text
stringlengths
65
20k
Configure Connection Security Enter connection information so your application can process requests.1.Go to the Security section.2.Enter the client ID (application ID) and client secret values you recorded when you added your application to your Microsoft Office 365 Outlook account.See Prerequisites for Creating a Connection .3.Enter the scope URLs in the Scope field.A scope is a list of authorization permissions for the target application.You must include the offline_access scope along with the application-specific scopes.A blank space between each scope is also required.For example:Chapter 2 Create a Connection 2-3If using the Outlook REST APIs: https://outlook.office.com/mail.send https://outlook.office.com/ mail.readwrite offline_access If using the Microsoft Graph REST APIs: https://graph.microsoft.com/Mail.ReadWrite https:// graph.microsoft.com/Mail.Send offline_access Note: You cannot use both Outlook and Microsoft Graph scopes in one connection.Do not specify Outlook scopes if you plan to select a Microsoft Graph REST API operation during adapter configuration.See Error Occurs If Using Outlook Scopes with a Microsoft Graph REST API Operation .Ensure you correctly enter your scope values.Otherwise, you receive an error when clicking Provide Consent .4.Click Provide Consent .This enables Oracle Integration to interact with the Microsoft Office 365 Outlook account used to create the application at https:// portal.azure.com/ .
1.Go to the Security section.2.Enter the client ID (application ID) and client secret values you recorded when you added your application to your Microsoft Office 365 Outlook account.See Prerequisites for Creating a Connection .3.Enter the scope URLs in the Scope field.A scope is a list of authorization permissions for the target application.You must include the offline_access scope along with the application-specific scopes.A blank space between each scope is also required.For example:Chapter 2 Create a Connection 2-3If using the Outlook REST APIs: https://outlook.office.com/mail.send https://outlook.office.com/ mail.readwrite offline_access If using the Microsoft Graph REST APIs: https://graph.microsoft.com/Mail.ReadWrite https:// graph.microsoft.com/Mail.Send offline_access Note: You cannot use both Outlook and Microsoft Graph scopes in one connection.Do not specify Outlook scopes if you plan to select a Microsoft Graph REST API operation during adapter configuration.See Error Occurs If Using Outlook Scopes with a Microsoft Graph REST API Operation .Ensure you correctly enter your scope values.Otherwise, you receive an error when clicking Provide Consent .4.Click Provide Consent .This enables Oracle Integration to interact with the Microsoft Office 365 Outlook account used to create the application at https:// portal.azure.com/ .If everything is correct, you are prompted for the Oracle Integration credentials.
2.Enter the client ID (application ID) and client secret values you recorded when you added your application to your Microsoft Office 365 Outlook account.See Prerequisites for Creating a Connection .3.Enter the scope URLs in the Scope field.A scope is a list of authorization permissions for the target application.You must include the offline_access scope along with the application-specific scopes.A blank space between each scope is also required.For example:Chapter 2 Create a Connection 2-3If using the Outlook REST APIs: https://outlook.office.com/mail.send https://outlook.office.com/ mail.readwrite offline_access If using the Microsoft Graph REST APIs: https://graph.microsoft.com/Mail.ReadWrite https:// graph.microsoft.com/Mail.Send offline_access Note: You cannot use both Outlook and Microsoft Graph scopes in one connection.Do not specify Outlook scopes if you plan to select a Microsoft Graph REST API operation during adapter configuration.See Error Occurs If Using Outlook Scopes with a Microsoft Graph REST API Operation .Ensure you correctly enter your scope values.Otherwise, you receive an error when clicking Provide Consent .4.Click Provide Consent .This enables Oracle Integration to interact with the Microsoft Office 365 Outlook account used to create the application at https:// portal.azure.com/ .If everything is correct, you are prompted for the Oracle Integration credentials.a.Enter the credentials and click OK.
See Prerequisites for Creating a Connection .3.Enter the scope URLs in the Scope field.A scope is a list of authorization permissions for the target application.You must include the offline_access scope along with the application-specific scopes.A blank space between each scope is also required.For example:Chapter 2 Create a Connection 2-3If using the Outlook REST APIs: https://outlook.office.com/mail.send https://outlook.office.com/ mail.readwrite offline_access If using the Microsoft Graph REST APIs: https://graph.microsoft.com/Mail.ReadWrite https:// graph.microsoft.com/Mail.Send offline_access Note: You cannot use both Outlook and Microsoft Graph scopes in one connection.Do not specify Outlook scopes if you plan to select a Microsoft Graph REST API operation during adapter configuration.See Error Occurs If Using Outlook Scopes with a Microsoft Graph REST API Operation .Ensure you correctly enter your scope values.Otherwise, you receive an error when clicking Provide Consent .4.Click Provide Consent .This enables Oracle Integration to interact with the Microsoft Office 365 Outlook account used to create the application at https:// portal.azure.com/ .If everything is correct, you are prompted for the Oracle Integration credentials.a.Enter the credentials and click OK.These are the same credentials you use to log in to Oracle Integration.
3.Enter the scope URLs in the Scope field.A scope is a list of authorization permissions for the target application.You must include the offline_access scope along with the application-specific scopes.A blank space between each scope is also required.For example:Chapter 2 Create a Connection 2-3If using the Outlook REST APIs: https://outlook.office.com/mail.send https://outlook.office.com/ mail.readwrite offline_access If using the Microsoft Graph REST APIs: https://graph.microsoft.com/Mail.ReadWrite https:// graph.microsoft.com/Mail.Send offline_access Note: You cannot use both Outlook and Microsoft Graph scopes in one connection.Do not specify Outlook scopes if you plan to select a Microsoft Graph REST API operation during adapter configuration.See Error Occurs If Using Outlook Scopes with a Microsoft Graph REST API Operation .Ensure you correctly enter your scope values.Otherwise, you receive an error when clicking Provide Consent .4.Click Provide Consent .This enables Oracle Integration to interact with the Microsoft Office 365 Outlook account used to create the application at https:// portal.azure.com/ .If everything is correct, you are prompted for the Oracle Integration credentials.a.Enter the credentials and click OK.These are the same credentials you use to log in to Oracle Integration.b.Enter the Microsoft Office 365 Outlook account credentials.
A scope is a list of authorization permissions for the target application.You must include the offline_access scope along with the application-specific scopes.A blank space between each scope is also required.For example:Chapter 2 Create a Connection 2-3If using the Outlook REST APIs: https://outlook.office.com/mail.send https://outlook.office.com/ mail.readwrite offline_access If using the Microsoft Graph REST APIs: https://graph.microsoft.com/Mail.ReadWrite https:// graph.microsoft.com/Mail.Send offline_access Note: You cannot use both Outlook and Microsoft Graph scopes in one connection.Do not specify Outlook scopes if you plan to select a Microsoft Graph REST API operation during adapter configuration.See Error Occurs If Using Outlook Scopes with a Microsoft Graph REST API Operation .Ensure you correctly enter your scope values.Otherwise, you receive an error when clicking Provide Consent .4.Click Provide Consent .This enables Oracle Integration to interact with the Microsoft Office 365 Outlook account used to create the application at https:// portal.azure.com/ .If everything is correct, you are prompted for the Oracle Integration credentials.a.Enter the credentials and click OK.These are the same credentials you use to log in to Oracle Integration.b.Enter the Microsoft Office 365 Outlook account credentials.A page is displayed asking for permission to interact with the account.
You must include the offline_access scope along with the application-specific scopes.A blank space between each scope is also required.For example:Chapter 2 Create a Connection 2-3If using the Outlook REST APIs: https://outlook.office.com/mail.send https://outlook.office.com/ mail.readwrite offline_access If using the Microsoft Graph REST APIs: https://graph.microsoft.com/Mail.ReadWrite https:// graph.microsoft.com/Mail.Send offline_access Note: You cannot use both Outlook and Microsoft Graph scopes in one connection.Do not specify Outlook scopes if you plan to select a Microsoft Graph REST API operation during adapter configuration.See Error Occurs If Using Outlook Scopes with a Microsoft Graph REST API Operation .Ensure you correctly enter your scope values.Otherwise, you receive an error when clicking Provide Consent .4.Click Provide Consent .This enables Oracle Integration to interact with the Microsoft Office 365 Outlook account used to create the application at https:// portal.azure.com/ .If everything is correct, you are prompted for the Oracle Integration credentials.a.Enter the credentials and click OK.These are the same credentials you use to log in to Oracle Integration.b.Enter the Microsoft Office 365 Outlook account credentials.A page is displayed asking for permission to interact with the account.c.Click Yes.
A blank space between each scope is also required.For example:Chapter 2 Create a Connection 2-3If using the Outlook REST APIs: https://outlook.office.com/mail.send https://outlook.office.com/ mail.readwrite offline_access If using the Microsoft Graph REST APIs: https://graph.microsoft.com/Mail.ReadWrite https:// graph.microsoft.com/Mail.Send offline_access Note: You cannot use both Outlook and Microsoft Graph scopes in one connection.Do not specify Outlook scopes if you plan to select a Microsoft Graph REST API operation during adapter configuration.See Error Occurs If Using Outlook Scopes with a Microsoft Graph REST API Operation .Ensure you correctly enter your scope values.Otherwise, you receive an error when clicking Provide Consent .4.Click Provide Consent .This enables Oracle Integration to interact with the Microsoft Office 365 Outlook account used to create the application at https:// portal.azure.com/ .If everything is correct, you are prompted for the Oracle Integration credentials.a.Enter the credentials and click OK.These are the same credentials you use to log in to Oracle Integration.b.Enter the Microsoft Office 365 Outlook account credentials.A page is displayed asking for permission to interact with the account.c.Click Yes.The Access Allowed!
For example:Chapter 2 Create a Connection 2-3If using the Outlook REST APIs: https://outlook.office.com/mail.send https://outlook.office.com/ mail.readwrite offline_access If using the Microsoft Graph REST APIs: https://graph.microsoft.com/Mail.ReadWrite https:// graph.microsoft.com/Mail.Send offline_access Note: You cannot use both Outlook and Microsoft Graph scopes in one connection.Do not specify Outlook scopes if you plan to select a Microsoft Graph REST API operation during adapter configuration.See Error Occurs If Using Outlook Scopes with a Microsoft Graph REST API Operation .Ensure you correctly enter your scope values.Otherwise, you receive an error when clicking Provide Consent .4.Click Provide Consent .This enables Oracle Integration to interact with the Microsoft Office 365 Outlook account used to create the application at https:// portal.azure.com/ .If everything is correct, you are prompted for the Oracle Integration credentials.a.Enter the credentials and click OK.These are the same credentials you use to log in to Oracle Integration.b.Enter the Microsoft Office 365 Outlook account credentials.A page is displayed asking for permission to interact with the account.c.Click Yes.The Access Allowed!page is displayed.
Do not specify Outlook scopes if you plan to select a Microsoft Graph REST API operation during adapter configuration.See Error Occurs If Using Outlook Scopes with a Microsoft Graph REST API Operation .Ensure you correctly enter your scope values.Otherwise, you receive an error when clicking Provide Consent .4.Click Provide Consent .This enables Oracle Integration to interact with the Microsoft Office 365 Outlook account used to create the application at https:// portal.azure.com/ .If everything is correct, you are prompted for the Oracle Integration credentials.a.Enter the credentials and click OK.These are the same credentials you use to log in to Oracle Integration.b.Enter the Microsoft Office 365 Outlook account credentials.A page is displayed asking for permission to interact with the account.c.Click Yes.The Access Allowed!page is displayed.Test the Connection Test your connection to ensure that it's configured successfully.
See Error Occurs If Using Outlook Scopes with a Microsoft Graph REST API Operation .Ensure you correctly enter your scope values.Otherwise, you receive an error when clicking Provide Consent .4.Click Provide Consent .This enables Oracle Integration to interact with the Microsoft Office 365 Outlook account used to create the application at https:// portal.azure.com/ .If everything is correct, you are prompted for the Oracle Integration credentials.a.Enter the credentials and click OK.These are the same credentials you use to log in to Oracle Integration.b.Enter the Microsoft Office 365 Outlook account credentials.A page is displayed asking for permission to interact with the account.c.Click Yes.The Access Allowed!page is displayed.Test the Connection Test your connection to ensure that it's configured successfully.1.In the page title bar, click Test.
Ensure you correctly enter your scope values.Otherwise, you receive an error when clicking Provide Consent .4.Click Provide Consent .This enables Oracle Integration to interact with the Microsoft Office 365 Outlook account used to create the application at https:// portal.azure.com/ .If everything is correct, you are prompted for the Oracle Integration credentials.a.Enter the credentials and click OK.These are the same credentials you use to log in to Oracle Integration.b.Enter the Microsoft Office 365 Outlook account credentials.A page is displayed asking for permission to interact with the account.c.Click Yes.The Access Allowed!page is displayed.Test the Connection Test your connection to ensure that it's configured successfully.1.In the page title bar, click Test.What happens next depends on whether your adapter connection uses a Web Services Description Language (WSDL) file.
Otherwise, you receive an error when clicking Provide Consent .4.Click Provide Consent .This enables Oracle Integration to interact with the Microsoft Office 365 Outlook account used to create the application at https:// portal.azure.com/ .If everything is correct, you are prompted for the Oracle Integration credentials.a.Enter the credentials and click OK.These are the same credentials you use to log in to Oracle Integration.b.Enter the Microsoft Office 365 Outlook account credentials.A page is displayed asking for permission to interact with the account.c.Click Yes.The Access Allowed!page is displayed.Test the Connection Test your connection to ensure that it's configured successfully.1.In the page title bar, click Test.What happens next depends on whether your adapter connection uses a Web Services Description Language (WSDL) file.Only some adapter connections use WSDLs.
4.Click Provide Consent .This enables Oracle Integration to interact with the Microsoft Office 365 Outlook account used to create the application at https:// portal.azure.com/ .If everything is correct, you are prompted for the Oracle Integration credentials.a.Enter the credentials and click OK.These are the same credentials you use to log in to Oracle Integration.b.Enter the Microsoft Office 365 Outlook account credentials.A page is displayed asking for permission to interact with the account.c.Click Yes.The Access Allowed!page is displayed.Test the Connection Test your connection to ensure that it's configured successfully.1.In the page title bar, click Test.What happens next depends on whether your adapter connection uses a Web Services Description Language (WSDL) file.Only some adapter connections use WSDLs.If Your Connection...Then... Doesnt use a WSDL The test starts automatically and validates the inputs you provided for the connection.Chapter 2 Create a Connection 2-4If Your Connection...Then...
This enables Oracle Integration to interact with the Microsoft Office 365 Outlook account used to create the application at https:// portal.azure.com/ .If everything is correct, you are prompted for the Oracle Integration credentials.a.Enter the credentials and click OK.These are the same credentials you use to log in to Oracle Integration.b.Enter the Microsoft Office 365 Outlook account credentials.A page is displayed asking for permission to interact with the account.c.Click Yes.The Access Allowed!page is displayed.Test the Connection Test your connection to ensure that it's configured successfully.1.In the page title bar, click Test.What happens next depends on whether your adapter connection uses a Web Services Description Language (WSDL) file.Only some adapter connections use WSDLs.If Your Connection...Then... Doesnt use a WSDL The test starts automatically and validates the inputs you provided for the connection.Chapter 2 Create a Connection 2-4If Your Connection...Then...Uses a WSDL A dialog prompts you to select the type of connection testing to perform: Validate and Test : Performs a full validation of the WSDL, including processing of the imported schemas and WSDLs.
If everything is correct, you are prompted for the Oracle Integration credentials.a.Enter the credentials and click OK.These are the same credentials you use to log in to Oracle Integration.b.Enter the Microsoft Office 365 Outlook account credentials.A page is displayed asking for permission to interact with the account.c.Click Yes.The Access Allowed!page is displayed.Test the Connection Test your connection to ensure that it's configured successfully.1.In the page title bar, click Test.What happens next depends on whether your adapter connection uses a Web Services Description Language (WSDL) file.Only some adapter connections use WSDLs.If Your Connection...Then... Doesnt use a WSDL The test starts automatically and validates the inputs you provided for the connection.Chapter 2 Create a Connection 2-4If Your Connection...Then...Uses a WSDL A dialog prompts you to select the type of connection testing to perform: Validate and Test : Performs a full validation of the WSDL, including processing of the imported schemas and WSDLs.Complete validation can take several minutes depending on the number of imported schemas and WSDLs.
a.Enter the credentials and click OK.These are the same credentials you use to log in to Oracle Integration.b.Enter the Microsoft Office 365 Outlook account credentials.A page is displayed asking for permission to interact with the account.c.Click Yes.The Access Allowed!page is displayed.Test the Connection Test your connection to ensure that it's configured successfully.1.In the page title bar, click Test.What happens next depends on whether your adapter connection uses a Web Services Description Language (WSDL) file.Only some adapter connections use WSDLs.If Your Connection...Then... Doesnt use a WSDL The test starts automatically and validates the inputs you provided for the connection.Chapter 2 Create a Connection 2-4If Your Connection...Then...Uses a WSDL A dialog prompts you to select the type of connection testing to perform: Validate and Test : Performs a full validation of the WSDL, including processing of the imported schemas and WSDLs.Complete validation can take several minutes depending on the number of imported schemas and WSDLs.No requests are sent to the operations exposed in the WSDL.
These are the same credentials you use to log in to Oracle Integration.b.Enter the Microsoft Office 365 Outlook account credentials.A page is displayed asking for permission to interact with the account.c.Click Yes.The Access Allowed!page is displayed.Test the Connection Test your connection to ensure that it's configured successfully.1.In the page title bar, click Test.What happens next depends on whether your adapter connection uses a Web Services Description Language (WSDL) file.Only some adapter connections use WSDLs.If Your Connection...Then... Doesnt use a WSDL The test starts automatically and validates the inputs you provided for the connection.Chapter 2 Create a Connection 2-4If Your Connection...Then...Uses a WSDL A dialog prompts you to select the type of connection testing to perform: Validate and Test : Performs a full validation of the WSDL, including processing of the imported schemas and WSDLs.Complete validation can take several minutes depending on the number of imported schemas and WSDLs.No requests are sent to the operations exposed in the WSDL.Test: Connects to the WSDL URL and performs a syntax check on the WSDL.
b.Enter the Microsoft Office 365 Outlook account credentials.A page is displayed asking for permission to interact with the account.c.Click Yes.The Access Allowed!page is displayed.Test the Connection Test your connection to ensure that it's configured successfully.1.In the page title bar, click Test.What happens next depends on whether your adapter connection uses a Web Services Description Language (WSDL) file.Only some adapter connections use WSDLs.If Your Connection...Then... Doesnt use a WSDL The test starts automatically and validates the inputs you provided for the connection.Chapter 2 Create a Connection 2-4If Your Connection...Then...Uses a WSDL A dialog prompts you to select the type of connection testing to perform: Validate and Test : Performs a full validation of the WSDL, including processing of the imported schemas and WSDLs.Complete validation can take several minutes depending on the number of imported schemas and WSDLs.No requests are sent to the operations exposed in the WSDL.Test: Connects to the WSDL URL and performs a syntax check on the WSDL.No requests are sent to the operations exposed in the WSDL.
A page is displayed asking for permission to interact with the account.c.Click Yes.The Access Allowed!page is displayed.Test the Connection Test your connection to ensure that it's configured successfully.1.In the page title bar, click Test.What happens next depends on whether your adapter connection uses a Web Services Description Language (WSDL) file.Only some adapter connections use WSDLs.If Your Connection...Then... Doesnt use a WSDL The test starts automatically and validates the inputs you provided for the connection.Chapter 2 Create a Connection 2-4If Your Connection...Then...Uses a WSDL A dialog prompts you to select the type of connection testing to perform: Validate and Test : Performs a full validation of the WSDL, including processing of the imported schemas and WSDLs.Complete validation can take several minutes depending on the number of imported schemas and WSDLs.No requests are sent to the operations exposed in the WSDL.Test: Connects to the WSDL URL and performs a syntax check on the WSDL.No requests are sent to the operations exposed in the WSDL.2.Wait for a message about the results of the connection test.
c.Click Yes.The Access Allowed!page is displayed.Test the Connection Test your connection to ensure that it's configured successfully.1.In the page title bar, click Test.What happens next depends on whether your adapter connection uses a Web Services Description Language (WSDL) file.Only some adapter connections use WSDLs.If Your Connection...Then... Doesnt use a WSDL The test starts automatically and validates the inputs you provided for the connection.Chapter 2 Create a Connection 2-4If Your Connection...Then...Uses a WSDL A dialog prompts you to select the type of connection testing to perform: Validate and Test : Performs a full validation of the WSDL, including processing of the imported schemas and WSDLs.Complete validation can take several minutes depending on the number of imported schemas and WSDLs.No requests are sent to the operations exposed in the WSDL.Test: Connects to the WSDL URL and performs a syntax check on the WSDL.No requests are sent to the operations exposed in the WSDL.2.Wait for a message about the results of the connection test.If the test was successful, then the connection is configured properly.
The Access Allowed!page is displayed.Test the Connection Test your connection to ensure that it's configured successfully.1.In the page title bar, click Test.What happens next depends on whether your adapter connection uses a Web Services Description Language (WSDL) file.Only some adapter connections use WSDLs.If Your Connection...Then... Doesnt use a WSDL The test starts automatically and validates the inputs you provided for the connection.Chapter 2 Create a Connection 2-4If Your Connection...Then...Uses a WSDL A dialog prompts you to select the type of connection testing to perform: Validate and Test : Performs a full validation of the WSDL, including processing of the imported schemas and WSDLs.Complete validation can take several minutes depending on the number of imported schemas and WSDLs.No requests are sent to the operations exposed in the WSDL.Test: Connects to the WSDL URL and performs a syntax check on the WSDL.No requests are sent to the operations exposed in the WSDL.2.Wait for a message about the results of the connection test.If the test was successful, then the connection is configured properly.If the test failed, then edit the configuration details you entered.
page is displayed.Test the Connection Test your connection to ensure that it's configured successfully.1.In the page title bar, click Test.What happens next depends on whether your adapter connection uses a Web Services Description Language (WSDL) file.Only some adapter connections use WSDLs.If Your Connection...Then... Doesnt use a WSDL The test starts automatically and validates the inputs you provided for the connection.Chapter 2 Create a Connection 2-4If Your Connection...Then...Uses a WSDL A dialog prompts you to select the type of connection testing to perform: Validate and Test : Performs a full validation of the WSDL, including processing of the imported schemas and WSDLs.Complete validation can take several minutes depending on the number of imported schemas and WSDLs.No requests are sent to the operations exposed in the WSDL.Test: Connects to the WSDL URL and performs a syntax check on the WSDL.No requests are sent to the operations exposed in the WSDL.2.Wait for a message about the results of the connection test.If the test was successful, then the connection is configured properly.If the test failed, then edit the configuration details you entered.Check for typos, verify URLs and credentials, and download the diagnostic logs for additional details.
Test the Connection Test your connection to ensure that it's configured successfully.1.In the page title bar, click Test.What happens next depends on whether your adapter connection uses a Web Services Description Language (WSDL) file.Only some adapter connections use WSDLs.If Your Connection...Then... Doesnt use a WSDL The test starts automatically and validates the inputs you provided for the connection.Chapter 2 Create a Connection 2-4If Your Connection...Then...Uses a WSDL A dialog prompts you to select the type of connection testing to perform: Validate and Test : Performs a full validation of the WSDL, including processing of the imported schemas and WSDLs.Complete validation can take several minutes depending on the number of imported schemas and WSDLs.No requests are sent to the operations exposed in the WSDL.Test: Connects to the WSDL URL and performs a syntax check on the WSDL.No requests are sent to the operations exposed in the WSDL.2.Wait for a message about the results of the connection test.If the test was successful, then the connection is configured properly.If the test failed, then edit the configuration details you entered.Check for typos, verify URLs and credentials, and download the diagnostic logs for additional details.Continue to test until the connection is successful.
1.In the page title bar, click Test.What happens next depends on whether your adapter connection uses a Web Services Description Language (WSDL) file.Only some adapter connections use WSDLs.If Your Connection...Then... Doesnt use a WSDL The test starts automatically and validates the inputs you provided for the connection.Chapter 2 Create a Connection 2-4If Your Connection...Then...Uses a WSDL A dialog prompts you to select the type of connection testing to perform: Validate and Test : Performs a full validation of the WSDL, including processing of the imported schemas and WSDLs.Complete validation can take several minutes depending on the number of imported schemas and WSDLs.No requests are sent to the operations exposed in the WSDL.Test: Connects to the WSDL URL and performs a syntax check on the WSDL.No requests are sent to the operations exposed in the WSDL.2.Wait for a message about the results of the connection test.If the test was successful, then the connection is configured properly.If the test failed, then edit the configuration details you entered.Check for typos, verify URLs and credentials, and download the diagnostic logs for additional details.Continue to test until the connection is successful.3.When complete, click Save .
What happens next depends on whether your adapter connection uses a Web Services Description Language (WSDL) file.Only some adapter connections use WSDLs.If Your Connection...Then... Doesnt use a WSDL The test starts automatically and validates the inputs you provided for the connection.Chapter 2 Create a Connection 2-4If Your Connection...Then...Uses a WSDL A dialog prompts you to select the type of connection testing to perform: Validate and Test : Performs a full validation of the WSDL, including processing of the imported schemas and WSDLs.Complete validation can take several minutes depending on the number of imported schemas and WSDLs.No requests are sent to the operations exposed in the WSDL.Test: Connects to the WSDL URL and performs a syntax check on the WSDL.No requests are sent to the operations exposed in the WSDL.2.Wait for a message about the results of the connection test.If the test was successful, then the connection is configured properly.If the test failed, then edit the configuration details you entered.Check for typos, verify URLs and credentials, and download the diagnostic logs for additional details.Continue to test until the connection is successful.3.When complete, click Save .Upload an SSL Certificate Certificates are used to validate outbound SSL connections.
Only some adapter connections use WSDLs.If Your Connection...Then... Doesnt use a WSDL The test starts automatically and validates the inputs you provided for the connection.Chapter 2 Create a Connection 2-4If Your Connection...Then...Uses a WSDL A dialog prompts you to select the type of connection testing to perform: Validate and Test : Performs a full validation of the WSDL, including processing of the imported schemas and WSDLs.Complete validation can take several minutes depending on the number of imported schemas and WSDLs.No requests are sent to the operations exposed in the WSDL.Test: Connects to the WSDL URL and performs a syntax check on the WSDL.No requests are sent to the operations exposed in the WSDL.2.Wait for a message about the results of the connection test.If the test was successful, then the connection is configured properly.If the test failed, then edit the configuration details you entered.Check for typos, verify URLs and credentials, and download the diagnostic logs for additional details.Continue to test until the connection is successful.3.When complete, click Save .Upload an SSL Certificate Certificates are used to validate outbound SSL connections.If you make an SSL connection in which the root certificate does not exist in Oracle Integration, an exception is thrown.
If Your Connection...Then... Doesnt use a WSDL The test starts automatically and validates the inputs you provided for the connection.Chapter 2 Create a Connection 2-4If Your Connection...Then...Uses a WSDL A dialog prompts you to select the type of connection testing to perform: Validate and Test : Performs a full validation of the WSDL, including processing of the imported schemas and WSDLs.Complete validation can take several minutes depending on the number of imported schemas and WSDLs.No requests are sent to the operations exposed in the WSDL.Test: Connects to the WSDL URL and performs a syntax check on the WSDL.No requests are sent to the operations exposed in the WSDL.2.Wait for a message about the results of the connection test.If the test was successful, then the connection is configured properly.If the test failed, then edit the configuration details you entered.Check for typos, verify URLs and credentials, and download the diagnostic logs for additional details.Continue to test until the connection is successful.3.When complete, click Save .Upload an SSL Certificate Certificates are used to validate outbound SSL connections.If you make an SSL connection in which the root certificate does not exist in Oracle Integration, an exception is thrown.In that case, you must upload the appropriate certificate.
Uses a WSDL A dialog prompts you to select the type of connection testing to perform: Validate and Test : Performs a full validation of the WSDL, including processing of the imported schemas and WSDLs.Complete validation can take several minutes depending on the number of imported schemas and WSDLs.No requests are sent to the operations exposed in the WSDL.Test: Connects to the WSDL URL and performs a syntax check on the WSDL.No requests are sent to the operations exposed in the WSDL.2.Wait for a message about the results of the connection test.If the test was successful, then the connection is configured properly.If the test failed, then edit the configuration details you entered.Check for typos, verify URLs and credentials, and download the diagnostic logs for additional details.Continue to test until the connection is successful.3.When complete, click Save .Upload an SSL Certificate Certificates are used to validate outbound SSL connections.If you make an SSL connection in which the root certificate does not exist in Oracle Integration, an exception is thrown.In that case, you must upload the appropriate certificate.A certificate enables Oracle Integration to connect with external services.
Complete validation can take several minutes depending on the number of imported schemas and WSDLs.No requests are sent to the operations exposed in the WSDL.Test: Connects to the WSDL URL and performs a syntax check on the WSDL.No requests are sent to the operations exposed in the WSDL.2.Wait for a message about the results of the connection test.If the test was successful, then the connection is configured properly.If the test failed, then edit the configuration details you entered.Check for typos, verify URLs and credentials, and download the diagnostic logs for additional details.Continue to test until the connection is successful.3.When complete, click Save .Upload an SSL Certificate Certificates are used to validate outbound SSL connections.If you make an SSL connection in which the root certificate does not exist in Oracle Integration, an exception is thrown.In that case, you must upload the appropriate certificate.A certificate enables Oracle Integration to connect with external services.If the external endpoint requires a specific certificate, request the certificate and then upload it into Oracle Integration.
No requests are sent to the operations exposed in the WSDL.Test: Connects to the WSDL URL and performs a syntax check on the WSDL.No requests are sent to the operations exposed in the WSDL.2.Wait for a message about the results of the connection test.If the test was successful, then the connection is configured properly.If the test failed, then edit the configuration details you entered.Check for typos, verify URLs and credentials, and download the diagnostic logs for additional details.Continue to test until the connection is successful.3.When complete, click Save .Upload an SSL Certificate Certificates are used to validate outbound SSL connections.If you make an SSL connection in which the root certificate does not exist in Oracle Integration, an exception is thrown.In that case, you must upload the appropriate certificate.A certificate enables Oracle Integration to connect with external services.If the external endpoint requires a specific certificate, request the certificate and then upload it into Oracle Integration.To upload an SSL certificate: 1.In the left navigation pane, click Home > Settings > Certificates .
Test: Connects to the WSDL URL and performs a syntax check on the WSDL.No requests are sent to the operations exposed in the WSDL.2.Wait for a message about the results of the connection test.If the test was successful, then the connection is configured properly.If the test failed, then edit the configuration details you entered.Check for typos, verify URLs and credentials, and download the diagnostic logs for additional details.Continue to test until the connection is successful.3.When complete, click Save .Upload an SSL Certificate Certificates are used to validate outbound SSL connections.If you make an SSL connection in which the root certificate does not exist in Oracle Integration, an exception is thrown.In that case, you must upload the appropriate certificate.A certificate enables Oracle Integration to connect with external services.If the external endpoint requires a specific certificate, request the certificate and then upload it into Oracle Integration.To upload an SSL certificate: 1.In the left navigation pane, click Home > Settings > Certificates .All certificates currently uploaded to the trust store are displayed in the Certificates dialog.
No requests are sent to the operations exposed in the WSDL.2.Wait for a message about the results of the connection test.If the test was successful, then the connection is configured properly.If the test failed, then edit the configuration details you entered.Check for typos, verify URLs and credentials, and download the diagnostic logs for additional details.Continue to test until the connection is successful.3.When complete, click Save .Upload an SSL Certificate Certificates are used to validate outbound SSL connections.If you make an SSL connection in which the root certificate does not exist in Oracle Integration, an exception is thrown.In that case, you must upload the appropriate certificate.A certificate enables Oracle Integration to connect with external services.If the external endpoint requires a specific certificate, request the certificate and then upload it into Oracle Integration.To upload an SSL certificate: 1.In the left navigation pane, click Home > Settings > Certificates .All certificates currently uploaded to the trust store are displayed in the Certificates dialog.The link enables you to filter by name, certificate expiration date, status, type, category, and installation method (user-installed or system-installed).
2.Wait for a message about the results of the connection test.If the test was successful, then the connection is configured properly.If the test failed, then edit the configuration details you entered.Check for typos, verify URLs and credentials, and download the diagnostic logs for additional details.Continue to test until the connection is successful.3.When complete, click Save .Upload an SSL Certificate Certificates are used to validate outbound SSL connections.If you make an SSL connection in which the root certificate does not exist in Oracle Integration, an exception is thrown.In that case, you must upload the appropriate certificate.A certificate enables Oracle Integration to connect with external services.If the external endpoint requires a specific certificate, request the certificate and then upload it into Oracle Integration.To upload an SSL certificate: 1.In the left navigation pane, click Home > Settings > Certificates .All certificates currently uploaded to the trust store are displayed in the Certificates dialog.The link enables you to filter by name, certificate expiration date, status, type, category, and installation method (user-installed or system-installed).Certificates installed by the system cannot be deleted.
If the test was successful, then the connection is configured properly.If the test failed, then edit the configuration details you entered.Check for typos, verify URLs and credentials, and download the diagnostic logs for additional details.Continue to test until the connection is successful.3.When complete, click Save .Upload an SSL Certificate Certificates are used to validate outbound SSL connections.If you make an SSL connection in which the root certificate does not exist in Oracle Integration, an exception is thrown.In that case, you must upload the appropriate certificate.A certificate enables Oracle Integration to connect with external services.If the external endpoint requires a specific certificate, request the certificate and then upload it into Oracle Integration.To upload an SSL certificate: 1.In the left navigation pane, click Home > Settings > Certificates .All certificates currently uploaded to the trust store are displayed in the Certificates dialog.The link enables you to filter by name, certificate expiration date, status, type, category, and installation method (user-installed or system-installed).Certificates installed by the system cannot be deleted.Chapter 2 Upload an SSL Certificate 2-52.Click Upload at the top of the page.
If the test failed, then edit the configuration details you entered.Check for typos, verify URLs and credentials, and download the diagnostic logs for additional details.Continue to test until the connection is successful.3.When complete, click Save .Upload an SSL Certificate Certificates are used to validate outbound SSL connections.If you make an SSL connection in which the root certificate does not exist in Oracle Integration, an exception is thrown.In that case, you must upload the appropriate certificate.A certificate enables Oracle Integration to connect with external services.If the external endpoint requires a specific certificate, request the certificate and then upload it into Oracle Integration.To upload an SSL certificate: 1.In the left navigation pane, click Home > Settings > Certificates .All certificates currently uploaded to the trust store are displayed in the Certificates dialog.The link enables you to filter by name, certificate expiration date, status, type, category, and installation method (user-installed or system-installed).Certificates installed by the system cannot be deleted.Chapter 2 Upload an SSL Certificate 2-52.Click Upload at the top of the page.The Upload Certificate dialog box is displayed.
Check for typos, verify URLs and credentials, and download the diagnostic logs for additional details.Continue to test until the connection is successful.3.When complete, click Save .Upload an SSL Certificate Certificates are used to validate outbound SSL connections.If you make an SSL connection in which the root certificate does not exist in Oracle Integration, an exception is thrown.In that case, you must upload the appropriate certificate.A certificate enables Oracle Integration to connect with external services.If the external endpoint requires a specific certificate, request the certificate and then upload it into Oracle Integration.To upload an SSL certificate: 1.In the left navigation pane, click Home > Settings > Certificates .All certificates currently uploaded to the trust store are displayed in the Certificates dialog.The link enables you to filter by name, certificate expiration date, status, type, category, and installation method (user-installed or system-installed).Certificates installed by the system cannot be deleted.Chapter 2 Upload an SSL Certificate 2-52.Click Upload at the top of the page.The Upload Certificate dialog box is displayed.3.Enter an alias name and optional description.
Continue to test until the connection is successful.3.When complete, click Save .Upload an SSL Certificate Certificates are used to validate outbound SSL connections.If you make an SSL connection in which the root certificate does not exist in Oracle Integration, an exception is thrown.In that case, you must upload the appropriate certificate.A certificate enables Oracle Integration to connect with external services.If the external endpoint requires a specific certificate, request the certificate and then upload it into Oracle Integration.To upload an SSL certificate: 1.In the left navigation pane, click Home > Settings > Certificates .All certificates currently uploaded to the trust store are displayed in the Certificates dialog.The link enables you to filter by name, certificate expiration date, status, type, category, and installation method (user-installed or system-installed).Certificates installed by the system cannot be deleted.Chapter 2 Upload an SSL Certificate 2-52.Click Upload at the top of the page.The Upload Certificate dialog box is displayed.3.Enter an alias name and optional description.4.In the Type field, select the certificate type.
3.When complete, click Save .Upload an SSL Certificate Certificates are used to validate outbound SSL connections.If you make an SSL connection in which the root certificate does not exist in Oracle Integration, an exception is thrown.In that case, you must upload the appropriate certificate.A certificate enables Oracle Integration to connect with external services.If the external endpoint requires a specific certificate, request the certificate and then upload it into Oracle Integration.To upload an SSL certificate: 1.In the left navigation pane, click Home > Settings > Certificates .All certificates currently uploaded to the trust store are displayed in the Certificates dialog.The link enables you to filter by name, certificate expiration date, status, type, category, and installation method (user-installed or system-installed).Certificates installed by the system cannot be deleted.Chapter 2 Upload an SSL Certificate 2-52.Click Upload at the top of the page.The Upload Certificate dialog box is displayed.3.Enter an alias name and optional description.4.In the Type field, select the certificate type.Each certificate type enables Oracle Integration to connect with external services.
Upload an SSL Certificate Certificates are used to validate outbound SSL connections.If you make an SSL connection in which the root certificate does not exist in Oracle Integration, an exception is thrown.In that case, you must upload the appropriate certificate.A certificate enables Oracle Integration to connect with external services.If the external endpoint requires a specific certificate, request the certificate and then upload it into Oracle Integration.To upload an SSL certificate: 1.In the left navigation pane, click Home > Settings > Certificates .All certificates currently uploaded to the trust store are displayed in the Certificates dialog.The link enables you to filter by name, certificate expiration date, status, type, category, and installation method (user-installed or system-installed).Certificates installed by the system cannot be deleted.Chapter 2 Upload an SSL Certificate 2-52.Click Upload at the top of the page.The Upload Certificate dialog box is displayed.3.Enter an alias name and optional description.4.In the Type field, select the certificate type.Each certificate type enables Oracle Integration to connect with external services.X.509 (SSL transport) SAML (Authentication & Authorization) PGP (Encryption & Decryption) X.509 (SSL transport) 1.Select a certificate category.
If you make an SSL connection in which the root certificate does not exist in Oracle Integration, an exception is thrown.In that case, you must upload the appropriate certificate.A certificate enables Oracle Integration to connect with external services.If the external endpoint requires a specific certificate, request the certificate and then upload it into Oracle Integration.To upload an SSL certificate: 1.In the left navigation pane, click Home > Settings > Certificates .All certificates currently uploaded to the trust store are displayed in the Certificates dialog.The link enables you to filter by name, certificate expiration date, status, type, category, and installation method (user-installed or system-installed).Certificates installed by the system cannot be deleted.Chapter 2 Upload an SSL Certificate 2-52.Click Upload at the top of the page.The Upload Certificate dialog box is displayed.3.Enter an alias name and optional description.4.In the Type field, select the certificate type.Each certificate type enables Oracle Integration to connect with external services.X.509 (SSL transport) SAML (Authentication & Authorization) PGP (Encryption & Decryption) X.509 (SSL transport) 1.Select a certificate category.a.Trust : Use this option to upload a trust certificate.
In that case, you must upload the appropriate certificate.A certificate enables Oracle Integration to connect with external services.If the external endpoint requires a specific certificate, request the certificate and then upload it into Oracle Integration.To upload an SSL certificate: 1.In the left navigation pane, click Home > Settings > Certificates .All certificates currently uploaded to the trust store are displayed in the Certificates dialog.The link enables you to filter by name, certificate expiration date, status, type, category, and installation method (user-installed or system-installed).Certificates installed by the system cannot be deleted.Chapter 2 Upload an SSL Certificate 2-52.Click Upload at the top of the page.The Upload Certificate dialog box is displayed.3.Enter an alias name and optional description.4.In the Type field, select the certificate type.Each certificate type enables Oracle Integration to connect with external services.X.509 (SSL transport) SAML (Authentication & Authorization) PGP (Encryption & Decryption) X.509 (SSL transport) 1.Select a certificate category.a.Trust : Use this option to upload a trust certificate.i.Click Browse , then select the trust file (for example, .cer or .crt) to upload.
A certificate enables Oracle Integration to connect with external services.If the external endpoint requires a specific certificate, request the certificate and then upload it into Oracle Integration.To upload an SSL certificate: 1.In the left navigation pane, click Home > Settings > Certificates .All certificates currently uploaded to the trust store are displayed in the Certificates dialog.The link enables you to filter by name, certificate expiration date, status, type, category, and installation method (user-installed or system-installed).Certificates installed by the system cannot be deleted.Chapter 2 Upload an SSL Certificate 2-52.Click Upload at the top of the page.The Upload Certificate dialog box is displayed.3.Enter an alias name and optional description.4.In the Type field, select the certificate type.Each certificate type enables Oracle Integration to connect with external services.X.509 (SSL transport) SAML (Authentication & Authorization) PGP (Encryption & Decryption) X.509 (SSL transport) 1.Select a certificate category.a.Trust : Use this option to upload a trust certificate.i.Click Browse , then select the trust file (for example, .cer or .crt) to upload.b.Identity : Use this option to upload a certificate for two-way SSL communication.
If the external endpoint requires a specific certificate, request the certificate and then upload it into Oracle Integration.To upload an SSL certificate: 1.In the left navigation pane, click Home > Settings > Certificates .All certificates currently uploaded to the trust store are displayed in the Certificates dialog.The link enables you to filter by name, certificate expiration date, status, type, category, and installation method (user-installed or system-installed).Certificates installed by the system cannot be deleted.Chapter 2 Upload an SSL Certificate 2-52.Click Upload at the top of the page.The Upload Certificate dialog box is displayed.3.Enter an alias name and optional description.4.In the Type field, select the certificate type.Each certificate type enables Oracle Integration to connect with external services.X.509 (SSL transport) SAML (Authentication & Authorization) PGP (Encryption & Decryption) X.509 (SSL transport) 1.Select a certificate category.a.Trust : Use this option to upload a trust certificate.i.Click Browse , then select the trust file (for example, .cer or .crt) to upload.b.Identity : Use this option to upload a certificate for two-way SSL communication.i.Click Browse , then select the keystore file ( .jks) to upload.
To upload an SSL certificate: 1.In the left navigation pane, click Home > Settings > Certificates .All certificates currently uploaded to the trust store are displayed in the Certificates dialog.The link enables you to filter by name, certificate expiration date, status, type, category, and installation method (user-installed or system-installed).Certificates installed by the system cannot be deleted.Chapter 2 Upload an SSL Certificate 2-52.Click Upload at the top of the page.The Upload Certificate dialog box is displayed.3.Enter an alias name and optional description.4.In the Type field, select the certificate type.Each certificate type enables Oracle Integration to connect with external services.X.509 (SSL transport) SAML (Authentication & Authorization) PGP (Encryption & Decryption) X.509 (SSL transport) 1.Select a certificate category.a.Trust : Use this option to upload a trust certificate.i.Click Browse , then select the trust file (for example, .cer or .crt) to upload.b.Identity : Use this option to upload a certificate for two-way SSL communication.i.Click Browse , then select the keystore file ( .jks) to upload.ii.Enter the comma-separated list of passwords corresponding to key aliases.
All certificates currently uploaded to the trust store are displayed in the Certificates dialog.The link enables you to filter by name, certificate expiration date, status, type, category, and installation method (user-installed or system-installed).Certificates installed by the system cannot be deleted.Chapter 2 Upload an SSL Certificate 2-52.Click Upload at the top of the page.The Upload Certificate dialog box is displayed.3.Enter an alias name and optional description.4.In the Type field, select the certificate type.Each certificate type enables Oracle Integration to connect with external services.X.509 (SSL transport) SAML (Authentication & Authorization) PGP (Encryption & Decryption) X.509 (SSL transport) 1.Select a certificate category.a.Trust : Use this option to upload a trust certificate.i.Click Browse , then select the trust file (for example, .cer or .crt) to upload.b.Identity : Use this option to upload a certificate for two-way SSL communication.i.Click Browse , then select the keystore file ( .jks) to upload.ii.Enter the comma-separated list of passwords corresponding to key aliases.Note: When an identity certificate file (JKS) contains more than one private key, all the private keys must have the same password.
The link enables you to filter by name, certificate expiration date, status, type, category, and installation method (user-installed or system-installed).Certificates installed by the system cannot be deleted.Chapter 2 Upload an SSL Certificate 2-52.Click Upload at the top of the page.The Upload Certificate dialog box is displayed.3.Enter an alias name and optional description.4.In the Type field, select the certificate type.Each certificate type enables Oracle Integration to connect with external services.X.509 (SSL transport) SAML (Authentication & Authorization) PGP (Encryption & Decryption) X.509 (SSL transport) 1.Select a certificate category.a.Trust : Use this option to upload a trust certificate.i.Click Browse , then select the trust file (for example, .cer or .crt) to upload.b.Identity : Use this option to upload a certificate for two-way SSL communication.i.Click Browse , then select the keystore file ( .jks) to upload.ii.Enter the comma-separated list of passwords corresponding to key aliases.Note: When an identity certificate file (JKS) contains more than one private key, all the private keys must have the same password.If the private keys are protected with different passwords, the private keys cannot be extracted from the keystore.
Certificates installed by the system cannot be deleted.Chapter 2 Upload an SSL Certificate 2-52.Click Upload at the top of the page.The Upload Certificate dialog box is displayed.3.Enter an alias name and optional description.4.In the Type field, select the certificate type.Each certificate type enables Oracle Integration to connect with external services.X.509 (SSL transport) SAML (Authentication & Authorization) PGP (Encryption & Decryption) X.509 (SSL transport) 1.Select a certificate category.a.Trust : Use this option to upload a trust certificate.i.Click Browse , then select the trust file (for example, .cer or .crt) to upload.b.Identity : Use this option to upload a certificate for two-way SSL communication.i.Click Browse , then select the keystore file ( .jks) to upload.ii.Enter the comma-separated list of passwords corresponding to key aliases.Note: When an identity certificate file (JKS) contains more than one private key, all the private keys must have the same password.If the private keys are protected with different passwords, the private keys cannot be extracted from the keystore.iii.Enter the password of the keystore being imported.
Chapter 2 Upload an SSL Certificate 2-52.Click Upload at the top of the page.The Upload Certificate dialog box is displayed.3.Enter an alias name and optional description.4.In the Type field, select the certificate type.Each certificate type enables Oracle Integration to connect with external services.X.509 (SSL transport) SAML (Authentication & Authorization) PGP (Encryption & Decryption) X.509 (SSL transport) 1.Select a certificate category.a.Trust : Use this option to upload a trust certificate.i.Click Browse , then select the trust file (for example, .cer or .crt) to upload.b.Identity : Use this option to upload a certificate for two-way SSL communication.i.Click Browse , then select the keystore file ( .jks) to upload.ii.Enter the comma-separated list of passwords corresponding to key aliases.Note: When an identity certificate file (JKS) contains more than one private key, all the private keys must have the same password.If the private keys are protected with different passwords, the private keys cannot be extracted from the keystore.iii.Enter the password of the keystore being imported.c.Click Upload .
The Upload Certificate dialog box is displayed.3.Enter an alias name and optional description.4.In the Type field, select the certificate type.Each certificate type enables Oracle Integration to connect with external services.X.509 (SSL transport) SAML (Authentication & Authorization) PGP (Encryption & Decryption) X.509 (SSL transport) 1.Select a certificate category.a.Trust : Use this option to upload a trust certificate.i.Click Browse , then select the trust file (for example, .cer or .crt) to upload.b.Identity : Use this option to upload a certificate for two-way SSL communication.i.Click Browse , then select the keystore file ( .jks) to upload.ii.Enter the comma-separated list of passwords corresponding to key aliases.Note: When an identity certificate file (JKS) contains more than one private key, all the private keys must have the same password.If the private keys are protected with different passwords, the private keys cannot be extracted from the keystore.iii.Enter the password of the keystore being imported.c.Click Upload .SAML (Authentication & Authorization) 1.Note that Message Protection is automatically selected as the only available certificate category and cannot be deselected.
3.Enter an alias name and optional description.4.In the Type field, select the certificate type.Each certificate type enables Oracle Integration to connect with external services.X.509 (SSL transport) SAML (Authentication & Authorization) PGP (Encryption & Decryption) X.509 (SSL transport) 1.Select a certificate category.a.Trust : Use this option to upload a trust certificate.i.Click Browse , then select the trust file (for example, .cer or .crt) to upload.b.Identity : Use this option to upload a certificate for two-way SSL communication.i.Click Browse , then select the keystore file ( .jks) to upload.ii.Enter the comma-separated list of passwords corresponding to key aliases.Note: When an identity certificate file (JKS) contains more than one private key, all the private keys must have the same password.If the private keys are protected with different passwords, the private keys cannot be extracted from the keystore.iii.Enter the password of the keystore being imported.c.Click Upload .SAML (Authentication & Authorization) 1.Note that Message Protection is automatically selected as the only available certificate category and cannot be deselected.Use this option to upload a keystore certificate with SAML token support.
4.In the Type field, select the certificate type.Each certificate type enables Oracle Integration to connect with external services.X.509 (SSL transport) SAML (Authentication & Authorization) PGP (Encryption & Decryption) X.509 (SSL transport) 1.Select a certificate category.a.Trust : Use this option to upload a trust certificate.i.Click Browse , then select the trust file (for example, .cer or .crt) to upload.b.Identity : Use this option to upload a certificate for two-way SSL communication.i.Click Browse , then select the keystore file ( .jks) to upload.ii.Enter the comma-separated list of passwords corresponding to key aliases.Note: When an identity certificate file (JKS) contains more than one private key, all the private keys must have the same password.If the private keys are protected with different passwords, the private keys cannot be extracted from the keystore.iii.Enter the password of the keystore being imported.c.Click Upload .SAML (Authentication & Authorization) 1.Note that Message Protection is automatically selected as the only available certificate category and cannot be deselected.Use this option to upload a keystore certificate with SAML token support.Create, read, update, and delete (CRUD) operations are supported with this type of certificate.
Each certificate type enables Oracle Integration to connect with external services.X.509 (SSL transport) SAML (Authentication & Authorization) PGP (Encryption & Decryption) X.509 (SSL transport) 1.Select a certificate category.a.Trust : Use this option to upload a trust certificate.i.Click Browse , then select the trust file (for example, .cer or .crt) to upload.b.Identity : Use this option to upload a certificate for two-way SSL communication.i.Click Browse , then select the keystore file ( .jks) to upload.ii.Enter the comma-separated list of passwords corresponding to key aliases.Note: When an identity certificate file (JKS) contains more than one private key, all the private keys must have the same password.If the private keys are protected with different passwords, the private keys cannot be extracted from the keystore.iii.Enter the password of the keystore being imported.c.Click Upload .SAML (Authentication & Authorization) 1.Note that Message Protection is automatically selected as the only available certificate category and cannot be deselected.Use this option to upload a keystore certificate with SAML token support.Create, read, update, and delete (CRUD) operations are supported with this type of certificate.2.Click Browse , then select the certificate file ( .cer or .crt) to upload.
X.509 (SSL transport) SAML (Authentication & Authorization) PGP (Encryption & Decryption) X.509 (SSL transport) 1.Select a certificate category.a.Trust : Use this option to upload a trust certificate.i.Click Browse , then select the trust file (for example, .cer or .crt) to upload.b.Identity : Use this option to upload a certificate for two-way SSL communication.i.Click Browse , then select the keystore file ( .jks) to upload.ii.Enter the comma-separated list of passwords corresponding to key aliases.Note: When an identity certificate file (JKS) contains more than one private key, all the private keys must have the same password.If the private keys are protected with different passwords, the private keys cannot be extracted from the keystore.iii.Enter the password of the keystore being imported.c.Click Upload .SAML (Authentication & Authorization) 1.Note that Message Protection is automatically selected as the only available certificate category and cannot be deselected.Use this option to upload a keystore certificate with SAML token support.Create, read, update, and delete (CRUD) operations are supported with this type of certificate.2.Click Browse , then select the certificate file ( .cer or .crt) to upload.3.Click Upload .
a.Trust : Use this option to upload a trust certificate.i.Click Browse , then select the trust file (for example, .cer or .crt) to upload.b.Identity : Use this option to upload a certificate for two-way SSL communication.i.Click Browse , then select the keystore file ( .jks) to upload.ii.Enter the comma-separated list of passwords corresponding to key aliases.Note: When an identity certificate file (JKS) contains more than one private key, all the private keys must have the same password.If the private keys are protected with different passwords, the private keys cannot be extracted from the keystore.iii.Enter the password of the keystore being imported.c.Click Upload .SAML (Authentication & Authorization) 1.Note that Message Protection is automatically selected as the only available certificate category and cannot be deselected.Use this option to upload a keystore certificate with SAML token support.Create, read, update, and delete (CRUD) operations are supported with this type of certificate.2.Click Browse , then select the certificate file ( .cer or .crt) to upload.3.Click Upload .PGP (Encryption & Decryption) 1.Select a certificate category.
i.Click Browse , then select the trust file (for example, .cer or .crt) to upload.b.Identity : Use this option to upload a certificate for two-way SSL communication.i.Click Browse , then select the keystore file ( .jks) to upload.ii.Enter the comma-separated list of passwords corresponding to key aliases.Note: When an identity certificate file (JKS) contains more than one private key, all the private keys must have the same password.If the private keys are protected with different passwords, the private keys cannot be extracted from the keystore.iii.Enter the password of the keystore being imported.c.Click Upload .SAML (Authentication & Authorization) 1.Note that Message Protection is automatically selected as the only available certificate category and cannot be deselected.Use this option to upload a keystore certificate with SAML token support.Create, read, update, and delete (CRUD) operations are supported with this type of certificate.2.Click Browse , then select the certificate file ( .cer or .crt) to upload.3.Click Upload .PGP (Encryption & Decryption) 1.Select a certificate category.Pretty Good Privacy (PGP) provides cryptographic privacy and authentication for communication.
b.Identity : Use this option to upload a certificate for two-way SSL communication.i.Click Browse , then select the keystore file ( .jks) to upload.ii.Enter the comma-separated list of passwords corresponding to key aliases.Note: When an identity certificate file (JKS) contains more than one private key, all the private keys must have the same password.If the private keys are protected with different passwords, the private keys cannot be extracted from the keystore.iii.Enter the password of the keystore being imported.c.Click Upload .SAML (Authentication & Authorization) 1.Note that Message Protection is automatically selected as the only available certificate category and cannot be deselected.Use this option to upload a keystore certificate with SAML token support.Create, read, update, and delete (CRUD) operations are supported with this type of certificate.2.Click Browse , then select the certificate file ( .cer or .crt) to upload.3.Click Upload .PGP (Encryption & Decryption) 1.Select a certificate category.Pretty Good Privacy (PGP) provides cryptographic privacy and authentication for communication.PGP is used for signing, encrypting, and decrypting files.
i.Click Browse , then select the keystore file ( .jks) to upload.ii.Enter the comma-separated list of passwords corresponding to key aliases.Note: When an identity certificate file (JKS) contains more than one private key, all the private keys must have the same password.If the private keys are protected with different passwords, the private keys cannot be extracted from the keystore.iii.Enter the password of the keystore being imported.c.Click Upload .SAML (Authentication & Authorization) 1.Note that Message Protection is automatically selected as the only available certificate category and cannot be deselected.Use this option to upload a keystore certificate with SAML token support.Create, read, update, and delete (CRUD) operations are supported with this type of certificate.2.Click Browse , then select the certificate file ( .cer or .crt) to upload.3.Click Upload .PGP (Encryption & Decryption) 1.Select a certificate category.Pretty Good Privacy (PGP) provides cryptographic privacy and authentication for communication.PGP is used for signing, encrypting, and decrypting files.You can select the private key to use for encryption or decryption when configuring the stage file action.
ii.Enter the comma-separated list of passwords corresponding to key aliases.Note: When an identity certificate file (JKS) contains more than one private key, all the private keys must have the same password.If the private keys are protected with different passwords, the private keys cannot be extracted from the keystore.iii.Enter the password of the keystore being imported.c.Click Upload .SAML (Authentication & Authorization) 1.Note that Message Protection is automatically selected as the only available certificate category and cannot be deselected.Use this option to upload a keystore certificate with SAML token support.Create, read, update, and delete (CRUD) operations are supported with this type of certificate.2.Click Browse , then select the certificate file ( .cer or .crt) to upload.3.Click Upload .PGP (Encryption & Decryption) 1.Select a certificate category.Pretty Good Privacy (PGP) provides cryptographic privacy and authentication for communication.PGP is used for signing, encrypting, and decrypting files.You can select the private key to use for encryption or decryption when configuring the stage file action.a.Private : Uses a private key of the target location to decrypt the file.Chapter 2 Upload an SSL Certificate 2-6i.Click Browse , then select the PGP file to upload.
Note: When an identity certificate file (JKS) contains more than one private key, all the private keys must have the same password.If the private keys are protected with different passwords, the private keys cannot be extracted from the keystore.iii.Enter the password of the keystore being imported.c.Click Upload .SAML (Authentication & Authorization) 1.Note that Message Protection is automatically selected as the only available certificate category and cannot be deselected.Use this option to upload a keystore certificate with SAML token support.Create, read, update, and delete (CRUD) operations are supported with this type of certificate.2.Click Browse , then select the certificate file ( .cer or .crt) to upload.3.Click Upload .PGP (Encryption & Decryption) 1.Select a certificate category.Pretty Good Privacy (PGP) provides cryptographic privacy and authentication for communication.PGP is used for signing, encrypting, and decrypting files.You can select the private key to use for encryption or decryption when configuring the stage file action.a.Private : Uses a private key of the target location to decrypt the file.Chapter 2 Upload an SSL Certificate 2-6i.Click Browse , then select the PGP file to upload.ii.Enter the PGP private key password.
If the private keys are protected with different passwords, the private keys cannot be extracted from the keystore.iii.Enter the password of the keystore being imported.c.Click Upload .SAML (Authentication & Authorization) 1.Note that Message Protection is automatically selected as the only available certificate category and cannot be deselected.Use this option to upload a keystore certificate with SAML token support.Create, read, update, and delete (CRUD) operations are supported with this type of certificate.2.Click Browse , then select the certificate file ( .cer or .crt) to upload.3.Click Upload .PGP (Encryption & Decryption) 1.Select a certificate category.Pretty Good Privacy (PGP) provides cryptographic privacy and authentication for communication.PGP is used for signing, encrypting, and decrypting files.You can select the private key to use for encryption or decryption when configuring the stage file action.a.Private : Uses a private key of the target location to decrypt the file.Chapter 2 Upload an SSL Certificate 2-6i.Click Browse , then select the PGP file to upload.ii.Enter the PGP private key password.b.Public : Uses a public key of the target location to encrypt the file.
iii.Enter the password of the keystore being imported.c.Click Upload .SAML (Authentication & Authorization) 1.Note that Message Protection is automatically selected as the only available certificate category and cannot be deselected.Use this option to upload a keystore certificate with SAML token support.Create, read, update, and delete (CRUD) operations are supported with this type of certificate.2.Click Browse , then select the certificate file ( .cer or .crt) to upload.3.Click Upload .PGP (Encryption & Decryption) 1.Select a certificate category.Pretty Good Privacy (PGP) provides cryptographic privacy and authentication for communication.PGP is used for signing, encrypting, and decrypting files.You can select the private key to use for encryption or decryption when configuring the stage file action.a.Private : Uses a private key of the target location to decrypt the file.Chapter 2 Upload an SSL Certificate 2-6i.Click Browse , then select the PGP file to upload.ii.Enter the PGP private key password.b.Public : Uses a public key of the target location to encrypt the file.i.Click Browse , then select the PGP file to upload.
c.Click Upload .SAML (Authentication & Authorization) 1.Note that Message Protection is automatically selected as the only available certificate category and cannot be deselected.Use this option to upload a keystore certificate with SAML token support.Create, read, update, and delete (CRUD) operations are supported with this type of certificate.2.Click Browse , then select the certificate file ( .cer or .crt) to upload.3.Click Upload .PGP (Encryption & Decryption) 1.Select a certificate category.Pretty Good Privacy (PGP) provides cryptographic privacy and authentication for communication.PGP is used for signing, encrypting, and decrypting files.You can select the private key to use for encryption or decryption when configuring the stage file action.a.Private : Uses a private key of the target location to decrypt the file.Chapter 2 Upload an SSL Certificate 2-6i.Click Browse , then select the PGP file to upload.ii.Enter the PGP private key password.b.Public : Uses a public key of the target location to encrypt the file.i.Click Browse , then select the PGP file to upload.ii.In the ASCII-Armor Encryption Format field, select Yes or No.
SAML (Authentication & Authorization) 1.Note that Message Protection is automatically selected as the only available certificate category and cannot be deselected.Use this option to upload a keystore certificate with SAML token support.Create, read, update, and delete (CRUD) operations are supported with this type of certificate.2.Click Browse , then select the certificate file ( .cer or .crt) to upload.3.Click Upload .PGP (Encryption & Decryption) 1.Select a certificate category.Pretty Good Privacy (PGP) provides cryptographic privacy and authentication for communication.PGP is used for signing, encrypting, and decrypting files.You can select the private key to use for encryption or decryption when configuring the stage file action.a.Private : Uses a private key of the target location to decrypt the file.Chapter 2 Upload an SSL Certificate 2-6i.Click Browse , then select the PGP file to upload.ii.Enter the PGP private key password.b.Public : Uses a public key of the target location to encrypt the file.i.Click Browse , then select the PGP file to upload.ii.In the ASCII-Armor Encryption Format field, select Yes or No.Yes shows the format of the encrypted message in ASCII armor.
Use this option to upload a keystore certificate with SAML token support.Create, read, update, and delete (CRUD) operations are supported with this type of certificate.2.Click Browse , then select the certificate file ( .cer or .crt) to upload.3.Click Upload .PGP (Encryption & Decryption) 1.Select a certificate category.Pretty Good Privacy (PGP) provides cryptographic privacy and authentication for communication.PGP is used for signing, encrypting, and decrypting files.You can select the private key to use for encryption or decryption when configuring the stage file action.a.Private : Uses a private key of the target location to decrypt the file.Chapter 2 Upload an SSL Certificate 2-6i.Click Browse , then select the PGP file to upload.ii.Enter the PGP private key password.b.Public : Uses a public key of the target location to encrypt the file.i.Click Browse , then select the PGP file to upload.ii.In the ASCII-Armor Encryption Format field, select Yes or No.Yes shows the format of the encrypted message in ASCII armor.ASCII armor is a binary-to- textual encoding converter.
Create, read, update, and delete (CRUD) operations are supported with this type of certificate.2.Click Browse , then select the certificate file ( .cer or .crt) to upload.3.Click Upload .PGP (Encryption & Decryption) 1.Select a certificate category.Pretty Good Privacy (PGP) provides cryptographic privacy and authentication for communication.PGP is used for signing, encrypting, and decrypting files.You can select the private key to use for encryption or decryption when configuring the stage file action.a.Private : Uses a private key of the target location to decrypt the file.Chapter 2 Upload an SSL Certificate 2-6i.Click Browse , then select the PGP file to upload.ii.Enter the PGP private key password.b.Public : Uses a public key of the target location to encrypt the file.i.Click Browse , then select the PGP file to upload.ii.In the ASCII-Armor Encryption Format field, select Yes or No.Yes shows the format of the encrypted message in ASCII armor.ASCII armor is a binary-to- textual encoding converter.ASCII armor formats encrypted messaging in ASCII.
2.Click Browse , then select the certificate file ( .cer or .crt) to upload.3.Click Upload .PGP (Encryption & Decryption) 1.Select a certificate category.Pretty Good Privacy (PGP) provides cryptographic privacy and authentication for communication.PGP is used for signing, encrypting, and decrypting files.You can select the private key to use for encryption or decryption when configuring the stage file action.a.Private : Uses a private key of the target location to decrypt the file.Chapter 2 Upload an SSL Certificate 2-6i.Click Browse , then select the PGP file to upload.ii.Enter the PGP private key password.b.Public : Uses a public key of the target location to encrypt the file.i.Click Browse , then select the PGP file to upload.ii.In the ASCII-Armor Encryption Format field, select Yes or No.Yes shows the format of the encrypted message in ASCII armor.ASCII armor is a binary-to- textual encoding converter.ASCII armor formats encrypted messaging in ASCII.This enables messages to be sent in a standard messaging format.
3.Click Upload .PGP (Encryption & Decryption) 1.Select a certificate category.Pretty Good Privacy (PGP) provides cryptographic privacy and authentication for communication.PGP is used for signing, encrypting, and decrypting files.You can select the private key to use for encryption or decryption when configuring the stage file action.a.Private : Uses a private key of the target location to decrypt the file.Chapter 2 Upload an SSL Certificate 2-6i.Click Browse , then select the PGP file to upload.ii.Enter the PGP private key password.b.Public : Uses a public key of the target location to encrypt the file.i.Click Browse , then select the PGP file to upload.ii.In the ASCII-Armor Encryption Format field, select Yes or No.Yes shows the format of the encrypted message in ASCII armor.ASCII armor is a binary-to- textual encoding converter.ASCII armor formats encrypted messaging in ASCII.This enables messages to be sent in a standard messaging format.This selection impacts the visibility of message content.
PGP (Encryption & Decryption) 1.Select a certificate category.Pretty Good Privacy (PGP) provides cryptographic privacy and authentication for communication.PGP is used for signing, encrypting, and decrypting files.You can select the private key to use for encryption or decryption when configuring the stage file action.a.Private : Uses a private key of the target location to decrypt the file.Chapter 2 Upload an SSL Certificate 2-6i.Click Browse , then select the PGP file to upload.ii.Enter the PGP private key password.b.Public : Uses a public key of the target location to encrypt the file.i.Click Browse , then select the PGP file to upload.ii.In the ASCII-Armor Encryption Format field, select Yes or No.Yes shows the format of the encrypted message in ASCII armor.ASCII armor is a binary-to- textual encoding converter.ASCII armor formats encrypted messaging in ASCII.This enables messages to be sent in a standard messaging format.This selection impacts the visibility of message content.No causes the message to be sent in binary format.
Pretty Good Privacy (PGP) provides cryptographic privacy and authentication for communication.PGP is used for signing, encrypting, and decrypting files.You can select the private key to use for encryption or decryption when configuring the stage file action.a.Private : Uses a private key of the target location to decrypt the file.Chapter 2 Upload an SSL Certificate 2-6i.Click Browse , then select the PGP file to upload.ii.Enter the PGP private key password.b.Public : Uses a public key of the target location to encrypt the file.i.Click Browse , then select the PGP file to upload.ii.In the ASCII-Armor Encryption Format field, select Yes or No.Yes shows the format of the encrypted message in ASCII armor.ASCII armor is a binary-to- textual encoding converter.ASCII armor formats encrypted messaging in ASCII.This enables messages to be sent in a standard messaging format.This selection impacts the visibility of message content.No causes the message to be sent in binary format.iii.From the Cipher Algorithm list, select the algorithm to use.
PGP is used for signing, encrypting, and decrypting files.You can select the private key to use for encryption or decryption when configuring the stage file action.a.Private : Uses a private key of the target location to decrypt the file.Chapter 2 Upload an SSL Certificate 2-6i.Click Browse , then select the PGP file to upload.ii.Enter the PGP private key password.b.Public : Uses a public key of the target location to encrypt the file.i.Click Browse , then select the PGP file to upload.ii.In the ASCII-Armor Encryption Format field, select Yes or No.Yes shows the format of the encrypted message in ASCII armor.ASCII armor is a binary-to- textual encoding converter.ASCII armor formats encrypted messaging in ASCII.This enables messages to be sent in a standard messaging format.This selection impacts the visibility of message content.No causes the message to be sent in binary format.iii.From the Cipher Algorithm list, select the algorithm to use.Symmetric-key algorithms for cryptography use the same cryptographic keys for both encryption of plain text and decryption of cipher text.
You can select the private key to use for encryption or decryption when configuring the stage file action.a.Private : Uses a private key of the target location to decrypt the file.Chapter 2 Upload an SSL Certificate 2-6i.Click Browse , then select the PGP file to upload.ii.Enter the PGP private key password.b.Public : Uses a public key of the target location to encrypt the file.i.Click Browse , then select the PGP file to upload.ii.In the ASCII-Armor Encryption Format field, select Yes or No.Yes shows the format of the encrypted message in ASCII armor.ASCII armor is a binary-to- textual encoding converter.ASCII armor formats encrypted messaging in ASCII.This enables messages to be sent in a standard messaging format.This selection impacts the visibility of message content.No causes the message to be sent in binary format.iii.From the Cipher Algorithm list, select the algorithm to use.Symmetric-key algorithms for cryptography use the same cryptographic keys for both encryption of plain text and decryption of cipher text.c.Click Upload .Chapter 2 Upload an SSL Certificate 2-73 Add the Microsoft Office 365 Outlook Adapter Connection to an Integration When you drag the Microsoft Office 365 Outlook Adapter into the invoke area of an integration, the Adapter Endpoint Configuration Wizard appears.
a.Private : Uses a private key of the target location to decrypt the file.Chapter 2 Upload an SSL Certificate 2-6i.Click Browse , then select the PGP file to upload.ii.Enter the PGP private key password.b.Public : Uses a public key of the target location to encrypt the file.i.Click Browse , then select the PGP file to upload.ii.In the ASCII-Armor Encryption Format field, select Yes or No.Yes shows the format of the encrypted message in ASCII armor.ASCII armor is a binary-to- textual encoding converter.ASCII armor formats encrypted messaging in ASCII.This enables messages to be sent in a standard messaging format.This selection impacts the visibility of message content.No causes the message to be sent in binary format.iii.From the Cipher Algorithm list, select the algorithm to use.Symmetric-key algorithms for cryptography use the same cryptographic keys for both encryption of plain text and decryption of cipher text.c.Click Upload .Chapter 2 Upload an SSL Certificate 2-73 Add the Microsoft Office 365 Outlook Adapter Connection to an Integration When you drag the Microsoft Office 365 Outlook Adapter into the invoke area of an integration, the Adapter Endpoint Configuration Wizard appears.This wizard guides you through configuration of Microsoft Office 365 Outlook Adapter endpoint properties.
ii.Enter the PGP private key password.b.Public : Uses a public key of the target location to encrypt the file.i.Click Browse , then select the PGP file to upload.ii.In the ASCII-Armor Encryption Format field, select Yes or No.Yes shows the format of the encrypted message in ASCII armor.ASCII armor is a binary-to- textual encoding converter.ASCII armor formats encrypted messaging in ASCII.This enables messages to be sent in a standard messaging format.This selection impacts the visibility of message content.No causes the message to be sent in binary format.iii.From the Cipher Algorithm list, select the algorithm to use.Symmetric-key algorithms for cryptography use the same cryptographic keys for both encryption of plain text and decryption of cipher text.c.Click Upload .Chapter 2 Upload an SSL Certificate 2-73 Add the Microsoft Office 365 Outlook Adapter Connection to an Integration When you drag the Microsoft Office 365 Outlook Adapter into the invoke area of an integration, the Adapter Endpoint Configuration Wizard appears.This wizard guides you through configuration of Microsoft Office 365 Outlook Adapter endpoint properties.These topics describe the wizard pages that guide you through configuration of the Microsoft Office 365 Outlook Adapter as an invoke in an integration.
b.Public : Uses a public key of the target location to encrypt the file.i.Click Browse , then select the PGP file to upload.ii.In the ASCII-Armor Encryption Format field, select Yes or No.Yes shows the format of the encrypted message in ASCII armor.ASCII armor is a binary-to- textual encoding converter.ASCII armor formats encrypted messaging in ASCII.This enables messages to be sent in a standard messaging format.This selection impacts the visibility of message content.No causes the message to be sent in binary format.iii.From the Cipher Algorithm list, select the algorithm to use.Symmetric-key algorithms for cryptography use the same cryptographic keys for both encryption of plain text and decryption of cipher text.c.Click Upload .Chapter 2 Upload an SSL Certificate 2-73 Add the Microsoft Office 365 Outlook Adapter Connection to an Integration When you drag the Microsoft Office 365 Outlook Adapter into the invoke area of an integration, the Adapter Endpoint Configuration Wizard appears.This wizard guides you through configuration of Microsoft Office 365 Outlook Adapter endpoint properties.These topics describe the wizard pages that guide you through configuration of the Microsoft Office 365 Outlook Adapter as an invoke in an integration.The Microsoft Office 365 Outlook Adapter cannot be used as a trigger in an integration.
i.Click Browse , then select the PGP file to upload.ii.In the ASCII-Armor Encryption Format field, select Yes or No.Yes shows the format of the encrypted message in ASCII armor.ASCII armor is a binary-to- textual encoding converter.ASCII armor formats encrypted messaging in ASCII.This enables messages to be sent in a standard messaging format.This selection impacts the visibility of message content.No causes the message to be sent in binary format.iii.From the Cipher Algorithm list, select the algorithm to use.Symmetric-key algorithms for cryptography use the same cryptographic keys for both encryption of plain text and decryption of cipher text.c.Click Upload .Chapter 2 Upload an SSL Certificate 2-73 Add the Microsoft Office 365 Outlook Adapter Connection to an Integration When you drag the Microsoft Office 365 Outlook Adapter into the invoke area of an integration, the Adapter Endpoint Configuration Wizard appears.This wizard guides you through configuration of Microsoft Office 365 Outlook Adapter endpoint properties.These topics describe the wizard pages that guide you through configuration of the Microsoft Office 365 Outlook Adapter as an invoke in an integration.The Microsoft Office 365 Outlook Adapter cannot be used as a trigger in an integration.Topics: Basic Info Page Invoke Operations Page Summary Page Basic Info Page You can enter a name and description on the Basic Info page of each adapter in your integration.
ii.In the ASCII-Armor Encryption Format field, select Yes or No.Yes shows the format of the encrypted message in ASCII armor.ASCII armor is a binary-to- textual encoding converter.ASCII armor formats encrypted messaging in ASCII.This enables messages to be sent in a standard messaging format.This selection impacts the visibility of message content.No causes the message to be sent in binary format.iii.From the Cipher Algorithm list, select the algorithm to use.Symmetric-key algorithms for cryptography use the same cryptographic keys for both encryption of plain text and decryption of cipher text.c.Click Upload .Chapter 2 Upload an SSL Certificate 2-73 Add the Microsoft Office 365 Outlook Adapter Connection to an Integration When you drag the Microsoft Office 365 Outlook Adapter into the invoke area of an integration, the Adapter Endpoint Configuration Wizard appears.This wizard guides you through configuration of Microsoft Office 365 Outlook Adapter endpoint properties.These topics describe the wizard pages that guide you through configuration of the Microsoft Office 365 Outlook Adapter as an invoke in an integration.The Microsoft Office 365 Outlook Adapter cannot be used as a trigger in an integration.Topics: Basic Info Page Invoke Operations Page Summary Page Basic Info Page You can enter a name and description on the Basic Info page of each adapter in your integration.Element Description What do you want to call your endpoint?Provide a meaningful name so that others can understand the responsibilities of this connection.
Yes shows the format of the encrypted message in ASCII armor.ASCII armor is a binary-to- textual encoding converter.ASCII armor formats encrypted messaging in ASCII.This enables messages to be sent in a standard messaging format.This selection impacts the visibility of message content.No causes the message to be sent in binary format.iii.From the Cipher Algorithm list, select the algorithm to use.Symmetric-key algorithms for cryptography use the same cryptographic keys for both encryption of plain text and decryption of cipher text.c.Click Upload .Chapter 2 Upload an SSL Certificate 2-73 Add the Microsoft Office 365 Outlook Adapter Connection to an Integration When you drag the Microsoft Office 365 Outlook Adapter into the invoke area of an integration, the Adapter Endpoint Configuration Wizard appears.This wizard guides you through configuration of Microsoft Office 365 Outlook Adapter endpoint properties.These topics describe the wizard pages that guide you through configuration of the Microsoft Office 365 Outlook Adapter as an invoke in an integration.The Microsoft Office 365 Outlook Adapter cannot be used as a trigger in an integration.Topics: Basic Info Page Invoke Operations Page Summary Page Basic Info Page You can enter a name and description on the Basic Info page of each adapter in your integration.Element Description What do you want to call your endpoint?Provide a meaningful name so that others can understand the responsibilities of this connection.You can include English alphabetic characters, numbers, underscores, and hyphens in the name.
ASCII armor is a binary-to- textual encoding converter.ASCII armor formats encrypted messaging in ASCII.This enables messages to be sent in a standard messaging format.This selection impacts the visibility of message content.No causes the message to be sent in binary format.iii.From the Cipher Algorithm list, select the algorithm to use.Symmetric-key algorithms for cryptography use the same cryptographic keys for both encryption of plain text and decryption of cipher text.c.Click Upload .Chapter 2 Upload an SSL Certificate 2-73 Add the Microsoft Office 365 Outlook Adapter Connection to an Integration When you drag the Microsoft Office 365 Outlook Adapter into the invoke area of an integration, the Adapter Endpoint Configuration Wizard appears.This wizard guides you through configuration of Microsoft Office 365 Outlook Adapter endpoint properties.These topics describe the wizard pages that guide you through configuration of the Microsoft Office 365 Outlook Adapter as an invoke in an integration.The Microsoft Office 365 Outlook Adapter cannot be used as a trigger in an integration.Topics: Basic Info Page Invoke Operations Page Summary Page Basic Info Page You can enter a name and description on the Basic Info page of each adapter in your integration.Element Description What do you want to call your endpoint?Provide a meaningful name so that others can understand the responsibilities of this connection.You can include English alphabetic characters, numbers, underscores, and hyphens in the name.You cant include the following characters: No blank spaces (for example, My Inbound Connection ) No special characters (for example, #;83& or righ(t)now4 ) except underscores and hyphens No multibyte characters What does this endpoint do?Enter an optional description of the connection's responsibilities.
ASCII armor formats encrypted messaging in ASCII.This enables messages to be sent in a standard messaging format.This selection impacts the visibility of message content.No causes the message to be sent in binary format.iii.From the Cipher Algorithm list, select the algorithm to use.Symmetric-key algorithms for cryptography use the same cryptographic keys for both encryption of plain text and decryption of cipher text.c.Click Upload .Chapter 2 Upload an SSL Certificate 2-73 Add the Microsoft Office 365 Outlook Adapter Connection to an Integration When you drag the Microsoft Office 365 Outlook Adapter into the invoke area of an integration, the Adapter Endpoint Configuration Wizard appears.This wizard guides you through configuration of Microsoft Office 365 Outlook Adapter endpoint properties.These topics describe the wizard pages that guide you through configuration of the Microsoft Office 365 Outlook Adapter as an invoke in an integration.The Microsoft Office 365 Outlook Adapter cannot be used as a trigger in an integration.Topics: Basic Info Page Invoke Operations Page Summary Page Basic Info Page You can enter a name and description on the Basic Info page of each adapter in your integration.Element Description What do you want to call your endpoint?Provide a meaningful name so that others can understand the responsibilities of this connection.You can include English alphabetic characters, numbers, underscores, and hyphens in the name.You cant include the following characters: No blank spaces (for example, My Inbound Connection ) No special characters (for example, #;83& or righ(t)now4 ) except underscores and hyphens No multibyte characters What does this endpoint do?Enter an optional description of the connection's responsibilities.For example: This connection receives an inbound request to synchronize account information with the cloud application.
This enables messages to be sent in a standard messaging format.This selection impacts the visibility of message content.No causes the message to be sent in binary format.iii.From the Cipher Algorithm list, select the algorithm to use.Symmetric-key algorithms for cryptography use the same cryptographic keys for both encryption of plain text and decryption of cipher text.c.Click Upload .Chapter 2 Upload an SSL Certificate 2-73 Add the Microsoft Office 365 Outlook Adapter Connection to an Integration When you drag the Microsoft Office 365 Outlook Adapter into the invoke area of an integration, the Adapter Endpoint Configuration Wizard appears.This wizard guides you through configuration of Microsoft Office 365 Outlook Adapter endpoint properties.These topics describe the wizard pages that guide you through configuration of the Microsoft Office 365 Outlook Adapter as an invoke in an integration.The Microsoft Office 365 Outlook Adapter cannot be used as a trigger in an integration.Topics: Basic Info Page Invoke Operations Page Summary Page Basic Info Page You can enter a name and description on the Basic Info page of each adapter in your integration.Element Description What do you want to call your endpoint?Provide a meaningful name so that others can understand the responsibilities of this connection.You can include English alphabetic characters, numbers, underscores, and hyphens in the name.You cant include the following characters: No blank spaces (for example, My Inbound Connection ) No special characters (for example, #;83& or righ(t)now4 ) except underscores and hyphens No multibyte characters What does this endpoint do?Enter an optional description of the connection's responsibilities.For example: This connection receives an inbound request to synchronize account information with the cloud application.Invoke Operations Page Select the Microsoft Office 365 Outlook API operation to perform.
This selection impacts the visibility of message content.No causes the message to be sent in binary format.iii.From the Cipher Algorithm list, select the algorithm to use.Symmetric-key algorithms for cryptography use the same cryptographic keys for both encryption of plain text and decryption of cipher text.c.Click Upload .Chapter 2 Upload an SSL Certificate 2-73 Add the Microsoft Office 365 Outlook Adapter Connection to an Integration When you drag the Microsoft Office 365 Outlook Adapter into the invoke area of an integration, the Adapter Endpoint Configuration Wizard appears.This wizard guides you through configuration of Microsoft Office 365 Outlook Adapter endpoint properties.These topics describe the wizard pages that guide you through configuration of the Microsoft Office 365 Outlook Adapter as an invoke in an integration.The Microsoft Office 365 Outlook Adapter cannot be used as a trigger in an integration.Topics: Basic Info Page Invoke Operations Page Summary Page Basic Info Page You can enter a name and description on the Basic Info page of each adapter in your integration.Element Description What do you want to call your endpoint?Provide a meaningful name so that others can understand the responsibilities of this connection.You can include English alphabetic characters, numbers, underscores, and hyphens in the name.You cant include the following characters: No blank spaces (for example, My Inbound Connection ) No special characters (for example, #;83& or righ(t)now4 ) except underscores and hyphens No multibyte characters What does this endpoint do?Enter an optional description of the connection's responsibilities.For example: This connection receives an inbound request to synchronize account information with the cloud application.Invoke Operations Page Select the Microsoft Office 365 Outlook API operation to perform.3-1Note: The Microsoft Office 365 Calendar Adapter supports the selection of Microsoft Graph REST API operations from the Select Operation list.
No causes the message to be sent in binary format.iii.From the Cipher Algorithm list, select the algorithm to use.Symmetric-key algorithms for cryptography use the same cryptographic keys for both encryption of plain text and decryption of cipher text.c.Click Upload .Chapter 2 Upload an SSL Certificate 2-73 Add the Microsoft Office 365 Outlook Adapter Connection to an Integration When you drag the Microsoft Office 365 Outlook Adapter into the invoke area of an integration, the Adapter Endpoint Configuration Wizard appears.This wizard guides you through configuration of Microsoft Office 365 Outlook Adapter endpoint properties.These topics describe the wizard pages that guide you through configuration of the Microsoft Office 365 Outlook Adapter as an invoke in an integration.The Microsoft Office 365 Outlook Adapter cannot be used as a trigger in an integration.Topics: Basic Info Page Invoke Operations Page Summary Page Basic Info Page You can enter a name and description on the Basic Info page of each adapter in your integration.Element Description What do you want to call your endpoint?Provide a meaningful name so that others can understand the responsibilities of this connection.You can include English alphabetic characters, numbers, underscores, and hyphens in the name.You cant include the following characters: No blank spaces (for example, My Inbound Connection ) No special characters (for example, #;83& or righ(t)now4 ) except underscores and hyphens No multibyte characters What does this endpoint do?Enter an optional description of the connection's responsibilities.For example: This connection receives an inbound request to synchronize account information with the cloud application.Invoke Operations Page Select the Microsoft Office 365 Outlook API operation to perform.3-1Note: The Microsoft Office 365 Calendar Adapter supports the selection of Microsoft Graph REST API operations from the Select Operation list.The Outlook Mail REST API operations have the same names and are still available for selection, but are identified as Desupported in the Select Operation list.
iii.From the Cipher Algorithm list, select the algorithm to use.Symmetric-key algorithms for cryptography use the same cryptographic keys for both encryption of plain text and decryption of cipher text.c.Click Upload .Chapter 2 Upload an SSL Certificate 2-73 Add the Microsoft Office 365 Outlook Adapter Connection to an Integration When you drag the Microsoft Office 365 Outlook Adapter into the invoke area of an integration, the Adapter Endpoint Configuration Wizard appears.This wizard guides you through configuration of Microsoft Office 365 Outlook Adapter endpoint properties.These topics describe the wizard pages that guide you through configuration of the Microsoft Office 365 Outlook Adapter as an invoke in an integration.The Microsoft Office 365 Outlook Adapter cannot be used as a trigger in an integration.Topics: Basic Info Page Invoke Operations Page Summary Page Basic Info Page You can enter a name and description on the Basic Info page of each adapter in your integration.Element Description What do you want to call your endpoint?Provide a meaningful name so that others can understand the responsibilities of this connection.You can include English alphabetic characters, numbers, underscores, and hyphens in the name.You cant include the following characters: No blank spaces (for example, My Inbound Connection ) No special characters (for example, #;83& or righ(t)now4 ) except underscores and hyphens No multibyte characters What does this endpoint do?Enter an optional description of the connection's responsibilities.For example: This connection receives an inbound request to synchronize account information with the cloud application.Invoke Operations Page Select the Microsoft Office 365 Outlook API operation to perform.3-1Note: The Microsoft Office 365 Calendar Adapter supports the selection of Microsoft Graph REST API operations from the Select Operation list.The Outlook Mail REST API operations have the same names and are still available for selection, but are identified as Desupported in the Select Operation list.Operation Description Get folders Returns a folder collection or an individual folder from a mailbox.
Symmetric-key algorithms for cryptography use the same cryptographic keys for both encryption of plain text and decryption of cipher text.c.Click Upload .Chapter 2 Upload an SSL Certificate 2-73 Add the Microsoft Office 365 Outlook Adapter Connection to an Integration When you drag the Microsoft Office 365 Outlook Adapter into the invoke area of an integration, the Adapter Endpoint Configuration Wizard appears.This wizard guides you through configuration of Microsoft Office 365 Outlook Adapter endpoint properties.These topics describe the wizard pages that guide you through configuration of the Microsoft Office 365 Outlook Adapter as an invoke in an integration.The Microsoft Office 365 Outlook Adapter cannot be used as a trigger in an integration.Topics: Basic Info Page Invoke Operations Page Summary Page Basic Info Page You can enter a name and description on the Basic Info page of each adapter in your integration.Element Description What do you want to call your endpoint?Provide a meaningful name so that others can understand the responsibilities of this connection.You can include English alphabetic characters, numbers, underscores, and hyphens in the name.You cant include the following characters: No blank spaces (for example, My Inbound Connection ) No special characters (for example, #;83& or righ(t)now4 ) except underscores and hyphens No multibyte characters What does this endpoint do?Enter an optional description of the connection's responsibilities.For example: This connection receives an inbound request to synchronize account information with the cloud application.Invoke Operations Page Select the Microsoft Office 365 Outlook API operation to perform.3-1Note: The Microsoft Office 365 Calendar Adapter supports the selection of Microsoft Graph REST API operations from the Select Operation list.The Outlook Mail REST API operations have the same names and are still available for selection, but are identified as Desupported in the Select Operation list.Operation Description Get folders Returns a folder collection or an individual folder from a mailbox.Create a folder Creates a folder in a mailbox.
c.Click Upload .Chapter 2 Upload an SSL Certificate 2-73 Add the Microsoft Office 365 Outlook Adapter Connection to an Integration When you drag the Microsoft Office 365 Outlook Adapter into the invoke area of an integration, the Adapter Endpoint Configuration Wizard appears.This wizard guides you through configuration of Microsoft Office 365 Outlook Adapter endpoint properties.These topics describe the wizard pages that guide you through configuration of the Microsoft Office 365 Outlook Adapter as an invoke in an integration.The Microsoft Office 365 Outlook Adapter cannot be used as a trigger in an integration.Topics: Basic Info Page Invoke Operations Page Summary Page Basic Info Page You can enter a name and description on the Basic Info page of each adapter in your integration.Element Description What do you want to call your endpoint?Provide a meaningful name so that others can understand the responsibilities of this connection.You can include English alphabetic characters, numbers, underscores, and hyphens in the name.You cant include the following characters: No blank spaces (for example, My Inbound Connection ) No special characters (for example, #;83& or righ(t)now4 ) except underscores and hyphens No multibyte characters What does this endpoint do?Enter an optional description of the connection's responsibilities.For example: This connection receives an inbound request to synchronize account information with the cloud application.Invoke Operations Page Select the Microsoft Office 365 Outlook API operation to perform.3-1Note: The Microsoft Office 365 Calendar Adapter supports the selection of Microsoft Graph REST API operations from the Select Operation list.The Outlook Mail REST API operations have the same names and are still available for selection, but are identified as Desupported in the Select Operation list.Operation Description Get folders Returns a folder collection or an individual folder from a mailbox.Create a folder Creates a folder in a mailbox.Delete a message Deletes a message in a mailbox.
This wizard guides you through configuration of Microsoft Office 365 Outlook Adapter endpoint properties.These topics describe the wizard pages that guide you through configuration of the Microsoft Office 365 Outlook Adapter as an invoke in an integration.The Microsoft Office 365 Outlook Adapter cannot be used as a trigger in an integration.Topics: Basic Info Page Invoke Operations Page Summary Page Basic Info Page You can enter a name and description on the Basic Info page of each adapter in your integration.Element Description What do you want to call your endpoint?Provide a meaningful name so that others can understand the responsibilities of this connection.You can include English alphabetic characters, numbers, underscores, and hyphens in the name.You cant include the following characters: No blank spaces (for example, My Inbound Connection ) No special characters (for example, #;83& or righ(t)now4 ) except underscores and hyphens No multibyte characters What does this endpoint do?Enter an optional description of the connection's responsibilities.For example: This connection receives an inbound request to synchronize account information with the cloud application.Invoke Operations Page Select the Microsoft Office 365 Outlook API operation to perform.3-1Note: The Microsoft Office 365 Calendar Adapter supports the selection of Microsoft Graph REST API operations from the Select Operation list.The Outlook Mail REST API operations have the same names and are still available for selection, but are identified as Desupported in the Select Operation list.Operation Description Get folders Returns a folder collection or an individual folder from a mailbox.Create a folder Creates a folder in a mailbox.Delete a message Deletes a message in a mailbox.Delete attachments Returns a message collection or an individual message from a mailbox folder.
These topics describe the wizard pages that guide you through configuration of the Microsoft Office 365 Outlook Adapter as an invoke in an integration.The Microsoft Office 365 Outlook Adapter cannot be used as a trigger in an integration.Topics: Basic Info Page Invoke Operations Page Summary Page Basic Info Page You can enter a name and description on the Basic Info page of each adapter in your integration.Element Description What do you want to call your endpoint?Provide a meaningful name so that others can understand the responsibilities of this connection.You can include English alphabetic characters, numbers, underscores, and hyphens in the name.You cant include the following characters: No blank spaces (for example, My Inbound Connection ) No special characters (for example, #;83& or righ(t)now4 ) except underscores and hyphens No multibyte characters What does this endpoint do?Enter an optional description of the connection's responsibilities.For example: This connection receives an inbound request to synchronize account information with the cloud application.Invoke Operations Page Select the Microsoft Office 365 Outlook API operation to perform.3-1Note: The Microsoft Office 365 Calendar Adapter supports the selection of Microsoft Graph REST API operations from the Select Operation list.The Outlook Mail REST API operations have the same names and are still available for selection, but are identified as Desupported in the Select Operation list.Operation Description Get folders Returns a folder collection or an individual folder from a mailbox.Create a folder Creates a folder in a mailbox.Delete a message Deletes a message in a mailbox.Delete attachments Returns a message collection or an individual message from a mailbox folder.Send a new message Creates and sends a new message.
The Microsoft Office 365 Outlook Adapter cannot be used as a trigger in an integration.Topics: Basic Info Page Invoke Operations Page Summary Page Basic Info Page You can enter a name and description on the Basic Info page of each adapter in your integration.Element Description What do you want to call your endpoint?Provide a meaningful name so that others can understand the responsibilities of this connection.You can include English alphabetic characters, numbers, underscores, and hyphens in the name.You cant include the following characters: No blank spaces (for example, My Inbound Connection ) No special characters (for example, #;83& or righ(t)now4 ) except underscores and hyphens No multibyte characters What does this endpoint do?Enter an optional description of the connection's responsibilities.For example: This connection receives an inbound request to synchronize account information with the cloud application.Invoke Operations Page Select the Microsoft Office 365 Outlook API operation to perform.3-1Note: The Microsoft Office 365 Calendar Adapter supports the selection of Microsoft Graph REST API operations from the Select Operation list.The Outlook Mail REST API operations have the same names and are still available for selection, but are identified as Desupported in the Select Operation list.Operation Description Get folders Returns a folder collection or an individual folder from a mailbox.Create a folder Creates a folder in a mailbox.Delete a message Deletes a message in a mailbox.Delete attachments Returns a message collection or an individual message from a mailbox folder.Send a new message Creates and sends a new message.Reply to a message Returns a response to a message.
Topics: Basic Info Page Invoke Operations Page Summary Page Basic Info Page You can enter a name and description on the Basic Info page of each adapter in your integration.Element Description What do you want to call your endpoint?Provide a meaningful name so that others can understand the responsibilities of this connection.You can include English alphabetic characters, numbers, underscores, and hyphens in the name.You cant include the following characters: No blank spaces (for example, My Inbound Connection ) No special characters (for example, #;83& or righ(t)now4 ) except underscores and hyphens No multibyte characters What does this endpoint do?Enter an optional description of the connection's responsibilities.For example: This connection receives an inbound request to synchronize account information with the cloud application.Invoke Operations Page Select the Microsoft Office 365 Outlook API operation to perform.3-1Note: The Microsoft Office 365 Calendar Adapter supports the selection of Microsoft Graph REST API operations from the Select Operation list.The Outlook Mail REST API operations have the same names and are still available for selection, but are identified as Desupported in the Select Operation list.Operation Description Get folders Returns a folder collection or an individual folder from a mailbox.Create a folder Creates a folder in a mailbox.Delete a message Deletes a message in a mailbox.Delete attachments Returns a message collection or an individual message from a mailbox folder.Send a new message Creates and sends a new message.Reply to a message Returns a response to a message.Forward a message Forwards a message to a mailbox.
Element Description What do you want to call your endpoint?Provide a meaningful name so that others can understand the responsibilities of this connection.You can include English alphabetic characters, numbers, underscores, and hyphens in the name.You cant include the following characters: No blank spaces (for example, My Inbound Connection ) No special characters (for example, #;83& or righ(t)now4 ) except underscores and hyphens No multibyte characters What does this endpoint do?Enter an optional description of the connection's responsibilities.For example: This connection receives an inbound request to synchronize account information with the cloud application.Invoke Operations Page Select the Microsoft Office 365 Outlook API operation to perform.3-1Note: The Microsoft Office 365 Calendar Adapter supports the selection of Microsoft Graph REST API operations from the Select Operation list.The Outlook Mail REST API operations have the same names and are still available for selection, but are identified as Desupported in the Select Operation list.Operation Description Get folders Returns a folder collection or an individual folder from a mailbox.Create a folder Creates a folder in a mailbox.Delete a message Deletes a message in a mailbox.Delete attachments Returns a message collection or an individual message from a mailbox folder.Send a new message Creates and sends a new message.Reply to a message Returns a response to a message.Forward a message Forwards a message to a mailbox.Get messages Returns a message collection or an individual message from a mailbox folder.
You can include English alphabetic characters, numbers, underscores, and hyphens in the name.You cant include the following characters: No blank spaces (for example, My Inbound Connection ) No special characters (for example, #;83& or righ(t)now4 ) except underscores and hyphens No multibyte characters What does this endpoint do?Enter an optional description of the connection's responsibilities.For example: This connection receives an inbound request to synchronize account information with the cloud application.Invoke Operations Page Select the Microsoft Office 365 Outlook API operation to perform.3-1Note: The Microsoft Office 365 Calendar Adapter supports the selection of Microsoft Graph REST API operations from the Select Operation list.The Outlook Mail REST API operations have the same names and are still available for selection, but are identified as Desupported in the Select Operation list.Operation Description Get folders Returns a folder collection or an individual folder from a mailbox.Create a folder Creates a folder in a mailbox.Delete a message Deletes a message in a mailbox.Delete attachments Returns a message collection or an individual message from a mailbox folder.Send a new message Creates and sends a new message.Reply to a message Returns a response to a message.Forward a message Forwards a message to a mailbox.Get messages Returns a message collection or an individual message from a mailbox folder.Get messages of a folder Returns a message collection or an individual message from a specific folder.
You cant include the following characters: No blank spaces (for example, My Inbound Connection ) No special characters (for example, #;83& or righ(t)now4 ) except underscores and hyphens No multibyte characters What does this endpoint do?Enter an optional description of the connection's responsibilities.For example: This connection receives an inbound request to synchronize account information with the cloud application.Invoke Operations Page Select the Microsoft Office 365 Outlook API operation to perform.3-1Note: The Microsoft Office 365 Calendar Adapter supports the selection of Microsoft Graph REST API operations from the Select Operation list.The Outlook Mail REST API operations have the same names and are still available for selection, but are identified as Desupported in the Select Operation list.Operation Description Get folders Returns a folder collection or an individual folder from a mailbox.Create a folder Creates a folder in a mailbox.Delete a message Deletes a message in a mailbox.Delete attachments Returns a message collection or an individual message from a mailbox folder.Send a new message Creates and sends a new message.Reply to a message Returns a response to a message.Forward a message Forwards a message to a mailbox.Get messages Returns a message collection or an individual message from a mailbox folder.Get messages of a folder Returns a message collection or an individual message from a specific folder.Move a message Moves a message collection or an individual message from one mailbox folder to another.
For example: This connection receives an inbound request to synchronize account information with the cloud application.Invoke Operations Page Select the Microsoft Office 365 Outlook API operation to perform.3-1Note: The Microsoft Office 365 Calendar Adapter supports the selection of Microsoft Graph REST API operations from the Select Operation list.The Outlook Mail REST API operations have the same names and are still available for selection, but are identified as Desupported in the Select Operation list.Operation Description Get folders Returns a folder collection or an individual folder from a mailbox.Create a folder Creates a folder in a mailbox.Delete a message Deletes a message in a mailbox.Delete attachments Returns a message collection or an individual message from a mailbox folder.Send a new message Creates and sends a new message.Reply to a message Returns a response to a message.Forward a message Forwards a message to a mailbox.Get messages Returns a message collection or an individual message from a mailbox folder.Get messages of a folder Returns a message collection or an individual message from a specific folder.Move a message Moves a message collection or an individual message from one mailbox folder to another.Copy a message Copies a message collection or an individual message from one mailbox folder to another.
Invoke Operations Page Select the Microsoft Office 365 Outlook API operation to perform.3-1Note: The Microsoft Office 365 Calendar Adapter supports the selection of Microsoft Graph REST API operations from the Select Operation list.The Outlook Mail REST API operations have the same names and are still available for selection, but are identified as Desupported in the Select Operation list.Operation Description Get folders Returns a folder collection or an individual folder from a mailbox.Create a folder Creates a folder in a mailbox.Delete a message Deletes a message in a mailbox.Delete attachments Returns a message collection or an individual message from a mailbox folder.Send a new message Creates and sends a new message.Reply to a message Returns a response to a message.Forward a message Forwards a message to a mailbox.Get messages Returns a message collection or an individual message from a mailbox folder.Get messages of a folder Returns a message collection or an individual message from a specific folder.Move a message Moves a message collection or an individual message from one mailbox folder to another.Copy a message Copies a message collection or an individual message from one mailbox folder to another.Get an attachment collection Returns a collection of attachments from a mailbox folder.
3-1Note: The Microsoft Office 365 Calendar Adapter supports the selection of Microsoft Graph REST API operations from the Select Operation list.The Outlook Mail REST API operations have the same names and are still available for selection, but are identified as Desupported in the Select Operation list.Operation Description Get folders Returns a folder collection or an individual folder from a mailbox.Create a folder Creates a folder in a mailbox.Delete a message Deletes a message in a mailbox.Delete attachments Returns a message collection or an individual message from a mailbox folder.Send a new message Creates and sends a new message.Reply to a message Returns a response to a message.Forward a message Forwards a message to a mailbox.Get messages Returns a message collection or an individual message from a mailbox folder.Get messages of a folder Returns a message collection or an individual message from a specific folder.Move a message Moves a message collection or an individual message from one mailbox folder to another.Copy a message Copies a message collection or an individual message from one mailbox folder to another.Get an attachment collection Returns a collection of attachments from a mailbox folder.Get an attachment Returns an individual attachment from a mailbox folder.
The Outlook Mail REST API operations have the same names and are still available for selection, but are identified as Desupported in the Select Operation list.Operation Description Get folders Returns a folder collection or an individual folder from a mailbox.Create a folder Creates a folder in a mailbox.Delete a message Deletes a message in a mailbox.Delete attachments Returns a message collection or an individual message from a mailbox folder.Send a new message Creates and sends a new message.Reply to a message Returns a response to a message.Forward a message Forwards a message to a mailbox.Get messages Returns a message collection or an individual message from a mailbox folder.Get messages of a folder Returns a message collection or an individual message from a specific folder.Move a message Moves a message collection or an individual message from one mailbox folder to another.Copy a message Copies a message collection or an individual message from one mailbox folder to another.Get an attachment collection Returns a collection of attachments from a mailbox folder.Get an attachment Returns an individual attachment from a mailbox folder.Create a file attachment Creates an attachment and attaches it to a message in a mailbox folder.
Operation Description Get folders Returns a folder collection or an individual folder from a mailbox.Create a folder Creates a folder in a mailbox.Delete a message Deletes a message in a mailbox.Delete attachments Returns a message collection or an individual message from a mailbox folder.Send a new message Creates and sends a new message.Reply to a message Returns a response to a message.Forward a message Forwards a message to a mailbox.Get messages Returns a message collection or an individual message from a mailbox folder.Get messages of a folder Returns a message collection or an individual message from a specific folder.Move a message Moves a message collection or an individual message from one mailbox folder to another.Copy a message Copies a message collection or an individual message from one mailbox folder to another.Get an attachment collection Returns a collection of attachments from a mailbox folder.Get an attachment Returns an individual attachment from a mailbox folder.Create a file attachment Creates an attachment and attaches it to a message in a mailbox folder.Summary Page You can review the specified adapter configuration values on the Summary page.
Create a folder Creates a folder in a mailbox.Delete a message Deletes a message in a mailbox.Delete attachments Returns a message collection or an individual message from a mailbox folder.Send a new message Creates and sends a new message.Reply to a message Returns a response to a message.Forward a message Forwards a message to a mailbox.Get messages Returns a message collection or an individual message from a mailbox folder.Get messages of a folder Returns a message collection or an individual message from a specific folder.Move a message Moves a message collection or an individual message from one mailbox folder to another.Copy a message Copies a message collection or an individual message from one mailbox folder to another.Get an attachment collection Returns a collection of attachments from a mailbox folder.Get an attachment Returns an individual attachment from a mailbox folder.Create a file attachment Creates an attachment and attaches it to a message in a mailbox folder.Summary Page You can review the specified adapter configuration values on the Summary page.Element Description Summary Displays a summary of the configuration values you defined on previous pages of the wizard.
Delete a message Deletes a message in a mailbox.Delete attachments Returns a message collection or an individual message from a mailbox folder.Send a new message Creates and sends a new message.Reply to a message Returns a response to a message.Forward a message Forwards a message to a mailbox.Get messages Returns a message collection or an individual message from a mailbox folder.Get messages of a folder Returns a message collection or an individual message from a specific folder.Move a message Moves a message collection or an individual message from one mailbox folder to another.Copy a message Copies a message collection or an individual message from one mailbox folder to another.Get an attachment collection Returns a collection of attachments from a mailbox folder.Get an attachment Returns an individual attachment from a mailbox folder.Create a file attachment Creates an attachment and attaches it to a message in a mailbox folder.Summary Page You can review the specified adapter configuration values on the Summary page.Element Description Summary Displays a summary of the configuration values you defined on previous pages of the wizard.The information that is displayed can vary by adapter.