In this section, you'll:
- Create an API management instance
- Import the Basic Calculator API
- Configure an OAuth 2.0 Server
- Set Auth0 as the OAuth 2.0 Server handling authentication requests to the API
- Test the Auth0-Azure API integration
Step 1: Create Your API Management Instance
To create a new API management service, click Create a resource in the left-hand navigation bar. Once redirected, click Web > API Management.
You'll be asked to provide the following configuration variables:
|Name||The name for your service (which will also be used to create the URL you need to access the service)|
|Subscription||The Azure subscription plan with which you'll use with the service|
|Resource group||The collection of resources sharing a lifecycle, permissions, and policies. You can use an existing resource group or you can create a new one (you'll need to provide a name for the group if you create a new one)|
|Location||Choose the location that services your API instance|
|Organization name||The name of your organization|
|Administrator email||The email address of the person who will be administering this instance|
|Pricing tier||The pricing tier you want, which determines the number of calls you can make to your API, as well as the maximum amount of data transfer allowed. You must opt for the Developer plan or higher; the Consumption plan does not offer sufficient functionality for this integration to work.|
You can also choose to Enable Application Insights. If you do, select the Application Insights instance you would like to use.
Click Create to begin provisioning your service.
Step 2: Import Your API
For this tutorial, we will be importing and using the Calculator API provided by Microsoft. You can, however, create your own API instead of using the Calculator API.
For detailed instructions on how to do so, see Import and Publish Your First API
When done, click Create to import your API. You'll be redirected to the summary page for your API when it's fully imported.
To use Auth0 to secure your API, you'll need to register Auth0 as an OAuth 2.0 Authorization Server. You can do so using the Azure Publisher Portal.
Find the Security area of your API Management service instance's near left navigation bar, and click OAuth 2.0.
Click on Add. You'll see the Add OAuth2 service configuration screen that lets you provide details about your Auth0 tenant.
For the purposes of this example, we'll use the Authorization Code grant type, but you're free to use whichever grant type is most appropriate for your use case. Azure currently supports the following grant types: Authorization Code, Implicit, Resource Owner Password, Client Credentials.
Set the following parameters:
|Display name||A descriptive name for your authorization server, such as
|Id||The identifying name for this Azure resource -- this field should auto-populate based on the display name you provide|
|Description||A description for your authorization server, such as
|Client registration page URL||The page where users can create or manage their accounts; for the purposes of this example, we'll use
|Authorization code grant types||The grant type used for authorization. Select
|Authorization endpoint URL||The URL Azure uses to make the authorization request. See the Auth0 docs on generating the URL|
|Authorization request method||The HTTP method used by Azure to make the authorization request. By default, this is
|Token endpoint URL||The endpoint used to exchange authorization grants for Access Tokens; Auth0's can be reached at
|Client authentication methods||Method used to authenticate the application; Auth0's is
|Access Token sending method||The location of the Access Token in the sending method (typically the Authorization header)|
|Default scope||Specify a default scope (if necessary)|
Because we're using the authorization code grant, we'll need to provide the client ID and client secret for the Auth0 Application we previously registered. You can find both values in the Application Settings.
Once you've provided both the client ID and client secret, you'll see an auto-generated redirect URI. Copy this URL, since you'll need to provide this URI in your Auth0 Application Settings page in the Allowed Callback URLs section.
When complete, click Create to persist your changes.
Set the Allowed Callback URL
You'll need to provide the redirect URI that was auto-generated during the OAuth 2.0 authorization server setup process to Auth0. Log into the Management Dashboard, and navigate to Applications. Select your Application, and click Settings. Paste the URL into the Allowed Callback URLs field.
Before you can use Auth0 to secure your API, you'll need to set your API to use Auth0.
In the near-left navigation column, click APIs. Select the Basic Calculator API; this redirects you to the Design tab.
Click over to the Settings tab.
Scroll to the Security section, and under User Authorization, select OAuth 2.0. In the Authorization Server field that appears, select the server you configured in the previous step.
Step 5: Test Your Integration
While logged in to the Azure Portal, open up your instance of the API Management Service. Click Developer Portal to launch the developer-facing side of your APIs.
Go to APIs > Basic Calculator (or the API you've created for this tutorial). This opens up to the page where you can make a
GET call that allows you to add two integers.
Click Try It. This will bring up the page where you can provide the parameters for your call.
Scroll down to the Authorization section. Next to the Auth0 field, select Authorization Code.
At this point, you'll see the Auth0 login widget in a popup window (if you don't, disable your popup blocker). Provide the credentials for the Auth0 user you created earlier in the tutorial, and sign in.
If you were able to successfully sign in, you'll see a message appear with the expiration date of the Access Token you need to call the API.
Scroll to the bottom, and click Send to send your request. If successful, you'll see a message containing the
HTTP 200 response at the bottom of the page.
In this tutorial, you:
- Configured your Auth0 tenant to act as an OAuth 2.0 server.
- Set up an API Management Service in Azure.
- Imported an API that's managed by Azure's API Management Service.
- Secured your API using Auth0.