Invoke Application-Specific Endpoints with OAuth
You can use OAuth to invoke applications that support invoke connections and OAuth.
Take a look at the adapter documentation for your specific application to find out how OAuth is supported. See Configure Connection Security for links to security configuration prerequisites and steps for each adapter.