Protect Application-Specific Endpoints with OAuth

You can use OAuth to protect the exposed endpoint of any application that supports trigger connections and OAuth.

Take a look at the adapter documentation for your specific application to find out how OAuth is supported. See Configure Connection Security for links to security configuration prerequisites and steps for each adapter.