After resource owners are authenticated and granted access, they can exchange the authorization code for an access and a refresh token. Each token is associated with a single user (also called a subscriber) and a single application that wants to access protected resources in IBM Connections ...
Connections Cloud supports both Open Authorization (OAuth) 1.0a and 2.0. The main usage differences are listed here.
After the original access token expires, resource owners can use their refresh tokens to get a new access token. Using the new access token, they can access the protected resources on IBM Connections Cloud™ from the application.