Connectors
Connectors let HiveMind OS integrate with external communication platforms, calendars, cloud drives, and contacts — turning your agent into a true productivity hub. Each connector runs inside the daemon and provides services that agents, workflows, and bots can use.
Supported Connectors
| Provider | Services | Auth Type |
|---|---|---|
| Microsoft 365 | Email, Calendar, Drive, Contacts | OAuth2 |
| Gmail / Google | Email, Calendar, Drive, Contacts | OAuth2 |
| IMAP / SMTP | Password | |
| Slack | Messaging | BotToken |
| Discord | Messaging | BotToken |
| Apple | Calendar, Contacts | Local |
| Coinbase | Trading (Advanced Trade API) | CdpApiKey |
Auth Configuration
Each provider uses a specific AuthConfig variant:
OAuth2 (Microsoft, Gmail)
auth:
type: oauth2
client_id: env:CLIENT_ID
client_secret: env:CLIENT_SECRET
refresh_token: env:REFRESH_TOKEN
access_token: env:ACCESS_TOKEN # optional, auto-refreshed
token_url: https://oauth2.example.com/token # optionalPassword (IMAP/SMTP)
auth:
type: password
username: env:IMAP_USER
password: env:IMAP_PASS
imap_host: imap.example.com
imap_port: 993
smtp_host: smtp.example.com
smtp_port: 587
smtp_encryption: starttlsBotToken (Slack, Discord)
auth:
type: bot_token
bot_token: env:BOT_TOKEN
app_token: env:APP_TOKEN # optional, used for Slack Socket ModeCdpApiKey (Coinbase)
auth:
type: cdp_api_key
key_name: env:CDP_KEY_NAME
private_key: env:CDP_PRIVATE_KEYLocal (Apple)
auth:
type: localSetting Up a Connector
- Open Settings → Connectors → Add Connector
- Pick a provider (e.g. Gmail, Microsoft, Slack)
- Authenticate — OAuth2 providers open a browser flow, IMAP asks for credentials
- Enable the services you want (communication, calendar, drive, contacts)
- Optionally restrict which personas can access this connector
Example: Gmail Connector
connectors:
- id: my-gmail
name: Personal Gmail
provider: gmail
auth:
type: oauth2
client_id: env:GMAIL_CLIENT_ID
client_secret: env:GMAIL_CLIENT_SECRET
refresh_token: env:GMAIL_REFRESH_TOKEN
services:
communication: true
calendar: true
drive: true
contacts: true
allowed_personas:
- user/support-agent
- user/schedulerExample: Slack Connector
connectors:
- id: work-slack
name: Work Slack
provider: slack
auth:
type: bot_token
bot_token: env:SLACK_BOT_TOKEN
app_token: env:SLACK_APP_TOKEN
services:
communication: trueExample: IMAP/SMTP (Generic Email)
connectors:
- id: work-email
name: Work Email (IMAP)
provider: imap
auth:
type: password
username: env:IMAP_USER
password: env:IMAP_PASS
imap_host: imap.example.com
imap_port: 993
smtp_host: smtp.example.com
smtp_port: 587
smtp_encryption: starttls
services:
communication: truePersona Scoping
Connectors can be restricted to specific personas using allowed_personas. This means:
- A
user/support-agentpersona can read and send emails - A
user/researcherpersona can't — it never sees the connector's tools
If allowed_personas is empty, no persona has access by default — you must explicitly grant it.
WARNING
Be intentional about which personas can access which connectors. A persona with email access can read and send messages on your behalf.
Classification on Connectors
Connectors are subject to the same data classification system as everything else. Outbound messages pass through the classification gate — if an agent tries to send CONFIDENTIAL data through a connector classified as PUBLIC, the override policy kicks in (block, prompt, or redact).
What Connectors Enable
With connectors configured, your agents can:
- Read and reply to emails — trigger workflows on incoming messages
- Schedule and manage calendar events — create meetings, check availability
- Browse and manage files — read from Google Drive or OneDrive
- Send Slack/Discord messages — post updates, respond to team members
- Look up contacts — find email addresses, phone numbers
These capabilities are exposed as tools that any persona (with access) can use, and as workflow triggers (e.g. incoming_message trigger type).
Learn More
- Workflows Guide — Use
incoming_messagetriggers with connectors - Personas Guide — Scoping connector access per persona
- Security Policies — Classification and override policies
