Create a Connection
Before you can build an integration, you must create the connections to the applications with which you want to share data.
Note:
You can also create a connection in the integration canvas. See why working with projects is preferred.To create a connection in Oracle Integration:
- Decide where to start:
- Work in a project (see why working with projects is
preferred).
- In the navigation pane, click Projects.
- Select the project name.
- Click Integrations
.
- In the Connections section, click Add if no connections currently exist or + if connections already exist. The Create connection panel opens.
- Work outside a project.
- In the navigation pane, click Design, then Connections.
- Click Create. The Create connection panel opens.
- Work in a project (see why working with projects is
preferred).
-
Select the adapter to use for this connection. To find the adapter, scroll through the list, or enter a partial or full name in the Search field.
-
Enter the information that describes this connection.
Element Description Name Enter a meaningful name to help others find your connection when they begin to create their own integrations.
Identifier Automatically displays the name in capital letters that you entered in the Name field. If you modify the identifier name, don't include blank spaces (for example,
SALES OPPORTUNITY
).Role Select the role (direction) in which to use this connection.
Note: Only the roles supported by the adapter you selected are displayed for selection. Some adapters support all role combinations (trigger, invoke, or trigger and invoke). Other adapters support fewer role combinations.
When you select a role, only the connection properties and security policies appropriate to that role are displayed on the Connections page. If you select an adapter that supports both invoke and trigger, but select only one of those roles, you'll get an error when you try to drag the adapter into the section you didn't select.
For example, assume you configure a connection for the Oracle Service Cloud (RightNow) Adapter as only an invoke. Dragging the adapter to a trigger section in the integration produces an error.
Keywords Enter optional keywords (tags). You can search on the connection keywords on the Connections page.
Description Enter an optional description of the connection.
Share with other projects Note: This field only appears if you are creating a connection in a project.
Select to make this connection publicly available in other projects. Connection sharing eliminates the need to create and maintain separate connections in different projects.
When you configure an adapter connection in a different project, the Use a shared connection field is displayed at the top of the Connections page. If the connection you are configuring matches the same type and role as the publicly available connection, you can select that connection to reference (inherit) its resources.
-
Click Create.
Your connection is created. You're now ready to configure the connection properties, security policies, and (for some connections) access type.
- Follow the steps to configure a connection.
The connection property and connection security values are specific to each adapter. Your connection may also require configuration with an access type such as a private endpoint or an agent group.
- Test the connection.
Configure Connection Properties
The FTP Adapter supports the following types of FTP connections.
- FTP connection: The FTP Adapter supports passive communication to an FTP server. You must configure passive configurations in the FTP server.
- FTP over SSL connection: The FTP Adapter supports FTP over SSL, which supports explicit FTP over SSL.
- sFTP connection: The FTP Adapter supports communication with a secure FTP server.
Note:
File Server only supports sFTP connections.
Configure an FTP Connection
Enter FTP connection information so your application can process requests.
Configure Connection Security
Security policies capture information about how the FTP Adapter must authenticate against the target FTP server.
The following security policies are supported:
-
FTP Server Access Policy: This policy uses the user name and password for authentication and enables users to configure the PGP values.
-
FTP Public Key Authentication: This policy connects to the sFTP server using a key. This is used only for sFTP connections. The user enters a user name and uploads the private key file. A passphrase for the private key is optional. The user can also configure the PGP values in this connection.
-
FTP Multi Level Authentication: This policy uses multiple
independent credentials to log in to the server. This process creates an extra
layer of defense against unauthorized users. With this policy, you provide a
user name, user password, private key, and private key passphrase to connect to
the sFTP server. You also configure the first authentication sequence between
the password and the public key.
Note:
File Server does not support use of this security policy.
- Encryption
- Provide encryption details if the FTP Adapter connection is used to encrypt the contents while writing the file to a target FTP server.
- Do not provide encryption details if the file being written to the target FTP server is already encrypted using the stage file action.
- Decryption
- Provide decryption details if the FTP Adapter connection decrypts the contents while downloading the file from the source FTP server.
- Do not provide decryption details if the stage file action is used to decrypt the downloaded file.
- Signing
- Provide signing details if the FTP Adapter connection is used to write a file to the target FTP server that must be optionally signed.
- Signature verification
- Provide signature verification details if the FTP Adapter connection reads and downloads a file that is digitally signed from the source FTP server.
Configure a PGP Encryption Decryption Connection
Each security policy (FTP Server Access Policy, FTP Public Key Authentication, and FTP Multi Level Authentication) provides options for specifying PGP encryption and decryption and signing verification details.
Connection Type | Supported Security Policy | See |
---|---|---|
FTP Server | FTP Server Access Policy | Specify PGP Encryption Decryption and Signing Verification for FTP Server Access Policy |
FTP over SSL | FTP Server Access Policy | Specify PGP Encryption Decryption and Signing Verification for FTP Server Access Policy |
sFTP |
|
Specify PGP Encryption Decryption and Signing Verification for FTP Server Access Policy
- Specify PGP encryption and decryption and signing verification
details.
Element Description PGP Public Key
If using a PGP public key, click the check box, then click Upload to upload the key for encrypting the payload. Pretty Good Privacy (PGP) is a data encryption and decryption program that provides cryptographic privacy and authentication for encrypting and decrypting message files. Message file encryption uses a serial combination of hashing, data compression, symmetric-key cryptography, and public-key cryptography. Each step uses one of several supported algorithms. Each public key is bound to a user name, an e-mail address, or both.
ASCII-Armor Encryption Format
Select to format the encrypted message in ASCII armor. ASCII armor is a binary-to-textual encoding converter. ASCII armor formats encrypted messaging in ASCII. This enables messages to be sent in a standard messaging format. This selection impacts the visibility of message content. If not selected, the message is sent in binary format.
Cipher Algorithm
Select the symmetric cryptographic algorithm to use. Symmetric-key algorithms for cryptography use the same cryptographic keys for both encryption of plain text and decryption of cipher text.-
CAST5
-
TDES
-
AES128
-
AES192
-
AES256
Use Secure RNG
If using a ECDSA or EDDSA key pair for PGP signing and verification, select Yes from the drop-down list.
PGP Private Key
If using a PGP private key, click the check box, then click Upload to upload the key for decrypting the payload.
PGP Private Key Password
Enter the password to encrypt the payload. Enter the password a second time for confirmation.
PGP Sign Public Key
Click the check box, then click Upload to upload the public key to verify a digitally-signed certificate.
PGP Sign Private Key
Click the check box, then click Upload to create a digitally-signed certificate.
PGP Sign Private Key Password
Enter the sign private key password, then enter the password a second time for confirmation.
-
Specify PGP Encryption Decryption and Signing Verification for FTP Public Key Authentication
- Specify PGP encryption and decryption and signing verification
details.
Element Description PGP Public Key
If using a PGP public key, click the check box, then click Upload to upload the key for encrypting the payload. Pretty Good Privacy (PGP) is a data encryption and decryption program that provides cryptographic privacy and authentication for encrypting and decrypting message files. Message file encryption uses a serial combination of hashing, data compression, symmetric-key cryptography, and public-key cryptography. Each step uses one of several supported algorithms. Each public key is bound to a user name, an e-mail address, or both.
ASCII-Armor Encryption Format
Select to format the encrypted message in ASCII armor. This option is used if you want the encrypted file in readable format. Readable format does not mean that anyone can view the decrypted data.
- If you select
Yes, the file has a
BEGIN PGP MESSAGE
header. - If you select No, the file is not readable and has junk characters.
ASCII armor is a binary-to-textual encoding converter. ASCII armor formats encrypted messaging in ASCII. This enables messages to be sent in a standard messaging format. This selection impacts the visibility of message content. If not selected, the message is sent in binary format.
Cipher Algorithm
Select the symmetric cryptographic algorithm to use for encryption. Symmetric-key algorithms for cryptography use the same cryptographic keys for both encryption of plain text and decryption of cipher text.-
CAST5
-
TDES
-
AES128
-
AES192
-
AES256
Use Secure RNG
If using a ECDSA or EDDSA key pair for PGP signing and verification, select Yes from the drop-down list.
PGP Private Key
If using a PGP private key, click the check box, then click Upload to upload the key for decrypting the payload.
PGP Private Key Password
Enter the password to encrypt the payload. Enter the password a second time for confirmation. If the PGP private key is passphrase-protected, enter the passphrase. Otherwise leave it blank. This field is optional.
PGP Sign Public Key
Click the checkbox, then click Upload to upload the public key to verify a digitally-signed certificate.
PGP Sign Private Key
Click the checkbox, then click Upload to create a digitally-signed certificate.
PGP Sign Private Key Password
Enter the sign private key password, then enter the password a second time for confirmation.
If the PGP sign private key is passphrase-protected, enter the passphrase. Otherwise leave it blank.
- If you select
Yes, the file has a
Specify PGP Encryption Decryption and Signing Verification for FTP Multi Level Authentication
- Specify PGP encryption and decryption and signing verification
details.
Element Description PGP Public Key
If using a PGP public key, click the checkbox, then click Upload to upload the key for encrypting the payload. Pretty Good Privacy (PGP) is a data encryption and decryption program that provides cryptographic privacy and authentication for encrypting and decrypting message files. Message file encryption uses a serial combination of hashing, data compression, symmetric-key cryptography, and public-key cryptography. Each step uses one of several supported algorithms. Each public key is bound to a user name, an e-mail address, or both.
ASCII - Armor Encryption Format
Select to format the encrypted message in ASCII armor. This option is used if you want the encrypted file in readable format. Readable format does not mean that anyone can view the decrypted data.
- If you select
Yes, the file has a
BEGIN PGP MESSAGE
header. - If you select No, the file is not readable and has junk characters.
ASCII armor is a binary-to-textual encoding converter. ASCII armor formats encrypted messaging in ASCII. This enables messages to be sent in a standard messaging format. This selection impacts the visibility of message content. If not selected, the message is sent in binary format.
Cipher Algorithm
Select the symmetric cryptographic algorithm to use for encryption. Symmetric-key algorithms for cryptography use the same cryptographic keys for both encryption of plain text and decryption of cipher text.-
CAST5
-
TDES
-
AES128
-
AES192
-
AES256
Use Secure RNG
If using a ECDSA or EDDSA key pair for PGP signing and verification, select Yes from the drop-down list.
PGP Private Key
If using a PGP private key, click the checkbox, then click Upload to upload the key for decrypting the payload.
PGP Private Key Password
Enter the password to encrypt the payload, then enter it a second time for confirmation.
Enter the password to encrypt the payload. Enter the password a second time for confirmation. If the PGP private key is passphrase-protected, enter the passphrase. Otherwise leave it blank. This field is optional.
PGP Sign Public Key
Click the checkbox, then click Upload to upload the public key to verify a digitally-signed certificate.
PGP Sign Private Key
Click the checkbox, then click Upload to create a digitally-signed certificate.
PGP Sign Private Key Password
Enter the sign private key password, then enter the password a second time for confirmation.
If the PGP sign private key is passphrase-protected, enter the passphrase. Otherwise leave it blank.
- If you select
Yes, the file has a
Configure the Endpoint Access Type
Configure access to your endpoint. Depending on the capabilities of the adapter you are configuring, options may appear to configure access to the public internet, to a private endpoint, or to an on-premises service hosted behind a fire wall.
Select the Endpoint Access Type
Specify an agent group only when the FTP server is not publicly accessible from Oracle Integration. Install the connectivity agent on the same network as the FTP server. This enables the connectivity agent to access the FTP server. Troubleshoot any connectivity agent issues that occur. See Troubleshoot Connectivity Agent Issues with the FTP Adapter.
- Go to the Access type section.
- Select the option for accessing your endpoint.
Option This Option Appears If Your Adapter Supports ... Public gateway Connections to endpoints using the public internet. Private endpoint Connections to endpoints using a private virtual cloud network (VCN). Note: To connect to private endpoints, you must complete prerequisite tasks in the Oracle Cloud Infrastructure Console. Failure to do so results in errors when testing the connection. See Connect to Private Resources in Provisioning and Administering Oracle Integration 3 and Troubleshoot Private Endpoints in Using Integrations in Oracle Integration 3.
Connectivity agent Connections to on-premises endpoints through the connectivity agent.
-
Click Associate agent group.
The Associate agent group panel appears.
-
Select the agent group, and click Use.
To configure an agent group, you must download and install the on-premises connectivity agent. See Download and Run the Connectivity Agent Installer and About Creating Hybrid Integrations Using Oracle Integration in Using Integrations in Oracle Integration 3.
-
Ensure Private Endpoint Configuration is Successful
- To connect to private endpoints, you must complete prerequisite tasks in the Oracle Cloud Infrastructure Console. Failure to do so results in errors when testing the connection. See Connect to Private Resources in Provisioning and Administering Oracle Integration 3.
- When configuring an adapter on the Connections page to connect to endpoints using a private network, specify the fully-qualified domain name (FQDN) and not the IP address. If you enter an IP address, validation fails when you click Test.
- IPSec tunneling and FastConnect are not supported for use with private endpoints.