AppConnect custom configuration key-value pairs for in-house iOS AppConnect apps

Add key-value pairs to the AppConnect custom configuration for an in-house iOS AppConnect app to use derived credentials. The key-value pairs that you add depend on why the app uses derived credentials:

App-defined key-value pairs

The app can receive custom configuration settings that it defines. You add the keys that have non-certificate values to the AppConnect Custom Configuration for the app. You add keys with certificate values to the AppConnect Certificate Configuration for the app. The app developer or vendor provides you the a list of key-value pairs.

In the AppConnect Certificate Configuration section for the app, add the specified case-sensitive keys and their values to use a derived credential for this use case:

Key

Value

<app-specific key name>

The app developer or vendor provides you the app-specific key name.

Select an identity certificate configuration for derived credentials from the drop-down list. The identity certificate configuration must have the purpose (Authentication, Signing, or Encryption) appropriate for this app-specific key.

Go delivers to the app the certificate from the derived credential that corresponds to the purpose.

AppConnect library certificate authentication feature

The app can authenticate to an enterprise service with a certificate, using the certificate authentication feature that the AppConnect library provides.

Procedure 

  1. In the AppConnect Custom Configuration section, add this case-sensitive key-value pair to use a derived credential for this use case:

    Key

    Value

    MI_AC_CLIENT_CERT_1_RULE

    The URL for the website to which the certificate from the derived credential will be presented. Wildcards are permitted in the host name.

    Examples:

    • *.mycompany.com/sales

    • myserver.mycompany.com/hr/benefits

  2. Repeat with similar keys with different numbers for other rules. For example:

    Key

    Value

    MI_AC_CLIENT_CERT_2_RULE

    myOtherServer.mycompany.com

    MI_AC_CLIENT_CERT_3_RULE

    YetAnotherServer.mycompany.com

  3. In the AppConnect Certificate Configuration section, add this case-sensitive key-value pair:

    Key

    Value

    MI_AC_CLIENT_CERT_1

    Select an identity certificate configuration for derived credentials from the drop-down list. The identity certificate configuration must have the purpose Authentication. This certificate is presented to URLs defined by the corresponding rule.

  4. Repeat with similar keys with different numbers to correspond to the other rules. For example:

    Key

    Value

    MI_AC_CLIENT_CERT_2

    Select an identity certificate configuration for derived credentials from the drop-down list. The identity certificate configuration must have the purpose Authentication.

    MI_AC_CLIENT_CERT_3

    Select an identity certificate configuration for derived credentials from the drop-down list. The identity certificate configuration must have the purpose Authentication.

See “Certificate authentication from AppConnect apps to enterprise services” in the AppConnect for Core Guide. It includes details about what the value of the MI_AC_CLIENT_CERT_#_RULE keys can be.