AS2 FAQs

 



Ques: Why are the AS1 and AS2 standards important?

Ans: Standards such as AS1 and AS2 simplify communication by reducing the number of technologies an organization must support and manage. If every large organization used a different data transport standard, it would be cost-prohibitive for their smaller business partners to exchange data with them electronically. AS1 and AS2 allow organizations to implement one solution for data exchange with all business partners who are using an AS1 or AS2 solution.

Ques: What are the benefits of AS2 for a small to medium-size supplier?

Ans: Benefits of AS2 for a small to medium-size supplier are listed here under:

UCCnet-interoperable
  • A standard supported by the Uniform Code Council (UCC) and others
  • Many AS2 solutions have been certified by the Drummond Group
  • Easy to connect trading partners
Cost-effective
  • Leverages the Internet to reduce VAN fees
  • Does not require expensive hardware like bisync
Extendable
  • Leverages the Internet to exchange transactions other than EDI, such as POS and sales forecasts that have traditionally been too expensive to send over a VAN
Secure
  • Offers security and non-repudiation via digital certificates
  • Uses SSL to secure the transport pipe
Speed & efficiency
  • Offers near real-time transaction processing
  • Immediate transaction receipt acknowledgment
  • Up to 200 times faster than bisync
  • More dependable than bisync
Control
  • You control transaction management
  • You handle and manage your valuable data
  • You control the transport schedule (batch processing and transport are possible)
  • You receive immediate feedback from partners
Support
  • Quick to set-up
  • Easier to support and maintain compared to direct bisync
  • AS2 is the first step required for UCCnet Communication certification

Ques: A major retailer (e.g., Wal-Mart) has decided that its suppliers must use AS2 to exchange Internet EDI documents. With all the options out there and little time to make a decision, what should I consider as I evaluate AS2 software solutions?

Ans: Driven by industry leaders, trading partners are moving to AS2 Internet EDI solutions to exchange business documents. This trend means that your Internet EDI solution should provide the flexibility and scalability to grow with your trading community.

Quality Internet EDI software solutions for suppliers provide much more than simple send/receive functionality. Because simple send/receive functionality is rarely sufficient, important features include:

  • Trading Partner Management with partner profiles that support security certificates
  • Transaction management, tracking, aging, reporting and audit trails
  • Configurable message alerts and notification
  • Flexible rules for document routing
  • A database for setup, configuration and trading partner and transaction data
  • Flexibility to set-up multiple transport protocols (AS1, AS2, FTP, HTTP, SMTP/POP3) with each trading partner (with no additional software or cost)
  • Flexibility to exchange more than just EDI documents (with no additional software or cost)

Ques: I have heard about Internet EDI (AS1/AS2) Interoperability Certified software. How do I know that the Internet EDI software that I use will work with the software that my trading partners use?

Ans: Internet EDI Interoperability Certification is extremely important. It is the ONLY way that you can be certain that your Internet EDI solution will successfully exchange documents with your trading partners. You and your trading partners could have Internet EDI software from different vendors; interoperability certification indicates that the solutions have been tested and confirmed to work together. The Drummond Group is the organization that conducts the tests and provides certification for Internet EDI.

Because standards are updated periodically and some software vendors may change the AS2 components of their software, it is equally important to make sure that the software passed the latest round of interoperability testing.

Ques: What if I need to exchange data or documents other than EDI with my trading partners?

Ans: Choose an Internet EDI solution that handles all variations of EDI and XML formats, including cXML, ebXML and binary or flat files. Many software solutions for Internet EDI only support AS1 or AS2.

Ques: How does an Internet EDI solution help my company use UCCnet?

Ans: Information is exchanged with UCCnet as XML via the AS2 Internet EDI protocol. A few software vendors are certified UCC Solution Partners, providing communication and message translation capabilities.

Ques: What type of data can I transmit with AS1 and AS2?

Ans: Virtually any data. AS1 and AS2 are transport mechanisms and are not tied to any specific data format. Both AS1 and AS2 will work with almost any data type, including EDI, XML, TXT, DOC, XLS and ebXML.

Ques: Are my business documents safe? How secure is Internet EDI (AS2)?

Ans: Your business documents are very safe. AS2 provides privacy, authentication, integrity and non-repudiation.

  • Privacy. Message content privacy is provided via data encryption so that a document can only be viewed by the Sender and the Receiver.
  • Authentication. A Sender's digital signature ensures that the Sender is actually who they claim to be.
  • Integrity. Hash totals are enclosed in Message Disposition Notifications (MDNs) so that a document cannot be altered without the Receiver detecting a change.
  • Non-repudiation. A signed MDN is a receipt acknowledgment that serves as proof that a document was in fact received by the Receiver.

Ques: How is security over the Internet handled?

Ans: Security issues:-

  • Encryption. Socket/Transport Based or Data Encryption - When referring to Internet EDI transport protocols (AS1 and AS2), encrypts both the socket and the payload.
  • Public and private key encryption. Supports both public and private encryption.
  • Certificate authority. Choose the source of the digital certificates from a Certificate Authority or a self-signed certificate generator.

Ques: Why is secure data transport important?

Ans: Security is an issue for any organization transmitting data electronically. Business data exchanged via the Internet typically includes sensitive information, such as inventory or sales figures, intended for a specific person at a specific organization. For this reason, it is important that data transmissions address privacy, access control and data integrity.

Ques: How easy is it to set-up and use Internet EDI software?

Ans: Our Internet EDI software solution, BizManager?, provides Setup Wizards to walk you through the process of setting up trading partner profiles and transport protocols. You can set-up and exchange EDI documents in as little as 15 minutes. Your installation may take longer depending on your business and technical requirements.

Ques: There are several people who will need to have access to the Internet EDI software. Can I install the software on multiple PCs?

Ans: With a web application you only need to install the software on one computer. There is no need to install or maintain software on multiple PCs. Users access the web application via a web browser (e.g., Microsoft Internet Explorer). For security, only users who are granted rights have access to the web application.

 

Step 1: AS2 Sender transmits document to AS2 Receiver

The document is first prepared by the AS2 Sender. While you will generally establish the format of the document with your trading partner, the actual contents of the document are independent of the AS2 protocol itself. You can trade baseball statistics in text files, and it is still technically AS2.

The sender of the document then optionally (but usually) S/MIME signs the document. The purpose of the signing of the document is three-fold. First, it establishes without a doubt that the AS2 Sender is the true sender of the document; only the sender of the document is capable of generating a signature that can be decrypted with the public key of the sender. Second, because the signature is created based on the contents of the document, you are gauranteed that the integrity of the document was preserved. If some nefarious third party intercepted the data and altered its contents, the signature and the document would not match. Third, by establishing that the AS2 Sender is the true sender of the document, the Receiver also establishes that the Sender *must* have knowingly sent the document. The sender cannot later deny that the document was sent if a signature is available stating otherwise.

The sender of the document then optionally (but again, usually) S/MIME encrypts the document. Encryption is done one-way so that only the receiver of the message is capable of decrypting the message; not even the sender of the message can decrypt the document once encrypted. An appropriate analogy would be one involving an opened combination padlock. Anyone with the public key (the padlock) is capable of encrypting a document (closing the padlock), but only the owner of the private key (the combination to the padlock) can decrypt it.

The message is then sent over HTTP or HTTPS to a server that the receiver is hosting. Generally, HTTPS is only used if S/MIME encryption is not, but it is possible to choose any option. It is of note that the encryption used by the S/MIME encryption is stronger than that used in HTTPS, but HTTPS encryption is less processor intensive and uses temporary session keys that expire after the session.

Step 2: AS2 Receiver acknowledges the document with a receipt

After the transfer of the document, a receipt is sent to the sender. The receipt is always signed for the same reasons that the document is, but it can be transferred a number of ways. The AS2 sender determines this when the document is sent.

A synchronous receipt is one that is sent over the same HTTP/HTTPS connection before the connection is closed. This is the easiest option for the sender, and is generally not a problem for smaller documents that are very quickly processed.

An asynchonous receipt is sent seperately, and if this option in used, the HTTP/HTTPS connection is closed almost immediately after the transfer of the document. An asynchronous receipt can be sent a few ways, the most common of which are HTTP, HTTPS and email (SMTP). If HTTP or HTTPS is used, the AS2 Sender provides the HTTP server for the AS2 Receiver to connect to. If SMTP is used, the AS2 Sender provides an email address which the AS2 Receiver should send to.

Back