Endpoints sub-tab, you manage the endpoints for a
Restriction: To manage environment endpoints, you must have
Create, Edit, and Delete Environments privilege, which is set in
SBM Application Administrator.
Defined endpoints are displayed with the following information:
A descriptive name for the endpoint.
The address of the endpoint.
The authentication method used for this endpoint.
After you create an environment, you can add endpoints, such as Web
services. You can later modify existing endpoints.
Whenever you change
information associated with an endpoint, you must redeploy any affected process
To add an environment endpoint:
- Enter the name and URL for the endpoint.
- In the
Authentication drop-down list, select one of
the following options:
None if the endpoint does not require authentication.
- HTTP Basic
HTTP Basic if the endpoint points to a Web service that
requires Basic Access Authentication and you want to provide the credentials
(user name and password).
HTTP Basic credentials set in
for an endpoint override Basic credentials that are set in orchestration
workflows. For example, if username
joe and password
pwd are specified in the orchestration, but
HTTP Basic with different credentials, the
credentials are used instead. If you do not want to override the credentials
specified in the orchestration workflow, select
NTLM if the endpoint points to a Web service that requires
Windows domain credentials. Enter the username, password, and domain name.
- Security Token
Security Token if the endpoint points to an
Web service or other internal endpoint.
- Oauth 2
Select OAuth 2 for RESTful calls that use OAuth 2 security.
For details on obtaining and specifying the OAuth 2 token
that is required, refer to
Configuring OAuth 2 Security.
To modify an endpoint:
- Select an endpoint from the list, and then click
- Modify the name, URL, and authentication method as necessary. Refer
to the steps above for adding an endpoint for more information about the
Note: If you are defining an internal
service endpoint, select
Security Token as the authentication method.
This is the optimal authentication method for internal endpoints because the
user’s credentials are seamlessly passed to the Web service call without the
need to hard code credentials ahead of time.
Copyright © 2007–2019 Micro Focus or one of its affiliates. All rights reserved.