Administration Guide
VERSION 3.5.1
© 2001-2010 nuBridges, Inc. All rights reserved.
Information in this document is subject to change without notice and does not represent a commitment on the
part of nuBridges. The documentation is provided “as is” without warranty of any kind including without
limitation, any warranty of merchantability or fitness for a particular purpose. Further, nuBridges does not
warrant, guarantee, or make any representations regarding the use, or the results of the use, of the software or
written material in terms of correctness, accuracy, reliability, or otherwise.
nuBridges is a trade name and registered trademark in the United States and other countries. The names of actual
companies and products mentioned herein may be the trademarks of their respective owners.
Table of Contents
Chapter 1: Overview
Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
About This Document. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Audience . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
Introduction to the Commerce Suite Documentation Set . . . . . . . . . . . . . . 9
Commerce Suite Documentation Roadmap. . . . . . . . . . . . . . . . . . . . . . . 10
Documentation Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Glossary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
Chapter 1: Overview
Introduction ...................................................................................................... 7
About This Document ...................................................................................... 7
Audience.......................................................................................................... 8
Introduction to the Commerce Suite Documentation Set................................. 9
Commerce Suite Documentation Roadmap .................................................. 10
Documentation Conventions.......................................................................... 12
Chapter 1: Overview
Introduction
Introduction
Welcome to the nuBridges Commerce Suite Administration Guide. This document
introduces and outlines Commerce Suite’s features, services, and architecture.
7
Chapter 1: Overview
Audience
Audience
This guide is intended primarily for use by the Commerce Suite data administration
personnel responsible for installation, configuration, maintenance, and use of the
Commerce Suite system.
This document has been written with the assumption that Commerce Suite
administrators and users have a general understanding of the following concepts and
technologies:
8
Chapter 1: Overview
Introduction to the Commerce Suite Documentation Set
• Commerce Suite Release Notes. The release notes describe new features,
maintenance updates, and important notes.
• Commerce Suite Getting Started Guide. This guide lists hardware and
software requirements, describes Commerce Suite installation, configuration,
and testing procedures, and includes post-installation considerations.
• Configuring Commerce Suite Clusters. This guide describes Commerce Suite
clusters and their benefits, and explains how to configure Commerce Suite
clusters using a configuration file or database.
• Commerce Suite Administration Guide. This guide describes how to manage
Commerce Suite servers, trading partners, and certificates, and provides other
important information for managing the Commerce Suite application.
• Commerce Suite Command Reference. This guide presents an overview of the
Commerce Suite administration commands.
• Commerce Suite Protocol Connectivity Guide. This guide provides
instructions for configuring Commerce Suite connectivity using FTP, SSL, and
AS1 protocols.
• Commerce Suite Trading Community Manager User Guide. This guide
describes how to configure and manage your trading community using the
Trading Community Manager graphical user interface.
9
Chapter 1: Overview
Commerce Suite Documentation Roadmap
10
Chapter 1: Overview
Commerce Suite Documentation Roadmap
11
Chapter 1: Overview
Documentation Conventions
Documentation Conventions
This section will familiarize you with the features of this guide. As you will notice,
the left side of this guide has a section that is used for notes, references, and warnings.
These notes are identified by the following icons:
Designates a reference relevant to the adjacent text. The
reference may refer to a procedure, text in another
document, or a definition.
Designates there is additional information that is relevant
to the text on the right side.
This guide also utilizes text formatting to help you locate and identify information.
Review the table below for details on the text formatting used in this guide.
12
Chapter 1: Overview
Documentation Conventions
{} -tb<timeout{s|ms}>
Indicates a set of choices from
which you must choose one.
Separates two mutually exclusive
| [in|out] choices in a syntax line. Type one of
the choices, not the symbol.
[] Indicates optional parameters. You
[in|out] typically type only the information
within the brackets, not the brackets.
... importkey <from> <to>
Indicates that a parameter can be
repeated several times in a
<usage>↵ <option>
command line. You enter only the
[...]
information, not the ellipsis (...).
13
Chapter 2: Introduction to
Commerce Suite
Introduction .................................................................................................... 15
The Commerce Suite Solution....................................................................... 15
Certified Platforms ......................................................................................... 16
The Commerce Suite Advantage................................................................... 17
Supports the EDI-INT Specification ..................................................................................17
Ensures Data Integrity and Confidentiality........................................................................17
Enables a High Performance, High Availability Trading Community ................................17
Assure Reliable Trading Community Data Delivery..........................................................17
Commerce Suite Architecture........................................................................ 18
Multi-threaded Execution ..................................................................................................18
Dynamic Scalability...........................................................................................................19
Failsafe Redundancy ........................................................................................................19
Data Asset Protection .......................................................................................................19
Commerce Suite Services Overview ............................................................. 20
Understanding the Console Service .................................................................................20
Understanding the Serialization Service ...........................................................................21
Understanding the Control Service ...................................................................................21
Understanding the Outbound Service...............................................................................21
Understanding the Inbound Service .................................................................................22
Understanding the Out-Beacon Service ...........................................................................22
Understanding the Router Service....................................................................................23
Understanding Commerce Suite Roles ......................................................... 24
Understanding the Transport Role....................................................................................24
Understanding the Router Role ........................................................................................24
Understanding the Admin Role .........................................................................................24
Chapter 2: Introduction to Commerce Suite
Introduction
Introduction
This chapter provide an overview of the Commerce Suite product. After reviewing
this chapter, you will have an understanding of how to configure Commerce Suite to
best serve your organization.
The nuBridges Commerce Suite enables your enterprise with the profile,
communication, security, and rollout management necessary to ensure the integrity of
your business partner relationships.
The nuBridges Commerce Suite solution is certified by the Uniform Code Council
(UCC) and is also in full compliance with the Internet Engineering Task Force (IETF)
Electronic Data Interchange over the Internet (EDI-INT) specification.
Support for the EDI-INT specification ensures that EDI trading partners and user
agents can use the Internet as a transport medium to conduct business between EDI
systems and provide secure EDI over the Internet.
The Commerce Suite application provides your enterprise with the following business
benefits:
• Supports multiple data types, transport protocols, and security standards
• Supports a wide range of platforms
• Utilizes high-performance technology to maximize throughput
• Enables complete Privacy, Authentication, Integrity, and Non-Repudiation of
all transactions
• Supports certificates from all major security vendors and provides a Public Key
Infrastructure (PKI) solution generating X.509 certificates
• Offers high-availability failover and restart
15
Chapter 2: Introduction to Commerce Suite
Certified and Supported Platforms
Solaris 8
Windows AIX 5.1
Windows Windows Solaris 9 HP-UX HP-UX HP-UX HP-UX Red Hat Red Hat Red Hat SuSe Ent. 9
Database Type 2003 Server Windows7 AIX 5.2
XP Vista Solaris 10-SPARC 11.00 PA 11.11 PA 11.23 IT 11.31 IT ES 3 ES 4 ES 5 SuSe Ent. 10
2008 Server AIX 5.3
Solaris10-Intel
Standalone X X X X X X X X X X X X X X
MS Access 2002 X X X X
MS Access 2003 X X X X
MS Access 2007 X X X X
MySQL 3.23 C C C
MySQL 4.1 X X C X X
(AIX 5.2 only) (SuSe Ent. 9 only)
MySQL 5.0 X X C X X
(AIX 5.2 only) (SuSe Ent. 9 only)
Oracle 8i X X X
(AIX 5.1 & (Solaris 8 and 9 only)
AIX 5.2 only)
Oracle 9i X X X X X X X X X X
(AIX 5.2 only) (Solaris 8, 9, & 10-
SPARC only)
Oracle 10G X X X X X X X X X X X
(AIX 5.3 only) (Solaris 10-SPARC &
10-Intel only)
Informix 9.3 X X
DB2 8.x X X
DB2 9 X X
X = denotes a certified platform eligible for support from nuBridges Customer Services
C = denotes compatibility; however, the platform is not supported
16
Chapter 2: Introduction to Commerce Suite
The Commerce Suite Advantage
17
Chapter 2: Introduction to Commerce Suite
Commerce Suite Architecture
• Multi-threaded Execution
• Dynamic Scalability
• Failsafe Redundancy
• Data Asset Protection
Multi-threaded Execution
To accomplish a broad variety of data-processing operations while maintaining an
efficient and robust design, the major operations of the Commerce Suite application
are executed as discrete services operating concurrently within a single process. For
example, at any given moment, the Commerce Suite may be in the process of both
receiving an inbound data stream and also preparing a file to be sent to a remote
computer.
The integrity of each independent task being performed by the computer is essential.
To protect each discrete operation and to more efficiently organize program logic, the
Commerce Suite application executes its code in the context of multiple threads of
execution within the overall application process. The operating system reserves time to
execute each thread in a cooperative manner, switching between threads at regular
intervals. Usually these thread-to-thread interruptions occur when a thread requests
access to a system resource that would otherwise, in a single-threaded environment,
impose a delay in processing due to media-access time. So, for example, while one
thread is waiting for a disk or network event to complete, other threads may obtain
CPU attention.
• Transport
• Router
• Admin (Administration)
18
Chapter 2: Introduction to Commerce Suite
Commerce Suite Architecture
Dynamic Scalability
One of the essential qualities of a real-time communications system is the ability to
dynamically tune the performance of the system without requiring system down-time.
A Commerce Suite configuration can be dynamically scaled by adding or removing
Transport agents without shutting down any other agent in the configuration. When a
new Transport agent is started and configured to participate in a Transport agent group,
or pool, the Transport agent automatically notifies any Router or Admin agent on its
local network segment of its presence by periodically sending a small Universal
Datagram Protocol (UDP) packet. Conversely, when a Transport agent is shut down,
Router and Admin agent on the local network segment become aware of the removal
of the Transport agent by detecting that UDP packets are no longer being transmitted
by the Transport agent.
Failsafe Redundancy
Another essential quality of a robust software system is redundancy. A Commerce
Suite configuration can be configured with multiple Router agents and multiple
Admin agents in order to insure that the secure flow of business information is not
interrupted, even if a Router or Admin agent is shut down. More than one Router agent
can service the same Transport agent pool, since each inbound data connection is
serviced by separate, dedicated threads in each agent. Likewise, more than one Admin
agent can distribute data-transfers to the same pool of Transport agents.
• Console
• Serialization
• Control
• Outbound
• Inbound
• Work Order
• Beacon
• Router
20
Chapter 2: Introduction to Commerce Suite
Commerce Suite Services Overview
The outbound queue is a list of transactions that carry addressing and status
information about the data to be sent. Two types of send operations are found on the
outbound queue: single-send operations and recurring-send operations. The single-
send operation is simply a send of a file from one location to another. The recurring-
send operation represents any iterative event, typically either a periodic send (for
example, a weekly status report) or a drop-box configuration wherein an outbox
location is continuously scanned for outgoing data. Both single-send and recurring-
send operations can be configured with retry parameters to handle the situation where
21
Chapter 2: Introduction to Commerce Suite
Commerce Suite Services Overview
a send operation fails. Any send can be configured to be retried a specified number of
times at a specified interval. When combined with the Router services ability to buffer
and spool incoming data to a pool of Transport agents, both sending and receiving
locations share in the responsibility of reliably transmitting data.
In a configuration where several Transport agents are receiving inbound data, the
Admin agent will typically be the primary sending agent. In configurations that do not
require an Admin agent, the Transport agent(s) may both send and receive data.
22
Chapter 2: Introduction to Commerce Suite
Commerce Suite Services Overview
• Forward all incoming data from the remote host connection to the Transport
agent.
• Forward all response data from the Transport agent to the remote host.
• Detect that the Transport agent has closed an inboard connection.
• Close the connection to the remote host.
23
Chapter 2: Introduction to Commerce Suite
Understanding Commerce Suite Roles
The Admin role also provides a Web-based user interface to support the definition and
maintenance of data-interchange relationships. In the electronic commerce industry,
such defined interchanges are often referred to as trading partner relationships. Such a
relationship defines the Internet address of the participating computers, message
delivery options, and data-security parameters such as the certificates to be used for
signature creation and key-encryption. The Admin agent also is responsible for
configuring the Transport and Router agents and for replicating configuration updates
to these roles if they are being hosted on separate processors.
24
Chapter 3: Managing Commerce Suite
Servers
Introduction .................................................................................................... 26
Managing Commerce Suite Servers.............................................................. 26
Defining a New Commerce Suite Server Profile...............................................................26
Inserting a Commerce Suite Server Profile Into the Database .........................................27
Displaying a List of Defined Commerce Suite Servers .....................................................27
Reading Commerce Suite Server Settings From a Database ..........................................28
Removing a Server Profile From a Database ...................................................................28
Removing a Server Profile From Memory ........................................................................29
Starting a Remote Commerce Suite Server on a Remote Host........................................29
Chapter 3: Managing Commerce Suite Servers
Introduction
Introduction
This section describes how to define and manage servers using the Commerce Suite
command line interface (CLI).
Refer to the Commerce Suite Getting Started Guide for instructions on starting the
Commerce Suite application and accessing the command line interface.
2. At the command prompt, enter the addserver command using the following
syntax:
addserver <name> <group> <role> <url> <control-URL>
Refer to the Commerce Suite Command Reference Guide for additional information
on using the addserver command.
26
Chapter 3: Managing Commerce Suite Servers
Managing Commerce Suite Servers
Refer to the Commerce Suite Command Reference Guide for additional information
on using the insertserver command.
2. At the command prompt, enter the listservers command using the following
syntax:
listeservers
Refer to the Commerce Suite Command Reference Guide for additional information
on using the listservers command.
27
Chapter 3: Managing Commerce Suite Servers
Managing Commerce Suite Servers
The getservers command is only functional if the database parameters have been
defined with the set -d* commands and the start database command has been
issued.
Follow the steps below to display a list of defined Commerce Suite servers.
Refer to the Commerce Suite Command Reference Guide for additional information
on using the getservers command.
Refer to the Commerce Suite Command Reference Guide for additional information
on using the deleteserver command.
28
Chapter 3: Managing Commerce Suite Servers
Managing Commerce Suite Servers
Refer to the Commerce Suite Command Reference Guide for additional information
on using the removeserver command.
Refer to the Commerce Suite Command Reference Guide for additional information
on using the remoteserver command.
29
Chapter 4: Managing Commerce Suite
Trading Partners
Introduction .................................................................................................... 31
Managing Trading Partner Relationships....................................................... 31
Defining a New Trading Partner Pair ................................................................................31
Inserting a Trading Partner Pair into a Database..............................................................32
Displaying Active Trading Partner Pairs ...........................................................................32
Reading Trading Partner Pair Data From a Database ......................................................33
Removing a Trading Partner Pair from a Database..........................................................33
Removing a Trading Partner Pair From Memory ..............................................................34
Chapter 4: Managing Commerce Suite Trading Partners
Introduction
Introduction
This section describes how to define and manage trading partners using the Commerce
Suite command line interface (CLI).
Refer to the Commerce Suite Getting Started Guide for instructions on starting the
Commerce Suite application and accessing the command line interface.
Follow the steps below to define a new trading partner pair from the Commerce Suite
command line interface.
2. At the command prompt, enter the addpair command using the following
syntax:
addpair <from> <to> <to-URL> <rcpt-URL> <notify-name>↵
<inbox> [in|out][<send-parameters>]
Refer to the Commerce Suite Command Reference Guide for additional information
on using the addpair command.
31
Chapter 4: Managing Commerce Suite Trading Partners
Managing Trading Partner Relationships
2. At the command prompt, enter the insertpair command using the following
syntax:
insertpair <from> <to> <to-URL> <rcpt-URL>↵
<notify-name> <inbox> [in|out][<send-parameters>]
Refer to the Commerce Suite Command Reference Guide for additional information
on using the insertpair command.
Displaying active trading partner pairs using the Commerce Suite CLI is
accomplished using the listpairs command.
Follow the steps below to display active trading partner pairs.
2. At the command prompt, enter the listpairs command using the following
syntax:
listpairs
Refer to the Commerce Suite Command Reference Guide for additional information
on using the listpairs command.
32
Chapter 4: Managing Commerce Suite Trading Partners
Managing Trading Partner Relationships
The getpairs command is only functional if the database parameters have been
defined with the set -d* commands and the startdatabase command has been
issued.
Follow the steps below to read trading partner pair data from a database.
2. At the command prompt, enter the getpairs command using the following
syntax:
getpairs
Refer to the Commerce Suite Command Reference Guide for additional information
on using the getpairs command.
2. At the command prompt, enter the deletepair command using the following
syntax:
deletepair <from> <to> <protocol>
Refer to the Commerce Suite Command Reference Guide for additional information
on using the deletepair command.
33
Chapter 4: Managing Commerce Suite Trading Partners
Managing Trading Partner Relationships
Follow the steps below to remove a trading partner pair from memory.
Refer to the Commerce Suite Command Reference Guide for additional information
on using the removepair command.
34
Chapter 5: Managing Certificates
Introduction .................................................................................................... 36
Managing Commerce Suite Certificates ........................................................ 36
Creating Public-Key and Private-Key Material..................................................................36
Removing a Public-Key Pair Definition From the Database .............................................37
Exporting Key-Pair Information to a File ...........................................................................37
Reading Key-Pair Information From the Database ...........................................................38
Importing an X.509 Certificate and Corresponding Private-Key .......................................38
Displaying Active Public-Key Pairs ...................................................................................39
Replicating a Public-Key Pair to a Remote Host ..............................................................39
Automatic Key Expiration Notification...............................................................................40
Removing a Public-Key Pair From Memory......................................................................41
Chapter 5: Managing Certificates
Introduction
Introduction
This section describes how to define and manage certificates using the Commerce
Suite command line interface (CLI).
2. At the command prompt, enter the addkey command using the following
syntax:
addkey <from> <to> <usage> <key-bits> <issuer> <subject>
Refer to the Commerce Suite Command Reference Guide for additional information
on using the addkey command.
36
Chapter 5: Managing Certificates
Managing Commerce Suite Certificates
Follow the steps below to delete the public-key pair definition from the database using
the Commerce Suite CLI.
2. At the command prompt, enter the deletekey command using the following
syntax:
deletekey <from> <to> <usage>
Refer to the Commerce Suite Command Reference Guide for additional information
on using the deletekey command.
2. At the command prompt, enter the exportkey command using the following
syntax:
Refer to the Commerce Suite Command Reference Guide for additional information
on using the exportkey command.
37
Chapter 5: Managing Certificates
Managing Commerce Suite Certificates
Follow the steps below to read key-pair information from the database using the
Commerce Suite CLI.
2. At the command prompt, enter the getkeys command using the following
syntax:
getkeys
Refer to the Commerce Suite Command Reference Guide for additional information
on using the getkeys command.
Follow the steps below to import an X.509 certificate and corresponding private-key
using the Commerce Suite CLI.
2. At the command prompt, enter the importkey command using the following
syntax:
Refer to the Commerce Suite Command Reference Guide for additional information
on using the importkey command.
38
Chapter 5: Managing Certificates
Managing Commerce Suite Certificates
Follow the steps below to display active public-key pairs using the Commerce Suite
CLI.
2. At the command prompt, enter the listkeys command using the following
syntax:
listkeys
Refer to the Commerce Suite Command Reference Guide for additional information
on using the listkeys command.
2. At the command prompt, enter the remotekey command using the following
syntax:
remotekey <from> <to> <usage> <cert> <key>
Refer to the Commerce Suite Command Reference Guide for additional information
on using the remotekey command.
39
Chapter 5: Managing Certificates
Managing Commerce Suite Certificates
startcertpolling
This command initiates the certificate expiry polling process. It is imperative that the
startcertpolling command is placed properly in the icssvr.cfg file. If you want to
have Commerce Suite poll for certificate expiration at start up, the startcertpolling
command must be placed in the configuration file after the importkeys, getkeys, and/
or getall commands. This ensures that all relevant certificate and key information is
loaded prior to polling. If the startcertpolling command is run before certificates and
keys are loaded, there will be no certificates/keys available for polling; therefore you
will not receive notice if there are keys set to expire.
Syntax
Required Parameters
Command Examples
Poll the certificates every twelve hours. Notify user if there are any certificates set to
The startcertpolling
expire within 14 days.
command must be listed
after any certificate/key
import commands in the startcertpolling -tC<1d> -tS<30>
configuration file if you want
it to poll immediately, Poll the certificates every once a day. Notify user if there are any certificates set to
otherwise polling will begin
at the next scan interval. If expire within the next 30 days.
you want to poll certificates
as part of your startup
process, make sure that the
startcertpolling command in
listed after the import
certificate/key commands in
icssvr.cfg.
40
Chapter 5: Managing Certificates
Managing Commerce Suite Certificates
stopcertpolling
This command stops the certificate expiry polling process.
Syntax
stopcertpolling
Parameters
2. At the command prompt, enter the removekey command using the following
syntax:
removekey <from> <to> <usage>
Refer to the Commerce Suite Command Reference Guide for additional information
on using the removekey command.
41
Chapter 6: Configuring a Backup
Administrator
Introduction .................................................................................................... 43
Backup Administrator Configuration Settings ................................................ 43
Primary Administrator Configuration Settings................................................ 44
Chapter 6: Configuring a Backup Administrator
Introduction
Introduction
The Commerce Suite application supports the ability to configure your secondary
agent to act in the capacity of a backup administrator. A backup administrator is an
agent that is instructed by its configuration parameters to monitor a primary
administrative agent and assume the function of the primary administrator in the event
that the primary administrator fails to regularly notify the backup administrator of its
status.
The purpose of the backup administrator function is to provide a failover feature so
that, in the event of a failure of the primary administrator, those functions performed
by the primary administrator continue to be executed. The backup administrator polls
the primary administrator each time the work-order interval expires.
set -an<num>
where <num> is a positive integer. This number represents the number of times
that the backup administrator will tolerate a failure receiving the primary
administrator's response before asserting itself as the primary administrator.
set -ah<URL>
This option must be included in the backup administrator’s configuration file so
that the agent can resolve the URL to an IP address and port in order to connect
to the primary administrative agent.
For example:
3. Set the work-order-interval as follows, if the default value (10 seconds) is not
desired:
set -to<secs|msecs>
4. Designate the backup administrator by including the following set option in its
configuration file:
set -gb
43
Chapter 6: Configuring a Backup Administrator
Primary Administrator Configuration Settings
This is done so that the primary administrator can accept polling messages from the
backup administrator. This URL should include the hostname or IP address and port on
which the primary administrator should listen for incoming connections, if the <URL>
parameter should correspond to the values provided in the backup administrator's set
-uh parameter.
44
Appendix A: UNIX Configuration
Information
Introduction .................................................................................................... 46
Running Commerce Suite in the Background on a Linux Server .................. 46
Running Commerce Suite in the Background on a HP-UX Server................ 46
Appendix A: UNIX Configuration Information
Introduction
Introduction
This topic contains special topics and instructions for configuring Commerce Suite on
UNIX operating systems.
nohup icssvr -e
This command completely frees the Commerce Suite application from a term session
and will survive any interruption with the exception of a hardware change.
nohup icssvr -e
This command completely frees the Commerce Suite application from a term session
and will survive any interruption with the exception of a hardware change.
46
Appendix B: Commerce Suite
Error Messages
48
Appendix B: Commerce Suite Error Messages
Commerce Suite Error Messages
49
Appendix B: Commerce Suite Error Messages
Commerce Suite Error Messages
50
Appendix B: Commerce Suite Error Messages
Commerce Suite Error Messages
51
Appendix B: Commerce Suite Error Messages
Commerce Suite Error Messages
52
Appendix B: Commerce Suite Error Messages
Commerce Suite Error Messages
ERR Rename
Symptom Attempting to send a file to a trading partner.
Possible 1. There is a file in the outbox from a previous attempted send with the
Causes same name as a file that icssvr is trying to send using persistent
send. The system cannot rename the file to a file name that already
exists on the file system.
2. Another application (e.g., Notepad, Wordpad, or your translator) has
the file locked and the operating system will not allow the
Commerce Suite Server to rename the file.
Resolution 1. Manually rename the prefix of file being sent or manually rename the
file blocking the rename.
53
Appendix B: Commerce Suite Error Messages
Commerce Suite Error Messages
54
Appendix B: Commerce Suite Error Messages
Commerce Suite Error Messages
55
Appendix B: Commerce Suite Error Messages
Commerce Suite Error Messages
56
Appendix B: Commerce Suite Error Messages
Commerce Suite Error Messages
57
Appendix B: Commerce Suite Error Messages
Commerce Suite Error Messages
The following table contains numbered error codes and their descriptions. You may
encounter these error codes, in addition to the error messages listed in the previous
table, when working with Commerce Suite.
Error Code
58
Appendix B: Commerce Suite Error Messages
Commerce Suite Error Messages
Error Code
59
Appendix B: Commerce Suite Error Messages
Commerce Suite Error Messages
Error Code
60
Appendix B: Commerce Suite Error Messages
Commerce Suite Error Messages
Error Code
61
Appendix B: Commerce Suite Error Messages
Commerce Suite Error Messages
Error Code
62
Appendix B: Commerce Suite Error Messages
Commerce Suite Error Messages
Error Code
63
Appendix B: Commerce Suite Error Messages
Commerce Suite Error Messages
Error Code
64
Appendix B: Commerce Suite Error Messages
Commerce Suite Error Messages
Error Code
65
Appendix B: Commerce Suite Error Messages
Commerce Suite Error Messages
Error Code
66
Appendix B: Commerce Suite Error Messages
Commerce Suite Error Messages
Error Code
67
Appendix B: Commerce Suite Error Messages
Commerce Suite Error Messages
Error Code
68
Appendix B: Commerce Suite Error Messages
Commerce Suite Error Messages
Error Code
69
Appendix B: Commerce Suite Error Messages
Commerce Suite Error Messages
Error Code
70
Appendix C: Database Schema for
Commerce Suite Deployments
Introduction .................................................................................................... 72
Database Schema Tables .............................................................................. 72
accesscategory.................................................................................................................72
agentrole...........................................................................................................................72
as2name ...........................................................................................................................72
certkey ..............................................................................................................................73
cipher ................................................................................................................................73
compression .....................................................................................................................73
email .................................................................................................................................74
errorcode ..........................................................................................................................74
filenamehist.......................................................................................................................74
grouppermission ...............................................................................................................74
hash ..................................................................................................................................75
icssysinfo ..........................................................................................................................75
keyencryption....................................................................................................................75
keypair ..............................................................................................................................76
keyusagecode...................................................................................................................76
notice ................................................................................................................................77
opdescription ....................................................................................................................78
org.....................................................................................................................................78
orgtpcert............................................................................................................................79
p2proute............................................................................................................................79
permission ........................................................................................................................80
protocolcode .....................................................................................................................80
relationship .......................................................................................................................80
server................................................................................................................................81
servercomputer.................................................................................................................81
sscipher ............................................................................................................................81
sscompression..................................................................................................................81
sshash ..............................................................................................................................82
sskeyencryption ................................................................................................................82
tp.......................................................................................................................................82
tporgstatus ........................................................................................................................83
tpurl...................................................................................................................................84
usergroup..........................................................................................................................84
userlogin ...........................................................................................................................85
workorder..........................................................................................................................85
Appendix C: Database Schema for Commerce Suite Deployments
Introduction
Introduction
This appendix illustrates the database schema used by Commerce Suite during
database creation. The database schema consists of tables and the appropriate fields
related to each table. These tables are created when the SQL scripts are implemented
during database setup. The SQL scripts are contained in the Commerce Suite install
package.
accesscategory
FIELD DATA TYPE
id Integer
categorykey Char(10)
description Char(40)
agentrole
FIELD DATA TYPE
agentroleid Char(1)
agentrolename Char(30)
as2name
FIELD DATA TYPE
id Integer
as2name Char(32)
tpid Integer
orgid Integer
72
Appendix C: Database Schema for Commerce Suite Deployments
Database Schema Tables
certkey
FIELD DATA TYPE
certkeyid Integer
validfrom Char(14)
validto Char(14)
keyusage Char(1)
subjectname VarChar(512)
issuername VarChar(512)
serialnbr VarChar(255)
certdata VarChar(4000)
keydata VarChar(2000)
cipher
FIELD DATA TYPE
id Integer
cipherid Integer
tpid Integer
orgid Integer
compression
FIELD DATA TYPE
id Integer
compressionid Integer
tpid Integer
orgid Integer
73
Appendix C: Database Schema for Commerce Suite Deployments
Database Schema Tables
email
FIELD DATA TYPE
id Integer
email VarChar(50)
isdefault Char(1)
tpid Integer
orgid Integer
errorcode
FIELD DATA TYPE
errcode Integer
errtext VarChar(1000)
filenamehist
FIELD DATA TYPE
as2fromname VarChar(32)
filename VarChar(255)
timestamp VarChar(14)
grouppermission
FIELD DATA TYPE
id Integer
groupid Integer
permissionkey Char(20)
74
Appendix C: Database Schema for Commerce Suite Deployments
Database Schema Tables
hash
FIELD DATA TYPE
id Integer
hashid Integer
tpid Integer
orgid Integer
icssysinfo
FIELD DATA TYPE
tcmversion Char(10)
tcmbuilddatetime Char(14)
dbtype Char(10)
schemaversion Char(10)
schemabuilddatetime Char(14)
keyencryption
FIELD DATA TYPE
id Integer
keyencryptionid Integer
tpid Integer
orgid Integer
75
Appendix C: Database Schema for Commerce Suite Deployments
Database Schema Tables
keypair
FIELD DATA TYPE
fromname Char(32)
toname Char(32)
keyusage Char(1)
pending Char(1)
encrypted Char(1)
status Char(1)
certkeyid Integer
certfile VarChar(255)
keyfile VarChar(255)
keyusagecode
FIELD DATA TYPE
keyusagecode Char(1)
usagestring VarChar(50)
keyusagenbr SmallInt
description Char(20)
76
Appendix C: Database Schema for Commerce Suite Deployments
Database Schema Tables
notice
FIELD DATA TYPE
noticeid Char(22)
opcode Char (8)
fromname Char(32)
toname Char(32)
notifyname Char(40)
msgid VarChar(255)
subject Char(64)
msgdigest Char(28)
begintime Char(14)
endtime Char(14)
agentrole Char(1)
batchnumber Integer
bytesincount Integer
bytesoutcount Integer
errcode Integer
filesize Integer
srcipaddress Char(15)
destipaddress Char(15)
srcipport SmallInt
destiport SmallInt
attemptcount SmallInt
attemptlimit SmallInt
origfilename VarChar(255)
agentname VarChar(20)
sendparams VarChar(255)
errtext VarChar(255)
storedfile Varchar(255)
origtxnid Char(10)
taskid Char(10)
payload VarChar(255)
77
Appendix C: Database Schema for Commerce Suite Deployments
Database Schema Tables
opdescription
FIELD DATA TYPE
opcode Char(8)
opdescription VarChar(50)
org
FIELD DATA TYPE
orgid Integer
orgname VarChar(128)
status Char(1)
type Char(1)
parentid Integer
sterlingconnectenterprise Char(1)
foldheader Char(1)
sslcompression Char(1)
contexttxcoding Char(1)
sendmdn Char(1)
sendmdnsyn Char(1)
signmdn Char(5)
address1 VarChar(100)
address2 VarChar(100)
city VarChar(50)
state VarChar(50)
postalcode Char(20)
country VarChar(50)
region VarChar(50)
pcname VarChar(50)
pctitle VarChar(50)
pcemail VarChar(50)
pcphone Char(20)
pcphoneext Char(10)
78
Appendix C: Database Schema for Commerce Suite Deployments
Database Schema Tables
orgtpcert
FIELD DATA TYPE
id Integer
certkeyid Integer
serialnbr VarChar(150)
status Char(1)
keysusagevalidcd Char(2)
orgid Integer
tpid Integer
p2proute
FIELD DATA TYPE
fromname VarChar(64)
toname VarChar(64)
p2pcondition VarChar(255)
filter VarChar(255)
url VarChar(255)
79
Appendix C: Database Schema for Commerce Suite Deployments
Database Schema Tables
permission
FIELD DATA TYPE
id Integer
category Char(10)
permissionkey Char(15)
description VarChar(100)
displayorder Integer
protocolcode
FIELD DATA TYPE
protocolid Integer
protocol Char(10)
relationship
FIELD DATA TYPE
fromname VarChar(32)
toname VarChar(32)
protocol Integer
notifyname Char(40)
inbox Char(40)
tourl VarChar(255)
rcpturl VarChar(255)
sendparams VarChar(255)
hashoption Integer
cipheroption Integer
compressionoption Integer
requestreceipt Char(1)
asyncreceipt Char(1)
receipthashoption Integer
fromorgid Integer
fromtpid Integer
toorgid Integer
totpid Integer
id Integer
80
Appendix C: Database Schema for Commerce Suite Deployments
Database Schema Tables
server
FIELD DATA TYPE
agentname Char(20)
peergroup Char(1)
agentrole Char(1)
url VarChar(255)
controlurl VarChar(255)
orgid Integer
servercomputer
FIELD DATA TYPE
id Integer
computername Char(50)
orgid Integer
sscipher
FIELD DATA TYPE
id Integer
ciphername VarChar(50)
isdefault Char(1)
sscompression
FIELD DATA TYPE
id Integer
compressionname VarChar(50)
isdefault Char(1)
81
Appendix C: Database Schema for Commerce Suite Deployments
Database Schema Tables
sshash
FIELD DATA TYPE
id Integer
hashnname VarChar(50)
isdefault Char(1)
sskeyencryption
FIELD DATA TYPE
id Integer
keyencryptionname VarChar(50)
isdefault Char(1)
tp
FIELD DATA TYPE
tpid Integer
tpname VarChar(128)
status Char(1)
sterlingconnectenterprise Char(1)
addressnote VarChar(100)
address1 VarChar(100)
address2 VarChar(100)
city Char(40)
state Char(40)
postalcode Char(20)
country Char(50)
bcname Char(40)
bctitle Char30)
bcdept VarChar(50)
bcphone Char(20)
bcmobil Char(20)
82
Appendix C: Database Schema for Commerce Suite Deployments
Database Schema Tables
tporgstatus
FIELD DATA TYPE
id Char(1)
Status Char(10)
83
Appendix C: Database Schema for Commerce Suite Deployments
Database Schema Tables
tpurl
FIELD DATA TYPE
id Integer
protocol Char(5)
server VarChar(128)
port Char(100)
urlresource VarChar(100)
isdefault Char(1)
tpid Integer
orgid Integer
usergroup
FIELD DATA TYPE
groupid Integer
groupname VarChar(75)
description VarChar(100)
orgid Integer
84
Appendix C: Database Schema for Commerce Suite Deployments
Database Schema Tables
userlogin
FIELD DATA TYPE
userid Integer
firstname Char(30)
middleinitial Char(1)
lastname Char(30)
title Char(30)
phone Char(20)
mobil Char(20)
pager Char(20)
email VarChar(50)
pager2 Char(20)
email2 VarChar(50)
login Char(20)
password Char(20)
orgid Integer
groupid Integer
workorder
FIELD DATA TYPE
workorderid Integer
fromname Char(32)
toname Char(32)
notifyname Char(40)
status Char(1)
statustime Char(14)
begintime Char(14)
endtime Char(14)
batchnumber Integer
command VarChar(255)
85
Glossary
Attack
Agent
An attempt to subvert or bypass a system’s security,
An instance of the Commerce Suite Server Version 3
which may or may not be successful. Attacks may be
application configured to provide services to a
active or passive. An active attack attempts to alter
particular role, i.e. Administrator, Transport, or Router.
or destroy data. A passive attack attempts to
Administrator Agent intercept and read data without altering it.
An instance of the Commerce Suite Server Authentication
application configured to provide administrative
services including the remote configuration of Ensures the accurate identification of both the sender
Transport and Router Agents and access to centrally and the receiver. Authentication is accomplished
located configuration data. using digital signatures.
Application Service
See Service. B
AS1
A draft specification first published in the Internet B2B
Engineering Task Force (IETF) standard’s track. AS See Business to Business Commerce.
stands for Applicability Statement and is a
specification about how to transport data, not how to BASE64 Encoding
validate or process data. AS1 provides an Internet Base64 encoding takes three bytes, each consisting
solution for securely exchanging EDI and XML over the of eight bits, and represents them as four printable
Internet using SMTP. characters in the ASCII standard. This is done using
essentially two steps:
AS2 1) Convert three bytes to four numbers of six bits.
A draft specification first published in the Internet Each character in the ASCII standard consists of
Engineering Task Force (IETF) standard’s track. AS seven bits. Base64 only uses 6 bits (corresponding
stands for Applicability Statement and is a to 2^6 = 64 characters) to ensure encoded data is
specification about how to transport data, not how to printable and humanly readable. None of the
validate or process data. AS2 specifies the means to special characters available in ASCII are used. The
connect, deliver, validate, and reply to (receipt) data 64 characters are 10 digits, 26 lowercase charac-
in a secure and reliable way. AS2 provides an Internet ters, 26 uppercase characters as well as '+' and '/'.
solution for securely exchanging EDI over the Internet
Glossary, continued
C Compression
The ability to represent data in forms that take less
storage than the original. The limit to this is the amount
CA of uniqueness in the data. It is not possible to compress
See Certificate Authority. everything down to a single byte, because a byte can
only select 256 different results. Data compression is
Certificate either “lossy,” in which some information is lost, or
An electronic document that verifies that the owner “lossless,” in which all of the original information can be
has a relationship with parties involved in a transaction, completely recovered.
such as a Cardholder that has a relationship with an
issuing bank or merchant that has a relationship with Communications Protocol
an acquiring bank. A certificate authorizes its owner to All communications between devices require that the
perform certain tasks and authenticates the owner to devices agree on the format of the data. The set of
other parties in the transaction, assuring that the party rules defining a format is called a protocol. At the very
presenting the certificate is the same party to which it least, a communications protocol must define the
was originally issued. following:
87
Glossary, continued
Configuration File
A text file containing one or more Console Command
D
statements. A Configuration File can be processed
automatically by the Commerce Suite Server Data Compression
application upon startup if it is named icssvr.cfg and Storing data in a format that requires less space than
stored in the same directory location as the usual. Compressing data is the same as packing data.
Commerce Suite Server executable program. A Data compression is particularly useful in
Configuration File can also be processed if the -f communications because it enables devices to
parameter is entered as a run-time program argument transmit the same amount of data in fewer bits.
or as a console command.
Database
Control Address
A structure to store data, usually as elements, so that a
The IP address portion of the IP Address and Port used variety of applications can use it, unlike the traditional
by the Commerce Suite Server Transport and Router file structure requiring different files for each
Agents to listen for incoming control messages from a application.
supervising Administrative Agent; configured using the
-ca Set Option. Data Integrity
The property that signifies that data is not altered,
Control Port
destroyed, or otherwise compromised.
The IP Port portion of the IP Address and Port used by
the Commerce Suite Server Transport and Router DBMS
Agents to listen for incoming control messages from a See Database Management System.
supervising Administrative Agent. Configured using the
-cp Set Option. DEFLATE
Specifies the DEFLATE compression algorithm used to
Control Service
reduce the file transfer overhead. The DEFLATE
The set of application tasks which execute within the compression algorithm is a lossless compressed data
context of a thread of execution to process incoming format that compresses data using a combination of
commands being sent by an Administrator Agent. The the LZ77 algorithm and Huffman coding.
Control Service is required by Commerce Suite Server
Agents acting in the Transport or Router Role, if the Delivery Notification
Agent is being remotely configured.
A message formatted according to (AS2) that is sent to
a sending host computer to indicate the disposition of
CRL
a received message. The format of Delivery
See Certificate Revocation List. Notifications used by Commerce Suite Server is the
Message Delivery Notification. or MDN, as defined in
Cryptography
MDN.
The process of protecting information by transforming
it into an unreadable format. The information is DES
encrypted using a Key, which makes the data See Digital Encryption Standard.
unreadable, and is then decrypted later when the
information needs to be used again. Diffie-Hellman Key Exchange Algorithm
A cryptographic technique that enables sending and
Cypher Text
receiving parties to derive a shared, secret key at both
Data that has been transformed from a plaintext form ends without disclosing it to a potential attacker. Using
into encrypted text (an unreadable form) using an a common modulus and base, both sides use a
encryption process. different random number as a power to perform a
modular exponentiation. The results are sent to each
88
Glossary, continued
other. The receiving party raises the received number the signature. Each signatory has a public and private
to the same random power they used before and the key. The private key is used in the signature generation
results are the same on both sides. process and the public key is used in the signature
verification process.
Digital Certificate
A document that contains name, serial number,
expiration dates and a copy of the owner’s public key;
used to encrypt data and validate signatures. E
Digital Encryption Standard EDI
A Private Key Encryption standard approved by the US See Electronic Data Interchange.
Government for encryption of data when
implemented in hardware. Uses 56-bit encryption. Electronic Commerce
89
Glossary, continued
F G
FIPS Graphical User Interface
Federal Information Processing Standard. A GUI (usually pronounced GOO-ee) is a graphical
user interface that takes advantage of the computer's
Firewall graphics capabilities to make the program easier to
A system designed to prevent unauthorized access to use. Well-designed graphical user interfaces can free
or from a private network, usually unauthorized access the user from learning complex command languages.
from the Internet into a private network. Firewalls can On the other hand, many users find that they work
be implemented in both hardware and software, or a more effectively with a command-driven interface,
combination of both. Firewalls are frequently used to especially if they already know the command
prevent unauthorized Internet users from accessing language.
private networks connected to the Internet, especially
GZIP
intranets. All messages entering or leaving the intranet
pass through the firewall, which examines each Specifies a lossless compressed data format that is
message and blocks those that do not meet the compatible with the widely used GZIP utility. This format
specified security criteria. includes a cyclic redundancy check value for
detecting data corruption.
There are several types of firewall techniques:
• Packet filter: Looks at each packet entering or
leaving the network and accepts or rejects it
based on user-defined rules. Packet filtering is H
fairly effective and transparent to users, but it is
difficult to configure. In addition, it is susceptible Hash
to IP spoofing.
A hash value (or simply hash) is a number generated
• Application gateway: Applies security from a string of text. The hash is substantially smaller
mechanisms to specific applications, such as than the text itself, and is generated by a formula in
FTP and Telnet servers. This is very effective, but such a way that it is extremely unlikely that some other
can impose a performance degradation. text will produce the same hash value. Hashes play a
role in security systems where they're used to ensure
• Circuit -level gateway: Applies security
that transmitted messages have not been tampered
mechanisms when a TCP or UDP connection is
with. The sender generates a hash of the message,
established. Once the connection has been
encrypts it, and sends it with the message itself. The
made, packets can flow between the hosts
recipient then decrypts both the message and the
without further checking.
hash, produces another hash from the received
• Proxy server: Intercepts all messages entering message, and compares the two hashes. If they're the
and leaving the network. The proxy server same, there is a very high probability that the message
effectively hides the true network addresses. was transmitted intact.
90
Glossary, continued
HTTP Interface
See Hypertext Transfer Protocol. A mechanism through which outside components
interact with software.
Hypertext Transfer Protocol
Hypertext Transfer Protocol (HTTP) is the underlying Interoperability
protocol used by the World Wide Web. HTTP defines The ability of software and hardware on different
how messages are formatted and transmitted, and machines from different vendors to share data.
what actions Web servers and browsers should take in
response to various commands. Interrogation
To ask a computer or network for information.
I Intranet
An internal network based on web servers that use
Internet protocols and technology. A network based
IETF on TCP/IP protocols (an internet) belonging to an
Internet Engineering Task Force - The Internet organization, usually a corporation, accessible only by
Engineering Task Force is a large, open, international the organization’s members, employees, or others with
community of network designers, operators, vendors, authorization. An intranet’s Web sites look and act just
and researchers concerned with the evolution of the like any other Web sites, but the firewall surrounding an
Internet architecture and the smooth operation of the intranet fends off unauthorized access.
Internet.
IP
In-Beacon Service Abbreviation for Internet Protocol, pronounced as two
The set of application tasks that execute within the separate letters. IP specifies the format of the packets,
context of a single application thread to receive UDP also called datagrams, and the addressing scheme.
packets sent by one or more Transport Agents. Most networks combine IP with a higher-level protocol
Commerce Suite Server Agents configured for the called Transport Control protocol (TCP), which
Router Role (Router Agents) use the In-Beacon Service establishes a virtual connection between a destination
to collect these UDP packets to maintain current and a source.
information about active Transfer Agents on the local IP by itself is something like the postal system. It allows
network segment. you to address a package and drop it in the system,
but there’s no direct link between you and the
Inbound Service recipient. TCP/IP, on the other hand, establishes a
One or more sets of application tasks that execute connection between two hosts so that they can send
within the context of one or more threads of execution messages back and forth for a period of time.
to process incoming data being sent by a remote host
computer. The Inbound Service consists of, at least, IP Address
one inbound thread listening for incoming TCP/IP An identifier for a computer or device on a TCP/IP
connections on a particular protocol (HTTP or HTTPS). network. Networks using the TCP/IP protocol route
The Inbound Service creates an Inbound Session messages based on the IP address of the destination.
thread for each separate incoming connection. Each The format of an IP address is a 32-bit numeric address
discrete protocol is serviced by a separate Inbound written as four numbers separated by periods. Each
Main thread, which is assigned a unique IP address number can be zero to 255. For example, 1.160.10.240
and port on which to listen for incoming connections. could be an IP address.
within an isolated network, you can assign IP addresses
Integrity at random as long as each one is unique. However,
Ensures that data is not tampered with or corrupted in connecting a private network to the Internet requires
transit. Integrity is accomplished using document using registered IP addresses (called Internet
digests and digital signatures. addresses) to avoid duplicates.
91
Glossary, continued
The four numbers in an IP address are used in different Lightweight Directory Access Protocol (LDAP)
ways to identify a particular network and a host on A set of protocols for accessing information directories.
that network. The InterNIC Registration Service assigns LDAP is based on the standards contained within the
Internet addresses from the following three classes: X.500 standard, but it is significantly simpler. And unlike
• Class A: supports 16 million hosts on each of 127 X.500, LDAP supports TCP/IP, which is necessary for any
networks. type of Internet access. Because it is a simpler version
of X.500, LDAP is sometimes called X.500-lite. Although
• Class B: supports 65,000 hosts on each of 16,000 not yet widely implemented, LDAP should eventually
networks. make it possible for almost any application running on
• Class C: supports 254 hosts on each of 2 million virtually any computer platform to obtain directory
networks. information, such as email addresses and public keys.
Because LDAP is an open protocol, applications need
The number of unassigned Internet addresses is
not worry about the type of server hosting the
running out, so a new classless scheme called CIDR is
directory.
gradually replacing the system based in classes A, B,
and C, and is tied to adoption of IPv6. Local Area Network (LAN)
A group of computers, printers, and file servers linked
together in a single building in order to share resources.
K
Key M
A password or table needed to decipher encoded
data. MD5
Key Encryption Specifies the Message Digest Algorithm used to verify
a file’s integrity. The MD-5 is a one-way algorithm that
The translation of data into a secret code. Encryption
takes any length of data and produces a 128-bit
is the most effective way to achieve data security. To
“fingerprint” or “message digest”. This fingerprint is
read an encrypted file, you must have access to a
“non-reversible”, meaning that the data cannot be
secret key or password that enables you to decrypt it.
determined based on its MD-5 fingerprint.
Unencrypted data is called plain text; encrypted data
is referred to as cipher text. There are two main types Message
of encryption: asymmetric encryption (also called
public-key encryption) and symmetric encryption. A communication containing one or more
transactions or related information.
Key Management
Message Digest
The generation, storage, secured distribution and
A mathematical value unique to a message, created
application of keying material in accordance with a
by running the message through the SHA1 hash
security policy.
function. The resulting message digest is then
Key Pair encrypted using the sender’s private key and then
appended to the message as the Digital Signature.
In public key cryptography, a public key and its
corresponding private key. Message Disposition Notification (MDN)
A Message Disposition Notification (MDN) message is a
response message defined to ensure the secure
L reliable delivery of messages for AS1 and AS2
protocols.
LDAP
See Lightweight Directory Access Protocol.
92
Glossary, continued
93
Glossary, continued
94
Glossary, continued
95
Glossary, continued
Order, User Interface, Out-Beacon, and In-Beacon. data units (PDUs), to different parts of a network.
Sets of concurrently executing Services are combined SNMP-compliant devices, called agents, store data
to define Commerce Suite Server Roles. about themselves in Management Information Bases
(MIBs) and return this data to the SNMP requesters.
SET
See Secure Electronic Transaction Protocol. SSL
See Secure Sockets Layer.
SHA-1
Specifies the Secure Hash Algorithm used to verify a Strong Encryption
file’s integrity. The SHA-1 generates a condensed A term given to describe a cryptosystem that uses a
representation of a message called a message digest. key of sufficient length that it becomes effectively
The SHA-1 is used by both the transmitter and intended impossible to break the cypher within a meaningful
receiver of a message in computing and verifying a time frame.
digital signature.
Subscriber
Signature An entity which receives a certificate from a CA.
See Digital Signature.
Supply Chain Management
Sockets The process of optimizing a company’s internal
Sockets are a method for communication between a practices, as well as the company’s interaction with
client program and a server program in a network. A suppliers and customers, in order to bring products to
socket is defined as the endpoint in a connection. market more efficiently. A company that performs
Sockets are created and used with a set of these functions most effectively is in a position to
programming request (function calls) sometimes deliver products more quickly, and at a lower cost or
called the sockets API. The most common sockets API higher profit margin, than its competitors.
is the Berkeley UNIC C interface for sockets. Sockets
can also be used for communication between Symmetric Encryption
processes within the same computer. A type of encryption where the same key is used to
encrypt and decrypt the message. This differs from
S/MIME asymmetric (or public-key) encryption, which uses one
Secure MIME - S/MIME (Secure/Multipurpose Internet key to encrypt a message and another to decrypt the
Mail Extensions) provides a consistent way to send and message.
receive secure MIME data. Based on the popular
Internet MIME standard, S/MIME provides the following
cryptographic security services for electronic
messaging applications: authentication, message T
integrity and non-repudiation of origin (using digital
signatures) and privacy and data security (using TCP/IP
encryption).
Transmission Control Protocol/Internet Protocol or the
SMTP suite of standard protocols that enable computers to
inter-communicate on the Internet. TCP/IP uses several
Simple Mail Transport Protocol - An Internet standard
protocols, the two main ones being TCP and IP. TCP/IP
for transporting email.
is built into the UNIX operating system and is used by
the Internet, making it the de facto standard for
SNMP
transmitting data over networks. Even network
See Simple Network Management Protocol. operating systems that have their own protocols, such
as NetWare, also support TCP/IP.
Simple Network Management Protocol
A set of protocols for managing complex networks. The
first versions of SNMP were developed in the early 80s.
SNMP works by sending messages, called protocol
96
Glossary, continued
Transport Agent
An instance of the Commerce Suite Server application
configured to provide transport services including the
V
compression, encryption and delivery of data, the
verification of digital signatures and the construction Virtual Private Network (VPN)
and transmission of Delivery Notifications. A controlled, trusted network structure that
incorporates end-to-end encryption, enabling a
Triple Data Encryption Standard secure connection from any linked machine to any
Triple Data Encryption Standard (DES3) is a derivative other.
of Data Encryption Standard (DES) that has served as
the cornerstone of data encryption for almost 40 years.
DES-3 is DES run three times with three different keys. It
uses a 192-bit key and has an effective strength of 112- W
bits.
Work-Order
A set of one or more Console Commands sent to a
U Commerce Suite Server Agent to accomplish one or
more specific tasks. The typical use of a Work-Order is
to initiate an outbound delivery of data (a send).
UCC
Uniform Code Council, Inc. Work-Order Service
The set of application tasks that execute within the
UDP context of a single thread of execution to query the
User Datagram Protocol. A simple, datagram- database or a directory for Work Orders.
oriented, transport layer protocol, used by Commerce
Suite Server to facilitate dynamic pools of Transport
Agents marshaled by a Router Agent. The Transport
Agents use UDP as the underlying protocol to transmit X
small informative packets of data identifying their
inbound protocol ports. XML
Uniform Resource Locator See eXtensible Markup Language.
The global address used for locating resources on the X.509V3
web.
X.509 Public Key Certificate and CRL Profile, Version 3,
URL defined in CERT. The version of X.509 Public Key
Certificate supported by Commerce Suite Server. A
See Uniform Resource Locator.
standard format for public key certificates and
User-Interface Service Certificate Revocation Lists (CRL). X.509 is a standard
for security services within the X.500 directory services
The set of application tasks that execute within the
framework.
context of a single thread of execution to return HTML-
formatted application-status information to a web-
browser. The User-Interface Service is not required by
any Commerce Suite Server Role. However, any
97
1000 Abernathy Road · Building 400, Suite 250 · Atlanta, Georgia 30328
800.251.4930 toll free · 770.730.3600 main · 770.730.3784 fax
info@nubridges.com · www.nubridges.com