Access token is a key concept in AgilePoint NX for connecting to external services. The term access token is also used in other technologies, such as OAuth. However, these terms do not mean exactly the same thing. It is helpful to understand the differences if you are familiar with third-party uses of the term access token.
Access Tokens in AgilePoint NX
An access token is a secure object that stores an endpoint (usually a URL) and authentication credentials to connect to a service or technology. Often this is an external or third-party service, like Salesforce or SharePoint, but access tokens can also connect to an AgilePoint NX enviornment, local database, or other types of technologies. Once an access token is created, app designers can simply select and reuse it, rather than entering the credentials each time they are needed.
You can control which application designers can use an access token by configuring it at the global level or app level, or with roles. For more information, refer to Security Settings.
Access tokens are collections of credentials that are used to authenticate communication directly between AgilePoint NX and an external system. Because it is the AgilePoint NX system that uses these credentials, rather than an app, there is no difference between design time and runtime access tokens. Access tokens are never checked in or published, and they do not use version control. If you change an access token in the App Builder or Manage Center, the access token changes immediately everywhere the access token is used. Changes to app level access tokens apply to all versions of an app, including running application instances. Changes to global access tokens apply everywhere they are used in AgilePoint NX. You can not roll back an access token to a previous version.
Access Tokens in OAuth
In OAuth, an access token is a string that identifies a secure connection between one endpoint and another. Unlike access tokens in AgilePoint NX, an OAuth access token does not include authentication credentials.
Related Topics
Examples
- (Example) Use Anonymous Authentication in a Form-Based App
- (Example) Use Anonymous Authentication in a Process-Based App
- Examples - Step-by-step use case examples, information about what types of examples are provided in the AgilePoint NX Product Documentation, and other resources where you can find more examples.
Video: Configure Access Token for Trial SQL Server Database
Video: Manage Your Organization
About This Page
This page is a navigational feature that can help you find the most important information about this topic from one location. It centralizes access to information about the concept that may be found in different parts of the documentation, provides any videos that may be available for this topic, and facilitates search using synonyms or related terms. Use the links on this page to find the information that is the most relevant to your needs.
Keywords
access token, application token, app token, security token, credentials, authenticate, authentication
Comments
2 comments
test
Thanks for the article.
Please sign in to leave a comment.