Logical and Technical Determination of Receiver, Sender, and Authentication

Definition

The logical and technical determination of receiver, sender, and authentication is done in the consumer factory. At design time, the appropriate settings must have been made. For more information, see Creating Consumer Factories.

Logical Determination of Sender, Receiver, and Authentication

If an application does not know the sender and receiver IBCs, they can be determined using rules defined by the administrator. Logical determination is based on the business context that is provided using a filter. During configuration, routing rules are defined. This allows flexible routing of Web service calls. At runtime, the consumer application passes the business context to route the calls to the correct provider application and to transfer the correct sender application. The correct authentication method can be determined using rules as well.

  • Logical receiver determination

    The receiver IBC reference is determined on the basis of rules that the administrator has defined in a filter structure. These rules are based on the business context and help find the correct logical port.

  • Logical sender determination

    The sender IBC reference is determined on the basis of rules that the administrator has defined in a filter structure. These rules are based on the business context and help find the correct logical port.

  • Logical authentication determination

    You may have more than one configured logical port for the same combination of sender and receiver but that use different authentication methods or authentication data. For this case, the administrator can define rules to determine the correct authentication method and authentication data to find the correct logical port.

For more information, see Logical Determination of Receiver, Sender, and Authentication.

Technical Determination of Sender, Receiver, and Authentication

Technical determination finds the sender, receiver, and authentication data based on technical IDs that the application specifies. It is used by the Web service consumer application if the application knows which receiver to address and which sender to use. If the application has specified the sender, receiver, and authentication data within the consumer factory, the correct logical port can be found without rules.