AS2 Protocol Manager User's Guide explains how to install, configure, deploy, and use the Sun JavaTM Composite Application Platform Suite (Java CAPS) AS2 Protocol Manager (PM). This product is part of the Sun B2B Suite.
This book is intended for computer users who have the ability and responsibility of setting up and maintaining a fully functioning Java CAPS system.
These persons must also understand any operating systems on which Java CAPS is installed, for example, and must be thoroughly familiar with Windows-style user interface operations, as well as having a familiarity with the Applicability Statement 2(AS2) protocol for business messaging.
Before your try to understand the concepts presented in this book and begin using the tutorial and reference materials it presents, make sure you read or are familiar with the references listed under Related Books. You must be especially proficient in the basic use of eGateTM Integrator, eWayTM Adapters, eInsightTM Business Process Manager, and eXchangeTM Integrator.
This book contains the following chapters:
Chapter 1, Introduction to AS2 PM provides a brief summary ofAS2 and its operation with AS2 PM.
Chapter 2, Overview of AS2 PM gives an overview of AS2 PM and its basic features, including installation information.
Chapter 3, Using SME/KS With AS2 PM gives an overview of the eXchange Secure Messaging Extension With Keystore (SME/KS), including its general operation.
Chapter 4, Configuring AS2 PM explains the eXchange ePartner Manager (ePM) configuration steps necessary to allow AS2 PM to operate in your environment.
Chapter 5, Quick Start for AS2 PM provides a brief overview of how to set up and run the AS2 PM sample scenario provided with the product.
Chapter 6, AS2 PM Sample Scenario Tutorial explains in detail, how to implement and use the AS2 PM sample Project scenario.
The following books provide additional related information about topics in this book:
Java Composite Application Platform Suite Installation Guide
Java Composite Application Platform Suite Deployment Guide
Sun SeeBeyond eGate Integrator User’s Guide
Sun SeeBeyond eGate Integrator System Administration Guide
Sun SeeBeyond eGate Integrator JMS Reference Guide
Sun SeeBeyond File eWay Adapter User’s Guide
Sun SeeBeyond Batch eWay Adapter User’s Guide
Sun SeeBeyond Oracle eWay Adapter User’s Guide
Sun SeeBeyond LDAP eWay Adapter User’s Guide
Sun SeeBeyond HTTP(S) eWay Adapter User’s Guide
Sun SeeBeyond eInsight Business Process Manager User’s Guide
Sun B2B Suite eXchange Integrator User’s Guide
Sun B2B Suite eXchange Integrator Developer's Guide
Depending on what products you have installed, and how they are configured, the screen captures in this book may differ from what you see on your system.
Third-party URLs are referenced in this book and provide additional related information.
Sun is not responsible for the availability of third-party web sites mentioned in this document. Sun does not endorse and is not responsible or liable for any content, advertising, products, or other materials that are available on or through such sites or resources. Sun will not be responsible or liable for any actual or alleged damage or loss caused or alleged to be caused by or in connection with use of or reliance on any such content, goods, or services that are available on or through such sites or resources.
The Sun web site provides information about the following additional resources:
The following table describes the typographic conventions that are used in this book.
Table P–1 Typographic Conventions
Typeface |
Meaning |
Example |
---|---|---|
AaBbCc123 |
The names of commands, files, and directories, and onscreen computer output |
Edit your .login file. Use ls -a to list all files. machine_name% you have mail. |
AaBbCc123 |
What you type, contrasted with onscreen computer output |
machine_name% su Password: |
aabbcc123 |
Placeholder: replace with a real name or value |
The command to remove a file is rm filename. |
AaBbCc123 |
Book titles, new terms, and terms to be emphasized |
Read Chapter 6 in the User's Guide. A cache is a copy that is stored locally. Do not save the file. Note: Some emphasized items appear bold online. |
The following table shows the default UNIX® system prompt and superuser prompt for the C shell, Bourne shell, and Korn shell.
Table P–2 Shell Prompts
Shell |
Prompt |
---|---|
C shell |
machine_name% |
C shell for superuser |
machine_name# |
Bourne shell and Korn shell |
$ |
Bourne shell and Korn shell for superuser |
# |