# .env File
A special file which contains configuration information in the form of environment variables.
n8n uses the .env file to control how n8n works. You can set items such as username and password for the editor or your timezone using this file. See the n8n docs for more details.
To learn more about the .env file, read Manage Environment Variables in your NodeJS Application with dotenv (opens new window).
Service which allows a user to connect to a product. User's identity is confirmed through shared credentials. Also known as a user account.
Many of the nodes in n8n require you to have an account with the service for which the node was built. For example, Typeform.
An acronym for Application Programming Interface, it is a framework for sharing text information by providing a specifically formatted URL to retrieve desired information.
For a more detailed understanding of APIs, see What is API: Definition, Types, Specifications, Documentation (opens new window).
A file or character string that is used to encrypt and decrypt information between two entities (e.g. computers, applications, users, etc.). It is used to ensure that anyone who intercepts the information between the two entities will not be able to read the information.
For further information, see What are certificates? (opens new window).
An acronym for Command Line Interface, it is a text-based form of processing computer commands.
It is possible to start a workflow or change its status using the CLI in n8n.
To learn more, see What is Command Line Interface (CLI)? (opens new window).
A link between two or more nodes that allows data to flow from one node to another.
This is a core concept in n8n.
n8n stores encrypted credentials so that it can automate tasks that require this information to run properly.
For more information, see Credentials (opens new window).
A system to build, run and share applications with all of the services bundled to support the application in one package.
n8n has created a docker image so that users who have a docker environment can quickly install and run n8n.
For more information, read Docker overview (opens new window) and A Docker Tutorial for Beginners (opens new window).
# Editor UI
In n8n, this is the web interface used to create workflows. It is accessed through a web browser at a designated website address.
To learn more about user interfaces, see User interface (opens new window).
# Encryption Key
A piece of data, either string or binary, which is used to encode information so that it cannot be easily read. Encryption keys are often long string of seemingly random characters.
For more information, see What are encryption keys and how do they work? 🔐 (opens new window)
# Environment Variables
Environment variables are predetermined values that typically get used to provide the ability to configure your program from outside of your application. An environment variable consists of a key-value pair. For example,
N8N_BASIC_AUTH_USER is the key and
user is the value.
n8n uses environment variables that help you configure your self-hosted n8n instance. You can use environment variables to set username and password for your n8n instance, configure the timezone, and a lot more. Refer to the configuration (opens new window) page to learn more about the environment variables used in n8n.
A completed run of a workflow from start to finish.
n8n logs workflow executions and allows the user to see if the workflow completed successfully or not.
n8n also has the ability to execute one workflow from another workflow.
To learn more, see Execution (computing) (opens new window).
A string of characters and symbols in a programming language that represents a value depending upon its input.
Find out more about expressions by reading Expression (opens new window).
A software model very similar to open source which allows developers to receive remuneration for use in a for profit product.
n8n is licensed under the fair-code model. See faircode.io (opens new window) for more details.
In programming, a set of reusable commands designed to be run together and launched by other commands in the code. It may or may not receive input from the command that launches it.
Many of the nodes in n8n behave like functions, receiving specific input to generate a specific output.
To learn more about functions, see Computer Programming - Functions (opens new window).
# IP Address
A string of numbers and letters which represents the location of an electronic device on a TCP/IP network.
n8n will often refer to IP addresses when accessing information on a system other than itself. This is more common when the service is on the local network rather than on the internet.
If you want to learn more about IP addresses, see What Is an IP Address? (opens new window).
A modern programming language popular with web platforms used to create interactive web interfaces.
The majority of data that is transferred from one node to another in n8n is most likely in the JSON format.
For further reading, please see Introducing JSON (opens new window).
Section of an HTTP request message that defines allows extra information to be passed between the transmitter and receiver.
For further information, see Request header (opens new window).
The basic building block for n8n. Each node is designed with a specific purpose of receiving, processing or outputting data.
For more information, see Node Basics.
n8n runs on top of NodeJS and uses its libraries extensively.
Read more at About Node.js (opens new window).
n8n is installed and updated using npm.
Find out more at About npm (opens new window).
You can try out n8n without installing it to your system using npx.
For more information about npx, see npx documentation (opens new window).
n8n is also distributed as an npm package.
For more information, see software package (opens new window).
Data that is passed to a program or script which is used for processing and directly effects the output or results generated.
Many n8n nodes accept parameters to customize their output.
The n8n CLI also accepts parameters so that it knows how to properly execute.
For more information, see Functions, procedures nad modules (opens new window).
A secret string of characters provided to prove one's identity. Often used to gain access to restricted applications and systems.
The n8n Editor UI can be password protected so that only authorized users can access the interface.
n8n also stores passwords as a part of credentials for some services.
To read more about passwords, see The Importance of passwords (opens new window).
# REST API
# Root User
In *NIX operating system, the user account that has no restrictions placed upon it within the system. The root user is typically only used for performing maintenance and upgrade tasks as improperly run applications using the root user account can cause significant damage to the system.
For the protection of the system, it is generally not recommended that n8n be run by the root user.
For more information about root, see root Definition (opens new window).
An acronym for Secure Socket Layer, it is the primary way that web based services are secured. A SSL certificate is often used on websites to encrypt the information that is travelling between a web server and a web page.
n8n uses SSL certificates to secure the n8n UI so that any information that is passed between the n8n server and the user's web browser is encrypted and cannot be spied upon when it is travelling between the two. It is possible to customize the SSL installation.
For further reading, see SSL and SSL Certificates Explained For Beginners (opens new window).
A unique identifier, typically a long string of characters, used to increase the security of systems that request or transmit data. It is usually a shared secret between the sender and the receiver to allow either system to determine if they should be requesting/transmitting data. Tokens can also sometimes be used as encryption keys to make the data which is transmitted illegible to thoses without the token.
For more information, see token (opens new window).
For more information about triggers, see Event Driven Programming (opens new window).
An encrypted session between two systems used to secure data transmission.
For further reading, see VPN Tunnels explained: what are they and how can they keep your internet data secure (opens new window).
n8n is written in TypeScript.
Read more at Typescript (opens new window).
An acronym for User Interface, it is the method or tool a person uses to interact with a computer system and its software.
n8n has a web based UI, meaning that you program and interact with n8n using a web browser.
Learn more at user interface (UI) (opens new window).
An acronym for Universal Resource Locator, it is a string of characters that represents a network location. Most people's experience with URLs is in the form of a website address (e.g. https://n8n.io)
n8n's Editor UI is accessed via an URL entered into a web browser (often https://localhost:5678).
Some nodes in n8n access resources on the internet using an URL.
Read more at What is a URL? (opens new window).
n8n also stores usernames as a part of credentials for some services.
Read more at Username (opens new window).
In computer programming, a variable represents a piece of data that can be changed or manipulated by the computer code. Variables are used to temporarily store information for processing.
n8n uses variables extensively throughout its programming and nodes.
Read more at Computer Programming - Variables (opens new window).
A service that listens for data input from an external source used to trigger an action in a system. Webhooks allow external systems to provide real-time alerts and updates to the system that does not limit the updates to regular polling intervals. Webhooks are often referenced by push notifications.
n8n has the ability to create webhooks that can be used to start workflows and receive data from systems outside of the n8n system itself.
To learn more about webhooks, see What's a Webhook? (opens new window).
A collection of nodes connected together to produce a specific outcome.
n8n's primary form of programming uses a workflow model to represent both code and data flow.
For more information, see Workflow application (opens new window).