Authentication Flow Patterns

Overview

Authentication flow choices determine the security posture and operability of your integration landscape.

This guide focuses on practical flow selection and controls rather than protocol theory.

Consensus Best Practices

Flow Selection Matrix

Client Credentials

Use when machine-to-machine access is required and no user context is needed.

Typical uses:

JWT Bearer / Certificate-Based Server Auth

Use when stronger key-management posture is required and centralized key rotation is available.

User-Delegated OAuth (Auth Code)

Use when an end user must explicitly authorize third-party access and user-level permissions must be respected.

Salesforce -> External System

Recommended pattern:

External System -> Salesforce

Recommended pattern:

Operational Controls

Common Failure Modes