Magento Integration

Magento

To integrate Trustvoice with a store running on Magento, there are three authentication methods supported by Magento. Trustvoice supports two of them out-of-the-box.


What Trustvoice needs

Depending on the authentication method, we require:

  • API username and password (used for token generation)
  • Bearer token (if available)
  • OAuth 1.0a credentials, including:
    • Consumer Key
    • Consumer Secret
    • Access Token
    • Token Secret
  • Domain / Base URL of the Magento store
    (e.g. https://checkout.customername.com)

Supported Authentication Methods

You provide:

  • API username
  • API password
  • Domain

Our system uses these credentials to dynamically generate an access token, which is then used for all authenticated API requests.


You generate and provide a long-lived bearer token that does not expire (or is valid for a long period).
Trustvoice uses this token directly when accessing order data.

You also need to provide the full endpoint for retrieving orders. Example:

GET https://checkout.customername.com/rest/V1/orders?searchCriteria[filter_groups][0][filters][0][field]=store_id&searchCriteria[filter_groups][0][filters][0][value]=9&searchCriteria[filter_groups][0][filters][0][condition_type]=eq&searchCriteria[pageSize]=10&searchCriteria[currentPage]=1
Authorization: Bearer {access_token}

📝 Note: Make sure the token has permission to read order data.


3. OAuth 1.0a (optional)

Magento supports OAuth 1.0a using HMAC-SHA256 as the signature method.

To use this method, the customer must provide:

  • Consumer Key
  • Consumer Secret
  • Access Token
  • Token Secret

⚠️ Important: OAuth 1.0a is not supported out-of-the-box by Trustvoice, but can be implemented if needed.


Recommendation

Recommended methods:
We recommend using Method 1 (Username & Password → Token) or Method 2 (Bearer Token), as both are supported by default.
Method 3 (OAuth 1.0a) requires custom setup and should only be used if specifically required.


Important

⚠️ Never share API keys, tokens, or credentials in unencrypted emails or open chats.
Always use a secure method such as encrypted email or a password manager.