Access and authentication for the REST API


Requests to all endpoints in the REST API must be on behalf of a BMC Helix Telco Extensions user. Before processing a request, the API authenticates the request to determine the user. The API uses the OAuth 2.0 protocol protocol for this authentication, and the process is based on tokens as described in the following sections.

After successful authentication, a permission check decides if the user is allowed to perform the requested action. This check uses the existing application permissions.

Authentication scheme

The BMC Helix Telco Extensions REST API leverages the authentication mechanism of BMC Helix Innovation Suite.

BMC Helix Innovation Suitefollows the OAuth 2.0 specification with API tokens provided by BMC Helix Single Sign-On. An authentication token is an opaque string. A token is associated with BMC Helix Telco Extensions user, which could be either a local user or an LDAP user.

For more information about the authentication mechanism and how you can use BMC Helix Single Sign-On for authentication, see Using authorization REST APIs to consume BMC Helix Single Sign-On 

Authentication and authorization

This article provides you step-by-step procedure to generate an OAuth2.0 Access Token. This token acts as your key to authorization and authentication for exploring BMC Helix Telco Extensions' vast API landscape.

To generate an access token

  1. Generate API authentication token using below authorization API: POST /api/rx/authentication/loginrequest
  2. Provide your login ID and password in this authorization API.
  3. Copy the access token from the response and use it to authorize while accessing any API endpoints.

Parameters

Name

Required/Optional

Description

Type

Example

Notes

id

Required

Remedy Server user login account.

String

hannah_admin

Locate this parameter in the request body. This parameter is not specified by default.

password

Required

Password.

String

<your_password>

Locate this parameter in the request body. This parameter is not specified by default.

Example request body

{
"userName": "<your_user>",
"password": "<your_password>"
}

Response

Response

Value

Notes

HTTP code

200

Application returns an authentication token that is valid for about half an hour.

HTTP code400User not found

Permissions

During authentication, a permission check decides whether the user is allowed to perform the requested action. The user must have the required permission in BMC Helix Telco Extensions to perform the operation.

 

Tip: For faster searching, add an asterisk to the end of your partial query. Example: cert*