
Chapter 4. Implementation scenarios 49
4.4 Securing the exchange between Companies E and A
In Chapter 7, “Creating a basic B2B exchange” on page 121, we assume default
values for the AS2 connection. This means that no encryption or digital
signatures are used. The EDI document is sent in clear text. This is not good
enough for a real-world implementation.
Chapter 8, “Securing the B2B exchange” on page 189, explains how to secure
the exchange of EDI documents. It demonstrates how to obtain keys and
certificates and how to upload them to WebSphere BI Connect. This is done to
switch to an AS2 connection where sensitive business data is encrypte ...