Table of Contents

Search

  1. Preface
  2. Welcome to Informatica Process Developer
  3. Using Guide Developer for the First Time
  4. Getting Started with Informatica Process Developer
  5. About Interfaces Service References and Local WSDL
  6. Planning Your BPEL Process
  7. Participants
  8. Implementing a BPMN Task or Event in BPEL
  9. Implementing a BPMN Gateway or Control Flow
  10. Using Variables
  11. Attachments
  12. Using Links
  13. Data Manipulation
  14. Compensation
  15. Correlation
  16. What is Correlation
  17. What is a Correlation Set
  18. Creating Message Properties and Property Aliases
  19. Adding a Correlation Set
  20. Deleting a Correlation Set
  21. Adding Correlations to an Activity
  22. Rules for Declaring and Using Correlation Sets
  23. Correlation Sets and Engine-Managed Correlation
  24. Event Handling
  25. Fault Handling
  26. Simulating and Debugging
  27. Deploying Your Processes
  28. BPEL Unit Testing
  29. Creating POJO and XQuery Custom Functions
  30. Custom Service Interactions
  31. Process Exception Management
  32. Creating Reports for Process Server and Central
  33. Business Event Processing
  34. Process Central Forms and Configuration
  35. Building a Process with a System Service
  36. Human Tasks
  37. BPEL Faults and Reports

2. Designer

2. Designer

Identity Service

Identity Service

An identity service provides a way to look up users and groups based on a defined set of attributes. The Process Server support for an identity service is based on Lightweight Directory Access Protocol (LDAP), JDBC, or a file-based service.
You can create a process that includes identity-based activities. As a prerequisite, in the Process Console, you must provide the communication details for access to your directory service. When the process runs, the user or group specified in the process is looked up in your directory service.
Any BPEL process that implements identity-based activities imports the WSDL provided with the Process Server. The name of the WSDL is
identity.wsdl
, and in the Participants view wizards, it is a System Service named
identity search
.
The WSDL contains the following operations:
Operation Name
Description
findRolesByPrincipal
Returns a list of roles for the named principal. For example
User1
is a member of
Administration
and
Finance
.
findRoles
Returns a list of roles, such as
Marketing
,
Finance
, and
DnsAdmins
that are defined in the directory service.
findIdentitiesByRole
Returns a list of identities for the named roles
findIdentities
Returns a list of identities that includes user name and email address
Specifies which roles and principals to include and exclude from the results
The query is comprised of include and exclude statements. The roles or principals listed under the include element are included in the result set while the ones listed under the exclude element are excluded.
assertPrincipalInQueryResult
For a given principal, make sure the user exists in the final result of the query.
You can use this operation for fault handling. It is good for checking permissions.
assertPrincipalInQueryResultwithResponse
Same as above with response
countIdentities
Receive a count of the users and groups requested
Building an Identity-Based Activity
Use identities in an alert service, for example, to send email to a group when a process is suspended on an uncaught fault.
You can also use identities in a BPEL process for branching, based on a group. For example, build one branch of an activity for managers, another for customer service representatives.
Build the assign activities you need to invoke the identity service. You can generate literal contents for a variable based on the
aeid:identityQuery
element.
Here is an example:
<aeid:IdentityQuery xmlns:aeid="http://schemas.active-endpoints.com/identity/2007/01/identity.xsd" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="aeid:IdentityQuery"> <aeid:include> <aeid:group>Development</aeid:group> <aeid:user>user1</aeid:user> <aeid:id>CN=Kim Pan,CN=Users,DC=aedomain,DC=active-endpoints,DC=local</aeid:id> </aeid:include> </aeid:IdentityQuery>
Note that the
<aeid:id>
element above shows an example of looking up a user in a LDAP directory by distinguished name (DN). For JDBC, the lookup is the primary key in the database. For
tomcat-users.xml
, the id is the same as the user name.
Add other programming logic, as desired.
In the PDD, for the partner role, System Service is pre-selected as a custom invoke handler. The PDD entry looks similar to the following:
<partnerLink name="provider"> <partnerRole endpointReference="dynamic" invokeHandler="system"/> </partnerLink>
Deploying a Process as an Identity Service
You can deploy your process and make it available as a standard document literal service for the My Role partner link. Note that in the BPR, there are no WSDL or XSD. They are already deployed and available on the server.


Updated March 30, 2020