490 likes | 1.09k Views
SAP PI is an integration platform which provides seamless integration between SAP and non-SAP applications.
E N D
All About SAP PI (Process Integration) SAP PI is an integration platform which provides seamless integration between SAP and non-SAP applications within the organization A2A (Application to Application) or even outside the organization B2B (Business to Business). But this was a technical aspect of SAP PI, but to understand this better we will see the example of implementation of SAP PI. Example: To understand the concept of SAP PI more clearly, we take an example of a large scale Dairy Industry, which is operating in a large portion of a state and dominating the region. But there are some small scale dairy industries operating in the same region, parallel to the large scale industry which is not making profit due to their price variation compare to large-scale industry. So to avoid the pricing conflict and maintaining the same price all over the region, large scale and small scale industry decides to link together, with the help of SAP PI (Process Integration). They inter-connect with each other with the help of SAP PI and started to work as a single unit. Now, through SAP PI they are able to exchange all the information pertaining to dairy industry, including pricing and share equal amount of profit. SAP PI connects different platforms like SAP and Non-SAP systems B2B and A2A Scenarios Asynchronous and Synchronous Communications Cross component business process management Why SAP PI? Prior to SAP PI, business would connect with each other through point-to-point communication. But this process is not useful for multiple and complex processes. For smooth communication between multiple businesses, Mediated communication or Integration broker is used, and SAP PI adapts this system very well. It enables interconnection of different process via a central location known as Integration
Broker, unlike the point to point connection which is more like a spider web. The integration broker or server is an integral part of mediated communication consist of Java based Advanced Adapter Engine (AAE) and an integration engine for routing. Mediated communication is based on an integration broker which is executed by exchanging XML messages. Let see how SAP PI handles the XML messages by the help of Integration Broker. The exchange of data or message in SAP PI tutorials occurs in this four phases. Message Transformation: During message exchange it transforms the structure of the business data. Message Routing: Forwarding a message sent by a sender system to one or more receiver systems. Connectivity Adapters: Connecting the integration broker and receiver system, the adapter will transform the incoming message into an inbound message and later convert it to the format of the receiving system at the other end. Integration Processes: Cross component Business Process Management (ccBPM) consists of functions for enhanced service orchestration. SAP PI Security For messages, SAP PI provides the message level security for XI message protocol, for the SOAP adapter, for the RosettaNet protocol, for mail adapter, for the CIDX protocol and for connectivity with WSRM (Web Service Reliable Messaging) enabled systems. In SAP PI message level security enabled through the use of encryption, digital signature, SAML Assertion, Username token, Certificate token, etc. Authentication methods supported by WS infrastructure for transport level includes basic authentication (Password and Username), SAP assertion ticket, and HTTP over SSL. Connecting Integration Server with WSRM (Web Service Reliable Messaging) Enabled System. To connect with WSRM enabled system you use a communication channel of adapter type WS.
You use a sender agreement with an assigned WS sender adapter to connect the Integration Server to a WS consumer. You use a receiver agreement with an assigned WS receiver adapter to connect the integration server to a WS provider. Benefits of Security in SAP PI Permissions of the receiver application are checked against the original user In the receiver system, user can be audited Dynamic configuration at the PI receiver channel Original Posted at: bit.ly/2KSTGXP