JavaScript must be enabled in order to use this site.Please enable JavaScript in your browser and refresh the page. Chaining of Processor Using Chain Adapter Processors can be chained using a chain adapter in an untethered environment and in a tethered environment. Chaining Processors in an Untethered Environment Procedure In the Configuration Manager, click the Endpoints tab and then click Call Transformation. In the Adapter field, input the name of the chain adapter. For example, com.mashery.proxy.customer.generic.oauth2-jwt-authenticator. As per your requirement, select the checkbox for Perform Preprocess/Perform Postprocess or both. In the Preinputs field, type the processors to be chained. The name of the processor is the processor's bean name. The syntax is: processors:PROCESSOR1,PROCESSOR2 For example: processors:com.mashery.local.MasheryCustomProcessorOne,com.mashery.local.MasheryCustomProcessorTwo You can also provide configuration data as input. The syntax is: PROCCESSOR1.parameter:value PROCCESSOR1.parameter:value PROCCESSOR2.parameter:value PROCCESSOR2.parameter:value Note: In the pre-input configuration, there must not be more than one key with name "processors". The processors to be chained must be input as comma separated list. In the Postinputs field, input the name of the processor that the traffic manager can use to post-process the calls, then click Save. Note: The input syntax for the Postinputs fields must be the same as that of the Preinputs field. If you opt for only Perform Postprocess, the input for Postinputs field must be as follows: processors:com.mashery.local.MasheryCustomProcessorOne and PROCESSOR1.parameter:value PROCESSOR1.parameter:value Chaining Processors in a Tethered Environment The process for chaining processors in a tethered environment is the same as that of untethered. The interface of the control center appears as shown below: What to do next To test the changes, use the endpoint and make a traffic call. Copyright © 2022. Cloud Software Group, Inc. All Rights Reserved.