Platform Docs

Using OAuth 2.0

While building your Clover app, you may want to access data about Clover merchants, such as their order history or current inventory. With Clover REST API, your app can easily access data about merchants and their businesses.

Considering the sensitivity of merchant data, we at Clover have implemented the OAuth 2.0 security framework. When a merchant selects and installs your app from the Clover App Market (in production environments), we use OAuth 2.0 to first secure the communication between your app and the merchant, and then give your app the desired access to merchant data.

OAuth in sandbox vs production

Our OAuth 2.0 documentation is created for use with the sandbox environment. To create the OAuth flow for apps on the Clover App Market (in production environments), simply replace https://sandbox.dev.clover.com/ with the correct regional base URL in your requests:

  • US & Canada: https://www.clover.com/
  • EU: https://eu.clover.com/

The Clover OAuth 2.0 flow

As shown in the figure below, there are four keys steps involved in the Clover OAuth 2.0 flow.

To start, let's define a few concepts used in the OAuth 2.0 flow:

  • Client ID: This ID uniquely identifies your app on the Clover App Market. This ID confirms that your app is participating in the OAuth 2.0 flow. Your client ID is the App ID value in your app's Settings page on the Developer Dashboard.
  • Client Secret: This ID is a secret key that is assigned to your app by Clover. Together, the client ID and client secret authenticate the identity of your app with the Clover server. Your client secret is the App Secret value on your app's Settings page. Do not share this key publicly.
  • Merchant: Clover merchants can be either one of two states: unauthorized or authorized
Merchant
URL

An unauthorized Merchant wants access to your app, but has not logged in to their Clover merchant account. Your app redirects this merchant to log in to their merchant account.

https://sandbox.dev.clover.com/oauth/authorize?client_id={APP_ID}

An authorized Merchant has logged in to their Clover merchant account. The Clover Server redirects this merchant to your app.

https://www.example.com/oauth_callback?merchant_id={MERCHANT_ID}&client_id={APP_ID}&code={AUTHORIZATION_CODE}

  • Authorization Code: An authorized merchant is redirected to your app along with an authorization code. With this code, the Clover server confirms that your request for merchant data has been authorized by the merchant.
https://sandbox.dev.clover.com/oauth/token?client_id={APP_ID}&client_secret={APP_SECRET}&code={AUTHORIZATION_CODE}
  • API Token: Your app uses the authorization code, client ID, and client secret to negotiate with the Clover server for an API token. With the API token, your app can make REST API calls and access merchant data.
{
   "access_token":"{API_TOKEN}"
}

Step 1: Request merchant authorization

When an unauthorized merchant selects and installs your app from the Clover App Market, redirect the merchant to log in to their Clover merchant account using the following URL format:

https://sandbox.dev.clover.com/oauth/authorize?client_id={APP_ID}&redirect_uri={CLIENT_REDIRECT_URL}

NOTE

If an unauthorized merchant navigates directly to your app URL without installing the app from the Clover App Market:

  • Redirect the merchant to log in to their Clover merchant account, and then
  • Ask the merchant to install your app from the Clover App Market

Clover provides several parameters to customize the merchant authorization redirect URL.

Parameter
Description

client_id

This ID uniquely identifies your app on the Clover App Market. The client_id parameter value is the App ID value in your app's Settings page on the Developer Dashboard.

client_ids (Optional)

If you are building an app for multiple Clover markets, your app receives a unique app ID for each Clover market. For such apps, set the client_ids parameter with a comma-separated list of app IDs.

merchant_id (Optional)

This ID uniquely identifies a merchant account or business. App users can own multiple merchant accounts and businesses. If an app user has multiple merchant accounts, the user is asked to select the desired merchant account as part of the OAuth 2.0 flow.

If you know the merchant account that the user will select, you can simply set the merchant_id parameter with the merchant ID of that account. This enables the user to skip the account selection step.

redirect_uri (Optional)

Once the merchant has logged in to their account, you can redirect them to a custom URL with the redirect_uri parameter.

response_type (Optional)

By default, the Clover server responds to merchant authorization requests by redirecting the merchant to your app along with an authorization code. For your app on the Clover App Market, receiving the authorization code is an important step in the OAuth 2.0 flow.

You can also build and publish client-based JavaScript and mobile apps on the Clover App Market. For such apps, if you set the value of the response_type parameter as token in the redirect URL, the Clover server directly sends you an API token along with redirecting the merchant to your app.

With this method, the API token from the Clover server is publicly accessible. We highly recommend that you use this method only for merchant-facing apps.

state (Optional)

To ensure that merchants are logging in to a legitimate redirect URL from your app, you can set the state parameter with any string value. In this case, if the Clover server response also includes the same state parameter value, this ensures:

  • A legitimate request has been made by your app
  • The Clover server has redirected the merchant to your app in response to the legitimate request

Step 2: Receive an authorization code

Once a merchant is authorized, the Clover server redirects the merchant to your app using the Site URL value on your app's Settings > Web Configuration page.

NOTE

If you have set the redirect_uri parameter to a custom location as part of the merchant authorization redirect URL, the server then redirects the merchant to the specified location.

The Clover server redirects the merchant to your app along with a set of parameters in the following URL format, which includes an authorization code:

https://www.example.com/oauth_callback?merchant_id={MERCHANT_ID}&client_id={APP_ID}&employee_id={EMPLOYEE_ID}&code={AUTHORIZATION_CODE}

With the authorization code, the Clover server confirms that your request for merchant data has been authorized by the merchant. You can use this code to further negotiate with the Clover server for an API token.

NOTE

Every time a merchant is redirected to your app, you can confirm whether the merchant has logged in to their Clover merchant account by checking for an authorization code in the redirect URL.

The following table lists the parameters in the merchant redirect URL from the Clover server to your app.

Parameter
Description

merchant_id

This ID uniquely identifies the Clover merchant account that has been authorized to use your app.

client_id

This ID uniquely identifies your app on the Clover App Market. This parameter confirms that your app is participating in the OAuth 2.0 flow and that the code parameter value is for the specified client_id parameter value.

code

With this authorization code, the Clover server confirms that your request for merchant data has been authorized by the merchant. You can use this code to further negotiate with the Clover server for an API token.

employee_id (Optional)

This ID uniquely identifies the employee from the merchant roster that has logged in to their account. You can create custom rules in your app based on the employee.

If a Clover customer support agent accesses your app on behalf of the merchant, the employee_id parameter is not part of the redirect URL.

Step 3: Request an API token

At this stage of the OAuth 2.0 flow, you exchange your authorization code for an API token. Send an API token request to the Clover server in the following URL format:

https://sandbox.dev.clover.com/oauth/token?client_id={APP_ID}&client_secret={APP_SECRET}&code={AUTHORIZATION_CODE}

NOTE

Since the API token request consists of sensitive information about your app, this request does not have CORS support. To successfully request an API token, send this request from your app server to the Clover server. When the Clover server responds to the request, retrieve the API token from your app server.

You must set all the parameters as listed in the following table.

Parameter
Description

client_id

This ID uniquely identifies your app on Clover App Market.

client_secret

This ID is a secret key that is assigned to your app by Clover. The client ID and client secret together authenticate the identity of your app with the Clover server when you are requesting for an API token.

The client_secret parameter value is the same as the App Secret value on your app's Settings page. Do not share this key publicly.

code

With this authorization code, the Clover server confirms that your request for merchant data has been authorized by the merchant. You can use this code to further negotiate with the Clover server for an API token.

Step 4: Receive an API token

In the final step, the Clover Server responds to your API token request with a JSON object in the following format:

{
   "access_token":"{API_TOKEN}"
}

NOTE

The API token has a lifespan of one year.

Using the Response Type Token method

All your apps on the Clover App Market undergo the four-step OAuth 2.0 flow to retrieve an API token from the Clover server. You can also build and publish client-based JavaScript and mobile apps on the Clover App Market. For these client-based apps, Clover provides you with the Response Type Token method to retrieve an API token as soon as the merchant is authorized.

To use the Response Type Token method:

  1. On your app's Settings > Web Configuration page, set the Default OAuth Response value to Token.
  2. In the merchant authorization redirect URL (step 1 of the OAuth 2.0 flow), set the value of the response_type parameter as token.

The Clover server directly sends you an API token and redirects the authorized merchant to your app using the following URL format:

http://example.com/javascript_app?&merchant_id={MERCHANT_ID}&client_id={APP_ID}&employee_id={EMPLOYEE_ID}#access_token={API_TOKEN}

WARNING

When you use the Response Type Token method, the API token from the Clover server is publicly accessible. We highly recommend that you use this method only for merchant-facing apps.


Using OAuth 2.0


Suggested Edits are limited on API Reference Pages

You can only suggest edits to Markdown body content, but not to the API spec.