Thursday, 23 April 2015

IMAP setup in Peoplesoft

IMAP setup has become very interim in PeopleSoft to make it more user friendly for clients to have approval and reject buttons on the mail only.
Here I am going to only explain the configuration of IMAP and POP3 protocol with PeopleSoft.
I am considering imap.gmail.com as the imap server.

First of all download the certificates from google.com by logging into gmail and import through PIA.







Then import the root certificate in the pskey, make sure to take the backup of pskey. follow the following link how to do it

how to import certificates in PeopleSoft

Then go to Peopletools>Integration Broker>Integration setup>Nodes and search for the node
MCF_GETMAIL.
Go to the connectors tab and make the configuration as shown in the below screenshot.


MCF_AttRoot:-- Give the path where the mails will be stored
MCF_Attserv:-- http://xyz.com:8999/PSAttachServlet/<webserver domain>/
MCF_Password:-- the encrypted password of the id used to login into gmail
MCF_Port:-- default port on which IMAP is configured
MCF_Protocol:-- IMAP
MCF_Server:-- imap.gmail.com
MCF_UseSSL:-- this has to be mentioned as Y if your imap server is using SSL
MCF_User:-- the gmail user to login into gmail

After making the required entries save the page.
Go to the Main Menu>PeopleTools>MultiChannel Framework>Email>Sample Pages
Username:-- Gmail userID which was configured in the MCF_User
Password:-- password of the gmail user
Server:-- imap.gmail.com

Then fetch the message count, if it gives the count then the setup is complete.















Keep experimenting.
Cheers!!

Thursday, 16 April 2015

How to import certificates in PeopleSoft.

To import the root certificate, please do the following.

1. Put this address into the Browser Address bar;

http://www.gstatic.com/GoogleInternetAuthority/GoogleInternetAuthority.crt

2. In the pop up window, select Save button and Save the file into local directory with this filename;

GoogleInternetAuthority.crt.

3. Double click the certificate file and go to Certification Path tab.

4. Click root certificate GeoTrust and click View Certificate button.

5. In the new certificate window, go to Details tab.

6. Click Copy to File button.

7. Click Next and select Format of

Base-64 encoded X.509(.CER).

8. Click Next and fill in a file name.

9. Click Next and then Finish.

10. Close all the windows.

Copy the c:\temp\ps\rootca.cer to <PS_HOME>\webserv\<Domain> on web server box.

11. Open the command prompt on the web server box and cd to
PS_HOME\webserv\<Domain>.If on tools release 8.49+ the path is: PS_HOME\webserv\<Domain>\bin

12. Type ‘pskeymanager – import’

13. It will prompt you for the password; type password as ‘password’ (it’s default, if you want to change it, you can type something you can remember)


14. It will prompt you for Alias

 Before this open a duplicate command prompt window and go to PS_HOME\webserv\<Domain>\bin and check for existing certificates
Type " pskemanager -list"

15. come to the previous command prompt window and Enter an alias name for the root certificate, e.g. ‘PTTEST’ or any other name (Make sure it does not already exist in your keystore) and in the next step enter the rootca file name ‘rootca.cer’ which you have copied to a file from the certificate sent by certificate provider and then click ‘Enter’

If necessary enter the file path to the certificate.


16. You will see the ‘Trust this Certificate’ prompt as shown below; type ‘yes’

17. It will complete the process and you will see ‘Certificate was added to keystore’

18. Edit integrationGateway.properties file.
Peopletools>Integration Broker>Configuration>Gateways and choose the gateway. Once there click on the Gateway Setup Properties link, enter the userid and password, Click OK. Now, click on the Advanced Properties Page and locate the following code and enter the path to pskey (<PS_HOME>\webserv\<Domain> /keystore/pskey) and the password.
19. On tools release 8.50+ the password must be encrypted.
Uncomment following parameters and make sure they are correct.
secureFileKeystorePath=<path to pskey>
secureFileKeystorePasswd=password
20. Bounce web server.
21. Again type "pskemanager -list" to see the imported certificate listed.
22. Always take the backup of the pskey before doing any import or deletion of certificates.