CoreView Public APIs are secured through OAuth 2.0 / OpenID Connect. Authentication uses the Client Credentials flow, which enables server-to-server communication by requesting an access token with a client ID and client secret.
Identity provider
Use the identity provider that matches the target environment:
-
Standard environments:
https://identity.coreview.com -
GOV environments:
https://usidentity.coreview.com
OpenID configuration
The OpenID Connect metadata documents are available at the following URLs:
-
Standard:
https://identity.coreview.com/.well-known/openid-configuration -
GOV:
https://usidentity.coreview.com/.well-known/openid-configuration
These documents provide the standard OAuth 2.0 / OpenID Connect discovery details, including the token endpoint.
Authentication flow
CoreView Public APIs use a standard Client Credentials flow:
- Obtain a valid Client ID and Client Secret from CoreView Support.
- Request a JWT access token from the CoreView Identity Provider.
- Use the token to call the CoreView Public API host associated with the correct datacenter.
API hosts by datacenter
API requests must be sent to the host that matches the customer datacenter.
| Datacenter | API host |
|---|---|
| EU | apiproxy.coreview.com |
| EUS | usapiproxy.coreview.com |
| CAE | caeapiproxy.coreview.com |
| AUS | ausapiproxy.coreview.com |
| UKN | uknapiproxy.coreview.com |
| GOV | usgovapiproxy.coreview.com |
Token endpoint
To obtain an access token, send a POST request to the token endpoint exposed by the identity provider. The token endpoint can be read from the OpenID configuration document.
Example for standard environments:
POST /connect/token HTTP/1.1
Host: identity.coreview.com
Content-Type: application/x-www-form-urlencoded
Authorization: Basic base64(CLIENT_ID + ":" + CLIENT_SECRET)
grant_type=client_credentials&scope=SPACE_SEPARATED_SCOPESSample request
POST /connect/token HTTP/1.1
Host: identity.coreview.com
Content-Type: application/x-www-form-urlencoded
Authorization: Basic c2FtcGxlY2xpZW50aWQ6c2FtcGxlY2xpZW50c2VjcmV0Cg==
Content-Length: 173
grant_type=client_credentials&scope=delegation.read%20delegation.write%20operator.read%20operator.write%20platform.read%20licensepool.write%20licensepool.read%20license.readSample response
{
"access_token": "eyJhbGciOiJ...",
"expires_in": 3600,
"token_type": "Bearer",
"scope": "delegation.read delegation.write license.read licensepool.read licensepool.write operator.read operator.write platform.read"
}Notes
- The
access_tokenis a JSON Web Token (JWT) used to authorize API requests. - The token expires after
3600seconds (1 hour). After expiration, a new token must be requested. - Client credentials must be stored securely and kept confidential.
- The token endpoint should be taken from the OpenID configuration document for the relevant environment.
- API requests must be sent to the API host associated with the customer datacenter.