Sun ONE logo     Previous      Contents      Index      Next     
Sun ONE Integration Server, Secure Trading Agent 1.0 User's Guide



Chapter 6   Editing ebXML Agreements

This chapter shows how to edit agreements using the Secure Trading Agent Agreement Editor. It contains information applicable to Secure Trading Agent administrators only. For information on how to create, import, deploy, and otherwise manage ebXML agreements, refer to Chapter 5, "ebXML Agreements".

Secure Trading Agent regular users should skip this chapter.

Editing Agreements

To edit an agreement, you launch the Agreement Editor from the Edit tab of the Communications Center.

To launch the Secure Trading Agent Agreement Editor to edit an agreement

  1. Log in to the Sun Management Center as administrator, and open the Communications Center, as described in "Starting the Communications Center".
  2. You must be a Secure Trading Agent administrator to edit agreements.

  3. From the Agreements tab, select Edit.
  4. The Communications Center displays a list of agreements in the system.

    Figure 6-1    Communications Center, Agreement List
    Screen capture of the Communications Center listing agreements that can be edited.

  5. Select the Edit link in the list of agreements for the agreement you want to edit.
  6. The Secure Trading Agent Agreement Editor opens, displaying the Agreement Information page for the agreement.

    Figure 6-2    Agreement Editor, Agreement Information Page
    Screen capture of the Agreement Editor displaying the Agreement Information Page.

General Editor Information

This section discusses general information about using the ebXML Agreement Editor.

View Mode/Edit Mode

The Agreement Editor has two modes, one for viewing a text version of the agreement and the other for editing the agreement.

To view a text version of the agreement

  1. In the Agreement Editor, select the View tab.
  2. The Agreement Editor displays a text version of the agreement.

    Figure 6-3    Agreement Editor, Viewing a Text Version
    Screen capture of the Agreement Editor displaying the text version of an agreement.

To return to Edit Mode for the agreement

  1. In the Agreement Editor, select the Edit tab.

Editing Pages

When editing an agreement, you select an editing page to view and modify the settings for a group of related agreement elements. Use the Agreement Tree in the leftmost frame to select an editing page. Modify the elements for that page in the editing fields displayed in the rightmost frame.

Although no particular order is enforced for editing these pages, you typically edit an agreement in the sequence outlined below:

  1. Agreement Information Page
  2. Local Party Page
  3. Party Roles Page
  4. Send Action / Receive Action Page
  5. Transport Security Page
  6. Message Security Page
  7. Messaging Defaults Page

Saving Your Changes

Each editing page has a Save button and a Reset button. Use the Save button to save any changes you make to that page. Use the Reset button to revert to the previous saved version for that page.



Caution

If you navigate to a new page without selecting Save, you will lose any edits that you make.

If you select Save on a page, you cannot use Reset to recover any prior edits.



Local Party / Other Party Editing

An ebXML agreement contains information about the two parties to the agreement. You are the local party and typically edit the agreement from that perspective. However, the agreement editor provides access to editing pages for the other party. This allows you to see the agreement from the perspective of the other party and also to modify some fields for the other party that have been generated by the editor.

As explained in the following sections, when you create an action (Send Action or Receive Action) for one party, the editor generates a corresponding action (Receive Action or Send Action) for the other party. You sometimes need to verify and edit the corresponding action and role names that the editor generates for the other party.

This manual focuses mainly on the editing pages available for the local party. However, you can make similar edits for the other party, as needed.

Agreement Information Page

The Agreement Information page allows you to specify top-level information about the agreement.

Figure 6-4    Agreement Editor, Agreement Information Page
Screen capture of the Agreement Editor displaying the Agreement Information Page.

Table 6-1 describes the editing fields available for agreement identification. Table 6-2 describes the editing fields available for agreement status.

Table 6-1    Agreement Identification Editing Fields  

Field

Description

Agreement Name

The agreement name is an alias for the CPA Id and is used by the Agreement Editor and the Communications Center for display purposes. The agreement name is also used when specifying ebScript commands.

Agreement Id

A unique identifier for the agreement. This is auto-generated if you do not specify a value.

Comment

A one line comment typically used to describe the agreement. The comment field is used by the Communications Center for display purposes.

Table 6-2    Agreement Status Editing Fields  

Field

Description

Status

An agreement status can be either Proposed or Agreed. Proposed indicates that the parties in the CPA have not yet agreed to activate the CPA. Agreed indicates the CPA has been successfully negotiated between the trading partners and can be deployed to enable the exchange of messages.

Caution: When a CPA status is set to Agreed and then deployed, it can no longer be edited. Refer to "Agreement Status" for more information.

Start Date

Specifies the date and time that the agreement takes effect. Secure Trading Agent interprets all times as Coordinated Universal Time (UTC).

End Date

Specifies the date and time that the agreement expires. Secure Trading Agent interprets all times as Coordinated Universal Time (UTC).

Local Party Page

The Local Party page allows you to specify endpoints (locations for receiving messages) for both the local party and the other party. You can also add or delete party roles from the Local Party page. You can use the Secure Trading Agent Control Panel to review the endpoints of your system. For more information, refer to "Configuring Secure Trading Agent".

Figure 6-5    Agreement Editor, Local Party Page
Screen capture of the Agreement Editor displaying the Local Party Page.

Table 6-3 describes the editing fields available from the Party Information Page.

Table 6-3    Party Information Editing Fields  

Field

Description

Local Party Name

A party name to be associated with the local party Id.

PartyId

The party Id to be used as the local party for the editing session. Choose from a list of local party Ids known to the system.

Endpoint

The location (URL) for receiving non-secure messages.

Secure Endpoint

The location (URL) for receiving secure messages. A secure endpoint is required if you are using a secure transport for your messages.

Party Roles

A list of roles for the local party. You can add or delete roles, or open the Role Information page to specify details about a selected role.

Other Party Endpoint
Other Party Secure Endpoint

Other party locations for receiving messages. Leave these fields blank if you do not know this information. The agreement can be sent to the other party to provide their endpoint information.

Party Roles Page

The Party Roles page allows you to add or delete actions for a party role, and also to rename the role. This Beta release of Secure Trading Agent does not enforce party roles to an agreement.

Figure 6-6    Agreement Editor, Roles Page
Screen capture of the Agreement Editor displaying the Roles Page.

Table 6-4 describes the editing fields available from the Local Party Roles Page.

Table 6-4    Local Party Roles Editing Fields  

Field

Description

Local Party Role

Generated from the information provided in the Party Information page. Edit this field to rename the party role.

Send Actions
Receive Actions

Lists of actions designated for the role. You can add or delete actions, or open the Action Information page to specify details about a selected action. For each Send Action you create for a party, a corresponding Receive Action is created for the other party. Similarly, for each Receive Action you create, a corresponding Send Action is created for the other party.

Send Action / Receive Action Page

There are two types of actions, Send Actions and Receive Actions. The Send Action and Receive Action pages allow you to specify the details of actions associated with a role. You can also specify secure transport for the action message and whether to enable reliable messaging.

A secure endpoint must be specified in the Party Information page before you can enable secure messaging. Similarly, reliable messaging information must be specified in the Messaging Defaults page before you can enable reliable messaging.

Figure 6-7    Agreement Editor, Action Page
Screen capture of the Agreement Editor displaying the Action Page.

Table 6-5 describes the editing fields available from the Send Action/Receive Action Page.

Table 6-5    Send Action/Receive Action Editing Fields 

Field

Description

Action Name

Generated from the information provided in the Role Information page. Edit this field to rename the action.

Reliable Messaging

Enables reliable messaging according to specifications in the Messaging Defaults page, as described in "Messaging Defaults Page".

Transaction Characteristics

Transaction characteristics specify nonrepudiation and security information for the action. Refer to Table 6-6 for more information.

Document Attachments

Specifies the MIME type of documents that are to be attached to the message. Specify a MIME type in the text box or select a type from the list. Provide a description of the document, and then select Add to add the selection to the list or Update to update an existing selection in the list.

Nonrepudiation

Nonrepudiation is the ability to prove that transactions between you and your partner occurred. There are two forms to nonrepudiation:

  1. Providing an audit of all messages and attached documents between you and your trading partner.
  2. Proving that messages sent were received by the intended party.

The first form basically means that a digital signature on a message authenticates the sender of the message and also that the document has not been tampered.

The second form, known as nonrepudiation of receipt, provides an acknowledgment of receipt of a message. This acknowledgement includes the following:

  • Confirmation that the acknowledgment was authored by the sending party
  • Confirmation that the contents of the acknowledgment were not changed in transit
  • Confirmation that the original message (the digest of which is included in the acknowledgement) was received completely in an unadulterated form

For the first form of nonrepudiation, you can instruct Secure Trading Agent to retain all messages and attached documents. For the second form of nonrepudiation, instruct Secure Trading Agent to require a signed acknowledgement of messages received. Table 6-6 provides details on how to specify nonrepudiation.

Table 6-6    Business Transaction Characteristics 

Field

Description

Enable Nonrepudiation

When nonrepudiation is enabled, Secure Trading Agent requires messages to be signed. If you enable this field, make sure you have specified the proper signing certificate information on the Message Security Page.

Nonrepudiation Receipt Required

When nonrepudiation receipt is enabled, Secure Trading Agent requires a signed acknowledgement for all messages. If you enable this field, make sure you have specified the proper signing certificate information on the Message Security Page.

Confidential

Specify transient to send messages over a secure transport (SSL). If you specify transient, then make sure you have specified the proper transport security information on the Transport Security page.

Authentication

Authenticates the sender's identity. Transient authentication uses SSL certificates specified in the Transport Security Page to authenticate the receiver's identity. Persistent authentication uses the digital signature specified in the Message Security Page to authenticate the user's identity.

Tamper-proof

Use the digital signature specified in the Message Security Page to verify that the document has not been tampered.

Authorization Required

This release of Secure Trading Agent does not support this business transaction characteristic. For more information, refer to the Secure Trading Agent Release Notes.

Transport Security Page

The Transport Security page allows you to specify the keynames of certificates and trust anchors that will be used for the secure transport of messages. This page is available as a child node for both local party and the other party. You typically specify your own certificate information as the local party. Your trading partner (the other party) specifies their security information during the negotiation process, as described in "Negotiating Agreements".

Figure 6-8    Agreement Editor, Transport Security Page
Screen capture of the Agreement Editor displaying the Transport Security Page.



Note

The Agreement Editor specifies keynames for the certificates and trust anchors. You must resolve the keynames to physical files using the Communications Center before you deploy the agreement. For more information, refer to "Resolving Certificate Keynames".



Table 6-7 describes the editing fields available from the Transport Security page. For more information on specifying certificate information in the Agreement Editor, refer to "Managing Security Certificates and Keystores".

Table 6-7    Certificates Editing Fields

Field

Description

Server Certificate

The certificate you use to implement SSL transport of ebXML messages. This certificate contains your public key. The server certificate identifies the server name for the messaging endpoint by comparing it with the CN name specified in the certificate. Typically, the CN name is an IP address that identifies the server.

Trust Anchors

Additional certificates that validate the server certificate. These certificates are typically a chain of parent certificates for a server certificate. Use TrustAnchor certificates when your server certificate is issued by a certificate authority such as Verisign or Thawte. If your are using self-signed certificates, leave this field blank.

Message Security Page

The Message Security page allows you to specify the keynames of certificates and trust anchors that will be used for the signing of messages. This page is available as a child node for both local party and the other party. You typically specify your own certificate information as the local party. Your trading partner (the other party) specifies their security information during the negotiation process, as described in "Negotiating Agreements".

Figure 6-9    Agreement Editor, Message Security Page
Screen capture of the Agreement Editor displaying the Message Security Page.



Note

The Agreement Editor specifies keynames for the certificates and trust anchors. You must use the Communications Center to resolve the keynames to physical files before you deploy the agreement. For more information, refer to "Resolving Certificate Keynames".



Table 6-8 describes the editing fields available from the Message Security Page. For more information on specifying certificate information in the Agreement Editor, refer to "Managing Security Certificates and Keystores".

Table 6-8    Certificates Editing Fields

Field

Description

Signature Certificate

The certificate you use to implement signing of ebXML messages. This certificate contains your public key. The keyname specified in the agreement for a message certificate must match the alias name contained in your private key (keystore) file.

Trust Anchor

Additional certificates that validate the signing certificate. These certificates are typically a chain of parent certificates for a message certificate. Use TrustAnchor certificates when your signing certificate is issued by a certificate authority such as Verisign or Thawte. If your are using self-signed certificates, leave this field blank.

Messaging Defaults Page

The Messaging Defaults page allows you to specify default messaging information and reliability parameters for the agreement. The messaging information that you specify here applies to all Send and Receive Actions contained within the agreement. The reliable messaging information can be enabled or disabled on a per action basis.

To provide evidence of the receipt of messages, enable Acknowledgment Requested. You can also specify Signature Required to authenticate the sender of the message. Acknowledgements are typically sent synchronously. Enable Synchronous Signals if you specify Acknowledgement Requested.

Figure 6-10    Agreement Editor, Messaging Defaults Page
Screen capture of the Agreement Editor displaying the Messaging Defaults Page.

Table 6-9 describes the editing fields available for default messaging.

Table 6-9    Messaging Editing Fields 

Field

Description

Acknowledgement Requested

Specifies whether to request an acknowledgement message from the other party for each action.

Signature Required

Specifies that acknowledgements are signed. If you enable this field, make sure you have specified the proper signing certificate information on the Message Security Page.

Synchronous Signals

Specifies whether acknowledgement messages should be synchronous or asynchronous.

Reliable Messaging

Reliable messaging provides a guarantee that messages you send are received by your trading partner and are received once-and-only-once. This guarantee for reliable delivery depends on the options you specify. You can specify how many times to attempt delivery of a message and the time to wait between attempts. You can also eliminate duplicates to avoid having the same message delivered more than once. The Persist Duration specifies the length of time duplicate elimination can be guaranteed.

Table 6-10 describes the editing fields available for reliable messaging.

Table 6-10    Reliability Editing Fields 

Field

Description

Eliminate Duplicates

Specifies whether to eliminate duplicate copies of a message.

Persist Duration

How long messages should be saved to avoid duplicates.

Retries

The number of attempts to deliver a message.

Retry Interval

The time to wait between delivery attempts. The default value is 5 minutes.



Note

When setting the Retry Interval, be careful not to set this to a value less than the time it takes to send your document. For example, if you send a 5 MB document with a Retry Interval of 30 seconds, then the interval will most likely expire before the first attempt is sent.




Previous      Contents      Index      Next     
Copyright 2003 Sun Microsystems, Inc. All rights reserved.