Sun B2B Suite HIPAA Protocol Manager User's Guide

Preface

Sun B2B Suite HIPAA Protocol ManagerUser's Guide explains how to install, configure, deploy, and use the Sun JavaTM Composite Application Platform Suite (Java CAPS) Sun B2B Suite HIPAA Protocol Manager (PM). This product is part of the Sun B2B Suite.

Who Should Use This Book

This book is intended for computer users who have the ability and responsibility of setting up and maintaining a fully functioning Java CAPS system.

These persons must also understand any operating systems on which Java CAPS is installed, for example, and must be thoroughly familiar with Windows-style user interface operations, as well as having a familiarity with the HIPAA protocol.

Before You Read This Book

Before you try to understand the concepts presented in this book and begin using the tutorial and reference materials it presents, make sure you read or are familiar with the references listed under Related Books. You must be especially proficient in the basic use of eGateTM Integrator, eWayTM Adapters, eInsightTM Business Process Manager, and eXchangeTM Integrator.

How This Book Is Organized

This book contains the following chapters:

Related Books

The following books provide additional related information about topics in this book:

The following books provide additional related information about topics in this book:

Screen Captures

Depending on what products you have installed, and how they are configured, the screen captures in this book may differ from what you see on your system.

Related Third-Party Web Site References

Third-party URLs are referenced in this document and provide additional, related information.


Note –

Sun is not responsible for the availability of third-party web sites mentioned in this document. Sun does not endorse and is not responsible or liable for any content, advertising, products, or other materials that are available on or through such sites or resources. Sun will not be responsible or liable for any actual or alleged damage or loss caused or alleged to be caused by or in connection with use of or reliance on any such content, goods, or services that are available on or through such sites or resources.


Documentation, Support, and Training

The Sun web site provides information about the following additional resources:

Typographic Conventions

The following table describes the typographic conventions that are used in this book.

Table P–1 Typographic Conventions

Typeface 

Meaning 

Example 

AaBbCc123

The names of commands, files, and directories, and onscreen computer output 

Edit your .login file.

Use ls -a to list all files.

machine_name% you have mail.

AaBbCc123

What you type, contrasted with onscreen computer output 

machine_name% su

Password:

aabbcc123

Placeholder: replace with a real name or value 

The command to remove a file is rm filename.

AaBbCc123

Book titles, new terms, and terms to be emphasized 

Read Chapter 6 in the User's Guide.

A cache is a copy that is stored locally.

Do not save the file.

Note: Some emphasized items appear bold online.

Shell Prompts in Command Examples

The following table shows the default UNIX® system prompt and superuser prompt for the C shell, Bourne shell, and Korn shell.

Table P–2 Shell Prompts

Shell 

Prompt 

C shell 

machine_name%

C shell for superuser 

machine_name#

Bourne shell and Korn shell 

$

Bourne shell and Korn shell for superuser 

#