|
| 1 | +# External Integration Overview |
| 2 | + |
| 3 | +PERSCOM.io provides a vast array of different options to integrate your personnel data with third-party services. These services include the |
| 4 | +PERSCOM.io [API](/external-integration/api), [OAuth 2.0](/external-integration/oauth), |
| 5 | +[OpenID Connect (OIDC)](/external-integration/oauth/oidc), [Webhooks](/external-integration/webhooks), and |
| 6 | +[Widgets](/external-integration/widgets). Visit the individual integrations page to view more information and how-to's on how to integrate |
| 7 | +these services. |
| 8 | + |
| 9 | +## Choosing an Integration |
| 10 | + |
| 11 | +Below is a brief overview of each integration and the best use cases for each. |
| 12 | + |
| 13 | +### API |
| 14 | + |
| 15 | +The PERSCOM.io API is a RESTful HTTP interface for interacting with your personnel data on a machine to machine level. The API would be best |
| 16 | +used for: |
| 17 | + |
| 18 | +- Querying personnel data for reports and analysis |
| 19 | +- Automating business workflows |
| 20 | +- Building custom software that will consume and display PERSCOM.io personnel data |
| 21 | +- Updating and managing personnel data from a third-party software |
| 22 | + |
| 23 | +### OAuth 2.0 |
| 24 | + |
| 25 | +OAuth 2.0 is an authorization protocol, built on top of the PERSCOM.io API, that enables third-party applications to access your |
| 26 | +organization's data without giving them your username and password. Here are some common use cases where OAuth 2.0 might be used: |
| 27 | + |
| 28 | +1. Single Sign-On (SSO): OAuth 2.0 can be used to enable SSO across multiple applications. A user can authenticate once, and then use that |
| 29 | + authentication to access other applications without having to log in again. |
| 30 | +2. Accessing PERSCOM.io API: OAuth 2.0 can be used to allow an application to access data from PERSCOM.io via the API. This is useful when |
| 31 | + an application needs to access data that is not stored locally. |
| 32 | +3. Mobile and Web Applications: OAuth 2.0 can be used to secure mobile and web applications, allowing users to log in using their |
| 33 | + credentials from another service. This is particularly useful for mobile applications, where users may not want to enter their |
| 34 | + credentials into a small screen. |
| 35 | +4. Enterprise Applications: OAuth 2.0 can be used to secure enterprise applications, allowing users to access resources across multiple |
| 36 | + applications without having to authenticate multiple times. |
| 37 | + |
| 38 | +### OpenID Connect (OIDC) |
| 39 | + |
| 40 | +OIDC is an authentication protocol that is built on top of OAuth 2.0. OIDC outlines a standard protocol for providing useable data about an |
| 41 | +authenticated user that can be used for third-party services to consume. Here are some common uses cases for OIDC: |
| 42 | + |
| 43 | +1. Single Sign-On (SSO): OIDC can be used to enable SSO across multiple applications. A user can authenticate once, and then use that |
| 44 | + authentication to access other applications without having to log in again. OIDC provides a standardized way for applications to verify a |
| 45 | + user's identity and access tokens, which can be used to access other resources. |
| 46 | +2. Identity Verification: OIDC can be used to verify a user's identity. When a user logs in, the OIDC provider sends an ID token to the |
| 47 | + application that contains information about the user, such as their name and email address. The application can use this information to |
| 48 | + verify the user's identity. |
| 49 | +3. Authorization: OIDC can be used to authorize access to resources. Applications can use OIDC to obtain access tokens that can be used to |
| 50 | + access protected resources. |
| 51 | +4. Mobile and Web Applications: OIDC can be used to secure mobile and web applications, allowing users to log in using their credentials |
| 52 | + from another service. This is particularly useful for mobile applications, where users may not want to enter their credentials into a |
| 53 | + small screen. |
| 54 | + |
| 55 | +### Webhooks |
| 56 | + |
| 57 | +Webhooks can be used to enable real-time notifications and data updates for third-party services, such as a messaging platform, an external |
| 58 | +database or a custom reporting tool. Here are some common use cases for webhooks: |
| 59 | + |
| 60 | +1. Automated Workflows: Webhooks can be used to trigger automated workflows between applications. For example, when a new user is added to |
| 61 | + PERSCOM.io, a webhook can automatically trigger the creation of a new record in a project management tool. |
| 62 | +2. Notifications: Webhooks can be used to send notifications to users or applications. For example, when a user completes a form, a webhook |
| 63 | + can be used to send a notification to start importing the user data into other managed services. |
| 64 | +3. Data Synchronization: Webhooks can be used to keep data synchronized between applications. For example, when a user updates their contact |
| 65 | + information in PERSCOM.io, a webhook can be used to update the information in other connected applications. |
| 66 | +4. Real-Time Data Transfer: Webhooks allow for real-time data transfer between applications. This is useful for applications that require |
| 67 | + real-time data, such as chat applications or real-time analytics. |
| 68 | + |
| 69 | +### Widgets |
| 70 | + |
| 71 | +Widgets provide a way to display your personnel data within another third-party service via HTML and Javascript. PERSCOM.io offers the |
| 72 | +following embeddable widgets: |
| 73 | + |
| 74 | +1. Roster and Personnel Files |
| 75 | +2. Awards |
| 76 | +3. Ranks |
| 77 | +4. Qualifications |
| 78 | +5. Calendar and Events |
0 commit comments