Entering content frame

Background documentation Communication Channel Security Locate the document in its SAP Library structure

Various channels of communication and technologies are used between the components and data sources in Knowledge Management.

Used Technologies

The following technologies are used for communication:

·        HTTP/HTTPS

·        WebDAV

·        ICE

·        JDBC on OpenSQL

·        Operation-system-dependent and database-specific technologies

 

This graphic is explained in the accompanying text

Components and Communication Channels

Communication Between…

Communication Channel/Log

Transmitted Data

Comments

CM and DBMS with CM database

Database-specific protocol

Documents, metadata

You can use database management systems such as ORACLE® and MICROSOFT®.

CM and TREX

HTTP or HTTPS

Search requests, search results, index data, classification data

 

CM and repositories

Depends on the implementation (see table below).

Documents, metadata

 

ICE subscriber und ICE provider (CM)

ICE using HTTP or HTTPS.

Documents, metadata

Use for exchanging content packages.

WebDAV client and WebDAV server (CM)

HTTP or HTTPS with WebDAV extension.

Documents, metadata

 

Browser and portal with installed KM

HTTP or HTTPS

(HTML) documents

 

 

Technologies for Repositories

External Repositories

Communication Technology

Type of Authentication

Web repository

HTTP, HTTPS

HTTP Basic Authentication, HTTP Digest Authentication, NTLM Authentication

WebDAV repository

HTTP, HTTPS with WebDAV extension

HTTP Basic Authentication, HTTP Digest Authentication, NTLM Authentication

File-system repository and CM repository (DBFS and FSDB modes)

Operating-system-dependent.

WINDOWS® - Example: NetBIOS, TCP/IP

UNIX – Example: NFS

Dependent on operating system and configuration.

WINDOWS® – Example: SMB using TCP/IP

Lotus Notes repository

IIOP

IIOP-specific

 

Note

In the case of Web and WebDAV repositories, the combination of HTTP and Basic Authentication is not seen as secure. This is because passwords are practically transmitted in plain text. However, the authentication type used is controlled by the remote server: If a remote server uses Basic Authentication, the server is not configured to be secure. If this is the case, change the type of authentication to another type, such as Digest Authentication.

 

See also:

Structure linkContent Management Configuration

Structure linkRepositories and Repository Managers

 

 

Leaving content frame