Overview: – Transferring files between systems is a common task in many businesses. MuleSoft makes this easy with its FTP connector. This blog will guide you through using the FTP connector in MuleSoft, from setting it up to transferring files securely and efficiently. The FTP connector allows you to connect to FTP servers, including secure […]
Introduction What is JCE Cryptography? The Java Cryptography Extension (JCE) is an officially released Standard Extension to the Java Platform and is included in the Java Cryptography Architecture (JCA). JCE offers a framework and implementations for encryption, key generation, key agreement, and Message Authentication Code (MAC) algorithms. JCE Cryptography modules in Mulesoft The JCE strategy […]
Introduction What is Two-Way SSL? Two-Way SSL, also known as Mutual SSL or Bidirectional SSL, is a type of SSL (Secure Sockets Layer) communication where both the client and the server authenticate each other. This enhances security by ensuring that both parties in the communication can verify each other’s identity. How does Two Way SSL […]
Introduction What is One Way SSL? One-way SSL (Secure Sockets Layer), also known as SSL/TLS authentication or server-side SSL authentication, is a security protocol used to establish an encrypted link between a client and a server. In one-way SSL, only the server is authenticated to the client. How does One Way SSL work? As previously […]
Introduction to Dashboard Dashboard is a place that shows information and statistics (=numbers) about how the program is working, which you can use to control it. Types of services available in Boomi Types of Dashboard available in Boomi Master data hub dashboard The Hub Dashboard page is divided into sections. Current View Repositories/modelsThis list is […]
This blog will cover how we can implement Two-way SSL in Boomi. What is SSL? SSL stands for Secure Sockets Layer. It’s a protocol designed to provide secure communication over a computer network, typically the Internet. SSL ensures that the data exchanged between a web server and a client (such as a web browser) remains […]
Introduction to Stored Procedure: A stored procedure is a precompiled collection of one or more SQL statements stored on the database server. They are used to encapsulate repetitive tasks, complex business logic, or a series of operations that need to be performed on the database. Stored procedures help improve the performance, maintainability, and security of […]
EDI TRANSACTION 850 Introduction to EDI What is the EDI? EDI stands for Electronic Data Interchange. EDI is the automated exchange of business documents between organizations. What are the different EDI Standards available in EDI? What are the different Documents types available in EDI? What are the different Communication methods available in EDI? Trading Partner – […]
Generally, MDH itself takes care of channel update acknowledgment by acknowledging the updates automatically when the updates are fetched by the source. But if we want to manually acknowledge the updates we have to do some configurations from MDH and Integration side. In this blog, we will learn how can we manually acknowledge channel updates […]