Sun B2B Suite HIPAA Protocol ManagerUser's Guide explains how to install, configure, deploy, and use the Sun JavaTM Composite Application Platform Suite (Java CAPS) Sun B2B Suite HIPAA Protocol Manager (PM). This product is part of the Sun B2B Suite.
This book is intended for computer users who have the ability and responsibility of setting up and maintaining a fully functioning Java CAPS system.
These persons must also understand any operating systems on which Java CAPS is installed, for example, and must be thoroughly familiar with Windows-style user interface operations, as well as having a familiarity with the HIPAA protocol.
Before you try to understand the concepts presented in this book and begin using the tutorial and reference materials it presents, make sure you read or are familiar with the references listed under Related Books. You must be especially proficient in the basic use of eGateTM Integrator, eWayTM Adapters, eInsightTM Business Process Manager, and eXchangeTM Integrator.
This book contains the following chapters:
Chapter 1, Introduction provides a brief summary of HIPAA PM and its operation, as well as an overview of this document.
Chapter 2, Overview of HIPAA PM gives an overview of HIPAA PM, HIPAA, and eXchange.
Chapter 3, Installing HIPAA PM explains installation procedures, before and after installation, as well as system requirements.
Chapter 4, Configuring HIPAA PM explains the eXchange ePartner Manager (ePM) configuration steps necessary to allow HIPAA PM to operate in your environment.
Chapter 5, Quick Start for HIPAA PM provides a brief overview of how to set up and run the HIPAA PM Project sample scenario provided with the product.
Chapter 6, HIPAA PM Sample Scenario Tutorial explains in detail, how to implement and use the HIPAA PM sample Project scenario.
Appendix A, Externally Assigned Unique IDs explains how HIPAA PM handles this type of unique ID.
The following books provide additional related information about topics in this book:
The following books provide additional related information about topics in this book:
Java Composite Application Platform Suite Installation Guide
Java Composite Application Platform Suite Deployment Guide
Sun SeeBeyond eGate Integrator User’s Guide
Sun SeeBeyond eGate Integrator System Administration Guide
Sun SeeBeyond eGate Integrator JMS Reference Guide
Sun SeeBeyond File eWay Adapter User’s Guide
Sun SeeBeyond Batch eWay Adapter User’s Guide
Sun SeeBeyond Oracle eWay Adapter User’s Guide
Sun SeeBeyond LDAP eWay Adapter User’s Guide
Sun SeeBeyond HTTP(S) eWay Adapter User’s Guide
Sun SeeBeyond eInsight Business Process Manager User’s Guide
Sun SeeBeyond HIPAA OTD Library User’s Guide
Sun B2B Suite eXchange Integrator User’s Guide
Sun B2B Suite eXchange Developer’s Guide
B2B Suite Readme file for HIPAA PM information
Depending on what products you have installed, and how they are configured, the screen captures in this book may differ from what you see on your system.
Third-party URLs are referenced in this document and provide additional, related information.
Sun is not responsible for the availability of third-party web sites mentioned in this document. Sun does not endorse and is not responsible or liable for any content, advertising, products, or other materials that are available on or through such sites or resources. Sun will not be responsible or liable for any actual or alleged damage or loss caused or alleged to be caused by or in connection with use of or reliance on any such content, goods, or services that are available on or through such sites or resources.
The Sun web site provides information about the following additional resources:
The following table describes the typographic conventions that are used in this book.
Table P–1 Typographic Conventions
Typeface |
Meaning |
Example |
---|---|---|
AaBbCc123 |
The names of commands, files, and directories, and onscreen computer output |
Edit your .login file. Use ls -a to list all files. machine_name% you have mail. |
AaBbCc123 |
What you type, contrasted with onscreen computer output |
machine_name% su Password: |
aabbcc123 |
Placeholder: replace with a real name or value |
The command to remove a file is rm filename. |
AaBbCc123 |
Book titles, new terms, and terms to be emphasized |
Read Chapter 6 in the User's Guide. A cache is a copy that is stored locally. Do not save the file. Note: Some emphasized items appear bold online. |
The following table shows the default UNIX® system prompt and superuser prompt for the C shell, Bourne shell, and Korn shell.
Table P–2 Shell Prompts
Shell |
Prompt |
---|---|
C shell |
machine_name% |
C shell for superuser |
machine_name# |
Bourne shell and Korn shell |
$ |
Bourne shell and Korn shell for superuser |
# |