The myConnectedFleet platform provides two authentication methods depending on the API you are using. This guide covers how to authenticate with each method.
1. Core API — Basic Authentication
This authentication method applies to the Core API.
The Core API uses HTTP Basic Authentication. Include your credentials directly in the Authorization header of every request.
Prerequisites
Contact your account manager to obtain:
- Username (
clientId)
- Client Secret (
clientSecret)
Combine your clientId and clientSecret with a colon separator and encode in Base64:
echo -n "clientId:clientSecret" | base64
Example result: Y2xpZW50SWQ6Y2xpZW50U2VjcmV0
Example Request
curl --request GET \
--url https://api.masternautconnect.com/connect-webservices/services/public/v1/customer/{customerId}/tracking/live \
--header 'Authorization: Basic Y2xpZW50SWQ6Y2xpZW50U2VjcmV0' \
--header 'Content-Type: application/json'
| Header | Value | Description |
|---|
Authorization | Basic <base64-encoded-credentials> | Your clientId and clientSecret encoded in Base64 |
Content-Type | application/json | Required for requests with a body |
Keep your Client ID and Client Secret secure. Never expose them in client-side code or public repositories.
2. Other APIs — OAuth2 Bearer Token Authentication
This authentication method applies to the following APIs:
These APIs require an OAuth2 access token. Follow the steps below to obtain a token and use it in your requests.
Prerequisites
Contact your account manager to obtain:
- Client ID (
clientId)
- Client Secret (
clientSecret)
Step 1: Generate an OAuth2 Access Token
Make a POST request to the OAuth2 token endpoint.
Endpoint:
POST https://auth.masternautconnect.com/masternauth-oauth/oauth/accessToken
HTTP Headers:
| Header | Value | Description |
|---|
Authorization | Basic <base64-encoded-credentials> | Your clientId and clientSecret encoded in Base64 |
Content-Type | application/x-www-form-urlencoded | Required to pass the grant_type |
Create the Authorization Header:
Combine your clientId and clientSecret with a colon separator and encode in Base64:
echo -n "clientId:clientSecret" | base64
Example result: Y2xpZW50SWQ6Y2xpZW50U2VjcmV0
Request Body:
{
"grant_type": "client_credentials"
}
Example Request:
curl --location 'https://auth.masternautconnect.com/masternauth-oauth/oauth/accessToken' \
--header 'Accept: application/json' \
--header 'Content-Type: application/x-www-form-urlencoded' \
--header 'Authorization: Basic Y2xpZW50SWQ6Y2xpZW50U2VjcmV0' \
--data-urlencode 'grant_type=client_credentials'
Response:
{
"success": true,
"accessToken": "B983854936PF1A7B61B141AB69494046",
"token_type": "bearer",
"expires_in": 2591999
}
| Field | Description |
|---|
success | true if authentication was successful |
accessToken | The OAuth access token to use in subsequent API requests |
token_type | The token type, will always be bearer |
expires_in | Token lifetime in seconds |
Step 2: Use the Access Token
Standard Bearer Token (Smart Tire, Tacho, Vehicle Check APIs)
Include the access token in the Authorization header using the Bearer scheme.
Example Request:
curl --request GET \
--url https://api.masternautconnect.com/connect-webservices/services/public/v1/customer/{customerId}/tire/events \
--header 'Authorization: Bearer B983854936PF1A7B61B141AB69494046' \
--header 'Content-Type: application/json'
Required Headers:
| Header | Value | Description |
|---|
Authorization | Bearer <your-access-token> | Your OAuth2 bearer token |
Content-Type | application/json | Required for requests with a body |
The Job Management API uses a custom header instead of the standard Authorization header.
Example Request:
curl --request GET \
--url https://api.masternautconnect.com/job-management/v1/customer/{customerId}/jobs \
--header 'x-connect-token: TOKEN B983854936PF1A7B61B141AB69494046' \
--header 'Content-Type: application/json'
Required Headers:
| Header | Value | Description |
|---|
x-connect-token | TOKEN <your-access-token> | Your OAuth2 bearer token with TOKEN prefix |
Content-Type | application/json | Required for requests with a body |
Note the TOKEN prefix before the access token value. This is required for the Job Management API.
Keep your Client ID, Client Secret, and access tokens secure. Never expose them in client-side code or public repositories.
Token Management Best Practices
- Token Expiration: OAuth tokens have a limited lifetime. Implement token refresh logic in your application.
- Secure Storage: Store client credentials and tokens securely using environment variables or secret management systems.
- Error Handling: Implement proper error handling for authentication failures and token expiration scenarios.
- Token Reuse: Cache and reuse valid tokens across multiple requests to minimize authentication overhead.