This chapter describes how to construct SOAP messages to process transactions with CyberSource using PHP 5.2.1. It provides instructions for downloading required third-party software, extending the SoapClient class to add WS-Security headers, and testing transactions using sample code provided. Developers can then modify the script and client code to integrate it with their application.
EnterpriseView 2.0 REST API Developer's GuideProtect724gopi
This document provides a REST API developer guide for HP EnterpriseView 2.0. It includes an overview of the REST API for importing and exporting asset data, HTTP return codes and error messages. It also includes examples of using the REST API with Spring, including retrieving an asset ID, updating a P5 assessment score, and references various REST resources like compliance score, aggregate scores, and asset reconciliation.
Introduction to Developing Android Apps With the Salesforce Mobile SDKSalesforce Developers
This session will show mobile developers how to build enterprise Android applications using our new Salesforce Mobile SDK. Not only will users be shown how to use the new features and functions of the SDK but we'll also dive into best practices for building mobile APIs focussed on enterprise business applications.
ESM Service Layer Developers Guide for ESM 6.8cProtect724gopi
The document provides information about developing REST clients for ArcSight ESM services. It discusses finding a list of available services from the core-service and manager-service, using proper namespaces in requests, preparing the URL, request body, and sending HTTP requests. Examples are also provided on using various ESM services through REST calls.
ESM Service Layer Developer's Guide (ESM v6.9.1c)Protect724tk
This document provides guidelines for developing REST clients to access ESM services via the ArcSight Service Layer APIs. It includes an overview of the SDK installation files, the ESM resources exposed as web services, Javadoc documentation locations, and how to set up a development environment. The document then describes how to develop REST clients, including finding and listing available services, preparing HTTP requests, sending requests, parsing responses, and examples of using specific ESM services.
This document discusses how SMS can be used to take Android apps offline. It provides examples of apps for finding low prices and searching Twitter hashtags that work offline through SMS. The txtWeb platform is introduced as a way for developers to build text-based apps that can be accessed through SMS without an internet connection using a simple API. Code examples are given for integrating SMS into apps and the overall workflow of the txtWeb platform is outlined.
Biz Talk Adapter Pack 2 0 Oracle Ebs Adapter Data Sheetkaushiksin
The Oracle E-Business Suite Adapter allows connectivity between Oracle E-Business Suite and other applications. It exposes Oracle E-Business Suite artifacts as web services and supports interfaces, APIs, datatypes and multi-language features. The adapter will be included in the upcoming BizTalk Adapter Pack 2.0 alongside a SQL Server adapter.
The document provides an overview of the technical capabilities of the InfoRouter content management system. It describes how InfoRouter is standards-based, scalable, secure, entirely web-based, browser independent, supports multiple document formats and languages, integrates with LDAP directories, and has a distributed architecture. It also discusses features like metadata services, web portals, live updating, and integration with web services APIs.
EnterpriseView 2.0 REST API Developer's GuideProtect724gopi
This document provides a REST API developer guide for HP EnterpriseView 2.0. It includes an overview of the REST API for importing and exporting asset data, HTTP return codes and error messages. It also includes examples of using the REST API with Spring, including retrieving an asset ID, updating a P5 assessment score, and references various REST resources like compliance score, aggregate scores, and asset reconciliation.
Introduction to Developing Android Apps With the Salesforce Mobile SDKSalesforce Developers
This session will show mobile developers how to build enterprise Android applications using our new Salesforce Mobile SDK. Not only will users be shown how to use the new features and functions of the SDK but we'll also dive into best practices for building mobile APIs focussed on enterprise business applications.
ESM Service Layer Developers Guide for ESM 6.8cProtect724gopi
The document provides information about developing REST clients for ArcSight ESM services. It discusses finding a list of available services from the core-service and manager-service, using proper namespaces in requests, preparing the URL, request body, and sending HTTP requests. Examples are also provided on using various ESM services through REST calls.
ESM Service Layer Developer's Guide (ESM v6.9.1c)Protect724tk
This document provides guidelines for developing REST clients to access ESM services via the ArcSight Service Layer APIs. It includes an overview of the SDK installation files, the ESM resources exposed as web services, Javadoc documentation locations, and how to set up a development environment. The document then describes how to develop REST clients, including finding and listing available services, preparing HTTP requests, sending requests, parsing responses, and examples of using specific ESM services.
This document discusses how SMS can be used to take Android apps offline. It provides examples of apps for finding low prices and searching Twitter hashtags that work offline through SMS. The txtWeb platform is introduced as a way for developers to build text-based apps that can be accessed through SMS without an internet connection using a simple API. Code examples are given for integrating SMS into apps and the overall workflow of the txtWeb platform is outlined.
Biz Talk Adapter Pack 2 0 Oracle Ebs Adapter Data Sheetkaushiksin
The Oracle E-Business Suite Adapter allows connectivity between Oracle E-Business Suite and other applications. It exposes Oracle E-Business Suite artifacts as web services and supports interfaces, APIs, datatypes and multi-language features. The adapter will be included in the upcoming BizTalk Adapter Pack 2.0 alongside a SQL Server adapter.
The document provides an overview of the technical capabilities of the InfoRouter content management system. It describes how InfoRouter is standards-based, scalable, secure, entirely web-based, browser independent, supports multiple document formats and languages, integrates with LDAP directories, and has a distributed architecture. It also discusses features like metadata services, web portals, live updating, and integration with web services APIs.
Una presentacion muy rapida y por eso nunca finalizada acerca de Windows Server Federation Services en Windows Server 2008, aunque tiene muchas fallas en el uso de informacion como la mezcla de idiomas, o muchos datos plasmados en el slide, puede servir de base para otra presentacion mejor
Ca site minder r12 professional study guideNitish Nagar
This document provides study materials for the CA SiteMinder r12 Professional Exam (CAT-140). It includes information about the exam structure, objectives covered, recommended training courses, and sample exam questions. The exam focuses on understanding CA SiteMinder services and functions, protecting web applications, administering and configuring CA SiteMinder, implementing various features, and troubleshooting. It aims to validate skills in managing, administering and implementing CA SiteMinder products.
Leveraging New Features in CA Single-Sign on to Enable Web Services, Social S...CA Technologies
CA Single Sign-On (CA SSO) is constantly evolving, incorporating the latest technologies in secure Web access management. In order to stay secure and competitive, CA SSO makes greater use of the CA Access Gateway (formerly CA SiteMinder Secure Proxy Server). This presentation provides a comprehensive overview of the new features in CA Single Sign On.
For more information on CA Security solutions, please visit: http://bit.ly/10WHYDm
F5's application traffic management products can enhance web server deployments in several ways:
1) They provide load balancing, security, and optimization to improve performance, availability, and scalability of web servers.
2) Features like intelligent compression, caching, and TCP optimization offload processing from web servers to increase efficiency.
3) Solutions like the BIG-IP system and FirePass controller ensure secure remote access to web applications and content.
O365con14 - information protection and control in office 365NCCOMMS
This document provides an overview of data loss prevention and rights management features in Microsoft 365. It discusses implementing more or less restrictive controls based on data sensitivity. New transport rule conditions and actions are introduced, including total message size filtering. Deep content analysis and predefined rules help identify and protect sensitive data. Rights management allows controlling data access and usage through encryption and usage rights. Integrations with Azure Active Directory and on-premises Active Directory are covered.
SharePoint 2010 Service Application Architecture_ Ayman El-Hattab,MVPAyman El-Hattab
The document discusses SharePoint 2010 service application architecture. It explains that service applications provide shared services and resources to sites in a configurable way. Service applications can be deployed individually and sites select which ones to consume. This allows for scaling and isolation of services across farms. The document outlines several core service applications and how to manage, develop, and configure them.
WebRTC(Web Real-Time Communications) is a web technology that allows users to make video/audio communications natively over the web. Join us as we explain WebRTC and show you how to use it in a demo app running on the Force.com Platform.
This document provides an introduction to the Salesforce Mobile SDK for Android. It discusses how mobile device usage is growing significantly, with many users relying on multiple devices for both work and personal use. The Mobile SDK provides tools to accelerate native, hybrid, and HTML5 mobile app development on Android and iOS platforms. These tools include OAuth authentication, API wrappers, an app container, secure offline storage, and push notifications. A five minute example is provided showing how to use the Mobile SDK to create a basic Android app that integrates with the Salesforce platform through REST calls.
The document discusses big data, including what it is, key factors enabling its growth, and examples of tools and techniques used for big data. It also provides examples of big data applications in areas like recommendations, network monitoring, social media analysis, and discusses challenges like dealing with data volume, velocity, and complexity.
- User-based collaborative filtering uses the ratings of similar users to predict ratings for a target user. Similarity is commonly measured using Pearson correlation. Predictions are generated by taking a weighted average of similar users' ratings.
- Item-based collaborative filtering finds similar items to those a user has rated and uses the user's ratings of similar items to predict new ratings. Cosine similarity is commonly used to find similar items.
- Collaborative filtering approaches struggle with data sparsity as they require overlapping ratings between users or items to find similarities. Techniques like singular value decomposition aim to address this by reducing the user-item rating matrix to fewer factors to better capture similarities despite sparsity.
The document discusses best practices for designing REST APIs using the JAX-RS implementation CXF. It covers REST architectural principles, designing resources and URIs, representations with JSON and XML, errors, asynchronous processing, and transactions. The goal is to provide practical lessons learned from building the Syncope REST API to help others design RESTful services with CXF.
This document discusses the basic structure and purpose of SOAP messages. It begins by explaining that a SOAP message is an XML document that can be used to exchange data between applications. The core elements of a SOAP message are the Envelope and Body elements, which form the container for the payload data being exchanged. An example is provided of a simple SOAP message containing a purchase order payload. The document continues to describe additional details of SOAP including supported transport protocols, messaging patterns, and the role of XML namespaces in SOAP messages.
This document discusses content-based recommendation techniques. It begins by defining content-based recommendation as techniques that use properties of items themselves to make recommendations, as opposed to collaborative filtering which relies only on user ratings. It then describes how content-based profiling works by building a profile of a user's preferences based on the features of items they have rated. Finally, it provides examples of how naive Bayes classification and neural networks can be used to classify items for content-based recommendations based on feature frequencies.
The document discusses using Java objects to generate JSON. It provides an overview of the steps involved, including setting response headers, getting the Java object result, converting it to a JSONObject using the org.json utilities, and outputting the JSONObject. Code samples are given for a servlet that performs these steps. Specifically, it shows calling a business logic method to get a Java result, converting it to a JSONObject, and printing the JSONObject to the response.
This document provides a tutorial on SQLite, an open-source SQL database that does not require a separate server. It begins with an overview of SQLite and its features, then discusses how to install SQLite on different operating systems. The majority of the document describes SQLite syntax, commands, and statements for working with databases, tables, indexes, and data, including examples. It also covers data types and how to create, attach, and detach databases in SQLite.
This document provides an overview of the HttpClient library. It discusses the fundamentals of making HTTP requests and handling responses. It also covers more advanced topics like connection management, state management, authentication, caching, and asynchronous request execution. The document is intended to teach developers how to effectively utilize the full capabilities of the HttpClient library.
This document discusses setting up an intermediate WCF service to connect an Android application to Dynamics AX. It describes creating a WCF service that enables REST and outputs data as JSON for consumption by the Android application. The WCF service is configured to use authentication via headers and return AX data like item lists. The document also provides code samples for the WCF service interface and implementation, as well as the Android application code to call the service, parse the JSON response, and display it in a list view.
1) The document discusses IBM's Big Data platform which provides solutions for analyzing massive amounts of structured and unstructured data.
2) It includes offerings for Hadoop, streaming analytics, data warehousing, in-memory databases, and tools for information integration and governance.
3) The platform aims to help customers accelerate insights from their data, simplify big data adoption, and implement enterprise-grade big data systems.
This document provides an overview and summary of the Oracle Database SQL Reference manual. It includes information about the primary author and contributors, copyright details, and instructions that the document and programs are proprietary and protected. It also contains a table of contents listing the chapters and main topics covered in the manual such as datatypes, literals, format models, nulls, comments and hints.
Agent technology for e commerce-recommendation systemsAravindharamanan S
This document discusses recommender systems which provide recommendations to users based on their preferences and the preferences of similar users. It describes two main techniques for recommender systems: content-based filtering which provides recommendations based on a user's profile of interests, and collaborative filtering which identifies other users with similar tastes and provides recommendations based on their preferences. The document also discusses issues with recommender systems like data sparsity, cold start problems, and privacy concerns when user profiles are collected.
Una presentacion muy rapida y por eso nunca finalizada acerca de Windows Server Federation Services en Windows Server 2008, aunque tiene muchas fallas en el uso de informacion como la mezcla de idiomas, o muchos datos plasmados en el slide, puede servir de base para otra presentacion mejor
Ca site minder r12 professional study guideNitish Nagar
This document provides study materials for the CA SiteMinder r12 Professional Exam (CAT-140). It includes information about the exam structure, objectives covered, recommended training courses, and sample exam questions. The exam focuses on understanding CA SiteMinder services and functions, protecting web applications, administering and configuring CA SiteMinder, implementing various features, and troubleshooting. It aims to validate skills in managing, administering and implementing CA SiteMinder products.
Leveraging New Features in CA Single-Sign on to Enable Web Services, Social S...CA Technologies
CA Single Sign-On (CA SSO) is constantly evolving, incorporating the latest technologies in secure Web access management. In order to stay secure and competitive, CA SSO makes greater use of the CA Access Gateway (formerly CA SiteMinder Secure Proxy Server). This presentation provides a comprehensive overview of the new features in CA Single Sign On.
For more information on CA Security solutions, please visit: http://bit.ly/10WHYDm
F5's application traffic management products can enhance web server deployments in several ways:
1) They provide load balancing, security, and optimization to improve performance, availability, and scalability of web servers.
2) Features like intelligent compression, caching, and TCP optimization offload processing from web servers to increase efficiency.
3) Solutions like the BIG-IP system and FirePass controller ensure secure remote access to web applications and content.
O365con14 - information protection and control in office 365NCCOMMS
This document provides an overview of data loss prevention and rights management features in Microsoft 365. It discusses implementing more or less restrictive controls based on data sensitivity. New transport rule conditions and actions are introduced, including total message size filtering. Deep content analysis and predefined rules help identify and protect sensitive data. Rights management allows controlling data access and usage through encryption and usage rights. Integrations with Azure Active Directory and on-premises Active Directory are covered.
SharePoint 2010 Service Application Architecture_ Ayman El-Hattab,MVPAyman El-Hattab
The document discusses SharePoint 2010 service application architecture. It explains that service applications provide shared services and resources to sites in a configurable way. Service applications can be deployed individually and sites select which ones to consume. This allows for scaling and isolation of services across farms. The document outlines several core service applications and how to manage, develop, and configure them.
WebRTC(Web Real-Time Communications) is a web technology that allows users to make video/audio communications natively over the web. Join us as we explain WebRTC and show you how to use it in a demo app running on the Force.com Platform.
This document provides an introduction to the Salesforce Mobile SDK for Android. It discusses how mobile device usage is growing significantly, with many users relying on multiple devices for both work and personal use. The Mobile SDK provides tools to accelerate native, hybrid, and HTML5 mobile app development on Android and iOS platforms. These tools include OAuth authentication, API wrappers, an app container, secure offline storage, and push notifications. A five minute example is provided showing how to use the Mobile SDK to create a basic Android app that integrates with the Salesforce platform through REST calls.
The document discusses big data, including what it is, key factors enabling its growth, and examples of tools and techniques used for big data. It also provides examples of big data applications in areas like recommendations, network monitoring, social media analysis, and discusses challenges like dealing with data volume, velocity, and complexity.
- User-based collaborative filtering uses the ratings of similar users to predict ratings for a target user. Similarity is commonly measured using Pearson correlation. Predictions are generated by taking a weighted average of similar users' ratings.
- Item-based collaborative filtering finds similar items to those a user has rated and uses the user's ratings of similar items to predict new ratings. Cosine similarity is commonly used to find similar items.
- Collaborative filtering approaches struggle with data sparsity as they require overlapping ratings between users or items to find similarities. Techniques like singular value decomposition aim to address this by reducing the user-item rating matrix to fewer factors to better capture similarities despite sparsity.
The document discusses best practices for designing REST APIs using the JAX-RS implementation CXF. It covers REST architectural principles, designing resources and URIs, representations with JSON and XML, errors, asynchronous processing, and transactions. The goal is to provide practical lessons learned from building the Syncope REST API to help others design RESTful services with CXF.
This document discusses the basic structure and purpose of SOAP messages. It begins by explaining that a SOAP message is an XML document that can be used to exchange data between applications. The core elements of a SOAP message are the Envelope and Body elements, which form the container for the payload data being exchanged. An example is provided of a simple SOAP message containing a purchase order payload. The document continues to describe additional details of SOAP including supported transport protocols, messaging patterns, and the role of XML namespaces in SOAP messages.
This document discusses content-based recommendation techniques. It begins by defining content-based recommendation as techniques that use properties of items themselves to make recommendations, as opposed to collaborative filtering which relies only on user ratings. It then describes how content-based profiling works by building a profile of a user's preferences based on the features of items they have rated. Finally, it provides examples of how naive Bayes classification and neural networks can be used to classify items for content-based recommendations based on feature frequencies.
The document discusses using Java objects to generate JSON. It provides an overview of the steps involved, including setting response headers, getting the Java object result, converting it to a JSONObject using the org.json utilities, and outputting the JSONObject. Code samples are given for a servlet that performs these steps. Specifically, it shows calling a business logic method to get a Java result, converting it to a JSONObject, and printing the JSONObject to the response.
This document provides a tutorial on SQLite, an open-source SQL database that does not require a separate server. It begins with an overview of SQLite and its features, then discusses how to install SQLite on different operating systems. The majority of the document describes SQLite syntax, commands, and statements for working with databases, tables, indexes, and data, including examples. It also covers data types and how to create, attach, and detach databases in SQLite.
This document provides an overview of the HttpClient library. It discusses the fundamentals of making HTTP requests and handling responses. It also covers more advanced topics like connection management, state management, authentication, caching, and asynchronous request execution. The document is intended to teach developers how to effectively utilize the full capabilities of the HttpClient library.
This document discusses setting up an intermediate WCF service to connect an Android application to Dynamics AX. It describes creating a WCF service that enables REST and outputs data as JSON for consumption by the Android application. The WCF service is configured to use authentication via headers and return AX data like item lists. The document also provides code samples for the WCF service interface and implementation, as well as the Android application code to call the service, parse the JSON response, and display it in a list view.
1) The document discusses IBM's Big Data platform which provides solutions for analyzing massive amounts of structured and unstructured data.
2) It includes offerings for Hadoop, streaming analytics, data warehousing, in-memory databases, and tools for information integration and governance.
3) The platform aims to help customers accelerate insights from their data, simplify big data adoption, and implement enterprise-grade big data systems.
This document provides an overview and summary of the Oracle Database SQL Reference manual. It includes information about the primary author and contributors, copyright details, and instructions that the document and programs are proprietary and protected. It also contains a table of contents listing the chapters and main topics covered in the manual such as datatypes, literals, format models, nulls, comments and hints.
Agent technology for e commerce-recommendation systemsAravindharamanan S
This document discusses recommender systems which provide recommendations to users based on their preferences and the preferences of similar users. It describes two main techniques for recommender systems: content-based filtering which provides recommendations based on a user's profile of interests, and collaborative filtering which identifies other users with similar tastes and provides recommendations based on their preferences. The document also discusses issues with recommender systems like data sparsity, cold start problems, and privacy concerns when user profiles are collected.
1. Determine if a Big Data approach is suitable based on factors like volume, variety and velocity of data as well as the need for iterative, exploratory analysis.
2. Use techniques like Hadoop, MapReduce and NoSQL databases that can analyze large, diverse, unstructured datasets in a distributed, parallel manner.
3. Follow data management best practices like data governance, quality checks, and master data management to ensure clean, well-organized data.
SOAP is a protocol for exchanging XML-based messages over computer networks, normally using HTTP/HTTPS. It allows applications to communicate by exchanging SOAP messages, which consist of an envelope containing a header and body. The header contains processing instructions, while the body contains the payload data. SOAP was designed to be independent of any underlying transport or operating system, and to provide extensibility to address future needs.
This document provides an example of how to create a splash screen in Android that is displayed for a set period of time before redirecting to the main application screen. It describes two methods for implementing a splash screen: 1) Using a thread to sleep for the set time before redirecting, and 2) Using a Handler and postDelayed to call a Runnable after the set time to redirect. The example project structure is also outlined.
Recommender systems are a technological proxy for social recommendations that suggest similar items or ideas to users based on their tastes. They aim to automate word-of-mouth recommendations by analyzing user preferences and behavior patterns to suggest new content. Recommender systems are commonly used on e-commerce sites to improve sales by suggesting additional items customers may like. They can use collaborative filtering by comparing users, content-based filtering by analyzing item content, or knowledge-based approaches. Maintaining accurate recommender systems over time with large amounts of user data presents challenges.
This document provides an introduction to Visual Studio, C#, and object-oriented programming. It discusses Visual Studio as an integrated development environment for creating various application types. C# is introduced as an object-oriented programming language that is part of the .NET framework from Microsoft. The .NET framework includes a large class library and supports language interoperability. Object-oriented programming organizes code around objects and their properties/methods rather than standalone functions. The document outlines various topics that will be covered, including Visual Studio features, C# fundamentals, and object-oriented techniques in C#.
The .NET Framework is a software framework developed by Microsoft that runs primarily on Windows. It includes a large class library and provides language interoperability across programming languages. Programs written for .NET execute in the Common Language Runtime (CLR), which provides services like security and memory management. The .NET Framework includes versions for mobile devices and supports multiple programming languages that compile to an intermediate language and are then compiled to native code when executing.
If you are trying to connect to D3 to consume Web Services, you need to attend this session! It covers all aspects of the D3 Toolkit. You will learn the components and how to create MV Web Servers and MVSP Servers as well as SOAP or REST BASED services.
Build Message-Based Web Services for SOAJeffrey Hasan
My presentation covers the principles of message-based Web services and how to build them using .NET. (Note, this presentation preceded the release of WCF, and covers ASMX technology. But the core principles are still applicable).
Create B2B Exchanges with Cisco Connected Processes: an overviewCisco DevNet
A session in the DevNet Zone at Cisco Live, Berlin. The opportunity cost of business disruptions in the hyper-connected world can be very high. To ensure business continuity and optimization, organizations are automating many critical workflows and infrastructure operations throughout their enterprise and extended ecosystems. Cisco Connected Processes software enable architects, application developers and integration professionals to deliver business processes and automation as a service, while managing workflows and data more efficiently and effectively. Join this session to learn how scalable operational efficiencies can save you time and money while simplifying collaboration between all the members of your technical community.
This document provides an overview of integration possibilities between Primavera applications and other systems. It discusses various integration architectures and interfaces available, including pre-built integrations, web services, events, and direct database integration. The document also introduces Primavera's support for business process management using Oracle's BPM Suite.
Liberty Buildpack: Designed for Extension - Integrating your services in Blue...Rohit Kelapure
The Liberty Buildpack aims to remove the hassle of running Java applications on Cloud Foundry whether it is the simplified setup, auto-configuration of Liberty and Java EE references to cloud resources, reduced droplet size through selective provisioning of the runtime, or the zero-touch configuration and usage of services. There are times, however, when an application needs a feature that the buildpack does not yet provide. This talk will start by showing how to use and configure the Java buildpack and finish by showing how to extend the buildpack to ensure that IBM BlueMix Cloud Foundry is the best place to run your application. To build services and integrate them with BlueMix, you must implement the Service Broker API of Cloud Foundry for your services. This talk will explain how to write plugins to the Liberty Buildpack that will auto wire services your organization developed and integrated into CF making it easier for your apps to use the services in Cloud Foundry.
Overview of azure microservices and the impact on integrationBizTalk360
On the back of Integrate 2014, Sam Vanhoutte will discuss view on some of the implications of the announcements made at the conference and talk about how this might affect the future for integration professionals
Microsoft Windows Azure - Developer’s Guide Access Control in the Windows Azu...Microsoft Private Cloud
The goal of this whitepaper is to show developers how to use a claims-based identity model and the Access Control feature of the Windows Azure platform AppFabric to implement single sign-on, federated identity, and role based access control in REST Web Services and clients today, with support for WS-* and single sign on for web applications coming in the future.
Microservices architecture is an evolution of service-oriented architecture (SOA) principles applied to application design and development. Some key differences include:
- SOA focuses on exposing application functionality as services at the enterprise level, while microservices focus on developing individual applications as a suite of independently deployable services.
- Microservices are typically smaller, lighter weight services focused on a single task, as opposed to monolithic applications. They communicate with lightweight protocols like HTTP.
- Microservices aim to support continuous delivery and deployment, with goals of automation, resilience, and loose coupling between services.
- Individual microservices can be developed and scaled independently. This provides benefits like enabling continuous delivery and deployment.
So in summary,
Leveraging Governance in the IBM WebSphere Service Registry and Repository fo...Prolifics
Abstract: Governance has not been enforced or followed in enterprises due to lack of skills or no clear understanding on how use cases can be applied across various technology paradigms. Customers want governance to be implemented in their enterprise but lack awareness. In this presentation we will focus on how IIB and Data Power can be aligned with WSRR for various governance use cases. We will primarily focus on IIB/WSRR Integration capabilities and similar approaches will be followed for Data Power/WSRR Integration capabilities. This will give a solid start on how governance capabilities of WSRR can be leveraged for ESBs.
IRJET- Proficient Business Solutions through Cloud ServicesIRJET Journal
This document discusses different cloud computing service models - Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS). SaaS provides ready-to-use software applications to customers over the internet. PaaS provides development tools and servers for customers to build their own applications. IaaS provides basic computing and storage infrastructure for customers to build and manage their own systems. The document explores the advantages and disadvantages of each service model and when each would be most suitable for customers based on their needs and capabilities.
While there are many ways to build integrations with salesforce, one of the fastest growing ways is through the Salesforce REST API. Join us as we explore the current REST-ful mechanisms available to the AppCloud, and see what the next year has to offer. In this session we will discuss the Salesforce REST API structure, Authenticating to the REST API, sObject Manipulation, and Composition through the REST API.
TechTalk: Accelerate Mobile Development using SDKs and Open APIs With CA API ...CA Technologies
As a mobile developer, you understand the pressure to deliver apps faster and of higher quality. Developer solutions must simplify the complexity of creating a great user experience by providing mobile security, interactivity and backend integration with developer-friendly interfaces and APIs. This session steps through the new mobile app services solutions from CA.
For more information, please visit http://cainc.to/Nv2VOe
This document provides an agenda and summary of an Azure meetup event. The meetup featured presentations on Azure Container Services (AKS) using Kubernetes and provided news and updates on various Azure services. It included information on upcoming events, ways to stay informed on Azure developments, and thanked sponsors. The breakout session focused on Azure Container Services (AKS) and Kubernetes and was led by an Azure MVP specialist.
The document provides an overview of developing and deploying REST APIs using IBM Integration Bus. It discusses developing a REST API from scratch or by importing a Swagger definition. Key features covered include defining resources, operations, and parameters; implementing operations as subflows; mapping JSON request/response bodies; and pushing the REST API to IBM API Connect for management. The document also demonstrates these features through examples and screenshots.
This document provides an overview and summary of new features in IBM WebSphere Service Registry and Repository (WSRR) version 8.5. Some key highlights include:
- Improved search capabilities with Google-style search and additional filters.
- Enhancements to managing services such as downloading service definition documents as a ZIP file and emailing service owners or consumers.
- Performance improvements to the user interface and backend processes.
- Additional policy capabilities including workload management policies and attaching policies to control service consumption.
- Support for managing REST services alongside SOAP services in the registry.
How to get started with Python web development? Here’s a guide to help you develop your web application on the world’s best server-side programming language.
https://www.sparxitsolutions.com/blog/complete-guide-of-python-web-development/
Architecting a Real-World Microservices Architecture and DevOps Strategy on A...Amazon Web Services
Scaling a large-scale tier-1 solution in the cloud requires a sophisticated approach, a microservices design, and a robust DevOps strategy. Architects must consider how to design a solution that maintains zero downtime, adjusts gracefully to consumption peaks and valleys, and can iterate and version APIs without client-side challenges to allow for continuous innovation. In this session, we share some approaches an architect should consider when building a tier-1 application. We cover such topics as authentication and authorization, API versioning, stateless design, zero-downtime deployment, graceful failure, automatic recovery, and infrastructure as code provisioning and maintenance.
Webinar presentation October 22, 2015.
The model behind Platform-as-a-Service (PaaS) is to provide a platform for customers to develop, run, and manage web applications without needing to build or maintain the infrastructure, which can reduce costs while increasing flexibility and speed-to-market.
In the CSCC deliverable, Practical Guide to Platform-as-a-Service, learn how to use PaaS to solve business challenges, specifically:
- Definition of PaaS, the benefits of using PaaS, and examples of PaaS offerings
- Applications best suited for PaaS and the considerations for architecture, development, and operations
- Recommendations for the best use of PaaS services
Download the deliverable: http://www.cloud-council.org/resource-hub
This document provides an overview and introduction to Crystal Reports 9 developer components. It discusses the different SDKs available, including RAS, RDC, and the .NET Crystal Reports SDK. It also describes the various viewers that can be used to view reports, such as the Report Page Viewer, Interactive Viewer, Report Part Viewer, and Mobile Report Part Viewer. The document provides guidance on which SDK and viewer are best based on your development scenario and platform. It also covers migrating from RDC to RAS and product registration for support.
Takashi Kobayashi and Hironori Washizaki, "SWEBOK Guide and Future of SE Education," First International Symposium on the Future of Software Engineering (FUSE), June 3-6, 2024, Okinawa, Japan
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
WhatsApp offers simple, reliable, and private messaging and calling services for free worldwide. With end-to-end encryption, your personal messages and calls are secure, ensuring only you and the recipient can access them. Enjoy voice and video calls to stay connected with loved ones or colleagues. Express yourself using stickers, GIFs, or by sharing moments on Status. WhatsApp Business enables global customer outreach, facilitating sales growth and relationship building through showcasing products and services. Stay connected effortlessly with group chats for planning outings with friends or staying updated on family conversations.
Need for Speed: Removing speed bumps from your Symfony projects ⚡️Łukasz Chruściel
No one wants their application to drag like a car stuck in the slow lane! Yet it’s all too common to encounter bumpy, pothole-filled solutions that slow the speed of any application. Symfony apps are not an exception.
In this talk, I will take you for a spin around the performance racetrack. We’ll explore common pitfalls - those hidden potholes on your application that can cause unexpected slowdowns. Learn how to spot these performance bumps early, and more importantly, how to navigate around them to keep your application running at top speed.
We will focus in particular on tuning your engine at the application level, making the right adjustments to ensure that your system responds like a well-oiled, high-performance race car.
A Study of Variable-Role-based Feature Enrichment in Neural Models of CodeAftab Hussain
Understanding variable roles in code has been found to be helpful by students
in learning programming -- could variable roles help deep neural models in
performing coding tasks? We do an exploratory study.
- These are slides of the talk given at InteNSE'23: The 1st International Workshop on Interpretability and Robustness in Neural Software Engineering, co-located with the 45th International Conference on Software Engineering, ICSE 2023, Melbourne Australia
Neo4j - Product Vision and Knowledge Graphs - GraphSummit ParisNeo4j
Dr. Jesús Barrasa, Head of Solutions Architecture for EMEA, Neo4j
Découvrez les dernières innovations de Neo4j, et notamment les dernières intégrations cloud et les améliorations produits qui font de Neo4j un choix essentiel pour les développeurs qui créent des applications avec des données interconnectées et de l’IA générative.
SOCRadar's Aviation Industry Q1 Incident Report is out now!
The aviation industry has always been a prime target for cybercriminals due to its critical infrastructure and high stakes. In the first quarter of 2024, the sector faced an alarming surge in cybersecurity threats, revealing its vulnerabilities and the relentless sophistication of cyber attackers.
SOCRadar’s Aviation Industry, Quarterly Incident Report, provides an in-depth analysis of these threats, detected and examined through our extensive monitoring of hacker forums, Telegram channels, and dark web platforms.
Neo4j - Product Vision and Knowledge Graphs - GraphSummit ParisNeo4j
Dr. Jesús Barrasa, Head of Solutions Architecture for EMEA, Neo4j
Découvrez les dernières innovations de Neo4j, et notamment les dernières intégrations cloud et les améliorations produits qui font de Neo4j un choix essentiel pour les développeurs qui créent des applications avec des données interconnectées et de l’IA générative.
UI5con 2024 - Boost Your Development Experience with UI5 Tooling ExtensionsPeter Muessig
The UI5 tooling is the development and build tooling of UI5. It is built in a modular and extensible way so that it can be easily extended by your needs. This session will showcase various tooling extensions which can boost your development experience by far so that you can really work offline, transpile your code in your project to use even newer versions of EcmaScript (than 2022 which is supported right now by the UI5 tooling), consume any npm package of your choice in your project, using different kind of proxies, and even stitching UI5 projects during development together to mimic your target environment.
Atelier - Innover avec l’IA Générative et les graphes de connaissancesNeo4j
Atelier - Innover avec l’IA Générative et les graphes de connaissances
Allez au-delà du battage médiatique autour de l’IA et découvrez des techniques pratiques pour utiliser l’IA de manière responsable à travers les données de votre organisation. Explorez comment utiliser les graphes de connaissances pour augmenter la précision, la transparence et la capacité d’explication dans les systèmes d’IA générative. Vous partirez avec une expérience pratique combinant les relations entre les données et les LLM pour apporter du contexte spécifique à votre domaine et améliorer votre raisonnement.
Amenez votre ordinateur portable et nous vous guiderons sur la mise en place de votre propre pile d’IA générative, en vous fournissant des exemples pratiques et codés pour démarrer en quelques minutes.
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI AppGoogle
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
👉👉 Click Here To Get More Info 👇👇
https://sumonreview.com/ai-fusion-buddy-review
AI Fusion Buddy Review: Key Features
✅Create Stunning AI App Suite Fully Powered By Google's Latest AI technology, Gemini
✅Use Gemini to Build high-converting Converting Sales Video Scripts, ad copies, Trending Articles, blogs, etc.100% unique!
✅Create Ultra-HD graphics with a single keyword or phrase that commands 10x eyeballs!
✅Fully automated AI articles bulk generation!
✅Auto-post or schedule stunning AI content across all your accounts at once—WordPress, Facebook, LinkedIn, Blogger, and more.
✅With one keyword or URL, generate complete websites, landing pages, and more…
✅Automatically create & sell AI content, graphics, websites, landing pages, & all that gets you paid non-stop 24*7.
✅Pre-built High-Converting 100+ website Templates and 2000+ graphic templates logos, banners, and thumbnail images in Trending Niches.
✅Say goodbye to wasting time logging into multiple Chat GPT & AI Apps once & for all!
✅Save over $5000 per year and kick out dependency on third parties completely!
✅Brand New App: Not available anywhere else!
✅ Beginner-friendly!
✅ZERO upfront cost or any extra expenses
✅Risk-Free: 30-Day Money-Back Guarantee!
✅Commercial License included!
See My Other Reviews Article:
(1) AI Genie Review: https://sumonreview.com/ai-genie-review
(2) SocioWave Review: https://sumonreview.com/sociowave-review
(3) AI Partner & Profit Review: https://sumonreview.com/ai-partner-profit-review
(4) AI Ebook Suite Review: https://sumonreview.com/ai-ebook-suite-review
#AIFusionBuddyReview,
#AIFusionBuddyFeatures,
#AIFusionBuddyPricing,
#AIFusionBuddyProsandCons,
#AIFusionBuddyTutorial,
#AIFusionBuddyUserExperience
#AIFusionBuddyforBeginners,
#AIFusionBuddyBenefits,
#AIFusionBuddyComparison,
#AIFusionBuddyInstallation,
#AIFusionBuddyRefundPolicy,
#AIFusionBuddyDemo,
#AIFusionBuddyMaintenanceFees,
#AIFusionBuddyNewbieFriendly,
#WhatIsAIFusionBuddy?,
#HowDoesAIFusionBuddyWorks
Revolutionizing Visual Effects Mastering AI Face Swaps.pdfUndress Baby
The quest for the best AI face swap solution is marked by an amalgamation of technological prowess and artistic finesse, where cutting-edge algorithms seamlessly replace faces in images or videos with striking realism. Leveraging advanced deep learning techniques, the best AI face swap tools meticulously analyze facial features, lighting conditions, and expressions to execute flawless transformations, ensuring natural-looking results that blur the line between reality and illusion, captivating users with their ingenuity and sophistication.
Web:- https://undressbaby.com/
Zoom is a comprehensive platform designed to connect individuals and teams efficiently. With its user-friendly interface and powerful features, Zoom has become a go-to solution for virtual communication and collaboration. It offers a range of tools, including virtual meetings, team chat, VoIP phone systems, online whiteboards, and AI companions, to streamline workflows and enhance productivity.
DDS Security Version 1.2 was adopted in 2024. This revision strengthens support for long runnings systems adding new cryptographic algorithms, certificate revocation, and hardness against DoS attacks.
Odoo ERP software
Odoo ERP software, a leading open-source software for Enterprise Resource Planning (ERP) and business management, has recently launched its latest version, Odoo 17 Community Edition. This update introduces a range of new features and enhancements designed to streamline business operations and support growth.
The Odoo Community serves as a cost-free edition within the Odoo suite of ERP systems. Tailored to accommodate the standard needs of business operations, it provides a robust platform suitable for organisations of different sizes and business sectors. Within the Odoo Community Edition, users can access a variety of essential features and services essential for managing day-to-day tasks efficiently.
This blog presents a detailed overview of the features available within the Odoo 17 Community edition, and the differences between Odoo 17 community and enterprise editions, aiming to equip you with the necessary information to make an informed decision about its suitability for your business.
Graspan: A Big Data System for Big Code AnalysisAftab Hussain
We built a disk-based parallel graph system, Graspan, that uses a novel edge-pair centric computation model to compute dynamic transitive closures on very large program graphs.
We implement context-sensitive pointer/alias and dataflow analyses on Graspan. An evaluation of these analyses on large codebases such as Linux shows that their Graspan implementations scale to millions of lines of code and are much simpler than their original implementations.
These analyses were used to augment the existing checkers; these augmented checkers found 132 new NULL pointer bugs and 1308 unnecessary NULL tests in Linux 4.4.0-rc5, PostgreSQL 8.3.9, and Apache httpd 2.2.18.
- Accepted in ASPLOS ‘17, Xi’an, China.
- Featured in the tutorial, Systemized Program Analyses: A Big Data Perspective on Static Analysis Scalability, ASPLOS ‘17.
- Invited for presentation at SoCal PLS ‘16.
- Invited for poster presentation at PLDI SRC ‘16.
1. CyberSource Corporation HQ | P.O. Box 8999 | San Francisco, CA 94128-8999 | Phone: 800-530-9095
Title Page
CyberSource SOAP Toolkits
for Web Services
Developer Guide
August 2015
3. SOAP Toolkits for Web Services Developer Guide | August 2015 3
CONTENTS
Contents
Recent Revisions to This Document 6
About This Guide 7
Audience 7
Purpose 7
Scope 7
Conventions 8
Note and Important Statements 8
Text and Command Conventions 8
Related Documents 9
CyberSource Services Documentation 9
Customer Support 9
Chapter 1 Configuring SOAP Toolkits for Web Services 10
Supported Toolkits 11
Destination URLs for SOAP Messages 12
Transaction Key 13
Sample SOAP Message 15
Chapter 2 Constructing SOAP with PHP 5.2.1 16
Preparing your PHP Installation 17
Windows Operating System 17
Linux Operating System 18
Building and Running the Sample 19
Modifying your Script 19
4. SOAP Toolkits for Web Services Developer Guide | August 2015 4
Contents
Chapter 3 Constructing SOAP with .NET 2.0 and WSE 3.0 20
Preparing Your Application 20
Sending Requests to CyberSource 25
Building the Sample and Testing the Client 28
Modifying your Client and your Code 29
Chapter 4 Constructing SOAP with .NET 3.0 (WCF) and Later 30
Creating and Testing the Client by Using the Sample Code 31
Modifying your Client and your Code 32
Chapter 5 Constructing SOAP with Perl 5.8.8 and SOAP::Lite 0.69 33
Installing SOAP::Lite 34
Using the CPAN Module 34
Not Using the CPAN Module 34
Building the Sample and Testing the Client 34
Modifying your Client and your Code 35
Chapter 6 Constructing SOAP with C++ and gSOAP 2.7.9c for Windows 36
Generating the Client Code 37
Building the Client 38
Building the Sample and Testing the Client 46
Modifying your Client and your Code 47
Chapter 7 Constructing SOAP with C++ and gSOAP 2.7.9e for Linux® 48
Preparing the Development Environment 49
Generating the Client Code 50
Building the Sample and Testing the Client 51
Modifying your Client and your Code 52
Chapter 8 Constructing SOAP with C++ and gSOAP 2.7.9d for Mac OS® X 53
Preparing the Development Environment 54
Generating the Client Code 54
Building the Sample and Testing the Client 55
Modifying your Client and your Code 56
5. SOAP Toolkits for Web Services Developer Guide | August 2015 5
Contents
Chapter 9 Constructing SOAP with Apache Axis and WSS4J 57
Generating and Building the Stubs 58
Building the Sample and Testing the Client 59
Modifying Your Client and Your Code 60
6. SOAP Toolkits for Web Services Developer Guide | August 2015 6
REVISIONS
Recent Revisions to This
Document
Release Changes
August 2015 Changed mentions of .NET 3.0 to .NET 3.0 and later.
October 2013 This revision contains only editorial changes and no technical updates.
August 2013 This revision contains only editorial changes and no technical updates.
January 2013 Added important note about the new requirement for separate transaction
security keys for CyberSource production and test environments. For more
information, see "Transaction Key," page 13.
July 2012 This revision contains only editorial changes and no technical updates.
June 2011 Updated the link to the activation.jar file in the JDK JavaBeans
Activation Framework. For more information, see "Constructing SOAP with
Apache Axis and WSS4J," page 57.
7. SOAP Toolkits for Web Services Developer Guide | August 2015 7
ABOUTGUIDE
About This Guide
Audience
This guide is written for application developers who want to configure SOAP toolkits that
are used with CyberSource Web Services.
Using the SOAP toolkits requires programming skills in one of the following programming
languages:
ASP
C, C++
Java/Cold Fusion
.NET
Perl
PHP
Purpose
This guide describes tasks you must complete to configure and use the CyberSource
SOAP toolkits.
Scope
This guide describes how to use the SOAP toolkits to build and test an API client for all
supported programming languages. It does not describe how to implement CyberSource
services. For information about how to use CyberSource APIs to implement CyberSource
services, see "Related Documents," page 9.
8. SOAP Toolkits for Web Services Developer Guide | August 2015 8
About This Guide
Conventions
Note and Important Statements
Text and Command Conventions
Note
A Note contains helpful suggestions or references to material not contained in
the document.
Important
An Important statement contains information essential to successfully
completing a task or learning a concept.
Convention Usage
bold Field and service names; for example:
Include the ics_applications field.
Items that you are instructed to act upon; for example:
Click Save.
italic Filenames and pathnames. For example:
Add the filter definition and mapping to your web.xml file.
Placeholder variables for which you supply particular values.
monospace XML elements.
Code examples and samples.
Text that you enter in an API environment; for example:
Set the davService_run field to true.
9. SOAP Toolkits for Web Services Developer Guide | August 2015 9
About This Guide
Related Documents
CyberSource Services Documentation
This guide (SOAP Toolkits for Web Services Developer Guide) contains information about
how to configure the SOAP toolkits.
In contrast, CyberSource services documentation contains information about how to:
Determine what to put in requests sent to CyberSource.
Interpret what is contained in the reply from CyberSource.
Each type of CyberSource service has associated documentation:
Getting Started with CyberSource Advanced for the Simple Order API (PDF | HTML)
Credit Card Services Using the Simple Order API (PDF | HTML)
Electronic Check Services for the Simple Order API (PDF | HTML)
Refer to the Support Center for complete CyberSource technical documentation:
http://www.cybersource.com/support_center/support_documentation
Customer Support
For support information about any CyberSource service, visit the Support Center:
http://www.cybersource.com/support
10. SOAP Toolkits for Web Services Developer Guide | August 2015 10
CHAPTER
1Configuring SOAP Toolkits
for Web Services
SOAP toolkits are designed for merchants who use the SOAP protocol with a secure
authentication method. With the SOAP toolkits, you do not need to download and
configure a CyberSource client. To use any of the toolkits, your system must support these
features:
This guide provides instructions for developers who need to configure SOAP toolkits that
will be used with CyberSource Web Services.
HTTPS HTTP protocol with SSL encryption
SOAP 1.1 Version 1.1 of the Simple Object Access Protocol
Document/literal (unwrapped) Style of the WSDL used by the CyberSource Web
Services. With this style, the entire content of the SOAP
body is defined in a schema.
UsernameToken Authentication mechanism specified in WS-Security 1.0
In header of the SOAP message
Note
The CyberSource servers do not support persistent HTTP connections.
11. SOAP Toolkits for Web Services Developer Guide | August 2015 11
Chapter 1 Configuring SOAP Toolkits for Web Services
Supported Toolkits
The toolkits are available in many platform options, including open source.
Important
CyberSource has tested and will support only the toolkits listed below. Although
you can implement a toolkit on a platform that is not tested or supported,
CyberSource cannot guarantee that you will be able to use such an
implementation with the Web Services.
Toolkits Supported Platforms
PHP 5.2.1 Windows, Linux, Solaris
.NET
.NET 2.0 and WSE 3.0
.NET 3.0 (WCF) and later
Windows
Perl 5.8.8 and SOAP::Lite 0.69 Windows, Linux, Solaris
C++ with gSOAP
gSOAP 2.7.9c for Windows
gSOAP 2.7.9e for Linux
gSOAP 2.7.9d for Mac OS X
Windows, Linux, Mac OS
Java with Apache Axis and WSS4J Windows, Linux, Solaris
Important
CyberSource recommends that you use logging only when troubleshooting
problems. To comply with all Payment Card Industry (PCI) and Payment
Application (PA) Data Security Standards regarding the storage of credit card
and card verification number data, the logs that are generated contain only
masked credit card and card verification number (CVV, CVC2, CVV2, CID,
CVN) data. For more information about PCI and PABP requirements, see
www.visa.com/cisp. Follow these guidelines:
Use debugging temporarily for diagnostic purposes only.
If possible, use debugging only with test credit card numbers.
Never store clear text card verification numbers.
Delete the log files as soon as you no longer need them.
Never email to CyberSource personal and account information, such as
customers' names, addresses, card or check account numbers, and card
verification numbers.
12. SOAP Toolkits for Web Services Developer Guide | August 2015 12
Chapter 1 Configuring SOAP Toolkits for Web Services
Destination URLs for SOAP
Messages
The latest version of the API is located at https://ics2ws.ic3.com/commerce/1.x/
transactionProcessor.
When constructing your SOAP messages, use these target URLs:
Test environment:
https://ics2wstest.ic3.com/commerce/1.x/transactionProcessor
Production environment:
https://ics2ws.ic3.com/commerce/1.x/transactionProcessor
Note
1.x is not a placeholder for the version number but an integral part of the URL.
13. SOAP Toolkits for Web Services Developer Guide | August 2015 13
Chapter 1 Configuring SOAP Toolkits for Web Services
Transaction Key
Before you can send requests for ICS (Internet Commerce Suite) services, you must
create a security key for your CyberSource merchant ID. Use this key to replace the
placeholder value for TRANSACTION_KEY in the code samples.
Step 1 In the navigation pane of the Business Center, click Account Management >
Transaction Security Keys.
Important
You must use separate transaction keys for the test and production
environments.
14. SOAP Toolkits for Web Services Developer Guide | August 2015 14
Chapter 1 Configuring SOAP Toolkits for Web Services
Step 2 Click Security Keys for the SOAP Toolkit API.
Step 3 Click Generate Key.
Your new key appears immediately below the table. Because the key content will
disappear as soon as you leave the Web page, save your key now. If you forget to do so,
you will need to delete the old key before creating a new one.
Step 4 Click Download.
Save the key in a secure location.
Important
Be sure to use separate locations for the test and production environment
transaction keys. Be careful not to overwrite a key in the wrong directory.
15. SOAP Toolkits for Web Services Developer Guide | August 2015 15
Chapter 1 Configuring SOAP Toolkits for Web Services
Sample SOAP Message
If you want to use this example, make sure to replace N.NN with the current API version.
<?xml version="1.0" encoding="UTF-8"?>
<soapenv:Envelope xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/">
<soapenv:Header>
<wsse:Security soapenv:mustUnderstand="1" xmlns:wsse="http://docs.oasis-open.org/
wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd">
<wsse:UsernameToken>
<wsse:Username>yourMerchantID</wsse:Username>
<wsse:Password Type="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-
username-token-profile-1.0#PasswordText">yourPassword</wsse:Password>
</wsse:UsernameToken>
</wsse:Security>
</soapenv:Header>
<soapenv:Body>
<requestMessage xmlns="urn:schemas-cybersource-com:transaction-data-N.NN">
<merchantID>yourMerchantID</merchantID>
<merchantReferenceCode>MRC-123</merchantReferenceCode>
<billTo>
<firstName>John</firstName>
<lastName>Doe</lastName>
<street1>1295 Charleston Road</street1>
<city>Mountain View</city>
<state>CA</state>
<postalCode>94043</postalCode>
<country>US</country>
<email>null@cybersource.com</email>
</billTo>
<item id="0">
<unitPrice>5.00</unitPrice>
<quantity>1</quantity>
</item>
<item id="1">
<unitPrice>10.00</unitPrice>
<quantity>2</quantity>
</item>
<purchaseTotals>
<currency>USD</currency>
</purchaseTotals>
<card>
<accountNumber>4111111111111111</accountNumber>
<expirationMonth>11</expirationMonth>
<expirationYear>2020</expirationYear>
</card>
<ccAuthService run="true"/>
</requestMessage>
</soapenv:Body>
</soapenv:Envelope>
16. SOAP Toolkits for Web Services Developer Guide | August 2015 16
CHAPTER
2Constructing SOAP with
PHP 5.2.1
This chapter describes how to construct SOAP messages to process transactions with
CyberSource.
Before starting, you need to download and install the third-party software. CyberSource
tested these versions:
Although the SOAP extension does not have built-in support for WS Security, you can add
the required header elements for UsernameToken to the outgoing request. The code in
the sample file shows how to extend the SoapClient class and how to override its __
doRequest() method (lines 17 to 49) to insert the UsernameToken information.
Test the client application with the following Cybersource sample code:
Software Tested Description
Linux Kernel 2.4
Windows XP Pro with SP2
Solaris
Operating system versions tested
PHP 5.2.1 PHP software. The SOAP extension is provided only in versions
5.2.1 and later
libxml2 2.6.23 2.6.11 is the minimum version required by the SOAP extension
openssl 0.9.8d SSL library; 0.9.6 is the minimum required version by the SOAP
extension
Sample code The sample PHP files contain many comments and a sample
card authorization. Choose the file appropriate for you:
cli-sample.php if you use the command-line interface
web-sample.php if you use the Web interface
Make sure that you understand the content of the file and that you
replace the generic values of the variables, such as your
merchant ID and password, with your own values.
17. SOAP Toolkits for Web Services Developer Guide | August 2015 17
Chapter 2 Constructing SOAP with PHP 5.2.1
Preparing your PHP Installation
Follow the instructions in the section that applies to your operating system.
Windows Operating System
Your PHP application requires at least these extensions: SOAP and OpenSSL.
Step 1 If not already present, create an extensions directory in the php.ini file:
extension_dir ="C:PHPextensions"
Step 2 Download the ZIP package from http://www.php.net/downloads.php.
Step 3 Copy the php_soap.dll and php_openssl.dll from the package to the extensions
directory.
Step 4 In the extension section of php.ini, add a reference to the DLLs:
extension=php_soap.dll
extension=php_openssl.dll
Note
The extensions are not included in the Windows installer package.
18. SOAP Toolkits for Web Services Developer Guide | August 2015 18
Chapter 2 Constructing SOAP with PHP 5.2.1
Linux Operating System
Your PHP application requires at least these extensions: SOAP, OpenSSL, and libxml.
Step 1 To find out if your existing PHP application meets these requirements, run this command:
php -i | grep configure
If the output shows these three extensions, skip steps 2 and 3, and proceed to the
next section:
--enable-soap
--with-openssl
--with-libxml-dir
or
If the output does not show all three extensions, proceed to step 2 and 3.
Step 2 To build your PHP application with the SOAP, OpenSSL, and libxml extensions, navigate
to the directory where the PHP source was installed and run the configure command
with the three required extensions and any other extension previously included in your
PHP application, for example:
./configure ‘--prefix=your_target_dir’ ‘--enable-soap’ ‘--with-
libxmldir=your_libxml_dir’ ‘--with-openssl=your_openssl_dir’
Step 3 In the same directory, build and install your application.
make
make install
Note
CyberSource is not responsible for build errors that you may encounter during
Steps 2 and 3.
19. SOAP Toolkits for Web Services Developer Guide | August 2015 19
Chapter 2 Constructing SOAP with PHP 5.2.1
Building and Running the Sample
To test your client, modify the variables in the sample files, and run the application.
Step 1 In your sample PHP file, replace the placeholder values with your own:
MERCHANT_ID
TRANSACTION_KEY
Note that the URL for the CyberSource API (WSDL_URL) is set to the test environment and
for a specific version of the API. Always use the most current version of the API.
Step 2 Run the script php <sample PHP file>.
In the reply file, you can see the result of the request and all the fields that are returned.
Modifying your Script
After your application is configured and tested, you can modify it as needed:
To alternate between the test and production environments, change as follows the
value of WSDL_URL (line 7) that is passed to the constructor of ExtendedClient:
To update the version of the CyberSource API, update the version number in the URL.
To add or delete API fields, modify your source code.
Important
You must use separate transaction keys for the test and production
environments.
Test environment ics2wstest.ic3.com
Production environment ics2ws.ic3.com
20. SOAP Toolkits for Web Services Developer Guide | August 2015 20
CHAPTER
3Constructing SOAP with
.NET 2.0 and WSE 3.0
This chapter describes how to construct SOAP messages to process transactions with
CyberSource.
Before starting, you need to download and install the required third-party software:
Test the client application with the following CyberSource sample code:
Preparing Your Application
To test the sample code provided, you must have a Console Application.
Step 1 Create a new application or open your existing application in Visual Studio.
Step 2 Right-click the project node and select WSE Settings 3.0.
If WSE Settings 3.0 does not appear, proceed as follows:
a Reinstall WSE 3.0 by using the Add or Remove Programs menu.
b In the installer, select Modify and install the Visual Studio Tools option.
c When done, restart Visual Studio.
d Repeat steps 1 and 2.
Software Tested Description
Windows XP Pro with SP2 Operating system version tested
Visual Studio 2005 Includes .NET 2.0
WSE 3.0 Web Services Enhancements for Microsoft .NET, which is used to
authenticate the user with the UsernameToken class.
Sample code sample_wse30.vb (VB) and sample_wse30.cs (C#)
provide the code to process your transactions.
To help you understand and use the code, the files contain many
comments and a sample card authorization. Before using the
files, make sure that you replace the generic values of the
variables with your own.
21. SOAP Toolkits for Web Services Developer Guide | August 2015 21
Chapter 3 Constructing SOAP with .NET 2.0 and WSE 3.0
Step 3 In the dialog box, check Enable this project for Web Services Enhancements.
22. SOAP Toolkits for Web Services Developer Guide | August 2015 22
Chapter 3 Constructing SOAP with .NET 2.0 and WSE 3.0
Step 4 Click the Policy tab and check Enable Policy.
Step 5 Click Add.
Step 6 In the field, enter CyberSource.
If you use a name other than CyberSource, you will need to modify the value of the
variable POLICY_NAME in the sample code.
The WSE Security Settings Wizard appears.
Step 7 Click Next.
23. SOAP Toolkits for Web Services Developer Guide | August 2015 23
Chapter 3 Constructing SOAP with .NET 2.0 and WSE 3.0
Step 8 Click Secure a client application and Username.
Step 9 Click Next.
On the next page, Specify Username Token in code is checked by default. CyberSource
recommends that you leave the setting as is. Otherwise, your password appears as plain
text in wse3policyCache.config. On the other hand, if you specify the user name and
password in the code, you can retrieve the password from a database or from any other
source.
Step 10 Click Next.
24. SOAP Toolkits for Web Services Developer Guide | August 2015 24
Chapter 3 Constructing SOAP with .NET 2.0 and WSE 3.0
Step 11 Uncheck Enabled WS-Security 1.1 Extensions, which causes None (rely on transport
protection) to be automatically selected.
Step 12 Click Next.
Step 13 To exit the wizard, click Finish.
Step 14 To save your changes, click OK.
25. SOAP Toolkits for Web Services Developer Guide | August 2015 25
Chapter 3 Constructing SOAP with .NET 2.0 and WSE 3.0
Sending Requests to CyberSource
To add a Web reference to CyberSource, follow these steps:
Step 1 In the Solution Explorer, right-click the project node and select Add Web Reference.
Step 2 In the dialog box, enter the URL for CyberSource’s Web Service:
Important
You must use separate transactions keys for the production and test
environments.
Test environment https://ics2wstest.ic3.com/commerce/1.x/
transactionProcessor
Production environment https://ics2ws.ic3.com/commerce/1.x/
transactionProcessor
26. SOAP Toolkits for Web Services Developer Guide | August 2015 26
Chapter 3 Constructing SOAP with .NET 2.0 and WSE 3.0
Step 3 Click Go.
The available server API versions are displayed.
Step 4 To display the content of the most current WSDL, click the top link.
27. SOAP Toolkits for Web Services Developer Guide | August 2015 27
Chapter 3 Constructing SOAP with .NET 2.0 and WSE 3.0
Step 5 Change the Web Reference Name to CyberSource.
The Web Reference Name will be used in the name space that you need to import in your
code. For example, if your project's default name space is myapp, and you set the Web
reference name to CyberSource, you will import myapp.CyberSource.
Depending on the URL that you entered in Step 2, the default Web Reference Name in the
field on the right side of the window is either com.ic3.ics2wstest or
com.ic3.ics2ws.
Step 6 Click Add Reference.
This generates the proxy classes that process the request and the reply.
Note
Step 5 is not required to run the application. However, if you decide to use a
name other than CyberSource, use a name that is not associated with a
particular server so that you can easily change between the test and production
servers. In addition, change the import statement in the sample code as
follows:
import myapp.com.ic3.ics2wstest;
28. SOAP Toolkits for Web Services Developer Guide | August 2015 28
Chapter 3 Constructing SOAP with .NET 2.0 and WSE 3.0
Building the Sample and Testing
the Client
To test your client, follow these steps.
Step 1 In sample_wse.cs or sample_wse.vb, modify the values of the following variables:
MERCHANT_ID
TRANSACTION_KEY
LIB_VERSION
POLICY_NAME
Modify POLICY_NAME only if needed.
Step 2 Add the sample file to your application.
Step 3 Run the application.
The reply file contains the request result and all returned fields. When testing the client is
finished, write the code to use the client application.
29. SOAP Toolkits for Web Services Developer Guide | August 2015 29
Chapter 3 Constructing SOAP with .NET 2.0 and WSE 3.0
Modifying your Client and your
Code
After your application is configured and tested, you can modify it as needed:
To alternate between the test and production environments, change the host in the
URL in your application or Web configuration file:
To update the version of the CyberSource API, follow these steps:
To add or delete API fields, modify your source code.
Important
You must use separate transaction keys for the test and production
environments.
Test environment ics2wstest.ic3.com
Production environment ics2ws.ic3.com
a In the Solution Explorer, under the Web References node, click the
CyberSource web reference.
b Update the value of the Web Reference URL to the version that you want to
use, such as 1.26 in this example:
https://ics2ws.ic3.com/commerce/1.x/transactionProcessor/
CyberSourceTransaction_1.26.wsdl
c Rebuild your application.
30. SOAP Toolkits for Web Services Developer Guide | August 2015 30
CHAPTER
4Constructing SOAP with
.NET 3.0 (WCF) and Later
This chapter describes how to construct SOAP messages to process transactions with
CyberSource.
Before starting, you need to download and install the required third-party software:
Test the client application with the following CyberSource sample code:
Software Tested Description
Windows XP Pro with SP2 Operating system version tested
Visual Studio 2005 Includes .NET 2.0
Microsoft Windows SDK Software Development Kit that contains necessary tools, such as
svcutil.exe
.NET Framework 3.0 and later
Redistributable Package
Includes the Windows Communication Foundation
Note After installing the software, make sure that you reboot
your computer to ensure that svcutil is recognized as a shell
command.
sample_wcf.cs provides the code to process your transactions.
To help you understand and use the code, the file contains many comments and a sample card
authorization. Before using the file, make sure that you understand each section and that you
replace the generic values of the variables with your own.
31. SOAP Toolkits for Web Services Developer Guide | August 2015 31
Chapter 4 Constructing SOAP with .NET 3.0 (WCF) and Later
Creating and Testing the Client by
Using the Sample Code
To reach the .NET 3.0 (and later) command shell and create the client, follow these steps:
Step 1 Go to Start > All Programs > Microsoft Windows SDK > CMD Shell.
Step 2 Change directory (cd) to locate the sample code (sample_wcf.cs).
Step 3 Generate the proxy classes as follows:
where N.NN is the latest server API version. For the latest version, point your browser to
https://ics2wstest.ic3.com/commerce/1.x/transactionProcessor.
Two files are generated:
CyberSourceTransactionWS.cs contains the proxy classes.
sample_wcf.exe.config is the configuration file for your application.
Step 4 In sample_wcf.exe.config, change the security mode from Transport to
TransportWithMessageCredential.
The security element now reads:
<security mode="TransportWithMessageCredential">
Step 5 To write the code to process your transactions, use sample_wcf.cs:
a Modify the values of MERCHANT_ID and TRANSACTION_KEY with your own values.
b Build the executable as follows:
The sample_wcf.exe is created.
svcutil /config:sample_wcf.exe.config https://ics2wstest.ic3.com/
commerce/1.x/transactionProcessor/CyberSourceTransaction_N.NN.wsdl
csc /out:sample_wcf.exe /target:exe /
reference:"C:WINDOWSMicrosoft.NETFrameworkv3.0Windows
Communication FoundationSystem.ServiceModel.dll"
CyberSourceTransactionWS .cs sample_wcf.cs
csc /out:sample_wcf.exe /target:exe /
reference:"C:WINDOWSMicrosoft.NETFrameworkv3.0Windows Co
mmunication FoundationSystem.ServiceModel.dll" CyberSourceTr
ansactionWS .cs sample_wcf.cs
32. SOAP Toolkits for Web Services Developer Guide | August 2015 32
Chapter 4 Constructing SOAP with .NET 3.0 (WCF) and Later
Step 6 Run sample_wcf.exe.
The reply file contains the request result and all returned fields. When testing the client is
finished, write the code to use the client application.
Modifying your Client and your
Code
After your application is configured and tested, you can modify it as needed:
To alternate between the test and production environments, change the host in the
endpoint address in the configuration file:
To update the version of the CyberSource API, repeat the steps in the previous
section except Step 5.
To add or delete API fields, modify the source code.
Important
You must use separate transaction keys for the test and production
environments.
Test environment ics2wstest.ic3.com
Production environment ics2ws.ic3.com
33. SOAP Toolkits for Web Services Developer Guide | August 2015 33
CHAPTER
5Constructing SOAP with
Perl 5.8.8 and SOAP::Lite
0.69
This chapter describes how to construct SOAP messages to process transactions with
CyberSource.
Before starting, you need to download and install the required third-party software.
CyberSource tested these versions:
Test the client application with the following Cybersource sample code:
Software Tested Description
Linux Kernel 2.4
Windows
Solaris
Operating systems tested
Perl 5.8.8 Perl software
SOAP::Lite 0.69 Perl module for SOAP messages
OpenSSL 0.9.7 SSL library
Crypt::SSLeay 0.53_02 Download from http://search.cpan.org/dist/Crypt-SSLeay/
SSLeay.pm
URI 1.35 Download from http://search.cpan.org/dist/URI/
XML::Parser 2.34 Download from http://search.cpan.org/dist/XML-Parser/
libwww-perl 5.8.0.5 Download from http://search.cpan.org/
sample_perl.pl provides the code to process your transactions.
To help you understand and use the code, the file contains many comments and a sample card
authorization. Before using the file, make sure that you understand its content and that you
replace the generic values of the variables with your own values.
34. SOAP Toolkits for Web Services Developer Guide | August 2015 34
Chapter 5 Constructing SOAP with Perl 5.8.8 and SOAP::Lite 0.69
Installing SOAP::Lite
You can install the SOAP::Lite module by using either of the following methods.
Regardless of the method that you choose, make sure that Client HTTPs support is
set to yes. If Crypt::SSLeay is properly installed, the default is yes.
Using the CPAN Module
Step 1 Run this command:
perl -MCPAN -e shell
Step 2 Inside the shell, run this command:
install SOAP::Lite
If the CPAN module is configured to follow prerequisites, the prerequisites will be installed
automatically. For more information, see the CPAN module documentation.
Not Using the CPAN Module
Run the following scripts for each module that SOAP::Lite requires and one last time for
SOAP::Lite:
cd package_directory
perl Makefile.PL
make
make test
make install
The package_directory is the directory where you unpacked the package.
Building the Sample and Testing
the Client
To test your client, follow these steps.
Step 1 In sample.pl, modify MERCHANT_ID and TRANSACTION_KEY with your own values.
Step 2 Run the script perl sample.pl.
The reply file contains the request result and all returned fields. When testing the client is
finished, write the code to use the client application.
35. SOAP Toolkits for Web Services Developer Guide | August 2015 35
Chapter 5 Constructing SOAP with Perl 5.8.8 and SOAP::Lite 0.69
Modifying your Client and your
Code
After your application is configured and tested, you can modify it as needed:
To alternate between the test and production environments, change the host in the
URL that you pass to proxy(). In the sample, set CYBS_HOST to the appropriate
host:
To update the version of the CyberSource API, update the version number in the URI
that you pass to uri(). In the sample, set CYBS_VERSION to your new target
version.
To add or delete API fields, modify the source code.
Important
You must use separate transaction keys for the test and production
environments.
Test environment ics2wstest.ic3.com
Production environment ics2ws.ic3.com
36. SOAP Toolkits for Web Services Developer Guide | August 2015 36
CHAPTER
6Constructing SOAP with
C++ and gSOAP 2.7.9c for
Windows
This chapter describes how to construct SOAP messages to process transactions with
CyberSource.
Before starting, you need to download and install the required third-party software.
CyberSource tested these versions:
Test the client application with the following Cybersource sample code:
Software Tested Description
Windows XP Pro with SP2 Operating system version tested
gSOAP 2.7.9c Soap toolkit
Download and unzip the latest win32 ZIP file from http://
sourceforge.net/projects/gsoap2/
OpenSSL 0.9.8d You may use the pre-built package available at http://
www.slproweb.com/products/Win32OpenSSL.html. If you do,
before installing the software, make a copy of libeay32.dll
and ssleay32.dll, which are located in
c:windowssystem32. Otherwise, these files will be
overwritten during installation.
Microsoft Visual Studio 2005 Development environment tested
Sample code sample.cpp provides the code to process your transactions.
To help you understand and use the code, the file contains many
comments and a sample card authorization. Before using the file,
make sure that you understand the many sections and that you
replace the generic values of the variables with your own.
37. SOAP Toolkits for Web Services Developer Guide | August 2015 37
Chapter 6 Constructing SOAP with C++ and gSOAP 2.7.9c for Windows
Generating the Client Code
Because the pre-built wsdl2h tool does not support SSL, you cannot point the tool directly
to https://ics2wstest.ic3.com or https://ics2ws.ic3.com.
Step 1 Download to the same directory the latest WSDL and XSD files from the following URL:
https://ics2ws.ic3.com/commerce/1.x/transactionProcessor
Step 2 Save the files as follows:
CyberSourceTransaction_1.26.wsdl
CyberSourceTransaction_1.26.xsd
Step 3 To generate the header file, run the following script in the directory where you downloaded
the WSDL and XSD files:
gsoap_directorybinwsdl2h -t gsoap_directoryWSWS-typemap.dat -s -o
cybersource.h CyberSourceTransaction_N.NN.wsdl
The gsoap_directory is the directory where you extracted gSoap.
N.NN is the version number of the WSDL file that you downloaded.
This script creates the cybersource.h header file. You may change the name of the file.
However, the following steps refer to cybersource.h.
Step 4 In cybersource.h, add the following line to the Import section:
#import "WS-Header.h"
Step 5 To generate the client source code, run this script:
gsoap_directorybinsoapcpp2 -C -Igsoap_directoryimport cybersource.h
Note
You will receive the following warnings, which you can safely ignore. However,
make sure that no two line items in your requests have the same ID.
Warning: element 'xsd:unique' at level 2 was not recognized and
will be ignored.
Warning: element 'xsd:selector' at level 3 was not recognized
and will be ignored.
Warning: element 'xsd:field' at level 3 was not recognized and
will be ignored.
Warning: element 'xsd:unique' at level 2 was not recognized and
will be ignored.
Warning: element 'xsd:selector' at level 3 was not recognized
and will be ignored.
Warning: element 'xsd:field' at level 3 was not recognized and
will be ignored.
38. SOAP Toolkits for Web Services Developer Guide | August 2015 38
Chapter 6 Constructing SOAP with C++ and gSOAP 2.7.9c for Windows
Building the Client
Step 1 In Visual Studio 2005, create a non-CLR (Common Language Runtime) C++ project.
The sample code provided is for a Win32 Console Application. The Win32 Application
Wizard appears. This sample uses a Win32 Console Application with gsoap_sample as
the name of the solution.
Step 2 Click OK and Next.
The Application Settings page appears.
39. SOAP Toolkits for Web Services Developer Guide | August 2015 39
Chapter 6 Constructing SOAP with C++ and gSOAP 2.7.9c for Windows
Step 3 On the Application Settings page, uncheck Precompiled header and click Finish.
Your new project is created.
Step 4 Select Project -> gsoap_sample Properties.
Step 5 In the navigation pane, expand Configuration Properties -> C/C++ and click Code
Generation.
40. SOAP Toolkits for Web Services Developer Guide | August 2015 40
Chapter 6 Constructing SOAP with C++ and gSOAP 2.7.9c for Windows
Step 6 Make sure that the default configuration runtime libraries are selected as follows:
Debug configuration:
a In the Configuration drop-down menu in the upper-left corner, select Debug.
b In the main panel, verify that Runtime Library reads Multi-threaded debug
DLL (/MDd).
41. SOAP Toolkits for Web Services Developer Guide | August 2015 41
Chapter 6 Constructing SOAP with C++ and gSOAP 2.7.9c for Windows
Release configuration:
Step 7 Click OK.
You are returned to the project.
a In the Configuration drop-down menu in the upper-left corner, select Release.
b In the main panel, verify that Runtime Library reads Multi-threaded DLL
(/MD).
42. SOAP Toolkits for Web Services Developer Guide | August 2015 42
Chapter 6 Constructing SOAP with C++ and gSOAP 2.7.9c for Windows
Step 8 Replace gsoap_sample.cpp, included in the project, with the following files:
Step 9 Add the following preprocessor definitions:
WIN32
WITH_OPENSSL
Note
Before adding the source files to the plugin directory, change their file
extension from .c to .cpp.
CyberSource sample sample.cpp
Generated by gSOAP soapC.cpp
soapClient.cpp
Included in gSOAP
package
gsoap_directorydom.cpp *
gsoap_directorystdsoap2.cpp
gsoap_directorymod_gsoapgsoap_
winwininetgsoapWinInet.cpp
gsoap_directorypluginsmdevp.cpp
gsoap_directorypluginwsseapi.cpp
* gsoap_directory is the directory where you downloaded and
extracted gsoap
43. SOAP Toolkits for Web Services Developer Guide | August 2015 43
Chapter 6 Constructing SOAP with C++ and gSOAP 2.7.9c for Windows
Step 10 In the Configuration Properties > C/C++ > General, add the following directories to your
project's Additional Include Directories:
gsoap_directory
gsoap_directorymod_gsoapgsoap_winwininet
gsoap_directoryplugin
gsoap_directoryinclude
44. SOAP Toolkits for Web Services Developer Guide | August 2015 44
Chapter 6 Constructing SOAP with C++ and gSOAP 2.7.9c for Windows
Step 11 In the Configuration Properties > Linker > Input, add the following libraries.
In the Configuration drop-down menu, select each option in turn:
Release libeay32MD.lib
ssleay32MD.lib
Debug libeay32MDd.lib
ssleay32MDd.lib
45. SOAP Toolkits for Web Services Developer Guide | August 2015 45
Chapter 6 Constructing SOAP with C++ and gSOAP 2.7.9c for Windows
Step 12 Add the following directory to your project's Additional Library Directories:
openssl_directorylibVC
Step 13 In gsoap_directorystdsoap2.cpp, and find the following calls:
ASN1_item_d2i
meth->d2i
Step 14 In each call, cast the second parameter (&data) as const unsigned char **.
The calls now read:
ext_data = ASN1_item_d2i(NULL, (const unsigned char **) &data, ext-
>value->length, ASN1_ITEM_ptr(meth->it));
ext_data = meth->d2i(NULL, (const unsigned char **) &data, ext-
>value->length);
Step 15 If you see the following compiler error in stdsoap2.cpp
error C2440: '=' : cannot convert from 'const char *' to 'char *
cast the first parameter as char * as follows:
t = strchr((char *) s, ',');
Step 16 Find d2i_X509 in gsoap_directorypluginwsseapi.cpp, inside soap_wsse_
get_BinarySecurityTokenX509.
Step 17 To the existing cast, add const as follows:
cert = d2i_X509(NULL, (const unsigned char**)&data, size);
You are ready to test the client.
46. SOAP Toolkits for Web Services Developer Guide | August 2015 46
Chapter 6 Constructing SOAP with C++ and gSOAP 2.7.9c for Windows
Building the Sample and Testing
the Client
To test your client, follow these steps.
Step 1 In sample.cpp, modify the values of the following variables:
MERCHANT_ID
TRANSACTION_KEY
SERVER_URL
LIB_VERSION
ENVIRONMENT
Only use LIB_VERSION if you are using a different version of gSOAP.
Step 2 Run the client.
The code included in gSOAP causes the Visual C++ compiler to generate several
warnings. You can safely ignore these warnings.
The reply file contains the request result and all returned fields. When testing the client is
finished, write the code to use the client application.
Important
You must use separate transaction keys for the test and production
environments.
47. SOAP Toolkits for Web Services Developer Guide | August 2015 47
Chapter 6 Constructing SOAP with C++ and gSOAP 2.7.9c for Windows
Modifying your Client and your
Code
After your application is configured and tested, you can modify it as needed:
To alternate between the test and production environments, change the URL assigned
to service.endpoint. In the sample file, set SERVER_URL to the appropriate value:
To update the version of the CyberSource API, rebuild your client by following the
steps in "Generating the Client Code," page 37.
To add or delete API fields, you only need to modify your source code.
Important
You must use separate transaction keys for the test and production
environments.
Test environment ics2wstest.ic3.com
Production environment ics2ws.ic3.com
48. SOAP Toolkits for Web Services Developer Guide | August 2015 48
CHAPTER
7Constructing SOAP with
C++ and gSOAP 2.7.9e for
Linux®
This chapter describes how to construct SOAP messages to process transactions with
CyberSource.
Before starting, you need to download and install the required third-party software.
CyberSource tested these versions:
Test the client application with the following Cybersource sample code:
Software Tested Description
Linux Kernel 2.6 Operating system version tested
gSOAP 2.7.9e SOAP toolkit. You can download it from http://sourceforge.net/
project/showfiles.php?group_id=52781
OpenSSL 0.9.8 Current version of the toolkit implementing SSL.
Note Most Linux installations already contain this package. If
your package does not or if it has an old version, download the
source from http://www.openssl.org.
gcc 4.1.2 C/C++ compiler tested
Sample code sample.cpp provides the code to process your transactions.
To help you understand and use the code, the file contains many
comments and a sample card authorization. Before using the file,
make sure that you understand each section and that you
replace the generic values of the variables with your own.
Makefile provides targets to easily create and build the
sample client.
49. SOAP Toolkits for Web Services Developer Guide | August 2015 49
Chapter 7 Constructing SOAP with C++ and gSOAP 2.7.9e for Linux®
Preparing the Development
Environment
Step 1 Download the latest gSOAP package for Linux.
Step 2 To open the package, run this command:
tar xvfz gsoap_linux_2.7.9e.tar.gz
Step 3 At the same level as the gSOAP directory created in the previous step, create these items
with the appropriate command:
Step 4 In gsoap/stdsoap2.cpp, find the following calls:
Step 5 In each call, cast the second parameter (&data) as const unsigned char **.
The calls now read:
ext_data = ASN1_item_d2i(NULL, (const unsigned char **) &data ...
ext_data = meth->d2i(NULL, (const unsigned char **) &data ...
Step 6 In gsoap/plugin/wsseapi.c, find cert = d2i_X509.
Step 7 Add const to the second argument’s cast as follows:
cert = d2i_X509(NULL, (const unsigned char**)&data, size);
Create a… Named With this command:
Directory for the client-related files
(Makefile and sample.cpp)
client mkdir client
Symbolic link to your gSOAP
directory
gsoap ln -s <gsoap_path> gsoap
where <gsoap_path> is the path to the
gSOAP directory that you created in Step 2.
ASN1_item_d2i (occurs once)
meth-d2i (occurs twice)
50. SOAP Toolkits for Web Services Developer Guide | August 2015 50
Chapter 7 Constructing SOAP with C++ and gSOAP 2.7.9e for Linux®
Generating the Client Code
Because the pre-built wsdl2h tool does not support SSL, you cannot point the tool directly
to https://ics2wstest.ic3.com or https://ics2ws.ic3.com.
Step 1 Download to the client directory the latest WSDL and XSD files from either of these
URLs:
https://ics2wstest.ic3.com/commerce/1.x/transactionProcessor
or
https://ics2ws.ic3.com/commerce/1.x/transactionProcessor
Step 2 To ensure that Makefile finds the WSDL file that you downloaded in the previous step,
rename this file as CyberSourceTransaction.wsdl by removing the version number.
Step 3 Run the make header script.
Step 4 In the newly generated cybersource.h, add the following line to the Import section:
#import "WS-Header.h"
Step 5 Run the make source script.
Note
Do not rename the XSD file.
Note
You will receive the following warnings, which you can safely ignore. However,
make sure that no two line items in your requests have the same ID.
Warning: element 'xsd:unique' at level 2 was not
recognized and will be ignored.
Warning: element 'xsd:unique' at level 2 was not recognized
and will be ignored.
51. SOAP Toolkits for Web Services Developer Guide | August 2015 51
Chapter 7 Constructing SOAP with C++ and gSOAP 2.7.9e for Linux®
Building the Sample and Testing
the Client
To test your client, follow these steps.
Step 1 In sample.cpp, modify the values of the following variables:
MERCHANT_ID
TRANSACTION_KEY
SERVER_URL
LIB_VERSION (if using a different gSOAP version)
ENVIRONMENT
Use LIB_VERSION only if you are using a different version of gSOAP.
Step 2 Run the script make cybsdemo.
You can safely ignore the warning messages. cybsdemo is now ready to use.
The reply file contains the request result and all returned fields. When testing the client is
finished, write the code to use the client application.
Step 3 Run the sample by executing ./cybsdemo.
52. SOAP Toolkits for Web Services Developer Guide | August 2015 52
Chapter 7 Constructing SOAP with C++ and gSOAP 2.7.9e for Linux®
Modifying your Client and your
Code
After your application is configured and tested, you can modify it as needed:
To alternate between the test and production environments, change the URL assigned
to service.endpoint. In the sample file, set SERVER_URL to the appropriate value:
To update the version of the CyberSource API, rebuild your client by following the
steps in "Generating the Client Code" and "Building the Sample and Testing the
Client."
To add or delete API fields, you only need to modify your source code.
Important
You must use separate transaction keys for the test and production
environments.
Test environment ics2wstest.ic3.com
Production environment ics2ws.ic3.com
53. SOAP Toolkits for Web Services Developer Guide | August 2015 53
CHAPTER
8Constructing SOAP with
C++ and gSOAP 2.7.9d for
Mac OS®
X
This chapter describes how to construct SOAP messages to process transactions with
CyberSource.
Before starting, you need to download and install the required third-party software.
CyberSource tested these versions:
Test the client application with the following Cybersource sample code:
Software Tested Description
Mac OS X Operating system version tested
gSOAP 2.7.9d SOAP toolkit
Download and unzip the latest Mac OS X package from http://
sourceforge.net/projects/gsoap2/
openssl 0.9.7 OpenSSL version that is part of Mac OS X
gcc 4.0.1 C/C++ compiler tested
Sample code sample.cpp provides the code to process your transactions.
To help you understand and use the code, the file contains many
comments and a sample card authorization. Before using the file,
make sure that you understand the many sections and that you
replace the generic values of the variables with your own.
Makefile provides targets to easily create and build the
sample client.
54. SOAP Toolkits for Web Services Developer Guide | August 2015 54
Chapter 8 Constructing SOAP with C++ and gSOAP 2.7.9d for Mac OS® X
Preparing the Development
Environment
Step 1 Download and unzip the latest gSOAP package for Mac OS X.
Step 2 To open the package, run this command:
tar xvfz gsoap_macosx_S2.7.9d.tar.gz
Step 3 Under the same parent directory, create these items with the appropriate command:
Generating the Client Code
Because the pre-built wsdl2h tool does not support SSL, you cannot point the tool directly
to https://ics2wstest.ic3.com or https://ics2ws.ic3.com.
Step 1 Download to the client directory the latest WSDL and XSD files from either of the
following URLs:
https://ics2wstest.ic3.com/commerce/1.x/transactionProcessor
or
https://ics2ws.ic3.com/commerce/1.x/transactionProcessor
Step 2 To ensure that Makefile finds the WSDL file that you downloaded in the previous step,
rename it as CyberSourceTransaction.wsdl by removing the version number.
Create a… Named With this command:
Directory for the client-related
files (Makefile and
sample.cpp)
client mkdir client
Symbolic link to your gSOAP
directory
gsoap gsoap -> gsoap-macosx-2.7
Note
Do not rename the XSD file.
55. SOAP Toolkits for Web Services Developer Guide | August 2015 55
Chapter 8 Constructing SOAP with C++ and gSOAP 2.7.9d for Mac OS® X
Step 3 Run the make header script.
Step 4 In the newly generated cybersource.h, add the following line to the Import section:
#import "WS-Header.h"
Step 5 Run the make source script.
Building the Sample and Testing
the Client
To test your client, follow these steps.
Step 1 In sample.cpp, modify the values of the following variables:
MERCHANT_ID
TRANSACTION_KEY
SERVER_URL
LIB_VERSION
ENVIRONMENT
Use LIB_VERSION only if you are using a different version of gSOAP.
Step 2 Run the make cybsdemo script.
Ignore the warning messages. cybsdemo is now ready to use.
Step 3 Run the sample by executing ./cybsdemo.
The reply file contains the request result and all returned fields. When testing the client is
finished, write the code to use the client application.
Note
You will receive the following warnings, which you can safely ignore. However,
make sure that no two line items in your requests have the same ID.
Warning: element 'xsd:unique' at level 2 was not recognized and
will be ignored.
Warning: element 'xsd:unique' at level 2 was not recognized and
will be ignored.
56. SOAP Toolkits for Web Services Developer Guide | August 2015 56
Chapter 8 Constructing SOAP with C++ and gSOAP 2.7.9d for Mac OS® X
Modifying your Client and your
Code
After your application is configured and tested, you can modify it as needed:
To alternate between the test and production environments, change the URL assigned
to service.endpoint. In the sample file, set SERVER_URL to the appropriate value:
To update the version of the CyberSource API, rebuild your client by following the
steps in "Generating the Client Code," page 54, and "Building the Sample and Testing
the Client."
To add or delete API fields, you only need to modify your source code.
Important
You must use separate transaction keys for the test and production
environments.
Test environment ics2wstest.ic3.com
Production environment ics2ws.ic3.com
57. SOAP Toolkits for Web Services Developer Guide | August 2015 57
CHAPTER
9Constructing SOAP with
Apache Axis and WSS4J
This chapter describes how to construct SOAP messages to process transactions with
CyberSource.
Before starting, you need to download and install the required third-party software.
CyberSource tested these versions:
Software Tested Description
Windows XP Professional
with SP2
Linux
Solaris
Operating systems tested
JDK 1.5 Java Development Kit
Apache Axis 1.4 SOAP toolkit
Download and unzip the latest package from http://
ws.apache.org/axis
Apache WSS4J 1.5.1 WS-Security package
Download and unzip the latest package from http://
ws.apache.org/wss4j
Apache XML Security 1.4.0 XML security package
Download the latest package from http://santuario.apache.org/
download.html and extract xmlsec-N.N.N.jar
activation.jar JDK JavaBeans Activation Framework add-on that you can
download from http://www.oracle.com/technetwork/java/jaf11-
139815.html
mail.jar JDK Java Mail add-on that you can download from http://
java.sun.com/products/javamail/
58. SOAP Toolkits for Web Services Developer Guide | August 2015 58
Chapter 9 Constructing SOAP with Apache Axis and WSS4J
Test the client application with the following Cybersource sample code:
Generating and Building the Stubs
Step 1 From each of these packages, add these items to your classpath:
The current directory (.)
These files:
Step 2 From a command prompt, go to the directory where you downloaded the CyberSource
sample code Sample.java.
Sample code Sample.java: sample file, which provides the code to process
your transactions. The file contains comments and a sample card
authorization. Before using the file, make sure that you
understand each section and that you replace the generic values
of the variables with your own.
SamplePWCallback.java: sample Password Callback
Handler, which provides the password to WSS4J.
SampleDeploy.wsdd: sample deployment descriptor file
used by WSS4J.
Package Files
Apache Axis axis.jar
commons-discovery-0.2.jar
commons-logging-1.0.4.jar
jaxrpc.jar
log4j-1.2.8.jar
saaj.jar
wsdl4j-1.5.1.jar
Apache WSS4J wss4j-1.5.1.jar
Apache XML Security xmlsec-1.4.0.jar
JDK JavaBeans
Activation Framework
activation.jar
JDK Java Mail mail.jar
59. SOAP Toolkits for Web Services Developer Guide | August 2015 59
Chapter 9 Constructing SOAP with Apache Axis and WSS4J
Step 3 To generate the stubs, execute this command without line breaks:
java org.apache.axis.wsdl.WSDL2Java -p com.cybersource.stub
https://ics2wstest.ic3.com/commerce/1.x/transactionProcessor/
CyberSourceTransaction_N.NN.wsdl
where:
com.cybersource.stub is the package name that will be used for the generated
classes. You can choose a different package name if you wish. However, the rest of the
steps and the sample code refer to this value.
N.NN is the CyberSource API version. The latest version is located:
https://ics2wstest.ic3.com/commerce/1.x/transactionProcessor
Step 4 To compile the source code, execute this command:
javac com/cybersource/stub/*.java
Step 5 Create a jar file by using the compiled classes:
jar cf cybersource.jar com/cybersource/stub/*.class
Step 6 Add the newly created cybersource.jar to your classpath.
Building the Sample and Testing
the Client
To build the sample and test your client, modify the variables in the sample files, and run
the application.
Step 1 In Sample.java, modify the values of MERCHANT_ID.
Step 2 In SamplePWCallback.java, modify the value of TRANSACTION_KEY.
Step 3 Compile the samples as follows:
javac Sample.java SamplePWCallback.java
Step 4 Run the sample as follows:
java -Daxis.ClientConfigFile=SampleDeploy.wsdd Sample
The reply file contains the request result and all returned fields. When testing the client is
finished, write the code to use the client application.
60. SOAP Toolkits for Web Services Developer Guide | August 2015 60
Chapter 9 Constructing SOAP with Apache Axis and WSS4J
Modifying Your Client and Your
Code
After your application is configured and tested, you can modify it as needed:
To alternate between the test and production environments, set SERVER_URL to the
appropriate value:
To update the version of the CyberSource API, rebuild the client by following the steps
in "Generating and Building the Stubs," page 58.
To add or delete API fields, modify your source code.
Important
You must use separate transaction keys for the test and production
environments.
Test environment ics2wstest.ic3.com
Production environment ics2ws.ic3.com