Service Manager
Log-in using OIDC
Logs into a tenant using the Open ID Connect (OIDC) authorization.
Base URL:
https://{tenant url}/api/rest/authentication/login

Here is an example to log-in to a tenant using the OIDC authorization.
URL |
https://{tenant url}/api/rest/authentication/login |
Method |
POST |
Request Payload |
{ "tenant" :"{tenant url}", "username" :"{name of the user}", "password" :"{password set for the user}", "role" :"{user role to log-in to the application}" } |
Status Code |
200 |
• When providing the "role" parameter, you need to provide the internal name of the role and not the display name. For example, Admin is the internal name of the role Administrator.
• The generated ID is a JTW Token or a Session ID can be identified by checking for the tenant url in the ID. If the ID contains the tenant url, then it is a Session ID, else it is a JWT Token.

"eyJ0eXAiOiJKV1QiLCJhbGciOiJSUzI1NiIsIng1dCI6ImEzck1VZ01Gdjl0UGNsTGE2eUYzekFrZnF1RSIsImtpZCI6ImEzck1VZ01Gdjl0UGNsTGE2eUYzekFrZnF1RSJ9.
eyJpc3MiOiJodHRwczovL2lzbS1pbm5vdmEtdGVuYW50MS5pdmFudGljbG91ZGRldi5jb20vT0lEQyIsImF1ZCI6Imh0dHBzOi8vaXNtLWlubm92YS10ZW5hbnQxLml2YW50aWN
sb3VkZGV2LmNvbS9PSURDL3Jlc291cmNlcyIsImV4cCI6MTU1MjU0Nzc4NiwibmJmIjoxNTUyNTQ0MTg2LCJjbGllbnRfaWQiOiJyZXN0TG9naW5FbmRQb2ludCIsInNjb3BlIj
oib3BlbmlkIiwic3ViIjoiaXNtLWlubm92YS10ZW5hbnQxLml2YW50aWNsb3VkZGV2LmNvbSNBVGF5bG9yIzU5RkNBUEw2MjNUUTZVUjM1TEpUOUNTM1BQRERSTzFNIiwiYXV0a
F90aW1lIjoxNTUyNTQ0MTg2LCJpZHAiOiJpZHNydiIsImlzbV9zaWQiOiI1OUZDQVBMNjIzVFE2VVIzNUxKVDlDUzNQUEREUk8xTSIsImFtciI6WyJwYXNzd29yZCJdfQ.Mmb8a
x45sH2GWut1KZJ7tt6gWb_IkJ2IT2DNNFSzaAyMwtuLO3AeX9oQwVLuKSJ7yq2gGNNJ2TZJp-WCSNxKYvB1uZ6FFnoGMNyueBGP1HXYUXRGNUzWjKAKfuwejy7Dun1J68WCX4zx
lVhjE2YDBWlW_l60hJuyr9fQ2ACkHMSFJKSZLbo4X8KBXVpmUGeYNOFNm7BA9Q3pTv_z8O35F8jmSOOQNu49kCC3mHHF_xkm6UgBpXfZOQbAFxyvuPca0URvI1i2JQ4NbNgk6s2
HlnUI11CBGWgInSjw-TX_Kd7gB9HwbFLLDWZVrIYsexOU-OcipQdimBQR9vd9uPv-GA"
After successfully executing the log-in API, the application generates a JWT Token. Follow the below steps to log in to the tenant:
1.Provide the generated JWT Token in the Token field of the Authorization tab in the Postman application.
2.Set the TYPE field as Bearer Token.
3.Click the Send button.
You are now successfully logged in to the tenant.
Unsuccessful Response

Scenario: Trying to log-in to a tenant with invalid user name, password or role.
https://{tenant url}/api/rest/authentication/login
Code | ISM_4000 |
Description | Bad Request |
Message |
[ "Unhandled system exception: Invalid Parameters." ] |
HTTP STATUS CODE |
400 |
Was this article useful?
Copyright © 2019, Ivanti. All rights reserved.