BEA Logo







BEA Tuxedo Release 7.1

  Corporate Info  |  News  |  Solutions  |  Products  |  Partners  |  Services  |  Events  |  Download  |  How To Buy

 

 

 Basics

Introducing the BEA Tuxedo TOP END Domain Gateway

Describes the features offered by the gateway and explains how the gateway works. Compares BEA Tuxedo and BEA TOP END architectures, and describes differences in the terminology used for the two systems.

Interconnecting Systems with the TOP END Domain Gateway

Explains how to connect BEA Tuxedo and BEA TOP END systems using the BEA TOP END Domain Gateway (TEDG). Also discusses how the TEDG handles connections and message passing, how the TEDG handles queue processing, and how the TEDG supports transactions. Includes a discussion of the application programming interfaces (APIs) of the two systems, lists the supported and unsupported features of the two APIs, and an overview of TEDG administration.

Understanding Security Between the BEA TOP END and BEA Tuxedo Systems

Gives an overview of the security features provided by the BEA Tuxedo and BEA TOP END systems. Also discusses how security works between the two systems, and how security is handled by the TEDG.

 

 Configuration

Configuring the TOP END Domain Gateway

Explains the TEDG configuration and run-time administration process, gives rules for configuring the TEDG with samples of valid and invalid values, and describes how to configure a TEDG node on a BEA TOP END system.

Editing the UBBCONFIG File

Defines the UBBCONFIG file, describes how to edit the file for a TEDG configuration, and gives a sample section of a UBBCONFIG file modified for a TEDG.

Editing the DMCONFIG File

Describes the DMCONFIG file and explains how to edit the file to configure a TEDG. Includes a list of the required and optional parameters for each section of the file.

Configuring Security Between BEA TOP END and BEA Tuxedo Systems

Explains how security is provided between the systems, and lists the prerequisites for setting up security between them. Also explains how to configure security in a BEA Tuxedo system, how to use BEA Tuxedo and BEA TOP END security administration tools to authorize inter-system access, and how to configure the TEDG for NI encryption and authentication.

Communicating with Multiple BEA TOP END Systems

Discusses how to configure multiple GWTOPEND processes, how to define multiple processes in the UBBCONFIG file, and how to modify the DMCONFIG file to support multiple gateway groups.

Sample Configuration File for a TOP END Domain Gateway

Describes a sample configuration that includes a TEDG. Discussion focuses on the mappings between the BEA TOP END products and functions and the corresponding BEA Tuxedo services. A sample DMCONFIG file is included.

Administering the TEDG During Run Time

Gives an overview of run-time administration and the tools available, including the dmadmin command interpreter.

 

 Programming Considerations

API Programming

Explains how to use the BEA Tuxedo ATMI and the BEA TOP END CSI with the TEDG, and describes the limitations of the supported features for the respective APIs.

Request/Response Mode Programming

Describes how request/response messaging works with the TEDG, how messages are passed from BEA Tuxedo clients to BEA TOP END servers, and how messages are passed from BEA TOP END clients to BEA Tuxedo servers in request/response mode. Includes client and server flag mappings and lists of error values and their causes.

Conversational Mode Programming

Describes how conversational messaging works with the TEDG, how messages are passed from BEA Tuxedo clients to BEA TOP END servers, and how messages are passed from BEA TOP END clients to BEA Tuxedo servers in conversational mode. Includes client and server flag mappings and lists of error values and their causes.

Reliable Queuing Programming

Describes how the BEA Tuxedo and BEA TOP END systems support reliable queues. Discussion focuses on common queuing features supported by the TEDG, and unsupported /Q and RTQ features. Discusses how BEA Tuxedo clients enqueue messages to RTQ, how BEA TOP END clients enqueue messages to /Q, and how the TEDG maps client requests. Includes lists of error values and their causes.

Transactional Support Programming

Explains how to use transactions with the TEDG, describes transaction capabilities supported by the TEDG, and discusses transaction design.

Security Programming

Gives an overview of end-to-end security for a configuration that comprises BEA Tuxedo and BEA TOP END systems connected by the TEDG.