How Can We Help?

Search for answers or browse our knowledge base.

Recent Comments

    Archives

      Solutions

      Docs

      Contact

      SYNCNOW

      SyncNow logo SyncNow – connect teams , tools and processes

      Connector Security

      < All Topics

      Connectors data is encrypted in the database, we recommend using TLS for http communication in order not to reveal credentials and other connector data.

      Connector Authentication Methods

      SyncNow currently supports these authentication methods

      1. Basic Authentication with username\password
      2. Basic Authentication with username\token

       

      Webhook Security

      Webhooks are used for continuous synchronization and DevOps Gate Processes, SyncNow registers webhooks for you when you activate a Sync process. Webhooks can aurhenticate with SyncNow with the following :

      1. Anonymous notifications – use this if the source system (Azure DevOps | Jira | ServiceNow etc)  supports only anonymous notifications to SyncNow. If Anonymous notifications is checked then SyncNow will not authenticate source requests to its notification API.

        We strongly recommend to Add IP restrictions if Anonymous notifications is checked.

      2. Allowed IP Addresses – check this to allow specific IP addresses or IP ranges in the format of network/mask separated with commas from which SyncNow will allow webhook notifications to its API.
      3. SyncNow API Key (secret)
      Warning

      If Anonymous notifications is checked then SyncNow will not authenticate source requests to its notification API.

      We strongly recommend to add IP restrictions if Anonymous notifications is checked.


      Setting SyncNow API Key

      The following steps are required to set an API Key for webhook communication:

      1. Navigate to Users
      2. Create a user which will be as the user that will be authenticated with SyncNow
      3.  Set an API Key for the user, Click Secret String to Generate a key that will be used for SyncNow authentication
      4. Save the user information
      5. Set this user as the authenticating user in webhook security at the system connector security section
        Was this article helpful?
        0 out of 5 stars
        5 Stars 0%
        4 Stars 0%
        3 Stars 0%
        2 Stars 0%
        1 Stars 0%
        5
        How can we improve this article?
        Please submit the reason for your vote so that we can improve the article.
        Table of Contents
        Skip to content