text
stringlengths 65
20k
|
---|
c.Select the role (direction) in which to use this connection (trigger, invoke, or both).Only the roles supported by the adapter are displayed for selection.When you select a role, only the connection properties and security policies appropriate to that role are displayed on the Connections page.If you select an adapter that supports both invoke and trigger, but select only one of those roles, you'll get an error when you try to drag the adapter into the section you didn't select.For example, let's say you configure a connection for the Oracle Service Cloud (RightNow) Adapter as only an invoke .Dragging the adapter to a trigger section in the integration produces an error.d.Enter an optional description of the connection.5.Click Create .Your connection is created.You're now ready to configure the connection details, such as connection properties, security policies, connection login credentials, and (for certain connections) agent group.Configure Connection Security Configure security for your LinkedIn connection by setting access credentials.1.Go to the Security section.2.Enter your login credentials.a.Enter the Client ID.This is a unique string provided to your client on the LinkedIn developer console ( https://www.linkedin.com/developer/apps ). |
Only the roles supported by the adapter are displayed for selection.When you select a role, only the connection properties and security policies appropriate to that role are displayed on the Connections page.If you select an adapter that supports both invoke and trigger, but select only one of those roles, you'll get an error when you try to drag the adapter into the section you didn't select.For example, let's say you configure a connection for the Oracle Service Cloud (RightNow) Adapter as only an invoke .Dragging the adapter to a trigger section in the integration produces an error.d.Enter an optional description of the connection.5.Click Create .Your connection is created.You're now ready to configure the connection details, such as connection properties, security policies, connection login credentials, and (for certain connections) agent group.Configure Connection Security Configure security for your LinkedIn connection by setting access credentials.1.Go to the Security section.2.Enter your login credentials.a.Enter the Client ID.This is a unique string provided to your client on the LinkedIn developer console ( https://www.linkedin.com/developer/apps ).b.Enter the Client Secret. |
When you select a role, only the connection properties and security policies appropriate to that role are displayed on the Connections page.If you select an adapter that supports both invoke and trigger, but select only one of those roles, you'll get an error when you try to drag the adapter into the section you didn't select.For example, let's say you configure a connection for the Oracle Service Cloud (RightNow) Adapter as only an invoke .Dragging the adapter to a trigger section in the integration produces an error.d.Enter an optional description of the connection.5.Click Create .Your connection is created.You're now ready to configure the connection details, such as connection properties, security policies, connection login credentials, and (for certain connections) agent group.Configure Connection Security Configure security for your LinkedIn connection by setting access credentials.1.Go to the Security section.2.Enter your login credentials.a.Enter the Client ID.This is a unique string provided to your client on the LinkedIn developer console ( https://www.linkedin.com/developer/apps ).b.Enter the Client Secret.This is also a unique string provided to your client on the LinkedIn developer console ( https://www.linkedin.com/developer/apps )Chapter 2 Create a Connection 2-2c.Enter the Scope. |
If you select an adapter that supports both invoke and trigger, but select only one of those roles, you'll get an error when you try to drag the adapter into the section you didn't select.For example, let's say you configure a connection for the Oracle Service Cloud (RightNow) Adapter as only an invoke .Dragging the adapter to a trigger section in the integration produces an error.d.Enter an optional description of the connection.5.Click Create .Your connection is created.You're now ready to configure the connection details, such as connection properties, security policies, connection login credentials, and (for certain connections) agent group.Configure Connection Security Configure security for your LinkedIn connection by setting access credentials.1.Go to the Security section.2.Enter your login credentials.a.Enter the Client ID.This is a unique string provided to your client on the LinkedIn developer console ( https://www.linkedin.com/developer/apps ).b.Enter the Client Secret.This is also a unique string provided to your client on the LinkedIn developer console ( https://www.linkedin.com/developer/apps )Chapter 2 Create a Connection 2-2c.Enter the Scope.The scope of the access request. |
For example, let's say you configure a connection for the Oracle Service Cloud (RightNow) Adapter as only an invoke .Dragging the adapter to a trigger section in the integration produces an error.d.Enter an optional description of the connection.5.Click Create .Your connection is created.You're now ready to configure the connection details, such as connection properties, security policies, connection login credentials, and (for certain connections) agent group.Configure Connection Security Configure security for your LinkedIn connection by setting access credentials.1.Go to the Security section.2.Enter your login credentials.a.Enter the Client ID.This is a unique string provided to your client on the LinkedIn developer console ( https://www.linkedin.com/developer/apps ).b.Enter the Client Secret.This is also a unique string provided to your client on the LinkedIn developer console ( https://www.linkedin.com/developer/apps )Chapter 2 Create a Connection 2-2c.Enter the Scope.The scope of the access request.Scopes enable you to specify which type of access you need, for example: r_basicprofile+r_emailaddress+w_share . |
Dragging the adapter to a trigger section in the integration produces an error.d.Enter an optional description of the connection.5.Click Create .Your connection is created.You're now ready to configure the connection details, such as connection properties, security policies, connection login credentials, and (for certain connections) agent group.Configure Connection Security Configure security for your LinkedIn connection by setting access credentials.1.Go to the Security section.2.Enter your login credentials.a.Enter the Client ID.This is a unique string provided to your client on the LinkedIn developer console ( https://www.linkedin.com/developer/apps ).b.Enter the Client Secret.This is also a unique string provided to your client on the LinkedIn developer console ( https://www.linkedin.com/developer/apps )Chapter 2 Create a Connection 2-2c.Enter the Scope.The scope of the access request.Scopes enable you to specify which type of access you need, for example: r_basicprofile+r_emailaddress+w_share .3.Click Provide Consent . |
d.Enter an optional description of the connection.5.Click Create .Your connection is created.You're now ready to configure the connection details, such as connection properties, security policies, connection login credentials, and (for certain connections) agent group.Configure Connection Security Configure security for your LinkedIn connection by setting access credentials.1.Go to the Security section.2.Enter your login credentials.a.Enter the Client ID.This is a unique string provided to your client on the LinkedIn developer console ( https://www.linkedin.com/developer/apps ).b.Enter the Client Secret.This is also a unique string provided to your client on the LinkedIn developer console ( https://www.linkedin.com/developer/apps )Chapter 2 Create a Connection 2-2c.Enter the Scope.The scope of the access request.Scopes enable you to specify which type of access you need, for example: r_basicprofile+r_emailaddress+w_share .3.Click Provide Consent .Prompts LinkedIn to ask consent of the user in order to authorize the applications access to the LinkedIn profile. |
5.Click Create .Your connection is created.You're now ready to configure the connection details, such as connection properties, security policies, connection login credentials, and (for certain connections) agent group.Configure Connection Security Configure security for your LinkedIn connection by setting access credentials.1.Go to the Security section.2.Enter your login credentials.a.Enter the Client ID.This is a unique string provided to your client on the LinkedIn developer console ( https://www.linkedin.com/developer/apps ).b.Enter the Client Secret.This is also a unique string provided to your client on the LinkedIn developer console ( https://www.linkedin.com/developer/apps )Chapter 2 Create a Connection 2-2c.Enter the Scope.The scope of the access request.Scopes enable you to specify which type of access you need, for example: r_basicprofile+r_emailaddress+w_share .3.Click Provide Consent .Prompts LinkedIn to ask consent of the user in order to authorize the applications access to the LinkedIn profile.Test the Connection Test your connection to ensure that it's configured successfully. |
Your connection is created.You're now ready to configure the connection details, such as connection properties, security policies, connection login credentials, and (for certain connections) agent group.Configure Connection Security Configure security for your LinkedIn connection by setting access credentials.1.Go to the Security section.2.Enter your login credentials.a.Enter the Client ID.This is a unique string provided to your client on the LinkedIn developer console ( https://www.linkedin.com/developer/apps ).b.Enter the Client Secret.This is also a unique string provided to your client on the LinkedIn developer console ( https://www.linkedin.com/developer/apps )Chapter 2 Create a Connection 2-2c.Enter the Scope.The scope of the access request.Scopes enable you to specify which type of access you need, for example: r_basicprofile+r_emailaddress+w_share .3.Click Provide Consent .Prompts LinkedIn to ask consent of the user in order to authorize the applications access to the LinkedIn profile.Test the Connection Test your connection to ensure that it's configured successfully.1.In the page title bar, click Test. |
You're now ready to configure the connection details, such as connection properties, security policies, connection login credentials, and (for certain connections) agent group.Configure Connection Security Configure security for your LinkedIn connection by setting access credentials.1.Go to the Security section.2.Enter your login credentials.a.Enter the Client ID.This is a unique string provided to your client on the LinkedIn developer console ( https://www.linkedin.com/developer/apps ).b.Enter the Client Secret.This is also a unique string provided to your client on the LinkedIn developer console ( https://www.linkedin.com/developer/apps )Chapter 2 Create a Connection 2-2c.Enter the Scope.The scope of the access request.Scopes enable you to specify which type of access you need, for example: r_basicprofile+r_emailaddress+w_share .3.Click Provide Consent .Prompts LinkedIn to ask consent of the user in order to authorize the applications access to the LinkedIn profile.Test the Connection Test your connection to ensure that it's configured successfully.1.In the page title bar, click Test.What happens next depends on whether your adapter connection uses a Web Services Description Language (WSDL) file. |
Configure Connection Security Configure security for your LinkedIn connection by setting access credentials.1.Go to the Security section.2.Enter your login credentials.a.Enter the Client ID.This is a unique string provided to your client on the LinkedIn developer console ( https://www.linkedin.com/developer/apps ).b.Enter the Client Secret.This is also a unique string provided to your client on the LinkedIn developer console ( https://www.linkedin.com/developer/apps )Chapter 2 Create a Connection 2-2c.Enter the Scope.The scope of the access request.Scopes enable you to specify which type of access you need, for example: r_basicprofile+r_emailaddress+w_share .3.Click Provide Consent .Prompts LinkedIn to ask consent of the user in order to authorize the applications access to the LinkedIn profile.Test the Connection Test your connection to ensure that it's configured successfully.1.In the page title bar, click Test.What happens next depends on whether your adapter connection uses a Web Services Description Language (WSDL) file.Only some adapter connections use WSDLs. |
1.Go to the Security section.2.Enter your login credentials.a.Enter the Client ID.This is a unique string provided to your client on the LinkedIn developer console ( https://www.linkedin.com/developer/apps ).b.Enter the Client Secret.This is also a unique string provided to your client on the LinkedIn developer console ( https://www.linkedin.com/developer/apps )Chapter 2 Create a Connection 2-2c.Enter the Scope.The scope of the access request.Scopes enable you to specify which type of access you need, for example: r_basicprofile+r_emailaddress+w_share .3.Click Provide Consent .Prompts LinkedIn to ask consent of the user in order to authorize the applications access to the LinkedIn profile.Test the Connection Test your connection to ensure that it's configured successfully.1.In the page title bar, click Test.What happens next depends on whether your adapter connection uses a Web Services Description Language (WSDL) file.Only some adapter connections use WSDLs.If Your Connection... Then... Doesnt use a WSDL The test starts automatically and validates the inputs you provided for the connection. |
2.Enter your login credentials.a.Enter the Client ID.This is a unique string provided to your client on the LinkedIn developer console ( https://www.linkedin.com/developer/apps ).b.Enter the Client Secret.This is also a unique string provided to your client on the LinkedIn developer console ( https://www.linkedin.com/developer/apps )Chapter 2 Create a Connection 2-2c.Enter the Scope.The scope of the access request.Scopes enable you to specify which type of access you need, for example: r_basicprofile+r_emailaddress+w_share .3.Click Provide Consent .Prompts LinkedIn to ask consent of the user in order to authorize the applications access to the LinkedIn profile.Test the Connection Test your connection to ensure that it's configured successfully.1.In the page title bar, click Test.What happens next depends on whether your adapter connection uses a Web Services Description Language (WSDL) file.Only some adapter connections use WSDLs.If Your Connection... Then... Doesnt use a WSDL The test starts automatically and validates the inputs you provided for the connection.Uses a WSDL A dialog prompts you to select the type of connection testing to perform: Validate and Test : Performs a full validation of the WSDL, including processing of the imported schemas and WSDLs. |
a.Enter the Client ID.This is a unique string provided to your client on the LinkedIn developer console ( https://www.linkedin.com/developer/apps ).b.Enter the Client Secret.This is also a unique string provided to your client on the LinkedIn developer console ( https://www.linkedin.com/developer/apps )Chapter 2 Create a Connection 2-2c.Enter the Scope.The scope of the access request.Scopes enable you to specify which type of access you need, for example: r_basicprofile+r_emailaddress+w_share .3.Click Provide Consent .Prompts LinkedIn to ask consent of the user in order to authorize the applications access to the LinkedIn profile.Test the Connection Test your connection to ensure that it's configured successfully.1.In the page title bar, click Test.What happens next depends on whether your adapter connection uses a Web Services Description Language (WSDL) file.Only some adapter connections use WSDLs.If Your Connection... Then... Doesnt use a WSDL The test starts automatically and validates the inputs you provided for the connection.Uses a WSDL A dialog prompts you to select the type of connection testing to perform: Validate and Test : Performs a full validation of the WSDL, including processing of the imported schemas and WSDLs.Complete validation can take several minutes depending on the number of imported schemas and WSDLs. |
This is a unique string provided to your client on the LinkedIn developer console ( https://www.linkedin.com/developer/apps ).b.Enter the Client Secret.This is also a unique string provided to your client on the LinkedIn developer console ( https://www.linkedin.com/developer/apps )Chapter 2 Create a Connection 2-2c.Enter the Scope.The scope of the access request.Scopes enable you to specify which type of access you need, for example: r_basicprofile+r_emailaddress+w_share .3.Click Provide Consent .Prompts LinkedIn to ask consent of the user in order to authorize the applications access to the LinkedIn profile.Test the Connection Test your connection to ensure that it's configured successfully.1.In the page title bar, click Test.What happens next depends on whether your adapter connection uses a Web Services Description Language (WSDL) file.Only some adapter connections use WSDLs.If Your Connection... Then... Doesnt use a WSDL The test starts automatically and validates the inputs you provided for the connection.Uses a WSDL A dialog prompts you to select the type of connection testing to perform: Validate and Test : Performs a full validation of the WSDL, including processing of the imported schemas and WSDLs.Complete validation can take several minutes depending on the number of imported schemas and WSDLs.No requests are sent to the operations exposed in the WSDL. |
b.Enter the Client Secret.This is also a unique string provided to your client on the LinkedIn developer console ( https://www.linkedin.com/developer/apps )Chapter 2 Create a Connection 2-2c.Enter the Scope.The scope of the access request.Scopes enable you to specify which type of access you need, for example: r_basicprofile+r_emailaddress+w_share .3.Click Provide Consent .Prompts LinkedIn to ask consent of the user in order to authorize the applications access to the LinkedIn profile.Test the Connection Test your connection to ensure that it's configured successfully.1.In the page title bar, click Test.What happens next depends on whether your adapter connection uses a Web Services Description Language (WSDL) file.Only some adapter connections use WSDLs.If Your Connection... Then... Doesnt use a WSDL The test starts automatically and validates the inputs you provided for the connection.Uses a WSDL A dialog prompts you to select the type of connection testing to perform: Validate and Test : Performs a full validation of the WSDL, including processing of the imported schemas and WSDLs.Complete validation can take several minutes depending on the number of imported schemas and WSDLs.No requests are sent to the operations exposed in the WSDL.Test: Connects to the WSDL URL and performs a syntax check on the WSDL. |
This is also a unique string provided to your client on the LinkedIn developer console ( https://www.linkedin.com/developer/apps )Chapter 2 Create a Connection 2-2c.Enter the Scope.The scope of the access request.Scopes enable you to specify which type of access you need, for example: r_basicprofile+r_emailaddress+w_share .3.Click Provide Consent .Prompts LinkedIn to ask consent of the user in order to authorize the applications access to the LinkedIn profile.Test the Connection Test your connection to ensure that it's configured successfully.1.In the page title bar, click Test.What happens next depends on whether your adapter connection uses a Web Services Description Language (WSDL) file.Only some adapter connections use WSDLs.If Your Connection... Then... Doesnt use a WSDL The test starts automatically and validates the inputs you provided for the connection.Uses a WSDL A dialog prompts you to select the type of connection testing to perform: Validate and Test : Performs a full validation of the WSDL, including processing of the imported schemas and WSDLs.Complete validation can take several minutes depending on the number of imported schemas and WSDLs.No requests are sent to the operations exposed in the WSDL.Test: Connects to the WSDL URL and performs a syntax check on the WSDL.No requests are sent to the operations exposed in the WSDL. |
The scope of the access request.Scopes enable you to specify which type of access you need, for example: r_basicprofile+r_emailaddress+w_share .3.Click Provide Consent .Prompts LinkedIn to ask consent of the user in order to authorize the applications access to the LinkedIn profile.Test the Connection Test your connection to ensure that it's configured successfully.1.In the page title bar, click Test.What happens next depends on whether your adapter connection uses a Web Services Description Language (WSDL) file.Only some adapter connections use WSDLs.If Your Connection... Then... Doesnt use a WSDL The test starts automatically and validates the inputs you provided for the connection.Uses a WSDL A dialog prompts you to select the type of connection testing to perform: Validate and Test : Performs a full validation of the WSDL, including processing of the imported schemas and WSDLs.Complete validation can take several minutes depending on the number of imported schemas and WSDLs.No requests are sent to the operations exposed in the WSDL.Test: Connects to the WSDL URL and performs a syntax check on the WSDL.No requests are sent to the operations exposed in the WSDL.2.Wait for a message about the results of the connection test. |
Scopes enable you to specify which type of access you need, for example: r_basicprofile+r_emailaddress+w_share .3.Click Provide Consent .Prompts LinkedIn to ask consent of the user in order to authorize the applications access to the LinkedIn profile.Test the Connection Test your connection to ensure that it's configured successfully.1.In the page title bar, click Test.What happens next depends on whether your adapter connection uses a Web Services Description Language (WSDL) file.Only some adapter connections use WSDLs.If Your Connection... Then... Doesnt use a WSDL The test starts automatically and validates the inputs you provided for the connection.Uses a WSDL A dialog prompts you to select the type of connection testing to perform: Validate and Test : Performs a full validation of the WSDL, including processing of the imported schemas and WSDLs.Complete validation can take several minutes depending on the number of imported schemas and WSDLs.No requests are sent to the operations exposed in the WSDL.Test: Connects to the WSDL URL and performs a syntax check on the WSDL.No requests are sent to the operations exposed in the WSDL.2.Wait for a message about the results of the connection test.If the test was successful, then the connection is configured properly. |
3.Click Provide Consent .Prompts LinkedIn to ask consent of the user in order to authorize the applications access to the LinkedIn profile.Test the Connection Test your connection to ensure that it's configured successfully.1.In the page title bar, click Test.What happens next depends on whether your adapter connection uses a Web Services Description Language (WSDL) file.Only some adapter connections use WSDLs.If Your Connection... Then... Doesnt use a WSDL The test starts automatically and validates the inputs you provided for the connection.Uses a WSDL A dialog prompts you to select the type of connection testing to perform: Validate and Test : Performs a full validation of the WSDL, including processing of the imported schemas and WSDLs.Complete validation can take several minutes depending on the number of imported schemas and WSDLs.No requests are sent to the operations exposed in the WSDL.Test: Connects to the WSDL URL and performs a syntax check on the WSDL.No requests are sent to the operations exposed in the WSDL.2.Wait for a message about the results of the connection test.If the test was successful, then the connection is configured properly.If the test failed, then edit the configuration details you entered. |
Prompts LinkedIn to ask consent of the user in order to authorize the applications access to the LinkedIn profile.Test the Connection Test your connection to ensure that it's configured successfully.1.In the page title bar, click Test.What happens next depends on whether your adapter connection uses a Web Services Description Language (WSDL) file.Only some adapter connections use WSDLs.If Your Connection... Then... Doesnt use a WSDL The test starts automatically and validates the inputs you provided for the connection.Uses a WSDL A dialog prompts you to select the type of connection testing to perform: Validate and Test : Performs a full validation of the WSDL, including processing of the imported schemas and WSDLs.Complete validation can take several minutes depending on the number of imported schemas and WSDLs.No requests are sent to the operations exposed in the WSDL.Test: Connects to the WSDL URL and performs a syntax check on the WSDL.No requests are sent to the operations exposed in the WSDL.2.Wait for a message about the results of the connection test.If the test was successful, then the connection is configured properly.If the test failed, then edit the configuration details you entered.Check for typos, verify URLs and credentials, and download the diagnostic logs for additional details. |
Test the Connection Test your connection to ensure that it's configured successfully.1.In the page title bar, click Test.What happens next depends on whether your adapter connection uses a Web Services Description Language (WSDL) file.Only some adapter connections use WSDLs.If Your Connection... Then... Doesnt use a WSDL The test starts automatically and validates the inputs you provided for the connection.Uses a WSDL A dialog prompts you to select the type of connection testing to perform: Validate and Test : Performs a full validation of the WSDL, including processing of the imported schemas and WSDLs.Complete validation can take several minutes depending on the number of imported schemas and WSDLs.No requests are sent to the operations exposed in the WSDL.Test: Connects to the WSDL URL and performs a syntax check on the WSDL.No requests are sent to the operations exposed in the WSDL.2.Wait for a message about the results of the connection test.If the test was successful, then the connection is configured properly.If the test failed, then edit the configuration details you entered.Check for typos, verify URLs and credentials, and download the diagnostic logs for additional details.Continue to test until the connection is successful. |
1.In the page title bar, click Test.What happens next depends on whether your adapter connection uses a Web Services Description Language (WSDL) file.Only some adapter connections use WSDLs.If Your Connection... Then... Doesnt use a WSDL The test starts automatically and validates the inputs you provided for the connection.Uses a WSDL A dialog prompts you to select the type of connection testing to perform: Validate and Test : Performs a full validation of the WSDL, including processing of the imported schemas and WSDLs.Complete validation can take several minutes depending on the number of imported schemas and WSDLs.No requests are sent to the operations exposed in the WSDL.Test: Connects to the WSDL URL and performs a syntax check on the WSDL.No requests are sent to the operations exposed in the WSDL.2.Wait for a message about the results of the connection test.If the test was successful, then the connection is configured properly.If the test failed, then edit the configuration details you entered.Check for typos, verify URLs and credentials, and download the diagnostic logs for additional details.Continue to test until the connection is successful.3.When complete, click Save . |
What happens next depends on whether your adapter connection uses a Web Services Description Language (WSDL) file.Only some adapter connections use WSDLs.If Your Connection... Then... Doesnt use a WSDL The test starts automatically and validates the inputs you provided for the connection.Uses a WSDL A dialog prompts you to select the type of connection testing to perform: Validate and Test : Performs a full validation of the WSDL, including processing of the imported schemas and WSDLs.Complete validation can take several minutes depending on the number of imported schemas and WSDLs.No requests are sent to the operations exposed in the WSDL.Test: Connects to the WSDL URL and performs a syntax check on the WSDL.No requests are sent to the operations exposed in the WSDL.2.Wait for a message about the results of the connection test.If the test was successful, then the connection is configured properly.If the test failed, then edit the configuration details you entered.Check for typos, verify URLs and credentials, and download the diagnostic logs for additional details.Continue to test until the connection is successful.3.When complete, click Save .Upload an SSL Certificate Certificates are used to validate outbound SSL connections. |
Only some adapter connections use WSDLs.If Your Connection... Then... Doesnt use a WSDL The test starts automatically and validates the inputs you provided for the connection.Uses a WSDL A dialog prompts you to select the type of connection testing to perform: Validate and Test : Performs a full validation of the WSDL, including processing of the imported schemas and WSDLs.Complete validation can take several minutes depending on the number of imported schemas and WSDLs.No requests are sent to the operations exposed in the WSDL.Test: Connects to the WSDL URL and performs a syntax check on the WSDL.No requests are sent to the operations exposed in the WSDL.2.Wait for a message about the results of the connection test.If the test was successful, then the connection is configured properly.If the test failed, then edit the configuration details you entered.Check for typos, verify URLs and credentials, and download the diagnostic logs for additional details.Continue to test until the connection is successful.3.When complete, click Save .Upload an SSL Certificate Certificates are used to validate outbound SSL connections.If you make an SSL connection in which the root certificate does not exist in Oracle Integration, an exception is thrown. |
If Your Connection... Then... Doesnt use a WSDL The test starts automatically and validates the inputs you provided for the connection.Uses a WSDL A dialog prompts you to select the type of connection testing to perform: Validate and Test : Performs a full validation of the WSDL, including processing of the imported schemas and WSDLs.Complete validation can take several minutes depending on the number of imported schemas and WSDLs.No requests are sent to the operations exposed in the WSDL.Test: Connects to the WSDL URL and performs a syntax check on the WSDL.No requests are sent to the operations exposed in the WSDL.2.Wait for a message about the results of the connection test.If the test was successful, then the connection is configured properly.If the test failed, then edit the configuration details you entered.Check for typos, verify URLs and credentials, and download the diagnostic logs for additional details.Continue to test until the connection is successful.3.When complete, click Save .Upload an SSL Certificate Certificates are used to validate outbound SSL connections.If you make an SSL connection in which the root certificate does not exist in Oracle Integration, an exception is thrown.In that case, you must upload the appropriate certificate. |
Uses a WSDL A dialog prompts you to select the type of connection testing to perform: Validate and Test : Performs a full validation of the WSDL, including processing of the imported schemas and WSDLs.Complete validation can take several minutes depending on the number of imported schemas and WSDLs.No requests are sent to the operations exposed in the WSDL.Test: Connects to the WSDL URL and performs a syntax check on the WSDL.No requests are sent to the operations exposed in the WSDL.2.Wait for a message about the results of the connection test.If the test was successful, then the connection is configured properly.If the test failed, then edit the configuration details you entered.Check for typos, verify URLs and credentials, and download the diagnostic logs for additional details.Continue to test until the connection is successful.3.When complete, click Save .Upload an SSL Certificate Certificates are used to validate outbound SSL connections.If you make an SSL connection in which the root certificate does not exist in Oracle Integration, an exception is thrown.In that case, you must upload the appropriate certificate.A certificate enables Oracle Integration to connect with external services. |
Complete validation can take several minutes depending on the number of imported schemas and WSDLs.No requests are sent to the operations exposed in the WSDL.Test: Connects to the WSDL URL and performs a syntax check on the WSDL.No requests are sent to the operations exposed in the WSDL.2.Wait for a message about the results of the connection test.If the test was successful, then the connection is configured properly.If the test failed, then edit the configuration details you entered.Check for typos, verify URLs and credentials, and download the diagnostic logs for additional details.Continue to test until the connection is successful.3.When complete, click Save .Upload an SSL Certificate Certificates are used to validate outbound SSL connections.If you make an SSL connection in which the root certificate does not exist in Oracle Integration, an exception is thrown.In that case, you must upload the appropriate certificate.A certificate enables Oracle Integration to connect with external services.If the external endpoint requires a specific certificate, request the certificate and then upload it into Oracle Integration. |
No requests are sent to the operations exposed in the WSDL.Test: Connects to the WSDL URL and performs a syntax check on the WSDL.No requests are sent to the operations exposed in the WSDL.2.Wait for a message about the results of the connection test.If the test was successful, then the connection is configured properly.If the test failed, then edit the configuration details you entered.Check for typos, verify URLs and credentials, and download the diagnostic logs for additional details.Continue to test until the connection is successful.3.When complete, click Save .Upload an SSL Certificate Certificates are used to validate outbound SSL connections.If you make an SSL connection in which the root certificate does not exist in Oracle Integration, an exception is thrown.In that case, you must upload the appropriate certificate.A certificate enables Oracle Integration to connect with external services.If the external endpoint requires a specific certificate, request the certificate and then upload it into Oracle Integration.To upload an SSL certificate: 1.In the left navigation pane, click Home > Settings > Certificates . |
Test: Connects to the WSDL URL and performs a syntax check on the WSDL.No requests are sent to the operations exposed in the WSDL.2.Wait for a message about the results of the connection test.If the test was successful, then the connection is configured properly.If the test failed, then edit the configuration details you entered.Check for typos, verify URLs and credentials, and download the diagnostic logs for additional details.Continue to test until the connection is successful.3.When complete, click Save .Upload an SSL Certificate Certificates are used to validate outbound SSL connections.If you make an SSL connection in which the root certificate does not exist in Oracle Integration, an exception is thrown.In that case, you must upload the appropriate certificate.A certificate enables Oracle Integration to connect with external services.If the external endpoint requires a specific certificate, request the certificate and then upload it into Oracle Integration.To upload an SSL certificate: 1.In the left navigation pane, click Home > Settings > Certificates .All certificates currently uploaded to the trust store are displayed in the Certificates dialog. |
No requests are sent to the operations exposed in the WSDL.2.Wait for a message about the results of the connection test.If the test was successful, then the connection is configured properly.If the test failed, then edit the configuration details you entered.Check for typos, verify URLs and credentials, and download the diagnostic logs for additional details.Continue to test until the connection is successful.3.When complete, click Save .Upload an SSL Certificate Certificates are used to validate outbound SSL connections.If you make an SSL connection in which the root certificate does not exist in Oracle Integration, an exception is thrown.In that case, you must upload the appropriate certificate.A certificate enables Oracle Integration to connect with external services.If the external endpoint requires a specific certificate, request the certificate and then upload it into Oracle Integration.To upload an SSL certificate: 1.In the left navigation pane, click Home > Settings > Certificates .All certificates currently uploaded to the trust store are displayed in the Certificates dialog.The link enables you to filter by name, certificate expiration date, status, type, category, andChapter 2 Upload an SSL Certificate 2-3installation method (user-installed or system-installed). |
2.Wait for a message about the results of the connection test.If the test was successful, then the connection is configured properly.If the test failed, then edit the configuration details you entered.Check for typos, verify URLs and credentials, and download the diagnostic logs for additional details.Continue to test until the connection is successful.3.When complete, click Save .Upload an SSL Certificate Certificates are used to validate outbound SSL connections.If you make an SSL connection in which the root certificate does not exist in Oracle Integration, an exception is thrown.In that case, you must upload the appropriate certificate.A certificate enables Oracle Integration to connect with external services.If the external endpoint requires a specific certificate, request the certificate and then upload it into Oracle Integration.To upload an SSL certificate: 1.In the left navigation pane, click Home > Settings > Certificates .All certificates currently uploaded to the trust store are displayed in the Certificates dialog.The link enables you to filter by name, certificate expiration date, status, type, category, andChapter 2 Upload an SSL Certificate 2-3installation method (user-installed or system-installed).Certificates installed by the system cannot be deleted. |
If the test was successful, then the connection is configured properly.If the test failed, then edit the configuration details you entered.Check for typos, verify URLs and credentials, and download the diagnostic logs for additional details.Continue to test until the connection is successful.3.When complete, click Save .Upload an SSL Certificate Certificates are used to validate outbound SSL connections.If you make an SSL connection in which the root certificate does not exist in Oracle Integration, an exception is thrown.In that case, you must upload the appropriate certificate.A certificate enables Oracle Integration to connect with external services.If the external endpoint requires a specific certificate, request the certificate and then upload it into Oracle Integration.To upload an SSL certificate: 1.In the left navigation pane, click Home > Settings > Certificates .All certificates currently uploaded to the trust store are displayed in the Certificates dialog.The link enables you to filter by name, certificate expiration date, status, type, category, andChapter 2 Upload an SSL Certificate 2-3installation method (user-installed or system-installed).Certificates installed by the system cannot be deleted.2.Click Upload at the top of the page. |
If the test failed, then edit the configuration details you entered.Check for typos, verify URLs and credentials, and download the diagnostic logs for additional details.Continue to test until the connection is successful.3.When complete, click Save .Upload an SSL Certificate Certificates are used to validate outbound SSL connections.If you make an SSL connection in which the root certificate does not exist in Oracle Integration, an exception is thrown.In that case, you must upload the appropriate certificate.A certificate enables Oracle Integration to connect with external services.If the external endpoint requires a specific certificate, request the certificate and then upload it into Oracle Integration.To upload an SSL certificate: 1.In the left navigation pane, click Home > Settings > Certificates .All certificates currently uploaded to the trust store are displayed in the Certificates dialog.The link enables you to filter by name, certificate expiration date, status, type, category, andChapter 2 Upload an SSL Certificate 2-3installation method (user-installed or system-installed).Certificates installed by the system cannot be deleted.2.Click Upload at the top of the page.The Upload Certificate dialog box is displayed. |
Check for typos, verify URLs and credentials, and download the diagnostic logs for additional details.Continue to test until the connection is successful.3.When complete, click Save .Upload an SSL Certificate Certificates are used to validate outbound SSL connections.If you make an SSL connection in which the root certificate does not exist in Oracle Integration, an exception is thrown.In that case, you must upload the appropriate certificate.A certificate enables Oracle Integration to connect with external services.If the external endpoint requires a specific certificate, request the certificate and then upload it into Oracle Integration.To upload an SSL certificate: 1.In the left navigation pane, click Home > Settings > Certificates .All certificates currently uploaded to the trust store are displayed in the Certificates dialog.The link enables you to filter by name, certificate expiration date, status, type, category, andChapter 2 Upload an SSL Certificate 2-3installation method (user-installed or system-installed).Certificates installed by the system cannot be deleted.2.Click Upload at the top of the page.The Upload Certificate dialog box is displayed.3.Enter an alias name and optional description. |
Continue to test until the connection is successful.3.When complete, click Save .Upload an SSL Certificate Certificates are used to validate outbound SSL connections.If you make an SSL connection in which the root certificate does not exist in Oracle Integration, an exception is thrown.In that case, you must upload the appropriate certificate.A certificate enables Oracle Integration to connect with external services.If the external endpoint requires a specific certificate, request the certificate and then upload it into Oracle Integration.To upload an SSL certificate: 1.In the left navigation pane, click Home > Settings > Certificates .All certificates currently uploaded to the trust store are displayed in the Certificates dialog.The link enables you to filter by name, certificate expiration date, status, type, category, andChapter 2 Upload an SSL Certificate 2-3installation method (user-installed or system-installed).Certificates installed by the system cannot be deleted.2.Click Upload at the top of the page.The Upload Certificate dialog box is displayed.3.Enter an alias name and optional description.4.In the Type field, select the certificate type. |
3.When complete, click Save .Upload an SSL Certificate Certificates are used to validate outbound SSL connections.If you make an SSL connection in which the root certificate does not exist in Oracle Integration, an exception is thrown.In that case, you must upload the appropriate certificate.A certificate enables Oracle Integration to connect with external services.If the external endpoint requires a specific certificate, request the certificate and then upload it into Oracle Integration.To upload an SSL certificate: 1.In the left navigation pane, click Home > Settings > Certificates .All certificates currently uploaded to the trust store are displayed in the Certificates dialog.The link enables you to filter by name, certificate expiration date, status, type, category, andChapter 2 Upload an SSL Certificate 2-3installation method (user-installed or system-installed).Certificates installed by the system cannot be deleted.2.Click Upload at the top of the page.The Upload Certificate dialog box is displayed.3.Enter an alias name and optional description.4.In the Type field, select the certificate type.Each certificate type enables Oracle Integration to connect with external services. |
Upload an SSL Certificate Certificates are used to validate outbound SSL connections.If you make an SSL connection in which the root certificate does not exist in Oracle Integration, an exception is thrown.In that case, you must upload the appropriate certificate.A certificate enables Oracle Integration to connect with external services.If the external endpoint requires a specific certificate, request the certificate and then upload it into Oracle Integration.To upload an SSL certificate: 1.In the left navigation pane, click Home > Settings > Certificates .All certificates currently uploaded to the trust store are displayed in the Certificates dialog.The link enables you to filter by name, certificate expiration date, status, type, category, andChapter 2 Upload an SSL Certificate 2-3installation method (user-installed or system-installed).Certificates installed by the system cannot be deleted.2.Click Upload at the top of the page.The Upload Certificate dialog box is displayed.3.Enter an alias name and optional description.4.In the Type field, select the certificate type.Each certificate type enables Oracle Integration to connect with external services.X.509 (SSL transport) SAML (Authentication & Authorization) PGP (Encryption & Decryption) X.509 (SSL transport) 1.Select a certificate category. |
If you make an SSL connection in which the root certificate does not exist in Oracle Integration, an exception is thrown.In that case, you must upload the appropriate certificate.A certificate enables Oracle Integration to connect with external services.If the external endpoint requires a specific certificate, request the certificate and then upload it into Oracle Integration.To upload an SSL certificate: 1.In the left navigation pane, click Home > Settings > Certificates .All certificates currently uploaded to the trust store are displayed in the Certificates dialog.The link enables you to filter by name, certificate expiration date, status, type, category, andChapter 2 Upload an SSL Certificate 2-3installation method (user-installed or system-installed).Certificates installed by the system cannot be deleted.2.Click Upload at the top of the page.The Upload Certificate dialog box is displayed.3.Enter an alias name and optional description.4.In the Type field, select the certificate type.Each certificate type enables Oracle Integration to connect with external services.X.509 (SSL transport) SAML (Authentication & Authorization) PGP (Encryption & Decryption) X.509 (SSL transport) 1.Select a certificate category.a.Trust : Use this option to upload a trust certificate. |
In that case, you must upload the appropriate certificate.A certificate enables Oracle Integration to connect with external services.If the external endpoint requires a specific certificate, request the certificate and then upload it into Oracle Integration.To upload an SSL certificate: 1.In the left navigation pane, click Home > Settings > Certificates .All certificates currently uploaded to the trust store are displayed in the Certificates dialog.The link enables you to filter by name, certificate expiration date, status, type, category, andChapter 2 Upload an SSL Certificate 2-3installation method (user-installed or system-installed).Certificates installed by the system cannot be deleted.2.Click Upload at the top of the page.The Upload Certificate dialog box is displayed.3.Enter an alias name and optional description.4.In the Type field, select the certificate type.Each certificate type enables Oracle Integration to connect with external services.X.509 (SSL transport) SAML (Authentication & Authorization) PGP (Encryption & Decryption) X.509 (SSL transport) 1.Select a certificate category.a.Trust : Use this option to upload a trust certificate.i.Click Browse , then select the trust file (for example, .cer or .crt) to upload. |
A certificate enables Oracle Integration to connect with external services.If the external endpoint requires a specific certificate, request the certificate and then upload it into Oracle Integration.To upload an SSL certificate: 1.In the left navigation pane, click Home > Settings > Certificates .All certificates currently uploaded to the trust store are displayed in the Certificates dialog.The link enables you to filter by name, certificate expiration date, status, type, category, andChapter 2 Upload an SSL Certificate 2-3installation method (user-installed or system-installed).Certificates installed by the system cannot be deleted.2.Click Upload at the top of the page.The Upload Certificate dialog box is displayed.3.Enter an alias name and optional description.4.In the Type field, select the certificate type.Each certificate type enables Oracle Integration to connect with external services.X.509 (SSL transport) SAML (Authentication & Authorization) PGP (Encryption & Decryption) X.509 (SSL transport) 1.Select a certificate category.a.Trust : Use this option to upload a trust certificate.i.Click Browse , then select the trust file (for example, .cer or .crt) to upload.b.Identity : Use this option to upload a certificate for two-way SSL communication. |
If the external endpoint requires a specific certificate, request the certificate and then upload it into Oracle Integration.To upload an SSL certificate: 1.In the left navigation pane, click Home > Settings > Certificates .All certificates currently uploaded to the trust store are displayed in the Certificates dialog.The link enables you to filter by name, certificate expiration date, status, type, category, andChapter 2 Upload an SSL Certificate 2-3installation method (user-installed or system-installed).Certificates installed by the system cannot be deleted.2.Click Upload at the top of the page.The Upload Certificate dialog box is displayed.3.Enter an alias name and optional description.4.In the Type field, select the certificate type.Each certificate type enables Oracle Integration to connect with external services.X.509 (SSL transport) SAML (Authentication & Authorization) PGP (Encryption & Decryption) X.509 (SSL transport) 1.Select a certificate category.a.Trust : Use this option to upload a trust certificate.i.Click Browse , then select the trust file (for example, .cer or .crt) to upload.b.Identity : Use this option to upload a certificate for two-way SSL communication.i.Click Browse , then select the keystore file ( .jks) to upload. |
To upload an SSL certificate: 1.In the left navigation pane, click Home > Settings > Certificates .All certificates currently uploaded to the trust store are displayed in the Certificates dialog.The link enables you to filter by name, certificate expiration date, status, type, category, andChapter 2 Upload an SSL Certificate 2-3installation method (user-installed or system-installed).Certificates installed by the system cannot be deleted.2.Click Upload at the top of the page.The Upload Certificate dialog box is displayed.3.Enter an alias name and optional description.4.In the Type field, select the certificate type.Each certificate type enables Oracle Integration to connect with external services.X.509 (SSL transport) SAML (Authentication & Authorization) PGP (Encryption & Decryption) X.509 (SSL transport) 1.Select a certificate category.a.Trust : Use this option to upload a trust certificate.i.Click Browse , then select the trust file (for example, .cer or .crt) to upload.b.Identity : Use this option to upload a certificate for two-way SSL communication.i.Click Browse , then select the keystore file ( .jks) to upload.ii.Enter the comma-separated list of passwords corresponding to key aliases. |
All certificates currently uploaded to the trust store are displayed in the Certificates dialog.The link enables you to filter by name, certificate expiration date, status, type, category, andChapter 2 Upload an SSL Certificate 2-3installation method (user-installed or system-installed).Certificates installed by the system cannot be deleted.2.Click Upload at the top of the page.The Upload Certificate dialog box is displayed.3.Enter an alias name and optional description.4.In the Type field, select the certificate type.Each certificate type enables Oracle Integration to connect with external services.X.509 (SSL transport) SAML (Authentication & Authorization) PGP (Encryption & Decryption) X.509 (SSL transport) 1.Select a certificate category.a.Trust : Use this option to upload a trust certificate.i.Click Browse , then select the trust file (for example, .cer or .crt) to upload.b.Identity : Use this option to upload a certificate for two-way SSL communication.i.Click Browse , then select the keystore file ( .jks) to upload.ii.Enter the comma-separated list of passwords corresponding to key aliases.Note: When an identity certificate file (JKS) contains more than one private key, all the private keys must have the same password. |
The link enables you to filter by name, certificate expiration date, status, type, category, andChapter 2 Upload an SSL Certificate 2-3installation method (user-installed or system-installed).Certificates installed by the system cannot be deleted.2.Click Upload at the top of the page.The Upload Certificate dialog box is displayed.3.Enter an alias name and optional description.4.In the Type field, select the certificate type.Each certificate type enables Oracle Integration to connect with external services.X.509 (SSL transport) SAML (Authentication & Authorization) PGP (Encryption & Decryption) X.509 (SSL transport) 1.Select a certificate category.a.Trust : Use this option to upload a trust certificate.i.Click Browse , then select the trust file (for example, .cer or .crt) to upload.b.Identity : Use this option to upload a certificate for two-way SSL communication.i.Click Browse , then select the keystore file ( .jks) to upload.ii.Enter the comma-separated list of passwords corresponding to key aliases.Note: When an identity certificate file (JKS) contains more than one private key, all the private keys must have the same password.If the private keys are protected with different passwords, the private keys cannot be extracted from the keystore. |
Certificates installed by the system cannot be deleted.2.Click Upload at the top of the page.The Upload Certificate dialog box is displayed.3.Enter an alias name and optional description.4.In the Type field, select the certificate type.Each certificate type enables Oracle Integration to connect with external services.X.509 (SSL transport) SAML (Authentication & Authorization) PGP (Encryption & Decryption) X.509 (SSL transport) 1.Select a certificate category.a.Trust : Use this option to upload a trust certificate.i.Click Browse , then select the trust file (for example, .cer or .crt) to upload.b.Identity : Use this option to upload a certificate for two-way SSL communication.i.Click Browse , then select the keystore file ( .jks) to upload.ii.Enter the comma-separated list of passwords corresponding to key aliases.Note: When an identity certificate file (JKS) contains more than one private key, all the private keys must have the same password.If the private keys are protected with different passwords, the private keys cannot be extracted from the keystore.iii.Enter the password of the keystore being imported. |
2.Click Upload at the top of the page.The Upload Certificate dialog box is displayed.3.Enter an alias name and optional description.4.In the Type field, select the certificate type.Each certificate type enables Oracle Integration to connect with external services.X.509 (SSL transport) SAML (Authentication & Authorization) PGP (Encryption & Decryption) X.509 (SSL transport) 1.Select a certificate category.a.Trust : Use this option to upload a trust certificate.i.Click Browse , then select the trust file (for example, .cer or .crt) to upload.b.Identity : Use this option to upload a certificate for two-way SSL communication.i.Click Browse , then select the keystore file ( .jks) to upload.ii.Enter the comma-separated list of passwords corresponding to key aliases.Note: When an identity certificate file (JKS) contains more than one private key, all the private keys must have the same password.If the private keys are protected with different passwords, the private keys cannot be extracted from the keystore.iii.Enter the password of the keystore being imported.c.Click Upload .Chapter 2 Upload an SSL Certificate 2-4SAML (Authentication & Authorization) 1.Note that Message Protection is automatically selected as the only available certificate category and cannot be deselected. |
The Upload Certificate dialog box is displayed.3.Enter an alias name and optional description.4.In the Type field, select the certificate type.Each certificate type enables Oracle Integration to connect with external services.X.509 (SSL transport) SAML (Authentication & Authorization) PGP (Encryption & Decryption) X.509 (SSL transport) 1.Select a certificate category.a.Trust : Use this option to upload a trust certificate.i.Click Browse , then select the trust file (for example, .cer or .crt) to upload.b.Identity : Use this option to upload a certificate for two-way SSL communication.i.Click Browse , then select the keystore file ( .jks) to upload.ii.Enter the comma-separated list of passwords corresponding to key aliases.Note: When an identity certificate file (JKS) contains more than one private key, all the private keys must have the same password.If the private keys are protected with different passwords, the private keys cannot be extracted from the keystore.iii.Enter the password of the keystore being imported.c.Click Upload .Chapter 2 Upload an SSL Certificate 2-4SAML (Authentication & Authorization) 1.Note that Message Protection is automatically selected as the only available certificate category and cannot be deselected.Use this option to upload a keystore certificate with SAML token support. |
3.Enter an alias name and optional description.4.In the Type field, select the certificate type.Each certificate type enables Oracle Integration to connect with external services.X.509 (SSL transport) SAML (Authentication & Authorization) PGP (Encryption & Decryption) X.509 (SSL transport) 1.Select a certificate category.a.Trust : Use this option to upload a trust certificate.i.Click Browse , then select the trust file (for example, .cer or .crt) to upload.b.Identity : Use this option to upload a certificate for two-way SSL communication.i.Click Browse , then select the keystore file ( .jks) to upload.ii.Enter the comma-separated list of passwords corresponding to key aliases.Note: When an identity certificate file (JKS) contains more than one private key, all the private keys must have the same password.If the private keys are protected with different passwords, the private keys cannot be extracted from the keystore.iii.Enter the password of the keystore being imported.c.Click Upload .Chapter 2 Upload an SSL Certificate 2-4SAML (Authentication & Authorization) 1.Note that Message Protection is automatically selected as the only available certificate category and cannot be deselected.Use this option to upload a keystore certificate with SAML token support.Create, read, update, and delete (CRUD) operations are supported with this type of certificate. |
4.In the Type field, select the certificate type.Each certificate type enables Oracle Integration to connect with external services.X.509 (SSL transport) SAML (Authentication & Authorization) PGP (Encryption & Decryption) X.509 (SSL transport) 1.Select a certificate category.a.Trust : Use this option to upload a trust certificate.i.Click Browse , then select the trust file (for example, .cer or .crt) to upload.b.Identity : Use this option to upload a certificate for two-way SSL communication.i.Click Browse , then select the keystore file ( .jks) to upload.ii.Enter the comma-separated list of passwords corresponding to key aliases.Note: When an identity certificate file (JKS) contains more than one private key, all the private keys must have the same password.If the private keys are protected with different passwords, the private keys cannot be extracted from the keystore.iii.Enter the password of the keystore being imported.c.Click Upload .Chapter 2 Upload an SSL Certificate 2-4SAML (Authentication & Authorization) 1.Note that Message Protection is automatically selected as the only available certificate category and cannot be deselected.Use this option to upload a keystore certificate with SAML token support.Create, read, update, and delete (CRUD) operations are supported with this type of certificate.2.Click Browse , then select the certificate file ( .cer or .crt) to upload. |
Each certificate type enables Oracle Integration to connect with external services.X.509 (SSL transport) SAML (Authentication & Authorization) PGP (Encryption & Decryption) X.509 (SSL transport) 1.Select a certificate category.a.Trust : Use this option to upload a trust certificate.i.Click Browse , then select the trust file (for example, .cer or .crt) to upload.b.Identity : Use this option to upload a certificate for two-way SSL communication.i.Click Browse , then select the keystore file ( .jks) to upload.ii.Enter the comma-separated list of passwords corresponding to key aliases.Note: When an identity certificate file (JKS) contains more than one private key, all the private keys must have the same password.If the private keys are protected with different passwords, the private keys cannot be extracted from the keystore.iii.Enter the password of the keystore being imported.c.Click Upload .Chapter 2 Upload an SSL Certificate 2-4SAML (Authentication & Authorization) 1.Note that Message Protection is automatically selected as the only available certificate category and cannot be deselected.Use this option to upload a keystore certificate with SAML token support.Create, read, update, and delete (CRUD) operations are supported with this type of certificate.2.Click Browse , then select the certificate file ( .cer or .crt) to upload.3.Click Upload . |
X.509 (SSL transport) SAML (Authentication & Authorization) PGP (Encryption & Decryption) X.509 (SSL transport) 1.Select a certificate category.a.Trust : Use this option to upload a trust certificate.i.Click Browse , then select the trust file (for example, .cer or .crt) to upload.b.Identity : Use this option to upload a certificate for two-way SSL communication.i.Click Browse , then select the keystore file ( .jks) to upload.ii.Enter the comma-separated list of passwords corresponding to key aliases.Note: When an identity certificate file (JKS) contains more than one private key, all the private keys must have the same password.If the private keys are protected with different passwords, the private keys cannot be extracted from the keystore.iii.Enter the password of the keystore being imported.c.Click Upload .Chapter 2 Upload an SSL Certificate 2-4SAML (Authentication & Authorization) 1.Note that Message Protection is automatically selected as the only available certificate category and cannot be deselected.Use this option to upload a keystore certificate with SAML token support.Create, read, update, and delete (CRUD) operations are supported with this type of certificate.2.Click Browse , then select the certificate file ( .cer or .crt) to upload.3.Click Upload .PGP (Encryption & Decryption) 1.Select a certificate category. |
a.Trust : Use this option to upload a trust certificate.i.Click Browse , then select the trust file (for example, .cer or .crt) to upload.b.Identity : Use this option to upload a certificate for two-way SSL communication.i.Click Browse , then select the keystore file ( .jks) to upload.ii.Enter the comma-separated list of passwords corresponding to key aliases.Note: When an identity certificate file (JKS) contains more than one private key, all the private keys must have the same password.If the private keys are protected with different passwords, the private keys cannot be extracted from the keystore.iii.Enter the password of the keystore being imported.c.Click Upload .Chapter 2 Upload an SSL Certificate 2-4SAML (Authentication & Authorization) 1.Note that Message Protection is automatically selected as the only available certificate category and cannot be deselected.Use this option to upload a keystore certificate with SAML token support.Create, read, update, and delete (CRUD) operations are supported with this type of certificate.2.Click Browse , then select the certificate file ( .cer or .crt) to upload.3.Click Upload .PGP (Encryption & Decryption) 1.Select a certificate category.Pretty Good Privacy (PGP) provides cryptographic privacy and authentication for communication. |
i.Click Browse , then select the trust file (for example, .cer or .crt) to upload.b.Identity : Use this option to upload a certificate for two-way SSL communication.i.Click Browse , then select the keystore file ( .jks) to upload.ii.Enter the comma-separated list of passwords corresponding to key aliases.Note: When an identity certificate file (JKS) contains more than one private key, all the private keys must have the same password.If the private keys are protected with different passwords, the private keys cannot be extracted from the keystore.iii.Enter the password of the keystore being imported.c.Click Upload .Chapter 2 Upload an SSL Certificate 2-4SAML (Authentication & Authorization) 1.Note that Message Protection is automatically selected as the only available certificate category and cannot be deselected.Use this option to upload a keystore certificate with SAML token support.Create, read, update, and delete (CRUD) operations are supported with this type of certificate.2.Click Browse , then select the certificate file ( .cer or .crt) to upload.3.Click Upload .PGP (Encryption & Decryption) 1.Select a certificate category.Pretty Good Privacy (PGP) provides cryptographic privacy and authentication for communication.PGP is used for signing, encrypting, and decrypting files. |
b.Identity : Use this option to upload a certificate for two-way SSL communication.i.Click Browse , then select the keystore file ( .jks) to upload.ii.Enter the comma-separated list of passwords corresponding to key aliases.Note: When an identity certificate file (JKS) contains more than one private key, all the private keys must have the same password.If the private keys are protected with different passwords, the private keys cannot be extracted from the keystore.iii.Enter the password of the keystore being imported.c.Click Upload .Chapter 2 Upload an SSL Certificate 2-4SAML (Authentication & Authorization) 1.Note that Message Protection is automatically selected as the only available certificate category and cannot be deselected.Use this option to upload a keystore certificate with SAML token support.Create, read, update, and delete (CRUD) operations are supported with this type of certificate.2.Click Browse , then select the certificate file ( .cer or .crt) to upload.3.Click Upload .PGP (Encryption & Decryption) 1.Select a certificate category.Pretty Good Privacy (PGP) provides cryptographic privacy and authentication for communication.PGP is used for signing, encrypting, and decrypting files.You can select the private key to use for encryption or decryption when configuring the stage file action. |
i.Click Browse , then select the keystore file ( .jks) to upload.ii.Enter the comma-separated list of passwords corresponding to key aliases.Note: When an identity certificate file (JKS) contains more than one private key, all the private keys must have the same password.If the private keys are protected with different passwords, the private keys cannot be extracted from the keystore.iii.Enter the password of the keystore being imported.c.Click Upload .Chapter 2 Upload an SSL Certificate 2-4SAML (Authentication & Authorization) 1.Note that Message Protection is automatically selected as the only available certificate category and cannot be deselected.Use this option to upload a keystore certificate with SAML token support.Create, read, update, and delete (CRUD) operations are supported with this type of certificate.2.Click Browse , then select the certificate file ( .cer or .crt) to upload.3.Click Upload .PGP (Encryption & Decryption) 1.Select a certificate category.Pretty Good Privacy (PGP) provides cryptographic privacy and authentication for communication.PGP is used for signing, encrypting, and decrypting files.You can select the private key to use for encryption or decryption when configuring the stage file action.a.Private : Uses a private key of the target location to decrypt the file. |
ii.Enter the comma-separated list of passwords corresponding to key aliases.Note: When an identity certificate file (JKS) contains more than one private key, all the private keys must have the same password.If the private keys are protected with different passwords, the private keys cannot be extracted from the keystore.iii.Enter the password of the keystore being imported.c.Click Upload .Chapter 2 Upload an SSL Certificate 2-4SAML (Authentication & Authorization) 1.Note that Message Protection is automatically selected as the only available certificate category and cannot be deselected.Use this option to upload a keystore certificate with SAML token support.Create, read, update, and delete (CRUD) operations are supported with this type of certificate.2.Click Browse , then select the certificate file ( .cer or .crt) to upload.3.Click Upload .PGP (Encryption & Decryption) 1.Select a certificate category.Pretty Good Privacy (PGP) provides cryptographic privacy and authentication for communication.PGP is used for signing, encrypting, and decrypting files.You can select the private key to use for encryption or decryption when configuring the stage file action.a.Private : Uses a private key of the target location to decrypt the file.i.Click Browse , then select the PGP file to upload. |
Note: When an identity certificate file (JKS) contains more than one private key, all the private keys must have the same password.If the private keys are protected with different passwords, the private keys cannot be extracted from the keystore.iii.Enter the password of the keystore being imported.c.Click Upload .Chapter 2 Upload an SSL Certificate 2-4SAML (Authentication & Authorization) 1.Note that Message Protection is automatically selected as the only available certificate category and cannot be deselected.Use this option to upload a keystore certificate with SAML token support.Create, read, update, and delete (CRUD) operations are supported with this type of certificate.2.Click Browse , then select the certificate file ( .cer or .crt) to upload.3.Click Upload .PGP (Encryption & Decryption) 1.Select a certificate category.Pretty Good Privacy (PGP) provides cryptographic privacy and authentication for communication.PGP is used for signing, encrypting, and decrypting files.You can select the private key to use for encryption or decryption when configuring the stage file action.a.Private : Uses a private key of the target location to decrypt the file.i.Click Browse , then select the PGP file to upload.ii.Enter the PGP private key password. |
If the private keys are protected with different passwords, the private keys cannot be extracted from the keystore.iii.Enter the password of the keystore being imported.c.Click Upload .Chapter 2 Upload an SSL Certificate 2-4SAML (Authentication & Authorization) 1.Note that Message Protection is automatically selected as the only available certificate category and cannot be deselected.Use this option to upload a keystore certificate with SAML token support.Create, read, update, and delete (CRUD) operations are supported with this type of certificate.2.Click Browse , then select the certificate file ( .cer or .crt) to upload.3.Click Upload .PGP (Encryption & Decryption) 1.Select a certificate category.Pretty Good Privacy (PGP) provides cryptographic privacy and authentication for communication.PGP is used for signing, encrypting, and decrypting files.You can select the private key to use for encryption or decryption when configuring the stage file action.a.Private : Uses a private key of the target location to decrypt the file.i.Click Browse , then select the PGP file to upload.ii.Enter the PGP private key password.b.Public : Uses a public key of the target location to encrypt the file. |
iii.Enter the password of the keystore being imported.c.Click Upload .Chapter 2 Upload an SSL Certificate 2-4SAML (Authentication & Authorization) 1.Note that Message Protection is automatically selected as the only available certificate category and cannot be deselected.Use this option to upload a keystore certificate with SAML token support.Create, read, update, and delete (CRUD) operations are supported with this type of certificate.2.Click Browse , then select the certificate file ( .cer or .crt) to upload.3.Click Upload .PGP (Encryption & Decryption) 1.Select a certificate category.Pretty Good Privacy (PGP) provides cryptographic privacy and authentication for communication.PGP is used for signing, encrypting, and decrypting files.You can select the private key to use for encryption or decryption when configuring the stage file action.a.Private : Uses a private key of the target location to decrypt the file.i.Click Browse , then select the PGP file to upload.ii.Enter the PGP private key password.b.Public : Uses a public key of the target location to encrypt the file.i.Click Browse , then select the PGP file to upload. |
c.Click Upload .Chapter 2 Upload an SSL Certificate 2-4SAML (Authentication & Authorization) 1.Note that Message Protection is automatically selected as the only available certificate category and cannot be deselected.Use this option to upload a keystore certificate with SAML token support.Create, read, update, and delete (CRUD) operations are supported with this type of certificate.2.Click Browse , then select the certificate file ( .cer or .crt) to upload.3.Click Upload .PGP (Encryption & Decryption) 1.Select a certificate category.Pretty Good Privacy (PGP) provides cryptographic privacy and authentication for communication.PGP is used for signing, encrypting, and decrypting files.You can select the private key to use for encryption or decryption when configuring the stage file action.a.Private : Uses a private key of the target location to decrypt the file.i.Click Browse , then select the PGP file to upload.ii.Enter the PGP private key password.b.Public : Uses a public key of the target location to encrypt the file.i.Click Browse , then select the PGP file to upload.ii.In the ASCII-Armor Encryption Format field, select Yes or No. |
Use this option to upload a keystore certificate with SAML token support.Create, read, update, and delete (CRUD) operations are supported with this type of certificate.2.Click Browse , then select the certificate file ( .cer or .crt) to upload.3.Click Upload .PGP (Encryption & Decryption) 1.Select a certificate category.Pretty Good Privacy (PGP) provides cryptographic privacy and authentication for communication.PGP is used for signing, encrypting, and decrypting files.You can select the private key to use for encryption or decryption when configuring the stage file action.a.Private : Uses a private key of the target location to decrypt the file.i.Click Browse , then select the PGP file to upload.ii.Enter the PGP private key password.b.Public : Uses a public key of the target location to encrypt the file.i.Click Browse , then select the PGP file to upload.ii.In the ASCII-Armor Encryption Format field, select Yes or No.Yes shows the format of the encrypted message in ASCII armor. |
Create, read, update, and delete (CRUD) operations are supported with this type of certificate.2.Click Browse , then select the certificate file ( .cer or .crt) to upload.3.Click Upload .PGP (Encryption & Decryption) 1.Select a certificate category.Pretty Good Privacy (PGP) provides cryptographic privacy and authentication for communication.PGP is used for signing, encrypting, and decrypting files.You can select the private key to use for encryption or decryption when configuring the stage file action.a.Private : Uses a private key of the target location to decrypt the file.i.Click Browse , then select the PGP file to upload.ii.Enter the PGP private key password.b.Public : Uses a public key of the target location to encrypt the file.i.Click Browse , then select the PGP file to upload.ii.In the ASCII-Armor Encryption Format field, select Yes or No.Yes shows the format of the encrypted message in ASCII armor.ASCII armor is a binary-to- textual encoding converter. |
2.Click Browse , then select the certificate file ( .cer or .crt) to upload.3.Click Upload .PGP (Encryption & Decryption) 1.Select a certificate category.Pretty Good Privacy (PGP) provides cryptographic privacy and authentication for communication.PGP is used for signing, encrypting, and decrypting files.You can select the private key to use for encryption or decryption when configuring the stage file action.a.Private : Uses a private key of the target location to decrypt the file.i.Click Browse , then select the PGP file to upload.ii.Enter the PGP private key password.b.Public : Uses a public key of the target location to encrypt the file.i.Click Browse , then select the PGP file to upload.ii.In the ASCII-Armor Encryption Format field, select Yes or No.Yes shows the format of the encrypted message in ASCII armor.ASCII armor is a binary-to- textual encoding converter.ASCII armor formats encrypted messaging in ASCII. |
3.Click Upload .PGP (Encryption & Decryption) 1.Select a certificate category.Pretty Good Privacy (PGP) provides cryptographic privacy and authentication for communication.PGP is used for signing, encrypting, and decrypting files.You can select the private key to use for encryption or decryption when configuring the stage file action.a.Private : Uses a private key of the target location to decrypt the file.i.Click Browse , then select the PGP file to upload.ii.Enter the PGP private key password.b.Public : Uses a public key of the target location to encrypt the file.i.Click Browse , then select the PGP file to upload.ii.In the ASCII-Armor Encryption Format field, select Yes or No.Yes shows the format of the encrypted message in ASCII armor.ASCII armor is a binary-to- textual encoding converter.ASCII armor formats encrypted messaging in ASCII.This enables messages to be sent in a standard messaging format. |
PGP (Encryption & Decryption) 1.Select a certificate category.Pretty Good Privacy (PGP) provides cryptographic privacy and authentication for communication.PGP is used for signing, encrypting, and decrypting files.You can select the private key to use for encryption or decryption when configuring the stage file action.a.Private : Uses a private key of the target location to decrypt the file.i.Click Browse , then select the PGP file to upload.ii.Enter the PGP private key password.b.Public : Uses a public key of the target location to encrypt the file.i.Click Browse , then select the PGP file to upload.ii.In the ASCII-Armor Encryption Format field, select Yes or No.Yes shows the format of the encrypted message in ASCII armor.ASCII armor is a binary-to- textual encoding converter.ASCII armor formats encrypted messaging in ASCII.This enables messages to be sent in a standard messaging format.This selection impacts the visibility of message content. |
Pretty Good Privacy (PGP) provides cryptographic privacy and authentication for communication.PGP is used for signing, encrypting, and decrypting files.You can select the private key to use for encryption or decryption when configuring the stage file action.a.Private : Uses a private key of the target location to decrypt the file.i.Click Browse , then select the PGP file to upload.ii.Enter the PGP private key password.b.Public : Uses a public key of the target location to encrypt the file.i.Click Browse , then select the PGP file to upload.ii.In the ASCII-Armor Encryption Format field, select Yes or No.Yes shows the format of the encrypted message in ASCII armor.ASCII armor is a binary-to- textual encoding converter.ASCII armor formats encrypted messaging in ASCII.This enables messages to be sent in a standard messaging format.This selection impacts the visibility of message content.No causes the message to be sent in binary format. |
PGP is used for signing, encrypting, and decrypting files.You can select the private key to use for encryption or decryption when configuring the stage file action.a.Private : Uses a private key of the target location to decrypt the file.i.Click Browse , then select the PGP file to upload.ii.Enter the PGP private key password.b.Public : Uses a public key of the target location to encrypt the file.i.Click Browse , then select the PGP file to upload.ii.In the ASCII-Armor Encryption Format field, select Yes or No.Yes shows the format of the encrypted message in ASCII armor.ASCII armor is a binary-to- textual encoding converter.ASCII armor formats encrypted messaging in ASCII.This enables messages to be sent in a standard messaging format.This selection impacts the visibility of message content.No causes the message to be sent in binary format.iii.From the Cipher Algorithm list, select the algorithm to use. |
You can select the private key to use for encryption or decryption when configuring the stage file action.a.Private : Uses a private key of the target location to decrypt the file.i.Click Browse , then select the PGP file to upload.ii.Enter the PGP private key password.b.Public : Uses a public key of the target location to encrypt the file.i.Click Browse , then select the PGP file to upload.ii.In the ASCII-Armor Encryption Format field, select Yes or No.Yes shows the format of the encrypted message in ASCII armor.ASCII armor is a binary-to- textual encoding converter.ASCII armor formats encrypted messaging in ASCII.This enables messages to be sent in a standard messaging format.This selection impacts the visibility of message content.No causes the message to be sent in binary format.iii.From the Cipher Algorithm list, select the algorithm to use.Symmetric-key algorithms for cryptography use the same cryptographic keys for both encryption of plain text and decryption of cipher text. |
a.Private : Uses a private key of the target location to decrypt the file.i.Click Browse , then select the PGP file to upload.ii.Enter the PGP private key password.b.Public : Uses a public key of the target location to encrypt the file.i.Click Browse , then select the PGP file to upload.ii.In the ASCII-Armor Encryption Format field, select Yes or No.Yes shows the format of the encrypted message in ASCII armor.ASCII armor is a binary-to- textual encoding converter.ASCII armor formats encrypted messaging in ASCII.This enables messages to be sent in a standard messaging format.This selection impacts the visibility of message content.No causes the message to be sent in binary format.iii.From the Cipher Algorithm list, select the algorithm to use.Symmetric-key algorithms for cryptography use the same cryptographic keys for both encryption of plain text and decryption of cipher text.c.Click Upload .Chapter 2 Upload an SSL Certificate 2-53 Add the LinkedIn Adapter Connection to an Integration When you drag the LinkedIn Adapter into the invoke area of an integration, the Adapter Endpoint Configuration Wizard appears. |
i.Click Browse , then select the PGP file to upload.ii.Enter the PGP private key password.b.Public : Uses a public key of the target location to encrypt the file.i.Click Browse , then select the PGP file to upload.ii.In the ASCII-Armor Encryption Format field, select Yes or No.Yes shows the format of the encrypted message in ASCII armor.ASCII armor is a binary-to- textual encoding converter.ASCII armor formats encrypted messaging in ASCII.This enables messages to be sent in a standard messaging format.This selection impacts the visibility of message content.No causes the message to be sent in binary format.iii.From the Cipher Algorithm list, select the algorithm to use.Symmetric-key algorithms for cryptography use the same cryptographic keys for both encryption of plain text and decryption of cipher text.c.Click Upload .Chapter 2 Upload an SSL Certificate 2-53 Add the LinkedIn Adapter Connection to an Integration When you drag the LinkedIn Adapter into the invoke area of an integration, the Adapter Endpoint Configuration Wizard appears.This wizard guides you through configuration of the LinkedIn Adapter endpoint properties. |
ii.Enter the PGP private key password.b.Public : Uses a public key of the target location to encrypt the file.i.Click Browse , then select the PGP file to upload.ii.In the ASCII-Armor Encryption Format field, select Yes or No.Yes shows the format of the encrypted message in ASCII armor.ASCII armor is a binary-to- textual encoding converter.ASCII armor formats encrypted messaging in ASCII.This enables messages to be sent in a standard messaging format.This selection impacts the visibility of message content.No causes the message to be sent in binary format.iii.From the Cipher Algorithm list, select the algorithm to use.Symmetric-key algorithms for cryptography use the same cryptographic keys for both encryption of plain text and decryption of cipher text.c.Click Upload .Chapter 2 Upload an SSL Certificate 2-53 Add the LinkedIn Adapter Connection to an Integration When you drag the LinkedIn Adapter into the invoke area of an integration, the Adapter Endpoint Configuration Wizard appears.This wizard guides you through configuration of the LinkedIn Adapter endpoint properties.These topics describe the wizard pages that guide you through configuration of the LinkedIn Adapter as an invoke in an integration. |
b.Public : Uses a public key of the target location to encrypt the file.i.Click Browse , then select the PGP file to upload.ii.In the ASCII-Armor Encryption Format field, select Yes or No.Yes shows the format of the encrypted message in ASCII armor.ASCII armor is a binary-to- textual encoding converter.ASCII armor formats encrypted messaging in ASCII.This enables messages to be sent in a standard messaging format.This selection impacts the visibility of message content.No causes the message to be sent in binary format.iii.From the Cipher Algorithm list, select the algorithm to use.Symmetric-key algorithms for cryptography use the same cryptographic keys for both encryption of plain text and decryption of cipher text.c.Click Upload .Chapter 2 Upload an SSL Certificate 2-53 Add the LinkedIn Adapter Connection to an Integration When you drag the LinkedIn Adapter into the invoke area of an integration, the Adapter Endpoint Configuration Wizard appears.This wizard guides you through configuration of the LinkedIn Adapter endpoint properties.These topics describe the wizard pages that guide you through configuration of the LinkedIn Adapter as an invoke in an integration.The LinkedIn Adapter cannot be used as a trigger in an integration. |
i.Click Browse , then select the PGP file to upload.ii.In the ASCII-Armor Encryption Format field, select Yes or No.Yes shows the format of the encrypted message in ASCII armor.ASCII armor is a binary-to- textual encoding converter.ASCII armor formats encrypted messaging in ASCII.This enables messages to be sent in a standard messaging format.This selection impacts the visibility of message content.No causes the message to be sent in binary format.iii.From the Cipher Algorithm list, select the algorithm to use.Symmetric-key algorithms for cryptography use the same cryptographic keys for both encryption of plain text and decryption of cipher text.c.Click Upload .Chapter 2 Upload an SSL Certificate 2-53 Add the LinkedIn Adapter Connection to an Integration When you drag the LinkedIn Adapter into the invoke area of an integration, the Adapter Endpoint Configuration Wizard appears.This wizard guides you through configuration of the LinkedIn Adapter endpoint properties.These topics describe the wizard pages that guide you through configuration of the LinkedIn Adapter as an invoke in an integration.The LinkedIn Adapter cannot be used as a trigger in an integration.Topics: Basic Information Page Select an Operation Page Summary Page Basic Information Page Enter the basic information parameters. |
ii.In the ASCII-Armor Encryption Format field, select Yes or No.Yes shows the format of the encrypted message in ASCII armor.ASCII armor is a binary-to- textual encoding converter.ASCII armor formats encrypted messaging in ASCII.This enables messages to be sent in a standard messaging format.This selection impacts the visibility of message content.No causes the message to be sent in binary format.iii.From the Cipher Algorithm list, select the algorithm to use.Symmetric-key algorithms for cryptography use the same cryptographic keys for both encryption of plain text and decryption of cipher text.c.Click Upload .Chapter 2 Upload an SSL Certificate 2-53 Add the LinkedIn Adapter Connection to an Integration When you drag the LinkedIn Adapter into the invoke area of an integration, the Adapter Endpoint Configuration Wizard appears.This wizard guides you through configuration of the LinkedIn Adapter endpoint properties.These topics describe the wizard pages that guide you through configuration of the LinkedIn Adapter as an invoke in an integration.The LinkedIn Adapter cannot be used as a trigger in an integration.Topics: Basic Information Page Select an Operation Page Summary Page Basic Information Page Enter the basic information parameters.Element Description What do you want to call your endpoint?Provide a meaningful name so that others can understand the connection. |
Yes shows the format of the encrypted message in ASCII armor.ASCII armor is a binary-to- textual encoding converter.ASCII armor formats encrypted messaging in ASCII.This enables messages to be sent in a standard messaging format.This selection impacts the visibility of message content.No causes the message to be sent in binary format.iii.From the Cipher Algorithm list, select the algorithm to use.Symmetric-key algorithms for cryptography use the same cryptographic keys for both encryption of plain text and decryption of cipher text.c.Click Upload .Chapter 2 Upload an SSL Certificate 2-53 Add the LinkedIn Adapter Connection to an Integration When you drag the LinkedIn Adapter into the invoke area of an integration, the Adapter Endpoint Configuration Wizard appears.This wizard guides you through configuration of the LinkedIn Adapter endpoint properties.These topics describe the wizard pages that guide you through configuration of the LinkedIn Adapter as an invoke in an integration.The LinkedIn Adapter cannot be used as a trigger in an integration.Topics: Basic Information Page Select an Operation Page Summary Page Basic Information Page Enter the basic information parameters.Element Description What do you want to call your endpoint?Provide a meaningful name so that others can understand the connection.For example, you may want to name it LinkedInTarget_update_status . |
ASCII armor is a binary-to- textual encoding converter.ASCII armor formats encrypted messaging in ASCII.This enables messages to be sent in a standard messaging format.This selection impacts the visibility of message content.No causes the message to be sent in binary format.iii.From the Cipher Algorithm list, select the algorithm to use.Symmetric-key algorithms for cryptography use the same cryptographic keys for both encryption of plain text and decryption of cipher text.c.Click Upload .Chapter 2 Upload an SSL Certificate 2-53 Add the LinkedIn Adapter Connection to an Integration When you drag the LinkedIn Adapter into the invoke area of an integration, the Adapter Endpoint Configuration Wizard appears.This wizard guides you through configuration of the LinkedIn Adapter endpoint properties.These topics describe the wizard pages that guide you through configuration of the LinkedIn Adapter as an invoke in an integration.The LinkedIn Adapter cannot be used as a trigger in an integration.Topics: Basic Information Page Select an Operation Page Summary Page Basic Information Page Enter the basic information parameters.Element Description What do you want to call your endpoint?Provide a meaningful name so that others can understand the connection.For example, you may want to name it LinkedInTarget_update_status .You can include English alphabetic characters, numbers, underscores, and dashes in the name. |
ASCII armor formats encrypted messaging in ASCII.This enables messages to be sent in a standard messaging format.This selection impacts the visibility of message content.No causes the message to be sent in binary format.iii.From the Cipher Algorithm list, select the algorithm to use.Symmetric-key algorithms for cryptography use the same cryptographic keys for both encryption of plain text and decryption of cipher text.c.Click Upload .Chapter 2 Upload an SSL Certificate 2-53 Add the LinkedIn Adapter Connection to an Integration When you drag the LinkedIn Adapter into the invoke area of an integration, the Adapter Endpoint Configuration Wizard appears.This wizard guides you through configuration of the LinkedIn Adapter endpoint properties.These topics describe the wizard pages that guide you through configuration of the LinkedIn Adapter as an invoke in an integration.The LinkedIn Adapter cannot be used as a trigger in an integration.Topics: Basic Information Page Select an Operation Page Summary Page Basic Information Page Enter the basic information parameters.Element Description What do you want to call your endpoint?Provide a meaningful name so that others can understand the connection.For example, you may want to name it LinkedInTarget_update_status .You can include English alphabetic characters, numbers, underscores, and dashes in the name.You cannot include the following: Blank spaces (for example, My FTP Connection ) Special characters (for example, #;83& or righ(t)now4 ) Multibyte characters What does this endpoint do? |
This enables messages to be sent in a standard messaging format.This selection impacts the visibility of message content.No causes the message to be sent in binary format.iii.From the Cipher Algorithm list, select the algorithm to use.Symmetric-key algorithms for cryptography use the same cryptographic keys for both encryption of plain text and decryption of cipher text.c.Click Upload .Chapter 2 Upload an SSL Certificate 2-53 Add the LinkedIn Adapter Connection to an Integration When you drag the LinkedIn Adapter into the invoke area of an integration, the Adapter Endpoint Configuration Wizard appears.This wizard guides you through configuration of the LinkedIn Adapter endpoint properties.These topics describe the wizard pages that guide you through configuration of the LinkedIn Adapter as an invoke in an integration.The LinkedIn Adapter cannot be used as a trigger in an integration.Topics: Basic Information Page Select an Operation Page Summary Page Basic Information Page Enter the basic information parameters.Element Description What do you want to call your endpoint?Provide a meaningful name so that others can understand the connection.For example, you may want to name it LinkedInTarget_update_status .You can include English alphabetic characters, numbers, underscores, and dashes in the name.You cannot include the following: Blank spaces (for example, My FTP Connection ) Special characters (for example, #;83& or righ(t)now4 ) Multibyte characters What does this endpoint do?Enter an optional description of the connection's responsibilities. |
This selection impacts the visibility of message content.No causes the message to be sent in binary format.iii.From the Cipher Algorithm list, select the algorithm to use.Symmetric-key algorithms for cryptography use the same cryptographic keys for both encryption of plain text and decryption of cipher text.c.Click Upload .Chapter 2 Upload an SSL Certificate 2-53 Add the LinkedIn Adapter Connection to an Integration When you drag the LinkedIn Adapter into the invoke area of an integration, the Adapter Endpoint Configuration Wizard appears.This wizard guides you through configuration of the LinkedIn Adapter endpoint properties.These topics describe the wizard pages that guide you through configuration of the LinkedIn Adapter as an invoke in an integration.The LinkedIn Adapter cannot be used as a trigger in an integration.Topics: Basic Information Page Select an Operation Page Summary Page Basic Information Page Enter the basic information parameters.Element Description What do you want to call your endpoint?Provide a meaningful name so that others can understand the connection.For example, you may want to name it LinkedInTarget_update_status .You can include English alphabetic characters, numbers, underscores, and dashes in the name.You cannot include the following: Blank spaces (for example, My FTP Connection ) Special characters (for example, #;83& or righ(t)now4 ) Multibyte characters What does this endpoint do?Enter an optional description of the connection's responsibilities.For example: This endpoint updates status on a user's LinkedIn timeline. |
No causes the message to be sent in binary format.iii.From the Cipher Algorithm list, select the algorithm to use.Symmetric-key algorithms for cryptography use the same cryptographic keys for both encryption of plain text and decryption of cipher text.c.Click Upload .Chapter 2 Upload an SSL Certificate 2-53 Add the LinkedIn Adapter Connection to an Integration When you drag the LinkedIn Adapter into the invoke area of an integration, the Adapter Endpoint Configuration Wizard appears.This wizard guides you through configuration of the LinkedIn Adapter endpoint properties.These topics describe the wizard pages that guide you through configuration of the LinkedIn Adapter as an invoke in an integration.The LinkedIn Adapter cannot be used as a trigger in an integration.Topics: Basic Information Page Select an Operation Page Summary Page Basic Information Page Enter the basic information parameters.Element Description What do you want to call your endpoint?Provide a meaningful name so that others can understand the connection.For example, you may want to name it LinkedInTarget_update_status .You can include English alphabetic characters, numbers, underscores, and dashes in the name.You cannot include the following: Blank spaces (for example, My FTP Connection ) Special characters (for example, #;83& or righ(t)now4 ) Multibyte characters What does this endpoint do?Enter an optional description of the connection's responsibilities.For example: This endpoint updates status on a user's LinkedIn timeline.Select an Operation Page Select the LinkedIn operation you want to perform. |
iii.From the Cipher Algorithm list, select the algorithm to use.Symmetric-key algorithms for cryptography use the same cryptographic keys for both encryption of plain text and decryption of cipher text.c.Click Upload .Chapter 2 Upload an SSL Certificate 2-53 Add the LinkedIn Adapter Connection to an Integration When you drag the LinkedIn Adapter into the invoke area of an integration, the Adapter Endpoint Configuration Wizard appears.This wizard guides you through configuration of the LinkedIn Adapter endpoint properties.These topics describe the wizard pages that guide you through configuration of the LinkedIn Adapter as an invoke in an integration.The LinkedIn Adapter cannot be used as a trigger in an integration.Topics: Basic Information Page Select an Operation Page Summary Page Basic Information Page Enter the basic information parameters.Element Description What do you want to call your endpoint?Provide a meaningful name so that others can understand the connection.For example, you may want to name it LinkedInTarget_update_status .You can include English alphabetic characters, numbers, underscores, and dashes in the name.You cannot include the following: Blank spaces (for example, My FTP Connection ) Special characters (for example, #;83& or righ(t)now4 ) Multibyte characters What does this endpoint do?Enter an optional description of the connection's responsibilities.For example: This endpoint updates status on a user's LinkedIn timeline.Select an Operation Page Select the LinkedIn operation you want to perform.Element Description Get basic profile Gets LinkedIn basic profile fields. |
Symmetric-key algorithms for cryptography use the same cryptographic keys for both encryption of plain text and decryption of cipher text.c.Click Upload .Chapter 2 Upload an SSL Certificate 2-53 Add the LinkedIn Adapter Connection to an Integration When you drag the LinkedIn Adapter into the invoke area of an integration, the Adapter Endpoint Configuration Wizard appears.This wizard guides you through configuration of the LinkedIn Adapter endpoint properties.These topics describe the wizard pages that guide you through configuration of the LinkedIn Adapter as an invoke in an integration.The LinkedIn Adapter cannot be used as a trigger in an integration.Topics: Basic Information Page Select an Operation Page Summary Page Basic Information Page Enter the basic information parameters.Element Description What do you want to call your endpoint?Provide a meaningful name so that others can understand the connection.For example, you may want to name it LinkedInTarget_update_status .You can include English alphabetic characters, numbers, underscores, and dashes in the name.You cannot include the following: Blank spaces (for example, My FTP Connection ) Special characters (for example, #;83& or righ(t)now4 ) Multibyte characters What does this endpoint do?Enter an optional description of the connection's responsibilities.For example: This endpoint updates status on a user's LinkedIn timeline.Select an Operation Page Select the LinkedIn operation you want to perform.Element Description Get basic profile Gets LinkedIn basic profile fields.Share Gets additional user profile fields. |
c.Click Upload .Chapter 2 Upload an SSL Certificate 2-53 Add the LinkedIn Adapter Connection to an Integration When you drag the LinkedIn Adapter into the invoke area of an integration, the Adapter Endpoint Configuration Wizard appears.This wizard guides you through configuration of the LinkedIn Adapter endpoint properties.These topics describe the wizard pages that guide you through configuration of the LinkedIn Adapter as an invoke in an integration.The LinkedIn Adapter cannot be used as a trigger in an integration.Topics: Basic Information Page Select an Operation Page Summary Page Basic Information Page Enter the basic information parameters.Element Description What do you want to call your endpoint?Provide a meaningful name so that others can understand the connection.For example, you may want to name it LinkedInTarget_update_status .You can include English alphabetic characters, numbers, underscores, and dashes in the name.You cannot include the following: Blank spaces (for example, My FTP Connection ) Special characters (for example, #;83& or righ(t)now4 ) Multibyte characters What does this endpoint do?Enter an optional description of the connection's responsibilities.For example: This endpoint updates status on a user's LinkedIn timeline.Select an Operation Page Select the LinkedIn operation you want to perform.Element Description Get basic profile Gets LinkedIn basic profile fields.Share Gets additional user profile fields.Share user generated content Shares user generated content in the users account. |
This wizard guides you through configuration of the LinkedIn Adapter endpoint properties.These topics describe the wizard pages that guide you through configuration of the LinkedIn Adapter as an invoke in an integration.The LinkedIn Adapter cannot be used as a trigger in an integration.Topics: Basic Information Page Select an Operation Page Summary Page Basic Information Page Enter the basic information parameters.Element Description What do you want to call your endpoint?Provide a meaningful name so that others can understand the connection.For example, you may want to name it LinkedInTarget_update_status .You can include English alphabetic characters, numbers, underscores, and dashes in the name.You cannot include the following: Blank spaces (for example, My FTP Connection ) Special characters (for example, #;83& or righ(t)now4 ) Multibyte characters What does this endpoint do?Enter an optional description of the connection's responsibilities.For example: This endpoint updates status on a user's LinkedIn timeline.Select an Operation Page Select the LinkedIn operation you want to perform.Element Description Get basic profile Gets LinkedIn basic profile fields.Share Gets additional user profile fields.Share user generated content Shares user generated content in the users account.3-1Summary Page You can review the specified adapter configuration values on the Summary page. |
These topics describe the wizard pages that guide you through configuration of the LinkedIn Adapter as an invoke in an integration.The LinkedIn Adapter cannot be used as a trigger in an integration.Topics: Basic Information Page Select an Operation Page Summary Page Basic Information Page Enter the basic information parameters.Element Description What do you want to call your endpoint?Provide a meaningful name so that others can understand the connection.For example, you may want to name it LinkedInTarget_update_status .You can include English alphabetic characters, numbers, underscores, and dashes in the name.You cannot include the following: Blank spaces (for example, My FTP Connection ) Special characters (for example, #;83& or righ(t)now4 ) Multibyte characters What does this endpoint do?Enter an optional description of the connection's responsibilities.For example: This endpoint updates status on a user's LinkedIn timeline.Select an Operation Page Select the LinkedIn operation you want to perform.Element Description Get basic profile Gets LinkedIn basic profile fields.Share Gets additional user profile fields.Share user generated content Shares user generated content in the users account.3-1Summary Page You can review the specified adapter configuration values on the Summary page.Element Description Summary Displays a summary of the configuration values you defined on previous pages of the wizard. |
The LinkedIn Adapter cannot be used as a trigger in an integration.Topics: Basic Information Page Select an Operation Page Summary Page Basic Information Page Enter the basic information parameters.Element Description What do you want to call your endpoint?Provide a meaningful name so that others can understand the connection.For example, you may want to name it LinkedInTarget_update_status .You can include English alphabetic characters, numbers, underscores, and dashes in the name.You cannot include the following: Blank spaces (for example, My FTP Connection ) Special characters (for example, #;83& or righ(t)now4 ) Multibyte characters What does this endpoint do?Enter an optional description of the connection's responsibilities.For example: This endpoint updates status on a user's LinkedIn timeline.Select an Operation Page Select the LinkedIn operation you want to perform.Element Description Get basic profile Gets LinkedIn basic profile fields.Share Gets additional user profile fields.Share user generated content Shares user generated content in the users account.3-1Summary Page You can review the specified adapter configuration values on the Summary page.Element Description Summary Displays a summary of the configuration values you defined on previous pages of the wizard.The information that is displayed can vary by adapter. |
Topics: Basic Information Page Select an Operation Page Summary Page Basic Information Page Enter the basic information parameters.Element Description What do you want to call your endpoint?Provide a meaningful name so that others can understand the connection.For example, you may want to name it LinkedInTarget_update_status .You can include English alphabetic characters, numbers, underscores, and dashes in the name.You cannot include the following: Blank spaces (for example, My FTP Connection ) Special characters (for example, #;83& or righ(t)now4 ) Multibyte characters What does this endpoint do?Enter an optional description of the connection's responsibilities.For example: This endpoint updates status on a user's LinkedIn timeline.Select an Operation Page Select the LinkedIn operation you want to perform.Element Description Get basic profile Gets LinkedIn basic profile fields.Share Gets additional user profile fields.Share user generated content Shares user generated content in the users account.3-1Summary Page You can review the specified adapter configuration values on the Summary page.Element Description Summary Displays a summary of the configuration values you defined on previous pages of the wizard.The information that is displayed can vary by adapter.For some adapters, the selected business objects and operation name are displayed. |
Element Description What do you want to call your endpoint?Provide a meaningful name so that others can understand the connection.For example, you may want to name it LinkedInTarget_update_status .You can include English alphabetic characters, numbers, underscores, and dashes in the name.You cannot include the following: Blank spaces (for example, My FTP Connection ) Special characters (for example, #;83& or righ(t)now4 ) Multibyte characters What does this endpoint do?Enter an optional description of the connection's responsibilities.For example: This endpoint updates status on a user's LinkedIn timeline.Select an Operation Page Select the LinkedIn operation you want to perform.Element Description Get basic profile Gets LinkedIn basic profile fields.Share Gets additional user profile fields.Share user generated content Shares user generated content in the users account.3-1Summary Page You can review the specified adapter configuration values on the Summary page.Element Description Summary Displays a summary of the configuration values you defined on previous pages of the wizard.The information that is displayed can vary by adapter.For some adapters, the selected business objects and operation name are displayed.For adapters for which a generated XSD file is provided, click the XSD link to view a read-only version of the file. |
For example, you may want to name it LinkedInTarget_update_status .You can include English alphabetic characters, numbers, underscores, and dashes in the name.You cannot include the following: Blank spaces (for example, My FTP Connection ) Special characters (for example, #;83& or righ(t)now4 ) Multibyte characters What does this endpoint do?Enter an optional description of the connection's responsibilities.For example: This endpoint updates status on a user's LinkedIn timeline.Select an Operation Page Select the LinkedIn operation you want to perform.Element Description Get basic profile Gets LinkedIn basic profile fields.Share Gets additional user profile fields.Share user generated content Shares user generated content in the users account.3-1Summary Page You can review the specified adapter configuration values on the Summary page.Element Description Summary Displays a summary of the configuration values you defined on previous pages of the wizard.The information that is displayed can vary by adapter.For some adapters, the selected business objects and operation name are displayed.For adapters for which a generated XSD file is provided, click the XSD link to view a read-only version of the file.To return to a previous page to update any values, click the appropriate tab in the left panel or click Back. |
You can include English alphabetic characters, numbers, underscores, and dashes in the name.You cannot include the following: Blank spaces (for example, My FTP Connection ) Special characters (for example, #;83& or righ(t)now4 ) Multibyte characters What does this endpoint do?Enter an optional description of the connection's responsibilities.For example: This endpoint updates status on a user's LinkedIn timeline.Select an Operation Page Select the LinkedIn operation you want to perform.Element Description Get basic profile Gets LinkedIn basic profile fields.Share Gets additional user profile fields.Share user generated content Shares user generated content in the users account.3-1Summary Page You can review the specified adapter configuration values on the Summary page.Element Description Summary Displays a summary of the configuration values you defined on previous pages of the wizard.The information that is displayed can vary by adapter.For some adapters, the selected business objects and operation name are displayed.For adapters for which a generated XSD file is provided, click the XSD link to view a read-only version of the file.To return to a previous page to update any values, click the appropriate tab in the left panel or click Back.To cancel your configuration details, click Cancel.Chapter 3 Summary Page 3-24 Troubleshoot the LinkedIn Adapter The following topics can help you troubleshoot problems you may encounter with the LinkedIn Adapter. |
You cannot include the following: Blank spaces (for example, My FTP Connection ) Special characters (for example, #;83& or righ(t)now4 ) Multibyte characters What does this endpoint do?Enter an optional description of the connection's responsibilities.For example: This endpoint updates status on a user's LinkedIn timeline.Select an Operation Page Select the LinkedIn operation you want to perform.Element Description Get basic profile Gets LinkedIn basic profile fields.Share Gets additional user profile fields.Share user generated content Shares user generated content in the users account.3-1Summary Page You can review the specified adapter configuration values on the Summary page.Element Description Summary Displays a summary of the configuration values you defined on previous pages of the wizard.The information that is displayed can vary by adapter.For some adapters, the selected business objects and operation name are displayed.For adapters for which a generated XSD file is provided, click the XSD link to view a read-only version of the file.To return to a previous page to update any values, click the appropriate tab in the left panel or click Back.To cancel your configuration details, click Cancel.Chapter 3 Summary Page 3-24 Troubleshoot the LinkedIn Adapter The following topics can help you troubleshoot problems you may encounter with the LinkedIn Adapter.Topics: Unauthorized Access Response Specify the Port Number with the Authorized Redirect URL Note: Oracle Integration offers a number of pre-assembled solutions, known as recipes, that provide you with a head start in building your integrations. |
Enter an optional description of the connection's responsibilities.For example: This endpoint updates status on a user's LinkedIn timeline.Select an Operation Page Select the LinkedIn operation you want to perform.Element Description Get basic profile Gets LinkedIn basic profile fields.Share Gets additional user profile fields.Share user generated content Shares user generated content in the users account.3-1Summary Page You can review the specified adapter configuration values on the Summary page.Element Description Summary Displays a summary of the configuration values you defined on previous pages of the wizard.The information that is displayed can vary by adapter.For some adapters, the selected business objects and operation name are displayed.For adapters for which a generated XSD file is provided, click the XSD link to view a read-only version of the file.To return to a previous page to update any values, click the appropriate tab in the left panel or click Back.To cancel your configuration details, click Cancel.Chapter 3 Summary Page 3-24 Troubleshoot the LinkedIn Adapter The following topics can help you troubleshoot problems you may encounter with the LinkedIn Adapter.Topics: Unauthorized Access Response Specify the Port Number with the Authorized Redirect URL Note: Oracle Integration offers a number of pre-assembled solutions, known as recipes, that provide you with a head start in building your integrations.You can start with a recipe, and then customize it to fit your needs and requirements. |
For example: This endpoint updates status on a user's LinkedIn timeline.Select an Operation Page Select the LinkedIn operation you want to perform.Element Description Get basic profile Gets LinkedIn basic profile fields.Share Gets additional user profile fields.Share user generated content Shares user generated content in the users account.3-1Summary Page You can review the specified adapter configuration values on the Summary page.Element Description Summary Displays a summary of the configuration values you defined on previous pages of the wizard.The information that is displayed can vary by adapter.For some adapters, the selected business objects and operation name are displayed.For adapters for which a generated XSD file is provided, click the XSD link to view a read-only version of the file.To return to a previous page to update any values, click the appropriate tab in the left panel or click Back.To cancel your configuration details, click Cancel.Chapter 3 Summary Page 3-24 Troubleshoot the LinkedIn Adapter The following topics can help you troubleshoot problems you may encounter with the LinkedIn Adapter.Topics: Unauthorized Access Response Specify the Port Number with the Authorized Redirect URL Note: Oracle Integration offers a number of pre-assembled solutions, known as recipes, that provide you with a head start in building your integrations.You can start with a recipe, and then customize it to fit your needs and requirements.Depending upon the solution provided, a variety of adapters are configured in the pre-assembled solutions. |
Select an Operation Page Select the LinkedIn operation you want to perform.Element Description Get basic profile Gets LinkedIn basic profile fields.Share Gets additional user profile fields.Share user generated content Shares user generated content in the users account.3-1Summary Page You can review the specified adapter configuration values on the Summary page.Element Description Summary Displays a summary of the configuration values you defined on previous pages of the wizard.The information that is displayed can vary by adapter.For some adapters, the selected business objects and operation name are displayed.For adapters for which a generated XSD file is provided, click the XSD link to view a read-only version of the file.To return to a previous page to update any values, click the appropriate tab in the left panel or click Back.To cancel your configuration details, click Cancel.Chapter 3 Summary Page 3-24 Troubleshoot the LinkedIn Adapter The following topics can help you troubleshoot problems you may encounter with the LinkedIn Adapter.Topics: Unauthorized Access Response Specify the Port Number with the Authorized Redirect URL Note: Oracle Integration offers a number of pre-assembled solutions, known as recipes, that provide you with a head start in building your integrations.You can start with a recipe, and then customize it to fit your needs and requirements.Depending upon the solution provided, a variety of adapters are configured in the pre-assembled solutions.See the Recipes page on the Oracle Help Center. |
Element Description Get basic profile Gets LinkedIn basic profile fields.Share Gets additional user profile fields.Share user generated content Shares user generated content in the users account.3-1Summary Page You can review the specified adapter configuration values on the Summary page.Element Description Summary Displays a summary of the configuration values you defined on previous pages of the wizard.The information that is displayed can vary by adapter.For some adapters, the selected business objects and operation name are displayed.For adapters for which a generated XSD file is provided, click the XSD link to view a read-only version of the file.To return to a previous page to update any values, click the appropriate tab in the left panel or click Back.To cancel your configuration details, click Cancel.Chapter 3 Summary Page 3-24 Troubleshoot the LinkedIn Adapter The following topics can help you troubleshoot problems you may encounter with the LinkedIn Adapter.Topics: Unauthorized Access Response Specify the Port Number with the Authorized Redirect URL Note: Oracle Integration offers a number of pre-assembled solutions, known as recipes, that provide you with a head start in building your integrations.You can start with a recipe, and then customize it to fit your needs and requirements.Depending upon the solution provided, a variety of adapters are configured in the pre-assembled solutions.See the Recipes page on the Oracle Help Center.Unauthorized Access Response If you make an API call using an invalid token, you will receive a "401 Unauthorized" response back from the server. |
Share Gets additional user profile fields.Share user generated content Shares user generated content in the users account.3-1Summary Page You can review the specified adapter configuration values on the Summary page.Element Description Summary Displays a summary of the configuration values you defined on previous pages of the wizard.The information that is displayed can vary by adapter.For some adapters, the selected business objects and operation name are displayed.For adapters for which a generated XSD file is provided, click the XSD link to view a read-only version of the file.To return to a previous page to update any values, click the appropriate tab in the left panel or click Back.To cancel your configuration details, click Cancel.Chapter 3 Summary Page 3-24 Troubleshoot the LinkedIn Adapter The following topics can help you troubleshoot problems you may encounter with the LinkedIn Adapter.Topics: Unauthorized Access Response Specify the Port Number with the Authorized Redirect URL Note: Oracle Integration offers a number of pre-assembled solutions, known as recipes, that provide you with a head start in building your integrations.You can start with a recipe, and then customize it to fit your needs and requirements.Depending upon the solution provided, a variety of adapters are configured in the pre-assembled solutions.See the Recipes page on the Oracle Help Center.Unauthorized Access Response If you make an API call using an invalid token, you will receive a "401 Unauthorized" response back from the server.This might be caused by one or more of the following: An expired access token. |
Share user generated content Shares user generated content in the users account.3-1Summary Page You can review the specified adapter configuration values on the Summary page.Element Description Summary Displays a summary of the configuration values you defined on previous pages of the wizard.The information that is displayed can vary by adapter.For some adapters, the selected business objects and operation name are displayed.For adapters for which a generated XSD file is provided, click the XSD link to view a read-only version of the file.To return to a previous page to update any values, click the appropriate tab in the left panel or click Back.To cancel your configuration details, click Cancel.Chapter 3 Summary Page 3-24 Troubleshoot the LinkedIn Adapter The following topics can help you troubleshoot problems you may encounter with the LinkedIn Adapter.Topics: Unauthorized Access Response Specify the Port Number with the Authorized Redirect URL Note: Oracle Integration offers a number of pre-assembled solutions, known as recipes, that provide you with a head start in building your integrations.You can start with a recipe, and then customize it to fit your needs and requirements.Depending upon the solution provided, a variety of adapters are configured in the pre-assembled solutions.See the Recipes page on the Oracle Help Center.Unauthorized Access Response If you make an API call using an invalid token, you will receive a "401 Unauthorized" response back from the server.This might be caused by one or more of the following: An expired access token.Generated access tokens have a lifespan of only 60 days. |
3-1Summary Page You can review the specified adapter configuration values on the Summary page.Element Description Summary Displays a summary of the configuration values you defined on previous pages of the wizard.The information that is displayed can vary by adapter.For some adapters, the selected business objects and operation name are displayed.For adapters for which a generated XSD file is provided, click the XSD link to view a read-only version of the file.To return to a previous page to update any values, click the appropriate tab in the left panel or click Back.To cancel your configuration details, click Cancel.Chapter 3 Summary Page 3-24 Troubleshoot the LinkedIn Adapter The following topics can help you troubleshoot problems you may encounter with the LinkedIn Adapter.Topics: Unauthorized Access Response Specify the Port Number with the Authorized Redirect URL Note: Oracle Integration offers a number of pre-assembled solutions, known as recipes, that provide you with a head start in building your integrations.You can start with a recipe, and then customize it to fit your needs and requirements.Depending upon the solution provided, a variety of adapters are configured in the pre-assembled solutions.See the Recipes page on the Oracle Help Center.Unauthorized Access Response If you make an API call using an invalid token, you will receive a "401 Unauthorized" response back from the server.This might be caused by one or more of the following: An expired access token.Generated access tokens have a lifespan of only 60 days.The user might have revoked the permission they initially granted to your application. |
Element Description Summary Displays a summary of the configuration values you defined on previous pages of the wizard.The information that is displayed can vary by adapter.For some adapters, the selected business objects and operation name are displayed.For adapters for which a generated XSD file is provided, click the XSD link to view a read-only version of the file.To return to a previous page to update any values, click the appropriate tab in the left panel or click Back.To cancel your configuration details, click Cancel.Chapter 3 Summary Page 3-24 Troubleshoot the LinkedIn Adapter The following topics can help you troubleshoot problems you may encounter with the LinkedIn Adapter.Topics: Unauthorized Access Response Specify the Port Number with the Authorized Redirect URL Note: Oracle Integration offers a number of pre-assembled solutions, known as recipes, that provide you with a head start in building your integrations.You can start with a recipe, and then customize it to fit your needs and requirements.Depending upon the solution provided, a variety of adapters are configured in the pre-assembled solutions.See the Recipes page on the Oracle Help Center.Unauthorized Access Response If you make an API call using an invalid token, you will receive a "401 Unauthorized" response back from the server.This might be caused by one or more of the following: An expired access token.Generated access tokens have a lifespan of only 60 days.The user might have revoked the permission they initially granted to your application.You have changed the member permissions (scope) your application is requesting. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.