Skip to main content
Skip table of contents


You can connect to any type of API you have access to. We support different types of authentication that should meet most requirements.


Enter the URL of the endpoint you want to retrieve data from.

For example:



You may need to send information about the problem to request the data source. To do this, you can add variable names in curly brackets (like {myCustomVariable}) anywhere within the URL. The value of this variable can be customized in the field configuration later on.



Variables can also be used in the content of a POST body.


In this section you can define the authentication method of the data source you want to connect with. Currently, the following methods are supported:

  • No authentication

  • Basic Auth (Basic HTTP Authentication)

  • Bearer Token

  • OAuth 2 (OAuth 2 )

  • Custom Auth Header (for API tokens or other header based authentication)

Custom Auth Header

Define a single header name and value that you need for authentication. The header value is separately encrypted and will never be displayed again after saving the data source.

Custom Headers

Define custom headers as needed to individualize the requests sent to the data source. These custom headers will be sent with each request. Enter the name and value of the header you want to add and click the + button to check and confirm it.

Don’t store secrets in this section. Please use the Custom Auth Header authentication instead

Response Type

Defines the response type returned by the data source. Choose either JSONor XML.


The following TCP ports are supported for connecting to your data source:

  • 80

  • 443

  • 4443

  • 8000

  • 8001

  • 8008

  • 8077

  • 8080

  • 8443

  • 8444

  • 9080

  • 5867

  • 37469

  • 37470

  • 3128

If the port you need is not on the list, feel free to contact our Support.

Security Recommendations (warning)

For best practices when connecting to an external URL/REST data source, we recommend the following steps:

  1. Choose a suitable authentication method: Use the most secure authentication method supported by the external data source. The recommended order of preference is OAuth 2, Bearer Token, Custom Auth Header, Basic Auth, and finally, No Authentication (only for non-sensitive data).

  2. Use a dedicated user account: If the data source supports user accounts, create a dedicated user account with limited permissions for connecting to the external data source. Grant read-only access to the specific data required by the app.

  3. Rotate passwords and tokens regularly: If using Basic Auth or Bearer Token, change the password or token every six months, or more frequently if required by your organization's security policies. For OAuth 2, ensure token expiration and refresh policies are properly configured.

  4. Enable secure communication: If the external data source supports HTTPS, make sure this option is enabled to encrypt data transmitted between the app and the data source.

  5. Monitor access and usage: Regularly review logs and reports from the external data source to identify suspicious activities, such as unauthorized access or data exfiltration.

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.