#
Gateway Administration
#
Grant Access to Other Users
To grant access to other members of your team, you need to grant them the appropriate Scopes. You can do this from the API Services Portal by selecting the relevant Namespace and going to the Namespaces Namespace Access page. From there, you can grant users access to the Namespace.
#
Using Service Accounts
Service Accounts are credentials that can be used to access the APS Directory and Gateway APIs.
#
Generate a Service Account
Login to the API Services Portal, select your namespace, and go to the
Namespacestab.Click
Service Accounts, then CickNew Service Account.Select the
GatewayConfig.Publishpermission for the Service Account and clickShare. A new credential will be created - make a note of theIDandSecret.
NOTE: Make sure to save the generated Client ID and Secret.
#
Available Permissions
The following list describes the permissions:
#
About the Admin APIs
#
Directory API
#
Kong Gateway API
#
Swagger Console
Go to gwa-api Swagger Console and select the PUT /namespaces/{namespace}/gateway API.
The Service Account uses the OAuth2 Client Credentials Grant Flow. Click the lock link (on the right) and enter the Service Account credentials generated in Section 2.
For the Parameter namespace, enter the namespace you created in Section 1.
Set dryRun to true.
Select a configFile file.
Send the request.
#
Postman
From the Postman App, click Import and go to the Link tab, enter one of the below URLs.
After creation, go to Collections and right-click on the Gateway Administration (GWA) API collection and select edit.
Go to the Authorization tab, enter your Client ID and Client Secret, and click Get New Access Token.
You should get a successful dialog to proceed. Click Proceed and Use Token.
You can verify that the token works by going to the Collection Return key information about authenticated identity and clicking Send.