TheSun B2B Suite HIPAA Library User's Guide describes the HIPAA OTD library, how to install it, and how to use it with eGate Integrator.
This guide is intended for users who are designing, deploying, and managing Java Composite Application Platform Suite (Java CAPS) Projects that use HIPAA OTDs. This document assumes that you are familiar with eGate-specific procedures.
This book contains the following chapters:
Chapter 1, Overview of the HIPAA OTD Library, provides an overview of the HIPAA OTD Library as well as its support for validation.
Chapter 2, Installing the HIPAA OTDs, describes how to install HIPAA OTDs, and the HIPAA OTD Library documentation.
Chapter 3, Using HIPAA OTDs, describes how to display OTDs, and how to build Collaborations with HIPAA OTDs.
Chapter 4, Java Methods for HIPAA OTDs, provides the syntax for the Java methods provided with the HIPAA OTDs.
Appendix A, X12OTDErrors Schema File and Sample XML, provides the X12OTDErrors schema file and a sample validation output XML.
For information on eXchange Integrator, refer to the eXchange Integrator User’s Guide.
For information on the HIPAA Protocol Manager, refer to the HIPAA Protocol Manager User’s Guide.
For late-breaking information on the B2B Suite, refer to the B2B_Readme file, located on the product media.
For information about Java CAPS products, refer to the following:
Java CAPS Installation Guide
Java CAPS Deployment Guide
eGate Integrator User’s Guide
eGate Integrator System Administration Guide
eGate Integrator JMS Reference Guide
eInsight Business Process Manager User’s Guide
Readme for Java CAPS / eGate Integrator
Depending on what products you have installed, and how they are configured, the screen captures in this document may differ from what you see on your system.
Third-party URLs are referenced in this document and provide additional, related information.
Sun is not responsible for the availability of third-party web sites mentioned in this document. Sun does not endorse and is not responsible or liable for any content, advertising, products, or other materials that are available on or through such sites or resources. Sun will not be responsible or liable for any actual or alleged damage or loss caused or alleged to be caused by or in connection with use of or reliance on any such content, goods, or services that are available on or through such sites or resources.
The Sun web site provides information about the following additional resources:
The following table describes the typographic conventions that are used in this book.
Table P–1 Typographic Conventions
Typeface |
Meaning |
Example |
---|---|---|
AaBbCc123 |
The names of commands, files, and directories, and onscreen computer output |
Edit your .login file. Use ls -a to list all files. machine_name% you have mail. |
AaBbCc123 |
What you type, contrasted with onscreen computer output |
machine_name% su Password: |
aabbcc123 |
Placeholder: replace with a real name or value |
The command to remove a file is rm filename. |
AaBbCc123 |
Book titles, new terms, and terms to be emphasized |
Read Chapter 6 in the User's Guide. A cache is a copy that is stored locally. Do not save the file. Note: Some emphasized items appear bold online. |
The following table shows the default UNIX® system prompt and superuser prompt for the C shell, Bourne shell, and Korn shell.
Table P–2 Shell Prompts
Shell |
Prompt |
---|---|
C shell |
machine_name% |
C shell for superuser |
machine_name# |
Bourne shell and Korn shell |
$ |
Bourne shell and Korn shell for superuser |
# |