Use SODA for REST with OAuth Client Credentials
You can access SODA for REST on Autonomous AI Database using OAuth authentication. Depending on your application, accessing SODA for REST with OAuth authentication can improve performance and security.
Perform the following steps to use OAuth authentication to provide limited access to SODA for REST on Autonomous AI Database:
- As the ADMIN user, access Database Actions and create a user
                                        with the required privileges.- Access Database Actions as ADMIN.See Access Database Actions as ADMIN for more information.
- In Database Actions, click  to show the available actions. to show the available actions.
- In Database Actions, under Administration select Database Users.
- Click Create User.
- In the Create User area, on the User tab enter User Name and a Password and confirm the password.
- Select Web Access.
- In the Create User area,
                                                  select the Granted Roles
                                                  tab and grant DWROLEto the user.
- Click Create User.
 See Manage Users and User Roles on Autonomous Database - Connecting with Database Actions in Using Oracle Autonomous AI Database Serverless for more information. 
- Access Database Actions as ADMIN.
- Use a SQL worksheet in Database Actions to grant user
                                        privileges required to load data.- Access Database Actions as ADMIN.See Access Database Actions as ADMIN for more information.
- In Database Actions, click  to show the available actions. to show the available actions.
- In Database Actions, under Development click SQL to open a SQL worksheet.
- Grant user privileges required to load data to
                                                  the user from Step 1.GRANT UNLIMITED TABLESPACE TO user_name;
 See Manage User Privileges on Autonomous Database - Connecting with a Client Tool for more information. 
- Access Database Actions as ADMIN.
- Sign out as the ADMIN user.
- Sign in to Database Actions as the user that is setting up to use OAuth authentication.
- In Database Actions, use a SQL worksheet to register the OAuth
                                        client.- Register the OAuth client.For example, enter the following commands into the SQL worksheet, where you supply the appropriate values for your user and your client application.BEGIN OAUTH.create_client( p_name => 'my_client', p_grant_type => 'client_credentials', p_owner => 'Example Company', p_description => 'A client for my SODA REST resources', p_support_email => 'user_name@example.com', p_privilege_names => 'my_priv' ); OAUTH.grant_client_role( p_client_name => 'my_client', p_role_name => 'SQL Developer' ); OAUTH.grant_client_role( p_client_name => 'my_client', p_role_name => 'SODA Developer' ); COMMIT; END; /
- In the SQL worksheet, click Run Script to run the command.
 See OAUTH PL/SQL Package Reference for more information. This registers a client named my_clientto access themy_privprivilege using OAuth client credentials.
- Register the OAuth client.
- Obtain the client_idandclient_secretrequired to generate the access token.For example, in the SQL worksheet run the following command:SELECT id, name, client_id, client_secret FROM user_ords_clients;
- Obtain the access token. To get an access token you send a
                                                REST GETrequest todatabase_ORDS_urluser_name/oauth/token.The database_ORDS_urlis available from Database Actions, under Related Services, on the RESTful Services and Soda card. See Access RESTful Services and SODA for REST for more information.In the following command, use the The following example uses theclient_idand theclient_secretyou obtained in Step 6.cURLcommand line tool (http://curl.haxx.se/) to submit REST requests to Autonomous AI Database. However, other 3rd party REST clients and libraries should work as well.You can use the cURLcommand line tool to submit theREST GETrequest. For example:> curl -i -k --user SBA-iO9Xe12cdZHYfryBGQ..:vvUQ1AagTqAqdA2oN7afSg.. --data "grant_type=client_credentials"https://mqssyowmqvgac1y-doc.adb.region.oraclecloudapps.com/ords/user_name/oauth/token HTTP/1.1 200 OK Date: Mon, 22 Jun 2020 15:17:11 GMT Content-Type: application/jsonTransfer-Encoding: chunked Connection: keep-alive X-Frame-Options: SAMEORIGIN {"access_token":"JbOKtAuDgEh2DXx0QhvPGg","token_type":"bearer","expires_in":3600}To specify both the client_idand theclient_secretwith the curl--userargument, enter a colon to separate theclient_idand theclient_secret. If you only specify the user name,client_id, curl prompts for a password and you can enter theclient_secretat the prompt.
- Use the access token to access the protected resource.The token obtained in the previous step is passed in the Authorization header. For example: > curl -i -H "Authorization: Bearer JbOKtAuDgEh2DXx0QhvPGg" -X GET https://database_id.adb.region.oraclecloudapps.com/ords/user_name/soda/latest HTTP/1.1 200 OK Date: Mon, 22 Jun 2020 15:20:58 GMT Content-Type: application/json Content-Length: 28 Connection: keep-alive X-Frame-Options: SAMEORIGIN Cache-Control: private,must-revalidate,max-age=0 {"items":[],"hasMore":false}
See Configuring Secure Access to RESTful Services for complete information on secure access to RESTful Services.