-
Notifications
You must be signed in to change notification settings - Fork 4.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Bring back "Bring-your-own-credentials" for OAuth2 authorization schemes #52084
Comments
Issue reported in Community Slack |
@strunov, thank you for bringing the issue to our attention. The team is currently reviewing it and will get back to you with a proposal for a solution. |
@strunov so a perfect solution would be to be able to choose between either providing the tokens directly, or providing client_id and secret, and going through the OAuth flow? |
Yes, but just to clarify - in many cases one would require Otherwise, yes, I think having both options is preferable |
@natikgadzhi I believe there was a reason for not providing the Generally speaking, I agree that the best approach is to have The current behavior for FE / UI is:
|
More information here in the Slack thread: https://airbytehq-team.slack.com/archives/C085DB1V57S/p1737583509789109 |
A toggle switch makes sense at the first pass, but thinking through:
|
This isn't blocking, as the redirect is done by the browser which can resolve the endpoint locally, over vpn, etc The second point is very, very true; as is the fact that the UI now disagrees/competes with any existing configuration |
Topic
OAuth2 data sources
Relevant information
As of AirByte 1.4, it appears that all data sources that could be authorized using OAuth2, no longer allow you to manually enter an
access_token
/refresh_token
.Instead, they must be procured through the regular user OAuth2 flow.
Whilst this functionality is convenient for less technical users, and maintains the data source setup within the AirByte context, it is intrusive in other ways...
/auth_flow
).It really makes no sense that we can no longer manually enter our access/refresh tokens which we've obtained by whichever workflows we already had...
Kindly consider.
The text was updated successfully, but these errors were encountered: