The OIC connectivity agent is the answer for a secure hybrid deployment, where you have a mix of cloud and on-premise applications and need to ensure a secure communication.
The agent is the handler/listener that manages both inbound/outbound communication. This ensures that there is no need to open a port in the on premise firewall.
1. Create an Agent Group
The agent group is a logical group to which we can associate the physical agents installed on premise. Very simple to create one – Just provide a name and a description.
2. Download and Run the Connectivity Agent Installer
Oracle Enterprise Linux 7.2
Oracle Enterprise Linux 7.5
RedHat Enterprise Linux 6.6
RedHat Enterprise Linux 7.2
RedHat Enterprise Linux 7.5
RedHat Enterprise Linux 7.6
Suse Linux Enterprise Edition 12 SP2
Windows Standard Edition 2016
It will look something like this.
# Required Parameters
# oic_URL format should be https://hostname:sslPort
oic_URL=https://oic_host:ssl_port
agent_GROUP_IDENTIFIER=
#Optional Parameters
oic_USER=
oic_PASSWORD=
#Proxy Parameters
proxy_HOST=
proxy_PORT=
proxy_USER=
proxy_PASSWORD=
proxy_NON_PROXY_HOSTS=
oic_URL is the HTTPS URL for the Oracle Integration host.
agent_GROUP_IDENTIFIER – the identifier for the agent group created in the previous step.
oic_user and oic_password – if left empty it will ask for credentials when initializing the agent.You can type your credentials in the file, and it will be encrypted once it runs the first time
proxy parameters are needed in case of an on-premise proxy.
Once the configuration file is complete, the agent is ready to be started.
java –jar connectivityagent.jar
One useful note is to run the agent as a background process, otherwise it will close whenever the session is closed.
nohup java -jar connectivity.jar &
There are many more topics to cover, as the high availability setup, agent upgrade, performance tuning etc. I will address this in upcoming posts. Stay tuned….