Chilkat Examples

ChilkatHOMEAndroid™Classic ASPCC++C#Mono C#.NET Core C#C# UWP/WinRTDataFlexDelphi ActiveXDelphi DLLVisual FoxProJavaLianjaMFCObjective-CPerlPHP ActiveXPHP ExtensionPowerBuilderPowerShellPureBasicCkPythonChilkat2-PythonRubySQL ServerSwift 2Swift 3,4,5...TclUnicode CUnicode C++Visual Basic 6.0VB.NETVB.NET UWP/WinRTVBScriptXojo PluginNode.jsExcelGo

Unicode C Web API Examples

Primary Categories

ABN AMRO
AWS Translate
Activix CRM
Adyen
Amazon MWS
Aruba Fatturazione
Azure Maps
Azure Monitor
Azure OAuth2
Azure Storage Accounts
Bitfinex v2 REST
Bluzone
CardConnect
ClickBank
Clickatell
Cloudfare
DocuSign
ETrade
Etsy
Facebook
GeoOp
GetHarvest
Global Payments
Google People
Google Search Console
Hungary NAV Invoicing
IBM Text to Speech
Jira
MYOB
Magento

MercadoLibre
Microsoft Calendar
Microsoft Group
Microsoft Tasks and Plans
Okta OAuth/OIDC
OneLogin OIDC
PayPal
Peoplevox
Populi
QuickBooks
Rabobank
SOAP finkok.com
Shippo
Shopify
SimpleTexting
Square
Stripe
SugarCRM
Trello
Twilio
Twitter
VoiceBase
Vonage
Walmart
Walmart v3
WhatsApp
WooCommerce
Xero
Yousign
_Miscellaneous_
eBay
effectconnect

 

 

 

(Unicode C) Docusign Request Impersonation Consent

Demonstrates how to obtain impersonation consent from a Docusign individual user. This is one way of getting consent prior to using the JWT (JSON Web Token) grant flow to obtain access tokens. See the Docusign documentation for Obtaining Consent and JSON Web Token (JWT) Grant for more information.

Important: This example requires that you add a line of code (or a few lines of code) to launch a web browser that navigates to the URL returned by the StartAuth method.

For more information, see https://developers.docusign.com/esign-rest-api/guides/authentication/oauth2-jsonwebtoken

Chilkat C/C++ Library Downloads

MS Visual C/C++

Linux/CentOS C/C++

Alpine Linux C/C++

MAC OS X C/C++

armhf/aarch64 C/C++

C++ Builder

iOS C/C++

Android C/C++

Win Mobile 5.0/Pocket PC 2003

Solaris C/C++

FreeBSD C/C++

OpenBSD C/C++

MinGW C/C++

#include <C_CkOAuth2W.h>
#include <C_CkJsonObjectW.h>
#include <C_CkFileAccessW.h>

void ChilkatSample(void)
    {
    HCkOAuth2W oauth2;
    BOOL success;
    const wchar_t *url;
    int numMsWaited;
    HCkJsonObjectW json;
    HCkFileAccessW fac;

    // This example requires the Chilkat API to have been previously unlocked.
    // See Global Unlock Sample for sample code.

    oauth2 = CkOAuth2W_Create();

    // This should be the port in the localhost Redirect URI for your app defined in the Docusign developer portal.  
    // The Redirect URI would look like "http://localhost:3017/" if the port number is 3017.
    CkOAuth2W_putListenPort(oauth2,3017);

    // For the developer sandbox environment, the authorization endpoint is https://account-d.docusign.com/oauth/auth
    // For the production platform, the authorization endpoint is https://account.docusign.com/oauth/auth
    CkOAuth2W_putAuthorizationEndpoint(oauth2,L"https://account-d.docusign.com/oauth/auth");
    CkOAuth2W_putTokenEndpoint(oauth2,L"https://account-d.docusign.com/oauth/token");

    // Replace these with actual values.
    // The client ID is also known as the "integration key" in Docusign.
    CkOAuth2W_putClientId(oauth2,L"MY_DOCUSIGN_CLIENT_ID");
    // This is your secret key for the authorization code grant.
    CkOAuth2W_putClientSecret(oauth2,L"MY_DOCUSIGN_CLIENT_SECRET");

    CkOAuth2W_putScope(oauth2,L"signature impersonation");

    // Begin the OAuth2 three-legged flow.  This returns a URL that should be loaded in a browser.
    url = CkOAuth2W_startAuth(oauth2);
    if (CkOAuth2W_getLastMethodSuccess(oauth2) != TRUE) {
        wprintf(L"%s\n",CkOAuth2W_lastErrorText(oauth2));
        CkOAuth2W_Dispose(oauth2);
        return;
    }

    // At this point, your application should load the URL in a browser.
    // For example, 
    // in C#: System.Diagnostics.Process.Start(url);
    // in Java: Desktop.getDesktop().browse(new URI(url));
    // in VBScript: Set wsh=WScript.CreateObject("WScript.Shell")
    //              wsh.Run url
    // in Xojo: ShowURL(url)  (see http://docs.xojo.com/index.php/ShowURL)
    // in Dataflex: Runprogram Background "c:\Program Files\Internet Explorer\iexplore.exe" sUrl        
    // The Microsoft account owner would interactively accept or deny the authorization request.

    // Add the code to load the url in a web browser here...
    // Add the code to load the url in a web browser here...
    // Add the code to load the url in a web browser here...

    // Now wait for the authorization.
    // We'll wait for a max of 30 seconds.
    numMsWaited = 0;
    while ((numMsWaited < 30000) && (CkOAuth2W_getAuthFlowState(oauth2) < 3)) {
        CkOAuth2W_SleepMs(oauth2,100);
        numMsWaited = numMsWaited + 100;
    }

    // If there was no response from the browser within 30 seconds, then 
    // the AuthFlowState will be equal to 1 or 2.
    // 1: Waiting for Redirect. The OAuth2 background thread is waiting to receive the redirect HTTP request from the browser.
    // 2: Waiting for Final Response. The OAuth2 background thread is waiting for the final access token response.
    // In that case, cancel the background task started in the call to StartAuth.
    if (CkOAuth2W_getAuthFlowState(oauth2) < 3) {
        CkOAuth2W_Cancel(oauth2);
        wprintf(L"No response from the browser!\n");
        CkOAuth2W_Dispose(oauth2);
        return;
    }

    // Check the AuthFlowState to see if authorization was granted, denied, or if some error occurred
    // The possible AuthFlowState values are:
    // 3: Completed with Success. The OAuth2 flow has completed, the background thread exited, and the successful JSON response is available in AccessTokenResponse property.
    // 4: Completed with Access Denied. The OAuth2 flow has completed, the background thread exited, and the error JSON is available in AccessTokenResponse property.
    // 5: Failed Prior to Completion. The OAuth2 flow failed to complete, the background thread exited, and the error information is available in the FailureInfo property.
    if (CkOAuth2W_getAuthFlowState(oauth2) == 5) {
        wprintf(L"OAuth2 failed to complete.\n");
        wprintf(L"%s\n",CkOAuth2W_failureInfo(oauth2));
        CkOAuth2W_Dispose(oauth2);
        return;
    }

    if (CkOAuth2W_getAuthFlowState(oauth2) == 4) {
        wprintf(L"OAuth2 authorization was denied.\n");
        wprintf(L"%s\n",CkOAuth2W_accessTokenResponse(oauth2));
        CkOAuth2W_Dispose(oauth2);
        return;
    }

    if (CkOAuth2W_getAuthFlowState(oauth2) != 3) {
        wprintf(L"Unexpected AuthFlowState:%d\n",CkOAuth2W_getAuthFlowState(oauth2));
        CkOAuth2W_Dispose(oauth2);
        return;
    }

    wprintf(L"OAuth2 authorization granted!\n");
    wprintf(L"Access Token = %s\n",CkOAuth2W_accessToken(oauth2));

    // Get the full JSON response:
    json = CkJsonObjectW_Create();
    CkJsonObjectW_Load(json,CkOAuth2W_accessTokenResponse(oauth2));
    CkJsonObjectW_putEmitCompact(json,FALSE);
    wprintf(L"%s\n",CkJsonObjectW_emit(json));

    // The JSON response looks like this:

    // Note: It doesn't seem like the access_token obtained here is actually used.
    // My guess is that the act of getting this access token persists the knowledge that the
    // DocuSign user account has granted access to the application.  The application only needs
    // to send a valid JWT to prove it's identity and get an access token (JSON Web Token Grant (JWT))
    // {
    //   "access_token": "eyJ0eXA....YQyig",
    //   "token_type": "Bearer",
    //   "refresh_token": "eyJ0eXA....auE3eHKg",
    //   "expires_in": 28800
    // }

    // Save the JSON to a file for future requests.
    fac = CkFileAccessW_Create();
    CkFileAccessW_WriteEntireTextFile(fac,L"qa_data/tokens/docusignImpersonation.json",CkJsonObjectW_emit(json),L"utf-8",FALSE);


    CkOAuth2W_Dispose(oauth2);
    CkJsonObjectW_Dispose(json);
    CkFileAccessW_Dispose(fac);

    }

 

© 2000-2020 Chilkat Software, Inc. All Rights Reserved.