Skip to Content
author's profile photo Former Member
Former Member

R3 to Oracle interface

Hi,

To create a B2B scenario, R3 --> XI --> Oracle Database......What are the adaptors used at the sender end and at the receiver end.

Is it right to use BAPI/IDOC at the sender end (for R3) and JDBC at the Receiver end.

But B2B scenarios are done through the firewalls. So, are IDOC/RFC and JDBC adaptors have security configurations?

If not, what adaptors can be used?

Thanks in Advance, I will assign points.

Add a comment
10|10000 characters needed characters exceeded

Assigned Tags

Related questions

2 Answers

  • Best Answer
    author's profile photo Former Member
    Former Member
    Posted on Oct 18, 2006 at 11:20 PM

    Hi San,

    below sap Help will give you an Good idea for Reaciver Jdbc Adapter when you r desiging interface between SAPr/3 --> Oralce.

    http://help.sap.com/saphelp_nw04/helpdata/en/2e/96fd3f2d14e869e10000000a155106/content.htm.

    Here are few web logs will give you an idea

    /people/laxman.molugu/blog/2006/08/13/integration-with-databases-made-easy-150-part-1

    /people/sriram.vasudevan3/blog/2005/02/14/calling-stored-procs-in-maxdb-using-sap-xi

    /people/alessandro.berta/blog/2005/10/04/save-time-with-generalized-jdbc-datatypes

    http://help.sap.com/saphelp_nw04/helpdata/en/2e/96fd3f2d14e869e10000000a155106/content.htm..

    /people/thorsten.nordholmsbirk/blog/2006/07/25/structuring-integration-repository-content--part-1-software-component-versions

    Hope these Info will help you.

    Regd's

    Hari

    Add a comment
    10|10000 characters needed characters exceeded

    • Hi,

      From your Other Thread ....

      >>>I do have the same question. For IDOC --> XI --> Oracle, (B2B) scenario what are the adaptors used in the sender and receiver side that are secure.

      1) IDOC - from Sender side

      2) JDBC from reciever side

      >>>I don't really have to create a communication channel for the sender right?

      yes, Since IDOC is ABAP Stack.

      >>>But B2B scenarios are done through the firewalls

      So the Firewall systems pass the your systems with the defined port. The Port is defined by you .Mean time JDBC is secured one to my knowledge.

      Regards

      Agasthuri Doss

  • author's profile photo Former Member
    Former Member
    Posted on Oct 19, 2006 at 12:54 AM

    Hi San,

    A useful blog..

    /people/udo.martens/blog/2005/09/30/one-logical-system-name-for-serveral-bpm-acknowledgements

    cheers,

    Prashanth

    P.S Please mark helpful answers

    Add a comment
    10|10000 characters needed characters exceeded

Before answering

You should only submit an answer when you are proposing a solution to the poster's problem. If you want the poster to clarify the question or provide more information, please leave a comment instead, requesting additional details. When answering, please include specifics, such as step-by-step instructions, context for the solution, and links to useful resources. Also, please make sure that you answer complies with our Rules of Engagement.
You must be Logged in to submit an answer.

Up to 10 attachments (including images) can be used with a maximum of 1.0 MB each and 10.5 MB total.