OAuth 2.0 Provider data instances

The following tabs are available on this form:

OAuth is a standard framework that enables secure, delegated access to services via HTTPS. OAuth 2.0 is the next evolution of the OAuth protocol. There are several grant types in the OAuth 2.0 specification.

Your Pega Platform application can act as an OAuth 2.0 client (consumer) to access protected resources that are stored in external websites such as Twitter and Facebook. The Pega Platform supports the client credentials and authorization code grant types.

With the client credentials grant type, you obtain client credentials from the external application that you want to connect to. These credentials are then used to generate an access token that allows you to access protected resources in the external application for a defined period of time. This grant type is used when the OAuth 2.0 consumer is an application and not an individual operator or user. For example, your Pega Platform application can connect to Twitter to obtain a collection of tweets.

With the authorization code grant type, your application submits an authorization code request to the external application that you want to connect to. The authorization server of the external application validates the credentials in the request, and then authenticates you via your user credentials to produce an authorization code. You can use the code to generate an access token, which allows access to your protected resources on the external application. This grant type is used when your application does not have a trusted relationship with the API provider. For example, you can connect to Facebook from your Pega Platform application to access your photos.

With the password credentials grant type, your application exchanges your user credentials for an access token. This grant type is used when your application does have a trusted relationship with the API provider or when other authorization grants are not supported.

Create an OAuth 2.0 Provider data instance as a part of the process to allow your application to securely access web service APIs. Each external application handles the OAuth 2.0 protocol in its own way. Consult the API guide for the application that you want to work with.

Where referenced

OAuth 2.0 Provider data instances are referenced on the OAuth 2.0 tab of Authentication Profile rule forms.

Access

Use the Records Explorer to see all the OAuth 2.0 Provider data instances in your system.

Category

The Data-Admin-Security-OAuth2-Provider class contains OAuth 2.0 Provider data instances. They are part of the Security category.