<< Click to Display Table of Contents >> Best Practice Configuration |
Step-by-step implementation instruction:
•Create the required Access Token.
•Add the needed data to the connector and execute it.
•Add the extracted data to the data processing and push it to applications.