Connected Apps
Learn how to manage third-party applications that integrate with Optare via OAuth.
What are Connected Apps?
Connected Apps are third-party applications that you've authorized to access your Optare account data. This uses OAuth 2.0 for secure, permission-based access.
Viewing Connected Apps
- Go to OAuth Clients or Connected Apps from sidebar
- See all applications with access to your account
App Information
For each connected app, you'll see:
- App name and description
- Permissions granted
- Last accessed date
- Connection date
- Status (Connected/Disconnected)
Connecting a New App
From the App
- On the third-party app, click "Login with Optare" or "Connect to Optare"
- You'll be redirected to Optare
- Log in if not already logged in
- Review the permissions the app is requesting
Permissions Screen
The authorization screen shows:
- App name and logo
- Developer/publisher
- Requested permissions:
- Email access
- Profile information
- Product access
- Organization data
Grant Access
- Review what the app can access
- Click "Authorize" to grant access
- Or click "Deny" to reject
- You'll be redirected back to the app
After Authorization
- App appears in your Connected Apps list
- App receives an access token
- App can now access your permitted data
Managing App Permissions
Viewing Permissions
- Go to Connected Apps
- Click on an app name
- See detailed permissions:
- Email access - Can read your email address
- Profile access - Can read your name and picture
- Product scopes - Can access specific products
- Organization access - Can read org details
You Cannot Modify Permissions
Once granted, permissions cannot be partially revoked. You must:
- Disconnect the app entirely, OR
- Contact the app developer to reduce requested scopes, OR
- Reconnect with new permissions
Revoking Access
Why Revoke?
- No longer using the app
- Security concern
- App requesting too much access
- Testing/development purposes
How to Revoke
- Go to Connected Apps
- Find the app in the list
- Click "Revoke Access" or the disconnect button
- Confirm the action
What Happens When You Revoke
- ❌ App can no longer access your data
- ❌ App's access tokens become invalid immediately
- ✅ Your data remains intact
- ✅ App can be reconnected later if needed
Note: Revoking doesn't delete data the app already has. Contact the app provider to delete their copy.
Creating Your Own OAuth Clients
If you're a developer building integrations:
- Go to OAuth Clients → Create New Client
- Follow the multi-step wizard:
Step 1: Basic Information
- Client name
- Description (optional)
- Client logo (optional)
Step 2: Redirect URIs
- Add callback URLs where users return after authorization
- Example:
https://yourapp.com/auth/callback - Can add multiple URIs
Step 3: Allowed Origins (CORS)
- Add domains that can make requests
- Example:
https://yourapp.com
Step 4: Allowed Scopes
- Select what your app can request:
openid- Basic authenticationemail- Email addressprofile- Name and picture- Product scopes - Access to specific products
Step 5: Save Credentials
- Client ID - Public identifier
- Client Secret - Private key (keep secure!)
Critical: Store your Client Secret securely. Never share it or commit it to version control!
OAuth Client Management
Editing a Client
- Go to OAuth Clients
- Find your client
- Click "Edit"
- Update settings
- Save changes
Regenerating Secret
If your secret is compromised:
- Click "Regenerate Secret"
- Get new secret
- Update your application immediately
- Old secret stops working instantly
Disabling a Client
Temporarily disable without deleting:
- Toggle the enable/disable switch
- When disabled, all authorization requests fail
- Existing tokens remain valid
- Re-enable anytime
Deleting a Client
Permanently remove:
- Click "Delete"
- Confirm deletion
- All issued tokens are revoked
- Cannot be undone
Security Best Practices
For Users
- Review permissions - Only authorize apps you trust
- Audit regularly - Review connected apps monthly
- Revoke unused apps - Reduce your attack surface
- Check last accessed - Disconnect dormant apps
For Developers
- Request minimum scopes - Only ask for what you need
- Secure client secret - Never expose publicly
- Use HTTPS - All redirect URIs must use HTTPS
- Rotate secrets - Periodically regenerate
- Handle revocation - App should handle 401 errors gracefully
Troubleshooting
App not working after connecting?
- Check if app has necessary permissions
- Try disconnecting and reconnecting
- Verify app is using correct scopes
- Contact app support
Can't authorize an app?
- Check redirect URI is correctly configured
- Verify app is not disabled
- Clear browser cache/cookies
- Try different browser
"Invalid client" error?
- Client ID may be incorrect
- Client may be disabled or deleted
- Contact app developer
Want to change permissions?
- Must revoke and reconnect
- Alternative: App developer updates requested scopes
Next Steps
- Manage API Keys - Programmatic access
- Configure Webhooks - Event notifications
- Security Settings - Enable 2FA