sf-connected-apps

>

INSTALLATION
npx skills add https://github.com/jaganpro/sf-skills --skill sf-connected-apps
Run in your project or agent environment. Adjust flags if your CLI version differs.

SKILL.md

$27

First Decision: Connected App or External Client App

If the need is...

Prefer

simple single-org OAuth app

Connected App

new development with better secret handling

External Client App

multi-org / packaging / stronger operational controls

External Client App

straightforward legacy compatibility

Connected App

Default guidance:

  • choose ECA for new regulated, packageable, or automation-heavy solutions
  • choose Connected App when simplicity and legacy compatibility matter more
  • Spring ’26 note: creation of new Connected Apps is disabled by default in orgs. For new integrations, prefer External Client Apps unless Connected App compatibility is explicitly required.

Required Context to Gather First

Ask for or infer:

  • app type: Connected App or ECA
  • OAuth flow: auth code, PKCE, JWT bearer, device, client credentials
  • client type: confidential vs public
  • callback URLs / redirect surfaces
  • required scopes
  • distribution model: local org only vs packageable / multi-org
  • whether certificates or secret rotation are required

Recommended Workflow

1. Choose the app model

Decide whether a Connected App or ECA is the better long-term fit.

2. Choose the OAuth flow

Use case

Default flow

backend web app

Authorization Code

SPA / mobile / public client

Authorization Code + PKCE

server-to-server / CI/CD

JWT Bearer

device / CLI auth

Device Flow

service account style app

Client Credentials (typically ECA)

3. Start from the right template

Use the provided assets instead of building from scratch:

  • assets/connected-app-basic.xml
  • assets/connected-app-oauth.xml
  • assets/connected-app-jwt.xml
  • assets/external-client-app.xml
  • assets/eca-global-oauth.xml
  • assets/eca-oauth-settings.xml
  • assets/eca-policies.xml

If you need source-controlled ECA OAuth security metadata, retrieve it from an org first and treat the retrieved file as the schema source of truth:

  • sf project retrieve start --metadata ExtlClntAppOauthSecuritySettings:<AppName> --target-org <alias>

4. Apply security hardening

Favor:

  • least-privilege scopes
  • explicit callback URLs
  • PKCE for public clients
  • certificate-based auth where appropriate
  • rotation-ready secret / key handling
  • IP restrictions when realistic and maintainable

5. Validate deployment readiness

Before handoff, confirm:

  • metadata file naming is correct
  • scopes are justified
  • callback and auth model match the real client type
  • secrets are not embedded in source

High-Signal Security Rules

Avoid these anti-patterns:

Anti-pattern

Why it fails

wildcard / overly broad callback URLs

token interception risk

Full scope by default

unnecessary privilege

PKCE disabled for public clients

code interception risk

consumer secret committed to source

credential exposure

no rotation / cert strategy for automation

brittle long-term ops

Default fix direction:

  • narrow scopes
  • constrain callbacks
  • enable PKCE for public clients
  • keep secrets outside version control
  • use JWT certificates or controlled secret storage where appropriate

Metadata Notes That Matter

Connected App

Usually lives under:

  • force-app/main/default/connectedApps/

External Client App

Current source-supported ECA metadata uses multiple top-level source directories, not a single externalClientApps/ folder:

  • force-app/main/default/externalClientApps/ExternalClientApplication (.eca-meta.xml)
  • force-app/main/default/extlClntAppGlobalOauthSets/ExtlClntAppGlobalOauthSettings (.ecaGlblOauth-meta.xml)
  • force-app/main/default/extlClntAppOauthSettings/ExtlClntAppOauthSettings (.ecaOauth-meta.xml)
  • force-app/main/default/extlClntAppOauthSecuritySettings/ExtlClntAppOauthSecuritySettings (.ecaOauthSecurity-meta.xml)
  • force-app/main/default/extlClntAppOauthPolicies/ExtlClntAppOauthConfigurablePolicies (.ecaOauthPlcy-meta.xml)
  • force-app/main/default/extlClntAppPolicies/ExtlClntAppConfigurablePolicies (.ecaPlcy-meta.xml)

Important file-name gotchas:

  • the global OAuth suffix is .ecaGlblOauth, not .ecaGlobalOauth
  • the general policy suffix is .ecaPlcy, not .ecaPolicy
  • use .ecaOauthSecurity for ExtlClntAppOauthSecuritySettings

Output Format

When finishing, report in this order:

  • App type chosen
  • OAuth flow chosen
  • Files created or updated
  • Security decisions
  • Next deployment / testing step

Suggested shape:

App: <name>

Type: Connected App | External Client App

Flow: <oauth flow>

Files: <paths>

Security: <scopes, PKCE, certs, secrets, IP policy>

Next step: <deploy, retrieve consumer key, or test auth flow>

Cross-Skill Integration

Need

Delegate to

Reason

Named Credential / callout runtime config

sf-integration

runtime integration setup

deploy app metadata

sf-deploy

org validation and deployment

Apex token or refresh handling

sf-apex

implementation logic

permission review after deployment

sf-permissions

access governance

Reference Map

Start here

Migration / examples

Score Guide

Score

Meaning

80+

production-ready OAuth app config

54–79

workable but needs hardening review

< 54

block deployment until fixed

BrowserAct

Let your agent run on any real-world website

Bypass CAPTCHA & anti-bot for free. Start local, scale to cloud.

Explore BrowserAct Skills →

Stop writing automation&scrapers

Install the CLI. Run your first Skill in 30 seconds. Scale when you're ready.

Start free
free · no credit card