Best Practice Configuration

<< Click to Display Table of Contents >>

Best Practice Configuration

Step-by-step implementation instruction:

Create the required Access Token.

Add the needed data to the connector and execute it.

Add the extracted data to the data processing and push it to applications.