Quantcast
Channel: Process Integration (PI) & SOA Middleware
Browsing all 741 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Converting IDoc XML to Flat File and Vice-Versa

One fine day, one of my friends(who is new to PI) came to me and asked if we can convert any Idoc xml to Idoc flat file in SAP PI. At that time, I was sure that it could be achieved by using ABAP...

View Article


Image may be NSFW.
Clik here to view.

How to Configure AXIS Framework for Authentication Using the "wsse" Security...

How to Configure AXIS Framework for Authentication Using the "wsse" Security Standard in SAP PI  Introduction You might be required to consume an interface exposed as a web service from a provider...

View Article


Image may be NSFW.
Clik here to view.

Variable Substitution for Directory or File name.

Hi Folks,  Today I have used this feature ,variable substitution ,in receiver file adapter. Although many of you might have already used it but Ihave used this for the first time and found it very...

View Article

Image may be NSFW.
Clik here to view.

Yes it is possible to dynamically define the name of file in Multimapping……………..

This scenario is extension of my  old scenario  that is defined in my old blog in which I define the Receiver Determination based on the  file name Condition, use of Context object, Use of CP(contain...

View Article

Image may be NSFW.
Clik here to view.

Enumeration in PI 7.1

ENUMERATION in SAP PI 7.1 Issue:While consuming a Web service that is provided by SAP PI  7.1/7.0, external application program that consumes the web service need to get  the values for particular...

View Article


Image may be NSFW.
Clik here to view.

Handling Referenced XSDs in SAP PI

Handling Referenced XSDs in SAP PI This objective of this guide snippet is to provide a detailed implementation of handling referenced XSDs in SAP PI.Issue: When we get the XSD nested structure /...

View Article

Finding com.sap.guid.IGUID (or any other class) on the PI Server

I have had a really hard time finding the jar file containing the interface com.sap.guid.IGUID...After googling for about 3 hours I finally decided to utilize Java itself to find this class. After all...

View Article

How to implement complex xpath logic in Interface determination

Hi Team, I have a requirement like based on the combination of different source values i need to map to different target structures.i have to implement condition in interface determination.  First...

View Article


Image may be NSFW.
Clik here to view.

Hidden Tools functionality with ESR/ID JNLP files

In this blog, I will explore you with all the features that were covered till now in my blog series (check References) as “XI hidden tools” along with some new features with a very simple approach...

View Article


Module PayloadGZipBean: Zip and Unzip Payloads using gzip

Here you'll find a module I wrote to zip and unzip messages using gzip. I hope you find it useful:  PayloadGZipBean  package com.integrations.adapter.module; import java.io.ByteArrayInputStream;import...

View Article

No Authorization-Test Configuration in ID

Hello, I have created customized role from standard PI Role(SAP_XI_CONFIGURATOR_J2EE) and assigned to user.But when the user trying to execute "Test Configuration" in Integration Directory is...

View Article

Image may be NSFW.
Clik here to view.

HOW TO DELAY (USE WAIT STEP) MESSAGE IN SAP PI WITHOUT ccBPM

In one of my projects, I had a requirement in which IDOCs are to be sent to external 3rd party application, via SAP PI. This external 3rd party application is a cloud system in which these IDOCs are...

View Article

Global Survey for SAP NetWeaver Process Integration 2013

IFG global Survey 2013 for SAP NetWeaver PIAs in previous years, the Global Special Interest Group for Process Integration conducts its annual survey for SAP NetWeaver PI. Focus of the survey is to...

View Article


Image may be NSFW.
Clik here to view.

POV: FEH or AIF or Custom Error Handling

Any typical SAP implementation landscape, has a  multitude of 3rd Party or Legacy Systems. Business Operations mandate interface between the 3rd party systems and SAP.  In such a situation, errors on...

View Article

Image may be NSFW.
Clik here to view.

Synchronizing SAP CRM data to external systems via SAP PI

Overview:             The data exchange between CRM Middleware and external systems (non-SAP) is performed via XIF adapter. In outbound process, creating or changing a data object, a mBDoc is created...

View Article


Image may be NSFW.
Clik here to view.

Logging for each pipeline step in the Integrated Configuration Object (ICO)...

In most of the integration scenarios, in order to debug, we do depend on the logging of different versions of the source message that eventually gets transformed to the target message by going through...

View Article

Image may be NSFW.
Clik here to view.

Create your own Automatic Message Restart job on PI Java Stack (PI 7.3 EHP1)

So far, till we arrived at Java Single stack of PI, we have the luxury of scheduling most of the house keeping jobs on ABAP stack. One of the most important of those jobs is automatic message...

View Article


Image may be NSFW.
Clik here to view.

List of all the Business Systems that are connected using iFlow (PI 7.3 EHP1,...

I came across a question from my customer on how to get the list of all my business systems that are connected using iFlow on the fly.  I answered that it’s not at all a problem as I can provide you...

View Article

Image may be NSFW.
Clik here to view.

Undeploy components using the SAP NetWeaver Development Studio (NWDS)

Why this blog?In the past, I encountered a problem to undeploy certain components from my SAP PI system.Using the JSPM, this was not feasible and therefore, I used the NWDS.This short blog contains all...

View Article

Image may be NSFW.
Clik here to view.

Error in implementing WS-Security Username token standard in soap receiver...

Hi, I am implementing a scenario to call from PI, a webservice with WS-Security username token standard,along with message encryption and signature. Username Token          Base64( SHA1...

View Article
Browsing all 741 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>