Skip to main content

Documentation Index

Fetch the complete documentation index at: https://docs.langdock.com/llms.txt

Use this file to discover all available pages before exploring further.

Custom OAuth clients apply workspace-wide for the specific integration. All new connections will use your OAuth application once configured.

How Custom OAuth Works

When you configure a custom OAuth client, Langdock routes all authentication flows through your OAuth application instead of the default Langdock client. This means:
  • Your branding (custom name and logo) appears in consent screens
  • Your tenant policies control user access and admin consent requirements
  • Your rate limits apply to API calls made by your users
1

Create OAuth App at Provider

Register a new OAuth application in your provider’s developer portal (Google Cloud Console, Microsoft Azure, etc.).Required Configuration:
  • Copy the exact redirect URL from Langdock’s integration settings
  • Select all required scopes shown in Langdock for that integration
  • Configure any tenant-specific settings (admin consent, allowlisting)
2

Gather Credentials

Note down the following from your OAuth app:
  • Client ID (always required)
  • Client secret (required for most integrations)
  • Tenant ID (optional, shown for Microsoft integrations only)
3

Configure in Langdock

Navigate to Workspace settings → Integrations and scroll to the Bring your own OAuth Client section. You will see a list of OAuth integrations, each showing its current client status.Byo Oauth 1 PnDepending on the integration’s current state, do one of the following:
  • If the integration has a Langdock client available, open the dropdown and select Your client to open the configuration dialog.
  • If no Langdock client exists and no custom client is configured, click the Configure button.
  • If no Langdock client exists and your custom client is already configured, you will see Your client displayed alongside an Edit button. Click Edit to modify your configuration. Byo Oauth 2 Pn
In the configuration dialog, copy the Redirect URL into your OAuth app and review the Scopes section. Make sure all listed scopes are enabled in your OAuth app — missing scopes will cause an insufficient scopes error. You can copy all scopes at once using the copy button.Enter your Client ID and Client secret (and Tenant ID if prompted for Microsoft integrations), then click Save.
New connections will immediately use your OAuth client and will only work if the credentials are valid. Existing connections continue working until their access tokens expire.
4

Test Authentication

Have a user connect their account to verify:
  • Consent screen shows your client
  • Required scopes are granted
  • Data access works as expected through actions

Integration Settings Interface

The configuration dialog contains the following sections:
A read-only field displaying the redirect URL your OAuth app must use. Click the copy button to copy it exactly. The URL format is:
https://app.langdock.com/api/integrations/{integration-id}/callback
The redirect URL must match exactly. Any mismatch will cause redirect_uri_mismatch errors. The exact domain depends on your Langdock deployment — always copy the redirect URL from the dialog rather than constructing it manually.

Switching Back to Langdock’s Client

If you want to stop using your custom client and revert to Langdock’s default:
  1. Open the dropdown next to the integration and select Langdock client.
  2. Confirm the switch in the dialog.
New connections will use Langdock’s client going forward. Existing connections made with your custom client continue working until their access tokens expire.

Common Configuration Errors

Cause: Redirect URL doesn’t match exactly between Langdock and your OAuth appSolution:
  • Copy the redirect URL from Langdock exactly
  • Check for trailing slashes or protocol mismatches
  • Verify you’re configuring the correct environment
Cause: Client ID or Client secret is incorrectSolution:
  • Double-check credentials from your OAuth app
  • Ensure no extra spaces or characters
  • Verify the client is enabled in your provider’s console
Cause: Missing required scopes in your OAuth appSolution:
  • Add all scopes shown in Langdock to your OAuth app
  • Users may need to reconnect after adding scopes
  • Verify scope names match exactly (case-sensitive)

Integrations Requiring Your Own OAuth Client

Some of our integrations can only be used when providing your own OAuth client. Details on how to connect them with Langdock are described in this section.

ServiceNow

Snowflake

Configuring your own OAuth client for Snowflake gives you control over authentication policies, token validity periods, and IP allowlisting within your Snowflake environment.