Skip to main content

What Are Connections?

A connection is a saved authentication link between Langdock and an external tool. When you connect your Google Calendar, HubSpot, or any other integration, you’re creating a connection that stores the credentials needed to interact with that service.
Each connection belongs to the user who created it. This ensures your credentials remain secure and actions are performed with your access rights.

Authentication Types

Langdock supports different authentication methods depending on the integration:
Auth TypeHow It WorksExample Integrations
OAuthYou sign in directly with the service and grant Langdock permissionGoogle Suite, Microsoft 365, Slack, HubSpot
API KeyYou provide an API key from the serviceOpenAI, Stripe, custom integrations
Service AccountAn admin sets up a service-level accountBigQuery, some enterprise tools
NoneNo authentication neededPublic APIs

OAuth Authentication

Most popular integrations use OAuth, the industry-standard protocol for secure authorization. When you connect via OAuth:
  1. You’re redirected to the service’s login page (e.g., Google, Microsoft)
  2. You sign in with your own account
  3. You grant permissions for Langdock to access specific data
  4. Tokens are stored securely and refreshed automatically
OAuth connections always act with your permissions. If you can’t access a calendar in Google, the assistant using your connection can’t access it either.

API Key & Service Account Authentication

These authentication types require you to manually provide credentials:
  • API Key: Copy an API key from the service’s settings and paste it into Langdock
  • Service Account: Provide service account credentials (often a JSON file or key pair)
These are typically used for services that don’t support OAuth or for admin-level integrations that need broader access.

Connection Ownership

By default, connections are user-based and not shareable. This means:
  • ✅ You can only see and use connections you created
  • ✅ Actions performed use your access rights and permissions
  • ✅ Your credentials are never exposed to other users
  • ❌ Other users cannot directly use your OAuth connections
This design ensures security and compliance—your authorization remains yours.

Why User-Based?

When you authorize Langdock to access your Google Calendar, you’re granting permission for actions to be performed as you. Sharing that connection with others would mean they could act on your behalf, which violates the trust relationship established during OAuth consent.

Sharing Connections via Assistants

While connections are personal by default, there’s a powerful way to share their capabilities: attaching connections to assistants.

How It Works

When you create an assistant and add actions:
  1. Add an action to your assistant (e.g., “Create Calendar Event”)
  2. Select a connection to use with that action
  3. Share the assistant with others
Now anyone using that assistant can trigger the action using your pre-configured connection—without ever seeing your credentials.
Example: You create a “Team Calendar Assistant” with a “Create Event” action linked to your Google Calendar connection. When a colleague uses this assistant to schedule a meeting, the event is created in your calendar using your credentials—but they never see your OAuth tokens.

Use Cases

  • Team assistants: Create a shared assistant that can add events to a team calendar using your connection
  • Workflow automation: Set up workflows where actions run with your credentials
  • Departmental tools: Build assistants that interact with your CRM or project management tools
When sharing assistants with pre-configured connections, the actions will be performed using your account. Only attach connections you’re comfortable having others trigger.

Sharing Non-OAuth Connections Directly

Connections that use API Key, Service Account, or No Authentication can be shared directly with other users, groups, or your entire workspace.

Shareable Connection Types

Auth TypeDirectly Shareable?
OAuth❌ No
API Key✅ Yes
Service Account✅ Yes
None✅ Yes

Why OAuth Can’t Be Shared Directly

OAuth tokens represent a specific user’s authorization and consent. Sharing them would:
  • Violate the user’s agreement with the service provider
  • Create security risks if tokens are leaked
  • Make it impossible to track who performed which action

How to Share Non-OAuth Connections

If you have an API key connection (or another shareable type), workspace admins and connection owners can share it:
  1. Go to Integrations in your settings
  2. Find the connection you want to share
  3. Click Share and select recipients:
    • Specific users: Share with individual team members
    • Groups: Share with entire teams or departments
    • Workspace: Make available to everyone
This is great for shared API keys like translation services, analytics tools, or internal APIs that the whole team should be able to use.

Who Can Share Connections?

RoleCan Share
Connection owner✅ Their own non-OAuth connections
Workspace admin✅ Any non-OAuth connection in the workspace
Regular user❌ Only through assistants

Choosing the Right Sharing Method

ScenarioRecommended Approach
Team needs access to your calendar/CRMCreate an assistant with pre-configured actions
Shared API key for a serviceShare the connection directly (if non-OAuth)
Personal workflow automationUse your own connection in your assistant
Departmental tool accessShare via assistant with specific groups

Summary

FeatureOAuthAPI Key / Service Account
User-owned
Direct sharing✅ (to users, groups, workspace)
Share via assistant
Automatic token refreshN/A
Admin can share
Understanding how connections work helps you build secure, collaborative workflows. Use assistant-based sharing for OAuth connections, and direct sharing for API keys and service accounts when appropriate.