This page applies to Apigee and Apigee hybrid.
View Apigee Edge documentation.
What
Deletes the specified OAuth V2 authorization code or access token.
This policy is an Extensible policy and use of this policy might have cost or utilization implications, depending on your Apigee license. For information on policy types and usage implications, see Policy types.
Samples
Delete Access Token
Below is an example policy used to delete an OAuth 2.0 access token. The example below locates
the access token to delete on the request message by looking for a header called
access_token
.
<DeleteOAuthV2Info name="DeleteAccessToken"> <AccessToken ref="request.header.access_token"></AccessToken> </DeleteOAuthV2Info>
Delete Auth Code
Below is an example policy used to delete an OAuth 2.0 authorization code. The example below
locates the auth code to delete on the request message by looking for a query parameter called
code
.
<DeleteOAuthV2Info name="DeleteAuthCode"> <AuthorizationCode ref="request.queryparam.code"></AuthorizationCode> </DeleteOAuthV2Info>
Element Reference
The element reference describes the elements and attributes of the DeleteOAuthV2Info policy.
<?xml version="1.0" encoding="UTF-8" standalone="yes"?> <DeleteOAuthV2Info async="false" continueOnError="false" enabled="true" name="DeleteOAuthV2Info-1"> <DisplayName>Delete OAuth v2.0 Info 1</DisplayName> <AccessToken ref={some-variable}></AccessToken> <!--<AuthorizationCode ref={some-variable}></AuthorizationCode>--> <Attributes/> </DeleteOAuthV2Info
<DeleteOAuthV2Info> attributes
<DeleteOAuthV2Info async="false" continueOnError="false" enabled="true" name="Delete-OAuth-v20-Info-1">
Attribute | Description | Default | Presence |
---|---|---|---|
async |
Set to This setting is only used for internal optimization. |
false | Optional |
continueOnError |
Most policies are expected to return an error when a failure occurs. By setting this
attribute to |
false | Optional |
enabled | Determines whether a policy is enforced or not. If set to false , a
policy is 'turned off', and not enforced (even though the policy remains attached to a
Flow). |
true | Optional |
name |
The internal name of the policy. This name is referenced in Step elements to attach the policy to a Flow. Note: Characters you can use in the name are restricted to:
|
N/A | Required |
<AccessToken> element
Identifies the variable where the access token to delete is located. For example, if the
access token is attached to request message as a query parameter called "access_token", specify
request.queryparam.access_token
. You can use any valid variable that references the
token. Or, could pass in the literal token string (rare case).
<AccessToken ref="request.queryparam.access_token"></AccessToken>
Default: | N/A |
Presence: | Either <AccessToken> or <AuthorizationCode> is
required. |
Type: | String |
Attributes
Attribute | Description | Default | Presence |
---|---|---|---|
ref |
An access token variable. Typically, retrieved from a flow variable. For
example: |
N/A | Optional |
<AuthorizationCode> element
Identifies the variable where the authorization code to delete is located. For example, if the
auth code is attached to request message as a query parameter called "code", specify
request.queryparam.code
. You can use any valid variable that references the token.
Or, could pass in the literal token string (rare case).
<AuthorizationCode ref="request.queryparam.code"></AuthorizationCode>
Default: | N/A |
Presence: | Either <AccessToken> or <AuthorizationCode> is
required. |
Type: | String |
Attributes
Attribute | Description | Default | Presence |
---|---|---|---|
ref |
An access token variable. Typically, retrieved from a flow variable. For
example: |
N/A | Optional |
<DisplayName> element
A natural-language name that labels the policy in the Apigee UI proxy editor. If omitted, the policy name attribute is used.
<DisplayName>DeleteOAuthV2Info 1</DisplayName>
Default: | The value of the policy's name attribute. |
Presence: | Optional |
Type: | String |
Error reference
This section describes the fault codes and error messages that are returned and fault variables that are set by Apigee when this policy triggers an error. This information is important to know if you are developing fault rules to handle faults. To learn more, see What you need to know about policy errors and Handling faults.
Runtime errors
These errors can occur when the policy executes.
Fault code | HTTP status | Cause |
---|---|---|
steps.oauth.v2.invalid_access_token |
401 |
The access token sent to the policy is invalid. |
steps.oauth.v2.invalid_request-authorization_code_invalid |
401 |
The authorization code sent to the policy is invalid. |
steps.oauth.v2.InvalidAPICallAsNoApiProductMatchFound |
401 |
Please see Oauth2.0 Access Token Verification throws "Invalid API call as no apiproduct match found" error for information about troubleshooting this error. |
Deployment errors
Refer to the message reported in the UI for information about deployment errors.
Fault variables
These variables are set when this policy triggers an error at runtime.
Variables | Where | Example |
---|---|---|
fault.name="fault_name" |
fault_name is the name of the fault, as listed in the Runtime errors table above. The fault name is the last part of the fault code. | fault.name = "invalid_access_token" |
oauthV2.policy_name.failed |
policy_name is the user-specified name of the policy that threw the fault. | oauthV2.DeleteTokenInfo.failed = true |
oauthV2.policy_name.fault.name |
policy_name is the user-specified name of the policy that threw the fault. | oauthV2.DeleteTokenInfo.fault.name = invalid_access_token |
oauthv2.policy_name.fault.cause |
policy_name is the user-specified name of the policy that threw the fault. | oauthV2.DeleteTokenInfo.cause = Invalid Access Token |
Example error response
{ "fault": { "faultstring": "Invalid Access Token", "detail": { "errorcode": "keymanagement.service.invalid_access_token" } } }
Example fault rule
<faultrule name="VariableOfNonMsgType"></faultrule><FaultRule name="DeleteOAuthV2Info_Faults"> <Step> <Name>AM-InvalidTokenResponse</Name> </Step> <Condition>(fault.name = "invalid_access_token")</Condition> </FaultRule>
Schema
Each policy type is defined by an XML schema (.xsd
). For reference, policy schemas
are available on GitHub.