How Authentication Works
When you connect services to Tadata, we store your credentials securely. Your AI agent authenticates with Tadata once, and Tadata handles authentication with all connected services on your behalf.The Flow
- You connect services (Linear, GitHub, Slack, etc.) to Tadata
- Tadata stores credentials - OAuth tokens or API keys, encrypted at rest
- Your AI agent connects to Tadata - Authenticates once with your Tadata toolset
- Tadata authenticates with services - Transparently handles auth when tools execute
Connecting Services
OAuth (Most Common)
For services with OAuth support, click Connect and authorize:1
Click Connect
Find your service (Slack, Linear, GitHub) and click Connect
2
Authorize
Redirected to the service to review and grant permissions
3
Done
Tadata stores OAuth tokens (access + refresh) securely. Automatic token refresh handled for you.
API Keys
For services without OAuth or custom APIs:1
Get API Key
Retrieve API key from service settings
2
Configure in Tadata
Enter the API key in Tadata’s connector configuration
3
Done
Tadata stores the key securely and uses it when executing tools
Security
Credential Storage
Credential Storage
All credentials (OAuth tokens and API keys) are encrypted at rest using industry-standard encryption (AES-256).Only Tadata’s backend services can decrypt credentials when needed for API calls.
Automatic Token Refresh
Automatic Token Refresh
For OAuth connections, Tadata automatically refreshes expired access tokens using refresh tokens.You never have to manually refresh tokens or reconnect services.
Revocation
Revocation
Revoke access anytime:
- In Tadata: Disconnect the service
- In the service: Revoke Tadata OAuth app
- Tadata stores credentials securely in an encrypted manner, and you can always revoke access and permanently delete tokens through your dashboard
HTTPS Only
HTTPS Only
All communication is over HTTPS. Credentials are never logged or exposed in URLs.
Best Practices
Use OAuth When Available
Use OAuth When Available
OAuth is more secure than API keys:
- Scoped permissions (read vs. write, specific resources)
- Revocable without changing passwords
- Automatic token refresh
Least Privilege
Least Privilege
Grant minimum necessary permissions:
- OAuth: Select only required scopes during authorization
- API Keys: Create restricted/scoped keys when possible
Service Accounts for Production
Service Accounts for Production
Create dedicated bot accounts for AI agents:
- Not tied to any individual (survives team changes)
- Clear audit trails (all actions under bot name)
- Controlled permissions (grant only what the bot needs)
ai-agent-bot@company.com in Linear, GitHub, Slack.Review Connected Services
Review Connected Services
Periodically review connected services in Tadata:
- Disconnect unused services
- Verify permissions are still appropriate
- Check for expired or failing connections
Troubleshooting
OAuth authorization fails
OAuth authorization fails
Tools fail with 401 Unauthorized
Tools fail with 401 Unauthorized
Tools fail with 403 Forbidden
Tools fail with 403 Forbidden
Symptoms: Some tools work, others fail with 403Causes:
- Insufficient OAuth scopes
- API key lacks necessary permissions
- Resource is private/inaccessible to connected account
- Review OAuth scopes granted during authorization
- Reconnect with broader scopes if needed
- Check API key permissions in service dashboard
- Verify connected account has access to the resource