What is OAuth? Why it matters for your business

Two colleagues at a desk reviewing a long list of authorised apps on a laptop screen, one pointing at the screen, the other writing notes
TL;DR

OAuth is the authorisation standard that lets one app act on behalf of a user in another app, without sharing the password. Every 'sign in with Google' or 'connect Slack' button is an OAuth flow. The structural design is more secure than sharing passwords or static API keys, because grants are scoped and revocable. The structural risk for UK SMEs is governance: grants accumulate across tools, leaver checklists almost never trigger revocation, and over-scoped grants let apps see far more than they need. The fix is a quarterly audit, a leaver step, and scope review at onboarding.

Key takeaways

- OAuth is the authorisation standard that lets one app act on behalf of a user in another app, without sharing the password. The user grants permission via a one-click flow, the app receives a token, and the token can be revoked at any time without changing the user's password. - OAuth is structurally safer than API keys for user-acting integrations because grants are scoped, revocable per user, and tied to consent rather than to a static secret. The Salesloft-Drift breach in 2025 showed the failure mode that remains: stolen tokens bypass passwords and multi-factor authentication entirely until the customer revokes them. - The biggest SME failure mode is the leaving-employee problem. HR disables the account and resets the password, but the OAuth grants the leaver authorised remain valid because they are issued per app per user and there is no single revoke-everything button. Tools continue to act in the leaver's name, sometimes for years. - Over-scoped grants are common. Apps request "read all email" when they only need "read calendar" because broad scope is easier to ship. A 2025 review found 18.5% of OAuth implementations request scopes beyond what the use case needs. - The 2026 SME governance pattern has three steps. Quarterly audit of grants in Google Workspace, Microsoft Entra ID, and Slack admin consoles. A leaver step that revokes all OAuth grants for the departing user. Scope review when a new tool first connects, with the IT lead pushing back on excessive requests before any user authorises.

A 30-staff financial advisory firm I worked with ran an internal audit of their OAuth grants last quarter. The IT lead exported the list of third-party apps authorised against the firm’s Google Workspace and Microsoft 365 accounts. The total came back at 412 active grants across the team. Forty-seven of those grants belonged to staff who had left the firm between 2023 and 2025. Three belonged to a contractor who had finished an engagement eighteen months earlier, and those three carried admin scope on the firm’s Google Drive. None of the leaver processes over the previous two years had triggered an OAuth revocation step.

The financial damage was zero, as far as anyone could tell from the access logs. The regulatory exposure was real. The compliance officer treated the finding as Schedule 7 material under the FCA SYSC operational-resilience rules. The cleanup took the IT lead and an external contractor a week of focused work. The owner’s reaction was the right one. OAuth had been doing exactly what it was designed to do, on every “sign in with Google” button across the firm, and nobody had been responsible for governing the trail it left behind.

What is OAuth?

OAuth is the authorisation standard that lets one application act on behalf of a user in another application, without sharing the password. The user clicks a button such as “Sign in with Google” or “Connect Slack”, a consent screen lists the specific permissions the app is requesting, and the user approves. The app receives a token from the identity provider, not a password, and uses that token to make scoped requests. The token can be revoked from the provider’s settings at any time, instantly, without the user changing their password or affecting any other connected app.

OAuth 2.0 is the dominant version in 2026 and is documented in IETF RFC 6749. OAuth 2.1, currently in draft, consolidates a decade of security best-practice guidance into a single specification. The mental model worth holding is that OAuth is delegation, not authentication. The user is delegating a narrow capability to a specific application, with scope, expiry, and a single-click revoke. Passwords and API keys do not offer any of those three properties, which is why OAuth has become the default for user-facing integrations.

Why does it matter for your business?

It matters because OAuth grants accumulate quietly across a firm, and almost nothing in a normal business process touches them. A 30-staff firm running Google Workspace, Microsoft 365, Slack, a CRM, and the usual marketing and finance tools will commonly carry 200 to 600 active OAuth grants across the team. Each one was authorised by an individual employee, in the moment, often inside the first week of using a new tool, and almost nobody can tell you a year later which ones are still in use or what scope they hold. That is fine until someone leaves, until a tool gets breached, or until a compliance officer asks for a list.

The Salesloft-Drift breach in August 2025 showed the modern shape of the risk. Attackers compromised Salesloft’s infrastructure, stole the OAuth tokens it held for its Salesforce integration, and used those tokens to reach Salesforce data across more than 700 customer organisations. The tokens were legitimate. They bypassed passwords and multi-factor authentication entirely, because that is what OAuth tokens do once issued. The customers who recovered fastest were the ones who already knew which OAuth grants their organisation held, because they could revoke the right one in minutes. The customers without an inventory took days to work out what to disconnect.

Where will you actually meet it?

You meet OAuth in five places any UK SME owner will recognise. Google Workspace OAuth is the canonical “sign in with Google” and the way SaaS tools connect to Drive, Calendar, and Gmail. Microsoft Entra ID handles the same role across the M365 stack, with admin-consent and verified-publisher controls in the admin centre. Slack OAuth runs every app in the Slack marketplace, with the workspace admin able to see scope and audit installations. GitHub OAuth governs developer-tool access to repositories. Stripe Connect uses OAuth so a marketplace platform can manage seller payouts without holding seller credentials. The differences mainly matter at admin level, not at integration code itself.

The leaving-employee problem is where SMEs commonly get hurt, and it is structural rather than negligent. When an employee leaves, account deactivation and password rotation usually happen on the day. OAuth revocation rarely does, because grants are scoped per app per user and there is no single button in any provider that says “revoke everything this user ever authorised.” The result is a long tail of valid tokens still acting in the leaver’s name, against tools the firm may not know are connected. NCSC guidance treats this as a baseline control, ICO accountability under UK GDPR Article 5(2) expects you to demonstrate it, and FCA-regulated firms must track it under SYSC.

When to ask vs when to ignore

The threshold to take OAuth governance seriously is the moment a firm has more than ten staff, any regulatory exposure, or any tool that touches personal data. At that point the 2026 pattern is straightforward and cheap. Run a quarterly OAuth audit by exporting the grants list from Google Workspace, Microsoft Entra ID, and Slack, and review by app and user. Add an OAuth revocation step to the leaver checklist, alongside account deactivation and password reset. Review scope requests when a new tool connects for the first time, and push back on excessive scopes before any user authorises. The whole programme is a spreadsheet, a checklist line, and an hour or two a quarter, owned by one named person.

You can skip the formal programme if you are a one or two-person firm with no personal data flowing through your stack and a handful of tools you set up yourself. At that scale, a single OAuth review when you change roles or wind a tool down is enough. The mistake is the assumption that low headcount means low exposure. A 5-staff firm running a CRM with read-write access to client emails, a marketing tool with broad Drive scope, and a contractor’s old Slack grant carries the same shape of risk a 30-staff firm has, just on a smaller surface. The procurement question worth asking every vendor is the same. What scopes does your app request and why, how long are the tokens valid, and how do we revoke for a single user from our admin console rather than a support ticket? Vendors with mature OAuth handling answer cleanly. Those who deflect are giving you procurement information, just not the kind they intended.

An API key is the closest sibling concept and the useful contrast. API keys authenticate an application to a vendor as a single static credential, with no per-user scope and no easy per-user revocation. OAuth tokens authenticate an application acting as a specific user, with scope, expiry, and a single-click revoke. Both have legitimate roles, API keys for backend service-to-service calls, OAuth for any integration acting on behalf of a person. Knowing which one a vendor is offering is the first procurement question after “do you have an API.”

An API is the interface itself, the set of endpoints a vendor exposes for software-to-software calls. OAuth is one of the authentication models that sits in front of that interface when the call is acting as a user. A webhook is the inverse direction, the vendor pushing events to a URL you provide, often secured with a signing secret rather than OAuth. MCP is the 2026 standard for letting AI agents discover and call tools, and it leans on OAuth for any user-acting flow inside that pattern.

OAuth is the quiet workhorse of every modern tool integration, and the failures are governance failures rather than protocol failures. If you want a second pair of eyes on your firm’s OAuth inventory or what to ask your vendors next, book a conversation.

Sources

IETF (2012). RFC 6749, the OAuth 2.0 authorization framework. The canonical specification cited as the protocol definition. https://datatracker.ietf.org/doc/html/rfc6749 IETF (2026). OAuth 2.1 draft, the consolidation of best-current-practice security guidance into a single specification. https://datatracker.ietf.org/doc/draft-ietf-oauth-v2-1/ National Cyber Security Centre (2025). Small Business Guide. UK government guidance on identity and access management, cited for the recommendation to deploy OAuth alongside multi-factor authentication. https://www.ncsc.gov.uk/collection/small-business-guide Information Commissioner's Office (2024). Accountability and governance guidance under the UK GDPR. Cited for the Article 5(2) accountability principle that requires demonstrable controls over third-party data access. https://ico.org.uk/for-organisations/uk-gdpr-guidance-and-resources/accountability-and-governance/guide-to-accountability-and-governance/ Financial Conduct Authority (2026). Senior Management Arrangements, Systems and Controls sourcebook (SYSC). Cited for the operational-resilience and governance requirements applicable to FCA-regulated SMEs handling personal data through third-party integrations. https://www.handbook.fca.org.uk/handbook/SYSC/ Google (2026). Google Identity OAuth 2.0 documentation. Cited as the canonical implementation reference for the "sign in with Google" and Google Workspace integration flow. https://developers.google.com/identity/protocols/oauth2 Microsoft (2026). Microsoft identity platform OAuth 2.0 authorization code flow. The canonical Entra ID reference for M365 integrations and the consent and admin-approval governance model. https://learn.microsoft.com/en-us/entra/identity-platform/v2-oauth2-auth-code-flow Slack (2026). Installing apps with OAuth. Cited as the workspace-admin model for app installation, scope review, and audit logging in a SaaS collaboration tool. https://docs.slack.dev/authentication/installing-with-oauth Stripe (2026). Stripe Connect OAuth reference. Cited for the marketplace and partner-platform OAuth pattern in financial integrations. https://docs.stripe.com/connect/oauth-reference Obsidian Security (2025). The Salesloft-Drift breach analysis. Cited as the named 2025 incident in which stolen OAuth tokens were used to access Salesforce data across hundreds of customer organisations, bypassing passwords and multi-factor authentication. https://www.obsidiansecurity.com/blog/oauth-vulnerabilities-security-teams

Frequently asked questions

What is the difference between OAuth and an API key?

An API key authenticates an application to a vendor. An OAuth token authenticates an application acting as a specific user. The difference shows up at offboarding, at scope, and at compromise. If a user leaves, their OAuth grants can be revoked per app without breaking other integrations. If a vendor misbehaves, the user can revoke that single grant without changing their password. API keys offer none of these properties, which is why modern user-facing integrations have moved to OAuth and API keys are now mainly used for backend service-to-service calls.

Do I need to do anything if my firm only has five staff?

At five staff and a small tool stack the immediate risk is low, but the habit is what compounds. Spend twenty minutes once a quarter in the Google Workspace or Microsoft 365 admin console reviewing which apps have been authorised and what scope they hold, and add one line to your leaver checklist that says "revoke all OAuth grants for this user." That is the difference between a manageable inventory at twenty staff and the 400-grant cleanup that catches firms once they cross fifty.

What should I ask a vendor about their OAuth integration before signing?

Three questions. What scopes does your app request, and why does each one map to a feature you actually use? How short are the access tokens, and do refresh tokens rotate? How do we revoke your app's access for a single user when they leave, and is the action available from our admin console rather than a support ticket? Vendors who answer cleanly in two minutes have built OAuth as part of their security posture. Vendors who deflect are signalling that scope and revocation are not a priority, which is procurement information either way.

This post is general information and education only, not legal, regulatory, financial, or other professional advice. Regulations evolve, fee benchmarks shift, and every situation is different, so please take qualified professional advice before acting on anything you read here. See the Terms of Use for the full position.

Ready to talk it through?

Book a free 30 minute conversation. No pitch, no pressure, just a useful chat about where AI fits in your business.

Book a conversation

Related reading

If any of this sounds familiar, let's talk.

The next step is a conversation. No pitch, no pressure. Just an honest discussion about where you are and whether I can help.

Book a conversation