CSOneCaseManagementAPI

(0 reviews)

Application Registration

1. Login into the API Portal with the required credentials(CCO ID).

2. Click on "Request API access" in orange color.

3. Click on "New application".

4. In the Add application window, give "Name" field as unique name along with API name.

5. In the Add application window, "Description" & "Application URL" fields are optional.

6. Select "OAuth 2.0 Grant type" as "Client Credentials Grant". (Please go through the security tab to choose your required grant type)

7. Click "Add" button.

8. Next choose "SLA tier" from the dropdown and add it.

9. Go through Terms & Conditions and Accept by clicking the check box.

10. Then finish your application creation by clicking on "Request API access" button.

11. Since the SLA selected by user is "manual" approval SLA limit,instantly the user will get a pop-up
saying "Your request has been received and is pending approval".
Once the request is approved by API owner, user will get a confirmation email.
Client id and client secret can be found in the
respective client application page present in the 'My applications' tab under Developer portal.

#How to make sure your application is created successfully?

You can also see your application details in "Developer Portal", which can be seen on left top corner of the page.

If the application is created successfully, your application name will be present in 'My applications' tab.

By clicking on the application name, you will be directed to see details of the applications like client Id , client Secret, the API that the application is associated, latency, error percentage e.t.c

How to access API with generated client_id and client_secret:


For internal clients: https://apmi.cisco.com/custcare/cm/v1.0/

For external clients: https://apx.cisco.com/custcare/cm/v1.0/

Note: The above URL's are base URL's to which a resource from the API definition needs to be added.

Token generation:


URL = https://cloudsso.cisco.com/as/token.oauth2

Query Parameters:

grant_type = client_credentials

client_id = <-client_id>

client_secret = <-client_secret>

Note:

  • client_id and client_secret values mentioned are for reference purposes. Please use your application specific client_id and client_secret while generating the token
  • Above example shows the query parameters to be used for client_credentials grant, for other types please refer 'Security' section.

Reviews