Copyright 2013 Consona Corporation. All rights reserved
|
|
- Madeline Parsons
- 8 years ago
- Views:
Transcription
1 COMPIERE SOAP FRAMEWORK Copyright 2013 Consona Corporation. All rights reserved
2 Table of Contents Compiere SOAP API... 3 Accessing Compiere SOAP... 3 Generate Java Compiere SOAP Client... 3 Using the Java Compiere SOAP Client... 4 Known Restrictions... 4 Licensing... 5 API Use... 5 Multiple Targets... 6 API Specifics... 6 Naming... 6 Data Transport (or Transfer) Object:... 6 Primary Key... 6 Foreign Key... 7 Pick... 7 Processes... 7 Workflow... 8 Security... 8 Authentication... 8 Transport Level Security... 8 Setup... 9 Examples... 9 Copyright 2013 Consona Corporation All rights reserved Page 2
3 Compiere SOAP API The Compiere SOAP framework allows integration of Compiere with third-party applications, and also enables third-party applications to call Compiere web services. This document allows you to access Compiere SOAP, generate and use the SOAP client. It also deals with the security aspects like authentication and transport level security. Accessing Compiere SOAP Add the file ws.war to Tomcat. You can build the war file from source via the command mvn install from the ws directory, generating the file ws/target/ws.war. Assuming, the base (SOAP Service Point) URL is check the following URLs: - the WSDL file - the XSD part only The SOAP client for a platform can be generated by pointing to the WSDL file. Generate Java Compiere SOAP Client In package ws-sdk, check the Ant file build.xml for the WSDL location and execute it with Ant. The generated Java client is enhanced by Java/Compiere specific functionality: 1. Convenience constructors, constants and methods (tostring, equals, hashcode) 2. Value Defaults 3. Fluent API (withxx(x)) 4. Date handling The objective is to make the Java SOAP API as convenient as using the direct Compiere API. Note that you might have to explicitly set the JAVA_HOME environment variable to Java 7 JDK for the generation, as we use the latest JAXB version. This requires Java 7 also for the Java SOAP client. You could use the generated Compiere Java SOAP API code, but you might need to regenerate it if you add columns, tables, processes, or pick list values. The Ant build requires a running Compiere server and generates the classes in the package org.compiere.sdk.ad in the directory src/main/java and also downloads and stores the WSDL and XSD file in the directory src/main/resources. For convenience, you can use the class org.compiere/sdk.compiereclient. This class extends org.compiere.sdk.compieresoapimpl, which exposes all SOAP operations and eliminates the need to deal with the JAXB packaging. This class is generated by the class, org.compiere.sdk.generateclientimpl. Copyright 2013 Consona Corporation All rights reserved Page 3
4 Note: Eventually, this should be run automatically in the Ant build. Using the Java Compiere SOAP Client Here are some examples on how to use the Compiere client: (Without modification, the examples assume the SOAP server is on src/test/java - org.compiere.sdk.it_compiereclient - Basic connection and functionality test src/test/java - org.compiere.sdk.it_orderprocess - Creating an order and processing it to create shipment plus invoice. Known Restrictions 1. The size of the WSDL file is currently 4.7MB. When a Java client is opened, it requests the current version, that is, the server basically serializes the entire dictionary and the client has to parse a sizable file. The options to address this are: a. To use ETags on the server to allow caching in the infrastructure and maybe also internal caching. b. To extend the default request notation from to a location such as (localhost is just a placeholder for the server URL). This would allow you to build smaller SOAP clients. The challenge is to define the components. 2. The current implementation uses the standard Compiere user credentials (username, password, and role name) to determine the available objects and methods. It might be sensible to generate specific API ID/secret for a given user. The alternative is to define a dedicated user. One of the considerations to use a specific API ID/secret is, if, for example, you want to allow end users to log in through a mobile device. 3. The SOAP API basically exposes the CRUD functionality. The Java API has quite a few convenience methods (for example, setting the business partner on an order sets also payment term, etc. of the customer). Depending on the usage, we may want to provide similar or better functionality with the SOAP API in future. This might include also the ability to create header and lines in one transaction (rather than first saving the header). 4. For pick lists, only the value is exposed in the API, and not the name. For the field, AD_Table.AccessLevel, the API exposes the values, 1, 2, 3, 4, 6, 7, but not the corresponding names, Organization, TenantOnly, TenantPlusOrganization, SystemOnly, SystemPlusTenant, All, due to the restriction that XSD elements only have a name and no description. Copyright 2013 Consona Corporation All rights reserved Page 4
5 2. It might be possible to tweak the JaxB generation process to expose annotations for values. 3. Fault Handling - Currently Java client does not throw the transaction specific fault (for example. LoginFault), but the more generic SOAPFaultException. The method, CompiereClient.getExceptionMethod(Exception), mitigates this by inspecting the XML elements and providing the information. 4. Defaults - Constants are automatically applied. In contrast to the base product, fields with defaults referencing foreign keys, variables, or formulas are not included. Licensing The SOAP services allow the use of a single technical Compiere user to many real users ( consolidator ). For licensing, the actual users using the SOAP services need to be licensed, even though they do not log in directly. API Use After obtaining the client from the SOAP infrastructure, you need to log in providing the username, password, and role (first role found is used, if not specified). On successful login, this call returns the client, organization, user and role, as well as a Session ID (SID). This SID is a code, which needs to be included in the SOAP SecurityHeader in subsequent calls (or alternatively in the http request header). The session expires on logout or after timeout. It is recommended to always log out explicitly. The Java CompiereClient automatically handles the SID and the SecurityHeader. For a given operation, you can use the raw API from the SOAP Port. For example, QueryResponse CompiereSoap.query(QueryRequest, SecurityHeader) throws QueryFault - or the generated call: QueryResponseType CompiereSoapImpl.query_(String tablename, String sqlwhere, Integer offset, Integer limit) throws QueryFault - or the one provided: List<Dto> CompiereClient.query(String tablename, String sqlwhere, int offset, int limit) The generated option (#2) just handles the security header and exposes all request parameters. The third option returns the actual result directly and handles any exceptions by just logging them and returning null as a result. If you expect an exception, you may want to use option 2. Copyright 2013 Consona Corporation All rights reserved Page 5
6 Note that the call can also throw the runtime exception, SOAPFaultException, (see restriction above), as well as a Throwable if there are communication or serialization issues. Note: When creating a new object, you may need to set (more) values explicitly than using the standard Java API. Also, the default values might be different than when using the Java API directly. Multiple Targets The target URL of the Java SOAP client is determined by the service location in the WSDL document. If you generate the client by providing the default URL, the client will connect to that URL. To enable that you can connect, for example, to development, test, and production servers without regenerating the client, WS-Addressing is used and you can provide the actual target URL when creating the CompiereClient. For example, new Compiere Client ( Note that the URL provided is the service point, where the WSDL is retrieved by adding?wsdl to the URL. If no argument is provided, then the service point at the time of the client generation is used. API Specifics Most data structures are directly mapped to the corresponding XML notation. Naming The entity names are converted to XML Standard by removing the underscores. For example, the table AD_Column is converted to ADColumn and the column AD_Column_ID is converted to ADColumnID. Data Transport (or Transfer) Object: The Compiere PO (Persistent Object) representation in the SOAP API is called by its proper technical term: Data Transport (or Transfer) Object. Primary Key The Primary Key is an integer value. All standard Compiere entities comply, but non-standard tables may have String values (that is, you can only use Compiere entities, who have an integer as the Primary Key). Copyright 2013 Consona Corporation All rights reserved Page 6
7 Foreign Key A Foreign Key extends the Primary Key and also has a label. When you query records, the label is populated, so that you don t need to query a referenced entity to get the name. When saving, the label is ignored. You can convert any Primary Key to a Foreign Key via the method.asfk() - example: column.setadtableid(table.getadtableid().asfk()); Pick Pick list values have an optional label. Like in Foreign Keys, the labels are populated when querying records and ignored when setting values. Pick lists are exposed as classes and their values exposed as static values. There are convenience methods for setting the pick values. Example: The Table AD_Table has the field TableTrxType, which is a pick list. The Pick List is represented in the class ADTableTableTrxType (concatenating table name and field name). The formal setting method is: table.settabletrxtype(new ADTableTableTrxType().withValue(ADTableTableTrxType.M)); This can also be written also as: table.settabletrxtype(new ADTableTableTrxType(ADTableTableTrxType.M)); table.settabletrxtype(adtabletabletrxtype.m); Processes All Compiere processes, which do not directly print (that is, reports) are exposed as SOAP operations. The value of the process is used with a process prefix. For example, C_Year_CreatePeriods is exposed as processcyearcreateperiods. If the process has parameters, the structure is dynamically generated. You call processes via: ProcessResponseType processcyearcreateperiods_(int recordid) throws ProcessFault from the Compiere Client. Copyright 2013 Consona Corporation All rights reserved Page 7
8 Workflow Any workflow can be started via: Dto CompiereClient.workflow(String docaction, Dto dto) For example: order = (COrder) m_client.workflow(docaction.complete, order); You pass the document action and the data transfer object (saved or updated) to the call and get the updated back. If the returned Dto is null, the workflow did not succeed. Alternatively you could also call: WorkflowResponseType workflow_(string docaction, Dto dto) throws WorkflowFault Security Authentication All SOAP transactions require that the client is authenticated. Therefore, you need to log in providing either username/password/role or API ID and secret. When successfully logged in, the client receives a SID, which needs to be transmitted in following SOAP transactions. The connections are stateless (unless you use SSL, see below), uses POST requests and do not use any cookies. With that, the risk of cross site request forgery (CRSF) is very unlikely. Transport Level Security If you want to secure the SOAP connection, the most effective solution is to use Transport Level Security (that is, https) - see also Note that you need a validated SSL certificate on your server. If you have Apache as front end server, install the certificate there instead of installing it in the web container (for example, Tomcat). For Tomcat SSL configuration, click here. If you do not have a signed certificate, for example, for testing purposes, do the following: Server test certificate 1. Check/run the script ws/testssl.bat to create the certificate. For Tomcat, modify conf/server.xml to activate the SSL connector pointing to the certificate file created in step 1..: <Connector port="8443" protocol="http/1.1" SSLEnabled="true" maxthreads="150" scheme="https" secure="true" Copyright 2013 Consona Corporation All rights reserved Page 8
9 keystorefile="c:\compiere\trunkcore\ws\test.keystore" keystorepass="tomcat" clientauth="false" sslprotocol="tls" /> 2. Start Tomcat and check the log for errors. SOAP Client 2. Make sure the server is running. Point your client to the SSL port. For example, new CompiereClient( (see IT_CompiereClient.testSSL) 3. You need to install the server certificate if it is not trusted. For example, if your browser does not appear, for example, e.g. without complaining. For that, use the program InstallCert.java in ws-sdk/scr/test/java: cd ws-sdk/target/test-classes java InstallCert localhost:8443 Accept the certificate Copy jssecacerts to %JAVA_HOME%/jre/lib/security. Run step 2 again to ensure that the certificate is installed. Setup In the Tenant (Maintain Clients/Tenants) window and the Tenant Info tab, you can enforce using SSL by client/tenant setting the flag Enforce Secure Web Services. By default, you can use username, password and role to use web services in addition to the API Access Key (see below). By setting the flag Require API Key, you can only connect to web services using API access credentials. In the Web Services API Key window, you select a User and Role to generate an API Access Key and Secret. You can regenerate the key/secret independent from changing the user name/password of the user. Note that for successful login, the referenced user and role need to be active. Now, you use the API Access Key as the user name and the API Access Secret as the password when connecting via the SOAP API. Examples Import Price List Reference an existing price list and/or version or create a new price list / version. Once set or created, you can add the prices for a given product via the following: addprice(product, pricelist, pricestd, pricelimit); Copyright 2013 Consona Corporation All rights reserved Page 9
10 Or you can import a file. It allows you to import a CSV file, Tab/etc. delimited or fixed with formats, you can define the header values (columns to be imported) or it can discover them. It also allows you to define column synonyms (for example, List for ListPrice ). The sequence of the columns in the file is arbitrary. They must contain the product and the limit price. Class: ws-sdk - org.compiere.sdk.app.importpricelist Test: org.compiere.sdk.app.it_importpricelist Copyright 2013 Consona Corporation All rights reserved Page 10
vcommander will use SSL and session-based authentication to secure REST web services.
vcommander REST API Draft Proposal v1.1 1. Client Authentication vcommander will use SSL and session-based authentication to secure REST web services. 1. All REST API calls must take place over HTTPS 2.
More informationRHEV 2.2: REST API INSTALLATION
RHEV 2.2: REST API INSTALLATION BY JAMES RANKIN REVISED 02/14/11 RHEV 2.2: REST API INSTALLATION 1 TABLE OF CONTENTS OVERVIEW PAGE 3 JAVA AND ENVIRONMENT VARIABLES PAGE 3 JBOSS INSTALLATION PAGE 5 REST
More informationwww.novell.com/documentation Policy Guide Access Manager 3.1 SP5 January 2013
www.novell.com/documentation Policy Guide Access Manager 3.1 SP5 January 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this documentation,
More informationEMC Clinical Archiving
EMC Clinical Archiving Version 1.7 Installation Guide EMC Corporation Corporate Headquarters Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com Legal Notice Copyright 2014-2015 EMC Corporation. All Rights
More informationFairsail REST API: Guide for Developers
Fairsail REST API: Guide for Developers Version 1.02 FS-API-REST-PG-201509--R001.02 Fairsail 2015. All rights reserved. This document contains information proprietary to Fairsail and may not be reproduced,
More informationConfiguring ActiveVOS Identity Service Using LDAP
Configuring ActiveVOS Identity Service Using LDAP Overview The ActiveVOS Identity Service can be set up to use LDAP based authentication and authorization. With this type of identity service, users and
More informationUsing EMC Unisphere in a Web Browsing Environment: Browser and Security Settings to Improve the Experience
Using EMC Unisphere in a Web Browsing Environment: Browser and Security Settings to Improve the Experience Applied Technology Abstract The Web-based approach to system management taken by EMC Unisphere
More informationSentinel EMS v7.1 Web Services Guide
Sentinel EMS v7.1 Web Services Guide ii Sentinel EMS Web Services Guide Document Revision History Part Number 007-011157-001, Revision E. Software versions 7.1 and later. Revision Action/Change Date A
More informationOnset Computer Corporation
Onset, HOBO, and HOBOlink are trademarks or registered trademarks of Onset Computer Corporation for its data logger products and configuration/interface software. All other trademarks are the property
More informationQlik REST Connector Installation and User Guide
Qlik REST Connector Installation and User Guide Qlik REST Connector Version 1.0 Newton, Massachusetts, November 2015 Authored by QlikTech International AB Copyright QlikTech International AB 2015, All
More informationTROUBLESHOOTING RSA ACCESS MANAGER SINGLE SIGN-ON FOR WEB-BASED APPLICATIONS
White Paper TROUBLESHOOTING RSA ACCESS MANAGER SINGLE SIGN-ON FOR WEB-BASED APPLICATIONS Abstract This white paper explains how to diagnose and troubleshoot issues in the RSA Access Manager single sign-on
More informationUse Enterprise SSO as the Credential Server for Protected Sites
Webthority HOW TO Use Enterprise SSO as the Credential Server for Protected Sites This document describes how to integrate Webthority with Enterprise SSO version 8.0.2 or 8.0.3. Webthority can be configured
More informationWeb Application Report
Web Application Report This report includes important security information about your Web Application. Security Report This report was created by IBM Rational AppScan 8.5.0.1 11/14/2012 8:52:13 AM 11/14/2012
More informationSage CRM Connector Tool White Paper
White Paper Document Number: PD521-01-1_0-WP Orbis Software Limited 2010 Table of Contents ABOUT THE SAGE CRM CONNECTOR TOOL... 1 INTRODUCTION... 2 System Requirements... 2 Hardware... 2 Software... 2
More informationStreamServe Persuasion SP5 StreamStudio
StreamServe Persuasion SP5 StreamStudio Administrator s Guide Rev B StreamServe Persuasion SP5 StreamStudio Administrator s Guide Rev B OPEN TEXT CORPORATION ALL RIGHTS RESERVED United States and other
More informationWeb Services for Management Perl Library VMware ESX Server 3.5, VMware ESX Server 3i version 3.5, and VMware VirtualCenter 2.5
Technical Note Web Services for Management Perl Library VMware ESX Server 3.5, VMware ESX Server 3i version 3.5, and VMware VirtualCenter 2.5 In the VMware Infrastructure (VI) Perl Toolkit 1.5, VMware
More informationTable of Contents. Open-Xchange Authentication & Session Handling. 1.Introduction...3
Open-Xchange Authentication & Session Handling Table of Contents 1.Introduction...3 2.System overview/implementation...4 2.1.Overview... 4 2.1.1.Access to IMAP back end services...4 2.1.2.Basic Implementation
More informationIUCLID 5 Guidance and Support
IUCLID 5 Guidance and Support Web Service Installation Guide July 2012 v 2.4 July 2012 1/11 Table of Contents 1. Introduction 3 1.1. Important notes 3 1.2. Prerequisites 3 1.3. Installation files 4 2.
More informationModule 13 Implementing Java EE Web Services with JAX-WS
Module 13 Implementing Java EE Web Services with JAX-WS Objectives Describe endpoints supported by Java EE 5 Describe the requirements of the JAX-WS servlet endpoints Describe the requirements of JAX-WS
More informationKofax Export Connector 8.3.0 for Microsoft SharePoint
Kofax Export Connector 8.3.0 for Microsoft SharePoint Administrator's Guide 2013-02-27 2013 Kofax, Inc., 15211 Laguna Canyon Road, Irvine, California 92618, U.S.A. All rights reserved. Use is subject to
More informationProject (Group) Management Installation Guide (Linux) Version 1.3. Copyright 2007 MGH
Project (Group) Management Installation Guide (Linux) Version 1.3 Copyright 2007 MGH Table of Contents About this Guide iii Document Version History iii Prerequisites 1 Required Software 1 Install 4 Installing
More informationConfiguration Worksheets for Oracle WebCenter Ensemble 10.3
Configuration Worksheets for Oracle WebCenter Ensemble 10.3 This document contains worksheets for installing and configuring Oracle WebCenter Ensemble 10.3. Print this document and use it to gather the
More informationSetup Guide Access Manager 3.2 SP3
Setup Guide Access Manager 3.2 SP3 August 2014 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE
More informationCA Spectrum and CA Service Desk
CA Spectrum and CA Service Desk Integration Guide CA Spectrum 9.4 / CA Service Desk r12 and later This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter
More informationDEPLOYMENT GUIDE Version 1.1. Deploying the BIG-IP LTM v10 with Citrix Presentation Server 4.5
DEPLOYMENT GUIDE Version 1.1 Deploying the BIG-IP LTM v10 with Citrix Presentation Server 4.5 Table of Contents Table of Contents Deploying the BIG-IP system v10 with Citrix Presentation Server Prerequisites
More informationCentral Administration QuickStart Guide
Central Administration QuickStart Guide Contents 1. Overview... 2 Licensing... 2 Documentation... 2 2. Configuring Central Administration... 3 3. Using the Central Administration web console... 4 Managing
More informationCarisbrooke. End User Guide
Carisbrooke Contents Contents... 2 Introduction... 3 Negotiate Kerberos/NTLM... 4 Scope... 4 What s changed... 4 What hasn t changed... 5 Multi-Tenant Categories... 6 Scope... 6 What s changed... 6 What
More informationwww.novell.com/documentation Jobs Guide Identity Manager 4.0.1 February 10, 2012
www.novell.com/documentation Jobs Guide Identity Manager 4.0.1 February 10, 2012 Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use of this documentation,
More informationJava Web Services SDK
Java Web Services SDK Version 1.5.1 September 2005 This manual and accompanying electronic media are proprietary products of Optimal Payments Inc. They are to be used only by licensed users of the product.
More informationSECURITY DOCUMENT. BetterTranslationTechnology
SECURITY DOCUMENT BetterTranslationTechnology XTM Security Document Documentation for XTM Version 6.2 Published by XTM International Ltd. Copyright XTM International Ltd. All rights reserved. No part of
More informationUpgrading Your Web Server from ClientBase Browser Version 2.0 or Above to Version 2.1.1
Upgrading Your Web Server from ClientBase Browser Version 2.0 or Above to Version 2.1.1 Introduction Successful ClientBase Browser usage depends on proper hardware, setup and installation. This section
More informationCA Nimsoft Service Desk
CA Nimsoft Service Desk Configure Outbound Web Services 7.13.7 Legal Notices Copyright 2013, CA. All rights reserved. Warranty The material contained in this document is provided "as is," and is subject
More informationKaseya 2. User Guide. Version 6.1
Kaseya 2 Kaseya SQL Server Reporting Services (SSRS) Configuration User Guide Version 6.1 January 28, 2011 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and
More informationICE Trade Vault. Public User & Technology Guide June 6, 2014
ICE Trade Vault Public User & Technology Guide June 6, 2014 This material may not be reproduced or redistributed in whole or in part without the express, prior written consent of IntercontinentalExchange,
More informationBASELINE SECURITY TEST PLAN FOR EDUCATIONAL WEB AND MOBILE APPLICATIONS
BASELINE SECURITY TEST PLAN FOR EDUCATIONAL WEB AND MOBILE APPLICATIONS Published by Tony Porterfield Feb 1, 2015. Overview The intent of this test plan is to evaluate a baseline set of data security practices
More informationWhite Paper BMC Remedy Action Request System Security
White Paper BMC Remedy Action Request System Security June 2008 www.bmc.com Contacting BMC Software You can access the BMC Software website at http://www.bmc.com. From this website, you can obtain information
More informationHP Operations Orchestration Software
HP Operations Orchestration Software Software Version: 9.00 HP Business Availability Center Integration Document Release Date: June 2010 Software Release Date: June 2010 Legal Notices Warranty The only
More informationCopyright 2014 Jaspersoft Corporation. All rights reserved. Printed in the U.S.A. Jaspersoft, the Jaspersoft
5.6 Copyright 2014 Jaspersoft Corporation. All rights reserved. Printed in the U.S.A. Jaspersoft, the Jaspersoft logo, Jaspersoft ireport Designer, JasperReports Library, JasperReports Server, Jaspersoft
More informationXerox DocuShare Security Features. Security White Paper
Xerox DocuShare Security Features Security White Paper Xerox DocuShare Security Features Businesses are increasingly concerned with protecting the security of their networks. Any application added to a
More informationTo install and configure SSL support on Tomcat 6, you need to follow these simple steps. For more information, read the rest of this HOW-TO.
pagina 1 van 6 Apache Tomcat 6.0 Apache Tomcat 6.0 SSL Configuration HOW-TO Table of Contents Quick Start Introduction to SSL SSL and Tomcat Certificates General Tips on Running SSL Configuration 1. Prepare
More informationCORISECIO. Quick Installation Guide Open XML Gateway
Quick Installation Guide Open XML Gateway Content 1 FIRST STEPS... 3 2 INSTALLATION... 3 3 ADMINCONSOLE... 4 3.1 Initial Login... 4 3.1.1 Derby Configuration... 5 3.1.2 Password Change... 6 3.2 Logout...
More informationIntegration Guide. SafeNet Authentication Service. Oracle Secure Desktop Using SAS RADIUS OTP Authentication
SafeNet Authentication Service Integration Guide Oracle Secure Desktop Using SAS RADIUS OTP Authentication Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013
More informationConfiguring Nex-Gen Web Load Balancer
Configuring Nex-Gen Web Load Balancer Table of Contents Load Balancing Scenarios & Concepts Creating Load Balancer Node using Administration Service Creating Load Balancer Node using NodeCreator Connecting
More informationSDK Code Examples Version 2.4.2
Version 2.4.2 This edition of SDK Code Examples refers to version 2.4.2 of. This document created or updated on February 27, 2014. Please send your comments and suggestions to: Black Duck Software, Incorporated
More informationLabVIEW Internet Toolkit User Guide
LabVIEW Internet Toolkit User Guide Version 6.0 Contents The LabVIEW Internet Toolkit provides you with the ability to incorporate Internet capabilities into VIs. You can use LabVIEW to work with XML documents,
More informationInstallation Guide for contineo
Installation Guide for contineo Sebastian Stein Michael Scholz 2007-02-07, contineo version 2.5 Contents 1 Overview 2 2 Installation 2 2.1 Server and Database....................... 2 2.2 Deployment............................
More informationSOA Software API Gateway Appliance 7.1.x Administration Guide
SOA Software API Gateway Appliance 7.1.x Administration Guide Trademarks SOA Software and the SOA Software logo are either trademarks or registered trademarks of SOA Software, Inc. Other product names,
More information2 Downloading Access Manager 3.1 SP4 IR1
Novell Access Manager 3.1 SP4 IR1 Readme May 2012 Novell This Readme describes the Novell Access Manager 3.1 SP4 IR1 release. Section 1, Documentation, on page 1 Section 2, Downloading Access Manager 3.1
More informationCentraSite SSO with Trusted Reverse Proxy
CentraSite SSO with Trusted Reverse Proxy Introduction Single-sign-on (SSO) via reverse proxy is the preferred SSO method for CentraSite. Due to its flexibility the reverse proxy approach allows to apply
More informationFTP, IIS, and Firewall Reference and Troubleshooting
FTP, IIS, and Firewall Reference and Troubleshooting Although Cisco VXC Manager automatically installs and configures everything you need for use with respect to FTP, IIS, and the Windows Firewall, the
More information1. Introduction. 2. Web Application. 3. Components. 4. Common Vulnerabilities. 5. Improving security in Web applications
1. Introduction 2. Web Application 3. Components 4. Common Vulnerabilities 5. Improving security in Web applications 2 What does World Wide Web security mean? Webmasters=> confidence that their site won
More informationInformatica Corporation Proactive Monitoring for PowerCenter Operations Version 3.0 Release Notes May 2014
Contents Informatica Corporation Proactive Monitoring for PowerCenter Operations Version 3.0 Release Notes May 2014 Copyright (c) 2012-2014 Informatica Corporation. All rights reserved. Installation...
More informationUser-ID Features. PAN-OS New Features Guide Version 6.0. Copyright 2007-2015 Palo Alto Networks
User-ID Features PAN-OS New Features Guide Version 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 http://www.paloaltonetworks.com/contact/contact/
More informationIdentity Server Guide Access Manager 4.0
Identity Server Guide Access Manager 4.0 June 2014 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF
More informationCentral Administration User Guide
User Guide Contents 1. Introduction... 2 Licensing... 2 Overview... 2 2. Configuring... 3 3. Using... 4 Computers screen all computers view... 4 Computers screen single computer view... 5 All Jobs screen...
More informationIntegrating VoltDB with Hadoop
The NewSQL database you ll never outgrow Integrating with Hadoop Hadoop is an open source framework for managing and manipulating massive volumes of data. is an database for handling high velocity data.
More informationCreating SOAP and REST Services and Web Clients with Ensemble
Creating SOAP and REST Services and Web Clients with Ensemble Version 2015.1 11 February 2015 InterSystems Corporation 1 Memorial Drive Cambridge MA 02142 www.intersystems.com Creating SOAP and REST Services
More informationEnterprise Service Bus
We tested: Talend ESB 5.2.1 Enterprise Service Bus Dr. Götz Güttich Talend Enterprise Service Bus 5.2.1 is an open source, modular solution that allows enterprises to integrate existing or new applications
More informationAppVet. Version 1.0. April 2014. Stephen Quirolgico Tom Karygiannis Jeff Voas
AppVet Version 1.0 April 2014 Stephen Quirolgico Tom Karygiannis Jeff Voas Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Any mention of commercial
More informationCompiere ERP & CRM Migration Instructions
Compiere ERP & CRM Migration Instructions Compiere Learning Services Division Copyright 2007 Compiere, inc. All rights reserved www.compiere.com Table of Contents Compiere ERP & CRM Migration Instructions
More informationNetIQ Access Manager 4.1
White Paper NetIQ Access Manager 4.1 Performance and Sizing Guidelines Performance, Reliability, and Scalability Testing Revisions This table outlines all the changes that have been made to this document
More informationCLC Server Command Line Tools USER MANUAL
CLC Server Command Line Tools USER MANUAL Manual for CLC Server Command Line Tools 2.5 Windows, Mac OS X and Linux September 4, 2015 This software is for research purposes only. QIAGEN Aarhus A/S Silkeborgvej
More informationEMC XDS Repository Connector for ViPR
EMC XDS Repository Connector for ViPR Version 1.8 Installation Guide EMC Corporation Corporate Headquarters Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com Legal Notice Copyright 2014-2015 EMC Corporation.
More informationNew Features... 1 Installation... 3 Upgrade Changes... 3 Fixed Limitations... 4 Known Limitations... 5 Informatica Global Customer Support...
Informatica Corporation B2B Data Exchange Version 9.5.0 Release Notes June 2012 Copyright (c) 2006-2012 Informatica Corporation. All rights reserved. Contents New Features... 1 Installation... 3 Upgrade
More informationConfiguring Single Sign-On from the VMware Identity Manager Service to Office 365
Configuring Single Sign-On from the VMware Identity Manager Service to Office 365 VMware Identity Manager JULY 2015 V1 Table of Contents Overview... 2 Passive and Active Authentication Profiles... 2 Adding
More informationForce.com Sites Implementation Guide
Force.com Sites Implementation Guide Salesforce, Winter 16 @salesforcedocs Last updated: October 16, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark
More informationMagento Search Extension TECHNICAL DOCUMENTATION
CHAPTER 1... 3 1. INSTALLING PREREQUISITES AND THE MODULE (APACHE SOLR)... 3 1.1 Installation of the search server... 3 1.2 Configure the search server for usage with the search module... 7 Deploy the
More informationConfiguration Guide - OneDesk to SalesForce Connector
Configuration Guide - OneDesk to SalesForce Connector Introduction The OneDesk to SalesForce Connector allows users to capture customer feedback and issues in OneDesk without leaving their familiar SalesForce
More informationCA SiteMinder. SAML Affiliate Agent Guide. 6.x QMR 6
CA SiteMinder SAML Affiliate Agent Guide 6.x QMR 6 This documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is
More informationThis document uses the following conventions for items that may need to be modified:
Contents Overview... 3 Purpose of this Document... 3 Conventions Used in this Document... 3 Before You Begin... 3 Setting Up HTTPS... 5 Creating a Certificate... 5 Configuring Contract Management to Use
More informationvcloud Air Platform Programmer's Guide
vcloud Air Platform Programmer's Guide vcloud Air OnDemand 5.7 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition.
More informationDISTRIBUTED CONTENT SSL CONFIGURATION AND TROUBLESHOOTING GUIDE
White Paper Abstract This white paper explains the configuration of Distributed Content (ACS, BOCS and DMS) in SSL mode and monitors the logs for content transfer operations. This guide describes the end-to-end
More informationManagement, Logging and Troubleshooting
CHAPTER 15 This chapter describes the following: SNMP Configuration System Logging SNMP Configuration Cisco NAC Guest Server supports management applications monitoring the system over SNMP (Simple Network
More informationRiverbed Cascade Shark Common REST API v1.0
Riverbed Cascade Shark Common REST API v1.0 Copyright Riverbed Technology Inc. 2015 Created Feb 1, 2015 at 04:02 PM Contents Contents Overview Data Encoding Resources information: ping information: list
More informationAcunetix Web Vulnerability Scanner. Getting Started. By Acunetix Ltd.
Acunetix Web Vulnerability Scanner Getting Started V8 By Acunetix Ltd. 1 Starting a Scan The Scan Wizard allows you to quickly set-up an automated scan of your website. An automated scan provides a comprehensive
More informationThe full setup includes the server itself, the server control panel, Firebird Database Server, and three sample applications with source code.
Content Introduction... 2 Data Access Server Control Panel... 2 Running the Sample Client Applications... 4 Sample Applications Code... 7 Server Side Objects... 8 Sample Usage of Server Side Objects...
More informationCertified Secure Web Application Security Test Checklist
www.certifiedsecure.com info@certifiedsecure.com Tel.: +31 (0)70 310 13 40 Loire 128-A 2491 AJ The Hague The Netherlands Certified Secure Checklist About Certified Secure exists to encourage and fulfill
More informationBitcoin Payment Gateway API
Bitcoin Payment Gateway API v0.3 BitPay, Inc. https://bitpay.com 2011-2012 BITPAY, Inc. All Rights Reserved. 1 Table of Contents Introduction Activating API Access Invoice States Creating an Invoice Required
More informationApplication Enablement Services. Web Services Programmer Guide Release 4.1 An Avaya MultiVantage Communications Application
Application Enablement Services Web Services Programmer Guide Release 4.1 An Avaya MultiVantage Communications Application 02-300362 Issue 4.0 December 2007 2007 Avaya Inc. All Rights Reserved Notice While
More informationOpenEMR: Achieving DICOM Interoperability using Mirth
OpenEMR: Achieving DICOM Interoperability using Mirth A ViSolve, Inc. Technical Guide TABLE OF CONTENTS Table of Contents 1. Objective... 3 2. DICOM Images... 3 3. DICOM Image Viewers... 4 4. Sending and
More informationIBM Operational Decision Manager Version 8 Release 5. Getting Started with Business Rules
IBM Operational Decision Manager Version 8 Release 5 Getting Started with Business Rules Note Before using this information and the product it supports, read the information in Notices on page 43. This
More informationAn Oracle White Paper June 2014. RESTful Web Services for the Oracle Database Cloud - Multitenant Edition
An Oracle White Paper June 2014 RESTful Web Services for the Oracle Database Cloud - Multitenant Edition 1 Table of Contents Introduction to RESTful Web Services... 3 Architecture of Oracle Database Cloud
More informationApplication Interface Services Server for Mobile Enterprise Applications Configuration Guide Tools Release 9.2
[1]JD Edwards EnterpriseOne Application Interface Services Server for Mobile Enterprise Applications Configuration Guide Tools Release 9.2 E61545-01 October 2015 Describes the configuration of the Application
More informationBusiness Interaction Server. Configuration Guide. 10300685-000 Rev A
Business Interaction Server Configuration Guide 10300685-000 Rev A 2008 Kofax Image Products, Inc., 16245 Laguna Canyon Road, Irvine, California 92618, U.S.A. All rights reserved. Use is subject to license
More informationEgnyte Single Sign-On (SSO) Installation for OneLogin
Egnyte Single Sign-On (SSO) Installation for OneLogin To set up Egnyte so employees can log in using SSO, follow the steps below to configure OneLogin and Egnyte to work with each other. 1. Set up OneLogin
More informationIntegrating ConnectWise Service Desk Ticketing with the Cisco OnPlus Portal
Integrating ConnectWise Service Desk Ticketing with the Cisco OnPlus Portal This Application Note explains how to configure ConnectWise PSA (Professional Service Automation) application settings and Cisco
More informationApplication Security Policy
Purpose This document establishes the corporate policy and standards for ensuring that applications developed or purchased at LandStar Title Agency, Inc meet a minimum acceptable level of security. Policy
More informationFileMaker Server 12. FileMaker Server Help
FileMaker Server 12 FileMaker Server Help 2010-2012 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker is a trademark of FileMaker, Inc.
More informationConfiguring Single Sign-on for WebVPN
CHAPTER 8 This chapter presents example procedures for configuring SSO for WebVPN users. It includes the following sections: Using Single Sign-on with WebVPN, page 8-1 Configuring SSO Authentication Using
More informationMultiSite Manager. User Guide
MultiSite Manager User Guide Contents 1. Getting Started... 2 Opening the MultiSite Manager... 2 Navigating MultiSite Manager... 2 2. The All Sites tabs... 3 All Sites... 3 Reports... 4 Licenses... 5 3.
More informationReplacements TECHNICAL REFERENCE. DTCCSOLUTIONS Dec 2009. Copyright 2009 Depository Trust Clearing Corporation. All Rights Reserved.
TECHNICAL REFERENCE Replacements Page 1 Table of Contents Table of Contents 1 Overview... 3 1.1 Replacements Features... 3 2 Roles and Responsibilities... 4 2.1 Sender (Receiving Carrier)... 4 2.2 Recipient
More informationEMC ApplicationXtender Server
EMC ApplicationXtender Server 6.0 Monitoring Guide P/N 300 008 232 A01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748 9103 1 508 435 1000 www.emc.com Copyright 1994 2009 EMC Corporation. All
More informationLoad Balancing. Outlook Web Access. Web Mail Using Equalizer
Load Balancing Outlook Web Access Web Mail Using Equalizer Copyright 2009 Coyote Point Systems, Inc. Printed in the USA. Publication Date: January 2009 Equalizer is a trademark of Coyote Point Systems
More informationKC Data Integration Web Service Developer Guide
KC Data Integration Web Service Developer Guide Kewill Copyright Notice Copyright 2016 by Kewill Inc. All rights reserved. This document is the property of Kewill and the information contained herein is
More informationSophos Mobile Control Technical guide
Sophos Mobile Control Technical guide Product version: 2 Document date: December 2011 Contents 1. About Sophos Mobile Control... 3 2. Integration... 4 3. Architecture... 6 4. Workflow... 12 5. Directory
More informationRevolution R Enterprise DeployR 7.1 Enterprise Security Guide. Authentication, Authorization, and Access Controls
Revolution R Enterprise DeployR 7.1 Enterprise Security Guide Authentication, Authorization, and Access Controls The correct bibliographic citation for this manual is as follows: Revolution Analytics,
More informationKMx Enterprise: Integration Overview for Member Account Synchronization and Single Signon
KMx Enterprise: Integration Overview for Member Account Synchronization and Single Signon KMx Enterprise includes two api s for integrating user accounts with an external directory of employee or other
More informationEMC ApplicationXtender Server
EMC ApplicationXtender Server 6.5 Monitoring Guide P/N 300-010-560 A01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com Copyright 1994-2010 EMC Corporation. All
More informationNote: With v3.2, the DocuSign Fetch application was renamed DocuSign Retrieve.
Quick Start Guide DocuSign Retrieve 3.2.2 Published April 2015 Overview DocuSign Retrieve is a windows-based tool that "retrieves" envelopes, documents, and data from DocuSign for use in external systems.
More information