- Introduction - Babelway concept
- Message definitions
- Transformations list
- Creation of a transformation
- Transformation detail
- Drag and Drop Transformation
- Xslt Transformation
- No Transformation
- Transformations list
- Lookup tables
- Test cases
- Extra processings
- Change Log
- Reuse and save time
- B2B Integration Project Management
- DNS load-balancing
- Message size limits
- Security Management
- External References
- Rest API
- Verify the chain yourself
- Common Integrations
- How to Integrate with 3M?
- How to Integrate with Ace Hardware?
- How to Integrate with Amazon?
- How to Integrate with Belk?
- How to Integrate with Canadian Freightways?
- How to Integrate with Celadon Trucking?
- How to Integrate with CTSI?
- How to Integrate with Dayton Freight?
- How to Integrate with DSV?
- How to Integrate with Expeditors?
- How to Integrate with J.B. Hunt?
- How to Integrate with Knight Transportation?
- How to Integrate with MercuryGate?
- How to Integrate with Oak Harbor?
- How to Integrate with Office Depot?
- How to Integrate with ODW Logistics?
- How to Integrate with PAM Transport?
- How to Integrate with Pitt Ohio?
- How to Integrate with Rite Aid?
- How to Integrate with Riverside Transport?
- How to Integrate with Rockfarm?
- How to Integrate with Saks?
- How to Integrate with Smith Transport?
- How to Integrate with Southeastern Freight Lines?
- How to Integrate with Swift Transportation?
- How to Integrate with Tax-Air Freight?
- How to Integrate with Traffic Tech?
- How to Integrate with Transplace?
- How to Integrate with Trax Tech?
- How to Integrate with USA Truck?
- How to Integrate with US Xpress?
- How to Integrate with Walmart?
- How to Integrate with Wayfair?
- How to Integrate with Würth?
- How to Integrate with XPO?
- How to Integrate with 3M?
- B2B Integration Project Management
- Babelway Glossary
A confirmation of receiving a message. See Support for 997 Acknowledgements.
This table allows you to add other email addresses, to which notifications will also be sent. See Notification detail.
AES (Advanced Encryption Standard) also known by its original name Rijndael. Is a specification for the encryption of electronic data established by the U.S. National Institute of Standards and Technology (NIST) in 2001.
Collecting (related items of content) so as to display or link to them. See gateway types.
Alert is a signal sent by the Babelway system to inform you that something abnormal has happened.
A free and open-source cross-platform web server, released under the terms of Apache License 2.0. Apache is developed and maintained by an open community of developers under the auspices of the Apache Software Foundation.
API (Application programming interface) in computer programming, an application programming interface is a set of subroutine definitions, protocols, and tools for building application software.
AS2 (Applicability Statement 2) is a specification about how to transport data securely and reliably over the Internet. Security is achieved by using digital certificates and encryption. gateway types.
File containing instructions and certificates for the installation. You should download it and send it to your AS2 partner. See gateway types.
AS2 Gateway In
A Gateway that receives messages using an AS2 connection. See gateway types.
AS2 ID (Applicability Statement 2 Identifier) of the server that sends incoming messages. (Provided by your partner) or the AS2 ID of the Babelway destination server. See gateway types.
AS2 URL (Applicability Statement 2 Uniform Resource Locator) address used by your partner to send messages to this gateway. It works for both http and https protocol. See gateway types.
ASCII (American Standard Code for Information Interchange) abbreviated from American Standard Code for Information Interchange, is a character encoding standard for electronic communication. ASCII codes represent text in computers, telecommunications equipment, and other devices. Most modern character-encoding schemes are based on ASCII, although they support many additional characters.
ASCX12 (Accredited Standards Committee X12) is a standards organization. Chartered by the American National Standards Institute (ANSI) in 1979, it develops and maintains the X12 Electronic data interchange (EDI) and Context Inspired Component Architecture (CICA) standards along with XML schemas which drive business processes globally. The membership of ASC X12 includes technologists and business process experts, encompassing health care, insurance, transportation, finance, government, supply chain and other industries.
ASN (Advance Ship Notice) is a notification of pending deliveries, similar to a packing list. It is usually sent in an electronic format and is a common EDI document. In the EDI X12 system, it is known as the EDI 856 document and the EDIFACT equivalent is the DESADV (Dispatch Advice) message.
The process or action of verifying the identity of a user or process.
B2B (Business to Business) is denoting trade conducted via the Internet between businesses.
The process of preparing or sending invoices.
A Boolean either true or false. See Understanding functions.
A collection of APIs used in cryptography. It includes APIs for both the Java and the C# programming languages. The APIs are supported by a registered Australian charitable organization: Legion of the Bouncy Castle Inc. Bouncy Castle is Australian in origin and therefore American restrictions on the export of cryptography from the United States do not apply to it.
Is a multi-paradigm programming language encompassing strong typing, imperative, declarative, functional, generic, object-oriented (class-based), and component-oriented programming disciplines.
A complete list of items (Channels, Gateways In/Out, Message In/Out, ... etc) used to create a complete channel on Babelway. See Using the Babelway catalogue.
CBC (Cipher Block Chaining) is a mode of operation for a block cipher (one in which a sequence of bits are encrypted as a single unit or block with a cipher key applied to the entire block). Cipher block chaining uses what is known as an initialization vector (IV) of a certain length.
Is a file extension for an SSL certificate file format used by Web servers to help verify the identity and security of the site in question. SSL certificates are provided by a third-party security certificate authority such as VeriSign, GlobalSign or Thawte.
In cryptography, a public key certificate, also known as a digital certificate or identity certificate, is an electronic document used to prove the ownership of a public key. The certificate includes information about the key, information about the identity of its owner (called the subject), and the digital signature of an entity that has verified the certificate's contents (called the issuer). If the signature is valid, and the software examining the certificate trusts the issuer, then it can use that key to communicate securely with the certificate's subject. See Certificates.
Certificate for verification
Certificate used for message verification. Provided by your partner. See Certificates.
This tabs shows you all the history of changes on this message definition, and allows you to revert to a past version. See Change Log.
Changing date time format
Changing dates/times from format to another. See Working with formulas - frequent scenarios.
A channel is the path that a message follows within Babelway between 2 external systems. The elements of the channel are (Gateway In, Message In, Transformation, Message Out, Gateway Out, Notification, Routing, Test cases). See Channels.
To ease reading and error detecting of the formulas
Link (things) together in a chain or series. See Metadata usage.
Full context of execution of the message, as it was at the start of the processing (after reception by the gateway IN). See Message Details.
Full context of execution of the message, as it was at the end of the processing. See Message Details.
To enclose the selected node in a new loop node. See Updating Message Definition Tree.
A string consisting of six or seven subexpressions (fields) that describe individual details of the schedule. These fields, separated by white space, can contain any of the allowed values with various combinations of the allowed characters for that field.
CRT is a file extension for a digital certificate file used with a web browser. CRT files are used to verify a secure website's authenticity, distributed by certificate authority (CA) companies such as GlobalSign, VeriSign and Thawte. CRT files allow a web browser to connect securely using the Secure Sockets Layer protocol.
CSV (Comma Separated Values) is a delimited text file that uses a comma to separate values. A CSV file stores tabular data in plain text. Each line of the file is a data record. See Message Definitions Types.
CXML (Commerce eXtensible Markup Language) is a protocol, created by Ariba in 1999, intended for communication of business documents between procurement applications, e-commerce hubs and suppliers. cXML is based on XML and provides formal XML schemas for standard business transactions, allowing programs to modify and validate documents without prior knowledge of their form. See Message Definitions Types.
Data privacy also called information privacy, is the aspect of information technology (IT) that deals with the ability an organization or individual has to determine what data in a computer system can be shared with third parties.
Date time a date is an instant, like '02/06/2017 13:25:17.645'.
Date time format a DateTimeFormat is a String that is used to represent the format of a DateTime. Besides being a String, it must comply to the same requirements as DateFormat.
Decryption the conversion of encrypted data into its original form.
Default value will be used in the message out for this field if no mapping is done for this field. See Update the message definition tree.
Define metadata defining your own metadata, and storing values into them can be done via the metadata section, on top of the target tree. See Using or changing metadata.
Delete formula to delete a formula. See Edit formula.
Delete subformula to delete a sub-formula, use the action at the right of the formula bar. See Sub-formulas.
Deloitte is a UK-incorporated multinational professional services network.
Deploy when you are setting up your channels, you're working in a sandbox that is separate from the production systems, so that you can make any changes or tests you want without any risk to the production system and your production flow of messages. See Deployment.
Deprecated is the discouragement of use of some terminology, feature, design, or practice, typically because it has been superseded or is no longer considered efficient or safe, without completely removing it or prohibiting its use.
DER the DER extension is used for binary DER encoded certificates. These files may also bear the CER or the CRT extension.
DES (Data Encryption Standard) is a block cipher, meaning acryptographic key and algorithm are applied to a block of data simultaneously rather than one bit at a time. To encrypt a plaintext message, DES groups it into 64-bit blocks.
DESADV (Despatch Advice) a message specifying details for goods despatched or ready for despatch under agreed conditions.
Description allows you to save some more documentation about this node.
DH (Diffie-Hellman) is an algorithm used to establish a shared secret between two parties. It is primarily used as a method of exchanging cryptography keys for use in symmetric encryption algorithms like AES.
DNS (Domain Name System) is a hierarchical decentralized naming system for computers, services, or other resources connected to the Internet or a private network.
Drag drop transformation properties
Drag drop transformation properties is an algorithm used to establish a shared secret between two parties. It is primarily used as a method of exchanging cryptography keys for use in symmetric encryption algorithms like AES. See Drag and Drop Transformation.
Easy function editor
Easy function editor can help you writing your formulas. See Understanding functions.
EC (Elliptic-curve) is an approach to public-key cryptography based on the algebraic structure of elliptic curves over finite fields. ECC requires smaller keys compared to non-ECC cryptography (based on plain Galois fields) to provide equivalent security.
ECDH (Elliptic-curve Diffie-Hellman) is an anonymous key agreement protocol that allows two parties, each having an elliptic-curve public-private key pair, to establish a shared secret over an insecure channel.
ECDHE (Elliptic Curve Diffie-Hellman) suites use elliptic curve diffie-hellman key exchange, where DHE suites use normal diffie-hellman. This exchange is signed with RSA, in the same way in both cases. The main advantage of ECDHE is that it is significantly faster than DHE.
ECDSA (Elliptic Curve Digital Signature Algorithm) in cryptography, it offers a variant of the Digital Signature Algorithm (DSA) which uses elliptic curve cryptography.
EDI (Electronic Data Interchange) is the computer-to-computer exchange of business documents in a standard electronic format between business partners.
EDIFACT( Electronic Data Interchange For Administration, Commerce and Transport) is a widely accepted international EDI standard used by many organisations. EDIFACT defines the syntax to structure data for over 200 business documents (like invoices, orders, despatch notes, etc. ) such that they can be exchanged unambiguously between 2 between partners. In practice, a single organisation would typically handle 2 to 8 business document types. See Message definition formats.
EERP (End to End ResPonse) is generated when a file reaches its ultimate destination. It is sent to the originator of the file to inform them that the file has been received.
Email this tab allows you to configure the content of notification emails, for every type of notification. See Notification detail.
Email Gateway In
Email Gateway In a Gateway to receive emails on Babelway servers. See Gateway types.
Encode to put a sequence of characters (letters, numbers, punctuation, and certain symbols) into a specialized format for efficient transmission.
Encrypt convert (information or data) into a code, especially to prevent unauthorized access.
Encryption the process of encoding a message or information in such a way that only authorized parties can access it and those who are not authorized cannot.
Encryption algorithm a mathematical procedure for performing encryption on data. Through the use of an algorithm, information is made into meaningless cipher text and requires the use of a key to transform the data back into its original form.
Environment an account environment contains a collection of one or more channels that are managed together. See Environment settings.
ERP (Enterprise resource planning) the integrated management of core business processes, often in real-time and mediated by software and technology. ERP is usually referred to as a category of business-management software - typically a suite of integrated applications-that an organization can use to collect, store, manage, and interpret data from these many business activities.
Excel files are used very similarly to CSV files. One row is designated the header file and the subsequent rows contain data related to each header column. The difference with Excel files to CSV is that they can have multiple pages within one file, so you can have differently defined headers and data. See Message definition formats.
Execution the process by which a computer or a virtual machine performs the instructions of a computer program. The instructions in the program trigger sequences of simple actions on the executing machine. Those actions produce effects according to the semantics of the instructions in the program.
Extra processings is an additional operation that must be applied on all messages. The extra processings can take place before of after each of the 5 main operations applied to messages in Babelway (gateway in, message in, transformation, message out and gateway out). Some examples are: extract a message from a zip file, sign a message, reject a message if it is a duplicate, ... See Extra processings.
Is a backup operational mode in which the functions of a system component (such as a processor, server, network, or database, for example) are assumed by secondary system components when the primary component becomes unavailable through either failure or scheduled down time, see DNS load-balancing.
You are notified when the processing of a message is failed, see Notifications.
The body of notification emails, for "Failure" notifications, see Notification detail.
The subject of notification emails, for "Failure" notifications, see Notification detail.
FAQ (Frequently Asked Questions) are listed questions and answers, all supposed to be commonly asked in some context, and pertaining to a particular topic
File available body
The body of notification emails,for "File available" notifications, see Notification detail.
File available subject
The subject of notification emails, for "File available" notifications, see Notification detail.
The file pattern is a regex used to filter files (ex: '.*\.csv' for all files ending with '.csv' or '(?!proc_).*\.csv' for all csv files that don't start with 'proc_'. If left empty, all files will be transferred.
When this value is filled, only the records with this precise value will be used. See Update the message definition tree.
Rows of text that convey pre-defined information. Typically, a flat file will begin with a line identifier, letting a system know what string of data is about to follow. A Flat File can contain multiple lines of data with each line containing different line identifiers. Each line can have many fields of data, separated by a special character. Many systems use Flat File formats to import and export data as it is very favorable to understand easily for a machine, see Message definition formats.
The formula that implements the function, see Edit formula.
By default, when you just make your mappings by dragging and dropping your source fields to the corresponding target fields, the values are associated without any transformation. See Edit formula.
FTP (File Transfer Protocol) is a standard network protocol used for the transfer of computer files between a client and server on a computer network. FTP is built on a client-server model architecture and uses separate control and data connections between the client and the server.
FTP Client Gateway In
A Gateway that fetches files from an external FTP server. See gateway types.
An FTP server is a computer which has a file transfer protocol (FTP) address and is dedicated to receiving an FTP connection.
FTP Server Gateway In
A Gateway that receives files on Babelway FTP server. See gateway types.
Indicate if the original X12 message is structurally valid or not optionally describe the errors found (data element too long, invalid control numbers etc) provide an acknowledgement code indicating if the message was accepted or not, see Support for 997 Acknowledgements.
Elements that describe the function, see Understanding functions.
Identifies the function, see User-defined functions.
A function is an operation that takes values as input (the parameters), and computes an output value (the result), see Understanding functions.
A gateway is a hardware device that acts as a "gate" between two networks. It may be a router, firewall, server, or other device that enables traffic to flow in and out of the network.
The gateway IN specifies the way incoming messages are communicated from the source external system to Babelway, see Gateways.
The gateway OUT specifies how the outgoing message should be communicated to the target external system, see Gateways.
GLN (Global Location Number) the Global Location Number (GLN) is part of the GS1 systems of standards. It is a simple tool used to identify a location and can identify locations uniquely where required. This identifier is compliant with norm ISO/IEC 6523. The GS1 Identification Key is used to identify physical locations or legal entities. The key comprises a GS1 Company Prefix, Location Reference, and Check Digit. Location identified with GLN could be a physical location such as a warehouse or a legal entity such as a company or customer or a function that takes place within a legal entity. It can also be used to identify something as specific as a particular shelf in a store. Being able to identify locations with a unique number is a key to many business processes. The GLN is used in electronic messaging between customers and suppliers, where location advice is important. GLN is also used within companies to identify specific locations both electronically in a database and physically where the GLN can be produced in a bar code or GS1 EPC tag.
When you have many nested sub-formulas, or user-functions, you can always have a global overview of your formula by using the "Copy-paste version", see Sub-formulas.
The Grids are used in the Babelway system in (Monitoring, Alerts, Lookup table, Certificates, .... etc), The grids are very powerful, and have many options that simplify the workflow steps done to achive your request.
Groups together all nodes that have the same value as the Grouping value, provided that they are also adjacent in the message sequence. See Update the message definition tree.
Groups together all nodes that have the same value as the Grouping value, See Update the message definition tree.
Group ending with
Processes the nodes in the supplied sequence in turn, closing the current group whenever one of the node matches the Grouping value. See Update the message definition tree.
Group starting with
Processes the nodes in the supplied sequence in turn, starting a new group whenever one of the node matches the Grouping value. See Update the message definition tree.
Is often the steps of verifying the connection, the speed, or the authorization of the computer trying to connect to it. An example of handshaking is when a modem connects to another Modem; the tones heard after the dialing is thehandshake and is how the computers greeting each other. See Security Management.
A network host is a computer or other device connected to a computer network. A network host may offer information resources, services, and applications to users or other nodes on the network. A network host is a network node that is assigned a network address, see DNS load-balancing.
HTTP (Hypertext Transfer Protocol) is an application protocol for distributed, collaborative, and hypermedia information systems. HTTP is the foundation of data communication for the World Wide Web. Hypertext is structured text that uses logical links (hyperlinks) between nodes containing text. HTTP is the protocol to exchange or transfer hypertext. gateway types.
POST is a request method supported by HTTP used by the World Wide Web. By design, the POST request method requests that a web server accepts the data enclosed in the body of the request message, most likely for storing it. It is often used when uploading a file or when submitting a completed web form, See Gateway types.
Http Gateway In
A Gateway that receives files on Babelway HTTP server, See gateway types.
HTTPS (Hypertext Transfer Protocol Secure) is an extension of the Hypertext Transfer Protocol (HTTP) for secure communication over a computer network, and is widely used on the Internet. In HTTPS, the communication protocol is encrypted using Transport Layer Security (TLS), or formerly, its predecessor, Secure Sockets Layer (SSL). The protocol is therefore also often referred to as HTTP over TLS, or HTTP over SSL. gateway types.
A node with a number of links that greatly exceeds the average. Emergence of hubs is a consequence of a scale-free property of networks
Ip address (Internet Protocol Address) is a numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication. An IP address serves two principal functions: host or network interface identification and location addressing, See Messages.
Iterate through mappings
Iterate through mappings it is possible to iterate through all mappings using the arrows at the top right of the target tree zone.
Java general-purpose computer-programming language that is concurrent, class-based, object-oriented, and specifically designed to have as few implementation dependencies as possible. It is intended to let application developers "write once, run anywhere" (WORA), meaning that compiled Java code can run on all platforms that support Java without the need for recompilation.
keystore a Java KeyStore (JKS) is a repository of security certificates - either authorization certificates or public key certificates - plus corresponding private keys, used for instance in SSL encryption. The keystore is the page where you can modify the keystore specific to your account. Each Babelway account environment has its own keystore and is able to add or remove certificates without affecting other users.
KPMG is a professional service company and one of the Big Four auditors, along with Deloitte, Ernst and Young (EY), and PricewaterhouseCoopers (PwC).
Label is the text used to show this node in the message definition tree. It can be changed freely, as it has no impact on the processing of the messages.
Lenght Min or Max length (in characters) for the value.
Library just indicates the provenance of this method
Load balancing refers to efficiently distributing incoming network traffic across a group of backend servers, also known as a server farm or server pool.In this manner, a load balancer performs the following functions: Distributes client requests or network load efficiently across multiple servers.
Local URL address
Local URL address used by your partner to send messages to the gateway. It works for both http and https protocol.
LookupTable parameter must refer to an existing LookupTable in your environment.
LookupTableColumn parameter must refer to a column of a specific LookupTable
Lookup tables are tables of values, that can be accessed by transformations
Loop can define the multiplicity of a node sequence.
Loop to loop
LLoop to loop loop mappings to loop.
Loop to value
Loop to value loop mappings to value fields
Mandatory when a field is marked as mandatory, it must have a non-empty value. From the xml point of view, it means that the element must be present, and may not be empty.
Mapping definition this file is the definition of the visual mapping. You normally edit it via the mapping tree editor.
Mapping loops loop mappings to loop or value fields
MD5 algorithm is a widely used hash function producing a 128-bit hash value. Although MD5 was initially designed to be used as a cryptographic hash function, it has been found to suffer from extensive vulnerabilities.
MDN (Message Delivery Notification) of a Message Level Response (MLR) is a proof from the receiver that the MLR was correctly submitted to its destination.
Message is a piece of informationen about data processing of an input file by Babelway system.
Message definition describe in Babelway the format (CSV, XML, EDIFACT, ... etc) and the structure (all the fields) of an exchanged file.
Message definitions define the structure of the message and the loops also for a node
Message Details is a screen that shows all the details about the processing of a message by Babelway system.
Message IN is used to describe the files received by Babelway from the source external system.
Message List is used to allow you to browse and search all messages processed by Babelway systems.
Message Out is used to describe the files that Babelway must send to the target external system.
Message storage duration
Message storage duration is how long the message wil be kept in the system of Babelway
Messaging engine groups the different components processing and storing messages. This leverages Babelway multi cloud architecture allowing to load balance operations on several infrastructures.
Metadata are data that are associated with the processing of the message, on top of the processed input and output files. For example, metadata can be the date and time when the message was received, the channel that processed the message, information about the sender of the message, ... etc.
The transformation only operates on the metadata of the incoming message, and can only update metadata of the outgoing message.
Metadata only for incoming message
Only the metadata of the incoming message will be used.
Metadata only for outgoing message
Only the metadata of the outgoing message will be updated.
MLR (Message Level Response ) a Message Level Response (MLR) is a business acknowledgment that tells the sender if the received message follows business rules related to the document type and business flow.
The monitoring section of the application contains all the tools and information that allow you to follow and manage the messages processed by the system, once the rules for how to handle the messages have been setup
Is a multirecord definition file used by the Self-Service MultiRecord wizard to generate the corresponding message definition and also build the corresponding serving xml resource file.
Multi nodes mapping
The multi-nodes mapping will work even if there are additional nodes in one of the 2 structures. These nodes will be ignored.
A tenantis a group of users who share a common access with specific privileges.
Name identifies the element in the xml representing the messages. Change only with care. Update the message definition tree.
EasyTrade (NemHandel in Danish) is a Danish e-invoicing infrastructure, developed by the National IT and Telecom Agency and launched in 2007. EasyTrade is based on open standards (including the Universal Business Language, Reliable Asynchronous Secure Profile (RASP), and UDDI), open source components, and digital certificates. It was launched as part of a Danish Government Globalisation initiative in 2005 under the auspices of Prime Minister Anders Fogh Rasmussen. gateway types.
Node a single xml element, This type will be used to represent a single xml node from your source document or from an additional xml source. Understanding functions.
NodeList a list of xml elements, This type will be used to represent a list of nodes in your source document. Understanding functions.
Nodes mapping you can initiate new mappings via many methods. Nodes mapping.
Normal transformation reads content and metadata of the incoming message, and its result will affect content and metadata of the outgoing message. Drag and Drop transformation properties.
Notification allows you to be notified by email when a message is processed by the channel, or falls in error. Notifications.
Notifications this section contains all you need to manage your notifications. Notifications.
No Transformation option is used when Babelway interface is used to transfer an unchanged message from one gateway to another. No Transformation.
Number a number can contain any numeric value, like 2 or 3.5. Understanding functions.
ODETTE (The Organization for Data Exchange by Tele Transmission (ODETTE) in Europe) is a group that represents the interests of the automotive industry in Europe. They are the equivalent of the Automotive Industry Action Group (AIAG) in North America. ODETTE has been responsible for developing communication standards such as OFTP and OFTP2.0. Gateway types.
OFTP (Odette File Transfer Protocol) a protocol created in 1986, used for EDI (Electronic Data Interchange) between two communications business partners. Its name comes from the Odette Organisation (the Organization for data exchange by teletransmission in Europe). Gateway types.
OFTP Client Gateway In
OFTP Client Gateway In a Gateway that fetches files from an external OFTP server. Gateway types.
OFTP Server Gateway In
OFTP Server Gateway In a Gateway that receives files on Babelway OFTP server. Gateway types.
Optimization the action of making the best or most effective use of a situation or resource. Introduction.
ORDSP (Purchase Order Acknowledgment) is an electronic version of a phone call or fax that tells the buyer who sent you a purchase order that you will be filling the purchase order as requested. The buyer then knows that you will be filling the order and shipping the goods as requested by the date requested. How to Integrate with Amazon?.
Pagination the process of dividing a document into discrete pages, either electronic pages or printed pages. Grids.
Parameters section shows all information about the parameters of the function. Understanding functions.
Parameter types in every function, the parameters and the return type are typed objects (a string, a number, ...). Understanding functions.
Partners are the entities that communicate via Babelway.
Partner IN is the entity from which the message comes, the sender of the message. Assigning partners to messages.
Partner OUT is the entity to which the message is adressed, the recipient of the message. Assigning partners to messages.
Partners the Partners are the entities that communicate via Babelway. Partners.
PCI-DSS (Payment Card Industry Data Security Standard) applies to companies of any size that accept credit card payments. If your company intends to accept card payment, and store, process and transmit cardholder data, you need to host your data securely with a PCI compliant hosting provider. Security Management.
PDF (Portable Document Format) is a file format developed in the 1990s to present documents, including text formatting and images, in a manner independent of application software, hardware, and operating systems. Based on the PostScript language, each PDF file encapsulates a complete description of a fixed-layout flat document, including the text, fonts, vector graphics, raster images and other information needed to display it. PDF was standardized as an open format, ISO 32000, in 2008, and does not require any royalties for its implementation. Message definition formats.
PEPPOL (Pan-European Public Procurement OnLine) Pan-European Public Procurement OnLine (PEPPOL) is an international project aimed at standardizing cross-border electronic public procurement within the European Union. Gateway types.
PGP (Pretty Good Privacy) is an encryption program that provides cryptographic privacy and authentication for data communication. PGP is used for signing, encrypting, and decrypting texts, e-mails, files, directories, and whole disk partitions and to increase the security of e-mail communications. Phil Zimmermann developed PGP in 1991. Extra processings on message definition IN.
PHP (Hypertext Preprocessor) a server-side scripting language designed for Web development, but also used as a general-purpose programming language. It was originally created by Rasmus Lerdorf in 1994, the PHP reference implementation is now produced by The PHP Group.PHP originally stood for Personal Home Page, but it now stands for the recursive acronym PHP: Hypertext Preprocessor. Code samples.
PKCS12 in cryptography, PKCS #12 defines an archive file format for storing many cryptography objects as a single file. It is commonly used to bundle a private key with its X.509 certificate or to bundle all the members of a chain of trust. A PKCS #12 file may be encrypted and signed. The internal storage containers, called ""SafeBags"", may also be encrypted and signed. A few SafeBags are predefined to store certificates, private keys and CRLs. Another SafeBag is provided to store any other data at individual implementer's choice. PKCS #12 is one of the family of standards called Public-Key Cryptography Standards (PKCS) published by RSA Laboratories. The filename extension for PKCS #12 files is "".p12"" or "".pfx"". Certificates.
PKCS7 in cryptography, PKCS stands for ""Public Key Cryptography Standards"". These are a group of public-key cryptography standards devised and published by RSA Security Inc, starting in the early 1990s. The company published the standards to promote the use of the cryptography techniques to which they had patents, such as the RSA algorithm, the Schnorr signature algorithm and several others. PKCS 7 Version 1.5, Cryptographic Message Syntax Standard used to sign and/or encrypt messages under a PKI. Used also for certificate dissemination (for instance as a response to a PKCS #10 message). Formed the basis for S/MIME, which is as of 2010 based on RFC 5652, an updated Cryptographic Message Syntax Standard (CMS). Often used for single sign-on. Certificate's Details.
PO (Purchase order) a commercial document and first official offer issued by a buyer to a seller, indicating types, quantities, and agreed prices for products or services. It is used to control the purchasing of products and services from external suppliers. How to Integrate with Belk?.
POLL/POLLING polling is the process of retrieving files from a remote server, FTP server for instance. Gateway detail.
Properties this screen allows you to configure all the options of the message definitions. Some of these options are common. Others differ depending on the message definition type. Message definition detail.
Protocol rules and conventions for communication between network devices. Gateway types.
Python interpreted high-level programming language for general-purpose programming. Created by Guido van Rossum and first released in 1991, Python has a design philosophy that emphasizes code readability, notably using significant whitespace. It provides constructs that enable clear programming on both small and large scales. Code samples.
RC4 (Rivest Cipher 4) is a stream cipher. While remarkable for its simplicity and speed in software, multiple vulnerabilities have been discovered in RC4, rendering it insecure. Security Management.
Recipients this tab allows you to determine who should receive the notification emails. Notification detail.
Redundancy is a condition created within a database or data storage technology in which the same piece of data is held in two separate places. This can mean two different fields within a single database, or two different spots in multiple software environments or platforms. DNS load-balancing.
Regex (Regular expression) a regular expression, regex or regexp (sometimes called a rational expression) is, in theoretical computer science and formal language theory, a sequence of characters that define a search pattern. Usually this pattern is then used by string searching algorithms for ""find"" or ""find and replace"" operations on strings, or for input validation. The concept arose in the 1950s when the American mathematician Stephen Cole Kleene formalized the description of a regular language. The concept came into common use with Unix text-processing utilities. Since the 1980s, different syntaxes for writing regular expressions exist, one being the POSIX standard and another, widely used, being the Perl syntax. Regular expressions are used in search engines, search and replace dialogs of word processors and text editors, in text processing utilities such as sed and AWK and in lexical analysis. Many programming languages provide regex capabilities, built-in or via libraries. Gateway types.
Regexp (Regular expression) that the value must match. Update the message definition tree.
Regular expression regex or regexp (sometimes called a rational expression) is, in theoretical computer science and formal language theory, a sequence of characters that define a search pattern. Usually this pattern is then used by string searching algorithms for ""find"" or ""find and replace"" operations on strings, or for input validation. The concept arose in the 1950s when the American mathematician Stephen Cole Kleene formalized the description of a regular language. The concept came into common use with Unix text-processing utilities. Since the 1980s, different syntaxes for writing regular expressions exist, one being the POSIX standard and another, widely used, being the Perl syntax. Regular expressions are used in search engines, search and replace dialogs of word processors and text editors, in text processing utilities such as sed and AWK and in lexical analysis. Many programming languages provide regex capabilities, built-in or via libraries. Gateway types.
Related items this tab contains quick links to many other elements related to this message definition. Message definition detail.
Release a software release life cycle is the sum of the stages of development and maturity for a piece of computer software: ranging from its initial development to its eventual release, and including updated versions of the released version to help improve software or fix software bugs still present in the software. Finding help.
Remittance advices a letter sent by a customer to a supplier to inform the supplier that their invoice has been paid. If the customer is paying by cheque, the remittance advice often accompanies the cheque. How to Integrate with Ace Hardware?.
Remove from loop
Remove from loop to remove the selected node from its parent loop. Update the message definition tree.
Replication mode lookup table entries are synchronized among all messaging engine servers. In a normal situation (when all servers are available and able to communicate), all entries are guaranteed to be correct, regardless where messages are processed. The 'Replication mode' parameter controls the synchronization during stress periods, like the network disconnection of one of the servers. The 'loose' mode is fault tolerant, this means that the messages processing will not be interrupted. However, there is very little chance of inaccuracy. When the reconnection occurs, the system performs consistency checks and creates an alert if an entry was modified independently by 2 messaging engine servers. The 'strict' mode guarantees the accuracy of the entries. This mode implies that message processing will fail if the entry update cannot be replicated immediately to all messaging engine servers. Use this for exact counters, like invoice number. This Default is 'loose'. Lookup table detail - General.
RESUBMIT MESSAGE enables to easily process a message again.
Resubmit multiple messages
Resubmit all allows to reprocess many messages in one operation.
Result section asks you for the type of the result of the function. User-defined functions.
Result description describes the value that is returned by the function, including its type. Understanding functions.
Rest API (Representational State Transfer) is a method of allowing communication between a web-based client and server that employs representational state transfer (REST) constraints. Rest API.
Reuse and save
Reuse and save to select an existing MessageDefinition or Gateway. Defining partners manually.
Root certificate in cryptography and computer security, a root certificate is a public key certificate that identifies a root certificate authority (CA). Root certificates are self-signed and form the basis of an X.509-based public key infrastructure (PKI). Either it has matched Authority Key Identifier with Subject Key Identifier, in some cases there is no Authority Key identifier, then Issuer string should match with Subject string (RFC5280). For instance, the PKIs supporting HTTPS for secure web browsing and electronic signature schemes depend on a set of root certificates. Trust new certificate.
RosettaNet is a non-profit consortium aimed at establishing standard processes for the sharing of business information (B2B). Message details.
Routing used to choose which channel must process a message when different channels share the same gateway in. or whcih message deiniation should process the message when different channels sharing the same message definiation. Routing.
Routing condition (regular expression)
Routing condition (regular expression) that the selected metadata must match to satisfy the routing rule. and also we can use xpath in the routing condition by xpath: in the beginning of the routing rule. Routing detail.
Routing metadata tells which metadata will be used for testing the condition. For example, the metadata com_babelway_messaging_context_mail_subject when been selected. This means that the rule will be satisfied if the subject of the email used to receive the message matches the following expression in the Condition (regular expression). If you want that your condition applies on the whole message, select com_babelway_messaging_context_message. Routing detail.
Routing priority tells in which order the rules will be evaluated. The system first evaluates rules that have the lowest priority. The evaluation of the rules is stopped as soon as the condition of a rule is satisfied, and the system chooses the next element notified in this rule. Routing detail.
Routing rules is created when 2 or more channels share the same incoming sequence. The routing rule defines the conditions to route a message towards a channel or the other. Routing detail.
RSA (Rivest-Shamir-Adleman) is one of the first public-key cryptosystems and is widely used for secure data transmission. In such a cryptosystem, the encryption key is public and it is different from the decryption key which is kept secret (private). In RSA, this asymmetry is based on the practical difficulty of the factorization of the product of two large prime numbers, the "factoring problem". The acronym RSA is made of the initial letters of the surnames of Ron Rivest, Adi Shamir, and Leonard Adleman, who first publicly described the algorithm in 1978. Gateway types.
S/MIME (Secure/Multipurpose Internet Mail Extensions) is a standard for public key encryption and signing of MIME data. S/MIME is on an IETF standards track and defined in a number of documents, most importantly RFC 3369, 3370, 3850 and 3851. It was originally developed by RSA Data Security Inc. and the original specification used the IETF MIME specification with the de facto industry standard PKCS#7 secure message format. Change control to S/MIME has since been vested in the IETF and the specification is now layered on Cryptographic Message Syntax, an IETF specification that is identical in most respects with PKCS #7. S/MIME functionality is built into the majority of modern email software and interoperates between them. Extra Processing Message Definition In.
SAAS (Software As A Service) is a software licensing and delivery model in which software is licensed on a subscription basis and is centrally hosted. Introduction.
A sandbox is a testing environment that isolates untested code changes and outright experimentation from the production environment or repository. Deployment.
SAX (Simple API for XML) is an event-driven online algorithm for parsing XML documents, with an API developed by the XML-DEV mailing list. SAX provides a mechanism for reading data from an XML document that is an alternative to that provided by the Document Object Model (DOM). Where the DOM operates on the document as a whole, i.e. building the full AST of an XML document for convenience of the user, SAX parsers operate on each piece of the XML document sequentially, issuing parsing events while making single pass through the input stream. Code Samples.
SDBH (Standard Business Document Header) is the effective message sent to a PEPPOL Access Point. It's the UBL message wrapped in an envelop that identifies key data about the document SAX provides a mechanism for reading data from an XML document that is an alternative to that provided by the Document Object Model (DOM). Where the DOM operates on the document as a whole, i.e. building the full AST of an XML document for convenience of the user, SAX parsers operate on each piece of the XML document sequentially, issuing parsing events while making single pass through the input stream. Message Details.
In cryptography and computer security, a self-signed certificate is an identity certificate that is signed by the same entity whose identity it certifies. This term has nothing to do with the identity of the person or organization that actually performed the signing procedure. In technical terms a self-signed certificate is one signed with its own private key. Certificates.
The email address 'from' of all the notification emails. Message Details.
Serving XML is an open source, Apache 2.0 licensed, framework for flat/XML data transformations. Message Details.
SFID (Start File Identification) this is a request for permission to send a file. It contains information such as the origin and destination of the file, its name and physical size. Gateway Types.
SFTP (Secure File Transfer Protocol) is a secure version of File Transfer Protocol (FTP), which facilitates data access and data transfer over a Secure Shell (SSH) data stream. It is part of the SSH Protocol. This term is also known as SSH File Transfer Protocol. Gateway Types.
SFTP Client Gateway In
A Gateway that fetches files from an external SFTP server. Gateway Types.
A secure FTP server helps users with transferring files over secure file transfer protocols such as SSH File Transfer Protocol or FTP with SSL/TLS. The transfers can be achieved through server-to-server or client-to-server configurations. Gateway Types.
SHA (Secure Hash Algorithms) a family of cryptographic hash functions published by the National Institute of Standards and Technology (NIST) as a U.S. Federal Information Processing Standard (FIPS), including:SHA-0,SHA-1,SHA-2 and SHA-3. Gateway Types.
SHA 1 (Secure Hash Algorithm 1) is a cryptographic hash function which takes an input and produces a 160-bit (20-byte) hash value known as a message digest - typically rendered as a hexadecimal number, 40 digits long. It was designed by the United States National Security Agency, and is a U.S. Federal Information Processing Standard. Gateway Types.
SHA 256 (Secure Hash Algorithms 256) a family of two similar hash functions, with different block sizes, known as SHA-256 and SHA-512. They differ in the word size; SHA-256 uses 32-bit words where SHA-512 uses 64-bit words. Gateway Types.
To use the gateway or message format in more than channel, and any change will impact all channels sharing the message definition or the gateway. Gateway Creation.
Shared access key
The key used by Babelway system to identify the lookup table, When the lookup table is shared, It is sharing access key that is used to use this lookup table from any environment. Lookup Table List.
SLA (Service-Level Agreement) is a commitment between a service provider and a client. Particular aspects of the service - quality, availability, responsibilities - are agreed between the service provider and the service user. Message Details.
SMTP (Simple Mail Transfer Protocol) is an Internet standard for electronic mail (email) transmission. First defined by RFC 821 in 1982, it was last updated in 2008 with Extended SMTP additions by RFC 5321, which is the protocol in widespread use today. Message Details.
SOAP (Simple Object Access Protocol) is a messaging protocol specification for exchanging structured information in the implementation of web services in computer networks. Its purpose is to induce extensibility, neutrality and independence. It uses XML Information Set for its message format, and relies on application layer protocols, most often Hypertext Transfer Protocol (HTTP) or Simple Mail Transfer Protocol (SMTP), for message negotiation and transmission. Gateway Types.
SOC2 (Service Organization Control 2) is a report focuses on a business's non-financial reporting controls as they relate to security, availability, processing integrity, confidentiality, and privacy of a system, as opposed to SOC 1/SSAE 16 which is focused on the financial reporting controls. Security Management.
SSH (Secure Socket Shell) a network protocol that provides administrators with a secure way to access a remote computer. Gateway Types.
SSID (Start Session IDentification) a request for initiate a session. It contains information such user and password of the requester. Gateway Types.
SSL (Secure Sockets Layer) is the standard security technology for establishing an encrypted link between a web server and a browser. This link ensures that all data passed between the web server and browsers remain private and integral. Gateway Types.
It is the most basic type. It is just a sequence of characters, without any more constraint. Understanding Functions.
Sub-Formulas parts of formulas that you can name and reuse later. Sub Formulas.
You are notified when message processing is fully completed, and is successful. Notifications.
The body of notification emails,for "Success" notifications. Notification Detail.
The subject of notification emails, for "Success" notifications. Notification Detail.
Is a table that allows you to choose what Internal gateway In will receive in the notification amongst all the internal gateways. See Notification detail.
Target users is a table that allows you to choose who will receive the notification, see Notification detail.
Test case allows you to easily test channel operations to validate it before deployment. This is done by creating and running test cases and providing the input messages that will be processed by the channel in order to check the mapping, see Test cases.
Ticket is the alert when using Babelway REST API, The alert return all of the information about a specific alert by using it's key. Ticket.
Timestamp is a sequence of characters or encoded information identifying when a certain event occurred, usually giving date and time of day, sometimes accurate to a small fraction of a second.
TLS (Transport Layer Security) is cryptographic protocol that provide communications security over a computer network., see Security management.
TRADACOM is an early standard for EDI (Electronic Data Interchange) primarily used in the UK retail sector. It was introduced in 1982 as an implementation of the UN/GTDI syntax, one of the precursors of EDIFACT, and was maintained and extended by the UK Article Numbering Association (now called GS1 UK), see Message definition formats.
The Transformation tells Babelway how the incoming message should be translated to the outgoing message, see Transformations.
Transformation mode allows you to use special transformation modes. The available modes are :
Normal : transformation reads content and metadata of the incoming message, and its result will affect content and metadata of the outgoing message.
Metadata only for outgoing message : only the metadata of the outgoing message will be updated. The content of the outgoing message will be the same as the input. This mode can be used in special situations where the transformation must only generate some additional metadata.
Metadata only for incoming message : only the metadata of the incoming message will be used, not its content. This mode can be used in special situations where the transformation only operated on the metadata of the incoming message. A dummy message in will be used instead of the incoming content.
Metadata only : the transformation only operates on the metadata of the incoming message, and can only update metadata of the outgoing message. Content will not be updated by the transform.
The Tree describes the structure of the message, with all its fields. It is displayed in graphical form, see Message definition detail.
TSA (Timestamp Authority) is the process of securely keeping track of the creation and modification time of a document.
Type of element
Element type defines the type of the data in the field (String, Number, Date, ...). This field will also affect the other validations that will be available, see Updating message definition tree.
UBL (Universal Business Language) is a royalty-free library of standard XML business documents. It supports the digitizing of commercial and logistical processes for domestic and international supply chains such as orders and invoices. It can be thought of as a language that allows business applications to exchange information along their supply chains in the same common format, see Message definition formats.
UN/EDIFACT (United Nations/Electronic Data Interchange for Administration, Commerce and Transport) is the international EDI standard developed under the United Nations impulse. This standard is maintained and further developed by a UN body. EDIFACT has now been adopted by the International Organization for Standardization (ISO) as the ISO standard ISO 9735, see Message definition formats.
URI (Uniform Resource Identifier) is a string of characters designed for unambiguous identification of resources and extensibility via the URI scheme. Such identification enables interaction with representations of the resource over a network, typically the World Wide Web, using specific protocols. Schemes specifying a concrete syntax and associated protocols define each URI.
URL (Uniform Resource Locator) is a reference to a web resource that specifies its location on a computer network and a mechanism for retrieving it. A URL is a specific type of Uniform Resource Identifier (URI), although many people use the two terms interchangeably. URLs occur most commonly to reference web pages (http), but are also used for file transfer (ftp), email (mailto), database access (JDBC), and many other applications.
User-defined functions allows the user to define additional functions, to simplify your mappings., see User-defined functions.
Using metadata or Accessing metadata can be done in your formulas with the function metadata, see Using or changing metadata.
UTC/GMT (Greenwich Mean Time/Coordinated Universal Time) where Greenwich Mean Time (GMT) is often interchanged or confused with Coordinated Universal Time (UTC). But GMT is a time zone and UTC is a time standard.
Although GMT and UTC share the same current time in practice, there is a basic difference between the two:
GMT is a time zone officially used in some European and African countries. The time can be displayed using both the 24-hour format (0 - 24) or the 12-hour format (1 - 12 am/pm).
UTC is not a time zone, but a time standard that is the basis for civil time and time zones worldwide. This means that no country or territory officially uses UTC as a local time.
UUID (Universally Unique Identifier) is a 128-bit number used to identify information in computer systems, see Message details.
Validation of your formulas in order to check formula's syntax is correct (a valid xpath expression), see Edit formula.
VAN (Value-Added Network) is a hosted service offering that acts as an intermediary between business partners sharing standards based or proprietary data via shared business processes. The offered service is referred to as "value-added network services", see Gateway Types.
VAT (Value-Added Tax) is a type of tax that is assessed incrementally, based on the increase in value of a product or service at each stage of production or distribution.
VDA (Verband der Automobilindustrie) maintains a series of fixed format messages that describe business documents typically exchanged between automotive manufacturers and suppliers.
Working with numbers
Working with numbers allows you to make calculations, xpath (like any programming language) needs Numbers. If your values are Strings, they first have to be converted into Numbers, see Working with formulas - frequent scenarios.
Working with object metadata
Babelway transformation supports working with object metadata. This is very useful to add a PDF or images extracted using a Zip unwrapping extra processing in an XML as a Base64 string, see Working with formulas - frequent scenarios.
X.400 is a suite of ITU-T Recommendations that define standards for Data Communication Networks for Message Handling Systems (MHS) - more commonly known as email. At one time, the designers of X.400 were expecting it to be the predominant form of email, but this role has been taken by the SMTP-based Internet e-mail, see gateway type.
ANSI ASC X12 is the official designation of the U.S. national standards body for the development and maintenance of Electronic Data Interchange (EDI) standards. ASC X12 has sponsored more than 315 X12-based EDI standards for health care, insurance, government, transportation, finance, and many other industries, see Message definition formats.
XPATH (Extensible Markup Language) is a markup language that defines a set of rules for encoding documents in a format that is both human-readable and machine-readable, see Routing detail.
XSD (XML Schema Definition) is a recommendation of the World Wide Web Consortium (W3C), specifies how to formally describe the elements in an Extensible Markup Language (XML) document. It can be used by programmers to verify each piece of item content in a document. They can check if it adheres to the description of the element it is placed in, see Message definitions types.
XSLT (Extensible Stylesheet Language Transformations) is the xslt transformation file that will be applied on the internal xml representation of your incoming message to transform it into the outgoing message, see Xslt Transformation.
ZIP is an archive file format that supports lossless data compression. A ZIP file may contain one or more files or directories that may have been compressed. The ZIP file format permits a number of compression algorithms, though DEFLATE is the most common, see Extra processings on message definition IN.