Friday, December 26, 2014

End-to-end Integration with IBM Sterling B2B Integration and Managed File Transfer Solutions

IBM Sterling B2B Integrator V5.2.3:

A transaction engine and toolkit that allows the user to define, create, implement, and
manage process flows. These flows, in turn, allow for the processing, routing, translation,
and storage of high volumes of inbound and outbound messages or files, and can also
interact and integrate with both internal systems and external business partners. For more
information, including the details of the supported protocols, see “Sterling B2B Integrator”
on page 21. You can also see the IBM Sterling B2B Integrator 5.2 Information Center at:

http://publib.boulder.ibm.com/infocenter/sb2bi/v5r2/index.jsp

 IBM Sterling File Gateway V2.2.3:

An application that integrates with, and extends, the ability of IBM Sterling B2B Integrator
to accept, manage, route, and process files from external partners, using multiple different
protocols and formats. It can simplify the management of external partners and
communities and can also assist in seamless integration of internal and external systems.
For more information, see “IBM Sterling File Gateway” on page 58. Another source of
information is IBM Sterling File Gateway 2.0 Information Center which can be found at:

http://publib.boulder.ibm.com/infocenter/sfg/v2r0/index.jsp

IBM Sterling Connect:Direct® V4.6:

A peer-to-peer file-based integration middleware which provides secure delivery of
high-volume data within and between enterprises. It is optimized for high performance file
transfer of any type of data (text, EDI, binary, digital content, image) across multiple
platforms, several file systems, and many different media. A large number of industries
throughout the world use it to move large volumes of data and for connecting to remote
offices. For more information, see “IBM Sterling Connect:Direct” on page 62 or IBM
Sterling Connect:Direct Product Overview manual at:

http://www.sterlingcommerce.com/documentation/home/MFT/ConnectDirect/Common/CDO
verview.pdf

 IBM Sterling Secure Proxy V3.4:

An application proxy between IBM Connect:Direct nodes or between a client application
and an IBM Sterling B2B Integrator server. It provides a high level of data protection
between external connections and your internal network. It defines an inbound node
definition for each trading partner connection from outside the company and an outbound
node definition for every company server to which SSP will connect. It supports the
following protocols: C:D, PEsit, FTP, SFTP (SSH-FTP), FTPS (FTP over SSL/TLS), HTTP,
HTTPS. For more information, see “Sterling Secure Proxy” on page 24, or see the
following link:

http://publib.boulder.ibm.com/infocenter/ssp/v3r4/index.jsp


 IBM Sterling Control Center V5.3:

Provides centralized management, monitoring, and notification for IBM Sterling products.
For more information, see “IBM Sterling Control Center” on page 67. You can also see the
following link:
http://publib.boulder.ibm.com/infocenter/sb2bi/v5r2/nav/6_5


 IBM WebSphere MQ V7.0.1:

Messaging backbone that provides powerful and reliable connectivity and assured delivery
of messages throughout the enterprise. For more information, see “WebSphere MQ” on
page 30, or see:
http://publib.boulder.ibm.com/infocenter/wmqv7/v7r0/index.jsp

IBM WebSphere Message Broker V8.0:

High volume integration hub that delivers advanced enterprise service bus capabilities on
the WebSphere MQ backbone. For more information, see “WebSphere Message Broker”
on page 74, or see:
http://publib.boulder.ibm.com/infocenter/wmbhelp/v8r0m0/index.jsp

IBM WebSphere Transformation Extender Design Studio V8.4:

Used to develop the maps used to translate and transform data to the desired formats. For
more information, see “WebSphere Transformation Extender Design Studio” on page 81,
or see:
http://publib.boulder.ibm.com/infocenter/wtxdoc/v8r4m0/index.jsp

IBM WebSphere Transformation Extender for Integration Servers V8.4:

Allows execution of maps on a variety of hardware platforms by many software products.
For more information, see “WebSphere Transformation Extender for Integration Servers”
on page 87, or see:
http://publib.boulder.ibm.com/infocenter/wtxdoc/v8r4m0/index.jsp

IBM WebSphere Transformation Extender Industry Packs:

Prebuilt industry specific artifacts providing out of the box functionality and used to
accelerate map development. The packs used in the book scenarios are:
– EDI pack V2.8.0
– Healthcare pack V4.4.0
For more information, see “WebSphere Transformation Extender Industry Packs” on
page 87, or see:
http://publib.boulder.ibm.com/infocenter/wtxdoc/v8r4m0/index.jsp

 IBM WebSphere DataPower® B2B Appliance XB62 v4.0.2.1:

The XB62 is a B2B enabled security gateway that makes the services of one organization
available to others in a controlled and secured manner providing capabilities such as
connection security, B2B Messaging, non-repudiation and partner profile management.
Additionally, it utilizes the integration services needed to make it easy to integrate to
internal systems or directly to applications. These services built on-top of the DataPower
appliance form factor adds integrated network functions decreasing the complexity and
deployment footprint of the solution. For more information, see “WebSphere DataPower
XB62 appliance” on page 25, or see:
http://publib.boulder.ibm.com/infocenter/ieduasst/v1r1m0/index.jsp?topic=/com.i
bm.iea.wdatapower/wdatapower/1.0/xb62.html

 IBM Sterling File Transfer Service:

Allows customers to manage a single, secure, and reliable connection to reach their
business partners without the capital expense associated with on-premise software or the
operational impact on IT staff. For more information, see “IBM Sterling File Transfer
Service” on page 65, or see:
http://publib.boulder.ibm.com/infocenter/sb2bsvcs/v1r0/nav/13

IBM Sterling B2B Collaboration Network:

Acts as the communications link between customers and their business partners, and
offers a growing list of on-demand application services. For more information, see “IBM
Sterling B2B Collaboration Network” on page 66, or see:
http://publib.boulder.ibm.com/infocenter/sb2bsvcs/v1r0/nav/0

IBM Sterling Web Forms:

A customizable website operated by IBM that helps customers to integrate smaller trading
partners who do not have EDI capabilities. For more information, see “IBM Sterling Web
Forms” on page 67, or see:
http://publib.boulder.ibm.com/infocenter/sb2bsvcs/v1r0/nav/9
1.



Wednesday, November 26, 2014

BOTS Open Source EDI

BOTS Open Source EDI Software is a low cost, full-featured solution for Electronic Data Interchange and the transmission of EDI documents across Trading Partners. Available under an open source license, BOTS open source EDI software makes Electronic Data Interchange is both possible and affordable even for small businesses.

BOTS is an "any-to-any" file translator. It can receive EDI documents inbound and convert that to a customer-defined text file (CSV, XML, etc.) that can easily be imported into vitually any business system. At the same time, it can ingest any text file generated by a company's business system and export it to a defined EDI format for outbound transmission. Because BOTS is open source, there is NO cost of software acquisition, NO annual licensing fees, and BOTS supports numerous Internet communication protocols including FTP, XML-RC, SMTP, ODBC, and more; so, unless required by a trading partner, the costs of using a VAN for document transmissions can also be eliminated. 

Functional details

BOTS is a highly stable EDI platform with superior performance that can easily handle large documents and numbers of transmissions making BOTS highly scalable from small organizations doing only a few transactions per day, to larger enterprises sending tens of thousands of EDI transactions. BOTS may be started manually, put on a scheduler, or initiated by another business application and can be configured to send email notifications in the event of errors, and/or archive copies of incoming and outgoing messages.

+ Competitive advantage

Because BOTS is available under an open source license, all costs of licensing and software acquisition are eliminated, regardless of the number of servers or users. Additionally, the user is free to modify and distribute the source code allowing new function to be easily added while eliminating proprietary "vendor lock-in". BOTS is web-based and platform independent and supports all major EDI standards including Edifact, X12, XML, SAP IDoc, Tradacoms & More. It provides a "BOTS Monitor" GUI interface that can be accessed from any authorized workstation on the company network. Further adding to the power of BOTS, it's mappings are written in a much more concise and easy to understand format than traditional EDI systems making them easily editable by end users.


+ Industries

Aerospace & Defense Industry
Automotive Industry
Banking Industry
Chemicals & Petroleum Industry
Computer Services Industry
Consumer Products Industry
Education Industry
Electronics Industry
Energy & Utilities Industry
Financial Markets Industry
Government Central/Federal industry
Government, State/Provincial/Local Industry
Healthcare Industry
Industrial Products Industry
Insurance Industry
Life Sciences Industry
Media & Entertainment Industry
Professional Services Industry
Retail Industry
Telecommunications Industry
Travel & Transportation Industry
Wholesale Distribution & Services Industry

Solution areas 

Financial Services/Banking
   Enterprise Payment Platform (Back Office/Payments)
Government
   Finance and Administration
Insurance
   Other
Retail
   Logistics
Wholesale Distribution
   Business management systems
Cross industry
   Business Intelligence
      Other
   Business Process Management and Integration
      Inventory/Warehouse and Shipping Mgmt
      Other
   Document Management
      Other
   e-Business/e-Commerce
      Billing Systems
      Infrastructure Systems and Management
      Internet Selling: Business to Business
      Payments
   Enterprise Resource Planning (a.k.a. Enterprise Application Systems (EAS)
      Business to Business Extensions
      Supply Chain Management Extensions
   Supply Chain Management
      Business -to- Business Buy Side
      Business -to- Business Sell Side
      Supply Chain Execution
      Trader partner collaboration

Customer size
 
Very Small Business (Less than 50 employees)
Small Business (50 to 99 employees)
Midmarket Business (100 to 499 employees)
Midmarket Business (500 to 1000 employees)
Large Business (greater than 1000 employees)


+ Languages supported

English


NOTE : POC for one retail customer is in progress..... I will update those details once suceesfully implemented...

Monday, October 27, 2014

EDI implementation between Amazon - Restaurantware

Project Description :

I had recently worked for one project called Amazon - Restaurantware EDI integration. As per client requirement, we need to implement EDI integration using free open source tools. Already customer purchased Amazon EC2 Linux instance for this implementation. We need to exchange EDI transactions i.e 850,855,856,810 etc. with their Amazon customer. For this implementation they have suggested to use AS2secure open source AS2 communication software for exchanging files with customer which is completely implemented in PHP. and for translation purpose they had asked me to develop PHP code to translate these standard documents into database.

Environment  :

  • Amazon EC2 Linux Instance
  • PHP
  • AS2secure

Information About Tools :

Amazon EC2 Linux Instance

Amazon Elastic Compute Cloud (Amazon EC2) by launching, connecting to, and using a Linux instance. We'll use the AWS Management Console, a point-and-click web-based interface, to launch and connect to a Linux instance.

For your reference you can check it at below link

http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/EC2_GetStarted.html

PHP :

PHP is a popular general-purpose scripting language that is especially suited to web development.
Fast, flexible and pragmatic, PHP powers everything from your blog to the most popular websites in the world
For your reference you can check it at below link

http://php.net/docs.php

AS2secure :

Before talking about AS2secure, first we need to talk about reliable AS2 communication protocol

AS2 Protocol

AS2 helps users connect, deliver, validate and reply to data that trading partners move securely through the Internet. This protocol thereby establishes a standard point-to-point connection in B2B (Business to Business) document transactions. Stated another way, AS2 provides the means by which vendor applications communicate EDI (Electronic Data Interchange) documents, or other data such as XML, over the Internet using HTTP (Hyper Text Transfer Protocol). Further, AS2 defines a security system that wraps the data in an envelope with a digital certificate.


This AS2secure is open source software which we can use it for AS2 communication implementation without purchasing any license. This will run on only Linux instance.The AS2Secure Project allows you to send AS2 (for Applicability Statement 2) messages using SMIME encryption format.Based on OpenSSL Lib, your can sign and/or encrypt files to send them over unsecured protocol such as HTTP with the security of HTTPS.

Note : This tool doesn't have support from software providers. We need to install and use it on our own risk.

For your reference you can check it at below link

http://www.as2secure.com/


To Be Continued ......














Friday, July 18, 2014

Overview of Sterling Connect Direct Server


What is IBM Sterling Connect:Direct?

IBM® Sterling Connect:Direct® is point-to-point (peer-to-peer) file-based integration middleware meant for 24x365 unattended operation, which provides assured delivery, high-volume, and secure data exchange within and between enterprises. It is optimized for high performance and throughput and moves files containing any type of data (text, EDI, binary, digital content, image) across multiple platforms, disparate file systems, and disparate media. It is used by many industries throughout the world to move large volumes of data and for connecting to remote offices.

Benefits

Sterling Connect:Direct offers the following benefits:
  • Predictability—Assures delivery via automated scheduling, checkpoint restart, and automatic recovery/retry. If a data transmission is interrupted, the transmission tries to restart at a predefined interval for a configured amount of time. All activity and statistics are logged so that there are verifiable audit trails of all actions.
  • Security—Ensures customer information stays private through a proprietary protocol and offers basic security through authentication and user proxies. Supports a comprehensive cryptographic solution (IBM Sterling Connect:Direct Secure Plus) that provides strong mutual authentication using X.509 certificates, SSL, and TLS data encryption, and data integrity checking. For more information about Sterling Connect:Direct Secure Plus and other products that enhance Sterling Connect:Direct's security model, see Extending the Capabilities of Sterling Connect:Direct.
  • Performance—Handles the most demanding loads, from high volumes of small files to terabyte files.

Features

Sterling Connect:Direct offers the following features:
  • Provides automation through easy-to-use Process definition and scripting. Multi-step Processes manage data movement as well as pre- and post-processing.
  • Provides automation through scripting, scheduling, and watch directories.
  • Automatically establishes connection to remote server when data is ready for transfer. Automatic session retry re-establishes an interrupted connection; work resumes at the point of failure.
  • Offers flexible security options to control access to data, network, or system resources. Interfaces to operating system and vendor-supplied access control and security software.
  • Supports a comprehensive cryptographic solution (Sterling Connect:Direct Secure Plus).
  • Supports local and remote administration, configuration, and Process management through a browser user interface.
  • Supports non-intrusive integration to existing applications through the Command Line Interface (CLI), which can be used in batch files or scripts. Also supports direct use by applications through APIs.
  • Provides a complete audit trail of data movement through extensive statistics logs.
  • Supports extensive configuration options for flexibility of deployment, management of network resources and optimization of data transfer performance.
  • Provides optional data compression that is configurable for maximum compression or optimal use of system resources.
  • Supports all major file types, media, and record formats across multiple platforms. Data exchange is independent of content.

Platforms

Typically, Sterling Connect:Direct is installed on a mainframe, UNIX, or Microsoft Windows server at a central processing site and is used to communicate with other Sterling Connect:Direct sites in the business's network. Sterling Connect:Direct offers multi-platform implementations tailored to each of the following operating systems:
  • z/OS®
  • UNIX (Sun, HP UX, AIX®, Linux)
  • Microsoft Windows
  • OpenVMS
  • HP NonStop (Tandem)
  • VM
  • VSE
  • i5/OS™ (OS/400®)

Overview of Sterling Secure Proxy

IBM® Sterling Secure Proxy acts as an application proxy between IBM Sterling
Connect:Direct® nodes or between a client application and a Sterling B2B Integrator
server. Sterling Secure Proxy provides a high level of data protection between
external connections and your internal network. Define an inbound node definition
for each trading partner connection from outside the company and an outbound
node definition for every company server to which Sterling Secure Proxy will
connect.

Protect file transfers from the public Internet.The Internet remains risky for file transfer
IBM Sterling Secure Proxy is a demilitarized zone (DMZ)-based application proxy that protects your file transfers from the public Internet.
IBM® Sterling Secure Proxy provides a demilitarized zone (DMZ)-based application proxy that shields file transfers from the public Internet. It uses trading-partner authorization, multifactor authentication, session breaks and other controls for validation before transfers enter your trusted zone.
IBM Sterling Secure Proxy features include:
  • Protections against unauthorized access with Secure Sockets Layer (SSL) session breaks and multifactor authentication.to help reduce data vulnerability and protect your brand.
  • Reduced file transfer costs that can help increase your file transfer community by taking advantage of the Internet.
  • Increased perimeter security for your file transfer infrastructure using time-tested firewall navigation practices.
  • Simplified authentication with self-service authentication customization for trading partners to help reduce dependency on your IT staff.

Sterling Secure Proxy Architecture

The components of the Sterling Secure Proxy architecture are:
  • Sterling Secure Proxy Engine—the engine resides in the DMZ and contains the minimum components necessary to manage communications sessions. The engine configuration (Sterling Secure Proxy engine properties) is created at Configuration Manager and pushed to the engine. It is stored in active memory and is never stored on disk in the DMZ. No web services or UI ports are open in the DMZ.
  • Configuration Manager (Sterling Secure Proxy CM)—Configuration Manager is installed in the trusted zone. Use this tool to configure your environment. When you save a configuration definition (Sterling Secure Proxy configuration store) at CM, it is pushed to an engine, using an SSL session. Configuration files are encrypted and stored on the computer where CM is installed.
    Note: Only one Configuration Manager should update an engine definition.
  • Sterling Secure Proxy configuration store—This file is encrypted on disk and contains the following information:
    • The user store with information on user credentials
    • The system certificate store with the certificates used for SSL/TLS sessions
    • The key store with the SSH keys
    • The engine configuration store with all configuration information for the engine
  • Sterling Secure Proxy engine properties file—These files are encrypted and contain the following information:
    • The IP and port number to listen on for connections from Configuration Manager
    • SSL key certificate, trusted certificate, and encryption cipher used for the connection from Configuration Manager
  • Web server—Configuration Manager is installed with a web server. You open a browser and access CM through a web page to configure Sterling Secure Proxy and monitor the engine activity. The web server is installed when you install Configuration Manager.
  • Adapter—an adapter identifies the protocol allowed for connections from trading partners. You can accept connections from clients that use different protocols; however, you must define a different adapter for each protocol. A single engine can run multiple adapters. In an adapter definition, you identify the port on which to listen for connections, the netmap to use with the adapter, the security policy, and the routing method to use. If you are using Sterling External Authentication Server, you identify the Sterling External Authentication Server to use in the adapter definition. If you are using a remote perimeter server, you identify the perimeter server to use in the adapter definition.
  • Netmap—define a netmap to identify the trading partners authorized to communicate through Sterling Secure Proxy and the company servers where connections are made.
    • For a Sterling Connect:Direct® netmap, create a node definition for all Sterling Connect:Direct nodes that will communicate through Sterling Secure Proxy. The node definition identifies the IP address and port to be used by the node and the policy to associate with the node. If SSL or TLS security is required for the connection, configure the protocol options in the node definition. You can also enable node-level logging in the node definition.
    • For HTTP and FTP netmaps, define an inbound node definition for trading partner connections from outside the company. The inbound node definition identifies the IP address or address pattern to allow for the connection and the policy to associate with the node. If SSL or TLS security is required, configure the protocol options in the node definition. You can also enable node-level logging in the inbound node definition.
    • For HTTP and FTP netmaps, define an outbound node for every company server to which Sterling Secure Proxy will connect. An outbound node definition identifies the address and port used to connect to the company server and enables SSL or TLS if this is required. You can also enable node-level logging and failover support in the outbound node definition.
    • For SFTP netmaps, define an inbound node definition for trading partner connections from outside the company. The inbound node definition identifies the IP address or address pattern to allow for the connection and the policy to associate with the node.You can also enable node-level logging in the inbound node definition.
    • For SFTP netmaps, define an outbound node for every company server to which Sterling Secure Proxy will connect. An outbound node definition identifies the address and port used to connect to the company server, the known host key that is used to authenticate the company server toSterling Secure Proxy, and the cipher suites and MACs used to secure the connection. You can also enable node-level logging and failover support in the outbound node definition.
  • Policy—define a policy to identify the security features to implement for an inbound node definition or a Sterling Connect:Direct node definition.
    • In all protocol policies, you can enable the capability to authenticate the inbound connection and identify what user ID and password to use to connect to the secure company server.
    • For FTP, HTTP, and Sterling Connect:Direct policies, you can enable the capability to authenticate certificate information using Sterling External Authentication Server,
    • In an HTTP policy, you can enable the capability to block commonly occurring HTTP exploits.
    • In a Sterling Connect:Direct policy, you can enable the capability to send a warning message or stop a session if a protocol error occurs, as well as prevent a Sterling Connect:Direct node from performing a runtask, runjob, copystep, or submit step function.
    • In an SFTP policy, you identify the method required to authenticate the inbound connection. Authentication methods supported are key, password, password or key, and password and key.
  • Sterling External Authentication Server—a separately installed feature of Sterling Secure ProxySterling External Authentication Server allows you to validate digital certificates passed by the client or trading partner during SSL/TLS session requests. You can also validate certificates against one or more certificate revocation lists (CRLs), and validate certificates based on a valid date range. See the Sterling Secure Proxy documentation library for more information.
    Sterling External Authentication Server can be configured to validate certificates and authenticate users. The functions performed by Sterling External Authentication Server are defined in an Sterling External Authentication Server definition. Sterling External Authentication Server performs one or more of the following functions:
    • Certificate Validation
    • Certificate Revocation List (CRL)—certificate revocation checking using a certificate revocation list (CRL)
    • Multi-factor Authentication
    • Certificate Policy Enforcement
    • LDAP Authentication
    • User ID mapping—remote trading partners can be given IDs and passwords that do not provide access to internal systems. The ID and password presented by the trading partner is mapped to an ID and password that can then access the internal system
    • Tivoli Access Manager Authentication
    • Generic Authentication
    Before you can use Sterling External Authentication Server with Sterling Secure Proxy, you must configure Sterling External Authentication Serverdefinitions in Sterling Secure Proxy. Then, when configuring policies and protocol adapters, you select these server definitions. You can also select security features available in Sterling External Authentication Server such as certificate authentication, user authentication, and user mapping. Refer to the Sterling External Authentication Server documentation library for more information.




Overview on Sterling File Gateway application

About IBM Sterling File Gateway


Sterling File Gateway is an application for transferring files between partners by using different protocols, conventions for naming files, and file formats.
Sterling File Gateway uses the Sterling B2B foundation, which includes IBM® Sterling B2B Integrator, Sterling Standards, and the Sterling platform. The capabilities that are delivered are similar to the features found in Advanced File Transfer and IBM Sterling Connect:Enterprise® for UNIX, plus new functionality.
Use Sterling File Gateway for movement of large and high-volume file transfers, with end-to-end visibility of file movement in a process-oriented and highly-scalable framework. This framework alleviates file transfer challenges, such as protocol and file brokering, automation, and data security.
Sterling File Gateway supports integration with:
  • Sterling B2B Integrator Mailbox
  • IBM Sterling Control Center
  • IBM Sterling Secure Proxy
  • IBM Sterling Connect:Direct® for UNIX server products
  • Sterling Connect:Direct
Sterling File Gateway, which is delivered on the Sterling B2B Integrator platform with a unique application URL, provides single sign-on access to the Sterling B2B Integrator administrative console through menu selection.

Features

Sterling File Gateway provides many features:
  • File/File name Transformations – Mapping of input to output file names; system-wide, group, and partner-specific policies; common file processing tasks such as compression/decompression, PGP encryption/decryption, and signing.
  • File Transfer Visibility – Events are recorded for monitoring and reporting; detailed tracking for input-output file structure processing and dynamic route determination; ability to view and filter Sterling File Gateway data flows for all users.
  • Replay/Redeliver – One click replay/redeliver capability that allows users to reprocess a transmission from the beginning or to resend just the processed file to a specific delivery destination.
  • Notifications – Partners and operators can subscribe to be notified about events by email.
  • Predefined business processes – Define common behaviors in file-transfer scenarios, reducing the need for customization.
  • Extensibility – Custom event codes, protocols, facts, and consumer identification policies can be added to support unique scenarios.
  • Broad Communications Protocol Support – FTP, FTP/S, SSH/SFTP, SSH/SCP, and Sterling Connect:Direct® are supported upon installation, and additional protocols (such as AS2, AS3, or Odette FTP) may be configured through use of the extensibility feature.
  • Partner Interface (myFileGateway) – Web browser-based interface that enables partners to upload/download files, subscribe to notifications of events, manage passwords, search and view file transfer activity, and generate reports about file transfer activity.
  • Flexible Mailbox Structures – Ability to specify mailbox structures that leverage pattern matching policies and specify attributes that must be true of all partners or a subset of partners
  • Dynamic Routing – Consumer derived at run-time, either through mailbox structure, file name, business process-derived consumer name, or map-derived consumer name.
  • Partner Onboarding – Easy-to-use graphical user interface to onboard partners and configure the various combinations of communication protocols to enable Sterling File Gateway operations.

How Sterling B2B Integrator and Sterling File Gateway work together

Sterling File Gateway utilizes the Sterling B2B foundation, which includes Sterling B2B Integrator, Sterling Standards, and the Sterling platform, to deliver capabilities similar to those found in Sterling Advanced File Transfer and Sterling Connect:Enterprise® for UNIX, while adding new features and functionality.
Within Sterling File GatewaySterling B2B Integrator is known as the B2B Console, and is accessed from the Tools menu. Administrative functions such as creating and managing user accounts, permission groups, and security keys for Sterling File Gateway are handled in Sterling B2B Integrator.
Sterling File Gateway utilizes the communication adapters of Sterling B2B Integrator, which include the following:
  • FTP Server adapter
  • FTP Client adapter
  • SFTP Server adapter
  • SFTP Client adapter
  • HTTP Server adapter
  • HTTP Client adapter
  • Connect:Direct Server adapter
  • Command Line adapter 2 (for PGP)
To install Sterling File Gateway, you must first install Sterling B2B Integrator. After you install Sterling File Gateway on an instance of Sterling B2B Integrator, when you install upgrades or new builds of Sterling B2B IntegratorSterling File Gateway upgrades and builds are automatically installed as part of the installation script.

How Sterling Secure Proxy and Sterling File Gateway work together

Sterling Secure Proxy can be used as a proxy with Sterling File Gateway and other HTTP applications and supports a single sign-on connection. Single sign-on (SSO) provides access control that allows a user to log in once to Sterling Secure Proxy, using the HTTP protocol, and then gain access to Sterling File Gateway without logging in again. SSO bypasses normal user authentication in Sterling File Gateway and trusts that Sterling Secure Proxy has authenticated the user.
After you set up the basic single sign-on configuration, trading partners can communicate in a secure environment that provides authentication. The trading partner first connects to Sterling Secure Proxy which then connects to Sterling File Gateway on behalf of the trading partner.
Following is an illustration of the flow of data:
The Trading Partner browser client (HTTP) in the internet zone communicates (sending and receiving information) with Sterling Secure Proxy in a DMZ. Sterling Secure Proxy forwards the communication to Sterling File Gateway in the trusted zone. Sterling File Gateway sends the trading partner credentials to a Sterling External Authentication Server to validate against the LDAP database. The result of the database query is passed back to Sterling File Gateway. Sterling File Gateway returns the database query results to Sterling Secure Proxy, which forwards or rejects the message based on the database query results. Sterling Secure Proxy can also exchange authentication requests directly with Sterling External Authentication Server.

Monday, July 14, 2014

New B2B Integration Tools

Simply put B2B Integration means the integration, automation and optimization of key business processes that extend outside the four walls of a companies organisation.

For example receiving purchase orders from your customers electronically, you can process order information faster and more accurately. Processing these orders in real time allows companies to be more responsive to their customers, improve customer service and increase sales. Similarly, by connecting to external suppliers electronically, companies can achieve real time views into the visibility of global shipments, automating the warehouse or distribution centres and optimising inventory or stock control – ultimately increasing working capital and lowering costs

B2B Integration began with large companies mandating methods of receiving business information technology. It evolved through the widespread adoption of Electronic Data Interchange (EDI) and in recent years has benefited from technology innovations e.g. the advent of the Internet, XML, web services and SOA, Business Process Management and SaaS. These innovations have led to increased benefits being made available to companies of every size. As we explore in this Microsite there are a number of ways to implement B2B Integration solutions.

In this area, I found new B2B tool called Adeptia EDI Accelerator 

ABOUT EDI ACCELERATOR 
If two business entities need to exchange EDI data, they can seamlessly do it using the EDI Accelerator. These 
entities are referred to as Trading Partners of each other. 
The EDI Accelerator enables you to configure new trading partners quickly via an easy-to-use interface. By using 
this interface, you can setup inbound and outbound relationships with each trading partner to quickly respond to 
different EDI messages. For each trading partner, you can setup number of translation rules to process different 
incoming EDI messages along with the ability to create outbound EDI messages. 
When EDI Accelerator receives data from one trading partner, you need to create an inbound relationship, 
wherein, it receives data from that trading partner and then processes it. In order to send data to the other trading 
partner, you need to create an outbound relationship, wherein, it receives data stored in the file system, processes 
it into a format compatible to the other trading partner and then sends it to that trading partner. 


ARCHITECTURE OF EDI ACCELERATOR 

The architecture of EDI Accelerator is as follows see Figure 1. 

Figure 1: EDI Accelerator Architecture


















The EDI Accelerator supports direct exchange of data using File and FTP protocols. In a case, where the trading partner is using a protocol other than File or FTP, third-party software, namely VL Trader Host is used. This host will receive the data from the partner’s protocol and send it to EDI Accelerator on a local file system or FTP location. For inbound processing, VLTrader receives the data from any trading partner and download it into its configured mailbox. 

The EDI Accelerator picks the data file from the inbox folder of VL Trader mailbox and starts its inbound processing. It splits the file into transaction sets and inserts them into the EDI database. It now processes each transaction set one by one. Once this EDI translation is done, the translated data is placed in the File System. This data can now be sent to the back-end application using a process flow. Refer to inbound flow in Figure 1. 

For outbound processing, EDI Accelerator picks the data from the File System (sent by the backend application using a process flow) and starts its outbound processing. It translates the data and splits it into different records, based on the Application ID (used to identify the Trading Partner for the specific data). Once it translates the outbound data, it puts it in the Outbound Queue. Transactions in this queue are processed when a batch schedule is run. Then, the EDI Accelerator picks these transactions, creates GS and ISA Envelopes for them, and sends them to Partner using File or FTP protocol of Adeptia Suite. If VLTrader Host is being used, then they are sent to the outbox folder in VLTrader mailbox, from where they are sent to Partner. 



Friday, July 11, 2014

Web Service - Sterling Integrator POC


In French (not in English) Youtube video presentation


https://www.youtube.com/watch?v=Ms0VltPCbgA


Gentran Server vs. Gentran Integration Suite (GIS)

An interesting take on (Sterling Commerce’s, now IBM’s) Gentran Server vs. Gentran Integration Suite from a posting to the public “EDI Professionals” group by “Jeff” on LinkedIn.
“Gentran Server and Gentran Integration Suite are radically different animals. Gentran Server does simple translation and storage of data, that’s it. If you understand mapping and basic coding: “IF” statements, functions and such, the learning curve is pretty quick. Trading partner setup is in a basic tree format with copy function to set up new vendors from existing. If you copy the ISA level, all GS and ST come across with it. pretty slick.
“GIS is another story. The learning curve is steep. It does the same functions as Gentran Server but not as cleanly. It can accomplish almost anything you want it to using business processes linking file system adapters FTPs, maps, custom Java programs and other functions together any way you need them. It is very object based with each envelope business process etc being it’s own little component that you link to others. This makes the Trading partner setup very cumbersome since you cannot see what each is linked to unless you open each component. Unless you are careful about your naming conventions your searches may not bring up all the components you are looking for in one search and or may present them in an illogical order. The system shows the names alphabetically or numerical order rather than ISA, GS , ST order. This also goes for BPs, adapters etc.
“In describing the system I tell people that sometimes searching for data is like finding one particular string in the middle of a giant yarn ball. Other users have laughed saying that is pretty accurate. All data search correlations (PO number, invoice number) are set up custom in the maps, they are not canned. If you don’t set it up, you can’t search on it. On the other hand Gentran Server does not have this capability. A well set up series of correlations makes the system quite efficient. The EDI correlations: IDs and control numbers are factory set though.
“However once you understand it, it can do anything. From basic EDI processing, running accounting programs, reports, etc. If you are familiar with robotics and can control them with Java you can have the system wash your car if you want. Just link the control program into your BP and your good to go.
“One big difference between Gentran Server and GIS is that GIS has built in AS2. Server needs an external package.”

difference between sterling integrator and gentran Integration suite

Security

    Identity management, including authorization and authentication
    Perimeter security at DMZ traversal
    Role-based data access and system operation
    Secured mailboxing repository
    Data transport security (SSL, SFTP/SSH) and data encryption (S/MIME and PGP) support
    Non-repudiation using the AS2 or AS3 protocol
    Digital signature support
    Message- and transport-level security based on WS-Security 1.0 compliance, including WS-I Basic Profile 1.1 and Basic Security Profile 1.0

Communication
    B2B communication protocols: Web services (SOAP), S/FTP/S client and server, HTTP and HTTP/S, SMTP, AS1, AS2, AS3 and RosettaNet, WebDAV, Zengin TCP/IP, IBM® Sterling Connect:Direct®
    Policy-based file transfer
    Multi-gigabyte file handling
    IPv6 compatible

Business process management


    Graphical process modeling tool
    Business process execution engine
    Process abstraction (layered modeling and component reuse)

Integration and transformation

    Multi-purpose data transformation engine
        Traditional EDI: X12, EDIFACT, CII, TRADACOMS, and Verband der Automobilindustrie (VDA)
        XML standards: OAGi, CIDX, PIDX, and RosettaNet
        Internet standards for B2B data exchange: RosettaNet RNIF, ebXML, 1SYNC, and EBICS
        XSLT service to transform XML documents
    Supports WTX translations
    Graphic data mapping tool
    Virtually unlimited file size (up to 50 gigabytes)
    Validation of inbound and outbound data based on HIPAA rules defined for Level 1 – Level 6
    Intelligent (content-based) routing
    Interoperable with .Net 1.1/2.0, Axis 1.x/2.0, Xfire 1.2.6 and Java EES

Community management

    Manage and grow trading partner communities
    Centralized visibility into trading partner communities
    Reduce error rates
    Digital certificates deployment
    Customizable partner configuration
    Intelligent onboarding with partner self-provisioning

Application extension and customization

    Web services: Support for SOAP, WDSL
    Integrated Development Environment (IDE): Tool to speed custom app/dev work
    Software Development Kit (SDK): Toolkit to create your own adapters to systems

Back-end connectivity adapters

    Enterprise applications
        SAP (BAPI, IDOC, and Netweaver), Oracle, PeopleSoft, Vantive, IBM® Sterling Connect:Direct®, IBM® Sterling Connect:Enterprise®
    EAI messaging platforms
        IBM WebSphere MQ, Oracle AQ, BEA Tuxedo, TIBCO Rendezvous, Microsoft MSMQ, JMS Queue and Topic
    Technology
        JDBC, CORBA, LDAP, command line, file system, EJB, RMI, SNMP trap, JCA, IM (Instant Messaging)

Mobility

IBM® Sterling B2B Integrator Mobile provides monitoring and management of Sterling Integrator processes and status from a mobile digital device, including system status, database growth, and average business process wait time.

    Monitoring with alerts for Sterling Integrator resources including system status, database growth and average business wait time
    Run or restart any failed or halted business process
    Initiate key functions such as manage lock resolution for users and resources, initiate thread/ heap dumps and turn logging on and off

Generate your trusted CRT , PEM and P12 security certificates for signing and encryption functionality for HTTP or HTTPS Communication

Self-Signed Certificate and Keystore Generator Certificate and Keystore Generator ...