📄️ Access Token
Access token are long-term tokens that can be used to authenticate API requests to Donetick. They are typically used by applications or scripts that need to interact with Donetick programmatically.
📄️ Using the API
This documentation is incomplete. For a more complete listing, see https://github.com/donetick/donetick/blob/main/internal/chore/api.go.
📄️ Single Sign-On(SSO)
Donetick supports OpenID Connect (OIDC) authentication using the OAuth2 protocol. This allows users to log in with identity providers. such as Authentik.
📄️ Storage
Donetick supports object storage for file uploads, profile pictures, and other assets using S3-compatible storage services. This includes Amazon S3, Cloudflare R2, MinIO, and other S3-compatible providers.
📄️ User Impersonation
User impersonation allows administrators and managers to perform actions on behalf of other users in their circle.
📄️ Webhook
Webhooks provide a way to receive real-time notifications about events occurring within Donetick. This allows you to integrate Donetick with other systems and automate actions based on these events. For example, you could use webhooks to send notifications, update databases, trigger workflows, or perform other custom logic.