Skip to main content

ClickPoint Authentication Tab

Use Basic, Digest, Bearer Token, and OAuth 2.0 authentication types in the ClickPoint Authentication Tab.

Chris Arenas avatar
Written by Chris Arenas
Updated over 2 weeks ago

Overview

The ClickPoint Authentication Tab in LeadExec allows you to configure various authentication methods to secure the delivery of leads to ClickPoint systems. Depending on the client's requirements, you can set up Basic, Digest, Bearer Token, or OAuth 2.0 authentication. This ensures that only authorized systems can receive lead data.

Key Functionality

  • Basic Authentication: Utilizes a username and password for authentication.

  • Digest Authentication: Employs a hashed password for more secure authentication.

  • Bearer Token Authentication: Uses a token provided by the client to authenticate requests.

  • OAuth 2.0 Authentication: Provides the ability to authenticate with an OAuth server using Client Credentials or Password. Here you will set the TOKEN URL, select the required Grant Type and input the credentials supplied by the client.

How to Use This Feature

  1. Navigate to the Authentication Tab
    In your LeadExec account, go to the ClickPoint Integration section and select the Authentication tab.

  2. Select the Authentication Method
    Choose the appropriate authentication method based on the client's specifications:

    • Basic Authentication: Enter the username and password provided by the client.

    • Digest Authentication: Input the username and password as supplied by the client.

    • Bearer Token Authentication: Enter the token prefix and the token itself as provided by the client.

    • OAuth 2.0 Authentication: Configure the following settings:

      • Token URL: Enter the URL where the token is requested.

      • Grant Type: Select the required grant type (Client Credentials or Password).

      • Client ID: Input the client ID provided.

      • Client Secret: Enter the client secret provided.

  3. Save Your Settings
    After configuring the authentication method, click Save to apply the settings.

Best Practices

  • Client Documentation: Always refer to the client's technical documentation to ensure the correct authentication method and credentials are used.

  • Secure Storage: Store all authentication credentials securely and avoid sharing them unnecessarily.

  • Testing: Test the authentication setup in a sandbox environment before applying it to production to ensure proper functionality.

Troubleshooting

  • Authentication Failures: If authentication fails, verify that the credentials are correct and that the selected authentication method matches the client's requirements.

  • Token Expiry: For OAuth 2.0, ensure that the token has not expired and that the refresh token is used appropriately.

  • Access Denied: If access is denied, check the permissions associated with the provided credentials and ensure they have the necessary access rights.

Next article: Field Mappings Tab >

Did this answer your question?