Skip to Content
Author's profile photo Former Member

WS-I Sample App Blog Series: Download SAP “beta” Software

Summary

This blog describes how to download the “beta” WS-I Sample Application that runs on the SAP NetWeaver Application Server. This sample application implements both the WS-I Basic Profile and the WS-I Basic Security Profile and interoperates with solutions from IBM, Microsoft, Novell and Oracle.

The WS-I Sample Application

The main idea behind the WS-I Sample Application activity is to develop interoperable solutions from multiple software vendors, that implement Web services specifications that comply with the “profiles” developed by WS-I. These sample implementations, developed by several software vendors, are then tested against each other to make sure that they interoperate.

If you want to find out more about: the Web Services Interoperability Organization (WS-I), SAP’s implementation of the WS-I Sample Application and why it’s been designed the way it is, there are two main sources of information:

Why a Software Download?

 … but a sample application is much more useful if you can also download the software and run it!

Now you can!

Here’s what you can do …

  • Download the “beta” SAP implementation of the WS-I Sample Application that implements both the WS-I Basic Profile and the Web Services Security
  • Unzip the downloaded file to review the source code and implementation in order to understand how the application was built
  • Install the “beta” SAP implementation on SAP NetWeaver 2004s Application Server Java Service Support Package Stack 7 – look for the “readme.txt” file in the download zip file for instructions
  • Download other “beta” implementations from IBM, Microsoft, Novell and Oracle – the SAP implementation has been tested against these solutions.

Draft/Beta Implementation

Finally, this is a “beta” implementation because the WS-I “testing tools” for the Basic Security Profile are still in development. When built, these testing tools will check that the “wire format” messages produced by an application conform to the rules and requirements stated in the WS-I Basic Security Profile.

Once the tools have been developed, each vendor’s sample application implementations will be tested using them which, once successful, will allow the implementations to be declared “final”.

Assigned tags

      Be the first to leave a comment
      You must be Logged on to comment or reply to a post.