Calling Demantra Workflow Using HTTP POST
Calling Demantra Workflow Using HTTP POST
Calling Demantra Workflow Using HTTP POST
OVERVIEW ............................................................................................................................................................. 3
UTL_HTTP .............................................................................................................................................................. 4
URL ........................................................................................................................................................................ 5
EBS ........................................................................................................................................................................ 6
SUMMARY ............................................................................................................................................................. 6
Overview
All Demantra customers today use workflows by calling workflow in these 4
manners:
This white paper describes some of the new security measures implemented in
Oracle Demantra 12.2.5.1 as part of Oracles continuous security assertion, and
focuses on 3 types of workflow callouts: UTL_HTTP, URL and EBS.
If a GET method is used, the form parameters are encoded in the URL in what is
called query string.
The form parameter can be anything, and in the case of workflow they would be
the username and password to authenticate connection.
For example:
http://myserver.com:8080/Demantra/WorkflowServer?action=run_proc&u
ser=dm&password=xyz&schema=RunEngineWF
In the GET method above, all the parameters are visible (user, password, and
schema). For this reason, one should consider using a POST method whenever
sensitive information is involved.
A POST method passes the form parameters in the body of the HTTP request to
the web server. The POST method is enforced in Oracle Demantra from version
12.2.5.1 by blocking GET method.
Many customers used to call Demantra workflows via one of the above
mentioned methods, after upgrading to Oracle Demantra 12.2.5.1 or above, the
calls to Workflows will stop working, and the new call process should be
implemented.
This is the responsibility of the Customer/ System Integrator, to implement these
changes.
UTL_HTTP
UTL_HTTP () is a package that makes HTTP callouts from PL/SQL and must
adopt POST method to work.
In case of ACL permission related error after running the procedure, the user must
perform the following:
2. Run GRANT_HTTP_TO_DEMANTRA.sql
URL
When customer executes the URL in a web browser, by default request is called
with GET method.
EBS
Prior to 12.2.5.1, when calling Demantra workflow from EBS using Oracles
provided concurrent program Launch Demantra Workflow, EBS has generated
URL using GET method:
http://myserver.com:8080Demantra/WorkflowServer?action=run_pr
oc&user=dm&password=xyz&schema=EBS%20Full%20Download&
EBS calls to Demantra workflows has been changed to use the POST method.
The new functionality can be obtained by applying patch:
21520322:R12.SCP_PF.C - VCP PATCH #1 ON TOP OF VCP 12.2.5.1
Summary
In this document I summarized the various options customer has when running
Demantra workflow. Enhancing security and following best practice delivers
secure processes.
These security benefits can enable customer to foster safeguard and adopt
stronger security policy.
Calling Demantra Workflow using HTTP POST method in Oracle Demantra 12.2.5.1 and up
March 2016
Authors: Demantra Development
Oracle Corporation
World Headquarters
500 Oracle Parkway
Redwood Shores, CA 94065
U.S.A.
Worldwide Inquiries:
Phone: +1.650.506.7000, Fax: +1.650.506.7200
oracle.com