qa-doc-docs.reskureturns.com
Open in
urlscan Pro
52.177.151.148
Public Scan
URL:
https://qa-doc-docs.reskureturns.com/
Submission: On January 21 via api from US — Scanned from US
Submission: On January 21 via api from US — Scanned from US
Form analysis
0 forms found in the DOMText Content
DOCUMENT SERVICE This site documents the technical contracts for interacting with the Document Service, an API provided by Inmar Intelligence. The Document Service is a centralized repository for storing and retrieving documents. When onboarded by Inmar Intelligence to use the Document Service, each client will be provided with credentials to interact with the API: * A client ID and client secret pair for authorization token generation (see Authorization section below) The below sequence diagram outlines the order of calls necessary to interact with the Document Service. Read the technical documentation via the link below to learn more about the individual endpoints. Read the Docs AUTHORIZATION The Document Service uses Azure Active Directory B2C for a token generation under the Inmar One SSO tenant. Inmar One SSO is Inmar's solution for customer single sign-on access to Inmar applications. To generate a token, make a request to POST https://login.microsoftonline.com/qainmaronessoaadb2c.onmicrosoft.com/oauth2/v2.0/token with a body of content type multipart/form-data (see form data example here) containing the following fields: * client_id: client ID credential given to the client upon onboarding * client_secret: client secret credential given to the client upon onboarding * grant_type: should be set to "client_credentials" * scope: should be set to "https://qainmaronessoaadb2c.onmicrosoft.com/69f2901e-3487-4c9f-9fec-6a5f477f763b/.default" The below is a sample HTTP request fitting the above requirements: POST /qainmaronessoaadb2c.onmicrosoft.com/oauth2/v2.0/token HTTP/1.1 Host: login.microsoftonline.com Content-Type: multipart/form-data;boundary="boundary" --boundary Content-Disposition: form-data; name="client_id" {client_id} --boundary Content-Disposition: form-data; name="client_secret" {client_secret} --boundary Content-Disposition: form-data; name="grant_type" client_credentials --boundary Content-Disposition: form-data; name="scope" https://qainmaronessoaadb2c.onmicrosoft.com/69f2901e-3487-4c9f-9fec-6a5f477f763b/.default --boundary-- In its response, Azure AD B2C will provide you with a body that contains the token as well as its expiry in seconds (see example below). For the duration of that token's lifetime, the token should be passed in any call to the Document Service in the Authorization header using the format Bearer {token}. The token can be reused as many times as required until its lifetime expires, at which point Azure AD B2C should be called again to generate a new token. { "token_type": "Bearer", "expires_in": 3599, "ext_expires_in": 3599, "access_token": "{token}" }