With our latest release, we enable our customers to connect Relatics to other applications with full support for machine-to-machine communication based on the OAuth 2.0 Client Credentials flow.
In plain human language, this technology enables applications to securely access each other’s resources without any user authentication involved in the process. The identity of the application itself is used, instead of ‘impersonating’ a user, where the identity of a specific user is needed to get access to a protected application. This type of grant is commonly used for server-to-server interactions that run in the background, without immediate interaction with a user.
Today, OAuth 2.0 is the de facto industry standard for online authorization. With this release, the overall security of Relatics is further enhanced and more aligned with industry standards. At that, it offers many new opportunities to set up system interfaces that were previously not feasible.
To learn more about the technical details, read the full article on our Knowledge Base.