The legal-i agent component is deployed on-premises. Authentication with the legal-i cloud is performed using a secret key, which can be rotated by the customer. IP whitelisting is also possible. Authentication is done via Auth0 (IDP provider).
How are endpoints mutually authenticated in machine-to-machine communication?
Integration
S
Written by Support amaise
Updated over 10 months ago