- Primeros pasos
- Introducción
- Conectores
- Conexiones
- Use credential assets for connections
- Desencadenadores
- Registro
- Disponibilidad de características de Integration Service
- Notificaciones
- Licencia
- Solución de problemas
- Creador de conectores
- Acerca del generador de conectores
- Crear tu primer conector
- Crear tu conector a partir de una definición de API
- Configurar la autenticación
- Utilizar variables en el Creador de conectores
- Diseñador de actividades
- Crear un desencadenador
- Lista de comprobación del Creador de conectores
- Primeros pasos
- Ejemplo A: crear un conector a partir de un lienzo en blanco con autenticación de token de acceso personal
- Ejemplo B: crear un conector a partir de un lienzo en blanco con autenticación de clave API
- Ejemplo C: crear un conector a partir de una especificación de API con autenticación de credenciales de cliente OAuth 2.0
- Act! 365
- ActiveCampaign
- Active Directory: vista previa
- Adobe Acrobat Sign
- Servicios de Adobe PDF
- Amazon Bedrock
- Amazon Connect
- Amazon Polly
- Amazon SES
- Amazon Transcribe
- Amazon Web Services
- Anthropic Claude
- Asana
- AWeber
- Azure AI Document Intelligence
- Azure Defender for Cloud
- Azure Maps
- BambooHR
- Box
- Brevo
- Calendly
- Campaign Monitor
- Cisco Webex Teams
- Citrix Hypervisor
- Citrix ShareFile
- Clearbit
- Confluence Cloud
- Constant Contact
- Coupa
- CrewAI: vista previa
- Customer.io
- Database Hub: vista previa
- Agente de Databricks
- Datadog
- BúsquedaProfunda
- Deputy
- Discord - Vista previa
- DocuSign
- Goteo
- Dropbox
- Dropbox Business
- Egnyte
- Eventbrite
- Tipos de cambio
- Exchange Server: vista previa
- Expensify
- Facebook
- Freshbooks
- Freshdesk
- Freshsales
- Freshservice
- GetResponse
- GitHub
- Gmail
- Plataforma Google Cloud
- Google Docs
- Google Drive
- Formularios de Google: vista previa
- Google Maps
- Google Sheets
- Google Speech-to-Text
- Texto a voz de Google
- Google Tasks: vista previa
- Google Vertex
- Google Vision
- Google Workspace
- GoToWebinar
- Greenhouse
- Hootsuite
- Http
- Webhook HTTP
- Hubspot CRM
- Hubspot Marketing
- HyperV: vista previa
- Icertis
- iContact
- Insightly CRM
- Intercom
- Jina.ai
- Jira
- Keap
- Klaviyo
- LinkedIn
- Correo
- Mailchimp
- Mailgun
- Mailjet
- MailerLite
- Marketo
- Microsoft 365
- Microsoft Azure
- Microsoft Azure Active Directory
- Microsoft Azure AI Foundry
- Microsoft Azure OpenAI
- Microsoft Azure Sentinel
- Microsoft Dynamics 365 CRM
- Microsoft OneDrive y SharePoint
- Microsoft Outlook 365
- Microsoft Power Automate: vista previa
- Opinión de Microsoft
- Microsoft Sentinel Threat Intelligence
- Microsoft Teams
- Microsoft Translator
- Microsoft Vision
- Miro
- NetIQ eDirectory
- Nvidia NIM: vista previa
- OKTA
- OpenAI
- LLM compatible con OpenAI V1
- Oracle Eloqua
- Oracle NetSuite
- PagerDuty
- PayPal
- PDFMonkey
- Perplexity
- Pinecone
- Pipedrive
- QuickBooksOnline
- Quip
- Salesforce
- Salesforce AgentForce y flujos: vista previa
- Salesforce Marketing Cloud
- SAP BAPI
- SAP Cloud for Customer
- SAP Concur
- SAP OData
- SendGrid
- ServiceNow
- Shopify
- Slack
- SmartRecruiters
- Smartsheet
- Snowflake
- Snowflake Cortex
- Stripe
- Sugar Enterprise
- Sugar Professional
- Sugar Sell
- Sugar Serve
- System Center: vista previa
- TangoCard
- Todoist
- Trello
- Twilio
- UiPath Apps - Preview
- Data Fabric de UiPath: vista previa
- Actividades de UiPath GenAI
- UiPath Orchestrator
- X (anteriormente Twitter)
- Xero
- watsonx.ai
- WhatsApp Business
- WooCommerce
- Viable
- Workday
- REST de Workday
- VMware ESXi vSphere
- YouTube
- Zendesk
- Zoho Campaigns
- Zoho Desk
- Zoho Mail
- Zoom
- ZoomInfo
Guía de usuario de Integration Service
Instead of entering credentials directly when creating connections, you can reference an Orchestrator credential asset linked to an external vault. Integration Service resolves the credential at runtime through Orchestrator and never stores it in the Integration Service database.
This feature is designed for organizations with centralized credential management requirements or strict security and compliance policies.
Cómo funciona
When a connection uses a credential asset, Integration Service calls the Orchestrator credential asset, which in turn retrieves the secret from the linked external vault. The resolved value is cached in memory (encrypted) for one hour to reduce repeated vault API calls.
If a credential becomes invalid before the cache expires — for example, because it was rotated — Integration Service automatically fetches a fresh value from the vault and retries the failed step. All communication between Integration Service and Orchestrator or the external vault is encrypted using HTTPS/TLS.
This feature applies to secret-type fields on the connection screen (such as passwords, API keys, and client secrets). OAuth 2.0 access and refresh tokens are still stored in Integration Service after the initial authorization flow, because the OAuth protocol requires more than a client secret to authenticate. You can use a credential asset for the client secret field in BYOA (Bring your own OAuth 2.0 app) authentication types, but not for the resulting OAuth tokens.
Requisitos previos
- Integration Service está habilitado y aprovisionado para tu tenant.
- At least one credential store is configured in Orchestrator. Supported external vaults include CyberArk, HashiCorp Vault, and all others supported by Orchestrator's credential store integrations.
- A credential asset of type Credential exists in an Orchestrator folder that references the vault secret. Assets of type Text, Integer, or Boolean are not supported.
Step 1: Configure the credential store in Orchestrator
Set up a credential store in Orchestrator that connects to your external vault.
For instructions, see About credential stores in the Orchestrator user guide.
Step 2: Create a credential asset in Orchestrator
In an Orchestrator folder, create an asset of type Credential and link it to the secret in the credential store.
For instructions, see Managing assets in Orchestrator in the Orchestrator user guide.
Step 3: Reference the credential asset when creating a connection
-
In Orchestrator, select a folder and navigate to the Connections tab.
-
Select Add connection and choose the connector.
-
On the connection creation page, locate a secret-type field (for example, Password, API Key, or Client Secret).
-
Select the menu icon next to the field and select Use credential asset.
-
Select the credential asset you want to use. You can select assets from any Orchestrator folder you have access to.
-
Complete any remaining fields and select Connect.
Preguntas frecuentes
Are credentials fetched from the vault on every request?
No. Credentials are cached in memory (encrypted) for one hour to reduce repeated vault API calls and improve runtime efficiency. The cache duration cannot be configured.
What happens when a credential is rotated before the cache expires?
If a request fails because the cached credential has become invalid, Integration Service automatically fetches a fresh value from the vault and retries the failed step.
Are credentials stored in Integration Service?
No. Credentials are not written to the Integration Service database. They are held in memory in an encrypted state for the one-hour cache duration only.
Does this work for all connectors?
Yes. This feature works with all connectors. Any connector that has secret-type input fields on its connection form (such as API Key, Password, or Client Secret) supports credential asset references, regardless of authentication type.
Does this apply to all fields on the connection form?
Currently, only secret-type fields are supported (such as passwords, API keys, and client secrets). Support for additional field types is planned.
Which Orchestrator asset types are supported?
Only assets of type Credential are supported. Text, Boolean, and Integer assets cannot be used.
Which external vaults are supported?
All credential store types supported by Orchestrator are supported. For the full list, see About credential stores.
Is proxy supported?
Yes. Both connected and disconnected proxy configurations are supported.
Can I use a credential asset for OAuth tokens?
No. OAuth 2.0 access and refresh tokens are always stored in Integration Service after the initial authorization flow. Only secret-type input fields on the connection screen (such as Client Secret in BYOA authentication) can reference a credential asset.