0% found this document useful (0 votes)
5 views

Encryption and Decryption

The document outlines the processes of encryption and decryption between systems using public and private keys, as well as the management of keys and security in CPI. It details the differences between headers and properties, variables and data stores, and the functionalities of Request-Reply versus Content Enricher steps. Additionally, it explains how to upload certificates in SAP CPI and provides information on HTTP receiver authentication methods.

Uploaded by

sapcpibuddy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views

Encryption and Decryption

The document outlines the processes of encryption and decryption between systems using public and private keys, as well as the management of keys and security in CPI. It details the differences between headers and properties, variables and data stores, and the functionalities of Request-Reply versus Content Enricher steps. Additionally, it explains how to upload certificates in SAP CPI and provides information on HTTP receiver authentication methods.

Uploaded by

sapcpibuddy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 9

Encryption and Decryption:

Source -> CPI ( here we are sharing the public key of CPI with Source system so that Source system
will encrypt the data and CPI will decrypt the data with own private key

CPI -> Reciever system(here Receiver system will be sharing public key with CPI so that CPI will
encrypt the data and Reciever system will decrypt the data with their own private key)

Outbound Flow :
From CPI to Receiver system ..Receiver system will generate two keys public and private keys and
Public key we need to provide it to CPI developer so that he will encrypt before sending to Receiver
system. once the Encrypted has reached the Receiver system then using their own private key they will
decrypt the content
Which ever you have generated in Monitor ->Manage security->PGP Keys -> you might have uploaded
the public key and that name has to provided in Encryption Key User ID

Signing: Select including option it will ask for private key We need to generate private key and public
key has to be given to recipient
Which ever you have generated in Monitor ->Manage security->PGP Keys -> you might have uploaded
the public key and that name has to provided in Encryption Key User ID

Signing: Select including option it will ask for private key We need to generate private key and public
key has to be given to recipient

----------------------------------------------------------------------------------------------------------------------------------

Difference Header vs Property difference:

If the information needs to be transferred to the receiver system, then ‘Header’ should be used in
Content Modifier. If the information is internal to Iflow, then ‘Property’ should be used. The property
lasts for the entire duration of an exchange but it is not transferred to a receiver.

Suppose I have two integration flows ( IF1,IF2), where IF2 is connected to IF1 via process direct .Now
properties in IF1 cannot be accessed in IF2 because the scope of property is with the iflow (IF1), but
where as headers created in the IF1 can be accessed in IF2 because it as global scope.
Difference between variable vs Data store :

If you store values in headers or properties in your iflow, those values will be gone when the iflow
finishes. If you need to store values longer than that, you can store them in a variable using the Write
Variables step. In other words, they're a way to persist data.

A global variable can be accessed by any iflow, but a local variable can only be accessed by the iflow that
wrote it.

You can see all the variables, you've stored, in the Operations view => Manage Stores => Variables.

Variables are similar to Data Stores, really. But variables store scalar values (i.e. one number, one
timestamp etc.) whereas Data Stores contain complete payloads (e.g. an XML or JSON document).

Please note that while there's a Write Variables step, there's no Read Variables step. To fetch the value
of a variable into a property or header, you use a Content Modifer with the type set to either Local
Variable or Global Variable.
Difference between Request Reply vs Content enricher :

Both steps make a synchronous call to an external system. Where they differ, is in how the response is
handled.

In the case of Request-Reply, the response from the external system replaces the current payload. This
means that if you need both the old payload and the response from the external system, you need to
store the old payload in e.g. an exchange property before making the external call.

In the case of Content Enricher, the response from the external system is merged into the current
payload, as per the step configuration. An example of this could be a lookup of e.g. customer details.
The returned information is added to a customer element in the current payload, thereby enriching it.
Difference between combine vs enrich in Content Enricher ?/Aggregation algorithms in content
enricher?

Now, we select the aggregation algorithm for the content enricher. There are two options for
aggregation algorithm:

1. Combine: On using this option, the Lookup Message is appended to the Original message.
2. Enrich: On using this option, the Lookup Message is merged with the Original message using a
common field.

How to upload certificates in sap cpi? Or where do you upload certificates in sap cpi?
Monitor -> Manage security -> Keystores -> Add -> Certificates(here upload certificates )

Source xsd ------- Message Mapping --------------- target xsd

To Simulate you need source xml

Display queue

Http Reciever - Authentication

 Oauth Credentials
 Basic
 Client certificate

Header Details :

Request Headers

You might also like