End-to-End (Authentication)
The Authentication End-to-End view shows detailed information about end-to-end integration flows and their authentication methods. This view appears when you drill down from the Authentication Overview by clicking on authentication counts or using authentication filters to focus on complete integration chains.
Navigate to Reporting → Authentication → End-to-End to access detailed end-to-end integration listings filtered by authentication method.
Came from Overview?
This view shows end-to-end integrations for the authentication method you selected. Use filters to refine results or return to Authentication Overview for the authentication distribution summary.
End-to-End Integration Overview
Authentication End-to-End displays a detailed table of complete integration flows using specific authentication methods, allowing you to analyze which end-to-end integrations implement particular authentication types and their configurations.

Authentication End-to-End table showing detailed integration flow list with End-to-End Integration names and specific Authentication implementations
What you see:
End-to-End Integration details table with complete integration flow names and authentication specifications
Authentication filter to focus on specific authentication methods
Environment filter to switch between environment (e.g. Production, Test, Development) views
Sortable columns for organizing integration information
Using End-to-End Integration Information
The integration table provides detailed information about authentication usage at the end-to-end integration level:
Column | Description | Purpose |
|---|---|---|
End-to-End Integration | Complete integration flow name (clickable blue links) | Navigate to detailed integration analysis |
Authentications | Specific authentication method details | See exact authentication configuration |

How to use the integration data:
End-to-End Integration names (blue links):
Click "CPI_EU: WHINT IFC Cloud Connector | WHINT IFD Document to SharePoint" → Navigate to detailed integration documentation
Click any integration name to access comprehensive integration details
Authentication specifications:
Basic - OAuth2ClientCredentials - RoleBased → Multi-layered authentication approach
Basic - RoleBased → Basic authentication with role-based access
RoleBased - ClientCertificate → Certificate-based role authentication
OAuth2ClientCredentials - loginEncrypted - RoleBased - Basic - none → Complex multi-method authentication chain
Filtering and Analysis
Filter options help you focus on specific authentication methods and environments:
Authentication Filter:
Select specific authentication types to see only end-to-end integrations using that method
Useful for security analysis when planning authentication upgrades across complete integration flows
Compare usage patterns across different authentication technologies in end-to-end scenarios
Environment Filter:
Switch between Production, Test, Development environments
Compare authentication usage across different landscape tiers
Validate deployment consistency across environments
Analysis workflow:
Use filters to focus on specific authentication types
Review integration names to understand complete business processes
Click integration links to investigate specific implementations
Analyze authentication patterns to identify standardization opportunities across end-to-end flows
Authentication End-to-End Integration (Selected)
When you click any blue integration name, you'll see the End-to-End Integration Details view with comprehensive information about that specific integration flow.

Detailed end-to-end integration view showing Basic Data, Reporting, Tags, Properties, Interfaces, Objects, and Description for the CPI_EU: WHINT IFC Cloud Connector | WHINT IFD Document to SharePoint integration
What you see after clicking an integration:
Integration name header with the specific end-to-end integration identifier
Basic Data section showing Name, Sender, and Receiver
Reporting section with Adapter, Authentication, Robustness (Avg) details
Tags section for business object classifications
Properties section for additional metadata
Interfaces section showing all interfaces within this end-to-end integration
Objects section for associated business objects
Description section for integration documentation
Key information displayed:
Authentication type (e.g. Basic OAuth2ClientCredentials RoleBased) confirming the authentication method
Adapter type (e.g., HTTP ProcessDirect HTTPS) showing the technical implementation
Robustness (Avg) score indicating integration stability (e.g. 99.92)
Interfaces list showing all individual interfaces that make up this end-to-end flow
System context via Sender and Receiver information
Use the end-to-end integration details to:
Verify authentication implementation across complete integration chains
Assess integration stability through robustness scoring
Understand complete business processes via sender/receiver mappings
Analyze individual interfaces within the end-to-end flow
Document integration specifications using the description field
Authentication End-to-End Insights
End-to-end integration-level authentication analysis helps with:
Security compliance:
Identify complete integration flows using weak or deprecated authentication methods
Assess security compliance across entire business processes
Plan security upgrade sequencing based on end-to-end integration criticality
Standardization opportunities:
Find integration flows using inconsistent authentication configurations
Identify opportunities to standardize authentication across complete integration chains
Support authentication strategy enforcement across business processes
Impact assessment:
Understand which complete business processes depend on specific authentication technologies
Assess potential impact of authentication changes across end-to-end flows
Plan testing scope for authentication-related updates in complete integration chains
Use this view to understand authentication usage across complete business processes. Regular review of end-to-end integrations helps identify authentication inconsistencies within integration chains. Combine with Robustness data to prioritize security improvements.
Navigation
Return to overview:
Navigate back to Authentication → Overview for authentication method distribution summary
Use browser back button to return to previous authentication analysis
Access other reporting sections via left navigation menu
Deep dive into integrations:
Click blue integration names to access detailed end-to-end integration documentation
Use integration-level data for comprehensive authentication analysis
Cross-reference with other KPIs (Complexity, Frequency, Robustness)
Related Documentation
For comprehensive authentication and end-to-end integration analysis:
Onboarding Guide - 2.3.2 Authentication - Authentication strategy configuration
Last Updated: August 25, 2025