Configuring a third-party CMS for integration with Unica Content Integration
You can configure a third-party CMS for integration with Unica Content Integration. When you create partitions in Unica Centralized Offer Management, an entry for Content Integration resides in each partition. For example, if Unica Centralized Offer Management has three partitions, you can configure Content Integration for all the partitions of Unica Centralized Offer Management.
About this task
To create partitions in Unica Centralized Offer Management, see the Unica Centralized Offer Management Installation Guide.
To configure a third-party CMS for integration with Unica Content Integration, complete the following steps:
Procedure
-
Select
.The Configuration page appears.
-
From the Configuration categories panel, select .
- Offer - The name provided to Unica Centralized Offer Management application.
- partition <n> - Here <n> represents the number of partitions. For example, if Unica Centralized Offer Management has two partitions, then partition <n> can be partition 1 or partition 2.
The Create category from template page for (System Configuration Template) appears. -
Provide values for the following fields:
- New category name - An appropriate name to
identify the CMS that you want to configure. For example, HCL
DX or Adobe Experience
Manager.Note: From 12.1.1 onwards, the New category name value will be used for identifying the CMS in all applicable Unica products, like Centralized Offer Management, Plan, and Deliver. Earlier, the value of the System Identifier parameter was used.
- System Identifier - A predefined system
identifier. Each system is assigned a unique identifier in Unica Content
Integration. System identifiers are case sensitive and must match with
the one stipulated for the respective system.Note: The System Identifier name must match the
systemId
used in the respective Content Integration plugin. For more information onsystemID
, see Unica Content Integration Developer's Guide. - User credentials - Specify the user credential
selection strategy for the target system. The available options are:
- Default user - If you select Default user, the data source for Default user for credential account is used while calling APIs of the target CMS.
- Logged-in user - If you select Logged-in user, the data source of Unica's signed-in user account is used while calling APIs of the target CMS.
- Hierarchical - If you select Hierarchical, the data source of Unica's signed-in user account is considered first. If the Unica's signed-in user account does not contain a data source, the Default user for credential will be considered.
- Default user for credential - The default
Marketing Platform user having the target CMS credentials. The system
uses this configuration when:
- the User Credential strategy is the Default User.
- the User Credential strategy is Hierarchical, but the logged-in user does not have the datasource associated. In such a case, the default user will be considered for credential selections.
- Data source name for credentials - The data source assigned to the Marketing Platform account. This data source authenticates the target system's REST API, database, etc.
- Anonymous Content Access - Select
Yes if the target system accepts anonymous
access to content or select No if the target
system does not accept anonymous access to content.Note:
- Content Integration framework works with the protected APIs of the target CMS system. However, in this release, the target CMS should be configured for allowing anonymous guest user access to the content URLs.
- Additional parameters - From version 12.1.0.4
onwards, additional key-value parameters can be specified as per the
requirement by each individual system. It can be left blank if no such
parameters are required by the respective system.
Each key-value pair must be specified on separate line. Key and value must be separated by a colon, followed by a space. For example:
key1: value1 key2: value2
Note: If you have not provided credentials for the target system, or if the provided credentials are incorrect, the target system will decline the connection request. Before saving the changes, ensure that you have provided the credentials and that they are accurate. - New category name - An appropriate name to
identify the CMS that you want to configure. For example, HCL
DX or Adobe Experience
Manager.
-
Click Save changes.
A new entry, for example <CMSName>, appears under Data sources for the configured CMS. Expand the entry to see the following entries:
- <CMSName> | HTTP Gateway - contains a configuration.
- <CMSName> | HTTP Gateway | REST - contains a configuration.
- <CMSName> | QOS - does not contain configurations.
- <CMSName> | QOS | Retry Policy - contains configurations.
-
To configure HTTP Gateway, complete the following
steps:
-
To configure HTTP Gateway | REST, complete the following
steps:
-
To configure QOS | Retry Policy, complete the following
steps:
What to do next
- From version 12.1.0.4 onwards, after every 30 mins system will reload the configuration. Hence, there is no need to restart the Content Integration application every time a change is made in Platform configurations. You can set the time intervals for reloading configurations, for more information see Setting configuration refresh interval JVM argument
- Updates to user data source does not require a restart. Changes in user data sources become effective as per configuration refresh schedule. See Setting configuration refresh interval JVM argument to learn more.
- Configure the out-of-the-box integrations like Adobe Experience Manager (AEM), HCL WCM, HCL DX, HCL Commerce & Microsoft Azure (for cognitive services). For more information, see Configuring the out-of-the-box integrations offered by Content Integration.
Webhook Security
Any invocation to Content Integration Framework's Webhooks from external systems are protected by means of API security filters in Unica Platform. In addition to Unica's API security filters, certain environments, such as IBM Security Verify Access (formerly known as IBM Security Access Manager) provide their own security measures for application access. Hence, to enable Webhook invocation from external systems running outside the realm of IBM Security Verify Access, appropriate permissions must be set up for respective Webhook URL.