- Create a profile for your API user
- Ensure the API checkbox is checked.
- Ensure password not expire checkbox is checked.
- Set other security options required by your application.
- Create a user you will use for the API logins and assign it to this profile.
- The application should run on a computer in a trusted IP address range (it could be located inside your network, on a trusted ISP, or it may connect to the network using a VPN).
- Login in via the API from the computer where the application is installed
- Check the IP address used here (Setup > Personal Setup > My Personal Information > Personal Information > Login History (Related List))
- Ensure that IP address is in a range defined here (Setup > Administration Setup > Security Controls> Network Access > Trusted IP Range Edit)
By executing the step #3, we are avoiding the use of a security token. This is still secure, because we are specifying the IP range of the computer where we know the application will always execute.
No comments:
Post a Comment