OAuth2 configuration

PlantUML supports two grant types for OAuth2: client_credentials and password (Resource Owner Password Credentials).

An OAuth2 credentials configuration file must be stored in the folder configured by the property plantuml.security.credentials.path. The file extension is .credential, the file content is structured in JSON, the charset encoding is UTF-8, the filename must match the UserInfo part of the URL.

  • see also

    • link::url-basicauth[Basic Auth configuration]

    • link::url-tokenauth[Token Auth configuration]

    • link::url-authentication[General URL authentication documentation]

OAuth2 client credentials flow

Flow

@startuml
PlantUML -> AuthServer : request token\n(with principal)
AuthServer -> PlantUML : response with token
PlantUML -> Service : call service URL with bearer token
Service -> Service : validates token
note right: Validation of a signed token\nor requesting a validation service
Service -> PlantUML : response with content
@enduml

OAuth2 client\_credentials JSON structure:

{
  "name": "<name of the configuration>",
  "type": "oauth",
  "identifier": "<principal identifier>",
  "secret": "<principal secret>",
  "properties": {
    "grantType": "client_credentials",
    "accessTokenUri": "<URL to token access controler>",
    "scope": "<access scopes>"
  },
  "proxy": {
    "type": "<proxy type>",
    "address": "<proxy server address>",
    "port": "<proxy server port>"
  }
}
@startjson

#highlight "name"
#highlight "type"
#highlight "properties" / "grantType"
#highlight "properties" / "accessTokenUri"
#highlight "proxy" / "type"
#highlight "proxy" / "address"
{
  "name": "",
  "type": "**oauth**",
  "identifier": "",
  "secret": "",
  "properties": {
    "grantType": "**client_credentials**",
    "accessTokenUri": "",
    "scope": ""
  },
  "proxy": {
    "type": "",
    "address": "",
    "port": ""
  }
}
@endjson
  • name: required

    • The name of the configuration and should be similar to the file name

  • type: oauth required

    • Defines an OAuth2 flow

  • identifier: required

    • Principal identifier name

  • secret:

    • Secret for the principal (not encrypted)

  • properties.grantType: client_credentials required

    • Defines the OAuth2 client credentials flow

  • properties.accessTokenUri: required

    • URI to the AuthServer token access controller. If PlantUML is configured to work with an allow-list, this controller URI must be added to the list (see also link::security[security configuration])

  • properties.scope:

    • Access tokens to request (e.g. read write)

  • proxy:

    • Optional proxy configuration (overrides system proxy settings)

  • proxy.type: required (direct, socks, http)

    • Proxy type definition.

  • proxy.address: required

    • Proxy server address (hostname, IP address)

  • proxy.port:

    • Proxy server port number

Examples:

{
  "name": "curity-demo",
  "type": "oauth",
  "identifier": "demo-backend-client",
  "secret": "MJlO3binatD9jk1",
  "properties": {
    "grantType": "client_credentials",
    "scope": "read write",
    "accessTokenUri": "https://login-demo.curity.io/oauth/v2/oauth-token"
  }
}

OAuth2 resource owner password credentials flow

Flow

@startuml
PlantUML -> AuthServer : request token\n(with principle and user credentials)
AuthServer -> PlantUML : response with token
PlantUML -> Service : call service URL with bearer token
Service -> Service : validates token
note right: Validation of a signed token\nor requesting a validation service
Service -> Service : loads/validates user\nif encoded in token
note right: maybe requesting a user service\nor use user data as is
Service -> PlantUML : response with content
@enduml

OAuth2 password JSON structure:

{
  "name": "<name of the configuration>",
  "type": "oauth",
  "identifier": "<principal identifier>",
  "secret": "<principal secret>",
  "properties": {
    "grantType": "password",
    "accessTokenUri": "<URL to token access controler>",
    "scope": "<access scopes>",
    "resourceOwner": {
      "identifier": "<resource owner name>",
      "secret": "<resource owner secret>"
    }
  },
  "proxy": {
    "type": "<proxy type>",
    "address": "<proxy server address>",
    "port": "<proxy server port>"
  }
}
@startjson
!theme plain

#highlight "name"
#highlight "type"
#highlight "identifier"
#highlight "properties" / "grantType"
#highlight "properties" / "accessTokenUri"
#highlight "proxy" / "type"
#highlight "proxy" / "address"
{
  "name": "",
  "type": "**oauth**",
  "identifier": "",
  "secret": "",
  "properties": {
    "grantType": "**password**",
    "accessTokenUri": "",
    "scope": "",
    "resourceOwner": {
      "identifier": "",
      "secret": ""
    }
  },
  "proxy": {
    "type": "",
    "address": "",
    "port": ""
  }
}
@endjson
  • name: required

    • The name of the configuration and should be similar to the file name

  • type: oauth required

    • Defines an OAuth2 flow

  • identifier: required

    • Principal identifier name

  • secret:

    • Secret for the principal (not encrypted)

  • properties.grantType: +password + required

    • Defines the OAuth2 resource owner password credentials flow

  • properties.accessTokenUri: required

    • URI to the AuthServer token access controller. If PlantUML is configured to work with an allow-list, this controller URI must be added to the list (see also link::security[security configuration])

  • properties.scope:

    • Access tokens to request (e.g. read write)

  • properties.resourceOwner.identifier:

    • Resource owner name, who requests the access

  • properties.resourceOwner.secret:

    • Resource owner password

  • proxy:

    • Optional proxy configuration (overrides system proxy settings)

  • proxy.type: required (direct, socks, http)

    • Proxy type definition.

  • proxy.address: required

    • Proxy server address (hostname, IP address)

  • proxy.port:

    • Proxy server port number

Examples:

{
	"name": "oauth-example",
	"type": "oauth",
	"identifier": "demo-backend-client",
	"secret": "MJlO3binatD9jk1",
	"properties": {
		"grantType": "password",
		"scope": "read write",
		"accessTokenUri": "https://login-demo.curity.io/oauth/v2/oauth-token",
		"resourceOwner": {
			"identifier": "alice",
			"secret": "secret"
		}
	}
}

(Please note, login-demo.curity.io actually stopped the support for 'password' grant type)