CA certificate changes for iPaaS connectors
This article covers the necessary steps to update the iPaaS connectors for HyperConnect/Informatica Cloud, Dell Boomi, Mulesoft and SnapLogic. See the article A Guide to CA Certificates in Anaplan Integrations - Anaplan Community for the steps to process a certificate once it has been procured.
HyperConnect/Informatica Cloud
Authentication within HyperConnect/Informatica Cloud is handled at the connection level. There should be a connection for each model that is used within the integrations. HyperConnect/Informatica Cloud supports basic authentication and certificate authentication.
The steps to use Certificate Authority (CA) certificates with HyperConnect/Informatica are listed below:
- Each connection must be using the "Anaplan V2" connector
- A java keystore containing both the public and private keys needs to be created and placed where the secure agent can access it
- In each connection:
- Set the Auth Type to "Cert Auth"
- Clear the "Certificate Path Location" field
- Update the API Major Version. Set it to 2
- Update the API Minor Version. Set it to 0
- Enter the full path to the java keystore in the "KeyStore Path Location"
- Enter the alias used when the java keystore was created in the "KeyStore Alias" field
- Enter the password for the java keystore in the "KeyStore Password" field. Note the password is masked.
- Test for connectivity.
Dell Boomi
Authentication within Dell Boomi is handled at the connection level. There should be a connection for each workspace that is used within the integrations. Dell Boomi supports basic authentication and certificate authentication.
The steps to use CA certificates with Dell Boomi are listed below:
- Each connection must be using the "Anaplan" version of the connector. The "Anaplan V2" and "Anaplan (legacy)" versions are not current and do not support CA certificate authentication.
- A P12 bundle of both the public and private keys needs to be created
- The file received from the CA provider is sometimes in the P12 bundle format
- To test this: Use the java keytool to run the following command
-
keytool -v list -storetype pkcs12 -keystore %path to keystore%
-
Within the output of the command, there should be an "Alias name" property. This value will be used in the connection.
-
If the certificate does not contain the alias, a P12 bundle can be created using OpenSSL. See Creating a Java Keystore for the steps to create a P12 bundle. Once the bundle is created, the remaining steps in the article are not needed.
- The file received from the CA provider is sometimes in the P12 bundle format
- In Dell Boomi:
- Create a new object
- Type: Certificate
- Certificate Type: X.509
- The name and location of the certificate are up to you
- Click "Create"
- Import the P12 bundle file.
- Edit the connection
- Ensure the URL is pointed to "https://api.anaplan.com/2/0"
- Set the Authentication Type to "Client Certificate"
- Select the certificate created above from the "Certificate" dropdown
- Enter the alias used in the P12 bundle into the "Private Key Alias" field
- Enter the password for the P12 bundle in the "Password" field
- Create a new object
MuleSoft
Authentication within MuleSoft is handled at the connection level. Typically only a single connection is needed. MuleSoft supports basic authentication and certificate authentication.
The steps to use CA Certificates with MuleSoft are listed below:
- A java keystore containing both the public and private keys needs to be created
- Enter the full path to the java keystore in the "Key store path"
- Enter the alias used when the java keystore was created in the "KeyStore Alias" field
- Enter the password for the java keystore in the "KeyStore Password" field. Note the password is masked.
SnapLogic
Authentication within SnapLogic is handled at the connection level. Typically only a single connection is needed. SnapLogic supports basic authentication and certificate authentication.
The steps to use CA Certificates with SnapLogic are listed below:
- Public Key
- Open the public key file in a text editor
- Copy everything from "--- BEGIN CERTIFICATE ---" through "---END CERTIFICATE ---"
- Paste the contents into the "External certificate contents"
- Private Key
- The private key cannot be encrypted for use in SnapLogic.
- Open the private key file in a text editor
- If the key information begins with "--- BEGIN RSA PRIVATE KEY ---" then the key is not encrypted. Continue with step iii below
- If the key information begins with "--- BEGIN ENCRYPTED PRIVATE KEY ---" then the key needs to be un-encrypted prior to use
- Issue the following OpenSSL command to create a new private key file from the original
-
openssl rsa -in private_key.pem -out unencrypted_private_key.pem
- Copy everything from "--- BEGIN RSA PRIVATE KEY ---" through "---END RSA PRIVATE KEY ---"
- Paste the contents into the "External private key" field