Service
A service enables you to address a sender or receiver of messages.
Depending on how you want to use the service, you can select from the following service types.
Service Types in Use
Service Type |
Use |
If you want to address a particular business system as the sender or receiver of messages, choose this service type. A business system is an actual application system in a system landscape. A business system (service) comprises information about the inbound and outbound interfaces and the software component versions of the business system. You usually use
business system services when configuring
|
|
If you want to address an abstract business entity as the sender or receiver of messages, choose this service type. Using a business service, you can define the technical or business subunits of the companies involved and then assign them the relevant interfaces. You usually use
business services when configuring
For example, you can define RosettaNet Partner Interface Processes (PIPs) as business services. |
|
If you want to address an integration process as the sender or receiver of messages, choose this service type. At runtime, these integration processes are controlled by messages and can themselves send messages. |
The following functions are available for services.

For information about functions that are only available for a particular service type, see the description of the relevant service type.
You can assign a
service to a
communication
party or define it as a Service without Party. Services that are assigned to a communication
party are displayed in the navigation area of the Integration Builder under
Party in the subtree of the party. Services that are not assigned to a
communication party are displayed in the subtree as Services Without
Party.
See also:
For more
information about addressing types, see
Collaboration
Profile.
For typical
application usages for the type of addressing, see
Configuring Internal
Company Processes and
Configuring
Cross-Company Processes. More information is also available in the
instructions for configuring the
demo
examples.
See
Adapter-Specific
Identifiers.
See
Access Control Using
Assigned Users.