The WeCom provides the authorized login method of OAuth, which can obtain members' identity information from the webpage opened by the WeCom terminal, eliminating the need for login.
There are two different types of applications: internal applications and third-party applications.
To configure a WeCom provider, the following table describes the required parameters.
|Sub type||Internal or Third-party|
|Method||Silent or Normal|
|Client ID||The enterprise CorpID|
|Client secret||The enterprise CorpSecret|
|Agent ID||Application agentid|
WeCom has two authorization methods. Silent authorization and normal authorization.
Silent authorization: After the user clicks the link, the page is
Normal authorization: After the user clicks the link, a middle page is displayed for the user to choose whether to
authorize or not. After the user confirms the authorization, go to
For more details, please see document.
For more information about internal application, please see Internal application.
About Third-party application, please see Third-party application.