AvantGuard - ConnectSecure icon

AvantGuard - ConnectSecure

AvantGuard - ConnectSecure

Actions223

Overview

This node implements an authorization step for the "Auth" resource with the "Post Authorize" operation. It is designed to send a request that includes a client authentication token in the headers, typically used to authenticate or authorize a client application against an external service. This node is beneficial when you need to programmatically obtain or validate authorization tokens as part of an automated workflow.

Practical examples include:

  • Automating OAuth2 token exchange flows where a client token must be sent to receive access credentials.
  • Integrating with APIs that require a base64-encoded client authentication token in the header for authorization.
  • Performing secure client authorization before making further API calls within a workflow.

Properties

Name Meaning
Client Auth Token A required string containing a base64-encoded value of (tenant+client_id:client_secret). This token is sent in the request header Client-Auth-Token to authorize the client.

Output

The node outputs JSON data received from the authorization endpoint. The exact structure depends on the external API's response but generally includes authorization tokens or status information confirming successful authorization.

If the node supports binary data output, it would represent any binary payload returned by the authorization endpoint; however, based on the provided code and properties, the primary output is JSON.

Dependencies

  • Requires an API key credential configured in n8n to authenticate requests to the external service.
  • Depends on the base URL and other connection details specified in the node’s credentials.
  • Uses an OpenAPI specification (openapi.json) bundled with the node to define its operations and properties.
  • Relies on the @avantguardllc/n8n-openapi-node package for building properties and handling requests.

Troubleshooting

  • Missing or invalid Client Auth Token: If the Client Auth Token property is empty or incorrectly formatted (not base64 encoded as expected), the authorization request will fail. Ensure the token is correctly generated and provided.
  • Authentication errors: Errors indicating unauthorized access usually mean the token is invalid or expired. Regenerate the token or verify credentials.
  • Network or configuration issues: Verify that the base URL and credentials are correctly set up in n8n. Connection failures may result from incorrect URLs or missing API keys.
  • Unexpected response format: If the external API changes its response schema, the node might not parse the output correctly. Check the API documentation for updates.

Links and References

Discussion