Skip to main content

Documentation Index

Fetch the complete documentation index at: https://www.c1.ai/docs/llms.txt

Use this file to discover all available pages before exploring further.

Capabilities

The Treasure AI connector syncs the following resources from Treasure AI CDP (REST API v3):
ResourceSyncProvision
UsersDelete
Roles
PoliciesGrant/Revoke
Policy GroupsGrant/Revoke
  • Users: All Treasure AI users with email, name, and admin status. Delete user supported.
  • Roles: Account roles derived from the administrator field (Admin or User). Read-only — roles are determined when a user is created in the Treasure AI Console and cannot be granted or revoked via the API. Role membership is not tracked as grants in the sync bundle.
  • Policies: Access control policies defining fine-grained permissions on databases, workflows, segments, etc. Only available when PBAC (Policy-Based Access Control) is enabled.
  • Policy Groups: Delegated access groups that associate users and policies. Only available when PBAC is enabled.

PBAC configuration

Policies and Policy Groups require the PBAC paid add-on. These resources are opt-in and can be enabled from the C1 connector settings. Without opt-in, only Users and Roles are synced. Required permissions by resource type:
ResourceRequirements
UsersMaster API Key
RolesMaster API Key
PoliciesMaster API Key + PBAC paid add-on
Policy GroupsMaster API Key + PBAC + Delegated Admin feature
Grant and revoke operations for Policy Groups replace the entire member list for a group. The connector reads current membership before writing to preserve existing members not involved in the operation.

Gather Treasure AI credentials

To configure the Treasure AI connector, you need a Master API key from a user with sufficient permissions to read access control data.
1
Log in to the Treasure AI Console.
2
Navigate to My Settings > API Keys.
3
Copy your Master API key.For production use, we recommend creating a dedicated service user (for example, c1-service@your-domain.com) with read-only access to:
  • Access control APIs (users, policies, policy groups, permissions)
  • User and account metadata
Generate a Master API key for that service user.
4
Determine your region endpoint:
RegionBase URL
US (default)https://api.treasuredata.com
EUhttps://api.eu01.treasuredata.com
Japanhttps://api.treasuredata.co.jp
Koreahttps://api.ap02.treasuredata.com
5
If your account has IP allowlisting enabled, add C1’s egress IP range(s) to the allowlist for the service user.

Configure the Treasure AI connector

Follow these instructions to use a built-in, no-code connector hosted by C1.
1
In C1, navigate to Integrations > Connectors and click Add connector.
2
Search for Treasure AI and click Add.
3
Choose how to set up the new Treasure AI connector:
  • Add the connector to a currently unmanaged app
  • Add the connector to a managed app
  • Create a new managed app
4
Set the owner for this connector.
5
Click Next.
6
Find the Settings area of the page and click Edit.
7
Enter the required configuration:
  • API Key: Your Treasure AI Master API key (TD1 scheme).
  • Base URL (optional): API base URL for your region. Defaults to https://api.treasuredata.com (US). Set to https://api.eu01.treasuredata.com for EU, https://api.treasuredata.co.jp for Japan, or https://api.ap02.treasuredata.com for Korea.
8
Click Save.
9
The connector’s label changes to Syncing, followed by Connected. You can view the logs to ensure that information is syncing.
Done. Your Treasure AI connector is now pulling access data into C1.

All versions of this connector are available at dist.conductorone.com.