RMM / Endpoint Management
Integration setup guides for remote monitoring and management platforms.
Connect your RMM and endpoint management tools to Zaun for device inventory, alert monitoring, and patch visibility.
Atera
Category: IT Management & RMM | Auth: API Key
Required Credentials
| Field | Description |
|---|---|
| API Key | Bearer token from Atera admin |
Auth: Authorization: Bearer <key>
Capabilities
| Feature | Description |
|---|---|
| Agent Inventory | List and view managed devices with detailed status |
| Alert Monitoring | List alerts with status filtering (Open, Resolved, Snoozed) |
| Ticket Creation | Create tickets with priority, status, type, and description |
| Customer Management | List customer accounts and contact information |
Setup Steps
- In Atera > Admin > API. Generate or view your API key.
- Paste into Zaun.
Resetting the key immediately breaks all integrations using the old key. Coordinate key rotation carefully.
Automox
Category: Patch & Endpoint Management | Auth: API Key
Required Credentials
| Field | Description |
|---|---|
| API Key | Organization-level or Global key |
Auth: Authorization: Bearer <key>. Use an Organization key to scope access to a single org.
Capabilities
| Feature | Description |
|---|---|
| Device Management | List devices, view packages, issue commands, batch updates |
| Policy Engine | Execute, clone, and monitor patch policies with device-level detail |
| Remediation | Upload remediation CSVs, run action sets, track issues and solutions |
| Reports | Needs-attention reports, pre-patch reports, data extracts |
| Worklets | Browse and execute custom automation scripts from the worklet catalog |
Setup Steps
- In Automox > Settings > Keys.
- Generate an Organization key (recommended) or Global API key.
- Paste into Zaun.
Organization keys scope access to a single org. Global keys access all orgs in the account.
ConnectWise Automate
Category: RMM / Endpoint Management | Auth: Basic Auth
Required Credentials
| Field | Description |
|---|---|
| Server URL | Your Automate server address |
| Integrator Username | Integrator login username |
| Integrator Password | Integrator login password |
Setup Steps
- Register at developer.connectwise.com to get a Client ID.
- In Automate > System > Users, create a new user with Integrator checked.
- Set username and password. Paste into Zaun.
Datto RMM
Category: Remote Monitoring & Management | Auth: OAuth2
Required Credentials
| Field | Description |
|---|---|
| API Key | Generated per user (acts as client_id) |
| API Secret Key | Shown once (acts as client_secret) |
| Platform | Pinotage, Merlot, Concord, Vidal, Zinfandel, or Syrah |
Setup Steps
- Setup > Global Settings > Access Control > toggle Enable API Access.
- Create a dedicated read-only user. Setup > Users > select user > Generate API Keys.
- Copy API Key, Secret, and note the API URL. Select platform in Zaun.
Token lifetime: 100 hours. Rate: 600 req/60 sec.
JAMF Pro
Category: Apple Device Management | Auth: OAuth2
Required Credentials
| Field | Description |
|---|---|
| Jamf Pro URL | e.g. https://instance.jamfcloud.com |
| Client ID | From API Client setup |
| Client Secret | Shown once; rotate when roles change |
Required Privileges
| Privilege | Purpose |
|---|---|
Read Computers | Computer inventory |
Read Mobile Devices | Mobile device inventory |
Read Users | User records |
Setup Steps
- Settings > System > API Roles and Clients.
- API Roles tab > + New. Select read privileges above.
- API Clients tab > + New. Assign role, enable, save.
- Click Generate Client Secret. Copy Client ID + Secret. Paste into Zaun.
Kaseya VSA X
Category: IT Management & RMM | Auth: Token Auth
Required Credentials
| Field | Description |
|---|---|
| Server Hostname | e.g. instance.kaseyalab.com |
| Token ID | Generated in VSA X admin |
| Token Secret | Shown once |
Auth: Authorization: Basic base64(TOKEN_ID:TOKEN_SECRET)
Setup Steps
- Administration > Configuration > API Access.
- Click Create Token. Name it, optionally set IP whitelist, configure permissions.
- Copy Token ID and Token Secret. Paste into Zaun.
N-able N-central
Category: Remote Monitoring & Management | Auth: JWT
Required Credentials
| Field | Description |
|---|---|
| JWT | Generated from N-central UI (inherits user permissions) |
| N-central Server URL | Your N-central instance URL |
Setup Steps
- Administration > User Management > Users, select an API-designated user.
- Click API Access > Generate JSON Web Token.
- Copy the JWT. Paste along with the server URL into Zaun.
Changing user permissions requires regenerating the JWT. Password expiry (90-day default) blocks JWT access.
N-able N-sight
Category: Remote Monitoring & Management | Auth: API Key
Required Credentials
| Field | Description |
|---|---|
| API Key | Generated from Settings (full account access) |
| Server URL | Provided alongside the key |
API uses query-parameter-based routing (e.g. /api/?service=list_clients).
Capabilities
| Feature | Description |
|---|---|
| Client Sites | List client sites with device counts |
| Device Inventory | List devices per client with hardware/software asset details |
| Alert Monitoring | List active alerts and failed monitoring checks |
| Antivirus Threats | List quarantined antivirus threats across managed endpoints |
Setup Steps
- Log in as Superuser/Administrator. Settings > General Settings > API.
- Click Generate. Copy and store the key securely.
- Paste key and server URL into Zaun.
The API key grants full account access. Store it securely and rotate periodically.
NinjaOne
Category: Remote Monitoring & Management | Auth: OAuth2
Required Credentials
| Field | Description |
|---|---|
| Client ID | Generated in NinjaOne admin |
| Client Secret | Shown once |
| Region | NA (app.ninjarmm.com), EMEA (eu.ninjarmm.com), APAC (oc.ninjarmm.com), CA (ca.ninjarmm.com) |
Scopes
| Scope | Permission | Purpose |
|---|---|---|
monitoring | Read | Devices, alerts, organizations |
management | Read+Write | Devices, run scripts |
control | Write | Remote control |
Setup Steps
- Administration > Apps > API > Client App IDs > Add.
- Select API Services (Machine-to-Machine), choose monitoring scope, Client Credentials grant.
- Copy Client ID and Client Secret. Select region and paste into Zaun.
Pulseway
Category: Remote Monitoring & Management | Auth: Basic Auth
Required Credentials
| Field | Description |
|---|---|
| Token ID | Generated in API Access |
| Token Secret | Paired with Token ID |
Capabilities
| Feature | Description |
|---|---|
| System Inventory | List monitored systems with hardware specs, OS, and agent status |
| Notifications | List alerts with priority filtering (Low, Normal, Elevated, Critical) |
| Command Execution | Run PowerShell/CMD commands on managed systems |
| Groups | List system groups and organization structure |
Setup Steps
- Administration > Configuration > API Access > Third-Party Access.
- Click Create Token. Copy Token ID and Secret.
- Paste both into Zaun.
SuperOps.ai
Category: RMM & PSA | Auth: API Token
Required Credentials
| Field | Description |
|---|---|
| API Token | Generated from user profile |
| Customer Subdomain | Found in Settings > Company Information |
Uses GraphQL API. Rate: 800 req/min.
Setup Steps
- Settings > Your Profile > API Token > Generate Token.
- Find subdomain at Settings > Company Information.
- Paste both into Zaun.
SyncroMSP
Category: RMM & PSA | Auth: API Token
Required Credentials
| Field | Description |
|---|---|
| API Token | Bearer token with granular permissions |
| Subdomain | Your .syncromsp.com subdomain |
Setup Steps
- User Menu > Profile/Password > API Tokens.
- Click Create New Token, select Custom Permissions, configure needed scopes.
- Copy the token (shown only once). Paste with subdomain into Zaun.