Anaplan V2 Connector > Introduction to Anaplan V2 Connector > Administration of Anaplan V2 Connector
  

Administration of Anaplan V2 Connector

As a user, you can use Anaplan V2 Connector after the organization administrator ensures that users have access to the Secure Agent directory that contains the success and error files. This directory path must be the same on each Secure Agent machine in the runtime environment. The organization administrator must also perform the following tasks:
As a user, you can also perform the following tasks:
  1. 1Verify your Informatica Connection properties, such as the Runtime Environment and the absolute path to a directory, which you can use as your output directory for Export.
  2. 2To use non-English characters, set the following environment variable: JAVA_TOOL_OPTIONS=-Dfile.encoding=UTF8
  3. 3Create a directory or file for the Anaplan actions.
  4. The following table describes the directory or file for the Anaplan actions:
    Anaplan Action
    Description
    Import
    A directory to hold the files you import
    Export
    A directory to hold the files you export
    Delete
    A csv file with at least one row and one column of data
    Process
    A csv file with at least one row and one column of data

Get the Certificate from a Certificate Authority

You can submit a certificate request to obtain the certificate from a certificate authority. The certificate authority issues the public certificate and the private key as a single file or as two separate files. If you obtain the public certificate and private key in a single file, you must extract and save both files separately.
Once you obtain the certificate, it is under your control and Anaplan Inc. is not responsible for keeping it secure. You should not share your private key with anyone under any circumstances.

Extract Private key and Public Certificate

If you obtain the public certificate and private key in a single file, use the openssl command to extract and save both files separately in PEM format.
Ensure that the public certificate file begins with “-----BEGIN CERTIFICATE-----” and ends with “-----END CERTIFICATE-----”. Delete any text present before“-----BEGIN CERTIFICATE-----” and after “-----END CERTIFICATE-----”.
Run the following commands to extract the public certificate and private key:
openssl pkcs12 -in Client_certificate.p12 -nokeys -out CERTIFICATE.pem
openssl pkcs12 -in Client_certificate.p12 -nocerts -out PRIVATE_KEY.pem -nodes

Create a Java KeyStore

Storing sensitive information like the private key in the file system can be insecure. Use a Java KeyStore to protect the private key and certificate with a KeyStore password.
Perform the following steps to create a Java KeyStore:
  1. 1Run the following command to create a pkcs12 bundle called keystore_bundle.p12 using the private key and public certificate:
  2. $ openssl pkcs12 -export -in <CERTIFICATE.pem> -inkey <PRIVATE_KEY.pem> -out keystore_bundle.p12 -name <KEYSTORE_ALIAS> -CAfile <CERTIFICATE.pem> -caname root
    The following table describes the openssl arguments:
    Arguments
    Description
    CERTIFICATE.pem
    The public certificate.
    PRIVATE_KEY.pem
    The private key.
    keystore_bundle.p12
    The generated pkcs12 formatted file.
    KEYSTORE_ALIAS
    The alias of your public certificate in the pkcs12 bundle.
    You are prompted to create the KeyStore password. Enter a password of your choice. This password is required to create the Java KeyStore.
  3. 2Run the following command to create the Java KeyStore called my_keystore.jks using the pkcs12 file:
  4. $ keytool -importkeystore -deststorepass <KEYSTORE-PASSWORD> -destkeystore my_keystore.jks -srckeystore keystore_bundle.p12 -srcstoretype PKCS12
    The following table describes the keytool arguments:
    Arguments
    Description
    my_keystore.jks
    The generated Java KeyStore file.
    keystore_bundle.p12
    The pkcs12 bundle.
    You are prompted for the KEYSTORE-PASSWORD. Enter the KeyStore password.
    The generated .jks file contains the KeyStore that securely holds the private key and the certificate.