OAuth 2.0 template page for consent to authorize
The authorization server uses this page to determine and store user consent information about which OAuth clients are authorized to access the protected resource. This page also indicates scopes the OAuth client requests.
The Security Verify Access for Mobile provides an HTML page template called user_consent.html. The macros in the template are specifically for an OAuth 2.0 flow. We can use a separate template for each API definition. To add a template for a specific definition, create a directory with the same name as the definition under oauth20 and add the user_consent.html template there.
Security Verify Access for Mobile stores the decisions made by the resource owner about which OAuth clients to trust. The resource owner is not prompted every time the same OAuth client requests authorization to access the protected resource.
The authorization request from the OAuth client shows a list of approved scopes, and a list of scopes to be approved. These lists are shown in the consent page and can be of indeterminate length. The template supports multiple copies of stanzas that are repeated once for each scope in either list. This template file provides several replacement macros:
- @OAUTH_AUTHORIZE_URI@
- This macro is replaced with the URI for the authorization endpoint.
- @OAUTH_CLIENT_COMPANY_NAME@
- This macro is replaced with the display name of the client that is requesting access the protected resource.
- @CLIENT_ID@
- This macro is replaced with the client_id parameter specified in the authorization request.
- @REDIRECT_URI@
- This macro is replaced with the redirect URI the authorization server uses to send the authorization code to. The value depends on the following items:
- Redirect URI that is entered during partner registration
- oauth_redirect parameter specified in the authorization request
- @STATE@
- This macro is replaced with the state parameter specified in the authorization request.
- @RESPONSE_TYPE@
- This macro is replaced with the response_type parameter specified in the authorization request.
- @OAUTH_CLIENT_DATA_MACRO@
- This macro is replaced with the client data in JSON format, which contains values that are entered at configuration time such as:
- Company name
- Company URL
- Contact name
- Email address
- Telephone number
- Contact type
- Other information
This macro is also the dynamic data of the client. This includes any statistically configured client values such as Company name, and any dynamic values, regardless of Whether they are from a dynamically registered client or from an extended client portion. For example, tos_uri
The fields are sanitized through a filter list. To populate or filter a specific value, change the advanced configuration oauth20.clientDataToInclude.
- @USERNAME@
- This macro is replaced with the ISAM for Mobile user name.
- @OAUTH_OTHER_PARAM_REPEAT@
- A multi-valued macro that belongs inside a [RPT oauthOtherParamsRepeatable] repeatable replacement list. The values show the list of extra parameter names.
- @OAUTH_OTHER_PARAM_VALUE_REPEAT@
- A multi-valued macro that belongs inside a [RPT oauthOtherParamsRepeatable] repeatable replacement list. The values show the list of extra parameter values.
- @OAUTH_TOKEN_SCOPE_REPEAT@
- A multi-valued macro that belongs either inside [RPT oauthTokenScopePreapprovedRepeatable] or [RPT oauthTokenScopeNewApprovalRepeatable] repeatable replacement lists. The values inside the [RPT oauthTokenScopePreapprovedRepeatable] show the list of token scopes that have been previously approved by the resource owner. Alternatively, the values inside the [RPT oauthTokenScopeNewApprovalRepeatable] show the list of token scopes that have not yet been approved by the resource owner.
- @CONSENT_FORM_VERIFIER@
- This macro is replaced with a unique identifier for the consent_form_verifier parameter value. The consent_form_verifier parameter value is automatically generated by the authorization server. The parameter name and value must not be modified.
Parent topic: OAuth 2.0 and OIDC support