Skip to main content
Skip table of contents

End-to-End (Authentication)

The Authentication End-to-End view shows detailed information about end-to-end integration flows and their authentication methods. This view appears when you drill down from the Authentication Overview by clicking on authentication counts or using authentication filters to focus on complete integration chains.

Navigate to ReportingAuthenticationEnd-to-End to access detailed end-to-end integration listings filtered by authentication method.

Came from Overview?

This view shows end-to-end integrations for the authentication method you selected. Use filters to refine results or return to Authentication Overview for the authentication distribution summary.


End-to-End Integration Overview

Authentication End-to-End displays a detailed table of complete integration flows using specific authentication methods, allowing you to analyze which end-to-end integrations implement particular authentication types and their configurations.

image-20250825-125520.png

Authentication End-to-End table showing detailed integration flow list with End-to-End Integration names and specific Authentication implementations

What you see:

  • End-to-End Integration details table with complete integration flow names and authentication specifications

  • Authentication filter to focus on specific authentication methods

  • Environment filter to switch between environment (e.g. Production, Test, Development) views

  • Sortable columns for organizing integration information


Using End-to-End Integration Information

The integration table provides detailed information about authentication usage at the end-to-end integration level:

Column

Description

Purpose

End-to-End Integration

Complete integration flow name (clickable blue links)

Navigate to detailed integration analysis

Authentications

Specific authentication method details

See exact authentication configuration

image-20250825-131511.png

How to use the integration data:

End-to-End Integration names (blue links):

  • Click "CPI_EU: WHINT IFC Cloud Connector | WHINT IFD Document to SharePoint" → Navigate to detailed integration documentation

  • Click any integration name to access comprehensive integration details

Authentication specifications:

  • Basic - OAuth2ClientCredentials - RoleBased → Multi-layered authentication approach

  • Basic - RoleBased → Basic authentication with role-based access

  • RoleBased - ClientCertificate → Certificate-based role authentication

  • OAuth2ClientCredentials - loginEncrypted - RoleBased - Basic - none → Complex multi-method authentication chain


Filtering and Analysis

Filter options help you focus on specific authentication methods and environments:

Authentication Filter:

  • Select specific authentication types to see only end-to-end integrations using that method

  • Useful for security analysis when planning authentication upgrades across complete integration flows

  • Compare usage patterns across different authentication technologies in end-to-end scenarios

Environment Filter:

  • Switch between Production, Test, Development environments

  • Compare authentication usage across different landscape tiers

  • Validate deployment consistency across environments

Analysis workflow:

  1. Use filters to focus on specific authentication types

  2. Review integration names to understand complete business processes

  3. Click integration links to investigate specific implementations

  4. Analyze authentication patterns to identify standardization opportunities across end-to-end flows


Authentication End-to-End Integration (Selected)

When you click any blue integration name, you'll see the End-to-End Integration Details view with comprehensive information about that specific integration flow.

image-20250825-130617.png

Detailed end-to-end integration view showing Basic Data, Reporting, Tags, Properties, Interfaces, Objects, and Description for the CPI_EU: WHINT IFC Cloud Connector | WHINT IFD Document to SharePoint integration

What you see after clicking an integration:

  • Integration name header with the specific end-to-end integration identifier

  • Basic Data section showing Name, Sender, and Receiver

  • Reporting section with Adapter, Authentication, Robustness (Avg) details

  • Tags section for business object classifications

  • Properties section for additional metadata

  • Interfaces section showing all interfaces within this end-to-end integration

  • Objects section for associated business objects

  • Description section for integration documentation

Key information displayed:

  • Authentication type (e.g. Basic OAuth2ClientCredentials RoleBased) confirming the authentication method

  • Adapter type (e.g., HTTP ProcessDirect HTTPS) showing the technical implementation

  • Robustness (Avg) score indicating integration stability (e.g. 99.92)

  • Interfaces list showing all individual interfaces that make up this end-to-end flow

  • System context via Sender and Receiver information

Use the end-to-end integration details to:

  • Verify authentication implementation across complete integration chains

  • Assess integration stability through robustness scoring

  • Understand complete business processes via sender/receiver mappings

  • Analyze individual interfaces within the end-to-end flow

  • Document integration specifications using the description field


Authentication End-to-End Insights

End-to-end integration-level authentication analysis helps with:

Security compliance:

  • Identify complete integration flows using weak or deprecated authentication methods

  • Assess security compliance across entire business processes

  • Plan security upgrade sequencing based on end-to-end integration criticality

Standardization opportunities:

  • Find integration flows using inconsistent authentication configurations

  • Identify opportunities to standardize authentication across complete integration chains

  • Support authentication strategy enforcement across business processes

Impact assessment:

  • Understand which complete business processes depend on specific authentication technologies

  • Assess potential impact of authentication changes across end-to-end flows

  • Plan testing scope for authentication-related updates in complete integration chains

Use this view to understand authentication usage across complete business processes. Regular review of end-to-end integrations helps identify authentication inconsistencies within integration chains. Combine with Robustness data to prioritize security improvements.


Navigation

Return to overview:

  • Navigate back to AuthenticationOverview for authentication method distribution summary

  • Use browser back button to return to previous authentication analysis

  • Access other reporting sections via left navigation menu

Deep dive into integrations:

  • Click blue integration names to access detailed end-to-end integration documentation

  • Use integration-level data for comprehensive authentication analysis

  • Cross-reference with other KPIs (Complexity, Frequency, Robustness)


Related Documentation

For comprehensive authentication and end-to-end integration analysis:


Last Updated: August 25, 2025


 

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.