This task describes how to set the environment properties of the Siebel EAI Adapter.
The Adapter Environment Configuration properties contain parameters that define how the adapter connects to and interacts with other Java CAPS components within the Environment. When you create a new Siebel EAI External System, you may configure the type of External System required.
Available External System properties include:
Siebel EAI includes the configuration parameters listed in the table.
Table 19 Environment Configuration — Siebel EAI
Name |
Description |
Required Value |
---|---|---|
User Name |
Specifies the user name. |
No default value. |
Password |
Specifies the user password. |
No default value. |
HTTP Settings includes the configuration parameters listed in the table.
Table 20 Environment Configuration — HTTP Settings
Name |
Description |
Required Value |
---|---|---|
URL |
Specifies the default URL to be used for establishing an HTTP or HTTPS connection. If HTTPS protocol is specified, SSL must be enabled. |
http://siebel/eai_enu/start.swe Note – The URL property does not support LDAP entries. |
Proxy Configuration includes the configuration parameters listed in the table.
Table 21 Environment Configuration — Proxy Configuration
Name |
Description |
Required Value |
---|---|---|
Proxy Host |
The host name of the HTTP proxy. This specifies the HTTPS proxy host to which requests to an HTTP server or reception of data from an HTTP server may be delegated to a proxy. This sets the proxy port for secured HTTP connections. |
A valid HTTPS proxy host name. |
Proxy Port |
The port of the HTTPS proxy. |
A valid HTTP proxy port. The default is 8080. |
Proxy Username |
Specifies the user name required for authentication to access the web site specified by the URL property. |
A valid user name. Note – The user name is required by URLs that require HTTP basic authentication to access the web site. Be sure to enter a value for this property before you enter a value for the Proxy password properties. |
Proxy Password |
Specifies the password required for authentication to access the web site specified by the URL property. |
The appropriate password. Note – Be sure to enter a value for the Proxy username properties before entering this property. |
The Environment Configuration Security properties are used to perform HTTP authentication and SSL connections. They include the following configuration sections:
Details for the Authentication settings used for HTTP authentication are detailed in the table.
Table 22 Environment Configuration — Security and Authentication
Name |
Description |
Required Value |
---|---|---|
HTTP Username |
Specifies the user name for authenticating the web site specified by the URL. |
A valid user name. Note – Enter a value for this property before you enter a value for the HTTPpassword properties. |
HTTP Password |
Specifies the password used for authenticating the web site specified by the URL. |
A valid password. Note – Be sure to enter a value for the HTTPusernameproperties before entering this property. |
Details for the SSL settings used for SSL connections are detailed in the table.
Table 23 Environment Configuration — Security and SSL
Name |
Description |
Required Value |
---|---|---|
Protocol SSL |
The SSL protocol to use when establishing an SSL connection with the server. If the protocol is not set by this method, the default protocol type, TLS (Sun JSSE), is used. |
If you are using the default Sun JSSE provider, choose one of the following settings: TLSv1 TLS SSLv2 SSLv3 SSL If you are running the Sun Application Server on AIX, choose one of the following settings: SSL-TLS TLSv1 TLS SSLv3 SSLv2 SSL For details on these settings, see the appropriate JSSE documentation. |
JSSE Provider Class |
Specifies the fully qualified name of the JSSE provider class. For more information, see the Sun Java Web site at: |
The name of a valid JSSE provider class. The default is com.sun.net.ssl.internal.ssl.Provider If you are running the Sun Application Server on AIX, specify com.ibm.jsse.IBMJSSEProvider. |
X509 Algorithm Name |
Specifies the X509 algorithm name to use for the trust and key manager factories. |
The name of a valid X509 algorithm. The default is SunX509. If you are running the Sun Application Server on AIX, specify IbmX509. |
Verify Hostname |
See Verify hostname for further information. | |
KeyStore Type |
Specifies the default KeyStore type. The keystore type is used for key/certificate management when establishing an SSL connection. If the default KeyStore type is not set by this method, the default KeyStore type, JKS, is used. | |
KeyStore |
Specifies the default KeyStore file. The keystore is used for key/certificate management when establishing SSL connections. |
A valid package location. There is no default value. |
KeyStore Username |
The username for accessing the keystore used for key/certificate management when establishing SSL connections. Note – If the keystore type is PKCS12 or JKS, the keystore username properties is not used. PKCS12 and JKS keystore types require passwords for access but do not require user names. If you enter a value for this property, it is ignored for PKCS12 and JKS. | |
KeyStore Password |
Specifies the default KeyStore password. The password is used to access the KeyStore used for key/certificate management when establishing SSL connections. |
There is no default value. |
TrustStore Type |
The TrustStore type of the TrustStore used for CA certificate management when establishing SSL connections. If the TrustStore type is not set by this method, the default TrustStore type, JKS, is used. |
A valid TrustStore type. |
TrustStore |
Specifies the default TrustStore. The TrustStore is used for CA certificate management when establishing SSL connections. |
A valid TrustStore name. There is no default value. |
TrustStore Password |
Specifies the default TrustStore password. The password is for accessing the TrustStore used for CA certificate management when establishing SSL connections. |
A valid TrustStore password. There is no default value. |
Following are additional notes related to the properties in the SSL section.
Determines whether the host name verification is done on the server certificate during the SSL handshake.
You can use this property to enforce strict checking of the server host name in the request URL and the host name in the received server certificate.
True or False; the default is False.
Under some circumstances, you can get different Java exceptions, depending on whether you set this property to True or False. This section explains what causes these exceptions.
For example, suppose the host name in the URL is localhost, and the host name in the server certificate is localhost.stc.com. Then, the following conditions apply:
If Verify hostname is set to False:
Host name checking between the requested URL and the server certificate is turned off.
You can use an incomplete domain host name, for example, https://localhost:444, or a complete domain host name, for example, https://localhost.stc.com:444, and get a positive response in each case.
If Verify hostname is set to True:
Host name checking between the requested URL and the server certificate is turned on.
If you use an incomplete domain host name, for example, https://localhost:444, you can get the exception java.io.IOException: HTTPS hostname wrong.
You must use a complete domain host name, for example, https://localhost.stc.com:444
If the Java Software Developer’s Kit (SDK) version used by the application server and the corresponding application server property setting do not match, you can get the exception java.lang.ClassCastException.