Skip to content

Commit

Permalink
Merge branch 'main' into mes-364-styling-improvements
Browse files Browse the repository at this point in the history
  • Loading branch information
mesellings authored Oct 3, 2024
2 parents 367e577 + 5972511 commit c45313e
Show file tree
Hide file tree
Showing 300 changed files with 5,126 additions and 8,567 deletions.
610 changes: 409 additions & 201 deletions api/camunda/camunda-openapi.yaml

Large diffs are not rendered by default.

12 changes: 6 additions & 6 deletions docs/apis-tools/administration-api/authentication.md
Original file line number Diff line number Diff line change
Expand Up @@ -8,11 +8,11 @@ description: "Learn about access tokens and client credentials and scopes to get

All Administration API requests require authentication. To authenticate, generate a [JSON Web Token (JWT)](https://jwt.io/introduction/) and include it in each request.

## Generating a token
## Generate a token

1. Create client credentials by clicking **Console > Organization > Administration API > Create new credentials**.
2. Add permissions to this client for [the needed scopes](#client-credentials-and-scopes).
3. Upon creating the client, capture the following values required to generate a token:
3. Once you have created the client, capture the following values required to generate a token:
<!-- this comment convinces the markdown processor to still treat the table as a table, but without adding surrounding paragraphs. 🤷 -->
| Name | Environment variable name | Default value |
| ------------------------ | -------------------------------- | -------------------------------------------- |
Expand All @@ -21,7 +21,7 @@ All Administration API requests require authentication. To authenticate, generat
| Authorization Server URL | `CAMUNDA_OAUTH_URL` | `https://login.cloud.camunda.io/oauth/token` |
| Audience | `CAMUNDA_CONSOLE_OAUTH_AUDIENCE` | `api.cloud.camunda.io` |
<!-- this comment convinces the markdown processor to still treat the table as a table, but without adding surrounding paragraphs. 🤷 -->
:::tip
:::caution
When client credentials are created, the `Client Secret` is only shown once. Save this `Client Secret` somewhere safe.
:::
4. Execute an authentication request to the token issuer:
Expand All @@ -33,7 +33,7 @@ All Administration API requests require authentication. To authenticate, generat
--data-urlencode "client_id=${CAMUNDA_CONSOLE_CLIENT_ID}" \
--data-urlencode "client_secret=${CAMUNDA_CONSOLE_CLIENT_SECRET}"
```
5. A successful authentication response looks like the following:
A successful authentication response looks like the following:
```json
{
"access_token": "<TOKEN>",
Expand All @@ -43,9 +43,9 @@ All Administration API requests require authentication. To authenticate, generat
"not-before-policy": 0
}
```
6. Capture the value of the `access_token` property and store it as your token.
5. Capture the value of the `access_token` property and store it as your token.

## Using a token
## Use a token

Include the previously captured token as an authorization header in each request: `Authorization: Bearer <TOKEN>`.

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,7 @@ description: "The Administration API for Self-Managed is a REST API and provides

All Administration Self-Managed API requests require authentication. To authenticate, generate a [JSON Web Token (JWT)](https://jwt.io/introduction/) and include it in each request.

## Generating a token
## Generate a token

1. [Add an M2M application in Identity](/self-managed/identity/user-guide/additional-features/incorporate-applications.md).
2. [Add permissions to this application](/self-managed/identity/user-guide/additional-features/incorporate-applications.md) for **Administration Self-Managed API**.
Expand All @@ -20,7 +20,7 @@ All Administration Self-Managed API requests require authentication. To authenti
--data-urlencode "client_secret=${CLIENT_SECRET}" \
--data-urlencode 'grant_type=client_credentials'
```
5. A successful authentication response looks like the following:
A successful authentication response looks like the following:
```json
{
"access_token": "<TOKEN>",
Expand All @@ -30,13 +30,13 @@ All Administration Self-Managed API requests require authentication. To authenti
"not-before-policy": 0
}
```
6. Capture the value of the `access_token` property and store it as your token.
5. Capture the value of the `access_token` property and store it as your token.

## Using a token
## Use a token

Include the previously captured token as an authorization header in each request: `Authorization: Bearer <TOKEN>`.

For example, to send a request to the ["Get current clusters" endpoint](./specifications/get-clusters.api.mdx):
For example, to send a request to the ["Get current clusters"](./specifications/get-clusters.api.mdx) endpoint:

:::tip
The `${CAMUNDA_BASE_URL}` variable below represents the URL of the Self-Managed environment. You can configure this value in your Self-Managed installation. The default value is `http://localhost:8080`.
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -9,7 +9,7 @@ import TabItem from "@theme/TabItem";

All Camunda 8 REST API requests require authentication. To authenticate, generate a [JSON Web Token (JWT)](https://jwt.io/introduction/) depending on your environment and include it in each request.

## Generating a token
## Generate a token

<Tabs groupId="environment" defaultValue="saas" queryString values={
[
Expand All @@ -21,7 +21,7 @@ All Camunda 8 REST API requests require authentication. To authenticate, generat

1. [Create client credentials](/guides/setup-client-connection-credentials.md) in the **Clusters > Cluster name > API** tab of [Camunda Console](https://console.camunda.io/).
2. Add permissions to this client for **Zeebe**.
3. Upon creating the client, capture the following values required to generate a token:
3. Once you have created the client, capture the following values required to generate a token:
<!-- this comment convinces the markdown processor to still treat the table as a table, but without adding surrounding paragraphs. 🤷 -->
| Name | Environment variable name | Default value |
| ------------------------ | -------------------------------- | -------------------------------------------- |
Expand All @@ -31,7 +31,7 @@ All Camunda 8 REST API requests require authentication. To authenticate, generat
| Audience | `ZEEBE_TOKEN_AUDIENCE` | `zeebe.camunda.io` |
| Zeebe REST Address | `ZEEBE_REST_ADDRESS` | - |
<!-- this comment convinces the markdown processor to still treat the table as a table, but without adding surrounding paragraphs. 🤷 -->
:::tip
:::caution
When client credentials are created, the `Client Secret` is only shown once. Save this `Client Secret` somewhere safe.
:::
4. Execute an authentication request to the token issuer:
Expand All @@ -43,7 +43,7 @@ All Camunda 8 REST API requests require authentication. To authenticate, generat
--data-urlencode "client_id=${ZEEBE_CLIENT_ID}" \
--data-urlencode "client_secret=${ZEEBE_CLIENT_SECRET}"
```
5. A successful authentication response looks like the following:
A successful authentication response looks like the following:
```json
{
"access_token": "<TOKEN>",
Expand All @@ -53,7 +53,7 @@ All Camunda 8 REST API requests require authentication. To authenticate, generat
"not-before-policy": 0
}
```
6. Capture the value of the `access_token` property and store it as your token.
5. Capture the value of the `access_token` property and store it as your token.

</TabItem>

Expand All @@ -70,7 +70,7 @@ All Camunda 8 REST API requests require authentication. To authenticate, generat
--data-urlencode "client_secret=${CLIENT_SECRET}" \
--data-urlencode 'grant_type=client_credentials'
```
5. A successful authentication response looks like the following:
A successful authentication response looks like the following:
```json
{
"access_token": "<TOKEN>",
Expand All @@ -80,13 +80,13 @@ All Camunda 8 REST API requests require authentication. To authenticate, generat
"not-before-policy": 0
}
```
6. Capture the value of the `access_token` property and store it as your token.
5. Capture the value of the `access_token` property and store it as your token.

</TabItem>

</Tabs>

## Using a token
## Use a token

Include the previously captured token as an authorization header in each request: `Authorization: Bearer <TOKEN>`.

Expand Down
Loading

0 comments on commit c45313e

Please sign in to comment.