Skip to content

Learn how to create OAuth credentials with ArcGIS Location Platform to support app authentication.

The developer credentials creation interface in a portal.

The developer credentials creation interface in a portal

OAuth credentials are an item required to implement app authentication. They contain client_id and client_secret parameters that are used to implement an OAuth 2.0 client credentials flow. The item page of OAuth credentials allows you to manage settings related to app authentication, including the authorized privileges of an application.

This tutorial shows you how to create OAuth credentials for use in app authentication and do the following:

  • Configure privileges to allow your application to access ArcGIS services, content, and functionality.
  • Set authorized referrer URLs.
  • Manage settings of the OAuth credentials and monitor usage using its item page.

This tutorial focuses on creating OAuth 2.0 credentials for a private application with selected privileges and access.

Prerequisites

  1. You need an ArcGIS Location Platform account.

  2. You need to know the privileges required by your application. The privileges assigned to developer credentials allow your application to access ArcGIS services and resources.

Steps

Sign in to your portal

You use your portal to create and manage items, including OAuth credentials.

  1. In your web browser, go to https://location.arcgis.com, and sign in with your ArcGIS Location Platform account. In the dashboard, click My portal to go to your portal.

Create a new item

  1. In your portal, click Content > My content > New item.
    New item button

  2. Click Developer credentials.

  3. In the credential type screen, select OAuth 2.0 credentials and click Next.

    OAuth 2.0 credentials in ArcGIS Location Platform

Select application type

You can configure your OAuth 2.0 credentials in the Where will you use these credentials? menu to define how your credentials will be used. This setting restricts where and how the credentials can be used and helps prevent unauthorized access to secure services.

  1. For this tutorial, select Private application with selected privileges and access.

    Selecting a key environment
  2. Click Next.

Select items (optional)

If your application will require access to specific private items, you will need to configure your developer credentials to access them. The Item access menu allows you to browse your portal's content and grant your developer credentials access to specific items.

  1. If your token does not require item access, select No item access. Then, click Next.

  2. Otherwise, select Grant access to specific items.

  3. Select the items you want to grant access to. You can select up to 100 items in this menu.

    Item access menu
  4. Click Next.

Select privileges

You can configure the settings of OAuth 2.0 credentials to configure the privileges of access tokens granted via app authentication. For an access token to work in your application, it needs to have the correct privileges to access the content and services your app is using. Select the privileges your app requires in this menu.

  1. In the Create developer credentials > Privileges window, browse the available privileges.

    Privilege selection window (ArcGIS Location Platform)
  2. Browse the table below to view the available privileges, privilege strings, and descriptions for ArcGIS Location Platform:

    CategoryLabelPrivilege stringDescription
    BasemapsBasemap styles servicepremium:user:basemapsAllow application to access the basemap styles service. Learn more
    BasemapsStatic basemap tilespremium:user:staticbasemaptilesAllow application to access the static basemap tiles service. Learn more
    Static mapsStatic maps service (beta)Allow application to access the static maps service. Learn more
    PlacesPlace findingpremium:user:placesAllow application to access the places service. Learn more
    GeocodingGeocode (stored)premium:user:geocode:storedAllow application to access the geocoding service and perform stored geocodes. Learn more
    GeocodingGeocode (not stored)premium:user:geocode:temporaryAllow application to access the geocoding service and perform geocodes that are not stored. Learn more
    RoutingRoutingpremium:user:networkanalysis:routingAllow application to access the routing service and perform standard routing operations. Learn more
    RoutingClosest facilitypremium:user:networkanalysis:closestfacilityAllow application to access the routing service and perform closest facility routing operations. Learn more
    RoutingLocation allocationpremium:user:networkanalysis:locationallocationAllow application to access the routing service and perform location allocation operations. Learn more
    RoutingOptimized routingpremium:user:networkanalysis:optimizedroutingAllow application to access the routing service and perform optimized routing operations. Learn more
    RoutingOrigin/destination cost matrixpremium:user:networkanalysis:origindestinationcostmatrixAllow application to access the routing service and generate travel cost matrices. Learn more
    RoutingService areapremium:user:networkanalysis:serviceareaAllow application to access the routing service and generate service areas. Learn more
    RoutingMulti-vehicle routingpremium:user:networkanalysis:vehicleroutingAllow application to access the routing service and perform fleet routing operations. Learn more
    RoutingLast milepremium:user:networkanalysis:lastmiledeliveryAllow application to access the routing service and perform routing operations for last mile delivery. Learn more
    RoutingSnap to roadspremium:user:networkanalysis:snaptoroadsAllow member to perform network analysis tasks such as snap GPS track points to roads. Learn more
    Data enrichmentGeoEnrichment servicepremium:user:geoenrichmentAllow application to access the GeoEnrichment service. Learn more
    ElevationElevation servicepremium:user:elevationAllow application to access the elevation service. Learn more
  3. Select the privileges required by your application and click Next.

Set referrer URLs

You can set referrer URLs on OAuth credentials that restrict the credentials to only be usable from authorized domains. This is highly recommended for security purposes.

  1. In the next window, scroll down to Referrer URLs.

  2. Set the Referrers field to the web domains you would like to restrict the access token to. To learn more about referrers, go to OAuth credentials (for app authentication).

    Referrer selector
  3. Click Next.

Save the item

After configuring the properties of your OAuth credentials, you can save the credentials as a new item.

  1. In the Create developer credentials window, set the following properties:

    • Title: My OAuth credentials (for app authentication)
    • Folder: Developer credentials (Create a new folder)
    • Tags: Add tags related to the privileges of the credentials.
    • Description: Describe the application that these developer credentials will be used in.
    OAuth credential details

    Click Next.

  2. In the Summary window, review the properties, privileges, and item access you have set.

  3. Click Create to create your OAuth credentials.

Copy the client ID and client secret

Your OAuth credentials contain client_id and client_secret parameters that are required to implement app authentication. Copy these values and paste them into your application or script.

  1. On the item page of your OAuth credentials, scroll down to Credentials.

  2. Copy the Client ID and Client Secret values and paste them into your application. Never expose the value of your client secret.

    Client credentials

Manage your credentials

After creating an OAuth credentials item, its privileges and item access can be managed at any time by going to the item page.

To learn more and see management steps, go to OAuth credentials (for app authentication).

Additional resources

Learn more about app authentication in the following topics:

Your browser is no longer supported. Please upgrade your browser for the best experience. See our browser deprecation post for more details.