API Reference

White-Label Integration

Branded connection links via JWT

White-label integration allows you to generate branded connection links. Your clients connect social accounts through your branded page — they never see CodivUpload branding.

How It Works

  1. Go to Profiles → click Share on a profile
  2. Select platforms (multi-select supported)
  3. Configure branding: logo, redirect URL, title, description
  4. Optionally add YouTube BYOP credentials
  5. Click Generate Link → 48-hour JWT link created
  6. Share the link → client sees your branding

Customization Fields

FieldRequiredDescription
Logo URLYesYour company logo on the connection page
Redirect URLYesWhere the user goes after connecting
Page TitleNoCustom heading (default: "Connect Social Media Accounts")
DescriptionNoCustom description text
Button TextNoSuccess button label (default: "Continue")
YouTube Client IDNoFor dedicated YouTube quota
YouTube Client SecretNoFor dedicated YouTube quota

API Usage

# Generate JWT link via API
curl -X POST https://api.codivupload.com/v1/agency/profiles/generate-jwt \
  -H "Authorization: Bearer YOUR_KEY" \
  -d '{
    "profile_name": "client_brand",
    "platforms": ["youtube", "tiktok", "instagram"],
    "logo_image": "https://yourdomain.com/logo.png",
    "redirect_url": "https://yourdomain.com/success"
  }'
The returned access_url is valid for 48 hours.

Privacy & Compliance for White-Label

When your clients connect their social accounts through your branded page, their data is handled with the same security standards as direct CodivUpload connections:

Your client's OAuth tokens are encrypted (AES-256-GCM) and stored in your workspace. Neither you nor CodivUpload staff can see the raw tokens.

JWT links expire after 48 hours. If a link is leaked, it becomes useless after expiry. Tokens already connected remain valid.

Your responsibility: Inform your clients about the data you collect and how CodivUpload processes it. Include a link to your own privacy policy in the redirect_url flow.

YouTube BYOP credentials embedded in JWT links are encrypted in transit and never stored in the JWT itself — only a reference to the encrypted DB record.