![](https://prod3-sprcdn-assets.sprinklr.com/160103/23a88fd1-0894-49c6-8502-b5eb2ba88cfa-370361475/Teya_HC_banner.jpg)
Welcome to Teya's help centre
Teya Developer
Articles
What is the difference between refresh and access tokens?
Access tokens are temporary credentials that grant access to a protected resource, while refresh tokens are used to obtain new access tokens once the current ones expire.When a user logs in to their Teya account and authorizes an application, they are granted an access token and a refresh token. The
What is a redirect URL?
A redirect URL is used in OAuth 2.0 to redirect users to an application after they grant permission to access their account. Specifically, this URL is used in the authorization code flow with PKCE, which is an enhanced security method to prevent authorization code interception attacks. In this flow,
Teya ID for Partners
Introduction to Teya IDTeya ID identifies and authenticates all users across the Teya ecosystem. It ensures:Identification: Using Teya ID, you can identify any user interacting with our products and recognize returning users.Authentication: Teya ID is the only user authentication provider via single
What should I do if I've forgotten my password?
If you've forgotten your password, don't worry. You can easily reset it by clicking on “Forgot your password?” on the portal login after you’ve entered your email address. We'll send you an email with instructions on how to reset your password. If you're still having trouble acce
How do the authentication and authorisation of API endpoints work (e.g., API keys, OAuth, etc.)?
At Teya, we use the OAuth 2.0 protocol for authentication, which is a widely adopted industry-standard protocol for secure authorization. The OAuth 2.0 protocol enables client applications to access protected resources on behalf of a resource owner, such as a user or device.To use OAuth 2.0 with our
Where can I find the API documentation?
Our API documentation can be easily accessed by visiting our developer portal. You can find it on the homepage or by clicking on the "Docs & Guides" tab on the navigation bar. If you are unsure about what you are looking for, please do not hesitate to contact us through the "Conta
What is OAuth and why it’s being used?
As mentioned in the previous question, we use the OAuth 2.0 protocol for the authentication and authorization of our endpoints. OAuth is an open standard for authorization that allows third-party applications to access a user's data without the need for the user's credentials. In simpler t
How do I get API keys or tokens?
To obtain API keys or tokens, you first need to apply for an account on our platform. Once your account is approved, you can create OAuth applications which will provide you with client IDs and client secrets. These credentials will enable you to make API requests and access resources on behalf of y
What are the best practices for handling errors and retries when working with the APIs?
Familiarize yourself with the API's error response format and codes. Implement graceful error handling by retrying failed requests with exponential backoff and handling specific errors accordingly. Monitor and log errors to identify patterns and improve your application's stability and use