OAuth 2.0 is an industry-standard authorisation framework that allows integrations to access Pleo data securely on behalf of a customer, without requiring the customer to share their login credentials. Instead of passwords, OAuth 2.0 uses access tokens, which grant limited, controlled access to specific resources and actions. This allows integrations to operate securely while ensuring customers remain in control of their data. OAuth 2.0 is the recommended authorisation method for most Pleo integrations. Because OAuth 2.0 terminology can vary between platforms, the following definitions explain how these concepts are used within the Pleo Partner platform.Documentation Index
Fetch the complete documentation index at: https://developers.pleo.io/llms.txt
Use this file to discover all available pages before exploring further.
Concepts and terminology
Before getting started, it helps to understand how key terms are used in Pleo’s platform.| Concept | Term | Description |
|---|---|---|
| Partner-built system | Integration | The external system or service you build that connects to Pleo APIs (for example, an accounting platform or internal tool). |
| Registered identity | OAuth 2.0 client | The technical identity registered in Pleo that allows your integration to authenticate and request access tokens. |
| Marketplace product | App / Application | The user-facing representation of your integration shown during authorisation and within the Pleo Marketplace. |
When to use OAuth 2.0
OAuth 2.0 is the required default authentication method for technology partners participating in the Early Access Program. You should use OAuth 2.0 if your integration needs to:- Access Pleo APIs on behalf of a customer
- Allow customers to connect their Pleo account to your integration
- Access or modify customer data, such as expenses, employees, or accounting information
- Maintain secure, long-lived access without storing user credentials
How OAuth 2.0 protects customer data
OAuth 2.0 improves security by:- Never exposing user passwords to third-party integrations
- Issuing access tokens with limited permissions
- Allowing integrations to request only the access they need using API scopes
- Allowing access to be revoked without affecting user login credentials
OAuth 2.0 roles (as used by Pleo)
OAuth 2.0 defines four roles involved in granting and using access:-
Resource Owner
The Pleo customer who owns the data and grants access to it. -
Client
The OAuth 2.0 client representing your integration when requesting access tokens. -
Authorisation Server
Pleo’s service that authenticates users, collects consent, and issues access tokens. -
Resource Server
Pleo APIs that store and provide access to protected data.
What happens when a customer connects your integration
At a high level:- Your integration directs the customer to Pleo to approve access
- The customer reviews and approves the requested permissions
- Pleo issues access tokens to your integration
- Your integration uses those tokens to access Pleo APIs securely
What Comes Next?
Once you decide that OAuth 2.0 is the right authorisation method for your integration, the next step is to design and implement it correctly. See:- OAuth 2.0 Overview – Understand how OAuth 2.0 works at the implementation level
- OAuth 2.0 Setup Workflow Guide – Follow a step-by-step implementation guide