Open Api > API usage as a third-party application instead of a user
OAuth authorization flow for third-party applications
This guide explains how to implement a standard OAuth authorization flow for third-party applications integrating with Tallyfy. This approach allows your users to authenticate directly with Tallyfy without sharing their credentials with your application.
- Paid Tallyfy Professional or Enterprise subscription
- Client ID and Client Secret from Tallyfy
- A registered redirect URI for your application
- Basic understanding of OAuth 2.0 authorization flows
Direct your users to Tallyfy’s authorization endpoint:
https://account.tallyfy.com/oauth/authorize?client_id=YOUR_CLIENT_ID&response_type=token&redirect_uri=YOUR_REDIRECT_URL
Replace:
YOUR_CLIENT_ID
with your application’s client IDYOUR_REDIRECT_URL
with your application’s registered redirect URI
Users will see Tallyfy’s login page where they can authenticate using their Tallyfy credentials.
After successful authentication, Tallyfy will redirect the user back to your specified redirect URI with the access token in the URL fragment:
YOUR_REDIRECT_URL?access_token=ACCESS_TOKEN&token_type=Bearer&expires_in=EXPIRES_IN_SECONDS
Your application should:
- Extract the
access_token
from the URL - Store it securely
- Use it for subsequent API requests
Use the access token in the Authorization header for all API requests:
Authorization: Bearer ACCESS_TOKENContent-Type: application/jsonX-Tallyfy-Client: APIClient
https://account.tallyfy.com/oauth/authorize?client_id=9999&response_type=token&redirect_uri=https://yourapp.com/auth/callback
https://yourapp.com/auth/callback?access_token=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9...&token_type=Bearer&expires_in=840
A user in Tallyfy can belong to multiple organizations. After authentication, the access token is associated with the organization the user is currently logged into. If your application needs to work with multiple organizations for a user:
- Store the organization context along with the access token
- Consider implementing organization selection in your application
- For users in multiple organizations, you may need to handle organization-specific authentication flows
- Always use HTTPS for all OAuth-related communication
- Implement PKCE (Proof Key for Code Exchange) for added security
- Store access tokens securely, preferably encrypted
- Implement token expiration handling
- Never expose your Client Secret in client-side code
- Validate all redirect URIs against expected patterns
- Implement state parameter to prevent CSRF attacks
Issue | Possible Cause | Solution |
---|---|---|
Authorization fails | Invalid client ID | Verify your client ID |
Redirect fails | Mismatched redirect URI | Ensure the redirect URI matches exactly with the registered one |
Token doesn’t work | Token expired | Check expiration time and request a new token |
Organization context issues | User belongs to multiple organizations | Clarify organization context during authentication |
For any issues with the OAuth implementation, contact Tallyfy Support with detailed information about the error and your implementation.
Open Api > API usage as a third-party application instead of a user
Open Api > Integrate with Tallyfy using the API
- 2025 Tallyfy, Inc.
- Privacy Policy
- Terms of Use
- Report Issue
- Trademarks