Different integrations use different authentication methods. Choosing the right method—and managing credentials properly—affects both security and reliability.Documentation Index
Fetch the complete documentation index at: https://may1test.mintctf.com/llms.txt
Use this file to discover all available pages before exploring further.
API keys
API keys are long-lived tokens issued by the external service. They are the simplest authentication method and work well for server-to-server connections where OAuth is not available. When to use: Services that issue personal access tokens or API keys (most developer tools, data APIs). How to rotate:- Generate a new key in the external service.
- Go to Integrations → [Integration name] → Credentials.
- Paste the new key and click Save.
- Verify the connection still works, then revoke the old key in the external service.
OAuth 2.0
OAuth 2.0 lets users authorize the platform to act on their behalf without sharing a password. The platform handles the token refresh cycle automatically. When to use: SaaS tools that support OAuth (CRMs, productivity tools, communication platforms). How it works:- Click Authorize on the connector setup page.
- You’re redirected to the service’s authorization screen.
- Sign in and approve the requested permissions.
- The platform stores the access token and refresh token securely.