Learn About Security Policies for Trigger Connections

The adapter definition document supports a number of managed inbound security policies for trigger connection definitions. These security policies protect your endpoints by validating incoming requests from external applications.