IM
EN
Docs Home
Menu
Features

Provider Credentials

Sign-in credential lifecycle for email provider access.

inbox-manager credentials encryption

Provider Credentials

The provider credentials feature defines the sign-in details used to connect your account to an email provider. It gives you a clear flow: sign in, save credentials, then use IMAP and SMTP safely.

Why This Matters

This feature keeps secret values out of standard API responses while exposing the fields clients need to operate safely. It makes validation, rotation, and deletion explicit operations so credential hygiene does not depend on side effects in sync or send flows.

Core Flow

After sign in, an authorized caller creates credential details and secret values, then validates connectivity through the test endpoint. Inbox flows reference credential IDs for IMAP and SMTP operations, and credentials are rotated or deleted explicitly as providers or security requirements change.

Operations

OperationEndpointPurpose
Create credentialPOST /api/accounts/:account_id/provider-credentialsRegister account-scoped provider credential
List credentialsGET /api/accounts/:account_id/provider-credentialsFetch account credential metadata
Search credentialsPOST /api/accounts/:account_id/provider-credentials/searchQuery credentials by filter
Get credentialGET /api/provider-credentials/:provider_credential_idRetrieve one credential metadata record
Update credentialPATCH /api/provider-credentials/:provider_credential_idModify non-secret credential fields
Delete credentialDELETE /api/provider-credentials/:provider_credential_idRemove credential from account usage
Test credentialPOST /api/provider-credentials/:provider_credential_id/testRun connectivity/auth validation
Rotate credentialPOST /api/provider-credentials/:provider_credential_id/rotateReplace active secret material

Key Data and State

{
  id: "pc_...",
  account_id: "acc_...",
  provider_kind: "imap" | "smtp",
  host: "mail.example.com",
  port: 993,
  security_mode: "ssl_tls",
  auth_kind: "password",
  username_masked: "u***@example.com"
}

Public payloads expose metadata and masked identity only.

Failure Modes and Controls

Invalid host, port, or security/auth combinations are rejected at create or update time, and test failures surface before downstream sync or send jobs execute. Secret values are excluded from read payloads, and credential rotation is explicit and auditable instead of being an implicit mutation during unrelated operations.

Provider Credential, 03-provider-credentials-and-connectivity.