OAuth Tools

Transparency is central to us at Intric. For certain tools to work (e.g. retrieving documents from SharePoint), the user needs to connect a personal integration. Here we describe step by step how the data flow works when an assistant uses an integration tool.

The process from your message to a finished response occurs in an interplay between Intric’s platform, the language model selected for the assistant, and the provider’s API (e.g. Microsoft Graph). Intric always acts as the intermediary — the language model never contacts the provider directly.

Step-by-step: How your data is handled

All transfers between Intric and external providers occur over secure, encrypted connections.

Step 1 — User interacts with Intric in the browser

The user writes a message to an assistant that has one or more OAuth integration tools configured (e.g. SharePoint).

Data sent to Intric’s server:

  • The user’s message
  • Chat history
  • Any attached files

Example: “Summarize the document ‘Q1 Report’ from our SharePoint.”

1 / 7

Data sharing and privacy

Intric applies the principle of data minimization. With OAuth integrations there are two separate privacy considerations — data is sent to both the language model and the provider’s API. Below you can see exactly what data is shared at each step.

Intric ↔ Language Model (LLM)

Sent to the LLMNot sent to the LLM
  • The user's message and conversation history
  • Tool definitions — name, description, parameters
  • Results from the provider's API (e.g. document content)
  • Access token and refresh token
  • Personal data about the user in Intric interacting with the assistant, provided it does not appear in the message to the assistant:

    • Name
    • Email
    • IP address
    • Organization affiliation

Intric ↔ Provider API

Sent to the providerNot sent to the provider
  • Access token (in the call's header)
  • The action and parameters specified by the language model (e.g. file name or search query)
  • The user's original prompt in full text
  • Chat history
  • Attached files (unless they form part of the tool call)
  • Organization affiliation
  • Tokens for other integrations

Authentication and access control via OAuth

Intric uses OAuth 2.0 to connect users to third-party services. Each user authenticates directly with the provider and approves the required permissions — Intric never sees or handles the user’s password.

Token management at the individual level

When a user has approved the connection, Intric stores an access token and a refresh token per user and integration. Tokens are encrypted with Fernet encryption (AES-128-CBC) before being written to the database and are decrypted only in memory at the moment they are needed for an API call. No token is stored in plain text and each token is tied to a single user — there are no shared or organization-wide tokens.

If an access token expires, Intric automatically uses the stored refresh token to request a new access token from the provider. The new token is encrypted and replaces the old one. The entire process occurs without the user needing to log in again.

Permission control based on the user

Each access token is linked to the individual user’s account with the provider and carries exactly the permissions the user has in the external service. This means that when Intric calls the provider’s API with this token, the provider returns only the content that the specific user is authorized to access. If a user only has read access to certain SharePoint pages, for example, Intric cannot retrieve content from pages the user does not have permission to access. Permission control is handled entirely on the provider’s side — Intric’s integration has no technical ability to change, extend, or otherwise affect the user’s permissions or access.

Data storage and deletion

Tokens are stored encrypted on Intric’s servers in Sweden for as long as the integration is active. When a user disconnects an integration, all tokens are deleted immediately.

Conversation history where integration tools have been used follows the same deletion rules as other assistants.

🔍 Read more in the article Data retention policy for assistants

Administrators can monitor how the service is used via the audit log where enabled.

🔍 Read more in the article Audit log
Updated on