Most major APIs use OAuth for authorization—GitHub, Google, Stripe, Slack, and hundreds more. Toolcog handles OAuth flows automatically, so you just click a link and authorize.
Toolcog supports OAuth for any service that uses standard OAuth 2.0. Common examples:
If an API uses OAuth 2.0, Toolcog can handle it.
When AI needs OAuth authorization:
AI provides a connect URL
https://toolcog.com/connect?owner={owner}&bridge={bridge}&scope={scope}You click and authenticate — Sign in to the service if needed
You grant permission — The service’s consent screen shows what access you’re granting
Toolcog stores the token — Encrypted in your vault
AI continues working — With the newly authorized access
All OAuth flows use PKCE (Proof Key for Code Exchange):
This prevents authorization code interception attacks.
OAuth tokens are stored with envelope encryption: your session key derives a KEK, which unwraps your vault DEK, which decrypts the token. The token only exists in plaintext during the moment of API execution, then is immediately discarded.
OAuth access tokens expire—typically in an hour. Toolcog handles this automatically:
You never see token refresh happening. It just works.
Sometimes refresh tokens expire too (varies by service). When this happens:
OAuth scopes define what access you’re granting. Toolcog requests minimal scopes:
If you first authorize read access, then later need write access:
Your scopes expand only when you explicitly authorize.
If your authorization becomes invalid (token expired, access revoked on the service side):
You can connect multiple accounts for the same service:
When AI needs to use a specific account, it uses the credentials associated with the current context.
For enterprise or self-hosted scenarios, you can use your own OAuth applications:
This gives you full control over the OAuth configuration.