A new connector takes six weeks, a middleware contract, and a JIRA epic nobody reads. Nothing ships by the original deadline.
Native connectors ship with field maps and auth flows out of the box. Median setup is two hours.
Most enterprise integration layers were never designed — they accreted. A middleware contract here, a pair of lambdas there, a spreadsheet of API tokens nobody dares rotate. Every new connector becomes a six-week project, and every incident becomes an archaeology dig.
The Integrations surface on ORDENTRA is a product, not an accretion. Forty-plus connectors, maintained in-house, covered by a 99.95% uptime SLA, with OAuth 2.0, SAML, SCIM, Kafka, and signed webhooks as first-class primitives. Your platform team watches one dashboard, not seven.
A new connector takes six weeks, a middleware contract, and a JIRA epic nobody reads. Nothing ships by the original deadline.
Native connectors ship with field maps and auth flows out of the box. Median setup is two hours.
Your integration layer is a stack of lambdas, a message bus, and a spreadsheet of tokens that have not been rotated since 2023.
One connector pool, scoped OAuth 2.0 credentials, SCIM-provisioned users, and signed webhooks end to end.
A bad sync drops 14 orders. The on-call engineer has no replay control and no audit trail to explain which ones.
At-least-once delivery with replay, dead-letter routing, and an audit trail per connector. Incidents are recoverable.
Every connector is maintained in-house, not through a third-party iPaaS. SLA: 99.95% connector uptime, measured across twelve months.
Every meaningful system of record. Bi-directional sync, field-level mapping, and delta-only writes keep latency low and audit trails intact.
Order, fulfilment, and service surfaces feed Order Management directly. Webhooks propagate order state changes in under two seconds end-to-end.
Stream events to your warehouse or lake, and surface approvals where your operators already live. OAuth 2.0, SAML, and SCIM all supported natively.
A typical deployment with four connectors reaches production in under a business day. Your platform team keeps their existing on-call and incident surfaces.
A solutions architect joins a 30-minute session and maps every ERP, commerce, and data system you run today onto one canvas. No questionnaire — we pull it from your SSO inventory and connector registry.
Workforce SSO connects via SAML 2.0; every downstream system authenticates via scoped OAuth 2.0 credentials. SCIM 2.0 handles provisioning. No shared passwords, no service accounts left floating.
Each connector ships with a baseline field map covering 95% of your schema. A guided UI handles the last mile — custom fields, code-list remaps, and per-tenant overrides — without a single CSV export.
The initial backfill runs on a dedicated replication pipeline. Once caught up, every subsequent change flows through Kafka-compatible streaming with ordered, at-least-once delivery. Median end-to-end lag: under two seconds.
Your platform team watches a single status panel with lag, error rate, retries, and replay controls. Incidents route to PagerVault or an on-call channel via the comms connectors you already run.
Design targets for first production deployments. Measured outcomes land at GA, Q2 2026.
Every integration capability is documented, versioned, and covered by the 99.95% connector uptime SLA. No hidden gotchas at procurement.
| Capability | Detail | Value |
|---|---|---|
| REST API | Versioned v2 endpoints with idempotency keys, cursor pagination, and field-level partial updates. | OpenAPI 3.1 |
| GraphQL | Typed schema with federation support, query cost analysis, and per-operation rate limiting. | Apollo Federation 2 |
| Event streaming | Kafka-compatible topic layer with at-least-once delivery, ordered partitions, and dead-letter routing. | Kafka 3.6 wire protocol |
| Webhooks | HMAC-signed outbound webhooks with automatic retry, exponential backoff, and replay from dashboard. | HMAC-SHA256 |
| Authentication | OAuth 2.0 authorization code and client credentials flows. Short-lived tokens, scoped per integration. | OAuth 2.0 · OIDC |
| Single sign-on | SAML 2.0 for workforce SSO plus SCIM 2.0 for user and group provisioning. | SAML 2.0 · SCIM 2.0 |
| Rate limits | Per-tenant and per-integration quotas with burst headroom and transparent 429 headers. | 10k req/min baseline |
| Connector uptime SLA | Measured across rolling twelve-month windows, with service credits written into the master agreement. | 99.95% |
Yes. Alongside the 40+ native connectors shipping for GA, ORDENTRA includes a first-class REST and GraphQL ingestion layer with an idempotent event contract. Teams should be able to wire a homegrown ERP in under a week using the same schema and auth primitives the native connectors use — no separate middleware.
Data residency is designed to be enforced per-tenant at the region level. Launch regions planned for GA: US-East, US-West, EU-West (Frankfurt), EU-North (Stockholm), APAC (Singapore), and APAC (Sydney). Customer data, event streams, and backups are designed to never leave the chosen region — including the connector worker pool.
Design target for median end-to-end lag from a source event to a ledger write is under two seconds across the native connector catalog, with a 95th percentile target under eight seconds. A live status dashboard with per-connector lag histograms will ship at GA so your platform team can verify before signing — the numbers will not live only in a slide deck.
Every connector is built around an at-least-once delivery pipeline with ordered partitions, exponential-backoff retries, and dead-letter routing. An upstream outage parks events in the replay queue rather than dropping them. When the source recovers, the connector catches up automatically and writes a resolved incident to the audit trail.
Baseline tenants are designed to receive 10,000 requests per minute with transparent 429 headers. High-volume commerce tenants move to a dedicated connector pool with negotiated limits, and the enterprise tier includes reserved capacity for seasonal peaks — we document the limit in the master agreement rather than in a hidden fair-use clause.
Every ORDENTRA module writes to a single operational data model. Read any module first — the others are already wired.
A 30-minute working session with a member of the ORDENTRA founding team. Bring your SSO inventory — we’ll have the connector canvas ready before you dial in, and walk the deployment flow end to end in the product.