![](/_static/web/static/4ce4175251c79f708825994498eea32e/00db2/M2M-section1-hero-bg-1536x768402x.png)
Customer Identity Cloud
Machine-to-Machine
Simplify communication between APIs and trusted services
Easily handle authentication and authorization for non-interactive applications with machine-to-machine communication from Okta Customer Identity Cloud, powered by Auth0.
![A visual of a new API form, an icon, and an image of a man on his laptop.](/_static/web/static/c3540c8fc21dd4bc101af3b2f6c2397f/9dd74/M2M-section1-hero-graphic-640x720402x.png)
Trusted interactions for APIs and applications
Enable secure access to your API from other internal or external non-interactive third party-apps with minimal configuration.
![A woman on her laptop, an application form, and a machine-to-machine icon.](/_static/web/static/5beeae9c4df8c69b5c64d22e5bb5c9ea/aec29/M2M-section2-large-img-1312X572402x.png)
Step 1
The application authenticates itself with Auth0 by Okta using its Client ID and Client Secret.
Step 2
Auth0 validates this information and returns an Access Token.
Step 3
The application can use the Access Token to call the API.
![A machine-to-machine application pop-up.](/_static/web/static/f14643e28a34b084b2424abcba6e01c8/a14fc/M2M-section2-small-img-560X400402x.png)
Internet of Things (IoT)
Use the identity of the IoT device instead of a user identity to streamline a secure IoT implementation.
Secure API authentication for non-interactive apps
Allow non-interactive applications such as app servers, command line interfaces (CLIs), daemons, and others to safely and securely consume your API in cases where no human interaction is necessary.
![A machine-to-machine authorization application form.](/_static/web/static/f93765b964e7c155fa414cd0a1f300a5/0be83/M2M-section3-graphic-image1-640x640402x_0.png)
Enable app servers, APIs, and services to make authenticated requests to your API without the need of human interaction.
![A machine-to-machine authorization application form.](/_static/web/static/a175cde8841cec6ea886819247f709c8/0be83/M2M-section3-graphic-image2-640x640402x.png)
Build powerful tools and CLIs that can connect and authenticate to your APIs.
![A machine-to-machine authorization application form.](/_static/web/static/bd4fee4d756775be9fdd6b634d3f0592/0be83/M2M-section3-graphic-image3-640x640402x_0.png)
Let job schedulers, daemons, and other system processes securely interact with your API.
![A machine-to-machine authorization application form.](/_static/web/static/3934c8b0027d4378f7d37672bb73afe9/0be83/M2M-section3-graphic-image4-640x640402x.png)
Easily control internal and external clients’ access levels to your API with highly granular permissions.
- Application backends
- Command line interfaces
- Other processes
![A machine-to-machine authorization application form.](/_static/web/static/f93765b964e7c155fa414cd0a1f300a5/0be83/M2M-section3-graphic-image1-640x640402x_0.png)
![A machine-to-machine authorization application form.](/_static/web/static/a175cde8841cec6ea886819247f709c8/0be83/M2M-section3-graphic-image2-640x640402x.png)
![A machine-to-machine authorization application form.](/_static/web/static/bd4fee4d756775be9fdd6b634d3f0592/0be83/M2M-section3-graphic-image3-640x640402x_0.png)
![A machine-to-machine authorization application form.](/_static/web/static/3934c8b0027d4378f7d37672bb73afe9/0be83/M2M-section3-graphic-image4-640x640402x.png)
![Standards based security asset](/_static/web/static/04c9c6f55b9bc1ae5b36a243e7bd03cb/1962d/M2M-section4-graphic-560x560.png)
Standards-based security
Rest easy knowing your API is protected with open standards through the use of the OAuth2 Client Credentials grant flow for secure communications.