Skip to content


Concepts and Principles




API Explorer


Release Notes

TORO Integrate

Coder Studio

Coder Cloud

Bug Reports


Users and Groups

Not all APIs are meant to be public; some require elevated privileges. By configuring users and groups, implementing fine-grained permissions for securing various components across the application becomes a breeze.

TORO Integrate's security model is composed of two units:

  • User - At minimum, a user consists of a username and a password. Users contain the credentials to be used when authenticating1 a particular invocation request.

  • Group - Groups enable a convenient way of aggregating authorizations for similarly-privileged users.

In the next sections, the documentation describes how to manage users and groups and how are they used with various authentication schemes such as Basic or OAuth 2. The documentation also describes how to secure incoming invocation requests of Gloop Services, Gloop APIs, Groovy APIs.

The next chapter also shows request throttling and monetization with users and groups.

  1. Although users are mainly used for authentication, they can be used as well for authorization, like groups.