Authorization code flow with refresh token (confidential clients)
Use this flow when: Your application can securely store a Client Secret (server-side applications).
Benefits: Provides both access tokens and refresh tokens for long-term access.
1
Redirect user for authorization
Redirect the user to the authorization endpoint:
GET https://www.make.com/oauth/v2/authorizeRequired parameters:
client_id: Your application's Client IDresponse_type: Set tocoderedirect_uri: Pre-registered callback URLscope: Requested permissions (includeopenidfor OpenID Connect)state: Random string for CSRF protection (recommended)
Example URL:
https://www.make.com/oauth/v2/authorize? client_id=your_client_id& response_ty2
3
Exchange code for tokens
Make a server-side POST request to the token endpoint:
POST https://www.make.com/oauth/v2/tokenRequired Parameters:
client_id: Your Client IDclient_secret: Your Client Secretgrant_type: Set toauthorization_codecode: Authorization code from Step 2
Response:
json{ "access_token": "eyJ...", "refresh_token": "eyJ...", "id_token": "eyJ...", "token_type": "Bearer", "expires_in": 3600}Last updated

