To demonstrate this flow, we’ll use an example built on top of Salesforce’s REST-based APIs. Our example will retrieve and output all contacts accessible to the resource owner in the Salesforce CRM system.
We’ll assume the example application is a native mobile application written by Acme Corporation and distributed to its employees through a corporate application directory. This method of distribution indicates to the employees that it is a “trusted” application and it’s OK to enter their credentials in the app.
The first step is asking the user to provide their credentials to the application. In addition to a username and password, Salesforce requires that a user enter their security token when logging into an app from an untrusted network, such as the networks used by popular mobile phone service providers. An application would typically display this as a third field for user input, in addition to the username and password.
The process of exchanging credentials for an access token is very
similar to exchanging an authorization code for an access token in the
Authorization Code flow. We simply need to make a HTTP POST
to the authorization server,
providing the credentials and client information.
You can find the authorization server URL in the API provider’s documentation. For Salesforce, the URL is
https://login.salesforce.com/services/oauth2/token
Here are the required POST
parameters:
grant_type
Specified as “password” for this flow.
scope
The data your application is requesting access to. It is not required for Salesforce and is optional for other APIs. The Winter ’12 version of Salesforce introduces optional values for this parameter.
client_id
The value provided to you when you registered your application. Although optional in the spec, this value is required by Salesforce. Registration of the app is achieved using the App Setup→Develop→Remote Access menu.
client_secret
The value provided to you when you registered your application. While the name of this parameter implies that the value is secret, it is sometimes required by API providers for nonconfidential clients such as native mobile applications. In these cases, the value is not actually a secret, as it could be discovered by users of the application.
username
The username provided by the resource owner, encoded as UTF-8.
password
The password provided by the resource owner, encoded as UTF-8. For Salesforce, you need to concatenate the security token entered by the user at the end of the entered password and pass the combined value as the value of this parameter.
Here’s an example request via the curl
command-line HTTP client:
curl -d "grant_type=password" \ -d "client_id=3MVG9QDx8IKCsXTFM0o9aE3KfEwsZLvRt" \ -d "client_secret=4826278391389087694" \ -d "username=ryan%40ryguy.com" \ -d "password=_userspassword__userssecuritytoken_" \ https://login.salesforce.com/services/oauth2/token
If the user-provided credentials are successfully authenticated,
the Salesforce OAuth authorization server will return an application/json
response containing an
access_token
:
{ "id":"https://login.salesforce.com/id/00DU0000000Io8rMAC/005U0000000hMDCIA2", "issued_at":"1316990706988", "instance_url":"https://na12.salesforce.com", "signature":"Q2KTt8Ez5dwJ4Adu6QttAhCxbEP3HyfaTUXoNI=", "access_token":"00DU0000000Io8r!AQcKbNiJPt0OCSAvxU2SBjVGP6hW0mfmKH07QiPEGIX" }
What do each of these response parameters mean?
access_token
The access token used to access the API on behalf of the user who provided their credentials. This is the only required item in the response.
id
(Salesforce-specific value)The unique identity of the user. This URL can also be accessed as any other OAuth-protected resource to obtain more information about the user. The user metadata is returned as JSON or XML, depending on the value of the HTTP
Accept
header sent in the request.instance_url
The URL prefix the client application should use to access the API. This response parameter is specific to Salesforce’s implementation.
signature
A signature used to validate that the identity URL hasn’t been modified since being sent from the server. Although Salesforce issues signatures that can be verified, it isn’t strictly necessary; instead, the application can use the built-in protections of HTTPS to ensure communication with Salesforce’s servers. This response parameter is specific to Salesforce’s implementation.
issued_at
(Salesforce-specific value)The time the signature was generated, used for validating it.
Since the OAuth access token issued by the authorization flow is a
simple bearer token like the access tokens provided in the other flows
(as described in Step 3: Call the API), it can be used
similarly. You simply need to provide the access token via a HTTP
Authorization
header or query
parameter value, depending on which the API provider supports.
Here’s an example curl
request:
curl -d "q=SELECT+name+FROM+Account"\ -H 'Authorization: Bearer 00DU0000000Io8r!AQcAQKJ.Cg1dCBCVHmx2.Iu3lroPQBV2P65_jXk' "https://na12.salesforce.com/services/data/v20query"
Although Salesforce does not support refreshing the access token when using this flow, the spec does accommodate it using the method described in Step 4a: Refresh the access token.
It is important that clients have a way of refreshing the access token if it is issued with only a short-term lifespan. This prevents developers from needing to store the provided user credentials within their applications—one of the major benefits of this flow versus traditional HTTP Basic access authentication mechanisms.
Get Getting Started with OAuth 2.0 now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.