Set up your own OAuth application for integrations to control scopes, enable additional integrations, or replace Langdock’s default OAuth client with your custom configuration.
Custom OAuth clients apply workspace-wide for the specific integration. All new connections will use your OAuth application once configured.
When you configure a custom OAuth client, Langdock routes all authentication flows through your OAuth application instead of the default Langdock client. This means:
Your branding (custom name and logo) appears in consent screens
Your tenant policies control user access and admin consent requirements
Your rate limits apply to API calls made by your users
1
Create OAuth App at Provider
Register a new OAuth application in your provider’s developer portal (Google Cloud Console, Microsoft Azure, etc.).Required Configuration:
Copy the exact redirect URL from Langdock’s integration settings
Select all required scopes shown in Langdock for that integration
Configure any tenant-specific settings (admin consent, allowlisting)
2
Gather Credentials
Note down the following from your OAuth app:
Client ID (always required)
Client Secret (always required)
Tenant ID or Domain (required for some providers like Microsoft)
3
Configure in Langdock
Navigate to Settings → Integrations and select your target integration.View the current configuration next to the integration and enable all required scopes in your own OAuth client. Scopes that are not added to your client will cause an insufficient scopes error.Close this screen, click on the integration, and in the OAuth client dropdown, select Configure your ownPaste your Client ID and Client Secret, and click Save
Some of our integrations can only be used when providing your own OAuth client. Details on how to connect them with Langdock are described in this section.
Are self-hosted or cloud-hosted accounts supported?
Only Cloud-hosted accounts are currently supported.
Is a paid ServiceNow plan required?
A paid ServiceNow account is required to create an application registry. View ServiceNow’s plans here.
Are any special account permissions / roles required?
Yes. To connect by OAuth, your systems administrator should set up the right configuration within your instance to connect any user using an OAuth connection. E.g. all users need the oauth_user role to be able to connect. Learn more about ServiceNow’s groups and permissions
Are there usage limits?
Yes. ServiceNow implements rate limiting to prevent excessive API usage. System administrators can configure rules that restrict the number of inbound REST API requests processed per hour. Learn more about ServiceNow’s usage limits.
Configuring your own OAuth client for Snowflake gives you control over authentication policies, token validity periods, and IP allowlisting within your Snowflake environment.
Show how to configure a Snowflake OAuth client
Required Information:
OAuth Redirect URL: Copy this from Langdock’s Snowflake integration settings page
Client ID: Generated by Snowflake after creating the security integration
Client Secret: Generated by Snowflake after creating the security integration
Authorization URL: Your Snowflake account’s authorization endpoint
The Redirect URL from Langdock must be provided in Snowflake, while the Client ID, Client Secret, and Authorization URL from Snowflake must be entered into Langdock’s integration settings.
If your Snowflake account has network policies or IP allowlisting enabled, you may need to whitelist Langdock’s static IP address to allow connections. See Static IP Configuration for details.
Replace <integration_name> with a descriptive name and <your_redirect_uri> with the OAuth Redirect URL from Step 1.
Run the query to create your new security integration in Snowflake.
Note: Adjust your OAUTH_REFRESH_TOKEN_VALIDITY value based on your security policies.
3
Retrieve Client ID and Client Secret
Show how to retrieve your Client ID, and Secret from Snowflake
Within the same workspace, run the following query: