Integrations Reference

Integrations are how ContextDX pulls in real-world context from the tools your team already uses. Each connected provider becomes a source of truth — code repos, documentation, conversations, infrastructure state — that you can reference directly from your boards.

You'll find all integration settings under Settings → Integrations in your organization.

Supported providers

ProviderAuthCategoryWhat it provides
GitHubOAuth 2.0 (user)Code RepositoryRepos, files, code search, directory trees
ConfluenceOAuth 2.0 (user)DocumentationSpaces, pages, content search
JiraOAuth 2.0 (user)Project ManagementProjects, issues, issue search
Google DocsOAuth 2.0 (user)DocumentationDocuments, document search via Google Drive
NotionOAuth 2.0 (org)DocumentationDatabases, pages, content search
SlackOAuth 2.0 (org)CommunicationChannels, message history, message search
IntercomOAuth 2.0 (org)Customer SupportConversations, contacts, support articles
SentryAPI Key (org)ObservabilityProjects, issues, error events
LogRocketAPI Key (org)ObservabilitySessions, session replay, error tracking
OpenRouterOAuth 2.0 PKCE (org)LLM ProviderLLM model routing, chat completions, streaming
TerraformAPI Key (org)InfrastructureWorkspaces, state files, runs, plan output

Auth methods

There are three authentication patterns used across providers:

Standard OAuth 2.0 redirects you to the provider to authorize access. You'll see a consent screen, approve the scopes, and get redirected back. The platform stores encrypted tokens on your behalf.

  • User-scoped providers (GitHub, Confluence, Jira, Google Docs): each team member connects their own account, so everyone sees only the resources they personally have access to.
  • Org-scoped providers (Slack, Notion, Intercom): a single org-wide token is shared across your organization. One person connects it and everyone benefits.

Token scope

ScopeMeaningProviders
UserEach user connects their own accountGitHub, Confluence, Jira, Google Docs
OrgOne connection shared across the organizationSlack, Notion, Intercom, Sentry, LogRocket, OpenRouter, Terraform
Tip

Org-scoped integrations only need to be set up once. User-scoped ones (like GitHub) need each team member to connect individually — this ensures everyone sees only the repos they have access to.

Connection status

Each integration can be in one of these states:

StatusMeaning
ConnectedActive and working
DisconnectedNot yet configured or manually disconnected
ExpiredToken has expired — needs re-authorization
Needs re-authProvider revoked access or scopes changed
ErrorSomething went wrong — check logs

Connect your first integration

Use this checklist to get your first provider wired up:

  • Navigate to Settings → Integrations in your organization
  • Choose a provider from the supported list above
  • For OAuth providers: click Connect and complete the authorization flow
  • For API Key providers: paste the token from the provider's dashboard
  • Verify the status shows Connected in the integrations list
  • Test by opening a board and referencing data from the connected source

Provider setup

GitHub setup
  1. Click Connect on the GitHub integration card.
  2. You'll be redirected to GitHub's OAuth consent screen.
  3. Approve the requested scopes (repo read access, code search).
  4. After redirect, your account is linked. Each team member repeats this for their own GitHub account.
  5. Once connected, you can reference repos, browse file trees, and search code directly from boards.
Confluence / Jira setup
  1. Click Connect on the Confluence or Jira card.
  2. Authorize via Atlassian's OAuth flow — both share the same Atlassian identity.
  3. Confluence provides: spaces, pages, and content search.
  4. Jira provides: projects, issues, and issue search.
  5. These are user-scoped — each team member connects their own Atlassian account.
Slack / Notion / Intercom setup

These are org-scoped OAuth providers. One team member connects the integration and it applies to the entire organization.

  1. Click Connect on the provider card.
  2. Authorize at the provider's consent screen.
  3. The org-wide token is stored and shared across all members.
  4. Slack gives you channels and message search. Notion gives you databases and pages. Intercom gives you conversations and support articles.
Sentry / LogRocket / Terraform setup (API key)
  1. Go to the provider's dashboard and generate an API key or auth token.
  2. Back in ContextDX, click Configure on the provider card.
  3. Paste the API key into the field and save.
  4. The key is encrypted at rest before storage.
  5. One key covers the whole organization.
OpenRouter setup (PKCE)

OpenRouter uses OAuth 2.0 with PKCE — no client secret required.

  1. Click Connect on the OpenRouter card.
  2. The platform generates a PKCE code verifier and challenge automatically.
  3. Authorize at OpenRouter's consent screen.
  4. After redirect, the token exchange completes using the code verifier.
  5. This gives your organization access to LLM model routing and chat completions.

What's next