Learn About Security Policies for Invoke Connections
The adapter definition document supports a number of managed outbound security policies for invoke connection definitions. These security policies allow integrations to securely connect to and invoke external applications.
Some of the managed security policies do support extensions in order to accommodate the authentication enhancements warranted by the applications.
Managed Security Policies for Invoke Connections:
- HTTP Basic Authentication
- API Key Based Authentication
- OCI Signature Version 1
- OAuth 1.0 One-Legged Authentication
- OAuth Resource Owner Password Credentials (extendable)
- OAuth Client Credentials (extendable)
- OAuth Authorization Code Policy (extendable)
- OAuth JWT User Assertion
- OAuth JWT Client Assertion