See the Integration Server Built-In Service’s guide for details on how to use the pub.security:setKeyAndChain service. You will need to know where your server’s private key, server certificate and root CA certificate are stored as well as the intermediate cert provided by your partner.
My original issue of GET Vs Post is not resolved. We need to send xmls to our partners thru https. Vendor has provided certs and we have added them to Security > Certificates > Configure Client Certificates.
But when I use pub.client:http to send the xmls, I am getting “Authorization required”. I verified with the vendor that the url, uid and pwd that I am using are correct.
What could be the problem? Is it because of the location of cert? Should be place the cert and in particular IS location?
You haven’t yet done what is needed to set the certificate chain properly on outbound HTTPS posts. The client certs portion of IS Admin relates to how to map certs on inbound posts to IS users and does not affect outbound posts.
Read the information I referenced in my last post.
Client has provided us both uid/pwd and certs. We placed the certs in Security > Certificates > Configure Client Certificates.
Can you please point to the location in the docs where is says we have to use either uid/pwd or certs for posting
xmls through https.
I have used pub.flow:http and in that I have given uid and pwd in auth section and method as post and tried to connect and
I got “Authorization denied”. When I change method to “GET”, I got 200-ok, but our client didnot recieve xml.
This used to work for few months in QA. We created another machine and installed wM with same config as QA and moved
code to that. Now I am getting the above error in both QA and UAT. Our cert is going to expire by the end of this month.
Could this be a problem? What are the things that we need to check?
Regarding what Mark mentioned about “pub.security:setKeyAndChain”–> we have only one cert and this is the default cert.
I don’t think we need to use the above flow service if we want the IS to use default cert. Do we?