Step 5: Configuring Endpoints for Processors

The endpoints of processors can be either Tethered or Untethered.

Untethered

The Untethered configuration is a two-stage process:
  1. Navigate to Config Manager GUI from your setup.
  2. Navigate to API's endpoint.

Procedure

To register a custom authenticator:

  1. In the Configuration Manager, click Endpoints tab and then click Protocol & Authentication.
  2. Select Request Authentication Type as Custom



  3. In the Custom Authentication Adapter field, provide the processor bean's name from adapter com.companyname.mashery.adapter.MyCustomAuthenticator.

To register a processor:

  1. In the Configuration Manager, select Endpoints tab and then click Call Transformation.
  2. In the Adapter field, provide the processor bean's name from adapter com.companyname.apim.adapter.



  3. Select the appropriate check box for performing the transformation Preprocess or Postprocess.

Tethered

The tethered configuration is a two-stage process:
  1. Navigate to API Design > Select an API.
  2. Navigate to API's endpoint.

Registering a Custom Authenticator

Procedure

  1. In the Configuration Manager, click Key and Method detection tab.
  2. Select Request Authentication Type as Custom.



  3. In the Customer Request Authentication Adapter field provide the processor bean's name from adapter com.companyname.apim.adapter.MyCustomAuthenticator.



Registering a Processor

  1. In the Configuration Manager, select Call Transformation tab.
  2. In the Adapter field provide the processor bean's name from adapter com.companyname.apim.adapter.MyCustomProcessor .



  3. Select the appropriate check box for performing the transformation Preprocess or Postprocess.