Applications must ask the permission to access, modify or delete data.
Applications can request permissions on the following items:
- Photos/video/docs: permissions for photos/videos/docs posted.
- Articles: permissions for articles.
- Contact: permissions on the contacts.
- Profile: permissions on the user's profile.
read: grants read-only access to user's items, even private.
write: permits the modification of the user's items (and also grants
delete: permits the deletion of the user's items (and also grants
Request which permissions?
Permissions your application must request depend on the API methods you intend to use (this is indicated for each method.) Users will decide whether or not to grant permissions to your application. Don't request permissions that aren't used or don't make sense.
How to request permission?
A permission is requested on an authorization web page
Build a connection link
A connection URL is built like this:
[api_key]: your API key.
[api_sig]: this request signature built using your secret.
[perm_doc]: the requested permission for photos/videos/docs. (read/write/delete).
[perm_blog]: the requested permission for the blog. (read/write/delete).
[perm_post]: the requested permission for articles. (read/write/delete).
[perm_network]: the requested permission for the contacts (read/write/delete).
[perm_profile]: the requested permission for the user's profile (read/write).
For example, here is an authorization link that requests permission to modify photos/videos/docs:
Redirect the user to the page above to obtain the requested permissions.
Link of connection with a frob
In the case of an authentication request for a desktop application, a
frob parameter will have to be added.
This page presents the user with the following information:
- The name of your application and its optional subtitle.
- The application description in the user's language if available.
- The name of the application developer
- The website URL, when filled in.
- Permissions requested by the application
Once the application is authorized, it will be added to the list of authorized applications in the user's account settings.
Check granted permissions
Your application can request new permissions at any time by providing the user with a new connection link.