This blog was a collaborative effort between Greg Mally and Mike Muller of the A-Team. There is an effort under way to provide example assets for this blog and...
This blog was a collaborative effort between Greg Mally and Mike Muller of the A-Team. There is an effort under way to provide example assets for this blog and when those assets are available, this blog will be updated with details on how to get to them. One of the big challenges that Oracle Integration Cloud developers face is any outbound REST calls from Integration Cloud (IC) to Fusion Applications (FA) APIs require a user’s identity. On the surface this seems pretty...
This blog was a collaborative effort between Greg Mally and Mike Muller of the A-Team. There is an effort under way to provide example assets for this blog and when those assets are available, this...
Introduction This blog picks up from where we left here. In that blog we had discussed about an end-to-end usecase involving API Gateway, WAF and OCI Functions....
Introduction This blog picks up from where we left here. In that blog we had discussed about an end-to-end usecase involving API Gateway, WAF and OCI Functions. We had showcased how we can implement security using a combination of WAF and API Gateway, with WAF handling the edge security usecases such as SQL injection protection, and the API Gateway handling authentication. In the API Gateway setup we had used a custom function that remotely introspected the JWT token in the...
Introduction This blog picks up from where we left here. In that blog we had discussed about an end-to-end usecase involving API Gateway, WAF and OCI Functions. We had showcased how we can implement...
table td { border-width: 0px; border-color: black; border-style: solid; border-spacing: 1px 1px; padding: 10px; background-color: white; } .cb11w1 ul li,...
table td { border-width: 0px; border-color: black; border-style: solid; border-spacing: 1px 1px; padding: 10px; background-color: white; } .cb11w1 ul li, .cb11w1 ol li { line-height: 1.4em; color: #404040 } Introduction In an recent post I explained how to use the IDCS Assertion Grant Type Flow to create a personalized JWT Access Token. But I deliberatly excluded any sample code for obvious reasons: There are just too many libraries and programming languages available to...
table td { border-width: 0px; border-color: black; border-style: solid; border-spacing: 1px 1px; padding: 10px; background-color: white; } .cb11w1 ul li, .cb11w1 ol li { line-height: 1.4em;...
Introduction This article shows how outbound REST calls can be made from App Composer Groovy using a content type of x-www-form-urlencoded. It assumes a basic...
Introduction This article shows how outbound REST calls can be made from App Composer Groovy using a content type of x-www-form-urlencoded. It assumes a basic knowledge of how to call REST APIs from Groovy and follows on from 2 articles on this subject: https://www.ateam-oracle.com/engagement-cloud-rest-in-brief https://www.ateam-oracle.com/engagement-cloud-outbound-rest-using-idcs-oauth Note - the method is not described in CX Sales documentation. Background Engagement...
Introduction This article shows how outbound REST calls can be made from App Composer Groovy using a content type of x-www-form-urlencoded. It assumes a basic knowledge of how to call REST APIs from...
Introduction In my Developing SaaS Extensions using VBCS and Helidon Micro-Services part 1, I focused on the creation of a Helidon based microservice which we...
Introduction In my Developing SaaS Extensions using VBCS and Helidon Micro-Services part 1, I focused on the creation of a Helidon based microservice which we tested locally. This blog post takes the reading through to the next step which is to deploy the microservice on Oracle Kubernetes Service and then explain how this service can be called from VBCS in a way that the microservice is aware of the user (aka identity propagation from VBCS to the microservice) In the example...
Introduction In my Developing SaaS Extensions using VBCS and Helidon Micro-Services part 1, I focused on the creation of a Helidon based microservice which we tested locally. This blog post takes the...
Introduction I'm going to start this blog by making 3 bold claims: The future is Serverless! API gateways are the best way to manage and expose Serverless...
Introduction I'm going to start this blog by making 3 bold claims: The future is Serverless! API gateways are the best way to manage and expose Serverless endpoints to the internet! Anything facing the internet should be behind a WAF! Let's do a quick review on Oracle Cloud Infrastructure's offerings that address these claims. Serverless: Oracle offers Oracle Functions which is based on the open-source Fn Project: is an open source, container native, serverless platform that...
Introduction I'm going to start this blog by making 3 bold claims: The future is Serverless! API gateways are the best way to manage and expose Serverless endpoints to the internet! Anything...
Overview Oracle HCM Cloud application provides several features to extend the application’s capabilities beyond what is provided out-of-box. Extending the SaaS...
Overview Oracle HCM Cloud application provides several features to extend the application’s capabilities beyond what is provided out-of-box. Extending the SaaS data model using flex fields is an important feature. In this blog, let’s take quick look at the types of important flex fields and how to access them over HCM REST API in detail. Types of flex fields Descriptive flex field and extensible flex fields are frequently used with HCM business objects. Here is a quick...
Overview Oracle HCM Cloud application provides several features to extend the application’s capabilities beyond what is provided out-of-box. Extending the SaaS data model using flex fields is...
.cb11w1 ul li, .cb11w1 ol li { line-height: 1.4em; color: #404040 } table td { border-width: 1px; border-color: black; border-style: solid; border-spacing: 1px...
.cb11w1 ul li, .cb11w1 ol li { line-height: 1.4em; color: #404040 } table td { border-width: 1px; border-color: black; border-style: solid; border-spacing: 1px 1px; padding: 10px; background-color: white; } Introduction As businesses adopt more SaaS, the ability to extend to meet changing business requirements becomes more important. Before cloud-native, IT teams were faced with the realities of either selecting a set of vendors offered integration solutions, providing...
.cb11w1 ul li, .cb11w1 ol li { line-height: 1.4em; color: #404040 } table td { border-width: 1px; border-color: black; border-style: solid; border-spacing: 1px 1px; padding: 10px;...
table td { border-width: 0px; border-color: black; border-style: solid; border-spacing: 1px 1px; padding: 10px; background-color: white; } .cb11w1 ul li, .cb11w1 ol li { line-height: 1.4em; color: #404040 } Introduction Many of the modern computer applications use a technology that is as old as the Roman Empire: this technology is user identitification by user name and pass word. It is used at the front end, the user interfaces, as well as the back end when computer...