Restrict access to /sparql

@kidehen

i could make this work as well… for others to replay, i did the following with my domain https://gd.turnguard.com:8891

  1. go to https://gd.turnguard.com:8891/oauth/applications.vsp
    1.1. “Create New Application”
    1.2. “Link” => https://gd.turnguard.com:8891
    1.3. “Callback URLs” => https://gd.turnguard.com:8891/val/api/thirdparty_callback
    1.4. “Create Application” (note: hit “View/Edit” to copy Application Key & Application Secret)
  2. go to https://gd.turnguard.com:8891/oauth/admin.vsp
    2.1. “Add API Key”
    2.2. “Service Name” => This Virtuoso
    2.3. “Authentication URL” => https://gd.turnguard.com:8891/OAuth2/authorize
    2.4. “Token URL” => https://gd.turnguard.com:8891/OAuth2/token
    2.5. “User Info URL” => https://gd.turnguard.com:8891/OAuth2/userinfo
    2.6. “OAuth Token Key” => ${Application Key} (see 1.4)
    2.7. “OAuth Secret” => ${Application Secret} (see 1.4)
  3. Verification
    3.1. go to https://gd.turnguard.com:8891/sparql
    3.2. choose the “Virtuoso” icon under “More” button (alt: “Authenticate via This Virtuoso”)
    3.3. redirected to: https://gd.turnguard.com:8891/oauth/authorize2 (note: Link on login screen changed to “Authenticate to access: This Virtuoso Instance”
    3.4. choose the “Twitter” icon under “More” button (note: i have the ACL for my twitter account already in place, @kidehen, you should be able to do the same with your twitter account, your google (or linkedin, github,…) account will get an access denied in the end)
    3.5. hit the “Authorize app” button on api.twitter.com/oauth
    3.6. i’m redirected back to virtuoso’s authorization dialog at https://gd.turnguard.com:8891/oauth/authorize2.vsp, hit the “Authorize” button
    3.7. voila: i’m logged in and can access the endpoint

(note: there is a message: Failed to fetch service ID from service "thisvirtuoso"., this however can be ignored, the endpoint also presents a link to my twitter account next to “Logged in as…”

lovely! :slight_smile: