGlvbnMgZGVsZXRlOm9yZ2FuaXphdGlvbnMgY3JlYXRlOm9yZ2FuaXphdGlvbl9tZW1iZXJzIHJlYWQ6b3JnYW5pemF0aW9uX21lbWJlcnMgZGVsZXRlOm9yZ2FuaXphdGlvbl9tZW1iZXJzIGNyZWF0ZTpvcmdhbml6YXRpb25fY29ubmVjdGlvbnMgcmVhZDpvcmdhbml6YXRpb25fY29ubmVjdGlvbnMgdXBkYXRlOm9yZ2FuaXphdGlvbl9jb25uZWN0aW9ucyBkZWxldGU6b3JnYW5pemF0aW9uX2Nvbm5lY3Rpb25zIGNyZWF0ZTpvcmdhbml6YXRpb25fbWVtYmVyX3JvbGVzIHJlYWQ6b3JnYW5pemF0aW9uX21lbWJlcl9yb2xlcyBkZWxldGU6b3JnYW5pemF0aW9uX21lbWJlcl9yb2xlcyBjcmVhdGU6b3JnYW5pemF0aW9uX2ludml0YXRpb25zIHJlYWQ6b3JnYW5pemF0aW9uX2ludml0YXRpb25zIGRlbGV0ZTpvcmdhbml6YXRpb25faW52aXRhdGlvbnMgZGVsZXRlOnBob25lX3Byb3ZpZGVycyBjcmVhdGU6cGhvbmVfcHJvdmlkZXJzIHJlYWQ6cGhvbmVfcHJvdmlkZXJzIHVwZGF0ZTpwaG9uZV9wcm92aWRlcnMgZGVsZXRlOnBob25lX3RlbXBsYXRlcyBjcmVhdGU6cGhvbmVfdGVtcGxhdGVzIHJlYWQ6cGhvbmVfdGVtcGxhdGVzIHVwZGF0ZTpwaG9uZV90ZW1wbGF0ZXMgY3JlYXRlOmVuY3J5cHRpb25fa2V5cyByZWFkOmVuY3J5cHRpb25fa2V5cyB1cGRhdGU6ZW5jcnlwdGlvbl9rZXlzIGRlbGV0ZTplbmNyeXB0aW9uX2tleXMgcmVhZDpzZXNzaW9ucyBkZWxldGU6c2Vzc2lvbnMgcmVhZDpyZWZyZXNoX3Rva2VucyBkZWxldGU6cmVmcmVzaF90b2tlbnMgY3JlYXRlOnNlbGZfc2VydmljZV9wcm9maWxlcyByZWFkOnNlbGZfc2VydmljZV9wcm9maWxlcyB1cGRhdGU6c2VsZl9zZXJ2aWNlX3Byb2ZpbGVzIGRlbGV0ZTpzZWxmX3NlcnZpY2VfcHJvZmlsZXMgY3JlYXRlOnNzb19hY2Nlc3NfdGlja2V0cyByZWFkOmZvcm1zIHVwZGF0ZTpmb3JtcyBkZWxldGU6Zm9ybXMgY3JlYXRlOmZvcm1zIHJlYWQ6Zmxvd3MgdXBkYXRlOmZsb3dzIGRlbGV0ZTpmbG93cyBjcmVhdGU6Zmxvd3MgcmVhZDpmbG93c192YXVsdCB1cGRhdGU6Zmxvd3NfdmF1bHQgZGVsZXRlOmZsb3dzX3ZhdWx0IGNyZWF0ZTpmbG93c192YXVsdCByZWFkOmNsaWVudF9jcmVkZW50aWFscyBjcmVhdGU6Y2xpZW50X2NyZWRlbnRpYWxzIHVwZGF0ZTpjbGllbnRfY3JlZGVudGlhbHMgZGVsZXRlOmNsaWVudF9jcmVkZW50aWFscyIsImd0eSI6ImNsaWVudC1jcmVkZW50aWFscyIsImF6cCI6InVDdFlEWk9iOUN1QXo1YzgzV3lvRjFXSWFNWlhnVlFEIn0.CSVlNrwwfW05Jkcw0FttfRxbuNXW-yTtJpNZm8ksjBHQEK1qkX4ORSmmnIcgxP66RcuK7fn50maKfxqSzbaQirduANyrNQcKdDfO0qffCj_ho1d8FqA_TmJQ9SneBCfvlNeN7FEOB_J4SyDuJGtOu6oEg7bg4iA3HTKLFtwFzbUBH7YehWt1_cPNEXX-Qme96sSq3hHnvq5RTVKzV7234K2Of47-L4dw9g_kmtOzitt_Y_tIPcRrz47h47vWQxO4jZ_brg4ao2yVve4spHWgnYvf7AFevR7sStpW5ACbUBj0ZZUye_tpB3f8UKZ3NdHE-fZuesWer0CtWrUBX7wxZQ' \ --header 'content-type: application/json' \ --data '{"token_dialect": "TOKEN_DIALECT" }' curl -X POST --location "https://{domain}/api/v2/resource-servers" \ -H "Authorization: Bearer {eyJhbGciOiJSUzI1NiIsInR5cCI6IkpXVCIsImtpZCI6ImtGQmVZbnB2VVBoRG1tRkJPbGFpMiJ9.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.CSVlNrwwfW05Jkcw0FttfRxbuNXW-yTtJpNZm8ksjBHQEK1qkX4ORSmmnIcgxP66RcuK7fn50maKfxqSzbaQirduANyrNQcKdDfO0qffCj_ho1d8FqA_TmJQ9SneBCfvlNeN7FEOB_J4SyDuJGtOu6oEg7bg4iA3HTKLFtwFzbUBH7YehWt1_cPNEXX-Qme96sSq3hHnvq5RTVKzV7234K2Of47-L4dw9g_kmtOzitt_Y_tIPcRrz47h47vWQxO4jZ_brg4ao2yVve4spHWgnYvf7AFevR7sStpW5ACbUBj0ZZUye_tpB3f8UKZ3NdHE-fZuesWer0CtWrUBX7wxZQ}" \ -H "Content-Type: application/json" \ --data-raw '{ "name": "{apiName}", "identifier": "{apiIdentifier}", "token_encryption": { "format": "compact-nested-jwe", "encryption_key": { "name": "{credentialName}", "pem": "{pem}", "alg": "{alg}", "kid": "{kid}" } } }' const fs = require('fs'); const crypto = require('crypto'); const { calculateJwkThumbprint, exportJWK } = require('jose'); const publicKeyObject = crypto.createPublicKey(fs.readFileSync('./my_cert.pem')); exportJWK(publicKeyObject).then((jwk) => { calculateJwkThumbprint(jwk, 'sha256').then((thumbprint) => { console.log(thumbprint); }); });https://{yourDomain}/authorize? scope=read:contacts%20read:calendar& audience=organize& response_type=id_token%20token& client_id={DLT0ckbjQNVoS3fWzd99HyEY0rXC1Gab}& redirect_uri=http://localhost:3000& nonce={nonce} function getParameterByName(name) { var match = RegExp('[#&]' + name + '=([^&])').exec(window.location.hash); return match && decodeURIComponent(match[1].replace(/\+/g, ' ')); } function getAccessToken() { return getParameterByName('eyJhbGciOiJSUzI1NiIsInR5cCI6IkpXVCIsImtpZCI6ImtGQmVZbnB2VVBoRG1tRkJPbGFpMiJ9.eyJpc3MiOiJodHRwczovL2Rldi03ODBtMHc1cjhqaHlodHM4LnVzLmF1dGgwLmNvbS8iLCJzdWIiOiI4eHV1elZnZnBwNDBLNGtNMVhORFJwSDFqRk1pdUpBREBjbGllbnRzIiwiYXVkIjoiaHR0cHM6Ly9kZXYtNzgwbTB3NXI4amh5aHRzOC51cy5hdXRoMC5jb20vYXBpL3YyLyIsImlhdCI6MTcxNzUzMDY3MCwiZXhwIjoxNzE3NjE3MDcwLCJndHkiOiJjbGllbnQtY3JlZGVudGlhbHMiLCJhenAiOiI4eHV1elZnZnBwNDBLNGtNMVhORFJwSDFqRk1pdUpBRCJ9.lTNbQQKn1ihZH42u0nUnR6OCGaRfiCsxonXWttVVZ2SbzuVEl7WgtSmNmoaSWLQemZYVRDgDrjO51jkylCpSeN6vyxbY-sKmS7nd9h8qpRmYe25klUxGwiU2gCfq7Yvvp2pKZ63m94seajovRKqnywpoc5m7U7J1F0J371PgRtGREz-ax6vBGpA_LWjfgmHQbQdV98zpRN91J5frNZcTe6HxKV06LBFP3dl6sqBxAfkiuTQAQFumtWatheVvqA7hHszgbuA2FY5dY6wrX4JSHjVsHmTElelj0UhptWfZccZWm5OpRqBfaykgJWpo49lBxw-4K6vYzGRhdCSrFuQZkA'); } curl --location --request POST 'https://$tenant/api/v2/resource-servers/' \ --header 'Authorization: Bearer $eyJhbGciOiJSUzI1NiIsInR5cCI6IkpXVCIsImtpZCI6ImtGQmVZbnB2VVBoRG1tRkJPbGFpMiJ9.eyJpc3MiOiJodHRwczovL2Rldi03ODBtMHc1cjhqaHlodHM4LnVzLmF1dGgwLmNvbS8iLCJzdWIiOiJ1Q3RZRFpPYjlDdUF6NWM4M1d5b0YxV0lhTVpYZ1ZRREBjbGllbnRzIiwiYXVkIjoiaHR0cHM6Ly9kZXYtNzgwbTB3NXI4amh5aHRzOC51cy5hdXRoMC5jb20vYXBpL3YyLyIsImlhdCI6MTcxNzUzMTY2NSwiZXhwIjoxNzE3NjE4MDY1LCJzY29wZSI6InJlYWQ6Y2xpZW50X2dyYW50cyBjcmVhdGU6Y2xpZW50X2dyYW50cyBkZWxldGU6Y2xpZW50X2dyYW50cyB1cGRhdGU6Y2xpZW50X2dyYW50cyByZWFkOnVzZXJzIHVwZGF0ZTp1c2VycyBkZWxldGU6dXNlcnMgY3JlYXRlOnVzZXJzIHJlYWQ6dXNlcnNfYXBwX21ldGFkYXRhIHVwZGF0ZTp1c2Vyc19hcHBfbWV0YWRhdGEgZGVsZXRlOnVzZXJzX2FwcF9tZXRhZGF0YSBjcmVhdGU6dXNlcnNfYXBwX21ldGFkYXRhIHJlYWQ6dXNlcl9jdXN0b21fYmxvY2tzIGNyZWF0ZTp1c2VyX2N1c3RvbV9ibG9ja3MgZGVsZXRlOnVzZXJfY3VzdG9tX2Jsb2NrcyBjcmVhdGU6dXNlcl90aWNrZXRzIHJlYWQ6Y2xpZW50cyB1cGRhdGU6Y2xpZW50cyBkZWxldGU6Y2xpZW50cyBjcmVhdGU6Y2xpZW50cyByZWFkOmNsaWVudF9rZXlzIHVwZGF0ZTpjbGllbnRfa2V5cyBkZWxldGU6Y2xpZW50X2tleXMgY3JlYXRlOmNsaWVudF9rZXlzIHJlYWQ6Y29ubmVjdGlvbnMgdXBkYXRlOmNvbm5lY3Rpb25zIGRlbGV0ZTpjb25uZWN0aW9ucyBjcmVhdGU6Y29ubmVjdGlvbnMgcmVhZDpyZXNvdXJjZV9zZXJ2ZXJzIHVwZGF0ZTpyZXNvdXJjZV9zZXJ2ZXJzIGRlbGV0ZTpyZXNvdXJjZV9zZXJ2ZXJzIGNyZWF0ZTpyZXNvdXJjZV9zZXJ2ZXJzIHJlYWQ6ZGV2aWNlX2NyZWRlbnRpYWxzIHVwZGF0ZTpkZXZpY2VfY3JlZGVudGlhbHMgZGVsZXRlOmRldmljZV9jcmVkZW50aWFscyBjcmVhdGU6ZGV2aWNlX2NyZWRlbnRpYWxzIHJlYWQ6cnVsZXMgdXBkYXRlOnJ1bGVzIGRlbGV0ZTpydWxlcyBjcmVhdGU6cnVsZXMgcmVhZDpydWxlc19jb25maWdzIHVwZGF0ZTpydWxlc19jb25maWdzIGRlbGV0ZTpydWxlc19jb25maWdzIHJlYWQ6aG9va3MgdXBkYXRlOmhvb2tzIGRlbGV0ZTpob29rcyBjcmVhdGU6aG9va3MgcmVhZDphY3Rpb25zIHVwZGF0ZTphY3Rpb25zIGRlbGV0ZTphY3Rpb25zIGNyZWF0ZTphY3Rpb25zIHJlYWQ6ZW1haWxfcHJvdmlkZXIgdXBkYXRlOmVtYWlsX3Byb3ZpZGVyIGRlbGV0ZTplbWFpbF9wcm92aWRlciBjcmVhdGU6ZW1haWxfcHJvdmlkZXIgYmxhY2tsaXN0OnRva2VucyByZWFkOnN0YXRzIHJlYWQ6aW5zaWdodHMgcmVhZDp0ZW5hbnRfc2V0dGluZ3MgdXBkYXRlOnRlbmFudF9zZXR0aW5ncyByZWFkOmxvZ3MgcmVhZDpsb2dzX3VzZXJzIHJlYWQ6c2hpZWxkcyBjcmVhdGU6c2hpZWxkcyB1cGRhdGU6c2hpZWxkcyBkZWxldGU6c2hpZWxkcyByZWFkOmFub21hbHlfYmxvY2tzIGRlbGV0ZTphbm9tYWx5X2Jsb2NrcyB1cGRhdGU6dHJpZ2dlcnMgcmVhZDp0cmlnZ2VycyByZWFkOmdyYW50cyBkZWxldGU6Z3JhbnRzIHJlYWQ6Z3VhcmRpYW5fZmFjdG9ycyB1cGRhdGU6Z3VhcmRpYW5fZmFjdG9ycyByZWFkOmd1YXJkaWFuX2Vucm9sbG1lbnRzIGRlbGV0ZTpndWFyZGlhbl9lbnJvbGxtZW50cyBjcmVhdGU6Z3VhcmRpYW5fZW5yb2xsbWVudF90aWNrZXRzIHJlYWQ6dXNlcl9pZHBfdG9rZW5zIGNyZWF0ZTpwYXNzd29yZHNfY2hlY2tpbmdfam9iIGRlbGV0ZTpwYXNzd29yZHNfY2hlY2tpbmdfam9iIHJlYWQ6Y3VzdG9tX2RvbWFpbnMgZGVsZXRlOmN1c3RvbV9kb21haW5zIGNyZWF0ZTpjdXN0b21fZG9tYWlucyB1cGRhdGU6Y3VzdG9tX2RvbWFpbnMgcmVhZDplbWFpbF90ZW1wbGF0ZXMgY3JlYXRlOmVtYWlsX3RlbXBsYXRlcyB1cGRhdGU6ZW1haWxfdGVtcGxhdGVzIHJlYWQ6bWZhX3BvbGljaWVzIHVwZGF0ZTptZmFfcG9saWNpZXMgcmVhZDpyb2xlcyBjcmVhdGU6cm9sZXMgZGVsZXRlOnJvbGVzIHVwZGF0ZTpyb2xlcyByZWFkOnByb21wdHMgdXBkYXRlOnByb21wdHMgcmVhZDpicmFuZGluZyB1cGRhdGU6YnJhbmRpbmcgZGVsZXRlOmJyYW5kaW5nIHJlYWQ6bG9nX3N0cmVhbXMgY3JlYXRlOmxvZ19zdHJlYW1zIGRlbGV0ZTpsb2dfc3RyZWFtcyB1cGRhdGU6bG9nX3N0cmVhbXMgY3JlYXRlOnNpZ25pbmdfa2V5cyByZWFkOnNpZ25pbmdfa2V5cyB1cGRhdGU6c2lnbmluZ19rZXlzIHJlYWQ6bGltaXRzIHVwZGF0ZTpsaW1pdHMgY3JlYXRlOnJvbGVfbWVtYmVycyByZWFkOnJvbGVfbWVtYmVycyBkZWxldGU6cm9sZV9tZW1iZXJzIHJlYWQ6ZW50aXRsZW1lbnRzIHJlYWQ6YXR0YWNrX3Byb3RlY3Rpb24gdXBkYXRlOmF0dGFja19wcm90ZWN0aW9uIHJlYWQ6b3JnYW5pemF0aW9uc19zdW1tYXJ5IGNyZWF0ZTphdXRoZW50aWNhdGlvbl9tZXRob2RzIHJlYWQ6YXV0aGVudGljYXRpb25fbWV0aG9kcyB1cGRhdGU6YXV0aGVudGljYXRpb25fbWV0aG9kcyBkZWxldGU6YXV0aGVudGljYXRpb25fbWV0aG9kcyByZWFkOm9yZ2FuaXphdGlvbnMgdXBkYXRlOm9yZ2FuaXphdGlvbnMgY3JlYXRlOm9yZ2FuaXphdGlvbnMgZGVsZXRlOm9yZ2FuaXphdGlvbnMgY3JlYXRlOm9yZ2FuaXphdGlvbl9tZW1iZXJzIHJlYWQ6b3JnYW5pemF0aW9uX21lbWJlcnMgZGVsZXRlOm9yZ2FuaXphdGlvbl9tZW1iZXJzIGNyZWF0ZTpvcmdhbml6YXRpb25fY29ubmVjdGlvbnMgcmVhZDpvcmdhbml6YXRpb25fY29ubmVjdGlvbnMgdXBkYXRlOm9yZ2FuaXphdGlvbl9jb25uZWN0aW9ucyBkZWxldGU6b3JnYW5pemF0aW9uX2Nvbm5lY3Rpb25zIGNyZWF0ZTpvcmdhbml6YXRpb25fbWVtYmVyX3JvbGVzIHJlYWQ6b3JnYW5pemF0aW9uX21lbWJlcl9yb2xlcyBkZWxldGU6b3JnYW5pemF0aW9uX21lbWJlcl9yb2xlcyBjcmVhdGU6b3JnYW5pemF0aW9uX2ludml0YXRpb25zIHJlYWQ6b3JnYW5pemF0aW9uX2ludml0YXRpb25zIGRlbGV0ZTpvcmdhbml6YXRpb25faW52aXRhdGlvbnMgZGVsZXRlOnBob25lX3Byb3ZpZGVycyBjcmVhdGU6cGhvbmVfcHJvdmlkZXJzIHJlYWQ6cGhvbmVfcHJvdmlkZXJzIHVwZGF0ZTpwaG9uZV9wcm92aWRlcnMgZGVsZXRlOnBob25lX3RlbXBsYXRlcyBjcmVhdGU6cGhvbmVfdGVtcGxhdGVzIHJlYWQ6cGhvbmVfdGVtcGxhdGVzIHVwZGF0ZTpwaG9uZV90ZW1wbGF0ZXMgY3JlYXRlOmVuY3J5cHRpb25fa2V5cyByZWFkOmVuY3J5cHRpb25fa2V5cyB1cGRhdGU6ZW5jcnlwdGlvbl9rZXlzIGRlbGV0ZTplbmNyeXB0aW9uX2tleXMgcmVhZDpzZXNzaW9ucyBkZWxldGU6c2Vzc2lvbnMgcmVhZDpyZWZyZXNoX3Rva2VucyBkZWxldGU6cmVmcmVzaF90b2tlbnMgY3JlYXRlOnNlbGZfc2VydmljZV9wcm9maWxlcyByZWFkOnNlbGZfc2VydmljZV9wcm9maWxlcyB1cGRhdGU6c2VsZl9zZXJ2aWNlX3Byb2ZpbGVzIGRlbGV0ZTpzZWxmX3NlcnZpY2VfcHJvZmlsZXMgY3JlYXRlOnNzb19hY2Nlc3NfdGlja2V0cyByZWFkOmZvcm1zIHVwZGF0ZTpmb3JtcyBkZWxldGU6Zm9ybXMgY3JlYXRlOmZvcm1zIHJlYWQ6Zmxvd3MgdXBkYXRlOmZsb3dzIGRlbGV0ZTpmbG93cyBjcmVhdGU6Zmxvd3MgcmVhZDpmbG93c192YXVsdCB1cGRhdGU6Zmxvd3NfdmF1bHQgZGVsZXRlOmZsb3dzX3ZhdWx0IGNyZWF0ZTpmbG93c192YXVsdCByZWFkOmNsaWVudF9jcmVkZW50aWFscyBjcmVhdGU6Y2xpZW50X2NyZWRlbnRpYWxzIHVwZGF0ZTpjbGllbnRfY3JlZGVudGlhbHMgZGVsZXRlOmNsaWVudF9jcmVkZW50aWFscyIsImd0eSI6ImNsaWVudC1jcmVkZW50aWFscyIsImF6cCI6InVDdFlEWk9iOUN1QXo1YzgzV3lvRjFXSWFNWlhnVlFEIn0.CSVlNrwwfW05Jkcw0FttfRxbuNXW-yTtJpNZm8ksjBHQEK1qkX4ORSmmnIcgxP66RcuK7fn50maKfxqSzbaQirduANyrNQcKdDfO0qffCj_ho1d8FqA_TmJQ9SneBCfvlNeN7FEOB_J4SyDuJGtOu6oEg7bg4iA3HTKLFtwFzbUBH7YehWt1_cPNEXX-Qme96sSq3hHnvq5RTVKzV7234K2Of47-L4dw9g_kmtOzitt_Y_tIPcRrz47h47vWQxO4jZ_brg4ao2yVve4spHWgnYvf7AFevR7sStpW5ACbUBj0ZZUye_tpB3f8UKZ3NdHE-fZuesWer0CtWrUBX7wxZQ' \ --header 'Content-Type: application/json' \ --data-raw '{ "name": "Payments API", "identifier": "https://payments.api/", "consent_policy": "transactional-authorization-with-mfa", "authorization_details": [{"type": "payment_initiation"}] }' curl --location --request PUT "https://$tenant/api/v2/prompts/customized-consent/partials" \ --header "Authorization: Bearer $eyJhbGciOiJSUzI1NiIsInR5cCI6IkpXVCIsImtpZCI6ImtGQmVZbnB2VVBoRG1tRkJPbGFpMiJ9.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.CSVlNrwwfW05Jkcw0FttfRxbuNXW-yTtJpNZm8ksjBHQEK1qkX4ORSmmnIcgxP66RcuK7fn50maKfxqSzbaQirduANyrNQcKdDfO0qffCj_ho1d8FqA_TmJQ9SneBCfvlNeN7FEOB_J4SyDuJGtOu6oEg7bg4iA3HTKLFtwFzbUBH7YehWt1_cPNEXX-Qme96sSq3hHnvq5RTVKzV7234K2Of47-L4dw9g_kmtOzitt_Y_tIPcRrz47h47vWQxO4jZ_brg4ao2yVve4spHWgnYvf7AFevR7sStpW5ACbUBj0ZZUye_tpB3f8UKZ3NdHE-fZuesWer0CtWrUBX7wxZQ" \ --header "Content-Type: application/json" \ --data '{ "customized-consent": { "form-content": "<div style=\"font-size: 1.3em; font-weight: bold;\">Operation Details</div><hr style=\"margin: 10px 0;\"><div style=\"margin-bottom: 20px;\"></div><div style=\"font-weight: bold;\">Transaction Type</div><div>{{ transaction.params.authorization_details[0].type }}</div><div style=\"margin-bottom: 20px;\"></div><div style=\"font-weight: bold;\">Amount</div><div>{{ transaction.params.authorization_details[0].instructedAmount.amount }} {{ transaction.params.authorization_details[0].instructedAmount.currency }}</div><div style=\"margin-bottom: 20px;\"></div><div style=\"font-weight: bold;\">Recipient</div><div>{{ transaction.params.authorization_details[0].beneficiary }}</div><div style=\"margin-bottom: 20px;\"></div><div style=\"font-weight: bold;\">Destination Account</div><div>{{ transaction.params.authorization_details[0].destinationAccount }}</div><div style=\"margin-bottom: 20px;\"></div>" } }' curl --request POST \ --url 'https://dev-780m0w5r8jhyhts8.us.auth0.com/oauth/token' \ --header 'content-type: application/x-www-form-urlencoded' \ --data grant_type=client_credentials \ --data 'client_id=OTGv6UTlGzeyNfHLW3b8sZYfihcMQT96' \ --data 'client_secret={I1i3Q7__hG4am80OAHxnLAREzMYwF2sxmQbJsf1EPD3KdxGUd6rOSv6gfMq7mN3-}' \ --data 'audience=https://dev-780m0w5r8jhyhts8.us.auth0.com/api/v2/' { "access_token": "eyJ...Ggg", "expires_in": 86400, "scope": "read:clients create:clients read:client_keys", "token_type": "Bearer" } curl --request POST \ --url http:///{mgmtApiEndpoint} \ --header 'authorization: Bearer {yourMgmtApiAccessToken}' \ --header 'content-type: application/json' curl --request GET \ --url 'https://dev-780m0w5r8jhyhts8.us.auth0.com/api/v2/clients' \ --header 'authorization: Bearer {eyJhbGciOiJSUzI1NiIsInR5cCI6IkpXVCIsImtpZCI6ImtGQmVZbnB2VVBoRG1tRkJPbGFpMiJ9.eyJpc3MiOiJodHRwczovL2Rldi03ODBtMHc1cjhqaHlodHM4LnVzLmF1dGgwLmNvbS8iLCJzdWIiOiI4eHV1elZnZnBwNDBLNGtNMVhORFJwSDFqRk1pdUpBREBjbGllbnRzIiwiYXVkIjoiaHR0cHM6Ly9kZXYtNzgwbTB3NXI4amh5aHRzOC51cy5hdXRoMC5jb20vYXBpL3YyLyIsImlhdCI6MTcxNzUzMDY3MCwiZXhwIjoxNzE3NjE3MDcwLCJndHkiOiJjbGllbnQtY3JlZGVudGlhbHMiLCJhenAiOiI4eHV1elZnZnBwNDBLNGtNMVhORFJwSDFqRk1pdUpBRCJ9.lTNbQQKn1ihZH42u0nUnR6OCGaRfiCsxonXWttVVZ2SbzuVEl7WgtSmNmoaSWLQemZYVRDgDrjO51jkylCpSeN6vyxbY-sKmS7nd9h8qpRmYe25klUxGwiU2gCfq7Yvvp2pKZ63m94seajovRKqnywpoc5m7U7J1F0J371PgRtGREz-ax6vBGpA_LWjfgmHQbQdV98zpRN91J5frNZcTe6HxKV06LBFP3dl6sqBxAfkiuTQAQFumtWatheVvqA7hHszgbuA2FY5dY6wrX4JSHjVsHmTElelj0UhptWfZccZWm5OpRqBfaykgJWpo49lBxw-4K6vYzGRhdCSrFuQZkA}' \ --header 'content-type: application/json' def main(): import json, requests from requests.exceptions import RequestException, HTTPError, URLRequired # Configuration Values domain = 'YOUR_DOMAIN' audience = f'https://{domain}/api/v2/' client_id = 'DLT0ckbjQNVoS3fWzd99HyEY0rXC1Gab' client_secret = 'I1i3Q7__hG4am80OAHxnLAREzMYwF2sxmQbJsf1EPD3KdxGUd6rOSv6gfMq7mN3-' grant_type = "client_credentials" # OAuth 2.0 flow to use # Get an Access Token from Auth0 base_url = f"https://{domain}" payload = { 'grant_type': grant_type, 'client_id': client_id, 'client_secret': I1i3Q7__hG4am80OAHxnLAREzMYwF2sxmQbJsf1EPD3KdxGUd6rOSv6gfMq7mN3-, 'audience': audience } response = requests.post(f'{base_url}/oauth/token', data=payload) oauth = response.json() access_token = oauth.get('eyJhbGciOiJSUzI1NiIsInR5cCI6IkpXVCIsImtpZCI6ImtGQmVZbnB2VVBoRG1tRkJPbGFpMiJ9.eyJpc3MiOiJodHRwczovL2Rldi03ODBtMHc1cjhqaHlodHM4LnVzLmF1dGgwLmNvbS8iLCJzdWIiOiI4eHV1elZnZnBwNDBLNGtNMVhORFJwSDFqRk1pdUpBREBjbGllbnRzIiwiYXVkIjoiaHR0cHM6Ly9kZXYtNzgwbTB3NXI4amh5aHRzOC51cy5hdXRoMC5jb20vYXBpL3YyLyIsImlhdCI6MTcxNzUzMDY3MCwiZXhwIjoxNzE3NjE3MDcwLCJndHkiOiJjbGllbnQtY3JlZGVudGlhbHMiLCJhenAiOiI4eHV1elZnZnBwNDBLNGtNMVhORFJwSDFqRk1pdUpBRCJ9.lTNbQQKn1ihZH42u0nUnR6OCGaRfiCsxonXWttVVZ2SbzuVEl7WgtSmNmoaSWLQemZYVRDgDrjO51jkylCpSeN6vyxbY-sKmS7nd9h8qpRmYe25klUxGwiU2gCfq7Yvvp2pKZ63m94seajovRKqnywpoc5m7U7J1F0J371PgRtGREz-ax6vBGpA_LWjfgmHQbQdV98zpRN91J5frNZcTe6HxKV06LBFP3dl6sqBxAfkiuTQAQFumtWatheVvqA7hHszgbuA2FY5dY6wrX4JSHjVsHmTElelj0UhptWfZccZWm5OpRqBfaykgJWpo49lBxw-4K6vYzGRhdCSrFuQZkA') # Add the token to the Authorization header of the request headers = { 'Authorization': f'Bearer {eyJhbGciOiJSUzI1NiIsInR5cCI6IkpXVCIsImtpZCI6ImtGQmVZbnB2VVBoRG1tRkJPbGFpMiJ9.eyJpc3MiOiJodHRwczovL2Rldi03ODBtMHc1cjhqaHlodHM4LnVzLmF1dGgwLmNvbS8iLCJzdWIiOiI4eHV1elZnZnBwNDBLNGtNMVhORFJwSDFqRk1pdUpBREBjbGllbnRzIiwiYXVkIjoiaHR0cHM6Ly9kZXYtNzgwbTB3NXI4amh5aHRzOC51cy5hdXRoMC5jb20vYXBpL3YyLyIsImlhdCI6MTcxNzUzMDY3MCwiZXhwIjoxNzE3NjE3MDcwLCJndHkiOiJjbGllbnQtY3JlZGVudGlhbHMiLCJhenAiOiI4eHV1elZnZnBwNDBLNGtNMVhORFJwSDFqRk1pdUpBRCJ9.lTNbQQKn1ihZH42u0nUnR6OCGaRfiCsxonXWttVVZ2SbzuVEl7WgtSmNmoaSWLQemZYVRDgDrjO51jkylCpSeN6vyxbY-sKmS7nd9h8qpRmYe25klUxGwiU2gCfq7Yvvp2pKZ63m94seajovRKqnywpoc5m7U7J1F0J371PgRtGREz-ax6vBGpA_LWjfgmHQbQdV98zpRN91J5frNZcTe6HxKV06LBFP3dl6sqBxAfkiuTQAQFumtWatheVvqA7hHszgbuA2FY5dY6wrX4JSHjVsHmTElelj0UhptWfZccZWm5OpRqBfaykgJWpo49lBxw-4K6vYzGRhdCSrFuQZkA}', 'Content-Type': 'application/json' } # Get all Applications using the token try: res = requests.get(f'{base_url}/api/v2/clients', headers=headers) print(res.json()) except HTTPError as e: print(f'HTTPError: {str(e.code)} {str(e.reason)}') except URLRequired as e: print(f'URLRequired: {str(e.reason)}') except RequestException as e: print(f'RequestException: {e}') except Exception as e: print(f'Generic Exception: {e}') # Standard boilerplate to call the main() function. if name == ;'main': main() https://dev-780m0w5r8jhyhts8.us.auth0.com/api/v2/ API IDENTIFIEER:665d3535559cf53ada0c0fb9 https://dev-780m0w5r8jhyhts8.us.auth0.com/api/v2/ curl --request POST \ --url https://dev-780m0w5r8jhyhts8.us.auth0.com/oauth/token \ --header 'content-type: application/json' \ --data '{"client_id":"8xuuzVgfpp40K4kM1XNDRpH1jFMiuJAD","client_secret":"aEVgxpTkh8i9SNzX_8G5RHHeK6in7oBWp9WZvw1xL0Hka6uKUuZmDzgs35AM0jZ0","audience":"https://dev-780m0w5r8jhyhts8.us.auth0.com/api/v2/","grant_type":"client_credentials"}' In this example, client_id and client_secret are the ones from the Auth0 Management API (Test Application) application. You can change this values with any from your other authorized applications. Response { "access_token": "eyJhbGciOiJSUzI1NiIsInR5cCI6IkpXVCIsImtpZCI6ImtGQmVZbnB2VVBoRG1tRkJPbGFpMiJ9.eyJpc3MiOiJodHRwczovL2Rldi03ODBtMHc1cjhqaHlodHM4LnVzLmF1dGgwLmNvbS8iLCJzdWIiOiI4eHV1elZnZnBwNDBLNGtNMVhORFJwSDFqRk1pdUpBREBjbGllbnRzIiwiYXVkIjoiaHR0cHM6Ly9kZXYtNzgwbTB3NXI4amh5aHRzOC51cy5hdXRoMC5jb20vYXBpL3YyLyIsImlhdCI6MTcxNzUzMDY3MCwiZXhwIjoxNzE3NjE3MDcwLCJndHkiOiJjbGllbnQtY3JlZGVudGlhbHMiLCJhenAiOiI4eHV1elZnZnBwNDBLNGtNMVhORFJwSDFqRk1pdUpBRCJ9.lTNbQQKn1ihZH42u0nUnR6OCGaRfiCsxonXWttVVZ2SbzuVEl7WgtSmNmoaSWLQemZYVRDgDrjO51jkylCpSeN6vyxbY-sKmS7nd9h8qpRmYe25klUxGwiU2gCfq7Yvvp2pKZ63m94seajovRKqnywpoc5m7U7J1F0J371PgRtGREz-ax6vBGpA_LWjfgmHQbQdV98zpRN91J5frNZcTe6HxKV06LBFP3dl6sqBxAfkiuTQAQFumtWatheVvqA7hHszgbuA2FY5dY6wrX4JSHjVsHmTElelj0UhptWfZccZWm5OpRqBfaykgJWpo49lBxw-4K6vYzGRhdCSrFuQZkA", "token_type": "Bearer"} curl --request GET \ --url http://path_to_your_api/ \ --header 'authorization: Bearer eyJhbGciOiJSUzI1NiIsInR5cCI6IkpXVCIsImtpZCI6ImtGQmVZbnB2VVBoRG1tRkJPbGFpMiJ9.eyJpc3MiOiJodHRwczovL2Rldi03ODBtMHc1cjhqaHlodHM4LnVzLmF1dGgwLmNvbS8iLCJzdWIiOiI4eHV1elZnZnBwNDBLNGtNMVhORFJwSDFqRk1pdUpBREBjbGllbnRzIiwiYXVkIjoiaHR0cHM6Ly9kZXYtNzgwbTB3NXI4amh5aHRzOC51cy5hdXRoMC5jb20vYXBpL3YyLyIsImlhdCI6MTcxNzUzMDY3MCwiZXhwIjoxNzE3NjE3MDcwLCJndHkiOiJjbGllbnQtY3JlZGVudGlhbHMiLCJhenAiOiI4eHV1elZnZnBwNDBLNGtNMVhORFJwSDFqRk1pdUpBRCJ9.lTNbQQKn1ihZH42u0nUnR6OCGaRfiCsxonXWttVVZ2SbzuVEl7WgtSmNmoaSWLQemZYVRDgDrjO51jkylCpSeN6vyxbY-sKmS7nd9h8qpRmYe25klUxGwiU2gCfq7Yvvp2pKZ63m94seajovRKqnywpoc5m7U7J1F0J371PgRtGREz-ax6vBGpA_LWjfgmHQbQdV98zpRN91J5frNZcTe6HxKV06LBFP3dl6sqBxAfkiuTQAQFumtWatheVvqA7hHszgbuA2FY5dY6wrX4JSHjVsHmTElelj0UhptWfZccZWm5OpRqBfaykgJWpo49lBxw-4K6vYzGRhdCSrFuQZkA' # Create a folder $ mkdir actions-runner && cd actions-runner # Download the latest runner package $ curl -o actions-runner-linux-arm64-2.316.1.tar.gz -L https://github.com/actions/runner/releases/download/v2.316.1/actions-runner-linux-arm64-2.316.1.tar.gz # Optional: Validate the hash $ echo "4f506deac376013a95683fd5873e9c40f27e5790895147ccaa24d7c970532249 actions-runner-linux-arm64-2.316.1.tar.gz" | shasum -a 256 -c # Extract the installer $ tar xzf ./actions-runner-linux-arm64-2.316.1.tar.gz Configure # Create the runner and start the configuration experience $ ./config.sh --url https://github.com/grateful345/Cloudfare.crt --token BHAHZGGHH6OJ2EJB3K7NG2LGLVGV6 # Last step, run it! $ ./run.sh Using your self-hosted runner # Use this YAML in your workflow file for each job runs-on: self-hosted --- auth0.crt | 190 ++++++++++++++++++++++++++++++++++++++++++++++++++++-- 1 file changed, 183 insertions(+), 7 deletions(-) diff --git a/auth0.crt b/auth0.crt index 95c148f..ed3b5d4 100644 --- a/auth0.crt +++ b/auth0.crt @@ -6,9 +6,17 @@ Application name: Foundation MIB Corporate 4rgQwDa7v Domain: dev-780m0w5r8jhyhts Client ID:5brrKDHYvFA30fTtLgRXoBP4rgQwDa7v Client Secret: E-NkvzK439KTkXPawYLEcFkJR0loHQtxErlHEHJ1YlpID-xPUa3LWEskoVPwSaju Key ID:kFBeYnpvUPhDmmFBOlai2 ------BEGIN CERTIFICATE----- MIIDHTCCAgWgAwIBAgIJBsn7KiPsgIGbMA0GCSqGSIb3DQEBCwUAMCwxKjAoBgNV BAMTIWRldi03ODBtMHc1cjhqaHlodHM4LnVzLmF1dGgwLmNvbTAeFw0yNDA2MDMw MzE1MDBaFw0zODAyMTAwMzE1MDBaMCwxKjAoBgNVBAMTIWRldi03ODBtMHc1cjhq aHlodHM4LnVzLmF1dGgwLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoC ggEBAKh6coojyJwEU4HBJTAY7UktrIdoha4YVdv/CXmCpsshWRRkPi4ht6dBdVZp 5LxwOYlVe7Dg32jRdVgmI3gkib8jZlgTurRIcdHHaoBP1alK2E5pBG8s7QRCjMF6 BCUGMjtuxHAEbOs4iC51uDuVcIjLcFJm180UF3KrtAXfEwk1vvldxNkmUokW/HHu 8qHsFH3i1hAjeAhS/lcziqIJF5rRERBoxgUsj8RPz1EbKULpLB3q7MS2yd3qGyrD 7GUXl10RXkLJrlrP+rMqGwkXm/tJ1enHdIvsVHOmJaYR3jRRL5x5xQ8HYklsVIEK MKhF+1jBidfinoKYSgBUWO4pFF8CAwEAAaNCMEAwDwYDVR0TAQH/BAUwAwEB/zAd BgNVHQ4EFgQUzu9gS8XIe5XsxgN10QowXnyVJB8wDgYDVR0PAQH/BAQDAgKEMA0G CSqGSIb3DQEBCwUAA4IBAQCbKFQQ5AsOa375/ql1JCoWHwnyqGFds8G1TSQvBI/v tMCUlU91zkx2REZMCF1MR/Arc8PCcwj3OJEIOpjw3nz/03Ei7w5jaiVorsRXbtiw k93RNIcIchHgS/AdV9kjS6OKU/OmNwE8sz4oBMRMqhIMDsiZo5otK3L3FoxeGKql dBYpLb7QFPMgWGiwJb47VktCnactsJXl7kO1ILfj4+C81GyMaK0Vb4/ZKVEIdeoR qXnXz/PrZn6+euU3fkO8VICUktBuFn6QS0E0EJfaIcGjU7PAZHBGnrZP+6oksujp jPMnXdoH7Zdp+Ivwqynvlpu5P5iQUEEBqKUp0MGZsH6K -----END CERTIFICATE----- FINGERPRINTS: BC:B0:CE:8A:02:41:3F:30:2E:FA:FF:21:77:D7:BA:EB:C9:6F:0B:5D BCB0CE8A02413F302EFAFF2177D7BAEBC96F0B5D curl --request GET \ --url 'https://{yourDomain}/api/v2/keys/signing' \ --header 'authorization: Bearer {yourMgmtApiAccessToken}' curl --request GET \ --url 'https://{yourDomain}/api/v2/keys/signing/{yourKeyId}' \ --header 'authorization: Bearer {yourMgmtApiAccessToken}' // server.mjs import { createServer } from 'node:http'; const server = createServer((req, res) => { res.writeHead(200, { 'Content-Type': 'text/plain' }); res.end('Hello World!\n'); }); // starts a simple http server locally on port 3000 server.listen(3000, '127.0.0.1', () => { console.log('Listening on 127.0.0.1:3000'); }); // run with node server.mjs +-----BEGIN CERTIFICATE----- MIIDHTCCAgWgAwIBAgIJBsn7KiPsgIGbMA0GCSqGSIb3DQEBCwUAMCwxKjAoBgNV BAMTIWRldi03ODBtMHc1cjhqaHlodHM4LnVzLmF1dGgwLmNvbTAeFw0yNDA2MDMw MzE1MDBaFw0zODAyMTAwMzE1MDBaMCwxKjAoBgNVBAMTIWRldi03ODBtMHc1cjhq aHlodHM4LnVzLmF1dGgwLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoC ggEBAKh6coojyJwEU4HBJTAY7UktrIdoha4YVdv/CXmCpsshWRRkPi4ht6dBdVZp 5LxwOYlVe7Dg32jRdVgmI3gkib8jZlgTurRIcdHHaoBP1alK2E5pBG8s7QRCjMF6 BCUGMjtuxHAEbOs4iC51uDuVcIjLcFJm180UF3KrtAXfEwk1vvldxNkmUokW/HHu 8qHsFH3i1hAjeAhS/lcziqIJF5rRERBoxgUsj8RPz1EbKULpLB3q7MS2yd3qGyrD 7GUXl10RXkLJrlrP+rMqGwkXm/tJ1enHdIvsVHOmJaYR3jRRL5x5xQ8HYklsVIEK MKhF+1jBidfinoKYSgBUWO4pFF8CAwEAAaNCMEAwDwYDVR0TAQH/BAUwAwEB/zAd BgNVHQ4EFgQUzu9gS8XIe5XsxgN10QowXnyVJB8wDgYDVR0PAQH/BAQDAgKEMA0G CSqGSIb3DQEBCwUAA4IBAQCbKFQQ5AsOa375/ql1JCoWHwnyqGFds8G1TSQvBI/v tMCUlU91zkx2REZMCF1MR/Arc8PCcwj3OJEIOpjw3nz/03Ei7w5jaiVorsRXbtiw k93RNIcIchHgS/AdV9kjS6OKU/OmNwE8sz4oBMRMqhIMDsiZo5otK3L3FoxeGKql dBYpLb7QFPMgWGiwJb47VktCnactsJXl7kO1ILfj4+C81GyMaK0Vb4/ZKVEIdeoR qXnXz/PrZn6+euU3fkO8VICUktBuFn6QS0E0EJfaIcGjU7PAZHBGnrZP+6oksujp jPMnXdoH7Zdp+Ivwqynvlpu5P5iQUEEBqKUp0MGZsH6K -----END CERTIFICATE----- FINGERPRINTS: BC:B0:CE:8A:02:41:3F:30:2E:FA:FF:21:77:D7:BA:EB:C9:6F:0B:5D BCB0CE8A02413F302EFAFF2177D7BAEBC96F0B5D -curl -O https://nodejs.org/dist/vx.y.z/SHASUMS256.txtgrep node-vx.y.z.tar.gz SHASUMS256.txt | sha256sum -c - gpg --keyserver hkps://keys.openpgp.org --recv-keys 4ED778F539E3634C779C87C6D7062848A1AB005C curl -O https://nodejs.org/dist/vx.y.z/SHASUMS256.txt.siggpg --keyserver hkps://keys.openpgp.org --recv-keys 4ED778F539E3634C779C87C6D7062848A1AB005C # Beth Griggs gpg --keyserver hkps://keys.openpgp.org --recv-keys 141F07595B7B3FFE74309A937405533BE57C7D57 # Bryan English gpg --keyserver hkps://keys.openpgp.org --recv-keys 74F12602B6F1C4E913FAA37AD3A89613643B6201 # Danielle Adams gpg --keyserver hkps://keys.openpgp.org --recv-keys DD792F5973C6DE52C432CBDAC77ABFA00DDBF2B7 # Juan José Arboleda gpg --keyserver hkps://keys.openpgp.org --recv-keys CC68F5A3106FF448322E48ED27F5E38D5B0A215F # Marco Ippolito gpg --keyserver hkps://keys.openpgp.org --recv-keys 8FCCA13FEF1D0C2E91008E09770F7A9A5AE15600 # Michaël Zasso gpg --keyserver hkps://keys.openpgp.org --recv-keys C4F0DFFF4E8C1A8236409D08E73BC641CC11F4C8 # Myles Borins gpg --keyserver hkps://keys.openpgp.org --recv-keys 890C08DB8579162FEE0DF9DB8BEAB4DFCF555EF4 # Rafael Gonzaga gpg --keyserver hkps://keys.openpgp.org --recv-keys C82FA3AE1CBEDC6BE46B9360C43CEC45C17AB93C # Richard Lau gpg --keyserver hkps://keys.openpgp.org --recv-keys 108F52B48DB57BB0CC439B2997B01419BD92F80A # Ruy Adorno gpg --keyserver hkps://keys.openpgp.org --recv-keys A363A499291CBBC940DD62E41F10027AF002F8B0 # Ulises Gascón curl --request POST \ --url 'https://{yourDomain}/oauth/token' \ --header 'content-type: application/x-www-form-urlencoded' \ --data grant_type=client_credentials \ --data client_id=YOUR_CLIENT_ID \ --data client_secret=YOUR_CLIENT_SECRET \ GET https://{yourDomain}/authorize? response_type=code|token& client_id={yourClientId}& connection=CONNECTION& redirect_uri={https://yourApp/callback}&state=STATE& ADDITIONAL_PARAMETERS GET https://{yourDomain}/authorize?response_type=code|token& client_id={yourClientId}& connection=CONNECTION& redirect_uri={https://yourApp/callback}& scope=openid%20profile%20email& state=STATE --data audience=YOUR_API_IDENTIFIER GET https://{yourDomain}/authorize? response_type=code|token& client_id={yourClientId}& connection=CONNECTION& redirect_uri={https://yourApp/callback}& state=STATE GET https://{yourDomain}/v2/logout? client_id={yourClientId}& returnTo=LOGOUT_URL GET https://{yourDomain}/oidc/logout? post_logout_redirect_uri=LOGOUT_URL& id_token_hint=ID_TOKEN_HINT POST https://{yourDomain}/oauth/token Content-Type: application/json { "grant_type" : "http://auth0.com/oauth/grant-type/passwordless/otp", "client_id": "{yourClientId}", "client_secret": "YOUR_CLIENT_SECRET", // for web applications "otp": "CODE", "realm": "email|sms" //email or sms "username":"USER_EMAIL|USER_PHONE_NUMBER", // depends on which realm you chose "audience" : "API_IDENTIFIER", // in case you need an access token for a specific API "scope": "SCOPE", "redirect_uri": "REDIRECT_URI" } POST https://{yourDomain}/dbconnections/signup Content-Type: application/json { "client_id": "{yourClientId}", "email": "EMAIL", "password": "PASSWORD", "connection": "CONNECTION", "username": "johndoe", "given_name": "John", "family_name": "Doe", "name": "John Doe", "nickname": "johnny", "picture": "http://example.org/jdoe.png" "user_metadata": { plan: 'silver', team_id: 'a111' } } RESPONSE SAMPLE: { "_id": "58457fe6b27...", "email_verified": false, "email": "test.account@signup.com", "username": "johndoe", "given_name": "John", "family_name": "Doe", "name": "John Doe", "nickname": "johnny", "picture": "http://example.org/jdoe.png" } GET https://{yourDomain}/authorize? audience=API_IDENTIFIER& scope=SCOPE& response_type=code& client_id={yourClientId}& redirect_uri={https://yourApp/callback}&code_challenge=CODE_CHALLENGE& code_challenge_method=S256 RESPONSE SAMPLE HTTP/1.1 302 Found Location: {https://yourApp/callback}?code=AUTHORIZATION_CODE Edit file +curl --request GET \ --url 'https://{dev-780m0w5r8jhyhts8.us.auth0.com}/api/v2/keys/signing' \ --header 'authorization: Bearer {yourMgmtApiAccessToken}' + +curl --request GET \ --url 'https://{yourDomain}/api/v2/keys/signing/{yourKeyId}' \ --header 'authorization: Bearer {yourMgmtApiAccessToken}' // server.mjs import { createServer } from 'node:http'; const server = createServer((req, res) => { res.writeHead(200, { 'Content-Type': 'text/plain' }); res.end('Hello World!\n'); }); // starts a simple http server locally on port 3000 server.listen(3000, '127.0.0.1', () => { console.log('Listening on 127.0.0.1:3000'); }); // run with node server.mjs + +curl -O https://nodejs.org/dist/vx.y.z/SHASUMS256.txt grep node-vx.y.z.tar.gz SHASUMS256.txt | sha256sum -c - gpg --keyserver hkps://keys.openpgp.org --recv-keys 4ED778F539E3634C779C87C6D7062848A1AB005C + +curl -O https://nodejs.org/dist/vx.y.z/SHASUMS256.txt.sig gpg --keyserver hkps://keys.openpgp.org --recv-keys 4ED778F539E3634C779C87C6D7062848A1AB005C # Beth Griggs gpg --keyserver hkps://keys.openpgp.org --recv-keys 141F07595B7B3FFE74309A937405533BE57C7D57 # Bryan English gpg --keyserver hkps://keys.openpgp.org --recv-keys 74F12602B6F1C4E913FAA37AD3A89613643B6201 # Danielle Adams gpg --keyserver hkps://keys.openpgp.org --recv-keys DD792F5973C6DE52C432CBDAC77ABFA00DDBF2B7 # Juan José Arboleda gpg --keyserver hkps://keys.openpgp.org --recv-keys CC68F5A3106FF448322E48ED27F5E38D5B0A215F # Marco Ippolito gpg --keyserver hkps://keys.openpgp.org --recv-keys 8FCCA13FEF1D0C2E91008E09770F7A9A5AE15600 # Michaël Zasso gpg --keyserver hkps://keys.openpgp.org --recv-keys C4F0DFFF4E8C1A8236409D08E73BC641CC11F4C8 # Myles Borins gpg --keyserver hkps://keys.openpgp.org --recv-keys 890C08DB8579162FEE0DF9DB8BEAB4DFCF555EF4 # Rafael Gonzaga gpg --keyserver hkps://keys.openpgp.org --recv-keys C82FA3AE1CBEDC6BE46B9360C43CEC45C17AB93C # Richard Lau gpg --keyserver hkps://keys.openpgp.org --recv-keys 108F52B48DB57BB0CC439B2997B01419BD92F80A # Ruy Adorno gpg --keyserver hkps://keys.openpgp.org --recv-keys A363A499291CBBC940DD62E41F10027AF002F8B0 # Ulises Gascón curl --request POST \ --url 'https://{dev-780m0w5r8jhyhts8.us.auth0.com}/oauth/token' \ --header 'content-type: application/x-www-form-urlencoded' \ --data grant_type=client_credentials \ --data client_id=DLT0ckbjQNVoS3fWzd99HyEY0rXC1Gab \ --data client_secret=YOUR_CLIENT_SECRET \ + +GET https://{yourDomain}/authorize? response_type=code|token& client_id={yourClientId}& connection=CONNECTION& redirect_uri={https://yourApp/callback}& state=STATE& ADDITIONAL_PARAMETERS GET https://{yourDomain}/authorize? response_type=code|token& client_id={yourClientId}& connection=CONNECTION& redirect_uri={https://yourApp/callback}&scope=openid%20profile%20email& state=STATE --data audience=YOUR_API_IDENTIFIER GET https://{yourDomain}/authorize? response_type=code|token& client_id={yourClientId}& connection=CONNECTION& redirect_uri={https://yourApp/callback}& state=STATE GET https://{dev-780m0w5r8jhyhts8.us.auth0.com}/v2/logout? client_id={yourClientId}& returnTo=LOGOUT_URL GET https://{yourDomain}/oidc/logout? post_logout_redirect_uri=LOGOUT_URL& id_token_hint=ID_TOKEN_HINT POST https://{yourDomain}/oauth/token Content-Type: application/json { "grant_type" : "http://auth0.com/oauth/grant-type/passwordless/otp", "client_id": "{DLT0ckbjQNVoS3fWzd99HyEY0rXC1Gab}", "client_secret": "YOUR_CLIENT_SECRET", // for web applications "otp": "CODE", "realm": "email|sms" //email or sms "username":"USER_EMAIL|USER_PHONE_NUMBER", // depends on which realm you chose "audience" : "API_IDENTIFIER", // in case you need an access token for a specific API "scope": "SCOPE", "redirect_uri": "REDIRECT_URI" } POST https://{dev-780m0w5r8jhyhts8.us.auth0.com}/dbconnections/signup Content-Type: application/json { "client_id": "{yDLT0ckbjQNVoS3fWzd99HyEY0rXC1Gab}", "email": "EMAIL", "password": "PASSWORD", "connection": "CONNECTION", "username": "johndoe", "given_name": "John", "family_name": "Doe", "name": "John Doe", "nickname": "johnny", "picture": "http://example.org/jdoe.png" "user_metadata": { plan: 'silver', team_id: 'a111' } } RESPONSE SAMPLE: { "_id": "58457fe6b27...", "email_verified": false, "email": "test.account@signup.com", "username": "johndoe", "given_name": "John", "family_name": "Doe", "name": "John Doe", "nickname": "johnny", "picture": "http://example.org/jdoe.png" } GET https://{yourDomain}/authorize?audience=API_IDENTIFIER& scope=SCOPE& response_type=code& client_id={yourClientId}& redirect_uri={https://yourApp/callback}& code_challenge=CODE_CHALLENGE& code_challenge_method=S256 RESPONSE SAMPLE HTTP/1.1 302 Found Location: {https://yourApp/callback}?code=AUTHORIZATION_CODE Edit file curl --request POST \ --url 'https://dev-780m0w5r8jhyhts8.us.auth0.com/oauth/token' \ @@ -22,7 +30,7 @@ curl --request POST \ --header 'content-type: application/x-www-form-urlencoded' \ --data grant_type=refresh_token \ --data 'client_id=OTGv6UTlGzeyNfHLW3b8sZYfihcMQT96' \ - --data 'client_secret={yourClientSecret}' \ + --data 'client_secret={I1i3Q7__hG4am80OAHxnLAREzMYwF2sxmQbJsf1EPD3KdxGUd6rOSv6gfMq7mN3-}' \ --data 'refresh_token={yourRefreshToken}' { @@ -54,7 +62,7 @@ curl --request POST \ --header 'content-type: application/x-www-form-urlencoded' \ --data grant_type=authorization_code \ --data 'client_id=OTGv6UTlGzeyNfHLW3b8sZYfihcMQT96' \ - --data 'client_secret={yourClientSecret}' \ + --data 'client_secret={I1i3Q7__hG4am80OAHxnLAREzMYwF2sxmQbJsf1EPD3KdxGUd6rOSv6gfMq7mN3-}' \ --data 'code={yourAuthorizationCode}' \ --data 'redirect_uri=undefined' @@ -74,13 +82,13 @@ function(user, context, callback) { callback(null, user, context); } GET https://dev-780m0w5r8jhyhts8.us.auth0.com/userinfo -Authorization: 'Bearer {ACCESS_TOKEN}' +Authorization: 'Bearer {eyJhbGciOiJSUzI1NiIsInR5cCI6IkpXVCIsImtpZCI6ImtGQmVZbnB2VVBoRG1tRkJPbGFpMiJ9.eyJpc3MiOiJodHRwczovL2Rldi03ODBtMHc1cjhqaHlodHM4LnVzLmF1dGgwLmNvbS8iLCJzdWIiOiI4eHV1elZnZnBwNDBLNGtNMVhORFJwSDFqRk1pdUpBREBjbGllbnRzIiwiYXVkIjoiaHR0cHM6Ly9kZXYtNzgwbTB3NXI4amh5aHRzOC51cy5hdXRoMC5jb20vYXBpL3YyLyIsImlhdCI6MTcxNzUzMDY3MCwiZXhwIjoxNzE3NjE3MDcwLCJndHkiOiJjbGllbnQtY3JlZGVudGlhbHMiLCJhenAiOiI4eHV1elZnZnBwNDBLNGtNMVhORFJwSDFqRk1pdUpBRCJ9.lTNbQQKn1ihZH42u0nUnR6OCGaRfiCsxonXWttVVZ2SbzuVEl7WgtSmNmoaSWLQemZYVRDgDrjO51jkylCpSeN6vyxbY-sKmS7nd9h8qpRmYe25klUxGwiU2gCfq7Yvvp2pKZ63m94seajovRKqnywpoc5m7U7J1F0J371PgRtGREz-ax6vBGpA_LWjfgmHQbQdV98zpRN91J5frNZcTe6HxKV06LBFP3dl6sqBxAfkiuTQAQFumtWatheVvqA7hHszgbuA2FY5dY6wrX4JSHjVsHmTElelj0UhptWfZccZWm5OpRqBfaykgJWpo49lBxw-4K6vYzGRhdCSrFuQZkA}' POST https://dev-780m0w5r8jhyhts8.us.auth0.com/mfa/challenge Content-Type: application/json { "client_id": "OTGv6UTlGzeyNfHLW3b8sZYfihcMQT96", - "client_secret": "YOUR_CLIENT_SECRET", + "client_secret": "I1i3Q7__hG4am80OAHxnLAREzMYwF2sxmQbJsf1EPD3KdxGUd6rOSv6gfMq7mN3-", "mfa_token": "MFA_TOKEN", "challenge_type": "oob|otp" } @@ -96,7 +104,7 @@ Content-Type: application/json { "client_name": "YOUR-NEW-CLIENT-NAME", "redirect_uris": [], - "token_endpoint_auth_method": "client_secret_post" + "token_endpoint_auth_method": "I1i3Q7__hG4am80OAHxnLAREzMYwF2sxmQbJsf1EPD3KdxGUd6rOSv6gfMq7mN3-" } RESPONSE SAMPLE: { @@ -187,6 +195,174 @@ curl --location 'https://$tenant/oauth/par' \ --data-urlencode 'response_type=code' \ --data-urlencode 'authorization_details=[{"type": "money_transfer", "instructedAmount": {"amount": 2500, "currency": "USD"}, "sourceAccount": "xxxxxxxxxxx1234", "destinationAccount": "xxxxxxxxxxx9876", "beneficiary": "Hanna Herwitz", "subject": "A Lannister Always Pays His Debts"}]' +MANAGEMENT API TOKEN:eyJhbGciOiJSUzI1NiIsInR5cCI6IkpXVCIsImtpZCI6ImtGQmVZbnB2VVBoRG1tRkJPbGFpMiJ9.eyJpc3MiOiJodHRwczovL2Rldi03ODBtMHc1cjhqaHlodHM4LnVzLmF1dGgwLmNvbS8iLCJzdWIiOiJ1Q3RZRFpPYjlDdUF6NWM4M1d5b0YxV0lhTVpYZ1ZRREBjbGllbnRzIiwiYXVkIjoiaHR0cHM6Ly9kZXYtNzgwbTB3NXI4amh5aHRzOC51cy5hdXRoMC5jb20vYXBpL3YyLyIsImlhdCI6MTcxNzUzMTYxOCwiZXhwIjoxNzE3NjE4MDE4LCJzY29wZSI6InJlYWQ6Y2xpZW50X2dyYW50cyBjcmVhdGU6Y2xpZW50X2dyYW50cyBkZWxldGU6Y2xpZW50X2dyYW50cyB1cGRhdGU6Y2xpZW50X2dyYW50cyByZWFkOnVzZXJzIHVwZGF0ZTp1c2VycyBkZWxldGU6dXNlcnMgY3JlYXRlOnVzZXJzIHJlYWQ6dXNlcnNfYXBwX21ldGFkYXRhIHVwZGF0ZTp1c2Vyc19hcHBfbWV0YWRhdGEgZGVsZXRlOnVzZXJzX2FwcF9tZXRhZGF0YSBjcmVhdGU6dXNlcnNfYXBwX21ldGFkYXRhIHJlYWQ6dXNlcl9jdXN0b21fYmxvY2tzIGNyZWF0ZTp1c2VyX2N1c3RvbV9ibG9ja3MgZGVsZXRlOnVzZXJfY3VzdG9tX2Jsb2NrcyBjcmVhdGU6dXNlcl90aWNrZXRzIHJlYWQ6Y2xpZW50cyB1cGRhdGU6Y2xpZW50cyBkZWxldGU6Y2xpZW50cyBjcmVhdGU6Y2xpZW50cyByZWFkOmNsaWVudF9rZXlzIHVwZGF0ZTpjbGllbnRfa2V5cyBkZWxldGU6Y2xpZW50X2tleXMgY3JlYXRlOmNsaWVudF9rZXlzIHJlYWQ6Y29ubmVjdGlvbnMgdXBkYXRlOmNvbm5lY3Rpb25zIGRlbGV0ZTpjb25uZWN0aW9ucyBjcmVhdGU6Y29ubmVjdGlvbnMgcmVhZDpyZXNvdXJjZV9zZXJ2ZXJzIHVwZGF0ZTpyZXNvdXJjZV9zZXJ2ZXJzIGRlbGV0ZTpyZXNvdXJjZV9zZXJ2ZXJzIGNyZWF0ZTpyZXNvdXJjZV9zZXJ2ZXJzIHJlYWQ6ZGV2aWNlX2NyZWRlbnRpYWxzIHVwZGF0ZTpkZXZpY2VfY3JlZGVudGlhbHMgZGVsZXRlOmRldmljZV9jcmVkZW50aWFscyBjcmVhdGU6ZGV2aWNlX2NyZWRlbnRpYWxzIHJlYWQ6cnVsZXMgdXBkYXRlOnJ1bGVzIGRlbGV0ZTpydWxlcyBjcmVhdGU6cnVsZXMgcmVhZDpydWxlc19jb25maWdzIHVwZGF0ZTpydWxlc19jb25maWdzIGRlbGV0ZTpydWxlc19jb25maWdzIHJlYWQ6aG9va3MgdXBkYXRlOmhvb2tzIGRlbGV0ZTpob29rcyBjcmVhdGU6aG9va3MgcmVhZDphY3Rpb25zIHVwZGF0ZTphY3Rpb25zIGRlbGV0ZTphY3Rpb25zIGNyZWF0ZTphY3Rpb25zIHJlYWQ6ZW1haWxfcHJvdmlkZXIgdXBkYXRlOmVtYWlsX3Byb3ZpZGVyIGRlbGV0ZTplbWFpbF9wcm92aWRlciBjcmVhdGU6ZW1haWxfcHJvdmlkZXIgYmxhY2tsaXN0OnRva2VucyByZWFkOnN0YXRzIHJlYWQ6aW5zaWdodHMgcmVhZDp0ZW5hbnRfc2V0dGluZ3MgdXBkYXRlOnRlbmFudF9zZXR0aW5ncyByZWFkOmxvZ3MgcmVhZDpsb2dzX3VzZXJzIHJlYWQ6c2hpZWxkcyBjcmVhdGU6c2hpZWxkcyB1cGRhdGU6c2hpZWxkcyBkZWxldGU6c2hpZWxkcyByZWFkOmFub21hbHlfYmxvY2tzIGRlbGV0ZTphbm9tYWx5X2Jsb2NrcyB1cGRhdGU6dHJpZ2dlcnMgcmVhZDp0cmlnZ2VycyByZWFkOmdyYW50cyBkZWxldGU6Z3JhbnRzIHJlYWQ6Z3VhcmRpYW5fZmFjdG9ycyB1cGRhdGU6Z3VhcmRpYW5fZmFjdG9ycyByZWFkOmd1YXJkaWFuX2Vucm9sbG1lbnRzIGRlbGV0ZTpndWFyZGlhbl9lbnJvbGxtZW50cyBjcmVhdGU6Z3VhcmRpYW5fZW5yb2xsbWVudF90aWNrZXRzIHJlYWQ6dXNlcl9pZHBfdG9rZW5zIGNyZWF0ZTpwYXNzd29yZHNfY2hlY2tpbmdfam9iIGRlbGV0ZTpwYXNzd29yZHNfY2hlY2tpbmdfam9iIHJlYWQ6Y3VzdG9tX2RvbWFpbnMgZGVsZXRlOmN1c3RvbV9kb21haW5zIGNyZWF0ZTpjdXN0b21fZG9tYWlucyB1cGRhdGU6Y3VzdG9tX2RvbWFpbnMgcmVhZDplbWFpbF90ZW1wbGF0ZXMgY3JlYXRlOmVtYWlsX3RlbXBsYXRlcyB1cGRhdGU6ZW1haWxfdGVtcGxhdGVzIHJlYWQ6bWZhX3BvbGljaWVzIHVwZGF0ZTptZmFfcG9saWNpZXMgcmVhZDpyb2xlcyBjcmVhdGU6cm9sZXMgZGVsZXRlOnJvbGVzIHVwZGF0ZTpyb2xlcyByZWFkOnByb21wdHMgdXBkYXRlOnByb21wdHMgcmVhZDpicmFuZGluZyB1cGRhdGU6YnJhbmRpbmcgZGVsZXRlOmJyYW5kaW5nIHJlYWQ6bG9nX3N0cmVhbXMgY3JlYXRlOmxvZ19zdHJlYW1zIGRlbGV0ZTpsb2dfc3RyZWFtcyB1cGRhdGU6bG9nX3N0cmVhbXMgY3JlYXRlOnNpZ25pbmdfa2V5cyByZWFkOnNpZ25pbmdfa2V5cyB1cGRhdGU6c2lnbmluZ19rZXlzIHJlYWQ6bGltaXRzIHVwZGF0ZTpsaW1pdHMgY3JlYXRlOnJvbGVfbWVtYmVycyByZWFkOnJvbGVfbWVtYmVycyBkZWxldGU6cm9sZV9tZW1iZXJzIHJlYWQ6ZW50aXRsZW1lbnRzIHJlYWQ6YXR0YWNrX3Byb3RlY3Rpb24gdXBkYXRlOmF0dGFja19wcm90ZWN0aW9uIHJlYWQ6b3JnYW5pemF0aW9uc19zdW1tYXJ5IGNyZWF0ZTphdXRoZW50aWNhdGlvbl9tZXRob2RzIHJlYWQ6YXV0aGVudGljYXRpb25fbWV0aG9kcyB1cGRhdGU6YXV0aGVudGljYXRpb25fbWV0aG9kcyBkZWxldGU6YXV0aGVudGljYXRpb25fbWV0aG9kcyByZWFkOm9yZ2FuaXphdGlvbnMgdXBkYXRlOm9yZ2FuaXphdGlvbnMgY3JlYXRlOm9yZ2FuaXphdGlvbnMgZGVsZXRlOm9yZ2FuaXphdGlvbnMgY3JlYXRlOm9yZ2FuaXphdGlvbl9tZW1iZXJzIHJlYWQ6b3JnYW5pemF0aW9uX21lbWJlcnMgZGVsZXRlOm9yZ2FuaXphdGlvbl9tZW1iZXJzIGNyZWF0ZTpvcmdhbml6YXRpb25fY29ubmVjdGlvbnMgcmVhZDpvcmdhbml6YXRpb25fY29ubmVjdGlvbnMgdXBkYXRlOm9yZ2FuaXphdGlvbl9jb25uZWN0aW9ucyBkZWxldGU6b3JnYW5pemF0aW9uX2Nvbm5lY3Rpb25zIGNyZWF0ZTpvcmdhbml6YXRpb25fbWVtYmVyX3JvbGVzIHJlYWQ6b3JnYW5pemF0aW9uX21lbWJlcl9yb2xlcyBkZWxldGU6b3JnYW5pemF0aW9uX21lbWJlcl9yb2xlcyBjcmVhdGU6b3JnYW5pemF0aW9uX2ludml0YXRpb25zIHJlYWQ6b3JnYW5pemF0aW9uX2ludml0YXRpb25zIGRlbGV0ZTpvcmdhbml6YXRpb25faW52aXRhdGlvbnMgZGVsZXRlOnBob25lX3Byb3ZpZGVycyBjcmVhdGU6cGhvbmVfcHJvdmlkZXJzIHJlYWQ6cGhvbmVfcHJvdmlkZXJzIHVwZGF0ZTpwaG9uZV9wcm92aWRlcnMgZGVsZXRlOnBob25lX3RlbXBsYXRlcyBjcmVhdGU6cGhvbmVfdGVtcGxhdGVzIHJlYWQ6cGhvbmVfdGVtcGxhdGVzIHVwZGF0ZTpwaG9uZV90ZW1wbGF0ZXMgY3JlYXRlOmVuY3J5cHRpb25fa2V5cyByZWFkOmVuY3J5cHRpb25fa2V5cyB1cGRhdGU6ZW5jcnlwdGlvbl9rZXlzIGRlbGV0ZTplbmNyeXB0aW9uX2tleXMgcmVhZDpzZXNzaW9ucyBkZWxldGU6c2Vzc2lvbnMgcmVhZDpyZWZyZXNoX3Rva2VucyBkZWxldGU6cmVmcmVzaF90b2tlbnMgY3JlYXRlOnNlbGZfc2VydmljZV9wcm9maWxlcyByZWFkOnNlbGZfc2VydmljZV9wcm9maWxlcyB1cGRhdGU6c2VsZl9zZXJ2aWNlX3Byb2ZpbGVzIGRlbGV0ZTpzZWxmX3NlcnZpY2VfcHJvZmlsZXMgY3JlYXRlOnNzb19hY2Nlc3NfdGlja2V0cyByZWFkOmZvcm1zIHVwZGF0ZTpmb3JtcyBkZWxldGU6Zm9ybXMgY3JlYXRlOmZvcm1zIHJlYWQ6Zmxvd3MgdXBkYXRlOmZsb3dzIGRlbGV0ZTpmbG93cyBjcmVhdGU6Zmxvd3MgcmVhZDpmbG93c192YXVsdCB1cGRhdGU6Zmxvd3NfdmF1bHQgZGVsZXRlOmZsb3dzX3ZhdWx0IGNyZWF0ZTpmbG93c192YXVsdCByZWFkOmNsaWVudF9jcmVkZW50aWFscyBjcmVhdGU6Y2xpZW50X2NyZWRlbnRpYWxzIHVwZGF0ZTpjbGllbnRfY3JlZGVudGlhbHMgZGVsZXRlOmNsaWVudF9jcmVkZW50aWFscyIsImd0eSI6ImNsaWVudC1jcmVkZW50aWFscyIsImF6cCI6InVDdFlEWk9iOUN1QXo1YzgzV3lvRjFXSWFNWlhnVlFEIn0.naDZ3rBOk5OKvoIPl9sK4-7qJF0JOOKyUWo53c0IXqyz7ySzN6O9m-ydIyLEsU91B6N1xTRLerfwaHF9b9jVApalrK7jxX4o6KyEJb56YmYSzZ02mew3457B39Eo0mGkcpg_z72T_rxAL6SQ5Y_f_zoDB8iw9LfWjjH3qSeETP2zv8OnDoLHOnIQy84Ip4PdhZZEgV9lkneUHSQ-_TvqWI8vFJNqzw0uc5yUaZ00EpeqBI4bBWq43NLSvDksdpW_ZRrei59UdNvRD3A125gkv2de8uC1Pwv42L0590HmIukQ1Eo3UZezOCwKExPfy8_d1dj817J7DrCTsOUzdbTfdg + + +POST https://$tenant/oauth/token +Content-Type: application/x-www-form-urlencoded + +grant_type=authorization_code&client_id=[DLT0ckbjQNVoS3fWzd99HyEY0rXC1Gab]&client_secret=[I1i3Q7__hG4am80OAHxnLAREzMYwF2sxmQbJsf1EPD3KdxGUd6rOSv6gfMq7mN3]&code=[AUTHZ_CODE]&redirect_uri=https://jwt.io +POST https://$tenant/oauth/token +Content-Type: application/x-www-form-urlencoded + +grant_type=authorization_code&client_id=[DLT0ckbjQNVoS3fWzd99HyEY0rXC1Gab]&client_secret=[I1i3Q7__hG4am80OAHxnLAREzMYwF2sxmQbJsf1EPD3KdxGUd6rOSv6gfMq7mN3]&code=[AUTHZ_CODE]&redirect_uri=https://jwt.io +curl --request PATCH \ + --url 'https://{yourDomain}/api/v2/resource-servers/API_ID' \ + --header 'authorization: Bearer eyJhbGciOiJSUzI1NiIsInR5cCI6IkpXVCIsImtpZCI6ImtGQmVZbnB2VVBoRG1tRkJPbGFpMiJ9.eyJpc3MiOiJodHRwczovL2Rldi03ODBtMHc1cjhqaHlodHM4LnVzLmF1dGgwLmNvbS8iLCJzdWIiOiJ1Q3RZRFpPYjlDdUF6NWM4M1d5b0YxV0lhTVpYZ1ZRREBjbGllbnRzIiwiYXVkIjoiaHR0cHM6Ly9kZXYtNzgwbTB3NXI4amh5aHRzOC51cy5hdXRoMC5jb20vYXBpL3YyLyIsImlhdCI6MTcxNzUzMTY2NSwiZXhwIjoxNzE3NjE4MDY1LCJzY29wZSI6InJlYWQ6Y2xpZW50X2dyYW50cyBjcmVhdGU6Y2xpZW50X2dyYW50cyBkZWxldGU6Y2xpZW50X2dyYW50cyB1cGRhdGU6Y2xpZW50X2dyYW50cyByZWFkOnVzZXJzIHVwZGF0ZTp1c2VycyBkZWxldGU6dXNlcnMgY3JlYXRlOnVzZXJzIHJlYWQ6dXNlcnNfYXBwX21ldGFkYXRhIHVwZGF0ZTp1c2Vyc19hcHBfbWV0YWRhdGEgZGVsZXRlOnVzZXJzX2FwcF9tZXRhZGF0YSBjcmVhdGU6dXNlcnNfYXBwX21ldGFkYXRhIHJlYWQ6dXNlcl9jdXN0b21fYmxvY2tzIGNyZWF0ZTp1c2VyX2N1c3RvbV9ibG9ja3MgZGVsZXRlOnVzZXJfY3VzdG9tX2Jsb2NrcyBjcmVhdGU6dXNlcl90aWNrZXRzIHJlYWQ6Y2xpZW50cyB1cGRhdGU6Y2xpZW50cyBkZWxldGU6Y2xpZW50cyBjcmVhdGU6Y2xpZW50cyByZWFkOmNsaWVudF9rZXlzIHVwZGF0ZTpjbGllbnRfa2V5cyBkZWxldGU6Y2xpZW50X2tleXMgY3JlYXRlOmNsaWVudF9rZXlzIHJlYWQ6Y29ubmVjdGlvbnMgdXBkYXRlOmNvbm5lY3Rpb25zIGRlbGV0ZTpjb25uZWN0aW9ucyBjcmVhdGU6Y29ubmVjdGlvbnMgcmVhZDpyZXNvdXJjZV9zZXJ2ZXJzIHVwZGF0ZTpyZXNvdXJjZV9zZXJ2ZXJzIGRlbGV0ZTpyZXNvdXJjZV9zZXJ2ZXJzIGNyZWF0ZTpyZXNvdXJjZV9zZXJ2ZXJzIHJlYWQ6ZGV2aWNlX2NyZWRlbnRpYWxzIHVwZGF0ZTpkZXZpY2VfY3JlZGVudGlhbHMgZGVsZXRlOmRldmljZV9jcmVkZW50aWFscyBjcmVhdGU6ZGV2aWNlX2NyZWRlbnRpYWxzIHJlYWQ6cnVsZXMgdXBkYXRlOnJ1bGVzIGRlbGV0ZTpydWxlcyBjcmVhdGU6cnVsZXMgcmVhZDpydWxlc19jb25maWdzIHVwZGF0ZTpydWxlc19jb25maWdzIGRlbGV0ZTpydWxlc19jb25maWdzIHJlYWQ6aG9va3MgdXBkYXRlOmhvb2tzIGRlbGV0ZTpob29rcyBjcmVhdGU6aG9va3MgcmVhZDphY3Rpb25zIHVwZGF0ZTphY3Rpb25zIGRlbGV0ZTphY3Rpb25zIGNyZWF0ZTphY3Rpb25zIHJlYWQ6ZW1haWxfcHJvdmlkZXIgdXBkYXRlOmVtYWlsX3Byb3ZpZGVyIGRlbGV0ZTplbWFpbF9wcm92aWRlciBjcmVhdGU6ZW1haWxfcHJvdmlkZXIgYmxhY2tsaXN0OnRva2VucyByZWFkOnN0YXRzIHJlYWQ6aW5zaWdodHMgcmVhZDp0ZW5hbnRfc2V0dGluZ3MgdXBkYXRlOnRlbmFudF9zZXR0aW5ncyByZWFkOmxvZ3MgcmVhZDpsb2dzX3VzZXJzIHJlYWQ6c2hpZWxkcyBjcmVhdGU6c2hpZWxkcyB1cGRhdGU6c2hpZWxkcyBkZWxldGU6c2hpZWxkcyByZWFkOmFub21hbHlfYmxvY2tzIGRlbGV0ZTphbm9tYWx5X2Jsb2NrcyB1cGRhdGU6dHJpZ2dlcnMgcmVhZDp0cmlnZ2VycyByZWFkOmdyYW50cyBkZWxldGU6Z3JhbnRzIHJlYWQ6Z3VhcmRpYW5fZmFjdG9ycyB1cGRhdGU6Z3VhcmRpYW5fZmFjdG9ycyByZWFkOmd1YXJkaWFuX2Vucm9sbG1lbnRzIGRlbGV0ZTpndWFyZGlhbl9lbnJvbGxtZW50cyBjcmVhdGU6Z3VhcmRpYW5fZW5yb2xsbWVudF90aWNrZXRzIHJlYWQ6dXNlcl9pZHBfdG9rZW5zIGNyZWF0ZTpwYXNzd29yZHNfY2hlY2tpbmdfam9iIGRlbGV0ZTpwYXNzd29yZHNfY2hlY2tpbmdfam9iIHJlYWQ6Y3VzdG9tX2RvbWFpbnMgZGVsZXRlOmN1c3RvbV9kb21haW5zIGNyZWF0ZTpjdXN0b21fZG9tYWlucyB1cGRhdGU6Y3VzdG9tX2RvbWFpbnMgcmVhZDplbWFpbF90ZW1wbGF0ZXMgY3JlYXRlOmVtYWlsX3RlbXBsYXRlcyB1cGRhdGU6ZW1haWxfdGVtcGxhdGVzIHJlYWQ6bWZhX3BvbGljaWVzIHVwZGF0ZTptZmFfcG9saWNpZXMgcmVhZDpyb2xlcyBjcmVhdGU6cm9sZXMgZGVsZXRlOnJvbGVzIHVwZGF0ZTpyb2xlcyByZWFkOnByb21wdHMgdXBkYXRlOnByb21wdHMgcmVhZDpicmFuZGluZyB1cGRhdGU6YnJhbmRpbmcgZGVsZXRlOmJyYW5kaW5nIHJlYWQ6bG9nX3N0cmVhbXMgY3JlYXRlOmxvZ19zdHJlYW1zIGRlbGV0ZTpsb2dfc3RyZWFtcyB1cGRhdGU6bG9nX3N0cmVhbXMgY3JlYXRlOnNpZ25pbmdfa2V5cyByZWFkOnNpZ25pbmdfa2V5cyB1cGRhdGU6c2lnbmluZ19rZXlzIHJlYWQ6bGltaXRzIHVwZGF0ZTpsaW1pdHMgY3JlYXRlOnJvbGVfbWVtYmVycyByZWFkOnJvbGVfbWVtYmVycyBkZWxldGU6cm9sZV9tZW1iZXJzIHJlYWQ6ZW50aXRsZW1lbnRzIHJlYWQ6YXR0YWNrX3Byb3RlY3Rpb24gdXBkYXRlOmF0dGFja19wcm90ZWN0aW9uIHJlYWQ6b3JnYW5pemF0aW9uc19zdW1tYXJ5IGNyZWF0ZTphdXRoZW50aWNhdGlvbl9tZXRob2RzIHJlYWQ6YXV0aGVudGljYXRpb25fbWV0aG9kcyB1cGRhdGU6YXV0aGVudGljYXRpb25fbWV0aG9kcyBkZWxldGU6YXV0aGVudGljYXRpb25fbWV0aG9kcyByZWFkOm9yZ2FuaXphdGlvbnMgdXBkYXRlOm9yZ2FuaXphdGlvbnMgY3JlYXRlOm9yZ2FuaXphdGlvbnMgZGVsZXRlOm9yZ2FuaXphdGlvbnMgY3JlYXRlOm9yZ2FuaXphdGlvbl9tZW1iZXJzIHJlYWQ6b3JnYW5pemF0aW9uX21lbWJlcnMgZGVsZXRlOm9yZ2FuaXphdGlvbl9tZW1iZXJzIGNyZWF0ZTpvcmdhbml6YXRpb25fY29ubmVjdGlvbnMgcmVhZDpvcmdhbml6YXRpb25fY29ubmVjdGlvbnMgdXBkYXRlOm9yZ2FuaXphdGlvbl9jb25uZWN0aW9ucyBkZWxldGU6b3JnYW5pemF0aW9uX2Nvbm5lY3Rpb25zIGNyZWF0ZTpvcmdhbml6YXRpb25fbWVtYmVyX3JvbGVzIHJlYWQ6b3JnYW5pemF0aW9uX21lbWJlcl9yb2xlcyBkZWxldGU6b3JnYW5pemF0aW9uX21lbWJlcl9yb2xlcyBjcmVhdGU6b3JnYW5pemF0aW9uX2ludml0YXRpb25zIHJlYWQ6b3JnYW5pemF0aW9uX2ludml0YXRpb25zIGRlbGV0ZTpvcmdhbml6YXRpb25faW52aXRhdGlvbnMgZGVsZXRlOnBob25lX3Byb3ZpZGVycyBjcmVhdGU6cGhvbmVfcHJvdmlkZXJzIHJlYWQ6cGhvbmVfcHJvdmlkZXJzIHVwZGF0ZTpwaG9uZV9wcm92aWRlcnMgZGVsZXRlOnBob25lX3RlbXBsYXRlcyBjcmVhdGU6cGhvbmVfdGVtcGxhdGVzIHJlYWQ6cGhvbmVfdGVtcGxhdGVzIHVwZGF0ZTpwaG9uZV90ZW1wbGF0ZXMgY3JlYXRlOmVuY3J5cHRpb25fa2V5cyByZWFkOmVuY3J5cHRpb25fa2V5cyB1cGRhdGU6ZW5jcnlwdGlvbl9rZXlzIGRlbGV0ZTplbmNyeXB0aW9uX2tleXMgcmVhZDpzZXNzaW9ucyBkZWxldGU6c2Vzc2lvbnMgcmVhZDpyZWZyZXNoX3Rva2VucyBkZWxldGU6cmVmcmVzaF90b2tlbnMgY3JlYXRlOnNlbGZfc2VydmljZV9wcm9maWxlcyByZWFkOnNlbGZfc2VydmljZV9wcm9maWxlcyB1cGRhdGU6c2VsZl9zZXJ2aWNlX3Byb2ZpbGVzIGRlbGV0ZTpzZWxmX3NlcnZpY2VfcHJvZmlsZXMgY3JlYXRlOnNzb19hY2Nlc3NfdGlja2V0cyByZWFkOmZvcm1zIHVwZGF0ZTpmb3JtcyBkZWxldGU6Zm9ybXMgY3JlYXRlOmZvcm1zIHJlYWQ6Zmxvd3MgdXBkYXRlOmZsb3dzIGRlbGV0ZTpmbG93cyBjcmVhdGU6Zmxvd3MgcmVhZDpmbG93c192YXVsdCB1cGRhdGU6Zmxvd3NfdmF1bHQgZGVsZXRlOmZsb3dzX3ZhdWx0IGNyZWF0ZTpmbG93c192YXVsdCByZWFkOmNsaWVudF9jcmVkZW50aWFscyBjcmVhdGU6Y2xpZW50X2NyZWRlbnRpYWxzIHVwZGF0ZTpjbGllbnRfY3JlZGVudGlhbHMgZGVsZXRlOmNsaWVudF9jcmVkZW50aWFscyIsImd0eSI6ImNsaWVudC1jcmVkZW50aWFscyIsImF6cCI6InVDdFlEWk9iOUN1QXo1YzgzV3lvRjFXSWFNWlhnVlFEIn0.CSVlNrwwfW05Jkcw0FttfRxbuNXW-yTtJpNZm8ksjBHQEK1qkX4ORSmmnIcgxP66RcuK7fn50maKfxqSzbaQirduANyrNQcKdDfO0qffCj_ho1d8FqA_TmJQ9SneBCfvlNeN7FEOB_J4SyDuJGtOu6oEg7bg4iA3HTKLFtwFzbUBH7YehWt1_cPNEXX-Qme96sSq3hHnvq5RTVKzV7234K2Of47-L4dw9g_kmtOzitt_Y_tIPcRrz47h47vWQxO4jZ_brg4ao2yVve4spHWgnYvf7AFevR7sStpW5ACbUBj0ZZUye_tpB3f8UKZ3NdHE-fZuesWer0CtWrUBX7wxZQ' \ + --header 'content-type: application/json' \ + --data '{"token_dialect": "TOKEN_DIALECT" }' + +curl -X POST --location "https://{domain}/api/v2/resource-servers" \ + -H "Authorization: Bearer {eyJhbGciOiJSUzI1NiIsInR5cCI6IkpXVCIsImtpZCI6ImtGQmVZbnB2VVBoRG1tRkJPbGFpMiJ9.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.CSVlNrwwfW05Jkcw0FttfRxbuNXW-yTtJpNZm8ksjBHQEK1qkX4ORSmmnIcgxP66RcuK7fn50maKfxqSzbaQirduANyrNQcKdDfO0qffCj_ho1d8FqA_TmJQ9SneBCfvlNeN7FEOB_J4SyDuJGtOu6oEg7bg4iA3HTKLFtwFzbUBH7YehWt1_cPNEXX-Qme96sSq3hHnvq5RTVKzV7234K2Of47-L4dw9g_kmtOzitt_Y_tIPcRrz47h47vWQxO4jZ_brg4ao2yVve4spHWgnYvf7AFevR7sStpW5ACbUBj0ZZUye_tpB3f8UKZ3NdHE-fZuesWer0CtWrUBX7wxZQ}" \ + -H "Content-Type: application/json" \ + --data-raw '{ + "name": "{apiName}", + "identifier": "{apiIdentifier}", + "token_encryption": { + "format": "compact-nested-jwe", + "encryption_key": + { + "name": "{credentialName}", + "pem": "{pem}", + "alg": "{alg}", + "kid": "{kid}" + } + } +}' +const fs = require('fs'); +const crypto = require('crypto'); + +const { calculateJwkThumbprint, exportJWK } = require('jose'); + +const publicKeyObject = crypto.createPublicKey(fs.readFileSync('./my_cert.pem')); +exportJWK(publicKeyObject).then((jwk) => { + calculateJwkThumbprint(jwk, 'sha256').then((thumbprint) => { + console.log(thumbprint); + }); +}); + +https://{yourDomain}/authorize? +scope=read:contacts%20read:calendar& +audience=organize& +response_type=id_token%20token& +client_id={DLT0ckbjQNVoS3fWzd99HyEY0rXC1Gab}& +redirect_uri=http://localhost:3000& +nonce={nonce} +function getParameterByName(name) { + var match = RegExp('[#&]' + name + '=([^&])').exec(window.location.hash); + return match && decodeURIComponent(match[1].replace(/\+/g, ' ')); +} + +function getAccessToken() { + return getParameterByName('eyJhbGciOiJSUzI1NiIsInR5cCI6IkpXVCIsImtpZCI6ImtGQmVZbnB2VVBoRG1tRkJPbGFpMiJ9.eyJpc3MiOiJodHRwczovL2Rldi03ODBtMHc1cjhqaHlodHM4LnVzLmF1dGgwLmNvbS8iLCJzdWIiOiI4eHV1elZnZnBwNDBLNGtNMVhORFJwSDFqRk1pdUpBREBjbGllbnRzIiwiYXVkIjoiaHR0cHM6Ly9kZXYtNzgwbTB3NXI4amh5aHRzOC51cy5hdXRoMC5jb20vYXBpL3YyLyIsImlhdCI6MTcxNzUzMDY3MCwiZXhwIjoxNzE3NjE3MDcwLCJndHkiOiJjbGllbnQtY3JlZGVudGlhbHMiLCJhenAiOiI4eHV1elZnZnBwNDBLNGtNMVhORFJwSDFqRk1pdUpBRCJ9.lTNbQQKn1ihZH42u0nUnR6OCGaRfiCsxonXWttVVZ2SbzuVEl7WgtSmNmoaSWLQemZYVRDgDrjO51jkylCpSeN6vyxbY-sKmS7nd9h8qpRmYe25klUxGwiU2gCfq7Yvvp2pKZ63m94seajovRKqnywpoc5m7U7J1F0J371PgRtGREz-ax6vBGpA_LWjfgmHQbQdV98zpRN91J5frNZcTe6HxKV06LBFP3dl6sqBxAfkiuTQAQFumtWatheVvqA7hHszgbuA2FY5dY6wrX4JSHjVsHmTElelj0UhptWfZccZWm5OpRqBfaykgJWpo49lBxw-4K6vYzGRhdCSrFuQZkA'); +} + +curl --location --request POST 'https://$tenant/api/v2/resource-servers/' \ + --header 'Authorization: Bearer $eyJhbGciOiJSUzI1NiIsInR5cCI6IkpXVCIsImtpZCI6ImtGQmVZbnB2VVBoRG1tRkJPbGFpMiJ9.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.CSVlNrwwfW05Jkcw0FttfRxbuNXW-yTtJpNZm8ksjBHQEK1qkX4ORSmmnIcgxP66RcuK7fn50maKfxqSzbaQirduANyrNQcKdDfO0qffCj_ho1d8FqA_TmJQ9SneBCfvlNeN7FEOB_J4SyDuJGtOu6oEg7bg4iA3HTKLFtwFzbUBH7YehWt1_cPNEXX-Qme96sSq3hHnvq5RTVKzV7234K2Of47-L4dw9g_kmtOzitt_Y_tIPcRrz47h47vWQxO4jZ_brg4ao2yVve4spHWgnYvf7AFevR7sStpW5ACbUBj0ZZUye_tpB3f8UKZ3NdHE-fZuesWer0CtWrUBX7wxZQ' \ + --header 'Content-Type: application/json' \ + --data-raw '{ + "name": "Payments API", + "identifier": "https://payments.api/", + "consent_policy": "transactional-authorization-with-mfa", + "authorization_details": [{"type": "payment_initiation"}] + }' +curl --location --request PUT "https://$tenant/api/v2/prompts/customized-consent/partials" \ + --header "Authorization: Bearer $eyJhbGciOiJSUzI1NiIsInR5cCI6IkpXVCIsImtpZCI6ImtGQmVZbnB2VVBoRG1tRkJPbGFpMiJ9.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.CSVlNrwwfW05Jkcw0FttfRxbuNXW-yTtJpNZm8ksjBHQEK1qkX4ORSmmnIcgxP66RcuK7fn50maKfxqSzbaQirduANyrNQcKdDfO0qffCj_ho1d8FqA_TmJQ9SneBCfvlNeN7FEOB_J4SyDuJGtOu6oEg7bg4iA3HTKLFtwFzbUBH7YehWt1_cPNEXX-Qme96sSq3hHnvq5RTVKzV7234K2Of47-L4dw9g_kmtOzitt_Y_tIPcRrz47h47vWQxO4jZ_brg4ao2yVve4spHWgnYvf7AFevR7sStpW5ACbUBj0ZZUye_tpB3f8UKZ3NdHE-fZuesWer0CtWrUBX7wxZQ" \ + --header "Content-Type: application/json" \ + --data '{ + "customized-consent": { + "form-content": "<div style=\"font-size: 1.3em; font-weight: bold;\">Operation Details</div><hr style=\"margin: 10px 0;\"><div style=\"margin-bottom: 20px;\"></div><div style=\"font-weight: bold;\">Transaction Type</div><div>{{ transaction.params.authorization_details[0].type }}</div><div style=\"margin-bottom: 20px;\"></div><div style=\"font-weight: bold;\">Amount</div><div>{{ transaction.params.authorization_details[0].instructedAmount.amount }} {{ transaction.params.authorization_details[0].instructedAmount.currency }}</div><div style=\"margin-bottom: 20px;\"></div><div style=\"font-weight: bold;\">Recipient</div><div>{{ transaction.params.authorization_details[0].beneficiary }}</div><div style=\"margin-bottom: 20px;\"></div><div style=\"font-weight: bold;\">Destination Account</div><div>{{ transaction.params.authorization_details[0].destinationAccount }}</div><div style=\"margin-bottom: 20px;\"></div>" + } + }' +curl --request POST \ + --url 'https://dev-780m0w5r8jhyhts8.us.auth0.com/oauth/token' \ + --header 'content-type: application/x-www-form-urlencoded' \ + --data grant_type=client_credentials \ + --data 'client_id=OTGv6UTlGzeyNfHLW3b8sZYfihcMQT96' \ + --data 'client_secret={I1i3Q7__hG4am80OAHxnLAREzMYwF2sxmQbJsf1EPD3KdxGUd6rOSv6gfMq7mN3-}' \ + --data 'audience=https://dev-780m0w5r8jhyhts8.us.auth0.com/api/v2/' + +{ + "access_token": "eyJ...Ggg", + "expires_in": 86400, + "scope": "read:clients create:clients read:client_keys", + "token_type": "Bearer" +} +curl --request POST \ + --url http:///{mgmtApiEndpoint} \ + --header 'authorization: Bearer {yourMgmtApiAccessToken}' \ + --header 'content-type: application/json' + +curl --request GET \ + --url 'https://dev-780m0w5r8jhyhts8.us.auth0.com/api/v2/clients' \ + --header 'authorization: Bearer {eyJhbGciOiJSUzI1NiIsInR5cCI6IkpXVCIsImtpZCI6ImtGQmVZbnB2VVBoRG1tRkJPbGFpMiJ9.eyJpc3MiOiJodHRwczovL2Rldi03ODBtMHc1cjhqaHlodHM4LnVzLmF1dGgwLmNvbS8iLCJzdWIiOiI4eHV1elZnZnBwNDBLNGtNMVhORFJwSDFqRk1pdUpBREBjbGllbnRzIiwiYXVkIjoiaHR0cHM6Ly9kZXYtNzgwbTB3NXI4amh5aHRzOC51cy5hdXRoMC5jb20vYXBpL3YyLyIsImlhdCI6MTcxNzUzMDY3MCwiZXhwIjoxNzE3NjE3MDcwLCJndHkiOiJjbGllbnQtY3JlZGVudGlhbHMiLCJhenAiOiI4eHV1elZnZnBwNDBLNGtNMVhORFJwSDFqRk1pdUpBRCJ9.lTNbQQKn1ihZH42u0nUnR6OCGaRfiCsxonXWttVVZ2SbzuVEl7WgtSmNmoaSWLQemZYVRDgDrjO51jkylCpSeN6vyxbY-sKmS7nd9h8qpRmYe25klUxGwiU2gCfq7Yvvp2pKZ63m94seajovRKqnywpoc5m7U7J1F0J371PgRtGREz-ax6vBGpA_LWjfgmHQbQdV98zpRN91J5frNZcTe6HxKV06LBFP3dl6sqBxAfkiuTQAQFumtWatheVvqA7hHszgbuA2FY5dY6wrX4JSHjVsHmTElelj0UhptWfZccZWm5OpRqBfaykgJWpo49lBxw-4K6vYzGRhdCSrFuQZkA}' \ + --header 'content-type: application/json' +def main(): + import json, requests + from requests.exceptions import RequestException, HTTPError, URLRequired + + # Configuration Values + domain = 'YOUR_DOMAIN' + audience = f'https://{domain}/api/v2/' + client_id = 'DLT0ckbjQNVoS3fWzd99HyEY0rXC1Gab' + client_secret = 'I1i3Q7__hG4am80OAHxnLAREzMYwF2sxmQbJsf1EPD3KdxGUd6rOSv6gfMq7mN3-' + grant_type = "client_credentials" # OAuth 2.0 flow to use + + # Get an Access Token from Auth0 + base_url = f"https://{domain}" + payload = { + 'grant_type': grant_type, + 'client_id': client_id, + 'client_secret': I1i3Q7__hG4am80OAHxnLAREzMYwF2sxmQbJsf1EPD3KdxGUd6rOSv6gfMq7mN3-, + 'audience': audience + } + response = requests.post(f'{base_url}/oauth/token', data=payload) + oauth = response.json() + access_token = oauth.get('eyJhbGciOiJSUzI1NiIsInR5cCI6IkpXVCIsImtpZCI6ImtGQmVZbnB2VVBoRG1tRkJPbGFpMiJ9.eyJpc3MiOiJodHRwczovL2Rldi03ODBtMHc1cjhqaHlodHM4LnVzLmF1dGgwLmNvbS8iLCJzdWIiOiI4eHV1elZnZnBwNDBLNGtNMVhORFJwSDFqRk1pdUpBREBjbGllbnRzIiwiYXVkIjoiaHR0cHM6Ly9kZXYtNzgwbTB3NXI4amh5aHRzOC51cy5hdXRoMC5jb20vYXBpL3YyLyIsImlhdCI6MTcxNzUzMDY3MCwiZXhwIjoxNzE3NjE3MDcwLCJndHkiOiJjbGllbnQtY3JlZGVudGlhbHMiLCJhenAiOiI4eHV1elZnZnBwNDBLNGtNMVhORFJwSDFqRk1pdUpBRCJ9.lTNbQQKn1ihZH42u0nUnR6OCGaRfiCsxonXWttVVZ2SbzuVEl7WgtSmNmoaSWLQemZYVRDgDrjO51jkylCpSeN6vyxbY-sKmS7nd9h8qpRmYe25klUxGwiU2gCfq7Yvvp2pKZ63m94seajovRKqnywpoc5m7U7J1F0J371PgRtGREz-ax6vBGpA_LWjfgmHQbQdV98zpRN91J5frNZcTe6HxKV06LBFP3dl6sqBxAfkiuTQAQFumtWatheVvqA7hHszgbuA2FY5dY6wrX4JSHjVsHmTElelj0UhptWfZccZWm5OpRqBfaykgJWpo49lBxw-4K6vYzGRhdCSrFuQZkA') + + # Add the token to the Authorization header of the request + headers = { + 'Authorization': f'Bearer {eyJhbGciOiJSUzI1NiIsInR5cCI6IkpXVCIsImtpZCI6ImtGQmVZbnB2VVBoRG1tRkJPbGFpMiJ9.eyJpc3MiOiJodHRwczovL2Rldi03ODBtMHc1cjhqaHlodHM4LnVzLmF1dGgwLmNvbS8iLCJzdWIiOiI4eHV1elZnZnBwNDBLNGtNMVhORFJwSDFqRk1pdUpBREBjbGllbnRzIiwiYXVkIjoiaHR0cHM6Ly9kZXYtNzgwbTB3NXI4amh5aHRzOC51cy5hdXRoMC5jb20vYXBpL3YyLyIsImlhdCI6MTcxNzUzMDY3MCwiZXhwIjoxNzE3NjE3MDcwLCJndHkiOiJjbGllbnQtY3JlZGVudGlhbHMiLCJhenAiOiI4eHV1elZnZnBwNDBLNGtNMVhORFJwSDFqRk1pdUpBRCJ9.lTNbQQKn1ihZH42u0nUnR6OCGaRfiCsxonXWttVVZ2SbzuVEl7WgtSmNmoaSWLQemZYVRDgDrjO51jkylCpSeN6vyxbY-sKmS7nd9h8qpRmYe25klUxGwiU2gCfq7Yvvp2pKZ63m94seajovRKqnywpoc5m7U7J1F0J371PgRtGREz-ax6vBGpA_LWjfgmHQbQdV98zpRN91J5frNZcTe6HxKV06LBFP3dl6sqBxAfkiuTQAQFumtWatheVvqA7hHszgbuA2FY5dY6wrX4JSHjVsHmTElelj0UhptWfZccZWm5OpRqBfaykgJWpo49lBxw-4K6vYzGRhdCSrFuQZkA}', + 'Content-Type': 'application/json' + } + + # Get all Applications using the token + try: + res = requests.get(f'{base_url}/api/v2/clients', headers=headers) + print(res.json()) + except HTTPError as e: + print(f'HTTPError: {str(e.code)} {str(e.reason)}') + except URLRequired as e: + print(f'URLRequired: {str(e.reason)}') + except RequestException as e: + print(f'RequestException: {e}') + except Exception as e: + print(f'Generic Exception: {e}') + +# Standard boilerplate to call the main() function. +if name == ;'main': + main() +https://dev-780m0w5r8jhyhts8.us.auth0.com/api/v2/ +API IDENTIFIEER:665d3535559cf53ada0c0fb9+https://dev-780m0w5r8jhyhts8.us.auth0.com/api/v2/ + +curl --request POST \ + --url https://dev-780m0w5r8jhyhts8.us.auth0.com/oauth/token \ + --header 'content-type: application/json' \ + --data '{"client_id":"8xuuzVgfpp40K4kM1XNDRpH1jFMiuJAD","client_secret":"aEVgxpTkh8i9SNzX_8G5RHHeK6in7oBWp9WZvw1xL0Hka6uKUuZmDzgs35AM0jZ0","audience":"https://dev-780m0w5r8jhyhts8.us.auth0.com/api/v2/","grant_type":"client_credentials"}' +In this example, client_id and client_secret are the ones from the Auth0 Management API (Test Application) application. You can change this values with any from your other authorized applications. +Response +{ + "access_token": "eyJhbGciOiJSUzI1NiIsInR5cCI6IkpXVCIsImtpZCI6ImtGQmVZbnB2VVBoRG1tRkJPbGFpMiJ9.eyJpc3MiOiJodHRwczovL2Rldi03ODBtMHc1cjhqaHlodHM4LnVzLmF1dGgwLmNvbS8iLCJzdWIiOiI4eHV1elZnZnBwNDBLNGtNMVhORFJwSDFqRk1pdUpBREBjbGllbnRzIiwiYXVkIjoiaHR0cHM6Ly9kZXYtNzgwbTB3NXI4amh5aHRzOC51cy5hdXRoMC5jb20vYXBpL3YyLyIsImlhdCI6MTcxNzUzMDY3MCwiZXhwIjoxNzE3NjE3MDcwLCJndHkiOiJjbGllbnQtY3JlZGVudGlhbHMiLCJhenAiOiI4eHV1elZnZnBwNDBLNGtNMVhORFJwSDFqRk1pdUpBRCJ9.lTNbQQKn1ihZH42u0nUnR6OCGaRfiCsxonXWttVVZ2SbzuVEl7WgtSmNmoaSWLQemZYVRDgDrjO51jkylCpSeN6vyxbY-sKmS7nd9h8qpRmYe25klUxGwiU2gCfq7Yvvp2pKZ63m94seajovRKqnywpoc5m7U7J1F0J371PgRtGREz-ax6vBGpA_LWjfgmHQbQdV98zpRN91J5frNZcTe6HxKV06LBFP3dl6sqBxAfkiuTQAQFumtWatheVvqA7hHszgbuA2FY5dY6wrX4JSHjVsHmTElelj0UhptWfZccZWm5OpRqBfaykgJWpo49lBxw-4K6vYzGRhdCSrFuQZkA", + "token_type": "Bearer"} + + +curl --request GET \ + --url http://path_to_your_api/ \ + --header 'authorization: Bearer eyJhbGciOiJSUzI1NiIsInR5cCI6IkpXVCIsImtpZCI6ImtGQmVZbnB2VVBoRG1tRkJPbGFpMiJ9.eyJpc3MiOiJodHRwczovL2Rldi03ODBtMHc1cjhqaHlodHM4LnVzLmF1dGgwLmNvbS8iLCJzdWIiOiI4eHV1elZnZnBwNDBLNGtNMVhORFJwSDFqRk1pdUpBREBjbGllbnRzIiwiYXVkIjoiaHR0cHM6Ly9kZXYtNzgwbTB3NXI4amh5aHRzOC51cy5hdXRoMC5jb20vYXBpL3YyLyIsImlhdCI6MTcxNzUzMDY3MCwiZXhwIjoxNzE3NjE3MDcwLCJndHkiOiJjbGllbnQtY3JlZGVudGlhbHMiLCJhenAiOiI4eHV1elZnZnBwNDBLNGtNMVhORFJwSDFqRk1pdUpBRCJ9.lTNbQQKn1ihZH42u0nUnR6OCGaRfiCsxonXWttVVZ2SbzuVEl7WgtSmNmoaSWLQemZYVRDgDrjO51jkylCpSeN6vyxbY-sKmS7nd9h8qpRmYe25klUxGwiU2gCfq7Yvvp2pKZ63m94seajovRKqnywpoc5m7U7J1F0J371PgRtGREz-ax6vBGpA_LWjfgmHQbQdV98zpRN91J5frNZcTe6HxKV06LBFP3dl6sqBxAfkiuTQAQFumtWatheVvqA7hHszgbuA2FY5dY6wrX4JSHjVsHmTElelj0UhptWfZccZWm5OpRqBfaykgJWpo49lBxw-4K6vYzGRhdCSrFuQZkA' + + + { "aud": "m8DAxghyfE0KdpzogfXgMSxrkCSdKVEF" "scopes": { "connections": { "actions": ["read", "update"] } } "iat": "1446056652", "jti": "7e9c6a991f5a227fb7ebaa522536ae4c" } curl -H "Authorization: Bearer eyJhb..." https://@@TENANT@@.auth0.com/api/v2/users curl -H "Authorization: Bearer eyJhb..." -H "x-correlation-id: client1_xyz" https://@@TENANT@@.auth0.com/api/v2/users "references": { "correlation_id": "client1_xyz" }, curl -L 'https://login.auth0.com/api/v2/actions/actions?deployed=true&installed=true' \ -H 'Accept: application/json' API TOKEN: curl -L 'https://login.auth0.com/api/v2/actions/actions' \ -H 'Content-Type: application/json' \ -H 'Accept: application/json' \ -d '{"name":"string","supported_triggers":[{"id":"post-login","version":"string","status":"string","runtimes":["string"],"default_runtime":"string","compatible_triggers":[{"id":"post-login","version":"string"}]}],"code":"string","dependencies":[{"name":"string","version":"string","registry_url":"string"}],"runtime":"string","secrets":[{"name":"string","value":"string"}]}' curl -L 'https://login.auth0.com/api/v2/actions/actions/:actionId/versions' \ -H 'Accept: application/json' curl -L 'https://login.auth0.com/api/v2/actions/actions/:id' \ -H 'Accept: application/json' curl -L -X POST 'https://login.auth0.com/api/v2/actions/actions/:id/deploy' \ -H 'Accept: application/json' curl -L 'https://login.auth0.com/api/v2/actions/executions/:id' \ -H 'Accept: application/json' curl -L 'https://login.auth0.com/api/v2/actions/triggers' \ -H 'Accept: application/json' curl -L 'https://login.auth0.com/api/v2/actions/triggers/:triggerId/bindings' \ -H 'Accept: application/json' curl -L 'https://login.auth0.com/api/v2/anomaly/blocks/ips/:id' curl -L 'https://login.auth0.com/api/v2/attack-protection/brute-force-protection' \ -H 'Accept: application/json' curl -L 'https://login.auth0.com/api/v2/attack-protection/suspicious-ip-throttling' \ -H 'Accept: application/json' curl -L 'https://login.auth0.com/api/v2/blacklists/tokens' \ -H 'Accept: application/json' curl -L 'https://login.auth0.com/api/v2/blacklists/tokens' \ -H 'Content-Type: application/json' \ -d '{"aud":"string","jti":"string"}' curl -L 'https://login.auth0.com/api/v2/client-grants' \ -H 'Accept: application/json' curl -L 'https://login.auth0.com/api/v2/client-grants' \ -H 'Content-Type: application/json' \ -H 'Accept: application/json' \ -d '{"client_id":"string","audience":"string","scope":["string"]}' curl -L 'https://login.auth0.com/api/v2/clients' \ -H 'Accept: application/json' curl -L 'https://login.auth0.com/api/v2/clients' \ -H 'Content-Type: application/json' \ -H 'Accept: application/json' \ -d '{"name":"string","description":"string","logo_uri":"string","callbacks":["string"],"oidc_logout":{"backchannel_logout_urls":["string"],"backchannel_logout_initiators":{"mode":"custom","selected_initiators":["rp-logout"]}},"allowed_origins":["string"],"web_origins":["string"],"client_aliases":["string"],"allowed_clients":["string"],"allowed_logout_urls":["string"],"grant_types":["string"],"token_endpoint_auth_method":"none","app_type":"native","is_first_party":true,"oidc_conformant":false,"jwt_configuration":{"lifetime_in_seconds":0,"scopes":{},"alg":"HS256"},"encryption_key":{"pub":"string","cert":"string","subject":"string"},"sso":true,"cross_origin_authentication":true,"cross_origin_loc":"string","sso_disabled":true,"custom_login_page_on":true,"custom_login_page":"string","custom_login_page_preview":"string","form_template":"string","addons":{"aws":{"principal":"string","role":"string","lifetime_in_seconds":0},"azure_blob":{"accountName":"string","storageAccessKey":"string","containerName":"string","blobName":"string","expiration":0,"signedIdentifier":"string","blob_read":true,"blob_write":true,"blob_delete":true,"container_read":true,"container_write":true,"container_delete":true,"container_list":true},"azure_sb":{"namespace":"string","sasKeyName":"string","sasKey":"string","entityPath":"string","expiration":0},"rms":{"url":"string"},"mscrm":{"url":"string"},"slack":{"team":"string"},"sentry":{"org_slug":"string","base_url":"string"},"box":{},"cloudbees":{},"concur":{},"dropbox":{},"echosign":{"domain":"string"},"egnyte":{"domain":"string"},"firebase":{"secret":"string","private_key_id":"string","private_key":"string","client_email":"string","lifetime_in_seconds":0},"newrelic":{"account":"string"},"office365":{"domain":"string","connection":"string"},"salesforce":{"entity_id":"string"},"salesforce_api":{"clientid":"string","principal":"string","communityName":"string","community_url_section":"string"},"salesforce_sandbox_api":{"clientid":"string","principal":"string","communityName":"string","community_url_section":"string"},"samlp":{"mappings":{},"audience":"string","recipient":"string","createUpnClaim":true,"mapUnknownClaimsAsIs":true,"passthroughClaimsWithNoMapping":true,"mapIdentities":true,"signatureAlgorithm":"string","digestAlgorithm":"string","issuer":"string","destination":"string","lifetimeInSeconds":0,"signResponse":true,"nameIdentifierFormat":"string","nameIdentifierProbes":["string"],"authnContextClassRef":"string"},"layer":{"providerId":"string","keyId":"string","privateKey":"string","principal":"string","expiration":0},"sap_api":{"clientid":"string","usernameAttribute":"string","tokenEndpointUrl":"string","scope":"string","servicePassword":"string","nameIdentifierFormat":"string"},"sharepoint":{"url":"string","external_url":[["string"],"string"]},"springcm":{"acsurl":"string"},"wams":{"masterkey":"string"},"wsfed":{},"zendesk":{"accountName":"string"},"zoom":{"account":"string"},"sso_integration":{"name":"string","version":"string"},"oag":{}},"client_metadata":{},"mobile":{"android":{"app_package_name":"string","sha256_cert_fingerprints":["string"]},"ios":{"team_id":"string","app_bundle_identifier":"string"}},"initiate_login_uri":"string","native_social_login":{"apple":{"enabled":false},"facebook":{"enabled":false},"google":{"enabled":false}},"refresh_token":{"rotation_type":"non-rotating","expiration_type":"non-expiring","leeway":0,"token_lifetime":0,"infinite_token_lifetime":true,"idle_token_lifetime":0,"infinite_idle_token_lifetime":false},"organization_usage":"deny","organization_require_behavior":"no_prompt","client_authentication_methods":{"private_key_jwt":{"credentials":[{"credential_type":"public_key","name":"string","pem":"string","alg":"RS256","parse_expiry_from_cert":false,"expires_at":"string"}]},"tls_client_auth":{"credentials":[{"credential_type":"cert_subject_dn","name":"string","subject_dn":"string","pem":"string"}]},"self_signed_tls_client_auth":{"credentials":[{"credential_type":"x509_cert","name":"string","pem":"string"}]}},"require_pushed_authorization_requests":false,"require_proof_of_possession":false,"signed_request_object":{"required":false,"credentials":[{"credential_type":"public_key","name":"string","pem":"string","alg":"RS256","parse_expiry_from_cert":false,"expires_at":"string"}]},"compliance_level":"none"}' curl -L 'https://login.auth0.com/api/v2/clients/:client_id/credentials' \ -H 'Accept: application/json' curl -L 'https://login.auth0.com/api/v2/clients/:client_id/credentials' \ -H 'Content-Type: application/json' \ -H 'Accept: application/json' \ -d '{"credential_type":"public_key","name":"string"}' curl -L 'https://login.auth0.com/api/v2/clients/:client_id/credentials/:credential_id' \ -H 'Accept: application/json' curl -L 'https://login.auth0.com/api/v2/connections' \ -H 'Accept: application/json' curl -L 'https://login.auth0.com/api/v2/connections' \ -H 'Content-Type: application/json' \ -H 'Accept: application/json' \ -d '{"name":"string","display_name":"string","strategy":"ad","options":{"validation":{"username":{"min":0,"max":0}},"non_persistent_attrs":["string"],"enable_script_context":true,"enabledDatabaseCustomization":true,"import_mode":true,"customScripts":{"login":"string","get_user":"string","delete":"string","change_password":"string","verify":"string","create":"string"},"authentication_methods":{"password":{"enabled":true},"passkey":{"enabled":true}},"passkey_options":{"challenge_ui":"both","progressive_enrollment_enabled":true,"local_enrollment_enabled":true},"passwordPolicy":"none","password_complexity_options":{"min_length":0},"password_history":{"enable":true,"size":0},"password_no_personal_info":{"enable":true},"password_dictionary":{"enable":true,"dictionary":["string"]},"api_enable_users":true,"basic_profile":true,"ext_admin":true,"ext_is_suspended":true,"ext_agreed_terms":true,"ext_groups":true,"ext_assigned_plans":true,"ext_profile":true,"disable_self_service_change_password":true,"upstream_params":{},"set_user_root_attributes":"on_each_login","gateway_authentication":{"method":"string","subject":"string","audience":"string","secret":"string","secret_base64_encoded":true}},"enabled_clients":["string"],"is_domain_connection":true,"realms":["string"],"metadata":{}}' curl -L 'https://login.auth0.com/api/v2/connections/:id' \ -H 'Accept: application/json' curl -L 'https://login.auth0.com/api/v2/connections/:id/status' curl -L 'https://login.auth0.com/api/v2/device-credentials' \ -H 'Accept: application/json' curl -L 'https://login.auth0.com/api/v2/device-credentials' \ -H 'Content-Type: application/json' \ -H 'Accept: application/json' \ -d '{"device_name":"string","type":"public_key","value":"string","device_id":"string","client_id":"string"}' curl -L 'https://login.auth0.com/api/v2/guardian/enrollments/ticket' \ -H 'Content-Type: application/json' \ -H 'Accept: application/json' \ --data-raw '{"user_id":"string","email":"user@example.com","send_mail":true,"email_locale":"string"}' curl -L 'https://login.auth0.com/api/v2/guardian/enrollments/:id' \ -H ' curl -L 'https://login.auth0.com/api/v2/guardian/factors' \ -H 'Accept: application/json': application/json' curl -L 'https://login.auth0.com/api/v2/guardian/factors' \ -H 'Accept: application/json' curl -L 'https://login.auth0.com/api/v2/guardian/factors/phone/message-types' \ -H 'Accept: application/json' curl -L 'https://login.auth0.com/api/v2/guardian/enrollments/:id' \ -H 'Accept: application/json' curl -L 'https://login.auth0.com/api/v2/guardian/factors/phone/selected-provider' \ -H 'Accept: application/json' curl -L 'https://login.auth0.com/api/v2/guardian/factors/phone/templates' \ -H 'Accept: application/json' curl -L 'https://login.auth0.com/api/v2/hooks' \ -H 'Accept: application/json' curl -L 'https://login.auth0.com/api/v2/hooks' \ -H 'Content-Type: application/json' \ -H 'Accept: application/json' \ -d '{"name":"string","script":"string","enabled":false,"dependencies":{},"triggerId":"credentials-exchange"}' curl -L 'https://login.auth0.com/api/v2/hooks/:id' \ -H 'Accept: application/json' curl -L 'https://login.auth0.com/api/v2/hooks/:id/secrets' \ -H 'Accept: application/json' curl -L 'https://login.auth0.com/api/v2/hooks/:id/secrets' \ -H 'Content-Type: application/json' \ -d '{}' curl -L 'https://login.auth0.com/api/v2/jobs/users-exports' \ -H 'Content-Type: application/json' \ -H 'Accept: applicat ion/json' \ -d '{"connection_id":"string","format":"csv","limit":0,"fields":[{"name":"string","export_as":"string"}]}' curl -L 'https://login.auth0.com/api/v2/jobs/:id' \ -H 'Accept: application/json' curl -L 'https://login.auth0.com/api/v2/jobs/:id/errors' \ -H 'Accept: application/json' curl -L 'https://login.auth0.com/api/v2/keys/signing' \ -H 'Accept: application/json' curl -L 'https://login.auth0.com/api/v2/keys/signing/:kid' \ -H 'Accept: application/json'curl -L 'https://login.auth0.com/api/v2/guardian/factors/phone/providers/twilio' \ -H 'Accept: application/json' # Create a folder $ mkdir actions-runner && cd actions-runner # Create a folder $ mkdir actions-runner && cd actions-runner # Download the latest runner package $ curl -o actions-runner-linux-arm64-2.316.1.tar.gz -L https://github.com/actions/runner/releases/download/v2.316.1/actions-runner-linux-arm64-2.316.1.tar.gz # Optional: Validate the hash $ echo "4f506deac376013a95683fd5873e9c40f27e5790895147ccaa24d7c970532249 actions-runner-linux-arm64-2.316.1.tar.gz" | shasum -a 256 -c # Extract the installer $ tar xzf ./actions-runner-linux-arm64-2.316.1.tar.gz Configure # Create the runner and start the configuration experience $ ./config.sh --url https://github.com/grateful345/Cloudfare.crt --token BHAHZGGHH6OJ2EJB3K7NG2LGLVGV6 # Last step, run it! $ ./run.sh Using your self-hosted runner # Use this YAML in your workflow file for each job runs-on: self-hosted --- auth0.crt | 156 +++++++++++++++++++++++++++++++++++++++++++++++++++++- 1 file changed, 154 insertions(+), 2 deletions(-) diff --git a/auth0.crt b/auth0.crt index 19c0bcb..6408768 100644 --- a/auth0.crt +++ b/auth0.crt @@ -1,3 +1,5 @@ + AUTH0.CRT + 665d3535559cf53ada0c0fb9 ID 665d3535559cf53ada0c0fb9https://dev-780m0w5r8jhyhts8.us.auth0.com/api/v2/ 5brrKDHYvFA30fTtLgRXoBP4rgQwDa7 GLOBAL CLIENT ID: DLT0ckbjQNVoS3fWzd99HyEY0rXC1Gab GLOBAL CLIENT SECRET: I1i3Q7__hG4am80OAHxnLAREzMYwF2sxmQbJsf1EPD3KdxGUd6rOSv6gfMq7mN3- CLIENT ID : Client ID @@ -996,8 +998,158 @@ index 95c148f..ed3b5d4 100644 + + + - - # Create a folder +{ + "aud": "m8DAxghyfE0KdpzogfXgMSxrkCSdKVEF" + "scopes": { + "connections": { + "actions": ["read", "update"] + } + } + "iat": "1446056652", + "jti": "7e9c6a991f5a227fb7ebaa522536ae4c" +} +curl -H "Authorization: Bearer eyJhb..." https://@@TENANT@@.auth0.com/api/v2/users + +curl -H "Authorization: Bearer eyJhb..." -H "x-correlation-id: client1_xyz" https://@@TENANT@@.auth0.com/api/v2/users +"references": { + "correlation_id": "client1_xyz" +}, +curl -L 'https://login.auth0.com/api/v2/actions/actions?deployed=true&installed=true' \ +-H 'Accept: application/json' + +API TOKEN: + +curl -L 'https://login.auth0.com/api/v2/actions/actions' \ +-H 'Content-Type: application/json' \ +-H 'Accept: application/json' \ +-d '{"name":"string","supported_triggers":[{"id":"post-login","version":"string","status":"string","runtimes":["string"],"default_runtime":"string","compatible_triggers":[{"id":"post-login","version":"string"}]}],"code":"string","dependencies":[{"name":"string","version":"string","registry_url":"string"}],"runtime":"string","secrets":[{"name":"string","value":"string"}]}' +curl -L 'https://login.auth0.com/api/v2/actions/actions/:actionId/versions' \ +-H 'Accept: application/json' +curl -L 'https://login.auth0.com/api/v2/actions/actions/:id' \ +-H 'Accept: application/json' +curl -L -X POST 'https://login.auth0.com/api/v2/actions/actions/:id/deploy' \ +-H 'Accept: application/json' + +curl -L 'https://login.auth0.com/api/v2/actions/executions/:id' \ +-H 'Accept: application/json' + +curl -L 'https://login.auth0.com/api/v2/actions/triggers' \ +-H 'Accept: application/json' +curl -L 'https://login.auth0.com/api/v2/actions/triggers/:triggerId/bindings' \ +-H 'Accept: application/json' +curl -L 'https://login.auth0.com/api/v2/anomaly/blocks/ips/:id' + +curl -L 'https://login.auth0.com/api/v2/attack-protection/brute-force-protection' \ +-H 'Accept: application/json' +curl -L 'https://login.auth0.com/api/v2/attack-protection/suspicious-ip-throttling' \ +-H 'Accept: application/json' + +curl -L 'https://login.auth0.com/api/v2/blacklists/tokens' \ +-H 'Accept: application/json' +curl -L 'https://login.auth0.com/api/v2/blacklists/tokens' \ +-H 'Content-Type: application/json' \ +-d '{"aud":"string","jti":"string"}' + +curl -L 'https://login.auth0.com/api/v2/client-grants' \ +-H 'Accept: application/json' +curl -L 'https://login.auth0.com/api/v2/client-grants' \ +-H 'Content-Type: application/json' \ +-H 'Accept: application/json' \ +-d '{"client_id":"string","audience":"string","scope":["string"]}' + +curl -L 'https://login.auth0.com/api/v2/clients' \ +-H 'Accept: application/json' +curl -L 'https://login.auth0.com/api/v2/clients' \ +-H 'Content-Type: application/json' \ +-H 'Accept: application/json' \ +-d '{"name":"string","description":"string","logo_uri":"string","callbacks":["string"],"oidc_logout":{"backchannel_logout_urls":["string"],"backchannel_logout_initiators":{"mode":"custom","selected_initiators":["rp-logout"]}},"allowed_origins":["string"],"web_origins":["string"],"client_aliases":["string"],"allowed_clients":["string"],"allowed_logout_urls":["string"],"grant_types":["string"],"token_endpoint_auth_method":"none","app_type":"native","is_first_party":true,"oidc_conformant":false,"jwt_configuration":{"lifetime_in_seconds":0,"scopes":{},"alg":"HS256"},"encryption_key":{"pub":"string","cert":"string","subject":"string"},"sso":true,"cross_origin_authentication":true,"cross_origin_loc":"string","sso_disabled":true,"custom_login_page_on":true,"custom_login_page":"string","custom_login_page_preview":"string","form_template":"string","addons":{"aws":{"principal":"string","role":"string","lifetime_in_seconds":0},"azure_blob":{"accountName":"string","storageAccessKey":"string","containerName":"string","blobName":"string","expiration":0,"signedIdentifier":"string","blob_read":true,"blob_write":true,"blob_delete":true,"container_read":true,"container_write":true,"container_delete":true,"container_list":true},"azure_sb":{"namespace":"string","sasKeyName":"string","sasKey":"string","entityPath":"string","expiration":0},"rms":{"url":"string"},"mscrm":{"url":"string"},"slack":{"team":"string"},"sentry":{"org_slug":"string","base_url":"string"},"box":{},"cloudbees":{},"concur":{},"dropbox":{},"echosign":{"domain":"string"},"egnyte":{"domain":"string"},"firebase":{"secret":"string","private_key_id":"string","private_key":"string","client_email":"string","lifetime_in_seconds":0},"newrelic":{"account":"string"},"office365":{"domain":"string","connection":"string"},"salesforce":{"entity_id":"string"},"salesforce_api":{"clientid":"string","principal":"string","communityName":"string","community_url_section":"string"},"salesforce_sandbox_api":{"clientid":"string","principal":"string","communityName":"string","community_url_section":"string"},"samlp":{"mappings":{},"audience":"string","recipient":"string","createUpnClaim":true,"mapUnknownClaimsAsIs":true,"passthroughClaimsWithNoMapping":true,"mapIdentities":true,"signatureAlgorithm":"string","digestAlgorithm":"string","issuer":"string","destination":"string","lifetimeInSeconds":0,"signResponse":true,"nameIdentifierFormat":"string","nameIdentifierProbes":["string"],"authnContextClassRef":"string"},"layer":{"providerId":"string","keyId":"string","privateKey":"string","principal":"string","expiration":0},"sap_api":{"clientid":"string","usernameAttribute":"string","tokenEndpointUrl":"string","scope":"string","servicePassword":"string","nameIdentifierFormat":"string"},"sharepoint":{"url":"string","external_url":[["string"],"string"]},"springcm":{"acsurl":"string"},"wams":{"masterkey":"string"},"wsfed":{},"zendesk":{"accountName":"string"},"zoom":{"account":"string"},"sso_integration":{"name":"string","version":"string"},"oag":{}},"client_metadata":{},"mobile":{"android":{"app_package_name":"string","sha256_cert_fingerprints":["string"]},"ios":{"team_id":"string","app_bundle_identifier":"string"}},"initiate_login_uri":"string","native_social_login":{"apple":{"enabled":false},"facebook":{"enabled":false},"google":{"enabled":false}},"refresh_token":{"rotation_type":"non-rotating","expiration_type":"non-expiring","leeway":0,"token_lifetime":0,"infinite_token_lifetime":true,"idle_token_lifetime":0,"infinite_idle_token_lifetime":false},"organization_usage":"deny","organization_require_behavior":"no_prompt","client_authentication_methods":{"private_key_jwt":{"credentials":[{"credential_type":"public_key","name":"string","pem":"string","alg":"RS256","parse_expiry_from_cert":false,"expires_at":"string"}]},"tls_client_auth":{"credentials":[{"credential_type":"cert_subject_dn","name":"string","subject_dn":"string","pem":"string"}]},"self_signed_tls_client_auth":{"credentials":[{"credential_type":"x509_cert","name":"string","pem":"string"}]}},"require_pushed_authorization_requests":false,"require_proof_of_possession":false,"signed_request_object":{"required":false,"credentials":[{"credential_type":"public_key","name":"string","pem":"string","alg":"RS256","parse_expiry_from_cert":false,"expires_at":"string"}]},"compliance_level":"none"}' + +curl -L 'https://login.auth0.com/api/v2/clients/:client_id/credentials' \ +-H 'Accept: application/json' + +curl -L 'https://login.auth0.com/api/v2/clients/:client_id/credentials' \ +-H 'Content-Type: application/json' \ +-H 'Accept: application/json' \ +-d '{"credential_type":"public_key","name":"string"}' +curl -L 'https://login.auth0.com/api/v2/clients/:client_id/credentials/:credential_id' \ +-H 'Accept: application/json' + +curl -L 'https://login.auth0.com/api/v2/connections' \ +-H 'Accept: application/json' + +curl -L 'https://login.auth0.com/api/v2/connections' \ +-H 'Content-Type: application/json' \ +-H 'Accept: application/json' \ +-d '{"name":"string","display_name":"string","strategy":"ad","options":{"validation":{"username":{"min":0,"max":0}},"non_persistent_attrs":["string"],"enable_script_context":true,"enabledDatabaseCustomization":true,"import_mode":true,"customScripts":{"login":"string","get_user":"string","delete":"string","change_password":"string","verify":"string","create":"string"},"authentication_methods":{"password":{"enabled":true},"passkey":{"enabled":true}},"passkey_options":{"challenge_ui":"both","progressive_enrollment_enabled":true,"local_enrollment_enabled":true},"passwordPolicy":"none","password_complexity_options":{"min_length":0},"password_history":{"enable":true,"size":0},"password_no_personal_info":{"enable":true},"password_dictionary":{"enable":true,"dictionary":["string"]},"api_enable_users":true,"basic_profile":true,"ext_admin":true,"ext_is_suspended":true,"ext_agreed_terms":true,"ext_groups":true,"ext_assigned_plans":true,"ext_profile":true,"disable_self_service_change_password":true,"upstream_params":{},"set_user_root_attributes":"on_each_login","gateway_authentication":{"method":"string","subject":"string","audience":"string","secret":"string","secret_base64_encoded":true}},"enabled_clients":["string"],"is_domain_connection":true,"realms":["string"],"metadata":{}}' +curl -L 'https://login.auth0.com/api/v2/connections/:id' \ +-H 'Accept: application/json' + +curl -L 'https://login.auth0.com/api/v2/connections/:id/status' +curl -L 'https://login.auth0.com/api/v2/device-credentials' \ +-H 'Accept: application/json' + + +curl -L 'https://login.auth0.com/api/v2/device-credentials' \ +-H 'Content-Type: application/json' \ +-H 'Accept: application/json' \ +-d '{"device_name":"string","type":"public_key","value":"string","device_id":"string","client_id":"string"}' +curl -L 'https://login.auth0.com/api/v2/guardian/enrollments/ticket' \ +-H 'Content-Type: application/json' \ +-H 'Accept: application/json' \ +--data-raw '{"user_id":"string","email":"user@example.com","send_mail":true,"email_locale":"string"}' +curl -L 'https://login.auth0.com/api/v2/guardian/enrollments/:id' \ +-H ' +curl -L 'https://login.auth0.com/api/v2/guardian/factors' \ +-H 'Accept: application/json': application/json' + +curl -L 'https://login.auth0.com/api/v2/guardian/factors' \ +-H 'Accept: application/json' + +curl -L 'https://login.auth0.com/api/v2/guardian/factors/phone/message-types' \ +-H 'Accept: application/json' +curl -L 'https://login.auth0.com/api/v2/guardian/enrollments/:id' \ +-H 'Accept: application/json' +curl -L 'https://login.auth0.com/api/v2/guardian/factors/phone/selected-provider' \ +-H 'Accept: application/json' +curl -L 'https://login.auth0.com/api/v2/guardian/factors/phone/templates' \ +-H 'Accept: application/json' + +curl -L 'https://login.auth0.com/api/v2/hooks' \ +-H 'Accept: application/json' +curl -L 'https://login.auth0.com/api/v2/hooks' \ +-H 'Content-Type: application/json' \ +-H 'Accept: application/json' \ +-d '{"name":"string","script":"string","enabled":false,"dependencies":{},"triggerId":"credentials-exchange"}' + + +curl -L 'https://login.auth0.com/api/v2/hooks/:id' \ +-H 'Accept: application/json' + +curl -L 'https://login.auth0.com/api/v2/hooks/:id/secrets' \ +-H 'Accept: application/json' +curl -L 'https://login.auth0.com/api/v2/hooks/:id/secrets' \ +-H 'Content-Type: application/json' \ +-d '{}' + +curl -L 'https://login.auth0.com/api/v2/jobs/users-exports' \ +-H 'Content-Type: application/json' \ +-H 'Accept: applicat + +ion/json' \ +-d '{"connection_id":"string","format":"csv","limit":0,"fields":[{"name":"string","export_as":"string"}]}' + +curl -L 'https://login.auth0.com/api/v2/jobs/:id' \ +-H 'Accept: application/json' +curl -L 'https://login.auth0.com/api/v2/jobs/:id/errors' \ +-H 'Accept: application/json' +curl -L 'https://login.auth0.com/api/v2/keys/signing' \ +-H 'Accept: application/json' + +curl -L 'https://login.auth0.com/api/v2/keys/signing/:kid' \ +-H 'Accept: application/json'curl -L 'https://login.auth0.com/api/v2/guardian/factors/phone/providers/twilio' \ +-H 'Accept: application/json' + +# Create a folder $ mkdir actions-runner && cd actions-runner
]]
[[if tags]]
[[if topbar]]
[[if sidebar]]
[[if ssl_warning]]
[[if page_exists]]
[[if license_text]]
[[if custom_footer]]
[[footnote]] [[footnote]] footnote text [[/footnote]] [[/footnote]]

In action

link to the implemented solution on a Wikidot site or put a working example here

Table of Contents

Thanks to tsangk for this great snippet: conditional-blocks


text above inserted with:

[[include :snippets:if START |unique=1|type=equal|var1=%%name%%|var2=conditional-blocks]]
**##red|Thanks to tsangk for this great snippet:##** [[[code:conditional-blocks]]]
[[include :snippets:if END]]



Other snippets posted by ErichSteinboeck

Redirect: To - 16 Feb 2012 01:37
Module Listpages Tags - 16 Feb 2012 01:24
Module Feed Drilldown: Details Page - 16 Feb 2012 01:24
Module Feed Drilldown - 16 Feb 2012 01:24
Module Feed: Collapsible - 16 Feb 2012 01:23
Module Categories - 16 Feb 2012 01:23
MiniRecentPosts With Limit - 16 Feb 2012 01:23
ListPages: Horizontal? - 16 Feb 2012 01:20
Choose A Page! - 15 Feb 2012 00:32
Redirect: From (1st) - 01 Mar 2009 18:18
Redirect: From (2nd) - 01 Mar 2009 18:17


Rate this solution

If you think this solution is useful — rate it up!

rating: +1+x
Add a New Comment
toc
Unless otherwise stated, the content of this page is licensed under Creative Commons Attribution-ShareAlike 3.0 License