Create a Connection
Before you can build an integration, you have to create the connections to the applications with which you want to share data.
To create a connection in Oracle Integration:
-
In the left navigation pane, click Home > Integrations > Connections.
-
Click Create.
Note:
You can also create a connection in the integration canvas of:-
An orchestrated integration (See Define Inbound Triggers and Outbound Invokes.)
-
A basic routing integration (See Add a Trigger (Source) Connection.)
-
-
In the Create Connection — Select Adapter dialog, select the adapter to use for this connection. To find the adapter, scroll through the list, or enter a partial or full name in the Search field and click Search.
-
In the Create Connection dialog, enter the information that describes this connection.
- Enter a meaningful name to help others find your connection when they
begin to create their own integrations. The name you enter is
automatically added in capital letters to the
Identifier field. If you modify the
identifier name, don't include blank spaces (for example,
SALES OPPORTUNITY
). - Enter optional keywords (tags). You can search on the connection keywords on the Connections page.
- Select the role (direction) in which to use this connection (trigger, invoke, or both). Only the roles supported by the adapter are displayed for selection. When you select a role, only the connection properties and security policies appropriate to that role are displayed on the Connections page. If you select an adapter that supports both invoke and trigger, but select only one of those roles, you'll get an error when you try to drag the adapter into the section you didn't select. For example, let's say you configure a connection for the Oracle Service Cloud (RightNow) Adapter as only an invoke. Dragging the adapter to a trigger section in the integration produces an error.
- Enter an optional description of the connection.
- Enter a meaningful name to help others find your connection when they
begin to create their own integrations. The name you enter is
automatically added in capital letters to the
Identifier field. If you modify the
identifier name, don't include blank spaces (for example,
-
Click Create.
Your connection is created. You're now ready to configure the connection details, such as connection properties, security policies, connection login credentials, and (for certain connections) agent group.
Configure Connection Properties
The FTP Adapter supports the following types of FTP connections.
- FTP connection: The FTP Adapter supports passive communication to an FTP server. You must configure passive configurations in the FTP server.
- FTP over SSL connection: The FTP Adapter supports FTP over SSL, which supports explicit FTP over SSL.
- sFTP connection: The FTP Adapter supports communication with a secure FTP server.
Note:
File Server only supports sFTP connections.
Configure an FTP Connection
Enter FTP connection information so your application can process requests.
Configure Connection Security
Security policies capture information about how the FTP Adapter must authenticate against the target FTP server.
The following security policies are supported:
-
FTP Server Access Policy: This policy uses the user name and password for authentication and enables users to configure the PGP values.
-
FTP Public Key Authentication: This policy connects to the sFTP server using a key. This is used only for sFTP connections. The user enters a user name and uploads the private key file. A passphrase for the private key is optional. The user can also configure the PGP values in this connection.
-
FTP Multi Level Authentication: This policy uses multiple
independent credentials to log in to the server. This process creates an extra
layer of defense against unauthorized users. With this policy, you provide a
user name, user password, private key, and private key passphrase to connect to
the sFTP server. You also configure the first authentication sequence between
the password and the public key.
Note:
File Server does not support use of this security policy.
- Encryption
- Provide encryption details if the FTP Adapter connection is used to encrypt the contents while writing the file to a target FTP server.
- Do not provide encryption details if the file being written to the target FTP server is already encrypted using the stage file action.
- Decryption
- Provide decryption details if the FTP Adapter connection decrypts the contents while downloading the file from the source FTP server.
- Do not provide decryption details if the stage file action is used to decrypt the downloaded file.
- Signing
- Provide signing details if the FTP Adapter connection is used to write a file to the target FTP server that must be optionally signed.
- Signature verification
- Provide signature verification details if the FTP Adapter connection reads and downloads a file that is digitally signed from the source FTP server.
Configure a PGP Encryption Decryption Connection
Each security policy (FTP Server Access Policy, FTP Public Key Authentication, and FTP Multi Level Authentication) provides options for specifying PGP encryption and decryption and signing verification details.
Connection Type | Supported Security Policy | See |
---|---|---|
FTP Server | FTP Server Access Policy | Specify PGP Encryption Decryption and Signing Verification for FTP Server Access Policy |
FTP over SSL | FTP Server Access Policy | Specify PGP Encryption Decryption and Signing Verification for FTP Server Access Policy |
sFTP |
|
Specify PGP Encryption Decryption and Signing Verification for FTP Server Access Policy
- Specify PGP encryption and decryption and signing verification
details.
Element Description PGP Public Key
If using a PGP public key, click the checkbox, then click Upload to upload the key for encrypting the payload. Pretty Good Privacy (PGP) is a data encryption and decryption program that provides cryptographic privacy and authentication for encrypting and decrypting message files. Message file encryption uses a serial combination of hashing, data compression, symmetric-key cryptography, and public-key cryptography. Each step uses one of several supported algorithms. Each public key is bound to a user name, an e-mail address, or both.
ASCII-Armor Encryption Format
Select to format the encrypted message in ASCII armor. ASCII armor is a binary-to-textual encoding converter. ASCII armor formats encrypted messaging in ASCII. This enables messages to be sent in a standard messaging format. This selection impacts the visibility of message content. If not selected, the message is sent in binary format.
Cipher Algorithm
Select the symmetric cryptographic algorithm to use. Symmetric-key algorithms for cryptography use the same cryptographic keys for both encryption of plain text and decryption of cipher text.-
CAST5
-
TDES
-
AES128
-
AES192
-
AES256
PGP Private Key
If using a PGP private key, click the checkbox, then click Upload to upload the key for decrypting the payload.
PGP Private Key Password
Enter the password to encrypt the payload. Enter the password a second time for confirmation.
PGP Sign Public Key
Click the checkbox, then click Upload to upload the public key to verify a digitally-signed certificate.
PGP Sign Private Key
Click the checkbox, then click Upload to create a digitally-signed certificate.
PGP Sign Private Key Password
Enter the sign private key password, then enter the password a second time for confirmation.
-
Specify PGP Encryption Decryption and Signing Verification for FTP Public Key Authentication
- Specify PGP encryption and decryption and signing verification
details.
Element Description PGP Public Key
If using a PGP public key, click the checkbox, then click Upload to upload the key for encrypting the payload. Pretty Good Privacy (PGP) is a data encryption and decryption program that provides cryptographic privacy and authentication for encrypting and decrypting message files. Message file encryption uses a serial combination of hashing, data compression, symmetric-key cryptography, and public-key cryptography. Each step uses one of several supported algorithms. Each public key is bound to a user name, an e-mail address, or both.
ASCII-Armor Encryption Format
Select to format the encrypted message in ASCII armor. This option is used if you want the encrypted file in readable format. Readable format does not mean that anyone can view the decrypted data.
- If you select
Yes, the file has a
BEGIN PGP MESSAGE
header. - If you select No, the file is not readable and has junk characters.
ASCII armor is a binary-to-textual encoding converter. ASCII armor formats encrypted messaging in ASCII. This enables messages to be sent in a standard messaging format. This selection impacts the visibility of message content. If not selected, the message is sent in binary format.
Cipher Algorithm
Select the symmetric cryptographic algorithm to use for encryption. Symmetric-key algorithms for cryptography use the same cryptographic keys for both encryption of plain text and decryption of cipher text.-
CAST5
-
TDES
-
AES128
-
AES192
-
AES256
PGP Private Key
If using a PGP private key, click the checkbox, then click Upload to upload the key for decrypting the payload.
PGP Private Key Password
Enter the password to encrypt the payload. Enter the password a second time for confirmation. If the PGP private key is passphrase-protected, enter the passphrase. Otherwise leave it blank. This field is optional.
PGP Sign Public Key
Click the checkbox, then click Upload to upload the public key to verify a digitally-signed certificate.
PGP Sign Private Key
Click the checkbox, then click Upload to create a digitally-signed certificate.
PGP Sign Private Key Password
Enter the sign private key password, then enter the password a second time for confirmation.
If the PGP sign private key is passphrase-protected, enter the passphrase. Otherwise leave it blank.
- If you select
Yes, the file has a
Specify PGP Encryption Decryption and Signing Verification for FTP Multi Level Authentication
- Specify PGP encryption and decryption and signing verification
details.
Element Description PGP Public Key
If using a PGP public key, click the checkbox, then click Upload to upload the key for encrypting the payload. Pretty Good Privacy (PGP) is a data encryption and decryption program that provides cryptographic privacy and authentication for encrypting and decrypting message files. Message file encryption uses a serial combination of hashing, data compression, symmetric-key cryptography, and public-key cryptography. Each step uses one of several supported algorithms. Each public key is bound to a user name, an e-mail address, or both.
ASCII - Armor Encryption Format
Select to format the encrypted message in ASCII armor. This option is used if you want the encrypted file in readable format. Readable format does not mean that anyone can view the decrypted data.
- If you select
Yes, the file has a
BEGIN PGP MESSAGE
header. - If you select No, the file is not readable and has junk characters.
ASCII armor is a binary-to-textual encoding converter. ASCII armor formats encrypted messaging in ASCII. This enables messages to be sent in a standard messaging format. This selection impacts the visibility of message content. If not selected, the message is sent in binary format.
Cipher Algorithm
Select the symmetric cryptographic algorithm to use for encryption. Symmetric-key algorithms for cryptography use the same cryptographic keys for both encryption of plain text and decryption of cipher text.-
CAST5
-
TDES
-
AES128
-
AES192
-
AES256
PGP Private Key
If using a PGP private key, click the checkbox, then click Upload to upload the key for decrypting the payload.
PGP Private Key Password
Enter the password to encrypt the payload, then enter it a second time for confirmation.
Enter the password to encrypt the payload. Enter the password a second time for confirmation. If the PGP private key is passphrase-protected, enter the passphrase. Otherwise leave it blank. This field is optional.
PGP Sign Public Key
Click the checkbox, then click Upload to upload the public key to verify a digitally-signed certificate.
PGP Sign Private Key
Click the checkbox, then click Upload to create a digitally-signed certificate.
PGP Sign Private Key Password
Enter the sign private key password, then enter the password a second time for confirmation.
If the PGP sign private key is passphrase-protected, enter the passphrase. Otherwise leave it blank.
- If you select
Yes, the file has a
Configure an Agent Group
Configure an agent group for accessing the service hosted on your premises behind the fire wall.
Specify an agent group only when the FTP server is not publicly accessible from Oracle Integration. Install the connectivity agent on the same network as the FTP server. This enables the connectivity agent to access the FTP server. Troubleshoot any connectivity agent issues that occur. See Troubleshoot Connectivity Agent Issues with the FTP Adapter.