What it does
Connections connect a workflow draft to a real external system. GTMship includes a provider catalog for common tools, but the Custom Connections Agent also supports custom APIs when you bring docs or an OpenAPI specification.
What GTMship needs to model a provider
Base URL and environment shape
The agent needs to know where the API lives and whether production, staging, or tenant-specific hosts change the request path.
Auth method and token behavior
OAuth, API key, and basic auth all behave differently, so GTMship needs the right auth shape before it can generate safe connection flows.
Endpoint or operation references
OpenAPI specs, endpoint docs, or structured examples help the workflow agent ground request formats before it writes integration code.
Example payloads or fields
Representative request and response shapes make it easier to map business objects and avoid vague field assumptions in generated workflows.
Auth modes GTMship supports
OAuth2
Use redirect-based auth for providers such as CRMs and messaging tools, with token refresh managed through the auth service.
API key
Store API keys as encrypted connection credentials so workflows can call systems without hardcoding secrets.
Basic auth
Handle username and password style credentials when an API exposes that auth shape.
Shared OAuth families
Some provider families can reuse a single shared app configuration instead of reauthorizing each related service separately.
How onboarding works
- Select a built-in connector or start a custom provider from docs.
- Define provider metadata such as base URL, auth type, and available endpoints.
- Create a connection using OAuth, API key, or basic auth.
- Store credentials behind the auth service instead of inside workflow source.
- Bind that connection into workflows during generation, preview, and deployment.
Provider docs
-> provider config
-> connection credentials
-> workflow binding
-> runtime auth resolution
Provider definitions vs connection records
The reusable API model
This captures things like base URL, auth expectations, and the operations GTMship should reason about when building workflows.
The authorized account or secret set
This is the actual credentialed relationship to a tenant, workspace, or account that gets bound into preview and deployment.
Runtime auth strategies
Simpler local and hosted flow
Workflow calls go through the auth-service proxy, which resolves the bound connection, injects auth headers, and can refresh expired OAuth tokens.
Cloud-native secret replication
Active credentials are replicated into AWS Secrets Manager or GCP Secret Manager, and deployments receive deterministic secret references in their runtime manifest.
When custom APIs fit best
- Your team has an internal service with a stable REST API.
- You need a tool GTMship has not shipped as a built-in connector yet.
- You want the workflow agent to reason over the provider docs before generating code.