Articles in this section

Integrate with AS2

Understand AS2 connections

You can set up a connection through integrator.io with your partners that use AS2. Find out how to set up a connection with AS2.  

What’s AS2?

Applicability Statement 2 (AS2) is a standardized way to move data securely over the internet. A combination of encrypted keys, unique IDs, and receipts are used to ensure security.

  • Unique ID: You will create an ID between 1-128 characters. It can include special characters, numbers, and letters. Tip: There should be one unique ID for your production connections and another for your sandbox connections. 
  • MDN: An MDN is an optional return receipt. Note: An MDN only verifies that files were received, not the nature of the data. MDNs can be:

      • Synchronous: When a message is received through an HTTP response, the MDN is sent to the URL that the message came from. Note: We only accept synchronous MDNs through integrator.io.
      • Asynchronous: The MDN will be sent at a later time and to a different URL than the one the message originally came from.
  • X.509 certificate and public key: The certificate contains an algorithm-based public key, an identity like a hostname or an organization, and a signature. The X.509 can come in many formats, but to be passed through our platform, it has to be in .pem form. You can convert your certificate to .pem with the OpenSSL toolkit.
  • The signature: Certificates can be self-signed or signed by a certificate authority. When certificates are signed by a certificate authority, the public key inside of it has been validated and can be trusted to establish secure connections.
  • The keys:  Before 2 parties start to exchange messages over an AS2 connection, they share their public keys with each other. The public key is paired with a private key. Only the person who owns the private key has access to it, which means that they’re the only ones who can decrypt messages sent with its corresponding public key.  
  • .pem From: This is what  .pem format looks like:
  • X.509 private key: You will use the algorithm-based private key to decrypt messages that were encrypted with the public key. Only private keys that correspond to the public keys will be able to open the message. The key must be in .pem form.

Before you can integrate with an AS2 connection

To be able to create an integration with your trading partner through an AS2 connection, you will have to have traded necessary info with them, like the certificates and IDs. You and your trading partner will also need to come to an agreement on which algorithms to use for signing and decryption so that each endpoint knows what to expect.

How integrator.io syncs files sent with AS2

We handle messages sent through an AS2 connection in stages that follow this order:

  1. Receive a message: There is only one URL integrator.io uses to receive messages: https://api.integrator.io/v1/as2.
  2. Check the receiver: We look at the unique ID of the recipient. The ID tells us which integrator.io customer is meant to receive this message.
  • Example: Your partner, Walmart, sends you a file of sales orders. When Walmart sends the file, your unique ID is in one of the headers.
  1. Check the sender: We look at the unique ID of the sender. The combination of the sender and recipient IDs tells us which connection the info belongs to.
  • Example: When your partner, Walmart, sends a file of sales orders to you through an AS2 connection, their ID will be in the AS2 message header.
  1. Look at the content: The recipient could be expecting multiple document types through an AS2 connection. We need to figure out which flow each of these types belongs to. To figure this out, we have to determine the content of the message. We use the routing rules defined by our customers to make that determination. We call this Content-based routing.
  • Example: You have a flow set up to sync your Walmart sales orders with your NetSuite ERP, and a separate flow that syncs your Walmart change orders with your Shopify shipping orders. We have to look at the content of the message being sent to you from Walmart to know which flow the files should be run through.
  1. Choose the flow: After we’ve identified who the message is to, who it’s from, and what kind of data files are being sent, we send the files to the intended flow.
Was this article helpful?
1 out of 1 found this helpful

Comments

0 comments

Please sign in to leave a comment.