Webinar (on-demand): OutSystems and Analytics Integration: A New Strategy to Reduce Costs

Discover everything you need to know about Hubway Connect

Try the product online without any installation or purchase commitment
Hubway Connect

Innovative ways to leverage your data for business outcomes

Find out how Hubway Connect can help you get more value from your OutSystems platform
Hubway Connect

Learn and expand your Hubway Connect knowledge

Deep dive in articles, videos and technical information to maximise its use
Hubway Connect

Start free and expand without surprises

Choose the Hubway Connect offer that best meets your needs and suits your budget
Hubway Connect

We are here to help. Let’s talk.

Connect with us via your preferred channel and we will be happy to answer your questions
Hubway Connect
  1. Home
  2. Knowledge Base
  3. Tutorials
  4. Configure Hubway OAuth2 plugin

Configure Hubway OAuth2 plugin

Configure the pre-built OAuth 2.0 authentication plugin module

Along with the installation of Hubway Connect you might have opted for the use of custom authentication methods. If your authentication method of choice is OAuth 2.0, you will not need to implement it from scratch, as we provide a example of its implementation through a Hubway authentication plugin, called HWAuthentication_OAuth2.
* Note that this module is optional and if you don’t have it available on your environment, reach out to our support team.

 

By default, signature verification is enabled. To disable it open the module in ServiceCenter and set the VerifySignature site property
to False. To enable it follow these steps:

  1. Open your Ping console generated in Create Ping Account
  2. Go to Applications and click on the created application, navigate to the Configuration tab

    1. Click on the pencil on the top right corner to edit the configuration

      1. Add https://example.com in the Redirect URIs field and save

    2. Expand the URLs section
  3. Paste the following path on your browser:
    {Authorization URL}?response_type=token id_token&client_id={Client ID}&redirect_uri=https://example.com&scope=openid%20profile

    * {Authorization URL} and {Client ID} are displayed in the Configuration tab of the created app.

  4. You’ll be requested to login with the Ping user created in (and might be requested to change the password)

  5. After login, copy the link from the browser, and retrieve the id_token from the path.
    Example: https://example.com/#access_token=eyJraWQiOiJ[..]kgUqDv7w&[..]&id_token=eyJraWQ[..]eoCl0VtbmY7Q

  6. Open the module HWAuthentication_OAuth2 in ServiceCenter and to include the signature verification, set the following site properties

    1. ExpectedSignatureKeyId

      1. Open and paste the id_token

      2. Copy the kid value and set the value of the site property

    2. SignatureKey

      1. In Ping open the Application and navigate to the Configuration tab and expand the URLs

      2. Copy the JWKS Endpoint and open it in a browser tab

        1. Search for the key with the same kid value as the one defined in , and set the value of this site property with the entire content of the JSon record you found
          Example:
          {
          “kty”: “RSA”, “e”: “AQAB”, “use”: “sig”, “x5t”: “TXBdKPlRe7upoxbRxLEzlGgkTN8”,
             “kid”: “d9aa0090-4317-11ee-ac7e-776c27709711”,
             “x5c”: [
          “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” ],
             “n”: “5kTz6tX6QyofI_uu4qwuPgQJmW_ABHuYNdL3VrpPNsBrftbe7VDzaTCv9dISHRQHWDx-_7jpc8fpeWQyvd1JALrfzm-jZFApYiNDigZO-gYSm7BgOPlc5MT2WTVMcICvs3yaen0XdhVIDXfOXjFN63XruVZAzK_lRouzsITdAjnR6ARlQ_R6eqeo0mKYxiZjEB7FcpGVw_ZX8l7SkRZt8QR_-BwySPWTYQLI9sVht_cagoWSQp7yKVwEtnqqZjkqGiCtLIq_e6XJI25y3fSIGtfK-xDoyy7oMKZLrWre6D7lL_G80hdSXl-clSnnyH8boU8eDcoBkBeHg1SsCtNUtQ”
          }

  7. You can use the id_token as the bearer token when accessing a Hubway project with OAuth 2.0 authentication
    See an example of how to use a Bearer token, when consuming APIs, using Postman:

 

Next step: Configure Hubway OAuth2 Client Sample app

Was this article helpful?

Related Articles

Need Support?

Can't find the answer you're looking for?
Contact Support