HTTPS connection - OAuth - j5 - 30 - Installation & Upgrade - Hexagon

j5 Installation and Upgrade

Language
English
Product
j5
Search by Category
Installation & Upgrade
j5 Version
30

Select the HTTPS Connection Configuration node.

Authentication Type: Select OAuth

Base URL: Enter a fully qualified domain name to connect to the web endpoints (for example, https://dev.text.com/restserver). All of your connections will use this base URL.

When you have a self-signed certificate or a certificate generated from a certificate authority that is not commonly trusted:

  • Certificate Bundle Filename: Navigate to the certificate bundle file or enter the path to the file's location containing the certificates from the trusted certificate authorities. Refer to Certificate bundle configuration for more information.

  • Certificate Filename: Navigate to the file containing the certificate and its private key to verify the certificate used in the connection. The private key MUST be unencrypted, as encrypted private keys aren't supported.

The certificate is from the third party (for example, GE Proficy or PI Web) to allow j5 to connect to it.

Client ID and Client Secret: These are used to request a bearer token from the OAuth provider. The bearer token is used to authenticate every request to the configured URL.

OAuth Authorization URL: Enter the URL that will be used to request a bearer token from the OAuth provider (for example, https://dev.provider.com/oauth2/default/v1/token).

OAuth Scopes: Enter a comma-separated list of scopes that need to be included in the request for the bearer token.

By default, Apigee has some non-RFC-compliant properties in their token response, which we don't support. Refer to their non-RFC-compliant page (https://docs.apigee.com/api-platform/reference/policies/oauthv2-policy#non-rfc-compliant-behavior) for information on their non-compliance. Apigee provide an OAuth proxy example that corrects their non-compliant behavior. The example is found here: https://github.com/kurtkanaskie/oauth-compliant.