Glyue User Docs
  • What is Glyue?
  • Tutorials
    • Start Here
    • Building a Single-Step Integration
      • 1. Creating the Integration
      • 2. Calling the External System
      • 3. Running the Integration
      • 4. Crafting the Output
    • Building a Multi-System Integration
      • 1. Connecting to the Core
      • 2. Field Mapping
      • 3. Running the Integration
    • Building an Event-Driven Integration
      • 1. Setting up the Mock CRM
      • 2. Receiving Inbound Requests
      • 3. Triggering the Integration from the CRM
    • Building an Email Integration
      • 1. Create and Configure the Integration
      • 2. Input Validation
      • 3. Get Story IDs from Hacker News
      • 4. Get Story Content
      • 5. Sending the Email
      • 6. Wrapping Up
      • 7. Extra credit
        • extra_credit.json
    • Building a RESTful CRUD Web Service
      • 1. Integration Setup
      • 2. Vault Setup
      • 3. Create Web Service Endpoints
      • 4. Execute Web Service Endpoints with Vault Methods
      • 5. Vault Code Examples and Explanation
    • Building a Retrieval API against FIS CodeConnect
      • 1. Integration Setup
      • 2. Service Request Setup
      • 3. Field Mapping Setup
      • 4. Integration and Service Request Hook Setup
      • 5. Testing the Integration
      • 6. Common Errors
    • What is Pre-Mapping?
      • Before you start
      • Bookmarks
      • Source and Targets
      • Field Mapping Status
      • Field Mapping Comments
      • Summary
  • How-To Guides
    • How to Run an Integration from Glyue
    • How to Invite New Users
    • How to Create a Value Mapping Set
    • How to Build and Deploy a Custom Frontend
    • How to Migrate an Integration
    • How to Set Up Single Sign On (SSO)
      • Glyue Setup
      • JumpCloud Setup
      • Azure Setup
      • Okta Setup
      • Glyue SAML Config Reference
    • How to Install the Glyue App for Zoom Contact Center
    • How to use the Vault
  • Reference
    • Integration Builder Page
    • Integration Anatomy
    • Integration Components
      • Integration
      • Service Request
      • Field Mapping
      • Value Mapping Set
      • Value Mapping
      • Validation Rule
      • Mask
      • Integration Config
      • Integration Engine Versions
    • Integration Lifecycle
    • Special Functions
      • add_run_label
      • callint
      • debug
      • end
      • get_namespace
      • humanize
      • import_helper
      • keep
      • list_files
      • map_value
      • open_glyuefile
      • open_vault
      • Data Manipulation Utilities
      • calladapter
    • Special Variables
      • __adapter_config__
      • input
      • parentint
      • retvalue
      • run_history_id
      • Iterables
        • fitem/fidx
        • sritem/sridx
        • vritem/vridx/vrmsg
    • Adapters
      • Generic HTTP Adapter
      • Email SMTP Adapter
    • Web Service Endpoints
    • Vault Reference
  • Glyue Platform Reference
    • Banking Core Connectivity Guide
    • Authentication
    • Permissions
      • Service Accounts
      • Organizations
    • Frontends
    • Idempotency Layer
    • Integration Scheduler
    • Governance Reports
    • Arbitrary Integration Request Content Support
    • Admin Components
    • Logging
  • ETL
    • Glyue ETL Overview
    • Data Connectors
    • Workflows
    • Run History
    • Scheduler
Powered by GitBook
On this page
  • 1. Establish a VPN
  • 2. Configure Glyue in the core’s middleware
  • 3. Create a service account

Was this helpful?

  1. Glyue Platform Reference

Banking Core Connectivity Guide

PreviousVault ReferenceNextAuthentication

Last updated 11 months ago

Was this helpful?

Glyue integrates across your technology stack, including on-prem systems. The most common type of on-prem system is a core, and often, its associated middleware.

An on-premises system is a system that is on its own, internal network, and is not accessible by systems that are not on that network.

Below are the steps outlining how Glyue establishes connectivity with an on-prem core. Some details may differ depending on the specifics of a core/middleware, but the high level steps remain the same.

At a high level, there are three steps:

  1. Establish a VPN between Glyue’s servers and your bank’s internal network

  2. Configure middleware for Glyue API access

  3. Create a service account for Glyue on the core

Let’s explore each step in detail below.


1. Establish a VPN

A VPN (Virtual Private Network) is a private “tunnel” between systems, in this case, Glyue servers and your on-prem core. Glyue uses a VPN to communicate with your core to keep the information secure and private. Setting up a VPN will require coordination between your IT team and Glyue’s network engineers.

Once the VPN is set up, your IT team will expose certain systems to the VPN so they can be accessed by Glyue. This can be your core and middleware, a database, or other systems running on your internal network.

Some cores may not be hosted on-prem, but instead as a managed service in a 3rd-party datacenter, such as one managed by the core’s vendor. For these setups, Glyue does not require a VPN to your network, and will instead work with you and the vendor to establish access to your core via the managed datacenter.

2. Configure Glyue in the core’s middleware

Most cores have an associated system called a “middleware” that sits between the core and external systems, governing access to the core. Glyue will need to be configured as an application in the middleware, along with the permissions necessary to execute your use cases.

Sandbox staff will work with you to determine the correct set of permissions for your specific needs.

If you do not have a middleware instance set up, you will need to work with your core vendor to install/license one before Glyue can integrate with your core.

3. Create a service account

Once Glyue is configured in the middleware, it needs an account on the core in order to read data and make changes. This is called a “service account”, to indicate that it’s being used by a service (Glyue) instead of a regular employee of the bank.

Glyue’s service account will also need the appropriate permissions to execute its intended use cases. These will be similar to, but may not exactly mirror, the permissions set earlier in the middleware configuration step.

If you are building multiple integrations with separate purposes, it may be appropriate to create separate service accounts for each integration. Consult with your Sandbox Banking engineers to determine the best approach.


Once a VPN, middleware configuration, and core service account are set up, you will have the necessary information to set up the access credentials within Glyue. This can be done via the on Glyue’s Build page.

configuration wizard
VPN Infrastructure Diagram