OAuth 2.0
-
- UpdatedAug 1, 2024
- 3 minutes to read
- Xanadu
- Platform Security
OAuth 2.0 lets users access instance resources through external clients by obtaining a token rather than by entering login credentials with each resource request.
You must have the security_admin role to manage the OAuth integration. Configure OAuth 2.0 for the following scenarios:
- OAuth external client scenario (Inbound): Your instance provides an endpoint for third-party clients to pull data from the instance.
- OAuth provider scenario (Outbound): Your instance pulls data from a third-party provider.
Both, simple security and high security frameworks support OAuth 2.0. High Security is recommended. See for information about which versions have high security already active and how to activate high security.
Key concepts of the OAuth 2.0 implementation
OAuth grant types
- Authorization code: The consumer first gets an authorization code and then uses it to get an access token. You can Specify an OAuth profile and specify this grant type. The process that uses the authorization code is also referred to as auth code flow or authorization code flow.
- Resource owner password credentials: The consumer of the resource already has the user credentials to get the access token. This process is also referred to as password flow.
- Client credentials: The consumer of the resource uses the client ID and client secret that is already configured in the application registry.
Storage of authentication credentials
The OAuth client secret is stored as a password2 type field, which is encrypted with KMF. User passwords, which are used to check incoming endpoint requests, are stored as a hash value in the User table in a password type field (SHA 256). For details on this encryption, see Password2 encryption with KMF