You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
feat: embed default public client ID for zero-config platform commands
Sandbox, Account Manager, and SLAS commands now work without requiring
a pre-configured client ID. The CLI falls back to a built-in public
client for implicit OAuth flows (browser-based login) when no client
ID is configured.
Embed a default public client ID for implicit OAuth flows. Account Manager, Sandbox, and SLAS commands now work without requiring a pre-configured client ID — the CLI will automatically use a built-in public client for browser-based authentication.
Copy file name to clipboardExpand all lines: docs/cli/account-manager.md
+7-12Lines changed: 7 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -16,32 +16,27 @@ These flags are available on all Account Manager commands:
16
16
17
17
## Authentication
18
18
19
-
Account Manager commands require an API client or can be executed through an implicit workflow that seamlessly handles user authentication and associated flows.
19
+
Account Manager commands work out of the box using the CLI's built-in public client, which authenticates via browser login (implicit flow). No API client configuration is required for interactive use.
20
20
21
-
### Required Configuration
22
-
23
-
| Flag | Environment Variable | Description |
24
-
|------|---------------------|-------------|
25
-
|`--client-id`|`SFCC_CLIENT_ID`| OAuth client ID for Account Manager |
26
-
|`--client-secret`|`SFCC_CLIENT_SECRET`| OAuth client secret for Account Manager |
21
+
For automation or CI/CD, you can provide your own API client credentials.
27
22
28
23
### Required Roles
29
24
30
25
| Auth Method | Role | Configured On |
31
26
|-------------|------|---------------|
27
+
| Built-in client (default) | Uses your user account's roles | Your user account |
32
28
| Client Credentials |`User Administrator` or higher | The API client |
33
29
34
-
User authentication is handled via the implicit flow, utilizing the access rights granted to the user.
Copy file name to clipboardExpand all lines: docs/cli/sandbox.md
+10-10Lines changed: 10 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -37,30 +37,30 @@ These flags are available on all sandbox commands:
37
37
38
38
## Authentication
39
39
40
-
Sandbox commands require an Account Manager API Client.
40
+
Sandbox commands work out of the box using the CLI's built-in public client, which authenticates via browser login (implicit flow). No API client configuration is required for interactive use.
41
+
42
+
For automation or CI/CD, you can provide your own API client credentials.
41
43
42
44
### Required Roles
43
45
44
46
| Auth Method | Role | Configured On |
45
47
|-------------|------|---------------|
48
+
| Built-in client (default) |`Sandbox API User`| Your user account |
46
49
| User Authentication |`Sandbox API User`| Your user account |
47
50
| Client Credentials |`Sandbox API User`| The API client |
48
51
49
-
**User Authentication**: Used when only `--client-id` is provided. Opens a browser for login. The `Sandbox API User` role must be assigned to your user account in Account Manager.
50
-
51
-
**Client Credentials**: Used when both `--client-id` and `--client-secret` are provided. The `Sandbox API User` role must be assigned to the API client.
52
-
53
-
### Tenant Filter
54
-
55
-
The API client's roles must have a tenant filter configured for the realm(s) you wish to manage. In Account Manager, under each role (e.g., `Sandbox API User`), add the realm IDs you need to access to the **Tenant Filter**.
52
+
The `Sandbox API User` role must have a **tenant filter** configured for the realm(s) you wish to manage.
56
53
57
54
### Configuration
58
55
59
56
```bash
60
-
# User Authentication (opens browser)
57
+
# No configuration needed — opens browser for login
Copy file name to clipboardExpand all lines: docs/cli/slas.md
+10-10Lines changed: 10 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -16,30 +16,30 @@ These flags are available on all SLAS commands:
16
16
17
17
## Authentication
18
18
19
-
SLAS commands require an Account Manager API Client.
19
+
SLAS commands work out of the box using the CLI's built-in public client, which authenticates via browser login (implicit flow). No API client configuration is required for interactive use.
20
+
21
+
For automation or CI/CD, you can provide your own API client credentials.
20
22
21
23
### Required Roles
22
24
23
25
| Auth Method | Role | Configured On |
24
26
|-------------|------|---------------|
27
+
| Built-in client (default) |`SLAS Organization Administrator`| Your user account |
25
28
| User Authentication |`SLAS Organization Administrator`| Your user account |
26
29
| Client Credentials |`Sandbox API User`| The API client |
27
30
28
-
**User Authentication**: Used when only `--client-id` is provided. Opens a browser for login. Roles must be assigned to your user account in Account Manager.
29
-
30
-
**Client Credentials**: Used when both `--client-id` and `--client-secret` are provided. Roles must be assigned to the API client.
31
-
32
-
### Tenant Filter
33
-
34
-
The API client's roles must have a tenant filter configured for the organization you wish to manage. In Account Manager, under each role (e.g., `Sandbox API User`, `SLAS Organization Administrator`), add the organization IDs you need to access to the **Tenant Filter**.
31
+
The role must have a **tenant filter** configured for the organization you wish to manage.
35
32
36
33
### Configuration
37
34
38
35
```bash
39
-
# User Authentication (opens browser)
36
+
# No configuration needed — opens browser for login
37
+
b2c slas client list --tenant-id abcd_123
38
+
39
+
# Or provide your own client ID
40
40
b2c slas client list --tenant-id abcd_123 --client-id xxx
|[MRT](/cli/mrt) commands | MRT API Key |[MRT API Key](#managed-runtime-api-key)|
22
23
24
+
::: tip Zero-Config for Platform Commands
25
+
Sandbox, SLAS, and Account Manager commands work out of the box without any client configuration. The CLI includes a built-in public client that authenticates via browser login (implicit flow). You only need to configure an API client if you want to use client credentials for automation/CI or need specific scopes.
26
+
:::
27
+
23
28
::: tip
24
29
Each CLI command page documents its specific authentication requirements. See the [CLI Reference](/cli/) for details.
Copy file name to clipboardExpand all lines: docs/guide/configuration.md
+4Lines changed: 4 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -300,6 +300,10 @@ When using the `--cloud-origin` flag to specify a different MRT endpoint, the CL
300
300
301
301
By default, the CLI automatically detects available credentials and tries authentication methods in this order: `client-credentials`, then `implicit`. You can override this behavior to control which methods are used.
302
302
303
+
::: tip Default Public Client
304
+
For platform-level commands (Sandbox, SLAS, and Account Manager), the CLI includes a built-in public client ID. If no `--client-id` is configured, these commands automatically use the built-in client with the implicit flow, opening a browser for authentication. This means you can use these commands with zero configuration.
305
+
:::
306
+
303
307
### Available Auth Methods
304
308
305
309
-`client-credentials` - OAuth 2.0 client credentials flow (requires client ID and secret). Used for SCAPI/OCAPI and WebDAV.
0 commit comments