APIs A2A

Prev Next

Through A2A, you can obtain your access keys to integrate your application with the following Segura resources:

  • PAM Core.
    • SSH keys.
    • Credentials.
    • Devices.
    • Remote sessions.
  • Certificate Manager.
  • Dashboards.
  • Protected information.
  • Related users.
  • Systems.

Access the How to authenticate an A2A application document to integrate your application with Segura and the corresponding documents for more information about the available methods for each resource.