Document Exchange Tab
The Document Exchange tab is used to specify security settings for the business transaction that is being exchanged.
-
Configure the Document Exchange tab using the information in the following table.
Field Description Outbound Document Exchange Signing Info Settings Signing Key Select the private key of the host from the list. Digest Algorithm Select a hash algorithm from the list: SHA1, SHA256, SHA384, or SHA512. PGP Signing Private Key Select the private PGP key of the host from the list. PGP Hash Algorithm Select the PGP hash algorithm from the list: SHA1 or RIPEMD160. Encryption Info Settings Encryption Certificate Select the partner's certificate from the list. Encryption Algorithm Select an algorithm from the list: DES3, AES-128, AES-192, or AES-256. PGP Encryption Public Key Select the partner's PGP public key from the list. PGP Encryption Algorithm Select the PGP encryption algorithm from the list: DES3, BLOWFISH, CAST5, AES-128, AES-192, or AES-256. Inbound Document Exchange Signing Info Settings Verification Certificate Select the partner's certificate. PGP Signing Verification Public Key Select the partner's certificate. Encryption Info Settings
Decryption Key Select the host’s private key. PGP Decryption Private Key Select the host’s private PGP key. - Click Save.
Shadow Credential Usage for BusinessConnect Container Edition – Services Plug-in
Sending Signed or Encrypted Messages
When sending signed or encrypted messages over HTTP, HTTPS, or HTTPSCA transports, you can use shadow credentials during the overlay and shadow credential period to sign or encrypt these messages.
Receiving Signed or Encrypted Messages
When receiving signed or encrypted messages from a trading partner over HTTP, HTTPS, or HTTPSCA transports, credentials are picked during the overlay period in the following order:
- Shadow credential is tried for authentication or decryption.
- If this fails, the original credential is tried.
For the shadow credential period, only the shadow credential is tried.