Unify and manage your data

Configure connections

Learn how to configure connections for installing RIH recipes.

By now, you must have installed the RIH Solution package. For more information, see topic Install the RIH Solution package.
To configure connections for the RIH recipes:
  1. In the RIH console of the customer tenant, go to the SFDC\_Connections folder.
  2. Select SFDC | CON | Connection to AWS SNS to configure connection using an API key/secret or IAM role.
    1. To authenticate using API key/secret, in the Access Key ID field, enter the IAM user access key ID.
    2. In the Secret Access Key field, enter the secret to the access key ID provided.
      Note: Ensure you do not encode special characters in the AWS Secret Access Key for workato use.
    3. In the Region field, enter the region of your AWS SNS instance.
    4. Click Connect.
    5. To authenticate using AIM role, in the IAM Role ARN field, enter the Amazon Resource Name (ARN) of the AWS IAM role. For example, arn:aws:iam::account_id:role/role-name-with-path.
    6. In the Region field, enter the region of your AWS SNS instance.
    7. Click Connect.
  3. In the SFDC\_Connections folder, select SFDC | CON | Connection to AWS SQS to connect to AWS SQS using an API key/secret or IAM role.
    1. To authenticate using API key/secret, in the Access Key ID field, enter the IAM user access key ID.
    2. In the Secret Access Key field, enter the secret to the access key ID provided.
    3. In the Region field, enter the region of your AWS SNS instance.
    4. In the Version field, enter the SQS version.
    5. In the Service field, enter your SQS queue service, defined in the queue ARN. For example, if your queue ARN is arn:aws:sqs-fips:us-east-1:123456789:bennett_standard_q, use sqs-fips as the service.
    6. Click Connect.
    7. To authenticate using AIM role, in the IAM Role ARN field, enter the Amazon Resource Name (ARN) of the AWS IAM role. For example, arn:aws:iam::account_id:role/role-name-with-path.
    8. In the Region field, enter the region of your AWS SNS instance.
    9. In the Version field, enter the SQS version.
    10. In the Service field, enter your SQS queue service, defined in the queue ARN. For example, if your queue ARN is arn:aws:sqs-fips:us-east-1:123456789:bennett_standard_q, use sqs-fips as the service.
    11. Click Connect.
  4. In the SFDC\_Connections folder, select SFDC | CON | Connection to Reltio Platform to configure connection to Reltio platform tenant using the Reltio Service Account user previously created.
    1. In the Environment URL field, enter the URL of the Reltio environment used for synchronization.
    2. In the Tenant ID field, enter the Reltio tenant ID.
    3. In the Use Client Authorization field, enter Yes or No depending your requirement.
    4. In the Username field, enter the user name of the service user created for RIH synchronization.
    5. In the Password field, enter the password of the service user.
    6. In the Use Custom Authorization Service field, enter Yes if you want to use an internal environment. Enter No for customers.
    7. In the Environment field, enter the environment you want use.
    8. Click Connect.
  5. In the SFDC\_Connections folder, select SFDC | CON | Connection to Salesforce to connect to the Salesforce organization using the Salesforce Service Account User previously created.
    1. In the Organization/community custom domain URL field, enter your organization or community custom domain URL.
      Note: When entering the custom domain URL, ensure you are using the Salesforce Classic URL format, and not the lightning URL format. The same holds good when entering URLs in the Advance settings section.
    2. From the Requested permissions dropdown, select the required permissions.
    3. Click Connect.