b+dgtal Compliance : Componente SAP PI/PO
1. Introduction
2. Software downloading
3. Software requirements
4. sca spread
4.1 sca spread thorugh jspm
4.2 sca spread thorugh telnet
4.3 sca spread thorugh nwds
4.4 Install validation
5. Sftp user, configuration and log folder
6. Certificate request
7. b+ secure keystore configuration
8. Search/manage certificates
9. Registry certificate
10. sap keystorage configuration (Only if being used)
11. https certificates
12. sap pi developer new user
13. sap pi communications new user
14. License install
15. Outside access through sap pi
Avvale 2024