OAuth API V2 integration provides a safe way to retrieve stored authorizations.
When you are building an application that communicates with a 3rd party API and that API authorizes using OAuth, Keboola Connection (KBC) stores the users’ credentials/access tokens in OAuth API V2. They are revealed and decrypted only for a target component and project. End-users can be assured that their authorized access will not leak.
This feature is available only for registered extensions.
Create a configuration for the given component and project in OAuth API V2.
OAUTH_API_ID is the id provided when storing authorization via OAuth API V2.
Docker Runner then retrieves, decrypts and injects the credentials to the
configuration file in the
authorization.oauth_api.credentials.#data configuration node stores the response from
the authorized API as a raw string. Parse the string accordingly, as OAuth API V2 has intentionally
no knowledge about the authorized APIs.
Important: None of the sandbox API calls
If you want to bypass OAuth API V2 integration, you can paste all required credential parameters in the configuration directly. Fields requiring encryption will be encrypted and decrypted as usual. That means, that you can save the following configuration.
This comes in very handy for quick Generic extractor iterations.