This is a demo application, meant for testing purposes only. Do not use this application's unmodified code in a production environment.
The Authorization endpoint will authenticate the user and return the user to our redirect_uri, with an authorization code in hand
GET
https://authorize.coxautoinc.com/oauth2/aus132uaxy2eomhmi357/v1/authorizeresponse_type=code&client_id=0oa15utrlayy6AcM9358&scope=openid&redirect_uri=https%3A%2F%2Feventer-oauth-demo-a.awsmetnp.manheim.com%2Fcipcallback
code
, when we're initiating the authorization code process.profile openid email
to access basic user information
via the introspect endpoint and the identity token.Remember to urlEncode your parameters!
The token endpoint exchanges an authorization code and your client's credentials for an access token and a refresh token.
POST
https://authorize.coxautoinc.com/oauth2/aus132uaxy2eomhmi357/v1/token
x-www-form-urlencoded body:
authorization code
, but we can also choose client_credentials
or refresh_token
.Remember to urlEncode your parameters!
This is a demo application, meant for testing purposes only. Do not use this application's unmodified code in a production environment.
The Authorization endpoint will authenticate the user and return the user to our redirect_uri, with an authorization code in hand
GET
https://e2e.api.manheim.com/oauth2/authorization.oauth2response_type=code&adaptor=&client_id=cu3w4a59xayqrvmhfexrkx4y&scope=profile%20openid&redirect_uri=https%3A%2F%2Feventer-oauth-demo-a.awsmetnp.manheim.com%2Fcallback
code
, when we're initiating the authorization code process.manheim_customer
for vicki,
or cai_okta
for employee login via okta.profile openid email
to access basic user information
via the introspect endpoint and the identity token.Remember to urlEncode your parameters!
The token endpoint exchanges an authorization code and your client's credentials for an access token and a refresh token.
POST
https://e2e.api.manheim.com/oauth2/token.oauth2
api_key: cu3w4a59xayqrvmhfexrkx4y
x-www-form-urlencoded body:
authorization code
, but we can also choose client_credentials
or refresh_token
.Remember to urlEncode your parameters!
The introspect endpoint takes a token and a client's credentials, and returns information about the token and the user who requested it.
POST
https://e2e.api.manheim.com/oauth2/introspect.oauth2
api-key: cu3w4a59xayqrvmhfexrkx4y
x-www-form-urlencoded body:
access_token
, but we can
also introspect a refresh_token
.Remember to urlEncode your parameters!
The token endpointCan also exchange a refresh token for a new access token and refresh token, without asking the user to enter her credentials a second time.
POST
https://e2e.api.manheim.com/oauth2/token.oauth2
api_key: cu3w4a59xayqrvmhfexrkx4y
x-www-form-urlencoded body:
refresh_token
, but we can also choose client_credentials
or authorization_code
.Remember to urlEncode your parameters!
The startSLO endpoint terminates the user's ping browser session, preventing the user's bypassing the credentials screen during subsequent application logins.
This page also simultaneously calls a logout endpoint for each client (app) with which the user has logged in.
The application developer should have a single logout url configured in Ping Federate. This endpoint should:
GET
https://e2e.api.manheim.com/auth/idp/startSLO.pingTargetResource=https://eventer-oauth-demo-a.awsmetnp.manheim.com/slo&InErrorResource=https://eventer-oauth-demo-a.awsmetnp.manheim.com/slo
Remember to urlEncode your parameters!
Revoke a token to disable it for future requests
POST
https://e2e.api.manheim.com/oauth2/revoke_token
api-key: cu3w4a59xayqrvmhfexrkx4y
x-www-form-urlencoded body:
access_token
, but we can
also revoke a refresh_token
.Remember to urlEncode your parameters!