Behind the Brackets

Developer programming on a laptop at a desk
Microsoft VSCode – Tips and Tricks Round Up 731 312 Team DataMotion

Microsoft VSCode – Tips and Tricks Round Up

The dev team here at DataMotion has been sharing some hot tips and tricks to our social media channels to help your development processes, with our most recent tip series featuring Microsoft Visual Studio Code. In today’s entry to the DataMotion Blog, our team gathered those four tips and tricks, where we focused on how to integrate VSCode with a source control program (such as GitHub) so you have them in one convenient, easily-accessible toolkit.

For the uninitiated, Visual Studio Code is what developers call an IDE (independent development environment). Unlike Visual Studio, Visual Studio Code is a free, lightweight IDE, focused on quick development, building, and debugging. It has built-in version control, making it easy for you to save and update your code to GitHub, Microsoft TFS, or any other git centered, version control software. Though Visual Studio has additional features for more complex development scenarios, the lighter-weight VSCode IDE provides everything a developer needs for a simple programming cycle.

It appears this is exactly what developers have been looking for, as VSCode has over 14 million users worldwide and counting. According to ZDNet.com, that’s about 58% of all developers, including the developers here at DataMotion! Since VSCode is a widely used and very proficient IDE, the dev team has put some tips and tricks together to help you better use the platform. Before we begin, as quick production note that you may notice the below tips are slightly different than those we shared on social media. This is because we added GIFs from v1.65.2, and the original tips were from a different version.

(Note: These tips were created to help enhance an already-basic knowledge of the VSCode platform. For more information on how to get started with VSCode, visit their quick start guide.)

If you would like to follow along with us, feel free to download DataMotion’s GitHub repository/secure-email-postman-collection. You can clone the code here.

Let’s get started!

Hot VSCode Tips and Useful Tricks

Hot Tip #1: Integrate Your GitHub Repositories Within VSCode.

Our first tip and trick for Microsoft Visual Studio code is to integrate your GitHub repositories within VSCode.

(Note: You can do this with other version control programs as well, but for this example and those going forward, we will stick to GitHub.)

To do this, open a new VSCode window and select “Clone Repository…”. At the top of the screen, either select your repository or enter the repository URL. You will then be prompted to choose a location to save your repository code locally.

There you have it! You have now pulled down a copy of your repo to save locally and work on. Next, we will review how you can easily switch branches within this repo as well as push changes to your source control program.

Hot Tip #2: Easily Switch Repository Branches Within VSCode.

Now that you have connected Visual Studio Code with GitHub, let’s review how to easily switch repository branches. You can do this by selecting your current branch name in the bottom left corner of the VSCode window. In the search bar that appears at the top of the screen, choose the branch you want to check out, or create a new branch. You can create a new branch by selecting the “+Create new branch…” option followed by entering a new branch name and hitting “Enter”.

Now you can easily switch between branches or create a new branch without leaving your IDE. Talk about efficient.

Hot Tip #3: See All the Code Changes on the Local Repository

The next VSCode tip and trick is an easy short cut to see all the changes you have made on your local repo that have not yet been pushed to your remote repo. To do so, hit Ctrl + Shift + G and you will see a list of files with changes made on your local repository within the Source Control panel. Select any file listed in the Source Control section to compare the changes on your local repo and the latest version on GitHub.

This makes it very easy to see what changes you are planning to push, as well as to quickly make some rollbacks.

Hot Tip #4: Push Changes from VSCode to GitHub

Now that we can quickly see where changes are, it’s time to review how to push these changes to GitHub. To push changes from VSCode to GitHub, there are three steps you will need to take:

First, stage your changes. To stage your changes, select Ctrl + Shift + G to open the Source Control panel, then select the + button next to each file you would like pushed to GitHub.

Next, commit your changes. To do this, locate the message bar at the top of the Source Control panel and add a commit message that describes the changes you are pushing such as “Added header”. Once your message is created, hit the check mark button next to the message box.

Finally, it’s time to push your changes. Select the “Sync Changes” button located below the message box.

There you have it! As easy as one, two, three. Your changes have now been pushed to your version control repository.

Conclusion

If you are one of the 14 million developers using VSCode (or someone who is looking to start using it) we hope these tips and tricks helped! You will now be able to easily integrate your source control software into your IDE for quick, easy and continuous development and version control.

In the meantime, stop by DataMotion’s GitHub profile to find our projects and development resources. You can also put these new VSCode tips and tricks to the test today by signing up for a free trial of our secure message center API. If you have any questions, feel free to visit our documentation site or contact our sales team.

happy group of business colleagues working together on code development in cafe
GitHub Enrichment: 4 Tips for Efficiency and Security 736 312 Team DataMotion

GitHub Enrichment: 4 Tips for Efficiency and Security

The GitHub platform is used by over 52,000 companies worldwide, including Team DataMotion. Why, you might ask? Because GitHub’s source code management and version control functionalities make it super-easy to add and contribute to your projects. For developers working in a group and sharing responsibilities, it’s essential to push code changes quickly and efficiently. As we know all too well, delays can have a ripple effect as others on the project may need your work to be completed before moving forward.

By enhancing your version control knowledge, you can quickly add new features and bug fixes to a project and avoid these slowdowns. In addition to efficiency, by building your GitHub knowledge you can take the incentive to ensure there are other controls in place on your repositories, such as security policies and safety nets. With cybercrime and insider threats on the rise, DataMotion and many other large corporations consider these security features to be essential for any GitHub repository.

Four More Tips to Improve Your GitHub Experience

To help you build this knowledge, the development team here at DataMotion has put together a list of tips and tricks to help you utilize GitHub to its fullest potential. If you are just joining in, this blog post is the second in a two-part series summarizing the tips we’ve shared over social media. You can find a quick GitHub overview, as well as the first of the series of tips and tricks, in our first blog post.

These tips are intended to enhance an already-basic knowledge of the GitHub platform, but for those of you who are still pretty new to GitHub and would like more information on how to get started, we recommend you visit their quick start guide. Otherwise, let’s continue and review four new GitHub tips that will help secure your repositories, increase efficiency, and enhance collaboration.

GitHub Tip #5 – Limit Repo Access

The fifth tip in our series is to limit who has access to your repositories. Limiting who has access is an important security strategy known as a Least Privilege Model (LPM) implementation. In essence, you are allowing only those who need access to the repository to have that access and therefore are cutting down the possibility of an insider threat.

The first step is to ensure the visibility of the repository is set to private, rather than the public setting that grants everyone access by default. To do this, navigate to the repository you would like locked down. Once on the repository, select “Settings” then scroll to the bottom of the screen where you will find a “Danger Zone” section. In this section, select “Change Visibility” and choose the “Make Private” option.

Once your repository is private, you will be the only user with access. From here, you will want to assess who on your team should also have it, then make them a contributor. You can do this by scrolling to the top of “Settings” and choose “Manage Access” on the left-hand side menu. A new page will display; in the page select the green “Add People” button within the manage access section.

To limit who has access to and to secure your repositories, go to your GitHub profile settings. Then manage access. Then click the "Add People" button

From here, you can search for the persons you would like to have access and contribute to your project.

Now only those who need access to your project will have it, reducing the chance of an insider threat.

GitHub Tip #6 – Scan Your Code

Continuing with security and efficiency in mind, our next tip is to scan your code once it is added to your GitHub repository. You can utilize CodeQL (or another third-party tool from the marketplace) to set up code scanning. This means CodeQL or another third-party scanning software program will crawl your code and identify errors or possible vulnerabilities within your code once it is pushed to GitHub. Note: CodeQL does have compatibility with VSCode as well.

When using CodeQL, these vulnerabilities and errors are found using queries. You can utilize queries created by GitHub and community contributors or create your own to use during these scans. Scans may identify errors in data flow, structure, and syntax. Custom queries can be used to search for errors unique to your organization, such as a query that may search for instances of a deprecated company URL. Searching for these vulnerabilities will keep your code clean and help thwart attacks in the future.

GitHub Tip #7 – Scan for Secrets

In addition to scanning for vulnerabilities, you can tighten security by scanning for secrets as well. To configure this setting within GitHub, navigate to your repository and select “Settings” followed by “Security and analysis”. Then, next to “Secret scanning” click “Enable”.

Doing so will ensure that no sensitive tokens or private keys that may grant permissions are pushed to your current repository. Therefore, you can ensure that sensitive data, as well as permissions, stay locked down.

Quick Note: This feature is automatically enabled for all public repositories (thankfully!). For private repos, you will need an advanced security license to enable this feature.

GitHub Tip #8 – Compare Repo Versions

While developing and continuously pushing project changes, you may find that you need to look at changes on a specific branch of your repository and compare it to the main branch. Therefore, our last GitHub tip in the series is how to efficiently do this from the version control platform.

To compare repository changes with another branch, add “/compare/branch1..branch2” to your repo path. For example, you can navigate to github.com/HeatherPost/GitHubTesting to see our latest repository. Then navigate to github.com/HeatherPost/GitHubTesting/compare/main..TestBranch to see the changes made on our test branch.

There is also the ability to compare two commits as well. To do this, use two dots to separate the version numbers. For example to compare commitA and commitB you would navigate to github.com/HeatherPost/GitHubTesting/compare/commitA..commitB.

Final Thoughts

Congratulations! You are on your way to becoming a GitHub master. With these tips and your new skills, you can now add security and efficiency features to your GitHub repositories and code. As a final tip, we recommend trying each of these suggestions out on a test repository before implementing in your current and future projects.  Once you’ve had a chance to test drive these tips for yourself, you will be ready to go!

We’ll be back soon with the next series of tips and tricks, which are all geared toward enhancing and broadening your skillset. These will be posted on DataMotion’s Twitter, Facebook, and LinkedIn pages every Tuesday. As always, we will be sure to summarize each set of tips in an easy and convenient blog post. Keep an eye out!

You can find DataMotion’s open-source projects, Postman collections and libraries on our GitHub. To find out more on how our secure message APIs can help you, visit datamotion.com today!

Developer sitting at desk with a laptop and coffee mug in front of him. Lines of code are written on the blue wall behind him and pieces of paper are taped on the wall.
Four New Year’s Resolutions to Become a Better Developer 732 312 Team DataMotion

Four New Year’s Resolutions to Become a Better Developer

Many see the start of a new year as a life.restart(); execution, and a time to create new habits that will bring success. With this in mind, I created four New Year’s resolutions that will help you build great habits, stay organized and become a better developer in 2022. Some are habits that I have found to be extremely helpful in my career, and others are suggestions from our engineers here at DataMotion that, for them, have made all the difference. To help these resolutions survive past January, I will also provide you with some helpful tips on how to achieve each below.

These timeless New Year’s resolutions will help you build your skills, career, and gain a work-life balance. Get your champagne ready because we’re going to ring in a new year full of success and achievements!

Let’s dive in.

2022 Resolution #1: Expand Your Knowledge

My first recommended New Year’s resolution is to take time to explore and develop skills in a new side of the technology field. For example, if programming is where you’re most resourceful, you may want to expand your knowledge and skill set in networking or operations. Expanding your knowledge provides a bigger picture on how your software will work in the grand scheme of things. Making a habit of expanding your knowledge and skill set will also make you a better, more marketable developer and allow you to become more resourceful in your current position.

If you’re still starting out in the programming world, you might want to take another step towards becoming a full stack developer. This doesn’t mean you have to choose a full stack role going forward, but this will give you flexibility in your current position as well as in future endeavors. For instance, if your current forte is front-end development, learning back-end development can be extremely useful. Understanding back-end development will again give you insight into how your DOM objects are being used. Doing so will also allow you to make your front-end work exactly as you have imagined as you will have control over how front-end objects are manipulated.

To help acquire new knowledge and skills, you can find courses on Udemy, Coursera, and YouTube. You can also find a wide array of blog posts online. Some courses might be a paid venture, but there are many free online alternatives. I am personally a big fan of w3schools.com, developer.mozilla.org and, of course, StackOverflow.

2022 Resolution #2: Personal Projects

Once you have learned a new skill or two, repetition and cycles will become your best friend. There are unfortunately no short cuts (I’ve checked!), and good, old-fashioned practice is the only way to improve your development skills and create mental “muscle” memory. A great way to practice a skill is through my second New Year’s resolution recommendation: get to work on some personal projects.

Meme of man reading a book about how to develop a new skill. Book reads "practice. practice. practice."

In order for these skills to truly become part of your arsenal, practice is critical. But your college course, work project, or personal business activities might not quite align with your new learnings. Therefore, you may need to create a project of your own to hone your newly-acquired skills.

Where to start? Your personal project could be something as simple as creating a personal portfolio with the new JavaScript framework you just learned. Perhaps you create an app to help automate some of your manual tasks. Another option is to create a pseudo-demonstration project, which has no other benefit aside from helping you practice.

These personal projects don’t have to be something you solely own, either. If you are learning back-end development, for example, find an open-source project where back-end development is needed. You might also consider taking a freelance position where you get to practice these skills. That said, I recommend these two options when you are more confident in your new skills but need repetition to stay sharp.

2022 Resolution #3: Build your Network

Developers often shy away from networking. It’s just a fact of life. But this is an extremely important skill to have, especially in the programming world, and is therefore my third recommended New Year’s resolution. Networking is an excellent way to gain career advice, learn of new developer events and industry news, and gain professional support. For example, if you are stuck on a project, it can be very helpful to have someone knowledgeable in the field to turn to. They may have run into the problem in the past, and unlike a stranger on StackOverflow, they may be willing to jump on a call to help walk you through a solution.

There are a number of options for networking with fellow developers. LinkedIn, of course, is a great place to network. There are also Discord and Reddit groups you can join. I also strongly recommend attending meet-ups, whether in person or virtually. I have personally found a ton of great groups to network in through meetup.com! Groups tend to meet on a timed interval (weekly, monthly, quarterly, etc.) to discuss a specific topic, or to work on a new development skill together. Making a habit of using these avenues to grow your network will help you expand your knowledge, gain, and refine new skills, and stay up to date on new technologies, malwares/threats, and job listings.

2022 Resolution #4: Know When to Step Away

Now the hardest resolution of all: knowing when to step away. I acknowledge this blog post has now asked you to take time to expand your knowledge, dedicate cycles to practicing new skills, and put in time to network, all on top of your current job and everyday life activities. But lighting the fire under your professional life can lead to burnout, which begs the question: when in the heck are you supposed to take a break?

This answer depends on you and your unique situation. For example, if you have a lighter workload at the moment but your personal life is busy, you may still need to take a break and focus on yourself. If your workload is becoming too much, a week away from these resolutions might be exactly what you need. I personally like to work in intervals, followed by a few days to myself. I find this gives me a great balance. You may need to do some trials to find a system that works best for you. You can also talk to a mentor or professional to help find the right system for you. Working to find this balance however is the key to staying consistent and sticking to your goals!

Here’s To 2022!

Well, there you have it! Four ideas for New Year’s resolutions to help you improve your development skills and gain success in 2022. Hopefully these resolutions will become habits that stay with you moving forward all year.

Be sure to follow DataMotion on Twitter, LinkedIn, and Facebook to learn about new features and products as well as find developer tips every Tuesday! We will be adding a new open-source project to our GitHub account this 2022 and would love for your contributions.

If security is already part of your 2022 resolution list, be sure to sign up for a free trial today!

Happy New Year!

Developer working on laptop and monitor pointing at the monitor using a pen
Get Resourceful with GitHub: Four Tips for the Skilled Developer 736 312 Team DataMotion

Get Resourceful with GitHub: Four Tips for the Skilled Developer

Have you ever been asked to share your GitHub profile at a job interview, or when meeting other developers at a conference? Doing so is an easy way to share your work and experience with others. With GitHub’s growing popularity, it’s now just as common for employers to request a GitHub profile as they would a LinkedIn profile. However, as great as the code hosting tool is for showboating talents, it does so much more. 

GitHub’s primary functions provide version control using Git and Internet hosting for web applications. As the platform continues to grow, new features are developed to enhance the primary functions and the development process as a whole. Understanding the magnitude of GitHub’s benefits, and how to use it to its fullest ability, will help advance your team’s productivity (as well as your career path).

Four Tips to Improve Your GitHub Experience

Over the past few weeks, our dev team has provided GitHub tips and tricks on DataMotion’s Twitter, Facebook and LinkedIn accounts to help users better utilize this version control tool. Below are the four tips we have provided to date, aggregated into a blog post for easy, convenient review.  

We created these tips to enhance an already-basic knowledge of the GitHub platform, but for those of you who are still pretty new to GitHub and would like more information on how to get started, visit their quick start guide.

GitHub Tip #1

Just as developers can showcase their software projects on GitHub, the GitHub Gist feature allows developers to easily display snippets of code as well. The gists are hosted on GitHub as any other repository would be and can be found on one’s GitHub profile. 

Gists can be used to share data and snippets of code through a URL or embed them into your webpages as I have below. By adding a quick source tag to our HTML, I was able to embed an example gist I created to this blog. 

This feature allowed me to easily provide the formatted code needed to get a DataMotion session key now without having to link to a full GitHub repo. Gists can be extremely useful when building documentation pages, how-to guides and, of course, technical blogs.

GitHub Tip #2

When collaborating on a project, you may want to fork a repository and push your changes to the main repo when you’re ready to contribute. This is a helpful strategy, but requires continuous pulling of the changes your partners push to the main project to ensure you are working with the latest code. Thankfully, GitHub makes it easy to know when you need to fetch these changes. 

Once your project is forked, make sure to enable the “Watch” feature on the main repository. By doing so, GitHub will notify you when a fetch is required. To do so, navigate to the main repository, select the watch button in the top right corner of the page, and choose your desired option!

To enable the "watch" feature on the main repository, click "watch" in the top right corner of the page and choose either "participating and @mentions," "all activity," "ignore," or "custom."

GitHub Tip #3

When collaborating on a development project, you can keep track of tasks by assigning bugs and feature requests with GitHub’s “Issues.” This feature allows users to create issues, which outline the different tasks that must be accomplished in order to complete a project. Developers can link to the issue in their push and pull requests in order to keep track of the issue’s progress. 

This adds issue tracking functionality on top of version control which helps further organize the development process. To get started, navigate to your project’s repository, select “Issues” at the top of the page followed by the “New Issue” button. From here, you can start filling out the details.

To create an "issue" select "issues" at the top of the page, then "new issue," then fill out the details when prompted

GitHub Tip #4

Now that we understand how the ‘Issues’ feature works, I’ll expand upon it. Developers may have a list of smaller tasks that need to be completed for one larger feature to be accomplished. To keep track of progress on a group of issues, utilize GitHub’s Milestones. 

The Milestones feature allows you to prioritize tasks and monitor which issues are completed and which are still open. You can also add a due date to each milestone to help better plan releases and keep to a specified development timeline. 

You can find more information on milestones within GitHub’s documentation. 

Key Takeaways

GitHub is an excellent tool for showcasing hosted code, but you can now see just how much more it has to offer. With the four tips reviewed today, you can enhance your development process and streamline collaboration by: 

  • Utilizing GitHub gists to share and display snippets of code
  • Ensuring you are notified when you must fetch upstream from a forked project 
  • Keeping track of bugs and feature requests with GitHub’s Issues
  • Using Milestones in order to group and prioritize various Issues

In the coming several weeks, every Tuesday, we will provide additional GitHub tips on DataMotion’s Twitter, Facebook and LinkedIn accounts. In the meantime, be sure to check out DataMotion’s GitHub profile to find our projects and development resources. To learn more about DataMotion and our products, visit our documentation site or contact our team of experts. 

Computer monitors with code on screen and red headphones and a keyboard in front
Meet Kevin Miller, DataMotion’s Postman Guru 736 312 Team DataMotion

Meet Kevin Miller, DataMotion’s Postman Guru

Kevin Miller, DataMotion Security Specialist, recently celebrated his seventh anniversary here at the company. During this time, Kevin has worn many hats and brought a wealth of knowledge to the table, including his proficiency of the Postman API testing application, of which he can be considered a subject matter expert. He has helped many of his colleagues and customers understand Postman, and how to succeed with the tool. Kevin was kind enough to sit down with us to share his experience, as well as some tips on how to leverage Postman to its fullest capability. 

Heather Post, DataMotion Developer Advocate: Kevin, thanks for your time. And congratulations on the work anniversary!

Kevin Miller: Heather, thanks—it’s a great achievement.

HP: Throughout your time at DataMotion, you have held a few different titles leading to your current position as the Security Specialist within our Engineering department. Can you tell us more about your role, and what that entails? 

KM: Today, my duties include handling security documents and statements, ranging from our information security plans and operating procedures, to our business continuity and disaster recovery. Security assessments from third parties, especially the bigger assessments like EHNAC and now HITRUST, fall under this umbrella as well.

In the past, I worked closely with support and sales to assist with questions relating to API integrations or specific product integrations, such as those involving Salesforce and the DataMotion secure email content filter. I’m still happy to help both departments when needed. 

HP: I understand that you have had the opportunity to use Postman extensively. Can you explain what Postman is?

KM: Sure! In a nutshell, Postman is a desktop application for performing web requests. As DataMotion provides an extensive number of APIs to go along with our system, Postman provides an easy way to quickly test those APIs or demonstrate their use if questions come up during conversations with customers.

HP: When did you first start using Postman?

KM: My first experience with Postman was back in late 2015 during the initial release phase for SecureMail 5.37 (now referred to as secure messaging center) when our REST APIs were first released. 

It was easy to get the hang of Postman, and it helped us quickly test DataMotion’s REST APIs without the need to build an application to do so for each. The ease of use of Postman at the time lay in the fact that it was a GUI application that was able to perform API requests without requiring vast knowledge of programming techniques. All that was required was the appropriate URLs for the API requests and entering their expected request bodies. Then, all you had to do was click a button to send your request and receive an easy-to-read response. All of this is still true in regard to Postman today. 

HP: Are there any specific projects where Postman plays a significant role?

KM: Most of DataMotion’s current projects involve API development, whether it be the original messaging products or the newer projects being integrated into the self-service portal for our customers to easily use. When creating a new API, we use Postman heavily to test functionality and to ensure the API will handle various parameters correctly. We also use Postman for internal and customer-facing demonstrations. 

Therefore, I would say any time you are developing or adding functionality to an API, that is a great time to use Postman. 

HP: What are some of your tips and tricks for using Postman successfully?

KM: I would advise several actions to make things easier when using Postman. 

The first tip I would recommend is utilizing variables. If you have to utilize the same information in multiple API calls, you can replace this information with a variable and define the value of that variable for an entire collection of calls. Therefore, if you need a session key to run all of your calls but login, you can update this value in one spot rather than having to do so for each of the calls you will be testing. 

My second tip is to create a set of environments that coincide with different sets of URLs. This is particularly helpful when working within our own systems, as many of the functions remain the same, but the base URLs change depending on the system. I simply create one of those useful variables for the base URL and update it based on which environment I will be using. This, again, saves time and the hassle of creating multiple collections of the same API calls.

The third action I’d recommend is very specific to our own messaging products, but is quite useful. This is to create a short console script in the ‘Tests’ category that carries the session key over to other requests in the collection. As an example of how this helps me, I have created a script that will update that session key variable that I mentioned earlier every time I call my Login API call. This streamlines the process of updating the variable and allows me to run any of my API calls directly after logging in. 

HP: Can you explain what the DataMotion Postman collections are, and how they can be used?

KM: All of DataMotion’s Postman collections are geared towards its messaging products, and are best suited for development teams to test sending their expected payloads via API, or for those customers who have on-premise systems to test the APIs within their own environments.

HP: One last question. Do you have any advice for developers who are just getting started with Postman?

KM: For those that have never used Postman, it is a good idea to use a pre-built set of collections to get used to what a request in the application will look like, how to trigger the requests, and what to expect in the response. This will make you much more familiar with the product when it comes time to build and test your own API.

HP: Kevin, thank you for your time today, and for all of the great information!

KM: You’re very welcome!

For additional Postman tips and tricks, check out our blog posts “4 Tips for Becoming a Postman Guru” and “4 More Tips for Your Journey to Becoming a Postman API Testing Guru” which rounded up our Postman series on social media. Finally, be sure to follow us on Twitter, Facebook, and LinkedIn to catch our next tips and tricks series, which focuses on GitHub.

Developer staring at a monitor with two windows of code open side by side
8 Tips for Postman API Testing Success 736 313 Team DataMotion

8 Tips for Postman API Testing Success

In software development, application programming interfaces (APIs) are an absolute necessity. APIs play a crucial role in enabling various systems to communicate and share data with one another. These versatile tools make it possible for developers to incorporate ready-made code into their applications, saving them the time and effort of creating complex features from scratch. Just as peanut butter pairs perfectly with chocolate, and a baseball game isn’t complete without sunshine, APIs are an integral part of a developer’s toolkit.

When it comes to working with APIs, there’s one tool that stands out above the rest: Postman. Loved by over 15 million developers and half a million companies worldwide, Postman has emerged as a key tool for programmers who need to test APIs, streamline their workflows, and save time.

What is Postman?

Postman is more than just an API testing application. It’s an all-in-one platform that supports every stage of the API lifecycle, from design and development to testing, documentation, and monitoring. With its user-friendly interface and extensive API collections, Postman has simplified the often-complex task of working with APIs.

Imagine you’re experimenting with a new API. You would likely need to set up the necessary request details, create an account, and provide account credentials before making the API call. With Postman’s API collections, all these details are readily available, cutting down your setup time and letting you ‘plug and play’ with ease.

As a testament to its effectiveness, the development team at DataMotion frequently utilizes Postman in their work, appreciating the many ways this tool enhances their productivity and efficiency.

Postman Tips and Tricks for Better API Testing

Postman is more than just an API testing application. It’s an all-in-one platform that supports every stage of the API lifecycle, from design and development to testing, documentation, and monitoring. With its user-friendly interface and extensive API collections, Postman has simplified the often-complex task of working with APIs.

After extensive use of Postman and thorough research, the development team at DataMotion has pulled together numerous tips and tricks to make the most of this powerful tool. These tips will save you time, streamline your API testing process, and help you become a Postman guru.

Tip 1: Streamline Workflows with Bulk Editing

Manually updating headers and parameters for each request can be time-consuming and repetitive. The ‘Bulk Edit’ feature in Postman is a lifesaver here. You can access this feature in the Header and Params sections, allowing you to see the list of headers or params in text rather than in a table format. This then allows you to copy the text and paste it into your new request. In the same section of your new request, select ‘Bulk Edit’ again and paste the text within. From here you can select ‘Key Values’ which has replaced the bulk edit option to see all your headers or params in the table format. This way, you can swiftly update your requests without having to modify each one individually.

Postman Tip 1, use bulk edit to copy and paste params or headers

Tip 2: Use Variables for Repeated Data in Multiple Requests

Another handy feature in Postman is its support for variables. You can set up variables within a folder or collection for data that is used repeatedly across multiple requests. For example, in DataMotion’s API collections, we have a header for a session key in most of our requests. When the session key updates, you can instead create a variable and update the session key variable’s value. You can then use {{variable}} to reference the variable in your requests. This simplifies updating the session key; you just update the variable value once, and it applies to all references across your requests.

Tip 3: Bulk Test Multiple Requests by Adding a Test Script

As a developer, quality assurance (QA) testing is an inevitable part of your role. Postman has a convenient way of allowing you to test multiple requests at once with the same script. To do this, select the folder or collection containing the requests you want to test, then navigate to the ‘Test’ tab and add your test code. You can then run the entire collection, executing multiple tests at the same time.

Postman Tip 3, test requests in bulk by clicking collection then adding a test script in the test tab

Tip 4: Enabling and Disabling Headers or Parameters

There might be times when you want to run a request without certain headers or parameters. Rather than deleting them and then having to add them back in later, Postman lets you disable or enable headers or parameters with a simple click. Deselect the checkbox next to each header or parameter you want to disable. This allows you to run the request with only the enabled headers or parameters included.

Postman Tip 4, run a request without a header or parameter by deselecting the checkbox next to each

Tip 5: Use the Postman Console to Update Environment Variables from a JSON Response

A great tip I recently learned utilizes the Postman console to update environment variables using data from a JSON response. You can write a script that parses the JSON response returned after making a request, then update an environment variable with this response data – all within Postman.

This trick is particularly useful when getting session keys. Within the DataMotion Postman collection, several requests require a session key. To streamline the testing process, I created a ‘SessionKey’ variable that allows me to easily update each instance at once. Then I add the following code to my console, which captures the updated session key from DataMotion’s ‘Get Sessionkey’ API call and automatically populates the ‘SessionKey’ variable with the response.

var data = JSON.parse(responseBody);

postman.setEnvironmentVariable(“SessionKey”, data.SessionKey);

This ensures that the ‘SessionKey’ variable in the majority of my requests consistently reflects the most current session key retrieved through the ‘GetSessionkey’ API call.

Tip 6: Utilize Postman’s Find and Replace Feature

The session key variable is scattered across the DataMotion collection. If the variable name needed to changed or be updated, it would be a long and menial task to complete. However, this work can be replaced with Postman’s find and replace feature.

To rename a variable, such as the session key variable or an attribute name, navigate to the bottom right of your Postman workspace to find the “Find and Replace” button. Select this button and type in the phrase or regex pattern you would like to identify. From here, select specific instances of this phrase to update or select all. Then enter the new phrase you would like to replace these instances with under the “Replace With” section and click “Replace.”

Navigate to bottom right of Postman window and find the "Find and Replace" button

Tip 7: Convert Your API Requests into Code Snippets

Postman is not just an API testing tool; it’s also great for converting your API calls into code. After configuring your Postman request, simply select the code icon on the right panel of your workspace, select a programming language, and copy the generated code snippet of your request.

You can then seamlessly integrate this snippet into your projects for a streamlined development process.

Select code icon in right panel to get code snippet

Tip 8: Automatically Create Documentation for Your Collections

You can create API documentation for your Postman collections using the documentation icon in the right panel of the Postman workspace.

Once you have selected the documentation icon, you will see the documentation for your request, including details on the endpoint, parameters, headers and body values. You can also select the ‘View the complete documentation’ button at the bottom of this view to get documentation on your entire collection. From here, you can select publish in the top right corner to publish this information, directly from Postman.

Create API documentation for collections with documentation icon

Deep Dive into Secure Message Center API with Postman

While Postman is a powerful ally for any API-related work, its functionality is especially evident when used with the secure message center API. Developed by DataMotion, the secure message center API enables secure messaging, email, and document exchange integration into self-service portals like online banking, insurance member services, wealth management portals, and more.

These self-service portals have become the primary interfaces for customers to manage their accounts, conduct transactions, find healthcare specialists, or check insurance claim statuses. However, these portals occasionally fall short of providing secure and compliant communication channels. This is where the secure message center API, built with data privacy and governance regulations like GLBA and HIPAA in mind, comes into play. By integrating the secure message center API into these portals, businesses can quickly establish a robust, secure, and compliant communication resource.

Postman’s ability to test, validate, and demonstrate the functionalities of the secure message center API proves invaluable in these integrations, making it easier for developers to understand, work with, and leverage the API to its full potential.

Postman Demonstration Videos

To help you navigate the complexities of secure messaging and API testing, DataMotion has prepared a series of demo videos showcasing the use of Postman with the secure message center API. These videos serve as a step-by-step guide, walking you through the API’s functionality and demonstrating how Postman can be utilized to facilitate API testing. Not a fan of Postman, but are looking for something different to test APIs? Check out our recent blog post and video demonstration that leverages the Insomnia REST Client for API testing.

Sending Secure Messages with DataMotion via Postman

Here’s one of our software developers demonstrating our ‘send message’ API. If you’d like to follow along, you can view our Postman Collection on GitHub and try out our APIs in our self-service portal.

Managing Folders in DataMotion's Secure Message Center API with Postman

This video offers a comprehensive demonstration of folder management with the secure message center API. It covers the essential steps of listing, creating, and deleting folders for efficient organization.

If you are developing a self-service portal for a financial services or insurance company – we hope this taste of secure message center programmability clarifies what you can build with our APIs. Of course, there is a lot more functionality – and all of the secure message center APIs are well documented with sample code and SDKs.

Conclusion and Invitation for Further Exploration

APIs have revolutionized the way developers work, and Postman is one of our favorite tools leading the charge in making API testing more accessible, efficient, and effective. As we continue to explore and discover new facets of this and other powerful tools, we’ll continue to share our knowledge and tips with the developer community. For more insights into the world of Postman, similar tools like Insomnia, and API testing in general, follow us on LinkedIn, Facebook, and Twitter and subscribe to our monthly newsletter. We post new tips and tricks every Tuesday, providing fresh content to help you master these incredible tools. To put your Postman learning into practice, download our Postman collections on GitHub.

Feel free to contact us for any questions or to discuss your project ideas, and don’t hesitate to book time for a conversation or technology demonstration!

Updated November 9, 2023

Programmer working on developing software with two laptops, a monitor, a keyboard, and a track pad
5 Things to Consider Before Developing Software In-house 736 313 Team DataMotion

5 Things to Consider Before Developing Software In-house

It’s a common analogy: the decision between building or buying a software application is comparable to choosing whether to build or buy a house. The pros and cons for both are similar. Building it yourself often leads to something made specifically for your needs and could save you money. However, it also can take much longer than predicted and has a substantial risk of unexpected expenses. While choosing to buy can be the simpler and faster decision, you may not receive that “made just for you” feeling you were hoping for. Many of our customers struggled with this dilemma before choosing to use a third-party vendor. Why is this? We’ll highlight five things to consider before developing software in-house and why it may be better to let someone else do the heavy lifting.

Stressed out developer taking a break while resting hands on headBefore getting started, we want to emphasize that building software in-house is not always a bad decision. If your desired solution is expected to be core to your business and your team has the resources to build it themselves, then building it in-house can be the better option. Not only will your solution have the features you need, but you’ll also have greater control over it in the long run. On the contrary, if your solution is not expected to handle core business processes and your team has other critical priorities, we encourage you to keep reading.

Now that we’ve gotten that out of the way, let’s get started. Here are five things to consider before building software in-house.

Five Things to Consider Before Developing Software In-House:

1. It’s a massive time commitment. As we alluded to earlier, building a new software solution or application from scratch can be an extremely long, drawn-out process. In fact, the time it takes to develop the front and back-end infrastructure for a standard web application is 4.5 months. If your project includes complex features, such as secure messaging, assume it will take longer. And when you think you’re done, you’re not. Work isn’t complete once you go live. As the software developer, you will be responsible for monitoring, updating, and supporting your application even after it’s launched.

2. It’s incredibly expensive. When you build software in-house, it’s common to assume that you’re saving money. While that may be true, it’s not always the case. To put the costs into perspective, let’s crunch some numbers.

For simplicity, we’re assuming we have a one-person team, a front-end developer. We’re also assuming they’ll complete the project in 4.5 months while working 40 hours per week.

Estimate for how many hours it will take to build software in house. Taking 4.5 months and multiplying it by week per month and 40 hours per work week.

That works out to 720 hours for one employee to work on a single application. Odds are, you’ll have a team of developers working together, so make sure to multiply that number by the number of people on your team.

Since we’re talking in terms of money here, let’s convert that to how much you will spend during that time frame, using $57 as the average pay per hour for a front-end developer in the United States.

Estimate for cost to build software in house. Taking the average pay per hour for a front-end developer multiplied by the number of hours to develop a standard web application. Estimated cost comes out to $41,040

$41,040. That’s the minimum you’ll spend to build a standard web application. Now, we’ll admit that math was not perfect. You’ll likely have a larger team, consisting of employees in various roles, all getting paid different amounts.

Not to mention – all that time and money that went towards building your application could have been spent focusing on other priorities, so there’s an opportunity cost to consider.

3. It’s (probably) already been built. Unless your requirements are highly specific and unique, there’s an excellent chance someone has already built all, or at least part of, what you’re searching for. A third-party vendor has already put an extensive amount of time and work into testing and perfecting their solution to ensure it works exactly as expected. Thus, they will know the ins and outs of their product, how it was built, what it can and cannot integrate with, the potential to customize it, and solutions to common problems. In short, these folks have years of experience and know what they’re doing.

Word of warning: not every third-party vendor is built equal. While many have taken the necessary steps to protect their system’s security and meet the needs of their customers, it’s important to do your due diligence when choosing to outsource all, or parts of, your project. Here are 14 points to consider when vetting a third-party vendor, particularly when choosing an API company.

4. You will be your own support team. As mentioned earlier, building software in-house means providing support for your software throughout its lifespan. This requires a significant, ongoing time commitment from your team. It also involves a constant effort to maintain the skills and knowledge to properly respond to requests. This means continuous training for your current team, and any future team members.

5. Other products have been polished and perfected. Remember when we mentioned earlier that an application with your requirements has likely already been built? This is a critical topic, so we’re going to reference that again in this last point. Many API and SaaS companies have been around for a while and have already spent years testing, modifying, and updating their services. Often, this results in a fine-tuned product specifically designed to meet customer demands.

This experience factor is also important to consider if your desired solution must comply with industry and privacy regulations. To satisfy compliance requirements, specific steps must be taken, and certain criteria met both within the services offered and the organization who provides the service. Many third-party vendors have already taken the extensive time needed to fulfill these requirements so their customers can focus their resources elsewhere.

To Sum Up

Building software in-house may sound like a promising idea when you’re considering a project. However, it is critical to assess the pros and cons of building it yourself, lest you fall into a never-ending development cycle. And if your project involves any type of secure messaging system, additional time must be taken to meet regulatory compliance requirements.

To close out this blog post, we’d like to provide you with five preliminary questions to ask yourself when choosing to build or buy software:

  1. Is my desired solution core to my business processes?
  2. How much time and money should I devote to my project?
  3. Do integrations for any of my solution’s preferred features exist?
  4. Do I have the resources to update, maintain, and provide support for my solution throughout its lifespan?
  5. If my solution deals with any kind of sensitive information, what are the relevant regulations with which it must comply?

DataMotion offers a variety of API and pre-built solutions for organizations seeking to add an easy-to-use and secure messaging system to their communications toolkit. We also offer several pricing plans for our pre-built services and tiered pricing for our transactional APIs. To get an estimate on how much you’ll spend using our secure message delivery API, you can use the calculator on our pricing page.

Explore More

Sources and Related Reads

A light blue security lock with data pixels flying to the right side on a dark blue background
Danger for Data, Part One: 7 Back-End Breach Risk Factors 786 310 Bob Janacek

Danger for Data, Part One: 7 Back-End Breach Risk Factors

According to the Identity Theft Resource Center’s 2022 Data Breach report, 1,802 data compromises were reported in 2022 in the United States, just 60 shy of 2021’s total. That number of data compromises translates to over 422 million affected individuals. Additionally, the average cost of a data breach worldwide in 2023 rose from $4.35 million to $4.45 million.

As such, many organizations want to know how they can reduce their data breach risks and which of their current processes put them most at risk. In the first part of this blog series, we will cover the top five risk-prone areas that developers and software engineers should be aware of. We’ll also discuss the causes and different types of data breaches that can occur within organizations.

In parts two and three, we’ll focus on people-oriented processes that put you at risk of a breach, following up with actionable tips, recommendations and data breach prevention tools for organizations to protect themselves and their customers’ data.

How Do Data Breaches Happen?

There are multiple ways data breaches can happen, including hacking, phishing, malware attacks, inside threats and weak security measures.

Hackers may take advantage of software and system vulnerabilities to gain unauthorized access to important information. Malware, such as viruses or ransomware, can infiltrate systems and steal data. Social engineering tactics, like phishing and baiting, involve deceiving individuals into revealing their login details. Insufficient physical and network security measures, weak passwords and unpatched software can also lead to data breaches.

A minor vulnerability can turn into a major data breach catastrophe in the digital realm. Whether you’re a business, government entity or individual, the exposure of sensitive information can lead to costly complications.

Often, individuals underestimate the prevalence of modern security threats due to a lack of awareness. As such, it’s crucial to understand the different types of data breaches:

  • Ransomware: Malicious software encrypts user data, demanding payment for decryption.
  • Malware: Harmful software infiltrates systems to access, steal or manipulate data.
  • Phishing: Deceptive emails or messages trick users into revealing sensitive information or clicking on malicious links.
  • Password guessing: Hackers use trial and error to uncover weak passwords and gain unauthorized access.
  • Stolen information: Cybercriminals physically steal devices or data storage containing valuable information.
  • Recording keystrokes: Malware records user keystrokes to capture login credentials and sensitive data.
  • Distributed Denial of Service: Attackers flood a network with traffic, overwhelming it and causing service disruption.
  • Unauthorized access: This can occur due to weak passwords, compromised credentials or vulnerabilities in software.
  • Insider threat: This can occur when disgruntled employees misuse their credentials to compromise and steal data.
  • Physical theft or loss: This is associated with the physical theft or loss of devices such as laptops, smartphones or storage media.
  • Third-party breaches: Security vulnerabilities in third-party vendors, suppliers or services can expose your organization to data breaches.
  • Shared accounts: Sharing credentials or using shared service accounts makes it challenging to trace actions back to specific individuals, increasing the risk of breaches.
  • Structured query language injection: One of the most common types of data breaches is when an attacker injects malicious code that allows them to manipulate the database query and gain access to sensitive information.

These breaches exploit vulnerabilities to steal personal and confidential information or hold an organization hostage to extract a ransom. Data breaches ultimately lead to financial loss and reputational damage.

Back-End Processes Putting You at Risk

Your organization may be at risk of data breaches due to various system and application vulnerabilities. Some of the examples of these security vulnerabilities include:

1. Outdated, Legacy Systems

Legacy systems are tremendously costly. These systems often operate on outdated hardware and software, which can be challenging and expensive to maintain. The cost of finding replacement parts, skilled personnel and compatible software can add up quickly.

Costs aside, legacy systems pose an elevated risk of a data breach due to outdated code, obsolete standards and outdated methods and procedures. An example of this is the use of passwords in clear text and relying on a common service account for operational tasks. These vulnerabilities, combined with a scarcity of qualified personnel to maintain them, create an ideal environment for hackers to exploit.

Despite the risks, many organizations continue to rely on these outdated systems. The reluctance to update or replace isn’t from nonchalance — this is usually because the systems were created for a specific purpose. Removing them could lead to data loss or an inability for an organization to execute critical processes.

2. Vulnerable Data Access

Would you give the keys to your house to just anyone in your circle? Probably not, because you understand not everyone should have that kind of access. There is no reason for your college roommate to have your keys or your third cousin. If you wouldn’t give everyone unlimited access to your house, why would you grant every employee access to all the data in your organization?

Just as giving away house keys opens the door to serious problems, playing fast and loose with data permissions is risky, too. This isn’t merely because of the risk of malicious intent by insiders — which costs organizations an average of about $4.90 million in 2023, or 9.5% more than the average $4.45 million cost of a global data breach — but rather the much higher risk of sensitive data being mishandled internally.

So, just as you carefully limit access to your home, data permissions demand similar vigilance. Access control levels (ACLs) are crucial for granting appropriate access. Your team may need higher access levels, but sensitive data should remain off-limits to others.

It is important to periodically review access levels and question the necessity of those levels to minimize the risk of unauthorized access resulting from ACL misconfigurations, oversight or mishandling. These reviews should be conducted by a third party who is not involved in the security process.

3. Sloppy Code and Insecure APIs

As a developer, you are notoriously busy. There is almost always a new product or update to release in a tight timeframe while simultaneously fixing bugs and improving performance. High stress and low bandwidth can lead to errors slipping under your radar. If you aren’t given the time to rigorously test your code, your organization runs the risk of releasing a project with security holes, thus increasing the number of vulnerabilities and the risk of a data breach.

Vulnerabilities in your codebase and poorly secured APIs create opportunities for cyber assailants. These weaknesses could range from inadequate input validation to a lack of proper encryption. Flaws in your code and APIs can lead to unauthorized data access, manipulation or even full-scale breaches. The cost isn’t just financial — the aftermath might entail reputational damage and regulatory penalties. There are several real-life examples of data breaches due to insecure and unregulated APIs.

Knowing that big development projects are time-consuming and typically involve features outside of your bandwidth, you might consider using third-party APIs. This option can help curtail the time and financial burden associated with building a project from scratch, while you benefit from the expertise the API company brings. But don’t gamble on your data security — do your diligence and research your vendor and the API you’re planning to use before coding them in.

In short, selecting APIs that follow proper security measures is critical. APIs that use OAuth or SAML authentication, strong encryption such as AES 256 and TLS, and those with rate limits all reduce the risk of a breach. Choosing an API that uses a zero-trust model, while unfortunately rather rare, is also another best practice to enhance the security of your project.

4. No Protections for Data in Motion

Most people understand the risks associated with sending an email, including phishing, malware and ransomware, to name just a few. The topic of inbound email security is frequently discussed, but we’ll examine a less-discussed risk — sending sensitive information in an outbound email.

When you send an email, that message passes through many systems and network locations. Think of the process as traveling abroad. As a tourist, you would carry your driver’s license, insurance card, credit card and passport. If you are marked as a tourist, an experienced pick-pocket can steal these items without anyone noticing. But by taking steps to secure your belongings, such as with an RFID wallet clipped to your belt, your chances of theft significantly decrease.

Protecting your outbound data is a similar concept. Just as you’d act to secure your documents while traveling, securing any sensitive information sent from your systems is equally important. Like a pick-pocket, a capable hacker can intercept emails and access sensitive information before you even notice a problem.

Taking the proper measures to protect your sensitive data diminishes both the threat and impact of email interception. To enhance the security of your emails and safeguard against phishing and malware attacks, it’s crucial to utilize proper transport layer security (TLS) encryption, end-to-end encryption, S/MIME and secure email gateways. However, it’s also necessary to protect non-email-based data in motion, like electronic data interchange and web traffic. In addition to TLS encryption, you should follow other best practices, including SSL/TLS certificates, HTTPS implementation, virtual private network usage, multi-factor authorization deployment and network segmentation.

For instance, using an email encryption service renders the content in your exchanges useless to hackers, greatly decreasing the chance of a breach. Utilizing options such as secure emailcontent filters and customer channels for secure messaging can lower your risk and accelerate your business.

5. Lack of Encryption Between Frontend and Backend Applications

The seamless interaction between frontend and backend applications is crucial for smooth operations. However, overlooking the encryption of communication between these components can open a gateway for potential data breaches.

Cyber attackers can exploit this vulnerability through man-in-the-middle attacks, intercepting and tampering with the data flowing between frontend and backend systems. Organizations inadvertently expose sensitive information to prying eyes by failing to implement strong encryption protocols.

Unencrypted communications provide a fertile ground for hackers to eavesdrop, steal data or inject malicious code — jeopardizing the confidentiality and integrity of critical information.

6. Unpatched Software

Picture unpatched software as an unlocked door in an otherwise secure fortress — a glaring vulnerability that cyber adversaries are all too eager to exploit. When organizations neglect to apply timely software updates and patches, they inadvertently create a gateway for hackers to infiltrate their systems.

Hackers are adept at identifying known vulnerabilities in outdated software versions. They exploit these weaknesses to gain unauthorized access, manipulate data and even exfiltrate sensitive information. Think of it as a thief finding an unguarded entrance to a vault.

7. Security as an Afterthought

There’s a well-known phrase that says if you fail to plan, you plan to fail. Perfect examples of this include failure to assess overall risk factors and proactively identifying and addressing software vulnerabilities before they become an issue. Another back-end breach risk factor is falsely assuming that your organization is not susceptible to a breach. Building your solutions without security as top-of-mind invites hackers in and you’ll find yourself in a race against the clock to find uninvited guests in your production systems before they gain control of sensitive data.

Make no mistake — it’s not a question of if you’ll suffer a data breach, but rather, a question of when. Being proactive about protecting your systems and data is much better than being reactive.

Fortify Your Defenses, Choose DataMotion for Secure Data Exchange

In an interconnected digital landscape, your data’s safety is crucial. Our exploration of seven back-end breach risk factors underscores the urgency of modernizing data protection. Ignoring these threats may expose your organization to avoidable risks. Don’t let complacency compromise your security.

As you analyze your current practices, remember that prevention is key. Stay vigilant against data breaches by adopting cutting-edge data breach prevention tools. DataMotion offers a comprehensive suite of services — honed by two decades of experience — to fortify your digital ecosystem.

Contact us online for more information on how you can upgrade your data protection.

Be sure to read the other parts of this series:

Updated September 8, 2023

Image of API code on a blue screen
Enabling Secure, Automated Email Notifications with the Secure Message Delivery API 786 310 Christian Grunkemeyer

Enabling Secure, Automated Email Notifications with the Secure Message Delivery API

Recently, we released the DataMotion API for secure message delivery. Like the rest of our family of APIs, it’s just as easy to code into your apps, portals, and workflows as it is to bake a cake. But what makes it unique is that it’s a small subset of our larger collection of secure message center APIs. So, instead of getting APIs for secure messaging, administration, and provisioning, you’ll only be buying an API for sending secure messages. Think of it like a computer monitor, keyboard, and mouse bundle. If you only need the monitor, there’s no sense in paying more for the mouse and keyboard, so you’ll just buy the monitor by itself.

So, if the secure message delivery API is only a subset of our secure message center APIs, what exactly does it do? Well, as you would expect, it integrates the ability to send a secure message in one direction into whatever you build. Also, it supports granular tracking and reporting at the per recipient, per attachment level. With this API alone, you probably won’t be building out an entire ecosystem for secure exchange, but you might enable automated, secure email notifications or a one-way, user-initiated secure channel for sending sensitive documents in your app or portal, for example.

Sample Scenario

To paint a better picture of what you can build with this API, we’re going to highlight a brief, sample use case. Let’s imagine you’re a front-end developer for a wealth management firm tasked with creating a secure and automatic system for notifying clients whenever there is a change in their account allocation. You already have a system in place that tracks every action taken on a client’s account and records the exact time that each action occurred. Now, you just need to create a workflow that automatically sends an email notification whenever a major change in an account takes place, such as an account allocation change. You don’t want clients to be able to reply directly to this notification, they just need to be able to view the description of the change that was made, view the steps needed to resolve changes that they don’t recognize, and you need to be able to view who has received and opened each message and when they opened it. Because the workflows needed to send these notifications are linked to private account information, you recognize that it’s better if they are sent in a secure manner to protect your client’s data.

This is where the secure message delivery API comes into play. With a few lines of code, it helps you quickly inject the functionality for sending secure email alerts right into your workflow, so you don’t have to build it yourself. With this API, your organization can easily send secure, automated account notifications and track the status of every message sent for operational and compliance reporting. Essentially, you’ll achieve a win-win-win scenario. You’ll streamline your business processes, your developers will save valuable development time, and your client’s will receive a simpler and more secure user experience.

What's Next?

So, now that you have a better idea of what you can build with the secure message delivery API, it’s time for you to get started and try it out for yourself. You can view documentation for this API or start building right now by signing up for a free trial right in our self-service portal.

Light blue circles on a dark blue background with strings of data
Getting Started with the DataMotion Secure Message Center API – Session Keys and Sending a Secure Message 788 311 Jose DeLavalle

Getting Started with the DataMotion Secure Message Center API – Session Keys and Sending a Secure Message

4 Minute Read

In this blog series, you’ll learn how to use the DataMotion secure message center APIs. We’ll start with the basics of getting a session key and sending a message, then explore a wide range of additional functionality. To make this series quick and easy to follow, we’ve broken it up into a few, easy-to-consume parts. This first part should only take you a few minutes, so you can start brewing a pot of coffee and celebrate with a fresh cup when your code is done.

For those who aren’t familiar with this family of DataMotion APIs, they make implementing modern secure document and message exchange in your mobile apps, portals, and workflows easy and fast. It’s a win-win – you get the secure features you need while having extra time to focus on other features that make your app best-of-its-kind.

There are many use cases where our secure messaging APIs have saved the day, ranging from enabling client to advisor exchanges in wealth management apps, to the exchange of medical results for clinical trials. Now, customers can say goodbye to muzak on hold, stamps, faxes or trips to see their advisor. Instead, they’ll be saying hello to securely getting business done in record time.

Now that you have a better understanding of what these APIs can do, let’s begin with the first part of this tutorial. We’ll start with showing you how to get a session key and send your first secure message directly from the “How Do I?” module in our self-service center.

First Things First...

There are a couple of things you will need to confirm prior to diving into this tutorial. First, in order to get a session key and send your first message, you must be signed up for a DataMotion developer account. If you don’t have one yet, you can fill out the form that pops up to “Create a DataMotion Account” when clicking the “Login” button at the top right corner of the self-service center. Upon completion of this form, you’ll begin a free 120-day trial of our secure message center APIs and you’ll be ready to move on to the rest of this tutorial. So, let’s get started!

Create a DataMotion account free trial sign up form

Get a Session Key

Before calling any of the functions in this suite of APIs, you’ll need to get a session key. A session key verifies a user’s account credentials, so the system knows it’s actually them when making API calls. To get a session key, your users will enter their UserIDorEmail and Password. In this example, use the ones that you established when creating your developer account and enter them into the body of your HTTPS request. Then click the Submit button.

How to get a session key for the secure message center API using your UserIDorEmail and Password

A successful response will return a 200 Status Code with a Response BODY:

Sample of a successful session key response body. Including a 200 OK status code and your session key

To keep things secure (that’s what we do), this session key will expire after 30 minutes of inactivity on an account.

It’s important to take a quick step back to discuss this process of getting a session key in a little more detail. For the purposes of this tutorial, we asked you to simply input your UserIDorEmail and Password. However, this isn’t the only method to verify your identity with our services. We also support single sign on and integrations with public or private identity providers, such as SAML, to establish and verify a user’s identity.

Send a Message

Now that you have a session key, keep it handy. We will be adding it as a custom header value to every other DataMotion secure message center API call we make. Alright, so let’s send your first message.

Using the same “How Do I?” module, you’re going to move down to the tab labeled “Send a Message.” First, to make things easy, you’ll notice that the “To” and “From” fields are already filled out for you using the email address associated with your DataMotion account. All you’ll need to do is fill out the Subject and the TextBody, then click Submit to send your message.

Sending a message with the secure messaging API with test subject and test text body

If your secure message sends successfully, you will receive a 200 status code along with your message ID and the message expiration date. Because the “To” field was pre-populated with your email address, you will receive a message waiting notification in your inbox. A successful request will look similar to the following:

Sample response for a successfully sent message with 200 OK status code, MessageID, and message ExpirationDate

What's Next?

Take a bow!  You’ve successfully gained access to the API, established a Session Key and sent a message. It’s a great time to treat yourself to that fresh cup of coffee!

You’re now ready to move on to the next step. In the next part of this blog series, we’ll show you how get your message summaries and how to read a message.

In the meantime, you can read up on our Get a Session Key and Send a Message documentation for the secure message center APIs in our developer center.

If you haven’t already, try it out for yourself using our “How do I?” module in our self-service center!

Try it Out