Sie sind auf Seite 1von 214

nuBridges Commerce Suite

Trading Community Manager


User Guide
Document Version 04.11

VERSION 3.5.2

2001-2011 Liaison Technologies, Inc. All rights reserved.

Information in this document is subject to change without notice and does not represent a commitment on the
part of Liaison. The documentation is provided as is without warranty of any kind including without limitation,
any warranty of merchantability or fitness for a particular purpose. Further, Liaison does not warrant, guarantee,
or make any representations regarding the use, or the results of the use, of the software or written material in
terms of correctness, accuracy, reliability, or otherwise.

Liaison is a trade name and registered trademark in the United States and other countries. The names of actual
companies and products mentioned herein may be the trademarks of their respective owners.

Table of Contents
Chapter 1: Overview
Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
What is Trading Community Manager? . . . . . . . . . . . . . . . . . . . . . . . . . . 11
About This Document. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Audience . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
Introduction to the Commerce Suite Documentation Set . . . . . . . . . . . . . 14
Commerce Suite Documentation Roadmap. . . . . . . . . . . . . . . . . . . . . . . 15
Documentation Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
Chapter 2: Getting Started with Trading Community Manager
Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
Opening and Closing TCM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
Opening TCM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
Logging In for the First Time . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
Closing TCM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21

Navigating TCM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
Parts of the User Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
Navigation Pane . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
Information Pane . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
Using Online Help . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
Allowing Blocked Content . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
Printing a Help Topic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24

Table of Contents, continued

Chapter 3: Configuring Trading Community Manager


Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
Logging In. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
Creating Your Organization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
Creating a Group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
Creating a User . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
Adding a Router . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
Adding a Transport Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
Creating an Organization Certificate . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
Configuring the Default Settings for the Organization . . . . . . . . . . . . . . . 40
Setting Up Trading Partners. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
Setting Up Your icssvr.cfg Configuration File. . . . . . . . . . . . . . . . . . . . . . 49
Creating the icssvr.cfg File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49

Chapter 4: Managing Organizations


Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
What is an Organization? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
Opening Your Organization List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
Opening the Organization Summary Page. . . . . . . . . . . . . . . . . . . . . . . . 52
Creating an Organization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
Editing Organization Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
Deleting an Organization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
Organizations Pages Field Definitions . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
Organizations Page Definitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
Organization Contacts Page Field Definitions . . . . . . . . . . . . . . . . . . . . . 62
Organization Default Settings Field Definitions . . . . . . . . . . . . . . . . . . . . 64
Basic Settings Page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
Default Settings Page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
Default Security Settings Page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65

Table of Contents, continued

Chapter 5: Managing Servers and Services


Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
Managing Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
What is a Server? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
Creating a Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
Editing a Server. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70
Deleting a Server. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70

Managing Services. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
What is a Service? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
Viewing Your Server Service List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
Viewing Server Service Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72
Creating a Service. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
Editing a Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74
Deleting a Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74

Servers and Services Page Field Definitions . . . . . . . . . . . . . . . . . . . . . . 75


Servers Page Definitions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
Server Service Information Page Definitions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76

Chapter 6: Managing Groups


Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
What is a Group? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
Creating a Group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80
Viewing Your Group List. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82
Viewing Group Information. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82
Editing Group Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84
Deleting a Group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
Group Pages Field Definitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
Groups Page Definitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
Group Information Page Field Definitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86

Table of Contents, continued

Chapter 7: Managing Users


Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89
What is a User? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89
Creating a User . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89
Viewing Your User List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92
Viewing User Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
Editing User Information. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
Deleting a User. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
User Pages Field Definitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
Users Page Field Definitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
User Information Page Field Definitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96

Chapter 8: Managing Trading Partners


Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98
What is a Trading Partner? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98
Opening Your Trading Partner List. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98
Creating a Trading Partner. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99
Using the EZ Setup Wizard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99
Manually Creating a Trading Partner . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103

Sending and Receiving Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109


Sending Files. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109
Receiving Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110

Editing Trading Partner Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111


Deleting a Trading Partner . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114
Trading Partner Pages Field Definitions. . . . . . . . . . . . . . . . . . . . . . . . . 114
Trading Partner Page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114
EZ View Page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115
Partner Information Page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116
Default Settings Page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119
Default Security Settings Page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120

Table of Contents, continued

Chapter 9: Managing Relationships


Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123
What is a Relationship? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123
Creating a Relationship . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123
Viewing Your Relationship List. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129
Viewing Relationship Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130
Editing Relationship Information. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 132
Deleting a Relationship . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 134
Relationship Pages Field Definitions . . . . . . . . . . . . . . . . . . . . . . . . . . . 134
Relationship List Page Definitions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 134
Relationship Entry Page Definitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135
Select Preferences Page. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 136

Chapter 10: Managing Work Orders


Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 142
What is a Work Order?. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 142
Creating a Work Order . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 142
Viewing Your Work Order List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143
Viewing Work Order Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143
Editing Work Order Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 144
Deleting a Work Order . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 144
Work Order Pages Field Definitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145
Work Order List Page Definitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145
Work Order Information Page Definitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145

Chapter 11: Managing Certificates


Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 147
What is a Certificate? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 147
Creating a Certificate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 148
Allocating Key Usage Criteria for a Certificate . . . . . . . . . . . . . . . . . . . . 150
Viewing Your Certificate List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 152
Viewing Certificate Information. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153

Table of Contents, continued

Chapter 11: Managing Certificates, continued


Viewing Usage Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 154
Importing a Certificate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 155
Exporting a Certificate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 156
Deleting a Certificate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 157
Certificate Pages Field Definitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 158
Certificate List Page Definitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 158
Certificate Information Page Field Definitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 158
Certificate Usage Information Page Field Definitions . . . . . . . . . . . . . . . . . . . . . . . 161

Chapter 12: Managing Events


Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163
What is an Event? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163
Searching for Service Events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163
Searching for Traffic Events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 164
Purging Events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 165
Purging Service Events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 165
Purging Traffic Events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 166

Event Pages Field Definitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 167


Service Events Page Definitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 167
Traffic Events Page Definitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 168

Chapter 13: Working with Reports


Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 170
Report Definitions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 170
Opening the Reports List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173
Generating a Report. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173
Error Report. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 174
Certificate Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 175
Relationship Report. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 176
Server Service Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 176
MDN Reconcile Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 177
User Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178

Table of Contents, continued

Chapter 13: Working with Reports, continued


Work Order Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178
Trading Partner Billing Contacts Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 179
Trading Partner Technical Contacts Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 179
Trading Partner Other Contacts Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 179
Key Pair Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 180
Undefined AS2 Name Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 180
Matched MDN Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 181
All Activity Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 182
Message Receipts Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 183

Saving a Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 184


Printing a Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 184
Exporting a Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 185
Sorting Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 185
Filtering Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 186
Grouping Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 186
Appendix A: Configuring FTPs Connectivity
Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 188
Workflow. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 188
Before You Begin . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 188
Adding the Trading Partner . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 189
Defining the FTPs Relationship . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 195
Configuring Trading Partners to Send and Retrieve Data
Over the FTPs Communications Link. . . . . . . . . . . . . . . . . . . . . . . . . . . 199
Glossary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 200

Chapter 1: Overview

Introduction .....................................................................................................11
What is Trading Community Manager? ..........................................................11
About This Document .................................................................................... 12
Audience........................................................................................................ 13
Introduction to the Commerce Suite Documentation Set............................... 14
Commerce Suite Documentation Roadmap .................................................. 15
Documentation Conventions.......................................................................... 17

Chapter 1: Overview
Introduction

Introduction
Welcome to the Commerce Suite Trading Community Manager User Guide. This
guide is provides instructions on how to create and manage trading partner
communities as well as how to manage work orders and certificates.
This guide assumes knowledge of the Windows operating system, including its
applications, network, and environment. If you are not familiar with the Windows
operating system, refer to the Microsoft library of manuals.

What is Trading Community Manager?


Trading Community Manager (TCM) provides an easy-to-use interface for defining
and maintaining trading partner relationships. TCM assists you in defining and
administering organizations participating in your collaborative e-commerce
community.
TCM enables you to manage participating organizations, servers, groups, users,
security, and events, enabling the creation of established and trusted data delivery
relationships. As you manage your trading community, changes are dynamically
entered and stored in a supported relational database.
TCM allows you to perform the following tasks:
Define organizations for data interchange relationships
Define Internet addresses of participating computers
Define message delivery options
Define data security parameters such as certificates and key-encryption
Configure Transport and Router agents
Configure Events

11

Chapter 1: Overview
About This Document

About This Document


The Commerce Suite Trading Community Manager User Guide contains the
following chapters:
Chapter 1: Introduction provides a brief overview of the Trading Community
Manager (TCM) application and its supporting documentation.
Chapter 2: Getting Started with Trading Community Manager provides
information on basic TCM procedures. This chapter is designed to get users
quickly acclimated to the application.
Chapter 3: Configuring Trading Community Manager provides instructions on
configuring TCM and conducting application testing with nuBridges.
Chapter 4: Managing Organizations provides instructions on creating and
maintaining organizations.
Chapter 5: Managing Servers and Services provides instructions on creating
and maintaining servers and services.
Chapter 6: Managing Groups provides instructions on creating and maintaining
groups.
Chapter 7: Managing Users provides instructions on creating and maintaining
users.
Chapter 8: Managing Trading Partners provides instructions on creating and
maintaining trading partners.
Chapter 9: Managing Relationships provides instructions on creating and
maintaining trading partner relationships.
Chapter 10: Managing Work Orders provides instructions on creating and
maintaining work orders.
Chapter 11: Managing Certificates provides instructions on creating and
maintaining certificates.
Chapter 12: Managing Events provides instructions on monitoring service and
traffic events.
Chapter 13: Working with Reports explains how to generate reports using TCM.

12

Chapter 1: Overview
Audience

Audience
This guide is intended primarily for use by nuBridges Commerce Suite data
administration personnel responsible for installation, configuration, maintenance, and
use of the Commerce Suite system.
This document has been written with the assumption that nuBridges Commerce Suite
administrators and users have a general understanding of the following concepts and
technologies:
Your business application software and business practices
Electronic Data Interchange over the Internet (EDI-INT)
E-Commerce
Uniform Code Council (UCC)
Data types
Transport protocols
Security standards
The Internet
Windows operating systems
UNIX operating system

13

Chapter 1: Overview
Introduction to the Commerce Suite Documentation Set

Introduction to the Commerce Suite Documentation Set


The following documents make up the nuBridges Commerce Suite library:
Commerce Suite Release Notes. The release notes describe new features,
maintenance updates, and important notes.
Commerce Suite Getting Started Guide. This guide lists hardware and
software requirements, describes Commerce Suite installation, configuration,
and testing procedures, and includes post-installation considerations.
Configuring Commerce Suite Clusters. This guide describes Commerce Suite
clusters and their benefits, and explains how to configure Commerce Suite
clusters using a configuration file or database.
Commerce Suite Administration Guide. This guide describes how to manage
Commerce Suite servers, trading partners, and certificates, and provides other
important information for managing the Commerce Suite application.
Commerce Suite Command Reference. This guide presents an overview of the
Commerce Suite administration commands.
Commerce Suite Protocol Connectivity Guide.
This guide provides
instructions for configuring Commerce Suite connectivity using FTP, SSL, and
AS1 protocols.
Commerce Suite Trading Community Manager User Guide. This guide
describes how to configure and manage your trading community using the
Trading Community Manager graphical user interface.

14

Chapter 1: Overview
Commerce Suite Documentation Roadmap

Commerce Suite Documentation Roadmap


The documentation should be read in the following order for you to understand and
master the concepts and configurations required to get Commerce Suite up and
running quickly:
1. Commerce Suite Release Notes
2. Commerce Suite Getting Started Guide
3. Configuring Commerce Suite Clusters
4. Commerce Suite Administration Guide
The following table provides information about the useful information found in the
Commerce Suite documentation set. Topics include installation instructions,
configuration procedures, and administration tasks that are focused on providing you
with the information you need to get up and running quickly.
Read...
Commerce Suite Release Notes

To Learn About...
New features
Maintenance updates
Documentation updates

Commerce Suite Getting Started Guide

Important notes
The nuBridges AS2 solution
Installing Commerce Suite
Firewall configuration
Licensing and upgrading
Configuring Commerce Suite
Testing Commerce Suite
Work orders
Configuration files
Sending and receiving data
Adding new trading partners
Testing trading partner connectivity
Connecting Commerce Suite to a
supported RDBMS
Oracle, SQL, DB2, Access, and
Informix database support

15

Chapter 1: Overview
Commerce Suite Documentation Roadmap

Read...
Configuring Commerce Suite Clusters

To Learn About...
Understanding
clusters

Commerce

Setting up a cluster
configuration file

Commerce Suite Administration Guide

Suite

using

Setting up a cluster using a supported


database
Commerce Suite basics
Managing Commerce Suite servers
Managing Commerce Suite trading
partners
Managing
certificates

Commerce

Suite

Configuring a backup administrator


Commerce Suite error messages
Database schema for Commerce Suite
deployments
Commerce Suite Command Reference
Commerce Suite commands and
parameters
Commerce Suite Protocol Connectivity Configuring Commerce Suite for use
Guide
with AS1, FTP, and SSL.
Trading Community Manager User Trading Community Manager (TCM)
Guide
hardware and software requirements
Installing TCM
Configuring TCM
Managing organization
Managing servers and services
Managing groups and users
Managing trading
relationships

partners

and

Managing work orders and certificates


Managing events and reports

16

Chapter 1: Overview
Documentation Conventions

Documentation Conventions
This section will familiarize you with the features of this guide. As you will notice,
the left side of this guide has a section that is used for notes, references, and warnings.
These notes are identified by the following icons:
Designates a reference relevant to the adjacent text. The
reference may refer to a procedure, text in another
document, or a definition.
Designates there is additional information that is relevant
to the text on the right side.
Designates a warning or important piece of information.

This guide also utilizes text formatting to help you locate and identify information.
Review the table below for details on the text formatting used in this guide.
Text Format
Bold

Italics

Bold Italics

Example
Click Done.
or
Go to the User Details section.
See the Introduction section
on page 6.
or
Open the configuration.cfg file.
e222
or
Review the nuBridges
Commerce Suite User Guide
for more information.

Explanation
Denotes a section of a screen, field,
button, page, menu, or literal text
that should be typed.
Denotes a reference to a document
section, chapter, or a filename.

Denotes a product name or


document title.

Denotes a key located on the


keyboard.
Denotes that both keys specified
should be pressed at the same time.
For example, to execute CTRL + N,
CTRL + N
KEY + KEY
you would simultaneously press the
CTRL key and the letter N on the
keyboard.
Indicates a command that should be
monospace Type -tr at the command line.
typed as displayed.
Indicates a code variable should be
<monospace> <CustomerName>
typed.
monospace -tr
Indicates sample code.
<monospace> <CustomerName>
Indicates a sample code variable.

SMALL CAPS

Press ENTER.

17

Chapter 1: Overview
Documentation Conventions

Text Format

{}
|
[]
...

Example

Explanation
Indicates the line of code wraps to
addpair <from> <to>
the next line in this documentation
<to-URL> <rcpt-URL>
only. When you enter the code in
<notify-name> <inbox>
Commerce Suite, it should not be
[in|out] [<send-parma>] split between multiple lines.
Indicates a set of choices from
-tb<timeout{s|ms}>
which you must choose one.
Separates two mutually exclusive
[in|out]
choices in a syntax line. Type one of
the choices, not the symbol.
Indicates optional parameters. You
[in|out]
typically type only the information
within the brackets, not the brackets.
Indicates that a parameter can be
importkey <from> <to>
repeated several times in a
<usage> <option>
command line. You enter only the
[...]
information, not the ellipsis (...).

18

Chapter 2: Getting Started with Trading


Community Manager

Introduction .................................................................................................... 20
Opening and Closing TCM ............................................................................ 20
Opening TCM ...................................................................................................................20
Logging In for the First Time .............................................................................................21
Closing TCM .....................................................................................................................21

Navigating TCM ............................................................................................. 22


Parts of the User Interface................................................................................................22
Navigation Pane .........................................................................................................23
Information Pane ........................................................................................................23
Using Online Help.............................................................................................................24
Allowing Blocked Content...........................................................................................24
Printing a Help Topic ..................................................................................................24

Chapter 2: Getting Started with Trading Community Manager


Introduction

Introduction
This chapter provides basic instructions for using TCM to help you get up and running
with the application.

Opening and Closing TCM


This section provides instructions for opening and closing TCM.
Note: To run TCM, you must use Microsoft Internet Explorer, version 6.0 or later. If
you use a different browser, you may experience functional or formatting problems.

Opening TCM
To start TCM, select Start > Programs > nuBridges > Commerce Suite > Trading
Community Manager. The TCM Home page displays.

20

Chapter 2: Getting Started with Trading Community Manager


Opening and Closing TCM

Logging In for the First Time


When logging into TCM for the first time, you must specify your organization name
and an administrator password. The administrator acts as a superuser for the interface
and provides you with the necessary privileges to add organizations, groups, users,
servers, trading partners, relationships, workorders, and certificates.
Note: The administrator login name cannot be changed or deleted once it is created. If
you want to do this, you must uninstall and reinstall the application in order to regain
administrator privileges.
Follow the steps below to set up your administrator login name and password.
1. Click Login. The Initial Administrator Setup Dialog box displays.
2. In the Organization Name field, enter your organization name.
3. The Login Name field contains an administrator login name that is greyed-out
and is not editable.
4. In the Password field, enter the password you want associated with the
administrator userid.
5. In the Confirm Password field, reenter the password you want associated with
the administrator userid.
6. Click Submit to create the system administrator login name and its associated
password within your Windows operating system.

Closing TCM
You can close TCM by using any of the following methods:
On the File menu, click Close.
Click the Trading Community Manager windows Close button (X) in the
upper right corner of the title bar.
Double clicking the Trading Community Managers window control icon in
the upper left corner of the title bar.
Pressing the key combination <ALT> + <F4>.

21

Chapter 2: Getting Started with Trading Community Manager


Navigating TCM

Navigating TCM
This section provides instructions for navigating through the TCM pages. The
following topics are discussed in this section:
Tour of the Trading Community Manager Home Page
Using the Navigation Pane
Using the Information Pane

Parts of the User Interface


The following is a screen capture of the TCM home page. Information on each labeled
feature can be found later in this section.
Logged In User Name

Configuration
Objects

Login Button

Online Help
System
Button

Navigation
Pane

Information Pane/Component Pages

22

Chapter 2: Getting Started with Trading Community Manager


Navigating TCM

Navigation Pane
The left pane of the home page contains a list of configurable objects that may be
selected to configure resources and configuration objects. Selecting an object in the
navigation pane displays that objects component page in the right pane of the home
page.

Information Pane
The information pane on the right side of the TCM home page displays content detail
for the object selected in the Navigation pane. Navigation within the information pane
is accomplished using tabs, links, and command buttons.

23

Chapter 2: Getting Started with Trading Community Manager


Navigating TCM

Using Online Help


Online Help containing overviews, procedures, and information about configuration
attributes is always available from TCM. You can access the online help by clicking
the Help icon (?) located in the upper right corner of the TCM pages. Clicking this
icon opens a small browser window containing information about the active TCM
page you have opened.
In order to access the TCM online help system, you must have Microsoft Internet
Explorer 6.0 or later installed on your machine. In addition, the Web browsers cookie
support must be turned on to receive the full functionality of the TCM help system.
Cookies are used for temporary and permanent storage of certain TCM help features.

Allowing Blocked Content


When you open a help topic, you may see a message at the top of the help window
indicating that active content has been blocked. This means that a setting in Internet
Explorer is preventing the TCM Help file header from displaying. To display the
header and gain access to the full functionality of the help system:
1. From a browser window, select Tools > Internet Options.
2. Click the Advanced tab.
3. Scroll to the bottom of the advanced options list, and find the Security section.
4. Find the Allow active content to run in files on My Computer option. Make
sure this option is marked.
5. Click OK. This allows you to display the TCM Help file header and take
advantage of the full functionality of the help system.

Printing a Help Topic


You can print a copy of any of the topics in the online Help system. Follow the steps
print a help topic.
1. Right click anywhere within the right frame of the help topic.
2. Select Print.

24

Chapter 3: Configuring Trading


Community Manager

Introduction .................................................................................................... 26
Logging In ...................................................................................................... 26
Creating Your Organization............................................................................ 27
Creating a Group ........................................................................................... 29
Creating a User.............................................................................................. 31
Adding a Router............................................................................................. 33
Adding a Transport Agent .............................................................................. 35
Creating an Organization Certificate.............................................................. 37
Configuring the Default Settings for the Organization ................................... 40
Setting Up Trading Partners .......................................................................... 45
Setting Up Your icssvr.cfg Configuration File................................................. 49
Creating the icssvr.cfg File................................................................................................49

Chapter 3: Configuring Trading Community Manager


Introduction

Introduction
This section describes the steps necessary to configure TCM for testing connectivity
with nuBridges and exchanging information with your trading partners.

Logging In
This section provides instructions on logging in to TCM.
Follow the steps below to login to the TCM application.
1. From the Start menu select Start > Programs > nuBridges > Commerce
Suite > Trading Community Manager. The TCM Home page displays.

2. Click Login to open the Login dialog box.

3. Enter your login name and password into the appropriate fields and click
Submit. The login dialog box disappears and your user name displays at the top
of the window next to the Logout button.

26

Chapter 3: Configuring Trading Community Manager


Creating Your Organization

Creating Your Organization


In this step, you add the detailed information for the Organization you specified when
you logged in for the first time (see the Logging In for the First Time section on
page 21). This is the default organization.
1. From the TCM Home Page, select Organizations. The Organizations List
page opens, displaying your organization in the list.

2. Click your organization name. The Organization Summary page opens.

27

Chapter 3: Configuring Trading Community Manager


Creating Your Organization

3. Click the Contacts tab. The Contact Information page displays.

4. Enter your Organization contact information and click Save. A message


displays indicating that the Organization has been updated.

5. Click OK. You are returned to the Organization Summary page.

28

Chapter 3: Configuring Trading Community Manager


Creating a Group

Creating a Group
Follow the steps below to create a new group.
1. Click the Groups tab. The Group List page displays.

2. Click the New button. The Group Information page displays.

29

Chapter 3: Configuring Trading Community Manager


Creating a Group

3. In the Group Name and Description fields, type View Only Group.
4. Check the View box for Organizations, Users and Groups, Trading
Partners, Relationships and Work Orders, and Certificates. This indicates
that this group can only view records in these databases.
5. Click Save. A message displays indicating that the group has been created.

6. Click OK. You are returned to the Group List page. Notice that the new group
now appears in the list.

30

Chapter 3: Configuring Trading Community Manager


Creating a User

Creating a User
Follow the steps below to create a user.
1. Click the Users tab. The User List page displays.

2. Click the New button. The User Information page displays.

3. Select View Only Group from the User Group drop down list.
4. Enter the users name and other information.
5. Enter the users login ID and password.

31

Chapter 3: Configuring Trading Community Manager


Creating a User

6. Click Save. A message displays indicating that the user has been created.

7. Click OK. You are returned to the User List page. Notice that the new user now
appears in the list.

32

Chapter 3: Configuring Trading Community Manager


Adding a Router

Adding a Router
You must be using Commerce Suite Enterprise to use the router functionality.
Follow the steps below to create a router.
1. Click the Servers tab. The Server List page displays.

2. Click New to add a new server. The Server Information page displays.

3. Enter Router as the New Service Name.

33

Chapter 3: Configuring Trading Community Manager


Adding a Router

4. Click Add. A message displays indicating that the server has been added.

5. Click OK. You are returned to the Server Information page.


6. Select Router from the Server Name drop down list.
7. Enter Router as the Service Name.
8. Select Router as the Service Role.
9. Enter the URL and Control URL information.
10. Click Save. A message displays indicating the Service has been added.

C
11. Click OK. You are returned to the Server Service List page. Notice that the
Router service now appears in the list.

34

Chapter 3: Configuring Trading Community Manager


Adding a Transport Agent

Adding a Transport Agent


You must be using Commerce Suite Enterprise to use the transport functionality.
Follow the steps below to add a transport agent.
1. Click New to add another new server. The Server Information page displays.

2. Enter Transport as the New Service Name.


3. Click Add. A message displays indicating that the server has been added.

4. Click OK. You are returned to the Server Information page.


5. Select Transport from the Server Name list.

35

Chapter 3: Configuring Trading Community Manager


Adding a Transport Agent

6. Enter Transport as the Service Name.


7. Select Transport as the Service Role.
8. Enter the URL and Control URL information.
9. Click Save. A message displays indicating the Service has been added.

10. Click OK. You are returned to the Server Service List page. Notice that the
new Transport service now appears in the list.

36

Chapter 3: Configuring Trading Community Manager


Creating an Organization Certificate

Creating an Organization Certificate


Follow the steps below to create an organization certificate.
1. Click the Certificates tab. The Certificate List page displays.

2. Click Add. The Certificate Information page displays.

3. Select the Create radio button. The Certificate Creation page displays.

37

Chapter 3: Configuring Trading Community Manager


Creating an Organization Certificate

4. Enter the Common Name for the certificate. We recommend that you assign a
Common Name that identifies the trading relationship of the certificate.
5. Select the appropriate Key Usage, Key Size (1024), and valid date range for the
certificate.
6. Click Create. A message displays indicating that the certificate has been
created.

7. Click OK. You are returned to the Certificate List page. Notice that the new
certificate now appears in the list.

8. Click the Serial Number to see the certificate detail.

38

Chapter 3: Configuring Trading Community Manager


Creating an Organization Certificate

9. Click the detail line to change the certificates status. The Certificate Status
Edit box displays.

10. Select active as the status.


11. Click OK. A message displays indicating the certificates status has been
changed.

12. Click OK. You are returned to the Certificate List page. Notice the certificates
status now appears as Active.

39

Chapter 3: Configuring Trading Community Manager


Configuring the Default Settings for the Organization

Configuring the Default Settings for the Organization


Follow the steps below to configure the default settings for the organization.
1. Select the Default Settings tab. The Basic Settings page displays.

2. Click New AS1/AS2 Name to add your AS2 name. The Add/Edit AS1/AS2
Name dialog box displays.

40

Chapter 3: Configuring Trading Community Manager


Configuring the Default Settings for the Organization

3. Enter your AS1 or AS2 name (maximum 32 characters).


4. Click Save. A message displays indicating that you must complete the Default
Settings wizard and click Finish before the AS1/AS2 name is added to the
database.

5. Click OK. You are returned to the Basic Settings page. Notice that your AS2
name now appears in the list.
6. In the Would you like TCM to alert Commerce Suite each time a change is
made to your Trading Partner? box, select on of the following:
Yes

Always automatically update changes.

No

Never update changes.

Ask

The system will ask you if you want to update


Commerce Suite each time a change is made.

41

Chapter 3: Configuring Trading Community Manager


Configuring the Default Settings for the Organization

7. Click Next. The Default Settings page displays.

8. Click New URL to add your default AS2 URL. The Add/Edit URL dialog box
displays.

9. Complete the screen using the field descriptions below.


Server

Enter your AS2 URL.

Port

Enter 4080.

Set as Default

Mark this checkbox.


42

Chapter 3: Configuring Trading Community Manager


Configuring the Default Settings for the Organization

10. Click Save. A message displays indicating that you must complete the wizard
and click Finish before the URL is added to the database.

11. Click OK. You are returned to the Default Settings page. Notice that the URL
now appears in the list.
12. Accept the default Message Delivery Notification settings.
13. Click Next. The Default Security Settings page displays.

43

Chapter 3: Configuring Trading Community Manager


Configuring the Default Settings for the Organization

14. Select the default security settings for your organization.


15. Click Finish. A message displays indicating that you have completed the
wizard.

16. Click OK. You are returned to the Organization Summary page. Notice that
the Summary and Checklist columns reflect the actions taken in the previous
steps.

44

Chapter 3: Configuring Trading Community Manager


Setting Up Trading Partners

Setting Up Trading Partners


TCM provides two methods of creating trading partners - manually, or using the Easy
Setup Wizard. The Easy Setup Wizard method is described below. For instructions on
creating trading partners manually, please review Chapter 8: Managing Trading
Partners .
1. Click Trading Partners in the left navigation pane. The Trading Partners List
page displays.

2. Click Launch Easy Setup in the upper right corner of the page. The Basic
Information page displays.

3. In the Trading Partner field, enter the name of the Trading Partner.
4. In the AS1/AS2 Name field, enter the AS1 or AS2 name for the Trading Partner
(maximum 32 characters).

45

Chapter 3: Configuring Trading Community Manager


Setting Up Trading Partners

5. In the URL Address field, select the protocol and enter the URL address for the
Trading Partner.
6. If you selected FTP as the protocol, and you want to use a different address for
notifications sent to this Trading Partner, select the checkbox and enter the
alternate MDN address.

7. In the Certificate File field, enter the name of the certificate file provided by
this trading partner, or click Browse to select it.
8. Click Next. The Sending Parameters page displays.

9. Select the appropriate Sending Parameters.

46

Chapter 3: Configuring Trading Community Manager


Setting Up Trading Partners

10. Click Next. The Trading Information for Your Organization page displays.

11. From the Organization list, select the appropriate organization. The Default
Settings fields are populated with the default settings for the selected
organization.
12. Select the checkbox indicating that you do not want to use the default settings.
A message displays indicating that you must set up the trading partner using the
manual method (see Chapter 8: Managing Trading Partners for instructions).
OR
Click Next to accept the default settings and continue the Easy Setup Wizard.
The Setup Summary page displays.

47

Chapter 3: Configuring Trading Community Manager


Setting Up Trading Partners

13. Verify that the information is correct. If it is not correct, click Back to return to
the appropriate page and correct the information. If it is correct, click Finish. A
message displays indicating that you have completed the wizard.

14. Click OK. You are returned to the Trading Partner List page.

48

Chapter 3: Configuring Trading Community Manager


Setting Up Your icssvr.cfg Configuration File

Setting Up Your icssvr.cfg Configuration File


The icssvr.cfg file is a text file containing configuration commands that are loaded and
read each time the application is started. This file also contains trading partner
information specifying inbound and outbound definitions, certificate assignments, and
commands to invoke listeners on IP addresses and ports.
The icssvr.cfg file is a text file using an XML command structure. As such, all
configuration files must begin with a beginning xml tag (<xml>) and end with an xml
tag (</xml>). Please note that it is not necessary to include a new-line or carriagereturn and line-feed combination between commands.

Creating the icssvr.cfg File


nuBridges recommends that you use a standard Windows text editor, such as Notepad
or Wordpad to create the icssvr.cfg file. The icssvr.cfg file you create must contain, at a
minimum, the following elements and should be saved to the same directory
containing the icssvr.exe file. Remember to use values specific to your organization.
Sample Trading Community Manager icssvr.cfg File
<xml>
<!--

TCM DB Config

-->

<command>set -ga</command>
<command>set -npnotice -nf- -nd</command>
<command>set -lplog -lf</command>
<command>set -rpreceipt</command>
<command>set -opworkorder -oswo -of</command>
<command>set -eperror -ef</command>
<command>set -tr300s</command>
<command>set -dnisoft -dhdev1 -duisoft -dpisoft </command>
<command>start database</command>
<!-- Start services -->
<command>start http://yourIPaddress:4080/</command>
<!--

retrieve database information

-->

<command>getpairs</command>
<command>sleep 5</command>
<command>getkeys</command>

49

Chapter 4: Managing Organizations

Introduction .................................................................................................... 51
What is an Organization? .............................................................................. 51
Opening Your Organization List ..................................................................... 51
Opening the Organization Summary Page .................................................... 52
Creating an Organization............................................................................... 53
Editing Organization Information ................................................................... 60
Deleting an Organization ............................................................................... 61
Organizations Pages Field Definitions........................................................... 61
Organizations Page Definitions ..................................................................... 61
Organization Contacts Page Field Definitions ............................................... 62
Organization Default Settings Field Definitions ............................................. 64
Basic Settings Page..........................................................................................................64
Default Settings Page .......................................................................................................64
Default Security Settings Page .........................................................................................65

Chapter 4: Managing Organizations


Introduction

Introduction
This chapter explains how to manage organizations using TCM.

What is an Organization?
In TCM, an Organization can be defined as an entity that participates in datainterchange relationships, such as your company, or a division within your company.
An Organization provides the base for storing Groups and Users in the Commerce
Suite relational database. For example, your company has Regional offices in different
parts of the country. You might set up an organization for each region, such as
Northern, Eastern, Southern, and Western.
Within these organizations, you can create groups of users with varying permissions to
set up and maintain other components within the TCM application.
Note: Only System Administrators can add new Organizations. See the What is a
Group? section on page 79 for more information on System Administrators.

Opening Your Organization List


The Organization List contains the name of every organization you have added and
defined for use with the TCM product.
Follow the steps below to open your Organization List.
1. Click Organizations in the Navigation pane. The Organizations page displays
containing your Organization List.

2. From within the Organization List, click an organization name. The Summary
page for the organization opens. This screen displays detailed organization
information. Review the Opening the Organization Summary Page section on
page 52 for a detailed description of the information found on this page.

51

Chapter 4: Managing Organizations


Opening the Organization Summary Page

Opening the Organization Summary Page


Follow the steps below to open the Organization Summary page.
1. Click Organizations in the Navigation pane. The Organizations page displays
containing your Organization List.
2. From within the Organization List, click an organization name. The Summary
page for the selected organization displays.

Each organization Summary page contains a tabbed interface and linked Data
Check List of configurable resources. Configured resources are displayed in
green and unconfigured resources are displayed in red. Clicking a resource tab
or a Data Check List item opens that resource page enabling you to configure
that organization resource.
The Summary page also includes a Data Summary list indicating how many
organization resources have been configured.

52

Chapter 4: Managing Organizations


Creating an Organization

Creating an Organization
Follow the steps below to create a new organization.
1. Click Organizations in the Navigation pane. The Organizations page displays
containing your Organization List.

53

Chapter 4: Managing Organizations


Creating an Organization

2. Click the New Organization link located at the top of the Organization page.
The Organization Information Contacts tab opens.

3. In the Organization Unit Name field, enter the name of your new organization.
This is the only field you are required to populate.
4. Enter text in the Address, Primary Contact, and Secondary Contact
information fields as appropriate. Entering this contact information is optional.
5. Click Save. A confirmation dialog box displays indicating your organization
has been added.

54

Chapter 4: Managing Organizations


Creating an Organization

6. Click OK. The confirmation dialog box closes and the new organization
Summary page displays.

7. Select the Default Settings tab. The Basic Settings page is displayed.
Note: The following steps configure the default settings for the new
organization. Default settings allow the objects within the organization to
inherit the settings of the organization.

55

Chapter 4: Managing Organizations


Creating an Organization

8. Click New AS/1AS2 Name. The Add/Edit AS1/AS2 Name dialog box
displays.

9. Enter your AS1 or AS2 name (maximum 32 characters). Click Save. A


message displays indicating that you must complete the Organization wizard
and click Finish before the AS1/AS2 name is added to the database.

10. Click OK. You are returned to the Basic Settings page. Notice that the new
AS1/AS2 name now appears in the list.

56

Chapter 4: Managing Organizations


Creating an Organization

11. Click Next. The Default Settings page displays. This page acts as step 2 of the
Organization Wizard.

12. Click New URL to add the default URL. The Add/Edit URL dialog box
displays.

57

Chapter 4: Managing Organizations


Creating an Organization

13. Enter the appropriate information for the default URL then click Save. A
message displays indicating that you must complete the wizard and click Finish
before the URL is added to the database.

14. Click OK. You are returned to the Default Settings page. Notice that the URL
now appears in the list.
15. Enter the appropriate Message Delivery Notification settings (see the
Organization Default Settings Field Definitions section on page 64 for field
definitions). Click Next. The Default Security Settings page displays.

58

Chapter 4: Managing Organizations


Creating an Organization

16. Select the default security settings for your organization then click Finish. A
message displays indicating that you have completed the wizard.

17. Click OK to dismiss the dialog box, complete the wizard, and return to the
Organization Summary page.

59

Chapter 4: Managing Organizations


Editing Organization Information

Editing Organization Information


Follow the steps below to edit organization information.
1. Click Organizations in the Navigation pane. The Organizations page displays
containing your Organization List.
2. From the Organization List, click the name of the organization whose contact
information you want to edit. The selected Organization Summary page
displays.
3. Click the Contacts tab to display the Name, Address, Primary Contact, and
Secondary Contact information fields.
4. Edit the Contact information as appropriate and click Save or Cancel
depending on whether you want to save or dismiss your modification.
Note: The following steps configure the default settings for the new
organization. Default settings allow the objects within the organization to
inherit the settings of the organization.
5. Click the Default Settings tab. The Basic Settings page is displayed. This page
acts as step 1 of the Organization Wizard.
6. Select the AS1/AS2 Name you want to change, change the name as appropriate,
and click Save.
7. Click Next. The Default Settings page displays. This page acts as step 2 of the
Organization Wizard.
8. Enter the appropriate URL and Message Delivery Notification options (see the
Organization Default Settings Field Definitions section on page 64 for more
information).
9. Click Next. The Default Security Settings page displays. This page acts as step
3 of the Organization Wizard.
10. Enter the appropriate security settings for your organization and click Finish to
complete the wizard. A confirmation dialog box opens indicating that you have
completed the wizard.
11. Click OK to dismiss the dialog box, complete the wizard, and return to the
Organization Summary page.

60

Chapter 4: Managing Organizations


Deleting an Organization

Deleting an Organization
Follow the steps below to delete an organization.
1. Click Organizations in the Navigation pane. The Organizations page displays
your Organization List.
2. Click the Delete (X) button to the right of the organization name you want to
delete from the TCM system. A confirmation dialog box displays asking you to
confirm the organization deletion.
3. Click Yes to dismiss the confirmation dialog box and return to the Organization
List. Your deleted organization no longer resides in the list.
Note: You cannot delete the default organization.

Organizations Pages Field Definitions


This section contains field definitions for all the TCM Organizations pages.

Organizations Page Definitions


Use the Organizations page to add a new organization and view a list of defined and
saved organizations. The following field definitions apply to the Organizations page:
Organization List

provides a listing of defined and saved organizations.

61

Chapter 4: Managing Organizations


Organization Contacts Page Field Definitions

Organization Contacts Page Field Definitions


Use the Organization Contacts page to define the contact information for your
organization. The following field definitions apply to the Organization Contacts
page:
The following field definitions apply to the Name group.
Organization Unit
Name

Specifies the name of the organization unit. The size of


the name can range from 1-75 characters. The following
values are invalid: double space, ampersand (&), single
quote (), backslash (\), less-than sign (<), greater-than
sign (>).

The following field definitions apply to the Address group.


Address 1

Specifies the organizations primary address. The size of


the address can range from 1-90 characters.

Address 2

Specifies the organizations secondary address. The size


of the address can range from 1-90 characters.

City

Specifies the city in which the organization resides. The


size of the name can range from 1-30 characters.

State

Specifies the state in which the organization resides. The


size of the name can range from 1-75 characters. The
size of the name can range from 1-30 characters.

Postal Code

Specifies the postal code associated with the


organizations address. The size of the postal code can
range from 1-15 characters.

Country

Specifies the country in which the organization resides.


The size of the name can range from 1-45 characters.

Region

Specifies the region in which the organization resides.


The size of the name can range from 1-45 characters.

The following field definitions apply to the Primary Contact group.)


Name

Specifies the name of the primary contact. The size of


the name can range from 1-35 characters.

Title

Specifies the title of the primary contact. The size of the


name can range from 1-25 characters.

62

Chapter 4: Managing Organizations


Organization Contacts Page Field Definitions

Email

Specifies the email address of the primary contact. The


size of the address can range from 1-45 characters.

Phone

Specifies the phone number of the primary contact. The


size of the number can range from 1-18 characters.

Phone Ext.

Specifies the phone extension of the primary contact.


The size of the number can range from 1-8 characters.

Pager

Specifies the pager number of the primary contact. The


size of the number can range from 1-18 characters.

Pager PIN

Specifies the personal identification number (PIN) for


the pager number. The size of the number can range
from 1-8 characters.

Mobile

Specifies the mobile phone number of the primary


contact. The size of the number can range from 1-18
characters.

The following field definitions apply to the Secondary Contact group.


Name

Specifies the name of the secondary contact. The size of


the name can range from 1-35 characters.

Title

Specifies the title of the secondary contact. The size of


the name can range from 1-25 characters.

Email

Specifies the email address of the secondary contact.


The size of the address can range from 1-45 characters.

Phone

Specifies the phone number of the secondary contact.


The size of the number can range from 1-18 characters.

Phone Ext.

Specifies the phone extension of the secondary contact.


The size of the number can range from 1-8 characters.

Pager

Specifies the pager number of the secondary contact.


The size of the number can range from 1-18 characters.

Pager PIN

Specifies the personal identification number (PIN) for


the pager number. The size of the number can range
from 1-8 characters.

Mobile

Specifies the mobile phone number of the secondary


contact. The size of the number can range from 1-18
characters.

63

Chapter 4: Managing Organizations


Organization Default Settings Field Definitions

Organization Default Settings Field Definitions


Use the Default Settings tab to define your AS1/AS2 name and URL, message
delivery notification options, and default security settings.

Basic Settings Page


New AS1/AS2
Name

Specify the name used to identify your organization to


other trading partners. The size of the name can range
from 1-32 characters. The following values are invalid:
double-space, ampersand (&), single quote (),
backslash (\), less-than sign (<), greater-than sign (>).

Default Settings Page


New URL

Specify the default URL used to contact your


organization.

The following field definitions apply to the Message Delivery Notification


group.
Request MDN

Select No if you do not want to receive a delivery


receipt. Yes is the default.

Request
Asynchronous MDN Select No if you do not want the receipt to be delivered
out of bound. Selecting Yes may increase outbound
throughput. Yes is the default value.
Request
Signed MDN

Select whether you want your receipt to be digitally


signed. Select one of the following options:
Choose

To

Yes (SHA-1)

Specify you want a digitally signed


receipt using the SHA-1 algorithm.

Yes (MD5)

Specify you want a digitally signed


receipt using the MD5 algorithm.

No

Specify you do not want a digitally


signed receipt.

64

Chapter 4: Managing Organizations


Organization Default Settings Field Definitions

Default Security Settings Page


Encryption

Specify the type of encryption algorithm used to encrypt


and decrypt messages.
Choose from among the following algorithm options:

Signature

Choose

To

DES-3

Encrypt and decrypt messages using the Triple


Data Encryption algorithm. DES-3 is DES run
three times with three different keys. It uses a
192-bit key and has an effective strength of 168bits. The DES-3 symmetric cipher is defined in
Federal Information Processing Standards
(FIPS) publication 46.3.

RC2

Encrypt and decrypt messages using the Rivests


Cipher encryption algorithm. RC2 is a
conventional (secret key) symmetric encryption
algorithm and has a block size of 64-bits with a
variable key size from one byte up to 128 bytes.
Refer to RFC 2268 for more information on the
RC2 cipher.

Specify the type of signature used to verify a files


integrity.
Choose from among the following options:
Choose

To

MD5

Verify a files integrity using the MD5 cipher.


The MD5 cipher is a one-way hash algorithm that
takes any length of data and produces a 128-bit
fingerprint or message digest. This
fingerprint is non-reversible, meaning that the
data cannot be determined based on its MD5
fingerprint. Refer to RFC 1321 for more
information on the MD5 cipher.

SHA-1

Verify a files integrity using the Secure Hash


Algorithm. The SHA-1 cipher generates a 160-bit
condensed representation of a message called a
message digest. The SHA-1 is used by both the
transmitter and intended receiver of a message in
computing and verifying a digital signature.

65

Chapter 4: Managing Organizations


Organization Default Settings Field Definitions

Compression

Specify the type of compression format when sending


your data.
Choose from among the following algorithm options:
Choose

To

DEFLATE Specifies the DEFLATE compression


algorithm used to reduce the file transfer
overhead. Refer to RFC-1521 for more
information on the DEFLATE compression
algorithm. The DEFLATE compression
algorithm is a lossless compressed data format
that compresses data using a combination of
the LZ77 algorithm and Huffman coding.
GZIP

Key Encryption

Specifies a lossless compressed data format


that is compatible with the widely used GZIP
utility. Refer to RFC-1522 on more
information on GZIP compression. This
format includes a cyclic redundancy check
value for detecting data corruption.

Specify the type of encryption system for digital


signature generation and verification.
Choose from among the following algorithm options:
Choose To
RSA

Specifies the RSA public-key cryptosystem that


offers both encryption and digital signatures. With
RSA, encryption and authentication take place
without any sharing of private keys: each person
uses only anothers public key to encrypt data and
verify the signature, or their own private key to
decrypt data and verify the signature. Anyone can
send an encrypted message or verify a signed
message, but only someone in possession of the
correct private keys can decrypt or sign a message.

DSS

Specifies the Digital Signature Algorithm (DSA)


for digital signature generation and verification.
The DSS cipher is defined in the FIPS publication
186. The DSA is used by a signatory to generate a
digital signature on data and by a verifier to verify
the authenticity of the signature. Each signatory
has a public and private key. The private key is
used in the signature generation process and the
public key is used in the signature verification
process.
66

Chapter 5: Managing Servers and Services

Introduction .................................................................................................... 68
Managing Servers.......................................................................................... 68
What is a Server? .............................................................................................................68
Creating a Server..............................................................................................................69
Editing a Server ................................................................................................................70
Deleting a Server ..............................................................................................................70

Managing Services ........................................................................................ 71


What is a Service?............................................................................................................71
Viewing Your Server Service List......................................................................................71
Viewing Server Service Information..................................................................................72
Creating a Service ............................................................................................................73
Editing a Service...............................................................................................................74
Deleting a Service.............................................................................................................74

Servers and Services Page Field Definitions................................................. 75


Servers Page Definitions ..................................................................................................75
Server Service Information Page Definitions ....................................................................76

Chapter 5: Managing Servers and Services


Introduction

Introduction
This chapter explains how to manage servers using TCM.

Managing Servers
This section contains the following topics:
What is a Server?
Creating a Server
Editing a Server
Deleting a Server

What is a Server?
In TCM, a Server can be defined as a physical computer that is running
Administrative, Transport, or Router Agent services. Servers are created under
Organizations and provide a method of grouping your installations of the Commerce
Suite software, called Services in TCM. You can assign multiple Services to a single
Server.
For example, within the Western organization, you can create a Server called
Purchasing. There may be three servers in this organization with the Commerce Suite
application installed, so there would be three Services contained within the Purchasing
server.

68

Chapter 5: Managing Servers and Services


Managing Servers

Creating a Server
Follow the steps below to create a new server.
1. Click Servers in the Navigation pane. The Servers page opens to display your
Server Service List.

2. Click the New Service link to open the Server Service Information page

3. In the Organization Unit list, click the organization with which the server is to
be associated.
4. Enter the name of the server you want to add in the New Server Name field.
5. Click Add. A confirmation dialog box displays indicating your server has been
added and defined within the TCM system.
6. Click OK to dismiss the confirmation dialog box and return to the Server
Service Information page.
Note: The server will not be added to the Server Services List on the Servers
page until a TCM service has been associated with it.
69

Chapter 5: Managing Servers and Services


Managing Servers

Editing a Server
Follow the steps below to edit an existing server name.
1. Click Servers in the Navigation pane. The Servers page opens to display your
Server Services List.
2. Click the New Service link. The Server Service Information page displays.
3. In the Organization Unit list, click the organization associated with the server
you want to edit.
4. Click Edit/Delete. A dialog box containing the Server List displays.
5. Click the server name you want to edit. The Server Edit dialog box opens
providing an editable Server Name field.
6. Edit the server name as appropriate.
7. Click Save to save your changes. A confirmation dialog box opens indicating
the server has been updated.
8. Click OK to dismiss the confirmation dialog box and return to the Server List
dialog box.
9. Click Close to dismiss the Server List dialog box and return to the Server
Service Information page.

Deleting a Server
Perform the following steps to delete an existing server.
1. Click Servers in the Navigation pane. The Servers page opens displaying your
Server Services List.
2. Click the New Service link. The Server Service Information page displays.
3. In the Organization Unit list, click the organization associated with the server
you want to edit.
4. Click Edit/Delete. A dialog box containing the Server List displays.
5. Click the Delete (X) button next to the server name you want to delete. A dialog
box opens indicating that all services on this server will be also be deleted.
6. Click Yes to confirm you want to delete the server, dismiss the dialog box, and
return to the Server List dialog box.
7. Click Close to dismiss the Server List dialog box and return to the Server
Service Information page. The Server and Service names are removed from the
Server and Server Services lists.
70

Chapter 5: Managing Servers and Services


Managing Services

Managing Services
This section contains the following topics:
What is a Service?
Viewing Your Server Service List
Viewing Server Service Information
Creating a Service
Editing a Service
Deleting a Service

What is a Service?
In TCM, a Service can be defined as an installation of the Commerce Suite software.
There are three types of services:
Admin - Provides administrative services including the remote configuration of
Transport and Router Agents and access to centrally located configuration data.
Transport - Provides transport services including the compression, encryption
and delivery of data, the verification of digital signatures, and the construction
and transmission of Delivery Notifications.
Router - Provides routing services including round-robin selection of Transport
Agents, message-queuing, and fail-over retransmission.

Viewing Your Server Service List


To view your Server Service List, click Servers in the Navigation pane. The Servers
page opens to display your Server Services List.

71

Chapter 5: Managing Servers and Services


Managing Services

Viewing Server Service Information


Follow the steps below to view Server Service Information.
1. Click Servers in the Navigation pane. The Servers page opens to display your
Server Services List.
2. From within the Server List, click a server name to open the Server Service
Information page and display more detailed server information.

72

Chapter 5: Managing Servers and Services


Managing Services

Creating a Service
A service is considered any instance of the TCM application installed on a physical
server.
Follow the steps below to create a service.
1. Click Servers in the Navigation pane. The Servers page opens to display your
Server Services List.
2. Click the New Service link or the New button to open the Server Service
Information page.
3. In the Organization Unit list, click the organization with which the server
service is to be associated.
4. In the Server Name list, select the server on which the service will reside.
5. In the Service Name field, enter a name for the new service.
6. In the Service Role list, select the TCM service role.
7. In the Service Group list, select a peer-group identifier for the service. This is
an optional step.
8. In the URL field, enter the address on which the server will listen for data of a
particular protocol.
9. In the Control URL field, enter the address on which the server will listen for
control messages of a particular protocol. This is a required step for router and
transport configurations.
10. Click Save. A confirmation dialog box opens indicating the service has been
added.
11. Click OK to dismiss the confirmation dialog box and return to the Servers
page. The new service appears in the Server Service list.

73

Chapter 5: Managing Servers and Services


Managing Services

Editing a Service
Follow the steps below to edit a service.
1. Click Servers in the Navigation pane. The Servers page opens to display your
Server Services List.
2. Click the row containing the server service you want to edit. The Server
Service Information page opens.
3. In the Server Name list, select the server on which the service will reside.
4. In the Service Name field, enter a name for the new service.
5. In the Service Role list, select the TCM service role.
6. In the Service Group list, select a peer-group identifier for the service. This is
an optional step.
7. In the URL field, enter the address on which the server will listen for data of a
particular protocol.
8. In the Control URL field, enter the address on which the server will listen for
control messages of a particular protocol. This is an optional step.
9. Click Save. A confirmation dialog box opens indicating the service has been
updated.
10. Click OK to dismiss the confirmation dialog box and return to the Servers
page. The updated service appears in the Server Service list.

Deleting a Service
Follow the steps below to delete a service.
1. Click Servers in the Navigation pane. The Servers page opens to display your
Server Services List.
2. Click the Delete (X) button next to the server service name you want to delete.
A dialog box opens prompting you to confirm you want to delete the service.
3. Click Yes to dismiss the dialog box and remove the service from the Server
Service list.

74

Chapter 5: Managing Servers and Services


Servers and Services Page Field Definitions

Servers and Services Page Field Definitions


This section contains field definitions for all the TCM Servers and Services pages.

Servers Page Definitions


Use the Servers page to search for, add, and view user-defined TCM servers and
services.
The following field definitions apply to the Servers page:
Organization Unit

Specifies an organization defined within the TCM


configuration. The organization unit is the main
configurable object upon which all other TCM
definitions are associated.

Type

Specifies the service type, either defined or undefined.


To change a service from undefined to defined, select
the service from the list, edit it, and save it, following
the steps in the Editing a Service section on page 74.

Server Service List

Provides a listing of saved servers and their defined


TCM services.

75

Chapter 5: Managing Servers and Services


Servers and Services Page Field Definitions

Server Service Information Page Definitions


Use the Server Service Information page to define server and service definitions
associated with a specified organization.
The following field definitions apply to the Server Service Information page:
Organization Unit

Specifies an organization defined within the TCM


configuration. The organization unit is the main
configurable object upon which all other TCM
definitions are associated.

New Server Name

Specifies a user-defined name identifying a new server/


protocol combination. The size of the name can range
from 1-20 characters.

Server Name

Specifies a user-defined name identifying a new server/


protocol combination.

Service Name

Specifies the name associated with the installed TCM


instance. This Service Name is defined in relation to the
server hosting the TCM instance. The size of the name
can range from 1-20 characters.

Service Role

Specifies the remote agent role.


Choose from among the following options:
Choose

To

router

Specify the TCM instance as a router agent.


The router agent routes incoming data to one
or more transport agents.

transport

Specify the TCM instance as a transport


agent. The transport agent performs
message packaging and unpacking
functions such as encryption and digital
signatures.

available for Specify that the TCM instance may be


configuration configured at a later time.

76

Chapter 5: Managing Servers and Services


Servers and Services Page Field Definitions

Service Group

Specifies the peer-group identifier to which this service


belongs. Selecting a group identifier allows the server to
be clustered into the group enabling it to perform a
router or admin role.

URL

Specifies the address on which the server will listen for


data of a particular protocol. The size of the address can
range from 1-90 characters.

Control URL

Specifies the control address of the remote address. This


is the address on which the server will listen for control
messages of a particular protocol. The size of the
address can range from 1-90 characters.

77

Chapter 6: Managing Groups

Introduction .................................................................................................... 79
What is a Group?........................................................................................... 79
Creating a Group ........................................................................................... 80
Viewing Your Group List ................................................................................ 82
Viewing Group Information ............................................................................ 82
Editing Group Information.............................................................................. 84
Deleting a Group............................................................................................ 85
Group Pages Field Definitions ....................................................................... 85
Groups Page Definitions ...................................................................................................85
Group Information Page Field Definitions.........................................................................86

Chapter 6: Managing Groups


Introduction

Introduction
This chapter explains how to manage groups using TCM.

What is a Group?
In TCM, a Group can be defined as a collection of Users who have the same editing
privileges. For example, you may want to allow some users to add and modify Trading
Partner information. You might create a Group called Add Trading Partners and assign
the add and modify permissions to this group.
You may want to allow other users to add, modify, and delete Users and Trading
Partner information. You might create a Group called Add/Modify/Delete and assign
the add, modify, and delete users and trading partners permissions to the users in this
group.
Groups are defined under each Organization and are specific to that Organization.
They cannot be shared between Organizations. Users within each Organization/Group
can only access data within their own Organization.
Note: When you install the TCM application, a System Administrator group is created
automatically. This group has full access privileges to all data.

79

Chapter 6: Managing Groups


Creating a Group

Creating a Group
Follow the steps below to create a new group.
1. Click Groups in the Navigation pane. The Groups page opens to display your
Group List.

2. Click the New Group link. The Group Information page displays.

80

Chapter 6: Managing Groups


Creating a Group

3. In the Organization Unit list, select the organization with which the group is to
be associated.
4. Complete the screen using the field descriptions below.
Group Name

Enter a name for the new group.

Description

Enter a description for the group.

Organizations

Specify your groups permissions relative to


organizations. You can click as many as necessary. This
is an optional step.

Users and Groups

Specify your groups permissions relative to users and


groups. You can click as many as necessary. This is an
optional step.

Trading Partners

Specify your groups permission relative to trading


partners. You can click as many as necessary. This is an
optional step.

Relationships and
Work Orders

Specify your groups permissions relative to


relationships and work orders. You can click as many as
necessary. This is an optional step.

Certificates

Specify your groups permissions relative to certificates.


You can click as many as necessary. This is an optional
step.

Reports

Specify your group's permissions relative to report


generation. This is an optional step.

5. Click Save. A confirmation dialog box open indicating the group has been
added.
6. Click OK to dismiss the dialog box and return to the Groups page. The new
group appears in the Group List.

81

Chapter 6: Managing Groups


Viewing Your Group List

Viewing Your Group List


To view your Group List, click Groups in the Navigation pane. The Groups page
opens to display your Group List.

Viewing Group Information


Follow the steps below to view group information.
1. Click Groups in the Navigation pane. The Groups page opens to display your
Group List.

82

Chapter 6: Managing Groups


Viewing Group Information

2. From within the Group List, click the group you want edit. The Group
Information opens.

83

Chapter 6: Managing Groups


Editing Group Information

Editing Group Information


Follow the steps below to edit group information.
1. Click Groups in the Navigation pane. The Groups page opens to display your
Group List.
2. From within the Group List, click the group you want edit. The Group
Information opens.
3. In the Organization Unit list, click the organization with which the group is to
be associated.
4. Complete the screen using the field descriptions below.
Group Name

Modify the group name as appropriate.

Description

Modify the group description as appropriate.

Organizations

Specify your groups permissions relative to


organizations. You can click as many as necessary. This
is an optional step.

Users and Groups

Specify your groups permissions relative to users and


groups. You can click as many as necessary. This is an
optional step.

Trading Partners

Specify your groups permission relative to trading


partners. You can click as many as necessary. This is an
optional step.

Relationships and
Work Orders

Specify your groups permissions relative to


relationships and work orders. You can click as many as
necessary. This is an optional step.

Certificates

Specify your groups permissions relative to certificates.


You can click as many as necessary. This is an optional
step.

Reports

Specify your group's permissions relative to report


generation. This is an optional step.

5. Click Save. A confirmation dialog box opens indicating the group has been
updated.
6. Click OK to dismiss the dialog box and return to the Groups page. The new
group appears in the Group List.
84

Chapter 6: Managing Groups


Deleting a Group

Deleting a Group
Follow the steps below to delete a group.
1. Click Groups in the Navigation pane. The Groups page opens to display your
Group List.
2. Click the Delete (X) button next to the group name you want to delete. A dialog
box opens prompting you to confirm the deletion and indicating that all users
for this group will also be deleted.
3. Click Yes to dismiss the dialog box, remove the group from the Group List,
and return to the Groups page.

Group Pages Field Definitions


This section contains field definitions for all the TCM group pages.

Groups Page Definitions


Use the Groups page to search for, add, and view user-defined TCM groups.
The following field definitions apply to the groups page:
Organization Unit

Specifies an organization defined within the TCM


configuration. The organization unit is the main
configurable object upon which all other Trading
Community Manager trading partner definitions are
associated.

Group List

Provides a listing of saved groups.

85

Chapter 6: Managing Groups


Group Pages Field Definitions

Group Information Page Field Definitions


Use the Group Information page to define group parameters. The following field
definitions apply to the Group Information page:
Organization Unit

Specifies an organization defined within the TCM


configuration. The organization unit is the main
configurable object upon which all other TCM trading
partner definitions are associated.

Group Name

Specifies the group name. The size of the name can


range from 1-70 characters.

Description

Specifies a brief description of the specified group. The


size of the description can range from 1-90 characters.

Organizations
Group Box

Users and Groups


Group Box

Specify your groups permissions relative


organizations. Choose from the following options:
Choose

To

view

Allow a group to view an organization.

edit

Allow a group to edit an organization.

delete

Allow a group to delete an organization.

to

Specify your groups permissions relative to users an


groups. Choose from the following options:
Choose

To

view

Allow a group to view users and groups.

add

Allow a group to add users and groups.

edit

Allow a group to edit users and groups.

delete

Allow a group to delete users and groups.

86

Chapter 6: Managing Groups


Group Pages Field Definitions

Trading Partners
Group Box

Specify your groups permissions relative to trading


partners. Choose from the following options:
Choose

To

view

Allow a group to view trading partner


information.

add

Allow a group to add a trading partner.

edit

Allow a group to edit trading partner


information.

delete

Allow a group to delete a trading partner.

Relationships and Work


Orders Group Box Specify your groups permissions relative to
relationships and work orders. Choose from the
following options:

Certificates
Group Box

Choose

To

view

Allow a group to view relationship and work


order information.

add

Allow a group to add a relationship or work


order.

edit

Allow a group to edit relationship and work


order information.

delete

Allow a group to delete a relationship or work


order.

Specify your groups permissions relative to certificates.


Choose from the following options:
Choose

To

view

Allow a group to view certificates.

add

Allow a group to add certificates.

edit

Allow a group to edit certificates.

delete

Allow a group to delete a certificate.

export

Allow a group to export certificates.

Reports Group Box Specify your groups permissions relative to generating


reports. Choose from the following options:
Choose

To

generate

Allow a group to generate reports.


87

Chapter 7: Managing Users

Introduction .................................................................................................... 89
What is a User? ............................................................................................. 89
Creating a User.............................................................................................. 89
Viewing Your User List................................................................................... 92
Viewing User Information............................................................................... 93
Editing User Information ................................................................................ 94
Deleting a User .............................................................................................. 95
User Pages Field Definitions ......................................................................... 95
Users Page Field Definitions ............................................................................................95
User Information Page Field Definitions ...........................................................................96

Chapter 7: Managing Users


Introduction

Introduction
This chapter explains how to manage users using TCM.

What is a User?
In TCM, a User can be defined as a person who uses the Trading Community
Manager application.
Users are created within Groups, based on their editing permissions for the application
components. For example, a User who is allowed to add, modify, and delete trading
partners would be assigned to the group with these permissions. A User who should
have complete access to all components of the application would be assigned to the
System Administrator group.

Creating a User
Follow the steps below to create a new user:
1. Click Users in the Navigation pane. The Users page opens to display your User
List.

89

Chapter 7: Managing Users


Creating a User

2. Click the New User link. The User Information page displays.

3. In the Organization Unit list, select the organization with which the user is to
be associated.
4. Users created for a specific organization can only access the data for this
specific organization, such as servers, groups, users, settings, etc.
5. In the User Group list, click the group with which the user is to be associated.

90

Chapter 7: Managing Users


Creating a User

6. Complete the screen using the field descriptions below.


First Name

Enter the first name of the new user.

Last Name

Enter the last name of the new user.

Title

Enter the title of the new user. This is an optional step.

Phone

Enter the phone number of the new user. This is an


optional step.

Mobile

Enter a cellular phone number for the user. This is an


optional step.

Pager

Enter a pager phone number for the new user. This is an


optional step.

Email

Enter the email address for the new user. This is an


optional step.

Login

Enter the userid for the new user.

Password

Enter the password for the new user login.

Confirm Password

Re-enter the password for the new user login.

7. Click Save to submit your new user into the TCM configuration. A
confirmation dialog box opens indicating that the new user has been added.
8. Click OK to dismiss the dialog box and return to the User List page. The new
user appears in the User List.

91

Chapter 7: Managing Users


Viewing Your User List

Viewing Your User List


To view your User List, click Users in the Navigation pane. The Users page opens to
display your User List.

92

Chapter 7: Managing Users


Viewing User Information

Viewing User Information


Follow the steps below to view user information.
1. Click Users in the Navigation Pane. The Users page opens to display your User
List.
2. From within the Users List, click the user whose information you want to view.
The User Information screen displays.

93

Chapter 7: Managing Users


Editing User Information

Editing User Information


Follow the steps below to edit user information.
1. Click Users in the Navigation Pane. The Users page opens to display your User
List.
2. From within the Users List, click the user whose information you want to edit.
The User Information opens.
3. In the Organization Unit list, click the organization with which the user is
associated.
4. In the User Group list, click the group with which the user is associated.
5. Complete the screen using the field descriptions below.
First Name

Edit the first name of the user.

Last Name

Edit the last name of the user.

Title

Edit the title of the user. This is an optional step.

Phone

Edit the phone number of the new user. This is an


optional step.

Mobile

Edit the cellular phone number for the user. This is an


optional step.

Pager

Edit the pager phone number for the user. This is an


optional step.

Email

Edit the email address for the user. This is an optional


step.

Login

Edit the userid for the user.

Password

Edit the password for the user login.

Confirm Password

Re-enter the password for the user login.

6. Click Save to submit your changes into the TCM configuration. A confirmation
dialog box opens indicating that the user information has been updated.
7. Click OK to dismiss the dialog box and return to the User List page. The
modified user appears in the User List.
94

Chapter 7: Managing Users


Deleting a User

Deleting a User
Follow the steps below to delete a user.
1. Click Users in the Navigation Pane. The Users page opens to display your User
List.
2. Click the Delete (X) button next to the user name you want to delete. A dialog
box opens prompting you to confirm the deletion.
3. Click Yes to dismiss the confirmation dialog box, delete the user, and return to
the Users page.

User Pages Field Definitions


This section contains field definitions for all the TCM Users pages.

Users Page Field Definitions


Use the Users page to search, add, delete, and view user-defined TCM users. The
following field definitions apply to the Users page:
First Name

Specifies the first name of the user being searched for.


The size of the name can range from 1-25 characters.

Last Name

Specifies the last name of the user being searched for.


The size of the name can range from 1-25 characters.

Login

Specifies the login of the user being searched for.

Organization
Unit

User List

Specifies an organization defined within the TCM


configuration. The organization unit is the main
configurable object upon which all other TCM trading
partner definitions are associated.
Provides a listing of saved users.

95

Chapter 7: Managing Users


User Pages Field Definitions

User Information Page Field Definitions


Use the User Information page to view or enter user information. The following field
definitions apply to the User Information page:
Organization Unit

Specifies an organization defined within the TCM


configuration. The organization unit is the main
configurable object upon which all other TCM trading
partner definitions are associated.

User Group

Specifies the group with which the user is associated.


The size of the name can range from 1-25 characters.

First Name

Specifies the users first name. The size of the name can
range from 1-25 characters.

Last Name

Specifies the users last name. The size of the name can
range from 1-25 characters.

Title

Specifies the users title. The size of the title can range
from 1-25 characters.

Phone

Specifies the users phone number. The size of the


number can range from 1-18 characters.

Mobile

Specifies the users mobile phone number. The size of


the number can range from 1-18 characters.

Pager

Specifies the users pager number. The size of the name


can range from 1-18 characters.

Email

Specifies the users email address. The size of the name


can range from 1-45 characters.

Login

Specifies the users login. The size of the name can


range from 1-15 characters.

Password

Specifies the users password. The size of the name can


range from 1-15 characters.

Confirm Password

Specifies the users password. The size of the name can


range from 1-15 characters.

96

Chapter 8: Managing Trading Partners

Introduction .................................................................................................... 98
What is a Trading Partner? ............................................................................ 98
Opening Your Trading Partner List ................................................................ 98
Creating a Trading Partner ............................................................................ 99
Using the EZ Setup Wizard ..............................................................................................99
Manually Creating a Trading Partner ..............................................................................103

Sending and Receiving Files ....................................................................... 109


Sending Files ..................................................................................................................109
Receiving Files ............................................................................................................... 110

Editing Trading Partner Information .............................................................. 111


Deleting a Trading Partner............................................................................114
Trading Partner Pages Field Definitions .......................................................114
Trading Partner Page...................................................................................................... 114
EZ View Page ................................................................................................................. 115
Partner Information Page................................................................................................ 116
Default Settings Page ..................................................................................................... 119
Default Security Settings Page .......................................................................................120

Chapter 8: Managing Trading Partners


Introduction

Introduction
This chapter explains how to manage trading partners using the TCM.

What is a Trading Partner?


In TCM, a Trading Partner can be defined as a vendor with whom your organization
exchanges data. For example, the Purchasing department of your company sends
purchase orders to the company that provides your office supplies, and the office
supply company sends invoices to your organization. The office supply company is
considered a Trading Partner.
When you define a Trading Partner in TCM, you can define basic information, such as
the company name and address, as well as up to three contact names and phone
numbers. You also define an AS2 Name for the Trading Partner. An AS2 Name is an
alias that has been agreed upon for communicating with the Trading Partner.

Opening Your Trading Partner List


Follow the steps below to view your Trading Partner list.
1. Click Trading Partners in the Navigation pane. The Trading Partners page
opens to display your Trading Partner List.

2. From within the Trading Partner List, click a trading partner name to open the
trading partner EZ View page and display more detailed trading partner
information.
98

Chapter 8: Managing Trading Partners


Creating a Trading Partner

Creating a Trading Partner


TCM provides two methods of creating trading partners: manually, or using the Easy
Setup Wizard.
TCM can be configured to automatically update trading partners in Commerce Suite.
For information on this functionality, please review the Default settings Chapter 4

Using the EZ Setup Wizard


Follow the steps below to create a trading partner using the EZ Setup Wizard.
1. Click Trading Partners in the left navigation pane. The Trading Partners List
page displays.

99

Chapter 8: Managing Trading Partners


Creating a Trading Partner

2. Click Launch Easy Setup in the upper right corner of the page. The Basic
Information page displays.

3. In the Trading Partner field, enter the name of the Trading Partner.
4. In the AS1/AS2 Name field, enter the AS1 or AS2 name for the Trading Partner
(maximum 32 characters).
5. In the URL Address field, select the protocol and enter the URL address for the
Trading Partner.
6. If you selected FTP as the protocol, and you want to use a different address for
notifications sent to this Trading Partner, select the checkbox and enter the
alternate MDN address.

100

Chapter 8: Managing Trading Partners


Creating a Trading Partner

7. In the Certificate File field, enter the name of the certificate file provided by
this trading partner, or click Browse to select it.
8. Click Next. The Sending Parameters page displays.

9. Select the appropriate Sending Parameters.


10. Click Next. The Trading Information for Your Organization page displays.

11. From the Organization list, select the appropriate organization. The Default
Settings fields are populated with the default settings for the selected
organization.

101

Chapter 8: Managing Trading Partners


Creating a Trading Partner

12. Select the checkbox indicating that you do not want to use the default settings.
A message displays indicating that you must set up the trading partner using the
manual method (see Chapter 8: Managing Trading Partners for instructions).
OR
Click Next to accept the default settings and continue the Easy Setup Wizard.
The Setup Summary page displays.

13. Verify that the information is correct. If it is not correct, click Back to return to
the appropriate page and correct the information. If it is correct, click Finish. A
message displays indicating that you have completed the wizard.

14. Click OK. You are returned to the Trading Partner List page.

102

Chapter 8: Managing Trading Partners


Creating a Trading Partner

Manually Creating a Trading Partner


Follow the steps below to use the manual process for creating trading partners.
1. Select Trading Partners from the left Navigation Pane. The Trading Partner
list displays.

2. Click New Partner to add a new trading partner. The Partner Information
page displays.

103

Chapter 8: Managing Trading Partners


Creating a Trading Partner

3. In the Trading Partner field, enter the trading partner name.


4. In the Status list, select one of the following:
Pending - indicates the trading partner characteristics have been defined in
TCM, but the trading partner is not actively exchanging data.
Active - indicates the trading partner characteristics have been defined in
TCM and the trading partner is actively exchanging data.
Inactive - indicates the trading partner characteristics have been defined in
TCM, however, the trading partner is not actively exchanging data.
5. Click New AS1/AS2 Name to add the trading partner AS2 name. The Add/
Edit AS1/AS2 Name dialog box displays.

6. Enter the AS1/AS2 name (maximum 32 characters). Click Save. A message


displays indicating that you must complete the wizard and click Finish before
the AS1/AS2 name is added to the database.

7. Click OK. You are returned to the Trading Partner Information page. Notice
that the AS2 name now appears in the list.

104

Chapter 8: Managing Trading Partners


Creating a Trading Partner

8. Click Next. The Default Settings page displays.

9. Click New URL to add the trading partners URL. The Add/Edit URL dialog
box displays.

105

Chapter 8: Managing Trading Partners


Creating a Trading Partner

10. Enter the appropriate information for the trading partner URL. Click Save. A
message displays indicating that you must complete the Trading Partner wizard
and click Finish before the trading partner URL is added to the database.
11. Click OK. You are returned to the Trading Partner Information page. Notice
that the URL name now appears in the list.
12. Click New Email to enter a notification email address for the trading partner.
The Add/Edit SMTP Emails dialog box displays.

13. Enter the appropriate email address for your company. Click Save. A message
displays indicating that you must complete the Trading Partner wizard and click
Finish before the trading partner email address is added to the database.
14. Click OK. You are returned to the Trading Partner Information page. Notice
that the new email address appears in the list.

106

Chapter 8: Managing Trading Partners


Creating a Trading Partner

15. Select the appropriate Message Delivery Notification settings for this trading
partner. Click Next. The Default Security Settings page displays.

16. Select the appropriate Default Security Settings. Click Finish. A message
displays indicating that you have completed the wizard.

107

Chapter 8: Managing Trading Partners


Creating a Trading Partner

17. Click OK. The EZ View page displays, showing the Trading Partner Summary
information.

108

Chapter 8: Managing Trading Partners


Sending and Receiving Files

Sending and Receiving Files


The following sections describe the procedures for sending files to and receiving files
from Trading Partners using TCM.

Sending Files
Follow the steps below to send files to a trading partner.
1. Click Trading Partners in the Navigation pane. The Trading Partners page
opens to display your Trading Partner list.
2. From within the trading partner list, select the desired Trading Partner. The EZ
View page for the selected trading partner displays.
3. Click Send a File. The Send a File dialog box displays.

The From, To, and Protocol fields are filled in automatically from the Trading
Partner information.
4. In the File field, enter the name of the file you want to send, or click Browse to
select the file.
5. The Send parameters are filled in automatically from the Trading Partner
information. You can accept these parameters or enter different ones for this
transaction.
6. If you enter different parameters, they are effective for this transaction only.
7. Review the nuBridges Commerce Suite Command Reference Guide for more
information on the valid parameters for the send command.
8. When you have entered all necessary information in this dialog, click Send. The
selected file is sent to the trading partner.
109

Chapter 8: Managing Trading Partners


Sending and Receiving Files

Receiving Files
Follow the steps below to receive files from a trading partner.
1. Click Trading Partners in the Navigation pane. The Trading Partners page
opens to display your Trading Partner list.
2. From within the trading partner list, select the desired Trading Partner. The EZ
View page for the selected trading partner displays.
3. Click Recv a File. The Store and Forward dialog box displays.

The From, To, and Protocol fields are filled in automatically from the Trading
Partner information.
4. In the TimeInt field, enter the time interval at which you want TCM to check
for received files. This time interval should be entered in minutes; the default is
30 minutes.
Note: These parameters are effective for this transaction only.
5. When you finish entering the parameters, click Send. A batchrequest
command is created for receiving files.

110

Chapter 8: Managing Trading Partners


Editing Trading Partner Information

Editing Trading Partner Information


Follow the steps below to view trading partner information.
1. Click Trading Partners in the Navigation pane. The Trading Partners page
opens to display your Trading Partner list.
2. From within the trading partner list, select the Trading Partner whose
information you want to edit. The EZ View page for the selected trading partner
displays.

Each EZ View page contains a tabbed interface and linked Data Check List of
configurable resources. Configured resources appear in green and unconfigured
resources appear in red. Clicking a resource tab or a Data Check List item opens
that resource page enabling you to configure that trading partner resource.

111

Chapter 8: Managing Trading Partners


Editing Trading Partner Information

3. To edit the basic trading partner information, click Contacts/Default Settings.

4. In the Trading Partner field, enter the trading partner name.


5. In the Status list, select one of the following:
Pending - indicates the trading partner characteristics have been defined in
TCM, but the trading partner is not actively exchanging data. Use this status
if you are waiting on information to complete the trading partner
configuration.
Active - indicates the trading partner characteristics have been defined in
TCM and the trading partner is actively exchanging data.
Inactive - indicates the trading partner characteristics have been defined in
TCM, however, the trading partner is no longer actively exchanging data. Use
this status to remove the trading partner from Active status, but keep the
trading partner information for historical purposes.

112

Chapter 8: Managing Trading Partners


Editing Trading Partner Information

6. Select the AS1/AS2 name you want to edit. The Add/Edit AS1/AS2 Name
dialog box displays.
7. Edit the AS1/AS2 name (maximum 32 characters). Click Save. A message
displays indicating that you must complete the wizard and click Finish before
the AS1/AS2 name is added to the database.
8. Click OK. You are returned to the Trading Partner Information page. Notice
that the edited AS2 name now appears in the list.
9. Click Next. The Default Settings page displays.
10. Select the trading partners URL you want to edit. The Add/Edit URL dialog
box displays.
11. Enter the appropriate information for the trading partner URL. Click Save. A
message displays indicating that you must complete the Trading Partner wizard
and click Finish before the trading partner URL is added to the database.
12. Click OK to dismiss the message. You are returned to the Trading Partner
Information page. Notice that the updated URL name appears in the list.
13. Click New Email to enter a notification email address for the trading partner.
The Add/Edit SMTP Emails dialog box displays.
14. Enter the appropriate email address for your company. Click Save. A message
displays indicating that you must complete the Trading Partner wizard and click
Finish before the trading partner email address is added to the database.
15. Click OK to dismiss the message. You are returned to the Trading Partner
Information page. Notice that the updated email address appears in the list.
16. Select the appropriate Message Delivery Notification settings for this trading
partner. Click Next. The Default Security Settings page displays.
17. Select the appropriate Default Security Settings. Click Finish. A message
displays indicating that you have completed the wizard.
18. Click OK. The EZ View page displays, showing the updated Trading Partner
Summary information.

113

Chapter 8: Managing Trading Partners


Deleting a Trading Partner

Deleting a Trading Partner


Follow the steps below to delete a trading partner.
1. Click Trading Partners in the Navigation pane. The Trading Partners page
opens to display your Trading Partner list.
2. Click Delete (X) next to the trading partner entry you want to delete. A
confirmation dialog box opens asking you to confirm the deletion.
3. Click Yes to dismiss the confirmation dialog box and return to the Trading
Partner List.

Trading Partner Pages Field Definitions


This section contains field definitions for all the TCM Trading Partner pages.

Trading Partner Page


Use the Trading Partner page to add a new trading partner, view a list of defined and
saved trading partners, search for, or delete a trading partner. The following field
definitions apply to the Trading Partner page:
Trading Partner
Name

Specifies the name of a company, institution, or


individual with which an organization exchanges data.
The size of the name can range from 1-75 characters.

AS1/AS2 Name

Specifies an agreed-upon name identifying the trading


partner in the AS1 or AS2 mode (maximum 32
characters).

Sort By

Click Name or Status to specify how to display your


search results in the Trading Partner List.

Trading Partner
List

List of defined and saved trading partners. Search results


are also displayed in this list.

114

Chapter 8: Managing Trading Partners


Trading Partner Pages Field Definitions

EZ View Page
Use the EZ View page to review trading information for the selected Trading Partner.
You can also send or receive files from the Trading Partner, and access the basic and
default settings for the Trading Partner. The following field definitions apply to the EZ
View page:
Data Check List

Lists the configurable resources for the trading partner.


Configured resources appear in green and unconfigured
resources appear in red.

Data Summary

Indicates the number of trading partner resources that


have been configured.

Trading
Information

Displays the settings for the selected trading partner and


the partner with a defined relationship.
Note: If Ready to Trade displays next to the trading
partner label, you can send and receive files directly
from this page. (See the Sending and Receiving
Files section on page 109 for more information.)

Send File

Displays the Send a File dialog, where you can specify


the information necessary to initiate a file send between
these trading partners.

Recv a File

Displays the Store and Forward dialog, where you can


specify the information necessary to receive a file from
this trading partner.

Contact
Information

View/Edit Details

Displays the name, title, department, email address, and


phone number for all the contacts defined for the trading
partner.
Displays the Partner Information page, where you can
edit the contact information and default settings for this
trading partner.

Recent Transactions Displays information about the recent transactions


between these two trading partners.

115

Chapter 8: Managing Trading Partners


Trading Partner Pages Field Definitions

Partner Information Page


Use the Trading Partner Information page to begin defining your trading partner
properties. The following field definitions apply to the Trading Partner Information
page:
Trading Partner

Specifies the name of a company, institution, or


individual with which an organization exchanges data.

Status

Specifies one of the following conditions:


Pending - indicates the trading partner characteristics
have been defined in TCM, but the trading partner is not
actively exchanging data. Use this status if you are
waiting on information to complete the trading partner
configuration.
Active - indicates the trading partner characteristics
have been defined in TCM and the trading partner is
actively exchanging data.
Inactive - indicates the trading partner characteristics
have been defined in TCM, however, the trading partner
is no longer actively exchanging data. Use this status to
remove the trading partner from Active status, but keep
the trading partner information for historical purposes.

AS1/AS2 Name

Specifies an agreed-upon name identifying the trading


partner in the AS2 mode. The size of the name can range
from 1-32 characters.

Address Information
Group
The following field definitions apply to the Address
Information group:
Address 1

Specifies the trading partners primary address. The size


of the name can range from 1-90 characters.

Address 2

Specifies the trading partners secondary address. The


size of the name can range from 1-90 characters.

City

Specifies the city in which the trading partner resides.


The size of the name can range from 1-30 characters.

116

Chapter 8: Managing Trading Partners


Trading Partner Pages Field Definitions

State/Province

Specifies the state or province in which the trading


partner resides. The size of the name can range from 130 characters.

Country

Specifies the country in which the trading partner


resides. The size of the name can range from 1-45
characters.

Postal Code

Specifies the postal code associated with the trading


partner address. The size of the code can range from 115 characters.

Comments

Specifies any additional comments you want to add to


your address information. The size of the comments can
range from 1-90 characters.

Business Contact
Person

The following field definitions apply to the Business


Contact person group:

Name

Specifies the business contacts name. The size of the


name can range from 1-35 characters.

Title

Specifies the business contacts title. The size of the


name can range from 1-25 characters.

Department

Specifies the business contacts department. The size of


the name can range from 1-45 characters.

Phone Number

Specifies the business contacts phone number. The size


of the number can range from 1-18 characters.

Mobile

Specifies the business contacts mobile number. The size


of the number can range from 1-18 characters.

Pager

Specifies the business contacts pager number. The size


of the number can range from 1-18 characters.

Email

Specifies the business contacts email address. The size


of the address can range from 1-45 characters.

Technical Contact
Person

The following field definitions apply to the Technical


Contact person group:

117

Chapter 8: Managing Trading Partners


Trading Partner Pages Field Definitions

Name

Specifies the technical contacts name. The size of the


name can range from 1-35 characters.

Title

Specifies the technical contacts title. The size of the


name can range from 1-25 characters.

Department

Specifies the technical contacts department. The size of


the name can range from 1-45 characters.

Phone Number

Specifies the technical contacts phone number. The size


of the number can range from 1-18 characters.

Mobile

Specifies the technical contacts mobile number. The


size of the number can range from 1-18 characters.

Pager

Specifies the technical contacts pager number. The size


of the number can range from 1-18 characters.

Email

Specifies the technical contacts email address. The size


of the address can range from 1-45 characters.

Other Contact
Person

The following field definitions apply to the Other


Contact person group:

Name

Specifies the other contacts name. The size of the name


can range from 1-35 characters.

Title

Specifies the other contacts title. The size of the name


can range from 1-25 characters.

Department

Specifies the other contacts department. The size of the


name can range from 1-45 characters.

Phone Number

Specifies the other contacts phone number. The size of


the number can range from 1-18 characters.

Mobile

Specifies the other contacts mobile number. The size of


the number can range from 1-18 characters.

Pager

Specifies the other contacts pager number. The size of


the number can range from 1-18 characters.

Email

Specifies the other contacts email address. The size of


the address can range from 1-45 characters.

118

Chapter 8: Managing Trading Partners


Trading Partner Pages Field Definitions

Default Settings Page


Use the Default Settings page to define default communication and transfer settings.
The following field definitions apply to the Default Settings page:
URL or IP Address

URL or IP Address
List
Emails By SMTP

Message Delivery
Notification

Request MDN

Specifies to connect to a trading partner with a static IP


address or URL that is always available. The size of the
name can range from 1-100 characters.

Listing of user-defined and saved trading partner URLs.


Listing of user-defined and saved email-by-SMTP
addresses. The size of the name can range from 1-45
characters.

The following field definitions apply to the Message


Delivery Notification group:
In the Request MDN list, click No if you do not want to
receive a delivery receipt. Yes is the default.

Request Asynchronous
MDN
In the Request Asynchronous MDN list, click No if
you do not want the receipt to be delivered out of bound.
Selecting Yes may increase outbound throughput. Yes is
the default value.
Request Signed
MDN

In the Request Signed MDN list, select whether you


want your receipt to be digitally signed. Select one of
the following options:
Yes (SHA-1) - Specifies you want a digitally signed
receipt using the SHA-1 algorithm.
Yes (MD5) - Specifies you want a digitally signed
receipt using the MD5 algorithm.
No - Specifies you do not want a digitally signed receipt.

119

Chapter 8: Managing Trading Partners


Trading Partner Pages Field Definitions

Default Security Settings Page


Encryption

Signature

Specify the type of encryption algorithm used to encrypt


and decrypt messages. Choose from the following
algorithm options:
Choose

To

DES-3

Encrypt and decrypt messages using the Triple


Data Encryption algorithm. DES-3 is DES run
three times with three different keys. It uses a
192-bit key and has an effective strength of 168bits. The DES-3 symmetric cipher is defined in
Federal Information Processing Standards
(FIPS) publication 46.3.

RC2

Encrypt and decrypt messages using the Rivests


Cipher encryption algorithm. RC2 is a
conventional (secret key) symmetric encryption
algorithm and has a block size of 64-bits with a
variable key size from one byte up to 128 bytes.
Refer to RFC 2268 for more information on the
RC2 cipher.

Specify the type of signature used to verify a files


integrity. Choose from the following options:
Choose

To

MD5

Verify a files integrity using the MD5 cipher.


The MD5 cipher is a one-way hash algorithm that
takes any length of data and produces a 128-bit
fingerprint or message digest. This
fingerprint is non-reversible, meaning that the
data cannot be determined based on its MD5
fingerprint. Refer to RFC 1321 for more
information on the MD5 cipher.

SHA-1

Verify a files integrity using the Secure Hash


Algorithm. The SHA-1 cipher generates a 160-bit
condensed representation of a message called a
message digest. The SHA-1 is used by both the
transmitter and intended receiver of a message in
computing and verifying a digital signature.

120

Chapter 8: Managing Trading Partners


Trading Partner Pages Field Definitions

Compression

Key Encryption

Specify the type of compression format when sending


your data. Choose from the following algorithm
options:
Choose

To

DEFLATE

Specifies the DEFLATE compression


algorithm used to reduce the file transfer
overhead. Refer to RFC-1521 for more
information on the DEFLATE compression
algorithm. The DEFLATE compression
algorithm is a lossless compressed data format
that compresses data using a combination of
the LZ77 algorithm and Huffman coding.

GZIP

Specifies a lossless compressed data format


that is compatible with the widely used GZIP
utility. Refer to RFC-1522 on more
information on GZIP compression. This
format includes a cyclic redundancy check
value for detecting data corruption.

Specify the type of encryption system for digital


signature generation and verification. Choose from the
following algorithm options:
Choose

To

RSA

Specifies the RSA public-key cryptosystem that


offers both encryption and digital signatures.
With RSA, encryption and authentication take
place without any sharing of private keys: each
person uses only anothers public key to encrypt
data and verify the signature, or their own private
key to decrypt data and verify the signature.
Anyone can send an encrypted message or verify
a signed message, but only someone in possession
of the correct private keys can decrypt or sign a
message.

DSS

Specifies the Digital Signature Algorithm (DSA)


for digital signature generation and verification.
The DSS cipher is defined in the FIPS publication
186. The DSA is used by a signatory to generate a
digital signature on data and by a verifier to verify
the authenticity of the signature. Each signatory
has a public and private key. The private key is
used in the signature generation process and the
public key is used in the signature verification
process.

121

Chapter 9: Managing Relationships

Introduction .................................................................................................. 123


What is a Relationship? ............................................................................... 123
Creating a Relationship ............................................................................... 123
Viewing Your Relationship List..................................................................... 129
Viewing Relationship Information ................................................................ 130
Editing Relationship Information .................................................................. 132
Deleting a Relationship................................................................................ 134
Relationship Pages Field Definitions ........................................................... 134
Relationship List Page Definitions ..................................................................................134
Relationship Entry Page Definitions ...............................................................................135
Select Preferences Page ................................................................................................135

Chapter 9: Managing Relationships


Introduction

Introduction
This chapter explains how to manage relationships using TCM.

What is a Relationship?
In TCM, a Relationship is the definition of the exchange of data between Trading
Partners. For example, you can define a Relationship between your companys
Purchasing Department and the Office Supply company. This Relationship definition
would contain the rules to be followed when data is exchanged between these
Trading Partners.
When you define a trading partner relationship, you specify information such as the
protocol to use when information is sent between the trading partner pair, the
destination URL and directory, and the settings to apply to the files being sent.

Creating a Relationship
Follow the steps below to create a new relationship.
1. Click Relationships in the Navigation pane. The Relationships page displays
your Relationship List. The Relationship List is a listing of all inbound and
outbound relationships for every defined trading partner.

123

Chapter 9: Managing Relationships


Creating a Relationship

2. Click the New Relationship link located at the top of the page. The
Relationship Entry page displays. This page acts as Step 1 in the Relationship
Wizard two-step process.

3. In the From list, select the trading partner who will be sending the data.
4. In the To list, select the trading partner receiving the data.
5. Define the Settings for the Inbound Relationship as follows:
a. In the Protocol drop down list, select the type of protocol you want to use
when receiving data from this trading partner.
b. In the Inbox Directory field, enter the name of the directory where you want
data received from this trading partner to be stored.
c. In the Notify Name field, enter the name of the intended outbound recipient
of the receipt.

124

Chapter 9: Managing Relationships


Creating a Relationship

d. For File Name Preservation, select None, Enable, or Disable to specify


your preference.
e. For File Date Preservation, select None, Enable, or Disable to specify your
preference.
f. For Short File-names Containing Date/Time Stamp select None, Enable,
or Disable to specify your preference.
g. For Short File-names Containing Date/Time Stamp and Unique Message
Number, select None, Enable, or Disable to specify your preference.
h. For Inbound File Extension, select None, Enable, or Disable to specify
your preference.
6. If you want to customize AS2 header information for this relationship, select
the box located next to the heading User Defined AS2 Header Values. The
section expands.

7. Use the instructions included in the section to customize the AS2 header
information.

125

Chapter 9: Managing Relationships


Creating a Relationship

8. Define the URL for Outbound Relationship as follows:


a. Select the protocol to be used when sending data to this trading partner.
b. In the To URL field, enter the destination URL address. You can also click
the Find URL icon to open the URL List to select a defined URL address.
Note: If you select FTP as the protocol, you are given the option to use a
different address for message delivery notifications (MDNs). Select this
checkbox if you want to specify a different MDN address.
c. For File Name Preservation, click None, Enable, or Disable to specify your
preference.
d. For File Date Preservation, click None, Enable, or Disable to specify your
preference.
9. Define the Outbox Settings for Outbound Relationship as follows:
a. If you want to delete the file from the local machine after it is sent, select the
checkbox.
b. Select the number of times you want to retry the send operation if an error is
encountered.

126

Chapter 9: Managing Relationships


Creating a Relationship

10. Click Next to open the Select Preferences page. This page acts as Step 2 in the
Relationship Wizard two-step process.

127

Chapter 9: Managing Relationships


Creating a Relationship

11. Define the Security Settings for Outbound Relationship as follows:


a. Under the Encryption list, select the type of encryption algorithm you want
to use when sending data to this trading partner.
b. Under the Signature list, select the type of signature algorithm you want to
use when sending data to this trading partner.
c. Under the Compression list, select the type of compression algorithm you
want to use when sending data to this trading partner.
12. Define the Receipt Settings for Outbound Relationship as follows:
a. Select Request Receipt if you want a receipt from the trading partner when
data is received.
b. Select Async Receipt if you want an asynchronous receipt.
Note: If you select both these checkboxes, the send command parameters
for this trading partner will be affected.
c. Select either MD5, SHA-1, or None depending on whether or not you want
your receipt hashed.
d. Enter the Receipt Address where you want to receive the receipts from this
trading partner. You can also click the Find URL icon to open the URL List
to select a defined URL address.
13. Define the Miscellaneous for Outbound Relationship as follows:
a. Select Use Quotes in MIME Headers to quote EDI Names in MIME
headers.
b. Select Base-64 Encode the Payload to use base-64 encoding.
c. Enter a message identifier in the User Supplied Message Identifier field.
This step is optional.
d. Enter a message subject in the User Supplied Message Subject field. This
step is optional.
14. Click Finish to save your relationship definitions. A confirmation dialog box
opens indicating you have completed the Wizard.
15. Click OK to dismiss the confirmation dialog box and return to the Relationship
List page.

128

Chapter 9: Managing Relationships


Viewing Your Relationship List

Viewing Your Relationship List


To view your Trading Partner list, click Relationships in the Navigation pane. The
Relationships page opens to display your Relationship list.

129

Chapter 9: Managing Relationships


Viewing Relationship Information

Viewing Relationship Information


Follow the steps below to view relationship information.
1. Click Relationships in the Navigation pane. The Relationships page opens to
display your Relationship list.
2. From within the Relationship List, click a relationship entry to open the
Relationship Entry page and display more detailed relationship information.

130

Chapter 9: Managing Relationships


Viewing Relationship Information

3. Click Next to open the Select Preferences page and display more detailed
relationship information.

131

Chapter 9: Managing Relationships


Editing Relationship Information

Editing Relationship Information


Follow the steps below to edit relationship information.
1. Click Relationships in the Navigation pane. The Relationships page opens to
display your Relationship list.
2. From within the Relationship List, click a relationship entry to open the
Relationship Entry page and display more detailed relationship information.
3. In the From list, select the trading partner who will be sending the data.
4. In the To list, select the trading partner receiving the data.
5. Define the Settings for the Inbound Relationship as follows:
a. In the Protocol list, select the type of protocol you want to use when receiving
data from this trading partner.
b. In the Inbox Directory field, enter the name of the directory where you want
data received from this trading partner to be stored.
c. In the Notify Name field, enter the name of the intended outbound recipient
of the receipt.
d. For File Name Preservation, click None, Enable, or Disable to specify your
preference.
e. For File Date Preservation, click None, Enable, or Disable to specify your
preference.
6. Define the URL for Outbound Relationship as follows:
a. Select the protocol to be used when sending data to this trading partner.
b. In the To URL field, enter the destination URL address. You can also click
the Find URL icon to open the URL List to select a defined URL address.
c. For File Name Preservation, click None, Enable, or Disable to specify your
preference.
d. For File Date Preservation, click None, Enable, or Disable to specify your
preference.
7. Define the Outbox Settings for Outbound Relationship as follows:
a. If you want to delete the file from the local machine after it is sent, select the
checkbox.
b. Select the number of times you want to retry the send operation if an error is
encountered.
8. Click Next to open the Select Preferences page. This page acts as Step 2 in the
Relationship Wizard two-step process.
132

Chapter 9: Managing Relationships


Editing Relationship Information

9. Define the Security Settings for Outbound Relationship as follows:


a. Under the Encryption list, select the type of encryption algorithm you want
to use when sending data to this trading partner.
b. Under the Signature list, select the type of signature algorithm you want to
use when sending data to this trading partner.
c. Under the Compression list, select the type of compression algorithm you
want to use when sending data to this trading partner.
10. Define the Receipt Settings for Outbound Relationship as follows:
a. Select Request Receipt if you want a receipt from the trading partner when
data is received.
b. Select Async Receipt if you want an asynchronous receipt.
Note: If you select both these checkboxes, the send command parameters
for this trading partner will be affected.
c. Select either MD5, SHA-1, or None depending on whether or not you want
your receipt hashed.
d. Enter the AS2 name you want to be notified of the receipt.
e. Enter the Receipt Address where you want to receive the receipts from this
trading partner. You can also click the Find URL icon to open the URL List
to select a defined URL address.
Note: If you selected FTP as the protocol, and specified to use a different
address for message delivery notifications, enter the MDN address you want
to use.
11. Define the Miscellaneous for Outbound Relationship as follows:
a. Select Use Quotes in MIME Headers to quote EDI Names in MIME
headers.
b. Select Base-64 Encode the Payload to use base-64 encoding.
c. Enter a message identifier in the User Supplied Message Identifier field.
This step is optional.
d. Enter a message subject in the User Supplied Message Subject field. This
step is optional.
12. Click Finish to save your relationship definitions. A confirmation dialog box
opens indicating you have completed the Wizard.
13. Click OK to dismiss the confirmation dialog box and return to the Relationship
List page.
133

Chapter 9: Managing Relationships


Deleting a Relationship

Deleting a Relationship
Follow the steps below to delete a relationship.
1. Click Relationships in the Navigation pane. The Relationships page opens to
display your Relationship list.
2. Click the Delete (X) button next to the relationship entry you want to delete. A
dialog box opens prompting you to confirm the deletion.
3. Click Yes to dismiss the dialog box, remove the relationship entry from the
Relationship List, and return to the Relationship List page.
Note: Deleting a relationship deletes both the inbound definition and the
outbound definition.

Relationship Pages Field Definitions


This section contains field definitions for all the TCM Relationship pages.

Relationship List Page Definitions


Use the Relationship List page to search for, add, and view user-defined TCM
relationships.
The following field definitions apply to the relationship list page:
From

Specifies the AS1/AS2 name of the trading partner


sending the data.

To

Specifies the AS1/AS2 name of the trading partner


receiving the data.

Type

Specifies the type of relationship, either defined or


undefined.
To change a relationship from undefined to defined,
select the relationship from the list, edit it, and save it,
following the steps in Editing Relationship Information.

Relationship List

Provides a listing of saved relationship definitions.

134

Chapter 9: Managing Relationships


Relationship Pages Field Definitions

Relationship Entry Page Definitions


Use the Relationship Entry page to search for, add, delete, or view user-defined TCM
relationships. The following field definitions apply to the Relationship Entry page:
From

Specifies the AS1/AS2 name of the trading partner


sending the data.

To

Specifies the AS1/AS2 name of the trading partner


receiving the data.

Settings for Inbound Relationship


Protocol

Specifies the protocol for sending data (HTTP, HTTPS,


SMTP, FTP, SFTP). Please note that selecting the
SFTP option enables FTPs. Commerce Suite does not
support the use of SFTP.

Inbox Directory

Specifies the destination directory.

Notify Name

Specifies the name of the intended outbound recipient of


the receipt.

File Name
Preservation
File Date
Preservation

Specifies to preserve the file name for inbound


transactions at the relationship level.
Specifies to preserve the file date for inbound
transactions at the relationship level.

URL for Outbound Relationship


To URL

Specifies the destination URL, or click the Find URL


icon to open the URL list to select a defined URL
address.

Do you want to use a different


MDN address?
If selected, you will be given the opportunity to enter an
alternate address for message delivery notifications on
the Select Preferences page. This option is only
available if you selected FTP as the protocol.
File Name
Preservation
File Date
Preservation

Specifies to preserve the file name for outbound


transactions at the relationship level.
Specifies to preserve the file date for outbound
transactions at the relationship level.
135

Chapter 9: Managing Relationships


Relationship Pages Field Definitions

Outbox Settings for Outbound Relationship


Delete the Local File
After Sending
If selected, the file on the local machine will be deleted
after sending.
Retry Sends

Specifies the maximum number of times that the system


should attempt to send the message if an error occurs.
You can select any number from 1 to 9.

Select Preferences Page


Use the Select Preferences page to define your encryption, hash, and compression
preferences, as well as receipt and miscellaneous settings.
The following field definitions apply to the Select Preferences page:
Security Settings for Outbound Relationship
Encryption

Specify the type of encryption algorithm used to encrypt


and decrypt messages.
Choose from the following algorithm options:
Choose

To

DES-3

Encrypt and decrypt messages using the


Triple Data Encryption algorithm. DES-3 is
DES run three times with three different
keys. It uses a 192-bit key and has an
effective strength of 168-bits. The DES-3
symmetric cipher is defined in Federal
Information Processing Standards (FIPS)
publication 46.3.

RC2

Encrypt and decrypt messages using the


Rivests Cipher encryption algorithm. RC2
is a conventional (secret key) symmetric
encryption algorithm and has a block size
of 64-bits with a variable key size from one
byte up to 128 bytes. Refer to RFC 2268 for
more information on the RC2 cipher.

None

Specifies that you do not want to use any


cipher algorithms in your data transfer.

136

Chapter 9: Managing Relationships


Relationship Pages Field Definitions

Signature

Specify the type of signature to be used to verify a files


integrity.
Choose from the following signature options:
Choose To
MD5

Verify a files integrity using the MD5


cipher. The MD5 cipher is a one-way hash
algorithm that takes any length of data and
produces a 128-bit fingerprint or
message digest. This fingerprint is nonreversible, meaning that the data cannot be
determined based on its MD5 fingerprint.
Refer to RFC 1321 for more information on
the MD5 cipher.

SHA-1

Verify a files integrity using the Secure


Hash Algorithm. The SHA-1 cipher
generates a 160-bit condensed
representation of a message called a
message digest. The SHA-1 is used by both
the transmitter and intended receiver of a
message in computing and verifying a
digital signature.

None

Specifies that you do not want to use any


hash algorithms in your data transfer.

137

Chapter 9: Managing Relationships


Relationship Pages Field Definitions

Compression

Specify the type of compression algorithm to use in your


data transfer.
Choose from the following compression options:
Choose

To

DEFLA Compress your data transfer, reducing the


TE
file transfer overhead. The DEFLATE
compression algorithm is a lossless
compressed data format that compresses
data using a combination of the LZ77
algorithm and Huffman coding. Refer to
RFC-1521 for more information on the
DEFLATE compression algorithm.
GZIP

Specifies a lossless compressed data format


that is compatible with the widely used GZIP
utility. This format includes a cyclic
redundancy check value for detecting data
corruption. Refer to RFC-1522 for more
information on GZIP compression.

none

Specifies that you do not want to use any


compression algorithms in your data
transfer.

138

Chapter 9: Managing Relationships


Relationship Pages Field Definitions

Receipt Settings for Outbound Relationship


Request Receipt

Specifies that you want to receive a delivery receipt.

Async Receipt

Specifies that you want to receive an asynchronous


receipt.

Signature

Specify the type of signature to be used to verify a files


integrity.
Choose from the following signature options:
Choose

To

MD5

Verify a files integrity using the MD5


cipher. The MD5 cipher is a one-way hash
algorithm that takes any length of data and
produces a 128-bit fingerprint or
message digest. This fingerprint is nonreversible, meaning that the data cannot be
determined based on its MD5 fingerprint.
Refer to RFC 1321 for more information on
the MD5 cipher.

SHA-1

Verify a files integrity using the Secure


Hash Algorithm. The SHA-1 cipher
generates a 160-bit condensed
representation of a message called a
message digest. The SHA-1 is used by both
the transmitter and intended receiver of a
message in computing and verifying a
digital signature.

None

Specifies that you do not want to use any


hash algorithms in your data transfer.

139

Chapter 9: Managing Relationships


Relationship Pages Field Definitions

Notify Name

Enter the AS2 name you want to notify of the receipts.


You can also click the Find URL icon to open the URL
List to select a defined URL address.

Receipt Address

Specifies the URL where you want to receive the


receipts from this trading partner. You can also click the
Find URL icon to open the URL List to select a defined
URL address.

MDN Address

If you selected FTP as the protocol, and specified that


you wanted to use a different MDN address, enter the
alternate MDN address.

Use Quotes in MIME


Headers
Specifies that you have AS2 EDI names with embedded
spaces or special characters and want them surrounded
by quotes in the MIME headers.
Base64-encode the
Payload

User Supplied
Message Identifier

User Supplied
Message Subject

Specifies that the data being sent should be encoded


prior to being encrypted.

Specifies a message-identifier for the message. By


default, the system will assign a unique identifier. The
size of the name can range from 1-30 characters.

Specifies a message subject to be carried in the subject


field of the HTTP header. The size of the name can
range from 1-30 characters.

140

Chapter 10: Managing Work Orders

Introduction .................................................................................................. 142


What is a Work Order? ................................................................................ 142
Creating a Work Order................................................................................. 142
Viewing Your Work Order List ...................................................................... 143
Viewing Work Order Information.................................................................. 143
Editing Work Order Information ................................................................... 144
Deleting a Work Order ................................................................................. 144
Work Order Pages Field Definitions............................................................. 145
Work Order List Page Definitions ...................................................................................145
Work Order Information Page Definitions .......................................................................145

Chapter 10: Managing Work Orders


Introduction

Introduction
This chapter explains how to manage work orders using TCM.

What is a Work Order?


In TCM, a Work Order can be defined as a set of commands sent to a Commerce Suite
Server to accomplish specific tasks. The typical use of a Work Order is to initiate
sending data, as shown in the following example:
send http CompanyA CompanyB -fNtest.txt -n1
The Commerce Suite Server application routinely checks the database to see if there
are work orders to be executed.
Refer to the Commerce Suite Command Reference Guide for more information on the
specific commands that can be included in work order files.

Creating a Work Order


Follow the steps below to create a work order.
1. Click Work Orders in the Navigation pane. The Work Orders page opens to
display your Work Order List.
2. Click the New button or the New Work Order link to open the Work Order
Information page.
3. In the Command field, enter the commands you want added to the work order
and executed by TCM at the specified time.
4. The Batch # field is populated automatically upon saving the created work
order.
5. The Status field specifies the current status of the work order.
6. The Status Time field specifies when the work order status was checked.
7. Click Save. A confirmation dialog box opens indicating the work order has
been created.
8. Click OK to dismiss the dialog box and return to the Work Order List page.

142

Chapter 10: Managing Work Orders


Viewing Your Work Order List

Viewing Your Work Order List


To view a listing of all your defined and saved work orders, click Work Orders in the
Navigation pane. The Work Order List page opens to display your Work Order
List.

Viewing Work Order Information


Follow the steps below to view work order information.
1. Click Work Orders in the Navigation Pane. The Work Orders List page
opens to display your Work Order List.
2. From within the Work Order List, click a work order entry to open the Work
Order Information page and display more detailed work order information.

143

Chapter 10: Managing Work Orders


Editing Work Order Information

Editing Work Order Information


Follow the steps below to edit work order information.
1. Click Work Orders in the Navigation pane. The Work Orders page opens to
display your Work Order List.
2. Select the work order you want to edit to open the Work Order Information
page.
3. In the Command field, enter the commands you want added to the work order
and executed by TCM at the specified time.
4. The Batch # field is populated automatically upon saving the created work
order.
5. The Status field specifies the current status of the work order.
6. The Status Time field specifies when the work order status was checked.
7. Click Save. A confirmation dialog box opens indicating the work order has
been modified.
8. Click OK to dismiss the dialog box and return to the Work Order List page.

Deleting a Work Order


Follow the steps below to delete a work order.
1. Click Work Orders in the Navigation pane. The Work Orders List page
opens to display your Work Order List.
2. Click the Delete (X) button next to the work order entry you want to delete. A
dialog box opens prompting you to confirm the work order deletion.
3. Click Yes to dismiss the dialog box, remove the work order from the Work
Order List, and return to the Work Order List page.

144

Chapter 10: Managing Work Orders


Work Order Pages Field Definitions

Work Order Pages Field Definitions


This section contains field definitions for all the TCM work order pages.

Work Order List Page Definitions


Use the Work Order List page to search for, add, delete, and view work orders. The
following field definitions apply to the Work Order List page:
Status

Specifies the status of the work order for which you are
searching.

Work Order List

Provides a listing of defined and saved work orders.

Work Order Information Page Definitions


Use the Work Order Information page to define work order files. The following
field definitions apply to the Work Order Information page:
Command

Specifies the commands you want added to the work


order and executed by TCM at the specified time.

Batch #

Specifies the batch number automatically defined for the


work order upon its creation.

Status

Specifies the current status of the work order.

Status Time

Specifies the time when the work order was a checked.

145

Chapter 11: Managing Certificates

Introduction .................................................................................................. 147


What is a Certificate?................................................................................... 147
Creating a Certificate ................................................................................... 148
Allocating Key Usage Criteria for a Certificate............................................. 150
Viewing Your Certificate List ........................................................................ 152
Viewing Certificate Information .................................................................... 153
Viewing Usage Information .......................................................................... 154
Importing a Certificate.................................................................................. 155
Exporting a Certificate ................................................................................. 156
Deleting a Certificate ................................................................................... 157
Certificate Pages Field Definitions............................................................... 158
Certificate List Page Definitions......................................................................................158
Certificate Information Page Field Definitions.................................................................158
Certificate Usage Information Page Field Definitions .....................................................161

Chapter 11: Managing Certificates


Introduction

Introduction
This chapter explains how to manage certificates using TCM.

What is a Certificate?
Securely exchanging data is a requirement when using the AS2 protocol. To
accommodate this requirement, nuBridges utilizes a public key cryptography scheme
that uses a pair of keys for encryption; a public key, which encrypts data, and a
corresponding private, or secret key, for decryption. Trading Partners exchange public
keys with each other while keeping their private key secret. As a result, anyone with a
copy of a Trading Partners public key can encrypt information that only the Trading
Partner can read.
The primary benefit of public key cryptography is that the need for the sender and
receiver to share secret keys is eliminated. All communication involves only public
keys, no private keys are ever transmitted or shared.
The following illustration provides a simple example of a data exchange between
Trading Partners using public key cryptography:

Senders
Message

Receivers
Private Key

Senders
Public Key

Received
Message

Encrypted Data

In this illustration, the original message is encrypted using the senders public key. The
encrypted data is then sent to the receiver. The receiver then decrypts the data using
their private key. Once it is decrypted, the receiver can read the message.
Certificates also define how the key will be used. The valid key usage selections are:
Sign only - Can only sign the data
Encrypt only - Can only encrypt the data
Decrypt only - Can only decrypt the data
Sign and Decrypt - Can sign and decrypt the data
Verify only - Can only verify the data
Verify and Encrypt - Can verify and encrypt the data
All - Can sign, encrypt, decrypt, and verify the data
147

Chapter 11: Managing Certificates


Creating a Certificate

Creating a Certificate
Follow the steps below to create a certificate.
1. Click Certificates in the Navigation pane. The Certificates page opens to
display expandable lists of Organizations and Trading Partners owning
certificates.
2. Click the Add Certificate link to open the Certificate Information page.
3. Click Organization or Trading Partner to specify the type of Owner of the
certificate.
4. If you select Organization as the owner, select an organization from the
Organization list.
5. If you select Trading Partner as the owner, select a trading partner from the
Trading Partner list.
6. Click Import to import a certificate or click Create to create a certificate.
7. If you selected Import, perform the following steps:
a. In the Certificate File field, enter the fully qualified path for the certificate
file, or click Browse to locate the file on your local system.
b. In the Private Key File field, enter the fully qualified path for the private-key
file, or click Browse to locate the file on your local system.
8. If you selected Create, perform the following steps:
a. In the Subject Common Name field, enter a subject for the public-key
certificate.
b. In the Subject Organization Unit field, enter the organization unit name, or
click More to select from the list.
c. In the Subject Organization field, enter the name of the organization.
d. In the Subject Locality field, enter the name of the city or town,
e. In the Subject State/Province field, enter the state or province.
f. In the Subject Country field, enter the country.
g. In the Subject Email field, enter the email address.

148

Chapter 11: Managing Certificates


Creating a Certificate

h. Click Issuer Name same as Subject Name if you want to duplicate the
Subject information into the Issuer information. Skip to sub-step w if this is
the case.
If the Issuer information is different than the Subject information, then
continue to the next step.
i. In the Issuer Common Name field, enter the name of the issuer.
j. In the Issuer Organization Unit field, enter the organization unit name, or
click More to select from the list.
k. In the Issuer Organization field, enter the name of the organization issuing
the certificate.
l. In the Issuer Locality field, enter the city or town.
m. In the Issuer State/Province field, enter the state or province.
n. In the Issuer Country field, enter the country.
o. In the Issuer Email field, enter the email address.
p. Click Encrypt if you want to encrypt the data.
q. Click Decrypt if you want to decrypt the data.
r. Click Sign if you want to sign the data.
s. Click Verify if you want to verify the signature. The following key usage
combinations are valid when creating Certificates: Sign only, Encrypt only,
Decrypt only, Sign and Decrypt, Verify only, Verify and Encrypt, All
t. In the Key Size list, select the length of the RSA modules.
u. In the Valid From Year lists, specify the date upon which the certificate is
valid.
v. In the Valid To Year lists, specify the expiration date of the certificate.
w. Click Create to save your settings and create the certificate. A confirmation
dialog box opens indicating the certificate has been added.
x. Click OK to dismiss the dialog box and return to the Certificates page. The
organization or trading partner for which the certificate was created is added
to the Organizations or Trading Partners list.

149

Chapter 11: Managing Certificates


Allocating Key Usage Criteria for a Certificate

Allocating Key Usage Criteria for a Certificate


1. Click Certificates in the Navigation pane. The Certificates page opens to
display expandable lists of Organizations and Trading Partners owning
certificates.
2. From within the Certificate for all Companies list, click the + to expand the
Organizations or Trading Partners list to view a list of certificates.
3. Click the + to expand the Organizations or Trading Partners list to view
defined organizations and trading partners.
4. Click the + next to the organization or trading partner whose certificate
information you want to view.
5. Click the + next to the Serial number of the certificate you want to view.
6. Click the + next to the Usage column of the certificate you want to view.
7. Click New Usage. The Usage Information page displays.

8. In the From field, select the trading partner who will be sending the data.
9. In the To field, select the trading partner who will be receiving the data.
10. Select Encrypt if you want to encrypt the data.
11. Select Decrypt if you want to decrypt the data.
12. Select Sign if you want to sign the data.
150

Chapter 11: Managing Certificates


Allocating Key Usage Criteria for a Certificate

13. Select Verify if you want to verify the signature. The following key usage
combinations are valid for allocating usage information: Sign only, Encrypt
only, Decrypt only, Sign and Decrypt, Verify only, Verify and Encrypt, All.
14. Select Yes if the certificate is pending. Otherwise, select No.
15. Select Yes if the certificate is encrypted. Otherwise, select No.
16. Specify the status of the certificate. Valid options are:
Pending - indicates the certificate characteristics have been defined in TCM,
but the certificate is not actively being used as yet, but will be in the future.
Active - indicates the certificate characteristics have been defined in TCM
and the certificate is actively being used.
Inactive - indicates the certificate characteristics have been defined in TCM,
however, the certificate is not actively being used.
Retired - indicates the certificate characteristics have been defined in TCM,
however, the certificate will not actively be used again.
17. Click Save to save the usage information.

151

Chapter 11: Managing Certificates


Viewing Your Certificate List

Viewing Your Certificate List


Follow the steps below to view your list of saved certificates.
1. Click Certificates in the Navigation pane. The Certificates page opens to
display expandable lists of Organizations and Trading Partners owning
certificates.

2. From within the Certificate for all Companies list, expand the Organizations
or Trading Partners list to view a list of certificates.

152

Chapter 11: Managing Certificates


Viewing Certificate Information

Viewing Certificate Information


Follow the steps below to view certificate information.
1. Click Certificates in the Navigation pane. The Certificates page opens to
display expandable lists of Organizations and Trading Partners owning
certificates.
2. Click the + to expand the Organizations or Trading Partners list to view
defined organizations and trading partners.
3. Click the + next to the organization or trading partner whose certificate
information you want to view.
4. Click the + next to the Serial number of the certificate you want to view.

153

Chapter 11: Managing Certificates


Viewing Usage Information

Viewing Usage Information


Follow the steps below to view certificate usage information:
1. Click Certificates in the Navigation pane. The Certificates page opens to
display expandable lists of Organizations and Trading Partners owning
certificates.
2. Click the + to expand the Organizations or Trading Partners list to view
defined organizations and trading partners.
3. Click the + next to the organization or trading partner whose certificate
information you want to view.
4. Click the + next to the Serial number of the certificate you want to view.
5. Click the + next to the Usage column of the certificate you want to view.
6. Select the usage instance you want to view.

154

Chapter 11: Managing Certificates


Importing a Certificate

Importing a Certificate
Follow the steps below to import a certificate.
1. Click Certificates in the Navigation pane. The Certificates page opens to
display expandable lists of Organizations and Trading Partners owning
certificates.
2. Click the Add Certificate link or the Add button to open the Certificate
Information page.
3. Click Organization or Trading Partner to specify the type of Owner of the
certificate.
4. If you select Organization as the owner, select an organization from the
Organization list.
or
If you select Trading Partner as the owner, select a trading partner from the
Trading Partner list.
5. Click Import. The Certificate Information screen displays.

6. In the Certificate File field, enter the fully qualified path for the certificate file,
or click Browse to locate the file on your local system.
7. In the Private Key File field, enter the fully qualified path for the private-key
file, or click Browse to locate the file on your local system.
8. Click Import to save your settings and create the certificate. A confirmation
dialog box opens indicating the certificate has been added.
9. Click OK to dismiss the dialog box and return to the Certificates page. The
organization or trading partner for which the certificate was created is added to
the Organizations or Trading Partners list.
155

Chapter 11: Managing Certificates


Exporting a Certificate

Exporting a Certificate
Follow the steps below to export a certificate.
1. Click Certificates in the Navigation pane. The Certificates page opens to
display expandable lists of Organizations and Trading Partners owning
certificates.
2. Click the + to expand the Organizations or Trading Partners list to view defined
organizations and trading partners.
3. Click the + next to the organization or trading partner whose certificate
information you want to view.
4. Click the + next to the Serial number of the certificate you want to view.
5. Click the Export Certificate button
displays.

. The Exporting Information dialog

6. Enter the name of the certificate file or private key file to which you want to
export the information, or click Save As to select the file from a list.
7. Click Export to export the information to the specified file. A confirmation
dialog box opens indicating the information has been exported.
8. Click OK to dismiss the dialog box and return to the Certificates page.

156

Chapter 11: Managing Certificates


Deleting a Certificate

Deleting a Certificate
Follow the steps below to delete a certificate.
1. Click Certificates in the Navigation pane. The Certificates page opens to
display expandable lists of Organizations and Trading Partners owning
certificates.
2. Click the + to expand the Organizations or Trading Partners list to view
defined organizations and trading partners.
3. Click the + next to the organization or trading partner whose certificate
information you want to view.
4. Click the + next to the Serial number of the certificate you want to view.
5. Click the X within the certificate information table to delete the certificate. A
dialog box opens prompting you to confirm the deletion of the certificate.
6. Click Yes to delete the certificate and return to the Certificates page.

157

Chapter 11: Managing Certificates


Certificate Pages Field Definitions

Certificate Pages Field Definitions


This section contains field definitions for all the TCM certificate pages.

Certificate List Page Definitions


Use the Certificate List page to search for, add, delete, and view certificate
information. The following field definitions apply to the Certificate List page:
Organizations

Specifies the organizations owning certificates.

Trading Partners

Specifies the trading partners owning certificates.

Undefined

Displays a list of undefined certificates. If the undefined


certificates are currently displayed, this button is labeled
Defined.

Certificate Information Page Field Definitions


Use the Certificate Information page to define certificate parameters. The following
field definitions apply to the Certificate Information page:
Owner

Specifies whether the certificate


organization or a trading partner.

owner

is

an

Organization Units

Specifies an organization defined within the TCM


configuration. The organization unit is the main
configurable object upon which all other TCM
definitions are associated.

Import/Export Certificate Action Options:


The following options are available if you specify to import or export your
certificate:
Certificate File

Specifies the name of the certificate file used in


conjunction with the key-pair cryptography system. The
certificate typically uses the X.509 file format and
contains CA and user information, including the users
public key. The size of the name can range from 1-70
characters.

Private Key File

Specifies the name of the private key file. The private


key file is the private part of the two-part key-pair
cryptography system. The size of the name can range
from 1-70 characters.
158

Chapter 11: Managing Certificates


Certificate Pages Field Definitions

Create Certificate Action Options:


The following options are available if you specify to create your certificate:
Subject Common
Name

Specifies a subject for the public-key certificate in a


delimited string of keyword-value pairs. Each keyword
value pair is delimited with a semi-colon. The size of the
name can range from 1-30 characters.

Subject Organization
Unit
Specifies the organization unit. The size of the name can
range from 1-75 characters.
Subject
Organization

Subject Locality

Subject
State/Province

Specifies the organization. The size of the name can


range from 1-75 characters.
Specifies the locality (city or town). The size of the
name can range from 1-30 characters.

Specifies the state or province. The size of the name can


range from 1-30 characters.

Subject Country

Specifies the country. The size of the name can range


from 1-45 characters.

Subject Email

Specifies the email address. The size of the name can


range from 1-45 characters.

Issuer Common
Name

Specifies how the public-key data is created. The size of


the name can range from 1-30 characters.

Issuer Organization
Unit
Specifies the organization unit. The size of the name can
range from 1-75 characters.
Issuer Organization Specifies the organization. The size of the name can
range from 1-75 characters.
Issuer Locality

Specifies the locality (city or town). The size of the


name can range from 1-30 characters.

159

Chapter 11: Managing Certificates


Certificate Pages Field Definitions

Issuer State/Province Specifies the state or province. The size of the name can
range from 1-30 characters.
Issuer Country

Specifies the country. The size of the name can range


from 1-45 characters.

Issuer Email

Specifies the email address. The size of the name can


range from 1-45 characters.

Encrypt

Specifies to encrypt the data.

Decrypt

Specifies to decrypt the data.

Sign

Specifies to sign the data.

Verify

Specifies to verify the signature.


Note: The following key usage combinations are valid
when creating Certificates: Sign only, Encrypt only,
Decrypt only, Sign and Decrypt, Verify only, Verify and
Encrypt, All.

Key Size

Specifies the length of the RSA modules in bits (512,


1024, or 2048).

Valid From Year

Specifies the date upon which the certificate is valid.

Valid To Year

Specifies the expiration date of the certificate.

160

Chapter 11: Managing Certificates


Certificate Pages Field Definitions

Certificate Usage Information Page Field


Definitions
Use the Certificate Usage Information page to define certificate usage parameters.
The following field definitions apply to the Certificate Usage Information page:
From

Specifies the trading partner who will be sending the


data.

To

Specifies the trading partner who will be receiving the


data.

Encrypt

Specifies to encrypt the data.

Decrypt

Specifies to decrypt the data.

Sign

Specifies to sign the data.

Verify

Specifies to verify the signature.

Pending

Specifies whether the certificate is pending.

Encrypted

Specifies whether the certificate is encrypted.

Status

Specifies one of the following conditions.


Pending - indicates the certificate characteristics have
been defined in TCM, but the certificate is not actively
being used. Pending certificates cannot be deleted.
Active - indicates the certificate characteristics have
been defined in TCM and the certificate is actively
being used.
Inactive - indicates the certificate characteristics have
been defined in TCM, however, the certificate is not
actively being used.
Retired - indicates the certificate characteristics have
been defined in TCM, however, the certificate will not
actively be used again.

161

Chapter 12: Managing Events

Introduction .................................................................................................. 163


What is an Event?........................................................................................ 163
Searching for Service Events ...................................................................... 163
Searching for Traffic Events......................................................................... 164
Purging Events ............................................................................................ 165
Purging Service Events ..................................................................................................165
Purging Traffic Events.....................................................................................................166

Event Pages Field Definitions...................................................................... 167


Service Events Page Definitions.....................................................................................167
Traffic Events Page Definitions .......................................................................................168

Chapter 12: Managing Events


Introduction

Introduction
This chapter explains how to view events using TCM.

What is an Event?
In TCM, an Event can be defined as a transaction that takes place between two Trading
Partners. There are two types of events that are recorded in TCM, Service Events and
Traffic Events.
A Service Event records the sender of the data, the senders role (Admin, Router, etc.),
and the date of the event.
A Traffic Event records the details of the actual data being sent, including the file
name, the source and destination, and any error or OP codes associated with the
transaction.

Searching for Service Events


Follow the steps below to search for a Service event.
1. Click Events in the Navigation pane. The Service Events page opens to display
your query options.

2. In the Service Name list, select the service whose events you want to view.
3. In the Service Role list, select the role of the service whose events you want to
view.
4. In the Start Date field, enter the date upon which events will begin being
retrieved.
5. In the End Date field, enter a date specifying to retrieve service events up to
and including the entered date.
6. Click Search to initiate your search. Your results appear in the Query Results
section.
163

Chapter 12: Managing Events


Searching for Traffic Events

Searching for Traffic Events


Follow the steps below to search for a Traffic event.
1. Click Events in the Navigation pane. The Service Events page opens to display
your query options.
2. Click Traffic Events to open the Traffic Events page.

3. In the From list, select the trading partner name sending the data, or click
Browse to open the AS1/AS2Name Lookup dialog box and select your value
from the list.
4. In the To list, select the trading partner name receiving the data, or click Browse
to open the AS1/AS2Name Lookup dialog box and select your value from the
list.
5. In the Error Code field, enter the error code representing the error event for
which you are searching.
6. In the Op Code list, enter the operation code representing the event for which
you are searching.
7. In the Start Date field, enter the date upon which traffic events will begin being
retrieved.
8. In the End Date field, enter a date specifying to retrieve traffic events up to and
including the entered date.
9. Click Search to initiate your search. Your results appear in the Query Results
section.

164

Chapter 12: Managing Events


Purging Events

Purging Events
To maintain the speed and usability of the TCM application, users are always
encouraged to regularly purge their Service and Traffic Event tables. There are two
ways to purge Service and Traffic Events:
manually purge records from the database (this can only be performed by a
database administrator or someone with similar privileges)
from the TCM interface (this option is available only to users in the system
administrator group)
Follow the steps below to purge events directly from TCM.

Purging Service Events


1. Access TCM.
2. From the navigation pane on the left side of the screen, select Events. The
Service Events screen displays in the right pane.

3. Use the search criteria to select the data that you want to purge. Once you have
selected the desired search criteria, click the Purge button. The following
confirmation message displays.

4. Click Yes to confirm the purge. All notice records that matched the search
criteria you selected are deleted from the Notice table.

165

Chapter 12: Managing Events


Purging Events

Purging Traffic Events


1. Access TCM.
2. From the navigation pane on the left side of the screen, select Events. The
Service Events screen displays in the right pane.

3. Select the Traffic Events link located at the top of the right pane. The Traffic
Events screen displays.

4. Use the search criteria to select the data that you want to purge. Once you have
selected the desired search criteria, click the Purge button. The following
confirmation message displays.

5. Click Yes to confirm the purge. All notice records that matched the search
criteria you selected are deleted from the Notice table.

166

Chapter 12: Managing Events


Event Pages Field Definitions

Event Pages Field Definitions


This section contains field definitions for all the TCM event pages.

Service Events Page Definitions


The following field definitions apply to the Service Events page:
Service Name

Specifies the name associated with the installed TCM


instance. This Service Name is defined in relation to the
server hosting the TCM instance.

Service Role

Specifies the remote agent role.


Choose from among the following options:
Choose

To

admin

Specify the TCM instance as an admin


agent.

router

Specify the TCM instance as a router


agent. The router agent routes incoming
data to one or more transport agents.

transport Specify the TCM instance as a transport


agent. The transport agent performs
message packaging and unpacking
functions such as encryption and digital
signatures.
Start Date

Specifies to retrieve service events starting at the


specified date.

End Date

Specifies to retrieve service events up to and including


the specified date.

167

Chapter 12: Managing Events


Event Pages Field Definitions

Traffic Events Page Definitions


The following field definitions apply to the Traffic Events page:
From

Specifies the trading partner name sending the data.


(Same as the AS2 Name).

To

Specifies the trading partner name receiving the data.


(Same as the AS2 Name).

Error Code

Specifies to retrieve traffic events with the specified


error code.

OP Code

Specifies to retrieve traffic events with the specified


operation code.

Start Date

Specifies to retrieve traffic events starting at the


specified date.

End Date

Specifies to retrieve traffic events up to and including


the specified date.

168

Chapter 13: Working with Reports

Introduction .................................................................................................. 170


Report Definitions ........................................................................................ 170
Opening the Reports List ............................................................................. 173
Generating a Report .................................................................................... 173
Error Report ....................................................................................................................174
Certificate Report............................................................................................................175
Relationship Report ........................................................................................................176
Server Service Report ....................................................................................................176
MDN Reconcile Report ...................................................................................................177
User Report ....................................................................................................................178
Work Order Report .........................................................................................................178
Trading Partner Billing Contacts Report .........................................................................179
Trading Partner Technical Contacts Report ....................................................................179
Trading Partner Other Contacts Report ..........................................................................179
Key Pair Report ..............................................................................................................180
Undefined AS2 Name Report .........................................................................................180
Matched MDN Report .....................................................................................................181
All Activity Report............................................................................................................182
Message Receipts Report ..............................................................................................183

Saving a Report ........................................................................................... 184


Printing a Report.......................................................................................... 184
Exporting a Report....................................................................................... 185
Sorting Reports ............................................................................................ 185
Filtering Reports .......................................................................................... 186
Grouping Reports ........................................................................................ 186

Chapter 13: Working with Reports


Introduction

Introduction
This chapter explains how to generate reports using Trading Community Manager.

Report Definitions
The following reports are provided in TCM:
Error Report

This report lists all messages which had some kind of


error in the errcode field from the notice table. A text
explanation of the error is provided in the report. This
report uses data from the notice, as2name, tp, and
org tables. This report has a date search feature, that
allows you to search for messages from a specific date
range (today, this week, this month), all messages, or
specify your own date range using Custom.
Note: Only transactions associated with Defines AS2
names are shown in this report.

Certificate Report

This report displays certificates which are expected to


expire within the date range. This report has a date
search feature, which will allow you to search for
certificates expiring within 30, 60, 90, or 120 days, all
messages, or specify your own date range using
Custom.

Relationship Report This report displays all relationships defined within the
Commerce Suite environment. These relationships show
all the parameters used to describe a relationship
between two as2names. This includes the protocol
used to communicate, and specific communication
options.
Server Service
Report

This report shows all the services defined within a


Commerce Suite environment. It enumerates the
different transports and routers that are available within
the environment, and specific control values related to
these services, such as their peer group, their URL and
Control URL, the computer they run on, and the
organization they belong to.

170

Chapter 13: Working with Reports


Report Definitions

MDN Reconcile
Report

User Report

This report shows all messages which do not have


corresponding receipts or MDNs (message delivery
notices). The absence of an MDN, when message
receipts are used, could indicate that a Trading Partner
either did not receive a message, or was unable to send a
receipt. This report allows the customer to easily
identify those messages and possibly resend them.
This report provides the customer with a list of users on
the system, their contact information, their group
information, and their organization information.

Work Order Report This report provides the customer with a list of work
orders that are present in the work order table. This
could vary by customer, as some customers may purge
workorders as they are completed, while other
customers leave set information in the workorder table,
and other customers simply change the status of
workorders as they are done.
Trading Partner Billing
Contacts Report
This report provides the customer with a list of billing
contacts for Trading Partners, and their contact
information.
Trading Partner Technical
Contacts Report
This report provides the customer with a list of technical
contacts for Trading Partners, and their contact
information.
Trading Partner Other
Contacts Report
This report provides the customer with a list of
additional, other contacts for Trading Partners, and
their contact information.
Key Pair Report

This report describes the key pair parameters used to


communicate between two trading partners, including
the status (Active, Pending), and the encryption and
signing options.

171

Chapter 13: Working with Reports


Report Definitions

Undefined AS2
Name Report

Matched MDN
Report

All Activity Report

This report provides a list of messages which have


as2names from the notice table, that do not
corresponding to names in the as2name table. These
are messages for undefined trading partners, within
TCM.

This report provides a list of messages that have


corresponding receipts or MDNs (message delivery
notices). These messages have been acknowledged by
the Trading Partner. This report is the opposite of the
MDN Reconcile report.
This report lists all messages sent by the Commerce
Suite environment, currently in the notice table. This
includes messages from and to trading partners and
internal messages passed between agents within the
Commerce Suite environment. This report has a date
search feature, which will allow you to search for
messages from a specific date range (today, this week,
this month), all messages, or specify your own date
range using Custom.
Note: Only transactions associated with Defines AS2
names are shown in this report.

Message Receipts

This report lists all messages received by Commerce


Suite, from the notice table. The receipt must have
worked successfully (error code of zero). This report
uses data from the notice, as2name, tp, and org
tables. This report has a date search feature, which will
allow you to search for messages from a specific date
range (today, this week, this month), all messages, or
specify your own date range using Custom.

172

Chapter 13: Working with Reports


Opening the Reports List

Opening the Reports List


To view the Reports list, click Reports in the Navigation pane. The Reports page
opens to display the Reports list.

Generating a Report
Follow the steps below to generate a report.
1. From the Report List, select the report you want to generate. The steps for
generating each report are presented in the following sections.
Note: The first time you select a report for generation, you may see the
following ActiveX warning message:

2. Click Yes to continue report generation.


Warning: Clicking No results is a runtime error blocking you from viewing
that report until TCM is shutdown and restarted.
Some reports allow you to specify criteria for filtering the data that is included
in the report. When generating multiple copies of the same report with different
criteria, you must close the criteria dialog and reopen it to specify the different
criteria.
173

Chapter 13: Working with Reports


Generating a Report

Error Report
The Error Report lists data transmissions between trading partners that generated
errors for the specified date range.
Follow the steps below to generate an Error Report.
1. Select the Error Report from the Report List. The Criteria dialog box
displays.

2. From the Pick A Day drop down list, select the dates you want to display on the
report.
3. If you selected Custom as the reporting date, enter the From Date and To Date.
4. Click Get Report. The Error Report is generated for the specified dates.

174

Chapter 13: Working with Reports


Generating a Report

Certificate Report
The Certificate Report lists the certificates that are set to expire within the specified
timeframe.
Follow the steps below to generate a Certificate Report.
1. Select the Certificate Report from the Report List. The Criteria dialog box
displays.

2. From the Certificate Expires drop down list, select the dates you want to
display on the report.
3. If you selected Custom as the expiration date, enter the desired expiration date.
The report will list all certificates that are set to expire prior to the specified
date.
4. Click Get Report. The Certificate Report is generated for the specified dates.

175

Chapter 13: Working with Reports


Generating a Report

Relationship Report
The Relationship Report lists all trading partner relationships you have defined in the
database.
To generate a Relationship Report, select the Relationship Report from the Report
List. The Relationship Report is generated.

Server Service Report


The Server Service Report lists the services that are defined in TCM.
To generate a Server Service Report, select the Server Service Report from the
Report List. The Server Service Report is generated.

176

Chapter 13: Working with Reports


Generating a Report

MDN Reconcile Report


The MDN Reconcile Report lists the message transmissions for the specified date
range that do not have matching MDNs.
Follow the steps below to generate an MDN Reconcile Report.
1. Select the MDN Reconcile Report from the Report List. The Criteria dialog
box displays.

2. From the Pick A Day drop down list, select the dates you want to display on the
report.
3. If you selected Custom as the reporting date, enter the From Date and To Date.
4. Click Get Report. The MDN Reconcile Report is generated for the specified
dates.

177

Chapter 13: Working with Reports


Generating a Report

User Report
The User Report lists the TCM users who have been set up in the system.
To generate a User Report, select the User Report from the Report List. The User
Report is generated.

Work Order Report


The Work Order Report lists all pending work orders in the system.
Follow the steps below to generate a Work Order Report.
1. Select the Work Order Report from the Report List. The Criteria dialog box
displays.

2. From the Pick A Day drop down list, select the dates you want to display on the
report.
3. If you selected Custom as the reporting date, enter the From Date and To Date.
4. Click Get Report. The Work Order Report is generated for the specified dates.

178

Chapter 13: Working with Reports


Generating a Report

Trading Partner Billing Contacts Report


The Trading Partner Billing Contacts report lists the billing contact information for all
defined trading partners.
To generate a Trading Partner Billing Contacts Report, select the Trading Partner
Billing Contacts Report from the Report List. The Trading Partner Billing Contacts
Report is generated.

Trading Partner Technical Contacts Report


The Trading Partner Technical Contacts report lists the technical contact information
for all defined trading partners.
To generate a Trading Partner Technical Contacts Report, select the Trading Partner
Tech. Contacts Report from the Report List. The Trading Partner Technical Contacts
Report is generated.

Trading Partner Other Contacts Report


The Trading Partner Other Contacts Report lists the other contact information for all
defined trading partners.
To generate a Trading Partner Other Contacts Report, select the Trading Partner
Other Contacts Report from the Report List. The Trading Partner Other Contacts
Report is generated.

179

Chapter 13: Working with Reports


Generating a Report

Key Pair Report


The Key Pair Report lists the details of the key pairs that have been defined in the
system.
To generate a Key Pair Report, select the Key Pair Report from the Report List. The
Key Pair Report is generated.

Undefined AS2 Name Report


The Undefined AS2 Name Report lists data transmissions that reference an undefined
AS2 name.
To generate an Undefined AS2 Name Report, select the Undefined AS2 Name
Report from the Report List. The Undefined AS2 Name Report is generated.

180

Chapter 13: Working with Reports


Generating a Report

Matched MDN Report


The Matched MDN Report lists the data transmissions with matched MDN Receipts
for the specified date range.
Follow the steps below to generate a Matched MDN Report.
1. Select the Matched MDN Report from the Report List. The Criteria dialog
box displays.

2. From the Pick A Day drop down list, select the dates you want to display on the
report.
3. If you selected Custom as the reporting date, enter the From Date and To Date.
4. Click Get Report. The Matched MDN Report is generated for the specified
dates.

181

Chapter 13: Working with Reports


Generating a Report

All Activity Report


The All Activity Report lists all data transmission activity that occurred during the
specified date range.
Follow the steps below to generate an All Activity Report.
1. Select the All Activity Report from the Report List. The Criteria dialog box
displays.

2. From the Pick A Day drop down list, select the dates you want to display on the
report.
3. If you selected Custom as the reporting date, enter the From Date and To Date.
4. Click Get Report. The All Activity Report is generated for the specified dates.

182

Chapter 13: Working with Reports


Generating a Report

Message Receipts Report


The Message Receipts Report lists all data transmissions received during the specified
date range.
Follow the steps below to generate a Message Receipts Report.
1. Select the Message Receipts Report from the Report List. The Criteria dialog
box displays.

2. From the Pick A Day drop down list, select the dates you want to display on the
report.
3. If you selected Custom as the reporting date, enter the From Date and To Date.
4. Click Get Report. The Message Receipts Report is generated for the specified
dates.

183

Chapter 13: Working with Reports


Saving a Report

Saving a Report
The IntelliVIEW interactive reporting application allows you to save your report data
along with the visual layout settings to your local disk. Perform the following steps to
save a report file:
1. From within IntelliVIEW, click File from the Menu bar.
2. Select Save to view a list containing the following save options:
Data File - specifies to save the entire report data.
Data File With Layout - specifies to save the report data and the visual
layout of the report. This options results in two files being saved to the same
location, a data file (.ivwd) and a layout file (.ivwl).
Layout File - specifies to save only the visual layout of the report that can be
applied to other reports as well.
3. Select the Save option that best suits your needs. A Save dialog box appears.
4. Select a location to save your files.
5. Enter a name for your file within the File Name field.
6. Click Save.
Note: For more information on saving IntelliVIEW reports, click Help from
within the IntelliVIEW application and select Using IntelliVIEW to open the
IntelliVIEW User Guide.

Printing a Report
The IntelliVIEW interactive reporting application enables you to print your report data
using one of following two views: Grid View or Free Form View.
Follow the steps below to print a report file.
1. From within IntelliVIEW, click File from the Menu bar.
2. Select Print to open the Print dialog box.
3. Click Page Setup to modify your print criteria prior to sending the document to
print.
4. Click OK to save your changes and return to the Print dialog box.
5. Click Print to send your report to your local printer.
Note: For more information on printing reports from within IntelliVIEW, click
Help from within the IntelliVIEW application and select Using IntelliVIEW to
open the IntelliVIEW User Guide.
184

Chapter 13: Working with Reports


Exporting a Report

Exporting a Report
The IntelliVIEW interactive reporting application enables you to export reports to
formats such as MS Excel, HTML, MS Word, XML, Text, PDF, etc.
Follow the steps below to export a report to the desired format.
1. From within IntelliVIEW, click File from the Menu bar.
2. Select Export To to view a list containing the following export options:
Visual - specifies to export the data that is visible on the screen to one of the
following desired formats: Excel, HTML, XML, Text, and PDF.
Data - specifies to export the whole report data to one of the following
desired formats: Data File, Excel, MS Word, Rich Text, HTML, Text, Comma
Delimited, Tab Delimited, Data Interchange Format, SYLK, and Clipboard
3. Select your export option.
4. Select the export format from the Visual or Data list. An Export dialog box
displays.
5. Select a location to save your files.
6. Enter a file name.
7. Click Save.
Note: For more information on exporting reports from within IntelliVIEW,
click Help from within the IntelliVIEW application and select Using
IntelliVIEW to open the IntelliVIEW User Guide.

Sorting Reports
The IntelliVIEW interactive reporting application enables you to sort your report
column using one of following two methods: Ascending or Descending.
Follow the steps below to sort the report data within a specified column.
1. Click the column header. This acts as a toggle option.
2. Click the column again to sort the column in ascending or descending order.
The column-header icon indicates which way the column is sorted.
Note: For more information on sorting report data from within IntelliVIEW,
click Help from within the IntelliVIEW application and select Using
IntelliVIEW to open the IntelliVIEW User Guide.
185

Chapter 13: Working with Reports


Filtering Reports

Filtering Reports
The IntelliVIEW interactive reporting application enables you to custom filter your
report data.
Follow the steps below to create a custom filter.
1. Click the down-arrow in the column header. The filter drop-down list appears.
2. Click Custom to open the Custom Filter dialog box. The column for which
you are applying the filter appears on the header for this window.
3. In this window, click the drop-down list box below the column name.
4. Selected one of the listed filter options.
5. Enter a value in the right-hand side box.
6. Use either the OR or the AND operators, by selecting one of the option buttons.
Follow the same procedure for entering values for the second set of filter
criteria
7. Click OK.
Note: For more information on filtering report data from within IntelliVIEW,
click Help from within the IntelliVIEW application and select Using
IntelliVIEW to open the IntelliVIEW User Guide.

Grouping Reports
The IntelliVIEW interactive reporting application enables you to group your report
data based on a particular column.
Follow the steps below to group data by a column.
1. From within IntelliVIEW, right-click the column heading with which you
would like to group the report.
2. Select Group By This Field. The specified column disappears from the report
and appears in the group by band, which is available between the report and the
tool bar. This column now groups the report.
Note: For more information on grouping report data from within IntelliVIEW,
click Help from within the IntelliVIEW application and select Using
IntelliVIEW to open the IntelliVIEW User Guide.

186

Appendix A: Configuring FTPs


Connectivity

Introduction .................................................................................................. 188


Workflow ...................................................................................................... 188
Before You Begin ......................................................................................... 188
Adding the Trading Partner.......................................................................... 189
Defining the FTPs Relationship ................................................................... 195
Configuring Trading Partners to Send and Retrieve Data
Over the FTPs Communications Link .......................................................... 199

Appendix A: Configuring FTPs Connectivity


Introduction

Introduction
This appendix provides instructions on how to configure an FTPs trading partner
relationship. Please note that selecting the SFTP option enables FTPs. Commerce
Suite does not support the use of SFTP.

Workflow
There are three primary steps to adding an FTPs trading partnership:
F

Add the partner

Define the relationship for FTPs

Configure trading partner to send or retrieve data over the FTPs


communications link

Before You Begin


TCM users primarily configure AS2 relationships, so you will see AS2 options during
the configuration process. Generally, these options should be disabled. The FTPs
relationship does not include any sort of security or receipt functionality, so it is not
necessary to define certificate data or MDN options.
Before you can move forward in the process, you need to have the following
information:
The partners FTPs server address/URL
The login name and password assigned to you
Other data may be required, such as type of FTPs connection (active/passive), or a
specific directory to change to after connection. If applicable, this information will be
provided to you by your partner. Please refer to the Commerce Suite Protocol
Connectivity Guide for information on configuring these additional options.

188

Appendix A: Configuring FTPs Connectivity


Adding the Trading Partner

Adding the Trading Partner


1. Login to TCM as an administrator. Click the Trading Partners link in the left
pane. The Trading Partner List displays.

189

Appendix A: Configuring FTPs Connectivity


Adding the Trading Partner

2. Click the New Partner link located at the top of the page. The Easy Setup
Wizard displays.

3. In the Trading Partner field, enter the trading partners name.

190

Appendix A: Configuring FTPs Connectivity


Adding the Trading Partner

4. In the Status list, select Active.


5. Click New AS1/AS2 Name button (this is necessary even though you are not
establishing AS2 connectivity). The Add/Edit AS1/AS2 Name dialog box
displays.

6. Enter a name for the FTPs relationship you are creating (maximum 32
characters). Click Save. A message displays indicating that you must complete
the wizard and click Finish before the AS1/AS2 name is added to the database.

7. Click OK. You are returned to the Trading Partner Information page. Notice
that the AS2 name now appears in the list.

191

Appendix A: Configuring FTPs Connectivity


Adding the Trading Partner

8. Click Next. The Default Settings page displays.

9. Click New URL to add the trading partners URL. The Add/Edit URL dialog
box displays.

10. In the protocol drop down list, select sftp. Selecting this protocol type from the
drop down menu enables you to use FTPs.
11. In the Server field, enter the server information using the following format:
name:password@ftp.domain.com
192

Appendix A: Configuring FTPs Connectivity


Adding the Trading Partner

12. In the port field, type the information provided by your trading partner.
13. Mark the Set as Default checkbox.
14. Click Save. A message displays indicating that you must complete the Trading
Partner wizard and click Finish before the trading partner URL is added to the
database.
15. Click OK. You are returned to the Trading Partner Information page. Notice
that the URL name now appears in the list.
16. Click Next. The Default Security Settings page displays.

193

Appendix A: Configuring FTPs Connectivity


Adding the Trading Partner

17. Deselect each of the checkboxes in the Support column. Click Finish. A
message displays indicating that you have completed the wizard.

18. Click OK. The EZ View page displays, showing the Trading Partner Summary
information.

Do not be concerned about the settings for your organization as shown on this
page. The information displayed here is not an integral part of your trading
partner relationship - it acts as a placeholder. You are ready to define the FTPs
relationship.

194

Appendix A: Configuring FTPs Connectivity


Defining the FTPs Relationship

Defining the FTPs Relationship


Follow the steps below to create a FTPs relationship.
1. Click Relationships in the Navigation pane. The Relationships page displays
your Relationship List. The Relationship List is a listing of all inbound and
outbound relationships for every defined trading partner.

195

Appendix A: Configuring FTPs Connectivity


Defining the FTPs Relationship

2. Click the New Relationship link located at the top of the page. The
Relationship Entry page displays. This page acts as Step 1 in the Relationship
Wizard two-step process.

3. In the From list, select the trading partner who will be sending the data.
4. In the To list, select the trading partner receiving the data.

196

Appendix A: Configuring FTPs Connectivity


Defining the FTPs Relationship

5. Define the Settings for the Inbound Relationship as follows:


a. In the Protocol drop down list, select sftp. Selecting the SFTP option enables
FTPs. Commerce Suite does not support the use of SFTP.
b. In the Inbox Directory field, enter the name of the directory where you want
data received from this trading partner to be stored.
c. In the Notify Name field, enter the name of the intended outbound recipient
of the receipt. You can click the search icon located to the right of the field if
you prefer to select the URL from the pop-up list. This value is a placeholder
as there are no receipts in the FTPs relationship.
d. For the remaining fields, select None.
6. Do not enter any information in the User Defined AS2 Header Values section.
7. Define the URL for Outbound Relationship as follows:
a. In the To URL drop down list, select sftp. Click the find icon located next to
the To URL field. Select the trading partner URL you added when creating
the trading partner.
b. Leave the Do you want to use a different MDN address? checkbox
unmarked.
c. For the remaining fields (File Name Preservation and File Date
Preservation) select None.
8. You do not need to enter any information in the Outbox Settings for
Outbound Relationship section.

197

Appendix A: Configuring FTPs Connectivity


Defining the FTPs Relationship

9. Click Next. The Select Preferences page displays.

This page acts as Step 2 in the Relationship Wizard two-step process.

198

Appendix A: Configuring FTPs Connectivity


Configuring Trading Partners to Send and Retrieve Data Over the FTPs Communications Link

10. Complete your screen so that it matches the one above. In the Notify Name
field, enter your AS2 name or click the Find icon located next to the field to
select your AS2 name from a list.
11. Click Finish to save your relationship definitions. A confirmation dialog box
opens indicating you have completed the Wizard. (If you are asked to update the
relationship, click Yes.)
12. Click OK to dismiss the confirmation dialog box and return to the Relationship
List page. You should see the relationship you added displayed in the
relationship list.

Configuring Trading Partners to Send and Retrieve Data


Over the FTPs Communications Link
Please refer to the Commerce Suite Protocol Connectivity Guide for instructions on
sending and retrieving data over the FTPs communications link.

199

Glossary
A
Agent
An instance of the Commerce Suite Server Version 3
application configured to provide services to a
particular role, i.e. Administrator, Transport, or
Router.
Administrator Agent
An instance of the Commerce Suite Server application
configured to provide administrative services
including the remote configuration of Transport and
Router Agents and access to centrally located
configuration data.
Application Service
See Service.
AS1
A draft specification first published in the Internet
Engineering Task Force (IETF) standards track. AS
stands for Applicability Statement and is a
specification about how to transport data, not how to
validate or process data. AS1 provides an Internet
solution for securely exchanging EDI and XML over
the Internet using SMTP.
AS2
A draft specification first published in the Internet
Engineering Task Force (IETF) standards track. AS
stands for Applicability Statement and is a
specification about how to transport data, not how to
validate or process data. AS2 specifies the means to
connect, deliver, validate, and reply to (receipt) data in
a secure and reliable way. AS2 provides an Internet
solution for securely exchanging EDI over the Internet

using the hypertext transmission protocol (HTTP)


instead of the simple mail transport protocol (SMTP)
as the transport protocol.
Asymmetric Cryptographic Algorithm
A cryptographic algorithm that uses two related keys,
a public-key and a private-key. The two keys have the
property that, given the public key, it is
computationally infeasible to derive the private key.
Attack
An attempt to subvert or bypass a systems security,
which may or may not be successful. Attacks may be
active or passive. An active attack attempts to alter or
destroy data. A passive attack attempts to intercept
and read data without altering it.
Authentication
Ensures the accurate identification of both the sender
and the receiver. Authentication is accomplished
using digital signatures.

B
B2B
See Business to Business Commerce.
Business to Business Commerce
Commercial transactions enacted between businesses
and individuals. Historically, electronic business to
business commerce has been handled via Electronic
Data Interchange, but recently months have seen
eXtensible Markup Language gain in popularity.

Glossary, continued

C
CA
See Certificate Authority.
Certificate
An electronic document that verifies that the owner has
a relationship with parties involved in a transaction,
such as a Cardholder that has a relationship with an
issuing bank or merchant that has a relationship with an
acquiring bank. A certificate authorizes its owner to
perform certain tasks and authenticates the owner to
other parties in the transaction, assuring that the party
presenting the certificate is the same party to which it
was originally issued.
Certificate Authority
The party which issues, renews, and revokes
Certificates. The SET protocol provides for a hierarchy
of certificate authorities. The Root CA issues
certificates to brand CAs. Brand CAs, in turn, issue
certificates to EECAs, which issue certificates to
Cardholders, Merchants, and Payment Gateways.
Optionally, a brand CA may issue certificates to
geopolitical CAs, which are responsible for issuing
certificates to end entity CAs in specific geographic or
political areas. The the SET protocol, certificates are
validated by following their signature chains up the
hierarchy of trust to the root CA.
Certificate Policy
When a CA issues a certificate, it is stating to a
certificate user that a particular public-key is bound to
a particular entity. Different certificates are issued with
different practices and procedures, and may be suitable
for different applications or purposes.
Certificate Revocation List
A list of public Keys that a Certificate Authority has
revoked before their scheduled expiration dates.

Clear Text
The unencrypted, readable text of a message.
Cipher
A key-selected transformation between plaintext and
ciphertext. An algorithm for putting a message into
code by transposition and/or substitution of symbols.
Compression
The ability to represent data in forms that take less
storage than the original. The limit to this is the amount
of uniqueness in the data. It is not possible to compress
everything down to a single byte, because a byte can
only select 256 different results. Data compression is
either lossy, in which some information is lost, or
lossless, in which all of the original information can
be completely recovered.
Communications Protocol
All communications between devices require that the
devices agree on the format of the data. The set of rules
defining a format is called a protocol. At the very least,
a communications protocol must define the following:

rate of transmission (in baud or bps)

whether transmission is to be synchronous or


asynchronous

whether data is to be transmitted in half-duplex or


full-duplex mode.

In addition, protocols can include sophisticated


techniques for detecting and recovering from
transmission errors and for encoding and decoding
data.
Confidentiality
Information is not made available or disclosed to
unauthorized individual, entities, or processes.
Configuration File
A text file containing one or more Console Command
statements. A Configuration File can be processed
automatically by the Commerce Suite Server
application upon startup if it is named icssvr.cfg and
201

Glossary, continued

stored in the same directory location as the Commerce


Suite Server executable program. A Configuration File
can also be processed if the -f parameter is entered as a
run-time program argument or as a console command.
Control Address
The IP address portion of the IP Address and Port used
by the Commerce Suite Server Transport and Router
Agents to listen for incoming control messages from a
supervising Administrative Agent; configured using
the -ca Set Option.
Control Port
The IP Port portion of the IP Address and Port used by
the Commerce Suite Server Transport and Router
Agents to listen for incoming control messages from a
supervising Administrative Agent. Configured using
the -cp Set Option.
Control Service
The set of application tasks which execute within the
context of a thread of execution to process incoming
commands being sent by an Administrator Agent. The
Control Service is required by Commerce Suite Server
Agents acting in the Transport or Router Role, if the
Agent is being remotely configured.
CRL
See Certificate Revocation List.
Cryptography
The process of protecting information by transforming
it into an unreadable format. The information is
encrypted using a Key, which makes the data
unreadable, and is then decrypted later when the
information needs to be used again.
Cypher Text
Data that has been transformed from a plaintext form
into encrypted text (an unreadable form) using an
encryption process.

D
Data Compression
Storing data in a format that requires less space than
usual. Compressing data is the same as packing data.
Data compression is particularly useful in
communications because it enables devices to transmit
the same amount of data in fewer bits.
Database
A structure to store data, usually as elements, so that a
variety of applications can use it, unlike the traditional
file structure requiring different files for each
application.
Data Integrity
The property that signifies that data is not altered,
destroyed, or otherwise compromised.
DBMS
See Database Management System.
DEFLATE
Specifies the DEFLATE compression algorithm used
to reduce the file transfer overhead. The DEFLATE
compression algorithm is a lossless compressed data
format that compresses data using a combination of the
LZ77 algorithm and Huffman coding.
Delivery Notification
A message formatted according to (AS2) that is sent to
a sending host computer to indicate the disposition of a
received message. The format of Delivery
Notifications used by Commerce Suite Server is the
Message Delivery Notification. or MDN, as defined in
MDN.
DES
See Digital Encryption Standard.

202

Glossary, continued

Diffie-Hellman Key Exchange Algorithm


A cryptographic technique that enables sending and
receiving parties to derive a shared, secret key at both
ends without disclosing it to a potential attacker. Using
a common modulus and base, both sides use a different
random number as a power to perform a modular
exponentiation. The results are sent to each other. The
receiving party raises the received number to the same
random power they used before and the results are the
same on both sides.

signatures must be unforgeable. There are a number of


different encryption techniques to guarantee this level
of security.

Digital Certificate
A document that contains name, serial number,
expiration dates and a copy of the owners public key;
used to encrypt data and validate signatures.

DSS
Specifies the Digital Signature Algorithm (DSA) for
digital signature generation and verification. The DSA
is used by a signatory to generate a digital signature on
data and by a verifier to verify the authenticity of the
signature. Each signatory has a public and private key.
The private key is used in the signature generation
process and the public key is used in the signature
verification process.

Digital Encryption Standard


A Private Key Encryption standard approved by the
US Government for encryption of data when
implemented in hardware. Uses 56-bit encryption.
Digital Envelope
The encrypted private Key that is used to decode an
accompanying encrypted message. The senders
software first randomly generates the private key and
uses it to encrypt the message data. The software then
encrypts the private key itself using the recipients
public key. The message and digital envelope (the
encrypted key) are sent to the recipient. The recipient
then uses his own private key to decrypt the message
envelope and then uses the decrypted private key to
decode the actual message.
Digital Signature
A digital code that can be attached to an electronically
transmitted message that uniquely identifies the
sender. Like a written signature, the purpose of a
digital signature is to guarantee that the individual
sending the message really is who he or she claims to
be. Digital signatures are especially important for
electronic commerce and are a key component of most
authentication schemes. To be effective, digital

Document Digest
A unique fingerprint summary (128 or 160 bits long)
of an input file. It is used to create a digital signature
and to ensure that the file has not been altered. It is also
called a hash and is produced by a checksum program
that processes a file.

E
EDI
See Electronic Data Interchange.
Electronic Commerce
A term for conducting commercial transactions
electronically, usually involving the exchange of
payment between two parties. Unlike EDI,
eCommerce recognizes the need for some human to
human communication.
Electronic Data Interchange
The transfer of data between different companies using
networks, such as the Internet. As more and more
companies get connected to the Internet, EDI is
becoming increasingly important as an easy
mechanism for companies to buy, sell, and trade
information. ANSI has approved a set of EDI standards
known as the X12 standards.
203

Glossary, continued

EDIINT
EDI Over the Internet Working Group - a working
group of the IETF that developed the AS1 and AS2
proposed standards.
Encryption
A process that uses a mathematical algorithm and a key
to transform data into an unreadable format (called
cyphertext). A receiver can then use a key to restore the
data to its original content.
Enterprise
Literally, a business organization. In the computer
industry, the term is often used to describe any large
organization that utilizes computers. An intranet, for
example, is a good example of an enterprise computing
system.
Extranet
Extension of control beyond internal web
infrastructure to allow business partners and other
trusted organizations to interact in a controlled, trusted
environment.
eXtensible Markup Language
A method for creating data formats that can be shared
on the World Wide Web.

F
FIPS
Federal Information Processing Standard.
Firewall
A system designed to prevent unauthorized access to or
from a private network, usually unauthorized access
from the Internet into a private network. Firewalls can
be implemented in both hardware and software, or a
combination of both. Firewalls are frequently used to
prevent unauthorized Internet users from accessing
private networks connected to the Internet, especially

intranets. All messages entering or leaving the intranet


pass through the firewall, which examines each
message and blocks those that do not meet the
specified security criteria.
There are several types of firewall techniques:

Packet filter: Looks at each packet entering or


leaving the network and accepts or rejects it based
on user-defined rules. Packet filtering is fairly
effective and transparent to users, but it is difficult
to configure. In addition, it is susceptible to IP
spoofing.

Application gateway: Applies security


mechanisms to specific applications, such as FTP
and Telnet servers. This is very effective, but can
impose a performance degradation.

Circuit -level gateway: Applies security


mechanisms when a TCP or UDP connection is
established. Once the connection has been made,
packets can flow between the hosts without further
checking.

Proxy server: Intercepts all messages entering


and leaving the network. The proxy server
effectively hides the true network addresses.

In practice, many firewalls use two or more of these


techniques in concert. A firewall is considered a first
line of defense in protecting private information. For
further security, data can be encrypted.
Forgery
Fabrication of information and/or the claim that such
information was received from an individual, entity, or
process that did not originate it.

G
Graphical User Interface
A GUI (usually pronounced GOO-ee) is a graphical
user interface that takes advantage of the computer's
graphics capabilities to make the program easier to use.
Well-designed graphical user interfaces can free the
204

Glossary, continued

user from learning complex command languages. On


the other hand, many users find that they work more
effectively with a command-driven interface,
especially if they already know the command
language.
GZIP
Specifies a lossless compressed data format that is
compatible with the widely used GZIP utility. This
format includes a cyclic redundancy check value for
detecting data corruption.

H
Hash
A hash value (or simply hash) is a number generated
from a string of text. The hash is substantially smaller
than the text itself, and is generated by a formula in
such a way that it is extremely unlikely that some other
text will produce the same hash value. Hashes play a
role in security systems where they're used to ensure
that transmitted messages have not been tampered
with. The sender generates a hash of the message,
encrypts it, and sends it with the message itself. The
recipient then decrypts both the message and the hash,
produces another hash from the received message, and
compares the two hashes. If they're the same, there is a
very high probability that the message was transmitted
intact.
HTTP
See Hypertext Transfer Protocol.
Hypertext Transfer Protocol
Hypertext Transfer Protocol (HTTP) is the underlying
protocol used by the World Wide Web. HTTP defines
how messages are formatted and transmitted, and what
actions Web servers and browsers should take in
response to various commands.

I
IETF
Internet Engineering Task Force.
The Internet
Engineering Task Force is a large, open, international
community of network designers, operators, vendors,
and researchers concerned with the evolution of the
Internet architecture and the smooth operation of the
Internet.
In-Beacon Service
The set of application tasks that execute within the
context of a single application thread to receive UDP
packets sent by one or more Transport Agents.
Commerce Suite Server Agents configured for the
Router Role (Router Agents) use the In-Beacon
Service to collect these UDP packets to maintain
current information about active Transfer Agents on
the local network segment.
Inbound Service
One or more sets of application tasks that execute
within the context of one or more threads of execution
to process incoming data being sent by a remote host
computer. The Inbound Service consists of, at least,
one inbound thread listening for incoming TCP/IP
connections on a particular protocol (HTTP or
HTTPS). The Inbound Service creates an Inbound
Session thread for each separate incoming connection.
Each discrete protocol is serviced by a separate
Inbound Main thread, which is assigned a unique IP
address and port on which to listen for incoming
connections.
Integrity
Ensures that data is not tampered with or corrupted in
transit. Integrity is accomplished using document
digests and digital signatures.
Interface
A mechanism through which outside components
interact with software.
205

Glossary, continued

Interoperability
The ability of software and hardware on different
machines from different vendors to share data.
Interrogation
To ask a computer or network for information.
Intranet
An internal network based on web servers that use
Internet protocols and technology. A network based on
TCP/IP protocols (an internet) belonging to an
organization, usually a corporation, accessible only by
the organizations members, employees, or others with
authorization. An intranets Web sites look and act just
like any other Web sites, but the firewall surrounding
an intranet fends off unauthorized access.
IP
Abbreviation for Internet Protocol, pronounced as two
separate letters. IP specifies the format of the packets,
also called datagrams, and the addressing scheme.
Most networks combine IP with a higher-level protocol
called Transport Control protocol (TCP), which
establishes a virtual connection between a destination
and a source.
IP by itself is something like the postal system. It
allows you to address a package and drop it in the
system, but theres no direct link between you and the
recipient. TCP/IP, on the other hand, establishes a
connection between two hosts so that they can send
messages back and forth for a period of time.
IP Address
An identifier for a computer or device on a TCP/IP
network. Networks using the TCP/IP protocol route
messages based on the IP address of the destination.
The format of an IP address is a 32-bit numeric address
written as four numbers separated by periods. Each
number can be zero to 255. For example, 1.160.10.240
could be an IP address.

within an isolated network, you can assign IP addresses


at random as long as each one is unique. However,
connecting a private network to the Internet requires
using registered IP addresses (called Internet
addresses) to avoid duplicates.
The four numbers in an IP address are used in different
ways to identify a particular network and a host on that
network. The InterNIC Registration Service assigns
Internet addresses from the following three classes:

Class A: supports 16 million hosts on each of 127


networks.

Class B: supports 65,000 hosts on each of 16,000


networks.

Class C: supports 254 hosts on each of 2 million


networks.

The number of unassigned Internet addresses is


running out, so a new classless scheme called CIDR is
gradually replacing the system based in classes A, B,
and C, and is tied to adoption of IPv6.

K
Key
A password or table needed to decipher encoded data.
Key Encryption
The translation of data into a secret code. Encryption is
the most effective way to achieve data security. To
read an encrypted file, you must have access to a secret
key or password that enables you to decrypt it.
Unencrypted data is called plain text; encrypted data is
referred to as cipher text. There are two main types of
encryption: asymmetric encryption (also called publickey encryption) and symmetric encryption.
Key Management
The generation, storage, secured distribution and
application of keying material in accordance with a
security policy.

206

Glossary, continued

Key Pair
In public key cryptography, a public key and its
corresponding private key.

Message
A communication containing one or more transactions
or related information.

Message Digest
A mathematical value unique to a message, created by
running the message through the SHA-1 hash function.
The resulting message digest is then encrypted using
the senders private key and then appended to the
message as the Digital Signature.

LDAP
See Lightweight Directory Access Protocol.
Lightweight Directory Access Protocol (LDAP)
A set of protocols for accessing information
directories. LDAP is based on the standards contained
within the X.500 standard, but it is significantly
simpler. And unlike X.500, LDAP supports TCP/IP,
which is necessary for any type of Internet access.
Because it is a simpler version of X.500, LDAP is
sometimes called X.500-lite. Although not yet widely
implemented, LDAP should eventually make it
possible for almost any application running on
virtually any computer platform to obtain directory
information, such as email addresses and public keys.
Because LDAP is an open protocol, applications need
not worry about the type of server hosting the
directory.
Local Area Network (LAN)
A group of computers, printers, and file servers linked
together in a single building in order to share resources.

M
MD5
Specifies the Message Digest Algorithm used to verify
a files integrity. The MD5 is a one-way algorithm that
takes any length of data and produces a 128-bit
fingerprint or message digest. This fingerprint is
non-reversible, meaning that the data cannot be
determined based on its MD5 fingerprint.

Message Disposition Notification (MDN)


A Message Disposition Notification (MDN) message
is a response message defined to ensure the secure
reliable delivery of messages for AS1 and AS2
protocols.
MIME
Multipurpose Internet Mail Extension - MIME is a
specification for enhancing the capabilities of standard
Internet electronic mail. It offers a simple standardized
way to represent and encode a wide variety of media
types for transmission using Internet mail.

N
Network
Two or more computers connected by a
communications protocol, allowing transfer of
information (voice or data), from one to another. There
are many types of computer networks, including:

local-area networks (LAN): The computers are


geographically close together (that it, in the same
building).

wide-area networks (WAN): The computers are


farther apart and are connected by telephone lines
or radio waves.

In addition to these types, the following characteristics


are also used to categorize different types of networks:

207

Glossary, continued

topology: The geometric arrangement of a


computer system. Common topologies include a
bus, star, and ring.

protocol: The protocol defines a common set of


rules and signals that computers on the network
use to communicate. One of the most popular
protocols for LANs is called Ethernet. Another
popular LAN protocol for PCs is the IBM tokenring network.

architecture: Networks can be broadly classified


as using either a peer-to-peer or client/server
architecture.

Computers on a network are sometimes called nodes.


Computers and devices that allocate resources for a
network are called servers.
NIST
National Institute of Standards and Technology. A part
of the U.S. Department of Commerce, formerly called
the National Bureau of Standards, that defines
standards for voice, data, and video transmissions,
encryption, and other kinds of technology.
Non-repudiation of Receipt
Confirms that the intended party received the data.
This is accomplished using digital signatures and
signed MDNs.

O
ODBC
See Open Database Connectivity.
Open Database Connectivity
A standard database access method developed by
Microsoft Corporation. The goal of ODBC is to make
it possible to access any data from any application,
regardless of which Database Management System
(DBMS) is handling the data.

Out-Beacon Service
The set of application tasks that execute within the
context of a single thread of execution to periodically
transmit a small packet of data identifying the
Transport Agent to one or more Router Agents. The
Out-Beacon Service emits a UDP packet containing
the IP Addresses and Ports on which the Agent is
currently listening. Router Agents collect these packets
to dynamically build a current list of Transport Agents
to which inbound data can be routed for processing.
Outbound Service
The set of application tasks that execute within the
context of one or more threads of execution to process
requests for outgoing message delivery. The Outbound
service consists of, at least, the main outbound thread
that processes send transactions from the Outbound
Queue. The main outbound thread creates an Outbound
Session thread for each separate send request.
O/S
Operating system, controls hardware and software
allowing application processing to take place.

P
PKCS
See Public-Key Cryptography Standards.
PKCS #1 RSA Cryptography Standard
The PKCS#1 standard provides recommendations for
the implementation of public-key cryptography based
on the RSA algorithm, covering the following aspects:
cryptographic primitives; encryption schemes;
signature schemes with appendix; ASN.1 syntax for
representing keys and for identifying the schemes.

208

Glossary, continued

PKCS#7 Cryptographic Message Syntax Standard


A message that uses the syntax specified in Public-Key
Cryptography Standard #7. The Globeset CA provides
a facility for receiving PKCS7 messages from higher
CAs. Those PKCS7 messages contain the certificates
that the Certificate Authority has requested.
PKCS#10 Certification Request Syntax Standard
A certificate request that uses the syntax specified in
Public-Key Cryptography Standard #10. Certificate
requests are sent to CAs, who then return certificates.
For example, the Globeset CA creates PKCS10
messages which it sends to a brand CA or geopolitical
CA to obtain the certificates it uses.
PKI
See Public Key Infrastructure.
PKI Service
The set of application tasks that execute within the
context of a single thread of execution to proactively
search the configuration database for public-key
certificates which are nearing their expiration date. The
PKI Service implements the nuBridges ZeroAdministration PKI architecture, to facilitate the
automated renewal of public-key certificates.
Plain Text
Unencrypted data.
Port
A specific communications end-point to a logical
connection and the way a client program specifies a
specific server program on a computer in a network.
Privacy
Ensures that only the intended receiver can view the
data. This is accomplished using a combination of
encryption algorithms and message packaging.

Private Key
A value known only to the owner, used to create a
signature and decrypt data encrypted by its
corresponding public key.
Private Key Cryptography
An encryption method which uses a single key for
encoding and decoding a message.
Public Key
A value, known by everyone to whom the certificate
has been distributed, used to encrypt data and validate
a digital signature. Although mathematically related to
the private key, it is astronomically difficult to derive
from the public key.
Public Key Cryptography
An encryption method that uses two Keys: one key to
encrypt the message and another key to decrypt the
message. The two keys are mathematically related so
that the data encrypted with either key can only be
decrypted using the other. Each user has a public and a
private key, and only the public key is distributed to
parties with which the user exchanges encrypted
messages.
Public-Key Cryptography Standards
A set of standards for implementing Private-Key
Cryptography, issued by RSA Data Security, Inc. in
collaboration with an industry consortium that includes
a large number of hardware and software
manufacturers. Documentation for the standards is
available from RSAs FTP site.
Public Key Infrastructure
Public Key Infrastructure is a system of digital
certificates, Certificate Authorities, and other
registration authorities that verify and authenticate the
validity of each party involved in an Internet
transaction. PKIs are currently evolving and there is no
single PKI or even a single agreed-upon standard for
setting up a PKI.

209

Glossary, continued

Commerce Suite Server


nuBridges Commerce Suite Server Agent, Version
3.X.

R
RC2
Specifies the Rivests Cipher encryption algorithm
used to encrypt and decrypt messages. RC2 is a
conventional (secret key) block encryption algorithm
and has a block size of 64-bits with a variable key size
from one byte up to 128 bytes.
Role
The set of Commerce Suite Server Application
Services operating within a single instance of the
Commerce Suite Server application (a process) which,
taken together, comprise a logical functional unit in an
nuBridges Commerce Suite network. The Roles
supported by Commerce Suite Server are
Administrator, Router, and Transport.
Root CA
The Certificate Authority which issues certificates to
brand CAs (superior CAs). The Root CA is also
sometimes called the Supreme CA.
RosettaNet
An organization focused on building a master
dictionary to define properties for products, partners,
and business transactions. RosettaNet can be found at
http://www.rosettanet.com.
Router Agent
An instance of the Commerce Suite Server application
configured to provide routing services including
round-robin selection of Transport Agents, messagequeuing and fail-over retransmission.

RSA
An internet encryption and authentication system that
uses an algorithm developed in 1977 by Ron Rivest,
Adi Shamir, and Leonard Adleman. The RSA
algorithm is the most commonly used encryption and
authentication algorithm and is included as part of the
Web browser from Netscape and Microsoft.

S
Secret Key Cryptography
An encryption method which uses the same Key to
encrypt and decrypt a message. The sender and
recipient must share the key.
Secure Electronic Transaction Protocol
A protocol developed jointly by Visa and MasterCard
that allow secure credit card transactions over open
networks, specifically the Internet.
Secure Sockets Layer
Short for Secure Sockets Layer, a protocol developed
by Netscape for transmitting private documents via the
Internet. SSL works by using a public key to encrypt
data that's transferred over the SSL connection. Both
Netscape Navigator and Internet Explorer support
SSL, and many Web sites use the protocol to obtain
confidential user information, such as credit card
numbers. By convention, URLs that require an SSL
connection start with https: instead of http:.
Serializer Service
The set of application tasks that execute within the
context of a single thread of execution to serialize the
access of shared application resources by other
application threads. The Serializer Service is started
automatically at application startup and is required by
all Commerce Suite Server Roles. Serialized resources
include shared memory areas, directories, and the
database.

210

Glossary, continued

Service
A discrete set of Commerce Suite Server application
tasks that provide a logical service to the Agent. The
Services supported by Commerce Suite Server are:
Serializer, Outbound, Inbound, Control, PKI, WorkOrder, User Interface, Out-Beacon, and In-Beacon.
Sets of concurrently executing Services are combined
to define Commerce Suite Server Roles.
SET
See Secure Electronic Transaction Protocol.
SHA-1
Specifies the Secure Hash Algorithm used to verify a
files integrity. The SHA-1 generates a condensed
representation of a message called a message digest.
The SHA-1 is used by both the transmitter and
intended receiver of a message in computing and
verifying a digital signature.
Signature
See Digital Signature.
Sockets
Sockets are a method for communication between a
client program and a server program in a network. A
socket is defined as the endpoint in a connection.
Sockets are created and used with a set of
programming request (function calls) sometimes
called the sockets API. The most common sockets API
is the Berkeley UNIC C interface for sockets. Sockets
can also be used for communication between processes
within the same computer.
S/MIME
Secure MIME - S/MIME (Secure/Multipurpose
Internet Mail Extensions) provides a consistent way to
send and receive secure MIME data. Based on the
popular Internet MIME standard, S/MIME provides
the following cryptographic security services for
electronic messaging applications: authentication,

message integrity and non-repudiation of origin (using


digital signatures) and privacy and data security (using
encryption).
SMTP
Simple Mail Transport Protocol. An Internet standard
for transporting email.
SNMP
See Simple Network Management Protocol.
Simple Network Management Protocol
A set of protocols for managing complex networks.
The first versions of SNMP were developed in the
early 80s. SNMP works by sending messages, called
protocol data units (PDUs), to different parts of a
network. SNMP-compliant devices, called agents,
store data about themselves in Management
Information Bases (MIBs) and return this data to the
SNMP requesters.
SSL
See Secure Sockets Layer.
Strong Encryption
A term given to describe a cryptosystem that uses a key
of sufficient length that it becomes effectively
impossible to break the cypher within a meaningful
time frame.
Subscriber
An entity which receives a certificate from a CA.
Supply Chain Management
The process of optimizing a companys internal
practices, as well as the companys interaction with
suppliers and customers, in order to bring products to
market more efficiently. A company that performs
these functions most effectively is in a position to
deliver products more quickly, and at a lower cost or
higher profit margin, than its competitors.

211

Glossary, continued

Symmetric Encryption
A type of encryption where the same key is used to
encrypt and decrypt the message. This differs from
asymmetric (or public-key) encryption, which uses one
key to encrypt a message and another to decrypt the
message.

T
TCP/IP
Transmission Control Protocol/Internet Protocol or the
suite of standard protocols that enable computers to
inter-communicate on the Internet. TCP/IP uses
several protocols, the two main ones being TCP and IP.
TCP/IP is built into the UNIX operating system and is
used by the Internet, making it the de facto standard for
transmitting data over networks. Even network
operating systems that have their own protocols, such
as NetWare, also support TCP/IP.
Thread
A logical sequence or program instructions that are
executed independently.
Transport Agent
An instance of the Commerce Suite Server application
configured to provide transport services including the
compression, encryption and delivery of data, the
verification of digital signatures and the construction
and transmission of Delivery Notifications.
Triple Data Encryption Standard
Triple Data Encryption Standard (DES3) is a
derivative of Data Encryption Standard (DES) that has
served as the cornerstone of data encryption for almost
40 years. DES-3 is DES run three times with three
different keys. It uses a 192-bit key and has an effective
strength of 112-bits.

U
UCC
Uniform Code Council, Inc.
UDP
User Datagram Protocol. A simple, datagram-oriented,
transport layer protocol, used by Commerce Suite
Server to facilitate dynamic pools of Transport Agents
marshaled by a Router Agent. The Transport Agents
use UDP as the underlying protocol to transmit small
informative packets of data identifying their inbound
protocol ports.
Uniform Resource Locator
The global address used for locating resources on the
web.
URL
See Uniform Resource Locator.
User-Interface Service
The set of application tasks that execute within the
context of a single thread of execution to return
HTML-formatted application-status information to a
web-browser. The User-Interface Service is not
required by any Commerce Suite Server Role.
However, any Commerce Suite Server Agent can
enable the User-Interface Service so that its current
status can be remotely viewed via a Web-browser.

V
Virtual Private Network (VPN)
A controlled, trusted network structure that
incorporates end-to-end encryption, enabling a secure
connection from any linked machine to any other.

212

Glossary, continued

W
Work-Order
A set of one or more Console Commands sent to a
Commerce Suite Server Agent to accomplish one or
more specific tasks. The typical use of a Work-Order is
to initiate an outbound delivery of data (a send).
Work-Order Service
The set of application tasks that execute within the
context of a single thread of execution to query the
database or a directory for Work Orders.

X
XML
See eXtensible Markup Language.
X.509V3
X.509 Public Key Certificate and CRL Profile, Version
3, defined in CERT. The version of X.509 Public Key
Certificate supported by Commerce Suite Server. A
standard format for public key certificates and
Certificate Revocation Lists (CRL). X.509 is a
standard for security services within the X.500
directory services framework.

213

115 Perimeter Center Place Suite 1100 Atlanta, Georgia 30346


800.251.4930 toll free 770.730.3600 main 770.730.3784 fax
info@nubridges.com www.nubridges.com

For technical support, call (866) 830-3600 or email support@nubridges.com.

Das könnte Ihnen auch gefallen