Agiled Docs
Account and Login

OAuth Consent

Review access before authorizing connected apps.

OAuth consent pages appear when an external app or provider asks you to approve access.

Use this page to decide whether an app should connect to your Agiled account or workspace. Consent is a security decision, not just a login step.

Pause when the requested access is broader than the task you expected. A legitimate app should have a clear reason for read, write, or offline access.

Before Approving

Check the app name, requested permissions, workspace, and account you are signed in with. Approve only when you trust the app and understand what access it needs.

If you belong to multiple workspaces, confirm the workspace shown on the consent screen is the one the external app should access. Deny the request if the app, workspace, or requested access does not match what you expected.

If you started from a third-party app, make sure the browser did not switch to a different Agiled account during sign-in. A consent screen can be valid but still belong to the wrong workspace or user.

Scopes You May See

  • Confirm your account identity for openid.
  • Read your profile name for profile.
  • Read your email address for email.
  • Read workspace records through MCP tools for mcp:read.
  • Create or update workspace records through MCP tools for mcp:write.
  • Stay connected until access is revoked for offline_access.

Approve or Deny

Select Allow access to approve the request. Select Deny if you do not recognize the client or do not want to grant the requested access.

Grant write access only when the app needs to create or update records. For read-only reporting, dashboards, or search tools, read access is usually enough.

If you are unsure why an app needs write or offline access, deny the request and ask the app owner to explain the exact workflow before approving.

Scope Review

Before allowing access, ask:

  1. Which workspace will the app access?
  2. Which user is granting access?
  3. Does the app need read access only?
  4. Does it need to create or update records?
  5. Does it need to stay connected when you are offline?
  6. Who will revoke access when the app is no longer used?

Return to the app that started the authorization and try again. If the same error continues, check whether you are signed into the correct Agiled workspace and whether your role allows the requested access.

Also check whether pop-up blockers, stale browser sessions, or an expired authorization attempt interrupted the flow. Start again from the external app so the request parameters are fresh.

If consent repeatedly fails after signing in, try a private browser window with only the intended Agiled account and provider account signed in.

Revoke Access

If an app should no longer connect, remove or disconnect it from the relevant integration or API settings when available. After revoking access, ask the external app admin to remove stored tokens on their side too.

After revoking, test the external app so you know whether the connection was fully removed or whether another admin-level integration is still active.

Confirm The Connected Account

After consent succeeds, return to Agiled and confirm the connected provider account is the one that owns the data or calendar you need. A successful OAuth approval with the wrong Google, Microsoft, HubSpot, or Slack account can look connected while syncing the wrong workspace.

Run one low-risk sync, booking, notification, or import before relying on the connection for customer work.

On this page