坛里有朋友搞过阿里巴巴API的授权请求吗
Rt.
http://open.china.alibaba.com/doc/api/cn/sys_auth.htm?ns=cn.alibaba.open
就这这一步,
------------------------------------
....
2) app发起授权请求
http://gw.open.china.alibaba.com/auth/authorize.htm?client_id=xxx&site=cbu&redirect_uri=YOUR_REDIRECT_URL&state=YOUR_PARM&_aop_signature=SIGENATURE
....
-------------------------------------
都搞不通,一直跳到错误页面。真是崩溃。
回复讨论(解决方案)
这个还真没搞过。那位高人指点下,坐等。
OAuth 2.0规范
应该和新浪API差别不大,这不需要专门申请key吗
你的SIGENATURE怎么没值啊
后台接口getToken,你接收到令牌了没
YOUR_REDIRECT_URL这个是回调地址,文档上都有说明吧
有申请到key的。
他是先发起授权请求获得code一个字符串,然后再去getToken获取令牌的。
后面的流程没问题可以测试通过。
现在问题是怎么发起授权请求的问题,按照他们文档那样做老是跳到错误页面。
web服务端和客户端流程大都一致,可参考客户端流程。 唯一不同点在于步骤[2]app发起授权申请的url中,redirect_url应为app的一个url地址,授权临时令牌会以queryString的形式跟在该url后返回。
楼上复制文档.......... = =
我把密钥都贴出来了。
AppKey: 1002774
AppSecret : PwPao1M4fUH
php签名方法
$code_sign = strtoupper(bin2hex(hash_hmac("sha1", $str, $appSecret, true)));
实在搞不鸟。。。请求各位帮忙。
有申请到key的。
他是先发起授权请求获得code一个字符串,然后再去getToken获取令牌的。
后面的流程没问题可以测试通过。
现在问题是怎么发起授权请求的问题,按照他们文档那样做老是跳到错误页面。
什么样的错误页面,是公用的像404一样吗,令牌有效期10个小时,别过期了,如果你完全按要求来,还有问题联系他们客服人员,在这之前,最好先确定,错误提示类型 ,令牌过期了没,引用方法、地址是否正确,参数再申核一遍,官方文档是至高无尚的
错误页面提示
很抱歉,您查找的页面不存在,可能已被删除或转移
有联系他们的。
他们都不确定文档是否正确的,旺旺找他们,他们说联系email,email联系上回复说"...不太懂技术.."。
现在不是令牌问题啊。
第一步发起授权请求都有问题了,这个是授权后取得一个code的。
code取不到,令牌什么的都就不能取的...后面流程什么都操作不了。
卡卡 阿里爸爸这么搞?这个我不清楚 如果是taobao open 我就很熟悉了... open上问问题也很容易解决. 继续悲剧吧...
阿门, 只玩过百度的Oauth2.0,母鸡了。
卡卡 阿里爸爸这么搞?这个我不清楚 如果是taobao open 我就很熟悉了... open上问问题也很容易解决. 继续悲剧吧...
之前也搞过taobao open 啊。就没这这个这么麻烦,同样也是通过url就可以发起授权请求了。
淘宝的开放平台就好些,用的人多。有问题容易解决啊。
阿门, 只玩过百度的Oauth2.0,母鸡了。
哈,正在做这个,也遇到这样的问题了,求解中。。。
楼主调试阿里巴巴API成功没?我现在连一个api调试都没调成功?楼主给个实例罗!
code不需要在程序中获取 它应该是应用市场访问你APP的入口的时候会带一个CODE参数 你获取后只需要使用getToken接口拿应用市场传过来的code换取accessToken

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics



Alipay PHP...

JWT is an open standard based on JSON, used to securely transmit information between parties, mainly for identity authentication and information exchange. 1. JWT consists of three parts: Header, Payload and Signature. 2. The working principle of JWT includes three steps: generating JWT, verifying JWT and parsing Payload. 3. When using JWT for authentication in PHP, JWT can be generated and verified, and user role and permission information can be included in advanced usage. 4. Common errors include signature verification failure, token expiration, and payload oversized. Debugging skills include using debugging tools and logging. 5. Performance optimization and best practices include using appropriate signature algorithms, setting validity periods reasonably,

The application of SOLID principle in PHP development includes: 1. Single responsibility principle (SRP): Each class is responsible for only one function. 2. Open and close principle (OCP): Changes are achieved through extension rather than modification. 3. Lisch's Substitution Principle (LSP): Subclasses can replace base classes without affecting program accuracy. 4. Interface isolation principle (ISP): Use fine-grained interfaces to avoid dependencies and unused methods. 5. Dependency inversion principle (DIP): High and low-level modules rely on abstraction and are implemented through dependency injection.

Article discusses late static binding (LSB) in PHP, introduced in PHP 5.3, allowing runtime resolution of static method calls for more flexible inheritance.Main issue: LSB vs. traditional polymorphism; LSB's practical applications and potential perfo

Sending JSON data using PHP's cURL library In PHP development, it is often necessary to interact with external APIs. One of the common ways is to use cURL library to send POST�...

Article discusses essential security features in frameworks to protect against vulnerabilities, including input validation, authentication, and regular updates.

How to automatically set the permissions of unixsocket after the system restarts. Every time the system restarts, we need to execute the following command to modify the permissions of unixsocket: sudo...

The article discusses adding custom functionality to frameworks, focusing on understanding architecture, identifying extension points, and best practices for integration and debugging.
