Tokens
Token Request: Your application then makes a secure POST request to the Token Endpoint, providing the code along with your
client_id
,client_secret
,redirect_uri
, and (if used in step 1) the sameuserid
. This step happens server-to-server (backend of your app to AIRisk API) and does not involve the user’s browser.Token Response: If the request is valid, the AIRisk authorization server responds with a JSON payload containing an access_token (and possibly other details like expiration). This token can then be used by your app to authenticate future API requests to AIRisk (usually by including it in an HTTP Authorization: Bearer header).
Note: The AIRisk OAuth2 flow supports two modes of obtaining tokens:
Generic tokens – obtained by omitting the
userid
parameter. These tokens are not tied to any specific end-user; they represent the application’s own access.User-specific tokens – obtained by including a
userid
. These tokens represent an authorization on behalf of a particular user. The following sections detail how to use each endpoint and clarify the differences between these token types.
Last updated