text
stringlengths
65
20k
You're now ready to configure the connection details, such as connection properties, security policies, connection login credentials, and (for certain connections) agent group.Chapter 2 Create a Connection 2-7Configure Connection Properties Enter connection information so your application can process requests.Note: Data dictionaries are required for the SAP Ariba task/event-based connections only.Data dictionaries are not required for the SAP Ariba web services connections.1.In the Host Name field, enter the host name of the SAP Ariba server.See Obtain the SAP Ariba Host Name and Partition (Site/Realm Name) .2.In the Partition (Site Name) field, enter the name of the SAP Ariba server partition on which to execute operations.See Obtain the SAP Ariba Host Name and Partition (Site/Realm Name) .3.In the Buyer Data Dictionary field, upload the buyer data dictionary you downloaded.See Download the Sourcing Data Dictionary and Buyer Data Dictionary .4.In the Sourcing Data Dictionary field, upload the source data dictionary you downloaded.See Download the Sourcing Data Dictionary and Buyer Data Dictionary .Note: You can upload the data dictionaries from the local host using the Upload option or enter the host location of the file.Configure Connection Security Configure security for your SAP Ariba Adapter connection by selecting the security policy and security token.1.In the Security Policy list, select the security policy.Basic Authentication : Select this security policy to create a web services connection.
Note: Data dictionaries are required for the SAP Ariba task/event-based connections only.Data dictionaries are not required for the SAP Ariba web services connections.1.In the Host Name field, enter the host name of the SAP Ariba server.See Obtain the SAP Ariba Host Name and Partition (Site/Realm Name) .2.In the Partition (Site Name) field, enter the name of the SAP Ariba server partition on which to execute operations.See Obtain the SAP Ariba Host Name and Partition (Site/Realm Name) .3.In the Buyer Data Dictionary field, upload the buyer data dictionary you downloaded.See Download the Sourcing Data Dictionary and Buyer Data Dictionary .4.In the Sourcing Data Dictionary field, upload the source data dictionary you downloaded.See Download the Sourcing Data Dictionary and Buyer Data Dictionary .Note: You can upload the data dictionaries from the local host using the Upload option or enter the host location of the file.Configure Connection Security Configure security for your SAP Ariba Adapter connection by selecting the security policy and security token.1.In the Security Policy list, select the security policy.Basic Authentication : Select this security policy to create a web services connection.Shared Secret-Based Authentication : Select this security policy to create a task/event-based connection.
Data dictionaries are not required for the SAP Ariba web services connections.1.In the Host Name field, enter the host name of the SAP Ariba server.See Obtain the SAP Ariba Host Name and Partition (Site/Realm Name) .2.In the Partition (Site Name) field, enter the name of the SAP Ariba server partition on which to execute operations.See Obtain the SAP Ariba Host Name and Partition (Site/Realm Name) .3.In the Buyer Data Dictionary field, upload the buyer data dictionary you downloaded.See Download the Sourcing Data Dictionary and Buyer Data Dictionary .4.In the Sourcing Data Dictionary field, upload the source data dictionary you downloaded.See Download the Sourcing Data Dictionary and Buyer Data Dictionary .Note: You can upload the data dictionaries from the local host using the Upload option or enter the host location of the file.Configure Connection Security Configure security for your SAP Ariba Adapter connection by selecting the security policy and security token.1.In the Security Policy list, select the security policy.Basic Authentication : Select this security policy to create a web services connection.Shared Secret-Based Authentication : Select this security policy to create a task/event-based connection.2.If you select Basic Authentication : a.In the Username field, enter the user name for the SAP Ariba account.
1.In the Host Name field, enter the host name of the SAP Ariba server.See Obtain the SAP Ariba Host Name and Partition (Site/Realm Name) .2.In the Partition (Site Name) field, enter the name of the SAP Ariba server partition on which to execute operations.See Obtain the SAP Ariba Host Name and Partition (Site/Realm Name) .3.In the Buyer Data Dictionary field, upload the buyer data dictionary you downloaded.See Download the Sourcing Data Dictionary and Buyer Data Dictionary .4.In the Sourcing Data Dictionary field, upload the source data dictionary you downloaded.See Download the Sourcing Data Dictionary and Buyer Data Dictionary .Note: You can upload the data dictionaries from the local host using the Upload option or enter the host location of the file.Configure Connection Security Configure security for your SAP Ariba Adapter connection by selecting the security policy and security token.1.In the Security Policy list, select the security policy.Basic Authentication : Select this security policy to create a web services connection.Shared Secret-Based Authentication : Select this security policy to create a task/event-based connection.2.If you select Basic Authentication : a.In the Username field, enter the user name for the SAP Ariba account.b.In the Password field, enter the password for the SAP Ariba account.
See Obtain the SAP Ariba Host Name and Partition (Site/Realm Name) .2.In the Partition (Site Name) field, enter the name of the SAP Ariba server partition on which to execute operations.See Obtain the SAP Ariba Host Name and Partition (Site/Realm Name) .3.In the Buyer Data Dictionary field, upload the buyer data dictionary you downloaded.See Download the Sourcing Data Dictionary and Buyer Data Dictionary .4.In the Sourcing Data Dictionary field, upload the source data dictionary you downloaded.See Download the Sourcing Data Dictionary and Buyer Data Dictionary .Note: You can upload the data dictionaries from the local host using the Upload option or enter the host location of the file.Configure Connection Security Configure security for your SAP Ariba Adapter connection by selecting the security policy and security token.1.In the Security Policy list, select the security policy.Basic Authentication : Select this security policy to create a web services connection.Shared Secret-Based Authentication : Select this security policy to create a task/event-based connection.2.If you select Basic Authentication : a.In the Username field, enter the user name for the SAP Ariba account.b.In the Password field, enter the password for the SAP Ariba account.c.In the Confirm Password field, re-enter the password.
2.In the Partition (Site Name) field, enter the name of the SAP Ariba server partition on which to execute operations.See Obtain the SAP Ariba Host Name and Partition (Site/Realm Name) .3.In the Buyer Data Dictionary field, upload the buyer data dictionary you downloaded.See Download the Sourcing Data Dictionary and Buyer Data Dictionary .4.In the Sourcing Data Dictionary field, upload the source data dictionary you downloaded.See Download the Sourcing Data Dictionary and Buyer Data Dictionary .Note: You can upload the data dictionaries from the local host using the Upload option or enter the host location of the file.Configure Connection Security Configure security for your SAP Ariba Adapter connection by selecting the security policy and security token.1.In the Security Policy list, select the security policy.Basic Authentication : Select this security policy to create a web services connection.Shared Secret-Based Authentication : Select this security policy to create a task/event-based connection.2.If you select Basic Authentication : a.In the Username field, enter the user name for the SAP Ariba account.b.In the Password field, enter the password for the SAP Ariba account.c.In the Confirm Password field, re-enter the password.See Configure Basic Authentication .
See Obtain the SAP Ariba Host Name and Partition (Site/Realm Name) .3.In the Buyer Data Dictionary field, upload the buyer data dictionary you downloaded.See Download the Sourcing Data Dictionary and Buyer Data Dictionary .4.In the Sourcing Data Dictionary field, upload the source data dictionary you downloaded.See Download the Sourcing Data Dictionary and Buyer Data Dictionary .Note: You can upload the data dictionaries from the local host using the Upload option or enter the host location of the file.Configure Connection Security Configure security for your SAP Ariba Adapter connection by selecting the security policy and security token.1.In the Security Policy list, select the security policy.Basic Authentication : Select this security policy to create a web services connection.Shared Secret-Based Authentication : Select this security policy to create a task/event-based connection.2.If you select Basic Authentication : a.In the Username field, enter the user name for the SAP Ariba account.b.In the Password field, enter the password for the SAP Ariba account.c.In the Confirm Password field, re-enter the password.See Configure Basic Authentication .3.If you select Shared Secret-Based Authentication : a.In the Shared Secret field, enter the key you obtained.Chapter 2 Create a Connection 2-8b.See Configure Shared Secret-Based Authentication .
3.In the Buyer Data Dictionary field, upload the buyer data dictionary you downloaded.See Download the Sourcing Data Dictionary and Buyer Data Dictionary .4.In the Sourcing Data Dictionary field, upload the source data dictionary you downloaded.See Download the Sourcing Data Dictionary and Buyer Data Dictionary .Note: You can upload the data dictionaries from the local host using the Upload option or enter the host location of the file.Configure Connection Security Configure security for your SAP Ariba Adapter connection by selecting the security policy and security token.1.In the Security Policy list, select the security policy.Basic Authentication : Select this security policy to create a web services connection.Shared Secret-Based Authentication : Select this security policy to create a task/event-based connection.2.If you select Basic Authentication : a.In the Username field, enter the user name for the SAP Ariba account.b.In the Password field, enter the password for the SAP Ariba account.c.In the Confirm Password field, re-enter the password.See Configure Basic Authentication .3.If you select Shared Secret-Based Authentication : a.In the Shared Secret field, enter the key you obtained.Chapter 2 Create a Connection 2-8b.See Configure Shared Secret-Based Authentication .Test the Connection Test your connection to ensure that it's configured successfully.
See Download the Sourcing Data Dictionary and Buyer Data Dictionary .4.In the Sourcing Data Dictionary field, upload the source data dictionary you downloaded.See Download the Sourcing Data Dictionary and Buyer Data Dictionary .Note: You can upload the data dictionaries from the local host using the Upload option or enter the host location of the file.Configure Connection Security Configure security for your SAP Ariba Adapter connection by selecting the security policy and security token.1.In the Security Policy list, select the security policy.Basic Authentication : Select this security policy to create a web services connection.Shared Secret-Based Authentication : Select this security policy to create a task/event-based connection.2.If you select Basic Authentication : a.In the Username field, enter the user name for the SAP Ariba account.b.In the Password field, enter the password for the SAP Ariba account.c.In the Confirm Password field, re-enter the password.See Configure Basic Authentication .3.If you select Shared Secret-Based Authentication : a.In the Shared Secret field, enter the key you obtained.Chapter 2 Create a Connection 2-8b.See Configure Shared Secret-Based Authentication .Test the Connection Test your connection to ensure that it's configured successfully.1.In the page title bar, click Test.
4.In the Sourcing Data Dictionary field, upload the source data dictionary you downloaded.See Download the Sourcing Data Dictionary and Buyer Data Dictionary .Note: You can upload the data dictionaries from the local host using the Upload option or enter the host location of the file.Configure Connection Security Configure security for your SAP Ariba Adapter connection by selecting the security policy and security token.1.In the Security Policy list, select the security policy.Basic Authentication : Select this security policy to create a web services connection.Shared Secret-Based Authentication : Select this security policy to create a task/event-based connection.2.If you select Basic Authentication : a.In the Username field, enter the user name for the SAP Ariba account.b.In the Password field, enter the password for the SAP Ariba account.c.In the Confirm Password field, re-enter the password.See Configure Basic Authentication .3.If you select Shared Secret-Based Authentication : a.In the Shared Secret field, enter the key you obtained.Chapter 2 Create a Connection 2-8b.See Configure Shared Secret-Based Authentication .Test the Connection Test your connection to ensure that it's configured successfully.1.In the page title bar, click Test.What happens next depends on whether your connection uses a Web Services Description Language (WSDL) file.
See Download the Sourcing Data Dictionary and Buyer Data Dictionary .Note: You can upload the data dictionaries from the local host using the Upload option or enter the host location of the file.Configure Connection Security Configure security for your SAP Ariba Adapter connection by selecting the security policy and security token.1.In the Security Policy list, select the security policy.Basic Authentication : Select this security policy to create a web services connection.Shared Secret-Based Authentication : Select this security policy to create a task/event-based connection.2.If you select Basic Authentication : a.In the Username field, enter the user name for the SAP Ariba account.b.In the Password field, enter the password for the SAP Ariba account.c.In the Confirm Password field, re-enter the password.See Configure Basic Authentication .3.If you select Shared Secret-Based Authentication : a.In the Shared Secret field, enter the key you obtained.Chapter 2 Create a Connection 2-8b.See Configure Shared Secret-Based Authentication .Test the Connection Test your connection to ensure that it's configured successfully.1.In the page title bar, click Test.What happens next depends on whether your connection uses a Web Services Description Language (WSDL) file.If Your Connection... Then... Doesnt use a WSDL The test starts automatically and validates the inputs you provided for the connection.
Note: You can upload the data dictionaries from the local host using the Upload option or enter the host location of the file.Configure Connection Security Configure security for your SAP Ariba Adapter connection by selecting the security policy and security token.1.In the Security Policy list, select the security policy.Basic Authentication : Select this security policy to create a web services connection.Shared Secret-Based Authentication : Select this security policy to create a task/event-based connection.2.If you select Basic Authentication : a.In the Username field, enter the user name for the SAP Ariba account.b.In the Password field, enter the password for the SAP Ariba account.c.In the Confirm Password field, re-enter the password.See Configure Basic Authentication .3.If you select Shared Secret-Based Authentication : a.In the Shared Secret field, enter the key you obtained.Chapter 2 Create a Connection 2-8b.See Configure Shared Secret-Based Authentication .Test the Connection Test your connection to ensure that it's configured successfully.1.In the page title bar, click Test.What happens next depends on whether your connection uses a Web Services Description Language (WSDL) file.If Your Connection... Then... Doesnt use a WSDL The test starts automatically and validates the inputs you provided for the connection.Uses a WSDL A dialog prompts you to select the type of connection testing to perform: Validate and Test : Performs a full validation of the WSDL, including processing of the imported schemas and WSDLs.
Configure Connection Security Configure security for your SAP Ariba Adapter connection by selecting the security policy and security token.1.In the Security Policy list, select the security policy.Basic Authentication : Select this security policy to create a web services connection.Shared Secret-Based Authentication : Select this security policy to create a task/event-based connection.2.If you select Basic Authentication : a.In the Username field, enter the user name for the SAP Ariba account.b.In the Password field, enter the password for the SAP Ariba account.c.In the Confirm Password field, re-enter the password.See Configure Basic Authentication .3.If you select Shared Secret-Based Authentication : a.In the Shared Secret field, enter the key you obtained.Chapter 2 Create a Connection 2-8b.See Configure Shared Secret-Based Authentication .Test the Connection Test your connection to ensure that it's configured successfully.1.In the page title bar, click Test.What happens next depends on whether your connection uses a Web Services Description Language (WSDL) file.If Your Connection... Then... Doesnt use a WSDL The test starts automatically and validates the inputs you provided for the connection.Uses a WSDL A dialog prompts you to select the type of connection testing to perform: Validate and Test : Performs a full validation of the WSDL, including processing of the imported schemas and WSDLs.Complete validation can take several minutes depending on the number of imported schemas and WSDLs.
1.In the Security Policy list, select the security policy.Basic Authentication : Select this security policy to create a web services connection.Shared Secret-Based Authentication : Select this security policy to create a task/event-based connection.2.If you select Basic Authentication : a.In the Username field, enter the user name for the SAP Ariba account.b.In the Password field, enter the password for the SAP Ariba account.c.In the Confirm Password field, re-enter the password.See Configure Basic Authentication .3.If you select Shared Secret-Based Authentication : a.In the Shared Secret field, enter the key you obtained.Chapter 2 Create a Connection 2-8b.See Configure Shared Secret-Based Authentication .Test the Connection Test your connection to ensure that it's configured successfully.1.In the page title bar, click Test.What happens next depends on whether your connection uses a Web Services Description Language (WSDL) file.If Your Connection... Then... Doesnt use a WSDL The test starts automatically and validates the inputs you provided for the connection.Uses a WSDL A dialog prompts you to select the type of connection testing to perform: Validate and Test : Performs a full validation of the WSDL, including processing of the imported schemas and WSDLs.Complete validation can take several minutes depending on the number of imported schemas and WSDLs.No requests are sent to the operations exposed in the WSDL.
Basic Authentication : Select this security policy to create a web services connection.Shared Secret-Based Authentication : Select this security policy to create a task/event-based connection.2.If you select Basic Authentication : a.In the Username field, enter the user name for the SAP Ariba account.b.In the Password field, enter the password for the SAP Ariba account.c.In the Confirm Password field, re-enter the password.See Configure Basic Authentication .3.If you select Shared Secret-Based Authentication : a.In the Shared Secret field, enter the key you obtained.Chapter 2 Create a Connection 2-8b.See Configure Shared Secret-Based Authentication .Test the Connection Test your connection to ensure that it's configured successfully.1.In the page title bar, click Test.What happens next depends on whether your connection uses a Web Services Description Language (WSDL) file.If Your Connection... Then... Doesnt use a WSDL The test starts automatically and validates the inputs you provided for the connection.Uses a WSDL A dialog prompts you to select the type of connection testing to perform: Validate and Test : Performs a full validation of the WSDL, including processing of the imported schemas and WSDLs.Complete validation can take several minutes depending on the number of imported schemas and WSDLs.No requests are sent to the operations exposed in the WSDL.Test: Connects to the WSDL URL and performs a syntax check on the WSDL.
Shared Secret-Based Authentication : Select this security policy to create a task/event-based connection.2.If you select Basic Authentication : a.In the Username field, enter the user name for the SAP Ariba account.b.In the Password field, enter the password for the SAP Ariba account.c.In the Confirm Password field, re-enter the password.See Configure Basic Authentication .3.If you select Shared Secret-Based Authentication : a.In the Shared Secret field, enter the key you obtained.Chapter 2 Create a Connection 2-8b.See Configure Shared Secret-Based Authentication .Test the Connection Test your connection to ensure that it's configured successfully.1.In the page title bar, click Test.What happens next depends on whether your connection uses a Web Services Description Language (WSDL) file.If Your Connection... Then... Doesnt use a WSDL The test starts automatically and validates the inputs you provided for the connection.Uses a WSDL A dialog prompts you to select the type of connection testing to perform: Validate and Test : Performs a full validation of the WSDL, including processing of the imported schemas and WSDLs.Complete validation can take several minutes depending on the number of imported schemas and WSDLs.No requests are sent to the operations exposed in the WSDL.Test: Connects to the WSDL URL and performs a syntax check on the WSDL.No requests are sent to the operations exposed in the WSDL.
2.If you select Basic Authentication : a.In the Username field, enter the user name for the SAP Ariba account.b.In the Password field, enter the password for the SAP Ariba account.c.In the Confirm Password field, re-enter the password.See Configure Basic Authentication .3.If you select Shared Secret-Based Authentication : a.In the Shared Secret field, enter the key you obtained.Chapter 2 Create a Connection 2-8b.See Configure Shared Secret-Based Authentication .Test the Connection Test your connection to ensure that it's configured successfully.1.In the page title bar, click Test.What happens next depends on whether your connection uses a Web Services Description Language (WSDL) file.If Your Connection... Then... Doesnt use a WSDL The test starts automatically and validates the inputs you provided for the connection.Uses a WSDL A dialog prompts you to select the type of connection testing to perform: Validate and Test : Performs a full validation of the WSDL, including processing of the imported schemas and WSDLs.Complete validation can take several minutes depending on the number of imported schemas and WSDLs.No requests are sent to the operations exposed in the WSDL.Test: Connects to the WSDL URL and performs a syntax check on the WSDL.No requests are sent to the operations exposed in the WSDL.2.Wait for a message about the results of the connection test.
b.In the Password field, enter the password for the SAP Ariba account.c.In the Confirm Password field, re-enter the password.See Configure Basic Authentication .3.If you select Shared Secret-Based Authentication : a.In the Shared Secret field, enter the key you obtained.Chapter 2 Create a Connection 2-8b.See Configure Shared Secret-Based Authentication .Test the Connection Test your connection to ensure that it's configured successfully.1.In the page title bar, click Test.What happens next depends on whether your connection uses a Web Services Description Language (WSDL) file.If Your Connection... Then... Doesnt use a WSDL The test starts automatically and validates the inputs you provided for the connection.Uses a WSDL A dialog prompts you to select the type of connection testing to perform: Validate and Test : Performs a full validation of the WSDL, including processing of the imported schemas and WSDLs.Complete validation can take several minutes depending on the number of imported schemas and WSDLs.No requests are sent to the operations exposed in the WSDL.Test: Connects to the WSDL URL and performs a syntax check on the WSDL.No requests are sent to the operations exposed in the WSDL.2.Wait for a message about the results of the connection test.If the test was successful, then the connection is configured properly.
c.In the Confirm Password field, re-enter the password.See Configure Basic Authentication .3.If you select Shared Secret-Based Authentication : a.In the Shared Secret field, enter the key you obtained.Chapter 2 Create a Connection 2-8b.See Configure Shared Secret-Based Authentication .Test the Connection Test your connection to ensure that it's configured successfully.1.In the page title bar, click Test.What happens next depends on whether your connection uses a Web Services Description Language (WSDL) file.If Your Connection... Then... Doesnt use a WSDL The test starts automatically and validates the inputs you provided for the connection.Uses a WSDL A dialog prompts you to select the type of connection testing to perform: Validate and Test : Performs a full validation of the WSDL, including processing of the imported schemas and WSDLs.Complete validation can take several minutes depending on the number of imported schemas and WSDLs.No requests are sent to the operations exposed in the WSDL.Test: Connects to the WSDL URL and performs a syntax check on the WSDL.No requests are sent to the operations exposed in the WSDL.2.Wait for a message about the results of the connection test.If the test was successful, then the connection is configured properly.If the test failed, then edit the configuration details you entered.
See Configure Basic Authentication .3.If you select Shared Secret-Based Authentication : a.In the Shared Secret field, enter the key you obtained.Chapter 2 Create a Connection 2-8b.See Configure Shared Secret-Based Authentication .Test the Connection Test your connection to ensure that it's configured successfully.1.In the page title bar, click Test.What happens next depends on whether your connection uses a Web Services Description Language (WSDL) file.If Your Connection... Then... Doesnt use a WSDL The test starts automatically and validates the inputs you provided for the connection.Uses a WSDL A dialog prompts you to select the type of connection testing to perform: Validate and Test : Performs a full validation of the WSDL, including processing of the imported schemas and WSDLs.Complete validation can take several minutes depending on the number of imported schemas and WSDLs.No requests are sent to the operations exposed in the WSDL.Test: Connects to the WSDL URL and performs a syntax check on the WSDL.No requests are sent to the operations exposed in the WSDL.2.Wait for a message about the results of the connection test.If the test was successful, then the connection is configured properly.If the test failed, then edit the configuration details you entered.Check for typos, verify URLs and credentials, and download the diagnostic logs for additional details.
3.If you select Shared Secret-Based Authentication : a.In the Shared Secret field, enter the key you obtained.Chapter 2 Create a Connection 2-8b.See Configure Shared Secret-Based Authentication .Test the Connection Test your connection to ensure that it's configured successfully.1.In the page title bar, click Test.What happens next depends on whether your connection uses a Web Services Description Language (WSDL) file.If Your Connection... Then... Doesnt use a WSDL The test starts automatically and validates the inputs you provided for the connection.Uses a WSDL A dialog prompts you to select the type of connection testing to perform: Validate and Test : Performs a full validation of the WSDL, including processing of the imported schemas and WSDLs.Complete validation can take several minutes depending on the number of imported schemas and WSDLs.No requests are sent to the operations exposed in the WSDL.Test: Connects to the WSDL URL and performs a syntax check on the WSDL.No requests are sent to the operations exposed in the WSDL.2.Wait for a message about the results of the connection test.If the test was successful, then the connection is configured properly.If the test failed, then edit the configuration details you entered.Check for typos, verify URLs and credentials, and download the diagnostic logs for additional details.Continue to test until the connection is successful.
Test the Connection Test your connection to ensure that it's configured successfully.1.In the page title bar, click Test.What happens next depends on whether your connection uses a Web Services Description Language (WSDL) file.If Your Connection... Then... Doesnt use a WSDL The test starts automatically and validates the inputs you provided for the connection.Uses a WSDL A dialog prompts you to select the type of connection testing to perform: Validate and Test : Performs a full validation of the WSDL, including processing of the imported schemas and WSDLs.Complete validation can take several minutes depending on the number of imported schemas and WSDLs.No requests are sent to the operations exposed in the WSDL.Test: Connects to the WSDL URL and performs a syntax check on the WSDL.No requests are sent to the operations exposed in the WSDL.2.Wait for a message about the results of the connection test.If the test was successful, then the connection is configured properly.If the test failed, then edit the configuration details you entered.Check for typos, verify URLs and credentials, and download the diagnostic logs for additional details.Continue to test until the connection is successful.3.When complete, click Save .
1.In the page title bar, click Test.What happens next depends on whether your connection uses a Web Services Description Language (WSDL) file.If Your Connection... Then... Doesnt use a WSDL The test starts automatically and validates the inputs you provided for the connection.Uses a WSDL A dialog prompts you to select the type of connection testing to perform: Validate and Test : Performs a full validation of the WSDL, including processing of the imported schemas and WSDLs.Complete validation can take several minutes depending on the number of imported schemas and WSDLs.No requests are sent to the operations exposed in the WSDL.Test: Connects to the WSDL URL and performs a syntax check on the WSDL.No requests are sent to the operations exposed in the WSDL.2.Wait for a message about the results of the connection test.If the test was successful, then the connection is configured properly.If the test failed, then edit the configuration details you entered.Check for typos, verify URLs and credentials, and download the diagnostic logs for additional details.Continue to test until the connection is successful.3.When complete, click Save .Upload an SSL Certificate Certificates are used to validate outbound SSL connections.
What happens next depends on whether your connection uses a Web Services Description Language (WSDL) file.If Your Connection... Then... Doesnt use a WSDL The test starts automatically and validates the inputs you provided for the connection.Uses a WSDL A dialog prompts you to select the type of connection testing to perform: Validate and Test : Performs a full validation of the WSDL, including processing of the imported schemas and WSDLs.Complete validation can take several minutes depending on the number of imported schemas and WSDLs.No requests are sent to the operations exposed in the WSDL.Test: Connects to the WSDL URL and performs a syntax check on the WSDL.No requests are sent to the operations exposed in the WSDL.2.Wait for a message about the results of the connection test.If the test was successful, then the connection is configured properly.If the test failed, then edit the configuration details you entered.Check for typos, verify URLs and credentials, and download the diagnostic logs for additional details.Continue to test until the connection is successful.3.When complete, click Save .Upload an SSL Certificate Certificates are used to validate outbound SSL connections.If you make an SSL connection in which the root certificate does not exist in Oracle Integration, an exception is thrown.
If Your Connection... Then... Doesnt use a WSDL The test starts automatically and validates the inputs you provided for the connection.Uses a WSDL A dialog prompts you to select the type of connection testing to perform: Validate and Test : Performs a full validation of the WSDL, including processing of the imported schemas and WSDLs.Complete validation can take several minutes depending on the number of imported schemas and WSDLs.No requests are sent to the operations exposed in the WSDL.Test: Connects to the WSDL URL and performs a syntax check on the WSDL.No requests are sent to the operations exposed in the WSDL.2.Wait for a message about the results of the connection test.If the test was successful, then the connection is configured properly.If the test failed, then edit the configuration details you entered.Check for typos, verify URLs and credentials, and download the diagnostic logs for additional details.Continue to test until the connection is successful.3.When complete, click Save .Upload an SSL Certificate Certificates are used to validate outbound SSL connections.If you make an SSL connection in which the root certificate does not exist in Oracle Integration, an exception is thrown.In that case, you must upload the appropriate certificate.
Uses a WSDL A dialog prompts you to select the type of connection testing to perform: Validate and Test : Performs a full validation of the WSDL, including processing of the imported schemas and WSDLs.Complete validation can take several minutes depending on the number of imported schemas and WSDLs.No requests are sent to the operations exposed in the WSDL.Test: Connects to the WSDL URL and performs a syntax check on the WSDL.No requests are sent to the operations exposed in the WSDL.2.Wait for a message about the results of the connection test.If the test was successful, then the connection is configured properly.If the test failed, then edit the configuration details you entered.Check for typos, verify URLs and credentials, and download the diagnostic logs for additional details.Continue to test until the connection is successful.3.When complete, click Save .Upload an SSL Certificate Certificates are used to validate outbound SSL connections.If you make an SSL connection in which the root certificate does not exist in Oracle Integration, an exception is thrown.In that case, you must upload the appropriate certificate.A certificate enables Oracle Integration to connect with external services.
Complete validation can take several minutes depending on the number of imported schemas and WSDLs.No requests are sent to the operations exposed in the WSDL.Test: Connects to the WSDL URL and performs a syntax check on the WSDL.No requests are sent to the operations exposed in the WSDL.2.Wait for a message about the results of the connection test.If the test was successful, then the connection is configured properly.If the test failed, then edit the configuration details you entered.Check for typos, verify URLs and credentials, and download the diagnostic logs for additional details.Continue to test until the connection is successful.3.When complete, click Save .Upload an SSL Certificate Certificates are used to validate outbound SSL connections.If you make an SSL connection in which the root certificate does not exist in Oracle Integration, an exception is thrown.In that case, you must upload the appropriate certificate.A certificate enables Oracle Integration to connect with external services.If the external endpoint requires a specific certificate, request the certificate and then upload it into Oracle Integration.
No requests are sent to the operations exposed in the WSDL.Test: Connects to the WSDL URL and performs a syntax check on the WSDL.No requests are sent to the operations exposed in the WSDL.2.Wait for a message about the results of the connection test.If the test was successful, then the connection is configured properly.If the test failed, then edit the configuration details you entered.Check for typos, verify URLs and credentials, and download the diagnostic logs for additional details.Continue to test until the connection is successful.3.When complete, click Save .Upload an SSL Certificate Certificates are used to validate outbound SSL connections.If you make an SSL connection in which the root certificate does not exist in Oracle Integration, an exception is thrown.In that case, you must upload the appropriate certificate.A certificate enables Oracle Integration to connect with external services.If the external endpoint requires a specific certificate, request the certificate and then upload it into Oracle Integration.To upload an SSL certificate: 1.In the left navigation pane, click Home > Settings > Certificates .
Test: Connects to the WSDL URL and performs a syntax check on the WSDL.No requests are sent to the operations exposed in the WSDL.2.Wait for a message about the results of the connection test.If the test was successful, then the connection is configured properly.If the test failed, then edit the configuration details you entered.Check for typos, verify URLs and credentials, and download the diagnostic logs for additional details.Continue to test until the connection is successful.3.When complete, click Save .Upload an SSL Certificate Certificates are used to validate outbound SSL connections.If you make an SSL connection in which the root certificate does not exist in Oracle Integration, an exception is thrown.In that case, you must upload the appropriate certificate.A certificate enables Oracle Integration to connect with external services.If the external endpoint requires a specific certificate, request the certificate and then upload it into Oracle Integration.To upload an SSL certificate: 1.In the left navigation pane, click Home > Settings > Certificates .All certificates currently uploaded to the trust store are displayed in the Certificates dialog.
No requests are sent to the operations exposed in the WSDL.2.Wait for a message about the results of the connection test.If the test was successful, then the connection is configured properly.If the test failed, then edit the configuration details you entered.Check for typos, verify URLs and credentials, and download the diagnostic logs for additional details.Continue to test until the connection is successful.3.When complete, click Save .Upload an SSL Certificate Certificates are used to validate outbound SSL connections.If you make an SSL connection in which the root certificate does not exist in Oracle Integration, an exception is thrown.In that case, you must upload the appropriate certificate.A certificate enables Oracle Integration to connect with external services.If the external endpoint requires a specific certificate, request the certificate and then upload it into Oracle Integration.To upload an SSL certificate: 1.In the left navigation pane, click Home > Settings > Certificates .All certificates currently uploaded to the trust store are displayed in the Certificates dialog.The link enables you to filter by name, certificate expiration date, status, type, category, and installation method (user-installed or system-installed).
2.Wait for a message about the results of the connection test.If the test was successful, then the connection is configured properly.If the test failed, then edit the configuration details you entered.Check for typos, verify URLs and credentials, and download the diagnostic logs for additional details.Continue to test until the connection is successful.3.When complete, click Save .Upload an SSL Certificate Certificates are used to validate outbound SSL connections.If you make an SSL connection in which the root certificate does not exist in Oracle Integration, an exception is thrown.In that case, you must upload the appropriate certificate.A certificate enables Oracle Integration to connect with external services.If the external endpoint requires a specific certificate, request the certificate and then upload it into Oracle Integration.To upload an SSL certificate: 1.In the left navigation pane, click Home > Settings > Certificates .All certificates currently uploaded to the trust store are displayed in the Certificates dialog.The link enables you to filter by name, certificate expiration date, status, type, category, and installation method (user-installed or system-installed).Certificates installed by the system cannot be deleted.
If the test was successful, then the connection is configured properly.If the test failed, then edit the configuration details you entered.Check for typos, verify URLs and credentials, and download the diagnostic logs for additional details.Continue to test until the connection is successful.3.When complete, click Save .Upload an SSL Certificate Certificates are used to validate outbound SSL connections.If you make an SSL connection in which the root certificate does not exist in Oracle Integration, an exception is thrown.In that case, you must upload the appropriate certificate.A certificate enables Oracle Integration to connect with external services.If the external endpoint requires a specific certificate, request the certificate and then upload it into Oracle Integration.To upload an SSL certificate: 1.In the left navigation pane, click Home > Settings > Certificates .All certificates currently uploaded to the trust store are displayed in the Certificates dialog.The link enables you to filter by name, certificate expiration date, status, type, category, and installation method (user-installed or system-installed).Certificates installed by the system cannot be deleted.Chapter 2 Upload an SSL Certificate 2-9 2.Click Upload at the top of the page.
If the test failed, then edit the configuration details you entered.Check for typos, verify URLs and credentials, and download the diagnostic logs for additional details.Continue to test until the connection is successful.3.When complete, click Save .Upload an SSL Certificate Certificates are used to validate outbound SSL connections.If you make an SSL connection in which the root certificate does not exist in Oracle Integration, an exception is thrown.In that case, you must upload the appropriate certificate.A certificate enables Oracle Integration to connect with external services.If the external endpoint requires a specific certificate, request the certificate and then upload it into Oracle Integration.To upload an SSL certificate: 1.In the left navigation pane, click Home > Settings > Certificates .All certificates currently uploaded to the trust store are displayed in the Certificates dialog.The link enables you to filter by name, certificate expiration date, status, type, category, and installation method (user-installed or system-installed).Certificates installed by the system cannot be deleted.Chapter 2 Upload an SSL Certificate 2-9 2.Click Upload at the top of the page.The Upload Certificate dialog box is displayed.
Check for typos, verify URLs and credentials, and download the diagnostic logs for additional details.Continue to test until the connection is successful.3.When complete, click Save .Upload an SSL Certificate Certificates are used to validate outbound SSL connections.If you make an SSL connection in which the root certificate does not exist in Oracle Integration, an exception is thrown.In that case, you must upload the appropriate certificate.A certificate enables Oracle Integration to connect with external services.If the external endpoint requires a specific certificate, request the certificate and then upload it into Oracle Integration.To upload an SSL certificate: 1.In the left navigation pane, click Home > Settings > Certificates .All certificates currently uploaded to the trust store are displayed in the Certificates dialog.The link enables you to filter by name, certificate expiration date, status, type, category, and installation method (user-installed or system-installed).Certificates installed by the system cannot be deleted.Chapter 2 Upload an SSL Certificate 2-9 2.Click Upload at the top of the page.The Upload Certificate dialog box is displayed.3.Enter an alias name and optional description.
Continue to test until the connection is successful.3.When complete, click Save .Upload an SSL Certificate Certificates are used to validate outbound SSL connections.If you make an SSL connection in which the root certificate does not exist in Oracle Integration, an exception is thrown.In that case, you must upload the appropriate certificate.A certificate enables Oracle Integration to connect with external services.If the external endpoint requires a specific certificate, request the certificate and then upload it into Oracle Integration.To upload an SSL certificate: 1.In the left navigation pane, click Home > Settings > Certificates .All certificates currently uploaded to the trust store are displayed in the Certificates dialog.The link enables you to filter by name, certificate expiration date, status, type, category, and installation method (user-installed or system-installed).Certificates installed by the system cannot be deleted.Chapter 2 Upload an SSL Certificate 2-9 2.Click Upload at the top of the page.The Upload Certificate dialog box is displayed.3.Enter an alias name and optional description.4.In the Type field, select the certificate type.
3.When complete, click Save .Upload an SSL Certificate Certificates are used to validate outbound SSL connections.If you make an SSL connection in which the root certificate does not exist in Oracle Integration, an exception is thrown.In that case, you must upload the appropriate certificate.A certificate enables Oracle Integration to connect with external services.If the external endpoint requires a specific certificate, request the certificate and then upload it into Oracle Integration.To upload an SSL certificate: 1.In the left navigation pane, click Home > Settings > Certificates .All certificates currently uploaded to the trust store are displayed in the Certificates dialog.The link enables you to filter by name, certificate expiration date, status, type, category, and installation method (user-installed or system-installed).Certificates installed by the system cannot be deleted.Chapter 2 Upload an SSL Certificate 2-9 2.Click Upload at the top of the page.The Upload Certificate dialog box is displayed.3.Enter an alias name and optional description.4.In the Type field, select the certificate type.Each certificate type enables Oracle Integration to connect with external services.
Upload an SSL Certificate Certificates are used to validate outbound SSL connections.If you make an SSL connection in which the root certificate does not exist in Oracle Integration, an exception is thrown.In that case, you must upload the appropriate certificate.A certificate enables Oracle Integration to connect with external services.If the external endpoint requires a specific certificate, request the certificate and then upload it into Oracle Integration.To upload an SSL certificate: 1.In the left navigation pane, click Home > Settings > Certificates .All certificates currently uploaded to the trust store are displayed in the Certificates dialog.The link enables you to filter by name, certificate expiration date, status, type, category, and installation method (user-installed or system-installed).Certificates installed by the system cannot be deleted.Chapter 2 Upload an SSL Certificate 2-9 2.Click Upload at the top of the page.The Upload Certificate dialog box is displayed.3.Enter an alias name and optional description.4.In the Type field, select the certificate type.Each certificate type enables Oracle Integration to connect with external services.X.509 (SSL transport) SAML (Authentication & Authorization) PGP (Encryption & Decryption) X.509 (SSL transport) 1.Select a certificate category.
If you make an SSL connection in which the root certificate does not exist in Oracle Integration, an exception is thrown.In that case, you must upload the appropriate certificate.A certificate enables Oracle Integration to connect with external services.If the external endpoint requires a specific certificate, request the certificate and then upload it into Oracle Integration.To upload an SSL certificate: 1.In the left navigation pane, click Home > Settings > Certificates .All certificates currently uploaded to the trust store are displayed in the Certificates dialog.The link enables you to filter by name, certificate expiration date, status, type, category, and installation method (user-installed or system-installed).Certificates installed by the system cannot be deleted.Chapter 2 Upload an SSL Certificate 2-9 2.Click Upload at the top of the page.The Upload Certificate dialog box is displayed.3.Enter an alias name and optional description.4.In the Type field, select the certificate type.Each certificate type enables Oracle Integration to connect with external services.X.509 (SSL transport) SAML (Authentication & Authorization) PGP (Encryption & Decryption) X.509 (SSL transport) 1.Select a certificate category.a.Trust : Use this option to upload a trust certificate.
In that case, you must upload the appropriate certificate.A certificate enables Oracle Integration to connect with external services.If the external endpoint requires a specific certificate, request the certificate and then upload it into Oracle Integration.To upload an SSL certificate: 1.In the left navigation pane, click Home > Settings > Certificates .All certificates currently uploaded to the trust store are displayed in the Certificates dialog.The link enables you to filter by name, certificate expiration date, status, type, category, and installation method (user-installed or system-installed).Certificates installed by the system cannot be deleted.Chapter 2 Upload an SSL Certificate 2-9 2.Click Upload at the top of the page.The Upload Certificate dialog box is displayed.3.Enter an alias name and optional description.4.In the Type field, select the certificate type.Each certificate type enables Oracle Integration to connect with external services.X.509 (SSL transport) SAML (Authentication & Authorization) PGP (Encryption & Decryption) X.509 (SSL transport) 1.Select a certificate category.a.Trust : Use this option to upload a trust certificate.i.Click Browse , then select the trust file (for example, .cer or .crt) to upload.
A certificate enables Oracle Integration to connect with external services.If the external endpoint requires a specific certificate, request the certificate and then upload it into Oracle Integration.To upload an SSL certificate: 1.In the left navigation pane, click Home > Settings > Certificates .All certificates currently uploaded to the trust store are displayed in the Certificates dialog.The link enables you to filter by name, certificate expiration date, status, type, category, and installation method (user-installed or system-installed).Certificates installed by the system cannot be deleted.Chapter 2 Upload an SSL Certificate 2-9 2.Click Upload at the top of the page.The Upload Certificate dialog box is displayed.3.Enter an alias name and optional description.4.In the Type field, select the certificate type.Each certificate type enables Oracle Integration to connect with external services.X.509 (SSL transport) SAML (Authentication & Authorization) PGP (Encryption & Decryption) X.509 (SSL transport) 1.Select a certificate category.a.Trust : Use this option to upload a trust certificate.i.Click Browse , then select the trust file (for example, .cer or .crt) to upload.b.Identity : Use this option to upload a certificate for two-way SSL communication.
If the external endpoint requires a specific certificate, request the certificate and then upload it into Oracle Integration.To upload an SSL certificate: 1.In the left navigation pane, click Home > Settings > Certificates .All certificates currently uploaded to the trust store are displayed in the Certificates dialog.The link enables you to filter by name, certificate expiration date, status, type, category, and installation method (user-installed or system-installed).Certificates installed by the system cannot be deleted.Chapter 2 Upload an SSL Certificate 2-9 2.Click Upload at the top of the page.The Upload Certificate dialog box is displayed.3.Enter an alias name and optional description.4.In the Type field, select the certificate type.Each certificate type enables Oracle Integration to connect with external services.X.509 (SSL transport) SAML (Authentication & Authorization) PGP (Encryption & Decryption) X.509 (SSL transport) 1.Select a certificate category.a.Trust : Use this option to upload a trust certificate.i.Click Browse , then select the trust file (for example, .cer or .crt) to upload.b.Identity : Use this option to upload a certificate for two-way SSL communication.i.Click Browse , then select the keystore file ( .jks) to upload.
To upload an SSL certificate: 1.In the left navigation pane, click Home > Settings > Certificates .All certificates currently uploaded to the trust store are displayed in the Certificates dialog.The link enables you to filter by name, certificate expiration date, status, type, category, and installation method (user-installed or system-installed).Certificates installed by the system cannot be deleted.Chapter 2 Upload an SSL Certificate 2-9 2.Click Upload at the top of the page.The Upload Certificate dialog box is displayed.3.Enter an alias name and optional description.4.In the Type field, select the certificate type.Each certificate type enables Oracle Integration to connect with external services.X.509 (SSL transport) SAML (Authentication & Authorization) PGP (Encryption & Decryption) X.509 (SSL transport) 1.Select a certificate category.a.Trust : Use this option to upload a trust certificate.i.Click Browse , then select the trust file (for example, .cer or .crt) to upload.b.Identity : Use this option to upload a certificate for two-way SSL communication.i.Click Browse , then select the keystore file ( .jks) to upload.ii.Enter the comma-separated list of passwords corresponding to key aliases.
All certificates currently uploaded to the trust store are displayed in the Certificates dialog.The link enables you to filter by name, certificate expiration date, status, type, category, and installation method (user-installed or system-installed).Certificates installed by the system cannot be deleted.Chapter 2 Upload an SSL Certificate 2-9 2.Click Upload at the top of the page.The Upload Certificate dialog box is displayed.3.Enter an alias name and optional description.4.In the Type field, select the certificate type.Each certificate type enables Oracle Integration to connect with external services.X.509 (SSL transport) SAML (Authentication & Authorization) PGP (Encryption & Decryption) X.509 (SSL transport) 1.Select a certificate category.a.Trust : Use this option to upload a trust certificate.i.Click Browse , then select the trust file (for example, .cer or .crt) to upload.b.Identity : Use this option to upload a certificate for two-way SSL communication.i.Click Browse , then select the keystore file ( .jks) to upload.ii.Enter the comma-separated list of passwords corresponding to key aliases.Note: When an identity certificate file (JKS) contains more than one private key, all the private keys must have the same password.
The link enables you to filter by name, certificate expiration date, status, type, category, and installation method (user-installed or system-installed).Certificates installed by the system cannot be deleted.Chapter 2 Upload an SSL Certificate 2-9 2.Click Upload at the top of the page.The Upload Certificate dialog box is displayed.3.Enter an alias name and optional description.4.In the Type field, select the certificate type.Each certificate type enables Oracle Integration to connect with external services.X.509 (SSL transport) SAML (Authentication & Authorization) PGP (Encryption & Decryption) X.509 (SSL transport) 1.Select a certificate category.a.Trust : Use this option to upload a trust certificate.i.Click Browse , then select the trust file (for example, .cer or .crt) to upload.b.Identity : Use this option to upload a certificate for two-way SSL communication.i.Click Browse , then select the keystore file ( .jks) to upload.ii.Enter the comma-separated list of passwords corresponding to key aliases.Note: When an identity certificate file (JKS) contains more than one private key, all the private keys must have the same password.If the private keys are protected with different passwords, the private keys cannot be extracted from the keystore.
Certificates installed by the system cannot be deleted.Chapter 2 Upload an SSL Certificate 2-9 2.Click Upload at the top of the page.The Upload Certificate dialog box is displayed.3.Enter an alias name and optional description.4.In the Type field, select the certificate type.Each certificate type enables Oracle Integration to connect with external services.X.509 (SSL transport) SAML (Authentication & Authorization) PGP (Encryption & Decryption) X.509 (SSL transport) 1.Select a certificate category.a.Trust : Use this option to upload a trust certificate.i.Click Browse , then select the trust file (for example, .cer or .crt) to upload.b.Identity : Use this option to upload a certificate for two-way SSL communication.i.Click Browse , then select the keystore file ( .jks) to upload.ii.Enter the comma-separated list of passwords corresponding to key aliases.Note: When an identity certificate file (JKS) contains more than one private key, all the private keys must have the same password.If the private keys are protected with different passwords, the private keys cannot be extracted from the keystore.iii.Enter the password of the keystore being imported.
Chapter 2 Upload an SSL Certificate 2-9 2.Click Upload at the top of the page.The Upload Certificate dialog box is displayed.3.Enter an alias name and optional description.4.In the Type field, select the certificate type.Each certificate type enables Oracle Integration to connect with external services.X.509 (SSL transport) SAML (Authentication & Authorization) PGP (Encryption & Decryption) X.509 (SSL transport) 1.Select a certificate category.a.Trust : Use this option to upload a trust certificate.i.Click Browse , then select the trust file (for example, .cer or .crt) to upload.b.Identity : Use this option to upload a certificate for two-way SSL communication.i.Click Browse , then select the keystore file ( .jks) to upload.ii.Enter the comma-separated list of passwords corresponding to key aliases.Note: When an identity certificate file (JKS) contains more than one private key, all the private keys must have the same password.If the private keys are protected with different passwords, the private keys cannot be extracted from the keystore.iii.Enter the password of the keystore being imported.c.Click Upload .
The Upload Certificate dialog box is displayed.3.Enter an alias name and optional description.4.In the Type field, select the certificate type.Each certificate type enables Oracle Integration to connect with external services.X.509 (SSL transport) SAML (Authentication & Authorization) PGP (Encryption & Decryption) X.509 (SSL transport) 1.Select a certificate category.a.Trust : Use this option to upload a trust certificate.i.Click Browse , then select the trust file (for example, .cer or .crt) to upload.b.Identity : Use this option to upload a certificate for two-way SSL communication.i.Click Browse , then select the keystore file ( .jks) to upload.ii.Enter the comma-separated list of passwords corresponding to key aliases.Note: When an identity certificate file (JKS) contains more than one private key, all the private keys must have the same password.If the private keys are protected with different passwords, the private keys cannot be extracted from the keystore.iii.Enter the password of the keystore being imported.c.Click Upload .SAML (Authentication & Authorization) 1.Note that Message Protection is automatically selected as the only available certificate category and cannot be deselected.
3.Enter an alias name and optional description.4.In the Type field, select the certificate type.Each certificate type enables Oracle Integration to connect with external services.X.509 (SSL transport) SAML (Authentication & Authorization) PGP (Encryption & Decryption) X.509 (SSL transport) 1.Select a certificate category.a.Trust : Use this option to upload a trust certificate.i.Click Browse , then select the trust file (for example, .cer or .crt) to upload.b.Identity : Use this option to upload a certificate for two-way SSL communication.i.Click Browse , then select the keystore file ( .jks) to upload.ii.Enter the comma-separated list of passwords corresponding to key aliases.Note: When an identity certificate file (JKS) contains more than one private key, all the private keys must have the same password.If the private keys are protected with different passwords, the private keys cannot be extracted from the keystore.iii.Enter the password of the keystore being imported.c.Click Upload .SAML (Authentication & Authorization) 1.Note that Message Protection is automatically selected as the only available certificate category and cannot be deselected.Use this option to upload a keystoreChapter 2 Upload an SSL Certificate 2-10certificate with SAML token support.
4.In the Type field, select the certificate type.Each certificate type enables Oracle Integration to connect with external services.X.509 (SSL transport) SAML (Authentication & Authorization) PGP (Encryption & Decryption) X.509 (SSL transport) 1.Select a certificate category.a.Trust : Use this option to upload a trust certificate.i.Click Browse , then select the trust file (for example, .cer or .crt) to upload.b.Identity : Use this option to upload a certificate for two-way SSL communication.i.Click Browse , then select the keystore file ( .jks) to upload.ii.Enter the comma-separated list of passwords corresponding to key aliases.Note: When an identity certificate file (JKS) contains more than one private key, all the private keys must have the same password.If the private keys are protected with different passwords, the private keys cannot be extracted from the keystore.iii.Enter the password of the keystore being imported.c.Click Upload .SAML (Authentication & Authorization) 1.Note that Message Protection is automatically selected as the only available certificate category and cannot be deselected.Use this option to upload a keystoreChapter 2 Upload an SSL Certificate 2-10certificate with SAML token support.Create, read, update, and delete (CRUD) operations are supported with this type of certificate.
Each certificate type enables Oracle Integration to connect with external services.X.509 (SSL transport) SAML (Authentication & Authorization) PGP (Encryption & Decryption) X.509 (SSL transport) 1.Select a certificate category.a.Trust : Use this option to upload a trust certificate.i.Click Browse , then select the trust file (for example, .cer or .crt) to upload.b.Identity : Use this option to upload a certificate for two-way SSL communication.i.Click Browse , then select the keystore file ( .jks) to upload.ii.Enter the comma-separated list of passwords corresponding to key aliases.Note: When an identity certificate file (JKS) contains more than one private key, all the private keys must have the same password.If the private keys are protected with different passwords, the private keys cannot be extracted from the keystore.iii.Enter the password of the keystore being imported.c.Click Upload .SAML (Authentication & Authorization) 1.Note that Message Protection is automatically selected as the only available certificate category and cannot be deselected.Use this option to upload a keystoreChapter 2 Upload an SSL Certificate 2-10certificate with SAML token support.Create, read, update, and delete (CRUD) operations are supported with this type of certificate.2.Click Browse , then select the certificate file ( .cer or .crt) to upload.
X.509 (SSL transport) SAML (Authentication & Authorization) PGP (Encryption & Decryption) X.509 (SSL transport) 1.Select a certificate category.a.Trust : Use this option to upload a trust certificate.i.Click Browse , then select the trust file (for example, .cer or .crt) to upload.b.Identity : Use this option to upload a certificate for two-way SSL communication.i.Click Browse , then select the keystore file ( .jks) to upload.ii.Enter the comma-separated list of passwords corresponding to key aliases.Note: When an identity certificate file (JKS) contains more than one private key, all the private keys must have the same password.If the private keys are protected with different passwords, the private keys cannot be extracted from the keystore.iii.Enter the password of the keystore being imported.c.Click Upload .SAML (Authentication & Authorization) 1.Note that Message Protection is automatically selected as the only available certificate category and cannot be deselected.Use this option to upload a keystoreChapter 2 Upload an SSL Certificate 2-10certificate with SAML token support.Create, read, update, and delete (CRUD) operations are supported with this type of certificate.2.Click Browse , then select the certificate file ( .cer or .crt) to upload.3.Click Upload .
a.Trust : Use this option to upload a trust certificate.i.Click Browse , then select the trust file (for example, .cer or .crt) to upload.b.Identity : Use this option to upload a certificate for two-way SSL communication.i.Click Browse , then select the keystore file ( .jks) to upload.ii.Enter the comma-separated list of passwords corresponding to key aliases.Note: When an identity certificate file (JKS) contains more than one private key, all the private keys must have the same password.If the private keys are protected with different passwords, the private keys cannot be extracted from the keystore.iii.Enter the password of the keystore being imported.c.Click Upload .SAML (Authentication & Authorization) 1.Note that Message Protection is automatically selected as the only available certificate category and cannot be deselected.Use this option to upload a keystoreChapter 2 Upload an SSL Certificate 2-10certificate with SAML token support.Create, read, update, and delete (CRUD) operations are supported with this type of certificate.2.Click Browse , then select the certificate file ( .cer or .crt) to upload.3.Click Upload .PGP (Encryption & Decryption) 1.Select a certificate category.
i.Click Browse , then select the trust file (for example, .cer or .crt) to upload.b.Identity : Use this option to upload a certificate for two-way SSL communication.i.Click Browse , then select the keystore file ( .jks) to upload.ii.Enter the comma-separated list of passwords corresponding to key aliases.Note: When an identity certificate file (JKS) contains more than one private key, all the private keys must have the same password.If the private keys are protected with different passwords, the private keys cannot be extracted from the keystore.iii.Enter the password of the keystore being imported.c.Click Upload .SAML (Authentication & Authorization) 1.Note that Message Protection is automatically selected as the only available certificate category and cannot be deselected.Use this option to upload a keystoreChapter 2 Upload an SSL Certificate 2-10certificate with SAML token support.Create, read, update, and delete (CRUD) operations are supported with this type of certificate.2.Click Browse , then select the certificate file ( .cer or .crt) to upload.3.Click Upload .PGP (Encryption & Decryption) 1.Select a certificate category.Pretty Good Privacy (PGP) provides cryptographic privacy and authentication for communication.
b.Identity : Use this option to upload a certificate for two-way SSL communication.i.Click Browse , then select the keystore file ( .jks) to upload.ii.Enter the comma-separated list of passwords corresponding to key aliases.Note: When an identity certificate file (JKS) contains more than one private key, all the private keys must have the same password.If the private keys are protected with different passwords, the private keys cannot be extracted from the keystore.iii.Enter the password of the keystore being imported.c.Click Upload .SAML (Authentication & Authorization) 1.Note that Message Protection is automatically selected as the only available certificate category and cannot be deselected.Use this option to upload a keystoreChapter 2 Upload an SSL Certificate 2-10certificate with SAML token support.Create, read, update, and delete (CRUD) operations are supported with this type of certificate.2.Click Browse , then select the certificate file ( .cer or .crt) to upload.3.Click Upload .PGP (Encryption & Decryption) 1.Select a certificate category.Pretty Good Privacy (PGP) provides cryptographic privacy and authentication for communication.PGP is used for signing, encrypting, and decrypting files.
i.Click Browse , then select the keystore file ( .jks) to upload.ii.Enter the comma-separated list of passwords corresponding to key aliases.Note: When an identity certificate file (JKS) contains more than one private key, all the private keys must have the same password.If the private keys are protected with different passwords, the private keys cannot be extracted from the keystore.iii.Enter the password of the keystore being imported.c.Click Upload .SAML (Authentication & Authorization) 1.Note that Message Protection is automatically selected as the only available certificate category and cannot be deselected.Use this option to upload a keystoreChapter 2 Upload an SSL Certificate 2-10certificate with SAML token support.Create, read, update, and delete (CRUD) operations are supported with this type of certificate.2.Click Browse , then select the certificate file ( .cer or .crt) to upload.3.Click Upload .PGP (Encryption & Decryption) 1.Select a certificate category.Pretty Good Privacy (PGP) provides cryptographic privacy and authentication for communication.PGP is used for signing, encrypting, and decrypting files.You can select the private key to use for encryption or decryption when configuring the stage file action.
ii.Enter the comma-separated list of passwords corresponding to key aliases.Note: When an identity certificate file (JKS) contains more than one private key, all the private keys must have the same password.If the private keys are protected with different passwords, the private keys cannot be extracted from the keystore.iii.Enter the password of the keystore being imported.c.Click Upload .SAML (Authentication & Authorization) 1.Note that Message Protection is automatically selected as the only available certificate category and cannot be deselected.Use this option to upload a keystoreChapter 2 Upload an SSL Certificate 2-10certificate with SAML token support.Create, read, update, and delete (CRUD) operations are supported with this type of certificate.2.Click Browse , then select the certificate file ( .cer or .crt) to upload.3.Click Upload .PGP (Encryption & Decryption) 1.Select a certificate category.Pretty Good Privacy (PGP) provides cryptographic privacy and authentication for communication.PGP is used for signing, encrypting, and decrypting files.You can select the private key to use for encryption or decryption when configuring the stage file action.a.Private : Uses a private key of the target location to decrypt the file.
Note: When an identity certificate file (JKS) contains more than one private key, all the private keys must have the same password.If the private keys are protected with different passwords, the private keys cannot be extracted from the keystore.iii.Enter the password of the keystore being imported.c.Click Upload .SAML (Authentication & Authorization) 1.Note that Message Protection is automatically selected as the only available certificate category and cannot be deselected.Use this option to upload a keystoreChapter 2 Upload an SSL Certificate 2-10certificate with SAML token support.Create, read, update, and delete (CRUD) operations are supported with this type of certificate.2.Click Browse , then select the certificate file ( .cer or .crt) to upload.3.Click Upload .PGP (Encryption & Decryption) 1.Select a certificate category.Pretty Good Privacy (PGP) provides cryptographic privacy and authentication for communication.PGP is used for signing, encrypting, and decrypting files.You can select the private key to use for encryption or decryption when configuring the stage file action.a.Private : Uses a private key of the target location to decrypt the file.i.Click Browse , then select the PGP file to upload.
If the private keys are protected with different passwords, the private keys cannot be extracted from the keystore.iii.Enter the password of the keystore being imported.c.Click Upload .SAML (Authentication & Authorization) 1.Note that Message Protection is automatically selected as the only available certificate category and cannot be deselected.Use this option to upload a keystoreChapter 2 Upload an SSL Certificate 2-10certificate with SAML token support.Create, read, update, and delete (CRUD) operations are supported with this type of certificate.2.Click Browse , then select the certificate file ( .cer or .crt) to upload.3.Click Upload .PGP (Encryption & Decryption) 1.Select a certificate category.Pretty Good Privacy (PGP) provides cryptographic privacy and authentication for communication.PGP is used for signing, encrypting, and decrypting files.You can select the private key to use for encryption or decryption when configuring the stage file action.a.Private : Uses a private key of the target location to decrypt the file.i.Click Browse , then select the PGP file to upload.ii.Enter the PGP private key password.
iii.Enter the password of the keystore being imported.c.Click Upload .SAML (Authentication & Authorization) 1.Note that Message Protection is automatically selected as the only available certificate category and cannot be deselected.Use this option to upload a keystoreChapter 2 Upload an SSL Certificate 2-10certificate with SAML token support.Create, read, update, and delete (CRUD) operations are supported with this type of certificate.2.Click Browse , then select the certificate file ( .cer or .crt) to upload.3.Click Upload .PGP (Encryption & Decryption) 1.Select a certificate category.Pretty Good Privacy (PGP) provides cryptographic privacy and authentication for communication.PGP is used for signing, encrypting, and decrypting files.You can select the private key to use for encryption or decryption when configuring the stage file action.a.Private : Uses a private key of the target location to decrypt the file.i.Click Browse , then select the PGP file to upload.ii.Enter the PGP private key password.b.Public : Uses a public key of the target location to encrypt the file.
c.Click Upload .SAML (Authentication & Authorization) 1.Note that Message Protection is automatically selected as the only available certificate category and cannot be deselected.Use this option to upload a keystoreChapter 2 Upload an SSL Certificate 2-10certificate with SAML token support.Create, read, update, and delete (CRUD) operations are supported with this type of certificate.2.Click Browse , then select the certificate file ( .cer or .crt) to upload.3.Click Upload .PGP (Encryption & Decryption) 1.Select a certificate category.Pretty Good Privacy (PGP) provides cryptographic privacy and authentication for communication.PGP is used for signing, encrypting, and decrypting files.You can select the private key to use for encryption or decryption when configuring the stage file action.a.Private : Uses a private key of the target location to decrypt the file.i.Click Browse , then select the PGP file to upload.ii.Enter the PGP private key password.b.Public : Uses a public key of the target location to encrypt the file.i.Click Browse , then select the PGP file to upload.
SAML (Authentication & Authorization) 1.Note that Message Protection is automatically selected as the only available certificate category and cannot be deselected.Use this option to upload a keystoreChapter 2 Upload an SSL Certificate 2-10certificate with SAML token support.Create, read, update, and delete (CRUD) operations are supported with this type of certificate.2.Click Browse , then select the certificate file ( .cer or .crt) to upload.3.Click Upload .PGP (Encryption & Decryption) 1.Select a certificate category.Pretty Good Privacy (PGP) provides cryptographic privacy and authentication for communication.PGP is used for signing, encrypting, and decrypting files.You can select the private key to use for encryption or decryption when configuring the stage file action.a.Private : Uses a private key of the target location to decrypt the file.i.Click Browse , then select the PGP file to upload.ii.Enter the PGP private key password.b.Public : Uses a public key of the target location to encrypt the file.i.Click Browse , then select the PGP file to upload.ii.In the ASCII-Armor Encryption Format field, select Yes or No.
Use this option to upload a keystoreChapter 2 Upload an SSL Certificate 2-10certificate with SAML token support.Create, read, update, and delete (CRUD) operations are supported with this type of certificate.2.Click Browse , then select the certificate file ( .cer or .crt) to upload.3.Click Upload .PGP (Encryption & Decryption) 1.Select a certificate category.Pretty Good Privacy (PGP) provides cryptographic privacy and authentication for communication.PGP is used for signing, encrypting, and decrypting files.You can select the private key to use for encryption or decryption when configuring the stage file action.a.Private : Uses a private key of the target location to decrypt the file.i.Click Browse , then select the PGP file to upload.ii.Enter the PGP private key password.b.Public : Uses a public key of the target location to encrypt the file.i.Click Browse , then select the PGP file to upload.ii.In the ASCII-Armor Encryption Format field, select Yes or No.Yes shows the format of the encrypted message in ASCII armor.
Create, read, update, and delete (CRUD) operations are supported with this type of certificate.2.Click Browse , then select the certificate file ( .cer or .crt) to upload.3.Click Upload .PGP (Encryption & Decryption) 1.Select a certificate category.Pretty Good Privacy (PGP) provides cryptographic privacy and authentication for communication.PGP is used for signing, encrypting, and decrypting files.You can select the private key to use for encryption or decryption when configuring the stage file action.a.Private : Uses a private key of the target location to decrypt the file.i.Click Browse , then select the PGP file to upload.ii.Enter the PGP private key password.b.Public : Uses a public key of the target location to encrypt the file.i.Click Browse , then select the PGP file to upload.ii.In the ASCII-Armor Encryption Format field, select Yes or No.Yes shows the format of the encrypted message in ASCII armor.ASCII armor is a binary-to- textual encoding converter.
2.Click Browse , then select the certificate file ( .cer or .crt) to upload.3.Click Upload .PGP (Encryption & Decryption) 1.Select a certificate category.Pretty Good Privacy (PGP) provides cryptographic privacy and authentication for communication.PGP is used for signing, encrypting, and decrypting files.You can select the private key to use for encryption or decryption when configuring the stage file action.a.Private : Uses a private key of the target location to decrypt the file.i.Click Browse , then select the PGP file to upload.ii.Enter the PGP private key password.b.Public : Uses a public key of the target location to encrypt the file.i.Click Browse , then select the PGP file to upload.ii.In the ASCII-Armor Encryption Format field, select Yes or No.Yes shows the format of the encrypted message in ASCII armor.ASCII armor is a binary-to- textual encoding converter.ASCII armor formats encrypted messaging in ASCII.
3.Click Upload .PGP (Encryption & Decryption) 1.Select a certificate category.Pretty Good Privacy (PGP) provides cryptographic privacy and authentication for communication.PGP is used for signing, encrypting, and decrypting files.You can select the private key to use for encryption or decryption when configuring the stage file action.a.Private : Uses a private key of the target location to decrypt the file.i.Click Browse , then select the PGP file to upload.ii.Enter the PGP private key password.b.Public : Uses a public key of the target location to encrypt the file.i.Click Browse , then select the PGP file to upload.ii.In the ASCII-Armor Encryption Format field, select Yes or No.Yes shows the format of the encrypted message in ASCII armor.ASCII armor is a binary-to- textual encoding converter.ASCII armor formats encrypted messaging in ASCII.This enables messages to be sent in a standard messaging format.
PGP (Encryption & Decryption) 1.Select a certificate category.Pretty Good Privacy (PGP) provides cryptographic privacy and authentication for communication.PGP is used for signing, encrypting, and decrypting files.You can select the private key to use for encryption or decryption when configuring the stage file action.a.Private : Uses a private key of the target location to decrypt the file.i.Click Browse , then select the PGP file to upload.ii.Enter the PGP private key password.b.Public : Uses a public key of the target location to encrypt the file.i.Click Browse , then select the PGP file to upload.ii.In the ASCII-Armor Encryption Format field, select Yes or No.Yes shows the format of the encrypted message in ASCII armor.ASCII armor is a binary-to- textual encoding converter.ASCII armor formats encrypted messaging in ASCII.This enables messages to be sent in a standard messaging format.This selection impacts the visibility of message content.
Pretty Good Privacy (PGP) provides cryptographic privacy and authentication for communication.PGP is used for signing, encrypting, and decrypting files.You can select the private key to use for encryption or decryption when configuring the stage file action.a.Private : Uses a private key of the target location to decrypt the file.i.Click Browse , then select the PGP file to upload.ii.Enter the PGP private key password.b.Public : Uses a public key of the target location to encrypt the file.i.Click Browse , then select the PGP file to upload.ii.In the ASCII-Armor Encryption Format field, select Yes or No.Yes shows the format of the encrypted message in ASCII armor.ASCII armor is a binary-to- textual encoding converter.ASCII armor formats encrypted messaging in ASCII.This enables messages to be sent in a standard messaging format.This selection impacts the visibility of message content.No causes the message to be sent in binary format.
PGP is used for signing, encrypting, and decrypting files.You can select the private key to use for encryption or decryption when configuring the stage file action.a.Private : Uses a private key of the target location to decrypt the file.i.Click Browse , then select the PGP file to upload.ii.Enter the PGP private key password.b.Public : Uses a public key of the target location to encrypt the file.i.Click Browse , then select the PGP file to upload.ii.In the ASCII-Armor Encryption Format field, select Yes or No.Yes shows the format of the encrypted message in ASCII armor.ASCII armor is a binary-to- textual encoding converter.ASCII armor formats encrypted messaging in ASCII.This enables messages to be sent in a standard messaging format.This selection impacts the visibility of message content.No causes the message to be sent in binary format.iii.From the Cipher Algorithm list, select the algorithm to use.
You can select the private key to use for encryption or decryption when configuring the stage file action.a.Private : Uses a private key of the target location to decrypt the file.i.Click Browse , then select the PGP file to upload.ii.Enter the PGP private key password.b.Public : Uses a public key of the target location to encrypt the file.i.Click Browse , then select the PGP file to upload.ii.In the ASCII-Armor Encryption Format field, select Yes or No.Yes shows the format of the encrypted message in ASCII armor.ASCII armor is a binary-to- textual encoding converter.ASCII armor formats encrypted messaging in ASCII.This enables messages to be sent in a standard messaging format.This selection impacts the visibility of message content.No causes the message to be sent in binary format.iii.From the Cipher Algorithm list, select the algorithm to use.Symmetric-key algorithms for cryptography use the same cryptographic keys for both encryption of plain text and decryption of cipher text.
a.Private : Uses a private key of the target location to decrypt the file.i.Click Browse , then select the PGP file to upload.ii.Enter the PGP private key password.b.Public : Uses a public key of the target location to encrypt the file.i.Click Browse , then select the PGP file to upload.ii.In the ASCII-Armor Encryption Format field, select Yes or No.Yes shows the format of the encrypted message in ASCII armor.ASCII armor is a binary-to- textual encoding converter.ASCII armor formats encrypted messaging in ASCII.This enables messages to be sent in a standard messaging format.This selection impacts the visibility of message content.No causes the message to be sent in binary format.iii.From the Cipher Algorithm list, select the algorithm to use.Symmetric-key algorithms for cryptography use the same cryptographic keys for both encryption of plain text and decryption of cipher text.c.Click Upload .Chapter 2 Upload an SSL Certificate 2-113 Add the SAP Ariba Adapter Connection to an Integration When you drag the SAP Ariba Adapter into the trigger or invoke area of an integration, the Adapter Endpoint Configuration Wizard appears.
i.Click Browse , then select the PGP file to upload.ii.Enter the PGP private key password.b.Public : Uses a public key of the target location to encrypt the file.i.Click Browse , then select the PGP file to upload.ii.In the ASCII-Armor Encryption Format field, select Yes or No.Yes shows the format of the encrypted message in ASCII armor.ASCII armor is a binary-to- textual encoding converter.ASCII armor formats encrypted messaging in ASCII.This enables messages to be sent in a standard messaging format.This selection impacts the visibility of message content.No causes the message to be sent in binary format.iii.From the Cipher Algorithm list, select the algorithm to use.Symmetric-key algorithms for cryptography use the same cryptographic keys for both encryption of plain text and decryption of cipher text.c.Click Upload .Chapter 2 Upload an SSL Certificate 2-113 Add the SAP Ariba Adapter Connection to an Integration When you drag the SAP Ariba Adapter into the trigger or invoke area of an integration, the Adapter Endpoint Configuration Wizard appears.This wizard guides you through configuration of theSAP Ariba Adapter endpoint properties.
ii.Enter the PGP private key password.b.Public : Uses a public key of the target location to encrypt the file.i.Click Browse , then select the PGP file to upload.ii.In the ASCII-Armor Encryption Format field, select Yes or No.Yes shows the format of the encrypted message in ASCII armor.ASCII armor is a binary-to- textual encoding converter.ASCII armor formats encrypted messaging in ASCII.This enables messages to be sent in a standard messaging format.This selection impacts the visibility of message content.No causes the message to be sent in binary format.iii.From the Cipher Algorithm list, select the algorithm to use.Symmetric-key algorithms for cryptography use the same cryptographic keys for both encryption of plain text and decryption of cipher text.c.Click Upload .Chapter 2 Upload an SSL Certificate 2-113 Add the SAP Ariba Adapter Connection to an Integration When you drag the SAP Ariba Adapter into the trigger or invoke area of an integration, the Adapter Endpoint Configuration Wizard appears.This wizard guides you through configuration of theSAP Ariba Adapter endpoint properties.These topics describe the wizard pages that guide you through configuration of the SAP Ariba Adapter as a trigger or invoke in an integration.
b.Public : Uses a public key of the target location to encrypt the file.i.Click Browse , then select the PGP file to upload.ii.In the ASCII-Armor Encryption Format field, select Yes or No.Yes shows the format of the encrypted message in ASCII armor.ASCII armor is a binary-to- textual encoding converter.ASCII armor formats encrypted messaging in ASCII.This enables messages to be sent in a standard messaging format.This selection impacts the visibility of message content.No causes the message to be sent in binary format.iii.From the Cipher Algorithm list, select the algorithm to use.Symmetric-key algorithms for cryptography use the same cryptographic keys for both encryption of plain text and decryption of cipher text.c.Click Upload .Chapter 2 Upload an SSL Certificate 2-113 Add the SAP Ariba Adapter Connection to an Integration When you drag the SAP Ariba Adapter into the trigger or invoke area of an integration, the Adapter Endpoint Configuration Wizard appears.This wizard guides you through configuration of theSAP Ariba Adapter endpoint properties.These topics describe the wizard pages that guide you through configuration of the SAP Ariba Adapter as a trigger or invoke in an integration.The SAP Ariba Adapter task/event- based connection can be used as an invoke in an integration.
i.Click Browse , then select the PGP file to upload.ii.In the ASCII-Armor Encryption Format field, select Yes or No.Yes shows the format of the encrypted message in ASCII armor.ASCII armor is a binary-to- textual encoding converter.ASCII armor formats encrypted messaging in ASCII.This enables messages to be sent in a standard messaging format.This selection impacts the visibility of message content.No causes the message to be sent in binary format.iii.From the Cipher Algorithm list, select the algorithm to use.Symmetric-key algorithms for cryptography use the same cryptographic keys for both encryption of plain text and decryption of cipher text.c.Click Upload .Chapter 2 Upload an SSL Certificate 2-113 Add the SAP Ariba Adapter Connection to an Integration When you drag the SAP Ariba Adapter into the trigger or invoke area of an integration, the Adapter Endpoint Configuration Wizard appears.This wizard guides you through configuration of theSAP Ariba Adapter endpoint properties.These topics describe the wizard pages that guide you through configuration of the SAP Ariba Adapter as a trigger or invoke in an integration.The SAP Ariba Adapter task/event- based connection can be used as an invoke in an integration.The SAP Ariba Adapter web services connection can be used as a trigger and invoke in an integration.
ii.In the ASCII-Armor Encryption Format field, select Yes or No.Yes shows the format of the encrypted message in ASCII armor.ASCII armor is a binary-to- textual encoding converter.ASCII armor formats encrypted messaging in ASCII.This enables messages to be sent in a standard messaging format.This selection impacts the visibility of message content.No causes the message to be sent in binary format.iii.From the Cipher Algorithm list, select the algorithm to use.Symmetric-key algorithms for cryptography use the same cryptographic keys for both encryption of plain text and decryption of cipher text.c.Click Upload .Chapter 2 Upload an SSL Certificate 2-113 Add the SAP Ariba Adapter Connection to an Integration When you drag the SAP Ariba Adapter into the trigger or invoke area of an integration, the Adapter Endpoint Configuration Wizard appears.This wizard guides you through configuration of theSAP Ariba Adapter endpoint properties.These topics describe the wizard pages that guide you through configuration of the SAP Ariba Adapter as a trigger or invoke in an integration.The SAP Ariba Adapter task/event- based connection can be used as an invoke in an integration.The SAP Ariba Adapter web services connection can be used as a trigger and invoke in an integration.Topics: Basic Info Page Trigger Operations Page - Ariba Web Services Method Invoke Operations Page - Ariba Web Services Method Invoke Service Options Page - Ariba Task/Event-Based Method Invoke Operation Page - Ariba Task/Event-Based Method Invoke Task Operation Mappings Page - Ariba Task/Event-Based Method Summary Page Summary Page - Ariba Task/Event-Based Method Perform SAP Ariba Adapter Postconfiguration Tasks Basic Info Page You can enter a name and description on the Basic Info page of each adapter in your integration.
Yes shows the format of the encrypted message in ASCII armor.ASCII armor is a binary-to- textual encoding converter.ASCII armor formats encrypted messaging in ASCII.This enables messages to be sent in a standard messaging format.This selection impacts the visibility of message content.No causes the message to be sent in binary format.iii.From the Cipher Algorithm list, select the algorithm to use.Symmetric-key algorithms for cryptography use the same cryptographic keys for both encryption of plain text and decryption of cipher text.c.Click Upload .Chapter 2 Upload an SSL Certificate 2-113 Add the SAP Ariba Adapter Connection to an Integration When you drag the SAP Ariba Adapter into the trigger or invoke area of an integration, the Adapter Endpoint Configuration Wizard appears.This wizard guides you through configuration of theSAP Ariba Adapter endpoint properties.These topics describe the wizard pages that guide you through configuration of the SAP Ariba Adapter as a trigger or invoke in an integration.The SAP Ariba Adapter task/event- based connection can be used as an invoke in an integration.The SAP Ariba Adapter web services connection can be used as a trigger and invoke in an integration.Topics: Basic Info Page Trigger Operations Page - Ariba Web Services Method Invoke Operations Page - Ariba Web Services Method Invoke Service Options Page - Ariba Task/Event-Based Method Invoke Operation Page - Ariba Task/Event-Based Method Invoke Task Operation Mappings Page - Ariba Task/Event-Based Method Summary Page Summary Page - Ariba Task/Event-Based Method Perform SAP Ariba Adapter Postconfiguration Tasks Basic Info Page You can enter a name and description on the Basic Info page of each adapter in your integration.Element Description What do you want to call your endpoint?Provide a meaningful name so that others can understand the responsibilities of this connection.
ASCII armor is a binary-to- textual encoding converter.ASCII armor formats encrypted messaging in ASCII.This enables messages to be sent in a standard messaging format.This selection impacts the visibility of message content.No causes the message to be sent in binary format.iii.From the Cipher Algorithm list, select the algorithm to use.Symmetric-key algorithms for cryptography use the same cryptographic keys for both encryption of plain text and decryption of cipher text.c.Click Upload .Chapter 2 Upload an SSL Certificate 2-113 Add the SAP Ariba Adapter Connection to an Integration When you drag the SAP Ariba Adapter into the trigger or invoke area of an integration, the Adapter Endpoint Configuration Wizard appears.This wizard guides you through configuration of theSAP Ariba Adapter endpoint properties.These topics describe the wizard pages that guide you through configuration of the SAP Ariba Adapter as a trigger or invoke in an integration.The SAP Ariba Adapter task/event- based connection can be used as an invoke in an integration.The SAP Ariba Adapter web services connection can be used as a trigger and invoke in an integration.Topics: Basic Info Page Trigger Operations Page - Ariba Web Services Method Invoke Operations Page - Ariba Web Services Method Invoke Service Options Page - Ariba Task/Event-Based Method Invoke Operation Page - Ariba Task/Event-Based Method Invoke Task Operation Mappings Page - Ariba Task/Event-Based Method Summary Page Summary Page - Ariba Task/Event-Based Method Perform SAP Ariba Adapter Postconfiguration Tasks Basic Info Page You can enter a name and description on the Basic Info page of each adapter in your integration.Element Description What do you want to call your endpoint?Provide a meaningful name so that others can understand the responsibilities of this connection.You can include English alphabetic characters, numbers, underscores, and hyphens in the name.
ASCII armor formats encrypted messaging in ASCII.This enables messages to be sent in a standard messaging format.This selection impacts the visibility of message content.No causes the message to be sent in binary format.iii.From the Cipher Algorithm list, select the algorithm to use.Symmetric-key algorithms for cryptography use the same cryptographic keys for both encryption of plain text and decryption of cipher text.c.Click Upload .Chapter 2 Upload an SSL Certificate 2-113 Add the SAP Ariba Adapter Connection to an Integration When you drag the SAP Ariba Adapter into the trigger or invoke area of an integration, the Adapter Endpoint Configuration Wizard appears.This wizard guides you through configuration of theSAP Ariba Adapter endpoint properties.These topics describe the wizard pages that guide you through configuration of the SAP Ariba Adapter as a trigger or invoke in an integration.The SAP Ariba Adapter task/event- based connection can be used as an invoke in an integration.The SAP Ariba Adapter web services connection can be used as a trigger and invoke in an integration.Topics: Basic Info Page Trigger Operations Page - Ariba Web Services Method Invoke Operations Page - Ariba Web Services Method Invoke Service Options Page - Ariba Task/Event-Based Method Invoke Operation Page - Ariba Task/Event-Based Method Invoke Task Operation Mappings Page - Ariba Task/Event-Based Method Summary Page Summary Page - Ariba Task/Event-Based Method Perform SAP Ariba Adapter Postconfiguration Tasks Basic Info Page You can enter a name and description on the Basic Info page of each adapter in your integration.Element Description What do you want to call your endpoint?Provide a meaningful name so that others can understand the responsibilities of this connection.You can include English alphabetic characters, numbers, underscores, and hyphens in the name.You cant include the following characters: No blank spaces (for example, My Inbound Connection ) No special characters (for example, #;83& or righ(t)now4 ) except underscores and hyphens No multibyte characters What does this endpoint do?Enter an optional description of the connection's responsibilities.
This enables messages to be sent in a standard messaging format.This selection impacts the visibility of message content.No causes the message to be sent in binary format.iii.From the Cipher Algorithm list, select the algorithm to use.Symmetric-key algorithms for cryptography use the same cryptographic keys for both encryption of plain text and decryption of cipher text.c.Click Upload .Chapter 2 Upload an SSL Certificate 2-113 Add the SAP Ariba Adapter Connection to an Integration When you drag the SAP Ariba Adapter into the trigger or invoke area of an integration, the Adapter Endpoint Configuration Wizard appears.This wizard guides you through configuration of theSAP Ariba Adapter endpoint properties.These topics describe the wizard pages that guide you through configuration of the SAP Ariba Adapter as a trigger or invoke in an integration.The SAP Ariba Adapter task/event- based connection can be used as an invoke in an integration.The SAP Ariba Adapter web services connection can be used as a trigger and invoke in an integration.Topics: Basic Info Page Trigger Operations Page - Ariba Web Services Method Invoke Operations Page - Ariba Web Services Method Invoke Service Options Page - Ariba Task/Event-Based Method Invoke Operation Page - Ariba Task/Event-Based Method Invoke Task Operation Mappings Page - Ariba Task/Event-Based Method Summary Page Summary Page - Ariba Task/Event-Based Method Perform SAP Ariba Adapter Postconfiguration Tasks Basic Info Page You can enter a name and description on the Basic Info page of each adapter in your integration.Element Description What do you want to call your endpoint?Provide a meaningful name so that others can understand the responsibilities of this connection.You can include English alphabetic characters, numbers, underscores, and hyphens in the name.You cant include the following characters: No blank spaces (for example, My Inbound Connection ) No special characters (for example, #;83& or righ(t)now4 ) except underscores and hyphens No multibyte characters What does this endpoint do?Enter an optional description of the connection's responsibilities.For example: This connection receives an inbound request to synchronize account information with the cloud application.
This selection impacts the visibility of message content.No causes the message to be sent in binary format.iii.From the Cipher Algorithm list, select the algorithm to use.Symmetric-key algorithms for cryptography use the same cryptographic keys for both encryption of plain text and decryption of cipher text.c.Click Upload .Chapter 2 Upload an SSL Certificate 2-113 Add the SAP Ariba Adapter Connection to an Integration When you drag the SAP Ariba Adapter into the trigger or invoke area of an integration, the Adapter Endpoint Configuration Wizard appears.This wizard guides you through configuration of theSAP Ariba Adapter endpoint properties.These topics describe the wizard pages that guide you through configuration of the SAP Ariba Adapter as a trigger or invoke in an integration.The SAP Ariba Adapter task/event- based connection can be used as an invoke in an integration.The SAP Ariba Adapter web services connection can be used as a trigger and invoke in an integration.Topics: Basic Info Page Trigger Operations Page - Ariba Web Services Method Invoke Operations Page - Ariba Web Services Method Invoke Service Options Page - Ariba Task/Event-Based Method Invoke Operation Page - Ariba Task/Event-Based Method Invoke Task Operation Mappings Page - Ariba Task/Event-Based Method Summary Page Summary Page - Ariba Task/Event-Based Method Perform SAP Ariba Adapter Postconfiguration Tasks Basic Info Page You can enter a name and description on the Basic Info page of each adapter in your integration.Element Description What do you want to call your endpoint?Provide a meaningful name so that others can understand the responsibilities of this connection.You can include English alphabetic characters, numbers, underscores, and hyphens in the name.You cant include the following characters: No blank spaces (for example, My Inbound Connection ) No special characters (for example, #;83& or righ(t)now4 ) except underscores and hyphens No multibyte characters What does this endpoint do?Enter an optional description of the connection's responsibilities.For example: This connection receives an inbound request to synchronize account information with the cloud application.3-1Trigger Operations Page - Ariba Web Services Method Select the SAP Ariba event operation to which to subscribe.
No causes the message to be sent in binary format.iii.From the Cipher Algorithm list, select the algorithm to use.Symmetric-key algorithms for cryptography use the same cryptographic keys for both encryption of plain text and decryption of cipher text.c.Click Upload .Chapter 2 Upload an SSL Certificate 2-113 Add the SAP Ariba Adapter Connection to an Integration When you drag the SAP Ariba Adapter into the trigger or invoke area of an integration, the Adapter Endpoint Configuration Wizard appears.This wizard guides you through configuration of theSAP Ariba Adapter endpoint properties.These topics describe the wizard pages that guide you through configuration of the SAP Ariba Adapter as a trigger or invoke in an integration.The SAP Ariba Adapter task/event- based connection can be used as an invoke in an integration.The SAP Ariba Adapter web services connection can be used as a trigger and invoke in an integration.Topics: Basic Info Page Trigger Operations Page - Ariba Web Services Method Invoke Operations Page - Ariba Web Services Method Invoke Service Options Page - Ariba Task/Event-Based Method Invoke Operation Page - Ariba Task/Event-Based Method Invoke Task Operation Mappings Page - Ariba Task/Event-Based Method Summary Page Summary Page - Ariba Task/Event-Based Method Perform SAP Ariba Adapter Postconfiguration Tasks Basic Info Page You can enter a name and description on the Basic Info page of each adapter in your integration.Element Description What do you want to call your endpoint?Provide a meaningful name so that others can understand the responsibilities of this connection.You can include English alphabetic characters, numbers, underscores, and hyphens in the name.You cant include the following characters: No blank spaces (for example, My Inbound Connection ) No special characters (for example, #;83& or righ(t)now4 ) except underscores and hyphens No multibyte characters What does this endpoint do?Enter an optional description of the connection's responsibilities.For example: This connection receives an inbound request to synchronize account information with the cloud application.3-1Trigger Operations Page - Ariba Web Services Method Select the SAP Ariba event operation to which to subscribe.Element Description Ariba Solution Identifies the SAP Ariba application type on which the operation is executed.
iii.From the Cipher Algorithm list, select the algorithm to use.Symmetric-key algorithms for cryptography use the same cryptographic keys for both encryption of plain text and decryption of cipher text.c.Click Upload .Chapter 2 Upload an SSL Certificate 2-113 Add the SAP Ariba Adapter Connection to an Integration When you drag the SAP Ariba Adapter into the trigger or invoke area of an integration, the Adapter Endpoint Configuration Wizard appears.This wizard guides you through configuration of theSAP Ariba Adapter endpoint properties.These topics describe the wizard pages that guide you through configuration of the SAP Ariba Adapter as a trigger or invoke in an integration.The SAP Ariba Adapter task/event- based connection can be used as an invoke in an integration.The SAP Ariba Adapter web services connection can be used as a trigger and invoke in an integration.Topics: Basic Info Page Trigger Operations Page - Ariba Web Services Method Invoke Operations Page - Ariba Web Services Method Invoke Service Options Page - Ariba Task/Event-Based Method Invoke Operation Page - Ariba Task/Event-Based Method Invoke Task Operation Mappings Page - Ariba Task/Event-Based Method Summary Page Summary Page - Ariba Task/Event-Based Method Perform SAP Ariba Adapter Postconfiguration Tasks Basic Info Page You can enter a name and description on the Basic Info page of each adapter in your integration.Element Description What do you want to call your endpoint?Provide a meaningful name so that others can understand the responsibilities of this connection.You can include English alphabetic characters, numbers, underscores, and hyphens in the name.You cant include the following characters: No blank spaces (for example, My Inbound Connection ) No special characters (for example, #;83& or righ(t)now4 ) except underscores and hyphens No multibyte characters What does this endpoint do?Enter an optional description of the connection's responsibilities.For example: This connection receives an inbound request to synchronize account information with the cloud application.3-1Trigger Operations Page - Ariba Web Services Method Select the SAP Ariba event operation to which to subscribe.Element Description Ariba Solution Identifies the SAP Ariba application type on which the operation is executed.Operation Select the event operation to which to subscribe.
Symmetric-key algorithms for cryptography use the same cryptographic keys for both encryption of plain text and decryption of cipher text.c.Click Upload .Chapter 2 Upload an SSL Certificate 2-113 Add the SAP Ariba Adapter Connection to an Integration When you drag the SAP Ariba Adapter into the trigger or invoke area of an integration, the Adapter Endpoint Configuration Wizard appears.This wizard guides you through configuration of theSAP Ariba Adapter endpoint properties.These topics describe the wizard pages that guide you through configuration of the SAP Ariba Adapter as a trigger or invoke in an integration.The SAP Ariba Adapter task/event- based connection can be used as an invoke in an integration.The SAP Ariba Adapter web services connection can be used as a trigger and invoke in an integration.Topics: Basic Info Page Trigger Operations Page - Ariba Web Services Method Invoke Operations Page - Ariba Web Services Method Invoke Service Options Page - Ariba Task/Event-Based Method Invoke Operation Page - Ariba Task/Event-Based Method Invoke Task Operation Mappings Page - Ariba Task/Event-Based Method Summary Page Summary Page - Ariba Task/Event-Based Method Perform SAP Ariba Adapter Postconfiguration Tasks Basic Info Page You can enter a name and description on the Basic Info page of each adapter in your integration.Element Description What do you want to call your endpoint?Provide a meaningful name so that others can understand the responsibilities of this connection.You can include English alphabetic characters, numbers, underscores, and hyphens in the name.You cant include the following characters: No blank spaces (for example, My Inbound Connection ) No special characters (for example, #;83& or righ(t)now4 ) except underscores and hyphens No multibyte characters What does this endpoint do?Enter an optional description of the connection's responsibilities.For example: This connection receives an inbound request to synchronize account information with the cloud application.3-1Trigger Operations Page - Ariba Web Services Method Select the SAP Ariba event operation to which to subscribe.Element Description Ariba Solution Identifies the SAP Ariba application type on which the operation is executed.Operation Select the event operation to which to subscribe.A use case is provided for this operation.
c.Click Upload .Chapter 2 Upload an SSL Certificate 2-113 Add the SAP Ariba Adapter Connection to an Integration When you drag the SAP Ariba Adapter into the trigger or invoke area of an integration, the Adapter Endpoint Configuration Wizard appears.This wizard guides you through configuration of theSAP Ariba Adapter endpoint properties.These topics describe the wizard pages that guide you through configuration of the SAP Ariba Adapter as a trigger or invoke in an integration.The SAP Ariba Adapter task/event- based connection can be used as an invoke in an integration.The SAP Ariba Adapter web services connection can be used as a trigger and invoke in an integration.Topics: Basic Info Page Trigger Operations Page - Ariba Web Services Method Invoke Operations Page - Ariba Web Services Method Invoke Service Options Page - Ariba Task/Event-Based Method Invoke Operation Page - Ariba Task/Event-Based Method Invoke Task Operation Mappings Page - Ariba Task/Event-Based Method Summary Page Summary Page - Ariba Task/Event-Based Method Perform SAP Ariba Adapter Postconfiguration Tasks Basic Info Page You can enter a name and description on the Basic Info page of each adapter in your integration.Element Description What do you want to call your endpoint?Provide a meaningful name so that others can understand the responsibilities of this connection.You can include English alphabetic characters, numbers, underscores, and hyphens in the name.You cant include the following characters: No blank spaces (for example, My Inbound Connection ) No special characters (for example, #;83& or righ(t)now4 ) except underscores and hyphens No multibyte characters What does this endpoint do?Enter an optional description of the connection's responsibilities.For example: This connection receives an inbound request to synchronize account information with the cloud application.3-1Trigger Operations Page - Ariba Web Services Method Select the SAP Ariba event operation to which to subscribe.Element Description Ariba Solution Identifies the SAP Ariba application type on which the operation is executed.Operation Select the event operation to which to subscribe.A use case is provided for this operation.See Subscribe to Incoming Events with an SAP Ariba Adapter Connection .
This wizard guides you through configuration of theSAP Ariba Adapter endpoint properties.These topics describe the wizard pages that guide you through configuration of the SAP Ariba Adapter as a trigger or invoke in an integration.The SAP Ariba Adapter task/event- based connection can be used as an invoke in an integration.The SAP Ariba Adapter web services connection can be used as a trigger and invoke in an integration.Topics: Basic Info Page Trigger Operations Page - Ariba Web Services Method Invoke Operations Page - Ariba Web Services Method Invoke Service Options Page - Ariba Task/Event-Based Method Invoke Operation Page - Ariba Task/Event-Based Method Invoke Task Operation Mappings Page - Ariba Task/Event-Based Method Summary Page Summary Page - Ariba Task/Event-Based Method Perform SAP Ariba Adapter Postconfiguration Tasks Basic Info Page You can enter a name and description on the Basic Info page of each adapter in your integration.Element Description What do you want to call your endpoint?Provide a meaningful name so that others can understand the responsibilities of this connection.You can include English alphabetic characters, numbers, underscores, and hyphens in the name.You cant include the following characters: No blank spaces (for example, My Inbound Connection ) No special characters (for example, #;83& or righ(t)now4 ) except underscores and hyphens No multibyte characters What does this endpoint do?Enter an optional description of the connection's responsibilities.For example: This connection receives an inbound request to synchronize account information with the cloud application.3-1Trigger Operations Page - Ariba Web Services Method Select the SAP Ariba event operation to which to subscribe.Element Description Ariba Solution Identifies the SAP Ariba application type on which the operation is executed.Operation Select the event operation to which to subscribe.A use case is provided for this operation.See Subscribe to Incoming Events with an SAP Ariba Adapter Connection .Description Provides a description of the selected event operation.
These topics describe the wizard pages that guide you through configuration of the SAP Ariba Adapter as a trigger or invoke in an integration.The SAP Ariba Adapter task/event- based connection can be used as an invoke in an integration.The SAP Ariba Adapter web services connection can be used as a trigger and invoke in an integration.Topics: Basic Info Page Trigger Operations Page - Ariba Web Services Method Invoke Operations Page - Ariba Web Services Method Invoke Service Options Page - Ariba Task/Event-Based Method Invoke Operation Page - Ariba Task/Event-Based Method Invoke Task Operation Mappings Page - Ariba Task/Event-Based Method Summary Page Summary Page - Ariba Task/Event-Based Method Perform SAP Ariba Adapter Postconfiguration Tasks Basic Info Page You can enter a name and description on the Basic Info page of each adapter in your integration.Element Description What do you want to call your endpoint?Provide a meaningful name so that others can understand the responsibilities of this connection.You can include English alphabetic characters, numbers, underscores, and hyphens in the name.You cant include the following characters: No blank spaces (for example, My Inbound Connection ) No special characters (for example, #;83& or righ(t)now4 ) except underscores and hyphens No multibyte characters What does this endpoint do?Enter an optional description of the connection's responsibilities.For example: This connection receives an inbound request to synchronize account information with the cloud application.3-1Trigger Operations Page - Ariba Web Services Method Select the SAP Ariba event operation to which to subscribe.Element Description Ariba Solution Identifies the SAP Ariba application type on which the operation is executed.Operation Select the event operation to which to subscribe.A use case is provided for this operation.See Subscribe to Incoming Events with an SAP Ariba Adapter Connection .Description Provides a description of the selected event operation.Invoke Operations Page - Ariba Web Services Method Enter the SAP Ariba Adapter invoke operation values for your integration.
The SAP Ariba Adapter task/event- based connection can be used as an invoke in an integration.The SAP Ariba Adapter web services connection can be used as a trigger and invoke in an integration.Topics: Basic Info Page Trigger Operations Page - Ariba Web Services Method Invoke Operations Page - Ariba Web Services Method Invoke Service Options Page - Ariba Task/Event-Based Method Invoke Operation Page - Ariba Task/Event-Based Method Invoke Task Operation Mappings Page - Ariba Task/Event-Based Method Summary Page Summary Page - Ariba Task/Event-Based Method Perform SAP Ariba Adapter Postconfiguration Tasks Basic Info Page You can enter a name and description on the Basic Info page of each adapter in your integration.Element Description What do you want to call your endpoint?Provide a meaningful name so that others can understand the responsibilities of this connection.You can include English alphabetic characters, numbers, underscores, and hyphens in the name.You cant include the following characters: No blank spaces (for example, My Inbound Connection ) No special characters (for example, #;83& or righ(t)now4 ) except underscores and hyphens No multibyte characters What does this endpoint do?Enter an optional description of the connection's responsibilities.For example: This connection receives an inbound request to synchronize account information with the cloud application.3-1Trigger Operations Page - Ariba Web Services Method Select the SAP Ariba event operation to which to subscribe.Element Description Ariba Solution Identifies the SAP Ariba application type on which the operation is executed.Operation Select the event operation to which to subscribe.A use case is provided for this operation.See Subscribe to Incoming Events with an SAP Ariba Adapter Connection .Description Provides a description of the selected event operation.Invoke Operations Page - Ariba Web Services Method Enter the SAP Ariba Adapter invoke operation values for your integration.Element Description Ariba Solution Identifies the SAP Ariba application type on which the operation is executed.
The SAP Ariba Adapter web services connection can be used as a trigger and invoke in an integration.Topics: Basic Info Page Trigger Operations Page - Ariba Web Services Method Invoke Operations Page - Ariba Web Services Method Invoke Service Options Page - Ariba Task/Event-Based Method Invoke Operation Page - Ariba Task/Event-Based Method Invoke Task Operation Mappings Page - Ariba Task/Event-Based Method Summary Page Summary Page - Ariba Task/Event-Based Method Perform SAP Ariba Adapter Postconfiguration Tasks Basic Info Page You can enter a name and description on the Basic Info page of each adapter in your integration.Element Description What do you want to call your endpoint?Provide a meaningful name so that others can understand the responsibilities of this connection.You can include English alphabetic characters, numbers, underscores, and hyphens in the name.You cant include the following characters: No blank spaces (for example, My Inbound Connection ) No special characters (for example, #;83& or righ(t)now4 ) except underscores and hyphens No multibyte characters What does this endpoint do?Enter an optional description of the connection's responsibilities.For example: This connection receives an inbound request to synchronize account information with the cloud application.3-1Trigger Operations Page - Ariba Web Services Method Select the SAP Ariba event operation to which to subscribe.Element Description Ariba Solution Identifies the SAP Ariba application type on which the operation is executed.Operation Select the event operation to which to subscribe.A use case is provided for this operation.See Subscribe to Incoming Events with an SAP Ariba Adapter Connection .Description Provides a description of the selected event operation.Invoke Operations Page - Ariba Web Services Method Enter the SAP Ariba Adapter invoke operation values for your integration.Element Description Ariba Solution Identifies the SAP Ariba application type on which the operation is executed.Operations Select the API operation to perform in the SAP Ariba application.
Topics: Basic Info Page Trigger Operations Page - Ariba Web Services Method Invoke Operations Page - Ariba Web Services Method Invoke Service Options Page - Ariba Task/Event-Based Method Invoke Operation Page - Ariba Task/Event-Based Method Invoke Task Operation Mappings Page - Ariba Task/Event-Based Method Summary Page Summary Page - Ariba Task/Event-Based Method Perform SAP Ariba Adapter Postconfiguration Tasks Basic Info Page You can enter a name and description on the Basic Info page of each adapter in your integration.Element Description What do you want to call your endpoint?Provide a meaningful name so that others can understand the responsibilities of this connection.You can include English alphabetic characters, numbers, underscores, and hyphens in the name.You cant include the following characters: No blank spaces (for example, My Inbound Connection ) No special characters (for example, #;83& or righ(t)now4 ) except underscores and hyphens No multibyte characters What does this endpoint do?Enter an optional description of the connection's responsibilities.For example: This connection receives an inbound request to synchronize account information with the cloud application.3-1Trigger Operations Page - Ariba Web Services Method Select the SAP Ariba event operation to which to subscribe.Element Description Ariba Solution Identifies the SAP Ariba application type on which the operation is executed.Operation Select the event operation to which to subscribe.A use case is provided for this operation.See Subscribe to Incoming Events with an SAP Ariba Adapter Connection .Description Provides a description of the selected event operation.Invoke Operations Page - Ariba Web Services Method Enter the SAP Ariba Adapter invoke operation values for your integration.Element Description Ariba Solution Identifies the SAP Ariba application type on which the operation is executed.Operations Select the API operation to perform in the SAP Ariba application.Examples of available operations are as follows: Create Suppliers Imports supplier information from an external application into SAP Ariba.
Element Description What do you want to call your endpoint?Provide a meaningful name so that others can understand the responsibilities of this connection.You can include English alphabetic characters, numbers, underscores, and hyphens in the name.You cant include the following characters: No blank spaces (for example, My Inbound Connection ) No special characters (for example, #;83& or righ(t)now4 ) except underscores and hyphens No multibyte characters What does this endpoint do?Enter an optional description of the connection's responsibilities.For example: This connection receives an inbound request to synchronize account information with the cloud application.3-1Trigger Operations Page - Ariba Web Services Method Select the SAP Ariba event operation to which to subscribe.Element Description Ariba Solution Identifies the SAP Ariba application type on which the operation is executed.Operation Select the event operation to which to subscribe.A use case is provided for this operation.See Subscribe to Incoming Events with an SAP Ariba Adapter Connection .Description Provides a description of the selected event operation.Invoke Operations Page - Ariba Web Services Method Enter the SAP Ariba Adapter invoke operation values for your integration.Element Description Ariba Solution Identifies the SAP Ariba application type on which the operation is executed.Operations Select the API operation to perform in the SAP Ariba application.Examples of available operations are as follows: Create Suppliers Imports supplier information from an external application into SAP Ariba.Create Remittance Returns the amount paid to suppliers for each invoice.
You can include English alphabetic characters, numbers, underscores, and hyphens in the name.You cant include the following characters: No blank spaces (for example, My Inbound Connection ) No special characters (for example, #;83& or righ(t)now4 ) except underscores and hyphens No multibyte characters What does this endpoint do?Enter an optional description of the connection's responsibilities.For example: This connection receives an inbound request to synchronize account information with the cloud application.3-1Trigger Operations Page - Ariba Web Services Method Select the SAP Ariba event operation to which to subscribe.Element Description Ariba Solution Identifies the SAP Ariba application type on which the operation is executed.Operation Select the event operation to which to subscribe.A use case is provided for this operation.See Subscribe to Incoming Events with an SAP Ariba Adapter Connection .Description Provides a description of the selected event operation.Invoke Operations Page - Ariba Web Services Method Enter the SAP Ariba Adapter invoke operation values for your integration.Element Description Ariba Solution Identifies the SAP Ariba application type on which the operation is executed.Operations Select the API operation to perform in the SAP Ariba application.Examples of available operations are as follows: Create Suppliers Imports supplier information from an external application into SAP Ariba.Create Remittance Returns the amount paid to suppliers for each invoice.Select this operation when remittance information is imported from an ERP application directly into SAP Ariba.
You cant include the following characters: No blank spaces (for example, My Inbound Connection ) No special characters (for example, #;83& or righ(t)now4 ) except underscores and hyphens No multibyte characters What does this endpoint do?Enter an optional description of the connection's responsibilities.For example: This connection receives an inbound request to synchronize account information with the cloud application.3-1Trigger Operations Page - Ariba Web Services Method Select the SAP Ariba event operation to which to subscribe.Element Description Ariba Solution Identifies the SAP Ariba application type on which the operation is executed.Operation Select the event operation to which to subscribe.A use case is provided for this operation.See Subscribe to Incoming Events with an SAP Ariba Adapter Connection .Description Provides a description of the selected event operation.Invoke Operations Page - Ariba Web Services Method Enter the SAP Ariba Adapter invoke operation values for your integration.Element Description Ariba Solution Identifies the SAP Ariba application type on which the operation is executed.Operations Select the API operation to perform in the SAP Ariba application.Examples of available operations are as follows: Create Suppliers Imports supplier information from an external application into SAP Ariba.Create Remittance Returns the amount paid to suppliers for each invoice.Select this operation when remittance information is imported from an ERP application directly into SAP Ariba.Create Sourcing Project Creates a sourcing project.
For example: This connection receives an inbound request to synchronize account information with the cloud application.3-1Trigger Operations Page - Ariba Web Services Method Select the SAP Ariba event operation to which to subscribe.Element Description Ariba Solution Identifies the SAP Ariba application type on which the operation is executed.Operation Select the event operation to which to subscribe.A use case is provided for this operation.See Subscribe to Incoming Events with an SAP Ariba Adapter Connection .Description Provides a description of the selected event operation.Invoke Operations Page - Ariba Web Services Method Enter the SAP Ariba Adapter invoke operation values for your integration.Element Description Ariba Solution Identifies the SAP Ariba application type on which the operation is executed.Operations Select the API operation to perform in the SAP Ariba application.Examples of available operations are as follows: Create Suppliers Imports supplier information from an external application into SAP Ariba.Create Remittance Returns the amount paid to suppliers for each invoice.Select this operation when remittance information is imported from an ERP application directly into SAP Ariba.Create Sourcing Project Creates a sourcing project.Create Organizations Creates an organization.
3-1Trigger Operations Page - Ariba Web Services Method Select the SAP Ariba event operation to which to subscribe.Element Description Ariba Solution Identifies the SAP Ariba application type on which the operation is executed.Operation Select the event operation to which to subscribe.A use case is provided for this operation.See Subscribe to Incoming Events with an SAP Ariba Adapter Connection .Description Provides a description of the selected event operation.Invoke Operations Page - Ariba Web Services Method Enter the SAP Ariba Adapter invoke operation values for your integration.Element Description Ariba Solution Identifies the SAP Ariba application type on which the operation is executed.Operations Select the API operation to perform in the SAP Ariba application.Examples of available operations are as follows: Create Suppliers Imports supplier information from an external application into SAP Ariba.Create Remittance Returns the amount paid to suppliers for each invoice.Select this operation when remittance information is imported from an ERP application directly into SAP Ariba.Create Sourcing Project Creates a sourcing project.Create Organizations Creates an organization.Create External Contract Information Returns contract information from external applications.
Element Description Ariba Solution Identifies the SAP Ariba application type on which the operation is executed.Operation Select the event operation to which to subscribe.A use case is provided for this operation.See Subscribe to Incoming Events with an SAP Ariba Adapter Connection .Description Provides a description of the selected event operation.Invoke Operations Page - Ariba Web Services Method Enter the SAP Ariba Adapter invoke operation values for your integration.Element Description Ariba Solution Identifies the SAP Ariba application type on which the operation is executed.Operations Select the API operation to perform in the SAP Ariba application.Examples of available operations are as follows: Create Suppliers Imports supplier information from an external application into SAP Ariba.Create Remittance Returns the amount paid to suppliers for each invoice.Select this operation when remittance information is imported from an ERP application directly into SAP Ariba.Create Sourcing Project Creates a sourcing project.Create Organizations Creates an organization.Create External Contract Information Returns contract information from external applications.Create Procurement Unit Imports procurement unit information from an external application into SAP Ariba.
Operation Select the event operation to which to subscribe.A use case is provided for this operation.See Subscribe to Incoming Events with an SAP Ariba Adapter Connection .Description Provides a description of the selected event operation.Invoke Operations Page - Ariba Web Services Method Enter the SAP Ariba Adapter invoke operation values for your integration.Element Description Ariba Solution Identifies the SAP Ariba application type on which the operation is executed.Operations Select the API operation to perform in the SAP Ariba application.Examples of available operations are as follows: Create Suppliers Imports supplier information from an external application into SAP Ariba.Create Remittance Returns the amount paid to suppliers for each invoice.Select this operation when remittance information is imported from an ERP application directly into SAP Ariba.Create Sourcing Project Creates a sourcing project.Create Organizations Creates an organization.Create External Contract Information Returns contract information from external applications.Create Procurement Unit Imports procurement unit information from an external application into SAP Ariba.Create Requisitions Imports requisition information from an external application into SAP Ariba.
A use case is provided for this operation.See Subscribe to Incoming Events with an SAP Ariba Adapter Connection .Description Provides a description of the selected event operation.Invoke Operations Page - Ariba Web Services Method Enter the SAP Ariba Adapter invoke operation values for your integration.Element Description Ariba Solution Identifies the SAP Ariba application type on which the operation is executed.Operations Select the API operation to perform in the SAP Ariba application.Examples of available operations are as follows: Create Suppliers Imports supplier information from an external application into SAP Ariba.Create Remittance Returns the amount paid to suppliers for each invoice.Select this operation when remittance information is imported from an ERP application directly into SAP Ariba.Create Sourcing Project Creates a sourcing project.Create Organizations Creates an organization.Create External Contract Information Returns contract information from external applications.Create Procurement Unit Imports procurement unit information from an external application into SAP Ariba.Create Requisitions Imports requisition information from an external application into SAP Ariba.Catalog Item Search Searches for catalog items in SAP Ariba to allow the synchronization of operations between SAP Ariba and external applications.
See Subscribe to Incoming Events with an SAP Ariba Adapter Connection .Description Provides a description of the selected event operation.Invoke Operations Page - Ariba Web Services Method Enter the SAP Ariba Adapter invoke operation values for your integration.Element Description Ariba Solution Identifies the SAP Ariba application type on which the operation is executed.Operations Select the API operation to perform in the SAP Ariba application.Examples of available operations are as follows: Create Suppliers Imports supplier information from an external application into SAP Ariba.Create Remittance Returns the amount paid to suppliers for each invoice.Select this operation when remittance information is imported from an ERP application directly into SAP Ariba.Create Sourcing Project Creates a sourcing project.Create Organizations Creates an organization.Create External Contract Information Returns contract information from external applications.Create Procurement Unit Imports procurement unit information from an external application into SAP Ariba.Create Requisitions Imports requisition information from an external application into SAP Ariba.Catalog Item Search Searches for catalog items in SAP Ariba to allow the synchronization of operations between SAP Ariba and external applications.Description A description of the selected API operation.Chapter 3 Trigger Operations Page - Ariba Web Services Method 3-2Invoke Service Options Page - Ariba Task/Event-Based Method Select the Ariba service option to use with the Ariba task/event-based method.
Description Provides a description of the selected event operation.Invoke Operations Page - Ariba Web Services Method Enter the SAP Ariba Adapter invoke operation values for your integration.Element Description Ariba Solution Identifies the SAP Ariba application type on which the operation is executed.Operations Select the API operation to perform in the SAP Ariba application.Examples of available operations are as follows: Create Suppliers Imports supplier information from an external application into SAP Ariba.Create Remittance Returns the amount paid to suppliers for each invoice.Select this operation when remittance information is imported from an ERP application directly into SAP Ariba.Create Sourcing Project Creates a sourcing project.Create Organizations Creates an organization.Create External Contract Information Returns contract information from external applications.Create Procurement Unit Imports procurement unit information from an external application into SAP Ariba.Create Requisitions Imports requisition information from an external application into SAP Ariba.Catalog Item Search Searches for catalog items in SAP Ariba to allow the synchronization of operations between SAP Ariba and external applications.Description A description of the selected API operation.Chapter 3 Trigger Operations Page - Ariba Web Services Method 3-2Invoke Service Options Page - Ariba Task/Event-Based Method Select the Ariba service option to use with the Ariba task/event-based method.Element Description Ariba Service Option Extract data from Ariba : Extracts data from Ariba in .csv file format.
Invoke Operations Page - Ariba Web Services Method Enter the SAP Ariba Adapter invoke operation values for your integration.Element Description Ariba Solution Identifies the SAP Ariba application type on which the operation is executed.Operations Select the API operation to perform in the SAP Ariba application.Examples of available operations are as follows: Create Suppliers Imports supplier information from an external application into SAP Ariba.Create Remittance Returns the amount paid to suppliers for each invoice.Select this operation when remittance information is imported from an ERP application directly into SAP Ariba.Create Sourcing Project Creates a sourcing project.Create Organizations Creates an organization.Create External Contract Information Returns contract information from external applications.Create Procurement Unit Imports procurement unit information from an external application into SAP Ariba.Create Requisitions Imports requisition information from an external application into SAP Ariba.Catalog Item Search Searches for catalog items in SAP Ariba to allow the synchronization of operations between SAP Ariba and external applications.Description A description of the selected API operation.Chapter 3 Trigger Operations Page - Ariba Web Services Method 3-2Invoke Service Options Page - Ariba Task/Event-Based Method Select the Ariba service option to use with the Ariba task/event-based method.Element Description Ariba Service Option Extract data from Ariba : Extracts data from Ariba in .csv file format.This option enables you to select Ariba export tasks for both solutions (buying and sourcing).