-
Notifications
You must be signed in to change notification settings - Fork 184
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Personal token for API access in third-party tools #7711
Comments
Sounds like … |
Please take into account that from a security POV we cannot use static tokens which have a global scope. That would give outside systems full control over your account and data. I think we need an auth service which manages user created tokens which are scoped, like having only read access, write access to only one endpoint or only one space and so on. that would need a graph Api implementation and a web app to create and destroy these tokens. |
@micbar yes, I agree. I would start with the following "spec":
Advanced features:
@DeepDiver1975 would the "start-spec" be sufficient for migration? |
For the migration scenario we need a way to impersonate a user without interaction of the user or the administrator. The intent is to create a service account which can impersonate any user up on request. |
Ok, so for migration we need more... but the small spec above stays relevant for normal App Tokens. |
For use cases like caldav and carddav - yes 👍 |
This issue has been automatically marked as stale because it has not had recent activity. It will be closed in 10 days if no further activity occurs. Thank you for your contributions. |
Description
User Stories
As a system integrator I want to combine oCIS with other software components. In order to do that I would like to create a tool that acts as a bridge and uses the Libre Graph API to interface with oCIS. This backend tool needs to authenticate with the API in some way.
Therefore I need a way to create a persistent access token that can be used for API authentication as current auth flows are either only targeted at frontend clients (OIDC) or not recommended for production use (basic auth).
Value
Acceptance Criteria
Definition of ready
Definition of done
The text was updated successfully, but these errors were encountered: