Skip to content

Store dynamic Webex OAuth tokens and make them accessible via a static key.

License

Notifications You must be signed in to change notification settings

cmlccie/webex-token-keeper

Repository files navigation

Webex Token Keeper

Store dynamic Webex OAuth tokens and make them accessible via a static key.


Webex Personal Access Token expire in twelve (12) hours. Webex Integration OAuth access tokens expire in about fourteen (14) days and may be refreshed; however, generating OAuth tokens require a web service and human interaction. You need to create a static configuration that can access the Webex APIs (CI/CD tools, backend automation, etc.).

How can you programmatically obtain a Webex API access token with a fixed identifier?

It takes a small web service.

Simple Microservice Provides Programmatic Access to OAuth Generated Access Tokens

Webex Token Keeper (WTK) implements the Webex Integration OAuth flow and stores the OAuth generated Access Token for future retrieval. The Access Token is stored using a randomly generated key, which is provided to the user at the end of the OAuth flow. WTK provides a simple REST API that provides programmatic access to the stored token.

WTK automatically refreshes the token when a stored token is requested via the REST API (if the token expires in less than seven days).

Features

  • Python implementation of the Webex Integration/OAuth process
  • Store OAuth generated access tokens for programmatic retrieval
  • REST API for retrieving and deleting stored access tokens
  • OpenAPI (Swagger) interactive REST API docs
  • Serverless (AWS Lambda) microservice
  • Fully automated deployment via SAM template

Tech Stack

Setup & Use

The Webex Token Keeper (WTK) app can be fully deployed by running the provided deployment script. The setup script sources installation specific information from the shell environment. You will need an AWS account and a functional local development environment.

At a minimum, you will need to:

  1. Install and configure the AWS Command Line Interface (CLI)

  2. Install the AWS SAM CLI

  3. Host your custom DNS domain in an AWS Route53 hosted zone

  4. Provision a secure SSL certificate for your custom domain in AWS Certificate Manager

Deploy the Token Keeper

The Makefile's deploy target will package the SAM application and . If everything is setup correctly, you can provision the full serverless application (including the DynamoDB table, API gateway, and custom domain name) by running make deploy.

The SAM template is idempotent; you can push environment variable, template, or code changes by rerunning the deployment script.