OAuth glossary
Describes commonly used authentication and authorization terms.
Note:
By using this API and its documentation and building an integration, you agree to the Additional API Terms and Guidelines.
[ A ] | [ C ] | [ E ] | [ G ] | [ I ] | [ O ] | [ P ] | [ R ]
access token |
A token that you include in every API call to prove that your app is authorized to make API calls:
The access token looks like a long, garbled string. 📘 Note: Indeed's access tokens use the OAuth 2.0 protocol, and follow the authorization request guidelines in RFC6749: The OAuth 2.0 Authorization Framework. |
authorization code |
In the authorization code flow (3‑legged OAuth), a code that the owner of an Indeed account sends to your app to enable calling the API on their behalf. To get an access token in this flow, you pass an authorization code and client ID and secret. |
authorization code flow (3‑legged OAuth) |
A flow that enables you to authorize your app to act on behalf of other Indeed user accounts and those accounts' associated employers. In this flow, after Indeed shows the user the OAuth consent screen, the user grants permissions to your app. |
— C — |
|
client credentials flow (2‑legged OAuth) |
A flow that enables you to authorize your app to act on behalf of itself and its associated employer accounts. |
client ID and secret |
Credentials that identify your app. Get these credentials one time for each app. If you have both test and production versions of your app, you must generate a separate set of API credentials for each version. Also called API keys or API credentials. |
credential type |
The crednetial type to request for your app:
|
— E — |
|
employer selection screen |
Enables a user to select an employer from a list of employers associated with the user. Hosted on Indeed. |
— G — |
|
grant type |
How the client is authenticated:
|
— I — |
|
incremental authorization |
Enables apps to request only the scopes that they need. Incremental authorization requires the |
— O — |
|
OAuth consent screen |
Indeed-hosted screen that enables a user to grant consent for any scopes requested by the OAuth app, such as the |
— P — |
|
public client |
A client that cannot maintain the confidentiality of their credentials and cannot secure client authentication through any other means. That is, clients that run on the device that the resource owner uses, such as an installed native app or a web browser-based app. For information about public clients, see Client Types in RFC6749 The OAuth 2.0 Authorization Framework. Public clients can use authentication code grant type only. |
— R — |
|
redirect URL |
A page on your website where Indeed redirects a user after trying to authorize your app on behalf of the user. If the user authorized your app, then Indeed passes an authorization code to your specified redirect URL. To test your OAuth app on your local machine, set one of your redirect URLs to |
refresh token |
When you include the The refresh token is valid for 60 days from when it was issued. With each refresh, the refresh token's expiration date is extended to 60 days from the most recent refresh. Indeed returns a refresh token with the access token only when your app requests and is granted the offline_access scope. |
Updated 3 days ago