This is most useful when building an Embedded Integration Hub and you need to make requests to external systems on the
user’s behalf in order to provide the best user experience.For example, if you want to provide your own End Users the ability to connect your SaaS platform to an external system,
like Slack, you may want the user to choose from a list of channels to post messages to. Before the Proxy API, each
use-case like this required a specific workflow to be implemented in your Integration. Now, you can use the Proxy API to
make requests to the Slack API directly from your application and show the results to the user.Another use case for this functionality is when a Connection requires some Connection Variables to be defined to make
requests from a Board. This situation is common when your Connector defines a dynamic base URL such as subdomain or a
region/data-center, but this information can only be known by making a request using the user’s credentials after they
have connected through Versori. Here, you can create a Connection as normal, then use the Proxy API to retrieve the
value of a Connection Variable, then use the Update Connection API to set the value of the
Connection Variable.
After onboarding a Connector to the Platform, providing the OpenAPI specification or the manually created
Actions are valid, prior to the Proxy API there was no other way to test the Connector’s functionality without building
a Board to actually use the Connector.With the Proxy API, users can now send requests to the system and validate that the Connector is working as expected.
Similar to testing Connectors, users can test the Connection to ensure that the credentials are correct and the system
responds as expected. This is particularly useful for credentials which are manually inputted by the user without
validation, for example API Key or Basic Authentication. However, even for OAuth 2.0 connections using
authorization_code, which requires proper authentication and will fail if provided invalid data, there’s still the
chances that the required scope for an operation is not granted, or the user has revoked the access.