Context and background
Target audience
Analysts and developers of integrators who want to call a secured Informatie Vlaanderen API server and need to know how to authorize.
Goals
Example
s
...
language | text |
---|---|
theme | Midnight |
title | Obtaining access tokens: example 1 |
...
- Help you decide the most suitable method to connect to the new GIPOD-APIs.
- Provide a step-by-step explanation of to get authenticated on the new GIPOD-APIs with your chosen method.
Terminology
Term | Definition |
---|---|
AIV | Agentschap Informatie Vlaanderen |
Resource Owner | The entity that can grant access to a protected resource. Typically, this is the end-user. |
Client | An application requesting access to a protected resource on behalf of the Resource Owner. |
Resource Server | The server hosting the protected resources. This is the net GIPOD-API you want to access. |
Authorization Server | The server that authenticates the Resource Owner and issues Access Tokens after getting proper authorization. In this case, Auth0. |
Access Token | A credential that can be used by an application to access an API. |
Refresh Token | A long-lived token that is used to obtain a new Access Token after a previous one has expired. |