Sign In   Register

When working with Temenos Journey Manager (JM), there may be instances where specific files cannot be directly uploaded to the platform. To address this, hosting files externally through a CDN, AEM, or your web server ensures accessibility and security.

This article provides a step-by-step guide to setting up external hosting and configuring your system for safe integration.

Applicable To

Product: Temenos Journey Manager
Module: Manager, Maestro
Version(s): All

Step-by-Step Guide

1 - Choose a Hosting Service

Select a hosting service that best fits your requirements:

  • CDNs (Content Delivery Networks): Ideal for static content. Examples: AWS CloudFront, Akamai, Cloudflare.
  • AEM (Adobe Experience Manager): Best suited for integrated web content management.
  • Your Own Website/Server: Useful for custom hosting solutions tailored to your environment.

2 - Configure Content Security Policy (CSP)

To allow secure access to externally hosted files, update your Content Security Policy (CSP) settings.

Example CSP Configuration:

3 - Update System Settings

Ensure your system is configured to allow the retrieval of resources from the chosen host. This may involve:

  • Updating configuration files.
  • Adjusting application security settings.
  • Verifying firewall rules permit external access.

4 - Test the Configuration

After updating the CSP and system settings:

  • Access Verification: Confirm that your application can retrieve the externally hosted files.
  • Security Validation: Ensure files are accessible only as intended and remain secure from unauthorized access.

5 - Monitor and Maintain

Security requirements and hosting configurations may evolve. Regularly:

  • Review and update CSP settings.
  • Monitor file accessibility and system logs.
  • Adapt configurations to meet compliance and organizational policies.

Conclusion

Hosting files externally and properly configuring your CSP and system settings can overcome Journey Manager’s file upload limitations while enhancing security and control. Following these steps ensures your applications remain compliant, secure, and optimized for performance.