Using Adobe AdminConsole to manage an Experience Platform instance, manage Product Profiles, manage users and administrators. Validate if login to Experience Platform UI succeeds.
- Understand AdminConsole capabilities for Experience Platform
- Understand the role of Product Profiles
- Access control through service -settings
- Managing users and administrators
- AdminConsole: https://adminconsole.adobe.com/
- Experience Platform UI: https://platform.adobe.com/
- Log into Adobe Cloud Platform
- Create Product Profile
- Add Users
- Add as Admin
- Setup an integration
- Authenticate via POSTMan
-
Navigate to https://adminconsole.adobe.com in your browser
-
Login with the “master credentials for lab” that are provided on your personal lab-worksheet.
-
Select “Adobe Cloud Platform – Data Services”
-
Select “New Profile”
-
Complete your Product Profile details (for prefix see your Lab worksheet):
- Profile Name : Profile-
- Display Name : [V] Same as Profile Name
- Description: Product Profile for
- Disable User notifications
-
Click “Next”
-
Select the Services you want to enable for this Product Profile
- Enable “Data Science Workspace”
- Enable “Experience Query Service”
-
Select “Done”
-
Click on the Product Profile you just created
-
Click “Add User”
-
Type your own Personal AdobeId (see Lab Worksheet)
-
Your user has been added to the Product Profile – you can now login into Experience Platform, but just one more thing…….
-
Go back to “Overview”
-
Click “Add Admin”, Add your AdobeId (see Lab Worksheet) and enable “System Administrator” privileges. N.B. This is only needed if the user needs to create Integrations using I/O Console
-
Create Certificate
For MacOS & Linux platform
Open terminal and execute below command:
openssl req -x509 -sha256 -nodes -days 365 -newkey rsa:2048 -keyout private.key -out certificate_pub.crt
For Windows Platform
Open Command Line Prompt and execute below commands.
set OPENSSL_CONF=C:/libs/openssl-1.1.1-win64-mingw/openssl.cnf cd C:/libs/openssl-1.1.1-win64-mingw/ openssl req -x509 -sha256 -nodes -days 365 -newkey rsa:2048 -keyout private.key -out certificate_pub.crt
You will get a response similar to the following which prompts you to enter some information about yourself:
Generating a 2048 bit RSA private key .................+++ .......................................+++ writing new private key to 'private.key' ----- You are about to be asked to enter information that will be incorporated into your certificate request. What you are about to enter is what is called a Distinguished Name or a DN. There are quite a few fields but you can leave some blank For some fields there will be a default value, If you enter '.', the field will be left blank. ----- Country Name (2 letter code) []: State or Province Name (full name) []: Locality Name (eg, city) []: Organization Name (eg, company) []: Organizational Unit Name (eg, section) []: Common Name (eg, fully qualified host name) []: Email Address []:
After entering the information two files will be generated:
certificate_pub.crt
andprivate.key
. These files can be found in the same directory that you ran theopenssl
command from.Note
certificate_pub.crt
will expire in 365 days. You can make the period longer by changing the value of days in the openssl command above but rotating credentials periodically is a good security practice.The
certificate_pub.crt
certificate will later be uploaded to the Adobe IO Console for when you create an API key for access to any Adobe I/O API.Your private key file named
private.key
will be used later to sign your JWT token.Note: Don't close this terminal window as you will need it later.
-
Navigate to the Adobe I/O Console and sign in with your Adobe ID.
-
From this page we want to create a New Integration.
-
You will then be prompted to Access an API or to Receive near-real-time events. We will be accessing APIs so select Access an API and then Continue.
-
The drop-down menu on the top right of the screen is where you would switch your organization if your account is tied to multiple. We are selecting Workshop and Data Services under Experience Cloud since we want to access the data services.
-
After your organization is selected there will be a new prompt at the top. We want a New Integration so make sure that option is selected before clicking Continue
-
Fill in your Integration Details. Afterwards, click on Select a File to upload your certificate_pub.crt file we generated in the previous section. Click Create Integration to finish up the process
-
After creating your integration, you will be able to view the details of your integration. After clicking on Retrieve client Secret your screen should look similar to this.
Copy down the values for {API KEY}, {IMS ORG} which is the Organization ID, and {CLIENT SECRET} as these will be used in the next step.
-
Start POSTMan
-
Click the
Import
button on the top left.Select the ExperiencePlatform.postman_collection.json collection file from this repository.
-
Next we need to import our environment. Click on the settings logo
To bring up the Manage Environments dialog.
-
Then click on
Import
-
Select the ExperiencePlatform.postman_environment.json file to import the environment.
-
Now click on the newly imported
Adobe Experience Platform - Environment
. -
Fill out the values for:
- clientID
- clientSecret
- OrgID
- TechAcctID
that you generated when you created your new integration.
Also fill out the
ldap
field with your user id so you'll be able to uniquely identify the datasets you create. -
Copy the contents of the
private.key
and use it as the value forsecret
.For MacOS & Linux platform
From the same terminal you ran
openssl
, execute the following command:pbcopy < private.key
For Windows Platform
From the same terminal you ran
openssl
, execute the following command:notepad private.key
Copy the entire key to the keyboard, including the
-----BEGIN PRIVATE KEY-----
and-----END PRIVATE KEY-----
lines. -
Click
Update
and close theManage Environments
dialog. -
Now make sure you select the
Adobe Experience Platform - Environment
from the environments drop down at the top right of POSTMan. -
After all this setup you are now ready to generate an JWT and bearer token to interact with Adobe I/O. In order to make this process easier we'll be using an Adobe I/O Runtime action.
From our newly imported
Adobe Experience Platform
collection, open chapter 2 and click onAdobe I/O Runtime: Generate Auth
. Then click on the body tab:All of that work you did to setup the environment has been put to good use. Each POSTMan call will take advantage of these values.
-
Now click
Send
and scroll down to the response section:That JSON response includes an
access_token
which is the Bearer token used to authenticate with Adobe I/O. The POSTMan call will save this value in an environment variable for future use.
Whew! We are finally ready to start calling the Adobe Experience Platform API's for real.
Previous: Chapter 1 - XDM and Experience Platform Overview Next: Chapter 3 - Define the Schema