Book description
This IBM Redbooks publication introduces you to business-to-business (B2B) solutions based on IBM WebSphere BI Connect for B2B. In Part 1, you learn about B2B technologies and features, architecture and integration options of WebSphere BI Connect.
Part 2 describes the implementation of three editions of WebSphere BI Connect on Microsoft Windows and AIX. Within an environment of four trading partners, you learn step-by-step how to implement various B2B scenarios. You learn how to integrate an FTP server with WebSphere BI Connect so that you still have the visibility and manageability of WebSphere BI Connect. This part also demonstrates how to implement an AS2 exchange of electronic data interchange (EDI) documents and custom XML documents, as well as how to secure such exchanges via digital signatures and encryption.
Part 3 discusses the integration between WebSphere Data Interchange and WebSphere BI Connect. It shows you how the two products can work together in routing and transforming documents to and from trading partners.
Part 4 discusses how to implement various user exits that allow you to use a custom transport, custom packaging, and custom formats.
Part 5 explains how you can enable RosettaNet support in WebSphere BI Connect. It shows a way to test this support using standard utilities and viewers in WebSphere BI Connect.
Please note that the additional material referenced in the text is not available from IBM.
Table of contents
- Figures (1/3)
- Figures (2/3)
- Figures (3/3)
- Tables
- Examples
- Notices
- Preface
- Part 1: Overview of B2B technology and WebSphere BI Connect
-
Part 2: Building a B2B exchange
-
Chapter 4: Implementation scenarios
- Implementation of WebSphere BI Connect Enterprise for Windows
- Implementation of WebSphere BI Connect Advanced for AIX
- Implementing a basic exchange
- Securing the exchange between Companies E and A
- Implementing WebSphere BI Connect Express for Windows
- Using FTP with WebSphere BI Connect
- Managing a B2B infrastructure
- EDI translation
- Extending WebSphere BI Connect
- Implementing RosettaNet
-
Chapter 5: Implementing WebSphere BI Connect Enterprise in a Windows environment
- Implementation overview
- Verifying software levels on the hub and data machine
- Enabling DB2 stored procedures on the data machine
- Installing the software for the data machine (1/3)
- Installing the software for the data machine (2/3)
- Installing the software for the data machine (3/3)
- Installing the software for the hub machine (1/2)
- Installing the software for the hub machine (2/2)
- Initial configuration of the WebSphere BI Connect server (1/2)
- Initial configuration of the WebSphere BI Connect server (2/2)
- Chapter 6: Implementing WebSphere BI Connect Advanced for AIX
-
Chapter 7: Creating a basic B2B exchange
- Scenario overview
- Configurations tasks for hubadmin of Company E (1/5)
- Configurations tasks for hubadmin of Company E (2/5)
- Configurations tasks for hubadmin of Company E (3/5)
- Configurations tasks for hubadmin of Company E (4/5)
- Configurations tasks for hubadmin of Company E (5/5)
- Configuration tasks by Company E administrator (1/2)
- Configuration tasks by Company E administrator (2/2)
- Configuration tasks for partner Company A (1/2)
- Configuration tasks for partner Company A (2/2)
- Connecting Company E to Company A (1/2)
- Connecting Company E to Company A (2/2)
- Configuration tasks for hubadmin of Company A (1/2)
- Configuration tasks for hubadmin of Company A (2/2)
- Validating communication (1/2)
- Validating communication (2/2)
- Revisiting role-based configuration
-
Chapter 8: Securing the B2B exchange
- What is needed to perform encryption and decryption
- Enabling encryption (1/5)
- Enabling encryption (2/5)
- Enabling encryption (3/5)
- Enabling encryption (4/5)
-
Enabling encryption (5/5)
- Company E generates a public/private key pair
- Company E uploads private key to its own server
- Company E uploads public certificate to partner’s server
- What happens next?
- Company A generates a public/private key pair
- Company A uploads a private key to its own server
- Company A uploads public key to the partner’s server
- Updating the participant connections
- Validating that encryption is enabled
- What is needed to digitally sign and verify the signature?
- Enabling digital signatures (1/3)
- Enabling digital signatures (2/3)
- Enabling digital signatures (3/3)
- Chapter 9: Implementing WebSphere BI Connect Express on Windows
- Chapter 10: Extending the basic B2B exchange
-
Chapter 11: Integrating FTP servers with WebSphere BI Connect
- Scenario overview
- Configuration of Company E for outbound (1/4)
- Configuration of Company E for outbound (2/4)
- Configuration of Company E for outbound (3/4)
- Configuration of Company E for outbound (4/4)
- Configuration of Company E for inbound (1/4)
- Configuration of Company E for inbound (2/4)
- Configuration of Company E for inbound (3/4)
- Configuration of Company E for inbound (4/4)
- Implementing FTPs (1/4)
- Implementing FTPs (2/4)
- Implementing FTPs (3/4)
- Implementing FTPs (4/4)
- Summary
- Chapter 12: Managing the B2B exchange
-
Chapter 4: Implementation scenarios
-
Part 3: Integration with WebSphere Data Interchange
- Chapter 13: Introduction to EDI technology and WebSphere Data Interchange
-
Chapter 14: WebSphere Data Interchange infrastructure and implementation
- The system view of WebSphere Data Interchange
- Step-by-step implementation (1/2)
- Step-by-step implementation (2/2)
- The component view of WebSphere Data Interchange (1/4)
- The component view of WebSphere Data Interchange (2/4)
- The component view of WebSphere Data Interchange (3/4)
- The component view of WebSphere Data Interchange (4/4)
-
Chapter 15: Integration with WebSphere Data Interchange
- Overview of implemented scenarios
- Setting up JMS for WebSphere BI Connect (1/3)
- Setting up JMS for WebSphere BI Connect (2/3)
- Setting up JMS for WebSphere BI Connect (3/3)
- Handling the inbound document flow (1/6)
- Handling the inbound document flow (2/6)
- Handling the inbound document flow (3/6)
- Handling the inbound document flow (4/6)
- Handling the inbound document flow (5/6)
- Handling the inbound document flow (6/6)
- Handling the outbound document flow (1/3)
- Handling the outbound document flow (2/3)
- Handling the outbound document flow (3/3)
- Using a translation table
- Adding a new EDI transaction
- Summary
-
Part 4: Extending the features of WebSphere BI Connect
- Chapter 16: Introduction to the user exit framework
- Chapter 17: Business case and development methodology for implementing user exits
-
Chapter 18: Implementing receiver and sender user exits
- Updating WebSphere BI Connect
- The frameworks and building blocks
- The receiver (1/3)
- The receiver (2/3)
- The receiver (3/3)
- The sender (1/3)
- The sender (2/3)
- The sender (3/3)
- Deploying and testing the receiver and sender (1/4)
- Deploying and testing the receiver and sender (2/4)
- Deploying and testing the receiver and sender (3/4)
- Deploying and testing the receiver and sender (4/4)
- Testing the flow
- Summary
-
Chapter 19: Implementing workflow user exits
- Document processing with document workflow
- Business case and document processing requirements (1/2)
- Business case and document processing requirements (2/2)
- Designing the document process (1/7)
- Designing the document process (2/7)
- Designing the document process (3/7)
- Designing the document process (4/7)
- Designing the document process (5/7)
- Designing the document process (6/7)
- Designing the document process (7/7)
- Developing a fixed workflow
- Developing a variable workflow
- Creating the ITSO workflow (1/3)
- Creating the ITSO workflow (2/3)
- Creating the ITSO workflow (3/3)
- Deploying and testing the ITSO workflow (1/8)
- Deploying and testing the ITSO workflow (2/8)
- Deploying and testing the ITSO workflow (3/8)
- Deploying and testing the ITSO workflow (4/8)
- Deploying and testing the ITSO workflow (5/8)
- Deploying and testing the ITSO workflow (6/8)
- Deploying and testing the ITSO workflow (7/8)
- Deploying and testing the ITSO workflow (8/8)
- Testing the flow (1/2)
- Testing the flow (2/2)
-
Part 5: Implementing RosettaNet in WebSphere BI Connect
- Chapter 20: Introduction to RosettaNet
-
Chapter 21: Implementing a RosettaNet solution
- WebSphere BI Connect RosettaNet overview
- Trading scenario overview
- Configuration tasks for hubadmin of Company E (1/5)
- Configuration tasks for hubadmin of Company E (2/5)
- Configuration tasks for hubadmin of Company E (3/5)
- Configuration tasks for hubadmin of Company E (4/5)
- Configuration tasks for hubadmin of Company E (5/5)
- Configuration tasks for hubadmin of Company A (1/4)
- Configuration tasks for hubadmin of Company A (2/4)
- Configuration tasks for hubadmin of Company A (3/4)
- Configuration tasks for hubadmin of Company A (4/4)
- Validating the RosettaNet configuration (1/4)
- Validating the RosettaNet configuration (2/4)
- Validating the RosettaNet configuration (3/4)
- Validating the RosettaNet configuration (4/4)
- Appendix A: Hardware and software configuration
- Appendix B: Additional material
- Abbreviations and acronyms
- Related publications
- Index (1/3)
- Index (2/3)
- Index (3/3)
- Back cover
Product information
- Title: B2B Solutions using WebSphere BI Connect Version 4.2.2
- Author(s):
- Release date: March 2005
- Publisher(s): IBM Redbooks
- ISBN: None
You might also like
book
Exporting: The Definitive Guide to Selling Abroad Profitably
Exporting: The Definitive Guide to Selling Abroad Profitably is for entrepreneurs and small business owners—the makers, …
book
Mastering the Nikon D7100
Mastering the Nikon D7100 by Darrell Young provides a wealth of experience-based information and insights for …
book
Engaged Ownership
Successful ownership transition requires effective decision making at the top Engaged Ownership is the definitive owner's …
book
IBM e-business Technology, Solution, and Design Overview
In a few short years, e-business has gone from a simple concept to an undeniable reality, …