Amazon SQS and SNS Connection Shared Resource
This Amazon SQS and SNS Connection shared resource is required by all SQS and SNS activities as it provides the AWS client object that mediates all interactions with the AWS messaging system.
General
This section includes the following fields:
SQS SNS Client Configuration
You can provide information required to establish the connection with Amazon SQS and SNS. You can configure the connection using AWS Credential, SAML Authentication, or Container Credentials.
The following table describes the fields:| Condition Applicable | Field | Module Property? | Description |
|---|---|---|---|
| N/A | AWS Region Name | Yes | The name of the AWS region to which you want to connect. For a complete list of regions, see the Regions and Availability Zones. |
| N/A | Authentication Type | Yes | There are following types of authentication you can use: |
| Available only when the Authentication Type is selected as AWS Credential. | AWS Key ID | Yes | This is the ID of the secret key for AWS. Keys can be created through the AWS console and downloaded as csv files. |
| AWS Secret | Yes | This is the encrypted secret key for access to AWS. | |
| Cross Account Access | No | Use the AWS Security Token Service (AWS STS) to create and provide trusted users with temporary security credentials that can control access to your AWS resources. This parameter uses cross-account access temporary security credentials created by AssumeRole. Please refer AWS documentation for further details on Temporary Security Credentials. | |
| Available only when the Authentication Type is selected as AWS Credential and Cross Account Access check-box is selected | Role ARN | Yes | The Amazon Resource Name (ARN) of the role to assume. Please refer AWS documentation for further details on RoleARN. |
| Role Session Name | Yes | An identifier for the assumed role session used to uniquely identify a session when the same role is assumed by different principals or for different reasons. Please refer AWS documentation for further details on RoleSessionName. | |
| External ID | Yes | A unique identifier that might be required when you assume a role in another account. It is used to address the confused deputy problem. Please refer AWS documentation for further details on ExternalId. | |
| Expiration Duration (min) | Yes |
Parameter to specify the duration in minutes for which the temporary security credentials remain valid using AssumeRole. Please refer AWS documentation for further details on ExpirationDuration. |
|
| Available only when the Authentication Type is selected as SAML Authentication. | Identity Provider (IdP) | No | The service provider that manages your user identities. With an IdP, you can manage user identities outside of AWS instead of creating AWS Identity and Access Management (IAM) users in your account. After establishing the trust relationship between IdP and AWS, your users can access AWS resources using their corporate credentials. |
| Identity Provider Login URL | Yes |
IdP login URL that is generated when you configure the identity provider in the identity provider console. Example URL for PingFederate: https://<host>:<port>/idp/startSSO.ping?PartnerSpId=urn%3Aamazon%3Awebservices |
|
| Username | Yes | User name that is configured with your identity provider | |
| Password | Yes | Password that is configured with your identity provider | |
| AWS Role | Yes | AWS IAM role | |
| Token Expiration Duration | Yes | Duration for which the token is valid | |
| SSL Client Configuration | No | Establishes secure connection with IdP
For more information about SSL Client Configuration, see the "Shared Resource" section of the TIBCO ActiveMatrix BusinessWorks™ Bindings and Palettes Reference guide. |
|
| Use Proxy | Yes | You can select the
Use Proxy check box and set proxy configuration in the Custom configuration section.
Note: To enable basic authentication, set JVM argument as
-Djdk.http.auth.tunneling.disabledSchemes= Please refer to setting bwappnode-<AppNodeName>.tra file in "Setting JVM Parameters for the AppNode Manually" section in the TIBCO ActiveMatrix BusinessWorks documentation. With TIBCO BusinessStudio for BusinessWorks : Add this argument in <BW_HOME>\studio\<version>\eclipse\TIBCOBusinessStudio.ini file. |
Custom Client Config
For other situations where the default configuration is not optimal, use the custom configuration. You can configure the HTTP proxy in the custom configuration. For more information about setting a proxy, see Setting Proxy.
For detailed descriptions of custom configuration, see Client Configuration page on Amazon documentation site.

icon .