Yep, this is the ideal way. Just make sure your backend workflow is set up correctly though. There shouldn’t be any unauth access to that if a potential hacker gets your endpoint. Also, the privacy rules for the accessToken field