Connection Methods
OX supports multiple connection methods so you can connect source control systems, cloud platforms, and security tools using an approach that matches your deployment model, security posture, and permission requirements. Each method represents a common integration pattern used across OX connectors.
How to choose a connection method
Select a connection method based on where your systems are hosted, how access is managed in your organization, and whether your environment allows inbound connectivity.
SaaS environments typically use App, Identity Provider, or Token connections. On-prem or restricted environments require OX Broker.
OX supports several connection methods that follow common integration patterns across connectors. Each method differs in how authentication is handled, how permissions are managed, and how connectivity is established.
App
The App method is the most straightforward and easy to apply. It uses a standard OAuth-based installation flow that can be completed with minimal configuration.
During setup, permissions are requested and scoped automatically, lowering configuration overhead and reducing the steps you need to take. Because the integration is managed and permissions are granted through a guided install process, this method is ideal for quick onboarding.
Identity Provider
The Identity Provider method relies on an external authentication system such as SSO, allowing users to authenticate through a centralized identity service instead of managing tokens directly.
This method removes the need for API token handling while providing federated access using established identity standards. It’s simple in terms of credential management and works well if you already use an identity provider for access control.
Token
The Token method uses direct API credentials to create the connection. Tokens can be scoped with granular permissions, letting you control exactly what resources OX can access.
This pattern is common when an organization requires fine-tuned access restrictions or must comply with strict security policies. Unlike managed App integrations that abstract permission details, this method makes permissions explicit and configurable.
OX Broker
OX Broker is a secure, containerized service that runs in your environment and enables communication between internal resources and OX services. Instead of requiring inbound access from the internet, the broker initiates a secure outbound connection to OX.
This reverses the traditional connectivity model, removing the need for open inbound ports or whitelisted IPs. It’s particularly useful for restricted or on-premises environments where network security or internal access constraints are high.
Connection methods comparison
App
SaaS
Managed integration
Not required
Limited
Outbound
Fast setup is preferred
Identity Provider
SaaS
Centralized authentication
Not required
Limited
Outbound
Central identity is in place
Token
SaaS
Direct API access
Required
Full
Outbound
Fine-grained permissions are required
OX Broker
On-Prem / Restricted
Internal system access
Depends on integration
Depends on integration
Outbound-only
Inbound connectivity is restricted
Notes
Not all connectors support all connection methods.
Available methods are listed on each connector’s setup page.
Some connectors support multiple methods to address different deployment scenarios.
Last updated
