Learn how to configure X (Twitter) OAuth for your Embedded Wallet instance. This guide covers using Sequence’s proxy for X’s OAuth 2.0 and the required permissions.
idToken
. For X, you will use the xAccessToken
parameter.
api.x.com
, you will use the Sequence proxy URL that facilitates the OAuth 2.0 flow.
When performing the token exchange in your OAuth 2.0 PKCE flow, you should target the following URL:
S256
code_challenge_method
for PKCE, which is more secure. This requires generating a random code_verifier
string, hashing it with SHA-256, and sending the Base64-URL-encoded hash as the code_challenge
. The original code_verifier
is then sent in the token request.users.read
email.read
tweet.read
tweet.read
. Due to a peculiarity in the X API, if this scope is not requested, the other scopes may not take effect. Sequence does not read any user tweets; this permission is requested only to ensure the authentication process works correctly.