cancel
Showing results for 
Search instead for 
Did you mean: 

SAP Cloud For Customer : Account 360 display Recent Order

Former Member
0 Kudos

Hi Experts,

I have configure the Account 360 to display the recent order and revenue data from ECC and BI system. The data comes from ECC/BI to C4C with expected results.

I have few questions about this Recent Order Data :

1) How many recent order display in C4C?

2) Is there any restriction to display the recent order data in C4C?

3) In SAP standard help center in Account 360 : Overview the SAP provide the Notes for custom report template , in that report they are mentioned the condition for no of count less-than 10 so can we remove this condition for more than 10 records.

finally i want to know in cloud system any restriction to display more than 10 records in RECENT ORDER tab under Account_TI screen.

Many Thanks,

Mithun

Accepted Solutions (1)

Accepted Solutions (1)

0 Kudos

Hi Mithun,

There is no restricion on the Recent Order UI to display only 10 orders. If the report transfers 200 orders, all of them would be displayed.

By the way, in SP 14 of the ERP Add-On CODERINT (coming in March 2015) a report for sending recent orders is included. This standard report replaces the sample coding.

That program is also available today as an advance development via SAP Note 2108612.

Regards,

Gerald

Answers (1)

Answers (1)

kamran_farooqui
Contributor
0 Kudos

Hi Mithun,

I'm trying to configure the Sales Order integration with ECC, but we are getting below SSL error while creating logical port in SOAMANAGER.

SRT Framework exception: Service Ping ERROR: Error when calling SOAP Runtime functions: SRT: Processing error in Internet Communication Framework: ("ICM_HTTP_SSL_PEER_CERT_UNTRUSTED")

Please Advise as this is very critical requirement.

Regards,

K.F.

AbinashNanda
Product and Topic Expert
Product and Topic Expert
0 Kudos

Hi Kamran Farooqui,

ICM_HTTP_SSL_PEER_CERT_UNTRUSTED usually means the peer certificate is not trusted by ECC. In your case ECC must be connecting via a middleware solution to C4C. Now the error points to ECC does not trust your middleware system. Can you please take a ICM trace with trace level set to 3 and attach it to this message. make sure you reset the trace file before you do a connection test via SOAMANAGER so as to keep the trace file size smaller.

best regards, Abinash

Former Member
0 Kudos

Hello K.F,

In my case we have completed the Account 360 setup and the data move correctly.

I have followed the below steps to complete the setup.

Cloud Activity:

1) In Cloud For Customer enable the scoping for Account 360.

2) Create Communication system using ECC system details.

3) Create Communciation arrangement for Account 360 and Analytic Integration.

4) Expose Data source for ID mapping.

5) Download the WSDL from communication arrangements and store into local system.

ECC Activity

1) Update the Full certificate chain from the Cloud system for more details go through this post

2) Now Create Consumer service ( Proxy) using WSDL (Downloaded from Cloud system) and activate it.

3) Now Open SOAMANAGER and search for a proxy and create logical port to make connection between ECC and Cloud once you create logical port RFC connection created (HTTP Destination) automatically for more details .

4) Now Follow the SAP Note 1724752 under this note custom report given by SAP modify as per you requirement and run it.

Now For more details follow the comment by Gerald Wiesner and check the SAP Note as mentioned in that comment.

Thanks Gerald Wiesner for sharing this helpful information

Regards,

Mithun

kamran_farooqui
Contributor
0 Kudos

Hi Abinash,

I tried to get the level 3 trace but the file is quite big, below is the the content which I thought can be useful.

Thr 2216] * SWITCH TRC-LEVEL to 3

[Thr 2216] *

[Thr 2216] eppSetTraceLevel: changing trace level to 3

[Thr 2216] DpRqFree: freeing REQ_HANDLER_ICMAN_OPCODE_RESP request (rq_id 438628, slot 308)

[Thr 2216] DpRqFreeResources: releasing ca_blk 3330 with request rq_id 438628

[Thr 2216] DpCaRelBlk: released ca_blk 3330

[Thr 2216] MAIN TRACE END

[Thr 2216] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2 contains 1 requests of type NOWP

[Thr 2216] SiSelNSelect: start select (timeout=-1)

[Thr 2216] SiSelNNext: sock 5668 selected (revt=r--)

[Thr 2216] NiSelIListInsert: add hdl 25 [2] to sel-list (0) of set0

[Thr 2216] NiSelISelectInt: 1 handles selected (0 buffered)

[Thr 2216] MAIN TRACE BEGIN

[Thr 2216] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2 contains 1 requests of type NOWP

[Thr 2216] DpRqFreePendingRequests: freed 0 pending request

[Thr 2216] RqQQueueGetRequest: Get request of queue <IcmanQueue> in slot 2 (timeout=0)

[Thr 2216] RqQRequestFree: Free request in slot 63 (rq_id 438629)

[Thr 2216] RqQRequestSlotClear: clear slot 63

[Thr 2216] NiDgHdlRecvFrom: hdl 25 received 1 bytes from 127.0.0.1:56318

[Thr 2216] RqQQueueGetRequest: Eat one selectable handle wakeup  (id=254), 1. receive

[Thr 2216] RqQQueueGetRequest: Eat selectable handle wakeup for queue <IcmanQueue> in slot 2

[Thr 2216] RqQQueueGetRequest: Request rq_id 438629 found in queue <IcmanQueue> in slot 2

[Thr 2216] rq_id 438629

[Thr 2216] -IN-- ca_blk    3331         len       5180

[Thr 2216] -IN-- reqHdlId  REQ_HANDLER_PLUGIN_RESP

[Thr 2216] -IN-- sender address:

[Thr 2216] -IN-- type      LOCAL

[Thr 2216] -IN-- agentType WORKER       workerTyp DIA          workerNum 8

[Thr 2216] -IN-- session   T1_U15895_M1

[Thr 2216] -IN-- receiver address:

[Thr 2216] -IN-- type      LOCAL

[Thr 2216] -IN-- agentType ICMAN

[Thr 2216] DpCaBecomeOwnerOfBlk: become owner of ca_blk 3331

[Thr 2216] DpRqCopyAndMoveData: copying REQ_HANDLER_PLUGIN_RESP request (rq_id 438629, slot 309)

[Thr 2216] IcmHandleRequest: handle request from icman request queue (rq_id 438629)

[Thr 2216] NiBufIAlloc: malloc REQUEST, to 96 bytes

[Thr 2216] IcmHandleAdmMsg: op: ICM_COM_OP_ICM_MONITOR(66)

[Thr 2216] NiBufIAlloc: malloc NiBufadm, to 0 bytes

[Thr 2216] NiBufDup: ref 1 for buf 000000002EF3CE30

[Thr 2216] IcmCreateRequest: Append request 2343

[Thr 2216] IcmQueueAppend: queuelen:     1

[Thr 2216] NiBufFree: ref 1 for buf 000000002EF3CE30

[Thr 6184] IcmWorkerThread: worker 9 got the semaphore

[Thr 6184] REQUEST:

    Type: ADMMSG    Index = 2343

[Thr 2216] DpRqFree: freeing REQ_HANDLER_PLUGIN_RESP request (rq_id 438629, slot 309)

[Thr 2216] Wed Feb 04 04:35:30 2015

[Thr 2216] DpRqFreeResources: releasing ca_blk 3331 with request rq_id 438629

[Thr 2216] DpCaRelBlk: released ca_blk 3331

[Thr 6184] MPI<7db>3#5 GetInbuf -1 204220 2184 (1) -> MPI_EOS: End Of Stream

[Thr 6184] IcmHandleMonitorMessage: called with opcode: ICM_COM_OP_MON_INFO (100)

[Thr 2216] MAIN TRACE END

[Thr 2216] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2 contains 0 requests of type NOWP

[Thr 6184] MPI<7da>4#4 GetOutbuf -1 1f41e0 65536 (0) -> 0000000015C44250 104857600 MPI_OK

[Thr 2216] SiSelNSelect: start select (timeout=-1)

[Thr 6184] MPI<7db>3#6 FreeInbuf#2 0 204220  0 -> MPI_OK

[Thr 6184] MPI<7da>4#5 FlushOutbuf -1 1 1 1f41e0 8302 6 -> 0000000015C44230 MPI_OK

[Thr 6184] IcmWorkerThread: Thread 9: Waiting for event

[Thr 6184] DpRqFreePendingRequests: freed 0 pending request

[Thr 2216] SiSelNNext: sock 5668 selected (revt=r--)

[Thr 2216] NiSelIListInsert: add hdl 25 [2] to sel-list (0) of set0

[Thr 2216] NiSelISelectInt: 1 handles selected (0 buffered)

[Thr 2216] MAIN TRACE BEGIN

[Thr 2216] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2 contains 1 requests of type NOWP

[Thr 2216] DpRqFreePendingRequests: freed 0 pending request

[Thr 2216] RqQQueueGetRequest: Get request of queue <IcmanQueue> in slot 2 (timeout=0)

[Thr 2216] RqQRequestFree: Free request in slot 63 (rq_id 438633)

[Thr 2216] RqQRequestSlotClear: clear slot 63

[Thr 2216] NiDgHdlRecvFrom: hdl 25 received 1 bytes from 127.0.0.1:56318

[Thr 2216] RqQQueueGetRequest: Eat one selectable handle wakeup  (id=255), 1. receive

[Thr 2216] RqQQueueGetRequest: Eat selectable handle wakeup for queue <IcmanQueue> in slot 2

[Thr 2216] RqQQueueGetRequest: Request rq_id 438633 found in queue <IcmanQueue> in slot 2

[Thr 2216] rq_id 438633

[Thr 2216] -IN-- ca_blk    3330         len       5180

[Thr 2216] -IN-- reqHdlId  REQ_HANDLER_PLUGIN_RESP

[Thr 2216] -IN-- sender address:

[Thr 2216] -IN-- type      LOCAL

[Thr 2216] -IN-- agentType WORKER       workerTyp DIA          workerNum 8

[Thr 2216] -IN-- session   T1_U15895_M1

[Thr 2216] -IN-- receiver address:

[Thr 2216] -IN-- type      LOCAL

[Thr 2216] -IN-- agentType ICMAN

[Thr 2216] DpCaBecomeOwnerOfBlk: become owner of ca_blk 3330

[Thr 2216] DpRqCopyAndMoveData: copying REQ_HANDLER_PLUGIN_RESP request (rq_id 438633, slot 310)

[Thr 2216] IcmHandleRequest: handle request from icman request queue (rq_id 438633)

[Thr 2216] NiBufIAlloc: malloc REQUEST, to 96 bytes

[Thr 2216] IcmHandleAdmMsg: op: ICM_COM_OP_ICM_MONITOR(66)

[Thr 2216] NiBufIAlloc: malloc NiBufadm, to 0 bytes

[Thr 2216] NiBufDup: ref 1 for buf 000000002EF3CE30

[Thr 2216] IcmCreateRequest: Append request 2344

[Thr 2216] IcmQueueAppend: queuelen:     1

[Thr 2216] NiBufFree: ref 1 for buf 000000002EF3CE30

[Thr 2216] DpRqFree: freeing REQ_HANDLER_PLUGIN_RESP request (rq_id 438633, slot 310)

[Thr 2216] DpRqFreeResources: releasing ca_blk 3330 with request rq_id 438633

[Thr 308] IcmWorkerThread: worker 4 got the semaphore

[Thr 308] REQUEST:

Wed Feb 04 04:35:30 2015

    Type: ADMMSG    Index = 2344

[Thr 308] MPI<7dd>3#5 GetInbuf -1 1f41e0 2184 (1) -> MPI_EOS: End Of Stream

[Thr 308] IcmHandleMonitorMessage: called with opcode: ICM_COM_OP_MON_INFO (100)

[Thr 308] MPI<7dc>4#4 GetOutbuf -1 204220 65536 (0) -> 0000000015C54290 104857600 MPI_OK

[Thr 2216] DpCaRelBlk: released ca_blk 3330

[Thr 308] MPI<7dd>3#6 FreeInbuf#2 0 1f41e0  0 -> MPI_OK

[Thr 2216] MAIN TRACE END

[Thr 308] MPI<7dc>4#5 FlushOutbuf -1 1 1 204220 8302 6 -> 0000000015C54270 MPI_OK

[Thr 2216] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2 contains 0 requests of type NOWP

[Thr 308] IcmWorkerThread: Thread 4: Waiting for event

[Thr 2216] SiSelNSelect: start select (timeout=-1)

[Thr 308] DpRqFreePendingRequests: freed 0 pending request

[Thr 9672] Wed Feb 04 04:35:31 2015

[Thr 9672] NiSelISelectInt: 0 handles selected (0 buffered)

[Thr 9672] WATCHDOG TRACE BEGIN

[Thr 9672] IcmWatchDogThread: Wakeup MPI Watchdog

[Thr 9672] MPI<22b>6#37030 WriteOOB 77

[Thr 9672] IcmWatchDogThread: check ni handles (timeout=5000)

[Thr 9772] MPI<22b>6#37031 PeekInbuf 0 0 0 (0) -> MPI_EOUTOFBAND: out-of-band message

[Thr 9772] MpiSelSelect( 2 -1 ) -> MPI_OK

[Thr 9672] WATCHDOG TRACE END

[Thr 9672] SiSelNFCSelect: start select (timeout=5000)

[Thr 9772] MPI WATCHDOG TRACE BEGIN

[Thr 9772] IcmMpiWatchDogThread: Wakeup OOB received

[Thr 9772] MPI<22b>6#37032 ReadOOB 77 -> MPI_OK

[Thr 9772] IcmMpiWatchDogThread: call MpiSelSelect

[Thr 9772] MPI WATCHDOG TRACE END

[Thr 9772] MPI<22b>6#37033: GetInbuf: check avail. buffers 0 0

[Thr 9772] MPI<22b>6#37033 PeekInbuf 0 0 0 (0) -> MPI_EAGAIN: resource busy

[Thr 9772] MpiSelect: 0 waiting for events

[Thr 9440] Wed Feb 04 04:35:33 2015

[Thr 9440] SiSelNSelect: of 1 sockets 0 selected

[Thr 9440] IcmProxyWatchDog: check sockets (timeout=10000)

[Thr 9440] SiSelNSelect: start select (timeout=10000)

[Thr 2216] Wed Feb 04 04:35:34 2015

[Thr 2216] SiSelNNext: sock 5668 selected (revt=r--)

[Thr 2216] NiSelIListInsert: add hdl 25 [2] to sel-list (0) of set0

[Thr 2216] NiSelISelectInt: 1 handles selected (0 buffered)

[Thr 2216] MAIN TRACE BEGIN

[Thr 2216] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2 contains 1 requests of type NOWP

[Thr 2216] DpRqFreePendingRequests: freed 0 pending request

[Thr 2216] RqQQueueGetRequest: Get request of queue <IcmanQueue> in slot 2 (timeout=0)

[Thr 2216] RqQRequestFree: Free request in slot 63 (rq_id 438636)

[Thr 2216] RqQRequestSlotClear: clear slot 63

[Thr 2216] NiDgHdlRecvFrom: hdl 25 received 1 bytes from 127.0.0.1:53104

[Thr 2216] RqQQueueGetRequest: Eat one selectable handle wakeup  (id=0), 1. receive

[Thr 2216] RqQQueueGetRequest: Eat selectable handle wakeup for queue <IcmanQueue> in slot 2

[Thr 2216] RqQQueueGetRequest: Request rq_id 438636 found in queue <IcmanQueue> in slot 2

[Thr 2216] rq_id 438636

[Thr 2216] -IN-- ca_blk    2331         len       5180

[Thr 2216] -IN-- reqHdlId  REQ_HANDLER_PLUGIN_RESP

[Thr 2216] -IN-- sender address:

[Thr 2216] -IN-- type      LOCAL

[Thr 2216] -IN-- agentType WORKER       workerTyp DIA          workerNum 5

[Thr 2216] -IN-- session   T1_U15895_M0

[Thr 2216] -IN-- receiver address:

[Thr 2216] -IN-- type      LOCAL

[Thr 2216] -IN-- agentType ICMAN

[Thr 2216] DpCaBecomeOwnerOfBlk: become owner of ca_blk 2331

[Thr 2216] DpRqCopyAndMoveData: copying REQ_HANDLER_PLUGIN_RESP request (rq_id 438636, slot 311)

[Thr 2216] IcmHandleRequest: handle request from icman request queue (rq_id 438636)

[Thr 2216] IcmHandleRequest: connect to prot/host/serv 2/my306963.crm.ondemand.com/443

[Thr 2216] NiBufIAlloc: malloc REQUEST, to 2164 bytes

[Thr 2216] IcmHandleAdmMsg: op: ICM_COM_OP_CONNECT(4)

[Thr 2216] MPI<7df>3#5 PeekSelectInbuf -1 0 3648 (1) -> MPI_EOS: End Of Stream

[Thr 2216] IcmHandleAdmMsg: need new slot

[Thr 2216] NiBufIAlloc: malloc NiBufadm, to 0 bytes

[Thr 2216] NiBufDup: ref 1 for buf 000000002EF410B0

[Thr 2216] IcmCreateRequest: Append request 2345

[Thr 2216] IcmQueueAppend: queuelen:     1

[Thr 2216] NiBufFree: ref 1 for buf 000000002EF410B0

[Thr 2216] DpRqFree: freeing REQ_HANDLER_PLUGIN_RESP request (rq_id 438636, slot 311)

[Thr 2216] DpRqFreeResources: releasing ca_blk 2331 with request rq_id 438636

[Thr 2216] DpCaRelBlk: released ca_blk 2331

[Thr 2216] MAIN TRACE END

[Thr 2216] RqQQueueGetNumberOfRequests: Queue <IcmanQueue> in slot 2 contains 0 requests of type NOWP

[Thr 2216] SiSelNSelect: start select (timeout=-1)

[Thr 1744] IcmWorkerThread: worker 2 got the semaphore

[Thr 1744] REQUEST:

    Type: CONNECT_TO_SERV    Index = 2345

[Thr 1744] IcmConnConnect: allocate new conn slot

[Thr 1744] IcmConnCheckStoredClientConn: check for client conn timeout

[Thr 1744] IcmConnCheckStoredClientConn: next client timeout check in 10 sec

[Thr 1744] Wed Feb 04 04:35:34 2015

[Thr 1744] IcmConnAllocContext: context 4 allocated

[Thr 1744] REQ TRACE BEGIN: 4/2191/1

[Thr 1744] MPI<7df>3#6 PeekSelectInbuf -1 0 3648 (1) -> MPI_EOS: End Of Stream

[Thr 1744] IcmConnAssignContext: searching for context:

[Thr 1744]     tid: 1, uid: 15895, mode: 0

[Thr 1744] IcmConnAssignContext: no context assigned

[Thr 1744] IcmConnConnect: context 4 assigned to tid: 1, uid: 15895, mode: 0

[Thr 1744]     keep_alive_timeout: 10, proc_timeout: 0, wp_timeout: 500

[Thr 1744] IcmGetServicePtr: CFCECCDEV.hqm.com:443 - new serv_ref_count: 1

[Thr 1744] IcmIConnConnect: direct connect to my306963.crm.ondemand.com:443

[Thr 1744] addrinfo of 'my306963.crm.ondemand.com':

[Thr 1744] 0: 169.145.64.30:0 'wd-nsq-e.crm.ondemand.com' <unknown socket type 0> (0-2-0-0-16)

[Thr 1744] NiHLGetNodeAddr: got hostname 'my306963.crm.ondemand.com' from operating system

[Thr 1744] NiIGetNodeAddr: hostname 'my306963.crm.ondemand.com' = addr 169.145.64.30

[Thr 1744] NiIGetServNo: servicename '443' = port 443

[Thr 1744] NiICreateHandle: hdl 116 state NI_INITIAL_CON

[Thr 1744] NiIInitSocket: set default settings for new hdl 116/sock 8332 (I4; ST)

[Thr 1744] NiIBlockMode: set blockmode for hdl 116 FALSE

[Thr 1744] NiIConnectSocket: hdl 116 is connecting to 169.145.64.30:443 (timeout=5000)

[Thr 1744] SiPeekPendConn: connection of sock 8332 established

[Thr 1744] NiICheckPendConnection: connection of hdl 116 to 169.145.64.30:443 established

[Thr 1744] NiIConnect: hdl 116 took local address 10.202.1.30:61517

[Thr 1744] NiIConnect: state of hdl 116 NI_CONNECTED

[Thr 1744] IcmIConnConnect: Connect to host: my306963.crm.ondemand.com, service: 443, SAP_O_K(0)

[Thr 1744] ->> SapSSLSessionInit(&sssl_hdl=000000002ED21870, role=1 (CLIENT), auth_type=3 (USE_CLIENT_CERT))

[Thr 1744] <<- SapSSLSessionInit()==SAP_O_K

[Thr 1744]      in: args = "role=1 (CLIENT), auth_type=3 (USE_CLIENT_CERT)"

[Thr 1744]     out: sssl_hdl = 000000002EF48250

[Thr 1744] ->> SapSSLSetNiHdl(sssl_hdl=000000002EF48250, ni_hdl=116)

[Thr 1744]   SSL NI-hdl 116: local=10.202.1.30:61517  peer=169.145.64.30:443

[Thr 1744] <<- SapSSLSetNiHdl(sssl_hdl=000000002EF48250, ni_hdl=116)==SAP_O_K

[Thr 1744] ->> SapSSLSetSessionCredential(sssl_hdl=000000002EF48250, &cred_name=000000002EF3AD50)

[Thr 1744]   SapISSLComposeFilename(): Filename = "H:\usr\sap\ECD\DVEBMGS00\sec\SAPSSLA.pse"

[Thr 1744]   SecuSSL_SetSessionCred(): request for anonymous credentials

[Thr 1744] <<- SapSSLSetSessionCredential(sssl_hdl=000000002EF48250)==SAP_O_K

[Thr 1744]      in: cred_name = "H:\usr\sap\ECD\DVEBMGS00\sec\SAPSSLA.pse"

[Thr 1744] IcmConnInitClientSSL: using pse H:\usr\sap\ECD\DVEBMGS00\sec\SAPSSLA.pse, show client certificate if available

[Thr 1744] ->> SapSSLSetTargetHostname(sssl_hdl=000000002EF48250, &hostname=000000002EF3A440)

[Thr 1744] <<- SapSSLSetTargetHostname(sssl_hdl=000000002EF48250)==SAP_O_K

[Thr 1744] Wed Feb 04 04:35:34 2015

[Thr 1744]      in: hostname = "my306963.crm.ondemand.com"

[Thr 1744] ->> SapSSLSessionStart(sssl_hdl=000000002EF48250)

[Thr 1744] NiIBlockMode: set blockmode for hdl 116 TRUE

[Thr 1744] NiIBlockMode: set blockmode for hdl 116 FALSE

[Thr 1744] NiIHdlGetStatus: hdl 116/sock 8332 ok, no data pending

[Thr 1744] NiIBlockMode: set blockmode for hdl 116 TRUE

[Thr 1744]   SapISSLUseSessionCache(): Creating NEW session (0 cached)

[Thr 1744] *** ERROR during SecuSSL_SessionStart() from SSL_connnect()==SSL_ERROR_SSL

[Thr 1744]    session uses PSE file "H:\usr\sap\ECD\DVEBMGS00\sec\SAPSSLA.pse"

[Thr 1744] SecuSSL_SessionStart: SSL_connnect() failed  (536872221/0x2000051d)

[Thr 1744]    => "SSL API error"

[Thr 1744] >> ---------- Begin of Secu-SSL Errorstack ---------- >>

[Thr 1744] 0x2000051d | SAPCRYPTOLIB | SSL_connect

[Thr 1744] SSL API error

[Thr 1744] Failed to verify peer certificate. Peer not trusted.

[Thr 1744] 0xa0600203 | SSL | ssl_verify_peer_certificates

[Thr 1744] Peer not trusted

[Thr 1744] 0xa0600297 | SSL | ssl_cert_checker_verify_certificates

[Thr 1744] peer certificate (chain) is not trusted

[Thr 1744] Certificate:

[Thr 1744]   Certificate:

[Thr 1744]       Subject     :CN=*.crm.ondemand.com, OU=SAP Cloud Managed Services, O=SAP AG, L=Walldorf, SP=Baden-Wuerttemberg, C=D

[Thr 1744]       Issuer      :CN=Cybertrust SureServer Standard Validation CA, O=Cybertrust Inc

[Thr 1744]       Serial number:0x0200000000014b067382351c1b76

[Thr 1744]       Validity:

[Thr 1744]         Not before  :Tue Jan 20 03:26:49 2015

[Thr 1744]         Not after   :Tue Apr  4 09:18:11 2017

[Thr 1744]       Key:

[Thr 1744]         Key type    :rsaEncryption (1.2.840.113549.1.1.1)

[Thr 1744]         Key size    :2048

[Thr 1744]       PK_Fingerprint_MD5:BF39 8BBE 0132 6B23 B60F 3165 01D1 C05F

[Thr 1744]       extensions:

[Thr 1744]         AuthorityKeyId:

[Thr 1744]           Significance:Non critical

[Thr 1744]           Value:

[Thr 1744]             Key identifier (size="20" ):CD3A969FAE6E0F405C1C48F84B2DB87101EB89DA

[Thr 1744]         SubjectKeyIdentifier:

[Thr 1744]           Significance:Non critical

[Thr 1744]           Value        (size="20" ):D25F5F6A4A1F510827AE933B0A5C52B61646CE68

[Thr 1744]         Key usage:

[Thr 1744]           Significance:Critical

[Thr 1744]           Value:

[Thr 1744]             digitalSignature

[Thr 1744]             keyEncipherment

[Thr 1744]         Extended key usage:

[Thr 1744]           Significance:Non critical

[Thr 1744]           Value:

[Thr 1744]             element#no="1":ServerAuthentication (1.3.6.1.5.5.7.3.1)

[Thr 1744]             element#no="2":ClientAuthentication (1.3.6.1.5.5.7.3.2)

[Thr 1744]         Alternative names:

[Thr 1744]           Significance:Non critical

[Thr 1744]           Value:

[Thr 1744]             element#no="1":

[Thr 1744]               GN-dNSName  :*.crm.ondemand.com

[Thr 1744]         Basic constraints:

[Thr 1744]           Significance:Non critical

[Thr 1744]           Value:

[Thr 1744]             Allowed as cA:False

[Thr 1744]         CRL distribution points:

[Thr 1744]           Significance:Non critical

[Thr 1744]           Value:

[Thr 1744]             element#no="1":

[Thr 1744]               distribution point:

[Thr 1744]                 full name:

[Thr 1744]                   element#no="1":

[Thr 1744]                     GN-uRI      :http://crl.omniroot.com/SureServerG2.crl

[Thr 1744]         Non supported extension:

[Thr 1744]           element#no="1":

[Thr 1744]             Type        :netscape-cert-type (2.16.840.1.113730.1.1)

[Thr 1744]             Value:

[Thr 1744]               BitString    ( size="2" 😞

[Thr 1744]     Signature algorithm:sha1WithRsaEncryption (1.2.840.113549.1.1.5)

[Thr 1744]     Fingerprint_MD5:06:BE:04:7A:B5:72:C5:34:8D:9D:C7:FA:90:E4:53:F3

[Thr 1744]     Fingerprint_SHA1:FF9F 8A1A ED1D 432D 8D57 323C E64F A394 4D2C 1543

[Thr 1744]   Verification result:

[Thr 1744]     Status      :Not successful

[Thr 1744]     Profile     :1.3.6.1.4.1.694.2.2.2.2

[Thr 1744]     SignerStatus:Not successful

[Thr 1744]     SignerVerificationResult:

[Thr 1744]       element#no="1":

[Thr 1744]         Status      :Not successful

[Thr 1744]         Validity    :Successful

[Thr 1744]         BasicConstraints:Successful

[Thr 1744]         KeyUsage    :Successful

[Thr 1744]         ObjectStatus:Not successful

[Thr 1744]         SignerCert:

[Thr 1744]           Certificate:

[Thr 1744]               Subject     :CN=Cybertrust SureServer Standard Validation CA, O=Cybertrust Inc

[Thr 1744]               Issuer      :CN=GTE CyberTrust Global Root, OU="GTE CyberTrust Solutions, Inc.", O=GTE Corporation, C=US

[Thr 1744]               Serial number:0x07271446

[Thr 1744]               Validity:

[Thr 1744]                 Not before  :Wed Apr  4 09:18:37 2007

[Thr 1744]                 Not after   :Tue Apr  4 09:18:11 2017

[Thr 1744]               Key:

[Thr 1744]                 Key type    :rsaEncryption (1.2.840.113549.1.1.1)

[Thr 1744]                 Key size    :2048

[Thr 1744]               PK_Fingerprint_MD5:36E3 AD02 C1AA 3FD6 FC83 E008 0E6A 380A

[Thr 1744]               extensions:

[Thr 1744]                 AuthorityKeyId:

[Thr 1744]                   Significance:Non critical

[Thr 1744]                   Value:

[Thr 1744]                     CertificateIssuer:

[Thr 1744]                       element#no="1":

[Thr 1744]                         GN-directoryName:CN=GTE CyberTrust Global Root, OU="GTE CyberTrust Solutions, Inc.", O=GTE Corpor

[Thr 1744]                     Issuers serial number (size="2" ):01A5

[Thr 1744]                 SubjectKeyIdentifier:

[Thr 1744]                   Significance:Non critical

[Thr 1744]                   Value        (size="20" ):CD3A969FAE6E0F405C1C48F84B2DB87101EB89DA

[Thr 1744]                 Key usage:

[Thr 1744]                   Significance:Critical

[Thr 1744]                   Value:

[Thr 1744]                     keyCertSign

[Thr 1744]

[Thr 1744] << ---------- End of Secu-SSL Errorstack ----------

kamran_farooqui
Contributor
0 Kudos

Hello,

I had resolved the above error but encountering the below error in C4C and as well as ECC.

Please advise, below are the screenshots;

0 Kudos

Hi K.F.,

I think this is a support case for which you should create an OSS message from your ERP system so that SAP can analyze your issue in detail.

Regards,

Gerald


kamran_farooqui
Contributor
0 Kudos

Thanks Guys, Issue resolved.

Nike
Explorer
0 Kudos

Hi Kamran,

how did you resolve the ERP error message?

Thanks a lot.

Regards,

Nike

kamran_farooqui
Contributor
0 Kudos

Hi Nike,

Yes Issue was resolved and now I can see orders in C4C, though I had expected more than what SAP is providing.

I mean I was expecting to see full order (line items etc.) but it just shows header only.

Regards,

K.F.

Nike
Explorer
0 Kudos

Hi Kamran,

thanks for your reply.

But I would like to know how you resolved this issue?

I am receiving the same error message.

Thanks a lot.

Best regards.

Nike

Former Member
0 Kudos

Hi Mithun,


What Middleware did you use PI / HCI?


Regards,

Sandeep