OAuth is a standard that authorizes access to services and data without sharing personal credentials. It uses secure tokens to grant access to users, applications, and systems. The discussion includes a real-world analogy and details on roles and interactions in the OAuth process.
OAuth is an industry standard mechanism Medallia Experience Cloud uses to authorize limited access to its services and data. OAuth allows users, applications, and systems to grant access to resources without sharing personal authentication credentials like passwords. Instead, the parties share a secure token that identifies what the user or application may access.
Analogy: This real-world scenario helps explain OAuth and that relates it to terms used throughout this discussion. When a you (a client) check in to a hotel (resource server), the agent at the check-in counter asks for some identification, such as a driver's license or passport, to authenticate who you are (similar to SSO with SAML). The agent (authorization server) then hands you a key card (OAuth token) that gives you access to your room, the gym, the pool, parking, and limited access to other amenities (resources), but not the entire hotel. Further, the key card is only usable for for the duration of your stay.
The discussion below explains how authorization compliments authentication, and how Medallia Experience Cloud uses OAuth to grant access to applications requesting Medallia resources.
OAuth and Experience Cloud
Medallia Experience Cloud uses OAuth to grant limited access to applications — and users using applications — to access Medallia Experience Cloud resources.
OAuth defines four roles:
- Resource owner
- An entity capable of granting access to a protected resource. The owner can be a person (an end-user) or an service (such as Medallia Experience Cloud).
In the later case, Experience Cloud "owns" the data but manages it on behalf of users of a company.
- Resource server
- The server hosting the protected resources, capable of accepting and responding to protected resource requests using access tokens.
The Experience Cloud database and reports are the resources in this discussion.
- An application requesting protected resources on behalf of the resource owner and with its authorization.
In Experience Cloud the client might be a Medallia Mobile or Medallia Voices app, or some other application accessing the resources on behalf of the company or a user of the company.
- Authorization server
- The server issuing access tokens to the client after successfully authenticating the resource owner and obtaining authorization. The authorization server may be the same server as the resource server or a separate entity.
In Experience Cloud the OAuth service performs authorization.
The four roles interact to grant authorization to the client (application) to allow it to access the protected resources.
In Medallia Experience Cloud, client applications are pre-registered with Medallia, Inc. and have unique identification values (clientID). When a user uses the app to connect to Experience Cloud, the app requests authorization by passing the clientID and the session ID granted to the user during authentication. The combination of clientID and sessionID determine the resources available to the app and user. Medallia Voices is an example of this kind of application.
Client credentials protocol flow
Some applications or systems accessing Experience Cloud do not work on behalf of a specific user. For example, some applications directly feed new survey records on behalf of a company. These applications have a pre-authenticated identification (clientSecret) that together with the clientID identifies the app and grants access to the appropriate resources. Medallia for Digital is an example of this kind of application.