Perform the following actions to create the Custom Connector,
Navigate to the Microservices tab.
Click    +Create New    in the top-right corner. 
Choose    Connection    and click    Pick &     Create. 
Click the    CUSTOM CONNECTOR category in the left pane. 
Click    Create New Custom Connector. 
    
 Note:  Click here for other methods       to create a custom connector.
Note:  Click here for other methods       to create a custom connector.You can also establish a connection by clicking the Custom Connector cards. Learn More
The following major configurations are necessary to create a Custom Connector:
General defines the basic information of your Custom Connector, such as Connector name, Connector link name, Description, and Logo.
Security defines the authentication settings of the Custom Connector, such as  Authentication Type,  Authentication Parameters, and  Scopes.  
Continuing from the previous instructions, enter the Connector Name and Description for your Custom Connector.
Connector Name is the display name of the connector you want to create.
 Note:
        Note:    Description (Optional) is the text box which stores details or more information about the Custom Connector.
 Note:   Description can have only the following special characters  , . ( ) - _ * @ / \ ! : | ~ | &  and cannot exceed 255 characters.
    Note:   Description can have only the following special characters  , . ( ) - _ * @ / \ ! : | ~ | &  and cannot exceed 255 characters.     Click    Create Custom Connector.    You will be directed to the General section of the Custom Connector builder. 
     
The General section consists of the basic details of the Connector.
The Connector name, Connector link name, and Description will be auto-populated from the initial page. You can also edit them by clicking on the respective field.
 Note:
         Note:     Upload a logo for your Custom Connector. 
  
      Note:
3. Click Save & Continue, and you will be directed to the Security section.
 
 Note :
        Note :| Authentication Type | Description | Fields | 
| Basic | This requires you to specify the keys as mentioned in the target services API docs. These connector configurations will be prompted during the connection authorization phase, where you need to key in the values for the parameters (username and password). They will be automatically encrypted with the base64 algorithm and passed as a header in the format: basic <encrypted_value> | Parameter Name: Display name of the field, which will be prompted       when you authorize a connection.   Note: 
 Parameter Key:      API key as specified in the target services         API        documentation against which the parameter value needs to be sent. This Key will be prompted to the user with the mentioned        Parameter Name              during connection authorization.      | 
| API Key | This allows you to connect with third-party        APIs by authenticating with an API key. It acts as a unique identifier for authentication purposes.     | Parameter Name: Display name of the parameter. This name will be prompted when you authorize a connection.   Note: 
 Parameter Key: Key (as specified in the API documentation of the desired service) against which the parameter value needs to be sent.      Note:      The Parameters Key is a placeholder value and will be prompted with the given Parameter Name to the user during the connection authorization. Parameter Location: Decides how the authentication         parameters will be sent along with the URLs specified in the invoke URL script. Supported parameter types are         Query String, Form Data, and Header. | 
| OAuth1 | OAuth 1.0 protocol enables Creator applications to access third-party resources through an API without disclosing the user’s credentials. Once the user grants the authorization, the Creator application can use an access token provided by the third-party service to access the user's resources. OAuth1 is efficient only for connecting with web-based applications. It uses cryptographic signatures and temporary tokens to secure the connection. | Consumer Key: A unique identifier for a third-party application in OAuth1, used to identify the application in requests made to the service provider. It should be kept confidential by the application.   Note: 
 Consumer Secret: A secret key associated with a consumer key in OAuth1, used to sign requests made by a third-party application to the service provider.   Note: 
 Authorization URL:  URL as specified in the API documentation of the desired service to get authorization for application access. Token URL:  URL to fetch the access token in exchange for an request token as specified in the API documentation of the desired service. Request Token URL:  URL to obtain request token, used to initiate the authorization process between the application and the third-party service. Revoke Token URL:  URL to revoke specified OAuth1 access or refresh token. A revoke token request causes the removal of the client permissions associated with the specified token.   Note: 
 | 
| OAuth2 | Authentication-OAuth2       OAuth 2.0  is an authorization protocol that gives limited access to user data on a web server. An OAuth 2.0 server issues an access token that the Creator applications can use to access protected resources on behalf of the resource owner. OAuth2 consists of scopes that allow Creator applications to request specific permissions from the user and are more compatible with both web and non-web-based applications. | Grant type: Refers the way to access the protected resources from the target server. The supported grant types are,   Note:  
 
   Note: 
 Client Secret: Your client secret to authorize your      application.   Note: 
 Client Authentication: Specifies how the client's credentials (Client ID and Client Secret) are sent to the authorization server to prove its identity during the token request process. 
 
 
 
  Note: 
 Token URL: URL to fetch the access token as specified in the API documentation of the desired service.      Note:  The Request Token URL and Revoke Token URL fields specified below are applicable only when the Grant Type is selected as Authorization code. Revoke Token URL: URL to revoke specified OAuth2 access or refresh token. A revoke token request causes the removal of the client permissions associated with the specified token. Refresh Token URL:      URL to access new access tokens when the current access token becomes invalid or expires.  Note:  The URL should be in a standard format withthe protocol(http), a hostname (          www.zylker.com), and a file name(index). E.g.          http://www.zylker.com/index. 
 Bearer Name: Text that acts as a prefix in the authentication header for the API request. Expiry Time:      Time (in seconds) at which the access token        expires. The default expiry time will be 3600 seconds.   Note: 
 | 
| OAuth Scopes (Optional)      - This limits the level of access given to the user via access token. | 
 Scope Display Name: The display name of the third-party Scope.   Note: 
 Scope Value:      The level of access that you are requesting for the third-party service. Scope Delimiter:              Delimiter with which the desired service API expects the scopes to be separated.      Note: The default Scope Delimiter will be Comma. | |
| Bearer Token | This authentication type allows connecting to third-party APIs by authenticating with a secure bearer token. | Parameter Location: Specify how you want to pass your parameters in the request. This field is preselected as "Header". Parameter Name: Configure the display name of the parameter. This name will be prompted when you authorize a connection. This field is prefilled as "Bearer Token" and can be customized.  Note: Parameter Name can only • Have only the following special characters * _ - @ / ! : | & ~ \ + • Start with a letter or a number. Parameter Key: Specify the technical key used when communicating with the external system. This field is set to "Authorization" by default and cannot be edited. Token Prefix: Defines the prefix attached to the token for authentication. The prefix is included when sending the token as part of the request. | 
| AWS | This authentication type allows connecting to AWS services using Signature Version 4 authentication. | AWS Service Name: Specify the AWS service to which the request should be sent. The name must match the exact service name as specified in the AWS API documentation. AWS Region: Define the AWS region where the requested service will be hosted. The region must be provided in the format supported by AWS (e.g., us-east-1, eu-west-2). | 
   
 Note:  The following steps are similar for both  API key  and  Basic authentication  types. Only the  Authentication parameter  fields change, hence we have considered  API Key  as an example.
    Note:  The following steps are similar for both  API key  and  Basic authentication  types. Only the  Authentication parameter  fields change, hence we have considered  API Key  as an example.Once you complete entering the authentication details, mark the connector as ready. 
  
 
Once you complete entering the authentication details, mark the connector as ready. 
      
   The stage has been changed from Draft to Ready.
Once marked Ready, You will be able to add connection using the       Add Connection    button.   
 
 Note:    We strongly recommend adding scopes to your OAuth connector, even though scopes in OAuth2 are optional.
  Note:    We strongly recommend adding scopes to your OAuth connector, even though scopes in OAuth2 are optional.After saving the       Authentication Parameters       in OAuth2, You will be directed to the       OAuth Scopes       section, or you can also navigate by clicking OAuth Scopes       from the left pane. 
 
On the next page, click    +Add Scope.     
 
Fill in the    Scope Name    and    Scope Value. Click    Add. Here we considered adding the scopes of    Dropbox.     
 
Click the    Add New    button to add more scopes.    
 
Click the three horizontal ellipsis to Edit    or    Delete    a specific scope record in the table.    
 
If you want to delete multiple scopes, mark it by checking in the checkbox and click    Delete, as shown below.   
 
You can search for the specific scope by entering the scope name or scope value on the Search tab.
Click the    Mark as Ready    button. The stage will be changed from    Draft to Ready. 
  
 
Once the connector is marked  Ready, You can add connection using    Add Connections.    
 
 Note:
          Note:    1. Navigate to the Microservices    page and scroll down to reach the Connections section.
2. If you have three or less connections, click Manage Custom Connectors that appears across the Connections section.
3.  i) If you have more than three connections, click View More. A list of all the connections in your account will appear.    
 
    ii) Click Manage Custom Connectors.
   
4. Click    +Create Custom Connector.     
 
5. If you find the Custom Connectors listed as cards, click the    +Create New    icon in the top-right corner to create a Custom Connector.    
  
 
6. Follow the steps given in Creating your own Custom Connector section to build your own Custom Connector.
Navigate to the    Microservices    tab and click    +Create New    in the top-right corner. 
 
Choose    Connection    and click    Pick & Create. 
Scroll down to the end of the Built-in Connectors page and click    +Create Custom Connector. 
      
 Note:  You can use the search tab to search for the desired connector. If the connector is not present in the  Built-in Connectors list, you will be prompted with the  +Create Custom Connector  link. You can also click this link to create a new  Custom Connector.
    Note:  You can use the search tab to search for the desired connector. If the connector is not present in the  Built-in Connectors list, you will be prompted with the  +Create Custom Connector  link. You can also click this link to create a new  Custom Connector.Follow the steps given in the Creating your own Custom Connector section to build your own Custom Connector.    
Learn how to use the best tools for sales force automation and better customer engagement from Zoho's implementation specialists.
         If you'd like a personalized walk-through of our data preparation tool, please request a demo and we'll be happy to show you how to get the best out of Zoho DataPrep.
         
      
You are currently viewing the help pages of Qntrl’s earlier version. Click here to view our latest version—Qntrl 3.0's help articles.