In this Article
...
Info |
---|
|
...
Log into the Coupa portal.
Navigate to Setup > Integrations > Oauth2/OpenID Connect Clients.
Note: You can also search for ‘oauth’ in the Find it fast search box.Click Create in Oauth2/OpenID Connect Clients page.
From the Grant type list, select Client credentials.
Specify the details for the client as shown in the image below:
Note: You must provide a unique login id for Client Credentials Grant type,else Coupa displays an error,
Login has already been taken
.Select the Scopes you want to include in this API setup. To create a client app, we must select at least one scope and the scopes which provide access to specific APIs required for your functionality. Click the Scope to view the APIs that each Scope supports.
Note: To implement API permissions with OIDC, we've created several new scopes that provide access to specific functionality for the API.Click Save to save the client.
The client Identifier and Secret are generated to gain access to the API Scopes that you have configured. Toggle Show/Hide to display and copy the client secret.
You can use the values of Client ID and Client Secret to gain access to the Coupa APIs.
Configuring an OAuth App with Authorization Code Grant type
...
Steps 1 through 3 are common as mentioned in Configuring an OAuth App with Client Credentials Grant type.
From the Grant type list, select Authorization code.
Specify the details for the client as shown in the image below.
Mandatory. Select
offline_access
scope under Scopes.Click Save. The client Identifier and Secret are generated.
Requesting an OpenID Connect access token
...
If code _verifier and code code _challenge mismatch, it displays the following error and each pair is used only once.
You can generate a code verifier using Online PKCE Generator tools available online.
Scopes
Coupa scopes take the form of service.object.right
. For example, core.accounting.read
or core.accounting.write
. You can find the list of scopes and their underlying Coupa permissions by navigating to the Scope management page in Coupa. When you drill down into a scope, you can see the specific API permissions associated with that scope.
...
Navigate to the <Snap Pack Name> Snap of your choice and configure the <Snap Pack Name> OAuth2 Account with the following details:
Client ID: A Public Identifier for your app. Provide the Client ID that is auto-generated after creating the app in the <endpoint>
Client Secret: Secret value known only to the app and the auth server. Provide the Client Secret that is auto-generated after creating the app in the <endpoint>.
Click Authorize.
You will be redirected to the login page of ServiceNow.Log into Coupa and accept the permissions.
The Access token and the Refresh Token will be generated.