Credential Protocols
Credential protocols are used to store connection information for remote systems, such as Windows Process Servers. The following built-in credentials are available.
Protocol | Description |
---|---|
login | The credential protocol for generic logins. |
SAP_RFC | The credential protocol for SAP R/3 scripting. |
PeopleSoft | The credential protocol for the PeopleSoft connector. |
oracle | The credential protocol used to connect to the database for SQL Plus jobs. |
JDBC | The credential protocol used to connect to the database for JDBC, Oracle EBS, and Oracle jobs. |
soap | The credential protocol for the SOAP connector. |
passphrase | The credential protocol used to store (SSH) passphrases. |
putty | The credential protocol to store Putty private keys |
SSH | The name of the credential protocol to store SSH private keys |
HTTP | The credential protocol for connections to HTTP(S) servers. |
X509_TrustedCertificate | Used to provide a verifiable identity to a remote server whilst establishing a secure HTTPS connection from the Redwood Server. |
X509_ClientCertificate | Used to verify the identity of a remote server whilst establishing a secure HTTPS connection from the Redwood Server. |
You must select the correct protocol for your credential. If you choose login and you want to connect to an Oracle database, the credential will not be taken into account.
If you require a specific protocol for your application or platform, protocols can be created/modified for you on a consultancy-basis. Contact your account manager for more information on custom protocols.
Context Menu
Credential protocols support the following context menu options.
Note: For generally applicable object context menu options, see Object Context Menu.
Action | Description |
---|---|
Edit Security | Edit the security of the credential protocol. |
Delete | Delete the credential protocol. |
Edit | Edit the credential protocol. |
New credential protocol | Create a new credential protocol. |
Deleting Credential Protocols
You can delete credential protocols only when no other objects relate to them. For example, if there are credentials that use a given credential protocol, the credential protocol cannot be deleted until all credentials that use it have been modified. You can see all credentials that relate to the credential protocol under Related Objects in the detail pane and on the show page.
The table in related objects contains three columns:
- Type: The type of object, with a link to it.
- Related Object: The name of the object, with a link to it.
- Used As: Objects can sometimes be used in different roles.
Security
The privileges available in the Security tab are as follows.
For more information, see Security Tab.
Privilege | Description |
---|---|
CredentialProtocol.Create | Create credential protocols |
CredentialProtocol.Delete | Delete credential protocols |
CredentialProtocol.Edit | Edit credential protocols |
CredentialProtocol.View | View credential protocols |