If your Connected Users represent accounts, organizations, or some other group of users in your platform, then you may want to control the permissions of the credentials and configurations within that user to only the set that an authenticated user of your application should have access to. By default, a Paragon User Token grants access to all credentials and configurations within a Connected User (identified by theDocumentation Index
Fetch the complete documentation index at: https://docs.useparagon.com/llms.txt
Use this file to discover all available pages before exploring further.
sub field in the JWT).

Usage
The claim for JWT Permissions is calledurn:useparagon:connect:permissions and is structured as an object with keys of Scopes (i.e. what to scope a group of permissions/rules to) and values of Permissions (i.e. visibility of specific credentials or configurations and the types of operations that are allowed).
Here are some examples of token types that are expressible with JWT Permissions:
Claims passed in the JWT are not persisted or saved in any way. They are only used and evaluated for the current API request and should be included with every token that requires permissions control.
JWT Scopes
The following scopes can be used to assign permissions and rules. These scopes are ordered from least specific to most specific. Permissions designated at more specific scopes will override those inherited from less specific scopes.| Scope | Description |
|---|---|
| integration:* | All integrations |
| integration:[name] | An integration matching a name of [name] (as passed to
paragon.connect ) |
| credential:* | All credentials belonging to an integration |
| credential:[uuid] | All credentials matching an ID of [uuid] |
| configuration:* | All configurations belonging to a credential |
| configuration:ext:[id] | All configurations matching an External ID of [id] |
JWT Permissions
The following permissions can be used to configure API capabilities for a Paragon User Token. These permissions can apply to any of the scopes listed above. Permissions must be specified as an array, or as a Boolean interpreted astrue = Allow All, false = Deny All.
| Permission | Description |
|---|---|
| credential:write | Connect a new credential, reconnect an existing credential, or disconnect an existing credential |
| config:write | Create, modify, or destroy a configuration |
| settings:read | Read User Settings and Workflow Enablement |
| settings:write | Write and read User Settings and Workflow Enablements |
| metadata:read | Read User Metadata |
| metadata:write | Write and read User Metadata |
| proxy-api | Send requests to the Proxy API |
| events | Send App Events |
| workflows | Send Workflow Request triggers |