Documentation Index
Fetch the complete documentation index at: https://docs.cativa.digital/llms.txt
Use this file to discover all available pages before exploring further.
In most integrations you don’t need to think about tenant explicitly. Authentication and routing already carry the tenant context, and the API filters data behind the scenes. This page documents the exceptions.
The multi-tenant model
Cativa is a multi-tenant platform: every customer’s data is fully isolated from the rest. There is no data leak between tenants — an API call from one tenant never sees or touches another tenant’s data.{customerName}); the term tenant is used in this guide as a synonym. Treat them as equivalent.
When you need the customer/tenant
1. OIDC flow (Sign in with Cativa)
SSO endpoints carry the customer slug in the path:https://apis.cativalab.digital/social/v1/sso/{customerName}/authorize, /token, /userinfo, etc. The customerName is the community’s public subdomain — align it with the tenant admin at onboarding.
See Sign in with Cativa for the OIDC step-by-step.
2. Webhooks listening to multiple tenants
If your endpoint receives webhooks from more than one tenant (typical for apps serving multiple communities), the payload includesCustomerId at the top level so you can route correctly.
CustomerId to figure out which account in your own system should receive the sync. Persist the mapping customerId -> external_account at customer onboarding — don’t try to derive it on every event.
The exact payload shape for each webhook event is documented on the event’s page (e.g. user_received_badge).
3. Cross-tenant Marketplace OAuth apps
If you are building a Zapier-style app that connects Cativa to other tools and serves many different communities, the right flow is OAuth Marketplace:- Each community (tenant) installs your app once.
- Cativa issues an OAuth token scoped to that tenant.
- You store one token per tenant and use the right token on each call.
4. Console and admin tooling
Admin endpoints (/tenants/v1/admin/...) can only be called with platform operator credentials and require an admin JWT. If you are an external API Key integrator, ignore this category — it isn’t publicly exposed to partners.
How to discover the current customer
If you need to know which customer your key belongs to (for your own logging or auditing), call:customer name, the id of the user tied to the key and the role — useful to record in your own audit trail.
Next steps
Identity and Users
How the user model maps to your external system.
Webhooks
Overview of how to receive events from Cativa, including the
CustomerId field.