Store dynamic Webex OAuth tokens and make them accessible via a static key.
Webex Personal Access Token expire in twelve (12) hours. Webex Integration OAuth access tokens expire in about fourteen (14) days and may be refreshed; however, generating OAuth tokens require a web service and human interaction. You need to create a static configuration that can access the Webex APIs (CI/CD tools, backend automation, etc.).
How can you programmatically obtain a Webex API access token with a fixed identifier?
It takes a small web service.
Webex Token Keeper (WTK) implements the Webex Integration OAuth flow and stores the OAuth generated Access Token for future retrieval. The Access Token is stored using a randomly generated key, which is provided to the user at the end of the OAuth flow. WTK provides a simple REST API that provides programmatic access to the stored token.
WTK automatically refreshes the token when a stored token is requested via the REST API (if the token expires in less than seven days).
- Python implementation of the Webex Integration/OAuth process
- Store OAuth generated access tokens for programmatic retrieval
- REST API for retrieving and deleting stored access tokens
- OpenAPI (Swagger) interactive REST API docs
- Serverless (AWS Lambda) microservice
- Fully automated deployment via SAM template
- FastAPI Web Service
- Pydantic Data Models
- AWS API Gateway w/Custom Domain Support
- AWS Lambda Serverless App
- AWS DynamoDB Database
- CloudFormation (SAM) Template Parameterized and Fully-Automated Deployment
The Webex Token Keeper (WTK) app can be fully deployed by running the provided deployment script. The setup script sources installation specific information from the shell environment. You will need an AWS account and a functional local development environment.
At a minimum, you will need to:
-
Install the AWS SAM CLI
-
Host your custom DNS domain in an AWS Route53 hosted zone
-
Provision a secure SSL certificate for your custom domain in AWS Certificate Manager
The Makefile's deploy
target will package the SAM application and . If everything is setup correctly, you can provision the full serverless application (including the DynamoDB table, API gateway, and custom domain name) by running make deploy
.
The SAM template is idempotent; you can push environment variable, template, or code changes by rerunning the deployment script.