OAuth2.0

This authentication method is appropriate for granular access controls. The configuration of this authentication method supports scope based access, which ensures that access is only provided on a needs-to-know basis and without exposing credentials.

After authenticating with the OAuth provider and receiving an Access Token, authentication with the platform is as simple as transmitting the access token through the headers of the request.

Authorization: Bearer <Access Token>

The service will then verify this token, extract the identity of the user, and then proceed to process the request.

Last updated