Concepts and terminology
Before getting started, it helps to understand how key terms are used in Pleo’s platform.| Concept | Term | Description |
|---|---|---|
| Partner-built system | Integration | The external system or service you build that connects to Pleo APIs (for example, an accounting platform or internal tool). |
| Registered identity | OAuth 2.0 client | The technical identity registered in Pleo that allows your integration to authenticate and request access tokens. |
| Marketplace product | App / Application | The user-facing representation of your integration shown during authorisation and within the Pleo Marketplace. |
When to use OAuth 2.0
OAuth 2.0 is the required default authentication method for technology partners participating in the Early Access Program. You should use OAuth 2.0 if your integration needs to:- Access Pleo APIs on behalf of a customer
- Allow customers to connect their Pleo account to your integration
- Access or modify customer data, such as expenses, employees, or accounting information
- Maintain secure, long-lived access without storing user credentials
How OAuth 2.0 protects customer data
OAuth 2.0 improves security by:- Never exposing user passwords to third-party integrations
- Issuing access tokens with limited permissions
- Allowing integrations to request only the access they need using API scopes
- Allowing access to be revoked without affecting user login credentials
OAuth 2.0 roles (as used by Pleo)
OAuth 2.0 defines four roles involved in granting and using access:-
Resource Owner
The Pleo customer who owns the data and grants access to it. -
Client
The OAuth 2.0 client representing your integration when requesting access tokens. -
Authorisation Server
Pleo’s service that authenticates users, collects consent, and issues access tokens. -
Resource Server
Pleo APIs that store and provide access to protected data.
What happens when a customer connects your integration
At a high level:- Your integration directs the customer to Pleo to approve access
- The customer reviews and approves the requested permissions
- Pleo issues access tokens to your integration
- Your integration uses those tokens to access Pleo APIs securely
What Comes Next?
Once you decide that OAuth 2.0 is the right authorisation method for your integration, the next step is to design and implement it correctly. See:- OAuth 2.0 Overview – Understand how OAuth 2.0 works at the implementation level
- OAuth 2.0 Setup Workflow Guide – Follow a step-by-step implementation guide