Skip to content

Latest commit

 

History

History
 
 

Folders and files

NameName
Last commit message
Last commit date

parent directory

..
 
 
 
 
 
 

Integration Flow recipes

| Browsing by Topic | Browse by Author | Browse by Artefact Type | Request a Recipe | Report a broken link | Contribute|

Topics


Amazon Web Services

Recipe Description Author
Connect to Amazon DynamoDB SAP CPI needs to make a rest call to DynamoDB endpoint Sunny Kapoor
Generate AWS4-HMAC-SHA256 Signature A reusable recipe to generate an AWS specific AWS4-HMAC-SHA256 signature and pass it as a HTTP Authorization header. Sunny Kapoor

Database Connectivity

Recipe Description Author
Connect to Amazon DynamoDB SAP CPI needs to make a rest call to DynamoDB endpoint Sunny Kapoor

Mappings

Recipe Description Author
Accessing Value Mappings from Groovy script Use ITApiFactory.getApi() to get ValueMappingAPI class that can be used to retrieve the mappings. Sharad Dixit
Convert JSON to XML using XSLT Mappings This recipe converts and incoming file in JSON format into XML format Kamlesh Zanje
Invoke Java functions from XSLT Mapping Writing reflexive extension functions in Java to be invoked from XSLT Kamlesh Zanje
Use Map data structures in XSLT Mapping Utilize Map data structures in XSLT Mappings flow step. Kamlesh Zanje

Partner Directory

Recipe Description Author
Accessing Partner Directory entries from within a Groovy script The String and Binary parameters from the Partner Directory can be accessed using a script with the help of getParameter API of the PartnerDirectoryService class. Amrita Laxmi

Security

Recipe Description Author
Accessing keystore artifacts using a Groovy script Any keypair available in tenant keystore can be accessed programmatically from a script with the help of the getKey and getCertificate api of the KeyStoreService class Shweta Walaskar
CMS Decryption with AES256-GCM algorithm using iaik libraries Decryption algorithm AES256-GCM using iaik which is the default security provider for CPI Shweta Walaskar
Encryption with AES256-GCM algorithm using iaik libraries Encryption algorithm AES256-GCM using iaik which is the default security provider for CPI Shweta Walaskar
Generate AWS4-HMAC-SHA256 Signature A reusable recipe to generate an AWS specific AWS4-HMAC-SHA256 signature and pass it as a HTTP Authorization header. Sunny Kapoor