Access Tokens | OCLC Developer Network (2024)

What is an Access Token?

A credential that can be used by an application to access an API. Access Tokens can be either an opaque string or a JSON Web Token (JWT) . They inform the API that the bearer of the token has been authorized:

  • to access a particular service or services
  • on behalf of a particular user (optional)
  • for a particular institution

Why Access Tokens?

The Access Token model has several benefits:

  • It is more efficient for clients to use than the HMAC signature pattern which requires the client to build a unique signature for every request. Only one signature has to be built to obtain the Access Token, which reduces the cryptography overhead.
  • It allows clients to have a single WSKey that can request Access Tokens for different institutions, which eliminates the client's need to manage multiple WSKeys.
  • Once a client obtains an Access Token, this is the only piece of information that will need to be passed to the web service in order to authenticate both the application and user. This removes the need for the client to store user identifiers after an AccessToken has been obtained.

Obtaining an Access Token

Partial scopes

Access token are not always returned with all of the scopes which the client application requested. In some cases a partial set of the requested scopes are returned. This may be due to: user lacking permissions for particular scopes; user not granting client acess to particular scopes

Obtaining Access Tokens for Different Institutions

A WSKey can be configured to allow a client to access to data associated with several institutions via Access Tokens. Using this single WSkey a client can request different Access Tokens to access the data of different libraries that are associated with its WSKey. Organization which want act on behalf of multiple libraries should include the libraries which they want access to via the WSKey Request form.

Example:

A client has a WSKey associated with three different libraries: Colgate, Keuka College and Ithaca College. The client can request an Access Token which access data on behalf of any one of these libraries by specifying the Context Institution ID. The client can also specify which institution to authenticate the user against by specifying the Authenticating Institution ID. These values are used in all of the flows for obtaining an Access Token.

Using an Access Token

All of these flows are built around the notion of authenticating to web services via an Access Token. In this model, authenticating to the web service is a two-step process. Step one: obtain an Access Token. Step two: send the Access Token as part of the web service as part of the HTTP Authorization Header.

Clients can make a request to access token enabled web services by submitting the token as a HTTP Authorization request header parameter. For example:

Authorization: Bearer tk_Yebz4BpEp9dAsghA7KpWx6dYD1OZKWBlHjqW
Access Tokens | OCLC Developer Network (2024)
Top Articles
Why has Russia grown to become a Bitcoin mining supergiant? - CNBC TV18
Should you choose a credit card with cash back or travel rewards? - The Points Guy
Star Wars Mongol Heleer
AllHere, praised for creating LAUSD’s $6M AI chatbot, files for bankruptcy
55Th And Kedzie Elite Staffing
Places 5 Hours Away From Me
P2P4U Net Soccer
Fnv Turbo
Paula Deen Italian Cream Cake
MADRID BALANZA, MªJ., y VIZCAÍNO SÁNCHEZ, J., 2008, "Collares de época bizantina procedentes de la necrópolis oriental de Carthago Spartaria", Verdolay, nº10, p.173-196.
Ssefth1203
Thotsbook Com
Hartland Liquidation Oconomowoc
Belle Delphine Boobs
Boston Gang Map
Union Ironworkers Job Hotline
Lowes Undermount Kitchen Sinks
Popular Chinese Restaurant in Rome Closing After 37 Years
Espn Horse Racing Results
Hampton University Ministers Conference Registration
Student Portal Stvt
Amerisourcebergen Thoughtspot 2023
What Is a Yurt Tent?
TJ Maxx‘s Top 12 Competitors: An Expert Analysis - Marketing Scoop
Fbsm Greenville Sc
Wake County Court Records | NorthCarolinaCourtRecords.us
What Happened To Father Anthony Mary Ewtn
Ma Scratch Tickets Codes
Indiana Immediate Care.webpay.md
Compress PDF - quick, online, free
Dreammarriage.com Login
Workday Latech Edu
آدرس جدید بند موویز
Timothy Kremchek Net Worth
11 Pm Pst
Go Smiles Herndon Reviews
Boggle BrainBusters: Find 7 States | BOOMER Magazine
Ticket To Paradise Showtimes Near Regal Citrus Park
M Life Insider
Vons Credit Union Routing Number
Torrid Rn Number Lookup
Mbfs Com Login
Wordle Feb 27 Mashable
3500 Orchard Place
Stitch And Angel Tattoo Black And White
Whitney Wisconsin 2022
Beds From Rent-A-Center
Craigslist Sparta Nj
Theatervoorstellingen in Nieuwegein, het complete aanbod.
Deshuesadero El Pulpo
Skyward Login Wylie Isd
Jasgotgass2
Latest Posts
Article information

Author: Reed Wilderman

Last Updated:

Views: 6393

Rating: 4.1 / 5 (52 voted)

Reviews: 91% of readers found this page helpful

Author information

Name: Reed Wilderman

Birthday: 1992-06-14

Address: 998 Estell Village, Lake Oscarberg, SD 48713-6877

Phone: +21813267449721

Job: Technology Engineer

Hobby: Swimming, Do it yourself, Beekeeping, Lapidary, Cosplaying, Hiking, Graffiti

Introduction: My name is Reed Wilderman, I am a faithful, bright, lucky, adventurous, lively, rich, vast person who loves writing and wants to share my knowledge and understanding with you.