Enhancement possibilities of Java Developments

Hi, all!
Does SAP provide an enhancement concept for it' s Java application within NWDI side similar to its ABAP development? Something like BADIs, customer exits on screens, customer includes for data structures a.s.o.? Something that would enable a customer to enhance either a SAP Java app or a ISV app without modification?
Regards,
Thomas

Hi,
This is a though question, and I think many share your concern (including me to some extent) regarding the TCO for Java applications.
SAP has provided little help in this area, in fact the primary tool is a visual diff extension in NWDS, allowing you to compare new version with the old. This is especially difficult with NWDI, since the diff tool has no concept of modelling differences which may impact multiple files. I believe this diff tool also has some auto-merge possibilities
There are some Java EE applications which are delivered for NWDI and are structured well into different DCs (CRM comes to mind). Here there are clearly defined guidelines on when to create new classes, and generally your changes are better separated from the core SAP provided code (still not 100%).
With regards with the classloading stuff, this is handled better and better, as there is a system of custom classloaders which can clear out loaded classes as needed. Doesn't always work, but most of the time.
Cheers
Dagfinn

Similar Messages

  • Java Programming @ SAP - the poor cousin?

    Hi!
    Recently I' ve started a kind of poll in the Java forums asking if someone knew any enhancement possibilities for java-side development at SAP mentioning the ABAP customer exits, BADIs, customer includes and enhancement spots as example.
    Guess how many answer I received - from WDJ, Java Programming, NWDI and NW Java from: None! All the gurus who usually bubble over with wisdom remained wondrous silent. I also run over help pages searching for some hints regarding this - in my opinion fundamental - questions, with the same result.
    Has really nobody at SAP spent a thought about one of the most precious features SAP offers its customers - the possibility to enhance delivered standard-programs and thereby adapt them to their needs without modification?
    How are we as Java programmers then supposed to stand the mistrustful glances of our ABAP collegues who wonder why there has been so much noise about this Java thing in the recent years. Thinking about the disadvantages a developer working with Java at SAP has to bear compared to his ABAP collegue - no direct data access, no comfortable debugging possibilities, lots of standalone tools with strange UIs (SDM Remote GUI, Visual Admin - only to name the least glorious ones - he to manage and - last, not least - no chance to enhance SAP Standard programs modification free I have to agree upon one ABAPers opinion on Java: "The hype is over!".
    Regards from a very pessimistic Java Developer
    Thomas
    PS: Does anybody know a way to unbureaucraticly swap a Java certification against an ABAP one?

    I get the question - should I do my development in ABAP or Java - quite often. My answer has become "It Depends."  I getting pretty good at those ambiguous consulting answers, aren't I.
    In all seriousness I really do think the answer depends upon several things.  As a company or development group you should analyze the skills that you already have in house.  As you have seen the two development environments are quite close.  The advantages of one over the other will continue to vary over time.  ABAP will add nice features from Java and vise versa.  In the end it is more important that companies leverage their skill sets and existing infrastructure (Software Lifecycle Landscape) to their maximum. 
    If you are already a java shop then it makes sense to continue down that development path because your developers will still be very efficient even if they have to access ERP and other SAP application logic and data via RFC or Web Services. 
    On the other hand, ABAP certainly isn't as dead as some people claimed it would be by now. Thanks to Web Services ABAP has more flexibility than ever before.  It isn't nearly the closed box that it used to be.  Also the workbench team isn't going to stop innovating either. 
    The next question I get is what does SAP do internally when deciding on a language to use.  To a large extent they use the same criteria - what existing skill sets do I have to work with.  They also look at where the data is located. 
    That means products like Portal aren't about to change from Java to ABAP.  On the other hand ERP suite development is still heavily ABAP.  The new UIs coming from ERP will primarily be done in Web Dynpro ABAP. 
    Even in some newer products that haven't been released yet - the UI was done in Java or Visual Composer and the backend business logic was done in ABAP. It is all about taking advantage of the unique strengths of each environment and the skill sets you have in each.
    In the end I don't think Java is the poor cousin any more than ABAP is going to die.  Look at NetWeaver CE and the huge investment SAP has made on top of Java Development there.  At the same time our investment in Java has not come at the cost of the ABAP environment.  Innovations will continue to take place there as well.  I can assure you that within SAP it is the hope and goal to have two top notch development environments within NetWeaver.
    Now let me share a little story with you.  My background is obviously ABAP and I doubt I will ever lose my particular passion for the environment.  At the same time I have done a fair bit of NetWeaver Java development in the last year and half or so.  I'm not a super deep expert, but I can hold my own. 
    I recently had a requirement to build an MDM Application.  I only had two days in which to build it.  My choices were to use the Java API or the ABAP API.  They are quite similar and both meet all my interface requirements.  I was building a Web Dynpro UI, so the end user wouldn't be able to tell the difference.  Interfacing capabilities being the same and UI output being identical - my decision came down to the environment where I personally could be most efficient.  I could have completed the project in either environment.  But because I knew the ABAP Programming Environment (you know the stuff that goes beyond the basic syntax - the real knowledge that lets you squeeze every last drop of performance out of an application) so well I personally could build the best application in the shorter time in ABAP. 
    Now someone with a different background might well have taken the Java path and done just as well.  This is the advantage that SAP provides by continuing to support both ABAP and Java development.  Does every feature and function of both environements line up exactly - of course not.  I'm sure they never will.  But do these differences keep experts in either environment from being able to make any application do amazing things - certainly not.  Personally I feel less constrained in either ABAP or Java today than I have ever felt programming before.

  • Java enhancement in XSLT mapping in PI 7.1 and JDK5 XML processing

    Hi,
    I am implementing an XSLT mapping and I need to use java enhancements. I got those working but only if I check "Use SAP XML Toolkit" from Operation Mapping. I would like to use JDK5 XML processing.
    I also got this message to trace:
    Resource not found: META-INF/services/javax.xml.parsers.SAXParserFactory
    Thrown:
    com.sap.aii.ib.server.mapping.execution.MappingClassNotFoundException: META-INF/services/javax.xml.parsers.saxparserfactory
    I tried to use com.sun.org.apache.xerces.internal.jaxp.SAXParserFactoryImpl but still couldn't get java enhancement working.
    Is there a way to get JDK5 XML processing working with java enhancements?

    > Is there a way to get JDK5 XML processing working with java enhancements?
    No. Java processing inside XSLT is no standard. So it works only with SAP lib.
    Regards
    Stefan

  • XSLT Enhancement with Java, Tokenize Functionality

    I tried the following requirement using EXSLT with no luck. Is there any other alternative to tokenize in XSLT 1.0.
    The syntax i have here is  
    <xsl:for-each select="tokenize($this/Field1,',')">
           <xsl:variable name="f1v" select="."/>
         <xsl:for-each select="tokenize($this/Field2,'\|')">
              <xsl:variable name="f2v" select="."/>
              <xsl:for-each select="tokenize($this/Field3,'\|')">
                        <xsl:variable name="f3v" select="."/>
    There are multiple for-each based on tokens
    I am leaning towards to Enhancing XSLT with Java Function. As i have less experience with Java, can anybody help me with the code that can be used by XSLT for Tokenize functionality.
    I have written something like following. I still have errors to fix. But i am not sure about having resultSet or return at the end, to make sure all the tokens were sent to XSLT.
    public class MyStringToken
         public static void main(String [] args)
              String str = "sssd;wwer;ssswwwwdwwwwwwwwwww;wwwwe";
              String delimiter = ";";
              MyStringToken my = new MyStringToken();
              my.getTokens(str,delimiter);
         public void getTokens(String str,String delimiter)
              StringTokenizer st = new StringTokenizer(str,delimiter);
              while(st.hasMoreElements())
                   try
                        String delString = new String(st.nextElement().toString());
                        return (delString);
                   catch(Exception e)
                        e.printStackTrace();
    Any help is appreciated

    Hi,
    I have been searching about, and I have found the next example that maybe can help you, It's a template to tokenize in XSLT 1.0 from the web [http://stackoverflow.com/questions/1018974/tokenizing-and-sorting-with-xslt-1-0]
    <xsl:template name="tokenize">
      <xsl:param name="string" />
      <xsl:param name="delimiter" select="' '" />
      <xsl:choose>
        <xsl:when test="$delimiter and contains($string, $delimiter)">
          <token>
            <xsl:value-of select="substring-before($string, $delimiter)" />
          </token>
          <xsl:text> </xsl:text>
          <xsl:call-template name="tokenize">
            <xsl:with-param name="string"
                            select="substring-after($string, $delimiter)" />
            <xsl:with-param name="delimiter" select="$delimiter" />
          </xsl:call-template>
        </xsl:when>
        <xsl:otherwise>
          <token><xsl:value-of select="$string" /></token>
          <xsl:text> </xsl:text>
        </xsl:otherwise>
      </xsl:choose>
    </xsl:template>
    Also I have found the next example of use tokenize in EXSLT from [http://exslt.org/str/functions/tokenize/index.html] It can be that inI your tests you are not using "str:tokenize", no?
    <xsl:template match="a">
       <xsl:apply-templates />
    </xsl:template>
    <xsl:template match="*">
       <xsl:value-of select="." />
          <xsl:value-of select="str:tokenize(string(.), ' ')" />
       <xsl:value-of select="str:tokenize(string(.), '')" />
       <xsl:for-each select="str:tokenize(string(.), ' ')">
          <xsl:value-of select="." />
       </xsl:for-each>
       <xsl:apply-templates select="*" />
    </xsl:template>
    I hope that helps you.
    Best.
    Jorge

  • Java Security Model: Java Protection Domains

    1.     Policy Configuration
    Until now, security policy was hard-coded in the security manager used by Java applications. This gives us the effective but rigid Java sandbox for applets.A major enhancement to the Java sandbox is the separation of policy from mechanism. Policy is now expressed in a separate, persistent format. The policy is represented in simple ascii, and can be modified and displayed by any tools that support the policy syntax specification. This allows:
    o     Configurable policies -- no longer is the security policy hard-coded into the application.
    o     Flexible policies -- Since the policy is configurable, system administrators can enforce global polices for the enterprise. If permitted by the enterprise's global policy, end-users can refine the policy for their desktop.
    o     Fine-grain policies -- The policy configuration file uses a simple, extensible syntax that allows you to specify access on specific files or to particular network hosts. Access to resources can be granted only to code signed by trusted principals.
    o     Application policies -- The sandbox is generalized so that applications of any stripe can use the policy mechanism. Previously, to establish a security policy for an application, an developer needed to implement a subclass of the SecurityManager, and hard-code the application's policies in that subclass. Now, the application can make use of the policy file and the extensible Permission object to build an application whose policy is separate from the implementation of the application.
    o     Extensible policies -- Application developers can choose to define new resource types that require fine-grain access control. They need only define a new Permission object and a method that the system invokes to make access decisions. The policy configuration file and policy tools automatically support application-defined permissions. For example, an application could define a CheckBook object and a CheckBookPermission.
    2.     X.509v3 Certificate APIs
    Public-key cryptography is an effective tool for associating an identity with a piece of code. JavaSoft is introducing API support in the core APIs for X.509v3 certificates. This allows system administrators to use certificates from enterprise Certificate Authorities (CAs), as well as trusted third-party CAs, to cryptographically establish identities.
    3.     Protection Domains
    The central architectural feature of the Java security model is its concept of a Protection Domain. The Java sandbox is an example of a Protection Domain that places tight controls around the execution of downloaded code. This concept is generalized so that each Java class executes within one and only one Protection Domain, with associated permissions.
    When code is loaded, its Protection Domain comes into existence. The Protection Domain has two attributes - a signer and a location. The signer could be null if the code is not signed by anyone. The location is the URL where the Java classes reside. The system consults the global policy on behalf of the new Protection Domain. It derives the set of permissions for the Protection Domain based on its signer/location attributes. Those permissions are put into the Protection Domain's bag of permissions.
    4.     Access Decisions
    Access decisions are straightforward. When code tries to access a protected resource, it creates an access request. If the request matches a permission contained in the bag of permissions, then access is granted. Otherwise, access is denied. This simple way of making access decisions extends easily to application-defined resources and access control. For example, the banking application allows access to the CheckBook only when the executing code holds the appropriate CheckBookPermission.
    Sandbox model for Security
    Java is supported in applications and applets, small programs that spurred Java's early growth and are executable in a browser environment. The applet code is downloaded at runtime and executes in the context of a JVM hosted by the browser. An applet's code can be downloaded from anywhere in the network, so Java's early designers thought such code should not be given unlimited access to the target system. That led to the sandbox model -- the security model introduced with JDK 1.0.
    The sandbox model deems all code downloaded from the network untrustworthy, and confines the code to a limited area of the browser -- the sandbox. For instance, code downloaded from the network could not update the local file system. It's probably more accurate to call this a "fenced-in" model, since a sandbox does not connote strict confinement.
    While this may seem a very secure approach, there are inherent problems. First, it dictates a rigid policy that is closely tied to the implementation. Second, it's seldom a good idea to put all one's eggs in one basket -- that is, it's unwise to rely entirely on one approach to provide overall system security.
    Security needs to be layered for depth of defense and flexible enough to accommodate different policies -- the sandbox model is neither.
    java.security.ProtectionDomain
    This class represents a unit of protection within the Java application environment, and is typically associated with a concept of "principal," where a principal is an entity in the computer system to which permissions (and as a result, accountability) are granted.
    A domain conceptually encloses a set of classes whose instances are granted the same set of permissions. Currently, a domain is uniquely identified by a CodeSource, which encapsulates two characteristics of the code running inside the domain: the codebase (java.net.URL), and a set of certificates (of type java.security.cert.Certificate) for public keys that correspond to the private keys that signed all code in this domain. Thus, classes signed by the same keys and from the same URL are placed in the same domain.
    A domain also encompasses the permissions granted to code in the domain, as determined by the security policy currently in effect.
    Classes that have the same permissions but are from different code sources belong to different domains.
    A class belongs to one and only one ProtectionDomain.
    Note that currently in Java 2 SDK, v 1.2, protection domains are created "on demand" as a result of class loading. The getProtectionDomain method in java.lang.Class can be used to look up the protection domain that is associated with a given class. Note that one must have the appropriate permission (the RuntimePermission "getProtectionDomain") to successfully invoke this method.
    Today all code shipped as part of the Java 2 SDK is considered system code and run inside the unique system domain. Each applet or application runs in its appropriate domain, determined by its code source.
    It is possible to ensure that objects in any non-system domain cannot automatically discover objects in another non-system domain. This partition can be achieved by careful class resolution and loading, for example, using different classloaders for different domains. However, SecureClassLoader (or its subclasses) can, at its choice, load classes from different domains, thus allowing these classes to co-exist within the same name space (as partitioned by a classloader).
    jarsigner and keytool
    example : cd D:\EicherProject\EicherWEB\Web Content jarsigner -keystore eicher.store source.jar eichercert
    The javakey tool from JDK 1.1 has been replaced by two tools in Java 2.
    One tool manages keys and certificates in a database. The other is responsible for signing and verifying JAR files. Both tools require access to a keystore that contains certificate and key information to operate. The keystore replaces the identitydb.obj from JDK 1.1. New to Java 2 is the notion of policy, which controls what resources applets are granted access to outside of the sandbox (see Chapter 3).
    The javakey replacement tools are both command-line driven, and neither requires the use of the awkward directive files required in JDK 1.1.x. Management of keystores, and the generation of keys and certificates, is carried out by keytool. jarsigner uses certificates to sign JAR files and to verify the signatures found on signed JAR files.
    Here we list simple steps of doing the signing. We assume that JDK 1.3 is installed and the tools jarsigner and keytool that are part of JDK are in the execution PATH. Following are Unix commands, however with proper changes, these could be used in Windows as well.
    1. First generate a key pair for our Certificate:
    keytool -genkey -keyalg rsa -alias AppletCert
    2. Generate a certification-signing request.
    keytool -certreq -alias AppletCert > CertReq.pem
    3. Send this CertReq.pem to VeriSign/Thawte webform. Let the signed reply from them be SignedCert.pem.
    4. Import the chain into keystore:
    keytool -import -alias AppletCert -file SignedCert.pem
    5. Sign the CyberVote archive �TeleVote.jar�:
    jarsigner TeleVote.jar AppletCert
    This signed applet TeleVote.jar can now be made available to the web server. For testing purpose we can have our own test root CA. Following are the steps to generate a root CA by using openssl.
    1. Generate a key pair for root CA:
    openssl genrsa -des3 -out CyberVoteCA.key 1024
    2. Generate an x509 certificate using the above keypair:
    openssl req -new -x509 -days key CyberVoteCA.key -out CyberVoteCA.crt
    3. Import the Certificate to keystore.
    keytool -import -alias CyberVoteRoot -file CyberVoteCA.crt
    Now, in the step 3 of jar signing above, instead of sending the request certificate to VeriSign/Thawte webform for signing, we 365 - can sign using our newly created root CA using this command:
    openssl x509 -req -CA CyberVoteCA.crt -CAkey CyberVoteCA.key -days 365 -in CertReq.pem -out SignedCert.pem �Cacreateserial
    However, our test root CA has to be imported to the keystore of voter�s web browser in some way. [This was not investigated. We used some manual importing procedure which is not recommended way]
    The Important Classes
    The MessageDigest class, which is used in current CyberVote mockup system (see section 2), is an engine class designed to provide the functionality of cryptographically secure message digests such as SHA-1 or MD5. A cryptographically secure message digest takes arbitrary-sized input (a byte array), and generates a fixed-size output, called a digest or hash. A digest has the following properties:
    � It should be computationally infeasible to find two messages that hashed to the same value.
    � The digest does not reveal anything about the input that was used to generate it.
    Message digests are used to produce unique and reliable identifiers of data. They are sometimes called the "digital fingerprints" of data.
    The (Digital)Signature class is an engine class designed to provide the functionality of a cryptographic digital signature algorithm such as DSA or RSA with MD5. A cryptographically secure signature algorithm takes arbitrary-sized input and a private key and generates a relatively short (often fixed-size) string of bytes, called the signature, with the following properties:
    � Given the public key corresponding to the private key used to generate the signature, it should be possible to verify the authenticity and integrity of the input.
    � The signature and the public key do not reveal anything about the private key.
    A Signature object can be used to sign data. It can also be used to verify whether or not an alleged signature is in fact the authentic signature of the data associated with it.
    ----Cheers
    ---- Dinesh Vishwakarma

    Hi,
    these concepts are used and implemented in jGuard(www.jguard.net) which enable easy JAAS integration into j2ee webapps across application servers.
    cheers,
    Charles(jGuard team).

  • Java webdynpro development with jdk1.5.7

    hi,
    I have installed the CE server and the Netweaver Developer Studio, to try some java developments.
    I was working with jdk1.5.7, but the server has only version 1.5.017.
    Is it possible to upgrade the java in the server, so it can work with the current jdk version?
    thx,
    Erik

    hi again,
    I could solve the problem:
    in the developer studio you can chose to compile for lower versions.
    To do so, go to windows>preferences>java-->compiler and chose compliance level 5 or 1.4(it was on 6), and now the development works fine.

  • Java SE 6 Update 10 RC  leak memory

    I install Java SE 6 Update 10 RC from JDK6 Update 10 RC and open
    http://java.sun.com/docs/books/tutorial/uiswing/components/table.html
    When I push "launch" button , I saw only first JavaApp, next I don`t see nothing.
    Processes have 5-6 "javaw.exe" on task manager (Windows2003s) ~26MB
    Then I remove SE 6 Update 10 , reinstall Java SE 6 Update 7 and now all are wonderfull!
    All Apps execute without problem.
    Sorry for my English.

    [Java 6 Update 10|http://java.sun.com/developer/technicalArticles/javase/java6u10/] provides some nice enhancements for deploying Java to the Desktop, a nice new look and feel and some other nice additions.
    Also, JDK 6 Update 7 is the latest, officially released version at the moment. The Update 10 is only a release candidate (that means it is what might become the final Update 10, but can still change).
    For normal development (and especially when you're just starting to learn) there shouldn't be too much difference, so choose whichever you want.

  • What's the difference between Java SE 6 Update 10 RC and JDK 6 Update 7

    I want to download jdk and do some java development. But I saw "Java SE 6 Update 10 RC" and "JDK 6 Update 7" are both there for me to download. I don't know which one should I download. I used to think JDK is Java SE. Can someone explain it to me? Great thanks!

    [Java 6 Update 10|http://java.sun.com/developer/technicalArticles/javase/java6u10/] provides some nice enhancements for deploying Java to the Desktop, a nice new look and feel and some other nice additions.
    Also, JDK 6 Update 7 is the latest, officially released version at the moment. The Update 10 is only a release candidate (that means it is what might become the final Update 10, but can still change).
    For normal development (and especially when you're just starting to learn) there shouldn't be too much difference, so choose whichever you want.

  • Enhancements in Program SAPMV60A

    Hi!
    We' re running SAP R/3 4.7 Enterprise and would like to place some custom coding in program SAPMV60A after a new invoice has been persisted in tables VBRK and VBFA, which is done within function module RV_INVOICE_DOCUMENT_ADD via call of FM RV_INVOICE_REFRESH.
    Unfortunatly, we haven' t found an appropriate enhancement point - neither program exit nor BAdI-call - after the entries are made via COMMIT work as the last mentioned function module ends with
    IF with_posting CA 'CD'.
        COMMIT WORK AND WAIT.
      ELSEIF with_posting CA ' AB'.
        COMMIT WORK.
      ENDIF.
    Afterwards, no more enhancement possibilities were found.
    Has anybody got any idea how customer coding could be placed within this program after invoice creation?
    Any hints are appreciated!
    Regards,
    Thomas

    Hi,
    I am not sure if this information would help.
    Did you try the following user exits in function pool SAPLV60A
      include rv60afzz.                " FORM's Userexit's
      include rv60afza.                " FORM's Userexit's
      include rv60afzb.                " FORM's Userexit's
      include rv60afzc.                " FORM's Userexit's
      include rv60afzd.                " FORM's Userexit's
    You should be able to find an appropriate spot for your enhancement.
    Regards,
    Subramanian

  • Urgently need a Technical Specification Document for any java development

    hi friends,
    I urgently need a tech spec doc for any java developments , wanted to refer for creating templates for a product . Please help its very urgent.
    Thanks

    Here are a couple of hundred technical specifications for a wide variety of Java development projects:
    http://jcp.org/en/jsr/all

  • Netweaver JAVA  vs Netweaver ABAP

    Hi,
    I am new to SAP having java background. Going through some of the information provided i have few questions:
    There are two servers now- Netweaver ABAP and Netweaver JAVA. Are both of these application servers provide same functionality, ie, can I do all developments like developing a ERP project (for example a SD Module) using Netweaver Java?
    In that case I need to install only Netweaver Java. Pls provide information if any of you are aware.
    Thanks
    Nagu

    For running and deploying your Java developments, you of course need a Java Application server, so you need at least a NetWeaver server with a Java stack.
    Othe NetWeaver server options are just an ABAP stack and a so-called dual-stack containing ABAP and Java.

  • Help -Confused -- WHAT Trial CE version to download (JAVA stack)

    Hi all
    I'm totally confused by the JAVA CE environment download options -- CE 7.1 with SP xxx , with EHP, the new CE 7.2 etc etc.
    All I want to do initially is trial out some JAVA web dynpro and java develpments on a stand alone laptop.
    What version do I need to download and get running. I also would need the eclipse Netweaver Development studio.
    All the install docs I've seen are a bit complex to follow and seem to want to connect this stuff to central servers. I really want to be able to test on a LOCAL stand alone workstation.
    I can connect to an ABAP server if I need to as I have the latest ABAP trial running fine on a Virtual Machine. I don't have any trouble running a number of virtual machines.
    So can somebody more knowlegeable than myself please guide me to UNDERSTANDABLE documentation
    1) What do I actually need to download
    2) How do I install it (all pieces - both server and Developer studio)
    3) PLEASE -- BECAUSE THIS IS ALWAYS THE MISSING PIECE -- WHAT DO I DO NEXT TO DEVELOP AND TEST A JAVA WEB DYNPRO ON THE WORKSTATION USING THE SOFTWARE I'VE DOWNLOADED AND INSTALLED.
    The ABAP stuff was fine  but I really want to try my hand at JAVA developments now.
    Cheers
    jimbo

    Download Java 6, the current version. Some of the stuff you mention is not part of that - you'll need to get that from the appropriate 3rd-party source.

  • JAVA mapping, output...

    Hello guys,
    Again here I am with some simple and easy doubts.
    When I'm creating a mapping between two interfaces with JAVA, I'll have a call to :
    execute(InputStream in, OutputStream out).
    The questions are, these two arguments are two XML files. The first will be the file we want to send, but the second how will it be?
    If I'm using a call to a RFC, the structure of the second file will have the importing, exporting and tables arguments of the RFC? And how are they disposed...?
    The idea is to perform the correspondence from the original file to the parameters of the RFC, but how will the RFC load the parameters from the file...?
    I know it's a really simple doubt but can anyone clear my mind?
    Thanks a lot in advance...

    > Hello guys,
    >
    > The questions are, these two arguments are two XML
    > files. The first will be the file we want to send,
    > but the second how will it be?
    These arguments dont necessarily need to be XML structures, in fact this method accepts any kind of input i.e. flat structure, strings, etc.. However, you are using this mapping within a message mapping so most likely you will pass an XML structure to it. The first parameter is the input (the source) and the second one is the resultt of your Java mapping.
    > If I'm using a call to a RFC, the structure of the
    > second file will have the importing, exporting and
    > tables arguments of the RFC? And how are they
    > disposed...?
    The RFC structure you have to download it from the R/3 system where you want to call this RFC. You do this from your SWCV in the repository. After you have downloaded the RFC metadata you will see both messages, the request and the response message.
    > The idea is to perform the correspondence from the
    > original file to the parameters of the RFC, but how
    > will the RFC load the parameters from the file...?
    Here is where your message mapping (enhanced with your Java mapping) will come into picture.
    PS: Without knowiing your requirements I think you can do this mapping from file to RFC call without the use of a Java mapping. i.e. message mapping.
    >
    > I know it's a really simple doubt but can anyone
    > clear my mind?
    >
    > Thanks a lot in advance...
    Good Luck,
    Roberto
    Message was edited by: Roberto Viana
    Message was edited by: Roberto Viana

  • Trying to enhance sample apps

    Hi all,
    I'm trying to enhance the tutorial .java files using jdoc.bat, I keep on
    getting the error:
    Exception class: java.lang.IllegalArgumentException. Exception message:
    The specified class "tutorial.Animal" could not be loaded.
    com.solarmetric.kodo.runtime.FatalUserException:
    java.lang.ClassNotFoundException: tutorial.Animal
    I can't figure out what I'm doing wrong. All the jars in my kodo \lib\
    dir are in my Classpath, and \bin\ is in my system path.
    The tutorial structure is: kodo\tutorial\*.java
    All classes belong to package "tutorial"
    And I'm trying to run jdoc from kodo\tutorial.
    Then it gives me the ClassNotFoundException. What have I left out? I've
    tried putting \tutorial\ under my Classpath, but that didn't help. Any
    clues or pointers?
    Thanks for any help!
    Kevin

    oops, ignore that. I just left out the package name in my argument.

  • SAP IdM 7.2 - enhancement UI

    Hi all,
    I have this specific request from our customer:
    1. They want to reset the passwords for a list of users in their IC.
    For that, we thought that it should be possible to create a new UI screen, that displays the list and an extra  button to reset the password for the selected users.
    How can we handle this request? Do we need to create a new Java Web Dynpro based on the REST Webservice, or are other options more relevant?
    2. Is it possible to enhance the default Java Web Dynpro's from IdM? for example an extra button on the screen?
    Thanks.

    How do they get mail if they don't have a password?  In any case.  I can't think of a really good way to do this.  I can, however think of a lot of bad ways.
    Most of these would involve looking at each entry individually and setting some custom attribnute to mark that the password needs to be generated.  then have a scheduled task to look for these entries every so often and do the password change / email.
    Like I said, it's not a good way.  The problem is that IDM is not designed to do mass operations anymore.
    I think holding out for the REST interface might be your best shot.

Maybe you are looking for

  • Acrobat 9 Pro - Batch Create Multiple Files from InDesign CS5 files

    When attempting to batch create PDFs from Indesign CS5 files using Acrobat Pro 9's File>Create PDF>Batch Create Multiple Files ... option the operation fails with the error 'Could not find the application that created this file: [path to file] Please

  • Problem with cfcookie

    Hi I have some problem with cfcookie. No where CFCOOKIE tag or javascript fns are used to create  a cookie from the code. But cookies are created and stored in the local system once logged into appln. By default expire value displayed for the cookie

  • File dates and names missing from library

    I have recently had my hard drive replaced and started afresh. My old copy of iPhoto library downloaded photos into separate files by date order and showed the roll name I assigned. I could click on a little arrow on the left to show or hide the phot

  • Sesonality - Lead-Time - Forecasting

    I have a unique scenario regarding seasonality and limiting the sales window for the sale and shipment of certain products.  Lets say for example my lead time is 40 days which is eight weeks from today so in theory I can have as much material as I wi

  • External website in a webpage

    Hiya all, is it possible to show an external website in a layer in dreamweaver??? Looking to show a video clip that is hosted elswhere in a window on an existing website. Thanks Paul