Nected Docs
Try Nected For Free
  • 5 min QuickStart Guide
  • Getting Started
    • Introduction
    • Core Concepts
    • Use Cases
    • Tech Architecture
    • FAQs
  • INTEGRATIONS
    • Overview
    • Integrations Libraries
      • PostGres
      • MySQL
      • Oracle
      • MS SQL Server
      • Snowflake
      • MongoDB
      • RedShift
      • REST API
      • Google Sheets
      • Slack
    • Managing Integrations
  • DATASETS
    • Overview
    • Managing Dataset
  • Rules
    • Overview
    • Rule Types
      • SimpleRule
      • DecisionTable
      • Ruleset
      • Rule Chain
    • Rule Conditions
    • Rule Actions
    • Concepts
      • Rule Result
      • Test & Publish Rules
    • Add Input Attributes
      • JSON Input Attributes
      • List Input Attributes
  • Triggers
    • Trigger Rule via API
    • Trigger Rule via WebHook
    • Trigger Workflow via API
    • Trigger Workflow via WebHook
    • Scheduler
    • Rule Response Format
  • Workflow
    • Overview
    • Managing Workflow
    • Add Node
      • Action Nodes
        • Rule Node
        • Workflow Node
        • Custom Code Node
        • Database Node
        • REST API Node
      • Control Nodes
        • Loop Node
        • Delay Node
        • Response Node
        • Set Variables Node
        • Switch Block
    • Test & Publish Workflows
  • CODE AND DATABASE QUERIES
    • JavaScript Editor
    • Formula Editor
    • JSON Editor
    • List Editor
    • Excel-like Function
  • Embedded System
    • White-Labelling
    • Embeddable View
  • Self Hosting
    • Overview
    • Infrastructure Sizing
    • New Installation
      • Docker
      • Kubernetes
        • Set Up Kubernetes Cluster on AWS EKS
    • Additional Configuration
      • High Availability
      • Email Setup Guide
    • Upgrade Nected Version
  • Security
    • API Authentication
      • OAuth as part of Authentication under REST API
    • Role Based Access Control (RBAC)
    • SOC 2 Type 2, GDPR, ISO Compliance
  • Audit
    • Audit Trail
    • Approval Flow
    • Version Control & Rollback
    • Import/Export
  • Management API
    • Audit Log API
    • Global Variable API
  • References
    • Attribute Library
    • Global Variables
    • Pre-Configured Tokens
    • Pre-Configured Operators
    • NULL Value Handling/Behavior
    • Troubleshooting Errors
      • Multiple Tabs/Users Edits
      • Limits in Nected
    • Allowed Status Combinations
    • Environments
    • Usage Widget
    • Gen AI
  • ACCOUNT SETTINGS
    • Workspace Setting
      • Date Format and Timezone Settings
Powered by GitBook
On this page
  • Authentication Config
  • 1. Bearer Token
  • 2. API Key​
  • Authentication Keys
  • OAuth 2.0
  1. Security

API Authentication

PreviousUpgrade Nected VersionNextOAuth as part of Authentication under REST API

Last updated 7 months ago

Nected provides and , available under tab, to ensure the absolute safety of your data.

Authentication Config

If you need to call an authenticated API (internal or 3rd party), you can create a REST API Integration that will automatically authenticate the endpoint when it is called. Authenticated API Integrations automatically fetch a token if needed and manage the caching of the tokens.

Authentication is checked directly before each API execution. When an API is executed in Superblocks, the execution environment first checks to see if non-expired tokens are cached. If not, the tokens are refreshed.

You can generate a new authentication configuration using the +New Authentication button.

Nected supports the following two types of authentication configuration:

1. Bearer Token

Use this option from the list of available authentication configuration options to authenticate using a bearer token, which are used for HTTP authentication. Provide a private authentication key while creating a token, which will be used while executing the API using a bearer token.

Anytime you use this integration, the Token value will be appended to the text Bearer in the required format to the request Authorization header as follows Authorization: Bearer <Your API Key>.

API Key auth lets you send a key-value pair to the API either in the request Header or Query Parameters. To authenticate using an API Key, choose this option from the list of available authentication methods. In the Key field, specify the Header key or Query Parameter that will be used. In the Value field, enter the API Key.

Anytime you use this integration, the relevant information will be appended to your request Headers or the URL query string.

Authentication Keys

Authentication Keys are Nected-generated API keys that are used to secure API calls to trigger Nected Rules.

Once Rule API is marked as Private, you can use any of the Authentication keys to pass in the header to authenticate Rule API. API Keys would be common for all environments, though you can use different authentication methods for staging and production environments.

INFO

If you pass invalid API keys in Rule API marked as Private, it will throw an "unauthorized access" error

Nected provides a pre-configured authentication key, named Auth_key_1. You can generate a new authentication key using the + Generate Key button.

The following figure shows the Credentials page of the Nected platform:

You can update the authentication key name and click Update to modify the name of the key. Use the delete icon and confirm the delete operation to delete an existing authentication configuration or authentication key.

OAuth 2.0

2. API Key

Refer to the page to know how to configure & secure Rule API to use one of these API keys.

To integrate any 3rd party Apps supporting only OAuth 2.0, this is authentication method that you can use while setting API connectors for those Apps. To know more around different types of OAuth and step-wise guide, click .

​
Triggering a Rule using an API
here
credentials
authentication configuration
authentication keys