Beruflich Dokumente
Kultur Dokumente
VERSION 3.5.2
Information in this document is subject to change without notice and does not represent a commitment on the
part of Liaison. The documentation is provided as is without warranty of any kind including without limitation,
any warranty of merchantability or fitness for a particular purpose. Further, Liaison does not warrant, guarantee,
or make any representations regarding the use, or the results of the use, of the software or written material in
terms of correctness, accuracy, reliability, or otherwise.
Liaison is a trade name and registered trademark in the United States and other countries. The names of actual
companies and products mentioned herein may be the trademarks of their respective owners.
Table of Contents
Chapter 1: Overview
Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
What is Trading Community Manager? . . . . . . . . . . . . . . . . . . . . . . . . . . 11
About This Document. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Audience . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
Introduction to the Commerce Suite Documentation Set . . . . . . . . . . . . . 14
Commerce Suite Documentation Roadmap. . . . . . . . . . . . . . . . . . . . . . . 15
Documentation Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
Chapter 2: Getting Started with Trading Community Manager
Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
Opening and Closing TCM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
Opening TCM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
Logging In for the First Time . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
Closing TCM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
Navigating TCM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
Parts of the User Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
Navigation Pane . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
Information Pane . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
Using Online Help . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
Allowing Blocked Content . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
Printing a Help Topic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
Managing Services. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
What is a Service? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
Viewing Your Server Service List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
Viewing Server Service Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72
Creating a Service. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
Editing a Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74
Deleting a Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74
Chapter 1: Overview
Introduction .....................................................................................................11
What is Trading Community Manager? ..........................................................11
About This Document .................................................................................... 12
Audience........................................................................................................ 13
Introduction to the Commerce Suite Documentation Set............................... 14
Commerce Suite Documentation Roadmap .................................................. 15
Documentation Conventions.......................................................................... 17
Chapter 1: Overview
Introduction
Introduction
Welcome to the Commerce Suite Trading Community Manager User Guide. This
guide is provides instructions on how to create and manage trading partner
communities as well as how to manage work orders and certificates.
This guide assumes knowledge of the Windows operating system, including its
applications, network, and environment. If you are not familiar with the Windows
operating system, refer to the Microsoft library of manuals.
11
Chapter 1: Overview
About This Document
12
Chapter 1: Overview
Audience
Audience
This guide is intended primarily for use by nuBridges Commerce Suite data
administration personnel responsible for installation, configuration, maintenance, and
use of the Commerce Suite system.
This document has been written with the assumption that nuBridges Commerce Suite
administrators and users have a general understanding of the following concepts and
technologies:
Your business application software and business practices
Electronic Data Interchange over the Internet (EDI-INT)
E-Commerce
Uniform Code Council (UCC)
Data types
Transport protocols
Security standards
The Internet
Windows operating systems
UNIX operating system
13
Chapter 1: Overview
Introduction to the Commerce Suite Documentation Set
14
Chapter 1: Overview
Commerce Suite Documentation Roadmap
To Learn About...
New features
Maintenance updates
Documentation updates
Important notes
The nuBridges AS2 solution
Installing Commerce Suite
Firewall configuration
Licensing and upgrading
Configuring Commerce Suite
Testing Commerce Suite
Work orders
Configuration files
Sending and receiving data
Adding new trading partners
Testing trading partner connectivity
Connecting Commerce Suite to a
supported RDBMS
Oracle, SQL, DB2, Access, and
Informix database support
15
Chapter 1: Overview
Commerce Suite Documentation Roadmap
Read...
Configuring Commerce Suite Clusters
To Learn About...
Understanding
clusters
Commerce
Setting up a cluster
configuration file
Suite
using
Commerce
Suite
partners
and
16
Chapter 1: Overview
Documentation Conventions
Documentation Conventions
This section will familiarize you with the features of this guide. As you will notice,
the left side of this guide has a section that is used for notes, references, and warnings.
These notes are identified by the following icons:
Designates a reference relevant to the adjacent text. The
reference may refer to a procedure, text in another
document, or a definition.
Designates there is additional information that is relevant
to the text on the right side.
Designates a warning or important piece of information.
This guide also utilizes text formatting to help you locate and identify information.
Review the table below for details on the text formatting used in this guide.
Text Format
Bold
Italics
Bold Italics
Example
Click Done.
or
Go to the User Details section.
See the Introduction section
on page 6.
or
Open the configuration.cfg file.
e222
or
Review the nuBridges
Commerce Suite User Guide
for more information.
Explanation
Denotes a section of a screen, field,
button, page, menu, or literal text
that should be typed.
Denotes a reference to a document
section, chapter, or a filename.
SMALL CAPS
Press ENTER.
17
Chapter 1: Overview
Documentation Conventions
Text Format
{}
|
[]
...
Example
Explanation
Indicates the line of code wraps to
addpair <from> <to>
the next line in this documentation
<to-URL> <rcpt-URL>
only. When you enter the code in
<notify-name> <inbox>
Commerce Suite, it should not be
[in|out] [<send-parma>] split between multiple lines.
Indicates a set of choices from
-tb<timeout{s|ms}>
which you must choose one.
Separates two mutually exclusive
[in|out]
choices in a syntax line. Type one of
the choices, not the symbol.
Indicates optional parameters. You
[in|out]
typically type only the information
within the brackets, not the brackets.
Indicates that a parameter can be
importkey <from> <to>
repeated several times in a
<usage> <option>
command line. You enter only the
[...]
information, not the ellipsis (...).
18
Introduction .................................................................................................... 20
Opening and Closing TCM ............................................................................ 20
Opening TCM ...................................................................................................................20
Logging In for the First Time .............................................................................................21
Closing TCM .....................................................................................................................21
Introduction
This chapter provides basic instructions for using TCM to help you get up and running
with the application.
Opening TCM
To start TCM, select Start > Programs > nuBridges > Commerce Suite > Trading
Community Manager. The TCM Home page displays.
20
Closing TCM
You can close TCM by using any of the following methods:
On the File menu, click Close.
Click the Trading Community Manager windows Close button (X) in the
upper right corner of the title bar.
Double clicking the Trading Community Managers window control icon in
the upper left corner of the title bar.
Pressing the key combination <ALT> + <F4>.
21
Navigating TCM
This section provides instructions for navigating through the TCM pages. The
following topics are discussed in this section:
Tour of the Trading Community Manager Home Page
Using the Navigation Pane
Using the Information Pane
Configuration
Objects
Login Button
Online Help
System
Button
Navigation
Pane
22
Navigation Pane
The left pane of the home page contains a list of configurable objects that may be
selected to configure resources and configuration objects. Selecting an object in the
navigation pane displays that objects component page in the right pane of the home
page.
Information Pane
The information pane on the right side of the TCM home page displays content detail
for the object selected in the Navigation pane. Navigation within the information pane
is accomplished using tabs, links, and command buttons.
23
24
Introduction .................................................................................................... 26
Logging In ...................................................................................................... 26
Creating Your Organization............................................................................ 27
Creating a Group ........................................................................................... 29
Creating a User.............................................................................................. 31
Adding a Router............................................................................................. 33
Adding a Transport Agent .............................................................................. 35
Creating an Organization Certificate.............................................................. 37
Configuring the Default Settings for the Organization ................................... 40
Setting Up Trading Partners .......................................................................... 45
Setting Up Your icssvr.cfg Configuration File................................................. 49
Creating the icssvr.cfg File................................................................................................49
Introduction
This section describes the steps necessary to configure TCM for testing connectivity
with nuBridges and exchanging information with your trading partners.
Logging In
This section provides instructions on logging in to TCM.
Follow the steps below to login to the TCM application.
1. From the Start menu select Start > Programs > nuBridges > Commerce
Suite > Trading Community Manager. The TCM Home page displays.
3. Enter your login name and password into the appropriate fields and click
Submit. The login dialog box disappears and your user name displays at the top
of the window next to the Logout button.
26
27
28
Creating a Group
Follow the steps below to create a new group.
1. Click the Groups tab. The Group List page displays.
29
3. In the Group Name and Description fields, type View Only Group.
4. Check the View box for Organizations, Users and Groups, Trading
Partners, Relationships and Work Orders, and Certificates. This indicates
that this group can only view records in these databases.
5. Click Save. A message displays indicating that the group has been created.
6. Click OK. You are returned to the Group List page. Notice that the new group
now appears in the list.
30
Creating a User
Follow the steps below to create a user.
1. Click the Users tab. The User List page displays.
3. Select View Only Group from the User Group drop down list.
4. Enter the users name and other information.
5. Enter the users login ID and password.
31
6. Click Save. A message displays indicating that the user has been created.
7. Click OK. You are returned to the User List page. Notice that the new user now
appears in the list.
32
Adding a Router
You must be using Commerce Suite Enterprise to use the router functionality.
Follow the steps below to create a router.
1. Click the Servers tab. The Server List page displays.
2. Click New to add a new server. The Server Information page displays.
33
4. Click Add. A message displays indicating that the server has been added.
C
11. Click OK. You are returned to the Server Service List page. Notice that the
Router service now appears in the list.
34
35
10. Click OK. You are returned to the Server Service List page. Notice that the
new Transport service now appears in the list.
36
3. Select the Create radio button. The Certificate Creation page displays.
37
4. Enter the Common Name for the certificate. We recommend that you assign a
Common Name that identifies the trading relationship of the certificate.
5. Select the appropriate Key Usage, Key Size (1024), and valid date range for the
certificate.
6. Click Create. A message displays indicating that the certificate has been
created.
7. Click OK. You are returned to the Certificate List page. Notice that the new
certificate now appears in the list.
38
9. Click the detail line to change the certificates status. The Certificate Status
Edit box displays.
12. Click OK. You are returned to the Certificate List page. Notice the certificates
status now appears as Active.
39
2. Click New AS1/AS2 Name to add your AS2 name. The Add/Edit AS1/AS2
Name dialog box displays.
40
5. Click OK. You are returned to the Basic Settings page. Notice that your AS2
name now appears in the list.
6. In the Would you like TCM to alert Commerce Suite each time a change is
made to your Trading Partner? box, select on of the following:
Yes
No
Ask
41
8. Click New URL to add your default AS2 URL. The Add/Edit URL dialog box
displays.
Port
Enter 4080.
Set as Default
10. Click Save. A message displays indicating that you must complete the wizard
and click Finish before the URL is added to the database.
11. Click OK. You are returned to the Default Settings page. Notice that the URL
now appears in the list.
12. Accept the default Message Delivery Notification settings.
13. Click Next. The Default Security Settings page displays.
43
16. Click OK. You are returned to the Organization Summary page. Notice that
the Summary and Checklist columns reflect the actions taken in the previous
steps.
44
2. Click Launch Easy Setup in the upper right corner of the page. The Basic
Information page displays.
3. In the Trading Partner field, enter the name of the Trading Partner.
4. In the AS1/AS2 Name field, enter the AS1 or AS2 name for the Trading Partner
(maximum 32 characters).
45
5. In the URL Address field, select the protocol and enter the URL address for the
Trading Partner.
6. If you selected FTP as the protocol, and you want to use a different address for
notifications sent to this Trading Partner, select the checkbox and enter the
alternate MDN address.
7. In the Certificate File field, enter the name of the certificate file provided by
this trading partner, or click Browse to select it.
8. Click Next. The Sending Parameters page displays.
46
10. Click Next. The Trading Information for Your Organization page displays.
11. From the Organization list, select the appropriate organization. The Default
Settings fields are populated with the default settings for the selected
organization.
12. Select the checkbox indicating that you do not want to use the default settings.
A message displays indicating that you must set up the trading partner using the
manual method (see Chapter 8: Managing Trading Partners for instructions).
OR
Click Next to accept the default settings and continue the Easy Setup Wizard.
The Setup Summary page displays.
47
13. Verify that the information is correct. If it is not correct, click Back to return to
the appropriate page and correct the information. If it is correct, click Finish. A
message displays indicating that you have completed the wizard.
14. Click OK. You are returned to the Trading Partner List page.
48
TCM DB Config
-->
<command>set -ga</command>
<command>set -npnotice -nf- -nd</command>
<command>set -lplog -lf</command>
<command>set -rpreceipt</command>
<command>set -opworkorder -oswo -of</command>
<command>set -eperror -ef</command>
<command>set -tr300s</command>
<command>set -dnisoft -dhdev1 -duisoft -dpisoft </command>
<command>start database</command>
<!-- Start services -->
<command>start http://yourIPaddress:4080/</command>
<!--
-->
<command>getpairs</command>
<command>sleep 5</command>
<command>getkeys</command>
49
Introduction .................................................................................................... 51
What is an Organization? .............................................................................. 51
Opening Your Organization List ..................................................................... 51
Opening the Organization Summary Page .................................................... 52
Creating an Organization............................................................................... 53
Editing Organization Information ................................................................... 60
Deleting an Organization ............................................................................... 61
Organizations Pages Field Definitions........................................................... 61
Organizations Page Definitions ..................................................................... 61
Organization Contacts Page Field Definitions ............................................... 62
Organization Default Settings Field Definitions ............................................. 64
Basic Settings Page..........................................................................................................64
Default Settings Page .......................................................................................................64
Default Security Settings Page .........................................................................................65
Introduction
This chapter explains how to manage organizations using TCM.
What is an Organization?
In TCM, an Organization can be defined as an entity that participates in datainterchange relationships, such as your company, or a division within your company.
An Organization provides the base for storing Groups and Users in the Commerce
Suite relational database. For example, your company has Regional offices in different
parts of the country. You might set up an organization for each region, such as
Northern, Eastern, Southern, and Western.
Within these organizations, you can create groups of users with varying permissions to
set up and maintain other components within the TCM application.
Note: Only System Administrators can add new Organizations. See the What is a
Group? section on page 79 for more information on System Administrators.
2. From within the Organization List, click an organization name. The Summary
page for the organization opens. This screen displays detailed organization
information. Review the Opening the Organization Summary Page section on
page 52 for a detailed description of the information found on this page.
51
Each organization Summary page contains a tabbed interface and linked Data
Check List of configurable resources. Configured resources are displayed in
green and unconfigured resources are displayed in red. Clicking a resource tab
or a Data Check List item opens that resource page enabling you to configure
that organization resource.
The Summary page also includes a Data Summary list indicating how many
organization resources have been configured.
52
Creating an Organization
Follow the steps below to create a new organization.
1. Click Organizations in the Navigation pane. The Organizations page displays
containing your Organization List.
53
2. Click the New Organization link located at the top of the Organization page.
The Organization Information Contacts tab opens.
3. In the Organization Unit Name field, enter the name of your new organization.
This is the only field you are required to populate.
4. Enter text in the Address, Primary Contact, and Secondary Contact
information fields as appropriate. Entering this contact information is optional.
5. Click Save. A confirmation dialog box displays indicating your organization
has been added.
54
6. Click OK. The confirmation dialog box closes and the new organization
Summary page displays.
7. Select the Default Settings tab. The Basic Settings page is displayed.
Note: The following steps configure the default settings for the new
organization. Default settings allow the objects within the organization to
inherit the settings of the organization.
55
8. Click New AS/1AS2 Name. The Add/Edit AS1/AS2 Name dialog box
displays.
10. Click OK. You are returned to the Basic Settings page. Notice that the new
AS1/AS2 name now appears in the list.
56
11. Click Next. The Default Settings page displays. This page acts as step 2 of the
Organization Wizard.
12. Click New URL to add the default URL. The Add/Edit URL dialog box
displays.
57
13. Enter the appropriate information for the default URL then click Save. A
message displays indicating that you must complete the wizard and click Finish
before the URL is added to the database.
14. Click OK. You are returned to the Default Settings page. Notice that the URL
now appears in the list.
15. Enter the appropriate Message Delivery Notification settings (see the
Organization Default Settings Field Definitions section on page 64 for field
definitions). Click Next. The Default Security Settings page displays.
58
16. Select the default security settings for your organization then click Finish. A
message displays indicating that you have completed the wizard.
17. Click OK to dismiss the dialog box, complete the wizard, and return to the
Organization Summary page.
59
60
Deleting an Organization
Follow the steps below to delete an organization.
1. Click Organizations in the Navigation pane. The Organizations page displays
your Organization List.
2. Click the Delete (X) button to the right of the organization name you want to
delete from the TCM system. A confirmation dialog box displays asking you to
confirm the organization deletion.
3. Click Yes to dismiss the confirmation dialog box and return to the Organization
List. Your deleted organization no longer resides in the list.
Note: You cannot delete the default organization.
61
Address 2
City
State
Postal Code
Country
Region
Title
62
Phone
Phone Ext.
Pager
Pager PIN
Mobile
Title
Phone
Phone Ext.
Pager
Pager PIN
Mobile
63
Request
Asynchronous MDN Select No if you do not want the receipt to be delivered
out of bound. Selecting Yes may increase outbound
throughput. Yes is the default value.
Request
Signed MDN
To
Yes (SHA-1)
Yes (MD5)
No
64
Signature
Choose
To
DES-3
RC2
To
MD5
SHA-1
65
Compression
To
Key Encryption
DSS
Introduction .................................................................................................... 68
Managing Servers.......................................................................................... 68
What is a Server? .............................................................................................................68
Creating a Server..............................................................................................................69
Editing a Server ................................................................................................................70
Deleting a Server ..............................................................................................................70
Introduction
This chapter explains how to manage servers using TCM.
Managing Servers
This section contains the following topics:
What is a Server?
Creating a Server
Editing a Server
Deleting a Server
What is a Server?
In TCM, a Server can be defined as a physical computer that is running
Administrative, Transport, or Router Agent services. Servers are created under
Organizations and provide a method of grouping your installations of the Commerce
Suite software, called Services in TCM. You can assign multiple Services to a single
Server.
For example, within the Western organization, you can create a Server called
Purchasing. There may be three servers in this organization with the Commerce Suite
application installed, so there would be three Services contained within the Purchasing
server.
68
Creating a Server
Follow the steps below to create a new server.
1. Click Servers in the Navigation pane. The Servers page opens to display your
Server Service List.
2. Click the New Service link to open the Server Service Information page
3. In the Organization Unit list, click the organization with which the server is to
be associated.
4. Enter the name of the server you want to add in the New Server Name field.
5. Click Add. A confirmation dialog box displays indicating your server has been
added and defined within the TCM system.
6. Click OK to dismiss the confirmation dialog box and return to the Server
Service Information page.
Note: The server will not be added to the Server Services List on the Servers
page until a TCM service has been associated with it.
69
Editing a Server
Follow the steps below to edit an existing server name.
1. Click Servers in the Navigation pane. The Servers page opens to display your
Server Services List.
2. Click the New Service link. The Server Service Information page displays.
3. In the Organization Unit list, click the organization associated with the server
you want to edit.
4. Click Edit/Delete. A dialog box containing the Server List displays.
5. Click the server name you want to edit. The Server Edit dialog box opens
providing an editable Server Name field.
6. Edit the server name as appropriate.
7. Click Save to save your changes. A confirmation dialog box opens indicating
the server has been updated.
8. Click OK to dismiss the confirmation dialog box and return to the Server List
dialog box.
9. Click Close to dismiss the Server List dialog box and return to the Server
Service Information page.
Deleting a Server
Perform the following steps to delete an existing server.
1. Click Servers in the Navigation pane. The Servers page opens displaying your
Server Services List.
2. Click the New Service link. The Server Service Information page displays.
3. In the Organization Unit list, click the organization associated with the server
you want to edit.
4. Click Edit/Delete. A dialog box containing the Server List displays.
5. Click the Delete (X) button next to the server name you want to delete. A dialog
box opens indicating that all services on this server will be also be deleted.
6. Click Yes to confirm you want to delete the server, dismiss the dialog box, and
return to the Server List dialog box.
7. Click Close to dismiss the Server List dialog box and return to the Server
Service Information page. The Server and Service names are removed from the
Server and Server Services lists.
70
Managing Services
This section contains the following topics:
What is a Service?
Viewing Your Server Service List
Viewing Server Service Information
Creating a Service
Editing a Service
Deleting a Service
What is a Service?
In TCM, a Service can be defined as an installation of the Commerce Suite software.
There are three types of services:
Admin - Provides administrative services including the remote configuration of
Transport and Router Agents and access to centrally located configuration data.
Transport - Provides transport services including the compression, encryption
and delivery of data, the verification of digital signatures, and the construction
and transmission of Delivery Notifications.
Router - Provides routing services including round-robin selection of Transport
Agents, message-queuing, and fail-over retransmission.
71
72
Creating a Service
A service is considered any instance of the TCM application installed on a physical
server.
Follow the steps below to create a service.
1. Click Servers in the Navigation pane. The Servers page opens to display your
Server Services List.
2. Click the New Service link or the New button to open the Server Service
Information page.
3. In the Organization Unit list, click the organization with which the server
service is to be associated.
4. In the Server Name list, select the server on which the service will reside.
5. In the Service Name field, enter a name for the new service.
6. In the Service Role list, select the TCM service role.
7. In the Service Group list, select a peer-group identifier for the service. This is
an optional step.
8. In the URL field, enter the address on which the server will listen for data of a
particular protocol.
9. In the Control URL field, enter the address on which the server will listen for
control messages of a particular protocol. This is a required step for router and
transport configurations.
10. Click Save. A confirmation dialog box opens indicating the service has been
added.
11. Click OK to dismiss the confirmation dialog box and return to the Servers
page. The new service appears in the Server Service list.
73
Editing a Service
Follow the steps below to edit a service.
1. Click Servers in the Navigation pane. The Servers page opens to display your
Server Services List.
2. Click the row containing the server service you want to edit. The Server
Service Information page opens.
3. In the Server Name list, select the server on which the service will reside.
4. In the Service Name field, enter a name for the new service.
5. In the Service Role list, select the TCM service role.
6. In the Service Group list, select a peer-group identifier for the service. This is
an optional step.
7. In the URL field, enter the address on which the server will listen for data of a
particular protocol.
8. In the Control URL field, enter the address on which the server will listen for
control messages of a particular protocol. This is an optional step.
9. Click Save. A confirmation dialog box opens indicating the service has been
updated.
10. Click OK to dismiss the confirmation dialog box and return to the Servers
page. The updated service appears in the Server Service list.
Deleting a Service
Follow the steps below to delete a service.
1. Click Servers in the Navigation pane. The Servers page opens to display your
Server Services List.
2. Click the Delete (X) button next to the server service name you want to delete.
A dialog box opens prompting you to confirm you want to delete the service.
3. Click Yes to dismiss the dialog box and remove the service from the Server
Service list.
74
Type
75
Server Name
Service Name
Service Role
To
router
transport
76
Service Group
URL
Control URL
77
Introduction .................................................................................................... 79
What is a Group?........................................................................................... 79
Creating a Group ........................................................................................... 80
Viewing Your Group List ................................................................................ 82
Viewing Group Information ............................................................................ 82
Editing Group Information.............................................................................. 84
Deleting a Group............................................................................................ 85
Group Pages Field Definitions ....................................................................... 85
Groups Page Definitions ...................................................................................................85
Group Information Page Field Definitions.........................................................................86
Introduction
This chapter explains how to manage groups using TCM.
What is a Group?
In TCM, a Group can be defined as a collection of Users who have the same editing
privileges. For example, you may want to allow some users to add and modify Trading
Partner information. You might create a Group called Add Trading Partners and assign
the add and modify permissions to this group.
You may want to allow other users to add, modify, and delete Users and Trading
Partner information. You might create a Group called Add/Modify/Delete and assign
the add, modify, and delete users and trading partners permissions to the users in this
group.
Groups are defined under each Organization and are specific to that Organization.
They cannot be shared between Organizations. Users within each Organization/Group
can only access data within their own Organization.
Note: When you install the TCM application, a System Administrator group is created
automatically. This group has full access privileges to all data.
79
Creating a Group
Follow the steps below to create a new group.
1. Click Groups in the Navigation pane. The Groups page opens to display your
Group List.
2. Click the New Group link. The Group Information page displays.
80
3. In the Organization Unit list, select the organization with which the group is to
be associated.
4. Complete the screen using the field descriptions below.
Group Name
Description
Organizations
Trading Partners
Relationships and
Work Orders
Certificates
Reports
5. Click Save. A confirmation dialog box open indicating the group has been
added.
6. Click OK to dismiss the dialog box and return to the Groups page. The new
group appears in the Group List.
81
82
2. From within the Group List, click the group you want edit. The Group
Information opens.
83
Description
Organizations
Trading Partners
Relationships and
Work Orders
Certificates
Reports
5. Click Save. A confirmation dialog box opens indicating the group has been
updated.
6. Click OK to dismiss the dialog box and return to the Groups page. The new
group appears in the Group List.
84
Deleting a Group
Follow the steps below to delete a group.
1. Click Groups in the Navigation pane. The Groups page opens to display your
Group List.
2. Click the Delete (X) button next to the group name you want to delete. A dialog
box opens prompting you to confirm the deletion and indicating that all users
for this group will also be deleted.
3. Click Yes to dismiss the dialog box, remove the group from the Group List,
and return to the Groups page.
Group List
85
Group Name
Description
Organizations
Group Box
To
view
edit
delete
to
To
view
add
edit
delete
86
Trading Partners
Group Box
To
view
add
edit
delete
Certificates
Group Box
Choose
To
view
add
edit
delete
To
view
add
edit
delete
export
To
generate
Introduction .................................................................................................... 89
What is a User? ............................................................................................. 89
Creating a User.............................................................................................. 89
Viewing Your User List................................................................................... 92
Viewing User Information............................................................................... 93
Editing User Information ................................................................................ 94
Deleting a User .............................................................................................. 95
User Pages Field Definitions ......................................................................... 95
Users Page Field Definitions ............................................................................................95
User Information Page Field Definitions ...........................................................................96
Introduction
This chapter explains how to manage users using TCM.
What is a User?
In TCM, a User can be defined as a person who uses the Trading Community
Manager application.
Users are created within Groups, based on their editing permissions for the application
components. For example, a User who is allowed to add, modify, and delete trading
partners would be assigned to the group with these permissions. A User who should
have complete access to all components of the application would be assigned to the
System Administrator group.
Creating a User
Follow the steps below to create a new user:
1. Click Users in the Navigation pane. The Users page opens to display your User
List.
89
2. Click the New User link. The User Information page displays.
3. In the Organization Unit list, select the organization with which the user is to
be associated.
4. Users created for a specific organization can only access the data for this
specific organization, such as servers, groups, users, settings, etc.
5. In the User Group list, click the group with which the user is to be associated.
90
Last Name
Title
Phone
Mobile
Pager
Login
Password
Confirm Password
7. Click Save to submit your new user into the TCM configuration. A
confirmation dialog box opens indicating that the new user has been added.
8. Click OK to dismiss the dialog box and return to the User List page. The new
user appears in the User List.
91
92
93
Last Name
Title
Phone
Mobile
Pager
Login
Password
Confirm Password
6. Click Save to submit your changes into the TCM configuration. A confirmation
dialog box opens indicating that the user information has been updated.
7. Click OK to dismiss the dialog box and return to the User List page. The
modified user appears in the User List.
94
Deleting a User
Follow the steps below to delete a user.
1. Click Users in the Navigation Pane. The Users page opens to display your User
List.
2. Click the Delete (X) button next to the user name you want to delete. A dialog
box opens prompting you to confirm the deletion.
3. Click Yes to dismiss the confirmation dialog box, delete the user, and return to
the Users page.
Last Name
Login
Organization
Unit
User List
95
User Group
First Name
Specifies the users first name. The size of the name can
range from 1-25 characters.
Last Name
Specifies the users last name. The size of the name can
range from 1-25 characters.
Title
Specifies the users title. The size of the title can range
from 1-25 characters.
Phone
Mobile
Pager
Login
Password
Confirm Password
96
Introduction .................................................................................................... 98
What is a Trading Partner? ............................................................................ 98
Opening Your Trading Partner List ................................................................ 98
Creating a Trading Partner ............................................................................ 99
Using the EZ Setup Wizard ..............................................................................................99
Manually Creating a Trading Partner ..............................................................................103
Introduction
This chapter explains how to manage trading partners using the TCM.
2. From within the Trading Partner List, click a trading partner name to open the
trading partner EZ View page and display more detailed trading partner
information.
98
99
2. Click Launch Easy Setup in the upper right corner of the page. The Basic
Information page displays.
3. In the Trading Partner field, enter the name of the Trading Partner.
4. In the AS1/AS2 Name field, enter the AS1 or AS2 name for the Trading Partner
(maximum 32 characters).
5. In the URL Address field, select the protocol and enter the URL address for the
Trading Partner.
6. If you selected FTP as the protocol, and you want to use a different address for
notifications sent to this Trading Partner, select the checkbox and enter the
alternate MDN address.
100
7. In the Certificate File field, enter the name of the certificate file provided by
this trading partner, or click Browse to select it.
8. Click Next. The Sending Parameters page displays.
11. From the Organization list, select the appropriate organization. The Default
Settings fields are populated with the default settings for the selected
organization.
101
12. Select the checkbox indicating that you do not want to use the default settings.
A message displays indicating that you must set up the trading partner using the
manual method (see Chapter 8: Managing Trading Partners for instructions).
OR
Click Next to accept the default settings and continue the Easy Setup Wizard.
The Setup Summary page displays.
13. Verify that the information is correct. If it is not correct, click Back to return to
the appropriate page and correct the information. If it is correct, click Finish. A
message displays indicating that you have completed the wizard.
14. Click OK. You are returned to the Trading Partner List page.
102
2. Click New Partner to add a new trading partner. The Partner Information
page displays.
103
7. Click OK. You are returned to the Trading Partner Information page. Notice
that the AS2 name now appears in the list.
104
9. Click New URL to add the trading partners URL. The Add/Edit URL dialog
box displays.
105
10. Enter the appropriate information for the trading partner URL. Click Save. A
message displays indicating that you must complete the Trading Partner wizard
and click Finish before the trading partner URL is added to the database.
11. Click OK. You are returned to the Trading Partner Information page. Notice
that the URL name now appears in the list.
12. Click New Email to enter a notification email address for the trading partner.
The Add/Edit SMTP Emails dialog box displays.
13. Enter the appropriate email address for your company. Click Save. A message
displays indicating that you must complete the Trading Partner wizard and click
Finish before the trading partner email address is added to the database.
14. Click OK. You are returned to the Trading Partner Information page. Notice
that the new email address appears in the list.
106
15. Select the appropriate Message Delivery Notification settings for this trading
partner. Click Next. The Default Security Settings page displays.
16. Select the appropriate Default Security Settings. Click Finish. A message
displays indicating that you have completed the wizard.
107
17. Click OK. The EZ View page displays, showing the Trading Partner Summary
information.
108
Sending Files
Follow the steps below to send files to a trading partner.
1. Click Trading Partners in the Navigation pane. The Trading Partners page
opens to display your Trading Partner list.
2. From within the trading partner list, select the desired Trading Partner. The EZ
View page for the selected trading partner displays.
3. Click Send a File. The Send a File dialog box displays.
The From, To, and Protocol fields are filled in automatically from the Trading
Partner information.
4. In the File field, enter the name of the file you want to send, or click Browse to
select the file.
5. The Send parameters are filled in automatically from the Trading Partner
information. You can accept these parameters or enter different ones for this
transaction.
6. If you enter different parameters, they are effective for this transaction only.
7. Review the nuBridges Commerce Suite Command Reference Guide for more
information on the valid parameters for the send command.
8. When you have entered all necessary information in this dialog, click Send. The
selected file is sent to the trading partner.
109
Receiving Files
Follow the steps below to receive files from a trading partner.
1. Click Trading Partners in the Navigation pane. The Trading Partners page
opens to display your Trading Partner list.
2. From within the trading partner list, select the desired Trading Partner. The EZ
View page for the selected trading partner displays.
3. Click Recv a File. The Store and Forward dialog box displays.
The From, To, and Protocol fields are filled in automatically from the Trading
Partner information.
4. In the TimeInt field, enter the time interval at which you want TCM to check
for received files. This time interval should be entered in minutes; the default is
30 minutes.
Note: These parameters are effective for this transaction only.
5. When you finish entering the parameters, click Send. A batchrequest
command is created for receiving files.
110
Each EZ View page contains a tabbed interface and linked Data Check List of
configurable resources. Configured resources appear in green and unconfigured
resources appear in red. Clicking a resource tab or a Data Check List item opens
that resource page enabling you to configure that trading partner resource.
111
112
6. Select the AS1/AS2 name you want to edit. The Add/Edit AS1/AS2 Name
dialog box displays.
7. Edit the AS1/AS2 name (maximum 32 characters). Click Save. A message
displays indicating that you must complete the wizard and click Finish before
the AS1/AS2 name is added to the database.
8. Click OK. You are returned to the Trading Partner Information page. Notice
that the edited AS2 name now appears in the list.
9. Click Next. The Default Settings page displays.
10. Select the trading partners URL you want to edit. The Add/Edit URL dialog
box displays.
11. Enter the appropriate information for the trading partner URL. Click Save. A
message displays indicating that you must complete the Trading Partner wizard
and click Finish before the trading partner URL is added to the database.
12. Click OK to dismiss the message. You are returned to the Trading Partner
Information page. Notice that the updated URL name appears in the list.
13. Click New Email to enter a notification email address for the trading partner.
The Add/Edit SMTP Emails dialog box displays.
14. Enter the appropriate email address for your company. Click Save. A message
displays indicating that you must complete the Trading Partner wizard and click
Finish before the trading partner email address is added to the database.
15. Click OK to dismiss the message. You are returned to the Trading Partner
Information page. Notice that the updated email address appears in the list.
16. Select the appropriate Message Delivery Notification settings for this trading
partner. Click Next. The Default Security Settings page displays.
17. Select the appropriate Default Security Settings. Click Finish. A message
displays indicating that you have completed the wizard.
18. Click OK. The EZ View page displays, showing the updated Trading Partner
Summary information.
113
AS1/AS2 Name
Sort By
Trading Partner
List
114
EZ View Page
Use the EZ View page to review trading information for the selected Trading Partner.
You can also send or receive files from the Trading Partner, and access the basic and
default settings for the Trading Partner. The following field definitions apply to the EZ
View page:
Data Check List
Data Summary
Trading
Information
Send File
Recv a File
Contact
Information
View/Edit Details
115
Status
AS1/AS2 Name
Address Information
Group
The following field definitions apply to the Address
Information group:
Address 1
Address 2
City
116
State/Province
Country
Postal Code
Comments
Business Contact
Person
Name
Title
Department
Phone Number
Mobile
Pager
Technical Contact
Person
117
Name
Title
Department
Phone Number
Mobile
Pager
Other Contact
Person
Name
Title
Department
Phone Number
Mobile
Pager
118
URL or IP Address
List
Emails By SMTP
Message Delivery
Notification
Request MDN
Request Asynchronous
MDN
In the Request Asynchronous MDN list, click No if
you do not want the receipt to be delivered out of bound.
Selecting Yes may increase outbound throughput. Yes is
the default value.
Request Signed
MDN
119
Signature
To
DES-3
RC2
To
MD5
SHA-1
120
Compression
Key Encryption
To
DEFLATE
GZIP
To
RSA
DSS
121
Introduction
This chapter explains how to manage relationships using TCM.
What is a Relationship?
In TCM, a Relationship is the definition of the exchange of data between Trading
Partners. For example, you can define a Relationship between your companys
Purchasing Department and the Office Supply company. This Relationship definition
would contain the rules to be followed when data is exchanged between these
Trading Partners.
When you define a trading partner relationship, you specify information such as the
protocol to use when information is sent between the trading partner pair, the
destination URL and directory, and the settings to apply to the files being sent.
Creating a Relationship
Follow the steps below to create a new relationship.
1. Click Relationships in the Navigation pane. The Relationships page displays
your Relationship List. The Relationship List is a listing of all inbound and
outbound relationships for every defined trading partner.
123
2. Click the New Relationship link located at the top of the page. The
Relationship Entry page displays. This page acts as Step 1 in the Relationship
Wizard two-step process.
3. In the From list, select the trading partner who will be sending the data.
4. In the To list, select the trading partner receiving the data.
5. Define the Settings for the Inbound Relationship as follows:
a. In the Protocol drop down list, select the type of protocol you want to use
when receiving data from this trading partner.
b. In the Inbox Directory field, enter the name of the directory where you want
data received from this trading partner to be stored.
c. In the Notify Name field, enter the name of the intended outbound recipient
of the receipt.
124
7. Use the instructions included in the section to customize the AS2 header
information.
125
126
10. Click Next to open the Select Preferences page. This page acts as Step 2 in the
Relationship Wizard two-step process.
127
128
129
130
3. Click Next to open the Select Preferences page and display more detailed
relationship information.
131
Deleting a Relationship
Follow the steps below to delete a relationship.
1. Click Relationships in the Navigation pane. The Relationships page opens to
display your Relationship list.
2. Click the Delete (X) button next to the relationship entry you want to delete. A
dialog box opens prompting you to confirm the deletion.
3. Click Yes to dismiss the dialog box, remove the relationship entry from the
Relationship List, and return to the Relationship List page.
Note: Deleting a relationship deletes both the inbound definition and the
outbound definition.
To
Type
Relationship List
134
To
Inbox Directory
Notify Name
File Name
Preservation
File Date
Preservation
To
DES-3
RC2
None
136
Signature
SHA-1
None
137
Compression
To
none
138
Async Receipt
Signature
To
MD5
SHA-1
None
139
Notify Name
Receipt Address
MDN Address
User Supplied
Message Identifier
User Supplied
Message Subject
140
Introduction
This chapter explains how to manage work orders using TCM.
142
143
144
Specifies the status of the work order for which you are
searching.
Batch #
Status
Status Time
145
Introduction
This chapter explains how to manage certificates using TCM.
What is a Certificate?
Securely exchanging data is a requirement when using the AS2 protocol. To
accommodate this requirement, nuBridges utilizes a public key cryptography scheme
that uses a pair of keys for encryption; a public key, which encrypts data, and a
corresponding private, or secret key, for decryption. Trading Partners exchange public
keys with each other while keeping their private key secret. As a result, anyone with a
copy of a Trading Partners public key can encrypt information that only the Trading
Partner can read.
The primary benefit of public key cryptography is that the need for the sender and
receiver to share secret keys is eliminated. All communication involves only public
keys, no private keys are ever transmitted or shared.
The following illustration provides a simple example of a data exchange between
Trading Partners using public key cryptography:
Senders
Message
Receivers
Private Key
Senders
Public Key
Received
Message
Encrypted Data
In this illustration, the original message is encrypted using the senders public key. The
encrypted data is then sent to the receiver. The receiver then decrypts the data using
their private key. Once it is decrypted, the receiver can read the message.
Certificates also define how the key will be used. The valid key usage selections are:
Sign only - Can only sign the data
Encrypt only - Can only encrypt the data
Decrypt only - Can only decrypt the data
Sign and Decrypt - Can sign and decrypt the data
Verify only - Can only verify the data
Verify and Encrypt - Can verify and encrypt the data
All - Can sign, encrypt, decrypt, and verify the data
147
Creating a Certificate
Follow the steps below to create a certificate.
1. Click Certificates in the Navigation pane. The Certificates page opens to
display expandable lists of Organizations and Trading Partners owning
certificates.
2. Click the Add Certificate link to open the Certificate Information page.
3. Click Organization or Trading Partner to specify the type of Owner of the
certificate.
4. If you select Organization as the owner, select an organization from the
Organization list.
5. If you select Trading Partner as the owner, select a trading partner from the
Trading Partner list.
6. Click Import to import a certificate or click Create to create a certificate.
7. If you selected Import, perform the following steps:
a. In the Certificate File field, enter the fully qualified path for the certificate
file, or click Browse to locate the file on your local system.
b. In the Private Key File field, enter the fully qualified path for the private-key
file, or click Browse to locate the file on your local system.
8. If you selected Create, perform the following steps:
a. In the Subject Common Name field, enter a subject for the public-key
certificate.
b. In the Subject Organization Unit field, enter the organization unit name, or
click More to select from the list.
c. In the Subject Organization field, enter the name of the organization.
d. In the Subject Locality field, enter the name of the city or town,
e. In the Subject State/Province field, enter the state or province.
f. In the Subject Country field, enter the country.
g. In the Subject Email field, enter the email address.
148
h. Click Issuer Name same as Subject Name if you want to duplicate the
Subject information into the Issuer information. Skip to sub-step w if this is
the case.
If the Issuer information is different than the Subject information, then
continue to the next step.
i. In the Issuer Common Name field, enter the name of the issuer.
j. In the Issuer Organization Unit field, enter the organization unit name, or
click More to select from the list.
k. In the Issuer Organization field, enter the name of the organization issuing
the certificate.
l. In the Issuer Locality field, enter the city or town.
m. In the Issuer State/Province field, enter the state or province.
n. In the Issuer Country field, enter the country.
o. In the Issuer Email field, enter the email address.
p. Click Encrypt if you want to encrypt the data.
q. Click Decrypt if you want to decrypt the data.
r. Click Sign if you want to sign the data.
s. Click Verify if you want to verify the signature. The following key usage
combinations are valid when creating Certificates: Sign only, Encrypt only,
Decrypt only, Sign and Decrypt, Verify only, Verify and Encrypt, All
t. In the Key Size list, select the length of the RSA modules.
u. In the Valid From Year lists, specify the date upon which the certificate is
valid.
v. In the Valid To Year lists, specify the expiration date of the certificate.
w. Click Create to save your settings and create the certificate. A confirmation
dialog box opens indicating the certificate has been added.
x. Click OK to dismiss the dialog box and return to the Certificates page. The
organization or trading partner for which the certificate was created is added
to the Organizations or Trading Partners list.
149
8. In the From field, select the trading partner who will be sending the data.
9. In the To field, select the trading partner who will be receiving the data.
10. Select Encrypt if you want to encrypt the data.
11. Select Decrypt if you want to decrypt the data.
12. Select Sign if you want to sign the data.
150
13. Select Verify if you want to verify the signature. The following key usage
combinations are valid for allocating usage information: Sign only, Encrypt
only, Decrypt only, Sign and Decrypt, Verify only, Verify and Encrypt, All.
14. Select Yes if the certificate is pending. Otherwise, select No.
15. Select Yes if the certificate is encrypted. Otherwise, select No.
16. Specify the status of the certificate. Valid options are:
Pending - indicates the certificate characteristics have been defined in TCM,
but the certificate is not actively being used as yet, but will be in the future.
Active - indicates the certificate characteristics have been defined in TCM
and the certificate is actively being used.
Inactive - indicates the certificate characteristics have been defined in TCM,
however, the certificate is not actively being used.
Retired - indicates the certificate characteristics have been defined in TCM,
however, the certificate will not actively be used again.
17. Click Save to save the usage information.
151
2. From within the Certificate for all Companies list, expand the Organizations
or Trading Partners list to view a list of certificates.
152
153
154
Importing a Certificate
Follow the steps below to import a certificate.
1. Click Certificates in the Navigation pane. The Certificates page opens to
display expandable lists of Organizations and Trading Partners owning
certificates.
2. Click the Add Certificate link or the Add button to open the Certificate
Information page.
3. Click Organization or Trading Partner to specify the type of Owner of the
certificate.
4. If you select Organization as the owner, select an organization from the
Organization list.
or
If you select Trading Partner as the owner, select a trading partner from the
Trading Partner list.
5. Click Import. The Certificate Information screen displays.
6. In the Certificate File field, enter the fully qualified path for the certificate file,
or click Browse to locate the file on your local system.
7. In the Private Key File field, enter the fully qualified path for the private-key
file, or click Browse to locate the file on your local system.
8. Click Import to save your settings and create the certificate. A confirmation
dialog box opens indicating the certificate has been added.
9. Click OK to dismiss the dialog box and return to the Certificates page. The
organization or trading partner for which the certificate was created is added to
the Organizations or Trading Partners list.
155
Exporting a Certificate
Follow the steps below to export a certificate.
1. Click Certificates in the Navigation pane. The Certificates page opens to
display expandable lists of Organizations and Trading Partners owning
certificates.
2. Click the + to expand the Organizations or Trading Partners list to view defined
organizations and trading partners.
3. Click the + next to the organization or trading partner whose certificate
information you want to view.
4. Click the + next to the Serial number of the certificate you want to view.
5. Click the Export Certificate button
displays.
6. Enter the name of the certificate file or private key file to which you want to
export the information, or click Save As to select the file from a list.
7. Click Export to export the information to the specified file. A confirmation
dialog box opens indicating the information has been exported.
8. Click OK to dismiss the dialog box and return to the Certificates page.
156
Deleting a Certificate
Follow the steps below to delete a certificate.
1. Click Certificates in the Navigation pane. The Certificates page opens to
display expandable lists of Organizations and Trading Partners owning
certificates.
2. Click the + to expand the Organizations or Trading Partners list to view
defined organizations and trading partners.
3. Click the + next to the organization or trading partner whose certificate
information you want to view.
4. Click the + next to the Serial number of the certificate you want to view.
5. Click the X within the certificate information table to delete the certificate. A
dialog box opens prompting you to confirm the deletion of the certificate.
6. Click Yes to delete the certificate and return to the Certificates page.
157
Trading Partners
Undefined
owner
is
an
Organization Units
Subject Organization
Unit
Specifies the organization unit. The size of the name can
range from 1-75 characters.
Subject
Organization
Subject Locality
Subject
State/Province
Subject Country
Subject Email
Issuer Common
Name
Issuer Organization
Unit
Specifies the organization unit. The size of the name can
range from 1-75 characters.
Issuer Organization Specifies the organization. The size of the name can
range from 1-75 characters.
Issuer Locality
159
Issuer State/Province Specifies the state or province. The size of the name can
range from 1-30 characters.
Issuer Country
Issuer Email
Encrypt
Decrypt
Sign
Verify
Key Size
Valid To Year
160
To
Encrypt
Decrypt
Sign
Verify
Pending
Encrypted
Status
161
Introduction
This chapter explains how to view events using TCM.
What is an Event?
In TCM, an Event can be defined as a transaction that takes place between two Trading
Partners. There are two types of events that are recorded in TCM, Service Events and
Traffic Events.
A Service Event records the sender of the data, the senders role (Admin, Router, etc.),
and the date of the event.
A Traffic Event records the details of the actual data being sent, including the file
name, the source and destination, and any error or OP codes associated with the
transaction.
2. In the Service Name list, select the service whose events you want to view.
3. In the Service Role list, select the role of the service whose events you want to
view.
4. In the Start Date field, enter the date upon which events will begin being
retrieved.
5. In the End Date field, enter a date specifying to retrieve service events up to
and including the entered date.
6. Click Search to initiate your search. Your results appear in the Query Results
section.
163
3. In the From list, select the trading partner name sending the data, or click
Browse to open the AS1/AS2Name Lookup dialog box and select your value
from the list.
4. In the To list, select the trading partner name receiving the data, or click Browse
to open the AS1/AS2Name Lookup dialog box and select your value from the
list.
5. In the Error Code field, enter the error code representing the error event for
which you are searching.
6. In the Op Code list, enter the operation code representing the event for which
you are searching.
7. In the Start Date field, enter the date upon which traffic events will begin being
retrieved.
8. In the End Date field, enter a date specifying to retrieve traffic events up to and
including the entered date.
9. Click Search to initiate your search. Your results appear in the Query Results
section.
164
Purging Events
To maintain the speed and usability of the TCM application, users are always
encouraged to regularly purge their Service and Traffic Event tables. There are two
ways to purge Service and Traffic Events:
manually purge records from the database (this can only be performed by a
database administrator or someone with similar privileges)
from the TCM interface (this option is available only to users in the system
administrator group)
Follow the steps below to purge events directly from TCM.
3. Use the search criteria to select the data that you want to purge. Once you have
selected the desired search criteria, click the Purge button. The following
confirmation message displays.
4. Click Yes to confirm the purge. All notice records that matched the search
criteria you selected are deleted from the Notice table.
165
3. Select the Traffic Events link located at the top of the right pane. The Traffic
Events screen displays.
4. Use the search criteria to select the data that you want to purge. Once you have
selected the desired search criteria, click the Purge button. The following
confirmation message displays.
5. Click Yes to confirm the purge. All notice records that matched the search
criteria you selected are deleted from the Notice table.
166
Service Role
To
admin
router
End Date
167
To
Error Code
OP Code
Start Date
End Date
168
Introduction
This chapter explains how to generate reports using Trading Community Manager.
Report Definitions
The following reports are provided in TCM:
Error Report
Certificate Report
Relationship Report This report displays all relationships defined within the
Commerce Suite environment. These relationships show
all the parameters used to describe a relationship
between two as2names. This includes the protocol
used to communicate, and specific communication
options.
Server Service
Report
170
MDN Reconcile
Report
User Report
Work Order Report This report provides the customer with a list of work
orders that are present in the work order table. This
could vary by customer, as some customers may purge
workorders as they are completed, while other
customers leave set information in the workorder table,
and other customers simply change the status of
workorders as they are done.
Trading Partner Billing
Contacts Report
This report provides the customer with a list of billing
contacts for Trading Partners, and their contact
information.
Trading Partner Technical
Contacts Report
This report provides the customer with a list of technical
contacts for Trading Partners, and their contact
information.
Trading Partner Other
Contacts Report
This report provides the customer with a list of
additional, other contacts for Trading Partners, and
their contact information.
Key Pair Report
171
Undefined AS2
Name Report
Matched MDN
Report
Message Receipts
172
Generating a Report
Follow the steps below to generate a report.
1. From the Report List, select the report you want to generate. The steps for
generating each report are presented in the following sections.
Note: The first time you select a report for generation, you may see the
following ActiveX warning message:
Error Report
The Error Report lists data transmissions between trading partners that generated
errors for the specified date range.
Follow the steps below to generate an Error Report.
1. Select the Error Report from the Report List. The Criteria dialog box
displays.
2. From the Pick A Day drop down list, select the dates you want to display on the
report.
3. If you selected Custom as the reporting date, enter the From Date and To Date.
4. Click Get Report. The Error Report is generated for the specified dates.
174
Certificate Report
The Certificate Report lists the certificates that are set to expire within the specified
timeframe.
Follow the steps below to generate a Certificate Report.
1. Select the Certificate Report from the Report List. The Criteria dialog box
displays.
2. From the Certificate Expires drop down list, select the dates you want to
display on the report.
3. If you selected Custom as the expiration date, enter the desired expiration date.
The report will list all certificates that are set to expire prior to the specified
date.
4. Click Get Report. The Certificate Report is generated for the specified dates.
175
Relationship Report
The Relationship Report lists all trading partner relationships you have defined in the
database.
To generate a Relationship Report, select the Relationship Report from the Report
List. The Relationship Report is generated.
176
2. From the Pick A Day drop down list, select the dates you want to display on the
report.
3. If you selected Custom as the reporting date, enter the From Date and To Date.
4. Click Get Report. The MDN Reconcile Report is generated for the specified
dates.
177
User Report
The User Report lists the TCM users who have been set up in the system.
To generate a User Report, select the User Report from the Report List. The User
Report is generated.
2. From the Pick A Day drop down list, select the dates you want to display on the
report.
3. If you selected Custom as the reporting date, enter the From Date and To Date.
4. Click Get Report. The Work Order Report is generated for the specified dates.
178
179
180
2. From the Pick A Day drop down list, select the dates you want to display on the
report.
3. If you selected Custom as the reporting date, enter the From Date and To Date.
4. Click Get Report. The Matched MDN Report is generated for the specified
dates.
181
2. From the Pick A Day drop down list, select the dates you want to display on the
report.
3. If you selected Custom as the reporting date, enter the From Date and To Date.
4. Click Get Report. The All Activity Report is generated for the specified dates.
182
2. From the Pick A Day drop down list, select the dates you want to display on the
report.
3. If you selected Custom as the reporting date, enter the From Date and To Date.
4. Click Get Report. The Message Receipts Report is generated for the specified
dates.
183
Saving a Report
The IntelliVIEW interactive reporting application allows you to save your report data
along with the visual layout settings to your local disk. Perform the following steps to
save a report file:
1. From within IntelliVIEW, click File from the Menu bar.
2. Select Save to view a list containing the following save options:
Data File - specifies to save the entire report data.
Data File With Layout - specifies to save the report data and the visual
layout of the report. This options results in two files being saved to the same
location, a data file (.ivwd) and a layout file (.ivwl).
Layout File - specifies to save only the visual layout of the report that can be
applied to other reports as well.
3. Select the Save option that best suits your needs. A Save dialog box appears.
4. Select a location to save your files.
5. Enter a name for your file within the File Name field.
6. Click Save.
Note: For more information on saving IntelliVIEW reports, click Help from
within the IntelliVIEW application and select Using IntelliVIEW to open the
IntelliVIEW User Guide.
Printing a Report
The IntelliVIEW interactive reporting application enables you to print your report data
using one of following two views: Grid View or Free Form View.
Follow the steps below to print a report file.
1. From within IntelliVIEW, click File from the Menu bar.
2. Select Print to open the Print dialog box.
3. Click Page Setup to modify your print criteria prior to sending the document to
print.
4. Click OK to save your changes and return to the Print dialog box.
5. Click Print to send your report to your local printer.
Note: For more information on printing reports from within IntelliVIEW, click
Help from within the IntelliVIEW application and select Using IntelliVIEW to
open the IntelliVIEW User Guide.
184
Exporting a Report
The IntelliVIEW interactive reporting application enables you to export reports to
formats such as MS Excel, HTML, MS Word, XML, Text, PDF, etc.
Follow the steps below to export a report to the desired format.
1. From within IntelliVIEW, click File from the Menu bar.
2. Select Export To to view a list containing the following export options:
Visual - specifies to export the data that is visible on the screen to one of the
following desired formats: Excel, HTML, XML, Text, and PDF.
Data - specifies to export the whole report data to one of the following
desired formats: Data File, Excel, MS Word, Rich Text, HTML, Text, Comma
Delimited, Tab Delimited, Data Interchange Format, SYLK, and Clipboard
3. Select your export option.
4. Select the export format from the Visual or Data list. An Export dialog box
displays.
5. Select a location to save your files.
6. Enter a file name.
7. Click Save.
Note: For more information on exporting reports from within IntelliVIEW,
click Help from within the IntelliVIEW application and select Using
IntelliVIEW to open the IntelliVIEW User Guide.
Sorting Reports
The IntelliVIEW interactive reporting application enables you to sort your report
column using one of following two methods: Ascending or Descending.
Follow the steps below to sort the report data within a specified column.
1. Click the column header. This acts as a toggle option.
2. Click the column again to sort the column in ascending or descending order.
The column-header icon indicates which way the column is sorted.
Note: For more information on sorting report data from within IntelliVIEW,
click Help from within the IntelliVIEW application and select Using
IntelliVIEW to open the IntelliVIEW User Guide.
185
Filtering Reports
The IntelliVIEW interactive reporting application enables you to custom filter your
report data.
Follow the steps below to create a custom filter.
1. Click the down-arrow in the column header. The filter drop-down list appears.
2. Click Custom to open the Custom Filter dialog box. The column for which
you are applying the filter appears on the header for this window.
3. In this window, click the drop-down list box below the column name.
4. Selected one of the listed filter options.
5. Enter a value in the right-hand side box.
6. Use either the OR or the AND operators, by selecting one of the option buttons.
Follow the same procedure for entering values for the second set of filter
criteria
7. Click OK.
Note: For more information on filtering report data from within IntelliVIEW,
click Help from within the IntelliVIEW application and select Using
IntelliVIEW to open the IntelliVIEW User Guide.
Grouping Reports
The IntelliVIEW interactive reporting application enables you to group your report
data based on a particular column.
Follow the steps below to group data by a column.
1. From within IntelliVIEW, right-click the column heading with which you
would like to group the report.
2. Select Group By This Field. The specified column disappears from the report
and appears in the group by band, which is available between the report and the
tool bar. This column now groups the report.
Note: For more information on grouping report data from within IntelliVIEW,
click Help from within the IntelliVIEW application and select Using
IntelliVIEW to open the IntelliVIEW User Guide.
186
Introduction
This appendix provides instructions on how to configure an FTPs trading partner
relationship. Please note that selecting the SFTP option enables FTPs. Commerce
Suite does not support the use of SFTP.
Workflow
There are three primary steps to adding an FTPs trading partnership:
F
188
189
2. Click the New Partner link located at the top of the page. The Easy Setup
Wizard displays.
190
6. Enter a name for the FTPs relationship you are creating (maximum 32
characters). Click Save. A message displays indicating that you must complete
the wizard and click Finish before the AS1/AS2 name is added to the database.
7. Click OK. You are returned to the Trading Partner Information page. Notice
that the AS2 name now appears in the list.
191
9. Click New URL to add the trading partners URL. The Add/Edit URL dialog
box displays.
10. In the protocol drop down list, select sftp. Selecting this protocol type from the
drop down menu enables you to use FTPs.
11. In the Server field, enter the server information using the following format:
name:password@ftp.domain.com
192
12. In the port field, type the information provided by your trading partner.
13. Mark the Set as Default checkbox.
14. Click Save. A message displays indicating that you must complete the Trading
Partner wizard and click Finish before the trading partner URL is added to the
database.
15. Click OK. You are returned to the Trading Partner Information page. Notice
that the URL name now appears in the list.
16. Click Next. The Default Security Settings page displays.
193
17. Deselect each of the checkboxes in the Support column. Click Finish. A
message displays indicating that you have completed the wizard.
18. Click OK. The EZ View page displays, showing the Trading Partner Summary
information.
Do not be concerned about the settings for your organization as shown on this
page. The information displayed here is not an integral part of your trading
partner relationship - it acts as a placeholder. You are ready to define the FTPs
relationship.
194
195
2. Click the New Relationship link located at the top of the page. The
Relationship Entry page displays. This page acts as Step 1 in the Relationship
Wizard two-step process.
3. In the From list, select the trading partner who will be sending the data.
4. In the To list, select the trading partner receiving the data.
196
197
198
10. Complete your screen so that it matches the one above. In the Notify Name
field, enter your AS2 name or click the Find icon located next to the field to
select your AS2 name from a list.
11. Click Finish to save your relationship definitions. A confirmation dialog box
opens indicating you have completed the Wizard. (If you are asked to update the
relationship, click Yes.)
12. Click OK to dismiss the confirmation dialog box and return to the Relationship
List page. You should see the relationship you added displayed in the
relationship list.
199
Glossary
A
Agent
An instance of the Commerce Suite Server Version 3
application configured to provide services to a
particular role, i.e. Administrator, Transport, or
Router.
Administrator Agent
An instance of the Commerce Suite Server application
configured to provide administrative services
including the remote configuration of Transport and
Router Agents and access to centrally located
configuration data.
Application Service
See Service.
AS1
A draft specification first published in the Internet
Engineering Task Force (IETF) standards track. AS
stands for Applicability Statement and is a
specification about how to transport data, not how to
validate or process data. AS1 provides an Internet
solution for securely exchanging EDI and XML over
the Internet using SMTP.
AS2
A draft specification first published in the Internet
Engineering Task Force (IETF) standards track. AS
stands for Applicability Statement and is a
specification about how to transport data, not how to
validate or process data. AS2 specifies the means to
connect, deliver, validate, and reply to (receipt) data in
a secure and reliable way. AS2 provides an Internet
solution for securely exchanging EDI over the Internet
B
B2B
See Business to Business Commerce.
Business to Business Commerce
Commercial transactions enacted between businesses
and individuals. Historically, electronic business to
business commerce has been handled via Electronic
Data Interchange, but recently months have seen
eXtensible Markup Language gain in popularity.
Glossary, continued
C
CA
See Certificate Authority.
Certificate
An electronic document that verifies that the owner has
a relationship with parties involved in a transaction,
such as a Cardholder that has a relationship with an
issuing bank or merchant that has a relationship with an
acquiring bank. A certificate authorizes its owner to
perform certain tasks and authenticates the owner to
other parties in the transaction, assuring that the party
presenting the certificate is the same party to which it
was originally issued.
Certificate Authority
The party which issues, renews, and revokes
Certificates. The SET protocol provides for a hierarchy
of certificate authorities. The Root CA issues
certificates to brand CAs. Brand CAs, in turn, issue
certificates to EECAs, which issue certificates to
Cardholders, Merchants, and Payment Gateways.
Optionally, a brand CA may issue certificates to
geopolitical CAs, which are responsible for issuing
certificates to end entity CAs in specific geographic or
political areas. The the SET protocol, certificates are
validated by following their signature chains up the
hierarchy of trust to the root CA.
Certificate Policy
When a CA issues a certificate, it is stating to a
certificate user that a particular public-key is bound to
a particular entity. Different certificates are issued with
different practices and procedures, and may be suitable
for different applications or purposes.
Certificate Revocation List
A list of public Keys that a Certificate Authority has
revoked before their scheduled expiration dates.
Clear Text
The unencrypted, readable text of a message.
Cipher
A key-selected transformation between plaintext and
ciphertext. An algorithm for putting a message into
code by transposition and/or substitution of symbols.
Compression
The ability to represent data in forms that take less
storage than the original. The limit to this is the amount
of uniqueness in the data. It is not possible to compress
everything down to a single byte, because a byte can
only select 256 different results. Data compression is
either lossy, in which some information is lost, or
lossless, in which all of the original information can
be completely recovered.
Communications Protocol
All communications between devices require that the
devices agree on the format of the data. The set of rules
defining a format is called a protocol. At the very least,
a communications protocol must define the following:
Glossary, continued
D
Data Compression
Storing data in a format that requires less space than
usual. Compressing data is the same as packing data.
Data compression is particularly useful in
communications because it enables devices to transmit
the same amount of data in fewer bits.
Database
A structure to store data, usually as elements, so that a
variety of applications can use it, unlike the traditional
file structure requiring different files for each
application.
Data Integrity
The property that signifies that data is not altered,
destroyed, or otherwise compromised.
DBMS
See Database Management System.
DEFLATE
Specifies the DEFLATE compression algorithm used
to reduce the file transfer overhead. The DEFLATE
compression algorithm is a lossless compressed data
format that compresses data using a combination of the
LZ77 algorithm and Huffman coding.
Delivery Notification
A message formatted according to (AS2) that is sent to
a sending host computer to indicate the disposition of a
received message. The format of Delivery
Notifications used by Commerce Suite Server is the
Message Delivery Notification. or MDN, as defined in
MDN.
DES
See Digital Encryption Standard.
202
Glossary, continued
Digital Certificate
A document that contains name, serial number,
expiration dates and a copy of the owners public key;
used to encrypt data and validate signatures.
DSS
Specifies the Digital Signature Algorithm (DSA) for
digital signature generation and verification. The DSA
is used by a signatory to generate a digital signature on
data and by a verifier to verify the authenticity of the
signature. Each signatory has a public and private key.
The private key is used in the signature generation
process and the public key is used in the signature
verification process.
Document Digest
A unique fingerprint summary (128 or 160 bits long)
of an input file. It is used to create a digital signature
and to ensure that the file has not been altered. It is also
called a hash and is produced by a checksum program
that processes a file.
E
EDI
See Electronic Data Interchange.
Electronic Commerce
A term for conducting commercial transactions
electronically, usually involving the exchange of
payment between two parties. Unlike EDI,
eCommerce recognizes the need for some human to
human communication.
Electronic Data Interchange
The transfer of data between different companies using
networks, such as the Internet. As more and more
companies get connected to the Internet, EDI is
becoming increasingly important as an easy
mechanism for companies to buy, sell, and trade
information. ANSI has approved a set of EDI standards
known as the X12 standards.
203
Glossary, continued
EDIINT
EDI Over the Internet Working Group - a working
group of the IETF that developed the AS1 and AS2
proposed standards.
Encryption
A process that uses a mathematical algorithm and a key
to transform data into an unreadable format (called
cyphertext). A receiver can then use a key to restore the
data to its original content.
Enterprise
Literally, a business organization. In the computer
industry, the term is often used to describe any large
organization that utilizes computers. An intranet, for
example, is a good example of an enterprise computing
system.
Extranet
Extension of control beyond internal web
infrastructure to allow business partners and other
trusted organizations to interact in a controlled, trusted
environment.
eXtensible Markup Language
A method for creating data formats that can be shared
on the World Wide Web.
F
FIPS
Federal Information Processing Standard.
Firewall
A system designed to prevent unauthorized access to or
from a private network, usually unauthorized access
from the Internet into a private network. Firewalls can
be implemented in both hardware and software, or a
combination of both. Firewalls are frequently used to
prevent unauthorized Internet users from accessing
private networks connected to the Internet, especially
G
Graphical User Interface
A GUI (usually pronounced GOO-ee) is a graphical
user interface that takes advantage of the computer's
graphics capabilities to make the program easier to use.
Well-designed graphical user interfaces can free the
204
Glossary, continued
H
Hash
A hash value (or simply hash) is a number generated
from a string of text. The hash is substantially smaller
than the text itself, and is generated by a formula in
such a way that it is extremely unlikely that some other
text will produce the same hash value. Hashes play a
role in security systems where they're used to ensure
that transmitted messages have not been tampered
with. The sender generates a hash of the message,
encrypts it, and sends it with the message itself. The
recipient then decrypts both the message and the hash,
produces another hash from the received message, and
compares the two hashes. If they're the same, there is a
very high probability that the message was transmitted
intact.
HTTP
See Hypertext Transfer Protocol.
Hypertext Transfer Protocol
Hypertext Transfer Protocol (HTTP) is the underlying
protocol used by the World Wide Web. HTTP defines
how messages are formatted and transmitted, and what
actions Web servers and browsers should take in
response to various commands.
I
IETF
Internet Engineering Task Force.
The Internet
Engineering Task Force is a large, open, international
community of network designers, operators, vendors,
and researchers concerned with the evolution of the
Internet architecture and the smooth operation of the
Internet.
In-Beacon Service
The set of application tasks that execute within the
context of a single application thread to receive UDP
packets sent by one or more Transport Agents.
Commerce Suite Server Agents configured for the
Router Role (Router Agents) use the In-Beacon
Service to collect these UDP packets to maintain
current information about active Transfer Agents on
the local network segment.
Inbound Service
One or more sets of application tasks that execute
within the context of one or more threads of execution
to process incoming data being sent by a remote host
computer. The Inbound Service consists of, at least,
one inbound thread listening for incoming TCP/IP
connections on a particular protocol (HTTP or
HTTPS). The Inbound Service creates an Inbound
Session thread for each separate incoming connection.
Each discrete protocol is serviced by a separate
Inbound Main thread, which is assigned a unique IP
address and port on which to listen for incoming
connections.
Integrity
Ensures that data is not tampered with or corrupted in
transit. Integrity is accomplished using document
digests and digital signatures.
Interface
A mechanism through which outside components
interact with software.
205
Glossary, continued
Interoperability
The ability of software and hardware on different
machines from different vendors to share data.
Interrogation
To ask a computer or network for information.
Intranet
An internal network based on web servers that use
Internet protocols and technology. A network based on
TCP/IP protocols (an internet) belonging to an
organization, usually a corporation, accessible only by
the organizations members, employees, or others with
authorization. An intranets Web sites look and act just
like any other Web sites, but the firewall surrounding
an intranet fends off unauthorized access.
IP
Abbreviation for Internet Protocol, pronounced as two
separate letters. IP specifies the format of the packets,
also called datagrams, and the addressing scheme.
Most networks combine IP with a higher-level protocol
called Transport Control protocol (TCP), which
establishes a virtual connection between a destination
and a source.
IP by itself is something like the postal system. It
allows you to address a package and drop it in the
system, but theres no direct link between you and the
recipient. TCP/IP, on the other hand, establishes a
connection between two hosts so that they can send
messages back and forth for a period of time.
IP Address
An identifier for a computer or device on a TCP/IP
network. Networks using the TCP/IP protocol route
messages based on the IP address of the destination.
The format of an IP address is a 32-bit numeric address
written as four numbers separated by periods. Each
number can be zero to 255. For example, 1.160.10.240
could be an IP address.
K
Key
A password or table needed to decipher encoded data.
Key Encryption
The translation of data into a secret code. Encryption is
the most effective way to achieve data security. To
read an encrypted file, you must have access to a secret
key or password that enables you to decrypt it.
Unencrypted data is called plain text; encrypted data is
referred to as cipher text. There are two main types of
encryption: asymmetric encryption (also called publickey encryption) and symmetric encryption.
Key Management
The generation, storage, secured distribution and
application of keying material in accordance with a
security policy.
206
Glossary, continued
Key Pair
In public key cryptography, a public key and its
corresponding private key.
Message
A communication containing one or more transactions
or related information.
Message Digest
A mathematical value unique to a message, created by
running the message through the SHA-1 hash function.
The resulting message digest is then encrypted using
the senders private key and then appended to the
message as the Digital Signature.
LDAP
See Lightweight Directory Access Protocol.
Lightweight Directory Access Protocol (LDAP)
A set of protocols for accessing information
directories. LDAP is based on the standards contained
within the X.500 standard, but it is significantly
simpler. And unlike X.500, LDAP supports TCP/IP,
which is necessary for any type of Internet access.
Because it is a simpler version of X.500, LDAP is
sometimes called X.500-lite. Although not yet widely
implemented, LDAP should eventually make it
possible for almost any application running on
virtually any computer platform to obtain directory
information, such as email addresses and public keys.
Because LDAP is an open protocol, applications need
not worry about the type of server hosting the
directory.
Local Area Network (LAN)
A group of computers, printers, and file servers linked
together in a single building in order to share resources.
M
MD5
Specifies the Message Digest Algorithm used to verify
a files integrity. The MD5 is a one-way algorithm that
takes any length of data and produces a 128-bit
fingerprint or message digest. This fingerprint is
non-reversible, meaning that the data cannot be
determined based on its MD5 fingerprint.
N
Network
Two or more computers connected by a
communications protocol, allowing transfer of
information (voice or data), from one to another. There
are many types of computer networks, including:
207
Glossary, continued
O
ODBC
See Open Database Connectivity.
Open Database Connectivity
A standard database access method developed by
Microsoft Corporation. The goal of ODBC is to make
it possible to access any data from any application,
regardless of which Database Management System
(DBMS) is handling the data.
Out-Beacon Service
The set of application tasks that execute within the
context of a single thread of execution to periodically
transmit a small packet of data identifying the
Transport Agent to one or more Router Agents. The
Out-Beacon Service emits a UDP packet containing
the IP Addresses and Ports on which the Agent is
currently listening. Router Agents collect these packets
to dynamically build a current list of Transport Agents
to which inbound data can be routed for processing.
Outbound Service
The set of application tasks that execute within the
context of one or more threads of execution to process
requests for outgoing message delivery. The Outbound
service consists of, at least, the main outbound thread
that processes send transactions from the Outbound
Queue. The main outbound thread creates an Outbound
Session thread for each separate send request.
O/S
Operating system, controls hardware and software
allowing application processing to take place.
P
PKCS
See Public-Key Cryptography Standards.
PKCS #1 RSA Cryptography Standard
The PKCS#1 standard provides recommendations for
the implementation of public-key cryptography based
on the RSA algorithm, covering the following aspects:
cryptographic primitives; encryption schemes;
signature schemes with appendix; ASN.1 syntax for
representing keys and for identifying the schemes.
208
Glossary, continued
Private Key
A value known only to the owner, used to create a
signature and decrypt data encrypted by its
corresponding public key.
Private Key Cryptography
An encryption method which uses a single key for
encoding and decoding a message.
Public Key
A value, known by everyone to whom the certificate
has been distributed, used to encrypt data and validate
a digital signature. Although mathematically related to
the private key, it is astronomically difficult to derive
from the public key.
Public Key Cryptography
An encryption method that uses two Keys: one key to
encrypt the message and another key to decrypt the
message. The two keys are mathematically related so
that the data encrypted with either key can only be
decrypted using the other. Each user has a public and a
private key, and only the public key is distributed to
parties with which the user exchanges encrypted
messages.
Public-Key Cryptography Standards
A set of standards for implementing Private-Key
Cryptography, issued by RSA Data Security, Inc. in
collaboration with an industry consortium that includes
a large number of hardware and software
manufacturers. Documentation for the standards is
available from RSAs FTP site.
Public Key Infrastructure
Public Key Infrastructure is a system of digital
certificates, Certificate Authorities, and other
registration authorities that verify and authenticate the
validity of each party involved in an Internet
transaction. PKIs are currently evolving and there is no
single PKI or even a single agreed-upon standard for
setting up a PKI.
209
Glossary, continued
R
RC2
Specifies the Rivests Cipher encryption algorithm
used to encrypt and decrypt messages. RC2 is a
conventional (secret key) block encryption algorithm
and has a block size of 64-bits with a variable key size
from one byte up to 128 bytes.
Role
The set of Commerce Suite Server Application
Services operating within a single instance of the
Commerce Suite Server application (a process) which,
taken together, comprise a logical functional unit in an
nuBridges Commerce Suite network. The Roles
supported by Commerce Suite Server are
Administrator, Router, and Transport.
Root CA
The Certificate Authority which issues certificates to
brand CAs (superior CAs). The Root CA is also
sometimes called the Supreme CA.
RosettaNet
An organization focused on building a master
dictionary to define properties for products, partners,
and business transactions. RosettaNet can be found at
http://www.rosettanet.com.
Router Agent
An instance of the Commerce Suite Server application
configured to provide routing services including
round-robin selection of Transport Agents, messagequeuing and fail-over retransmission.
RSA
An internet encryption and authentication system that
uses an algorithm developed in 1977 by Ron Rivest,
Adi Shamir, and Leonard Adleman. The RSA
algorithm is the most commonly used encryption and
authentication algorithm and is included as part of the
Web browser from Netscape and Microsoft.
S
Secret Key Cryptography
An encryption method which uses the same Key to
encrypt and decrypt a message. The sender and
recipient must share the key.
Secure Electronic Transaction Protocol
A protocol developed jointly by Visa and MasterCard
that allow secure credit card transactions over open
networks, specifically the Internet.
Secure Sockets Layer
Short for Secure Sockets Layer, a protocol developed
by Netscape for transmitting private documents via the
Internet. SSL works by using a public key to encrypt
data that's transferred over the SSL connection. Both
Netscape Navigator and Internet Explorer support
SSL, and many Web sites use the protocol to obtain
confidential user information, such as credit card
numbers. By convention, URLs that require an SSL
connection start with https: instead of http:.
Serializer Service
The set of application tasks that execute within the
context of a single thread of execution to serialize the
access of shared application resources by other
application threads. The Serializer Service is started
automatically at application startup and is required by
all Commerce Suite Server Roles. Serialized resources
include shared memory areas, directories, and the
database.
210
Glossary, continued
Service
A discrete set of Commerce Suite Server application
tasks that provide a logical service to the Agent. The
Services supported by Commerce Suite Server are:
Serializer, Outbound, Inbound, Control, PKI, WorkOrder, User Interface, Out-Beacon, and In-Beacon.
Sets of concurrently executing Services are combined
to define Commerce Suite Server Roles.
SET
See Secure Electronic Transaction Protocol.
SHA-1
Specifies the Secure Hash Algorithm used to verify a
files integrity. The SHA-1 generates a condensed
representation of a message called a message digest.
The SHA-1 is used by both the transmitter and
intended receiver of a message in computing and
verifying a digital signature.
Signature
See Digital Signature.
Sockets
Sockets are a method for communication between a
client program and a server program in a network. A
socket is defined as the endpoint in a connection.
Sockets are created and used with a set of
programming request (function calls) sometimes
called the sockets API. The most common sockets API
is the Berkeley UNIC C interface for sockets. Sockets
can also be used for communication between processes
within the same computer.
S/MIME
Secure MIME - S/MIME (Secure/Multipurpose
Internet Mail Extensions) provides a consistent way to
send and receive secure MIME data. Based on the
popular Internet MIME standard, S/MIME provides
the following cryptographic security services for
electronic messaging applications: authentication,
211
Glossary, continued
Symmetric Encryption
A type of encryption where the same key is used to
encrypt and decrypt the message. This differs from
asymmetric (or public-key) encryption, which uses one
key to encrypt a message and another to decrypt the
message.
T
TCP/IP
Transmission Control Protocol/Internet Protocol or the
suite of standard protocols that enable computers to
inter-communicate on the Internet. TCP/IP uses
several protocols, the two main ones being TCP and IP.
TCP/IP is built into the UNIX operating system and is
used by the Internet, making it the de facto standard for
transmitting data over networks. Even network
operating systems that have their own protocols, such
as NetWare, also support TCP/IP.
Thread
A logical sequence or program instructions that are
executed independently.
Transport Agent
An instance of the Commerce Suite Server application
configured to provide transport services including the
compression, encryption and delivery of data, the
verification of digital signatures and the construction
and transmission of Delivery Notifications.
Triple Data Encryption Standard
Triple Data Encryption Standard (DES3) is a
derivative of Data Encryption Standard (DES) that has
served as the cornerstone of data encryption for almost
40 years. DES-3 is DES run three times with three
different keys. It uses a 192-bit key and has an effective
strength of 112-bits.
U
UCC
Uniform Code Council, Inc.
UDP
User Datagram Protocol. A simple, datagram-oriented,
transport layer protocol, used by Commerce Suite
Server to facilitate dynamic pools of Transport Agents
marshaled by a Router Agent. The Transport Agents
use UDP as the underlying protocol to transmit small
informative packets of data identifying their inbound
protocol ports.
Uniform Resource Locator
The global address used for locating resources on the
web.
URL
See Uniform Resource Locator.
User-Interface Service
The set of application tasks that execute within the
context of a single thread of execution to return
HTML-formatted application-status information to a
web-browser. The User-Interface Service is not
required by any Commerce Suite Server Role.
However, any Commerce Suite Server Agent can
enable the User-Interface Service so that its current
status can be remotely viewed via a Web-browser.
V
Virtual Private Network (VPN)
A controlled, trusted network structure that
incorporates end-to-end encryption, enabling a secure
connection from any linked machine to any other.
212
Glossary, continued
W
Work-Order
A set of one or more Console Commands sent to a
Commerce Suite Server Agent to accomplish one or
more specific tasks. The typical use of a Work-Order is
to initiate an outbound delivery of data (a send).
Work-Order Service
The set of application tasks that execute within the
context of a single thread of execution to query the
database or a directory for Work Orders.
X
XML
See eXtensible Markup Language.
X.509V3
X.509 Public Key Certificate and CRL Profile, Version
3, defined in CERT. The version of X.509 Public Key
Certificate supported by Commerce Suite Server. A
standard format for public key certificates and
Certificate Revocation Lists (CRL). X.509 is a
standard for security services within the X.500
directory services framework.
213