Prerequisites
Before initiating the configuration, ensure you have the following credentials and connectivity in place:- Make sure that you have followed Get started with connectors and Sync Hub.
- OBPM access: An active account in the Oracle Open Banking Payment Manager environment and
wlthint3clientlicense for connecting to JMS Server. - Network connectivity: Confirmed routing between the Oracle environment and the Grand Central (GC) iPaaS. See Network connectivity for supported options.
- Environment details: The following table shows the environment variables you need from Oracle to configure the connector:
| Key | Description |
|---|---|
soap-obpm-url | The SOAP service URL to access the OBPM environment |
soap-flexcube-url | The SOAP service URL to access the Flexcube environment |
obpm-source | The unique identifier assigned to the client by OBPM |
obpm-userId | User ID of the client who is making the connection to OBPM |
flexcube-source | The unique identifier assigned to the client by Flexcube |
flexcube-userId | User ID of the client who is making the connection to Flexcube |
rest-obpm-url | The REST service URL to access the OBPM environment |
jms-obpm-url | JMS connection URL to OBPM environment |
jms-queue-name | JMS queue name |
jms-connection-factory | JMS connection factory |
Configuration guide
Follow these steps to initialize and authorize your OBPM connector.1. Establish connectivity
Share the following details with the Grand Central team to establish secure connectivity between Grand Central and OBPM:- Environment details:
baseUrl,ipaddress, andsubnetof the OBPM application.
- Environment details:
ipaddressof Grand Central. - Shared key:
PSKfrom the Grand Central team.
2. OBPM service authentication and authorization
The connector supports the following authentication and authorization mechanisms, which you can configure based on your security requirements:- mTLS for SOAP OBPM services
- WS-Security for Flexcube services
- OBPM authorization for REST services
- SSL server certificate verification for REST services
- SSL server certificate trust for JMS connection
Certificates and credentials security: To configure all certificates and credentials, create SOPS secrets. See Configure a connector for instructions. For sharing credentials between OBPM and Grand Central, we recommend using 1Password.
3. Environment configuration
To initialize the OBPM connector, define specific environment variables within yourgc-applications-live repository.
Store common variables in values.yaml and connector-specific variables in the files listed in the following table:
| connector | Property file | Description |
|---|---|---|
gc-obpm-payment-connector | payments-v0.values.yaml | Outbound payment connector for all payments |
gc-obpm-payment-inbound-connector | inbound-payments-v0.values.yaml | Inbound payment connector to receive inbound payment status |
gc-obpm-direct-debit-mandate-connector | ddmandate-payment-v0.values.yaml | Outbound payment connector for direct debit mandate creation |
gc-flexcube-foreign-exchange-connector | foreignexchange-payment-v0.values.yaml | Outbound payment connector for foreign exchange creation |
Define common parameters
The following table shows variables used across all connectors connecting Grand Central to OBPM and OBPM to Grand Central:| Key | Description | Environment key |
|---|---|---|
obpm.baseUrl | Target API endpoint for the OBPM gateway. | soap-obpm-url |
flexcube.baseUrl | Target API endpoint for the Flexcube gateway. | soap-flexcube-url |
obpm.source | Unique organizational identifier assigned by OBPM. | obpm-source |
obpm.userId | User ID of the client who is making the connection to OBPM. | obpm-userId |
obpm.branch | Specific OBPM branch or default to 001. | N/A |
flexcube.source | Unique organizational identifier assigned by Flexcube. | flexcube-source |
flexcube.userId | User ID of the client who is making the connection to Flexcube. | flexcube-userId |
flexcube.branch | Specific Flexcube branch or default to 001. | N/A |
values.yaml:
values.yaml file needs to be placed:
Define gc-obpm-payment-connector parameters
The following table shows variables used to make outbound connections for all payments from Grand Central to OBPM:| Key | Description |
|---|---|
retryFlag | Set to true to enable automatic request retries if any failure in connection. |
cxf.client.ssl.ca.cert.path | Optional: Server certificate path for mTLS. |
cxf.client.ssl.keystore.path | Optional: Client certificate path for mTLS. |
cxf.client.ssl.keystore.type | Optional: Client keystore certificate type. |
http.client.ssl.ca.cert.path | Optional: Certificate for SSL pinning for REST services. |
payments-v0.values.yaml:
payments-v0.values.yaml file needs to be placed:
Define inbound/webhook gc-obpm-payment-inbound-connector parameters
Configure how Grand Central receives asynchronous updates from OBPM to GC.You must set up the Sync Hub component. See Sync Hub. The ASB variables below come from configuring Sync Hub, which is a mandatory component for inbound connectivity.
| Key | Description | Environment key |
|---|---|---|
jmsFlexCubeUrl | The JMS URL to connect to OBPM. | jms-obpm-url |
payment.status.update.queue.name | The queue name for JMS to connect. | jms-queue-name |
jms.connection.factory | The JMS connection factory name. | jms-connection-factory |
jms.ssl.enable | Optional: Enable if SSL trust required for JMS connection. | N/A |
jms.ssl.trustStore | Optional: Trust certificate if SSL trust to take place. | N/A |
jms.ssl.trustStorePassword | Optional: Trust certificate password if SSL trust to take place. | N/A |
asb.event.version | Version of the Async Service Bridge (ASB) schema. | N/A |
asb.producer.apiUri | The callback URI for receiving incoming events. | N/A |
asb.event.topic | The ASB topic to send messages. | N/A |
asb.event.type | The ASB event type to send messages. | N/A |
asb.event.source | The ASB source to send messages. | N/A |
retryFlag | Retry flag to retry for any technical issues connecting ASB. | N/A |
jms.recover.exception.http.enable | Retry flag to retry for JMS connection technical issues. | N/A |
inbound-payments-v0.values.yaml:
inbound-payments-v0.values.yaml file needs to be placed:
Define gc-obpm-direct-debit-mandate-connector parameters
The following table shows variables used to make direct debit mandate outbound connections from Grand Central to OBPM:| Key | Description |
|---|---|
retryFlag | Set to true to enable automatic request retries if any failure in connection. |
ddmandate-payment-v0.values.yaml:
ddmandate-payment-v0.values.yaml file needs to be placed:
Define gc-flexcube-foreign-exchange-connector parameters
The following table shows variables used to make foreign exchange payment outbound connections from Grand Central to OBPM:| Key | Description |
|---|---|
retryFlag | Set to true to enable automatic request retries if any failure in connection. |
foreignexchange-payment-v0.values.yaml:
foreignexchange-payment-v0.values.yaml file needs to be placed:
Testing your integration
To access the Payments Unified API, you must include your Grand Central subscription key in the request header. If you do not have a key, contact the Grand Central Support Team to have one provisioned.| Key | Value |
|---|---|
api-key | <your_subscription_key> |
Troubleshooting
If your connector isn’t responding as expected, check these common scenarios.5xx: Internal server error / core system is down
5xx: Internal server error / core system is down
Cause: The Grand Central (GC) gateway cannot establish a handshake with the OBPM endpoint. This typically indicates an upstream service outage at Oracle or a network routing failure.Solution: Verify the operational status of the OBPM environment with Oracle. If the service is operational, contact GC Support.
5xx: Timeout from core / read timeout / SocketTimeoutException
5xx: Timeout from core / read timeout / SocketTimeoutException
Cause: The Grand Central (GC) gateway cannot establish a handshake with the OBPM endpoint. This typically indicates an upstream service outage at Oracle or a network routing failure.Solution: Verify the operational status of the OBPM environment with Oracle. If the service is operational, contact GC Support.
Invalid OAuth token
Invalid OAuth token
Cause: The
client_id or client_secret provided during setup is incorrect.Solution: Re-verify your credentials with the Oracle portal and contact the GC team to update the connection.429: Rate limit exceeded
429: Rate limit exceeded
Cause: The number of incoming requests has exceeded the defined threshold for your subscription tier. This “429 Too Many Requests” response is a protective measure to ensure the stability of the Grand Central and Core Banking infrastructure.Solution: Review your application’s request patterns to identify unexpected spikes. If your business requirements have evolved and you require a higher throughput, contact the Grand Central Team to request an adjustment to your APIM rate limit policy.
Need more help?
Contact support
Reach out to the Grand Central team for assistance with environment setup or rate limit increases.