Perform the following actions to create the Custom Connector,
Navigate to the Microservices tab.
Click +Create New in the top-right corner.
Choose Connection and click Pick & Create.
Click the CUSTOM CONNECTOR category in the left pane.
Click Create New Custom Connector.
You can also establish a connection by clicking the Custom Connector cards. Learn More
The following major configurations are necessary to create a Custom Connector:
General defines the basic information of your Custom Connector, such as Connector name, Connector link name, Description, and Logo.
Security defines the authentication settings of the Custom Connector, such as Authentication Type, Authentication Parameters, and Scopes.
Continuing from the previous instructions, enter the Connector Name and Description for your Custom Connector.
Connector Name is the display name of the connector you want to create.
Description (Optional) is the text box which stores details or more information about the Custom Connector.
Click Create Custom Connector. You will be directed to the General section of the Custom Connector builder.
The General section consists of the basic details of the Connector.
The Connector name, Connector link name, and Description will be auto-populated from the initial page. You can also edit them by clicking on the respective field.
Upload a logo for your Custom Connector.
Note:
3. Click Save & Continue, and you will be directed to the Security section.
Authentication Type | Description | Fields |
Basic | This requires you to specify the keys as mentioned in the target services API docs. These connector configurations will be prompted during the connection authorization phase, where you need to key in the values for the parameters (username and password). They will be automatically encrypted with the base64 algorithm and passed as a header in the format: basic <encrypted_value> | Parameter Name: Display name of the field, which will be prompted when you authorize a connection. Note:
Parameter Key: API key as specified in the target services API documentation against which the parameter value needs to be sent. This Key will be prompted to the user with the mentioned Parameter Name during connection authorization. |
API Key | This allows you to connect with third-party APIs by authenticating with an API key. It acts as a unique identifier for authentication purposes. | Parameter Name: Display name of the parameter. This name will be prompted when you authorize a connection. Note:
Parameter Key: Key (as specified in the API documentation of the desired service) against which the parameter value needs to be sent. Note: The Parameters Key is a placeholder value and will be prompted with the given Parameter Name to the user during the connection authorization. Parameter Location: Decides how the authentication parameters will be sent along with the URLs specified in the invoke URL script. Supported parameter types are Query String, Form Data, and Header. |
OAuth1 | OAuth 1.0 protocol enables Creator applications to access third-party resources through an API without disclosing the user’s credentials. Once the user grants the authorization, the Creator application can use an access token provided by the third-party service to access the user's resources. OAuth1 is efficient only for connecting with web-based applications. It uses cryptographic signatures and temporary tokens to secure the connection. | Consumer Key: A unique identifier for a third-party application in OAuth1, used to identify the application in requests made to the service provider. It should be kept confidential by the application. Note:
Consumer Secret: A secret key associated with a consumer key in OAuth1, used to sign requests made by a third-party application to the service provider. Note:
Authorization URL: URL as specified in the API documentation of the desired service to get authorization for application access. Token URL: URL to fetch the access token in exchange for an request token as specified in the API documentation of the desired service. Request Token URL: URL to obtain request token, used to initiate the authorization process between the application and the third-party service. Revoke Token URL: URL to revoke specified OAuth1 access or refresh token. A revoke token request causes the removal of the client permissions associated with the specified token. Note:
|
OAuth2 | Authentication-OAuth2 OAuth 2.0 is an authorization protocol that gives limited access to user data on a web server. An OAuth 2.0 server issues an access token that the Creator applications can use to access protected resources on behalf of the resource owner. OAuth2 consists of scopes that allow Creator applications to request specific permissions from the user and are more compatible with both web and non-web-based applications. | Grant type: Refers the way to access the protected resources from the target server. The supported grant types are, Note:
Note:
Client Secret: Your client secret to authorize your application. Note:
Token URL: URL to fetch the access token as specified in the API documentation of the desired service. Note: The Request Token URL and Revoke Token URL fields specified below are applicable only when the Grant Type is selected as Authorization code. Revoke Token URL: URL to revoke specified OAuth2 access or refresh token. A revoke token request causes the removal of the client permissions associated with the specified token. Refresh Token URL: URL to access new access tokens when the current access token becomes invalid or expires. Note: The URL should be in a standard format withthe protocol(http), a hostname ( www.zylker.com), and a file name(index). E.g. http://www.zylker.com/index.
Bearer Name: Text that acts as a prefix in the authentication header for the API request. Expiry Time: Time (in seconds) at which the access token expires. The default expiry time will be 3600 seconds. Note:
|
OAuth Scopes (Optional) - This limits the level of access given to the user via access token. |
Scope Display Name: The display name of the third-party Scope. Note:
Scope Value: The level of access that you are requesting for the third-party service. Scope Delimiter: Delimiter with which the desired service API expects the scopes to be separated. Note: The default Scope Delimiter will be Comma. |
Once you complete entering the authentication details, mark the connector as ready.
Once you complete entering the authentication details, mark the connector as ready.
The stage has been changed from Draft to Ready.
Once marked Ready, You will be able to add connection using the Add Connection button.
After saving the Authentication Parameters in OAuth2, You will be directed to the OAuth Scopes section, or you can also navigate by clicking OAuth Scopes from the left pane.
On the next page, click +Add Scope.
Fill in the Scope Name and Scope Value. Click Add. Here we considered adding the scopes of Dropbox.
Click the Add New button to add more scopes.
Click the three horizontal ellipsis to Edit or Delete a specific scope record in the table.
If you want to delete multiple scopes, mark it by checking in the checkbox and click Delete, as shown below.
You can search for the specific scope by entering the scope name or scope value on the Search tab.
Click the Mark as Ready button. The stage will be changed from Draft to Ready.
Once the connector is marked Ready, You can add connection using Add Connections.
1. Navigate to the Microservices page and scroll down to reach the Connections section.
2. If you have three or less connections, click Manage Custom Connectors that appears across the Connections section.
3. i) If you have more than three connections, click View More. A list of all the connections in your account will appear.
ii) Click Manage Custom Connectors.
4. Click +Create Custom Connector.
5. If you find the Custom Connectors listed as cards, click the +Create New icon in the top-right corner to create a Custom Connector.
6. Follow the steps given in Creating your own Custom Connector section to build your own Custom Connector.
Navigate to the Microservices tab and click +Create New in the top-right corner.
Choose Connection and click Pick & Create.
Scroll down to the end of the Built-in Connectors page and click +Create Custom Connector.
Follow the steps given in the Creating your own Custom Connector section to build your own Custom Connector.
Learn how to use the best tools for sales force automation and better customer engagement from Zoho's implementation specialists.
If you'd like a personalized walk-through of our data preparation tool, please request a demo and we'll be happy to show you how to get the best out of Zoho DataPrep.
You are currently viewing the help pages of Qntrl’s earlier version. Click here to view our latest version—Qntrl 3.0's help articles.