Setting up authentication
Overview
All supported third-party services require some form of authentication to accept Fuse's external requests. In Fuse, this authentication information is used to create the integrations (see Add an Integration (Admin) for more) that the Integration modules use to access your solutions.
This page describes how to set up authentication for all Fuse-supported third-party services.
NOTE: The following assumes that you have already created an appropriate account and working solution on one of Fuse's supported third-party services.
Authentication setup guides
Google Dialogflow
What you need to set up:
A service account.
A service account key.
Setup steps:
See the guided steps in the expandable box below.
All done?
You will use your service account key's JSON in Fuse when creating an integration for your Dialogflow agent. See Add an Integration (Admin) for more information.
IMPORTANT! Keep your service account key in a secure location as with any sensitive authentication information.
Amazon DynamoDB
What you need to set up:
An IAM user configured with
programmatic access to AWS.
an IAM policy that permits Fuse to perform all available DynamoDB operations.
An access key ID and secret access key.
Setup steps:
See the guided steps in the expandable box below.
All done?
You will use the access key and secret key in Fuse when creating any integration(s) for your DynamoDB table(s). See Add an Integration (Admin) for more information.
IMPORTANT! Keep your access and secret keys in a secure location as with any sensitive authentication information.
AWS S3
What you need to set up:
An IAM user configured with
programmatic access to AWS.
an IAM policy that permits Fuse to perform all available S3 operations.
An access key ID and secret access key.
Setup steps:
See the guided steps in the expandable box below.
All done?
You will use the access key and secret key in Fuse when creating any integration(s) for your S3 bucket(s). See Add an Integration (Admin) for more information.
IMPORTANT! Keep your access and secret keys in a secure location as with any sensitive authentication information.
Last updated