Credential Protocols

Credential protocols are used to store connection information for remote systems, such as Windows Process Servers. The following built-in credentials are available.

Credential Protocol Description
HTTP The Credential protocol for connections to HTTP(S) servers.
JDBC The Credential protocol used to connect to the database for JDBC, Oracle EBS, and Oracle jobs.
login The Credential protocol for generic logins.
oracle The Credential protocol used to connect to the database for SQLPLUS jobs.
passphrase The Credential protocol used to store (SSH) passphrases.
PeopleSoft The Credential protocol for the PeopleSoft connector.
putty The Credential protocol to store Putty private keys
SAP_RFC The Credential protocol for SAP R/3 scripting.
soap The Credential protocol for the SOAP connector.
SSH The name of the credential protocol to store SSH private keys
X509_ClientCertificate The Credential protocol for providing TLS servers with authentication information by means of a client certificate.
X509_TrustedCertificate The Credential protocol for trusting TLS servers by means of their X509 certificate.

You must select the correct protocol for your credential. If you choose login and you want to connect to an Oracle database, the credential will not be taken into account.

If you require a specific protocol for your application or platform, protocols can be created/modified for you on a consultancy-basis. Contact your account manager for more information on custom protocols.

Credential protocols support the following context menu options.

Note: For generally applicable object context menu options, see Object Context Menu.

Action Description
Edit Security Edit the security of the credential protocol.
Delete Delete the credential protocol.
Edit Edit the credential protocol.
New credential protocol Create a new credential protocol.

Deleting Credential Protocols

You can delete credential protocols only when no other objects relate to them. For example, if there are credentials that use a given credential protocol, the credential protocol cannot be deleted until all credentials that use it have been modified. You can see all credentials that relate to the credential protocol under Related Objects in the detail pane and on the show page.

The table in related objects contains three columns:

  • Type: The type of object, with a link to it.
  • Related Object: The name of the object, with a link to it.
  • Used As: Objects can sometimes be used in different roles.

Security

The privileges available in the Security tab are as follows.

For more information, see Security Tab.

Privilege Description
CredentialProtocol.Create Create credential protocols
CredentialProtocol.Delete Delete credential protocols
CredentialProtocol.Edit Edit credential protocols
CredentialProtocol.View View credential protocols