WAS v8.5 > Secure applications > Authorizing access to resources > OAuth > OAuth 2.0 services![]()
OAuth command group for AdminTask
We can use the Jython or Jacl scripting languages to configure OAuth with wsadmin. The commands and parameters in the OAuth group can be used to configure the OAuth Trust Association Interceptor (TAI) and to manage the OAuth provider configuration.
The OAuth command group for AdminTask includes the following commands:
- enableOAuthTAI
- createOAuthProvider
- deleteOAuthProvider
The enableOAuthTAI command adds the OAuth TAI to the security configuration of the WebSphere Application Server.
Information Value Required parameters None Optional parameters None Examples:
- Jacl:
$AdminTask enableOAuthTAI
- Using Jython:
AdminTask.enableOAuthTAI()
The createOAuthProvider command creates an OAuth provider in the security configuration of the WAS.
Information Value Required parameters -providerName
The name of the OAuth provider. (String, required)
-fileName
The name of the provider configuration file to use for this provider.
The file specified by this parameter must exist. (String, required)
Optional parameters None Examples:
- Jacl:
$AdminTask createOAuthProvider {-providerName OAuthProvider1 -fileName c:/WebSphere/properties/OAuthConfigSample.xml}- Using Jython:
AdminTask.createOAuthProvider('[-providerName OAuthProvider1 -fileName c:/WebSphere/properties/OAuthConfigSample.xml]')
The deleteOAuthProvider command deletes the OAuth provider from the security configuration of the WAS.
Information Value Required parameters -providerName
The name of the OAuth provider. (String, required)
Optional parameters None Examples:
- Jacl:
$AdminTask deleteOAuthProvider {-providerName OAuthProvider1}
- Using Jython:
AdminTask.deleteOAuthProvider('-providerName OAuthProvider1')