Credential Protocols

Credential protocols are used to store connection information for remote systems, such as Windows Process Servers. The following built-in credentials are available.

Protocol Description
login The credential protocol for generic logins.
SAP_RFC The credential protocol for SAP R/3 scripting.
PeopleSoft The credential protocol for the PeopleSoft connector.
oracle The credential protocol used to connect to the database for SQL Plus jobs.
JDBC The credential protocol used to connect to the database for JDBC, Oracle EBS, and Oracle jobs.
soap The credential protocol for the SOAP connector.
passphrase The credential protocol used to store (SSH) passphrases.
putty The credential protocol to store Putty private keys
SSH The name of the credential protocol to store SSH private keys
HTTP The credential protocol for connections to HTTP(S) servers.
X509_TrustedCertificate Used to provide a verifiable identity to a remote server whilst establishing a secure HTTPS connection from the Redwood Server.
X509_ClientCertificate Used to verify the identity of a remote server whilst establishing a secure HTTPS connection from the Redwood Server.

You must select the correct protocol for your credential. If you choose login and you want to connect to an Oracle database, the credential will not be taken into account.

If you require a specific protocol for your application or platform, protocols can be created/modified for you on a consultancy-basis. Contact your account manager for more information on custom protocols.

Credential protocols support the following context menu options.

Note: For generally applicable object context menu options, see Object Context Menu.

Action Description
Edit Security Edit the security of the credential protocol.
Delete Delete the credential protocol.
Edit Edit the credential protocol.
New credential protocol Create a new credential protocol.

Deleting Credential Protocols

You can delete credential protocols only when no other objects relate to them. For example, if there are credentials that use a given credential protocol, the credential protocol cannot be deleted until all credentials that use it have been modified. You can see all credentials that relate to the credential protocol under Related Objects in the detail pane and on the show page.

The table in related objects contains three columns:

  • Type: The type of object, with a link to it.
  • Related Object: The name of the object, with a link to it.
  • Used As: Objects can sometimes be used in different roles.

Security

The privileges available in the Security tab are as follows.

For more information, see Security Tab.

Privilege Description
CredentialProtocol.Create Create credential protocols
CredentialProtocol.Delete Delete credential protocols
CredentialProtocol.Edit Edit credential protocols
CredentialProtocol.View View credential protocols