15 KiB
OAuth2 Endpoints
GET login/oauth2/auth
GET https://<canvas-install-url>/login/oauth2/auth?client_id=XXX&response_type=code&redirect_uri=https://example.com/oauth_complete&state=YYY&scope=<value_1>%20<value_2>%20<value_n>
Parameters
Parameter | Description |
---|---|
client_id | The client id for your registered application. |
response_type | The type of OAuth2 response requested. The only
currently supported value is code . |
redirect_uri | The URL where the user will be redirected after
authorization. The domain of this URL must match the domain of the
redirect_uri stored on the developer key, or it must be a subdomain of
that domain.
For native applications, currently the only supported value is
|
state | Your application can pass Canvas an arbitrary piece of state in this parameter, which will be passed back to your application in Step 2. It's strongly encouraged that your application pass a unique identifier in the state parameter, and then verify in Step 2 that the state you receive back from Canvas is the same expected value. Failing to do this opens your application to the possibility of logging the wrong person in, as described here. |
scope | This can be used to specify what information the Canvas API access token will provide access to. Canvas API scopes may be found beneath their corresponding endpoints in the "resources" documentation pages. If the developer key does not require scopes and no scope parameter is specified, the access token will have access to all scopes. If the developer key does require scopes and no scope parameter is specified, Canvas will respond with "invalid_scope." To successfully pass multiple scope values, the scope parameter is included once, with multiple values separated by spaces. Passing multiple scope parameters, as is common in other areas of Canvas, causes only the last value to be applied to the generated token. |
purpose | This can be used to help the user identify which instance of an application this token is for. For example, a mobile device application could provide the name of the device. |
force_login | Set to '1' if you want to force the user to enter their credentials, even if they're already logged into Canvas. By default, if a user already has an active Canvas web session, they will not be asked to re-enter their credentials. |
unique_id | Set to the user's username to be populated in the login form in the event that the user must authenticate. |
prompt | If set to none , Canvas will immediately redirect to the
redirect_uri . If the caller has a valid session with a
"remember me" token or a token from a trusted Developer Key,
the redirect will contain a code=XYZ param. If the caller
has no session, the redirect will contain an
error=login_required param. If the caller has a session, but
no "remember me" or trusted token, the redirect will contain an
error=interaction_required param. |
POST login/oauth2/token
See Section 4.1.3 of the OAuth2 RFC for more information about this process.
POST /login/oauth2/token
Parameters
Parameter | Description |
---|---|
grant_type | Values currently supported "authorization_code", "refresh_token", and "client_credentials" |
client_id grant_types: authorization_code refresh_token | The client id for your registered application. |
client_secret grant_types: authorization_code refresh_token | The client secret for your registered application. |
redirect_uri grant_types: authorization_code refresh_token | If a redirect_uri was passed to the initial request in step 1, the same redirect_uri must be given here. |
code grant_type: authorization_code | Required if grant_type is authorization_code. The code you received in a redirect response. |
refresh_token grant_type: refresh_token | Required if grant_type is refresh_token. The refresh_token you received in a redirect response. |
client_assertion_type grant_type: client_credentials | Currently the only supported value for this field is `urn:ietf:params:oauth:client-assertion-type:jwt-bearer` |
client_assertion grant_type: client_credentials | The signed jwt used to request an access token. Includes the value of Developer Key id as the sub claim of the jwt body. Should be signed by the private key of the stored public key on the DeveloperKey. |
scope grant_type: client_credentials | A list of scopes to be granted to the token. Currently only IMS defined scopes may be used. |
Canvas API example responses
For grant_type of code or refresh_token:
Parameter | Description |
---|---|
access_token | The OAuth2 Canvas API access token. |
token_type | The type of token that is returned. |
user | A JSON object of canvas user id and user name. |
refresh_token | The OAuth2 refresh token. |
expires_in | Seconds until the access token expires. |
When using grant_type=code (ex: for Canvas API access):
{ "access_token": "1/fFAGRNJru1FTz70BzhT3Zg", "token_type": "Bearer", "user": {"id":42, "name": "Jimi Hendrix"}, "refresh_token": "tIh2YBWGiC0GgGRglT9Ylwv2MnTvy8csfGyfK2PqZmkFYYqYZ0wui4tzI7uBwnN2", "expires_in": 3600 }
When using grant_type=refresh_token, the response will not contain a new refresh token since the same refresh token can be used multiple times:
{ "access_token": "1/fFAGRNJru1FTz70BzhT3Zg", "token_type": "Bearer", "user": {"id":42, "name": "Jimi Hendrix"}, "expires_in": 3600 }
If scope=/auth/userinfo was specified in the GET login/oauth2/auth request (ex: when using Canvas as an authentication service) then the response that results from POST login/oauth2/token would be:
{ "access_token": null, "token_type": "Bearer", "user":{"id": 42, "name": "Jimi Hendrix"} }
Examples using client_credentials
When using grant_type=client_credentials (ex: to access LTI Advantage Services):
Example request
This request must be signed by an RSA256 private key with a public key that is configured on the developer key as described in Step 1: Developer Key Setup.
{ "grant_type": "client_credentials", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "eyJ0eXAiOiJKV1QiLCJhbGciOiJSUzI1NiIsImtpZCI6IjIwMTktMDYtMjFUMTQ6NTk6MzBaIn0.eyJpc3MiOiJodHRwczovL3d3dy5teS10b29sLmNvbSIsInN1YiI6Ilx1MDAzY2NsaWVudF9pZFx1MDAzZSIsImF1ZCI6Imh0dHA6Ly9cdTAwM2NjYW52YXNfZG9tYWluXHUwMDNlL2xvZ2luL29hdXRoMi90b2tlbiIsImlhdCI6MTU2MTc1MDAzMSwiZXhwIjoxNTYxNzUwNjMxLCJqdGkiOiJkZmZkYmRjZS1hOWYxLTQyN2ItOGZjYS02MDQxODIxOTg3ODMifQ.lUHCwDqx2ukKQ2vwoz_824IVcyq-rNdJKVpGUiJea5-Ybk_VfyKW5v0ky-4XTJrGHkDcj0T9J8qKfYbikqyetK44yXx1YGo-2Pn2GEZ26bZxCnuDUDhbqN8OZf4T8DnZsYP4OyhOseHERsHCzKF-SD2_Pk6ES5-Z8J55_aMyS3w3tl4nJtwsMm6FbMDp_FhSGE4xTwkBZ2KNM4JqkCwHGX_9KcpsPsHRFQjn9ysTeg-Qf7H2QFgFMFjsfQX-iSL_bQoC2npSz7rQ8awKMhCEYdMYZk2vVhQ7XQ8ysAyf3m1vlLbHjASpztcAB0lz_DJysT0Ep-Rh311Qf_vXHexjVA", "scope": "https://purl.imsglobal.org/spec/lti-ags/lineitem https://purl.imsglobal.org/spec/lti-ags/result/read" }
Below is an example of the decoded client_assertion JWT in the above request:
{ "iss": "https://www.my-tool.com", "sub": "<client_id>", "aud": "https://<canvas_domain>/login/oauth2/token", "iat": 1561750031, "exp": 1561750631, "jti": "dffdbdce-a9f1-427b-8fca-604182198783" }
NOTE:
- the value of the sub claim should match the client_id of the developer key in Canvas.
- the value of the aud claim should contain the domain of the Canvas account where the desired data resides.
Example Response
Parameter | Description |
---|---|
access_token | The OAuth2 client_credentials access token. |
token_type | The type of token that is returned. |
expires_in | Seconds until the access token expires. |
scope | The scope or space delimited list of scopes granted for the access token. |
{ "access_token" : "eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.eyJzdWIiOiJ3d3cuZXhhbXBsZS5jb20iLCJpYXQiOiIxNDg1OTA3MjAwIiwiZXhwIjoiMTQ4NTkwNzUwMCIsImltc2dsb2JhbC5vcmcuc2VjdXJpdHkuc2NvcGUiOiJMdGlMaW5rU2V0dGluZ3MgU2NvcmUuaXRlbS5QVVQifQ.UWCuoD05KDYVQHEcciTV88YYtWWMwgb3sTbrjwxGBZA", "token_type" : "Bearer", "expires_in" : 3600, "scope" : "https://purl.imsglobal.org/spec/lti-ags/lineitem https://purl.imsglobal.org/spec/lti-ags/result/read" }
DELETE login/oauth2/token
If your application supports logout functionality, you can revoke your own access token. This is useful for security reasons, as well as removing your application from the list of tokens on the user's profile page. Simply make an authenticated request to the following endpoint by including an Authorization header or providing the access_token as a request parameter.
DELETE /login/oauth2/token
Parameters
Parameter | Description |
---|---|
expire_sessions | Set this to '1' if you want to end all of the user's Canvas web sessions. Without this argument, the endpoint will leave web sessions intact.
|
Example responses
{ "forward_url": "https://idp.school.edu/opaque_url" }
GET login/session_token
If your application needs to begin a normal web session in order to access features not supported via API (such as quiz taking), you can use your API access token in order to get a time-limited URL that can be fed to a browser or web view to begin a new web session.
GET /login/session_token
Parameters
Parameter | Description |
---|---|
return_to | An optional URL to begin the web session at. Otherwise the user will be sent to the dashboard. |
Example responses
{ "session_url": "https://canvas.instructure.com/opaque_url" }