Navigation: Implementation details > External Authentication
OAuth2 flow
•Token acquisition
•Authenticated API calls
•End of token validity
•Sequence diagram