- Make sure that you have followed Get started with connectors and Sync Hub.
- OBPM access: An active account in the Oracle Open Banking Payment Manager environment and proprietary wlthint3client.jar license for connecting to JMS Server.
- Network connectivity: Confirmed routing between the Oracle environment and the Grand Central (GC) iPaaS. We support these Network Connectivities.
- Environment details: The following environment variables are needed from Oracle to configure the connector:
| Environmental Key | Description |
|---|---|
soap-obpm-url | The Soap Service URL to access the obpm environment |
obpm-source | The unique identifier assigned to the client by obpm |
obpm-userId | UserId of the client who is making the connection to obpm |
rest-obpm-url | The Rest Service URL to access the obpm environment |
jms-obpm-url | JMS Connection URL to obpm environment |
jms-queue-name | JMS Queue name |
jms-connection-factory | JMS Connection Factory |
jms-security-principal | JMS username to authenticate |
jms-security-credentials | JMS password for the username to authenticate |
| Environmental Key | Description |
|---|---|
soap-flexcube-url | The Soap Service URL to access the flexcube environment |
flexcube-source | The unique identifier assigned to the client by flexcube |
flexcube-userId | UserId of the client who is making the connection to flexcube |
Configuration guide
Follow these steps to initialize and authorize your OBPM connector.1. Establishing connectivity
Share the details to and from Grand Central and OBPM as mentioned on the Network connectivity page for your chosen network connection.2. OBPM service authentication and authorization mechanisms
The following authentication and authorization mechanisms are supported and can be configured based on your security requirements:- mTLS for soap obpm services
- ws-security for flexcube services
- obpm authorization for REST Services
- SSL Server Certificate verification for REST services
- Trusting SSL Server Certificate for JMS Connection
Certificates/Credentials Security: To configure all certificates and credentials, create a SOPs secret mechanism. For more information, see How to create SOPS. For sharing credentials between OBPM and Grand Central, we recommend using 1Password.
3. Environment configuration
To initialize the OBPM connector, you must define specific environment variables within yourgc-applications-live repository.
These variables are stored in values.yaml for common across connector and in the below files for each connector specific
| Connector | property | Description |
|---|---|---|
gc-obpm-payment-connector | payments-v0.values.yaml | outbound payment connector for all payments |
gc-obpm-payment-inbound-connector | inbound-payments-v0.values.yaml | inbound payment connector to receive inbound payment status |
gc-obpm-direct-debit-mandate-connector | ddmandate-payment-v0.values.yaml | outbound payment connector for direct debit mandate creation |
gc-flexcube-foreign-exchange-connector | foreignexchange-payment-v0.values.yaml | outbound payment connector for foreign exchange creation |
Define common parameters
These variables are used across all connectors connecting Grand Central to OBPM and OBPM to Grand Central.| values.yaml | Description | Environmental Key |
|---|---|---|
obpm.baseUrl | Target API endpoint for the OBPM gateway. | soap-obpm-url |
obpm.source | Unique organizational identifier assigned by obpm. | obpm-source |
obpm.userId | UserId of the client who is making the connection to OBPM. | obpm-userId |
obpm.branch | Specific obpm branch or default to 001 | |
flexcube.baseUrl | Target API endpoint for the Flexcube gateway. | soap-flexcube-url |
flexcube.source | Unique organizational identifier assigned by flexcube. | flexcube-source |
flexcube.userId | UserId of the client who is making the connection to flexcube. | flexcube-userId |
flexcube.branch | Specific flexcube branch or default to 001 |
Either flexcube or obpm properties alone required for some connectors. eg: direct debit required obpm properties alone. please skip those properties if its not required for those connectors and in each connector the requirments are mentioned
values.yaml:
Define gc-obpm-payment-connector parameters
These variables, along with the common parameters mentioned above, are used to make outbound connections for all payments from Grand Central to OBPM.| paymentsv01.values.yaml | Description |
|---|---|
retryFlag | Set to true to enable automatic request retries if any failure in connection. |
cxf.client.ssl.ca.cert.path | **Optional:** set server certificate path for mTLS |
cxf.client.ssl.keystore.path | **Optional:** set client certificate path for mTLS |
cxf.client.ssl.keystore.type | **Optional: **set client keystore certificate type |
http.client.ssl.ca.cert.path | **Optional: **certificate for SSL Pinning for REST Services |
| obpm-outbound-secrets | Description |
|---|---|
server.crt | Optional: load server certificate from obpm to SOPs if mTLS or http trust required for REST service . |
client.p12 | Optional: load Grand Central certificate to SOPs if mTLS is required for Soap service` |
cxf.client.wsse.password | Optional: Soap WSSE security password` |
cxf.client.ssl.keystore.password | **Optional: **Server certificate keystore password for mTLS` |
*Follow how to create SOPS to create new SOPS secret for the above mentioned variables
payments-v0.values.yaml:
payments-v0.values.yaml needs to be placed:
Define inbound/webhook gc-obpm-payment-inbound-connector parameters
Configure how Grand Central receives asynchronous updates from OBPM to GC.Set up the sync-hub component as described in Sync Hub. You can obtain the ASB variables by configuring Sync Hub. This is a mandatory component for inbound connectivity.
inbound-payments-v0.values.yaml | Description | Environmental Key |
|---|---|---|
jmsFlexCubeUrl | The JMS URL to connect to OBPM | jms-obpm-url |
payment.status.update.queue.name | The Queue name for JMS to connect. | jms-queue-name |
jms.connection.factory | The JMS Connection Factory name. | jms-connection-factory |
jms.ssl.enable | Optional: Enable if SSL Trust required for JMS Connection. | |
jms.ssl.trustStore | Optional: Trust Certificate if SSL trust to take place. | |
asb.event.version | Version of the Async Service Bridge (ASB) schema. | |
asb.producer.apiUri | The callback URI for receiving incoming events. | |
asb.event.topic | The ASB topic to send messages. | |
asb.event.type | The ASB event type to send messages. | |
asb.event.source | The ASB source to send messages. | |
retryFlag | Retry flag to retry for any technical issues connecting ASB. | |
jms.recover.exception.http.enable | Retry flag to retry for JMS connection technical issues. |
values.yaml common parameters are not required for inbound connectors
| obpm-inbound-secrets | Description | Environmental Key |
|---|---|---|
jms.ssl.trustStorePassword | Optional: Trust Certificate password if SSL trust to take place. | |
flexcube.jms.security.principal | JMS server username to authenticate | jms-security-principal |
flexcube.jms.security.credentials | JMS server password to authenticate | jms-security-credentials |
Follow How to create SOPS to create a new SOPS secret for the variables mentioned above.
Below is a sample
inbound-payments-v0.values.yaml:
Define gc-obpm-direct-debit-mandate-connector parameters
These variables along with common parameters invalues.yaml are used to make direct debit mandate outbound connections from Grand Central to OBPM.
For the direct debit mandate connector, the Flexcube URLs mentioned in the common parameter section under
values.yaml are not required.| ddmandate-payment-v0.values.yaml | Description |
|---|---|
retryFlag | Set to true to enable automatic request retries if any failure in connection. |
ddmandate-payment-v0.values.yaml:
Define gc-flexcube-foreign-exchange-connector parameters
These variables along with common parameters invalues.yamlare used to make foreign exchange outbound connections from Grand Central to OBPM.
For foreign exchange connector, obpm urls mentioned in comon parameter section under values.yaml are not required
| foreignexchange-payment-v0.values.yaml | Description |
|---|---|
retryFlag | Set to true to enable automatic request retries if any failure in connection. |
foreignexchange-payment-v0.values.yaml:
Testing your integration
To access the Payments Unified API, you must include your Grand Central subscription key in the request header. If you do not have a key, please contact the Grand Central Support Team to have one provisioned.| Key | Value |
|---|---|
api-key | <your_subscription_key> |
Inbound Status Testing: The inbound connector automatically fetches the payment status, and no external trigger is required.
Troubleshooting
If your connector isn’t responding as expected, check these common scenarios.5XX: Internal server error / Core system is down
5XX: Internal server error / Core system is down
Cause: The Grand Central (GC) gateway cannot establish a handshake with the OBPM endpoint. This typically indicates an upstream service outage at Oracle or a network routing failure.Solution: Verify the operational status of the OBPM environment with Oracle. If the service is operational, contact GC Support.
5XX: Timeout from core / Read timeout / SocketTimeoutException
5XX: Timeout from core / Read timeout / SocketTimeoutException
Cause: The Grand Central (GC) gateway cannot establish a handshake with the OBPM endpoint. This typically indicates an upstream service outage at Oracle or a network routing failure.Solution: Verify the operational status of the OBPM environment with Oracle. If the service is operational, contact GC Support.
Invalid OAuth token
Invalid OAuth token
Cause: The
client_id or client_secret provided during setup is incorrect.Solution: Re-verify your credentials with the Oracle portal and contact the GC team to update the connection.429: Rate limit exceeded
429: Rate limit exceeded
Cause: The number of incoming requests has exceeded the defined threshold for your subscription tier. This “429 Too Many Requests” response is a protective measure to ensure the stability of the Grand Central and Core Banking infrastructure.Solution: Review your application’s request patterns to identify unexpected spikes. If your business requirements have evolved and you require a higher throughput, contact the Grand Central Team to request an adjustment to your APIM rate limit policy.
Need more help?
Contact support
Reach out to the Grand Central team for assistance with environment setup or rate limit increases.