Skip to main content

GuideWire Agent Installation

GuideWire Requires OpCon version 22.8 or greater.

Before starting an installation, an updated OpCon License key including a GuideWire Agent type must be obtained. Failure to do this will result in a license Violation when the defined OpCon MFT agent is activated in opCon and will result in OpCon termination if the activated GuideWire Agent is not deactivated within the specified time.

The OpCon GuideWire environment consists of the AgentProxy that provides the communication link between OpCon and the GuideWire applications.

The AgentProxy is contained within the SMANetCom environment and is installed automatically when the core SMA OpCon component is installed.

The AgentProxy uses the new SMANetCom Rest-API module and provides the communications link between OpCon and the GuideWire Rest-API. Currently, there is a one to one relationship between an OpCon environment and a GuideWire application, meaning a separate AgentProxy instance would need to be configured for each GuideWire application environment.

Authentication

GuideWire uses OAuth which is an open standard authorization framework for token-based authorization on the internet. It acts as an intermediary on behalf of the end user, providing the third-party service with an access token that authorizes specific account information to be shared. The process for obtaining the token is called an authorization flow.

In order to authenticate with your GuideWireCloud instance, a GuideWireCloud OAuth account must first be created.

Consult GuideWire documentation or support to create the required account.

Once you have created the GuideWireCloud OAuth account you will have a set credentials containing the fields needed for OpCOn to communicate with the GuideWireCloud instance.

  • Application ID
  • Client Secret
  • Auth Server URL

However, before setting up the OpCon GuideWire connection, the permission scopes allocated to OpCon must be defined.

Configuring GuideWire Permission Scopes

This requires creating a YAML file containing the allocated permissions and storing it in your GuideWireCloud source repository.

Each Service Center will require it's own copy of this file, although the same file can be used for each service. For each Service Center, this file should be located in ServiceCenterName/modules/configuration/config/integration/roles/. This directory should contain many other .role.yaml files for reference.

The file name should be a recognizable name without spaces or special characters and suffixed with .role.yaml (i.e. scp.cc.sasma_stanalone.role.yaml - see figure 1) .

The file contains permissable endpoints and must contain the /systemtools/v1/** endpoint.


name: scp.cc.sasma_stanalone
endpoints:
- endpoint: /claim/v1/**
methods:
- GET
- POST
- PATCH
- DELETE
- endpoint: /admin/v1/**
methods:
- GET
- POST
- PATCH
- DELETE
- endpoint: /async/v1/**
methods:
- GET
- POST
- PATCH
- DELETE
- endpoint: /common/v1/**
methods:
- GET
- POST
- PATCH
- DELETE
- endpoint: /systemtools/v1/**
methods:
- GET
- POST
- PATCH
- DELETE
accessibleFields:
"*":
edit:
- "*"
view:
- "*"

Figure 1 : Fully Permissive Role File Example

The file contains the following three major fields (Table 1)

FieldDescription
namethis is the value used as the filename without the .role.yaml suffix.
endpointsdescribes the the endpoint for which the subsequent methods are permitted (glob patterns are supported). See endpoint information (table 2).
accessibleFieldsthis describes the specific fields which the CloudWireCloud API will return to OpCon. For specific details, reference the GuideWire Cloud documentation (figure 2 contains a default definition that should be used for proper OpCon integration).

Table 1 : role.yaml major values

accessibleFields:
"*":
edit:
- "*"
view:
- "*"

Figure 2 : Definition for Proper OpCon integration.

Each endpoint must be separately defined within the endpoints section and contains the endpoint name as well as which methods are allowed.

FieldDescription
endpoint:defines the endpoint values /admin/v1/**, /async/v1/**, /claim/v1/**, /common/v1/**, /systemtools/v1/**,
methodsdefines the methods allowed on the endpoint DELETE, GET, PATCH, POST

Table 2 : role.yaml second level values

One the file has been created, it must be committed to your GuideWireCloud Repository. Remember that each Service Center that must be integrated with OpCon will need its own file. Once the file has been committed, you will be all to reference the newly-created scope from within OpCon.

Consult GuideWire documentation or support to commit the information into your GuideWireCloud Repository.

Agent Definition

Before a task can be selected, the agent definition for the connection to the GuideWire environment must be defined. It should be noted that a separate GuideWire agent must be defined for each Service Center that OpCon will connect to.

From Solution Manager, select Library and under the Administration menu select Agents.

Agent View

Select + Add to configure the new GuideWire Agent.

Enter a name for the agent and select the Guidewire item from the Machine Type drop-down list.

Open the General Settings sub-heading and enter the domain name of the GuideWireCloud Service Center which OpCon will be connecting to in the Fully Qualified Domain Name field. All other settings can be left as the default value.

Select the Save button.

Agent Settings

After saving, a new a new sub-heading titled Guidewire Settings will be available. Expand this sub-heading to display four input and one informational field.

The GuideWire credentials returned following the Authentication step are entered into these fields.

Enter your GuideWireCloud credentials into the appropriate fields here.

FieldValue
OAuth Authorize Server URLthe value returned when the GuideWireCloud OAuth account was created.
OAuth Application IDthe value returned when the GuideWireCloud OAuth account was created.
OAuth Client Secretthe value returned when the GuideWireCloud OAuth account was created.
OAuth Scopesthis consists of several names separated by spaces (example: tenant.sasma project.gwcp planet_class.lower cc.service scp.cc.sasma_stanalone)
tenant nameyour GuideWireCloud Tenant name (example: tenant.sasma)
GuideWireCloud Project nameyour GuideWireCloud project name (example: project.gwcp)
GuideWireCloud Planet Classyour GuideWireCloud Planet Class (example: planet_class.lower)
Service Center identifierthe Service Center identifier to be associated with this agent. If, for example, this agent will be used to automate Claims Center, you should enter cc.service, or for Policy Center, pc.service.
The created scope fileThe scope file which you created earlier. Enter the name of the scope file .roles.yaml suffix (example: scp.cc.sasma_stanalone).
Supported Batch ProcessesInitially this field will contain No supported Batch Processes - have you started communication with the agent?

Table 3 : GuideWire Settings fields

Select the Save button.

After getting confirmation that the save was successful, mark the machine Up.

After a short while (a page refresh might be necessary), you will see that the Supported Batch Processes line item has changed to display a list of all batch processes which the agent is capable of automating. This indicates successful completion of the OAuth configuration for your agent.