Skip to main content

Configuration

A Configuration represents a secured mechanism to manage and control how external resources or credentials are integrated and accessed within the system. Configurations enable secure and standardized usage of these resources in scripts across various Pipelines, Transformations, Destinations, etc.

Configurations are categorized into two main types:

  • API Access
  • Key Value pair

API Access:

API Access configurations provide credentials or authorization methods for interacting with APIs of Sources and Function as a service. They facilitate secure and controlled communication from external systems.

There are four distinct types of API Access:

cidaas OAuth2:

  • A specific implementation of OAuth2 provided by cidaas, enabling secure token-based authentication and authorization.
  • Ideal for flows leveraging the cidaas platform for user authentication or API security.

General OAuth2:

  • A flexible OAuth2 implementation that can be configured for any OAuth2-compliant system.

API Key:

  • Here you can configure if you want to secure your api with a key. The key, its value and placement can be customized.

TOTP:

  • System generates a TOTP key that can be used to secure your APIs.

Key Value pair:

These can be added to pipelines for providing information such as configuration