Configure an Application to use the offline_access Scope
This activity shows you how to create an application and configure it to use the offline_access scope. The offline_access scope allows an application to request a long-lived refresh token which grants access to resources on behalf of the user. For more information, refer to Authorization.
This workflow very similar to Configuring an Application with an Authorization Code Grant, however you’ll specify the offline_access scope when creating the application’s resource grant in step 5.
The following operations are supported by the PingOne APIs:
-
Create an application
-
Create a resource access grant
-
Initiate an
authorization_codeauthorization flow -
Use flow APIs to complete the login
Best practices for application secrets
-
Do not store an application secret in applications that are publicly available.
-
For security purposes, regenerate application secrets regularly (refer to Update the application secret).
-
If you suspect an application secret has been compromised, generate a new application secret immediately.
Prerequisites
Get an access token from the worker application that you created in PingOne for Developers Getting Started. To get a token from a different worker application in an alternate sandbox environment, run the token request endpoint using the client ID and client secret of your chosen worker app to authenticate the request. For more information, refer to Token (client_credentials).
Workflow order of operations
To configure an application and initiate the authorization flow, you must complete the following tasks:
-
Make a
POSTrequest to/environments/{{envID}}/applicationsto add a new application to the specified environment. -
Make a
GETrequest to/environments/{{envID}}/applications/{{offlineAccessAppID}}/secretto return the new application’s secret attribute. -
Make a
GETrequest to/environments/{{envID}}/resourcesto return a list of all resource entities associated with the specified environment to get the ID for the PingOne platform resource. -
Make a
GETrequest to/environments/{{envID}}/resources/{{resourceID}}/scopesto to get the ID for theoffline_accessscope. -
Make a
POSTrequest to/environments/{{envID}}/applications/{{appID}}/grantsto create a new resource access grant for the application. -
Make a
POSTrequest to/environments/{{envID}}/populationsto create a new population resource. -
Make a
POSTrequest to/environments/{{envID}}/usersto create a user who will be associated with the new population resource. -
Make a
POSTrequest to/environments/{{envID}}/users/{{userID}}/passwordto set the new user’s password. -
Make a
POSTrequest to/{{envID}}/as/authorizeto obtain an authorization grant. This request starts the authorization flow. -
To initiate the authentication flow, make a
GETrequest toGET /{{envID}}/flows/{{flowID}}. -
To complete the authentication flow, make a
POSTrequest toGET /{{envID}}/flows/{{flowID}}and provide the user’s login credentials. -
Make a
GETrequest to/{{envID}}/as/resume?flowId={{flowID}}to call the resume endpoint and return the token. -
After the authorization flow completes and returns an auth code, make a
POSTrequest to/{{envID}}/as/tokento exchange the auth code for an access token.
Click the Run in Postman button below to fork, or download and import, the Postman collection for this workflow to your workspace.