Content Types Configuring the Action Framework

Using Actions to Integrate Oracle BI EE with External Systems 5-13 and then Policies from the Weblogic domain. For more information about the predefined policies available through OWSM, see Predefined Policies in Oracle Fusion Middleware Security and Administrator’s Guide for Web Services.

5.3.6 Proxy

The proxy element specifies proxy settings. The proxy settings are used for accessing items such as Web Services and URLs that would ordinarily be inaccessible from the network containing the Weblogic server where the Action Framework Web Services are deployed. The following example is a proxy entry. Table 5–8, Proxy Elements and Descriptions describes each element. proxy hostproxyserver.oracle.comhost port80port useridjsmithuserid passwordjohsmipassword nonProxyHostslocalhost|.oracle.com|10.1.10.78 nonProxyHosts proxy

5.3.6.1 Proxy Elements Descriptions

Table 5–8, Proxy Elements and Descriptions contains each proxy element and its description.

5.3.7 ebusinesssuiteconfig

The ebusinesssuiteconfig element specifies that an Oracle E-Business Suite system is available. If this element is present in the configuration file, Oracle BI Presentation Services displays the menu option that allows users to create a Navigate to E-Business Suite action. Users must have the proper privileges to access E-Business Suite from Oracle BI Presentation Services. The following example is an ebusinesssuiteconfig entry. ebusinesssuiteconfig visibletruevisible ebusinesssuiteconfig Table 5–8 Proxy Elements and Descriptions Element Description host This element specifies the host name of the server where the proxy server is located. port This element specifies the proxy server’s port number. userid password These element specifies the userid and password for the proxy server. Use these elements for a proxy that requires authentication. Leave these elements blank for a non-authenticating proxy. nonProxyHosts This element allows for a pipe character | separated list of the server, domain names, and patterns to exclude from the proxy. Use this element so the system does not attempt to use the proxy to access internal resources.