- Follow the steps in Getting started.
- Fiserv DNA access: An active account in the Fiserv DNA production or test environment with necessary permissions.
- Network connectivity: Verify that your network routes traffic between the Fiserv DNA environment and Grand Central iPaaS. For supported options, see Network connectivity.
- Environment details: You need the following environment details from Fiserv DNA to configure the connector:
| Parameter | Description |
|---|---|
fiservdna-base-url | The API endpoint URL for the Fiserv DNA environment |
fiservdna-host | The hostname for Fiserv DNA services |
device-id | Device identifier for DirectSignOn authentication |
user-id | Username for DirectSignOn authentication |
password | Password for DirectSignOn authentication |
app-id | Application identifier for core API requests |
Configuration guide
Follow these steps to initialize and authorize your Fiserv DNA Connector.1. Establish connectivity
Share connectivity details between Grand Central and Fiserv DNA as described in Network connectivity.2. Fiserv DNA authentication
The Fiserv DNA Connector uses SingleSignOn (SSO) authentication for API access. This two-step authentication process generates secure tokens for all API requests.The SSO authentication process consists of two steps: DirectSignOn (to obtain an SSOTicket) and WhoIs (to validate the ticket and obtain session credentials).
Authentication flow
Step 1: DirectSignOn Request The connector usesDeviceId, UserId, and Password to generate an SSOTicket:
SSOTicket that is extracted from the DirectSignonResult tag.
Step 2: WhoIs Request
The connector uses the SSOTicket to obtain a WhoIsResult token with session credentials:
WhoIsResult contains authentication details including an ExpirationDate for token caching and a Signature for API requests.
Step 3: API Requests
All API requests use the WhoIsResult, NetworkNodeName, and AppId:
The connector automatically manages token lifecycle, including caching and renewal based on expiration dates. To configure authentication, create a Secrets Operations (SOPS) secret. For more information, see How to create SOPS.
To share credentials between Fiserv DNA and Grand Central, consider using 1Password.
3. Environment configuration
To initialize the Fiserv DNA Connector, define the required environment variables in yourgc-applications-live repository.
These variables are stored in values.yaml for common configuration across all connectors and in the following files for connector-specific configuration:
| Connector | Property | Description |
|---|---|---|
gc-fiservdna-deposit-connector | deposit-v0.values.yaml | Outbound deposit connector for deposit account operations |
gc-fiservdna-deposit-transaction-connector | deposit-transaction-v0.values.yaml | Outbound deposit transactions connector for transaction operations |
gc-fiservdna-loan-connector | loan-v0.values.yaml | Outbound loan connector for loan account operations |
gc-fiservdna-loan-transaction-connector | loan-transaction-v0.values.yaml | Outbound loan transactions connector for transaction operations |
gc-fiservdna-party-connector | party-v0.values.yaml | Outbound party connector for party management operations |
gc-fiservdna-party-access-entitlement-connector | party-access-entitlement-v0.values.yaml | Outbound party access entitlement connector |
gc-fiservdna-payment-connector | payment-v0.values.yaml | Outbound payment connector for payment operations |
Define common parameters
These variables are stored invalues.yaml and are used across all Fiserv DNA connectors:
| Parameter | Description | Example value |
|---|---|---|
fiservdna.baseUrl | Target API endpoint for the Fiserv DNA environment. | https://fiservdna-api.yourbank.com/Extensions/DNA.CoreApiService/CoreApiService.svc/Soap11 |
fiservdna.host | Hostname for Fiserv DNA services. | fiservdna-api.yourbank.com |
fiservdna.appId | Application identifier for core API requests. | your-app-id-uuid |
fiservdna.networkNodeName | Network node identifier for core API requests. | YOUR_NODE_NAME |
fiservdna.cashBoxNumber | Cash box number for payment operations. | 1001 |
values.yaml configuration:
| Pattern | Description |
|---|---|
MajorAccountTypeCode.<Major> | Single field mapping for major account type |
MinorAccountTypeCode.<Minor> | Single field mapping for minor account type |
MajorAccountTypeCode.<Major>@MinorAccountTypeCode.<Minor> | Combined mapping for both major and minor types |
<GC_ProductId>@<GC_SecondaryProductId> | Grand Central product ID and secondary product ID |
Define deposit connector parameters
Thedeposit-v0.values.yaml file contains configuration for deposit account operations.
Define deposit-transaction connector parameters
Thedeposit-transaction-v0.values.yaml file contains configuration for deposit transaction operations including transaction type mappings.
Define loan connector parameters
Theloan-v0.values.yaml file contains configuration for loan account operations.
Define loan-transaction connector parameters
Theloan-transaction-v0.values.yaml file contains configuration for loan transaction operations including transaction type mappings.
Define party connector parameters
Theparty-v0.values.yaml file contains configuration for party management operations.
Define party-access-entitlement connector parameters
Theparty-access-entitlement-v0.values.yaml file contains configuration for party access entitlement operations.
Define payment connector parameters
Thepayment-v0.values.yaml file contains configuration for payment operations.
Testing your integration
To access the Unified API, include your Grand Central subscription key in the request header. If you don’t have a key, contact the Grand Central Support Team to request one.| Header | Value |
|---|---|
api-key | <your_subscription_key> |
Troubleshooting
If your connector isn’t responding as expected, check these common scenarios.5XX: Internal server error / Core system is down
5XX: Internal server error / Core system is down
Cause: The Grand Central gateway cannot establish a handshake with the Fiserv DNA endpoint. This typically indicates an upstream service outage at Fiserv or a network routing failure.Solution: Verify the operational status of the Fiserv DNA environment. Check the Fiserv status page or contact Fiserv support. If the service is operational, contact Grand Central Support.
5XX: Timeout from core / Read timeout / SocketTimeoutException
5XX: Timeout from core / Read timeout / SocketTimeoutException
Cause: The request to Fiserv DNA exceeded the configured timeout period. This may indicate performance issues at Fiserv or network latency problems.Solution: Verify the operational status of the Fiserv DNA environment and check for any performance degradation. If the service is operational and performing normally, contact Grand Central Support.
401: Invalid authentication credentials
401: Invalid authentication credentials
Cause: The DirectSignOn credentials provided during setup are incorrect, expired, or the user lacks the required permissions in Fiserv DNA.Solution: Re-verify your credentials with your Fiserv DNA administrator and ensure the user has the required permissions. Contact the Grand Central team to update the connection credentials if needed.
Authentication token expired
Authentication token expired
Cause: The SSOTicket or WhoIsResult token has expired based on the ExpirationDate field.Solution: The connector automatically refreshes tokens. If you continue to see errors, verify that the system clock is synchronized and contact Grand Central Support.
429: Rate limit exceeded
429: Rate limit exceeded
Cause: The number of incoming requests exceeds the defined threshold for your subscription tier. This “429 Too Many Requests” response protects the stability of the Grand Central and Fiserv DNA infrastructure.Solution: Review your app’s request patterns to identify unexpected spikes. If you need higher throughput, contact the Grand Central Team to request a higher rate limit.
Need more help?
Contact support
Contact the Grand Central team for help with environment setup or rate limit increases.