Authenticating to the Admin API requires an External Application configuration to be created within Banno.
If you are a financial institution or working directly with a financial institution, you should work with the back office administrator at your institution to get appropriate access to the Admin API.
If you are a fintech or other developer working without a financial institution, you are likely using the JackHenry.Dev developer portal. In this case, you will not have access to the Banno Back Office.
The back office administrator at your financial institution can do this for you in the Users & Groups section of Banno.
From the Banno People dashboard, click the
... button to open the menu and select Users & Groups
Finally, click the + Create external app button.
These properties are common to both the Standard application type and Service account application type.
The name of the External Application.
The name we use to monitor and track integrators using the Admin API.
There are two different application types.
Requirements (Standard application type)
The Standard application type provides the ability to “Sign in with Banno” using user-level OAuth.
These properties are specific to the Standard application type.
Authentication can either be configured as Confidential (which uses a client secret), or Public (which uses PKCE).
User consent required
This option determines whether or not a user will see a consent prompt during authentication.
User consent should be required unless the application is owned by the institution or a fully trusted partner.
These are the Redirect URIs that the Admin API uses to return users to your client as part of the Authorization Code Flow for the Standard application type.
Each Redirect URI is matched using exact string matching. If the Redirect URI does not match, then the authorization flow will not be valid.
- Redirect URI matching is case-sensitive and path-inclusive so http://localhost:8080/dynamic is NOT the same as http://localhost:8080/Dynamic and NOT the same as http://localhost:8080/dynamic/.
- ‘Wild card’ Redirect URI formats are not allowed so https://*.example.com is NOT valid.
Requirements (Service account application type)
The Service account application type uses a signed JWT for authentication. A service account provides application-level authentication instead of user-level authentication.
These properties are specific to the Service account application type.
Authentication for Service accounts uses a Signed JWT.
See the Public Key + Private Key topic.
See the Associated User topic.
Both the Standard application type and Service account application type will generate a Client ID when the External Application is created.
See the Authentication topic.