Act‑as‑User (userId)
Purpose
userId
binds a run to a specific identity. That identity’s OAuth/API keys are used for all tool calls for the given integration. This determines which user’s permissions and data will be used when executing the run. Choose the user whose perspective should be used for the operation.
Behavior
Reuse: If you (or your AI Agent) provide a previously used
userId
, the stored OAuth tokens for that user are reused, and your agent can act on behalf of that user.Least privilege: Pick the user with the minimum required permissions.
Security: Treat
userId
as sensitive. Don’t expose it unnecessarily in logs or UI.Revocation: Tokens are revoked at the integration level; once re-authorized, the same
userId
can be reused.Audit trail: Reusing the same
userId
across runs preserves a consistent audit trail.
OAuth Flow
If a new identity is provided, or the user does not yet have the required OAuth scopes to fulfill the plan, an OAuth flow is triggered automatically to collect the missing scopes.
During this process, the system will return OAuth authentication links in the Server-Sent Events (SSE) stream. Your client (or AI Agent) is responsible for handling these links and surfacing them to the user to complete authorization.
Once the flow is completed, the tokens are stored and reused for subsequent runs tied to the same
userId
.
OAuth Token Lifetime & Refresh
TL;DR: “OAuth tokens are kept alive by toolregistry.ai until revoked. We keep tokens refreshed until the integration allows.”
What happens
Toolregistry.ai keeps OAuth tokens alive and refreshed for the selected userId
until you revoke them or the integration stops honoring refresh.
How it works
Auto-refresh: We rotate access tokens using the provider’s refresh token before expiry.
Until it can’t: Refresh continues until one of the following:
You revoke access (see Revocation).
The provider invalidates/rotates the refresh token (
invalid_grant
, etc.).Required scopes change and re-consent is needed.
Tenant/policy disables offline access or long-lived refresh.
Consent is withdrawn or the account is disabled.
Revocation
Tokens are revoked at the integration level. Once re-authorized, the same userId
can be reused.
To revoke:
Navigate to Integrations > Integration Users.
Enter the exact
userId
you want to revoke to search box - it will reveal the user.Confirm the action — access for that identity will be removed until re-authorization.

Last updated