DX 1053 OperatorGuide en
DX 1053 OperatorGuide en
10.5.3
Operator Guide
Informatica B2B Data Exchange Operator Guide
10.5.3
December 2022
© Copyright Informatica LLC 1993, 2022
This software and documentation are provided only under a separate license agreement containing restrictions on use and disclosure. No part of this document may be
reproduced or transmitted in any form, by any means (electronic, photocopying, recording or otherwise) without prior consent of Informatica LLC.
U.S. GOVERNMENT RIGHTS Programs, software, databases, and related documentation and technical data delivered to U.S. Government customers are "commercial
computer software" or "commercial technical data" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such,
the use, duplication, disclosure, modification, and adaptation is subject to the restrictions and license terms set forth in the applicable Government contract, and, to the
extent applicable by the terms of the Government contract, the additional rights set forth in FAR 52.227-19, Commercial Computer Software License.
Informatica, the Informatica logo, Informatica Cloud, PowerCenter, PowerExchange, and Data Engineering Integration are trademarks or registered trademarks of
Informatica LLC in the United States and many jurisdictions throughout the world. A current list of Informatica trademarks is available on the web at https://
www.informatica.com/trademarks.html. Other company and product names may be trade names or trademarks of their respective owners.
Portions of this software and/or documentation are subject to copyright held by third parties. Required third party notices are included with the product.
DISCLAIMER: Informatica LLC provides this documentation "as is" without warranty of any kind, either express or implied, including, but not limited to, the implied
warranties of noninfringement, merchantability, or use for a particular purpose. Informatica LLC does not warrant that this software or documentation is error free. The
information provided in this software or documentation may include technical inaccuracies or typographical errors. The information in this software and documentation
is subject to change at any time without notice.
NOTICES
This Informatica product (the "Software") includes certain drivers (the "DataDirect Drivers") from DataDirect Technologies, an operating company of Progress Software
Corporation ("DataDirect") which are subject to the following terms and conditions:
1. THE DATADIRECT DRIVERS ARE PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING BUT NOT LIMITED TO,
THE IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT.
2. IN NO EVENT WILL DATADIRECT OR ITS THIRD PARTY SUPPLIERS BE LIABLE TO THE END-USER CUSTOMER FOR ANY DIRECT, INDIRECT, INCIDENTAL,
SPECIAL, CONSEQUENTIAL OR OTHER DAMAGES ARISING OUT OF THE USE OF THE ODBC DRIVERS, WHETHER OR NOT INFORMED OF THE POSSIBILITIES
OF DAMAGES IN ADVANCE. THESE LIMITATIONS APPLY TO ALL CAUSES OF ACTION, INCLUDING, WITHOUT LIMITATION, BREACH OF CONTRACT, BREACH
OF WARRANTY, NEGLIGENCE, STRICT LIABILITY, MISREPRESENTATION AND OTHER TORTS.
The information in this documentation is subject to change without notice. If you find any problems in this documentation, report them to us at
[email protected].
Informatica products are warranted according to the terms and conditions of the agreements under which they are provided. INFORMATICA PROVIDES THE
INFORMATION IN THIS DOCUMENT "AS IS" WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING WITHOUT ANY WARRANTIES OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND ANY WARRANTY OR CONDITION OF NON-INFRINGEMENT.
Table of Contents 3
Deleting a Portal User. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
Profiles. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
Setting Up a Profile. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
Searching for Profiles. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
Editing a Profile. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
Deleting a Profile. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
Enabling or Disabling a Profile. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
Running a Batch Profile. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
Profile Usage in Endpoints. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
Delayed Events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
Chapter 7: Endpoints. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
Endpoints Overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
Endpoint Types. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
Common Endpoint Properties. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88
File Receive Endpoint Properties. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89
File Send Endpoint Properties. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
4 Table of Contents
JMS Receive Endpoint Properties. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
JMS Send Endpoint Properties. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92
MFT Hosted Receive Endpoint Properties. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
MFT Hosted Send Endpoint Properties. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96
MFT Remote Receive Endpoint Properties. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98
MFT Remote Send Endpoint Properties. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103
Configuration Variables in Endpoints. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107
Custom Variables. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108
Adding an Informatica Managed File Transfer Hosted Receive Endpoint. . . . . . . . . . . . . . . . . . 108
Adding an Informatica Managed File Transfer Hosted Send Endpoint. . . . . . . . . . . . . . . . . . . . 109
Adding an Informatica Managed File Transfer Remote Receive Endpoint. . . . . . . . . . . . . . . . . 110
Adding an Informatica Managed File Transfer Remote Send Endpoint. . . . . . . . . . . . . . . . . . . 111
Adding Local Endpoints. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111
Running an Inbound Informatica Managed File Transfer Endpoint Manually . . . . . . . . . . . . . . . 112
Searching Endpoints. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112
Editing and Deleting Endpoints. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113
Changing Status of Multiple Endpoints. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113
Processing Files with Informatica Intelligent Cloud Services Mappings. . . . . . . . . . . . . . . . . . 114
Input File Parameters. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115
Formatting Options for Flat File Sources. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115
Processing Files with a File Ingestion Task. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116
Adding Local Endpoints. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117
Endpoint Error Events. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117
Table of Contents 5
Chapter 10: Reconciliations. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131
Reconciliations Overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131
Reconciliation Monitors. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131
Creating a Reconciliation Monitor. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 132
Updating a Reconciliation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135
Reconciliation Problems. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138
Monitoring and Resolving Timed-out Reconciliations. . . . . . . . . . . . . . . . . . . . . . . . . . . 139
6 Table of Contents
Dashboard Filters. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 158
Dashboard Panels. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 158
Average Processing Time Panel. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 160
Error Events by Account Panel. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 161
Error Events by Event Status Panel. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 162
Error Events by Event Type Panel. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163
Error Events by Partner Panel. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 164
Error Events Distribution Panel. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 165
Error Rate Panel. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 166
Events by Account Panel. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 167
Events by Event Status Panel. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 167
Events by Event Type Panel. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 169
Events by Partner Panel. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 170
Events Distribution Panel. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 170
SLA Violations Panel. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 171
Tasks Panel. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 174
Dashboard Panel CSV File Structure. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 175
Managing the Dashboard. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 176
Index. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 186
Table of Contents 7
Preface
Use the B2B Data Exchange Operator Guide to learn about the operational tasks available in the B2B Data
Exchange Operation Console. The guide describes the Operation Console and provides information about
partners and profiles, Managed File Transfer, endpoints, events, and audit and authorization. The guide also
describes the B2B Data Exchange dashboard and the reports that show in the dashboard.
Informatica Resources
Informatica provides you with a range of product resources through the Informatica Network and other online
portals. Use the resources to get the most from your Informatica products and solutions and to learn from
other Informatica users and subject matter experts.
Informatica Network
The Informatica Network is the gateway to many resources, including the Informatica Knowledge Base and
Informatica Global Customer Support. To enter the Informatica Network, visit
https://network.informatica.com.
To search the Knowledge Base, visit https://search.informatica.com. If you have questions, comments, or
ideas about the Knowledge Base, contact the Informatica Knowledge Base team at
[email protected].
Informatica Documentation
Use the Informatica Documentation Portal to explore an extensive library of documentation for current and
recent product releases. To explore the Documentation Portal, visit https://docs.informatica.com.
8
If you have questions, comments, or ideas about the product documentation, contact the Informatica
Documentation team at [email protected].
Informatica Velocity
Informatica Velocity is a collection of tips and best practices developed by Informatica Professional Services
and based on real-world experiences from hundreds of data management projects. Informatica Velocity
represents the collective knowledge of Informatica consultants who work with organizations around the
world to plan, develop, deploy, and maintain successful data management solutions.
You can find Informatica Velocity resources at http://velocity.informatica.com. If you have questions,
comments, or ideas about Informatica Velocity, contact Informatica Professional Services at
[email protected].
Informatica Marketplace
The Informatica Marketplace is a forum where you can find solutions that extend and enhance your
Informatica implementations. Leverage any of the hundreds of solutions from Informatica developers and
partners on the Marketplace to improve your productivity and speed up time to implementation on your
projects. You can find the Informatica Marketplace at https://marketplace.informatica.com.
To find your local Informatica Global Customer Support telephone number, visit the Informatica website at
the following link:
https://www.informatica.com/services-and-training/customer-success-services/contact-us.html.
To find online support resources on the Informatica Network, visit https://network.informatica.com and
select the eSupport option.
Preface 9
Chapter 1
Document Processing
This chapter includes the following topics:
You can use the Operation Console to customize, manage, and monitor processing of similar types of
documents for different partners. The Operation Console enables you to perform the operational and
administrative tasks required to process the documents, such as setting up and managing partners,
workflows, and profiles, and monitoring the events that are generated when the documents are processed.
The B2B Data Exchange developer can create PowerCenter workflows to process documents. These
workflows typically include Data Exchange Transformations and Unstructured Data Transformations. In B2B
Data Exchange, the administrator can create a workflow that represents the PowerCenter workflow. The Data
Exchange Server uses profiles to determine the workflow and parameters to use to process documents for a
partner.
1. Create partners that represent customers or applications. For more information, see “Partners” on page
21.
2. Create accounts that represent customer departments or divisions. For more information, see “Adding
an Account to a Partner” on page 24.
3. Create profiles to associate a partner or an account with a workflow. For more information, see
“Profiles” on page 31.
10
4. Create endpoints for partners or accounts. For more information, see “Endpoints Overview” on page
85.
5. Test and enable the profiles that you created. You can run the workflow that is associated with a profile
in a test environment to process test documents.
6. Review the events that are generated when you run the profiles. For more information, see “Managing
Events on the Event List Page” on page 120.
7. If the profile requires delayed events, create delayed processing rules. For more information, see
“ Delayed Events ” on page 36.
8. Create on-boarding checklists to manage partner creation and maintenance. For more information, see
“On-Boarding Checklists Overview” on page 48.
1. B2B Data Exchange receives the document file from the partner and routes the document to the
PowerCenter workflow.
2. If the inbound file contains multiple X12 850 documents, the PowerCenter workflow splits the file to
individual X12 850 documents.
3. The PowerCenter workflow runs a B2B data transformation to validate each document.
4. If required, the PowerCenter workflow generates an EDI Acknowledgement document (997) after the
validation.
5. If no errors are encountered, the PowerCenter workflow runs a B2B data transformation that transforms
the documents to COBOL format.
6. The PowerCenter workflow combines the individual COBOL documents into a single COBOL file.
7. The PowerCenter workflow returns the 997 files to B2B Data Exchange.
8. B2B Data Exchange delivers the 997 documents to the partner.
Profiles enable you to customize the transformation process according to parameters that define the
transformation process.
• Validation parameters. Data validation within the document. For example, the parameter can set the
control sequence number or determine the version of an EDI document.
• Enrichment parameters. Values to add to the document. For example, the parameter can contain data for
the EDI ISA control envelope when an EDI output is generated.
• Control parameters. Evaluate various conditions during the transformation. For example, the parameter
can control how to generate an EDI acknowledgement or how to process documents in a test
environment.
The following diagram shows how profiles customize the transformation process:
The following table includes the information that you need to set up a profile:
Type Description
Workflow Name Name of the PowerCenter workflow to use when you process documents for each partner.
Processing Specific requirements for running the profile. These can include acknowledgement
Requirements requirements or whether a profile runs in test mode or production mode.
Event Hierarchy Outline of the events that should be generated when the documents are processed. When
Documentation you view these events, the event hierarchy documentation can help you interpret the events
and determine how to resolve errors.
Delayed Processing Rules and conditions for delaying events. Delayed processing might be required if
Rules documents must be processed in groups, or when processing large documents may take a
long time.
Type Description
Customer Name Name of the customer. This name is used as the partner name in B2B Data Exchange.
Departments List of customer departments that need to send or receive documents. Each department name is
used as an account name in B2B Data Exchange.
Note:
- A partner must include at least one account.
- You can define more than one account for a single partner.
Processing Specific instructions or rules for processing documents. These can include requirements such
Requirements as sending acknowledgements at specific time intervals.
Operation Console
This chapter includes the following topics:
Area Description
Left pane Navigator. Enables you to navigate between tasks that you can perform in the Operation Console.
Right pane Current page. Main work area in which you perform the tasks that you select in the Navigator.
15
• For security and resource allocation purposes, B2B Data Exchange ends the user session if there is no
activity for 30 minutes.
• If you are unable to connect to the Operation Console, or if you see incorrect data after you connect, verify
that the database settings in the following files are identical:
<DataExchangeInstallationDir>/conf/dx-configuration.properties
<DataExchangeInstallationDir>/tomcat/shared/classes/dx-configuration.properties
These files contain the PowerCenter repository connection settings.
The options at the bottom of each pay display the current page, the total number of pages, and enable you to
move to the next or previous page.
1. To change the maximum number of rows that are displayed in each page, select the relevant value in the
Rows per page field.
2. If the list contains more objects than the number you specified, click Next to navigate to the remaining
objects.
3. To return to the previous object list, click Previous.
To sort a list of objects, click the title of the column by which you want to sort.When you sort a list of objects
by a column, an arrow indicates whether the column is sorted in ascending or descending order.
Note:
Each partner contains one or more accounts. In a customer organization, an account can be a division, a
department, or a subsidiary. In an internal system, an account can be a customer ID or a vendor code.
A workflow represents the transformation logic required to process documents for a partner. The B2B Data
Exchange developer creates a PowerCenter workflow to process the documents and a workflow in the B2B
Data Exchange Operation Console to represent the PowerCenter workflow.
Profiles enable you to associate a workflow with a partner or an account. A profile defines how to process a
document for a partner or an account. You can add parameters to the profile that customize the selected
workflow for a partner. When you run a workflow that is associated with a profile, the PowerCenter workflow
processes the documents for the partner that is defined in the profile.
You can restrict access to partners, accounts, and profiles with categories. Categories are classifications
that can represent regional division or departments in the organization. When you assign categories to
objects, you also restrict access to related objects, such as events, endpoints, and SLA rules. The B2B Data
Exchange administrator assigns categories to user groups to determine which users can access the objects.
20
Categories
A category controls access to partners, accounts, and profiles. You assign categories to the objects to
determine the users that can view or modify the objects.
By default, accounts inherit categories from the partner and profiles inherit categories from the account. You
can choose to manage individual account or profile categories. Inherited categories for accounts and profiles
appear in read-only mode.
When you assign categories to objects, you also restrict access to the following related objects:
When you add an account to a partner, B2B Data Exchange sets the account categories according to the
category management mode. For example, if you apply partner categories to the accounts, new accounts
inherit the partner categories. If you add or remove categories from the partner, B2B Data Exchange applies
the change to all accounts for that partner.
If you change the category management mode to inherit from the partner or account, all existing categories
for the profile or account are overridden. If you change the category management mode to manage individual
account categories, you must save the partner before you can assign categories to individual accounts.
The B2B Data Exchange administrator creates categories and grants permissions for the categories to user
groups. Objects without categories are accessible by all B2B Data Exchange users. Objects with categories
are accessible only by users with permissions to one or more categories.
Partners
Partners are the entities that send documents to B2B Data Exchange for processing and receive the
processed documents in return. A partner can be an organization like a vendor or customer. Internal systems,
like accounting systems and ERP systems, can also be defined as partners.
B2B Data Exchange provides the following functions for working with partners:
• Setting up a partner
• Searching for partners
• Editing a partner
• Deleting a partner
• Adding an account to a partner
• Promoting partners
Setting Up a Partner
Setting up a partner explains how to add a partner to the B2B Data Exchange repository.
Categories 21
On all Operation Console screens, fields marked with an asterisk (*) are mandatory.
3. On the Create Partner page, enter a name for the partner.
The partner name can be up to 60 characters and can include spaces and special characters.
4. In the Description field, enter any relevant information or a description of the partner.
You can enter up to 255 characters in the Description field.
5. To flag this partner as ready for promotion, click the Ready to be promoted checkbox.
6. To manage contact information for this partner, click Contacts.
7. To add a contact, click Add Contact. The Contact Information form opens.
8. Complete the form according to the following table, and click Save. You can edit an existing contact.
Property Description
Name Name of the contact person. The contact name can contain up to 60
characters.
Title Title of the contact person. The title can contain up to 255 characters.
Address Address of the contact person. The address can contain up to 255
characters.
Business Phone Business telephone number of the contact person. The telephone number
can contain up to 20 characters.
Email Email address of the contact person. The email address can contain up to
255 characters.
9. To update additional information about this partner, click Additional Information and edit the contents of
the form. Click Save.
The content of the additional information form is dynamic and is controlled by the Administrator.
1. In the Navigator, click Partner Management > Partners. The Partners screen appears showing all
partners in descending order of Partner Id.
2. To search for a specific partner by name, enter your search string in the Find field and click Go.
3. To search for partners by Partner Promotion status, Partner Categories, or Custom Attributes, click
Advanced Search.
4. To search by Partner Id or Partner Name, enter your search string in the appropriate field and click Go.
5. To search for partners by Partner Promotion status, select a value from the list. The default value is All.
6. You can search for partners using up to three custom partner or account attributes in one search. To
search by custom attributes, click the Browse button (...).
The Custom Attributes Search Criteria window appears.
7. On the Customs Attribute Search Criteria screen, select a Partner/Account, then an Attribute, then an
Operator. Type in the search value of the attribute. Repeat for up to three custom attributes. Click OK.
The Partners Screen reappears.
8. On the Partners screen, choose an operation for the search – either Or (default) or And . This operator
applies to all search criteria on the screen, including Custom Attributes.
Partners 23
9. The Operation Console displays a list of partners matching your search criteria. To edit, copy or delete a
partner, click on the appropriate icon at the right side of the screen.
10. To display all the events sent to or received from a specific partner in the Partners screen, click the
Events link in the desired partner's row. The Operation Console shows the events for the selected partner
in the Event List screen.
Editing a Partner
To edit a partner, click Partner Management > Partners and click Edit for the partner to edit. Modify the
properties and click Save.
Deleting a Partner
To delete a partner, click Partner Management > Partners and click the Delete icon for the partner you want
to remove. Confirm the deletion. If the partner has portal users, confirm that you want to delete the portal
users.
Account Uniqueness
The dx.system.account.uniqueness system property indicates whether an account is unique within the scope
of the partner or within the scope of B2B Data Exchange.
If the dx.system.account.uniqueness system property is set to PARTNER, the account is unique within the
scope of the partner. You can assign the same account number to multiple partners. If you do, the B2B Data
Exchange Server determines the profile based on the application, partner, and account number.
You can edit the account settings and select a Default Outbound Endpoint. B2B Data Exchange uses the
default endpoint to route outgoing files.
Partner Promotion
Partner promotion enables you to export one or more partners and their related entities from one
environment to another. For example, you can promote partners from development to test or from test to
production. Partner promotion consists of exporting partners from the source environment and importing
them into the target environment.
After you create and test a partner and its associated entities in the test environment you can flag it as
"Ready to be promoted" on the Update Partner screen. You can later search for all the partners that you
marked and export them all at once.
The partner export process creates a file of partners to be exported as well as partners and entities
associated with the partners. The following associated entities are exported with the partners:
• Accounts
• Profiles
• Endpoints
• Monitors
• Workflows
The export file contains partners that are related to the exported partners. A related partner is a partner that
is connected to an exported partner thorough a monitor that executes a profile that refers to the related
partner. The following figure illustrates the connection between an exported partner and a related partner:
In addition to associated entities and related partners, the export process transparently exports some
additional entities that are required by the imported partners to function properly. These entities are:
• Applications
• Event attributes
• Categories
• Partner and Account custom attributes
• Schedules
• Calendars
Partners 25
• Event Statuses
• Event Types
When importing a partner file, the import process may discover that a conflict exists between an entity in the
import file one with the same identity in the target environment. B2B Data Exchange provides you with
several choices to deal with conflicts:
• Import and replace – the entity from the file is imported and replaces the entity in the target environment.
• Don't import – the entity from the import file is skipped.
• Abort the import – the import process is aborted.
• Merge read patterns - the selected patterns are merged with the entity when you import the endpoints.
This applies only for endpoints.
Exporting Partners
Create a file of the partners that you want to export.
The top half of the page displays the partners to be exported. A warning symbol appearing to the left of a
partner name indicates that this partner is not marked as 'Ready to be promoted'. This notice is
informational only.
The bottom half of the page shows all the related entities that are associated with the partners to be
exported.
5. To prevent the export of a related entity, for example profiles, uncheck the Export profiles checkbox in
the Profiles tab or the Overview tab of the Export partners page. You cannot prevent the export of
accounts.
Partners 27
6. To clear the 'Ready to be promoted' indications that may be set for some of the exported partners, click
the "Clear 'Ready to be promoted' indication" checkbox. By default, these indications are not cleared.
7. To export the partners, click Export.
If the export succeeds, the Operation Console displays a message indicating that the promotion export
file was created successfully.
8. Click Download to download the promotion export file.
The file download window opens.
9. Click Save to save the file.
10. When the download is complete, the Download Complete window opens. Click Close.
Note: You are limited to exporting a total of 500 accounts in one file. If you exceed this limit, the
Operation Console displays an error message. There are two workarounds:
• Reduce the number of partners in the file until there are fewer than 500 accounts.
• Ask your system administrator to export the partners using the partner import/export command line
utility. The limit on the number of accounts does not apply the this utility.
If you export objects that include MFT endpoints, perform an export operation in both the B2B Data
Exchange operation console and the Managed File Transfer administrative console. PowerCenter
entities, such as mappings, workflows, and Data Transformation services, are not exported with partners
and have to be exported/imported separately.
1. Browse to the environment where you want to import the partners. Click OK.
2. In the Navigator, click Partners > Partners.
3. Click Actions > Import Partners.
The Import Partner page appears.
4. Browse to the promotion export file and click Open > Upload. The Import partners page appears.
5. The conflict Resolution column of the Overview tab lists all the conflicts. To resolve a conflict, choose
one of the following actions:
• Import and replace. Replace existing entities with imported entities.
• Don't import. Do not import existing entities.
• Abort. Cancel the import process.
• Merge read patterns - Merge the selected patterns with the entity when you import the endpoint. This
applies only for endpoints.
6. The Related Entities section of the Partners page displays a list of related entities that were exported
with the partners and, by default, will be imported. To prevent the import of a related entity, click a
related entity tab and uncheck the Import checkbox.
7. Click Import.
The Import Partner Results page displays, showing what entities that the import process created.
Partners 29
Consider the following rules and guidelines when you import partners:
• You might encounter difficulties when importing a partner file that was created by the command line
import/export utility previous versions of B2B Data Exchange. If so, export the partners again using the
current and re-import the file.
• The import process is limited to handling files with a maximum of 500 accounts. If your file exceeds this
limit, the Operation Console displays an error message directing you to reduce the number of accounts in
the file. To import a file with more than 500 accounts, ask your System Administrator to import it for you
using the import/export command line utility.
• MFT endpoints are imported in disabled status. MFT endpoint information is stored in the B2B Data
Exchange repository and in the B2B Managed File Transfer repository. If you import objects that include
MFT endpoints, perform an export operation in both the B2B Data Exchange operation console and B2B
Managed File Transfer administrative console. Make sure to import the objects first to MFT and then to
Data Exchange. For more information about importing and exporting MFT endpoints, see the B2B
Managed File Transfer User Guide.
• Non-MFT endpoints are imported as-is, depending on the endpoints' enable/disable status during import.
• PowerCenter entities, such as mappings, workflows, and Data Transformation services, are not included in
the exported partners file. You have to be export and import them separately.
• If you import partners from B2B Data Exchange 9.5.0 or earlier, account categories are not imported and
the accounts inherit categories from the partner after the import process.
10. To cancel any changes since the last save, click Cancel.
1. In the Navigator, click Partner Management > Portal Users. The Portal Users screen appears showing all
portal users in descending order of User ID.
2. To search for a specific portal user by name, user ID, or partner name, enter your search string in the
Find field and click Go.
3. The Operation Console displays a list of portal users matching your search criteria. To edit or delete a
portal user, click the appropriate icon at the right side of the screen.
Profiles
A profile associates a workflow to a partner or account. It also defines the properties that customize that
workflow to process documents for the associated partner or account.
When you set up a profile, use the following rules and guidelines to associate a workflow with a partner or
account:
• To process different types of documents for a partner or account, you can associate multiple workflows
with a partner or account.
• To process similar documents for different partners or accounts, you can associate a workflow with
multiple partners or accounts. You can also associate a workflow with multiple accounts of the same
partner.
• Each profile must have a unique combination of application, workflow, partner, and account.
• You cannot associate a partner or account with more than one workflow of the same application.
• You cannot associate a workflow with a partner and an account of that partner. For example, PartnerOne
has AccountOne and AccountTwo. If you create a profile to associate WorkflowOne with AccountOne, you
can create another profile to associate WorkflowOne with AccountTwo. If you create a profile to associate
WorkflowOne with PartnerOne, you cannot create a profile to associate WorkflowOne with AccountOne or
AccountTwo.
You can set up a profile in the following ways:
• Create a profile. You can create a profile to associate a workflow with a partner or an account.
Profiles 31
• Copy a profile. When you copy a profile, the new profile contains the same description, workflow, status,
categories, and workflow parameters. You must associate the workflow with a different partner or
account. If you plan to use the same workflow, description, and categories for a new profile, copying a
profile can be a quicker way to create a profile.
The Workflow Parameters tab of the Profile page displays the list of parameters associated with a
selected workflow. A developer sets up the workflow parameters when the creating a PowerCenter
workflow. You can use these attributes to specify additional event information at run time.
Usually, an administrator sets up the event attributes on the Operation Console. Contact the B2B Data
Exchange administrator for information about the event attribute requirements for a profile.
Setting Up a Profile
1. In the Navigator, click Partner Management > Profiles.
2. Click New Profile.
The Create Profile page appears.
3. Enter a name for the profile, which can contain up to 60 characters.
4. In the Description field, enter any relevant information or a description of the profile. The description can
be up to 255 characters.
5. To select a partner, click the Browse button and select a partner from the list. Click OK.
6. Select an account from the list and click OK.
7. Select a workflow from the list. Click OK.
8. Select a schedule from the list.
Add schedules to batch workflows that do not contain a file trigger. A schedule is necessary to activate
the workflow.
9. Select a status from the list.
• Enabled. Run the workflow that is associated with the profile immediately after the profile is created.
• Disabled. Do not run the workflow immediately.
Note: You cannot run the workflow for a disabled profile.
10. Click the Workflow Parameters tab and enter the values for the workflow parameters.
If you selected an Informatica Cloud workflow, the workflow is associated with an Informatica Intelligent
Cloud Services (Data Integration) mapping.
If you installed the Partners Portal component, the Portal Parameters tab displays the list of workflow
parameters that the Message Profile wizard shows in the Partners Portal and that the partner can edit.
You can create default settings for these parameters.
Note: The name of the Portal Parameters tab is configurable, and the tab might have another name.
11. Click the Event Attributes tab.
The Event Attributes tab displays the list of attributes associated with events created when the workflow
associated with this profile runs. You can use the attributes to specify additional event information at
run time.
Usually, an administrator sets up the event attributes on the Operation Console. Contact the B2B Data
Exchange administrator for information about the event attribute requirements for a profile.
12. Enter the values for the event attributes. The values you enter will be used as default values, but might
be overridden by the workflow when processing a specific message.
13. To enter delayed processing information, click the Delayed Processing tab.
Profile ID
The profile ID uniquely identifies a profile. When you create a profile, the B2B Data Exchange Server
generates and sets the profile ID. When you import a profile into another instance of B2B Data Exchange, the
B2B Data Exchange Server of the new instance generates a new profile ID for the imported profile. The
imported profile ID can differ from the original profile ID.
You can use the profile ID variable, $profileId, to represent a profile in the file pattern in the endpoint setup.
The value of the variable can vary from one system to another for profiles with the same name. Each B2B
Data Exchange instance can generate a different profileId for the same profile name.
For example, when you move a profile from a development environment of B2B Data Exchange to a
production environment, the production instance generates a profile ID. For this reason, if you develop and
test workflows in a development environment and then move them to a production environment, use the
$profileName variable instead of the $profileId to associate between a partner and workflow.
When you create a profile, you must associate it with a workflow, partner, and account. The workflow
determines the application associated with the profile.
Property Description
Profiles 33
Property Description
3. To search for profiles based on additional search criteria, click Advanced Search and enter one or more
of the following properties:
Property Description
Profile Categories Categories for the profile. You can select multiple categories.
Operation Logical operator for the search. Choose one of the following options:
• And. Searches for profiles that match all of the search criteria.
• Or. Searches for profiles that match any of the search criteria.
4. Click Search.
The Profiles page displays the search results.
Editing a Profile
You can customize the workflow associated with a partner or an account.
Deleting a Profile
To delete a profile, click Partner Management > Profiles. Select the check boxes next to the profiles that you
want to delete and click Actions > Delete. Confirm the deletion.
To temporarily stop running the workflow associated with profile, set the status of the profile to Disabled. To
start running the workflow again, set the status of the profile to Enabled.
Profiles 35
Profile Usage in Endpoints
The Data Exchange Server identifies the profile that defines the association between a partner and a
workflow based on the information that you provided when you created an endpoint.
When creating an endpoint, you can explicitly define the profile to be used for each file name pattern
expected to be received at that endpoint. If no explicit profile is defined for a file pattern, the Data Exchange
Server uses an implicit routing procedure and identifies the required profile based on the application, partner,
and account number.
For more more information about endpoints, see the “Endpoints Overview” on page 85.
Delayed Events
It is sometimes necessary to delay events before they are submitted to PowerCenter. Delayed event
processing may be required, for example, to process all transactions of the same type at once, or to hold
certain transactions until the night when server resources are available.
The conditions for delaying event processing are defined for a profile. All messages meeting a delay rule are
delayed until released by the rule, by a workflow, or by the operator.
• Timing rules. A timing rule defines when delayed event release is evaluated.
• Delay Rules. Delay rules define what events to delay, and what conditions trigger their release.
• Release rules. Release rules define how delayed events are released to PowerCenter.
In order to delay all events sent to a specific profile, without regard for delay rules, use the Delay All Events
flag on the Delayed Processing tab. Setting this flag to On delays all events arriving at the profile and
suspends release rules. You can manually release delayed events by using the Release delayed events action
in the Profiles screen or the Release action in the Event Search Results screen. The workflow can also
release events using the DX_Release_Delayed_Events transformation. When the Delay all Events flag is Off,
delayed events are either released immediately, or delayed, according to the defined delay rules. When Delay
all Events is turned Off, all events that arrived while the flag was On, and were thus delayed, are immediately
released.
Assume that you need to delay all the events of type "Claim" that arrive during the day and process them after
10:00 PM. The events are released by the arrival of a a Claims Summary message. When released, the events
are released in groups of ten events.
1. On the Schedule screen, define a schedule whose start time is 10:00 PM and recurs daily.
2. On the Profile screen, create a new profile for processing Claim events, and delay rules, as explained
below.
3. On the Profile > Delayed Processing tab, add a Timing Rule using the Scheduling Rule option. Select Daily
at 10:00 PM as the scheduling policy for this rule. Specify that if mandatory rules are not met within two
hours, wait for the next processing window.
Timing Rules
Timing rules define when delayed events are released.
• Schedule rule. A schedule rule defines a processing window whose starting time is set by a pre-defined
schedule and whose length is operator-configurable. At the scheduled time, B2B Data Exchange evaluates
the delay rules.
• Timeout rule. A timeout rule defines the maximum time an event sent to this profile can be delayed. This
time is defined by the operator. At the end of the timeout, B2B Data Exchange evaluates the delay rules
defined for this profile.
Both timing rules let the operator decide how to handle delayed events that cannot be released according to
the release rules. Either save them until the next processing window, or discard them.
Delay Rules
Delay rules define which events should be delayed and what conditions trigger their release. Multiple delay
rules are allowed.
• Number of events rule. This rule specifies the minimum number of events that need to be delayed in order
to release them for processing.
• Specific event rule. This rule states that B2B Data Exchange should delay all events until a specific event
arrives which meets a condition set in the rule. An example of such a special event is one with an attribute
set to a specific value, for example, an event whose EndofDay attribute is True.
• Combination rule. There are several variations of the definition of the combination rule.
The first one is to delay all events until a threshold number of events has been delayed, for example, delay
900 events. This rule is similar to the Number of Events rule.
The second variation of the combination rule is to delay all events until the accumulated total of an event
attribute reaches an operator configurable value - for example, total price equals a threshold value.
The third variation of the combination rule is optional, and can be combined with one of the first two
variations. This rule allows the operator to define which events are accumulated. Events are identified by
an event attribute that holds a specific value, for example, delay 100 events whose PartnerCode attribute
is 147, or delay all events whose PartnerCode attribute is 147, until their Total price equals 10,000.
• By-event rule. This rule is used to re-group events. The rule groups events by an operator-selected event
attribute. The size of the groups can be specified by another event attribute.
Profiles 37
Release Rules
Release rules determine how to release delayed events.
• Release as One Rule. This rule specifies how to release the delayed events and which parameters B2B
Data Exchange passes to the PowerCenter workflow. You can select from the following options:
- Concatenate all delayed event documents in a single file. The file has one new root event, and the list of
delayed event documents is separated by a rule-provided separator.
- Prepare a list of input files and pass it by reference to a PowerCenter batch workflow that expects an
indirect set of sources. Specify which event attribute contains the source file name. You can also pass
the original Event ID for each delayed event to the PowerCenter workflow.
Note: If you do not specify a Release as One Rule, B2B Data Exchange releases each event one by one.
• Maximum Volume Rule. This rule specifies that the events are released in groups, and specifies the
maximum number of events for each group.
• Order By Rule. This rule lets you specify the order to use when releasing delayed events. Specify an event
attribute that determines the order in which the events are released. The order of events can be either
ascending or descending. You can choose the data format for comparing the event attribute values:
string, number, or date. For example, release events by creation date/time, starting with the earliest event.
The operator can define multiple release rules, provided that there is just one of each type.
Field Description
Select schedule Select a schedule from the list of defined schedules. The property
indicates the starting point of the processing window.
For more information about creating schedules, see B2B Data
Exchange Administrator Guide.
If mandatory rules are not met within Number + time units (minutes, days, hours), for example, which
delay rules are checked at frequent intervals.
Wait for the next processing window Hold delayed events for the next processing window.
Generate error event Generate an error event if mandatory rules are not met within the
processing period.
Click Save.
7. A timeout rule defines the maximum time that events sent to this profile can be delayed.
To configure a timeout rule, select Timeout Rule from the list of rules.
Profiles 39
The New Timeout Rule page appears.
Field Description
Do not delay events for more than Number and time units (minutes, days, hours), for example, 2 hours.
This property indicates the maximum delay time.
Change to manual release mode Event release is manual. Automatic event release is disabled.
Manual (operator) release is possible by clicking the Release icon on
the Profile page, or selecting the Release action on the Event List
page.
Generate error event Generate an error event if mandatory rules are not met with the
processing period.
Click Save.
9. Delay rules define how events are delayed and what conditions trigger their release. Multiple delay rules
can be defined for a single profile.
To set up a delay rule, click the Delay Rules > Add Rule button.
10. The Number of Events Rule defines the minimum number of events that need to be received and delayed
before they can be released.
To configure a Number of Events rule, select Number of Events rule from the rules list.
The New Number of Events page appears.
Field Description
Process events after receiving at least N The minimum number of events to be delayed before release.
events
This rule is mandatory If mandatory, the conditions of the rule must be met in order to
release the delayed events.
Click Save.
Profiles 41
The New Specific Event Rule page appears.
Field Description
Process events after receiving at least Select an event attribute from the list.
one event where
Is (equal to) A value for the selected event attribute that will cause delayed
events to be released.
This rule is mandatory If mandatory, the conditions of the rule must be met in order to
release the delayed events.
Click Save.
14. A combination rule is an advanced rule that offers delayed event release according to a number of
conditions.
To configure a combination rule, select Combination Rule from the list of rules.
Field Description
Number of delayed events reaches The number of delayed events that must accumulate before they can
<value>. be released for processing.
Accumulated <Event Attribute > is Delay events when the accumulated value of <Event Attribute>
<value>. reaches <value>.
For events where <Event Attribute> is The number of delayed events or the accumulated value is
<value> calculated for events having <Event Attribute> = <value>.
This rule is mandatory If mandatory, the conditions of the rule must be met in order to
release the delayed events.
15. Select whether to release events according to the number of events delayed or according to the
cumulative total value of some event attribute of the delayed events. For example, you can release
events when five have arrived, or when the total payment amount of all delayed events reaches $4,500.
Fill in the fields in the page as follows:
• To release events according to the number of delayed events: Select Number of delayed events and
enter the threshold value into the Reaches field.
• To release events based on the accumulated value of some event attribute: Select Accumulated,
select an event attribute from the list, and enter the threshold value into the Is field. For example,
select the event attribute Payment Amount from the list and enter 4500 into the Is field.
• To restrict the number of events or the accumulated value of events based on an event attribute,
check "For events where", select an event attribute from the list and fill in the attribute value, for
example, "For events where document type" is <invoice>.
• Check "This rule is mandatory" to make the rule mandatory.
Profiles 43
• Click Save.
16. A By Event Attribute rule is used to re-group events based on a specific event attribute.
To configure a By Event Attribute rule, select By Event Rule from the list of rules.
The New By Event Attribute Rule page appears.
Field Description
Group events by Select an event attribute from the list. The events will be grouped by
the selected event attribute.
Determine group size using Select an event attribute from the list. The numerical value of this
attribute is the group size.
This rule is mandatory If mandatory, the conditions of the rule must be met in order to
release the delayed events.
Click Save.
18. Release rules define the conditions for delayed event release.
To define a release rule, click the Release Rules Add Rule button and select a rule from the list.
19. The Release-As-One-Rule page appears. This rule combines all the delayed events for the profile into one
single event and releases it for processing.
To define a Release as One rule, select Release-As-One Rule from the new rules list.
The Release-As-One Rule page appears.
20. Fill in the fields in the Release as One Rule page, as follows:
Field Description
Concatenate events documents ... Select to combine input documents of all delayed events into one
document.
Separate documents with Enter a string for separating aggregated documents one from
another.
Profiles 45
Field Description
Store the aggregated document ... Send the aggregated message to the workflow as a file pointer. Use
this option if the aggregated message is expected to be very large
and you don't want to submit it through the queue.
Prepare input files lists for a As an alternative to concatenating source documents into a single
PowerCenter workflow file, you can choose to prepare a list of input files and pass it by
reference (using the file source name that you select) to a
PowerCenter batch workflow that expects an indirect set of sources.
Determine the file source name using Select an event attribute name from the list. This attribute holds the
file source name.
Pass the original Event ID to PowerCenter Add a second column to the list of input files with the original Event
workflow ID for each source file.
Click Save.
21. A Max Volume rule determines the maximum number of events to release in one batch.
To create a maximum volume rule, select Max Volume from the list of rules.
The New Max Volume Rule page appears.
Field Description
Click Save.
Field Description
Order events by Select an event attribute name from the list. The released events are
ordered by the selected event attribute.
Compare as Chose the data format of the selected event attribute for sorting the
released events: string, date, or numeric.
Click Save.
25. To delay all events and release them manually, select the Delay-All-Events (with manual release)
checkbox from the top of the Update Profile page.
The operator can release events manually:
• In the Navigator, click Partner Management > Profiles. Select a profile and click Actions > Release
Delayed Events.
• In the Navigator, click Events > All Events > Advanced Search. Select the events to be released. Click
Actions > Release.
Profiles 47
Chapter 4
On-Boarding Checklists
This chapter includes the following topics:
The on-boarding process often involves multiple roles within the organization, each of which is responsible to
perform one or more tasks to implement the trading agreement. Some of these tasks are performed in the
B2B Data Exchange environment, while other tasks are carried out in external systems, like CRM and
Accounting.
On-boarding a partner is implemented by using an on-boarding checklist, which contains all the tasks that
must be accomplished to complete the on-boarding process. An on-boarding checklist might refer to some
B2B Data Exchange tasks, like creating a partner and its accounts, or to tasks which are outside of the B2B
Data Exchange environment, like opening a partner account in the accounting system. It is the responsibility
of the operator to enter starting and ending times of each task in the process checklist, and to monitor the
progress of each and every task.
The responsibilities for creating an on-boarding checklist are divided between the administrator and the
operator.
• On-boarding checklist templates. Created by the administrator. Different checklist templates represent
different on-boarding processes. Each checklist template defines the tasks that the B2B Data Exchange
operator must do to successfully complete the on-boarding process.
• An on-boarding checklist. Created by the operator, based on an on-boarding checklist template. Choose
the most appropriate template for the specific process and partner.
The on-boarding checklist enables the operator to meet two responsibilities:
• Implementing partner on-boarding. Implementing partner on-board consists of carrying out the operator
tasks which appear in the checklist. An operator can report on the beginning and completion of every task,
as well as flag any tasks which are experiencing delays or other difficulties.
48
• Monitoring the progress of the on-boarding process. Progress monitoring assures that the on-boarding
process is carried out smoothly and on-time. B2B Data Exchange provides a variety of tracking
capabilities to monitor progress.
1. In the Navigator, click Partner Management > On-boarding > New Checklist.
The Create New Checklist page appears.
Field Description
Template Required. The on-boarding template for this checklist. The Task List is populated only after
selecting a template.
Partner The partner being on-boarded. When on-boarding a new partner, you can create the checklist
before creating the partner and then create the partner as a part of the checklist. After creating the
partner, enter the partner details in this field. When on-boarding an existing partner, enter the
partner details when creating the checklist.
Due Date The deadline for completing the checklist. Click the Browse button to open the calendar and select
a date.
Task List The name and description of every task in the selected checklist template.
3. Click Save.
You can use the following parameters to search inside on-boarding checklists:
Parameter Description
Deadline A specific number of days before or after the checklist due date.
Start Date A range of dates during which the checklist started. Click Browse to open the calendar tool.
Click X to delete the date.
Due Date A range of dates during which the checklist is due to be completed. Click Browse to open the
calendar tool. Click X to delete the date.
End Date A range of dates during which the checklist was completed. Click Browse to open the calendar
tool. Click X to delete the date.
4. To edit the details of a task, click the arrowhead icon of the task you want to edit.
The details of the chosen task appear:
Field Description
Task Action If the task is to perform a B2B Data Exchange operation, like Create Partner, click the link to
open the appropriate B2B Data Exchange Operation Console page. When you close this page,
you are returned to the checklist page.
If the task is a custom task, the task Action is read-only.
Flag Task Select to flag (mark) this task for special attention. To explain the reason for the flag, use the
Description field.
5. To indicate that the handling of this task has begun, and to set the Start Time to the current date and
time, click Start task.
6. To indicate that the task is complete, expand the task and click End Task.
When you click Start or End Task, the Undo button appears. Start and End times are used for statistical
analysis of the status of all tasks. Report start and end times on time.
Field Description
Not started The number of checklists that were created but processing has not yet
started.
In process The number of checklists have started but are not yet complete.
Overdue The number of checklists that are overdue (current date > due date).
Progress bar Red = overdue. Yellow = flagged. Green = in process. The length of the
bars indicate the ratio between the overdue, flagged and in progress
checklists.
The checklist status column contains three icons showing the status of the checklists:
Icon Description
Flag Flagged
The Progress column shows the proportion of checklists by status. The light green bar indicates the number
of tasks that are in progress, the dark green bar the number of completed tasks, and the grey bar the number
of tasks not yet started.
• Operational purposes. To answer partner queries about on-boarding status and to identify those
processes which require managerial attention.
• Productivity improvements. Identify tasks that create bottlenecks and delay process completion.
By default, the left window displays the Open Checklists by Type chart and the right window displays the
Average Checklist Duration chart. You can view other charts by selecting from the chart list in each window.
The two lists of charts are identical, allowing you to display different charts side-by-side.
The available charts are described below. Some charts require a parameter to open them.
This chart shows average elapsed time per task for all completed checklists of a certain checklist template.
In this example, the template is EDI partners. The checklist enables you to identify the tasks that take the
longest time to complete.
This chart shows the average time (in days), by checklist template, required to complete a checklist. This
chart displays only completed checklists, not open ones.
This chart shows the number of open checklists by type (template). The green bar shows the number of open
checklists before their due-dates. The red bar shows the number of overdue checklists.
This chart shows the number of open checklists by partner. The green bar indicates the number of checklists
before their due date. The red bar shows the number of overdue checklists.
This chart displays the ten completed checklists that took the longest time (in days) to complete. The names
on the x-axis, in the example NY inc. and Goodlife Healthcare, are checklist names.
This chart shows the ten tasks, from all completed checklists, that took the longest time to complete. The
labels on the x-axis are the names of the tasks and their templates.
You create an MFT Hosted Endpoint to use Informatica Managed File Transfer to receive files from the
partner to a mailbox hosted on an organization server, or send files from the hosted mailbox to the partner.
Before you create an MFT Hosted endpoint, create an MFT Web User. You must assign an MFT Web User to
the MFT Hosted endpoint.
Note: An MFT Web User can only be associated with one endpoint.
Related Topics:
• “Adding an Informatica Managed File Transfer Hosted Receive Endpoint” on page 108
• “Adding an Informatica Managed File Transfer Hosted Send Endpoint” on page 109
59
MFT Web User Properties
Create an MFT Web User so that partners can access Informatica Managed File Transfer hosted servers to
exchange files. When you define an MFT Web User, specify the user authentication properties and contact
details.
Property Description
Status Status of the MFT Web User. The MFT Web User can be enabled or disabled.
Email Address The primary email address of the MFT Web User. An email address should be specified if the MFT
Web User receives email communication for account creation, password reset, forgot password or
they have access to Secure Mail.
Description The description is optional information pertaining to the MFT Web User. This field is limited to 512
characters.
Organization The company or organization which the MFT Web User belongs to.
Property Description
Login Method Specify which technique should be used to authenticate the MFT Web User. Valid methods are
Active Directory (AD), LDAP, LDAP Managed Server, and Native.
Password Passwords for MFT Web User accounts can be generated automatically based on the MFT Web
Generation User Password Policy. Otherwise the MFT Web User Manager creating the account can manually
specify a password. If specifying the password, you are alerted if the password does not meet the
MFT Web User Password Policy. The maximum password length is 20 characters.
Authentication The Authentication Type can be specified per service. For example, an MFT Web User can be
Type forced to use a Password and Certificate when authenticating to FTPS but only require a
Password for HTTPS. If a certificate is used for authentication, the Client Authentication setting
on the SSL tab of the specific service must be set to Optional or Required.
If certificate authentication is specified and the certificate being used is either self-signed or
signed by an untrusted Certificate Authority (CA), then the certificate will need to be imported into
the Default Trusted Certificates Key Store. Importing the certificate instructs Informatica Managed
File Transfer to trust this source. If the certificate being used is already signed by a trusted
authority (for example, Verisign, GoDaddy, Equifax, etc.) the certificate does not need to be
imported since the trust is inherited.
The following options are available:
HTTPS
- Password - MFT Web Users login using their standard MFT Web User name and password.
- Certificate - MFT Web Users are authenticated by a certificate which must be in the
Informatica Managed File Transfer Default Trusted Key Store and on the MFT Web User's
local computer. This method does not require the MFT Web User to specify a user name or
password any time they use Informatica Managed File Transfer. On enabling the Certificate
authentication type, select the Digest Algorithm, and enter the corresponding fingerprint for
the Web User's certificate in the box. Each MFT Web User must have a unique SHA1
Fingerprint. You can select one of the following digest algorithm:
- SHA1
- SHA224
- SHA256
- SHA384
- SHA512
- Either - If a matching certificate is found during the connection, the MFT Web User will
automatically authenticate. However if a match is not found, the MFT Web User can still login
to the Informatica Managed File Transfer server with a user name and password. If Either is
selected, type the unique SHA1 Fingerprint for the MFT Web User's certificate in the box.
AS2
- Password - MFT Web Users login using their standard MFT Web User name and password.
- Certificate - MFT Web Users are authenticated by a certificate which must be in the
Informatica Managed File Transfer Default Trusted Key Store and on the MFT Web User's
local computer. This method does not require the MFT Web User to specify a user name or
password any time they use Informatica Managed File Transfer. On enabling the Certificate
authentication type, select the Digest Algorithm, and enter the corresponding fingerprint for
the Web User's certificate in the box. You can select one of the following digest algorithm:
- SHA1
- SHA224
- SHA256
- SHA384
- SHA512
- Either - If a matching certificate is found during the connection, the MFT Web User will
automatically authenticate. However if a match is not found, the MFT Web User can still login
to the Informatica Managed File Transfer server with a user name and password. If Either is
selected, type a SHA1 Fingerprint for the MFT Web User's certificate in the box.
- Password and Certificate - MFT Web Users are authenticated by their standard MFT Web User
name and password along with a shared certificate that is both on the Informatica Managed
File Transfer server and the MFT Web Users' local computer. Type the certificate's SHA1
Fingerprint in the box.
FTPES (Explicit SSL)
- Password - MFT Web Users login using their standard MFT Web User name and password.
- Certificate - MFT Web Users are authenticated by a certificate which must be in the
Informatica Managed File Transfer Default Trusted Key Store and on the MFT Web User's
local computer. This method does not require the MFT Web User to specify a password any
time they use Informatica Managed File Transfer. On enabling the Certificate authentication
type, select the Digest Algorithm, and enter the corresponding fingerprint for the Web User's
certificate in the box. You can select one of the following digest algorithm:
- SHA1
- SHA224
- SHA256
- SHA384
- SHA512
- Either - If a matching certificate is found during the connection, the MFT Web User will
automatically authenticate. However if a match is not found, the MFT Web User can still login
to the Informatica Managed File Transfer server with a user name and password. If Either is
selected, type the certificate's SHA1 Fingerprint in the box.
- Password and Certificate - MFT Web Users are authenticated by their standard MFT Web User
name and password along with shared certificate that is both on the Informatica Managed
File Transfer server and the MFT Web Users' local computer. Type the certificate's SHA1
Fingerprint in the box.
FTPS (Implicit SSL)
- Password - MFT Web Users login using their standard MFT Web User name and password.
- Certificate - MFT Web Users are authenticated by a certificate which must be in the
Informatica Managed File Transfer Default Trusted Key Store and on the MFT Web User's
local computer. This method does not require the MFT Web User to specify a password any
time they use Informatica Managed File Transfer. On enabling the Certificate authentication
type, select the Digest Algorithm, and enter the corresponding fingerprint for the Web User's
certificate in the box. You can select one of the following digest algorithm:
- SHA1
- SHA224
- SHA256
- SHA384
- SHA512
- Either - If a matching certificate is found during the connection, the MFT Web User will
automatically authenticate. However if a match is not found, the MFT Web User can still login
to the Informatica Managed File Transfer server with a user name and password. If Either is
selected, type the certificate's SHA1 Fingerprint in the box.
- Password and Certificate - MFT Web Users are authenticated by their standard MFT Web User
name and password along with shared certificate that is both on the Informatica Managed
File Transfer server and the MFT Web Users' local computer. Type the certificate's SHA1
Fingerprint in the box.
SFTP
- Password - MFT Web Users login using their standard MFT Web User name and password.
- Public Key - MFT Web Users use a public key on the server to encrypt a session key that
produces a secure login.
- Either - If a matching public key is found during the connection, the MFT Web User will
automatically pass authentication. However if a key match is not found, the MFT Web User
can still login to the Informatica Managed File Transfer server with a user name and
password.
- Password and Public Key - MFT Web Users must login using their MFT Web User name and
password along with a public key.
Property Description
AS2 ID The AS2 ID of the MFT Web User. The AS2 ID is case sensitive and can be 1 to 128 ASCII
printable characters in length.
Signature This is the alias of the public certificate used by this MFT Web User to sign their messages. If
Certificate Alias the certificate is signed by a certificate authority (for example, Verisign), this field can be left
blank since the certificate chain already exists in the Default Trusted Certificates Key Store. If a
specific certificate is to be used by the Web User for signing messages or they use a self-signed
certificate, then that certificate should be imported into the Default Trusted Certificates Key
Store. For more information, see the Informatica Managed File Transfer Guide.
Default Upload The location where AS2 messages are saved when received (uploaded). The default location is
Folder the default home directory for the MFT Web User, which is the [installdirectory]/
userdata/webdocs/[webuser] folder, where [installdirectory] is the installation
directory of Managed File Transfer and [webuser] is the account name of the Web User.
When File Exists The action that Informatica Managed File Transfer performs when a file with the same name
already exists in the default upload folder.
Require Encryption This option indicates whether or not messages sent by this MFT Web User must be encrypted.
Require Signature A signed message contains a digital signature from the sender to further authenticate the
message. If signatures are required, any unsigned message sent by this MFT Web User will be
rejected.
Asynchronous If a return receipt is requested by the MFT Web User, select if the MDN will be sent automatically
MDN Approval during the MFT Web User session or manually after the message is processed. A manual receipt
can only be sent if a message is received successfully. If an error occurs during transmission,
an asynchronous receipt is sent automatically.
The following table describes the properties in the SSH Keys tab:
Property Description
Name The name identifies the SSH key. The maximum length of the name is 64 characters.
Algorithm The algorithm to use when generating the key. Valid values are RSA and DSA. It is generally
recommended to use RSA.
Key Size The length (in bits) of the key. Valid values are 512, 1024, 2048 or 4096 bits. Large key sizes will
provide strong protection, but will slow the performance of encryption/decryption processes.
Fingerprint This is the password that protects the private key portion of the SSH Key Pair and should be
recorded in a safe place.
Public Key The format in which to store the public key. Valid values are OpenSSH or SecureShell. It is
Format generally recommended to use OpenSSH unless your trading partner dictates otherwise.
Note: Private Keys and passphrases should be kept confidential and should NOT be shared with
trading partners.
Comments A description to store with the key. This typically should contain the name of your organization
(for example, "ABC Company SSH Key"), which will allow others to quickly identify the key.
Created By The name of the user that created the SSH key.
Created On The date that the user created the SSH key.
The following table describes the properties in the Upload Restrictions tab:
Property Description
Allow Files with No Select this option to allow web users to upload files that don't have extensions.
Extension
Allow Files with an Select this option to allow web users to upload files that have extensions. The web users must
Extension enter the file extensions in the File Extension Filter field.
File Extension Filter The file extension filter can permit all files, restrict specific extensions or permit specific
extensions. To specify the file types web users can or can't upload, enter the file extensions in
this box. Enter extensions without periods (.), separate them with commas, and don't add line
breaks or spaces. For example, to allow .txt, .xls, .xlsx, and .csv files, enter txt,xls,xlsx,csv. The
maximum number of characters for this field is 2,000.
Case Sensitive Select this option to specify that file extensions are case sensitive.
4. On the Authentication tab, define the login method, password generation, and authentication type and
method.
5. For an AS2 connection type, on the AS2 tab, specify AS2 ID, signature certificate alias, default upload
folder, encryption, signatures, authentication requirement, and asynchronous MDN approval.
6. For an SSH connection type, on the SSH Keys tab, to add an SSH key click Add SSH Key. Select an SSH
key from the list and click Select.
Related Topics:
• “Adding an Informatica Managed File Transfer Hosted Receive Endpoint” on page 108
• “Adding an Informatica Managed File Transfer Hosted Send Endpoint” on page 109
You create an MFT Remote Send Endpoint to use Informatica Managed File Transfer to receive files from the
organization to a remote partner server. You create an MFT Remote Receive Endpoint for the organization to
receive files from a remote partner server.
Before you create an MFT Remote Send or MFT Remote Receive endpoint, you create an MFT Connection.
The MFT Connection defines how Informatica Managed File Transfer communicates with the remote partner
server. The defined MFT Connections can be used with Informatica Managed File Transfer Remote endpoints
by choosing the MFT Connection names from the project variables drop-down lists.
Related Topics:
• “Adding an Informatica Managed File Transfer Remote Receive Endpoint” on page 110
• “Adding an Informatica Managed File Transfer Remote Send Endpoint” on page 111
66
AS2 MFT Connection Properties
Create an AS2 MFT Connection to define communications using the AS2 protocol for an MFT Remote
endpoint. The AS2 MFT Connection specifies the settings used when messages are sent using the AS2 1.2
specification. AS2 is a standard originally created to securely transfer EDI documents, but it can also be used
to transmit virtually any file type. The messages are structured using the standard S/MIME format and are
sent over HTTP(S) connections.
Property Description
URL This is the URL of the server that receives the messages. The URL syntax must be a valid server and
location where [hostname] can be an IP Address or a Domain name and [portnumber] is the port on
which the AS2 Server listens.
AS2 From ID The AS2 From ID is the name or ID used by the sender (most commonly you are the sender). The ID is
arbitrary, but if the receiving server filters by this ID, the ID's must match. The AS2 From ID is case
sensitive, can be 1 to 128 ASCII printable characters in length, and may not contain whitespaces.
AS2 To ID The AS2 To ID is the name or ID used by the recipient. The ID is arbitrary. The AS2 To ID is case
sensitive, can be 1 to 128 ASCII printable characters in length, and may not contain whitespaces.
Property Description
Encrypt Encrypting the message itself during transmission within the encrypted tunnel is optional, but
Messages highly recommended. The default value if left blank is No.
Encryption The Encryption Algorithm is the algorithm used to encrypt the message. The default encryption
Algorithm algorithm is AES128.
Encryption The Encryption Certificate Alias is the certificate alias to use in the Default Trusted Certificate
Certificate Alias Key store.
Sign Messages Signing the message with a digital signature to further identify yourself is optional, but highly
recommended.
Signature The signature algorithm used to sign the messages can be SHA1, SHA224, SHA256, SHA384,
Algorithm SHA512, or MD5. The default is SHA1.
Signature This is the private key alias used to sign the message. The private key is located in the Default
Certificate Alias Private Key store.
Compress Messages can be compressed to reduce bandwidth using the zlib format. The default is No.
Messages
Receipt The Receipt Certificate Alias is optional when the receipt signature contains an embedded
Certificate Alias certificate. In this scenario, Managed File Transfer will ensure that the embedded certificate is
also located in the Default Trusted Certificate Key Store. To enhance security, a Receipt
Certificate Alias can be specified which verifies the certificate that signed the receipt is a
specific certificate in the key store.
If the receipt signature does not contain an embedded certificate, then the Receipt Certificate
Alias must be specified in order to verify and trust the signature. Typically, the same certificate
that is used to encrypt the outbound message can be used to verify the receipt signature.
Receipt Transfer Define the encoding of a receipt. This is useful when the receipt does not include the transfer
Encoding encoding.
Property Description
User The user name (login name) to use for connecting to the AS2 server. This is only required if the
AS2 server needs the AS2 client to authenticate using either the BASIC or DIGEST authentication
schemes.
Password The password to use for connecting to the AS2 server. This is only required if the AS2 server needs
the AS2 client to authenticate using either the BASIC or DIGEST authentication schemes. After
entering the password, you can optionally click the Encrypt button, which will encrypt the password
when it is stored in Managed File Transfer's database.Note: If you do not wish to store the
password for the AS2 server resource, the password can be supplied when executing a Project.
Is Password Indicates whether or not the password is encrypted. You should choose Yes if you clicked the
Encrypted Encrypt button for the Password.
Connection The maximum amount of time, in seconds, to wait when trying to establish a connection to the AS2
Timeout server. A timeout value of 0 (zero) is interpreted as an infinite wait time. If the field is left blank,
the default value is 60 seconds.
Read Timeout The maximum amount of time, in seconds, to wait for a (read) response from the AS2 server. A
timeout value of 0 (zero) is interpreted as an infinite wait time. If the field is left blank, then the
default value is 0 (zero).
Connection The number of times the AS2 Resource will attempt to connect if a connection cannot be
Retry Attempts established on the first attempt.
Connection The number of seconds to wait between each connection retry attempt. If left blank, the retry
Retry Interval interval is 0 (zero) seconds.
Follow Specify whether or not to follow redirects. The default value is yes.
Redirects
Enable Cookies Specify whether or not to enable cookies. The default value is yes.
User Agent The user agent is the value used in the message header to indicate what application created or
sent the message. The default value is Managed File Transfer/${currentProductVersion}.
Use Chunked Indicates if the length of the request will be pre-calculated or sent in chunks. Pre-calculating the
Encoding content length may slow performance when sending large files, but not all AS2 servers support
chunked encoding. The default setting is No.
Client A particular key within the default key store can be used for client authentication by indicating the
Certificate Alias key alias. The specified key will be used when required by the AS2 server.
SSL Context Specify the protocol to use when creating the SSLContext. The value you need to specify here
Protocol depends on the security providers you have installed in the JRE (Java Runtime Environment). In
most cases, the default value (SSL) should just work fine. However, on some IBM JRE
implementations the default value would not work if the server you are connecting to does not
support SSLv3.
Property Description
Proxy Type Managed File Transfer supports SOCKS (version 4 and 5), HTTP tunneling through an HTTP proxy
and Managed File Transfer Gateway. Check with the network administrator for the correct proxy type.
Host The host name (or IP address) of the proxy server on your network.
Alternate Host The host name or IP address of an alternate proxy server. The alternate proxy server is used when
the primary proxy server is unavailable.
Port The port number to use for connecting to the proxy server. If left blank, the default port for an HTTP
connection is 80 and SOCKS is 1080.
Property Description
Port The port number to use for connecting to the server. If left blank, the default port number is 21.
Property Description
Use passive Indicates whether or not the MFT Connection will use Passive or Active mode. Specify Yes to use
mode Passive mode. Specify No to use Active mode. If neither value is selected, then the default mode
of Active will be used.
In Active mode, the server will attempt to connect back to a port on the Managed File Transfer
client in order perform the data transfer. The challenge with Active mode is that your firewall may
block the server from trying to open a port back into your network.
In Passive mode, the server does not need to connect back to a port on the Managed File Transfer
client, which is a more firewall-friendly mode. Therefore, if you have problems with connecting to
the server, you may want to change the mode to Passive by selecting Yes for this option.
Data Connection The starting port number to use for the data connection. This should be used when Active mode is
Start Port specified and there is a limited range of open ports on your firewall allowed for data connections.
Data Connection The ending port number to use for the data connection. This should be used when Active mode is
End Port specified and there is a limited range of open ports on your firewall allowed for data connections.
Timeout The number of seconds to wait when attempting to connect to the server. A timeout will occur if
the connection cannot be established in the specified amount of time. If left blank, the default
timeout is 120 seconds.
Connection Retry The number of times to retry the FTP connection if it cannot be established. This setting is used
Attempts for both the initial connection and any reconnect attempts due to lost connections. If left blank,
then no retries will be attempted.
Connection Retry The number of seconds to wait between each connection retry attempt.
Interval Note: For instance, if you want Managed File Transfer to retry the connection up to 10 times with
a 5 second delay between retries, then specify 10 for the Connection Retry Attempts and 5 for the
Connection Retry Interval.
Initial Remote The initial directory to start in after connecting to the server. If left blank, then the initial directory
Directory will be the home directory assigned to the user on the server.
Control Encoding If left blank, Managed File Transfer uses the ISO standard ISO-8859-1. If supported by the server,
other encodings like UTF-8 can be specified to support more international characters.
Throttle Limit the inbound and outbound bandwidth used for file transfers.
Bandwidth
Property Description
List Parser The list parser to use for the server connection. If the field is left blank, Managed File Transfer will
attempt to use the MLSD parser. If the MLSD parser is not supported by the server, the UNIX parser will
be used. If you experience problems listing directories, select a different list parser.
Date Format This field is used if the date returned by the server is different than the selected list parser's default. If
your location requires a different date format (for example, d MMM yyyy), specify the date format in
this field. Not all list parsers support the date format setting. List parsers that do not support the Date
Format setting will ignore any User specified values.
Recent Date Specify the date format to use when parsing the recent last modified date for each file. The recent
Format date format is primarily used on UNIX-based systems and appears on entries less than a year old. If
your location requires a different recent date format (for example, d MMM HH:mm), specify that
pattern in this field. Not all list parsers support the recent date format setting. List parsers that do not
support the recent date format setting will ignore any User specified values.
Property Description
Proxy Type Managed File Transfer supports SOCKS (version 4 and 5), HTTP tunneling through an HTTP proxy and
Managed File Transfer Gateway. HTTP tunneling requires that the HTTP proxy supports the CONNECT
HTTP method. Not all HTTP proxy servers may support the CONNECT method and some might only
allow HTTPS traffic. When using an HTTP proxy that requires authentication, Basic and Digest
authentication schemes are supported. Check with the network administrator for the correct proxy
type.
Alternate The host name or IP address of an alternate proxy server. The alternate proxy server is used when the
Host primary proxy server is unavailable.
Port The port number to use for connecting to the proxy server. If left blank, the default port for an HTTP
connection is 80 and SOCKS is 1080.
User The user name to use for connecting to the proxy server.
Property Description
Port The port number to use for connecting to the server. If left blank, the default port number is 21.
Property Description
Use passive mode Indicates whether or not the MFT Connection will use Passive or Active mode. Specify Yes to
use Passive mode. Specify No to use Active mode. If you do not select either value, the default
Active is applied.
In Active mode, the server will attempt to connect back to a port on the Managed File Transfer
client in order perform the data transfer. The challenge with Active mode is that your firewall
might block the server from trying to open a port back into your network.
In Passive mode, the server does not need to connect back to a port on the Managed File
Transfer client, which is a more firewall-friendly mode. Therefore, if you have problems with
connecting to the server, you might want to change the mode to Passive by selecting Yes for
this option.
Data Connection The starting port number to use for the data connection. This should be used when Active
Start Port mode is specified and there is a limited range of open ports on your firewall allowed for data
connections.
Data Connection The ending port number to use for the data connection. This should be used when Active mode
End Port is specified and there is a limited range of open ports on your firewall allowed for data
connections.
Timeout The number of seconds to wait when attempting to connect to the server. A timeout will occur
if the connection cannot be established in the specified amount of time. If left blank, the
default timeout is 120 seconds.
Connection Retry The number of times to retry the FTPS connection if it cannot be established. This setting is
Attempts used for both the initial connection and any reconnect attempts due to lost connections. If left
blank, then no retries will be attempted.
Connection Retry The number of seconds to wait between each connection retry attempt.
Interval Note: For instance, if you want Managed File Transfer to retry the connection up to 10 times
with a 5 second delay between retries, then specify 10 for the Connection Retry Attempts and 5
for the Connection Retry Interval.
Initial Remote The initial directory to start in after connecting to the server. If left blank, then the initial
Directory directory will be the home directory assigned to the user on the server.
Control Encoding If left blank, Managed File Transfer uses the ISO standard ISO-8859-1. If supported by the
server, other encodings like UTF-8 can be specified to support more international characters.
Throttle Bandwidth Limit the inbound and outbound bandwidth used for file transfers.
The server is If enabled, Managed File Transfer uses the default certificate that is defined in the Managed
considered trusted File Transfer default key store.
and validation will
not be attempted
using digital
certificates.
Client Certificate Select a Managed File Transfer client certificate using the client certificate alias. A particular
Alias key within the Managed File Transfer default key store can be used for client authentication by
indicating the key alias. The specified key will be used when required by the FTPS server.
The following table describes the properties in the Directory Listing tab:
Property Description
List Parser The list parser to use for the server connection. If the field is blank, Managed File Transfer will try to
use the MLSD parser. If the server does not support the MLSD parser, the UNIX parser is used. If you
experience problems listing directories, select a different list parser.
Date Format Use this field if the server returns a date that is different from the selected list parser's default. If your
location requires a different date format (for example, d MMM yyyy), specify the date format in this
field. Not all list parsers support the date format setting. List parsers that do not support the Date
Format setting will ignore any User specified values.
Recent Date Specify the date format to use when parsing the recent last modified date for each file. The recent
Format date format is primarily used on UNIX-based systems and appears on entries less than a year old. If
your location requires a different recent date format (for example, d MMM HH:mm), specify that
pattern in this field. Not all list parsers support the recent date format setting. List parsers that do not
support the recent date format setting will ignore any User specified values.
Property Description
Proxy Type Managed File Transfer supports SOCKS (version 4 and 5), HTTP tunneling through an HTTP proxy and
Managed File Transfer Gateway. HTTP tunneling requires that the HTTP proxy supports the CONNECT
HTTP method. Not all HTTP proxy servers might support the CONNECT method and some might only
allow HTTPS traffic. When using an HTTP proxy that requires authentication, Basic and Digest
authentication schemes are supported. Check with the network administrator for the correct proxy
type.
Alternate The host name or IP address of an alternate proxy server. The alternate proxy server is used when the
Host primary proxy server is unavailable.
Port The port number to use for connecting to the proxy server. If left blank, the default port for an HTTP
connection is 80 and SOCKS is 1080.
User The user name to use for connecting to the proxy server.
Property Description
Connection Indicates if the connection type is Implicit SSL or Explicit SSL. The preferred connection type is the
Type more modern Explicit SSL standard, however some trading partners might still require Implicit SSL.
If this field is left blank, then the default connection type of Explicit SSL will be used.
Security Indicates whether SSL or TLS should be used for Explicit SSL connections. TLS is the latest
Protocol security protocol standard, however many trading partners still use the SSL protocol for Explicit
SSL connections. If this field is left blank, then the default security protocol of SSL will be used.
Clear Command Indicates whether or not to use a clear command channel (CCC) for the FTPS connection. Specify
Channel No to keep the command channel encrypted. Specify Yes to not encrypt the control command
channel (however, the actual data transfers will remain encrypted). If neither value is selected, then
the default value of No will be used.
Note: SSL connections require a Clear Command Channel (CCC) when connecting from behind a
NAT firewall.
Data Channel The data channel protection level indicates if the data channel is encrypted. Select Private to keep
Protection the data channel encrypted. If the FTPS server does not support an encrypted data channel, select
Level Clear to leave the data channel unencrypted. The default setting is Private.
Send SSL Close After the command channel is closed, most servers automatically close the SSL/TLS connection,
Notify however some servers do not understand the "close_notify" command. Select No to keep
Informatica Managed File Transfer from sending the "close_notify" command. The default value is
Yes.
SSL Context Specify the protocol to use when creating the SSLContext. The value you need to specify here
Protocol depends on the security providers you have installed in the JRE (Java Runtime Environment). In
most cases, the default value (TLSv 1.2) should just work fine. However, on some IBM JRE
implementations the default value would not work if the server you are connecting to does not
support TLS 1.0. The supported TLS versions are TLSv1.1, TLSv1.2, and TLSv1.3.
Property Description
Property Description
Port The port number to use for connecting to the server. If left blank, the default port number is 80.
User The user name (login name) to use for connecting to the HTTP server. This is only needed if the
HTTP server requires that the client be authenticated using either the BASIC or DIGEST
authentication schemes.
Password The password to use for connecting to the HTTP server. This is only needed if the HTTP server
requires that the client be authenticated using either the BASIC or DIGEST authentication schemes.
Connection The maximum amount of time, in seconds, to wait when trying to establish a connection to the HTTP
Timeout server. A timeout value of 0 (zero) is interpreted as an infinite wait time. If the field is left blank,
then the default value of 60 seconds will be used.
Read Timeout The maximum amount of time, in seconds, to wait for a (read) response from the HTTP server. A
timeout value of 0 (zero) is interpreted as an infinite wait time. If the field is left blank, then the
default infinite value of 0 (zero) will be used.
Property Description
Proxy Type Managed File Transfer supports SOCKS (version 4 and 5), HTTP tunneling through an HTTP proxy
and Managed File Transfer Gateway. Check with the network administrator for the correct proxy type.
Host The host name (or IP address) of the proxy server on your network. This is only needed if your
system uses a proxy server to make HTTP connections.
Alternate The host name or IP address of an alternate proxy server. The alternate proxy server is used when
Host the primary proxy server is unavailable.
Port The port number of the proxy server on your network. This is only needed if your network uses a
proxy server to make HTTP connections.
User The user name (login name) to use for connecting to the proxy server. This is only needed if your
network uses a proxy server to make HTTP connections.
Password The password to use for connecting to the proxy server. This is only needed if your network uses a
proxy server to make HTTP connections.
Property Description
Property Description
Proxy Type Managed File Transfer supports SOCKS (version 4 and 5), HTTP tunneling through an HTTP proxy
and Managed File Transfer Gateway. Check with the network administrator for the correct proxy type.
Host The host name (or IP address) of the proxy server on your network. This is only needed if your
system uses a proxy server to make HTTP connections.
Alternate The host name or IP address of an alternate proxy server. The alternate proxy server is used when
Host the primary proxy server is unavailable.
Port The port number of the proxy server on your network. This is only needed if your network uses a
proxy server to make HTTP connections.
User The user name (login name) to use for connecting to the proxy server. This is only needed if your
network uses a proxy server to make HTTP connections.
Password The password to use for connecting to the proxy server. This is only needed if your network uses a
proxy server to make HTTP connections.
Property Description
Port The port number to use for connecting to the server. If left blank, the default port number is 80.
User The user name (login name) to use for connecting to the HTTP server. This is only needed if the
HTTP server requires that the client be authenticated using either the BASIC or DIGEST
authentication schemes.
Password The password to use for connecting to the HTTP server. This is only needed if the HTTP server
requires that the client be authenticated using either the BASIC or DIGEST authentication
schemes.
Connection The maximum amount of time, in seconds, to wait when trying to establish a connection to the
Timeout HTTP server. A timeout value of 0 (zero) is interpreted as an infinite wait time. If the field is left
blank, then the default value of 60 seconds will be used.
Read Timeout The maximum amount of time, in seconds, to wait for a (read) response from the HTTP server. A
timeout value of 0 (zero) is interpreted as an infinite wait time. If the field is left blank, then the
default infinite value of 0 (zero) will be used.
SSL Context Specify the protocol to use when creating the SSLContext. The value depends on the security
Protocol providers you have installed in the Java Runtime Environment. In most cases, the default value
SSL is fine. However, on some IBM JRE implementations the default value does not work if the
server to which you connect to does not support SSLv3.
Select whether the server is considered trusted so that validation will not be attempted using
digital certificates. By default, this option is enabled.
The server is If enabled, Managed File Transfer uses the default certificate that is defined in the Managed File
considered trusted Transfer default key store.
and validation will
not be attempted
using digital
certificates.
Client Certificate A particular key within the default key store can be used for client authentication by indicating
Alias the key alias. The specified key will be used when required by the HTTPS server.
Property Description
Server Type Indicates if the mail box server type is O365, POP-3, or IMAP. If this field is left blank, then the
default server type of POP-3 will be used.
User The user name to use for connecting to the mailbox server.
Is Password Indicates whether or not the password is encrypted. You should choose Yes if you clicked the
Encrypted Encrypt button for the Password.
Property Description
Port The port number to use for connecting to the server. If left blank, the default port number is 25.
Connection Type The connection type to use when communicating with the SMTP Server. The following options are
available:
- Normal - The connection is not encrypted.
- SSL - The entire connection and transmission is encrypted using SSL.
Client ID The unique identification ID assigned to an application which establishes an identity with the
Office 365 applications.
Client Secret The secret key is used to exchange the authorization code to access the token. Include the Client
Secret if the application is confidential.
Is Client Secret Indicates whether or not the client secret is encrypted. You should choose Yes if you clicked the
Encrypted Encrypt button for the Client Secret.
Timeout The number of seconds to wait when attempting to connect to the mail box server. A timeout
error will occur if the connection cannot be established in the specified amount of time. If this
field is left blank, the default timeout value of 300 seconds will be used.
Property Description
Connection The connection type for the MQ server. The MQ server can use the JMS Standard (Java Message
Type Service) or a connection type specific to the MQ Provider. When connecting to Websphere MQ,
SonicMQ or ActiveMQ use the MQ Provider Specific type and use JNDI (JMS Standard) for others.
URL The connection string to an MQ Provider Specific server uses the following syntax: providerCode:
[transportProtocol:]//host[:port][?key1=value1&key2=value2]
. The connection string to a JNDI (JMS Standard) server is supplied by the MQ server administrator.
JNDI Initial The JNDI (Java Name and Directory Interface) context factory is the fully qualified name of the class
Context used to look up the JMS connection factory object. For example, the class might be
Factory com.sun.jndi.fscontext.RefFSContextFactory or
com.sun.jndi.ldap.LdapCtxFactory. This is required when the connection type is set to use
the JMS Standard.
JNDI Name The name of the JMS connection factory object to use. This is required when the connection type
uses the JMS Standard.
JNDI The optional JNDI properties are specified using key=value pairs. Each pair is defined on a
Properties separate line.
Property Description
Property Description
Port The port number to use for connecting to the server. If left blank, the default port number is 25.
Is Password Indicates whether or not the password is encrypted. You should choose Yes if you clicked the
Encrypted Encrypt button for the Password.
Connection Type The connection type to use when communicating with the SMTP Server. The following options
are available:
- Normal - The connection is not encrypted.
- Explicit SSL - After initial authentication with the SMTP server, the connection is encrypted
with SSL.
- Implicit SSL - The entire connection and transmission is encrypted using SSL.
- O365 - Connects to the Office365 SMTP servers.
Client ID The unique identification ID assigned to an application which establishes an identity with the
Office 365 applications.
Client Secret The secret key is used to exchange the authorization code to access the token. Include the
Client Secret if the application is confidential.
Is Client Secret Indicates whether or not the client secret is encrypted. You should choose Yes if you clicked the
Encrypted Encrypt button for the Client Secret.
Property Description
Port The port number to use for connecting to the server. If left blank, the default port number is 21.
Property Description
Timeout The number of seconds to wait when attempting to connect to the server. A timeout will occur if
the connection cannot be established in the specified amount of time. If left blank, the default
timeout is 120 seconds.
Connection Retry The number of times to retry the connection if it cannot be established. This setting is used for
Attempts both the initial connection and any reconnect attempts due to lost connections. If left blank,
then no retries will be attempted.
Connection Retry The number of seconds to wait between each connection retry attempt.
Interval Note: For instance, if you want Managed File Transfer to retry the connection up to 10 times
with a 5 second delay between retries, then specify 10 for the Connection Retry Attempts and 5
for the Connection Retry Interval.
Initial Remote The initial directory to start in after connecting to the server. If left blank, then the initial
Directory directory will be the home directory assigned to the user on the server.
Throttle Bandwidth Limit the inbound and outbound bandwidth used for file transfers.
Property Description
Proxy Type Managed File Transfer supports SOCKS (version 4 and 5), HTTP tunneling through an HTTP proxy and
Managed File Transfer Gateway. HTTP tunneling requires that the HTTP proxy supports the CONNECT
HTTP method. Not all HTTP proxy servers may support the CONNECT method and some might only
allow HTTPS traffic. When using an HTTP proxy that requires authentication, Basic and Digest
authentication schemes are supported. Check with the network administrator for the correct proxy
type.
Alternate The host name or IP address of an alternate proxy server. The alternate proxy server is used when the
Host primary proxy server is unavailable.
Port The port number to use for connecting to the proxy server. If left blank, the default port for an HTTP
connection is 80 and SOCKS is 1080.
User The user name to use for connecting to the proxy server.
Property Description
Host Key The fingerprint of the server's public key, which will be used to authenticate the server. If a
fingerprint is not specified, then the server will be treated as trusted.
Private Key Alias The private key used to authenticate the server, which is located in the SSH Key Manager.
Private Key File The password to use for accessing the Private Key File. After entering the password, you can
Password optionally click the Encrypt button, which will encrypt the password when it is stored in Managed
File Transfer's database. A private key password is only required if using SSH private key
authentication or both password and SSH private key authentication.
On the Algorithms tab, specify the authentication options and algorithms to use for this SFTP, SCP, or SSH
connection. The following table describes the properties in the Algorithms tab:
Property Description
Authentication Specify the authentication option to use for this connection. The following options are available:
- publickey
- password
- keyboard-interactive
Cipher Specify the cipher option to use for this connection. The following options are available:
- aes256-cbc
- aes192-cbc
- aes128-cbc
- 3des-cbc
- blowfish-cbc
- twofish256-cbc
- twofish-cbc
- twofish192-cbc
- twofish128-cbc
- serpent256-cbc
- serpent192-cbc
- serpent128-cbc
- arcfour
- idea-cbc
- cast128-cbc
- des-cbc
- arcfour128
- arcfour256
- aes128-ctr
- aes192-ctr
- aes256-ctr
- 3des-ctr
- blowfish-ctr
- twofish128-ctr
- twofish192-ctr
- twofish256-ctr
- serpent128-ctr
- serpent192-ctr
- serpent256-ctr
- idea-ctr
- cast128-ctr
Mac Specify the mac connection option to use for this connection. The following options are available:
- hmac-md5
- hmac-sha1
- hmac-sha2-256
- hmac-sha1-96
- hmac-md5-96
Compression Specify the mac connection option to use for this connection. The following options are available:
- none
- zlib
- [email protected]
The options on the Algorithms tab allow customization of the supported algorithms for each SSH server
resource. The entries in the left column are the available algorithms and the entries in the right column are
the selected algorithms. By selecting one or more algorithms, only those will be used during the
communication. If no algorithms are selected for a section, the defaults for that section will be used.
During the handshake process, the selected options are negotiated with the server, starting with the entry at
the top of the list. The first cipher and mac and compression algorithms to match an algorithm supported by
the server will be used for the connection. If your company prefers certain algorithms over others, use the
arrow buttons to move that cipher to the Selected column and to set the order with the most preferred
algorithm at the top. Press the CTRL key while clicking to select multiple entries.
2. To add an MFT Connection, click New MFT Connection, and then select the relevant connection type by
protocol.
3. On the Basic tab, define the connection name, description, host, port, user, and password, as relevant.
4. Depending on the connection type, on the Connection tab, define the connection parameters such as
timeout, retry attempts, and control encoding.
5. Depending on the connection type, on the Proxy tab, specify the proxy parameters.
6. For an FTP or FTPS connection type, on the Directory Listing tab, define the parameters only if the list
parser must be customized.
7. For an SSH connection type, on the SSH Keys tab, specify the SSH Key parameters. On the Algorithms
tab, specify the communication authentication type and algorithms.
8. For an AS2 connection type, on the Message tab, specify encryption, signatures, and receipt certificate
parameters.
9. Click Save.
The MFT Connections page displays the MFT Connection.
Endpoints
This chapter includes the following topics:
• Endpoints Overview, 85
• Endpoint Types, 86
• Configuration Variables in Endpoints, 107
• Adding an Informatica Managed File Transfer Hosted Receive Endpoint, 108
• Adding an Informatica Managed File Transfer Hosted Send Endpoint, 109
• Adding an Informatica Managed File Transfer Remote Receive Endpoint, 110
• Adding an Informatica Managed File Transfer Remote Send Endpoint, 111
• Adding Local Endpoints, 111
• Running an Inbound Informatica Managed File Transfer Endpoint Manually , 112
• Searching Endpoints, 112
• Editing and Deleting Endpoints, 113
• Changing Status of Multiple Endpoints, 113
• Processing Files with Informatica Intelligent Cloud Services Mappings, 114
• Processing Files with a File Ingestion Task, 116
• Adding Local Endpoints, 117
• Endpoint Error Events, 117
Endpoints Overview
Endpoints are points of entry or exit for documents in B2B Data Exchange. Endpoints specify how and where
B2B Data Exchange sends and receives documents for specific partners or accounts.
You create endpoints as a part of the on-boarding process for one or more partners or accounts. B2B Data
Exchange uses the information in the endpoint when a workflow runs for the partner or the account.
When you create endpoints, you define common properties, such as endpoint type, description, and partner or
account. In addition, you define unique properties for each endpoint type.
For some endpoints, you can use configuration variables when you specify file name patterns. The
configuration variables can represent object name, such as partners, accounts, parameters, or profiles. For
example, use ($partnerId) to represent the partner ID for which to process documents to or from the
endpoint.
85
You can use the Operation Console to configure protocol communication parameters and details for
Informatica Managed File Transfer endpoints. Before you can do this, you must install the Informatica
Managed File Transfer application and enable Single Sign On.
Create an MFT Remote Receive Endpoint to use Informatica Managed File Transfer to receive files from a
partner hosted server to the organization. Create an MFT Remote Send Endpoint to use Informatica Managed
File Transfer to send files from the organization to the server hosted by the partner.
Note: Before you create an MFT Remote Send or MFT Remote Receive endpoint, create an MFT Connection.
The MFT Connection defines how Informatica Managed File Transfer communicates with the remote server.
Create an MFT Hosted Receive Endpoint to receive files uploaded by the web users associated with the
partner, to the services hosted by Informatica Managed File Transfer. Create an MFT Hosted Send Endpoint
to send files to web users associated with the partner.
Note: Before you create an MFT Hosted Send endpoint or MFT Hosted Receive endpoint, create an MFT Web
User. The MFT Web User is an account that supports partner communication with the organization-hosted
servers, defined in Informatica Managed File Transfer as Services. Managed File Transfer Services support
FTP, FTPS, SFTP, HTTPS, and AS2 protocols.
Endpoint Types
The endpoint type that you create depends on the communication method between B2B Data Exchange and
the partner.
The following table describes the types of endpoints that you can define:
File Receive File system directory for incoming files from partners or accounts.
File Send File system directory for outgoing files to partners or accounts.
Web Service Location for incoming files that are sent by the DX_Endpoint Web service. You cannot create
Receive Web Service Receive endpoints in the Operation Console. The B2B Data Exchange administrator
manages Web Service Receive endpoints in the Web Service API.
Informatica MFT The following protocols are supported for the services hosted in the Informatica Managed File
Hosted Receive Transfer:
- FTP
- FTPS
- SFTP
- HTTPS
- AS2
Note: The endpoint is not directly associated with any protocol, but rather primarily stores
information about the partner MFT Web User. The MFT Web User is an account that supports
partner communication with the organization-hosted services.
86 Chapter 7: Endpoints
Endpoint Type Description
Informatica MFT The following protocols are supported for the services hosted in the Informatica Managed File
Hosted Send Transfer:
- FTP
- FTPS
- SFTP
- HTTPS
- AS2
Note: The endpoint is not directly associated with any protocol, but rather primarily stores
information about the partner MFT Web User. The MFT Web User is an account that supports
partner communication with the organization-hosted services.
Informatica MFT Mailbox on a server hosted in the partner DMZ that uses a specific protocol for incoming
Remote Receive documents. The following protocols are available:
- FTP
- FTPS
- SSH (SFT/SCP/SSH)
- AS2
- HTTP
- HTTPS
- SMTP
Note: The endpoint is not directly associated with any protocol, but obtains the protocol
information from the Informatica Managed File Transfer project with which the endpoint is
associated.
Informatica MFT Mailbox on a server hosted in the partner DMZ that uses a specific protocol for outgoing
Remote Send documents. The following protocols are available:
- FTP
- FTPS
- SSH (SFT/SCP/SSH)
- AS2
- HTTP
- HTTPS
- SMTP
Note: The endpoint is not directly associated with any protocol, but obtains the protocol
information from the Informatica Managed File Transfer project with which the endpoint is
associated.
Endpoint Types 87
Related Topics:
• “Adding Local Endpoints” on page 111
Property Description
Account The account associated with the endpoint. You can either associate the endpoint with a specific
account or leave the Account field empty to instruct B2B Data Exchange to process documents
for all accounts to or from the endpoint.
Connectivity Guide Add a connectivity guide that describes how the partner configures communications with the
organization.
If you choose to select and upload a file, it can then be viewed from the Partners Portal.
Partner Partner to associate with the endpoint. You can either associate the endpoint with a specific
partner or leave the Partner field empty to instruct B2B Data Exchange to process documents for
all partners to or from the endpoint.
Enable Portal File Indicates whether files for this endpoint can be uploaded, downloaded, or deleted using the
Exchange Partners Portal. Applies only to endpoint types File receive and File send.
88 Chapter 7: Endpoints
Related Topics:
• “Adding Local Endpoints” on page 111
The following table describes the File Receive endpoint Receiving Options properties:
Property Description
Use endpoint Specifies whether to store incoming documents in the root directory of the endpoint. The
root directory administrator defines the root directory path in the dx.endpoint.file.prefix.path system
property.
For example, if B2B Data Exchange stores all documents in H:/comserver/partners_msg/, the
administrator can add this path to the system property and define a variable name for the path, such
as Partners_Root. Use this name instead of the full root directory path, and add only a partner
name, such as <Partners_Root><MyPartner>.
Incoming file Path to the folder in which to store incoming files. You can include configuration variables in the
path incoming file path.
Pass by Passes documents that B2B Data Exchange receives through this endpoint to PowerCenter by
reference reference. When you pass documents by reference, PowerCenter stores the file path in the
repository instead of the actual file.
Pass large files by reference to improve performance and optimize storage.
Promote all Allows you to select all the added patterns while exporting the endpoint. Deselect this option to
patterns select only specific patterns from the added patterns list. You must select at least one file pattern.
The Promote all patterns option is selected by default.
Add Pattern... List of all of the file patterns that the endpoint can receive. B2B Data Exchange picks up files that
match one of these file patterns. You can select one or more of the following file pattern types:
- For Profile. Instructs B2B Data Exchange to use a specific profile when it processes documents
with the specific file pattern. To process files with an Informatica Intelligent Cloud Services (Data
Integration) mapping, select a profile associated with the relevant Informatica Cloud workflow.
- For Application. Instructs B2B Data Exchange to use a specific application when it processes
documents with the specific file pattern.
- None. Instructs B2B Data Exchange to process all documents with the specific file pattern.
You must configure at least one file name pattern.
You must select at least one file pattern to import.
File name File pattern that B2B Data Exchange receives through the endpoint. You can use variables ($xxx) and
pattern the asterisk (*) wildcard in the file name pattern.
Regular Create a regular expression to identify the file name that B2B Data Exchange receives through the
expression endpoint.
Regular When you define a regular expression, B2B Data Exchange checks the file path and file name that
Expression follows the defined endpoint root directory and incoming file path for a match. If you use a regular
Partial Match expression that does not match the path or name structure, the files are not matched. For example,
the endpoint file name is text.in and you do not check for a period as part of the regular
expression. You entered [a-z]+ instead of [a-z]+\.in. The file is not matched. To check any part
of the file path and file name for a match, select the Regular Expression Partial Match option.
Endpoint Types 89
You can define the files that the endpoint can receive with a file name pattern, or a regular expression, or
both. When you define a regular expression, B2B Data Exchange checks the file path and name after the
defined endpoint root directory and incoming file path for a match. If you use a regular expression, the
Incoming file path cannot include a configuration variable.
Note: The regular expression syntax is Java based. For more information about the regular expression
syntax, see http://docs.oracle.com/javase/7/docs/api/java/util/regex/Pattern.html.
If you use a regular expression and a file name pattern, B2B Data Exchange matches the elements in the
regular expression to variables in the file name pattern. If the regular expression has more or less elements
than the file name pattern, the endpoint files are processed according to the regular expression, but the file
name pattern variables might not be matched to the regular expression elements.
The following table describes the File Receive endpoint Backup properties:
Property Description
Enable backup Saves a copy of each file that B2B Data Exchange receives through the endpoint. If you disable
backup, B2B Data Exchange transfers the files from the endpoint to the target and then deletes the
files.
Use endpoint Specifies whether to store the backup copies of the files in the root directory of the endpoint. The
root directory administrator defines the endpoint root directory in a system property.
For example, if the root directory is Z:\backup, select Use endpoint root directory and enter the
subdirectory path in the Backup path field. B2B Data Exchange stores the backup copies of the
documents in Z:\backup\<subdirectory>.
Backup path Path to the directory in which to save copies of the files.
The following table describes the File Receive endpoint Store in HDFS properties:
Property Description
Store a copy in Saves a copy of each file that B2B Data Exchange receives through the endpoint in a Hadoop file
HDFS system (HDFS).
Note: You cannot store files that B2B Data Exchange receives from directories with a file path that
includes two back slashes (\\), such as Windows network folders.
Use HDFS root Stores the backup copies of the files in the root directory of the HDFS. The administrator defines
directory the HDFS root directory in a system property.
For example, if the root directory is Z:\HDFS_storage, select Use HDFS root directory and enter
the subdirectory path in the HDFS path field. B2B Data Exchange stores the backup copies of the
documents in the following location: Z:\HDFS_storage\<subdirectory>.
HDFS path Path to the HDFS directory in which to save copies of the files.
The following table describes the File Receive endpoint Advanced properties:
Property Description
Pick up file when size remains Pick up and process incoming files when the file size remains the same for a
the same for <x> seconds specific time interval. Select to help ensure that larger files are complete before
B2B Data Exchange transfers them.
Default value is 10.
90 Chapter 7: Endpoints
Related Topics:
• “Adding Local Endpoints” on page 111
• “Configuration Variables in Endpoints” on page 107
Property Description
Use endpoint Specifies whether to store outgoing documents in the root directory of the endpoint. The
root directory administrator defines the root directory path in the dx.endpoint.file.prefix.path system
property.
For example, if B2B Data Exchange stores all documents in H:/comserver/partners_msg/, the
administrator can add this path to the system property and define a variable name for the path, such
as Partners_Root. Use this name instead of the full root directory path, and add only a partner
name, such as <Partners_Root><MyPartner>.
Outgoing file Path to the folder that contains outgoing files. You can include configuration variables in the
path outgoing file path.
File pattern File pattern to which the outgoing file names must comply. You can use regular expressions and the
asterisk (*) wildcard in the file name pattern.
Related Topics:
• “Adding Local Endpoints” on page 111
• “Configuration Variables in Endpoints” on page 107
The following table describes the JMS Receive endpoint JNDI properties:
Property Description
Use values from java.naming Uses the context factory and provider URL that are defined in the system
system properties properties.
Context factory URL of the context factory with which to establish a JMS connection.
Endpoint Types 91
The following table describes the JMS Receive endpoint JMS properties:
Property Description
Connection factory URL of the connection factory used to create a connection to the JMS.
Related Topics:
• “Adding Local Endpoints” on page 111
The following table describes the JMS Send endpoint JNDI properties:
Property Description
Use values from java.naming system Uses the context factory and provider URL defined in the system properties.
properties
Context factory URL of the context factory with which to establish a JMS connection.
The following table describes the JMS Send endpoint JMS properties:
Property Description
Connection factory URL to the connection factory used to create a connection with the JMS.
Message type Type of the message. You can send the following message types:
- Text
- Bytes
Make sure that the message type matches the Message Body Type value in the
DX_Return_Queue transformation in PowerCenter.
92 Chapter 7: Endpoints
Related Topics:
• “Adding Local Endpoints” on page 111
Note: Before you create an MFT Hosted Receive endpoint, create an MFT Web User for the endpoint.
The following table describes the Basic properties in the Basic tab:
Property Description
Endpoint Type Specifies the type of endpoint, whether hosted or remote, send or receive.
Connectivity Add a connectivity guide that describes how the partner configures communications with the
Guide organization.
Partner Partner to associate with the endpoint. You can either associate the endpoint with a specific
partner or leave the Partner field empty to instruct B2B Data Exchange to process documents for
all partners to or from the endpoint.
Project Optionally, select an Informatica Managed File Transfer project that defines additional file
processing tasks. Informatica Managed File Transfer contains pre-configured projects that you
can use out of the box, or you can create and use a customized project.
The following out of the box projects can be used:
- DX_Hosted_PGP_Decrypt: Receive files using PGP encryption and decrypt the files.
- DX_Hosted_Unzip: Receive and unzip the files.
After you select a project, the project variables are displayed. Define values for the project
variables.
For general information about projects, see the Informatica Managed File Transfer Guide.
After you select a project, the project properties table displays variables that relate to the project.
Property Description
Endpoint Types 93
If you select a pre-packaged DX_Hosted_Unzip project, define the following properties:
Property Description
The following table describes the Receiving Options properties in the Processing tab:
Property Description
Pass by Passes documents that B2B Data Exchange receives through this endpoint to PowerCenter by
reference reference. When you pass documents by reference, PowerCenter stores the file path in the
repository instead of the actual file.
Pass large files by reference to improve performance and optimize storage.
Add Schedule Select one or more schedules for the endpoint. A schedule determines the pickup intervals for the
endpoint. For example, you can choose to pick up each file when it arrives or pick up files at
specific time intervals regardless of the number of files.
You can manually run an endpoint from the Partner Management --> Endpoints page. For more
information, see “Running an Inbound Informatica Managed File Transfer Endpoint Manually ” on page
112 .
Promote all Allows you to select all the added patterns while exporting the endpoint. Deselect this option to
patterns select only specific patterns from the added patterns list. You must select at least one file pattern.
The Promote all patterns option is selected by default.
Add Pattern... List of all of the file patterns that the endpoint can receive. B2B Data Exchange picks up files that
match one of these file patterns. You can select one or more of the following file pattern types:
- For Profile. Instructs B2B Data Exchange to use a specific profile when it processes documents
with the specific file pattern.
- For Application. Instructs B2B Data Exchange to use a specific application when it processes
documents with the specific file pattern.
- For MFT Project. Instructs B2B Data Exchange to process the file through the Project in
Informatica Managed File Transfer. This option is enabled only when the endpoint is configured
with a project.
- None. Instructs B2B Data Exchange to processes all documents with the specific file pattern.
You must configure at least one file name pattern.
Note: B2B Data Exchange picks up files that match the file name pattern after the following
Informatica Managed File Transfer operations are completed:
- For project or job runs, file matching and pick up is performed after archive tasks, decrypt
operations, unzip operations, or untar operations.
- For job tasks, file matching and pick up is performed after renaming files, or read/write
operations.
- For files tasks, file matching and pick up is performed after file upload, file download, file put
operations, file get operations, AS2 transfer, MLLP transfer, or portal download.
File name File pattern that B2B Data Exchange receives through the endpoint. You can use ($xxx) variables in
pattern the file name pattern.
Regular Create a regular expression to identify the file name that B2B Data Exchange receives through the
expression endpoint.
94 Chapter 7: Endpoints
Property Description
Regular If enabled, the regular expression is matched to any section of the file name and path that follows
expression the defined endpoint root directory and incoming file path, so the match does not need to be exact.
partial If cleared, the regular expression is treated as if the expression had the prefix ^ and postfix $.
matched
AS2 to ID The AS2 ID of the AS2 Server. If the AS2 Server is configured with multiple IDs, then you use the AS2
ID as a routing pattern to resolve the profile, with the file name pattern.
For example, you have configured three AS2 IDs such as, ID-1, ID-2, and ID-3 to the AS2 server
hosted on Managed File Transfer. There are three Managed File Transfer hosted receive endpoints
EP1 using ID-1, EP2 using ID-2, and EP3 using ID-3 for the file transfer. You configure AS2 to ID such
that when a web user sends an AS2 message over to ID-2, then EP2 receives the file.
The following table describes the Backup properties in the Processing tab:
Property Description
Enable backup Saves a copy of each file that B2B Data Exchange receives through the endpoint. If you disable
backup, B2B Data Exchange transfers the files from the endpoint to the target and then deletes the
files.
Use endpoint Specifies whether to store the backup copies of the files in the root directory of the endpoint. The
root directory administrator defines the endpoint root directory in a system property.
For example, if the root directory is Z:\backup, select Use endpoint root directory and enter the
subdirectory path in the Backup path field. B2B Data Exchange stores the backup copies of the
documents in Z:\backup\<subdirectory>.
Backup path Path to the directory in which to save the backup copies of the files that B2B Data Exchange receives
through the endpoint.
The following table describes the Store in HDFS properties in the Processing tab:
Property Description
Store a copy in Saves a copy of each incoming file that B2B Data Exchange receives through the endpoint in a
HDFS Hadoop file system (HDFS).
Note: You cannot store files that B2B Data Exchange receives from directories with a file path that
includes two back slashes (\\), such as Windows network folders.
Use HDFS root Stores the backup copies of the incoming files in the root directory of the HDFS. The B2B Data
directory Exchange administrator defines the HDFS root directory in a system property.
For example, if the root directory is Z:\HDFS_storage, select Use HDFS root directory and enter
the subdirectory path in the HDFS path field. B2B Data Exchange stores the backup copies of the
documents in the following location: Z:\HDFS_storage\<subdirectory>.
HDFS path Path to the HDFS directory in which to save copies of the incoming files.
Endpoint Types 95
The following table describes the Advanced properties in the Processing tab:
Property Description
Pick up file when size remains Pick up and process incoming files when the file size remains the same for a
the same for <x> seconds specific time interval. Select to help ensure that larger files are complete before B2B
Data Exchange transfers them.
Default value is 10 seconds.
The following table describes the MFT Web User properties in the MFT Web Users tab:
Property Description
Add Web Users Select from a list of all of the MFT Web Users that you can assign to the endpoint.
You must add at least one MFT Web User.
Note: you cannot associate a single MFT Web User to multiple hosted receive endpoints.
First Name The first name of the MFT Web User contact.
Last Name The last name of the MFT Web User contact.
Email Address The email address of the MFT Web User contact.
Status Operational status of the MFT Web User. Default value is Enabled.
Related Topics:
• “Adding an Informatica Managed File Transfer Hosted Receive Endpoint” on page 108
Note: Before you create an MFT Hosted Send endpoint, create an MFT Web User for the endpoint.
The following table describes the Basic properties in the Basic tab:
Property Description
Endpoint Type Specifies the type of endpoint, whether hosted or remote, send or receive.
Connectivity Guide Add a connectivity guide that describes how the partner configures communications with the
organization.
96 Chapter 7: Endpoints
Property Description
Partner Partner to associate with the endpoint. You can either associate the endpoint with a specific
partner or leave the Partner field empty to instruct B2B Data Exchange to process documents for
all partners to or from the endpoint.
Property Description
Add Web Users List of all of the MFT Web Users that you can assign to the endpoint.
You must add an MFT Web User. You can only add a single MFT Web User.
Note: You cannot add an MFT Web User that is associated with any other partner.
First Name The first name of the MFT Web User contact.
Last Name The last name of the MFT Web User contact.
Email Address The email address of the MFT Web User contact.
Status Operational status of the MFT Web User. Default value is Enabled.
File name pattern File pattern that defines the files the endpoint sends. You can use ($xxx) variables in the file
name pattern.
Property Description
Project Optionally, select an Informatica Managed File Transfer project that defines additional file processing
Name tasks. Informatica Managed File Transfer contains pre-configured projects that you can use out of the
box, or you can create and use a customized project.
The following out of the box projects can be used:
- DX_Hosted_PGP_Encrypt: Encrypt the files with PGP encryption and then send the files.
- DX_Hosted_Zip: Zip and then send the files.
After you select a project, the project variables are displayed. Define values for the project variables.
For general information about projects, see the Informatica Managed File Transfer Guide.
After you select a project, the project properties table displays variables that relate to the project.
Endpoint Types 97
If you select a pre-packaged DX_Hosted_PGP_Encrypt project, define the following properties:
Property Description
PublicKey_ID Specify the ID of the key. The Key ID is used to identify which key to select.
Content_File_Suffix Specifies an extension for the output file. Default value: .txt
Compressed_OutputFile_Suffix Specifies an extension for the compressed output file. Default value: .zip
Property Description
Content_File_Suffix Specifies an extension for the output file. Default value: .txt
Compressed_OutputFile_Suffix Specifies an extension for the compressed output file. Default value: .zip
Related Topics:
• “Adding an Informatica Managed File Transfer Hosted Send Endpoint” on page 109
Note: Before you create an MFT Remote Receive endpoint, create an MFT Connection for the endpoint.
The following table describes the MFT Remote Receive endpoint Basic properties in the Basic tab:
Property Description
Endpoint Type Specifies the type of endpoint, whether hosted or remote, send or receive.
Connectivity Guide Add a connectivity guide that describes how the partner configures communications with the
organization.
98 Chapter 7: Endpoints
Property Description
Partner Partner to associate with the endpoint. You can either associate the endpoint with a specific
partner or leave the Partner field empty to instruct B2B Data Exchange to process documents for
all partners to or from the endpoint.
You must select a project in the Project properties in the Basic tab:
Property Description
Project Select an Informatica Managed File Transfer project that defines communications between the partner
Name and the organization. Informatica Managed File Transfer contains pre-configured projects that you can
use out of the box, or you can create and use a customized project.
The following out of the box projects can be used:
- DX_Remote_FTP_Receive: Receive files using the FTP communications protocol.
- DX_Remote_FTPS_Receive: Receive files using the FTPS communications protocol.
- DX_Remote_HTTP_Get: Receive files using the HTTP communications protocol.
- DX_Remote_HTTPS_Get: Receive files using the HTTPS communications protocol.
- DX_Remote_SCP_Receive: Receive files using the SCP communications protocol.
- DX_Remote_SFTP_Receive: Receive files using the SFTP communications protocol.
For general information about projects, see the Informatica Managed File Transfer Guide.
Job Queue To run jobs in batch mode, browse to select a job queue and then click Add. When you select a job
queue, B2B Data Exchange runs the job and submits it to the selected queue. The selected job queue
runs in Managed File Transfer. If left blank, the default queue runs the job.
Default value is Default.
Note: When you upgrade or export endpoints from an older version, select the Default job queue.
After you select a project and a job queue, the project properties table displays variables that relate to the
project.
Property Description
Source_Directory Specify a directory from which files are downloaded. If no filters are defined,
all files in this directory are downloaded. Default value: /.
RegEx_or_Wildcard Specify whether to use a wild card filter or a regular expression filter to
search for files to receive. Possible values are WildCard or RegEx. Default
value: RegEx.
File_Pattern_To_Download Specify the file name pattern used to select the files that Informatica
Managed File Transfer receives to the endpoint. Default value: *.txt.
Delete_From_Source_After_Download Select whether or not to delete a file after it is downloaded. Default value:
true.
Endpoint Types 99
Property Description
Property Description
Source_FTPS_Connection Mandatory. Select a pre-configured connection from the list of the available
Managed File Transfer connections of the FTPS type.
Source_Directory Specify a directory from which files are downloaded. If no filters are defined,
all files in this directory are downloaded. Default value: /.
RegEx_or_Wildcard Specify whether to use a wild card filter or a regular expression filter to
search for files to receive. Possible values are WildCard or RegEx. Default
value: RegEx.
File_Pattern_To_Download Specify the file name pattern used to select the files that Informatica
Managed File Transfer receives to the endpoint. Default value: *.txt.
Delete_From_Source_After_Download Select whether or not to delete a file after it is downloaded. Default value:
true.
Property Description
Source_HTTP_Connection Mandatory. Select a pre-configured connection from the list of the available Managed File
Transfer connections of the HTTP type.
Get_URI Specify the URI with which to query the HTTP server.
Destination_File_Name Specify the query destination file name. Default value: destination.txt.
Property Description
Source_HTTPS_Connection Mandatory. Select a pre-configured connection from the list of the available Managed
File Transfer connections of the HTTPS type.
Get_URI Specify the URI with which to query the HTTP server.
Destination_File_Name Specify the query destination file name. Default value: destination.txt.
Property Description
Source_SCP_Connection Mandatory. Select a pre-configured connection from the list of the available Managed
File Transfer connections of the SCP type.
Source_Directory Specify a directory from which files are downloaded. If no filters are defined, all files in
this directory are downloaded. Default value: /.
File_Pattern_To_Download Specify the file name pattern used to select the files that Informatica Managed File
Transfer receives to the endpoint. Default value: *.txt.
Property Description
Source_SFTP_Connection Mandatory. Select a pre-configured connection from the list of the available
Managed File Transfer connections of the SFTP type.
Source_Directory Specify a directory from which files are downloaded. If no filters are defined,
all files in this directory are downloaded. Default value: /.
RegEx_or_Wildcard Specify whether to use a wild card filter or a regular expression filter to
search for files to receive. Possible values are WildCard or RegEx. Default
value: RegEx.
File_Pattern_To_Download Specify the file name pattern used to select the files that Informatica
Managed File Transfer receives to the endpoint. Default value: *.txt.
Delete_From_Source_After_Download Select whether or not to delete a file after it is downloaded. Default value:
true.
Property Description
Promote all patterns Allows you to select all the added patterns while
exporting the endpoint. Deselect this option to select only
specific patterns from the added patterns list. You must
select at least one file pattern.
The Promote all patterns option is selected by default.
Add Pattern... List of all of the file patterns that the endpoint can
receive. B2B Data Exchange picks up files that match one
of these file patterns. You can select one or more of the
following file pattern types:
- For Profile. Instructs B2B Data Exchange to use a
specific profile when it processes documents with the
specific file pattern.
- For Application. Instructs B2B Data Exchange to use a
specific application when it processes documents with
the specific file pattern.
- None. Instructs B2B Data Exchange to processes all
documents with the specific file pattern.
You must configure at least one file name pattern.
File name pattern File pattern that B2B Data Exchange receives through the
endpoint. You can use ($xxx) variables in the file name
pattern.
Property Description
Enable backup Saves a copy of each file that B2B Data Exchange receives through the endpoint. If you disable
backup, B2B Data Exchange transfers the files from the endpoint to the target and then deletes the
files.
Use endpoint Specifies whether to store the backup copies of the files in the root directory of the endpoint. The
root directory administrator defines the endpoint root directory in a system property.
For example, if the root directory is Z:\backup, select Use endpoint root directory and enter the
subdirectory path in the Backup path field. B2B Data Exchange stores the backup copies of the
documents in Z:\backup\<subdirectory>.
Backup path Path to the directory in which to save the backup copies of the files that B2B Data Exchange receives
through the endpoint.
The following table describes the MFT Remote Receive endpoint Store in HDFS properties in the Processing
tab:
Property Description
Store a copy in Saves a copy of each incoming file that B2B Data Exchange receives through the endpoint in a
HDFS Hadoop file system (HDFS).
Note: You cannot store files that B2B Data Exchange receives from directories with a file path that
includes two back slashes (\\), such as Windows network folders.
Use HDFS root Stores the backup copies of the incoming files in the root directory of the HDFS. The B2B Data
directory Exchange administrator defines the HDFS root directory in a system property.
For example, if the root directory is Z:\HDFS_storage, select Use HDFS root directory and enter
the subdirectory path in the HDFS path field. B2B Data Exchange stores the backup copies of the
documents in the following location: Z:\HDFS_storage\<subdirectory>.
HDFS path Path to the HDFS directory in which to save copies of the incoming files.
Related Topics:
• “Adding an Informatica Managed File Transfer Remote Receive Endpoint” on page 110
Note: Before you create an MFT Remote Send endpoint, create an MFT Connection for the endpoint.
The following table describes the Basic properties in the Basic tab:
Property Description
Endpoint Type Specifies the type of endpoint, whether hosted or remote, send or receive.
Connectivity Guide Add a connectivity guide that describes how the partner configures communications with the
organization.
Partner Partner to associate with the endpoint. You can either associate the endpoint with a specific
partner or leave the Partner field empty to instruct B2B Data Exchange to process documents for
all partners to or from the endpoint.
Property Description
File pattern File pattern of files that B2B Data Exchange sends through the endpoint. You can use ($xxx) variables in
the file name pattern. For more information, see “Configuration Variables in Endpoints” on page 107 .
Property Description
Project Select an Informatica Managed File Transfer project that defines communications between the
Name partner and the organization. Informatica Managed File Transfer contains pre-configured projects that
you can use out of the box, or you can create and use a customized project.
The following out of the box projects can be used:
- DX_Remote_MI_Send: Send files using the Data Integration mass ingestion task.
- DX_Remote_AS2_Send: Send files using the AS2 communications protocol.
- DX_Remote_FTP_Send: Send files using the FTP communications protocol.
- DX_Remote_FTPS_Send: Send files using the FTPS communications protocol.
- DX_Remote_HTTP_POST: Send files using the HTTP communications protocol.
- DX_Remote_HTTPS_POST: Send files using the HTTPS communications protocol.
- DX_Remote_SCP_Send: Send files using the SCP communications protocol.
- DX_Remote_SFTP_Send: Send files using the SFTP communications protocol.
For general information about projects, see the Informatica Managed File Transfer Guide.
Project Select the mode to execute the B2B Data Exchange job. You can use one of the following modes:
Execution - Interactive. The session waits for previous jobs to complete before it executes the new job.
Mode - Batch. The session immediately submits the project for execution regardless of other active jobs.
Default is Interactive.
Job Queue Applies when you select Batch in Project Execution Mode. Browse to select a job queue and click
Add. The selected job queue runs in Managed File Transfer. If left blank, the default queue runs the
job.
Default value is Default.
After you select a project, the project properties table displays variables that relate to the project.
Property Description
MI_Source_Directory Mandatory. Specify the server directory from which to send files that is specified in the mass
ingestion task.
MI_Project_Location Mandatory. Specify the project folder location of the mass ingestion task.
Max_Time_Poll_MI Optional. Specify the maximum polling time for the mass ingestion task in hours. Default: 1.
Property Description
DX_RequestReceipt Optional. Specify whether or not to request a receipt from the server. Default
value: none.
DX_Receipt_Destination Optional. Specify if and where the receipt, if any, should be sent. Default
value: discard.
DX_Receipt_Destination_File Optional. Specify the location of the file to which the receipt should be
saved. Default value: discard.
DX_Receipt_Destination_File_overwrite Optional. Specify the action to take when the receipt file already exists.
Default value: rename.
DX_Receipt_email Specify the email address to which the receipt, if any, should be sent.
Required if Receipt Destination is set to email.
DX_Receipt_URL Specify the URL to which the receipt, if any, should be sent. Required if
Receipt Destination is set to url.
DX_Content_Type Specify the value to send in the Content-Type header field when making the
request. Default value: multipart/mixed.
Property Description
Destination_Directory Optional. Specify a partner server directory to which to send files. Default value: /.
Property Description
Destination_Directory Optional. Specify a partner server directory to which to send files. Default value: /.
Property Description
Property Description
Property Description
Destination_Directory Optional. Specify a partner server directory to which to send files. Default value: /.
Property Description
Destination_Directory Optional. Specify a partner server directory to which to send files. Default value: /.
Related Topics:
• “Adding an Informatica Managed File Transfer Remote Send Endpoint” on page 111
For example, if you enter the ($accountNumber)_report.txt file name pattern in a File Receive endpoint,
when B2B Data Exchange receives a document that matches the file name pattern, such as
20534_report.txt, it processes the document through the File Receive endpoint.
Note: If you associate an endpoint or a profile with a specific partner or account, B2B Data Exchange ignores
the partner or account configuration variables.
You can also use variables in endpoints that derive the values from the PowerCenter mapping. For more
information about customizing a variable, see “Custom Variables” on page 108.
The following table describes the variables you can use in the file or directory patterns:
Variable Description
($accountId) Unique identifier for the account. B2B Data Exchange generates the account ID when you create
a account.
Note: If you import the account into another instance of B2B Data Exchange, B2B Data Exchange
generates another account ID.
($accountNumber) Account number. If you use ($accountId) and ($accountNumber), B2B Data Exchange ignores
this variable.
($parameterName) Parameter name. Use the ($parameterName) variable to create a single endpoint with multiple
parameters.
For more information about customizing a variable name, see “Custom Variables” on page 108 .
($partnerId) Unique identifier for the partner. B2B Data Exchange generates the partner ID when you create a
partner.
Note: If you import the partner into another instance of B2B Data Exchange, B2B Data Exchange
generates another partner ID.
($partnerName) Partner name. If you use ($partnerId) and ($partnerName), B2B Data Exchange ignores this
variable.
($profileId) Unique identifier for the profile. B2B Data Exchange generates the profile ID when you create a
profile.
Note: If you import the profile into another instance of B2B Data Exchange, B2B Data Exchange
generates another profile ID.
($profileName) Profile name. If you use ($profileId) and ($profileName), B2B Data Exchange ignores this
variable.
Related Topics:
• “File Receive Endpoint Properties” on page 89
• “File Send Endpoint Properties” on page 91
Custom Variables
You can use custom variables to define a set of values in the endpoint.
Configure the custom variables in the JMS target properties in the PowerCenter mapping and use them in the
endpoint variables. Use custom variables when you configure endpoints that derives the destination directory
from the PowerCenter.
Consider that you add a parameter, param1 to the JMS target in a PowerCenter mapping and set the value as
($param1) in a MFT Hosted Send endpoint. When you run the MFT Hosted Send endpoint, the endpoint uses
the value of the param1 that PowerCenter resolves.
Before you create an MFT Hosted Receive endpoint, create an MFT Web User.
Note: B2B Data Exchange receives files that a Web user uploaded before creating an MFT Hosted Receive
endpoint.
Related Topics:
• “MFT Hosted Receive Endpoint Properties” on page 93
• “Managed File Transfer Web Users Overview” on page 59
• “Creating an MFT Web User” on page 64
Before you create an MFT Hosted Send endpoint, create an MFT Web User.
2. To add an endpoint, click New Endpoint, and select the MFT Endpoint endpoint type from the list.
3. To add an MFT Hosted Send endpoint, select MFT Hosted Send from the list.
The Create New MFT Hosted Endpoint - Send page appears.
4. On the Basic tab, define the endpoint name, partner, account, and status.
5. Optionally, select a project and specify values for the project variables.
6. Select a Web User.
Note: A Web User cannot be assigned to more than one endpoint.
Related Topics:
• “MFT Hosted Send Endpoint Properties” on page 96
• “Managed File Transfer Web Users Overview” on page 59
• “Creating an MFT Web User” on page 64
Before you create an MFT Remote Receive endpoint, create an MFT Connection.
1. To add an endpoint, click New Endpoint, and select the MFT Endpoint endpoint type from the list.
2. To add an MFT Remote Receive endpoint, select MFT Remote Receive from the list.
The Create New MFT Remote Endpoint - Receive page appears.
3. On the Basic tab, define the endpoint name, partner, account, and status.
4. Select a Project.
After you select a project, the Project properties table displays variables that relate to the project.
5. On the Processing tab, define the Receiving Options properties.
a. Select whether to pass documents by reference.
b. To add a schedule, select a schedule from the list and then click Add Schedule.
c. Specify the file name pattern used to select the files that the endpoint receives.
You must configure at least one file name pattern.
d. Select the Promote all patterns option to include all the added patterns when you export an
endpoint.
6. Define the Backup properties. Select whether to enable backup, use the endpoint root directory for
backup, and define a backup path.
7. Define the Store in HDFS properties. Select whether to store a copy of the file in HDFS, use the HDFS
root directory for backup, and define an HDFS path.
8. Click Save.
The Endpoints page displays the endpoint.
2. To add an endpoint, click New Endpoint, and select the MFT Endpoint endpoint type from the list.
3. To add an MFT Remote Send endpoint, select MFT Remote Send from the list.
The Create New MFT Remote Endpoint - Send page appears.
4. On the Basic tab, define the endpoint name, partner, account, and status.
5. Define the Sending Options properties. Specify a file name pattern used to identify which files to send
from the endpoint.
6. Select a Project.
After you select a project, the Project properties table displays variables that relate to the project.
7. Define the properties in the Project properties table.
8. Click Save.
The Endpoints page displays the endpoint.
Related Topics:
• “MFT Remote Send Endpoint Properties” on page 103
• “Managed File Transfer Connections Overview” on page 66
• “Creating an MFT Connection” on page 83
Related Topics:
• “Endpoint Types” on page 86
• “Common Endpoint Properties” on page 88
• “File Receive Endpoint Properties” on page 89
• “File Send Endpoint Properties” on page 91
• “JMS Receive Endpoint Properties” on page 91
• “JMS Send Endpoint Properties” on page 92
You must enable the "Run Endpoint" privilege to run an endpoint manually. For the Operator and
Administrator role, the "Run Endpoint" privilege is enabled by default.
Searching Endpoints
You can search for an endpoints from the list of existing endpoints.
You can define the individual status of the endpoint while adding an endpoint. You can change the status of
an endpoint or multiple endpoints by using the operations in the Actions menu.
Before you use Cloud Data Integration to create and run mappings, ensure that you have an active
Informatica Intelligent Cloud Services account, have defined user roles through the Administrator, and
have a relevant license. Ensure that you install the Secure Agent on the same machine as B2B Data
Exchange. For more information, see the Informatica Intelligent Cloud Services Administrator Guide.
• dx.iics.url
• dx.iics.username
• dx.iics.password
• dx.iics.runtime.environment
• dx.iics.max.poll.time.minutes
• dx.iics.object.prefix
For more information, see the B2B Data Exchange Administrator Guide.
Create a mapping with a flat file source transformation, Expression transformations, any additional
transformations whose functionality you wish to use, and a target transformation.
You must create an Expression transformation with a parameter for the input file path, and you can also
define parameters for the flat file source formatting. For more information, see “ Input File
Parameters” on page 115 and “Formatting Options for Flat File Sources” on page 115.
For more information about transformations, see the Informatica Intelligent Cloud Services
Transformations Guide.
Create a workflow with an Informatica Cloud workflow flow type, and select the Cloud Data
Integration mapping for the workflow.
For more information, see the B2B Data Exchange Developer Guide.
Create a profile
Create a profile and associate it with the Informatica Cloud workflow. The mapping parameters that you
created in the Expression transformations are displayed as workflow parameters. You can configure the
mapping input file parameter and flat file formatting parameters as part of the workflow parameters
associated with the profile.
Create an endpoint
Create an inbound endpoint such as a File Receive endpoint. As part of the file pattern configuration,
select the profile associated with the Informatica Cloud workflow.
To enable the Cloud Data Integration mapping to obtain the input file path, you create an Expression
transformation parameter for the input file parameter, and use the Expression transformation to pass the
input file path to the downstream transformation in the mapping.
Create an expression parameter named Prop_DxInputFilePath of type output field in the Expression
transformation.
B2B Data Exchange automatically populates the value for this parameter during runtime. The parameter is
read-only and hidden in the B2B Data Exchange Operations Console by default as the value for this parameter
is passed automatically during runtime.
When you create a flat file source, note that B2B Data Exchange supports only the Delimited formatting
option. B2B Data Exchange does not support the Fixed Width option.
The flat file formatting parameters are created with predefined names. These parameter values are later
defined in B2B Data Exchange using workflow parameters and passed back to Cloud Data Integration.
- Semicolon resolves to ;
- Colon resolves to :
- Tab resolves to \T
- Any other value is considered an error. The default value is passed instead.
• Prop_SrcFormattingOpt_FirstDataRow. Identify the first data row.
• Prop_SrcFormattingOpt_ImportRow. Import the header from a row.
• Prop_SrcFormattingOpt_EscapeChar. Defines an escape character.
For more information about Expression transformations, see Informatica Intelligent Cloud Services
Transformations Guide.
Import the custom task and project into Informatica Managed File Transfer
Before you can use the custom Informatica Managed File Transfer task and project to run the Data
Integration mass ingestion task, import the relevant task and project. For more information, see the
Informatica Managed File Transfer Installation and Configuration Guide.
Before you can use Cloud Data Integration to create and run tasks, ensure that you have an active
Informatica Intelligent Cloud Services account, have defined user roles through the Administrator, and
have a relevant license. Ensure that you install the Secure Agent on the same machine as B2B Data
Exchange. For more information, see the Informatica Intelligent Cloud Services Administrator Guide.
• dx.iics.url
• dx.iics.username
• dx.iics.password
• dx.iics.runtime.environment
• dx.iics.max.poll.time.minutes
After you configure the properties, restart B2B Data Exchange. For more information, see the B2B Data
Exchange Administrator Guide.
Create a file ingestion task with valid source and target transformations. For more information, see the
Informatica Intelligent Cloud Services Deploy Guide.
Related Topics:
• “Endpoint Types” on page 86
• “Common Endpoint Properties” on page 88
• “File Receive Endpoint Properties” on page 89
• “File Send Endpoint Properties” on page 91
• “JMS Receive Endpoint Properties” on page 91
• “JMS Send Endpoint Properties” on page 92
Events
This chapter includes the following topics:
Events Overview
An event is a representation of a document at a particular stage of processing. The B2B Data Exchange
server generates events as it processes documents, and it changes the status of the events as they go
through the transformation process.
When the B2B Data Exchange server receives a file that contains documents to process, it generates an event
associated with the file. This initial event is a file-level event. It is the root event for the file and is the parent
event for all other events that the B2B Data Exchange server generates during the course of processing the
documents in the file. The workflow that processes the document can generate child events of the file-level
event during document processing.
You monitor and perform actions on events in the Operation Console. You can view all events on the Event
List page. You can perform a basic or advanced search for events, and drill down to a specific event to view
event details. The event log provides information about the log type and a description about the event. To
view the input or output file of an event, you must enable the download the input file or output file of an event
privilege.The default description for an output message is prefixed with Outputmessage. To customize the
output message, create a JMS target property as outputMsgHeader in a PowerCenter mapping.
For more information about using custom variables, see “Custom Variables” on page 108.
You can view parent events and child events for system events, user events, and monitor events. To track a
set of events, you can create an event monitor and set up the rules for the events to be included in the
monitor. You can create multiple event monitors to track events for different profiles or to track different
types of events. You can configure the monitor to notify you of changes to the events that you track.
You can view all events that the B2B Data Exchange server generated since the last archive. To keep the
volume of events displayed in the Operation Console at a manageable level, archive the events regularly. If
you archive events with the B2B Data Exchange accelerator for Informatica Data Archive from the B2B Data
Exchange repository to the history database, you can view the archived events in the Operation Console.
119
Event Actions
You can perform actions on events from the Event List page based on the event status, state, or other
requirements in your organization.
The following table describes actions that you can perform on events:
Action Description
Change event status Changes the status of the selected events in the Change Event Status pop-up window.
Discard Discards all of the selected events. The status of the selected events is changed to
Discarded, but the events are not deleted.
Export event list to a Creates a .csv file that contains all of the events in the event list. You can then convert the
CSV file file to Excel format.
The following table describes basic event properties for which you can perform a basic search:
Property Description
Event Status Status of the event. This list contains two properties:
- State. Indicates whether the event is still processing or reached a final status.
- Status. Current progress of the event, regardless of whether the event finished processing.
The following table describes event properties for which you can perform an advanced search:
Property Description
Event Attributes Attributes of the event. Click Browse and select up to 3 attributes and operators in the Event
Attributes Search Criteria window.
Operation Select whether all search properties apply together or whether any of them may apply to the
search.
Parent Event ID Unique identifier of the parent events for any events that match the search criteria.
Show child events Indicates whether to perform the search in child events.
Cleared by default.
• Complete. Assigned when the event completes processing. Child events might, however, still be
processing. Message reconciliation can be completed later.
• Pending. Assigned while the event waits to be processed. The event is assigned this status from the
moment it is created until the status changes.
• Error. Assigned when the event processing produces an error.
• Critical. Assigned when the event processing produces a critical error.
• Reprocessed. Assigned when the event is processed again.
• Warning. Can be assigned when the event processing produces specific problematic states.
• New. This event type is not currently used.
• Rejected. Assigned when the message was rejected.
• Transferring. Assigned while the message is transferred from B2B Data Exchange to an outbound
endpoint. After the transfer is finished, B2B Data Exchange changes the event type to Complete or Error
depending on the result.
• Delayed. Assigned if message processing is delayed due to processing rules, if message processing waits
for a processing rule to release the message, or if message processing waits for a manual release.
• Discarded. Assigned when the event is delayed and then discarded due to a processing rule, or discarded
manually.
Aggregated Statuses
An Aggregated status indicates the overall state of message processing. When an event has child events, for
example when a file contains several transactions, the aggregated status indicates the status of all the child
events. B2B Data Exchange assigns the following aggregated statuses:
• Delayed: Assigned if message processing is delayed due to processing rules, or if message processing
waits for a processing rule to release the message, or if message processing waits to be manually
released.
• Error: Assigned when the event processing produces an error.
• Final: Assigned when the event processing finalizes.
For endpoints associated with an Informatica Managed File Transfer project, the Event Logs panel displays
the file send jobs and receive jobs with a link to related Managed File Transfer jobs. To view the Managed
File Transfer job details, click the link and the job details are displayed in a separate tab.
For Informatica Managed File Transfer hosted endpoints, the event details also provide access to service
jobs that log the files that MFT Web Users upload to the organization-hosted server.
Archived Events
You can view archived events in the Operation Console for short-term archiving that the B2B Data Exchange
performs with Informatica Data Archive to the history database.
Use the Archived Events page of the Operation Console to access the archived events and view events for
which you have viewing privileges. You can perform an advanced search for events. The advanced search
properties are similar to the advanced search properties for other event pages.
You can view detailed information about the events, such as the creation time, status, and type. You can also
export the archived events list to a CSV file. The archived events appear in read-only mode. You cannot
modify the event details, status, or state.
You cannot view archived events from the file archive in the Operation Console. To view archived events in
the file archive, use Informatica Data Archive.
Event Monitors
This chapter includes the following topics:
Event monitors run continuously to capture changes to events. You can run an event monitor manually or
configure it to run on a schedule. You cannot run a monitor that is disabled.
Event monitors can be set up to deliver captured events to the Advanced Exception Handling module. To do
this, choose the Deliver event and create issue option on the Event Monitor screen. For more information on
Advanced Exception Handling, see Chapter 13, “Advanced Exception Handling” on page 151.
You can view event monitors that are configured to send you notification. You must have the Monitors Full
Access privilege to view monitors that you create. If you do not have the Monitors Full Access privilege and
you create a monitor that you do not configure to send you notification, you cannot view the monitor or the
events in the monitor.
125
The Create Monitor page appears.
Note: You can monitor only event type and status or reconciliation status, but not both. If you want to
define a reconciliation monitor, follow the steps in “Creating a Reconciliation Monitor” on page 132.
6. If you monitor event status, select Set event status time window to define the amount of time that an
event must remain in specific status before the monitor reports this event. For example, if you set the
time window to 2 days and 15 hours, the monitor reports the event only after the event remains in the
specific status for 2 days and 15 hours.
8. To monitor events associated with one or more accounts for the selected partner, select an account
from the list. Use the Shift key to select multiple accounts.
9. To monitor events associated with a specific workflow, click the radio button next to the Workflow list,
click Browse, and select one or more workflows from the list.
10. To be notified when events that match the monitor criteria do not occur, select Report if event does NOT
occur.
Note: You can choose multiple users and multiple user groups. When you select a user group, all the
users in that group are notified.
12. Select the action that the Data Exchange Server should take when the monitor reports events that match
the monitor criteria:
Deliver event only Add the event to the list of events in the event monitor and display the event in the
console.
Deliver event and send Add the event to the list of events in the event monitor and send an email to the
email selected users.
Deliver event and run Add the event to the list of events in the event monitor and run a workflow. Click the
workflow Select Workflow button to select the workflow to run after the delivery.
Deliver event and run Add the event to the list of events in the event monitor and run a workflow associated
profile with a profile. Click the Select Profile button to select a partner, account, and profile.
After delivery, the Data Exchange Server runs the workflow associated with the
selected profile.
Deliver event and Add the event to the list of events in the event monitor and create an advanced
create issue exception handling issue.
Batch notification Select to send a single email that contains a list of all events that the monitor found.
Otherwise, each event is sent in a separate email.
Note: The maximum number of events that can be sent in a single email is 200. If more
than 200 events are found, the notifications are sent in multiple emails.
Note: To send email notifications, you must configure a mail server for B2B Data Exchange. For more
information, see the B2B Data Exchange Installation and Configuration Guide. The user account to which
you send email notifications must have valid email addresses.
13. Select the priority level for email notifications from the Select Priority list.
14. To change the status of the events that the monitor reports, select Change event status and select a
status from the Target event status list.
15. To suspend monitor activity on holidays, select the name of the calendar that contains the relevant
holidays from the Holiday Calendar list.
Frequency Description
Disabled Do not run the monitor according to a schedule. When a monitor is disabled, you cannot run the
monitor.
Custom Run the monitor in a specific time interval in hours and minutes.
Weekly Run the monitor at a specific hour once a week. If a scheduled run occurs on a holiday, select the
action that the Data Exchange Server performs:
- Skip run. Do not run the monitor during the holiday week. The Data Exchange Server runs the
monitor the following week.
- Run before holiday. Run the monitor one day before the day of the scheduled run.
- Run after holiday. Run the monitor one day after the day of the scheduled run.
Monthly Run the monitor at a specific hour once a month. . When a scheduled run falls on a holiday, select
the action that the Data Exchange Server performs:
- Skip run. Do not run the monitor during the holiday month. The Data Exchange Server runs the
monitor the following week.
- Run before holiday. Run the monitor one day before the day of the scheduled run.
- Run after holiday. Run the monitor one day after the day of the scheduled run.
• User events. List of events found by monitors that are configured to send you notifications. If you create a
monitor that does not send you notification, the events for that monitor are not included in the user events
list. The user events list can display events from multiple event monitors.
• Events for a monitor. List of events that match the monitor criteria. This list includes the total number of
events found by a specific monitor and the number of events that you did not view.
When you view monitored events, you can see the same type of information as when you view all events. You
can perform basic and advanced search. You can also drill into parent and child events.
Reconciliations
This chapter includes the following topics:
Reconciliations Overview
Reconciliation is the process of correlating an event with another event.
An example of reconciliation is when you send a document file to a partner containing transactions such as
payments or orders that require acknowledgment. When you send the file to the partner, the Data Exchange
Server initiates a reconciliation. When you receive the acknowledgment from the partner, the Data Exchange
Server completes the reconciliation. The Data Exchange Server uses a correlation ID to identify each
transaction and to reconcile the initial event with the acknowledgement.
When the Data Exchange Server initiates a reconciliation for an event, it sets a limit to the amount of time
that the reconciliation can take to complete. The reconciliation status of an event indicates whether the Data
Exchange Server completed the reconciliation within the time limit.
Reconciliation Monitors
The Data Exchange Server requires a reconciliation monitor to track events and update the status of the
reconciliations. The schedule you set for the reconciliation monitor determines how often the Data Exchange
Server updates the status of the reconciliations. If you do not create reconciliation monitors, the Data
Exchange Server does not update the reconciliation status of any event.
When a reconciliation monitor runs, the Data Exchange Server updates the status of the reconciliations for
the events within the scope of the monitor. If you create multiple reconciliation monitors with the same
scope and the monitors run at different times, the monitors find the reconciliations at different stages. When
the first monitor runs and finds an event that falls within the scope of the monitor, it can change the status of
the event. If the status changes, the other monitors do not find the same event because the new
reconciliation status does not fall within the scope of the monitor.
For example, you create reconciliation monitor A to track reconciliations for account 100 with status
Reconciled after timeout and schedule it to run at 8:00 a.m. every day. You also create reconciliation monitor
B to track reconciliations for account 100 with status Reconciled after timeout and schedule it to run at 10:00
a.m. every day. When monitor A runs, the Data Exchange Server finds one event for account 100 with the
131
status Reconciled after timeout. It changes the status to Reconciliation complete. When monitor B runs, the
Data Exchange Server does not find any event for account 100 with status Reconciled after timeout.
You can configure the reconciliation monitor to notify you of the events that fall within the scope of the
reconciliation monitor. You can use the reconciliation monitor to determine whether the reconciliations are
completed in a timely manner. If a large number of reconciliations do not complete within the timeout limit,
you might need to raise the timeout limit or modify the document reconciliation process.
Monitor Description
Timed out Change the reconciliation status of the specified events to Timed out if no acknowledgment was
received for the event within the time limit.
After timeout Change the reconciliation status of the specified events to After timeout if an acknowledgement
was received for the event after the time limit.
Note: You can monitor only event type and status or reconciliation status, but not both. If you want to
define an event monitor, follow the steps in “Creating an Event Monitor” on page 125.
6. To monitor event reconciliations associated with a specific partner, select the radio button next to the
Partner field, click Browse, and select a partner from the list.
Note: You can choose multiple users and multiple user groups. When you select a user group, all the
users in that group are notified.
10. Select the action that the Data Exchange Server should take when the monitor reports events that match
the monitor criteria:
Deliver event only Add the event to the list of events in the event monitor and display the event in the
console.
Deliver event and send Add the event to the list of events in the event monitor and send an email to the
email selected users.
Deliver event and run Add the event to the list of events in the event monitor and run a workflow. Click the
workflow Select Workflow button to select the workflow to run after the delivery.
Deliver event and run Add the event to the list of events in the event monitor and run a workflow associated
profile with a profile. Click the Select Profile button to select a partner, account, and profile.
After delivery, the Data Exchange Server runs the workflow associated with the
selected profile.
Deliver event and Add the event to the list of events in the event monitor and create an advanced
create issue exception handling issue.
Batch notification Select to send a single email that contains a list of all events that the monitor found.
Otherwise, each event is sent in a separate email.
Note: The maximum number of events that can be sent in a single email is 200. If more
than 200 events are found, the notifications are sent in multiple emails.
Note: To send email notifications, you must configure a mail server for B2B Data Exchange. For more
information, see the B2B Data Exchange Installation and Configuration Guide. The user account to which
you send email notifications must have valid email addresses.
11. Select the priority level for email notifications from the Select Priority list.
12. To change the status of the events that the monitor reports, select Change event status and select a
status from the Target event status list.
13. To suspend monitor activity on holidays, select the name of the calendar that contains the relevant
holidays from the Holiday Calendar list.
Frequency Description
Disabled Do not run the monitor according to a schedule. When a monitor is disabled, you cannot run the
monitor.
Custom Run the monitor in a specific time interval in hours and minutes.
Weekly Run the monitor at a specific hour once a week. If a scheduled run occurs on a holiday, select the
action that the Data Exchange Server performs:
- Skip run. Do not run the monitor during the holiday week. The Data Exchange Server runs the
monitor the following week.
- Run before holiday. Run the monitor one day before the day of the scheduled run.
- Run after holiday. Run the monitor one day after the day of the scheduled run.
Monthly Run the monitor at a specific hour once a month. . When a scheduled run falls on a holiday, select
the action that the Data Exchange Server performs:
- Skip run. Do not run the monitor during the holiday month. The Data Exchange Server runs the
monitor the following week.
- Run before holiday. Run the monitor one day before the day of the scheduled run.
- Run after holiday. Run the monitor one day after the day of the scheduled run.
Updating a Reconciliation
When you view a list of events, user events, or events for a specific monitor, you can view and change the
reconciliation status of the event.
2. Click the event ID of an event with an entry in the Reconciliation Status column.
The Details page appears.
Property Description
Initiated Date and time on which the reconciliation request was submitted.
Reconciliation Event Identifier of the event that was created when the reconciliation completed successfully.
To change the reconciliation status of an event, select the check box next to the reconciliation ID and
click Change Status.
4. Set the reconciliation status to Reconciliation Complete for one of the following options:
Option Description
All reconciliations in the Set the status of all of the reconciliations that are associated with the event.
event Note: This is equivalent to selecting all off the reconciliations in the
Reconciliation tab.
All reconciliations in the Set the status of all of the reconciliations for this event and all of the related
event hierarchy events, including parent and child events.
5. Click OK.
The Reconciliation Status displays the new status.
6. To change the timeout deadline for a reconciliation, select the check box next to the reconciliation ID
and click Change Timeout.
Option Description
All reconciliations in the Set the timeout of all of the reconciliations that are associated with the event.
event Note: This is equivalent to selecting all off the reconciliations in the
Reconciliation tab.
All reconciliations in the Set the timeout of all of the reconciliations for this event and all of the related
event hierarchy events, including parent and child events.
8. Click the calendar icon and select the new timeout date. Click Apply to close the calendar tool.
9. Set the new timeout hour and minute and click OK.
The Timeout column displays the new date and time for the selected reconciliations.
Reconciliation Problems
A reconciliation status of Timed-out or Reconciled after timeout can indicate a problem that might require
operator intervention.
To monitor and resolve reconciliations that have timed out, complete the following steps:
Event Resubmission
This chapter includes the following topics:
Note: If you use a real-time PowerCenter workflow to process the event, verify that the workflow is running
before you resubmit the event.
Reprocessing an Event
You can send events to PowerCenter for reprocessing, for example, if the event processing resulted in an
error. If you reprocess a parent event, only the parent event is submitted to PowerCenter, but the status of all
of the child events is changed to Reprocessed.
140
If you selected one event, the Reprocess Event window appears. If you selected multiple events, this
window does not appear. Instead, B2B Data Exchange reprocesses the events according to the default
values in the Reprocess Event window.
Option Description
Event source Default. Original document that was attached to the event.
document
External file External file to attach to the event for reprocessing. Select this option if you want to edit one
of the original documents before reprocessing the event.
Note: If the source of the event is pass by reference or if the event type is File Set, this option
is not available. You can only reprocess the event with one of the original source documents.
Option Description
Defaul event profile Default. Original profile used to process the event.
5. Click Reprocess.
B2B Data Exchange checks that the selected events can be reprocessed, makes a copy of the original
events, and submits the events to PowerCenter. It then changes the original event to read-only, sets the
event status to Reprocessed, and attaches a log file to the event.
Note: To prevent an event from being reprocessable, the developer can set the dxProhibitReprocess
event attribute to True.
Option Description
Event target Default. Original document that was attached to the event.
document
External file External file to attach to the event. Select this option if you want to edit one of the original
documents before reprocessing the event.
Note: If the source of the event is pass by reference or if the event type is File Set, this option
is not available. You can only resend the event with the original target document.
Option Description
Last outbound endpoint Default. The endpoint to which the event was originally sent.
5. Click Resend.
B2B Data Exchange creates an audit trail to track actions that operators perform on objects in the Operation
Console or the command line utilities, such as creating or editing a partner or an account. Operators with
audit trail viewing privileges can view the audit records that correspond to the actions in the Operation
Console and monitor object changes or troubleshoot issues with the objects on which the operators
performed the actions.
Specific objects or specific actions that operators perform in the Operation Console may directly impact the
business flow in the organization, and therefore may require approval before B2B Data Exchange completes
the action. Similarly, when Portal users change message profile or endpoint settings in the Partners Portal,
these changes require approval.
In such cases, operators with authorization privileges can review and approve or reject the actions. For
example, operators that are responsible for specific partners might need to approve edits to the partners that
other operators in the team perform, or updates made in the Partners Portal. Actions that B2B Data Exchange
receives from the command line utilities or an API do not require approval.
143
Search for Audit Events
Perform a basic or advanced search for audit events based on certain search criteria.
Property Description
Object Type Type of the object on which the operator performed the action, such as partner or account.
Object Name Name of the object on which the operator performed the action.
You can also filter the search results according to a specific time frame.
5. To search for audit events based on additional search criteria, click Advanced Search and enter one or
more of the following properties:
Property Description
6. Click Search.
The Audit Events page displays the search results.
B2B Data Exchange generates audit records for the following object types:
• Account
• Endpoint
• Monitor
• Partner
• Profile
• Portal User
• User
• User group
Note: When you modify a Managed File Transfer endpoint, B2B Data Exchange does not generate an audit
record for mailbox or host changes.
Property Description
Object Type Type of the object on which the operator performed the action, such as partner or account.
Object Name Name of the object on which the operator performed the action.
When you drill down to individual audit record details, you can view the current and new value for the fields in
the object.
Property Description
Type Object area in which the operator performed the action, such as Details.
Field Name Name of the field on which the operator performed the action.
New Value Value of the field after the operator performed the action.
You can view legacy audit events for the following object types:
• Account
• Partner
• Profile
• Monitor
• Endpoint
• User
• User group
• Workflow
• Application
• Calendar
• System property
• Category
• Schedule
Property Description
Start Time Date and time in which the operator performed the action.
1. In the Navigator, click Audit and Authorization > Legacy Audit Events.
The Legacy Audit Events page displays audit events that earlier B2B Data Exchange versions generated.
2. To view the details of a legacy audit event, click the event ID of the event that you want to view.
The Event Details section displays the operator action details.
3. To return to the Legacy Audit Events page, click Back.
Portal user actions in the Partners Portal to objects that require approval must be approved by operators with
authorization privileges. Operators can review, approve, revert, or reject the portal user actions. Portal user
actions require approval by just one operator.
When an operator or portal user performs an action that requires approval, the action appears as an approval
request in the Authorization page. Operators with authorization privileges review the request and approve or
reject the request as needed. If the action requires approval by two operators, the request remains pending
until the second operator approves the request. If an operator or portal user edits an object, that object is
locked for editing while the action request is pending and a message indicates that the object contains
pending actions. If an operator creates an object, the object is not visible to other operators while the action
request is pending.
The B2B Data Exchange administrator defines the authorization levels for each object type and assigns
authorization privileges to specific operators based on the organization needs.
The following object types might require approval for create, edit or delete actions:
• Partner
• Account
• Profile
Note: You can access the Authorization page only if you have authorization privileges. The B2B Data
Exchange administrator assigns authorization privileges according to the organization needs.
Property Description
Object Name Name of the object on which the operator performed the action.
Object Type Type of the object on which the operator performed the create, edit, or delete action.
User Name Name of the operator or portal user that performed the action.
When you drill down to individual action details, you can view the current and new value for the fields in the
object.
Property Description
Field Name Name of the field on which the operator performed the action.
First Level Approval Name of the first operator that approved the action.
New Value Value of the field after the operator performed the action.
Second Level Name of the second operator that approved the action.
Approval This property does not appear for actions that require approval by one operator or for portal
user actions that require approval.
Type Object area in which the operator performed the action, such as Details.
You can filter the list in the Authorization page based on the action status.
Status Description
Approved Actions that one or two operators with authorization privileges previously approved.
In Progress Actions related to the message profile status that are in progress in the Partners Portal.
Invalid Actions that B2B Data Exchange cancelled due to a more recent action that operators performed on the
object with external tools, such as the command line utilities or the Web Services API. Actions can also
be cancelled due to other operations such as an operator requesting to delete an account for which a
profile change was submitted for approval.
Pending Actions that require either approval by one operator or the first of approval by two operators with
authorization privileges.
• Portal user actions must be approved by operators with authorization privileges. Portal user actions
require approval by just one operator.
• Only operators that did not perform the actions can approve the actions. In addition, if the action requires
approval by two operators, a different operator must perform each approval level.
• B2B Data Exchange does not send notifications for new pending operator actions. Operators can review
pending actions in the Authorization page or in the Dashboard page.
Authorization 149
• If the B2B Data Exchange administrator defined that actions that operators perform on a partner do not
require approval but actions that operators perform on the accounts of the partner require approval, when
you create a partner with accounts B2B Data Exchange creates the partner and submits the request to
create the accounts for approval. You can view or edit the accounts only after the approval of an operator
with authorization privileges.
• Only manual operator actions can require approval. If B2B Data Exchange receives an action on the object
from the command line utilities or an API, B2B Data Exchange automatically accepts the action.
• If an operator performs an action with an external API on an object that already contains a pending action
before the pending action is approved, B2B Data Exchange prevents the approval of the pending action by
cancelling the action request when an operator attempts to approve the action. This ensures that approval
of the original action does not override more recent actions.
• When an operator deletes an object with related objects, the approval for the parent object applies to all
related objects even if the related objects require a different approval level. For example, if an operator
with authorization privileges approves an action request to delete a partner with a profile that requires
second level approval, B2B Data Exchange deletes that profile without requiring second level approval.
You can only access the Authorization page if the B2B Data Exchange administrator assigned authorization
privileges to you.
Advanced Exception Handling, an add-in that requires a separate license, provides complete functionality to
support the process of issue resolution.
The following terms are important to understanding the functionality of the Advanced Exception Handling
option:
• Event. An event is created when a document is received by B2B Data Exchange. Document status
information is updated throughout the processing of the document.
• Exception event. An event that is defined in an event monitor. The monitor can be configured to create an
exception handling issue when it traps an exception event.
• Exception handling issue. An exception handling issue is created by the Advanced Exception Handling
module when an event monitor traps an event exception. The issue is updated with status information as
its resolution workflow progresses. When the user updates the status of the event issue to Completed, the
system updates the status of the exception event to Completed.
• Regular event exception. A regular event exception is a single B2B event that meets the conditions
defined in an event monitor, for example, an error event for partner P.
• NOT event exception. A NOT event exception is a condition that meets the NOT condition defined in an
event monitor. An example of a NOT event exception is not receiving any input from partner P in the last
24 hours.
151
• Batch event exception. A batch event exception represents the occurrence of one or more exception
events over a period of time, for example, the receipt of one or more empty messages from Partner P over
the course of a day.
• Reconciliation event exception. A reconciliation event exception is a reconciliation event that meets the
conditions defined in an event monitor.
First, define an event monitor to trap events from Partner P whose event status is Error. Configure the
monitor Action after Notification as Deliver Event and Create Issue. Using the Advanced Exception Handling
option, you can have the system notify you by email when it creates an exception handling issue.
The initial status of an issue is Created. After you review the details of the issue, you decide to contact the
partner and ask that the message be re-sent. At this point you can display the issue, add a comment to
document the actions you took, and change the status to In Progress.
When you see that the replacement message has been received and completed, you can display the issue
again and change its status to Closed. The system changes the attached event status to Complete.
Project Name of the project used for exception issue handling. System default or event
attribute.
Account Number Number of the account associated with the event. Event.
Account Name Name of the account associated with the event. Event.
Description For each source, log, or target document in the source event, Event.
the following information is displayed:
<document type>:<document description> <HTTP link to the
document>
Attached Event Link to the source event in the event repository. System property in the attached
event.
Attached Event ID Unique identifier of the source event. All of the following:
- Event.
- System property.
Custom Properties Unique properties defined for this system. One of the following:
- Event attributes
- System properties.
• If any event attributes are empty, the monitor uses profile attributes.
• If both event attributes and profile attributes are empty, the monitor uses system properties.
Priority Relative priority of this issue. The priority set in the event monitor:
H=Critical, M=Major, L=Minor.
First line of description If the event monitor has a name, “Created Monitor.
by DX monitor [monitor name].”
Partner Partner name as defined in the monitor. NOT event (created by the monitor).
Account number Account numbers defined in the monitor. NOT event (created by the monitor).
Custom properties Unique properties defined for this system. System properties.
The attributes of a batch tracking issue are similar to the attributes of a NOT batch exception issue. Both
issue types to not include attached events and no partner or account information, because they normally
refer to multiple events, partners, or accounts.
To configure an event monitor to create an exception handling issue, follow the steps in “Creating an Event
Monitor” on page 125, and select the Deliver event and create issue option in the Action after notification
section.
To display details of an exception handling issue, go to the event details screen and click the issue link that is
displayed together with the logging information.
The Dashboard collects data from the metadata repository however, it continues to collect data from the
operational data store for some reports.
Use the dashboard to view summary information about events and document processing, such as the
number of events for certain partners or the error rate for specific event accounts. You can drill down to each
report to view event details or manage daily tasks that require further investigation. You can focus on areas
of interest and analyze statistical information about the processed data. In some panels you can export the
chart to a comma-separated-values (CSV) file for further analysis.
Data that appears in the report is filtered by global dashboard filters, for example, by a time frame or by a
partner. The data is then filtered by permissions. You can view data pertaining to applications to which you
have access. All charts are visible to users with dashboard privileges.
The dashboard page display the panels in the Events tab and the Service Level Agreement (SLA) tab. By
default, the Events tab in the Dashboard displays the Error Rate panel, the Tasks panel, the Error Events by
Partner panel, the Events Distribution panel, and the Average Processing Time panel. By default, the SLA tab
in the Dashboard displays the Violations By SLA Rules panel and the Violoations By KPI panel.
In the Dashboard, use the Tasks panel to view the link to the operator actions that are pending approval. The
Tasks panel retrieve information from the main B2B Data Exchange repository.
You can personalize the Dashboard with additional tabs and add different panels to each tab as needed. You
can organize the display of the panels and add tabs to display selected reports. You can view the Dashboard
only if the B2B Data Exchange administrator has installed and configured it. You can only view information
for which you have assigned privileges.
157
If you delete an object with information that the Dashboard displays in a panel and then create an object with
the same name, the operational data store event loader fails. For example, you delete a partner and create a
partner with the same name. Do not delete objects with information that the Dashboard uses.
Dashboard Filters
You can apply filters for each tab in the Dashboard. The filters apply to all panels and tabs.
Filter Description
Time Frame Time period during which to display event information in the panels. You can choose one of the
following options:
- Last 24 hours
- Last 48 hours
- Last 72 hours
- Last 7 days
- Last 30 days
- All
- Custom
If you select Custom, you can select a custom time frame in the Custom Time Frame dialog box.
Account Related account for the events. You must select a partner before you select an account.
Set as Default Select a filter that you want as the default filter setting, and click the Set as Default button to save
the settings.
Dashboard Panels
The Dashboard tabs contain panels in which you can view different reports based on information that B2B
Data Exchange collects about different KPIs. You can personalize each tab by adding or removing panels
Panel Description
Average Processing Visual indication of the distribution of event processing time during the selected time frame.
Time Appears by default.
Error Events by Ten or 20 accounts with the highest number of error events or unresolved error events
Account created during the selected time frame.
Error Events by Event Ten or 20 event statuses with the highest number of error events or unresolved error events
Status created during the selected time frame.
Error Events by Event Ten or 20 event types with the highest number of error events or unresolved error events
Type created during the selected time frame.
Error Events by Ten or 20 partners with the highest number of error events or unresolved error events created
Partner during the selected time frame.
Appears by default.
Error Events Number of error events created per hour or per day during the selected time frame.
Distribution
Error Rate Ratio of error events to the total events during the selected time frame in an intuitive and
graphical format.
Appears by default.
Events by Account Ten or 20 accounts with the highest number of events created during the selected time
frame.
Events by Event Ten or 20 event statuses with the highest number of events created during the selected time
Status frame.
Events by Event Type Ten or 20 event types with the highest number of events created during the selected time
frame.
Events by Partner Ten or 20 partners with the highest number of events created during the selected time frame.
Events Distribution Total number of events created per hour or per day during the selected time frame.
Appears by default.
SLA Violations Service level agreement (SLA) violations. The panel contains the following areas:
- Violations by SLA Rule. A breakdown of the top 10 violations according to the SLA rules.
- Violations by KPI. A breakdown of the top 10 violations according to the type of event
information, such as the number of events or the error rate.
- Violations. List view of the first 50 violations. You can filter the list according to the SLA
rule or the KPI. You can click a violation in the list to view the related events in the Event
List page.
Appears by default on the SLA tab.
Tasks Links to the number of unresolved error events and operator actions that are pending
approval.
Appears by default.
The Dashboard calculates the average processing time for time intervals during which B2B Data Exchange
processed events.
The following image illustrates the Average Processing Time panel on the dashboard:
The Average Processing Time report in the dashboard collects data from the operational data store.
The following table describes the Average Processing Time panel elements:
Element Description
Event State State of the events to display in the panel. You can choose one of the following options:
- All. Displays all event states on the graph.
- Error. Displays error event states on the graph.
- Non-Error. Displays non-error event states on the graph.
Scale Time frame intervals. You can choose one of the following options:
- Hour. Displays the average processing time of events at hourly intervals as point on the graph.
- Day. Displays the average processing time of events at daily intervals as point on the graph.
If you select a time frame filter longer than 7 days, you can only view events on a day scale.
Seconds Average number of seconds from when B2B Data Exchange generated the events until the events
finished processing during the selected time frame.
Appears on the Y-axis of the panel.
Time Distribution Date or time intervals during which B2B Data Exchange generated events.
Appears on the X-axis of the panel.
Average Line Average processing time for the entire time frame.
Average Average processing time for events that B2B Data Exchange generated each day or hour and the
Processing Time total number of events for the selected time frame. You can click the link to display the events in
the Event List page.
The following image illustrates the Error Events by Account panel on the dashboard:
The following table describes the Error Events by Account panel elements:
Element Description
Top 10 / Top 20 Number of accounts for which to display the number of error events or unresolved error events
for the selected time frame.
All Errors Displays all events that reached an error state for the accounts during the selected time frame.
Account Name Names of the accounts with the highest number of error events or unresolved error events for the
selected time frame.
Appears on the Y-axis of the panel.
Events Number of error events or unresolved error events for the accounts during the selected time
frame.
Appears on the X-axis of the panel.
Number of Events Total number of error events or unresolved error events for the accounts during the selected time
frame.
The following image illustrates the Error Events by Event Status panel on the dashboard:
The following table describes the Error Events by Event Status panel elements:
Element Description
Top 10 / Top 20 Number of event statuses for which to display the number of error events or unresolved error
events for the selected time frame.
All Errors Displays all events that reached an error state for the event statuses during the selected time
frame.
Event Status Names of the event statuses with the highest number of error events or unresolved error events
for the selected time frame.
Appears on the Y-axis of the panel.
Events Number of error events or unresolved error events for the event statuses during the selected time
frame.
Appears on the X-axis of the panel.
Number of Events Total number of error events or unresolved error events for the event statuses during the selected
time frame.
The following image illustrates the Error Events by Event Type panel on the dashboard:
The following table describes the Error Events by Event Type panel elements:
Element Description
Top 10 / Top 20 Number of event types for which to display the number of error events or unresolved error events
for the selected time frame.
All Errors Displays all events that reached an error state for the event types during the selected time frame.
Event Type Names of the event types with the highest number of error events or unresolved error events for
the selected time frame.
Appears on the Y-axis of the panel.
Events Number of error events or unresolved error events for the event types during the selected time
frame.
Appears on the X-axis of the panel.
Number of Events Total number of error events or unresolved error events for the event types during the selected
time frame.
The following image illustrates the Error Events by Partner panel on the dashboard:
The following table describes the Error Events by Partner panel elements:
Element Description
Top 10 / Top 20 Number of partners for which to display the number of error events or unresolved error events for
the selected time frame.
All Errors Displays all events that reached an error state for the accounts during the selected time frame.
Partner Name Names of the partners with the highest number of error events or unresolved error events for the
selected time frame.
Appears on the Y-axis of the panel.
Events Number of error events or unresolved error events for the partners during the selected time
frame.
Appears on the X-axis of the panel.
Number of Events Total number of error events or unresolved error events for the partners during the selected time
frame.
The following image illustrates the Error Events Distribution panel on the dashboard:
The following table describes the Error Events Distribution panel elements:
Element Description
Scale Time frame intervals. You can choose one of the following options:
- Hour. Displays the number of error events at hourly intervals as point on the graph.
- Day. Displays the number of error events at daily intervals as point on the graph.
If you select a time frame filter longer than 7 days, you can only view error event distribution on
a day scale.
Number of Events Number of error events that B2B Data Exchange generated during the selected time frame.
Appears on the Y-axis of the panel.
Time Distribution Date or time intervals during which B2B Data Exchange generated error events.
Appears on the X-axis of the panel.
Average Line Average number of error events that B2B Data Exchange generated each day or hour and the
total number of events for the selected time frame.
Daily/Hourly Overall error event average and the total number of events for the selected time frame. You can
Average click the link to display the error events in the Event List page.
The following image illustrates the Error Rate panel on the dashboard:
Element Description
Green Zone Low percentage of error events for the selected time frame.
Yellow Zone Medium percentage of error for during the selected time frame.
Red Zone High percentage of error events for the selected time frame.
Dial Indicator Visual indication of the error events percentage for the selected time frame.
Error Rate Actual percentage and number of error events and the total number of events for the selected time
frame. You can click the link to display the error events in the Event List page.
The following image illustrates the Events by Account panel on the dashboard:
Element Description
Top 10 / Top 20 Number of accounts for which to display the number of events for the selected time frame.
Account Name Names of the accounts with the highest number of events for the selected time frame.
Appears on the Y-axis of the panel.
Events Number of events for the accounts during the selected time frame.
Appears on the X-axis of the panel.
Number of Events Total number of events for the accounts during the selected time frame.
The following image illustrates the Events by Event Status panel on the dashboard:
The following table describes the Events by Event Status panel elements:
Element Description
Top 10 / Top 20 Number of event status for which to display the number of events for the selected time frame.
Event Status Event statuses with the highest number of events for the selected time frame.
Appears on the Y-axis of the panel.
Events Number of events for the event status during the selected time frame.
Appears on the X-axis of the panel.
Number of Events Total number of events for the event statuses during the selected time frame.
The following image illustrates the Events by Event Type panel on the dashboard:
The following table describes the Events by Event Type panel elements:
Element Description
Top 10 / Top 20 Number of event types for which to display the number of events for the selected time frame.
Event Type Event types with the highest number of events for the selected time frame.
Appears on the Y-axis of the panel.
Events Number of events for the event type during the selected time frame.
Appears on the X-axis of the panel.
Number of Events Total number of events for the event types during the selected time frame.
The following image illustrates the Events by Partner panel on the dashboard:
Element Description
Top 10 / Top 20 Number of partners for which to display the number of events for the selected time frame.
Partner Name Names of the partners with the highest number of events for the selected time frame.
Appears on the Y-axis of the panel.
Events Number of events for the partners during the selected time frame.
Appears on the X-axis of the panel.
Number of Events Total number of events for the partners during the selected time frame.
The panel displays all event types and statuses that reached a final state. You can click any point on the
graph to display the events in the Event List page.
Element Description
Scale Time frame intervals. You can choose one of the following options:
- Hour. Displays the number of events at hourly intervals as point on the graph.
- Day. Displays the number of events at daily intervals as point on the graph.
If you select a time frame filter longer than 7 days, you can only view event distribution on a day
scale.
Number of Events Number of events that B2B Data Exchange generated during the selected time frame.
Appears on the Y-axis of the panel.
Time Distribution Date or time intervals during which B2B Data Exchange generated events.
Appears on the X-axis of the panel.
Average Line Average number of events that B2B Data Exchange generated each day or hour and the total
number of events for the selected time frame.
Daily/Hourly Overall event average and the total number of events for the selected time frame. You can click
Average the link to display the events in the Event List page.
By default, the SLA Violations panel appears on the SLA tab of the Dashboard. You can apply global
Dashboard filters to the panel. The panel displays violations for events that reached a final state.
You can view violations for events even if you do not have viewing permissions for the related partners.
However, you cannot view the events for those partners in the Event List page when you click the violation in
the list.
Related Topics:
• “Viewing Service Level Agreement Violations” on page 181
The following image illustrates the Violations by SLA Rule chart on the dashboard:
The Violations by SLA Rule chart in the dashboard collects data from the operational data store.
The area contains a pie chart and a legend that show a breakdown of violations for the top 10 rules. You can
click any segment in the diagram to filter the violations in the Violations list. You can hover over any segment
to view the number of violations for that rule.
The following image illustrates the Violations by KPI chart in the dashboard:
The Violations by KPI chart in the dashboard collects data from the operational data store.
The area contains a pie chart and a legend that show a breakdown of violations for the top 10 indicators. You
can click any segment in the diagram to filter the violations in the Violations list. You can hover over any
segment to view the number of violations for that indicator.
Violations List
The Violations list displays detailed information about the first 50 violations according to the segment that
you select from the diagrams.
By default, the Violations list displays violations sorted by the date and time that the violation was reported.
You can click any column header to sort the visible violations in the list and hover over a violation to display
the rule details.
The following table describes the Violations list columns in the dashboard:
Column Description
KPI Type of information that the rule uses, such as the number of events or the error rate percentage.
Value Actual value for the violation. For example, if you define a rule that event processing must not exceed
30 seconds and the actual processing time is 45 seconds, the Value column shows the total
processing time as 45 seconds and the difference from the maximum processing time as 15 seconds.
For SLA rules that you view at the end of the calculation level period, the column shows the total
value for the violation. For example, if you define a rule that the number of errors in a day must not
exceed 50 errors and the total number of errors for the day is 65, the Value column shows the total
number of errors for all events that occurred during the time frame.
Last Modified Date and time that the violation was modified. The value of this property reflects the latest reported
violation for that rule or KPI for the calculation level period.
The Violations list in the dashboard collects data from the operational data store.
Tasks Panel
The Tasks panel in the Dashboard displays the number of pending operator action requests with a link to the
Authorization page. The panel displays a quick overview in a list of daily tasks.
Element Description
Operator actions Link to the Authorization page that displays the list of pending operator actions. This link
pending approval. appears only if you have authorization privileges.
The following table describes the CSV elements for the events or unresolved events panels:
Element Description
<object>_ID Identifier for the related object in B2B Data Exchange. You can view the following objects:
- Partner
- Account
- Event Type
- Event Status
<object>_NAME Name of the related object. You can view the following objects:
- Partner
- Account
- Event Type
- Event Status
SUM_COUNT Number of events that B2B Data Exchange generated for each object during the selected time
frame.
The following table describes the CSV elements for the events or error events distribution panels:
Element Description
ROW_NR Numeric identifier for the time interval during which B2B Data Exchange processed the events.
DAY / TIMESLICE Start date and time of the time intervals during which B2B Data Exchange processed events. The
DAY column appears for panels that you view in a day scale. The TIMESLICE column appears for
panels that you view in an hour scale.
TOTAL_COUNT Total number of events that B2B Data Exchange processed during each time interval.
The following table describes the CSV elements for the average processing time panels:
Element Description
ROW_NR Numeric identifier for the time interval during which B2B Data Exchange processed the events.
DAY / TIMESLICE Start date and time of the time intervals during which B2B Data Exchange processed events. The
DAY column appears for panels that you view in a day scale. The TIMESLICE column appears for
panels that you view in an hour scale.
TOTAL_COUNT Total number of events that B2B Data Exchange processed during the each time interval.
TOTAL_TIME Overall processing time for all of the events that B2B Data Exchange processed during each time
interval.
You can personalize your view of the Dashboard and add or remove panels and tabs as needed. If you require
more screen space to view the Dashboard, you can collapse the Navigator.
You create rules to manage and track compliance with service level agreement requirements. The SLA
violation detector searches the operational data store and reports violations based on key performance
indicators that you select when you define the rule. Key performance indicators (KPIs) provide measurable
information about events, such as average processing time or number of events.
You can use SLA tracking and management if the B2B Data Exchange administrator installed the Dashboard
and Reports component.
You can define a rule for all partners and accounts or for a specific partner and account. If you define a rule
for a specific partner and account, the partner and account are excluded from global rules that report the
same violation type.
177
If you modify a rule, the SLA violation detector reports violations only the next time it runs. If the SLA
violation detector reported violations before you modified the rule, you can view violations for the previous
rule and for the modified rule. If you delete a rule, you can still view previously detected violations.
The Create SLA Rule page contains the General tab and the Rule tab.
General Tab
The following table describes the properties in the General tab:
Property Description
Show in Portal Select whether to hide or display the SLA rule in the Partners Portal for the selected partner. If
you select to display SLA rules, the three SLA rules with the greatest number of relevant events
are displayed in the Partners Portal.
Partner and Determines whether to apply the rule to all partners and accounts or to a specific partner and
Account account.
You can choose from the following options:
- All partners and accounts. Reports violations for all partners and accounts. The violations
appear separately for each partner and account.
- Selected partner and account. Reports violations for a single partner an account. You must
select a partner before you select an account.
Rule Tab
The following table describes the properties in the Rule tab:
Property Description
Event type Type of the event for which to report violations. You can choose to report violations for all event types
or for a specific event type. The event types appear according to the event types that you define on
the Event Types page of the Operation Console.
KPI Type of information about the event that you want to report. You can choose from the following
default key performance indicators:
- Number of events
- Error rate (percent)
- Number of errors
- Average processing time (seconds)
- Event processing time (seconds)
If the B2B Data Exchange developer created custom key performance indicators from event attributes,
the custom indicators appear below the default key performance indicators.
Calculation Scope of the violation to report. You can choose from the following options:
level - Per single event. Reports violations as they occur in individual events. The SLA violation detector
reports violations at the end of the next operational data store event load process according to the
schedule that the B2B Data Exchange administrator defines.
- Per day. Reports violations that occur during a single day. The B2B Data Exchange administrator
sets the start of the daily calculation level period in a system property.
- Per week. Reports violations that occur during a week. The B2B Data Exchange administrator sets
the first day of the week in a system property.
- Per month. Reports violations that occur during a calendar month.
Function Type of calculation to perform on custom key performance indicators. You can choose from the
following options:
- Sum
- Count
- Average
- Max
- Min
Not available for default key performance indicators. Not available if you define a rule for a single
event.
Condition Mathematical operator to apply to the key performance indicator. You can choose from the following
options:
- Is less than. Reports violations in which the actual value is less than the required value.
- Is greater than. Reports violations in which the actual value is greater than the required value.
Value Numeric value in digits or percent according to the selected key performance indicator. For example,
to report violations for the number of events, enter the number of events.
To report violations for error rate, enter the percentage of errors relative to the total errors. To report
violations for event processing time or average processing time, enter a value greater than zero in
seconds.
The following examples show rules that you can define according to the requirements.
The following table describes the rule properties to define on the Rule tab of the Create SLA Rule page:
Property Value
Value 1000
The following table describes the rule properties to define on the Rule tab of the Create SLA Rule page:
Property Value
Value 25
The operational data store event loader collects aggregated event information from the run-time B2B Data
Exchange repository and loads the information to the operational data store. At the end of the event load
process, the SLA violation detector searches the aggregated event information for violations based on the
SLA rules that you defined.
The SLA violation detector reports violations for events that reached a final state. Violations for events that
processed during multiple time frames appear only in the time frame on which the event processing started.
For example, if the SLA violation detector finds a violation for an event that started processing on Sunday and
reached a final state on Monday, you will see the violation when you select violations for Sunday but not for
Monday.
The SLA violation detector reports most violation types at the end of the time frame. For example, if you
define an SLA rule in which the error rate for a single day does not exceed 20%, the SLA violation detector
searches the events for the violation only at the end of the day.
The SLA violation detector reports violations immediately when the value of the following default key
performance indicators is greater than the value that you define in the rule:
• Number of events
• Number of errors
• Event processing time
The SLA violation detector reports violations for custom key performance indicators immediately when you
define the following conditions in the rule:
• The key performance indicator count is greater than the rule value
• The maximum key performance indicator value is greater than the rule value
• The minimum key performance indicator value is less than the rule value
• The calculation level period for the rule is Per Single Event
For example, if you define a rule in which each purchase order that a partner sends must have a value of at
least 5,000 dollars, the SLA violation detector reports the violation as soon as it finds a purchase order with a
lower value and the event reached a final state.
Make sure that the dashboard is installed and that the operational data store event loader is running.
The panel displays violations according to the defined SLA rule or the KPI for the SLA rule. By default, the
panel appears on the SLA tab of the Dashboard.
Glossary
account
A sub-entity of a partner. In a customer organization, an account can represent a unit such as a department
or subsidiary. For an internal system, an account can be a unit such as a customer ID or a vendor code.
application
A set of related workflows. If multiple workflows are required to complete the processing of a document, you
can group the workflows into one application.
batch workflow
A PowerCenter workflow that runs once and stops after completion. The workflow reads from a file, a
database, or another source and writes to a target. You can use file-reading PowerCenter batch workflows to
process documents from B2B Data Exchange. You can use the other batch workflows to generate documents
for B2B Data Exchange, for example, outbound reports.
child event
An event within the hierarchy of another event that acts as a parent event. The child event is a subsidiary of
the parent event.
A custom mapping uses a PowerCenter workflow, a Data Engineering Integration mapping, or an Informatica
Cloud task to process data. Workflows and tasks can perform complex transformations on the data.
183
A custom mapping that uses a PowerCenter workflow or a Data Engineering Integration mapping can include
parameters.
document
An instance of data to be processed. A document is the content of a file received by B2B Data Exchange and
passed to the flow engine for transformation.
document store
File directory where B2B Data Exchange stores all documents associated with a document reference. The
document store directory must be accessible to the B2B Data Exchange server, the Apache Tomcat server,
and the PowerCenter Integration Service with the same file path.
endpoint
The point of entry and exit of documents in B2B Data Exchange. The endpoint definition in the Data Exchange
configuration file specifies how and where B2B Data Exchange receives documents from and sends
documents to partners.
event
An occurrence of a document at each stage of processing. The B2B Data Exchange server generates the
event and updates the event status while it processes the document.
event monitor
A view of a set of events filtered by rules that specify the type of events to be included in the view, actions to
be done to the events, and notifications to be sent about the events. You can set the frequency in which the
view is updated. The event monitor can be used to track document processing problems and to specify
actions required.
flow engine
The B2B Data Exchange component that executes the transformation logic to process a document.
PowerCenter is the main flow engine used to process Data Exchange documents.
Operation Console
Web interface to manage partners, customize and monitor document processing, and administer user access
in B2B Data Exchange. Use a web browser to access the Operation Console.
parent event
An event at the top level of a hierarchy of events. The parent event status changes after all child events
change status.
partner
An external or internal entity that sends documents for processing or receives documents after processing in
B2B Data Exchange. A partner can be an organization such as a vendor or customer or an internal system
such as an accounting system or an ERP system.
profile
A profile associates a workflow with a partner or account and defines the properties that customize a
workflow to process documents for a specific partner or account.
real-time workflow
A PowerCenter real-time workflow that runs continuously and reads input from the JMS queue. You can use
these workflows to process documents from B2B Data Exchange.
reconciliation
Reconciliation is the process of correlating an event with another event. For example, you send a document
file to a partner containing transactions such as payments or orders that require acknowledgement. When
you send the file to the partner, you initiate a reconciliation. When you receive the acknowledgement from the
partner, you complete the reconciliation. The Data Exchange Server uses a correlation ID to identify each
transaction and to reconcile the event associated with sending the file with the event associated with
receiving the file.
root event
An event that does not have a parent event. A root event can be a parent event. See also event on page 184.
workflow
The B2B Data Exchange object that represents the transformation logic used to process a document. The
workflow can be a Data Integration workflow or a PowerCenter workflow.
B E
B2B Data Exchange endpoint
definition 10 configuration variables 107
basic search creating 108–111, 117
objects in view 18 deleting 113
editing 113
errors 117
C File Receive 89
File Send 91
charts Informatica Managed File Transfer 93, 96, 98, 103
on-boarding checklist 55 JMS Receive 91
Cloud Data Integration mapping JMS Send 92
formatting flat file options 115 MFT hosted receive endpoint 93
input file parameter 115 MFT hosted send endpoint 96
integration with B2B Data Exchange 114 MFT remote receive endpoint 98
MFT remote send endpoint 103
types 86
D endpoint integration
Informatica Cloud workflow 114
Dashboard and reports Informatica Intelligent Cloud Services mapping 114
managing 176 mass ingestion task 116
overview 157 endpoints
delay rules searching 112
delayed event processing 37
186
event MFT Connection (continued)
audit 146 SMTP properties 79
reprocessing 140 MFT Web User
resending 142 description 59
event monitor properties 60
creation 125 monitoring
definition 125 on-boarding checklists 53
event resubmission
definition 140
events
actions 120
O
advanced search properties 121 on-boarding checklist
archived 124 charts 55
basic search properties 121 monitor 55
delayed processing 36 on-boarding checklists
Informatica Managed File Transfer 124 monitoring 53
managing 120 Operation Console
message processing 123 searching 16
overview 119 sorting objects 16
searching for 121, 122
types and statuses 123
events page
how to access 120
P
how to search 121, 122 Partner
exception handling Creating 21
advanced 151 partners
displaying issue details 155 definition 20
deleting 24
editing 24
G searching 31
prerequisites
glossary Informatica Intelligent Cloud Services mapping 114
of terms 183 mass ingestion task 116
profile
creating 32
I profiles
creating 31
Informatica Cloud workflow 114 definition 20
Informatica Managed File Transfer rules and guidelines 31
jobs 124 progress
MFT Connection 66, 67, 69, 72, 75–80 on-boarding checklist 55
MFT Web User 60
MFT Web Users 59
input files
parameterizing 115
R
reconciliation monitor
creation 132
M definition 131
release rules
mass ingestion task delayed event processing 38
integration with B2B Data Exchange 116 resending
message processing event 142
event types and statuses 123
MFT Connection
description 66
FTP properties 67, 69
S
FTPS properties 72 search
HTTP properties 75 advanced 18
HTTPS properties 76 basic 18
Mailbox properties 77 SLA violations
MQ properties 78 by KPI 173
SFTP, SCP, or SSH properties 80 by SLA rule 172
Index 187
SLA violations (continued)
list 173 T
SLA Violations timing rules
Dashboard panel 171 delayed event processing 37
188 Index