Verify requests to your API(s) using Gobo access tokens.
Access tokens are issued by Gobo to allow your partners' apps to access one or many of your API(s). Gobo access tokens conform to the JSON Web Token (JWT) standard and contain information in the form of claims. They are self-contained, therefore it is not necessary for the recipient to call a server to validate the token.
Once a customeruser installs an app into a customerorg, an app can request an access token from Gobo and begin making calls to your API(s).
Example Access Tokens
Token issued using the OAuth 2.0 client credentials flow:
For additional security, you can ensure that the access token was generated for API receiving the request by verifying the aud claim against the associated Gobo API GUID.
Keep your Signing Key Secure
The tenant signing key ensures that your access tokens were generated by Gobo and have not been modified. It must be kept secure and private. Be sure to prevent your signing key from being made publicly accessible, such as in client-side code, GitHub, unsecured S3 buckets, and so forth. API Tokens are prefixed with gk_.
Last updated
Gobo JWT access tokens are signed using HS256 (HMAC with SHA-256), a symmetric key hashing algorithm that uses a shared secret. By using the Gobo signing key provided in the , you are able to verify that the access token was generated by Gobo and has not been modified.