You can access the manage application interface by selecting Manage application from the Actions dropdown menu located to the right of an application in the All applications tab of the third-party applications user interface. Here, you can review and edit an application’s registration such as its name, description, logo, authorization grant types, and application discovery settings.
The Manage application interface is only available to permissioned members of the managing Organization for a third-party application.
The organization that the user creates an application in is deemed the managing organization of the application, and anyone in the organization who has the Manage OAuth 2.0 clients permission can manage the third-party application.
The following is an example of a Manage application page shown for an example application:
In the Application details section, you can edit the application name, the optional description, and logo.
In the Client type section, you can view the Client ID and edit the client type for your application. Client type refers to an OAuth2 standard regarding whether a client application can securely store a secret.
The two options for client type are:
code_verifier
and code_challenge
parameters is required. Client credentials grant is not supported.For more information about these client types, see the documentation on writing OAuth2 clients.
Native or single-page applications, such as mobile apps, are distributed to users for deployment. Thus, the application binaries are available and can be disassembled to extract a client secret. The client secret could then be used to impersonate an authorized user in an attack. Proof Key for Code Exchange (PKCE) is used to prevent such attacks.
In the Authorization grant types section, you will see the grant types supported by the client type chosen in the previous step. If you choose to enable the Authorization code grant, you will be asked to specify at least one redirect URL.
If you choose to enable the Client credentials grant (this will only be available to confidential clients), a service user will be created for the application. The service user can be permissioned to access Palantir resources for requests on behalf of the application.
In the Application discovery section, you can search for and select which organizations can discover and enable the application.
Danger zone actions are located at the bottom of the Manage application page.
To permanently prevent users from authorizing a third-party application, the application’s registration can be revoked: that is, deleted from the platform.
This is considered a “danger zone action” as it is irrevocable and will render the third-party application unusable by all users unless the application is re-registered. If an application is re-registered, users will have to reauthorize the third-party application since Gotham treats the re-registration as a new registration.
Learn how to delete an application's registration from the danger zone actions documentation.