Amazon SQS and SNS Connection Shared Resource

This Amazon SQS and SNS Connection shared resource is required by all SQS and SNS activities as it provides the AWS client object that mediates all interactions with the AWS messaging system.

General

This section includes the following fields:

Field Module Property? Description
Package No Name of the package. By default, the value of the field is the name of the package in which resource is created. You can change the field value by clicking icon .
Name No Name of the connection. You can change the field value by clicking icon.
Description No The user can provide additional description about the connection.

SQS SNS Client Configuration

You can provide information required to establish the connection with Amazon SQS and SNS. You can configure the connection using AWS Credential or SAML Authentication.

The following table describes the fields:
Condition Applicable Field Module Property? Description
N/A AWS Region Name Yes The name of the AWS region to which you want to connect. For a complete list of regions, see the Regions and Availability Zones.
N/A Authentication Type Yes There are following types of authentication you can use:
  • AWS Credential
  • SAML Authentication
Available only when the Authentication Type is selected as AWS Credential. AWS Key ID Yes This is the ID of the secret key for AWS. Keys can be created through the AWS console and downloaded as csv files or to your ~/.aws/credentials file.
AWS Secret Yes This is the encrypted secret key for access to AWS.
Available only when the Authentication Type is selected as SAML Authentication. Identity Provider (IdP) No The service provider that manages your user identities. With an IdP, you can manage user identities outside of AWS instead of creating AWS Identity and Access Management (IAM) users in your account. After establishing the trust relationship between IdP and AWS, your users can access AWS resources using their corporate credentials.
Identity Provider Login URL Yes

IdP login URL that is generated when you configure the identity provider in the identity provider console.

Example URL for PingFederate: https://<host>:<port>/idp/startSSO.ping?PartnerSpId=urn%3Aamazon%3Awebservices

Username Yes User name that is configured with your identity provider
Password Yes Password that is configured with your identity provider
AWS Role Yes AWS IAM role
Token Expiration Duration Yes Duration for which the token is valid
Note: This is configured in AWS IAM policy when creating the role. If the user specifies the value as 0, the value is taken as 60 minutes.
SSL Client Configuration No Establishes secure connection with IdP

For more information about SSL Client Configuration, see the "Shared Resource" section of the TIBCO ActiveMatrix BusinessWorks™ Bindings and Palettes Reference guide.

Use Proxy Yes You can select the Use Proxy check box and set proxy configuration in the Custom configuration section.
Note: To enable basic authentication, set JVM argument as

-Djdk.http.auth.tunneling.disabledSchemes=

Please refer to setting bwappnode-<AppNodeName>.tra file in "Setting JVM Parameters for the AppNode Manually" section in the TIBCO ActiveMatrix BusinessWorks documentation.

With TIBCO BusinessStudio for BusinessWorks : Add this argument in <BW_HOME>\studio\<version>\eclipse\TIBCOBusinessStudio.ini file.

Custom Client Config

SQS Default Client Config choose a predefined configuration or create a custom configuration.
Note: The DynamoDB and SimpleWorkFlow configurations are provided in case the client defaults for those clients who closely match your desired configuration.

For other situations where the default configuration is not optimal, use the custom configuration. You can configure the HTTP proxy in the custom configuration. For more information about setting a proxy, see Setting Proxy.

For detailed descriptions of custom configuration, see Client Configuration page on Amazon documentation site.