Create an Access Token to Provision an Instance with the CLI, REST API, or SDKs
Before you can provision an Oracle Integration instance as a user with the command line interface (CLI), REST API, or any of the SDKs (Java and non-Java), you must create an application and generate an access token. You specify the access token when provisioning the instance.
For information on how to create an instance with the CLI, REST API, and Java SDKs, see:
Create the Application
Before you can provision an Oracle Integration instance as a user, you must first create an application.
You can skip this section if you have already created the application.
Generate the Access Token
Before you can provision an Oracle Integration instance as a user, you must create an access token.
The access token is only valid for one hour.
Generate the Access Token from the Oracle Cloud Infrastructure Console
- Sign in as the tenant administrator to the Oracle Cloud Infrastructure Console.
- Open the Oracle Cloud Infrastructure navigation menu and click Identity & Security. Under Identity, click Federation.
- Click the OracleIdentityCloudService link.
- Click the link in the Oracle Identity Cloud Service Console field to access the console.
- Open the Oracle Cloud Infrastructure navigation menu and click Developer Services. Under Functions, click Applications.
- Scroll down and click the application you created (for this example, named PSO-AT-Gen-App).
- Select Customized Scopes.
- Select Invokes Identity Cloud Service APIs, then specify Identity Domain Administrator.
- Click Download Token and save the
file.
The
tokens.tok
file contains the access token with the attribute name app_access_token.cat tokens.tok {"app_access_token":"eyJ4NXQjUzI. . . . ."}
- Provide the part of the access token between the quotes
to the user to use for provisioning an instance. Do
not provide the part labeled
app_access_token
.
Generate the Access Token from the CLI or an API
IDCS_AT_PWD=$(curl "${CURL_FLAGS}" -u "$IDCS_CLIENT_ID:$IDCS_CLIENT_SECRET" $IDCS_URL/oauth2/v1/token -d "grant_type=password&scope=urn:opc:idm:__myscopes__&username=${IDCS_USERNAME}&password=${IDCS_PASSWORD}" | jq -r ".access_token")