Create HTTP integration 编辑

Now that you have identified your APIs, let’s add an HTTP integration to Microapps service.

  1. From the Microapp Integrations page, select Add Integration.
  2. Choose the Create a new integration to your HTTP web service to add configuration details.

    HTTP Tile

  3. Give your integration a Name and enter the Base URL that you collected. The Base URL is the consistent part of your web address that you will use for this integration. For example, https://app.asana.com/api/1.0/workspaces/${YOUR_WORKSPACE_ID}. Replace ${YOUR_WORKSPACE_ID} with your workspace ID (ex. 419224638481718).

    You can add only one Base URL per integration. If you require more Base URLs you must create another integration.

    Note:

    While HTTP and HTTPS are both permitted as Base URLs for SaaS integrations, HTTP is considered a much less secure connection method and it is unlikely that you use it for your target integration application. On-premises integrations do not permit HTTP base URLs.

  4. Select an Icon to show with your integration. Choose one from the predefined set of icons, or add a custom icon. For details about adding custom icons, see Add custom icons.
  5. (Optional) To connect to an on-premises System of Record (SoR), enable the On-premises instance toggle. For more information, see On-premises instance.
  6. Select your Service authentication method and Service Action Authentication as required. For more information, see Set up Service Authentication.
  7. (Optional) To enable rate limiting for your integration, select the Request rate limiting toggle. For more information, see Request rate limiting.
  8. Select Add at the top-right to save these integration configurations. You now continue configuring the integration. For more information, see Configure the integration.

Add custom icons

You can add custom icons to better identify your integrations. When you publish your HTTP integration to a broader audience, the icons files are uploaded to the Azure CDN storage, and are accessible publicly.

The icon file must conform to these parameters:

  • The file is in the png format, with a transparent background.
  • The file’s resolution must be 128x128 pixels exactly.
  • Maximum file size is 80 KB.

Note

Custom icons are for your overview of integrations only. You cannot propagate them to Workspace notifications.

To add an icon, choose Add an icon, and select the file that you want to upload.

When you export an integration and then import it to another instance, the icon is added to the list of custom icons at the target instance.

To remove an icon, select an icon from the icons popup, and click Remove icon. When you remove an icon, the icon isn’t deleted. The integration contains a link to the icon, but you can’t select the icon again.

On-premises instance

Microapps service allows you to connect your on-premises System of Record (SoR). On-premises integrations do not permit HTTP base URLs. To create an on-premises connection, first connect using the Connector Appliance then follow this procedure to collect and add the resource identifier id. For more information, see Citrix Cloud Connector Appliance.

  1. Go to Citrix Cloud and sign in with your credentials.
  2. After signing in to Citrix Cloud, select Resource Locations from the top left menu.
  3. Find the resource location you want to use and select the ID icon below the resource name to reveal the ID of your resource location.
  4. Copy the resource location ID.
  5. Paste the location ID into the On-premises instance resource location field in the Add HTTP Integration screen.
  6. (Optional) disable SSL certificate validation if you require your integration to accept unsigned certificates.

Your on-premises integration is configured.

Set up Service Authentication

When configuring your HTTP Integration service authentication, you must set up your service account with your target application (System of Record). You must also possess both read and write privileges in your target application if you are using the service account to write data to your application. After you have gathered all the necessary information on your target application (login, passwords, security credentials and so on) you can begin the service integration process.

Select your authentication method from the following:

  • None - No security credentials needed.
  • Basic - Use your user name and password of the target application for authentication.
  • NTLM - Configure your HTTP integration to use a suite of Microsoft protocols to connect via New Technology LAN Manager (NTLM) authentication server to authenticate NTLM users via Microsoft Windows credentials.
  • Bearer - Configure the target integration’s authentication scheme to use bearer tokens generated by the server in response to a log-in request.
  • OAuth 2.0 - Use the OAuth 2.0 security protocol to generate request/authorization tokens for delegated access. OAuth 2.0 implementation varies from system to system but the general workflow for OAuth 2.0 works as described below.
  • API Keys - use the API Keys method to authenticate a user, developer, or calling program to an API.

Note:

It is recommended that you always use OAuth 2.0 as your service authentication method where available. OAuth 2.0 ensures that your integration meets the maximum security compliance with your configured microapp.

Follow these steps:

  1. Enter Service Authentication parameters for the integration.
  2. (Optional) For Authorization Code grant type, select Log in with your service account and wait for the login to complete.
  3. (Optional) Select the Service Action Authentication radio button, and enter authentication parameters at the service action level.

    Important:

    If you are using delegated permissions, you might not have full access. In this case, use Service Action Authentication to authenticate at the service action level. In this situation, you can use basic authentication at the service level, but you must use OAuth 2.0 at the service action level for security reasons.

  4. Select Add.

OAuth 2.0 Authentication

OAuth 2.0 enables applications to gain specific access to HTTP service user accounts on third-party applications. It works by delegating authentication to the service that contains the user account, and then authorizes third-party applications to access that user account.

OAuth Callback URLs

Callback URLs for authentication follow this pattern:

https://{customer_id}.{customer_geo}.iws.cloud.com/admin/api/gwsc/auth/serverContext
https://{customer_id}.{customer_geo}.iws.cloud.com/app/api/auth/serviceAction/callback

如果你对这篇内容有疑问,欢迎到本站社区发帖提问 参与讨论,获取更多帮助,或者扫码二维码加入 Web 技术交流群。

扫码二维码加入Web技术交流群

发布评论

需要 登录 才能够评论, 你可以免费 注册 一个本站的账号。
列表为空,暂无数据

词条统计

浏览:93 次

字数:9284

最后编辑:6年前

编辑次数:0 次

    我们使用 Cookies 和其他技术来定制您的体验包括您的登录状态等。通过阅读我们的 隐私政策 了解更多相关信息。 单击 接受 或继续使用网站,即表示您同意使用 Cookies 和您的相关数据。
    原文