azp
rather than client_id
. You can learn more about the differences by reading Access Token Profiles.
HS256,
RS256,
or PS256
.
The most secure practice, and our recommendation, is to use RS256. Some of the reasons are:
batch:upload
, read:timesheets
, create:timesheets
, delete:timesheets
, and approve:timesheets
. Also add an additional scope: batch:upload
.
batch:upload
scope because that is all that is required by the cron job. However, for the sake of completeness, we are adding the necessary scopes which will be required by future applications.Timesheets Import Job
.
For the cron job, you will need a Machine-to-Machine Application. The test application that was generated when the API was created was automatically configured as a Machine-to-Machine Application.
Authorized
. If it does not indicate that the application is authorized, simply toggle the value of the switch from Unauthorized
to Authorized
.
You will also need to specify which scopes will be included in access tokens that are issued to the application when the application authorizes with Auth0.
Expand the settings for the application by clicking on the down arrow to the far right, and you will see the list of available scopes. The cron job will only require the batch:upload
scope as it will simply create new timesheets based on the timesheet entries in the external system.
Once you have selected the batch:upload
scope, save the settings by clicking the Update button.