B2B Solutions using WebSphere BI Connect Version 4.2.2

Book description

This IBM Redbooks publication introduces you to business-to-business (B2B) solutions based on IBM WebSphere BI Connect for B2B. In Part 1, you learn about B2B technologies and features, architecture and integration options of WebSphere BI Connect.

Part 2 describes the implementation of three editions of WebSphere BI Connect on Microsoft Windows and AIX. Within an environment of four trading partners, you learn step-by-step how to implement various B2B scenarios. You learn how to integrate an FTP server with WebSphere BI Connect so that you still have the visibility and manageability of WebSphere BI Connect. This part also demonstrates how to implement an AS2 exchange of electronic data interchange (EDI) documents and custom XML documents, as well as how to secure such exchanges via digital signatures and encryption.

Part 3 discusses the integration between WebSphere Data Interchange and WebSphere BI Connect. It shows you how the two products can work together in routing and transforming documents to and from trading partners.

Part 4 discusses how to implement various user exits that allow you to use a custom transport, custom packaging, and custom formats.

Part 5 explains how you can enable RosettaNet support in WebSphere BI Connect. It shows a way to test this support using standard utilities and viewers in WebSphere BI Connect.

Please note that the additional material referenced in the text is not available from IBM.

Table of contents

  1. Figures (1/3)
  2. Figures (2/3)
  3. Figures (3/3)
  4. Tables
  5. Examples
  6. Notices
    1. Trademarks
  7. Preface
    1. The team that wrote this redbook
    2. Become a published author
    3. Comments welcome
  8. Part 1: Overview of B2B technology and WebSphere BI Connect
    1. Chapter 1: Business-to-business concepts
      1. Impact of the Internet on the world of business applications
      2. E-commerce
        1. Business-to-consumer
        2. Business-to-business
        3. Evolution of the B2B data structures
        4. Evolution of B2B data communications
      3. Enterprise application integration and B2B
      4. B2B integration (1/2)
      5. B2B integration (2/2)
        1. Types of B2B integration
        2. Summary
    2. Chapter 2: B2B technologies and standards
      1. Requirements for a B2B solution
      2. Some terminology (1/2)
      3. Some terminology (2/2)
        1. Messaging and queuing
        2. Electronic data interchange
        3. Transport protocols
        4. Security
        5. Java
        6. Extensible Markup Language
        7. Web services
    3. Chapter 3: Introduction to WebSphere BI Connect
      1. Features of WebSphere BI Connect
      2. Architecture of WebSphere BI Connect
        1. Run-time components
        2. Configuration components
        3. Profile management
      3. B2B features and standards
        1. Transport options
        2. Messaging protocol options
        3. Business document formats
        4. Security options in WebSphere BI Connect
      4. Integration options
  9. Part 2: Building a B2B exchange
    1. Chapter 4: Implementation scenarios
      1. Implementation of WebSphere BI Connect Enterprise for Windows
      2. Implementation of WebSphere BI Connect Advanced for AIX
      3. Implementing a basic exchange
      4. Securing the exchange between Companies E and A
      5. Implementing WebSphere BI Connect Express for Windows
      6. Using FTP with WebSphere BI Connect
      7. Managing a B2B infrastructure
      8. EDI translation
      9. Extending WebSphere BI Connect
      10. Implementing RosettaNet
    2. Chapter 5: Implementing WebSphere BI Connect Enterprise in a Windows environment
      1. Implementation overview
      2. Verifying software levels on the hub and data machine
        1. Verifying WebSphere MQ
        2. Verifying DB2
      3. Enabling DB2 stored procedures on the data machine
        1. Installing .NET Framework and SDK
        2. Configuring DB2 to use the .NET SDK
      4. Installing the software for the data machine (1/3)
      5. Installing the software for the data machine (2/3)
      6. Installing the software for the data machine (3/3)
        1. Adding user IDs and a group
        2. Configuring WebSphere MQ
        3. Installing the database schema
        4. Local validation
      7. Installing the software for the hub machine (1/2)
      8. Installing the software for the hub machine (2/2)
        1. Adding a user and group
        2. Installing the product code
        3. Local validation
      9. Initial configuration of the WebSphere BI Connect server (1/2)
      10. Initial configuration of the WebSphere BI Connect server (2/2)
    3. Chapter 6: Implementing WebSphere BI Connect Advanced for AIX
      1. Implementation overview
      2. Verifying software levels on the AIX machine
        1. Verifying DB2
        2. Verifying WebSphere MQ
      3. Enabling DB2 stored procedures
      4. Software installation (1/4)
      5. Software installation (2/4)
      6. Software installation (3/4)
      7. Software installation (4/4)
        1. Adding user accounts
        2. Configuring WebSphere MQ
        3. Installing the database schema
        4. Installing the product code
        5. Local validation
      8. Initial configuration of the WebSphere BI Connect server
    4. Chapter 7: Creating a basic B2B exchange
      1. Scenario overview
        1. Role-based configuration
        2. Outbound flow
        3. Inbound flow
      2. Configurations tasks for hubadmin of Company E (1/5)
      3. Configurations tasks for hubadmin of Company E (2/5)
      4. Configurations tasks for hubadmin of Company E (3/5)
      5. Configurations tasks for hubadmin of Company E (4/5)
      6. Configurations tasks for hubadmin of Company E (5/5)
        1. Creating targets
        2. Creating interactions
        3. Creating a community manager
        4. Creating a community participant
      7. Configuration tasks by Company E administrator (1/2)
      8. Configuration tasks by Company E administrator (2/2)
        1. Initial logon by community manager
        2. Creating a gateway
        3. Providing B2B capabilities
      9. Configuration tasks for partner Company A (1/2)
      10. Configuration tasks for partner Company A (2/2)
      11. Connecting Company E to Company A (1/2)
      12. Connecting Company E to Company A (2/2)
      13. Configuration tasks for hubadmin of Company A (1/2)
      14. Configuration tasks for hubadmin of Company A (2/2)
      15. Validating communication (1/2)
      16. Validating communication (2/2)
      17. Revisiting role-based configuration
    5. Chapter 8: Securing the B2B exchange
      1. What is needed to perform encryption and decryption
      2. Enabling encryption (1/5)
      3. Enabling encryption (2/5)
      4. Enabling encryption (3/5)
      5. Enabling encryption (4/5)
      6. Enabling encryption (5/5)
        1. Company E generates a public/private key pair
        2. Company E uploads private key to its own server
        3. Company E uploads public certificate to partner’s server
        4. What happens next?
        5. Company A generates a public/private key pair
        6. Company A uploads a private key to its own server
        7. Company A uploads public key to the partner’s server
        8. Updating the participant connections
        9. Validating that encryption is enabled
      7. What is needed to digitally sign and verify the signature?
      8. Enabling digital signatures (1/3)
      9. Enabling digital signatures (2/3)
      10. Enabling digital signatures (3/3)
        1. Changes to be performed on the server of Company A
        2. Changes to perform on the server of Company E
        3. Validating that digital signatures are enabled
    6. Chapter 9: Implementing WebSphere BI Connect Express on Windows
      1. Overview of the Express edition
      2. Software installation and configuration
      3. Initial configuration of the WebSphere BI Connect Express server (1/2)
      4. Initial configuration of the WebSphere BI Connect Express server (2/2)
    7. Chapter 10: Extending the basic B2B exchange
      1. Scenario overview
      2. Implementation steps
      3. Configuration of the Company X machine
        1. Customizing the profile of participant Company E
        2. Customizing My Profile
      4. Additional configuration for Company E (1/4)
      5. Additional configuration for Company E (2/4)
      6. Additional configuration for Company E (3/4)
      7. Additional configuration for Company E (4/4)
        1. Updating the profile of hubadmin
        2. Updating the profile of Company X on the Company E server
        3. Updating the profile of Company E on the Company E server
      8. Validating communication
        1. Sending XML documents from Company E to Company X
        2. Sending XML documents from Company X to Company E
    8. Chapter 11: Integrating FTP servers with WebSphere BI Connect
      1. Scenario overview
      2. Configuration of Company E for outbound (1/4)
      3. Configuration of Company E for outbound (2/4)
      4. Configuration of Company E for outbound (3/4)
      5. Configuration of Company E for outbound (4/4)
        1. Implementation steps
        2. Creating a directory structure
        3. Updating the profile of hubadmin
        4. Updating the profile of Company F
        5. Updating the profile of Company E
        6. Creating a participant connection
        7. Validating communication
      6. Configuration of Company E for inbound (1/4)
      7. Configuration of Company E for inbound (2/4)
      8. Configuration of Company E for inbound (3/4)
      9. Configuration of Company E for inbound (4/4)
        1. Installing an FTP server
        2. Configuring the FTP server
        3. Updating the configuration of WebSphere BI Connect
        4. Validating communication
      10. Implementing FTPs (1/4)
      11. Implementing FTPs (2/4)
      12. Implementing FTPs (3/4)
      13. Implementing FTPs (4/4)
        1. Enabling FTPS for the FTP server of Company F
        2. Uploading certificates in WebSphere BI Connect of Company E
        3. Updating the FTP gateway
        4. Validating outbound communication
        5. Using FTPS for inbound communication
      14. Summary
    9. Chapter 12: Managing the B2B exchange
      1. Overview of tools to manage the exchange
      2. System log files
      3. Event Viewer
      4. Document Viewer
      5. AS1/AS2 Viewer
      6. Gateway queue
      7. Using the tools to solve problems (1/3)
      8. Using the tools to solve problems (2/3)
      9. Using the tools to solve problems (3/3)
        1. MDN HTTP URL not defined
        2. Problems with encryption
        3. Problems with digital signatures
  10. Part 3: Integration with WebSphere Data Interchange
    1. Chapter 13: Introduction to EDI technology and WebSphere Data Interchange
      1. EDI terms and concepts
      2. Benefits of EDI
      3. EDI components
        1. Message standards
        2. Communication
      4. The evolution of EDI (1/2)
      5. The evolution of EDI (2/2)
        1. Elements of an EDI solution
        2. The IBM EDI solution
        3. Features of WebSphere Data Interchange
      6. Usage patterns for WebSphere Data Interchange
        1. A point-to-point solution
        2. An integration broker solution
        3. A B2B gateway solution
      7. Internet references
    2. Chapter 14: WebSphere Data Interchange infrastructure and implementation
      1. The system view of WebSphere Data Interchange
        1. Development environment
        2. Run-time environment
      2. Step-by-step implementation (1/2)
      3. Step-by-step implementation (2/2)
        1. WebSphere Data Interchange Server installation and setup
        2. Setting up the WebSphere Data Interchange database
        3. Setting up WebSphere MQ objects
        4. WebSphere Data Interchange Client installation and setup
        5. Setting up a connection to the database
      4. The component view of WebSphere Data Interchange (1/4)
      5. The component view of WebSphere Data Interchange (2/4)
      6. The component view of WebSphere Data Interchange (3/4)
      7. The component view of WebSphere Data Interchange (4/4)
        1. Mailbox profiles
        2. Network profiles
        3. WebSphere MQ-related artifacts
        4. Service profiles
        5. Trading Partner profiles
        6. Rules
        7. Final view of a running WebSphere Data Interchange system
    3. Chapter 15: Integration with WebSphere Data Interchange
      1. Overview of implemented scenarios
        1. Phase 1: Transforming XML into EDI for Company A
        2. Phase 2: EDI for Company A and XML for Company X
        3. Phase 3: Managing business identifiers
        4. Phase 4: Multiple EDI transactions and internal applications
      2. Setting up JMS for WebSphere BI Connect (1/3)
      3. Setting up JMS for WebSphere BI Connect (2/3)
      4. Setting up JMS for WebSphere BI Connect (3/3)
        1. Connecting the queue managers
        2. Enabling JMS
        3. Creating the JMS gateway
        4. Creating the JMS target
        5. Validating the JMS and MQ configuration
      5. Handling the inbound document flow (1/6)
      6. Handling the inbound document flow (2/6)
      7. Handling the inbound document flow (3/6)
      8. Handling the inbound document flow (4/6)
      9. Handling the inbound document flow (5/6)
      10. Handling the inbound document flow (6/6)
        1. Document definition for XML
        2. Document definition for EDI
        3. Transformation map for EDI to XML
        4. Trading partner setup
        5. Rule or usage for the transformation map
        6. Supporting definitions
        7. Putting it all together
        8. Validating the map and the supporting setup
      11. Handling the outbound document flow (1/3)
      12. Handling the outbound document flow (2/3)
      13. Handling the outbound document flow (3/3)
        1. Detailed review of the map XML-XML-850
        2. Detailed review of the map XML-EDI-850
        3. Detailed review of the map XML-ROUTER
        4. Additional supporting definitions
      14. Using a translation table
        1. Validating the maps and supporting definitions
      15. Adding a new EDI transaction
      16. Summary
  11. Part 4: Extending the features of WebSphere BI Connect
    1. Chapter 16: Introduction to the user exit framework
      1. User exits and document flow
      2. User exits and components (1/2)
      3. User exits and components (2/2)
        1. Receivers
        2. Inbound Fixed Workflow
        3. Variable Workflow
        4. Outbound Fixed Workflow
        5. Senders
    2. Chapter 17: Business case and development methodology for implementing user exits
      1. Business case
        1. Use case
        2. Summary
      2. User exit development methodology (1/6)
      3. User exit development methodology (2/6)
      4. User exit development methodology (3/6)
      5. User exit development methodology (4/6)
      6. User exit development methodology (5/6)
      7. User exit development methodology (6/6)
        1. Requirement gathering
        2. Design
        3. Implementation
        4. Testing methodology
        5. Error handling, problem determination in WebSphere BI Connect
        6. Business case test strategy
        7. Predeployment tests
        8. Deployment
        9. Post-deployment tests
    3. Chapter 18: Implementing receiver and sender user exits
      1. Updating WebSphere BI Connect
      2. The frameworks and building blocks
        1. Transport development
      3. The receiver (1/3)
      4. The receiver (2/3)
      5. The receiver (3/3)
        1. Receiver processing flow
        2. The receiver framework
        3. WebSphere BI Connect provided receiver and custom handlers
      6. The sender (1/3)
      7. The sender (2/3)
      8. The sender (3/3)
        1. Sender processing flow
        2. The sender framework
        3. WebSphere BI Connect provided sender and custom handlers
      9. Deploying and testing the receiver and sender (1/4)
      10. Deploying and testing the receiver and sender (2/4)
      11. Deploying and testing the receiver and sender (3/4)
      12. Deploying and testing the receiver and sender (4/4)
        1. Creating the user exits JAR file
        2. Receiver deployment and configuration
        3. Sender configuration
      13. Testing the flow
      14. Summary
    4. Chapter 19: Implementing workflow user exits
      1. Document processing with document workflow
        1. Component interaction
        2. Document processing
      2. Business case and document processing requirements (1/2)
      3. Business case and document processing requirements (2/2)
        1. ITSO specific requirements
        2. Business object framework
        3. Business case development
      4. Designing the document process (1/7)
      5. Designing the document process (2/7)
      6. Designing the document process (3/7)
      7. Designing the document process (4/7)
      8. Designing the document process (5/7)
      9. Designing the document process (6/7)
      10. Designing the document process (7/7)
        1. Creating document flow definitions
        2. Creating an interaction
        3. Configuring B2B capabilities
      11. Developing a fixed workflow
        1. BusinessProcessHandlerInterface
        2. Fixed inbound workflow
        3. Fixed outbound workflow
      12. Developing a variable workflow
        1. BusinessProcessFactoryInterface
        2. BusinessProcessInterface
      13. Creating the ITSO workflow (1/3)
      14. Creating the ITSO workflow (2/3)
      15. Creating the ITSO workflow (3/3)
        1. Company A
        2. Company E
      16. Deploying and testing the ITSO workflow (1/8)
      17. Deploying and testing the ITSO workflow (2/8)
      18. Deploying and testing the ITSO workflow (3/8)
      19. Deploying and testing the ITSO workflow (4/8)
      20. Deploying and testing the ITSO workflow (5/8)
      21. Deploying and testing the ITSO workflow (6/8)
      22. Deploying and testing the ITSO workflow (7/8)
      23. Deploying and testing the ITSO workflow (8/8)
        1. Creating the user exits JAR file
        2. Company A workflow deployment
        3. Company E workflow deployment
      24. Testing the flow (1/2)
      25. Testing the flow (2/2)
  12. Part 5: Implementing RosettaNet in WebSphere BI Connect
    1. Chapter 20: Introduction to RosettaNet
      1. A brief history
        1. IBM’s involvement with the RosettaNet organization
        2. Interoperability
        3. Electronic business exchange
      2. Partner Interface Process
        1. Cluster 0: RosettaNet Support
        2. Cluster 1: Partner Product and Service Review
        3. Cluster 2: Product Information
        4. Cluster 3: Order Management
        5. Cluster 4: Inventory Management
        6. Cluster 5: Marketing Information Management
        7. Cluster 6: Service and Support
        8. Cluster 7: Manufacturing
      3. RosettaNet Dictionary Framework
        1. RosettaNet Business Dictionary
        2. RosettaNet Technical Dictionary
      4. RosettaNet Implementation Framework
        1. RNIF Version 1.1
        2. RNIF version 2.0
        3. RosettaNet business message (RNIF v2.0)
    2. Chapter 21: Implementing a RosettaNet solution
      1. WebSphere BI Connect RosettaNet overview
      2. Trading scenario overview
        1. PIP 3A4 document flow (dual action PIP)
      3. Configuration tasks for hubadmin of Company E (1/5)
      4. Configuration tasks for hubadmin of Company E (2/5)
      5. Configuration tasks for hubadmin of Company E (3/5)
      6. Configuration tasks for hubadmin of Company E (4/5)
      7. Configuration tasks for hubadmin of Company E (5/5)
        1. Setting up MQ queues
        2. Setting up JMS environment
        3. Adding DUNS identifiers to each profile
        4. Setting up targets and gateways
        5. Uploading RosettaNet packages
        6. Creating interactions for RosettaNet
        7. Configuring the B2B capabilities
        8. Configuring the participant connections
        9. Providing failure notification
      8. Configuration tasks for hubadmin of Company A (1/4)
      9. Configuration tasks for hubadmin of Company A (2/4)
      10. Configuration tasks for hubadmin of Company A (3/4)
      11. Configuration tasks for hubadmin of Company A (4/4)
        1. Setting up MQ queues
        2. Setting up the JMS environment
        3. Adding the DUNS IDs to each profile
        4. Setting up targets and gateways
        5. Uploading the RosettaNet packages
        6. Creating interactions for RosettaNet
        7. Configuring B2B capabilities
        8. Configuring participant connections
      12. Validating the RosettaNet configuration (1/4)
      13. Validating the RosettaNet configuration (2/4)
      14. Validating the RosettaNet configuration (3/4)
      15. Validating the RosettaNet configuration (4/4)
        1. Sending the P.O. request message from a buyer to seller
        2. Sending the confirmation message from seller to buyer
        3. Viewing RosettaNet transactions
    3. Appendix A: Hardware and software configuration
      1. Configuration for the hub machine
      2. Configuration for the data machine
      3. Configuration for the EDI translation machine
      4. Configuration for the UNIX machine of Company A
      5. Configuration for the Windows machine of Company X
      6. Configuration for the Windows machine of Company F
    4. Appendix B: Additional material
      1. Locating the Web material
      2. Using the Web material
        1. System requirements for downloading and using the Web material
    5. Abbreviations and acronyms
    6. Related publications
      1. IBM Redbooks
      2. Online resources
      3. How to get IBM Redbooks
      4. Help from IBM
    7. Index (1/3)
    8. Index (2/3)
    9. Index (3/3)
    10. Back cover

Product information

  • Title: B2B Solutions using WebSphere BI Connect Version 4.2.2
  • Author(s): Geert Van de Putte, Jeff Brent, Ronan Dalton, Rich Kinard, Benjamin Thurgood
  • Release date: March 2005
  • Publisher(s): IBM Redbooks
  • ISBN: None