Applications

Applications represent pieces of software or services that are authorized to interact with the system (similar to OAuth clients).

They allow external or internal software components to authenticate and perform actions under controlled permissions.

The Applications view in the Admin Portal is where administrators can see and manage software identities that interact with the system.

Why Applications Matter

💻Applications act like clients in an OAuth/OpenID model.

🔐They authenticate to the system using credentials (e.g. client_id / client_secret) and then, with assigned policies, are allowed to perform actions or access data.


What This Means for You as a Technical User?

  • 👩‍💻You usually won’t need to create applications — that is done during integrations or by developers.

  • ❗However, understanding that applications exist helps you interpret logs, troubleshoot integrations, and understand how external systems connect.

  • 👀If changes are needed (e.g. adding policies, unlocking an application), you’ll know where to look and what to expect.


What Can Applications Do?

While most users will not need to create or manage applications, the Admin Portal supports the following operations:

Operation
Description

List / View Applications

See all registered applications and their details.

Create Application

Register a new software client with properties like name, vendor, version, and generate credentials.

Generate/Reset Secret

Create or reset the secret (password/key) for an application to authenticate.

Edit Application

Update application metadata (name, version, vendor, etc.).

Lock / Unlock / Reset Security State

Prevent an application from authenticating if it fails too often, or unlock it when needed.

Assign / Remove Policies

Customize which policies (grant, deny, elevate) the application holds.


Key Concepts & Fields for Applications

Here are some fields you’ll see when inspecting an application:

Field
Description

Client ID / Name

The unique identifier for the application (acts as client_id).

Software Name / Vendor / Version

Metadata that identifies the software owner, version, and vendor.

Secret / Secret Key

The credential (like a password) that the application uses to authenticate.

Lockout / Security State

Tracks failed authentication attempts; may lock the application if thresholds are exceeded.

Assigned Policies

The set of policies this application is allowed or denied; these control its access.


How Applications Get Permissions?

  • When a new application is created, by default it inherits policies from a general APPLICATIONS group.

  • After creation, those default policies can be overridden or customized via the Policies panel.

  • Policy permission types supported include:

    • Grant — the application is allowed to perform the action/data access.

    • Deny — the application is explicitly denied.

    • Elevate — requests are denied by default, but may prompt for override (e.g. ask for justification).

When a policy is removed from an application, if no explicit grant is assigned, the system falls back to default denial (unless a user’s group grants it).


References & Further Reading

Last updated