OAuth2 Endpoints
GET login/oauth2/auth
GET https://<canvas-install-url>/login/oauth2/auth?client_id=XXX&response_type=code&redirect_uri=https://example.com/oauth_complete&state=YYY&scope=<value_1>%20<value_2>%20<value_n>
Parameters
Parameter | Description |
---|---|
client_id | The client id for your registered application. |
response_type | The type of OAuth2 response requested. The only
currently supported value is code . |
redirect_uri | The URL where the user will be redirected after
authorization. The domain of this URL must match the domain of the
redirect_uri stored on the developer key, or it must be a subdomain of
that domain.
For native applications, currently the only supported value is
urn:ietf:wg:oauth:2.0:oob , signifying that the credentials will be
retrieved out-of-band using an embedded browser or other functionality.
|
state | Your application can pass Canvas an arbitrary piece of state in this parameter, which will be passed back to your application in Step 2. It's strongly encouraged that your application pass a unique identifier in the state parameter, and then verify in Step 2 that the state you receive back from Canvas is the same expected value. Failing to do this opens your application to the possibility of logging the wrong person in, as described here. |
scope | This can be used to specify what information the Canvas API access token will provide access to. Canvas API scopes may be found beneath their corresponding endpoints in the "resources" documentation pages. If the developer key does not require scopes and no scope parameter is specified, the access token will have access to all scopes. If the developer key does require scopes and no scope parameter is specified, Canvas will respond with "invalid_scope." To successfully pass multiple scope values, the scope parameter is included once, with multiple values separated by spaces. Passing multiple scope parameters, as is common in other areas of Canvas, causes only the last value to be applied to the generated token. |
purpose | This can be used to help the user identify which instance of an application this token is for. For example, a mobile device application could provide the name of the device. |
force_login | Set to '1' if you want to force the user to enter their credentials, even if they're already logged into Canvas. By default, if a user already has an active Canvas web session, they will not be asked to re-enter their credentials. |
unique_id | Set to the user's username to be populated in the login form in the event that the user must authenticate. |
prompt | If set to none , Canvas will immediately redirect to the
redirect_uri . If the caller has a valid session with a
"remember me" token or a token from a trusted Developer Key,
the redirect will contain a code=XYZ param. If the caller
has no session, the redirect will contain an
error=login_required param. If the caller has a session, but
no "remember me" or trusted token, the redirect will contain an
error=interaction_required param. |
POST login/oauth2/token
POST /login/oauth2/token
Parameters
Parameter | Description |
---|---|
grant_type | Values currently supported "authorization_code", "refresh_token", and "client_credentials" |
client_id grant_types: authorization_code refresh_token | The client id for your registered application. |
client_secret grant_types: authorization_code refresh_token | The client secret for your registered application. |
redirect_uri grant_types: authorization_code refresh_token | If a redirect_uri was passed to the initial request in step 1, the same redirect_uri must be given here. |
code grant_type: authorization_code | Required if grant_type is authorization_code. The code you received in a redirect response. |
refresh_token grant_type: refresh_token | Required if grant_type is refresh_token. The refresh_token you received in a redirect response. |
client_assertion_type grant_type: client_credentials | Currently the only supported value for this field is `urn:ietf:params:oauth:client-assertion-type:jwt-bearer` |
client_assertion grant_type: client_credentials | The signed jwt used to request an access token. Includes the value of Developer Key id as the sub claim of the jwt body. Should be signed by the private key of the stored public key on the DeveloperKey. |
scope grant_type: client_credentials | A list of scopes to be granted to the token. Currently only IMS defined scopes may be used. |
Canvas API example responses
For grant_type of code or refresh_token:
Parameter | Description |
---|---|
access_token | The OAuth2 Canvas API access token. |
token_type | The type of token that is returned. |
user | A JSON object of canvas user id and user name. |
refresh_token | The OAuth2 refresh token. |
expires_in | Seconds until the access token expires. |
canvas_region | For hosted Canvas, the AWS region (e.g. us-east-1) in which the institution that provided this token resides. For local or open source Canvas, this will have a value of "unknown". This field is safe to ignore. |
When using grant_type=code (ex: for Canvas API access):
{
"access_token": "1/fFAGRNJru1FTz70BzhT3Zg",
"token_type": "Bearer",
"user": {"id":42, "name": "Jimi Hendrix"},
"refresh_token": "tIh2YBWGiC0GgGRglT9Ylwv2MnTvy8csfGyfK2PqZmkFYYqYZ0wui4tzI7uBwnN2",
"expires_in": 3600,
"canvas_region": "us-east-1"
}
When using grant_type=refresh_token, the response will not contain a new refresh token since the same refresh token can be used multiple times:
{
"access_token": "1/fFAGRNJru1FTz70BzhT3Zg",
"token_type": "Bearer",
"user": {"id":42, "name": "Jimi Hendrix"},
"expires_in": 3600
}
If scope=/auth/userinfo was specified in the GET login/oauth2/auth request (ex: when using Canvas as an authentication service) then the response that results from POST login/oauth2/token would be:
{
"access_token": null,
"token_type": "Bearer",
"user":{"id": 42, "name": "Jimi Hendrix"}
}
Examples using client_credentials
When using grant_type=client_credentials (ex: to access LTI Advantage Services):
Example request
This request must be signed by an RSA256 private key with a public key that is configured on the developer key as described in Step 1: Developer Key Setup.
{
"grant_type": "client_credentials",
"client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer",
"client_assertion": "eyJ0eXAiOiJKV1QiLCJhbGciOiJSUzI1NiIsImtpZCI6IjIwMTktMDYtMjFUMTQ6NTk6MzBaIn0.eyJpc3MiOiJodHRwczovL3d3dy5teS10b29sLmNvbSIsInN1YiI6Ilx1MDAzY2NsaWVudF9pZFx1MDAzZSIsImF1ZCI6Imh0dHA6Ly9cdTAwM2NjYW52YXNfZG9tYWluXHUwMDNlL2xvZ2luL29hdXRoMi90b2tlbiIsImlhdCI6MTU2MTc1MDAzMSwiZXhwIjoxNTYxNzUwNjMxLCJqdGkiOiJkZmZkYmRjZS1hOWYxLTQyN2ItOGZjYS02MDQxODIxOTg3ODMifQ.lUHCwDqx2ukKQ2vwoz_824IVcyq-rNdJKVpGUiJea5-Ybk_VfyKW5v0ky-4XTJrGHkDcj0T9J8qKfYbikqyetK44yXx1YGo-2Pn2GEZ26bZxCnuDUDhbqN8OZf4T8DnZsYP4OyhOseHERsHCzKF-SD2_Pk6ES5-Z8J55_aMyS3w3tl4nJtwsMm6FbMDp_FhSGE4xTwkBZ2KNM4JqkCwHGX_9KcpsPsHRFQjn9ysTeg-Qf7H2QFgFMFjsfQX-iSL_bQoC2npSz7rQ8awKMhCEYdMYZk2vVhQ7XQ8ysAyf3m1vlLbHjASpztcAB0lz_DJysT0Ep-Rh311Qf_vXHexjVA",
"scope": "https://purl.imsglobal.org/spec/lti-ags/lineitem https://purl.imsglobal.org/spec/lti-ags/result/read"
}
Below is an example of the decoded client_assertion JWT in the above request:
{
"iss": "https://www.my-tool.com",
"sub": "<client_id>",
"aud": "https://<canvas_domain>/login/oauth2/token",
"iat": 1561750031,
"exp": 1561750631,
"jti": "dffdbdce-a9f1-427b-8fca-604182198783"
}
NOTE:
- the value of the sub claim should match the client_id of the developer key in Canvas.
- the value of the aud claim should contain either the domain of the Canvas account where the desired data resides, or the domain of the LTI 1.3 OIDC Auth endpoint, as described here.
Example Response
Parameter | Description |
---|---|
access_token | The OAuth2 client_credentials access token. |
token_type | The type of token that is returned. |
expires_in | Seconds until the access token expires. |
scope | The scope or space delimited list of scopes granted for the access token. |
{
"access_token" : "eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.eyJzdWIiOiJ3d3cuZXhhbXBsZS5jb20iLCJpYXQiOiIxNDg1OTA3MjAwIiwiZXhwIjoiMTQ4NTkwNzUwMCIsImltc2dsb2JhbC5vcmcuc2VjdXJpdHkuc2NvcGUiOiJMdGlMaW5rU2V0dGluZ3MgU2NvcmUuaXRlbS5QVVQifQ.UWCuoD05KDYVQHEcciTV88YYtWWMwgb3sTbrjwxGBZA",
"token_type" : "Bearer",
"expires_in" : 3600,
"scope" : "https://purl.imsglobal.org/spec/lti-ags/lineitem https://purl.imsglobal.org/spec/lti-ags/result/read"
}
DELETE login/oauth2/token
DELETE /login/oauth2/token
Parameters
Parameter | Description |
---|---|
expire_sessions | Set this to '1' if you want to end all of the user's Canvas web sessions. Without this argument, the endpoint will leave web sessions intact. Additionally, if the user logged in to Canvas via a delegated authentication provider, and the provider supports Single Log Out functionality, the response will contain a forward_url key. If you are still in control of the user's browsing session, it is recommended to then redirect them to this URL, in order to also log them out from where their session originated. Beware that it is unlikely that control will be returned to your application after this redirect. |
Example responses
{
"forward_url": "https://idp.school.edu/opaque_url"
}
GET login/session_token
GET /login/session_token
Parameters
Parameter | Description |
---|---|
return_to | An optional URL to begin the web session at. Otherwise the user will be sent to the dashboard. |
Example responses
{
"session_url": "https://canvas.instructure.com/opaque_url"
}