OData security provider in Jitterbit App Builder
The OData security provider authenticates requests made to an OData data source. It includes support for the following authentication mechanisms:
- Anonymous Authentication.
- HTTP Basic Authentication.
- OAuth 2.0 Authorization Code flow.
- OAuth 2.0 Client Credentials flow.
- OAuth 2.0 Resource Owner Password Credentials flow.
- OAuth 2.0 JSON Web Token Bearer flow.
- OAuth 2.0 SAML 2.0 Bearer Assertion flow.
Anonymous authentication
Anonymous authentication is used by default when credentials are not supplied and no other authentication type is selected. Anonymous authentication does not require any configuration. However, it can be explicitly enabled by associating the data source with a security provider that has an AuthenticationType of Anonymous
.
See HTTP anonymous authentication for the complete configuration.
HTTP basic authentication
As implemented by App Builder, HTTP Basic Authentication is a form of service account, meaning all App Builder users authenticate with the same set of credentials. The credentials (user name and password) are defined at the data source level.
HTTP Basic Authentication is enabled in one of two ways:
- Implicitly. Credentials are defined at the data source level and the data source is not associated with a security provider.
- Explicitly. Credentials are defined at the data source level and the data source is associated with a security provider that has an AuthenticationType of
Basic
.
See HTTP basic authentication for the complete configuration.
OAuth 2.0 authorization code flow
The OAuth 2.0 Authorization Code flow provides user-level authentication. In this flow, authorization codes are exchanged for OAuth access tokens.
Unlike the Anonymous and HTTP Basic authentication schemes, the Authorization Code flow must be explicitly enabled. This is done by associating a data source with a security provider that has an AuthenticationType of AuthorizationCode
.
Furthermore, the OAuth Authorization Code flow works in conjunction with an OAuth security provider. The OAuth security provider is responsible for authorizing the user and exchanging authorization codes for access tokens.
See OAuth 2.0 authorization code flow for the complete configuration.
OAuth 2.0 SAML 2.0 bearer assertion flow
The OAuth 2.0 SAML 2.0 Bearer Assertion Flow provides user-level authentication. In this flow, SAML assertions are exchanged for OAuth access tokens.
Unlike the Anonymous and HTTP Basic authentication schemes, the SAML 2.0 Bearer Assertion flow must be explicitly enabled. This is done by associating a data source with a security provider that has an AuthenticationType of Saml
.
See OAuth 2.0 SAML 2.0 bearer assertion flow for the complete configuration.
OAuth 2.0 client credentials flow
The OAuth 2.0 Client Credentials flow provides client-level authentication, akin to a service account. In this flow, the OAuth client credentials are exchanged for an OAuth access token.
Unlike the Anonymous and HTTP Basic authentication schemes, the Client Credentials flow must be explicitly enabled. This is done by associating a data source with a security provider that has an AuthenticationType of ClientCredentials
.
See OAuth 2.0 client credentials flow for the complete configuration.
OAuth 2.0 resource owner password credentials flow
As implemented by App Builder, the OAuth 2.0 Resource Owner Password Credentials flow provides client-level authentication, akin to a service account. In this flow, the OAuth resource owner credentials are exchanged for an OAuth access token.
Unlike the Anonymous and HTTP Basic authentication schemes, the OAuth Resource Owner Password Credentials flow must be explicitly enabled. This is done by associating a data source with a security provider that has an AuthenticationType of ResourceOwnerPasswordCredentials
.
See OAuth 2.0 resource owner password credentials flow for the complete configuration.
OAuth 2.0 JSON web token bearer token flow
The OAuth 2.0 JSON Web Token (JWT) Bearer Token flow provides user-level authentication. In this flow, JWTs are exchanged for OAuth access tokens. Unlike the Anonymous and HTTP Basic authentication schemes, the JWT Bearer Token flow must be explicitly enabled. This is done by associating a data source with a security provider that has an AuthenticationType of Jwt
.
See OAuth 2.0 JSON web token bearer token flow for the complete configuration.