If your app is a mobile, single-page, or native desktop application, it can not safely store the client secret and is a low trust app. Therefore the app must use the auth flow with proof key for code exchange (PKCE) as shown in the diagram.
The following values for access and refresh tokens are dynamic and can change:
- Token expiration displays in the response body. Tokens created later can have different durations until they expire.
- Token lengths are not fixed.
Do not hard code access and refresh token expirations or lengths so that you can handle any future updates.
To create an access and refresh token pair using PKCE:
|1||Developer app||Generate a |
|2||Developer app||Redirect the merchant to |
|3||Merchant||Log in to the merchant Clover account and install the developer’s app from the Clover App Market.|
By installing the app, the merchant authorizes the app to access the merchant’s information that the app requires.
|4||Clover backend||Redirect the merchant to the developer’s app with an authorization code.|
|5||Developer app||Request an access and refresh token pair.|
Send a POST request to
|6||Clover backend||Return an access and refresh token pair.|
Sample response body
Note: The response body indicates when the access and refresh tokens expire. The expiration dates are represented as unix timestamps.
See Sandbox and production environments URLs about which URLs to use in the requests.
Updated 25 days ago