Skip to content

OAuth2 Authentication

Solo includes an integrated OAuth2 engine for retrieving, storing, and automatically renewing access tokens, simplifying authentication procedures during testing.


You can configure authentication once at the request or collection level. Solo manages the following phases:

  1. Automatic Retrieval: If the token is missing or expired, a request is sent to the authorization server before the API call.
  2. Transparent Injection: The obtained token is automatically inserted into the Authorization: Bearer <token> header.
  3. Silent Refresh: In case of an authorization error, Solo attempts to use the refresh token (if available) to obtain a new key and repeat the original call.

  1. Open the Auth tab: Select the “Auth” tab in the request.

  2. Enable the Service: Activate the “Enable Authentication” toggle.

  3. Enter Parameters: Fill in the necessary fields (Token URL, Client ID, Client Secret, etc.). You can use {{ variable }} placeholders.

  4. Response Mapping: Define the path (JSON Path) to find the token in the server’s response (e.g., access_token).

  5. Send: Click “Send” on the main request. Token retrieval is handled automatically before the data is sent.


Solo stores Client Secrets and tokens locally using secure encryption algorithms, avoiding plaintext storage in configuration files.

You can customize the parameters sent in the token request (Grant Type, Scope, custom parameters) via a dedicated configuration table.


FieldDescriptionVariable Support
Token URLAuthorization server endpoint.Yes
Token PathJSON path for token extraction (e.g., data.token).No
Grant TypeAuthorization type (e.g., client_credentials, password).Yes
Client ID/SecretApplication credentials.Yes
TemplateTable for adding custom parameters.Yes