Skip to content
background-image background-image


OAuth 2.0

Integray allows you to add new authorizations using the OAuth 2.0 protocol, which stands for “Open Authorization”, a standard designed to allow a website or application to access resources hosted by other web apps on behalf of a user. It replaced OAuth 1.0 in 2012 and is now the de facto industry standard for online authorization. OAuth 2.0 provides consented access and restricts actions of what the client app can perform on resources on behalf of the user, without ever sharing the user's credentials.

Benefits of OAuth 2.0

OAuth 2.0 offers several advantages:

  • Enhanced security: Minimizes the risk of exposing credentials by using authorization tokens.

  • User convenience: Allows you to grant and revoke access to applications without sharing passwords.

  • Scalability: Supports a wide range of applications, including web, mobile, and desktop applications.

Authorizations list

The content navigation menu item Authorizations takes you to the Authorization list, which provides a comprehensive overview and management capabilities for each authorization.

In the upper section of the list interface, you will find a user-friendly search field, enabling you to locate specific authorization quickly.

On the right side of the screen, you can see the Show in/active button, which switches between active and inactive authorizations views, and the + Add button, which starts the configuration of a new authorization and opens the editor.


The authorization list view provides you with essential information about the following:

  • Provider: The service provider associated with the authorization.

  • Name: The name given to the authorization.

  • Authorized status: Displays the current status of the authorization, which can be either Not authorized or Authorized.

Additionally, each row in the list includes a Deactivate button, which allows you to deactivate the authorization when necessary.


New Authorization

To add a new authorization, navigate to the Authorization list and start by clicking the +Add button. This action opens a form.


Enter the necessary information for the new authorization. Provide a Name for the authorization and select the service Provider from the dropdown list.

Next, use the +Add button to choose connectors from the list, which is populated based on the selected provider. Once you've chosen the appropriate connectors, click the Authorize button. This action will redirect you to the provider’s login page, where you will enter your credentials to sign in.

During the login process, you must approve the User consent screen, which is a dialog or webpage presented to you by the authorization server. This screen informs you about the specific permissions or Scopes the application requests access to. You must review these permissions and provide their consent to allow the application to access their data within the specified scope.

After successful authentication, the status indicator in the upper left corner of the screen will change from Not authorized to Authorized, confirming the authorization. Finally, click the Save button to store the new authorization.



Scopes are permission settings that dictate what actions the connector is allowed to perform. The Scopes section section lists the specific permissions for the selected authorization. Each scope defines a particular level of access that the connector needs to perform its tasks with the given service. These scopes ensure that the application only has the permissions necessary to complete its functions.

For instance (when using Reservanto connectors):

  • Booking_w: This scope might allow the connector to write booking data.

  • Merchant_r: This scope might grant read access to merchant information.