IBM Global Sales & Distribution Client Enablement Guide
|
|
|
- Rosanna Sherman
- 10 years ago
- Views:
Transcription
1 IBM Global Sales & Distribution Client Enablement Guide Your guide to enabling electronic transactions with IBM
2 1.0 About This Guide Best Practice for a Successful Project IBM s Commitment to Success Your Commitment to Success Business Assumption Technical Assumptions Best Practice: Punchout Catalogue/Electronic Order Routing Catalogue Options Punchout Catalogue (Suppler Hosted) Local Catalogue (Buyer Hosted) Order Management Process Electronic Orders Orders Reports Boarding Plan and Schedule What Does It Mean to Board Support from IBM s Boarding Team Overview of the 10-Step Boarding Process Test Phases Test Scenarios Test Data Sample Test Plan Move to Production Security HTTPS Protocol Digital Certificates Technical Support Help Desk Support & Problem Reporting Level 2 Team for Deeper Technical Support 15 Appendix A 16 Supplier Networks and associated external protocols supported 16 Sample data mapping documents 17 Message type Definitions 17 xcbl Message 17 A. What is xcbl? 17 B. IBM Gateway xcbl Standard Support 17 cxml Message 17 A. What is cxml? 17 B. IBM EGW cxml Requirements 17 Appendix B Punchout Demo Sites 18 A. cxml Protocol 18 B. OCI Protocol 18 C. Oracle Protocol 18 Appendix C PunchoutCatalog Process 19 Appendix D Sample CIF Catalog 22 Appendix E HTTP Return Codes 23 Appendix F Help Desk Contact Information 25 Appendix G Severity and Response Definitions 26 Appendix H Problem Ticket Template 28 2
3 1.0 About This Guide 2.0 Best Practices for a Successful Project The purpose of this document is to guide our clients through the process of implementing secure electronic transactions with IBM.. This guide describes IBM s capabilities, what to expect during the implementation, and includes best practices gained from working with a wide range of clients. As we work through the process together, you ll have the full support of IBM. To meet our client requirements, IBM has a B2B gateway for connectivity with individual comp, supplier networks and IBM Business Partners. With this guide you ll better understand the technical details, prerequisites and the connectivity data necessary to implement an electronic connection with IBM s gateway. You ll have a fuller understanding of the steps within the process and the pros and cons of options to consider for Catalogue and Order Management. The focus of this guide is eprocurement systems and supplier networks that support cxml, OCI, xcbl, Oracle OAG, SAP EBP, SAP SRM and SAP XML IDOC. 2.1 IBM s Commitment to Success We are committed to providing you an accurate and efficient epurchasing process -- one that provides your users with a personalized and user-friendly experience with IBM. Your ibm.com Representative is your primary point of contact and will work closely with you, IBM s Boarding Team, and your technical team, to streamline your ordering experience with IBM. The IBM Boarding Team provides technical guidance across multiple topics such as: punchout catalogues, local catalogues, special local catalogues, purchase orders / purchase order responses, and invoices. They also have expertise in formed messages and the order management flow within IBM s fulfillment system. 2.2 Your Commitment to Success Feedback from our clients highlighted that internal commitment was key to a successful implementation. We recommend that each client secure commitment for: A technical team with whom we can work on your implementation A mutually-agreed project schedule with key dates that we work toward together. For customers wishing a closed-loop Purchase-to-Pay process, then process owners for the complete cycle are recommended. 3
4 2.3 Business Assumption A prerequisite is agreed terms for electronic purchases with IBM. We can assist in evaluating whether current terms are mutually acceptable, and if additions required, establish an appropriate contract addendum. 2.4 Technical Assumptions To exchange electronic documents we assume that the following base capabilities are in place: Punchout Catalogue: With a punchout catalogue, your company will receive a dynamic real-time catalogue that contains detailed product information, pricing and product images. Electronic Order Routing: By choosing electronic order routing over routing, your company benefits from a fully automated order flow where manual touch points are minimized and order fulfillment is as efficient as possible. HTTPS capability to access punchout catalogues using OCI, cxml, and Oracle or local catalogue capabilities Ability to submit electronic orders using an industry format (cxml, xcbl, SAP XML, SAP EBP, Oracle OAG and RosettaNet) Capability to URL-encode requests and messages to the gateway Predefined connectivity standards for your company such as connectivity data, sample messages and certificates The IBM gateway provides the supporting infrastructure for this best practice and acts as the interface for a range of electronic interactions and integration with the business systems of IBM and our trading partners. It has two primary components: Punchout Gateway and Order Management. Punchout Gateway: this component enables a client to access their IBM Catalogue securely and reliably from their own eprocurement system. Please note: IBM will provide URL and credential information as needed throughout the project 2.5 Best Practice: Punchout Catalogue/Electronic Order Routing Having worked with clients in multiple sectors, locations and companies of various sizes, there is a common theme: our clients want to optimize and automate the entirety of their purchasing process to reduce costs. To achieve that objective, we recommend a fully automated solution characterized by low maintenance and touch less order flows. Our Punchout Catalogue/Electronic Order implementation offers the best solution for our clients and we encourage all of our clients to pursue this automated solution. We will work diligently with you to achieve this best practice and its associated benefits. Order management: this component accepts client s purchase orders, performs automated verifications, and routes the orders to IBM s internal fulfillment system. 4
5 3.0 Catalogue Options IBM can accommodate either a catalogue that IBM provides for you within our infrastructure (supplier-hosted) as a best practice or one that your company hosts (buyer-hosted). 3.1 Punchout Catalogue (Supplier-Hosted) With a supplier-hosted catalogue, IBM provides you with a website that can communicate directly with your eprocurement application using cxml, OCI or OAG. This process of shopping on the IBM website, by clicking on a button within your eprocurement application is commonly referred to as Punchout, Roundtrip, or Link out. Punchout or Roundtrip is IBM s recommended method of catalogue delivery. Punchout catalogues are live, interactive catalogues that are hosted on the IBM website. Clients have the ability to link to these catalogues over the Internet using their eprocurement systems. Your company designated employees can shop the IBM catalogue, configure and price products, and add IBM services before importing the shopping cart into your company s eprocurement system. Once the shopping cart is in your company s eprocurement system it is within your control for activities such as routing and approvals. The shopping cart is ultimately converted to an electronic order that can then be transferred to IBM. Details of the Punchout catalogue process for your eprocurement system are explained in documentation provided by your provider. IBM s punchout catalogue capabilities offer buyers within your company many features that are associated with shopping via the Internet such as: Simple navigation to browse products and prices, configure IBM systems, build and save a shopping cart, as well as initiate online transactions Choices of payment methods included purchase orders and credit cards Tailored catalogue content with your company s pricing information and choices of offerings that your company pre-selects for purchase or lease directly from IBM Additional unique features are available, for example, IBM can integrate your company s approved standards into the catalogue limiting buyers in your organization to only those your company wishes to support. We can also provide suggested configurations to assist your buyers. Finally we can structure access levels with you to protect against unauthorized users from performing certain tasks within the site. Benefits for choosing our supplier-hosted catalogues: 1. Punchout catalogues are simple to navigate via user-friendly catalogue and search functions 2. Detailed product information and specifications are provided 3. Order placed from the from the supplier-hosted catalogue have a higher degree of accuracy 4. Minimized maintenance for both you and IBM 5
6 5. Your company s eprocurement system investment is maximized through the consolidation of the shopping experience and order submission processes into one consistent process 6. Products can be configured within the shopping experience 7. IBM will build and maintain the punchout catalogue to contain your entitled products with negotiated pricing 8. Content within the punchout catalogue is updated on a real-time basis 9. Configured products can be placed into the shopping cart and saved for later use or repeat purchases 10. Your company s users can be limited to the set of navigational hyperlinks determined by your organization Please note: Appendix B contains the information to access a demonstration punchout catalogue for each of the IBMsupported protocols. 3.2 Local Catalogue (Buyer-Hosted) Buyer-hosted catalogues (also known as local catalogues) are an alternative to the Punchout catalogue. Local catalogues are flat files or spreadsheets that are either hosted within your company s eprocurement system or the supplier network your company has chosen to work with. The local catalogue can be provided in a variety of formats, including CIF 3.0, spreadsheet, delimited text. 6
7 The Catalog Interchange Format (CIF) catalog is the standard format that can be provided by IBM. CIF is a general-purpose catalog description format that is commonly used by many types of procurement systems. In either a spreadsheet or a comma delimited form, the CIF catalog can be delivered for upload into your company s eprocurement system on a monthly, quarterly, annual or on demand basis. Please note: The CIF Catalog format can be found in Appendix D. If your company requires a format other than CIF, IBM may be able to build a specialized solution for you. This option should be discussed with your ibm.com Representative. Please note: We are happy to provide 6 and 8-digit UNSPSC commodity codes with our products, and can provide you with a list of UNSPSC codes that are commonly included in a customer catalogue. However, we are unable to provide a complete list of the UNSPSC codes to be in your catalogue until it is built per your product selections. 4.0 Order Management Process To begin shopping, users within your company log into your company s eprocurement system and begin to shop the IBM catalogue of offerings (using either the pre-established punchout or local catalogue). Once the user has selected products, your company s eprocurement system receives a shopping cart and performs any preset approval routing your company may have in place. The gateway can then receive the electronic purchase order directly from your company s eprocurement application or via a supplier network your company may work with such as: Ariba Supplier Network (ASN) SciQuest Quadrem IBX Oracle Exchange Hubwoo IBM can also receive orders via , fax, and EDI. In some cases IBM can also provide order status and advance ship notice for orders that were sent successfully via XML. These XML transactions are sent back to the supplier network or to a URL that you can specify 4.1 Electronic Orders In most cases, transactions can be seen as an interaction between two trading partners. In the case of the gateway, the buyer (IBM client) initiates the transaction and the seller (IBM) is the one who is fulfilling a purchase order. In a typical flow, the transaction progresses through six steps. 7
8 1. The buyer starts a transaction by sending a purchase order request to IBM from the supplier network or eprocurement system. and checks and accepts only those documents that are valid and adhere to the Document Type Definition (DTD) for each message type (cxml, xcbl, Oracle, SAP, etc). 2. The supplier network or eprocurement system transmits the purchase order to the gateway via a secure URL associated with purchase orders. 3. Upon receiving the request, the gateway authenticates the supplier network, trading partner, order, performs initial message format verification, and sends an acknowledgment back to the supplier network or eprocurement system 4. The IBM gateway passes the transaction to IBM s internal fulfillment system 5. The IBM fulfillment system processes, ships, and invoices the order 6. Order confirmation is sent back to the your supplier network or eprocurement system Electronic Order Validation, Checking and Acceptance: The gateway will send Order Acknowledgments (200 OK) or error messages (400, 500, etc) in response to orders received. We utilize standard HTTP codes highlighted in Appendix E: HTTP Return Codes. The gateway authenticates the message 4.2 Orders An order is an alternate solution to the electronic order process and is an interim approach to the automated process. The catalogue shopping experience can either be through the punchout or the local catalog process. However, the order submission method is via . The supplier network will be configured with IBM s B2B address and all orders will be routed to the specified . Once the order has been submitted via , a Customer Service Representative follows a predetermined process for entering the order into the IBM fulfillment system for processing and fulfillment. This is not considered a best practice and precludes the ability to further automate the purchase-to-pay process. 4.3 Reports Most leading supplier networks provide robust reporting capabilities to support your business across multiple suppliers. At this time IBM does not seek to duplicate that capability or provide additional reporting. You can review your supplier network documentation for the reporting capabilities offered. 8
9 5.0 Boarding Plan and Schedule 5.1 What Does It Mean to Board By using the term board, we are referring to the completion of the necessary steps to enable electronic transactions with IBM. Connectivity between many leading supplier networks and the gateway is already in place. If the connection with the supplier network your company has chosen is already in place, IBM will work with you to board your company within your established and IBM-enabled supplier network. However, if connectivity with the supplier network your company uses is not yet in place we ll work to establish this connectivity by boarding the supplier network as well as boarding your company. In most cases we can work with your supplier network and your company to accomplish both in parallel. Our approach to boarding encompasses three major steps to ensure the secure, accurate and reliable exchanges of electronic messages between us. 1. Your IBM catalogue (local, punch-out or both) is set-up properly 2. You have the ability to successfully navigate your catalogue and shop for IBM products 3. The capability is in place for us to communicate and exchange messages through your eprocurement system, supplier network and the gateway. Should any of your needs change after the boarding takes place, such as an upgrade or change in your company eprocurement technology, relationship with supplier networks or relationship with IBM, we ll work with you on the changes, or at your request remove the connections between us. 5.2 Support from IBM s Boarding Team IBM has an experienced boarding team in place to provide you with technical support and guidance throughout the boarding process. The team s first step will be to work with the appropriate counterparts in your company to share data necessary to set-up the connection between your company s punchout and order management process and the gateway. The team will help establish and exercise a rigorous test plan with your company to check all the elements of the connection and implementation. If additional technical development is needed within IBM or your company, IBM will work to define and validate the specific technical requirements with IBM s developers - and with your company as appropriate. The boarding team will follow the boarding process and participate in the move to production activities. They ensure that the systems are interacting properly with orders successfully sent from your company and received/acknowledged by IBM. 9
10 The boarding team s activities span the following: The 5 main things we need from our clients are: Exchange, share and evaluate connectivity data Act as a technical liaison to establish and confirm connectivity Provide the tasks and schedule to support the project Coordinate and set-up the test plan Support test cases and testing status Coordinate and set-up of the move to production activities Monitor the systems and the initial order(s) Manage any required security certificates Manage the updates of any needed client profiles 5.3 Overview of the 10-Step Boarding Process IBM has refined a 10-step boarding process to enable your company (the buyer) initiating the transaction and IBM (the supplier) fulfilling the transaction. They include: 1. Business gap analysis 2. Technical gap analysis 3. Client boarding 4. Set-up of the supplier network/eprocurement system 5. Set-up of client information 6. Set-up supporting product catalogues 7. Set-up error-handling 8. Testing the process 9. Move to production 10. Validation of initial orders 1. Certificates (detailed in Section 6: Security) 2. Sample purchase order requests and purchase order responses 3. Sample punchout requests (for clients who opt for punchout catalogues) 4. Sample catalogue (if local is requested) 5. I/T engagement schedule (including maintenance windows, vacations, etc.) 5.4 Test Phases As part of the boarding project with you, IBM will develop and a proposed master test plan describing our recommended test strategy for connectivity, catalogue access, and order flow. Its purpose is to answer questions you may have such as What will be tested? How will it be tested? Who will do it and when? The plan documents system objectives, test objectives, test team roles and responsibilities, resource requirements, the test strategy, methods, and standards to be used for testing. It can be used as a vehicle to build a mutually agreeable test phase and act as a communication vehicle within your organization to describe how the process between your company and IBM will be tested. We propose, as a best practice, that we have three phases of testing: connectivity, message testing, and catalogue testing Connectivity Testing: This test phase will ensure that there is constant link a handshake between your compay s supplier network and IBM. 10
11 Test cases will be performed to ensure that purchase orders sent from the supplier network or eprocurement system to the gateway are successfully received and that messages are recorded accurately in a log. In turn, we test to ensure the gateway returns a receipt acknowledgment that confirms that the message has been received. Well-Formed Message Testing: These test cases validate the purchase order format and adherence to the message standards. The gateway is designed to accept messages that meet the respective cxml, xcbl, OCI, Oracle, and SAP standards. These test cases will focus on IBM s ability to accept and process the messages without exceptions. If there are issues with the validity and structure of the message, the gateway will return the appropriate error code. Once the Gateway has received and passed the message for structure validity, it must successfully transmit the message to the IBM order fulfillment system. These tests ensure that your company s purchase order or message flows through the IBM infrastructure successfully and without error. Once the purchase order or message is received and processed by the IBM fulfillment system, an order response will be sent back to your supplier network or eprocurement system. The IBM fulfillment system will also return shipment notices and Invoices, as appropriate. Punchout Catalogue Testing: These test cases will ensure that the IBM punchout URL within your company s supplier network or eprocurement system is properly set, the security between the systems is in place and that the catalogue functions properly. Once the punchout setup has been validated, tests will be conducted to confirm that, from within your systems, you arrive as intended at your catalogue. At this stage you should be able to navigate through the catalogue, perform shopping steps, and create a shopping cart. You ll also have the opportunity to visually inspect that elements on the pages are correct such as the logo, header, footer, product selection, and the overall design elements of the catalogue have displayed correctly. 5.5 Test Scenarios The testing scenarios in each of the three stages will be provided to you as part of the project. Each test scenario has a clear purpose, lists dependencies, provides instructions to perform the test and provides the results expected after the test scenario is completed. In total, these test scenarios comprehensively cover all aspects to verify the boarding of your company. 5.6 Test Data IBM will work with your team to identify a list of realistic test data conditions before testing begins, Our experienced systems engineer/data architects will work with you to define, create and load sufficient data to test the system to mutual satisfaction. 5.7 Sample Test Plan 11
12 5.8 Move to Production Once testing is complete, IBM will seek your company s concurrence to move the system to a production-ready state - that is to start using the system for actual ordering. IBM s technical representatives will provide their assessment of the readiness of the system as part of this process. Once that decision is made we follow these steps to go live : Confirm that IBM s gateway production certificates have been installed in your company s systems Confirm that your production certificates are installed in IBM s gateway Remove all test indicators (i.e. -T ) from any network Ids or credentials residing on your systems Confirm that all orders/messages refer to the Production URL for the gateway (versus the Test URL) Notify both IBM Support and IBM fulfillment that your will be going live Confirm that your company has received the proper contact information for support your IBM Help Desk Review of readiness and final decision to proceed with going live a Go/No-go decision Perform a cutover from testing environment to the live environment during predefined timeframes (maintenance time windows) 6.0 Security 6.1 HTTPS Protocol In the interest of all of our clients, IBM supports HTTPS (Hypertext Transfer Protocol over Secure Socket Layer) exclusively. This protocol is widely recognized as the secure version of HTTP. The HTTPS protocol provides a secure connection between your company and IBM, over which confidential data can be safely sent using the Internet. HTTPS involves the normal HTTP interaction over an encrypted Secure Sockets Layer (SSL). The HTTPS protocol provides authentication and encrypted communication and is widely used on the Web for security-sensitive information. Most browsers display a small icon in the form of a padlock or key indicating that the transmission of data is encrypted. IBM will provide the HTTPS URL to transmit orders that should be loaded in your eprocurement system. Please note: HTTPS is different than Secure HTTP to be transmitted over HTTPS. If your company can support HTTP and not HTTPS, please let us know. 6.2 Digital Certificates HTTPS and SSL support the use of digital certificates from the server so that, if necessary, a user can authenticate the sender. SSL is a unique and effective way to achieve data and ecommerce security. SSL uses a cryptographic system that employ two keys to encrypt data, firstly a public key known to the sender and receiver. The second is a private key known only to the recipient of the message. 12
13 To complete the connectivity between us there is a set of five security certificates that are needed for both the testing and actual technical environments: Server Certificate, Root Certificate, Client Certificate, Signature Verification Certificate and Credentials, and Shared Secrets. Server Certificate: A server certificate is a digital credential that identifies the server that uses the certificate for secure communications. Server certificates contain identifying information about the organization that owns the application, such as the system s distinguished name. The certificate also contains the system s public key. A server must have a digital certificate to use the Secure Sockets Layer (SSL) for secure communications. These certificates will be installed during the boarding project and subsequently installed a month prior to expirations. Most certificates expire either annually or semi-annually. The IBM team will alert your company 30 days prior to a certificate s expiration. We encourage you to provide new certificates promptly to avoid any disruption in business activities. Credentials and Shared Secrets: In addition to encryption, we have an added level of security using credentials and shared secrets. The IBM gateway authenticates all documents and requests it receives. This authentication process uses unique credentials sent in the message from your company s eprocurement system. These unique credentials are matched against the unique keys stored in the gateway. Client Certificate: A client certificate is a digital credential that identifies the sender. This certificate is a copy of the sender s private key which is used by the receiver to validate them during client authentication. Root Certificate: A root certificate can be either a Certificate Authority (CA) or a self-signed certificate. A root certificate is part of a public key infrastructure scheme. The standard method of securing transactions in cxml is the shared secret. A shared secret is typically an agreed-upon username/password combination that is contained within the message header. If the username/password pair from the user fails the authenticating step, an error message will be returned indicating that the message has been rejected. Signature Verification Certificate: A signature verification certificate is a copy of an object-signing certificate without that certificate s private key. You use the signature verification certificate s public key to authenticate the digital signature created with an object-signing certificate. Verifying the signature allows you to determine the origin of the object and whether it has been altered since it was signed. 13
14 7.0 Technical Support 7.1 Help Desk Support & Problem Reporting As part of IBM s commitment to your company you are entitled to two levels of technical support on an ongoing basis via the IBM Help Desk IBM s Electronic Response Center. Should any technical problems arise your comppany s first point of contact is the IBM Help Desk. Your IBM Representative can help you with questions you may have related to IBM products and pricing and the Help Desk is at your service for technical issues. The IBM Help Desk can be reached by [email protected] The process in place to support technical problems encountered is: 1. Users within your company report the problem to the IBM Help Desk via or phone (For Severity 1 problems both methods are recommended). If the customer deems a problem to be a critical severity 1 situation, they must call the help desk to provide problem details and their 24-hour contact information; they can follow up with a detailed The Help Desk will evaluate whether the problem can be solved immediately or whether additional assistance is required. If the Help Desk is able to solve the problem immediately, they will respond back to the person who reported the problem. When contacting the Help Desk, be sure to identify yourself as a B2B Customer and use B2B as a key word in the problem description. This will assist the Help Desk staff to direct the problem to the right support technicians within IBM. The format for the is highlighted in Appendix H: Problem Ticket Template. Once contacted, the Help Desk staff will open a problem ticket for investigation. At any time you are free to contact the Help Desk to get a status update on the problem resolution, please have the problem ticket number for reference. 3. If the Help Desk is not able to solve the problem, they will open a problem ticket using IBM s Problem Management System and route the ticket to the Level 2 support team, or the appropriate alternative support team, for further investigation. When speaking with the IBM Help Desk, you can help direct your problem ticket to their attention by specifying B2B when you report technical issues. 14
15 4. The support team will receive the problem ticket, and engage appropriate resources to resolve the issue. 5. The support team will update the problem ticket with current status as details change, and ensure the final resolution is included once it has been determined. 6. Once solved, the problem resolution will be communicated to the problem reporter for sign-off Severity 1 Problems: All problems are triaged by means of designating the severity of the problem. Severity 1 is the highest level that can be designated and is treated as an emergency with round-the-clock attention to resolve the problem. If you are experiencing a Severity 1 technical issue you can call the help desk directly at either: or You ll be asked to provide the details of the problem and a contact number where you can be reached at any time. IBM will be working on an emergency basis throughout a 24-hour day and will need your contact information also on a 24-hour basis. 7.2 Level 2 Team for Deeper Technical Support The Level 2 Team is a specialized team familiar with the gateway and technical connectivity. In most cases, this is the team that will resolve any reported problems. The Level 2 technical support team operates on a 24x7 schedule with teams in Raleigh, NC USA, Dalian, China, and Bangalore, India. The Raleigh, NC based team has standard scheduled hours between 8:00am 5:00pm Eastern Standard Time. The China-based team is available from 8:30pm midnight Eastern Standard Time. The India-based team is available from midnight to 8:00am Eastern Standard Time. In Severity 1 situations, this team is called upon at any hour for emergency problem resolution purposes. Please note: Planned outages and general informational notices that don t need problem determination can be sent directly to IBM s Level 2 support team at [email protected]. com. 15
16 Appendix A Supplier Networks and associated external protocols supported Supplier Network Protocol / Format Name supported Ariba IBX Quadrem Hubwoo SAP XML SAP EBP Oracle Xign Ketera SciQuest Maximo cxml xcbl xcbl xcbl IDOC EbpXml cxml OAG EDI X12 cxml cxml cxml 16
17 Sample data mapping documents: Order Protocol Orders Response Invoice cxml xcbl EDI X12 EDIFACT RosettaNet (Contact your ibm.com representative for more information) Message type Definitions: cxml Message: A. What is cxml? cxml is a protocol intended for communication of business documents between procurements applications, e-commerce hubs and suppliers. cxml is based on XML and provides formal XML schemas for standard business transactions, allowing programs to validate documents without prior knowledge of their form. B. IBM EGW cxml Requirements: 1. Some of our products do not have an 8 digit UNSPSC code, so we use the closest 6 digit code and add 00 as the 7th and 8th digits. xcbl Message : A. What is xcbl? xcbl is the pre-eminent XML component library for businessto-business e-commerce. xcbl is a set of XML business documents and their components, distributed freely here on xcbl.org. In addition to using the business documents provided, you can also use the component library to build your own documents. Either way, using xcbl promotes interoperability between applications. 2. We do not provide 9th and 10th digit UNSPSC codes. 3. We provide UNUOM (unit of measure) for all of our products. All these unit of measures are EA as in each. 4. We evaluate custom fields on an individual basis. 5. We do not provide images or product detail URLs in our buyer-hosted catalogs. B. IBM Gateway xcbl Standard Support: 1. The IBM gateway supports xcbl messages wrapped in Mime or MML. We can now support SOAP envelopes and will soon support simple xcbl without envelopes. 2. The version support is xcbl 3.0 and We accept orders that include non-catalog items although these cannot be processed and fullfiled in a touchless manner. 7. We do not accept change orders or cancel orders. 8. We do not accept orders that have attachments. 9. We do not provide market price. 10. We do not accept orders with multiple bill to addresses or multiple payment methods per order 11. We do not provide lease prices in the catalog. 12. We do not accept lease prices in the purchase order 17
18 Appendix B Punchout Demo Sites The credential for checking Punchout Demo site are as follows: A. cxml Protocol cxml Punchout URL ahe/cvt/punchoutgateway/protocols/cxml/punchout.wss <From> <Credential domain= NetworkID > <Identity>cXMLDemo-T </Identity> </Credential> </From> <To> <Credential domain= DUNS > <Identity> T </Identity> </Credential> </To> <Sender> <Credential domain= AribaNetworkUserId > <Identity>[email protected]</Identity> <SharedSecret>ariba2003</SharedSecret> </Credential> <UserAgent>CatalogTester</UserAgent></Sender> </Header> C. Oracle Protocol Oracle punchout URL punchoutgateway/protocols/oracle/punchout.wss username - OracleDemo-T password - demosecret Oracle Protocol punchout sites can be tested using attached backdoor views. OCI_Punchout.zip B. OCI Protocol OCI Punchout URL punchoutgateway/protocols/oci/logon.wss USERNAME = OCIDemo-T PASSWORD = demosecret OCI Protocol punchout sites can be tested using attached backdoor views. Oracle_Punchout.zip 18
19 Appendix C Punchout Catalog Process The following images are designed to show you the navigation and configurator capability on a typical IBM punchout page. The catalog images provided below represent what will be viewed within the users eprocurement page wrapper that will vary depending on the eprocurement application. The following sample page provides the user with the ability to do a quick lookup on model numbers, prices and related items. In addition, the Quick Order and ServicePac capabilities allow for easy product searching by part number and product specific ServicePacs 19
20 By selecting the Add Options link for any product will lead you into the Accessories and Options page that allows for easy configuration of the selected product. In this particular example, the user is allowed to create and name their configurations, and select among several memory options. Once the user has selected the desired options, a summary of the configured product can be viewed and then added to the shopping cart. Once the user has selected the desired options, the configured product may then be added to the current user shopping cart. 20
21 After clicking on the Add to Shopping Cart button, the Shopping Cart page is displayed. Here the user can check order contents, verify the products in the cart, the quantity ordered and the total price. At this point, the user may change quantity, remove items from the cart, continue shopping, or checkout. Note: the Requested Delivery Date on the shopping cart page will not be recognized. The Requested Delivery Date entered into your e-procurement application and sent in the XML purchase order will be the only date that is recognized. After clicking Proceed to Checkout, the shopping cart will be transferred back to the user s e-procurement application. 21
22 Appendix D Sample CIF Catalog The attributes of a record in a standard Local Catalog (often referred to as CIF) are the following: Supplier ID Supplier Part ID Manufacturer ID Item Description UNSPSC Code Unit Price Unit of Measure Lead Time Manufacturer Name Supplier URL Manufacturer URL Market Price Supplier Part Auxiliary ID The following is a sample of a Local Catalog in the CIF format: CIF_I_V3.0 LOADMODE:F CODEFORMAT:UNSPSC CURRENCY:USD DUNS:TRUE UNUOM:TRUE CHARSET:iso COMMENTS:This is a local file for Acme Storm Door Company ITEMCOUNT:3 TIMESTAMP: :41: FIELDNAMES:Supplier ID,Supplier Part ID,Manufacturer Part ID,Item Description,SPSC Code,Unit Price,Unit of Measure,Lead Time,Manufacturer Name,Supplier URL,Manufacturer URL,Market Price,Supplier Part Auxiliary ID DATA ,1871D33,1871D33, Lenovo ThinkPad T43 PM GHz, 2x512MB, 60GB 7200rpm, Intel 2200abg wireless, DVD/CDRW Combo Drive, XPPro OS, , 1,140.00,E A,14,Lenovo,,,0, contract= salesorgid= 9147 salesoffice= ,2672A43,2672A43, Lenovo ThinkPad X32 PM GHz, 1GB (2x512), 60GB 5400rpm, Intel 2200abg wireless, USB DVD/CDRW Combo Drive, XPPro OS, , 1,320.00,EA,14,Lenovo,,,0, contract= salesorgid= 9147 salesoffice= ,2668C54,2668C54, Lenovo ThinkPad T43P PM 740, 2GB RAM, 14.1 inch SXGA display, 60GB 7200RPM hard drive, Intel 2200bg wireless, DVD recordable drive, WinXP Pro, , 1,999.00,EA,14,Lenovo,,,0, contract= salesorgid= 9147 salesoffice= 9147 ENDOFDATA 22
23 Appendix E HTTP Return Codes Code # Type Browser Error Message Description 200 Success OK This is the normal response where a page has been successfully fetched 201 Success Created A new address has been created through the use of form posting, perl, cgi, etc. 202 Success Accepted The request has been accepted (keep in mind that the request has been accepted, not completed). 301 Redirection Moved Permanently Page has moved permanently. Usually a response from implementing a 301 redirect 302 Redirection none Page has moved temporarily 304 Redirection none Page has not been modified since last request (this is an OK response) 400 Client Error Code Bad Request The request could not be understood by the server due to incorrect syntax. 401 Client Error Code Unauthorized User authentication is required. 403 Client Error Code Forbidden The server understood the request, but is refusing to fulfill it. 404 Client Error Code Page Not Found The server has not found anything matching the Request-URI. 405 Client Error Code Method Not Allowed The method specified in the Request-Line is not allowed for the resource identified by the Request-URI. 406 Client Error Code Not Acceptable The server cannot generate a response that the requestor is willing to accept. 407 Client Error Code Proxy Authentication This code is similar to 401 (Unauthorized), but indicates Required that the client must first authenticate itself with the proxy. 408 Client Error Code Request Timed Out The server stopped waiting for a client request. 409 Client Error Code Conflict The request could not be completed due to a conflict with the current state of the resource. 410 Client Error Code Gone The requested resource is no longer available at the server and no forwarding address is known. This condition is similar to 404, except that the 410 error condition is expected to be permanent. 23
24 Appendix E HTTP Return Codes (continued) Code # Type Browser Error Message Description 411 Client Error Code Length Required The server requires a content-length in the request 412 Client Error Code Precondition Failed The precondition given in one or more of the request-header fields evaluated to false when it was tested on the server. 413 Client Error Code Request Entity Too Large The server is refusing to process a request because the request entity is larger than the server is willing or able to process. 414 Client Error Code Request URL Too Long The server is refusing to service the request because the Request- URI is longer than the server is willing to interpret. 415 Client Error Code Unsupported Media Type The server is refusing to service the request because the entity of the request is in a format not supported by the requested resource for the requested method. 500 Server Error Code Internal Server Error Internal Web server error 501 Server Error Code Not Implemented Function not implemented in Web server software 502 Server Error Code Bad Gateway Bad gateway; a server being used by this Web server has sent an invalid response. 503 Server Error Code Service Unavailable Service unavailable because of temporary overload or maintenance. 504 Server Error Code Gateway Timeout A server being used by this server has not responded in time. 505 Server Error Code HTTP Version Not The server does not support the HTTP protocol version that was Supported used in the request message. 24
25 Appendix F Help Desk Contact Information IBM Support Issue Sales and Product Configuration Order Status Product Specific Technical Contact Resources US: SHOP-IBM ( ) or Non US: US: or Non US: US: IBM-SERV ( ) or Non US: B2B Catalogue Technical International Canada and United States Toll Free Help Desk [email protected] All Other Issues US: IBM-4YOU ( ) or Non US: 25
26 Appendix G Severity and Response Definitions Inquiries will be responded to within 1 business day, meaning either solved or, as a minimum, an acknowledgement including when an answer or a solution can be expected. Problem Severity definitions and the Response targets follow. Severity 1 Business impact Business is immediately impacted resulting in critical loss of revenue and/or critically significant customer impact: Total service is unavailable or unusable for all users Critical service component (infrastructural or application) is unavailable or unusable for all users Total failure of network connectivity Critically degraded performance resulting in service being unable to function at a rate required to meet critical business objectives No work around available Severity 2 Business impact Business is significantly impacted: Total service unavailable to some users Non-critical service component (infrastructural or application) is unavailable or unusable for all users Service performance is significantly degraded Problem that would fulfill Sev 1 criteria but for work around being available involving significant effort Problem that has potential to become Sev 1 if not resolved Response IBM and Client will implement immediate continuous efforts to resolve system problems until the problem is circumvented and/or permanently resolved. If a severity 1 problem is raised by the Client, it is expected that a contact from the IBM Help Desk is available 24x7 until the problem is solved. Resolution target is 24 hours. Problem originator must contact the IBM ERC (Level 1) via telephone to provide problem details and their 24-hour contact information. The problem originator can follow up with a detailed if they desire. The problem reporting template is found in Addendum H of this document. Response IBM and Client will implement efforts to resolve system problems until the problem is circumvented and/or permanently resolved. Resolution target is 3 calendar days. Problem originator must contact the IBM ERC (Level 1) via telephone or via using the template in Addendum H of this document. The Time flows from the first of these contacts. 26
27 Appendix G Severity and Response Definitions (continued) Severity 3 Business impact Business is minimally impacted: Non-critical service component (infrastructural or application) is unavailable or unusable for some users Problem that would fulfill Sev 1 criteria but for work around being available involving minimal / no effort Problem that would fulfill Sev 2 criteria but for work around being available involving significant effort Service performance is minimally degraded Problem that has potential to become Sev 2 if not resolved Response IBM and Client will implement efforts to resolve system problems until the problem is circumvented and/or permanently resolved. Resolution target is 7 calendar days. Problem originator must contact the IBM ERC (Level 1) via telephone or via using the template in Addendum H of this document. The Time flows from the first of these contacts. Severity 4 Business impact Business is not immediately impacted: Problem that would fulfill Sev 2 criteria but for work around being available which involves minimal / no effort Problem that would fulfill Sev 3 criteria but for work around being available Problem that has potential to become Sev 3 if not resolved Problem record for problem that has been resolved but is awaiting completion of text update Response IBM and Trading Partner will implement efforts to resolve system problems until the problem is circumvented and/or permanently resolved. Resolution target is 30 calendar days. Problem originator must contact the IBM ERC (Level 1) via telephone or via using the template in Addendum H of this document. The Time flows from the first of these contacts.. 27
28 Appendix H Problem Ticket Template This B2B Problem Report template is to be used by the Client to report problems of any severity to the applicable IBM Level 1 support team. When speaking with the IBM Help Desk, you can help direct your problem ticket to their attention by specifying B2B when you report technical issues. Use the following template when opening the Severity 2 ticket: 1. Problem Abstract: Short Description 2. Employee Serial: Your employee serial, if applicable 3. Reporter s Information: Reporter s Name: address: Contact number(s): If needed Alternate contact person and number: 4. Application Name / Account ID: e.g., TxHub, CCE, B2B. 5. Workgroup: e.g., EGBNR_SMTXNINFO (TxHub), NUS_W_ASCCEWSL2 (CCE), NUS_N_B2BMAINT (B2B Level 2) 6. Problem Description: If applicable, use the B2B key word in the problem description. Include supplier, problem recreation steps, screen prints depicting problem, purchase order numbers, master order numbers, error return codes received as much information as possible. 28
29 Copyright IBM Corporation 2008 IBM Corporation New Orchard Road Armonk, NY U.S.A. ibm.com Produced in the United States of America All Rights Reserved. IBM, the IBM logo and ibm.com are trademarks or registered trademarks of International Business Machines Corporation in the United States, other countries, or both. Other company, product and service names may be trademarks or service marks of others. References in this publication to IBM products or services do not imply that IBM intends to make them available in all countries in which IBM operates.
PremierConnect Global B2B Capabilities Guide
PremierConnect Global B2B Capabilities Guide PremierConnect Global B2B Capabilities Guide Streamlined procurement. Increased efficiency. Welcome to PremierConnect our global end-to-end electronic procurement
HPE SLMS Business to Business Integration (B2Bi) Program
HPE SLMS Business to Business Integration (B2Bi) Program HPE Software Licensing and Management Solutions (SLMS) Business to Business Integration (B2Bi) Program Helping clients leverage their e-procurement
PremierConnect B2B Integration Guide
PremierConnect B2B Integration Guide Table of contents Your Guide to PremierConnect 3 PremierConnect Overview 3 Integration with Procurement 4 Applications and Supplier Networks The Dell Team Is Here to
TexasOnline TxSmartBuy Supplier Punch-Out Setup Process. Version: 1.0
TexasOnline Supplier Punch-Out Setup Process Version: 1.0 October 2009 Revision History Date Version Revision Description Author 10/27/09 1.0 Initial Version Josh Marcus (DC) Approvals Date Version Name
Security Digital Certificate Manager
System i Security Digital Certificate Manager Version 5 Release 4 System i Security Digital Certificate Manager Version 5 Release 4 Note Before using this information and the product it supports, be sure
Security Digital Certificate Manager
IBM i Security Digital Certificate Manager 7.1 IBM i Security Digital Certificate Manager 7.1 Note Before using this information and the product it supports, be sure to read the information in Notices,
SIP Messages. 180 Ringing The UA receiving the INVITE is trying to alert the user. This response MAY be used to initiate local ringback.
SIP Messages 100 Trying This response indicates that the request has been received by the next-hop server and that some unspecified action is being taken on behalf of this call (for example, a database
FF/EDM Intro Industry Goals/ Purpose Related GISB Standards (Common Codes, IETF) Definitions d 4 d 13 Principles p 6 p 13 p 14 Standards s 16 s 25
FF/EDM Intro Industry Goals/ Purpose GISB defined two ways in which flat files could be used to send transactions and transaction responses: interactive and batch. This section covers implementation considerations
Solutions. eprocurement. Delivering best-in-class. From Punchout to our exclusive ibuy tool, choose the solution that is right for you.
Delivering best-in-class eprocurement Solutions From Punchout to our exclusive ibuy tool, choose the solution that is right for you. farnell.com/eprocurement [email protected] 2 GLOBAL COVERAGE
Ariba PunchOut Implementation Guide DECEMBER 2000
Ariba PunchOut Guide DECEMBER 2000 Copyright 2000 by Ariba, Inc. The information contained in this document is proprietary and confidential to Ariba, Inc. All rights reserved. Patents Pending. Ariba and
Swedbank Payment Portal Implementation Overview
Swedbank Payment Portal Implementation Overview Product: Hosted Pages Region: Baltics September 2015 Version 1.0 Contents 1. Introduction 1 1.1. Audience 1 1.2. Hosted Page Service Features 1 1.3. Key
Ensuring the security of your mobile business intelligence
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
Description of Microsoft Internet Information Services (IIS) 5.0 and
Page 1 of 10 Article ID: 318380 - Last Review: July 7, 2008 - Revision: 8.1 Description of Microsoft Internet Information Services (IIS) 5.0 and 6.0 status codes This article was previously published under
In-Network Translation User s Guide
GXS EDI Services In-Network Translation User s Guide GC34-3282-02 Third Edition (November 2005) This book replaces GC34-3282-01. Copyright GXS, Inc. 1998, 2005. All rights reserved. Government Users Restricted
An Overview of Fastenal s E- Business Partners and Technology Solutions for E- Procurement
An Overview of Fastenal s E- Business Partners and Technology Solutions for E- Procurement Objective: To deliver to our customers an electronically enabled supply chain process that lowers Total Systems
NETWRIX EVENT LOG MANAGER
NETWRIX EVENT LOG MANAGER QUICK-START GUIDE FOR THE ENTERPRISE EDITION Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not
Manual. Netumo NETUMO HELP MANUAL WWW.NETUMO.COM. Copyright Netumo 2014 All Rights Reserved
Manual Netumo NETUMO HELP MANUAL WWW.NETUMO.COM Copyright Netumo 2014 All Rights Reserved Table of Contents 1 Introduction... 0 2 Creating an Account... 0 2.1 Additional services Login... 1 3 Adding a
Oracle Procurement. Punchout and Transparent Punchout Guide for Oracle iprocurement and Oracle Exchange Release 11i. Part No.
Oracle Procurement Punchout and Transparent Punchout Guide for Oracle iprocurement and Oracle Exchange Release 11i Part No. A92190-03 April 2003 Oracle Procurement Punchout and Transparent Punchout Guide
How To Set Up A Xerox Econcierge Powered By Xerx Account
Xerox econcierge Account Setup Guide Xerox econcierge Account Setup Guide The free Xerox econcierge service provides the quickest, easiest way for your customers to order printer supplies for all their
Oracle iprocurement and Oracle Exchange
Oracle iprocurement and Oracle Exchange Punchout Guide Release 11i September, 2002 Part No. A92190-02 Oracle iprocurement and Oracle Exchange Punchout Guide, Release 11i Part No. A92190-02 Copyright 2001,
IBM Aspera Add-in for Microsoft Outlook 1.3.2
IBM Aspera Add-in for Microsoft Outlook 1.3.2 Windows: 7, 8 Revision: 1.3.2.100253 Generated: 02/12/2015 10:58 Contents 2 Contents Introduction... 3 System Requirements... 5 Setting Up... 6 Account Credentials...6
Enabling SSL and Client Certificates on the SAP J2EE Engine
Enabling SSL and Client Certificates on the SAP J2EE Engine Angel Dichev RIG, SAP Labs SAP AG 1 Learning Objectives As a result of this session, you will be able to: Understand the different SAP J2EE Engine
MiGS Virtual Payment Client Integration Guide. July 2011 Software version: MR 27
MiGS Virtual Payment Client Integration Guide July 2011 Software version: MR 27 Copyright MasterCard and its vendors own the intellectual property in this Manual exclusively. You acknowledge that you must
Dell E-Commerce guide for Skyward Users 1
Dell E-Commerce guide for Skyward Users 1 This document contains instructions on how to use the e-commerce application running on Skyward s Business Suite to purchase from your Dell Premier Page. E-Commerce
Secure Web Service - Hybrid. Policy Server Setup. Release 9.2.5 Manual Version 1.01
Secure Web Service - Hybrid Policy Server Setup Release 9.2.5 Manual Version 1.01 M86 SECURITY WEB SERVICE HYBRID QUICK START USER GUIDE 2010 M86 Security All rights reserved. 828 W. Taft Ave., Orange,
Electronic approvals for forms FAQs
Click on any of the boxes below to explore more detail, including answers to frequently asked questions, video quick links, and more. Advisor experience Client experience Security Electronic approvals
Integrated SSL Scanning
Software Version 9.0 Copyright Copyright 1996-2008. Finjan Software Inc. and its affiliates and subsidiaries ( Finjan ). All rights reserved. All text and figures included in this publication are the exclusive
Kaseya 2. User Guide. Version 6.1
Kaseya 2 Kaseya SQL Server Reporting Services (SSRS) Configuration User Guide Version 6.1 January 28, 2011 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and
Installation Guide. Version 1.5. May 2015 Edition 2002-2015 ICS Learning Group
Installation Guide Version 1.5 May 2015 Edition 2002-2015 ICS Learning Group 1 Disclaimer ICS Learning Group makes no representations or warranties with respect to the contents or use of this manual, and
cxml User s Guide VERSION 1.1
cxml User s Guide VERSION 1.1 JUNE, 2000 Ariba, Inc. (Ariba) hereby grants to you a perpetual, nonexclusive, royalty-free, worldwide right and license to use the cxml specification (the ) under any Ariba
LogLogic Cisco IPS Log Configuration Guide
LogLogic Cisco IPS Log Configuration Guide Document Release: March 2011 Part Number: LL600072-00ELS090000 This manual supports LogLogic Cisco IPS Release 1.0 and later, and LogLogic Software Release 4.9.1
Fairsail REST API: Guide for Developers
Fairsail REST API: Guide for Developers Version 1.02 FS-API-REST-PG-201509--R001.02 Fairsail 2015. All rights reserved. This document contains information proprietary to Fairsail and may not be reproduced,
Customer Tips. Xerox Network Scanning HTTP/HTTPS Configuration using Microsoft IIS. for the user. Purpose. Background
Xerox Multifunction Devices Customer Tips June 5, 2007 This document applies to these Xerox products: X WC Pro 232/238/245/ 255/265/275 for the user Xerox Network Scanning HTTP/HTTPS Configuration using
IBM. Implementing SMTP and POP3 Scenarios with WebSphere Business Integration Connect. Author: Ronan Dalton
IBM Implementing SMTP and POP3 Scenarios with WebSphere Business Integration Connect Author: Ronan Dalton Table of Contents Section 1. Introduction... 2 Section 2. Download, Install and Configure ArGoSoft
Merchant Integration Guide
Merchant Integration Guide Card Not Present Transactions Authorize.Net Customer Support [email protected] Authorize.Net LLC 071708 Authorize.Net LLC ( Authorize.Net ) has made efforts to ensure the
Introduction to Directory Services
Introduction to Directory Services Overview This document explains how AirWatch integrates with your organization's existing directory service such as Active Directory, Lotus Domino and Novell e-directory
PremierConnect (B2B) Shopping and Ordering Guide. Accessing your Premier Page via PremierConnect (B2B)
PremierConnect (B2B) Shopping and Ordering Guide PremierConnect is Dell s B2B ecommerce solution, integrating your Enterprise Resource Planning (ERP) / procurement system with Dell s Premier Page. This
Credit Card Processing
Microsoft Dynamics AX 2009 Credit Card Processing Technical White Paper This white paper is intended for professionals who are involved in the implementation and support of the Credit Card Processing functionality
Understanding Digital Certificates and Secure Sockets Layer (SSL)
Understanding Digital Certificates and Secure Sockets Layer (SSL) Author: Peter Robinson January 2001 Version 1.1 Copyright 2001-2003 Entrust. All rights reserved. Digital Certificates What are they?
Installing and Configuring vcenter Support Assistant
Installing and Configuring vcenter Support Assistant vcenter Support Assistant 5.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced
Setup Guide Access Manager 3.2 SP3
Setup Guide Access Manager 3.2 SP3 August 2014 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE
efolder BDR for Veeam Cloud Connection Guide
efolder BDR for Veeam Cloud Connection Guide Setup Connect Preload Data uh6 efolder BDR Guide for Veeam Page 1 of 36 INTRODUCTION Thank you for choosing the efolder Cloud for Veeam. Using the efolder Cloud
/ 1. Online Banking User Guide SouthStateBank.com / (800) 277-2175
/ 1 Online Banking User Guide SouthStateBank.com / (800) 277-2175 Welcome Thank you for using South State s Online Banking. Whether you are a first time user or an existing user, this guide will walk you
Management Reporter Integration Guide for Microsoft Dynamics GP
Microsoft Dynamics Management Reporter Integration Guide for Microsoft Dynamics GP July 2013 Find updates to this documentation at the following location: http://go.microsoft.com/fwlink/?linkid=162565
Smart Card Authentication. Administrator's Guide
Smart Card Authentication Administrator's Guide October 2012 www.lexmark.com Contents 2 Contents Overview...4 Configuring the applications...5 Configuring printer settings for use with the applications...5
Mechanics Bank Mobile Banking Mobile Finance Manager (MFM) Application Palm Treo Installation
Mechanics Bank Mobile Banking Mobile Finance Manager (MFM) Application Palm Treo Installation Thank you for your interest in Mechanics Bank Mobile Banking. This guide will help you get started with Mechanics
Securing your Online Data Transfer with SSL
Securing your Online Data Transfer with SSL A GUIDE TO UNDERSTANDING SSL CERTIFICATES, how they operate and their application 1. Overview 2. What is SSL? 3. How to tell if a Website is Secure 4. What does
PeopleSoft Enterprise Campus Solutions 9.0 Enrollment Web Services
PeopleSoft Enterprise Campus Solutions 9.0 Enrollment Web Services DEVELOPER'S GUIDE July 2011 ORACLE PROPRIETARY AND C ONFIDENTIAL P AGE 1 OF 26 Enrollment Web Services Developer s Guide for PeopleSoft
Corporate Access File Transfer Service Description Version 1.0 01/05/2015
Corporate Access File Transfer Service Description Version 1.0 01/05/2015 This document describes the characteristics and usage of the Corporate Access File Transfer service, which is for transferring
April 2010. 2007, 2008, 2009, 2010 GXS, Inc. All Rights Reserved.
April 2010 2007, 2008, 2009, 2010 GXS, Inc. All Rights Reserved. Licenses and Trademarks All product names are copyrights and registered trademarks/tradenames of their respective owners. Information in
Merchant Integration Guide
Merchant Integration Guide Card Not Present Transactions January 2012 Authorize.Net Developer Support http://developer.authorize.net Authorize.Net LLC 082007 Ver.2.0 Authorize.Net LLC ( Authorize.Net )
HMRC Secure Electronic Transfer (SET)
HMRC Secure Electronic Transfer (SET) How to use HMRC SET using PGP Desktop Version 2.0 Contents Welcome to HMRC SET 1 HMRC SET overview 2 Encrypt a file to send to HMRC 3 Upload files to the Government
Host Access Management and Security Server
Host Access Management and Security Server Evaluation Guide Host Access Management and Security Server Evaluation Guide 12.2 Copyrights and Notices Copyright 2015 Attachmate Corporation. All rights reserved.
Securing your Microsoft Internet Information Services (MS IIS) Web Server with a thawte Digital Certificate thawte thawte thawte thawte thawte 10.
Securing your Microsoft Internet Information Services (MS IIS) Web Server with a thawte Digital Certificate A STEP-BY-STEP GUIDE to test, install and use a thawte Digital Certificate on your MS IIS Web
Ariba SN Quick Start Guide. November 2004
Ariba SN Quick Start Guide November 2004 Copyright 1996-2004 Ariba, Inc. Ariba and the Ariba logo are registered trademarks of Ariba, Inc. Ariba Spend Management, Ariba Spend Management. Find it. Get it.
Introduction to the EIS Guide
Introduction to the EIS Guide The AirWatch Enterprise Integration Service (EIS) provides organizations the ability to securely integrate with back-end enterprise systems from either the AirWatch SaaS environment
Table of Contents. ecommerce...1 SmartSync...9 Electronic Data Interchange (EDI)...11 ebusiness Partnerships...13 ebusiness Integrated Solutions...
Table of Contents ecommerce...1 SmartSync...9 Electronic Data Interchange (EDI)...11 ebusiness Partnerships...13 ebusiness Integrated Solutions...17 In today s hectic business world, we are faced with
Setup Guide Access Manager Appliance 3.2 SP3
Setup Guide Access Manager Appliance 3.2 SP3 August 2014 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS
Working with Purchase Orders
Ariba Network Working with Purchase Orders Document Version: April 2013 Copyright 1996 2013 Ariba, Inc. All rights reserved. This documentation, as well as the Ariba software and/or services described
Contents. Contents... i. Chapter 1 Introduction...1. Chapter 2 Using PSiGate...9. Index...25
Using PSiGate Contents i Contents Contents... i Chapter 1 Introduction...1 How to Apply for an Account...4 Set Up a Merchant Account Profile...6 Chapter 2 Using PSiGate...9 PSiGate from the Customer s
/ 1. Online Banking User Guide SouthStateBank.com / (800) 277-2175
/ 1 Online Banking User Guide SouthStateBank.com / (800) 277-2175 Welcome Thank you for using South State s Online Banking. Whether you are a first time user or an existing user, this guide will walk you
Upgrading from Call Center Reporting to Reporting for Contact Center. BCM Contact Center
Upgrading from Call Center Reporting to Reporting for Contact Center BCM Contact Center Document Number: NN40010-400 Document Status: Standard Document Version: 02.00 Date: June 2006 Copyright Nortel Networks
How To Manage Storage With Novell Storage Manager 3.X For Active Directory
www.novell.com/documentation Installation Guide Novell Storage Manager 4.1 for Active Directory September 10, 2015 Legal Notices Condrey Corporation makes no representations or warranties with respect
Sonian Getting Started Guide October 2008
Sonian Getting Started Guide October 2008 Sonian, Inc. For Authorized Use Only 1 Create your new archiving account 3 Configure your firewall for IMAP collections 4 (Skip this step if you will be using
Ariba SN Getting Started with Ariba EDI. April 2004
Ariba SN Getting Started with Ariba EDI April 2004 Copyright 1996-2004 Ariba, Inc. Ariba and the Ariba logo are registered trademarks of Ariba, Inc. Ariba Spend Management, Ariba Spend Management. Find
enicq 5 System Administrator s Guide
Vermont Oxford Network enicq 5 Documentation enicq 5 System Administrator s Guide Release 2.0 Published November 2014 2014 Vermont Oxford Network. All Rights Reserved. enicq 5 System Administrator s Guide
Installing Management Applications on VNX for File
EMC VNX Series Release 8.1 Installing Management Applications on VNX for File P/N 300-015-111 Rev 01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com Copyright
2X SecureRemoteDesktop. Version 1.1
2X SecureRemoteDesktop Version 1.1 Website: www.2x.com Email: [email protected] Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious
Ariba Supplier Network Getting Started with EDI. Release: 44 April 2007 Document Version: A
Ariba Supplier Network Getting Started with EDI Release: 44 April 2007 Document Version: A Copyright 1996 2007 Ariba, Inc. All rights reserved. This documentation, as well as the Ariba software and/or
RealPresence Platform Director
RealPresence CloudAXIS Suite Administrators Guide Software 1.3.1 GETTING STARTED GUIDE Software 2.0 June 2015 3725-66012-001B RealPresence Platform Director Polycom, Inc. 1 RealPresence Platform Director
Walmart Stores, Inc. Getting Started with EDI Implementation Guideline Document version: 1.0 Published November 2011
Walmart Stores, Inc. Getting Started with EDI Implementation Guideline Document version: 1.0 Published November 2011 5 0 1 0 Business Usage: The following packet was created to speed-up your EDI implementation.
CA Nimsoft Service Desk
CA Nimsoft Service Desk Single Sign-On Configuration Guide 6.2.6 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation
RoomWizard Synchronization Software Manual Installation Instructions
2 RoomWizard Synchronization Software Manual Installation Instructions Table of Contents Exchange Server Configuration... 4 RoomWizard Synchronization Software Installation and Configuration... 5 System
SafeGuard Enterprise Web Helpdesk. Product version: 6 Document date: February 2012
SafeGuard Enterprise Web Helpdesk Product version: 6 Document date: February 2012 Contents 1 SafeGuard web-based Challenge/Response...3 2 Installation...5 3 Authentication...8 4 Select the Web Helpdesk
NASDAQ Web Security Entitlement Installation Guide November 13, 2007
November 13, 2007 Table of Contents: Copyright 2006, The Nasdaq Stock Market, Inc. All rights reserved.... 2 Chapter 1 - Entitlement Overview... 3 Hardware/Software Requirements...3 NASDAQ Workstation...3
Introduction to Clarity Connect s Standard E-Commerce/Store Manager Solution
Introduction to Clarity Connect s Standard E-Commerce/Store Manager Solution This document contains a detailed description of the functionality provided in a standard e commerce implementation with Clarity
Websense Content Gateway HTTPS Configuration
Websense Content Gateway HTTPS Configuration web security data security email security Support Webinars 2010 Websense, Inc. All rights reserved. Webinar Presenter Title: Sr. Tech Support Specialist Cisco
IBM Endpoint Manager Version 9.1. Patch Management for Red Hat Enterprise Linux User's Guide
IBM Endpoint Manager Version 9.1 Patch Management for Red Hat Enterprise Linux User's Guide IBM Endpoint Manager Version 9.1 Patch Management for Red Hat Enterprise Linux User's Guide Note Before using
Citrix Receiver for Mobile Devices Troubleshooting Guide
Citrix Receiver for Mobile Devices Troubleshooting Guide www.citrix.com Contents REQUIREMENTS...3 KNOWN LIMITATIONS...3 TROUBLESHOOTING QUESTIONS TO ASK...3 TROUBLESHOOTING TOOLS...4 BASIC TROUBLESHOOTING
Axis Cloud Collaboration Platform Business Partner Collaboration
Axis Cloud Collaboration Platform Business Partner Collaboration Axis is an enterprise cloud-delivered collaboration platform for exchanging supply chain, asset & work management data electronically between
Securing your Online Data Transfer with SSL A GUIDE TO UNDERSTANDING SSL CERTIFICATES, how they operate and their application INDEX 1. Overview 2. What is SSL? 3. How to tell if a Website is Secure 4.
Installing and Configuring vcenter Multi-Hypervisor Manager
Installing and Configuring vcenter Multi-Hypervisor Manager vcenter Server 5.1 vcenter Multi-Hypervisor Manager 1.1 This document supports the version of each product listed and supports all subsequent
User Guide. Version 3.0 April 2006
User Guide Version 3.0 April 2006 2006 Obvious Solutions Inc. All rights reserved. Dabra and Dabra Network are trademarks of Obvious Solutions Inc. All other trademarks owned by their respective trademark
NEFSIS DEDICATED SERVER
NEFSIS TRAINING SERIES Nefsis Dedicated Server version 5.2.0.XXX (DRAFT Document) Requirements and Implementation Guide (Rev5-113009) REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER Nefsis
DOSarrest Security Services (DSS) Version 4.0
DOSarrest Security Services (DSS) Version 4.0 DOSarrest DSS User Guide The DSS is the main customer portal where customers can view and manipulate traffic statistics from a wide variety of variables that
Important. Please read this User s Manual carefully to familiarize yourself with safe and effective usage.
Important Please read this User s Manual carefully to familiarize yourself with safe and effective usage. About This Manual This manual describes how to install and configure RadiNET Pro Gateway and RadiCS
Replacements TECHNICAL REFERENCE. DTCCSOLUTIONS Dec 2009. Copyright 2009 Depository Trust Clearing Corporation. All Rights Reserved.
TECHNICAL REFERENCE Replacements Page 1 Table of Contents Table of Contents 1 Overview... 3 1.1 Replacements Features... 3 2 Roles and Responsibilities... 4 2.1 Sender (Receiving Carrier)... 4 2.2 Recipient
Pre-Installation Instructions
Agile Product Lifecycle Management PLM Mobile Release Notes Release 2.0 E49504-02 October 2014 These Release Notes provide technical information about Oracle Product Lifecycle Management (PLM) Mobile 2.0.
Embedded Web Server Security
Embedded Web Server Security Administrator's Guide September 2014 www.lexmark.com Model(s): MS911de, MX910de, MX911, MX912, XM9145, XM9155, XM9165, CS310, CS410, CS510, CX310, CX410, CX510, M1140, M1145,
PayPal PRO Sandbox Testing
PayPal PRO Sandbox Testing Updated June 2014 2014 GoPrint Systems, Inc., All rights reserved. PayPal Pro Configuration Guide 1 PayPal Pro Test Mode (Sandbox) Overview The PayPal test account, referred
Document Management Getting Started Guide
Document Management Getting Started Guide Version: 6.6.x Written by: Product Documentation, R&D Date: February 2011 ImageNow and CaptureNow are registered trademarks of Perceptive Software, Inc. All other
VMware Horizon FLEX User Guide
Horizon FLEX 1.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this
Embedded Web Server Security
Embedded Web Server Security Administrator's Guide September 2014 www.lexmark.com Model(s): C54x, C73x, C746, C748, C792, C925, C950, E260, E360, E46x, T65x, W850, X264, X36x, X46x, X543, X544, X546, X548,
Configuring, Customizing, and Troubleshooting Outlook Express
3 Configuring, Customizing, and Troubleshooting Outlook Express............................................... Terms you ll need to understand: Outlook Express Newsgroups Address book Email Preview pane
TIBCO Spotfire Automation Services 6.5. User s Manual
TIBCO Spotfire Automation Services 6.5 User s Manual Revision date: 17 April 2014 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED OR BUNDLED TIBCO
OnCommand Performance Manager 1.1
OnCommand Performance Manager 1.1 Installation and Setup Guide For Red Hat Enterprise Linux NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501
Password Reset PRO. Quick Setup Guide for Single Server or Two-Tier Installation
Password Reset PRO Quick Setup Guide for Single Server or Two-Tier Installation This guide covers the features and settings available in Password Reset PRO version 3.x.x. Please read this guide completely
Configuring your email client to connect to your Exchange mailbox
Configuring your email client to connect to your Exchange mailbox Contents Use Outlook Web Access (OWA) to access your Exchange mailbox... 2 Use Outlook 2003 to connect to your Exchange mailbox... 3 Add
A Guide to Accounts Payable Supplier Processes
A Guide to Accounts Payable Supplier Processes The Johnson & Johnson Family of Companies believe in the benefits associated with the efficiencies gained through methods of electronic or paperless invoicing.
