Configuration

The Configuration tab has the following fields.

Field

Description

Name

The name to appear as the label for the activity in the process definition.

Description

Short description of the activity.

Host

The host machine name or IP address to send the request to. For example, www.tibco.com.

Port

The port on the host machine to send the request to. The default port is 80.

Use Proxy Setting

Specifies to use a proxy server to gain access outside of a firewall. The Proxy Configuration shared configuration resource specifies the configuration of the proxy server. For more information, see Proxy Configuration.

Accept Redirects

Checking this field indicates that the request should be automatically redirected when the HTTP server sends the redirection status code (302) in response to this request and the remote host redirects the request to the same host and port. If the remote host redirects the request to a different host or a different port on the same host, the request is not automatically redirected.

The maximum number of redirections is 100.

When this field is unchecked, the request is not redirected.

Parameters

The parameters of the HTTP request. For each parameter, you must provide a name, datatype (must be type string), and whether the parameter is required, optional, or repeating.

These parameters are specified in the parameters element on the Input tab.

For more information about this field, see Sending Data in the HTTP Request.

HTTP Authentication

Specifies what authentication should be used . An authentication can be of the following three types:

  • NONE - is default.

  • BASIC - to continue with the current implementation of using username and password credentials. The Identity field appears when this field is enabled.

  • NTLM - Identity and Domain fields appear when NTLM is selected. Identity is a reference of the Username and Password combination.

  • Kerberos - Identity, Krb Conf and Login Conf fields appear when Kerberos is selected.
    This includes information describing the default Kerberos realm, and the location of the Kerberos key distribution centers for known realms.

Identity

This is an Identity resource that contains the client’s username and password. This identity is used to perform only Basic, NTLM authentication and Kerberos authentication.

When using Kerberos authentication, the identity configuration type must be of type username and password only.

For more information, see TIBCO Designer™ Palette Reference.

Domain

Specifies the domain to be used for Authentication. The username and password specified in the Identity must exist in the domain.

SSL

When the Use SSL? check box is selected, this specifies to use the HTTPS (secure socket layer, or SSL) for the request. This protocol authenticates the server to the client, and optionally, the server can require that the client authenticate itself to the server.

The Configure SSL button becomes enabled when this field is checked. For more information, see Configure SSL Button.

Upgrade Configuration

This field is visible only when projects created in ActiveMatrix BusinessWorks 5.2.x or earlier versions are migrated to a higher version.

Selecting the check box upgrades the schema in the input/output tab for the activity. You can revert back to the old schema by clearing the check box.

However, if you create new processes in the older projects, the activities always show the new schema in their input/output tabs. In this case, it is not possible to revert to the old schema.

Krb Conf

This field is visible only when Kerberos is specified in the HTTP Authentication field.

Provide the Krb conf file from the disk or from the network. The krb5.conf file contains Kerberos configuration information, including the locations of KDCs and admin servers for the Kerberos realms of interest, defaults for the current realm and for Kerberos applications, and mappings of hostnames to Kerberos realms.

Login Conf

This field is visible only when Kerberos is specified in the HTTP Authentication field.

Login configuration file entry consists of a name followed by one or more LoginModule-specific items. The name used for specifying LoginModule-specific items is "com.sun.security.jgss.login".
Each LoginModule-specific item specifies a LoginModule, a flag value, and options to be passed to the LoginModule.

Use the option, refreshKrb5Config=true for LoginModule.

Example: com.sun.security.jgss.login {
com.sun.security.auth.module.Krb5LoginModule required
client=TRUE
doNotPrompt=false
refreshKrb5Config=true
useTicketCache=true;
};