Home kellton

Main navigation

  • Services
    • Digital Business Services
      • AI & ML
        • Utilitarian AI
        • Predictive Analytics
        • Generative AI
        • Machine Learning
        • Data Science
        • RPA
      • Digital Experience
        • Product Strategy & Consulting
        • Product Design
        • Product Management
      • Product Engineering
        • Digital Application Development
        • Mobile Engineering
        • IoT & Wearables Solutions
        • Quality Engineering
      • Data & Analytics
        • Data Consulting
        • Data Engineering
        • Data Migration & Modernization
        • Analytics Services
        • Integration & API
      • Cloud Engineering
        • Cloud Consulting
        • Cloud Migration
        • Cloud Managed Services
        • DevSecOps
      • NextGen Services
        • Blockchain
        • Web3
        • Metaverse
        • Digital Signage Solutions
        • Spatial Computing
    • SAP
      • SAP Services
        • S/4HANA Implementations
        • SAP AMS Support
        • SAP Automation
        • SAP Security & GRC
        • SAP Value Added Solutions
        • Other SAP Implementations
      • View All Services
  • Platforms & Products
    • Audit.io
    • Kellton4Health
    • Kellton4NFT
    • Kellton4Commerce
    • KLGAME
    • tHRive
    • Optima
    • Our Data Accelerators
      • Data DigitalTwin
      • SmartScope
      • DataLift
      • SchemaLift
      • Reconcile360
    • View All Products
  • Industries
    • Fintech, Banking, Financial Services & Insurance
    • Retail, E-Commerce & Distribution
    • Pharma, Healthcare & Life Sciences
    • Non-Profit, Government & Education
    • Travel, Logistics & Hospitality
    • HiTech, SaaS, ISV & Communications
    • Manufacturing, Automotive & Chemicals
    • Oil,Gas & Mining
    • Energy & Utilities
    • View All Industries
  • Insights
    • Blogs
    • Brochures
    • Success Stories
    • News / Announcements
    • Webinars
    • White Papers
  • Careers
    • Life At Kellton
    • Jobs
  • About
    • About Us
    • Our Partners
    • Our Leadership
    • Testimonials
    • Analyst Recognitions
    • Investors
    • Privacy-Policy
    • Contact Us
    • Our Delivery Centers
      • India Delivery Center
      • Europe Delivery Center
Search
  1. Home
  2. All Insights
  3. Blogs

Experience the Power of B2B, EDI, and PGP Capabilities of SAP PI

SAP
May 23 , 2019
Posted By:
Digital Practice Team
linkedin
Experience the Power of B2B, EDI, and PGP Capabilities of SAP PI

Other recent blogs

Generative AI companies
ROI of Generative AI: Measuring its impact and value for your business
April 15 , 2025
Data migration cost
Breaking down the cost of Data Migration: Is it worth in 2025
April 10 , 2025
Data Migration trends 2025
Revealing top Data Migration trends and predictions to watch
April 01 , 2025

Let's talk

Reach out, we'd love to hear from you!

Image CAPTCHA
Get new captcha!
Enter the characters shown in the image.

With the introduction of the NetWeaver Process Orchestration B2B add-on, SAP is covering all aspects of Application to Application (A2A) and Business to Business (B2B) integration, eliminating the need to deploy any third-party adapters. This B2B add-on is included as part of the standard license for Process Orchestration (Single Stack) 7.31 or higher. On the other hand, for Process Integration (Dual Stack) it might require additional licensing costs.

New Features in SAP PI

  • File adapter that supports the transfer of large (unlimited file size) binary files
  • Sender HTTP adapter that supports HTTP GET method
  • Publish and subscribe via Java Message Service (JMS) adapter
  • In addition to FTP and FTPS; File adapter supports Secure File Transfer Protocol (SFTP) as well
  • B2B adapters like Applicability Statement 2 (AS2), Odette File Transfer Protocol (OFTP), X.400 and support for Electronic Data Interchange For Administration, Commerce, and Transport (EDIFACT), ANSI X.12, VDA, TRADACOMS, and ODETTE
  • Built-in support for Pretty Good Privacy (PGP) encryption and decryption
  • Ability to ping adapters and check their status (Active/Inactive/Stopped)
  • Blacklisting of error messages. If a message runs into error several times, it can be flagged and moved to another queue. This will prevent messages from getting stuck in queues and avoid blocking other messages
  • Enhanced message search capabilities based on values from payload and adapter-specific message attributes, for e.g. searching an IDOC based on “Customer Name” or “Customer Number,” etc.

The B2B and EDI Capabilities of SAP PI 

  • Message-level encryption for secure message content 
  • Transport level encryption for secure message content
  • Data stream encryption via Secure Sockets Layer (HTTPS)
  • Security based on the Web Service standard (WS-Security)
  • AS2 support
  • Support for EDIFACT, ANSI X12, TRADACOM, SWIFT etc.

SAP PI B2B and EDI


Configuring B2B Adapters in PI – AS2

All the B2B adapters can be configured in the integration repository, just like any other out-of-the-box adapters (e.g. File, SOAP, JDBC, IDOC, etc.).

B2B Adapters


The PGP Capabilities of SAP PI

Encryption

  • Encrypt Only

Use the public key provided by the partner to do encryption. Along with the public key, you can also specify the encryption algorithm. The SAP standard module supports the following algorithms for encryption:  AES_128, AES_192, AES_256, BLOWFISH, CAST5, DES, 3DES, and TWOFISH.

  •  Sign and Encrypt

In this case, along with the public key, you also need your own private key and its passphrase to sign the message. The following algorithms can be used to sign messages MD5, RIPEMD160, SHA1, SHA224, SHA256, SHA384, and SHA512. 

  •  Compression

This is optional and allows you to define necessary compression that needs to be carried out on the message, reducing message size. The supported compressions are ZIP, ZLIB, and BZIP2

Decryption

  • Decrypt Only

In case of decryption, you need to use your private key and its passphrase. There is no need to exclusively specify the algorithm, as it will be automatically detected by the module.

  • Decrypt and Verify

To verify sender’s signature, partner’s public key along with your private key and passphrase must be provided. There is no need to provide any algorithm information.   

Configuring PGP Adapters in SAP PI

You can secure the transmission of your business data over the Internet by configuring communication channels with the PGP module. The cryptographic algorithm of the PGP module encrypts sensitive data and transmits it securely so that it cannot be read by anyone except the intended recipient.
 

SAP PI B2B and EDI


The release of B2B, EDI, and PGP capabilities has enabled the use of SAP PI/PO for all your internal (Application to Application) and external (Business to Business) integration needs, eliminating the need to deploy any third party adapters.

Want to know more?

SAP Cloud Private vs Public
Blog
SAP S/4HANA Cloud Editions: Private vs. Public Cloud—which is right?
August 27 , 2024
SAP Upgrade guide
Blog
SAP S/4HANA upgrade guide: Why upgrading to higher version is more crucial than ever
January 29 , 2024
 SAP PIPO
Blog
How to generate and use SuccessFactors ODATA API XSD in SAP PI/PO?
October 18 , 2023

North America: +1.844.469.8900

Asia: +91.124.469.8900

Europe: +44.203.807.6911

Email: ask@kellton.com

Footer menu right

  • Services
  • Platforms & Products
  • Industries
  • Insights

Footer Menu Left

  • About
  • News
  • Careers
  • Contact
LinkedIn Twitter Youtube
clutch Badge

© 2024 Kellton