The HTTP Client collector function collects data from a third-party HTTP server. You can configure this function to set the values for how the HTTP Client function would behave when communication communicating with the third-party HTTP server, and how to specify the method of communication.
You can configure this function in the following settings.
Connection
Operational settings
General settings
:
Table of Contents | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Connection
Depending on the users' your configuration, three authentication methods are available: None, Basic authentication and OAuth 2.0.
A selectable option from the Authentication type is used to make the selection and based on that separate configuration options are available. There will be additional options for the Authentication type selectedWhen you select an Authentication type, there will be separate configuration options for the selected authentication type.
Rw ui tabs macro | ||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Add the Target URL of the HTTP request to be made to the HTTP server. You can use Variable Insertion.
Add the Username and Password if there are any. These options can be left emptyare optional. Add the Target URL of the HTTP request to be made to the HTTP server. In Target URL, enter the URL of the target HTTP server. You You can use Variable Insertion.
When the Authentication type selection is selected as OAuth 2.0 additional options are displayed. Their configuration is mandatory to properly activate the function. |
Add the Target URL of the HTTP request to be made to the HTTP server. You can use Variable Insertion. Check the Use redirect fields check box to enable URL redirection using the available options. Two fields are displayed when this option is enabled – the Target URL field where the designated address is to be entered, and an optional Resource path. |
|
Rw ui expands macro | ||||
---|---|---|---|---|
It is also possible to use the Secrets Wallet functionality When the OAuth 2.0 authentication type is selected in the Connection section, it is possible to enable Secrets Wallet to apply stored credentials for the three HTTP Functions. If Secrets Wallet is not enabled, you configure the following fields.
|
rw-ui-tabsexpands-macro | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
The OAuth 2.0 parameters section of the function controls the authentication token credentials. Based on the Grant Type selection If Secrets wallet is not enabled in the OAuth 2.0 credentials section, there are two types of credentials access provided for the authentication provisions – Password and Client credentials. Each of them has a distinctive configuration option. Rw tab | | title | Password credentials
Rw tab | ||
---|---|---|
|
Access token URL – In this field specify the URL containing the authorization token.
Token header prefix –is the Authorization header placed before the access token.Scope – The authorization and token endpoints allow the client to specify the access request scope using this parameter. The entered value must be expressed as a list of space-delimited, case-sensitive strings. This is an optional parameter.
Audience
Client Authentication – This - Set the recipient that the token is intended for.
Client authentication – This option controls the type of authentication mechanism as defined by the connecting server – Auth Header or Auth Body are available. The The options are named "Send as Basic Auth Headerbasic auth header" and "Send client credentials in body".
If Secrets wallet is wallet is enabled in the OAuth 2.0 credentials section, and a the Private key JWT authentication type is selected, these options have to be configured.there are distinctive configuration options:
Access token URL – In this field specify Specify the URL containing the authorization token.
Token header prefix – Is the Authorization The authorization header placed before the access token.
Issuer – Identifies Set the issuer of the JWT
Audience – Identifies Set the recipients recipient that the JWT is intended for. It can be a single recipient or a list of recipients.
Subject – Identifies Set the subject of the JWT, typically representing the user or entity the token is about.
Identifier – Provides Set a unique identifier for the JWT.
OAuth 2.0 credentials
It is also possible to use the Secrets Wallet functionality to apply stored credentials for the three HTTP Functions.
If Secrets Wallet is not enabled, you configure the following fields.
Grant type – In this field, select the grant type of the credential.
Client ID – In this field enter the client identifier.
Client secret – In this field enter the associated client secret. This parameter may be omitted if the client secret is an empty string.
Username – This field is used to specify the relevant username, it is mandatory. This field appears when the Password credentials is selected for the Grant type.
If Secrets wallet is enabled in the OAuth 2.0 credentials section, and the Bearer token authentication type is selected, there are distinctive configuration options.
|
Operational settings
In Operational settings, enter the following details that determine how you want the function to handle the errors. The following options are available for HTTP Collector and Processor Functions only:behave.
In Request run limit, specify the number of times the operation should run . in a single stream. The limit of runs you can request is from one to 12.
In Action on error, specify the action you want to take in case of an error. You can select from the following options:
Any response with the HTTP status code 4xx or 5xx is considered an error. All errors get logged in the system logs. You can refer to the See
The default value is Ignore.
General settings
You In General settings, you select an HTTP request method from the following options:
Include query string in URL – This enables a query string in the token URL.
Note |
---|
Note!*The Body and Form fields are visible only for the POST, PUT and PATCH request methods. See Contents for more information. |
You can select a combination of the following options to be included:
Note!
*The Body and Form fields are visible only for request methods POST, PUT and PATCH.Rw ui expands macro | ||||
---|---|---|---|---|
Select Body or Form and add the corresponding details in the content of the request message. You can use Variable Insertion. |
Expand the examples below to view samples of HTTP request messages for Body or Form:
Expand the examples below to view samples of HTTP request messages for Body or Form:
|
Results
Response HeadersIn Result key, you can assign a name to the result that you receive in response to the request. It is recommended to configure the resulting key to make future references of the same response easy and traceable. The default value is httpResponse.
The support for response headers can be enabled by toggling on the Enable response headers option.A default value for the key Result headers Key will be added by the engine (httpResponseHeaders) which will match the placeholder for the key input. Configuration is done by filling up the necessary input fields: Result Header Key and Result Key.
Note |
---|
HTTP Response Headers SupportBy enabling response headers, the overall data size of the HTTP packets will also increase. Caching of the body checkbox check box is tied to the headers. This option is available only for the HTTP Client collector and the HTTP Client Processor. |
processor functions. |
Info |
---|
Token Renewal SupportThe collector and processor Functions functions support token renewal, if the servers return a 401 Token Expiry error. |