Managed Auth Connections are configured the same way regardless of how you collect credentials — via Hosted UI, the React component, or the programmatic flow. The options below live on the connection itself and apply to the initial login, every background health check, and every automatic re-authentication.Documentation Index
Fetch the complete documentation index at: https://tbd-6fc993ce-hypeship-byo-proxy-managed-auth-docs.mintlify.app/llms.txt
Use this file to discover all available pages before exploring further.
Credentials and Auto-Reauth
Credentials are saved after every successful login, enabling automatic re-authentication when the session expires. One-time codes (TOTP, SMS, etc.) are not saved. To opt out of credential saving, setsave_credentials: false when creating the connection. See Credentials for more on automated authentication.
Custom Login URL
If the site’s login page isn’t at the default location, specify it when creating the connection:SSO/OAuth Support
Sites with “Sign in with Google/GitHub/Microsoft” are supported. The user completes the OAuth flow with the provider, and the authenticated session is automatically saved to the Kernel profile. Common SSO provider domains are automatically allowed by default, including Google, Microsoft/Azure AD, Okta, Auth0, Apple, GitHub, Facebook, LinkedIn, Amazon Cognito, OneLogin, and Ping Identity. You don’t need to add these toallowed_domains.
For custom or less common OAuth providers, add their domains to allowed_domains:
Custom Proxy
Pin the auth flow to a specific proxy so logins, health checks, and automatic re-authentications all egress through that proxy. This is useful for sites that allowlist IPs, geo-pin sessions, or treat IP changes as a fraud signal. How stable the exit IP is depends on the proxy type:- ISP and datacenter proxies provide a static exit IP that stays consistent across all connections.
- Residential proxies rotate IPs per connection — use them when you need legitimacy from a real ISP pool but can tolerate IP changes.
- Custom (BYO) proxies route through whatever you point them at, so this is the right pick if you need a truly static IP under your own control (e.g. an allowlisted egress your security team owns).
name instead of id. The proxy must belong to the same org and project as the connection.
Once attached, every browser the connection spins up — the initial login, every background health check, and every automatic re-auth — runs through that proxy.
You can swap the proxy on an existing connection with auth.connections.update; the change takes effect immediately, so the next health check or reauth uses the new proxy.
proxy on .login() — useful when you want to try a one-off egress without changing the connection-wide default (which would also affect subsequent health checks and reauths).
Record Sessions for Debugging
Setrecord_session: true to capture a replay of every browser session tied to the connection — initial logins, background health checks, and automatic re-authentications. The entire browser session is recorded.
record_session on .login() — useful for one-off debugging on a specific login attempt without flipping the connection-wide flag (which would also record subsequent health checks and reauths).
replay_id for the recording captured during that session.
Post-Login URL
After successful authentication,post_login_url will be set to the page where the login landed. Use this to start your automation from the right place:
Updating a Connection
After creating a connection, you can update its configuration withauth.connections.update:
| Field | Description |
|---|---|
login_url | Override the login page URL |
credential | Update the linked credential |
allowed_domains | Update allowed redirect domains |
health_check_interval | Seconds between health checks (minimum varies by plan) |
save_credentials | Whether to save credentials on successful login |
record_session | Record a replay of every auth browser session for this connection (logins, health checks, and reauths) |
proxy | Pin login, health-check, and reauth sessions to a proxy. Takes effect on the next health check or reauth |
health_check_interval and proxy take effect immediately, so the next health check or reauth uses the new value.