Authorization
Authorization guidance for Management API operations, including tenant credentials, client credentials, and machine-to-machine access for administrative automation.
Overview
The Management API is primarily administrative and service-side. Most operations in this group are intended for backend systems, admin tooling, or automation layers that manage tenant configuration and governance.
This group should not be treated as a public user-facing API surface.
Primary authentication models
The dominant auth patterns in this group are:
- tenant API key and secret
- client ID and client secret
- machine-to-machine bearer tokens
These patterns reflect the operational nature of tenant and platform administration.
Required credentials
Depending on the route, expect some combination of:
apikeyapisecretclient_idclient_secretAuthorization: Bearer <m2m-token>
Security schemes used in this group
The current public spec uses these schemes in the Management API group:
APIKeyAPISecretClientIdClientSecretM2MBearerToken
Practical interpretation
- tenant credentials are common across management endpoints
- client credentials are used where application-level authorization is part of the control plane
- M2M tokens are important for service automation and backend orchestration
Headers and query parameters
Common auth inputs in this group include:
- query
apikey - query
apisecret - query
client_id - query
client_secret - header
Authorization: Bearer <token>
These routes should usually be called from controlled backend systems, not public applications.
Token usage guidance
Use service-side credentials
Prefer server-side tenant and application credentials for administrative operations.
Use M2M for automation
If your architecture supports service-to-service authorization, M2M bearer tokens are appropriate for workflow engines, integration services, and admin automation.
Keep configuration writes backend-only
Provider, client, policy, and governance changes should never be exposed to browser-only clients.
Examples and common patterns
Typical patterns in this group include:
- provisioning OAuth, JWT, or SAML client configurations
- rotating or updating provider settings
- maintaining templates and communications settings
- configuring password policy, CAPTCHA, passkeys, or second factors
- managing webhooks, workflows, roles, and permissions
- generating SOTT from a secure backend service
Common auth errors and pitfalls
- exposing tenant or client secrets in client-side code
- using consumer-auth assumptions from Authentication API on management endpoints
- assuming all configuration endpoints support the same auth shape
- skipping M2M token support where service automation is expected
Always validate the exact generated operation page for the endpoint you are automating.