|
21 | 21 | <SectionTitle title="Introduction" /> |
22 | 22 |
|
23 | 23 | <p> |
24 | | - In this guide we will explain how to find, get access to and use data from data sources |
25 | | - published on an IOXIO data sharing service. We will be showing the process on the |
| 24 | + In this guide we will explain how to find, get access to and use data sources published on an |
| 25 | + IOXIO data sharing service. We will be showing the process on the |
26 | 26 | <A href="https://sandbox.ioxio-dataspace.com/">IOXIO Sandbox Dataspace</A>, but this guide also |
27 | 27 | works for most parts on for example |
28 | 28 | <A href="https://ioxio.io/">IOXIO.io</A>. |
|
31 | 31 | <SectionTitle title="Prerequisites" /> |
32 | 32 |
|
33 | 33 | <ul> |
34 | | - <li>Knowing what kind of data you want to access/use.</li> |
| 34 | + <li>Knowing what kind of data source you want to access/use.</li> |
35 | 35 | <li> |
36 | 36 | An account and a group on one of the data sharing services, such as |
37 | 37 | <A href="https://sandbox.ioxio-dataspace.com/">IOXIO Sandbox Dataspace</A> or |
38 | 38 | <A href="https://ioxio.io/">IOXIO.io</A>. |
39 | 39 | </li> |
40 | 40 | <li> |
41 | | - To access the data, you need to request access for your group. If you don’t yet know which |
42 | | - data, you can find instructions to identify the source below, but you cannot connect to it |
43 | | - before your group has been granted access. |
| 41 | + To access the data source, you need to request access for your group. If you don’t yet know |
| 42 | + which data source, you can find instructions to identify the source below, but you cannot |
| 43 | + connect to it before your group has been granted access. |
44 | 44 | </li> |
45 | 45 | </ul> |
46 | 46 |
|
47 | 47 | <SectionTitle title="Finding a data source" /> |
48 | 48 |
|
49 | 49 | <p> |
50 | | - The first step is to find a data source providing the kind of data you want to use. You can |
51 | | - browse all available data sources by going to the <em>Data sources</em> |
52 | | - section in the menu. |
| 50 | + The first step is to find a data source you want to use. You can browse all available data |
| 51 | + sources by going to the <em>Data sources</em> section in the menu. |
53 | 52 | </p> |
54 | 53 |
|
55 | 54 | <GuideImage img={images.MENU_DATA_SOURCES} compact /> |
56 | 55 |
|
57 | 56 | <p> |
58 | | - Search for the data relevant to you, e.g. using search words, or tags. In this example we’ve |
59 | | - searched for data related to <em>weather</em> and will be using a source for the |
| 57 | + Search for the data sources relevant to you, e.g. using search words, or tags. In this example |
| 58 | + we’ve searched for data related to <em>weather</em> and will be using a source for the |
60 | 59 | <em>Meteorology/Weather</em> definition. |
61 | 60 | </p> |
62 | 61 |
|
|
139 | 138 | <li> |
140 | 139 | <p> |
141 | 140 | API tokens: API tokens are short-lived, typically valid for an hour from being generated, |
142 | | - and used in the requests to fetch data products from a data source. They are validated by |
143 | | - the IOXIO data sharing service (when the <em>Dataspace verified API tokens</em> option is used |
144 | | - for the data source) and optionally validated by the data source. |
| 141 | + and used in the requests to a data source. They are validated by the IOXIO data sharing |
| 142 | + service (when the <em>Dataspace verified API tokens</em> option is used for the data source) |
| 143 | + and optionally validated by the data source. |
145 | 144 | </p> |
146 | 145 | <p> |
147 | | - These can be treated as opaque strings for the practical matters of the group requesting |
148 | | - data. Technically they are actually JWTs signed by the data sharing service. They prove that |
149 | | - the holder of the token, for a limited time, has the right to request data from a particular |
150 | | - source on behalf of a the group that generated them. These tokens can not be invalidated or |
151 | | - revoked but automatically expire in a short time. |
| 146 | + These can be treated as opaque strings for the practical matters of the group making the |
| 147 | + request. Technically they are actually JWTs signed by the data sharing service. They prove |
| 148 | + that the holder of the token, for a limited time, has the right to make requests to a |
| 149 | + particular source on behalf of a the group that generated them. These tokens can not be |
| 150 | + invalidated or revoked but automatically expire in a short time. |
152 | 151 | </p> |
153 | 152 | <p> |
154 | 153 | They are forwarded by the IOXIO data sharing service to the data source so that it can (if |
155 | 154 | it wants to) verify that the request came from the IOXIO data sharing service. The data |
156 | | - source can also verify which group is requesting data and might also implement its own |
| 155 | + source can also verify which group is making the request and might also implement its own |
157 | 156 | access control to restrict access based on that. |
158 | 157 | </p> |
159 | 158 | <p> |
160 | 159 | API tokens should also be kept safe and only used in server-to-server connections as they |
161 | | - can be used to request any data on behalf of the requesting group from the data source. |
| 160 | + can be used to make any requests on behalf of the group to the data source. |
162 | 161 | </p> |
163 | 162 | </li> |
164 | 163 | </ul> |
|
238 | 237 | </p> |
239 | 238 |
|
240 | 239 | <p> |
241 | | - To make it easier to test fetching data, the access control keys page also has a |
| 240 | + To make it easier to make test requests the access control keys page also has a |
242 | 241 | <em>Generate API token</em> button, that will use one of your access control keys to generate a fresh |
243 | 242 | API token that you can easily copy & paste. |
244 | 243 | </p> |
245 | 244 |
|
246 | 245 | <GuideImage img={images.GENERATED_API_TOKEN} /> |
247 | 246 |
|
248 | | - <SectionTitle title="Requesting data" /> |
| 247 | + <SectionTitle title="Making requests" /> |
249 | 248 |
|
250 | 249 | <p>The details page of the access control keys tell you the main parts of making the request:</p> |
251 | 250 |
|
|
306 | 305 |
|
307 | 306 | <GuideImage img={images.SWAGGER_UI_REQUEST_RESPONSE} /> |
308 | 307 |
|
309 | | - <p>You should now have successfully requested data from the data source, congratulations!</p> |
| 308 | + <p>You should now have made a successful request to the data source, congratulations!</p> |
310 | 309 |
|
311 | 310 | <p> |
312 | 311 | Below the response you will also find documentation of all the possible responses, incl. errors, |
|
324 | 323 | </p> |
325 | 324 |
|
326 | 325 | <p> |
327 | | - You should also know how to check the details of the definitions to understand what data you |
328 | | - need to send and the structure and meaning of the data you are receiving. |
| 326 | + You should also know how to check the details of the definitions to understand the format of the |
| 327 | + request and response, as well as the descriptions and meaning of each field in them. |
329 | 328 | </p> |
330 | 329 |
|
331 | 330 | <SectionTitle title="Next steps" /> |
|
0 commit comments