Applications
  • 2 minutes to read
  • Dark
    Light
  • PDF

Applications

  • Dark
    Light
  • PDF

Article summary

This document provides information about the Applications report screen, which displays details about applications authorized to consume the available APIs.

More information in APIs A2A.

Prerequisites

  • System administrator permission.

Path to access

  1. On senhasegura, in the navigation bar, hover over the Products menu and select A2A.
  2. In the side menu, select Applications > Applications.

Actions menu

ItemTypeDescription
AddButtonDirects to the Add application screen.
ActionsDropdown menuDisplays the options Print report, Export CSV, and Schedule report.

Search fields

Info

To view all search fields, click More.

ItemTypeDescription
CodeText fieldFilters applications by their identification code in senhasegura.
NameText fieldFilters applications by their identification name.
SystemText fieldFilters applications by the system where they can be used.
EnvironmentText fieldFilters applications by the environment where they can be used.
TagsText fieldFilters applications by associated keywords.
Authentication methodDropdown menuFilters applications by the authentication method used. The options are: No, OAuth 1.0, OAuth 2.0, and AWS.
StatusDropdown menuFilters applications by their activation status. Options are Enabled and Disabled. Clear the field to enable the All option.
Created onDate pickerFilters applications by the period they were created.

Report fields

  • ID.
  • Name.
  • Systems.
  • Environments.
  • Tags.
  • Status.
  • Authentication method.
  • Created at.
  • Actions:
    • Authorizations: opens the Application Authorization screen.
    • Edit: opens the Edit Application screen.
    • View: opens the Application Configuration screen.
Info

By default, the report displays 30 records per screen. To go to the next screen, click the forward button at the end of the report.

Add/Edit application screen

This section provides information about the Add application and Edit application screens, which share the same fields.

ItemTypeRequiredDescription
Application name*Text fieldYesApplication identification name.
Use OAuth signature*Dropdown menuYesSelects the authentication method used. The options are No, OAuth 1.0, OAuth 2.0, and AWS.
Status*Radio buttonYesSets the application status as Enabled or Disabled.
TagsText fieldNoKeywords to categorize the application.
DescriptionText fieldNoAdditional information about the application.
Add (Amazon AWS ARNs)ButtonNoAdds ARNs to the application if the chosen authentication method is AWS. More information in AWS Security Credentials.

Amazon AWS ARNs section

ItemTypeRequiredDescription
AddButtonNoAdds ARNs to the application if the chosen authentication method is AWS. More information in AWS Security Credentials.
Select itemsCheckboxNoSelects records in the ARN table and enables the Remove selected button.

Application configuration screen

The Application Configuration screen displays all details related to the created application.

  • Authentication method: authentication method used by the application.
  • Application: application identification name.
  • Client identifier: unique code identifying the application, varying according to the authentication method:
    • Client ID: used for OAuth 2.0 authentication.
    • Consumer key: used for OAuth 1.0 authentication.
    • Access key ID: used for AWS authentication.
  • Secret key: secret used to authenticate the application, varying according to the authentication method:
    • Client Secret: used for OAuth 2.0 authentication. Sensitive information. Click Show to display.
    • Secret Access Key: used for AWS authentication. Sensitive information. Click Show to display.
  • Amazon ARNs: unique identifiers for Amazon resources.
  • System: system where the application’s authorization will be used. Information available after creating an authorization for the application.
  • Environment: environment where the application’s authorization will be used. Information available after creating an authorization for the application.
  • Credentials: information about the credentials the authorization can access.

Was this article helpful?