Integration docs
  • Integrating
    • Getting started
    • JSON feed
    • JS tag
    • CSV import
    • REST API
    • Webhooks
  • Security
    • SSO authentication
  • Onboarding
    • Getting started
    • ATS Sync
      • ICIMS
      • Teamtailor
      • Recruiterflow
      • SAP SuccessFactors
      • Ashby
      • Pinpoint
      • Lever
      • Salesforce
      • Jobylon
      • Workday
      • Greenhouse
      • SmartRecruiters
      • Bullhorn
      • Bullhorn Recruitment Cloud (Bullhorn for Salesforce, BH4SF)
      • ReachMee (TalenTech)
      • Recman
    • Social ads
    • Social pages
      • Facebook & Instagram
      • LinkedIn
      • Snapchat
    • Social talent pools
      • Setup process
  • Templates & Content - Creative Assets
    • Getting Started
      • Image Templates
        • Aspect ratios & sizes
      • Text Templates
      • Exporting assets to Adway
      • Forbidden Content
    • Advanced
      • Dynamic text replacements
      • Variations
Powered by GitBook
On this page
  • Authentication
  • Credentials
  • Permissions
  1. Onboarding
  2. ATS Sync

ICIMS

PreviousATS SyncNextTeamtailor

Last updated 11 months ago

Authentication

Credentials

A set of credentials are required in order to create a valid connector. This is so Adway can establish a connection to your profile on ICIMS. In ICIMS you can create two different set of credentials; OAuth 2.0 or HMAC. Se below for more information about respective method

In OAuth 2.0, the service's identity is represented by a client_id and a client_secret. Adway uses the client_id as a kind of username for our service; it acts as a public identifier. Adway uses the client_secret as a kind of password

Identity Credentials

To access an iCIMS API, You must provide following credentials:

  • Client_id

  • Client_secret

If you don't have a client_id and client_secret, these credentials must be authorized by your organization’s iCIMS Integration Specialist before we can access the iCIMS API.

Using the HTTP Authorization header is the most common method of providing authentication information. The header value contains the algorithm and few other information that is used to calculate the signature. Below is the example of an Authorization header value. Please note that line breaks have been added to this example for readability.

Read more how to create a connection based on HMAC:

Permissions

To be able to use Attract and Convert Adway will need both read and write access

​

​

https://developer-community.icims.com/platform/services/connecting-and-authentication#HMAC