Connection Email
Purpose
Defines the connection parameters for an Email endpoint.
This Asset can be used by:
Asset type | Link |
---|---|
Source | Email Source |
Service | Email Service |
Configuration
Name & Description
Name
: Name of the Asset. Spaces are not allowed in the name.
Description
: Enter a description.
The Asset Usage
box shows how many times this Asset is used and which parts are referencing it. Click to expand and then click to follow, if any.
Email Connection Type
The Email connection Asset supports two different types of Email connections:
- Standard: This is mode supports POP3/SMTP and IMAP connection protocols.
- Microsoft 365: This mode supports the Microsoft 365 email connection protocol. Note, that this is different from the standard type and proprietary to Microsoft.
You should be able to obtain the necessary parameters from your email provider or your administrator.
Standard Mail Settings
This mode supports standard email protocols like SMTP, POP3, and IMAP.
Incoming mail server
Specify connection parameters for SMTP, POP3, IMAP connections.
-
Incoming mail server protocol
: Pick eitherIMAP
orPOP3
, depending on how you want to connect to the incoming email. PickNo incoming emails
if you do not want to collect incoming emails. -
User
(macro supported): Enter the username for the outgoing email account, e.g.my.name@domain.com
. -
Host
(macro supported): This is the host, e.g.my-host.domain.com
. -
Port
(macro supported): The IP-port to use for the connection.For IMAP this is typically
143
for non TLS/SSL connections, or993
for TLS/SSL secured connections.For POP3 this is typically
110
for non TLS/SSL connections, or995
for TLS/SSL secured connections. -
Connection security
: Pick the respective encryption for your connection. -
Check server identity
: Force-checks the server identity based on the authenticity of the certificate presented by the email server. Only applies to connections which use encryption (TLS/SSL) -
Credential type
: Please see Credential type settings below.
Outgoing mail server
-
Outgoing mail server protocol
: Pick eitherSMTP
if you want to send emails, else pickNo outgoing emails
.. -
User
(macro supported): Enter the username for the outgoing email account, e.g.my.name@domain.com
. -
Host
(macro supported): This is the host, e.g.smtp.domain.com
. -
Port
(macro supported): The IP-port to use for the connection.For SMTP this is typically
25
for non TLS/SSL connections, or2525
,587
,465
for TLS/SSL encrypted connections. -
Connection security
: Pick the respective encryption for your connection. -
Check server identity
: Force-checks the server identity based on the authenticity of the certificate presented by the email server. Only applies to connections which use encryption (TLS/SSL) -
Credential type
: Please see Credential type settings below
Credential type
The credential type defined the authentication method/flow to be applied.
The Email Connection Asset supports the following credential flows:
- None
- OAuth (Client Credentials)
- OAuth (Device Flow)
- Secret
None
No authentication is performed.
OAuth (Client Credentials)
The Client Credentials Flow involves an application exchanging its application credentials, such as client ID and client secret, for an access token. You can check the Auth0 documentation for an example description.
-
Authority
: The authority URL as provided by the party to connect to. This is the endpoint which authorizes the connection and issues a respective token. -
Client ID
: An ID issued by the authenticating authority. -
Scopes
: These are the authentication scopes requested by the connection and which ust be granted by the authenticating authority. This is typically defined by the issuing authority in the context of the client id. I.e. if the other party has granted the access scopes which you define here, they authentication will be successful. Otherwise, the authentication may fail.
OAuth (Device Flow)
With input-constrained devices that connect to the internet, rather than authenticate the user directly, the device asks the user to go to a link on their computer or smartphone and authorize the device. This avoids a poor user experience for devices that do not have an easy way to enter text. To do this, device apps use the Device Authorization Flow, in which they pass along their Client ID to initiate the authorization process and get a token.
You can check the Auth0 documentation for an example description.
For settings please see Client Credential Flow.
Secret
-
Secret
: Select aSecret
from the drop-down list. If the list is empty, then you need to first create a secret to be able to assign it here.Please follow this link to "Advanced Concepts" to learn about the concept and use of the Security Storage.
Microsoft 365 Settings
This mode supports the Microsoft 365 email connection protocol. Note, that this is different from the standard type and proprietary to Microsoft.
Credential type
Microsoft Email supports two different authentication flows:
- OAuth (Client Credentials)
- OAuth (Device Flow)
Please check with your Microsoft endpoint which authentication flow is appropriate for your use case.
Microsoft OAuth (Client Credentials)
The Client Credentials Flow involves an application exchanging its application credentials, such as client ID and client secret, for an access token. You can check the Auth0 documentation for an example description.
-
Authority
: The authority URL as provided by the party to connect to. This is the endpoint which authorizes the connection and issues a respective token. -
Client ID
: An ID issued by the authenticating authority. -
Scopes
: These are the authentication scopes requested by the connection and which ust be granted by the authenticating authority. This is typically defined by the issuing authority in the context of the client id. I.e. if the other party has granted the access scopes which you define here, they authentication will be successful. Otherwise, the authentication may fail.
Microsoft OAuth (Device Flow)
With input-constrained devices that connect to the internet, rather than authenticate the user directly, the device asks the user to go to a link on their computer or smartphone and authorize the device. This avoids a poor user experience for devices that do not have an easy way to enter text. To do this, device apps use the Device Authorization Flow, in which they pass along their Client ID to initiate the authorization process and get a token.
You can check the Auth0 documentation for an example description.
For settings please see Microsoft Client Credential Flow above.
You can use ${...} macros to expand variables defined in environment variables.
Please note, that the creation of the online documentation is Work-In-Progress. It is constantly being updated. should you have questions or suggestions, please don't hesitate to contact us at support@layline.io .