/users/user/oauth2/resources/sets
AM-specific endpoint for viewing and updating a resource registered to a particular user.
Tip
Use the AM API Explorer for detailed information about the parameters supported by this endpoint, and to test it against your deployed AM instance.
In the AM console, click the Help icon, and go to API Explorer > /users > /{user} > /oauth2 > /resources > /sets.
To call the endpoint, you must compose the path to the realm where the resource is registered.
This example reads an OAuth 2.0 resource and related policy in the alpha
realm. Note that you must provide the SSO token of an administrative user or of the resource owner as a header, and that the name of the resource owner (demo
, in this example) is part of the URL:
$curl \ --request GET \ --header "iPlanetDirectoryPro: AQIC5wM2LY4Sfcxs...EwNDU2NjE0*" \ "https://openam.example.com:8443/openam/json/realms/root/realms/alpha/users/demo\ /oauth2/resources/sets/43225628-4c5b-4206-b7cc-5164da81decd0"
{ "scopes": [ "http://photoz.example.com/dev/scopes/view", "http://photoz.example.com/dev/scopes/comment" ], "_id": "43225628-4c5b-4206-b7cc-5164da81decd0", "resourceServer": "UMA-Resource-Server", "name": "My Videos", "icon_uri": "http://www.example.com/icons/cinema.png", "policy": { "permissions": [ { "subject": "user.1", "scopes": [ "http://photoz.example.com/dev/scopes/view" ] }, { "subject": "user.2", "scopes": [ "http://photoz.example.com/dev/scopes/comment", "http://photoz.example.com/dev/scopes/view" ] } ] }, "type": "http://www.example.com/rsets/videos" }
Tip
You can specify the fields that are returned with the _fields
query string filter. For example ?_fields=scopes, resourceServer, name
On success, an HTTP 200 OK status code is returned, with a JSON body representing the resource. If a policy relating to the resource exists, a representation of the policy is also returned in the JSON.
If the specified resource does not exist, an HTTP 404 Not Found status code is returned, as follows:
{
"code": 404,
"reason": "Not Found",
"message": "No resource set with id, bad-id-3e28-4c19-8a2b-36fc24c899df0, found."
}
If the SSO token used is not that of the resource owner or an administrator, an HTTP 403 Forbidden status code is returned, as follows:
{
"code": 403,
"reason": "Forbidden",
"message": "User, user.1, not authorized."
}