Overview
Passthrough authentication is an advanced mode where your AI agent sends credentials with each request instead of Tadata storing them. This gives you full control over credential management but comes with limitations.How Passthrough Works
Standard Authentication (Default)
Passthrough Authentication
- AI agent obtains credentials (OAuth token or API key)
- AI agent sends credentials with each tool execution request
- Tadata passes credentials through to the service without storing
- Service validates and responds
Key Limitation
OAuth Passthrough
Requirements
To use OAuth passthrough, you must:- Control the OAuth resource - Have your own OAuth app registered with the service
- Handle OAuth flow - Your AI agent must implement the OAuth authorization code flow
- Manage tokens - Your agent handles token refresh and expiration
When to Use
Use OAuth passthrough if:- You’ve already built your own OAuth app and want to use it
- You need custom OAuth scopes not provided by Tadata’s OAuth apps
- You want OAuth tokens to never leave your control
- You’re integrating a single-source toolset only
Setup
1
Register OAuth App
Register your OAuth application with the service (Linear, GitHub, etc.)
- Set redirect URI to your agent’s callback handler
- Note client ID and client secret
2
Configure Toolset
In Tadata, create a toolset and enable passthrough mode:
- Select the connector (e.g., Linear)
- Choose Passthrough Authentication
- Select OAuth as passthrough type
- Provide OAuth configuration (authorization URL, token URL, scopes)
3
Implement OAuth in Agent
Your AI agent must:
- Redirect users to authorization URL
- Handle callback with authorization code
- Exchange code for access + refresh tokens
- Store tokens securely
- Send access token with each tool request to Tadata
4
Send Tokens with Requests
When executing tools, include OAuth token in request headers:
Token Format
Tadata expects OAuth tokens in theAuthorization header:
API Key Passthrough
Requirements
No special requirements. The AI agent just needs the API key.When to Use
Use API key passthrough if:- You don’t want Tadata to store API keys
- You need different API keys per user/agent
- You want full control over key rotation
- You’re integrating a single-source toolset only
Setup
1
Get API Key
Retrieve API key from the service or generate one for your custom API
2
Configure Toolset
In Tadata, create a toolset and enable passthrough mode:
- Select the connector or bring your own API
- Choose Passthrough Authentication
- Select API Key as passthrough type
- Specify header name (e.g.,
Authorization,X-API-Key) - Specify header prefix (e.g.,
Bearer,Token, or none)
3
Store Key in Agent
Your AI agent stores the API key securely (environment variable, secrets manager, etc.)
4
Send Key with Requests
When executing tools, include API key in request headers as configured
API Key Format
Tadata expects API keys in the configured header. Examples: Bearer Token:Security Considerations
Credential Transmission
Credential Transmission
In passthrough mode, credentials are sent with every request:
- All communication is over HTTPS (required)
- Credentials are not logged by Tadata
- Credentials are passed directly to the target service
Token Refresh
Token Refresh
You are responsible for token refresh.For OAuth passthrough:
- Monitor access token expiration
- Implement refresh token flow
- Handle refresh failures gracefully
Rate Limiting
Rate Limiting
Each request includes credentials, so rate limiting applies per credential:
- Multiple agents using the same API key share rate limits
- Consider using separate API keys per agent if needed
Audit Trails
Audit Trails
Actions appear under the credential owner:
- OAuth: Actions appear under the user who authorized
- API Key: Actions appear under the API key owner/service account
Comparison: Standard vs. Passthrough
| Feature | Standard (Tadata stores) | Passthrough |
|---|---|---|
| Multi-source toolsets | ✅ Yes (Slack + Linear + GitHub) | ❌ No (one connector only) |
| Setup complexity | ✅ Simple (click Connect) | ⚠️ Complex (implement OAuth/manage keys) |
| Credential storage | Tadata (encrypted) | AI agent (you manage) |
| Token refresh | ✅ Automatic | ❌ Manual (you handle) |
| OAuth app | Tadata’s OAuth apps | Your OAuth app (required for OAuth) |
| Per-user credentials | ✅ Yes (connect per user) | ✅ Yes (agent manages) |
| Use case | Most toolsets, multi-source workflows | Advanced, single-source, full control |
Troubleshooting
401 Unauthorized in passthrough mode
401 Unauthorized in passthrough mode
Cannot mix connectors in passthrough toolset
Cannot mix connectors in passthrough toolset
Symptoms: Error when trying to add multiple connectors to passthrough toolsetCause: Passthrough mode only supports single-source toolsetsSolution: Use standard authentication (Tadata stores credentials) for multi-source toolsets
OAuth refresh not working
OAuth refresh not working
Symptoms: Access tokens expire and tools failCause: In passthrough mode, you are responsible for token refreshSolution:
- Implement refresh token flow in your AI agent
- Monitor token expiration and refresh proactively
- Or switch to standard authentication for automatic refresh
Different credentials per user
Different credentials per user
Question: How do I use different credentials for different users?Answer:
In passthrough mode, each agent instance can send different credentials. Your agent should:
- Store credentials per user
- Include the appropriate user’s credentials with each request
- Ensure proper isolation and security