Secure Production Deployment of B2B Solutions using WebSphere Business Integration Connect

An IBM Redbooks publication


Many business-to-business (B2B) deployments are unsuccessful due to the lack of proper planning prior to installing and configuring the software solution. Also, it is often forgotten that implementing a B2B solution has implications for the overall IT infrastructure. Network security, network availability, and application integration are all equally required of a successful B2B solution implementation.

In this IBM Redbooks publication, we start with a discussion about topics that a B2B consultant needs to know before working on a B2B project. A deep understanding of the B2B product, an understanding of business issues, and network technologies are all required.

The second part of this book discusses the typical phases of a B2B project, starting with assessment meetings and ending with post-production support.

In the last part of this book, we discuss the production implementation of WebSphere® Business Integration Connect within a topology that consists of two DMZs, a reverse proxy and a load balancer. Within this environment, we have implemented the exchange of EDI documents within AS2 messages over Secure HTTP (HTTPS).

Table of contents

Part 1. Preparing for a B2B project
Chapter 1. Overview
Chapter 2. Introducing WebSphere Business Integration Connect
Chapter 3. Aspects of security
Chapter 4. Implementation topologies
Part 2. Managing a B2B project
Chapter 5. Introduction to B2B projects
Chapter 6. Project Espresso: Discovery phase
Chapter 7. Project Espresso: Planning phase
Chapter 8. Project Espresso: Testing phase
Chapter 9. Project Espresso: Production deployment phase
Chapter 10. Project Espresso: Partner ramping phase
Chapter 11. Project Espresso: Support phase
Part 3. Implementing a B2B solution
Chapter 12. Validating the environment
Chapter 13. Implementing a firewall
Chapter 14. Implementing a proxy server
Chapter 15. Deploying the solution
Chapter 16. Implementing a load balancer
Chapter 17. Troubleshooting the deployment
Chapter 18. Implementing HTTPS
Chapter 19. Testing the deployment
Appendix A. Using the port test utility
Appendix B. Additional material


Publish Date
09 May 2005

Rating: Not yet rated




IBM Form Number

Number of pages