OAuth grants are permissions that allow one application to access data or perform actions in another application on behalf of a user.
They are created when a user connects one app to another.
OAuth makes integrations easy.
Click “Connect,” approve access, and the apps start working together.
What’s less obvious is what gets granted:
Once granted, that access often continues indefinitely.
It does not depend on a user logging in again.
An employee connects a note-taking tool to their Google Workspace account.
They approve:
The integration works.
Months later:
The access is still active.
That is an OAuth grant.
OAuth grants are created when:
They are designed to be quick and user-driven.
That is what makes them easy to create and hard to track.
OAuth operates outside traditional identity workflows.
Your IDP may control login.
It does not fully control what users authorize after login.
OAuth grants can introduce:
The risk is not just the app.
It is the access the app retains over time.
You need to treat OAuth like any other access.
That means:
OAuth grants are a direct contributor to effective access.
They create access paths that are:
If you don’t account for OAuth, you don’t see the full picture.
An OAuth grant is permission given by a user that allows one application to access another system on their behalf.
Some do, but many persist until they are explicitly revoked.
They can provide long-term access to data and systems without ongoing visibility or review.
Not fully. They are typically managed within the application environment itself.
By identifying connected apps, reviewing permissions, and monitoring usage across systems.
YeshID surfaces OAuth grants alongside other access.
So you can:
OAuth grants are easy to create and easy to forget.
But they are still access.