Authorization code flow with refresh token (confidential clients)
Use this flow when: Your application can securely store a Client Secret (server-side applications).
Benefits: Provides both access tokens and refresh tokens for long-term access.
1
Redirect user for authorization
Redirect the user to the authorization endpoint:
GET https://www.make.com/oauth/v2/authorize
Required parameters:
client_id
: Your application's Client IDresponse_type
: Set tocode
redirect_uri
: Pre-registered callback URLscope
: Requested permissions (includeopenid
for OpenID Connect)state
: Random string for CSRF protection (recommended)
Example URL:
https://www.make.com/oauth/v2/authorize? client_id=your_client_id& response_ty
2
3
Exchange code for tokens
Make a server-side POST request to the token endpoint:
POST https://www.make.com/oauth/v2/token
Required Parameters:
client_id
: Your Client IDclient_secret
: Your Client Secretgrant_type
: Set toauthorization_code
code
: Authorization code from Step 2
Response:
json{ "access_token": "eyJ...", "refresh_token": "eyJ...", "id_token": "eyJ...", "token_type": "Bearer", "expires_in": 3600}
Last updated