Skip to main content

Documentation Index

Fetch the complete documentation index at: https://authsome.agentr.dev/docs/llms.txt

Use this file to discover all available pages before exploring further.

Postiz is a bundled OAuth2 provider in authsome. Postiz social posting and scheduling APIs.

At a glance

Provider namepostiz
Display namePostiz
Auth typeOAuth2
Default flowdevice_code, headless
PKCE supportedYes
Device code supportedYes
DCR supportedNo
Default scopes(none)
Proxy hostapi.postiz.com
Env var (access_token)POSTIZ_ACCESS_TOKEN
Provider docsLink

Prerequisites

Postiz uses the device authorization grant. No callback URL is registered. You enter a short code on a separate device after running authsome login.

Log in

uvx authsome login postiz
Authsome prints a verification URL and a short user code. Open the URL on any device, enter the code, approve the app, and authsome’s poll completes. Verify:
uvx authsome get postiz --field status
# → connected

Multiple accounts

Pass --connection <name> on login and on every read command to keep two or more accounts on the same provider side by side. See Multiple connections per provider for the full pattern.
uvx authsome login postiz --connection personal
uvx authsome login postiz --connection work

Use the token

Run the agent under the proxy. The library tab is for embedding authsome inside a larger Python orchestrator.
uvx authsome run -- python my_agent.py
Under the proxy, authsome sets POSTIZ_ACCESS_TOKEN=authsome-proxy-managed in the child’s environment and injects the real token into outbound requests to api.postiz.com. The child process never sees the actual value. Refresh tokens are never exported.

Override the bundled definition

uvx authsome inspect postiz > ~/.authsome/providers/postiz.json
# edit scopes, base_url, or anything else
uvx authsome list   # source now shows "custom" for postiz
User-registered files always win over bundled definitions. See Provider schema.

What’s next

Headless setup

Postiz is the only bundled provider that defaults to the device code flow.

Run agents with the proxy

Inject the access token into outbound requests without exposing it.