<< Click to Display Table of Contents >> Best Practice Configuration |
Step-by-step implementation instruction:
1.Create the required credentials.
2.Add the credentials to the connector and execute it.
3.Add the extracted data to the data processing and push it to applications.