You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: content/reference/authentication/flows/app-access-token.md
+17-1Lines changed: 17 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -19,7 +19,23 @@ with URL-encoded POST body:
19
19
&client_secret=[your client secret]
20
20
&grant_type=client_credentials
21
21
22
-
> Note: we also accept the `client_id` and `client_secret` parameters via the Authorization header, as described in [section 2.3.1 of the spec](http://tools.ietf.org/html/rfc6749#section-2.3.1).
22
+
Example:
23
+
24
+
<%= curl_example(:post, "access_token", :none, {
25
+
:subdomain => "account",
26
+
:path_prefix => "/oauth/",
27
+
:pretty_json => false,
28
+
:token => nil,
29
+
:content_type => nil,
30
+
:data => {
31
+
"grant_type" => "client_credentials",
32
+
"client_id" => "[your client_id]",
33
+
"client_secret" => "[your client secret]",
34
+
}
35
+
}) %>
36
+
37
+
38
+
> We also accept the `client_id` and `client_secret` parameters via the Authorization header, as described in [section 2.3.1 of the OAuth 2 spec](http://tools.ietf.org/html/rfc6749#section-2.3.1).
Copy file name to clipboardExpand all lines: content/reference/authentication/flows/password.md
+21-3Lines changed: 21 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -49,9 +49,27 @@ Once you have been approved, using the password flow is pretty straightforward:
49
49
&password=[user's password]
50
50
&scope=[scopes separated by spaces]
51
51
52
-
> The use of `password_grant_secret` diverges from the OAuth 2.0 specificaion. `password_grant_secret` is a special token that we'll send you when your use of the password flow is approved.
53
-
54
-
> **You can require app-specific passwords** by providing a `require_app_specific_password=1` URL parameter. **[Two-Factor Auth users](http://blog.app.net/2013/03/13/added-security-for-your-app-net-account/) must use app-specific passwords** irrespective of this parameter. We strongly encourage the use of app-specific passwords by all users as they significantly increase account security.
52
+
Example:
53
+
54
+
<%= curl_example(:post, "access_token", :none, {
55
+
:subdomain => "account",
56
+
:path_prefix => "/oauth/",
57
+
:pretty_json => false,
58
+
:token => nil,
59
+
:content_type => nil,
60
+
:data => {
61
+
"grant_type" => "password",
62
+
"client_id" => "[your client_id]",
63
+
"password_grant_secret" => "[your password grant secret that was emailed to you]",
64
+
"username" => "[user's email address or username]",
65
+
"password" => "[user's password]",
66
+
"scope" => "[scopes separated by spaces]",
67
+
}
68
+
}) %>
69
+
70
+
> The use of `password_grant_secret` diverges from the OAuth 2.0 specification. `password_grant_secret` is a special token that we'll send you when your use of the password flow is approved.
71
+
72
+
> **You can require app-specific passwords** by providing a `require_app_specific_password=1` URL parameter. **[Two-Factor Auth users](http://blog.app.net/2013/03/13/added-security-for-your-app-net-account/) must use app-specific passwords** regardless of this parameter. We strongly encourage the use of app-specific passwords by all users as they significantly increase account security.
55
73
56
74
1. If the authorization was successful, App.net will respond with a JSON-encoded token:
Copy file name to clipboardExpand all lines: content/reference/authentication/flows/web.md
+18-1Lines changed: 18 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -45,7 +45,24 @@ Your `redirect_uri` must be registered with App.net before you can use it.
45
45
&redirect_uri=[your registered redirect URI]
46
46
&code=[code received from redirect URI]
47
47
48
-
> Note: we also accept the `client_id` and `client_secret` parameters via the Authorization header, as described in [section 2.3.1 of the spec](http://tools.ietf.org/html/rfc6749#section-2.3.1).
> We also accept the `client_id` and `client_secret` parameters via the Authorization header, as described in [section 2.3.1 of the OAuth 2 spec](http://tools.ietf.org/html/rfc6749#section-2.3.1).
49
66
50
67
1. App.net will respond with a JSON-encoded token: `{"access_token": "[user access token]", "token": {...Token object...}}`
Copy file name to clipboardExpand all lines: content/reference/authentication/identity-delegation.md
+45-2Lines changed: 45 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -45,6 +45,20 @@ Intentionally not addressed in this document are the following:
45
45
46
46
> For App.net, the OAuth token endpoint is: `https://account.app.net/oauth/access_token`
47
47
48
+
Example:
49
+
50
+
<%= curl_example(:post, "access_token", :none, {
51
+
:subdomain => "account",
52
+
:path_prefix => "/oauth/",
53
+
:pretty_json => false,
54
+
:content_type => nil,
55
+
:data => {
56
+
"grant_type" => "delegate",
57
+
"delegate_client_id" => "[your client_id]",
58
+
}
59
+
}) %>
60
+
61
+
48
62
1. The authorized client makes a request to the delegate client with two additional headers, `Identity-Delegate-Token` and `Identity-Delegate-Endpoint`:
49
63
50
64
POST /protected/resource HTTP/1.1
@@ -60,7 +74,26 @@ Intentionally not addressed in this document are the following:
60
74
61
75
> The delegate token and delegate endpoint may also be sent as delegate_token and delegate_endpoint in the query string or POST body.
62
76
63
-
1. The delegate client identifies the resource server by using the `Identity-Delegate-Endpoint` header and makes a request to that endpoint with the Authorization header set.
1. The delegate client identifies the resource server (App.net) by using the `Identity-Delegate-Endpoint` header and makes a request to that endpoint with the Authorization header set.
64
97
65
98
> The query string parameters `delegate_token`, `client_id` and `client_secret` may be used in place of HTTP headers if desired.
66
99
@@ -100,12 +133,22 @@ Intentionally not addressed in this document are the following:
100
133
}
101
134
}
102
135
103
-
The resource server replies with an implementation-dependent description of the current user, which must include the client_id the authorized client. In the case of App.net, this is the Token object of the authorizing client's access_token as returned by the [Retrieve current Token](/reference/resources/token/#retrieve-current-token) endpoint.
136
+
App.net replies with information about the authorized delegate token. This is the Token object of the authorizing client's access_token as returned by the [Retrieve current Token](/reference/resources/token/#retrieve-current-token) endpoint.
104
137
105
138
The delegate client may verify that the authorized client matches some external authentication scheme and/or list of authorized applications. If the delegate token is not valid for the delegate client's client_id, this call will return a `401 Unauthorized`.
106
139
107
140
> For App.net, the identity delegation endpoint is: `https://alpha-api.app.net/stream/0/token`
Copy file name to clipboardExpand all lines: content/reference/make-request/responses.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ title: "Responses"
9
9
10
10
All responses to requests to the App.net API endpoints listed under [Resources](/reference/resources/), whether successful or not, will be returned in the same type of envelope structure. This document describes how that envelope works and what it may contain.
11
11
12
-
*Please note: the[authentication endpoints](/reference/authentication) return a slightly different format that follows the OAuth2 specification.*
12
+
*The[authentication endpoints](/reference/authentication) return a slightly different format that follows the OAuth2 specification.*
13
13
14
14
## Response Envelope
15
15
@@ -63,7 +63,7 @@ To request pretty-printing, send the following HTTP header with your request:
63
63
64
64
X-ADN-Pretty-JSON: 1
65
65
66
-
*Note: Sending any value is sufficient. Omit the header entirely if you wish to receive minified JSON.*
66
+
Sending any value is sufficient. Omit the header entirely if you wish to receive minified JSON.
Copy file name to clipboardExpand all lines: content/reference/meta/entities.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -13,7 +13,7 @@ Usually entities are extracted from the Post text by App.net's servers. We allow
13
13
14
14
Ranges specified by entities may be adjacent, but may not overlap.
15
15
16
-
<divclass="alert alert-info"><b>Note:</b> <code>pos</code> and <code>len</code> fields are given as UTF-32 code points. Many string implementations (in particular, Cocoa's NSString class and Javascript's strings) use UTF-16 or UCS-2 encoding internally, and thus the indices given will not map directly to UTF-16 code points if encoded with surrogate pairs, e.g., emoji characters.</div>
16
+
<divclass="alert alert-info"><code>pos</code> and <code>len</code> fields are given as UTF-32 code points. Many string implementations (in particular, Cocoa's NSString class and Javascript's strings) use UTF-16 or UCS-2 encoding internally, and thus the indices given will not map directly to UTF-16 code points if encoded with surrogate pairs, e.g., emoji characters.</div>
17
17
18
18
All of the following examples are about the following text:
Copy file name to clipboardExpand all lines: content/reference/other/web-intents.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,7 +11,7 @@ Web intents are an easy way to integrate with App.net; you don't even need to us
11
11
12
12
13
13
<divclass="alert alert-info alert-block">
14
-
<p><strong>Note:</strong> If you just want a simple follow or share button you can use <a href='http://app.net/about/buttons/'>button builder</a> instead. We've also open sourced the buttons so that you could host them your self. Checkout the <a href="https://github.com/appdotnet/piha">github repo</a> for more information on how to do that.</p>
14
+
<p>If you just want a simple follow or share button you can use <a href='http://app.net/about/buttons/'>button builder</a> instead. We've also open sourced the buttons so that you could host them your self. Checkout the <a href="https://github.com/appdotnet/piha">github repo</a> for more information on how to do that.</p>
Copy file name to clipboardExpand all lines: content/reference/resources/channel/search.md
+3-1Lines changed: 3 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,7 +11,9 @@ title: "Channel Search"
11
11
12
12
Returns [Channel](/reference/resources/channel/) objects which match a given search query. Because channels have no inherent notion of description or name, we take textual data from common channel annotations which contain such fields, e.g. <code>net.patter-app.settings</code>. We also allow filtering on specific channel properties, such as channel type. No matter what query data is supplied, the search results will respect channel ACLs, and results are limited to non-private channels if the requesting access token does not have the <code>messages</code> scope.
13
13
14
-
<%= general_params_note_for "channel" %> Note: Pagination works for all orderings on this endpoint. Be sure to make requests with before_id=min_id or since_id=max_id as usual when paginating the popularity-sorted results. Separate lists of terms by spaces.
14
+
Separate lists of terms by spaces.
15
+
16
+
<%= general_params_note_for "channel" %>
15
17
16
18
<%= endpoint "GET", "channels/search", "User", "public_messages</code> or <code>messages" %>
0 commit comments