You want an enterprise message flow to directly access your trusted website for processing, and want the message flow to run in App Connect on IBM Cloud. In App Connect on IBM Cloud plans that provide enterprise capabilities you can now deploy message flows that use CA Certificates.
First, find or create everything you need:
- An instance of App Connect on IBM Cloud that provides enterprise capabilities, currently the Custom Enterprise or Lite plan.
- Certificates and Bar file extracted from the zip file provided: appconnect_truststore.zip (attached below)
- Import the BAR file from the archive file above into your instance of App Connect on IBM Cloud. This creates an Integration server.
- On the App Connect dashboard, click the Integration server’s tile to show the details of the integration server.
- Attach a Truststore Certificate policy to the integration server. At the top of the page, click Attached Policies and with the flow stopped, click Manage.
- To create a new policy and use the certificate from the provided archive, Create and attach a policy.
Tip: If you have an existing Truststore Certificate policy, you can attach that by selecting the policy and then clicking Save.
- Select the policy type ‘Truststore Certificate’, and then give the policy a name. This name can be anything and is only used as a way of identifying the policy in the App Connect list of policies.
- Upload the certificate provided in the archive file above by dragging it into the ‘Create and attach a policy’ window.
- Enter the alias to be used in the truststore for this certificate and then click Add to add the certificate and alias to the policy.
- Click Create to create the policy.
- Start the flow. For example, open the menu (⋮) in the top right of the Integration server’s details view, then click Start. The status shown should change to ‘Running’.
- To test the flow, click the Integration server’s tile, copy the ‘HTTP Input’ URL, and then use your web browser to navigate to that address. You will need to input the credentials, because HTTPS is being used. You can find these by clicking ‘Credentials’ to the right of the URL in the Integration server’s details view.
The website cacert.org is returned with no css.
If the certificate is invalid it can be downloaded from cacert.org as the Class 3 PKI Key (intermediate) in PEM format.