Permission UX and fine-grained scope strings continue to evolve. Treat this page as the conceptual model; exact scope names and dashboard controls may change—verify against your project settings and the live OAuth flow.
How it works
Users sign in and grant scopes to your app. Access tokens encode what the app may do. Users can revoke access from their account when they no longer trust an app.Flow
- Application initiates login / auth flow, which redirects users to a Basic SSO page
- User can select how much access they want to give
- The scope is defined into a self-verifiable token (JWT) that is sent to the application
The token is cryptographically signed and is verifiable (i.e., it cannot be forged, and developers can independently verify that it came from the respective users)
- The application then uses this token to make requests to the user’s datastore.
The application simply includes the token as an auth header in its API requests
Scope
Usually, an application will specify what it wants to request. At minimum, this is set toprofile to return general profile info.
Scope can be extended to include access to the database, which is organized in the following hierarchy: database > table > row > field.
For example, an application might request the following scope:
profiledatabase_id.table_id= readdatabase_id.table_id.row_id= read, write

