If you're a Lobby Admin, you can create an OAuth Client directly from the Lobby. Your OAuth Client will be ready to use in minutes.
Every integration with Aconex APIs must be registered with Oracle and you will receive credentials that will be used to uniquely identify the integration. Every one of your integrations must be registered individually.
You can only create an OAuth Client for your organization(s).
Oracle Technology Partners must create their OAuth Clients on Early Access (EA) Lobby and after completing testing there, must Publish the OAuth Client for their customers to access.
Determine which one of these is most applicable to your integration. If you are unsure see What type of OAuth Integration should I register?
User Account
If you are registering a User-Bound Integration select the Lobby user account to bind to the integration from the User account drop-down list. Every call made to an Aconex API by this integration will be performed in the context of the bound user account. You'll only be able to select Lobby accounts from your organization(s).
Redirect URL(s)
If you are registering a Web Server Application or Installed Application you must provide an endpoint (redirect URL) that the Lobby will call with the authorization code as part of the OAuth flow.
You may register a single redirect URL or multiple.
Check with your technical team for what redirect URL(s) need to be registered for your integration.
If you are registering an Installed Application, RFC 8252 states that should use either a Private-user URI scheme redirect or a Loopback redirect URI, each of which are described below.
A Private-user URI scheme redirect uses a custom URI scheme that has been registered on the device for your application, taking the form:
scheme:/path
Here's an example:
com.example.app:/oauth2/callback
A Loopback redirect URI uses the "http" scheme with the loopback IP literal and whatever port the application is listening on, taking the form:
http://127.0.0.1:{port}/{path}
Here's an example:
http://127.0.0.1:54001/oauth2/callback
If your Installed Application loops through a number of ports to find an available port for binding the callback, you may register a single loopback redirect URI with a wildcard (*) port identifier, rather than registering multiple redirect URIs.
Organizations
Select the organization(s) that will use this integration. You'll only see organizations listed where you are a Lobby Admin.
Trusted Issuer Public Certificate
If you are registering a Non-Interactive Integration, you must upload the public certificate of the Trusted Issuer that will sign the User Assertion used to identify the user on behalf of whom your integration will access Aconex APIs.
Terms of Use
If you chose Aconex as the Resource Application you must check the box to accept the terms of use.
If you've configured SSO in your own Identity Domain, you must add the integration to your IdP policy. Learn more about adding apps.
If you've configured 2SV in your own Identity Domain, you must add the integration to your Sign-on policy. Learn more about configuring 2SV policies.