Security Concepts for B2B Communication

Use

This section summarizes the security concepts related to business-to-business process (B2B) communication.

Several companies or business partners are typically involved in a B2B process. Each of these bases their configuration of the B2B process on the information available to them. For example, make business partner details known using your internal system landscape, not externally.

To make it possible to configure integration content in a B2B situation like this, there are concepts available that allow you to, for example, “mask” internal details in an outbound message. For more information about these concepts, see B2B Configuration .

In general, the supported security level depends on the connectivity option, in particular, the used adapters for inbound and outbound message processing. For an overview of the adapter-specific security settings, see Adapter-Specific Security Settings .

In many B2B scenarios, industry standard adapters and industry standard content are used. Therefore, the supported security settings depend on the industry standard adapter. Examples of industry standard adapters are the RNIF and the CIX adapter. For more information on the security settings supported by these adapters, see Message-Level Security .