Configuration
The Configuration tab has the following fields.
Field |
Description |
Name |
The name to appear as the label for the activity in the process definition. |
Description |
Short description of the activity. |
Host |
The host machine name or IP address to send the request to. For example, www.tibco.com. |
Port |
The port on the host machine to send the request to. The default port is 80. |
Use Proxy Setting |
Specifies to use a proxy server to gain access outside of a firewall. The Proxy Configuration shared configuration resource specifies the configuration of the proxy server. For more information, see Proxy Configuration. |
Accept Redirects |
Checking this field indicates that the request should be automatically redirected when the HTTP server sends the redirection status code (302) in response to this request and the remote host redirects the request to the same host and port. If the remote host redirects the request to a different host or a different port on the same host, the request is not automatically redirected. The maximum number of redirections is 100. When this field is unchecked, the request is not redirected. |
Parameters |
The parameters of the HTTP request. For each parameter, you must provide a name, datatype (must be type string), and whether the parameter is required, optional, or repeating. These parameters are specified in the For more information about this field, see Sending Data in the HTTP Request. |
HTTP Authentication |
Specifies what authentication should be used . An authentication can be of the following three types:
|
Identity |
This is an Identity resource that contains the client’s username and password. This identity is used to perform only Basic, NTLM authentication and Kerberos authentication. When using Kerberos authentication, the identity configuration type must be of type username and password only. For more information, see TIBCO Designer™ Palette Reference. |
Domain |
Specifies the domain to be used for Authentication. The username and password specified in the Identity must exist in the domain. |
SSL |
When the Use SSL? check box is selected, this specifies to use the HTTPS (secure socket layer, or SSL) for the request. This protocol authenticates the server to the client, and optionally, the server can require that the client authenticate itself to the server. The Configure SSL button becomes enabled when this field is checked. For more information, see Configure SSL Button. |
Upgrade Configuration |
This field is visible only when projects created in ActiveMatrix BusinessWorks 5.2.x or earlier versions are migrated to a higher version. Selecting the check box upgrades the schema in the input/output tab for the activity. You can revert back to the old schema by clearing the check box. However, if you create new processes in the older projects, the activities always show the new schema in their input/output tabs. In this case, it is not possible to revert to the old schema. |
Krb Conf |
This field is visible only when Kerberos is specified in the HTTP Authentication field. Provide the Krb conf file from the disk or from the network. The krb5.conf file contains Kerberos configuration information, including the locations of KDCs and admin servers for the Kerberos realms of interest, defaults for the current realm and for Kerberos applications, and mappings of hostnames to Kerberos realms. |
Login Conf |
This field is visible only when Kerberos is specified in the HTTP Authentication field. Login configuration file entry consists of a name followed by one or more LoginModule-specific items. The name used for specifying LoginModule-specific items is "com.sun.security.jgss.login". Use the option, refreshKrb5Config=true for LoginModule. Example: com.sun.security.jgss.login { |