Details
-
Story
-
Status: Closed
-
Minor
-
Resolution: Completed
-
Master
-
AppSec Iteration 98, AppSec Iteration 99, AppSec Iteration 100, AppSec Iteration 101
Description
Motivation
We wrap the current logic of scope checking behind an SPI to make it possible to use that by the GraphQL logic.
Acceptance Criteria
p.s. The following ACs should be met before and after the implementation, because we are simply refactoring existing code.
- AC-1
- Given there is an application configured to OAuth 2 with well defined scopes for a JAX-RS application
- When a valid access_token has been received on a request by the said JAX-RS application through a proper request
- Then the request is authorized (subject to permission checking)
- AC-2
- Given there is an application configured to OAuth 2 with well defined scopes for a JAX-RS application
- When an invalid access_token is used in the OAuth 2.0 header for receiving data from the application
- Then the response must be a 401 Unathorized response
Attachments
Issue Links
- depends on
-
LRDOCS-11396 Documentation of LPS-166214 Story
-
- Ready For Documentation
-
- is a dependency of
-
LPS-158259 [GraphQL] Returns 401 Unauthorized error when using OAuth 2.0 as the authorization mechanism
- Closed
(1 mentioned in)