Once the Bridge agent is set up, you can log in to the bridge agent to view and modify the allowed configuration as needed. To do this:
In Qntrl, navigate to (settings) >> Advanced >> Bridge, then select your bridge.
Hover your cursor over the bridge name, then click on the action menu, and select Open Agent.
This will direct you to the bridge agent login page. Log in with your username and password.
Click the (settings) icon at the top right of the header bar.
The following settings options will appear on the left pane.
Configuration
Reset Password
Credentials
Configure OAuth
Configure SSL
From the options, you can click on the desired action to perform various configuration tasks.
Click Save. The credentials will be stored and ready for use.
Grants access to a database connection by establishing a connection with a database using the provided username and password. Upon selecting JDBC as the credential type, fill in the following field details.
Username: Username associated with the database account.
Password: Password for the corresponding username to authenticate database access.
Enables secured connections to UNIX and Linux devices by executing commands over SSH protocol. This credential type has two modes of authentication.
i. Password Authentication:
Used for secure connections with Windows machines by executing Powershell commands. If you've chosen Powershell as the credential type, provide the following details in the designated fields.
User Name: Username on the Windows machine.
Password: Password associated with the machine for script execution.
Used for authentication and accessing resources within an Active Directory environment. For AD credential types fill in the following details.
User DN: Distinguished Name of the Active Directory.
Password: Active Directory password.
Pre-requisite
To register your application and generate a Client ID and Client Secret, select the '+' icon next to Client ID and follow the registration process outlined in the Register your Application section, commencing from step 3.
Click Save and Connect.
Upon successful authorization, the connection will be created and the status will be shown as Connected.
You have the option to modify or revoke the connection you've created by simply clicking the Edit or Revoke buttons.
Visit the Zoho API Console by navigating to the official website Zoho API Console and click GET STARTED.
Choose the "Server-based Application" client type and click CREATE NOW.
Provide the following details:
Click CREATE.
Upon successful registration, you will receive the following credentials:
Client ID: The consumer key generated from the connected app.
Client Secret: The consumer secret generated from the connected app.
For more in-depth information about OAuth integration with Zoho, you can refer to Zoho's OAuth documentation
The Client Name should not include any special characters except for "_" and "&."
The Redirect URIs must be in the format "https://www.your-domain.com/callback".
The Homepage URL in the format "https://www.yourdomain.com"
Before enabling HTTPS for the Bridge, ensure that the following requirements are met:
Qntrl Bridge currently requires OpenSSL 1.x. To enable HTTPS, ensure that OpenSSL 1.x is installed on the Bridge host computer.
If OpenSSL 1.x is installed, you can proceed with configuring HTTPS.
If OpenSSL 3.x or any other version is installed, follow the steps below to install OpenSSL 1.x.
Once HTTPS is enabled for the Bridge, you can remove these lines from .bashrc.
For Windows:
Download OpenSSL 1.x for Windows, from a trusted source like this link.
Extract the downloaded ZIP file into a folder and install.
Set the OpenSSL 1.x version as default in the environment path.
1. Create a Configuration File
Create a file with the following sample content and save it as <name.conf>.
[req]distinguished_name = req_distinguished_namereq_extensions = req_extprompt = no[req_distinguished_name]C = {Your country code}ST = {Your state}L = {Your city}O = {Your organisation}OU = {Your org unit}CN = {Your bridge domain}[req_ext]subjectAltName = @alt_names[alt_names]DNS.1 = {Your bridge domain}
This file contains the details for the certificates.
2. Create a Private Key
Execute the following command in the terminal:
openssl genrsa -out {bridge_domain}.key 2048
This command will create a .key file, which has to be uploaded in the Private Key field.
3. Create a CSR (Certificate Signing Request)
Execute the following command to create a .csr file. You will need this to obtain the server certificate from your Certificate Authority.
openssl req -new -key {bridge_domain}.key -out {bridge_domain}.csr -config cert.conf
Execute the following command to create a server certificate for testing purposes.
openssl req -key {bridge_domain}.key -new -x509 -days 365 -out {bridge_domain}.crt -config cert.conf
The bridge truststore is used for all outbound calls from the bridge. You can upload certificates that the bridge needs to trust.
For example, if the bridge needs to consume private network APIs and the server certificate is not signed by a CA, you must upload that server certificate to this truststore to make the API accessible from the bridge.You are currently viewing the help articles of Qntrl 3.0. If you are still using our older version and require guidance with it, Click here.