Credential Types
Use this page as the entry point. Each credential type has a dedicated page.
Type guides
HTTP and API Auth
Databases and Cache
Messaging and Email
Secret Source Model
Practical verification checklist
- Attach credential to one proxy or workflow node in non-production.
- Run one success request and one failure case.
- Verify expected branch behavior in logs (
success/error). - Rotate the secret and retest before production promotion.