Skip to main content

External System Configuration for Applicant Types

This page explains how organizations can configure which external systems are available for each applicant type in Axvero. This enables tailored data integration for underwriting and risk assessment workflows.

Overview

  • Organizations can map external data sources (e.g., credit bureaus, government APIs) to specific applicant types (e.g., employee, pensioner, self-employed).
  • Configuration is managed via the organization settings interface.
  • Only authorized admins can update these settings.

Configuration Steps

1. Access Organization Settings

  • Navigate to the Organization Configuration section in Axvero admin.
  • Select "External System Integration" from the settings menu.

2. Define Applicant Types

  • List all applicant types relevant to your organization (e.g., Employee, Pensioner, Freelancer).

3. Map External Systems

  • For each applicant type, select and configure the external systems to be used:
    • Credit bureaus (Schufa, Experian)
    • Employment verification APIs
    • Pension fund databases
    • Custom REST APIs
  • Enter required credentials (API keys, OAuth tokens, etc.) securely.
  • Specify any additional parameters (e.g., endpoints, data fields).

4. Save & Test Configuration

  • Save the mapping and credentials.
  • Test the integration for each applicant type to ensure connectivity and data retrieval.

5. Audit & Update

  • All changes are logged for compliance.
  • Update mappings as business needs evolve.

Example Configuration Table

Applicant TypeExternal SystemAPI EndpointAuth MethodStatus
EmployeeSchufa Credit Bureauhttps://api.schufa.de/reportAPI KeyEnabled
PensionerPension Fund Databasehttps://api.pension.de/dataOAuth2Enabled
FreelancerTax Authorityhttps://api.tax.de/checkAPI KeyDisabled

Best Practices

  • Use secure storage for credentials.
  • Regularly review and update external system mappings.
  • Limit access to configuration to trusted admins.
  • Monitor integration logs for errors and unauthorized access.

For more details on workflow automation, see the Workflow Rules & Triggers documentation.