Skip to main content
Version: 1.2.x

Connection Email

Purpose

Defines the connection parameters for an Email endpoint.

This Asset can be used by:

Asset typeLink
SourceEmail Source
ServiceEmail Service

Configuration

Name & Description

Name & Description (Connection Email)

Name : Name of the Asset. Spaces are not allowed in the name.

Description : Enter a description.

The Asset Usage box shows how many times this Asset is used and which parts are referencing it. Click to expand and then click to follow, if any.

Email Connection Type

Email Connection Type

The Email connection Asset supports two different types of Email connections:

  1. Standard: This is mode supports POP3/SMTP and IMAP connection protocols.
  2. Microsoft 365: This mode supports the Microsoft 365 email connection protocol. Note, that this is different from the standard type and proprietary to Microsoft.
info

You should be able to obtain the necessary parameters from your email provider or your administrator.

Standard Mail Settings

This mode supports standard email protocols like SMTP, POP3, and IMAP.

Incoming mail server

Specify connection parameters for SMTP, POP3, IMAP connections.

Incoming Email IMAP/POP3 (Connection Email)

  • Incoming mail server protocol: Pick either IMAP or POP3, depending on how you want to connect to the incoming email. Pick No incoming emails if you do not want to collect incoming emails.

  • User (macro supported): Enter the username for the outgoing email account, e.g. my.name@domain.com.

  • Host (macro supported): This is the host, e.g. my-host.domain.com.

  • Port (macro supported): The IP-port to use for the connection.

    For IMAP this is typically 143 for non TLS/SSL connections, or 993 for TLS/SSL secured connections.

    For POP3 this is typically 110 for non TLS/SSL connections, or 995 for TLS/SSL secured connections.

  • Connection security: Pick the respective encryption for your connection.

  • Check server identity: Force-checks the server identity based on the authenticity of the certificate presented by the email server. Only applies to connections which use encryption (TLS/SSL)

  • Credential type: Please see Credential type settings below.

Outgoing mail server

Outgoing Email IMAP/POP3 (Connection Email)

  • Outgoing mail server protocol: Pick either SMTP if you want to send emails, else pick No outgoing emails..

  • User (macro supported): Enter the username for the outgoing email account, e.g. my.name@domain.com.

  • Host (macro supported): This is the host, e.g. smtp.domain.com.

  • Port (macro supported): The IP-port to use for the connection.

    For SMTP this is typically 25 for non TLS/SSL connections, or 2525, 587, 465 for TLS/SSL encrypted connections.

  • Connection security: Pick the respective encryption for your connection.

  • Check server identity: Force-checks the server identity based on the authenticity of the certificate presented by the email server. Only applies to connections which use encryption (TLS/SSL)

  • Credential type: Please see Credential type settings below

Credential type

The credential type defined the authentication method/flow to be applied.

The Email Connection Asset supports the following credential flows:

  1. None
  2. OAuth (Client Credentials)
  3. OAuth (Device Flow)
  4. Secret
None

No authentication is performed.

OAuth (Client Credentials)

The Client Credentials Flow involves an application exchanging its application credentials, such as client ID and client secret, for an access token. You can check the Auth0 documentation for an example description.

OAuth Client Credential Flow (Connection Email)

  • Authority: The authority URL as provided by the party to connect to. This is the endpoint which authorizes the connection and issues a respective token.

  • Client ID: An ID issued by the authenticating authority.

  • Scopes: These are the authentication scopes requested by the connection and which ust be granted by the authenticating authority. This is typically defined by the issuing authority in the context of the client id. I.e. if the other party has granted the access scopes which you define here, they authentication will be successful. Otherwise, the authentication may fail.

OAuth (Device Flow)

With input-constrained devices that connect to the internet, rather than authenticate the user directly, the device asks the user to go to a link on their computer or smartphone and authorize the device. This avoids a poor user experience for devices that do not have an easy way to enter text. To do this, device apps use the Device Authorization Flow, in which they pass along their Client ID to initiate the authorization process and get a token.

You can check the Auth0 documentation for an example description.

For settings please see Client Credential Flow.

Secret

Microsoft 365 Settings

This mode supports the Microsoft 365 email connection protocol. Note, that this is different from the standard type and proprietary to Microsoft.

Microsoft 365 Settings (Connection Email)

Credential type

Microsoft Email supports two different authentication flows:

  1. OAuth (Client Credentials)
  2. OAuth (Device Flow)

Please check with your Microsoft endpoint which authentication flow is appropriate for your use case.

Microsoft OAuth (Client Credentials)

The Client Credentials Flow involves an application exchanging its application credentials, such as client ID and client secret, for an access token. You can check the Auth0 documentation for an example description.

Microsoft OAuth Client Credential Flow (Connection Email)

  • Authority: The authority URL as provided by the party to connect to. This is the endpoint which authorizes the connection and issues a respective token.

  • Client ID: An ID issued by the authenticating authority.

  • Scopes: These are the authentication scopes requested by the connection and which ust be granted by the authenticating authority. This is typically defined by the issuing authority in the context of the client id. I.e. if the other party has granted the access scopes which you define here, they authentication will be successful. Otherwise, the authentication may fail.

Microsoft OAuth (Device Flow)

With input-constrained devices that connect to the internet, rather than authenticate the user directly, the device asks the user to go to a link on their computer or smartphone and authorize the device. This avoids a poor user experience for devices that do not have an easy way to enter text. To do this, device apps use the Device Authorization Flow, in which they pass along their Client ID to initiate the authorization process and get a token.

You can check the Auth0 documentation for an example description.

For settings please see Microsoft Client Credential Flow above.


Fields marked with "macro supported"

You can use ${...} macros to expand variables defined in environment variables.


Can't find what you are looking for?

Please note, that the creation of the online documentation is Work-In-Progress. It is constantly being updated. should you have questions or suggestions, please don't hesitate to contact us at support@layline.io .