The Delete action requests the server to delete the resource identified by the request URL.
The following table describes the elements of an HTTP adapter request with a Delete action:
| | |
---|
| Specifies the name of the adapter
Default value: HTTPAdapter | |
| Specifies the URL for the target page | |
| Determines whether to establish a secure connection
Set the value of this element to true when <action> uses HTTPS. Set the value of this element to false or leave it blank when <action> uses HTTP.
Valid values: true, false (default) | |
| Determines whether to install certificates
Set the value of this element to true, if you prefer to have security certificates installed automatically (a common practice). Set the value of this element to false, if you prefer to manually export the security certificate from the specified target server and manually import it into the BMC Atrium Orchestrator's local peer's cacerts file (a rare practice).
Valid values: true, false (default) | |
<allow-unsigned-certificate> | Specifies whether to allow unsigned certificates from trusted zones
Set the value of this element to true, if you are using self-signed SSL certificates (a common practice).
On ecommerce sites or military installations, if you need to use signed certificates such as Verisign or Thawte, set the value of this element to false (a rare practice).
Valid values: true, false (default) | |
| Specifies the Java Standard Trust Keystore passphrase
Default value: changeit Warning - The value of the <passphrase> element is the passphrase for the cacerts certificate stored on the BMC Atrium Orchestrator local peer (CDP or AP) and not the specified target host.
- Changing the passphrase can be tricky and might destroy the cacerts security file integrity.
Verify the cacerts passphrase using the following command in UNIX or Linux:
$ /opt/bmc/ao/cdp/jvm/bin/keytool -list -keystore /opt/bmc/ao/cdp/jvm/lib/security/cacerts | |
| Indicates the data type for the adapter response The JSON string in the response is parsed to XML only if <Content-Type> is set to application/json and <data-format> is set to XML.
Valid values: XML (default), HTML | |
| Contains the data to be posted
Data can be used in the following ways: - Simple text format
- Parent and child format
- Key and entry format
| |
| Indicates whether to use NTLM authentication for the target server for the specified user credentials
NTLM authentication is an application protocol used in various Microsoft network protocol implementations and is used throughout Microsoft systems as an integrated single sign-on mechanism.
The adapter supports both NTLMv1 and NTLMv2 authentication.
Valid values: true, false (default)
If the value of the parameter is true, the adapter uses NTLMv1 or NTLMv2 authentication (based on the server configuration) to authenticate the user. Else, the adapter uses basic authentication. | |
| Specifies the user name required for basic authentication | |
| Specifies the password corresponding to the user name provided for basic authentication
| |
| Specifies the supporting CharSet
Also called character set, it includes identifiers describing a series of universal characters.
Note: If you do not specify the supporting character set, the adapter response is parsed based on the character set in the HTTP response header. | |
<http-connection-properties> | Specifies an XML document that includes HTTP connection properties, which contain the <user-name> and <password> elements for basic or NTLM authentication
The XML document also includes information such as content-type in the HTTP request header before executing the HTTP request.
Note: The user name and password properties are not set in the request header and are case sensitive. | |
| Specifies the user name required for basic or NTLM authentication specified in <http-connection-properties> | |
| Specifies the password corresponding to the user name specified in <http-connection-properties> | |
| Contains the elements that specify information about the public key (X.509 certificate) and the private key that are used for the digital signature
Note: If you specify signature-properties in the adapter configuration and an adapter request, the values in the request override the values in the configuration.
The <signature-properties> element can contain the mode attribute that specifies the format in which the public (X.509 certificate) and private keys are provided for signing the HTTP request.
You can provide the keys using one of the following formats: - Java Keystore (JKS)
- Privacy Enhanced Mail (PEM)
- Definite Encoding Rules (DER) files
- Base64-encoded PEM
Valid values: - <signature-properties mode="keystore"> (default)
- <signature-properties mode="key-files">
- <signature-properties mode="key-data">
| |
| Specifies the path to the JKS that contains the client certificate | Conditional; required when <signature-properties mode="keystore"> |
| Specifies the password of the key contained in the JKS
Note: If you do not specify <key-password>, then the value of <keystore-password> is used as the key password. | |
| Specifies the password to the JKS | Conditional; required when <signature-properties mode="keystore"> |
| Specifies the name of the alias in the JKS that identifies the Public Key Certificate (PKC) that the web server uses to authenticate the client
Note: The value of the <alias> element is verified only when <install-certificate> is set to true and <allow-unsigned-certificate> is set to false. | Conditional; required when <signature-properties mode="keystore"> |
| Specifies the file containing the private key that is used to sign the HTTP request
The adapter supports the following formats: | Conditional; required when <signature-properties mode="key-files"> |
| Specifies the file containing the public key (X509 Certificate)
The adapter supports the following formats: | Conditional; required when <signature-properties mode="key-files"> |
| Contains an XML file specifying the private key in an Base64-encoded PEM format
For example: <private-key-data> --- BEGIN PRIVATE KEY --- MIICdQIBADANBgkqhkiG9w0 BAQEFAASCAl8wggJbAgEAAo GBAKomKro6VbW4PeQtUhNz ZpSH26vbBTBtH1r4EjnIv4vnh SyyA62ewpROVNn0Spvjo BFwE88HcX3tXym/zbVgtd Pke9K+SYHP6CWdiLqn ... --- END PRIVATE KEY -</private-key-data> | Conditional; required when <signature-properties mode="key-data"> |
| Contains an XML file specifying the public key (X509 Certificate) in an Base64-encoded PEM format
For example: <certificate-data> --- BEGIN CERTIFICATE --- MIICdzCCAeCgAwIBAgIFXseN1xYwDQYJKoZIhvcNAQEFBQ AwUzELMAkGA1UEBhMCVVMxEzARBgNVBAoTCkFtYXpvbi5jb20x DDAKBgNVBAsTA0FXUzEhMB8GA1UEAxMY ........ --- END CERTIFICATE -</certificate-data> | Conditional; required when <signature-properties mode="key-data"> |
| Specifies whether the adapter should treat the input data in the request and the data received in the adapter response as a JavaScript Object Notation (JSON) string
If <enable-json-conversion> is set to true, the input data in the request (XML format) is converted to a JSON string after parsing.
Valid values: true, false (default)
Notes:
- If you specify <enable-json-conversion> in the adapter configuration and the adapter request, the value in the adapter request overrides the value in the configuration.
- The response maintains the order in which the fields are specified in the request.
| |