Get your service configuration:
- In CF from VCAP_SERVICES environment variable
- In K8s/Kyma from configuration secrets
The documentation assumes the utilities curl
and awk
to be installed (Mac OS: brew install curl, Ubuntu: sudo apt-get install curl).
Using X.509 Client Certificate
-
Store the
certificate
andkey
from your service configuration in separate files in PEM format.⚠️ In case you experience invalid PEM file errors, \n characters might have to be replaced by newlines \n to have the PEM in the correct format.awk '{gsub(/\\n/,"\n")}1' <file>.pem
-
Fetch the token using:
curl --cert certificate.pem --key key.pem \ -X POST <<credentials.url>>/oauth2/token \ -H 'Content-Type: application/x-www-form-urlencoded' \ --data-urlencode 'client_id=<<credentials.clientid>>' \ --data-urlencode 'grant_type=password' \ --data-urlencode 'username=<<name of requesting user>>' \ --data-urlencode 'password=<<password of requesting user>>'
❕ Replace the
<<>>
placeholders with values from the service configuration and user credentials.
Using Client Credentials
- Fetch the token using:
❕ Replace the
curl -u '<<credentials.clientid>>:<<credentials.clientsecret>>' \ -X POST <<credentials.url>>/oauth2/token \ -H 'Content-Type: application/x-www-form-urlencoded' \ --data-urlencode 'grant_type=password' \ --data-urlencode 'username=<<name of requesting user>>' \ --data-urlencode 'password=<<password of requesting user>>'
<<>>
placeholders with values from the service configuration and user credentials.
Using X.509 Client Certificate
- Store the
certificate
andkey
from your service configuration in separate files in PEM format.⚠️ In case you experience invalid PEM file errors, \n characters might have to be replaced by newlines \n to have the PEM in the correct format.awk '{gsub(/\\n/,"\n")}1' <file>.pem
- Fetch the token using:
❕ Replace the
curl --cert certificate.pem --key key.pem \ -X POST <<credentials.certurl>>/oauth/token \ -H 'Content-Type: application/x-www-form-urlencoded' \ --data-urlencode 'client_id=<<credentials.clientid>>' \ --data-urlencode 'grant_type=password' \ --data-urlencode 'username=<<name of requesting user>>' \ --data-urlencode 'password=<<password of requesting user>>'
<<>>
placeholders with values from the service configuration and user credentials.
Using Client Credentials
- Fetch the token using:
❕ Replace the
curl \ -X POST <<credentials.url>>/oauth/token \ -H 'Content-Type: application/x-www-form-urlencoded' \ --data-urlencode 'client_id=<<credentials.clientid>>' \ --data-urlencode 'client_secret=<<credentials.clientsecret>>' \ --data-urlencode 'grant_type=password' \ --data-urlencode 'username=<<name of requesting user>>' \ --data-urlencode 'password=<<password of requesting user>>'
<<>>
placeholders with values from the service configuration and user credentials.