Skip to main content

API Access

The API Access screen lets administrators configure OAuth client IDs that allow external systems to authenticate against your wallet using the OAuth 2.0 Client Credentials flow.

Each client ID has its own set of roles, an expiry date, and optional notes — so you can grant different integrating parties exactly the access they need, for as long as they need it.

What you can do

Go to Settings → IAM → API Access.

API Access overview

The table lists all configured client IDs. Each row shows:

ColumnDescription
Client IDThe unique identifier used during OAuth authentication
RolesThe permissions assigned to this client
Expiry dateThe date after which this client ID is rejected
NotesOptional context about the integrating party

Expired client IDs are visually greyed out and flagged with a warning icon.

Required permission

You need the API Access (Read) permission to view this screen, and API Access (Change) to add, edit, or delete client IDs.

Add a client ID

Click Add API client.

Add API client button

The Add API client dialog opens.

Add API client dialog

Fill in the fields:

Client ID (required) A unique identifier for this client. Choose something meaningful, such as the name of the integrating party or its purpose (e.g. acme-backend or reporting-service). This value cannot be changed after creation.

Expiry date (required) The date on which this client ID expires. Defaults to one year from today. After the expiry date, the client can no longer obtain tokens.

Notes (optional) Free-text field to record context about the client, such as the integrating party's name, contact person, or purpose.

Permissions Select which roles to assign to this client using the permissions grid. Each row represents a resource:

  • Change column — grants CRUD (create, read, update, delete) access and automatically selects View as well
  • View column — grants read-only access; can be selected independently when Change is not selected

Click Save. A dialog appears showing the generated client secret.

Client secret dialog
Copy the secret now

The client secret is only shown once. Store it securely — it cannot be retrieved afterwards.

The new client ID now appears in the list.

Edit a client ID

Click the pencil icon on any row to edit a client ID.

Edit API client dialog

You can update the roles and notes. The client ID and expiry date cannot be changed.

Click Save to apply the changes.

Delete a client ID

Click the trash icon on any row. A confirmation dialog appears.

Delete confirmation dialog

Click Yes to permanently revoke access for this client ID.

Authenticate using a client ID

Use the token endpoint shown at the bottom of the API Access screen to obtain an access token via the OAuth 2.0 Client Credentials flow.

Token endpoint

Example request:

POST {token-endpoint}
Content-Type: application/x-www-form-urlencoded

grant_type=client_credentials
&client_id=wallet-{external-key}-{your-client-id}
&client_secret={your-client-secret}

The returned access_token can then be passed as a Bearer token in API requests to your wallet.