External System Configuration for Applicant Types
This page explains how organizations can configure which external systems are available for each applicant type in Axvero. This enables tailored data integration for underwriting and risk assessment workflows.
Overview
- Organizations can map external data sources (e.g., credit bureaus, government APIs) to specific applicant types (e.g., employee, pensioner, self-employed).
- Configuration is managed via the organization settings interface.
- Only authorized admins can update these settings.
Configuration Steps
1. Access Organization Settings
- Navigate to the Organization Configuration section in Axvero admin.
- Select "External System Integration" from the settings menu.
2. Define Applicant Types
- List all applicant types relevant to your organization (e.g., Employee, Pensioner, Freelancer).
3. Map External Systems
- For each applicant type, select and configure the external systems to be used:
- Credit bureaus (Schufa, Experian)
- Employment verification APIs
- Pension fund databases
- Custom REST APIs
- Enter required credentials (API keys, OAuth tokens, etc.) securely.
- Specify any additional parameters (e.g., endpoints, data fields).
4. Save & Test Configuration
- Save the mapping and credentials.
- Test the integration for each applicant type to ensure connectivity and data retrieval.
5. Audit & Update
- All changes are logged for compliance.
- Update mappings as business needs evolve.
Example Configuration Table
| Applicant Type | External System | API Endpoint | Auth Method | Status |
|---|---|---|---|---|
| Employee | Schufa Credit Bureau | https://api.schufa.de/report | API Key | Enabled |
| Pensioner | Pension Fund Database | https://api.pension.de/data | OAuth2 | Enabled |
| Freelancer | Tax Authority | https://api.tax.de/check | API Key | Disabled |
Best Practices
- Use secure storage for credentials.
- Regularly review and update external system mappings.
- Limit access to configuration to trusted admins.
- Monitor integration logs for errors and unauthorized access.
Related Pages
For more details on workflow automation, see the Workflow Rules & Triggers documentation.