Resources List
The following list shows the supported resources.
The following resources are supported:
- Accounts – Configuration data that describes user accounts. Subcategories include: Users, Groups, and Permissions.
- Adapter Policies - Adapter Policies can limit bandwidth, command availability, amount of inbound data, and can lockout users.
- Application Configurations – For SAP, this resource is configuration data that describes application setup.
- Business Processes – Business process model definitions and their associated particulars.
- Communities – Data that describes trading partner communities, including adding or deleting protocols and document types.
- Digital Certificates – User identification data for secure communications, which contains a user's public key, identity information, and one or more digital signatures. Subcategories include: CA, Trusted, and System.
- ebXML Specifications – Data that describes ebXML Business Process Specification Schema (BPSS) and Collaboration Protocol Agreement (CPA) defined when setting up trading profiles.
- Extended Rule Libraries – Data defining a list of extended rules, used in the Map Editor to define complex mapping transactions, saved in a separate file outside of the Map Editor source.
- Group Permissions - Configuration data defined to provide access to different modules within Sterling B2B Integrator and are the foundation of role-based security.
- Maps – Source maps of either the .mxl or .map versions and translation objects (.txo) and XML encoder objects (.ltx).
- Mailboxes – Configuration data for setting up mailboxes and services. When Mailbox metadata is exported, the users, user groups, permissions, virtual roots and routing rules the mailbox needs to function are automatically exported. You do not have to specifically select them for export. Unless you explicitly do not want these additional resources, you should import all of the resources in the export file when you import the mailboxes. This imports the additional resources that the mailboxes need to work correctly.
- OFTP - Odette File Transfer Protocol (OFTP) is a packet-oriented file transfer protocol (RFC 5024) facilitating electronic data interchange of business data between trading partners. (For Sterling B2B Integrator version 5242 and higher)
- PGP Profiles – Pretty Good Privacy (PGP) configuration data used to encrypt and decrypt documents.
- Perimeter Servers – Configuration data defined when setting up perimeter servers and services.
- Proxy Netmaps – Configuration data for netmaps used with IBM® Sterling Secure Proxy.
- Proxy Policies – Configuration data for policies used with Sterling Secure Proxy.
- Report Configurations – Configuration data defined when specifying the reports to be generated.
- Schedules – Configuration data used to define business processes and services.
- Security Tokens – Configuration data defined to ensure that only authorized users can access the data associated with the token, such as by identifying and checking the credentials of Web Services users so that they can send and receive documents.
- Service Configurations – Data defined when creating service configurations (restricted to operator-level permissions).
- SSH Keys – Security key data used for authentication between partners when establishing a session for SSH/SFTP or SSH/SCP data transfer.
- SWIFTNet Routing Rules – The SWIFTNet Routing Rule is created by the Responder and is used by the SWIFTNet Server adapter to manage interactive messages from the SWIFTNet MEFG Server. The rule routes an incoming request message to a user-defined business process.
- Trading Partner Data – Configuration data defined with trading profiles. Subcategories, known as partner resources, include, Packagings, Identities, Contracts, Envelopes, Control numbers, and Code lists.
- User Groups - Configuration data defined for role-based security, enables you to maintain access permissions for multiple users from a central location. Enables the association of many permissions to different users by creating groups for each job function, instead of each user.
- User Permissions - Configuration data defined to provide access to different modules within Sterling B2B Integrator and are the foundation of role-based security.
- Web Resources – Data that makes up XSLT style sheets.
- Web Services – Configured resource data that makes up Web services, including service and adapter configurations, digital certificates, business process models, XML schemas, WSDL, and Web services group configurations.
- WSDL – Data that describes Web Service Definition Languages (WSDL).
- XML schemas – Data that makes up XML schemas.
- XSLTs – Data that makes up XSLT style sheets.