Oscar Della Casa
11/05/2025, 3:23 PM/api/oauth/access_token redirect loops) even when using SessionTokenAuthenticator or BearerAuthenticator without declarative OAuth enabled, making it impossible to create sources with manual token input for custom connectors that only need token refresh, not full OAuth flows.
The connector works fine in the builder area when testing but it is impossible once published to add it as a source due to the problem mentioned above.
As anyone encountered this before, and fixed it? Thxkapa.ai
11/05/2025, 3:23 PMSessionTokenAuthenticator or BearerAuthenticator. This is documented in [GitHub Issue #52084](https://github.com/airbytehq/airbyte/issues/52084), where users reported that as of Airbyte 1.4, data sources that could be authorized using OAuth2 no longer allow manual entry of `access_token`/`refresh_token`. According to the discussion in that issue, the problem is that: 1. Airbyte now requires the full OAuth2 flow for certain connectors 2. This requires the Airbyte instance to have a publicly accessible endpoint (/auth_flow) 3. Some OAuth2 providers only allow one redirect, making this particularly problematic ## Current Status The good news is that this issue has been acknowledged by the Airbyte team. According to the [GitHub discussion](https://github.com/airbytehq/airbyte/issues/52084), contributors mentioned that they were working on expanding the flexibility of OAuth2 authentication, and that you should still be able to bring your own client_id, client_secret, and tokens. One contributor noted: "I believe there was a reason for not providing the access token option authentication... Generally speaking, I agree that the best approach is to have Airbyte-Own OAuth Apps alongside the ability to switch to the Use my credentials toggle manually." ## Potential Workaround For custom connectors that only need token refresh without the full OAuth flow, you might want to try using the [OAuth 2 without Declarative OAuth Connector Specification](https://docs.airbyte.com/platform/connector-development/connector-builder-ui/authentication#without-declarative-oauth-connector-specification) approach. This legacy method allows you to use an existing access token or refresh token to authenticate with the API, which might bypass the automatic OAuth UI injection you're experiencing. However, the knowledge sources don't provide a definitive solution for preventing the OAuth UI injection in Self-Managed Airbyte when using SessionTokenAuthenticator or BearerAuthenticator. The issue appears to be an ongoing concern that the team is working to address. I recommend monitoring the GitHub issue mentioned above for updates, as the team indicated they were reviewing the problem and working on a solution.Oscar Della Casa
11/06/2025, 8:43 AMkapa.ai
11/06/2025, 8:43 AMkapa.ai
11/06/2025, 8:43 AMclient id and client secret - The configuration is processed and executed by the Airbyte platform on your behalf - Handles the OAuth flow coordination including generating consent URLs, token exchange, and refresh token management The configuration is done through the advanced_auth.oauth_config_specification field in your connector's spec file. ## Important Note However, based on the [GitHub issue discussion](https://github.com/airbytehq/airbyte/issues/52084) you mentioned earlier, there appears to be an ongoing challenge with the OAuth UI injection. One contributor noted that "it requires the AirByte instance to have a publicly accessible endpoint (/auth_flow)," which may be causing issues in your self-hosted setup. The knowledge sources don't provide specific troubleshooting steps for when the OAuth UI setup fails in self-hosted instances. If you're still experiencing issues with the setup, this appears to be part of the broader problem being addressed by the Airbyte team.Oscar Della Casa
11/07/2025, 10:05 AMkapa.ai
11/07/2025, 10:05 AMkapa.ai
11/07/2025, 10:05 AMOscar Della Casa
11/07/2025, 10:06 AMkapa.ai
11/07/2025, 10:06 AMkapa.ai
11/07/2025, 10:07 AMclient_id / client_secret fields correctly" ## The Bottom Line OAuth functionality does work in Self-Managed Airbyte for many connectors, but there are documented issues with: - Custom connectors built in the Connector Builder - Certain connectors that haven't been migrated to the newer Declarative OAuth implementation - UI rendering of OAuth fields in some cases The knowledge sources don't indicate that OAuth is completely broken, but rather that there are specific scenarios (like yours with custom connectors) where it's currently problematic.Oscar Della Casa
11/07/2025, 10:08 AMkapa.ai
11/07/2025, 10:08 AMkapa.ai
11/07/2025, 10:08 AMOscar Della Casa
11/07/2025, 12:42 PMkapa.ai
11/07/2025, 12:42 PMkapa.ai
11/07/2025, 12:42 PM/api/oauth/access_token redirect loop issue you're experiencing - Confirmation that this specific issue has been resolved in version 2.0.1 Given that you're on a current version and still experiencing these issues, this appears to be an unresolved problem that may require direct support from the Airbyte team or filing a new GitHub issue if one doesn't already exist for version 2.0+.