Creating a Connection

The first step in creating an integration is to create the connections to the applications with which you want to share data.

  1. In the Oracle Integration Cloud Service home page, click Connections.
  2. Click Create.
    The Create Connection — Select Adapter dialog is displayed.
  3. Select an adapter from the dialog. You can also search for the type of adapter to use by entering a partial or full name in the Search field, and clicking Search.
    The Create New Connection dialog is displayed.
  4. Enter the information to describe the connection.
    • Enter a meaningful name to help others find your connection when they begin to create their own integrations. The name you enter is automatically added in capital letters to the Identifier field. If you modify the identifier name, do not include a blank space (for example, Sales Opportunity).

    • Select the role (direction) in which to use this connection (trigger, invoke, or both). Only the roles supported by this adapter are displayed for selection. When you select a role, only the connection properties and security policies appropriate to that role are displayed on the Connections page. If you select an adapter that supports both invoke and trigger, but select only one of those roles, then try to drag the adapter into the section you did not select, you receive an error (for example, configure an Oracle Service Cloud (RightNow) Adapter as only an invoke, but drag the adapter to the trigger section).

    • Enter an optional description of the connection.


    Description of create_new_connection.png follows
    Description of the illustration create_new_connection.png
  5. Click Create.
    Your connection is created and you are now ready to configure connection details, such as email contact, connection properties, security policies, connection login credentials, and (for certain connections) agent group.

Adding a Contact Email

From the Connection Administrator section of the connection, you can add a contact email address for notifications.

  1. In the Email Address field, enter an email address to receive email notifications when problems occur.
  2. In the upper right corner, click Save.

Configuring Connection Properties

Enter connection information so your application can process requests.

  1. Click Configure Connectivity.
    The Connection Properties dialog is displayed.
  2. In the FTP Server Host Address field, enter the host address of the FTP/FTPS/sFTP server.
  3. In the FTP Server Port field, enter the FTP server port number.
  4. If you are using secure FTP, select Yes from the SFTP Connection dropdown list.
    1. Click the Host Key checkbox. Host key authentication is used by a server to verify its identity to a client (the FTP adapter in this case). This authentication guards against “man-in-the-middle” style attacks.

      Note:

      If you are using Managed File Transfer Cloud Service, see Post-Provisioning Tasks in Using Oracle Managed File Transfer Cloud Service for information about gathering this information on MFT embedded servers.
    2. Click Upload to upload the host key.
      • The default location of the RSA key is /etc/ssh on the server.

      • If you are using Oracle Managed File Transfer Cloud Service, download the host key from the Oracle Managed File Transfer Cloud Service console.

      • If you are using vsftpd, you will find the host key under /etc/ssh.

  5. If you are using an FTP over SSL certificate, select the SSL Certificate checkbox, then click Upload to upload a certificate in PKCS12 format (.p12 extension).
  6. If you plan to specify a processing delay, use the Minimum Age element in List Files operation in the Invoke Operation page. See What You See on the FTP Adapter Invoke Operations Properties Page.
  7. Click OK.
    You are now ready to configure connection security.

Configuring Connection Security

Configure security for your FTP connection by selecting the security policy and setting login credentials. You can also specify a Pretty Good Privacy (PGP) public key for encryption and private key for decryption. An FTP connection is only allowed for publicly accessible FTP servers.

  1. Click Configure Security.
  2. Choose one of the following security policies and then fill in the fields that are presented for that policy:
    • Table 2-1 FTP Server Access Policy—This policy uses the user name and password for authentication and enables users to configure the PGP values.

    • Table 2-2 FTP Public Key Authentication—This policy connects to the sFTP server using a key. This is used only for sFTP connections. The user enters a user name and uploads the private key file. A passphrase for the private key is optional. The user can also configure the PGP values in this connection.

Table 2-1 FTP Server Access Policy

Element Description

User Name

Enter the username to connect to the FTP server.

Password

Enter the password to connect to the FTP server, then enter the password a second time for confirmation.

The FTP Adapter supports a nonmanaged connection factory.

SSL Certificate Password

If you uploaded an FTP over SSL certificate, enter the password for the .p12 format certificate. Enter the password a second time for confirmation.

PGP Public Key

If using a PGP public key, click the checkbox, then click Upload to upload the key for encrypting the payload. Pretty Good Privacy (PGP) is a data encryption and decryption program that provides cryptographic privacy and authentication for encrypting and decrypting message files. Message file encryption uses a serial combination of hashing, data compression, symmetric-key cryptography, and public-key cryptography. Each step uses one of several supported algorithms. Each public key is bound to a user name, an e-mail address, or both.

ASCII-Armor Encryption Format

Select to format the encrypted message in ASCII armor. ASCII armor is a binary-to-textual encoding converter. ASCII armor formats encrypted messaging in ASCII. This enables messages to be sent in a standard messaging format. This selection impacts the visibility of message content. If not selected, the message is sent in binary format.

Cipher Algorithm

Select the symmetric cryptographic algorithm to use. Symmetric-key algorithms for cryptography use the same cryptographic keys for both encryption of plain text and decryption of cipher text.
  • CAST5

  • 3DES

  • AES128

  • AES192

  • AES256

PGP Private Key

If using a PGP private key, click the checkbox, then click Upload to upload the key for decrypting the payload.

PGP Private Key Password

Enter the password to encrypt the payload. Enter the password a second time for confirmation.

Table 2-2 FTP Public Key Authentication

Element Description

User Name

Enter the username to connect to the FTP server.

Private Key File

If you have a private key, click the checkbox and then click Upload to upload the key. You will not need to enter a password to access the server. However, some private keys are encrypted and require a passphrase. If that is the case, enter it in the following field.

PassPhrase

If your private key file is passphrase protected, enter the passphrase here.

PGP Public Key

If using a PGP public key, click the checkbox, then click Upload to upload the key for encrypting the payload. Pretty Good Privacy (PGP) is a data encryption and decryption program that provides cryptographic privacy and authentication for encrypting and decrypting message files. Message file encryption uses a serial combination of hashing, data compression, symmetric-key cryptography, and public-key cryptography. Each step uses one of several supported algorithms. Each public key is bound to a user name, an e-mail address, or both.

ASCII-Armor Encryption Format

Select to format the encrypted message in ASCII armor. ASCII armor is a binary-to-textual encoding converter. ASCII armor formats encrypted messaging in ASCII. This enables messages to be sent in a standard messaging format. This selection impacts the visibility of message content. If not selected, the message is sent in binary format.

Cipher Algorithm

Select the symmetric cryptographic algorithm to use. Symmetric-key algorithms for cryptography use the same cryptographic keys for both encryption of plain text and decryption of cipher text.
  • CAST5

  • 3DES

  • AES128

  • AES192

  • AES256

PGP Private Key

If using a PGP private key, click the checkbox, then click Upload to upload the key for decrypting the payload.

PGP Private Key Password

Enter the password to encrypt the payload. Enter the password a second time for confirmation.

Testing the Connection

Test your connection to ensure that it is successfully configured.

  1. In the upper right corner of the page, click Test.
  2. Select the type of connection testing to perform:
    • Validate and Test: Performs a full validation of the WSDL, including processing of the imported schemas and WSDLs. Complete validation can take several minutes depending on the number of imported schemas and WSDLs. No requests are sent to the operations exposed in the WSDL.

    • Test: Connects to the WSDL URL and performs a syntax check on the WSDL. No requests are sent to the operations exposed in the WSDL.

    If successful, the following message is displayed and the progress indicator shows 100%.

    Connection connection_name was tested successfully.

  3. If your connection was unsuccessful, an error message is displayed with details. Verify that the configuration details you entered are correct.
  4. When complete, click Save, then click Close.