Through A2A, you can obtain your access keys to integrate your application with the following Segura resources:
- PAM Core.
- SSH keys.
- Credentials.
- Devices.
- Remote sessions.
- Certificate Manager.
- Dashboards.
- Protected information.
- Related users.
- Systems.
Access the How to authenticate an A2A application document to integrate your application with Segura and the corresponding documents for more information about the available methods for each resource.