After creating your security profile, you must authorize the application.
This process safe lists and authorizes your application to use Video Central on behalf of the user who authorizes the application. The application is limited to the scope selected when authorizing it. This allows the application to only use Video Central features that are both included within the authorized scope and within the set of permissions the authorizing user is granted. Changing the scope requires repeating the process below, however, changing the permissions of the authorizing user doesn't.
For production purposes, we recommend creating a dedicated Video Central account for your application to use. Make sure that an email address similar to
firstname.lastname@example.org exists for your company's domain and then create a Video Central account using that email address. The application's dedicated Video Central account should be granted the minimal permissions required to download reports (e.g., Reports: View Only).
Note: Sign in to Video Central before continuing the steps of this process.
The following steps safe list your application to access your Video Central accounts:
The authorization code is a one-time code created using your web browser. The code is used only for the first time your application requests a token (unless the authorizing user revokes consent).
To get the authorization code, you'll create a specific URL to use in your web browser. To complete this step, you'll need the following:
The URL uses the following format:
[YOUR_REDIRECT_ID](including the brackets) with your specific values from above and then open the URL in your web browser.
redirect_urithat you provided. In the browser address bar, the query string will have a suffix containing both the authorization code and the scope.
The authorization code will appear within the query string.
The code listed is the application authorization code. In the example above,
ANQCZiBAPweTtvCiAaaa is the code.
Note: If you remove the authorizing user's permissions to use reports, then the application will also have its permission to use reports revoked.
Please sign in to continueSign In