Connect Secure icon

Connect Secure

Consume Connect Secure API

Actions222

Overview

This node interacts with the Connect Secure API to retrieve a specific integration rule by its identifier. It is useful in scenarios where you need to fetch detailed information about an integration rule within your Connect Secure environment, such as for auditing, monitoring, or further processing in an automation workflow.

For example, you might use this node to:

  • Retrieve configuration details of an integration rule before updating it.
  • Fetch integration rule data to display or log in another system.
  • Use the retrieved data as input for conditional logic or downstream processing steps.

Properties

Name Meaning
X USER ID The user identifier required by the API, sent as a header named X-USER-ID.
Id The numeric identifier of the integration rule to retrieve.

Output

The node outputs JSON data representing the integration rule corresponding to the provided Id. This JSON typically includes all relevant fields and metadata of the integration rule as returned by the Connect Secure API.

No binary data output is expected from this operation.

Dependencies

  • Requires an API key credential for authenticating with the Connect Secure API.
  • The node depends on the Connect Secure API being accessible and the provided user ID and integration rule ID being valid.
  • No additional environment variables are explicitly required beyond the API authentication setup.

Troubleshooting

  • Invalid or missing X USER ID: The API requires the X-USER-ID header; ensure this property is set correctly. Missing or incorrect values will likely cause authorization errors.
  • Invalid Id: Providing an invalid or non-existent integration rule ID will result in an error or empty response. Verify the ID before running the node.
  • API connectivity issues: Network problems or incorrect API credentials can cause failures. Check API endpoint accessibility and credential validity.
  • Error messages from API: These usually indicate issues like unauthorized access, resource not found, or malformed requests. Review the error message details and adjust inputs accordingly.

Links and References

Discussion