oauth_applications
Overview
Name | oauth_applications |
Type | Resource |
Id | github.apps.oauth_applications |
Fields
SELECT
not supported for this resource, use SHOW METHODS
to view available operations for the resource and then invoke a supported method using the EXEC
command
Methods
Name | Accessible by | Required Params | Description |
---|---|---|---|
delete_authorization | DELETE | client_id, data__access_token | OAuth application owners can revoke a grant for their OAuth application and a specific user. You must use Basic Authentication when accessing this endpoint, using the OAuth application's client_id and client_secret as the username and password. You must also provide a valid OAuth access_token as an input parameter and the grant for the token's owner will be deleted.Deleting an OAuth application's grant will also delete all OAuth tokens associated with the application for the user. Once deleted, the application will have no access to the user's account and will no longer be listed on the application authorizations settings screen within GitHub. |
check_token | EXEC | client_id, data__access_token | OAuth applications can use a special API method for checking OAuth token validity without exceeding the normal rate limits for failed login attempts. Authentication works differently with this particular endpoint. You must use Basic Authentication to use this endpoint, where the username is the OAuth application client_id and the password is its client_secret . Invalid tokens will return 404 NOT FOUND . |
delete_token | EXEC | client_id, data__access_token | OAuth application owners can revoke a single token for an OAuth application. You must use Basic Authentication when accessing this endpoint, using the OAuth application's client_id and client_secret as the username and password. |
reset_token | EXEC | client_id, data__access_token | OAuth applications can use this API method to reset a valid OAuth token without end-user involvement. Applications must save the "token" property in the response because changes take effect immediately. You must use Basic Authentication when accessing this endpoint, using the OAuth application's client_id and client_secret as the username and password. Invalid tokens will return 404 NOT FOUND . |
scope_token | EXEC | client_id, data__access_token | Use a non-scoped user-to-server OAuth access token to create a repository scoped and/or permission scoped user-to-server OAuth access token. You can specify which repositories the token can access and which permissions are granted to the token. You must use Basic Authentication when accessing this endpoint, using the OAuth application's client_id and client_secret as the username and password. Invalid tokens will return 404 NOT FOUND . |