Professional Documents
Culture Documents
Copyright
This edition applies to the 1.4 Version of IBM Sterling e-Invoicing and to all subsequent releases and modifications
until otherwise indicated in new editions.
Copyright IBM Corporation 2008, 2011.
US Government Users Restricted Rights Use, duplication or disclosure restricted by GSA ADP Schedule Contract
with IBM Corp.
Contents
Chapter 1. Introduction to Sterling Integrated Archive in Sterling e-Invoicing . . . 13
e-Invoicing . . . . . . . . . . . . . 1 External Archive in Sterling e-Invoicing . . . . 13
Prerequisites for Using Sterling e-Invoicing . . . . 1 Custom/Trading Partner Archive in Sterling
Sterling e-Invoicing Overview . . . . . . . . 1 e-Invoicing . . . . . . . . . . . . . 13
Signature Verification and Invoice Validation . . . 2 Integrated Archive Online Access . . . . . . . 14
Archive Methods in Sterling e-Invoicing . . . . . 2 Integrated Archive Re-validation . . . . . . 14
Auditor Functions in Sterling e-Invoicing . . . . . 3 Scheduled Archive Timestamping . . . . . . . 14
Supplier and Buyer Processes in Sterling e-Invoicing 3 Archive Audit Trail . . . . . . . . . . . . 14
Mapping in Sterling e-Invoicing . . . . . . . . 3
Interoperability in Sterling e-Invoicing . . . . . . 4 Chapter 4. Sterling e-Invoicing
User Permissions in Sterling e-Invoicing . . . . . 4 Agreements . . . . . . . . . . . . 15
Access to Sterling e-Invoicing by Tax Auditors and
End Users . . . . . . . . . . . . . . . 4 Chapter 5. TrustWeaver Error Handling 17
Sterling B2B Integrator and Sterling e-Invoicing. . . 5 Supplier Process Error Scenarios . . . . . . . 17
Buyer Process Error Scenarios . . . . . . . . 18
Chapter 2. e-Invoice Buyer and Supplier Error Handling in Sterling e-Invoicing . . . . . 18
Processes . . . . . . . . . . . . . . 7
Logical Separation of the Buyer and Supplier Chapter 6. Workflow Scenarios . . . . 21
Processes . . . . . . . . . . . . . . . 7 Workflow Scenario 1 . . . . . . . . . . . 21
Supplier Process in Sterling e-Invoicing . . . . . 7 Workflow Scenario 2 . . . . . . . . . . . 22
Buyer Process in Sterling e-Invoicing . . . . . . 8 Workflow Scenario 3 . . . . . . . . . . . 23
Workflow Scenario 4 . . . . . . . . . . . 24
Chapter 3. Sterling e-Invoicing Workflow Scenario 5 . . . . . . . . . . . 26
Functionality . . . . . . . . . . . . 11 Workflow Scenario 6 . . . . . . . . . . . 28
Canonical Invoice Format in Sterling e-Invoicing . . 11 Workflow Scenario 7 . . . . . . . . . . . 29
Maximum Invoice Size in Sterling e-Invoicing . . . 11 Worklfow Scenario 8 . . . . . . . . . . . 30
Limiting Invoice Size in Sterling e-Invoicing . . 12
Maximum Number of Open Connections in Sterling Chapter 7. Glossary . . . . . . . . . 33
e-Invoicing . . . . . . . . . . . . . . 12
Validating e-Invoices . . . . . . . . . . . 12 Notices . . . . . . . . . . . . . . 37
Archiving e-Invoices . . . . . . . . . . . 12
Note: Canonical format is a format for storing hierarchical names that displays the
hierarchical attribute of each component of the name.
Customers must provide a map with their invoice format so that it can be
translated to the published canonical format. The canonical version of the invoice
is also used by the invoice archive functionality to extract the necessary business
content from the archive to support a human-readable view format and reports for
the invoice.
Re-validation of invoices will invoke the TrustWeaver Request service. Since the
archive may contain data for more than one legal entity, access to the invoice data
in the archive is restricted based on permissions.
If a tax auditor needs to access data using Sterling e-Invoicing, the tax auditor is
assigned the necessary permissions to access only the integrated archive and not
any other functionality in the Sterling B2B Integrator.
You configure the processing options for the supplier and buyer using e-Invoicing
agreements that are:
v Configurable objects that relate two organizations involved in an electronic
invoice transaction and store the relationship options.
v Versioned, importable, and exportable like other Sterling B2B Integrator
resources.
These user permissions ensure the security of the data, and separate the data into
supplier and buyer sets.
Each operation performed through the user interface requires the appropriate
permission to be assigned before carrying out its operation. You are notified
on-screen of a failed operation if this notification is set up in the Sterling B2B
Integrator.
The output of this business process is the signed invoice, while logging of the
event and archiving is done in the execution of the process. This business process
does not invoke another business process to do further processing, because it will
be done by the eInvoiceProcess.
There is no configuration user interface for the buyer process. It is based on the
VAT IDs or Lookup IDs (as well as the message type, that allows you to specify
the type of message exchanged if you have multiple agreements with the same
supplier/buyer information but use different message types) of the sending and
receiving trading partners configured in the agreements.
To ensure proper processing based on the service level agreement (SLA), the
eInvoiceProcess has to perform different functions. The basic flow implemented for
this business process is as follows:
1. The eInvoiceProcess needs the following inputs:
v PrimaryDocument with the invoice to be processed (raw or signed
depending upon the configuration).
v SupplierVAT, which is the ProcessData parameter that indicates the Supplier
VAT ID.
v BuyerVAT, which is the ProcessData parameter that indicates the Buyer VAT
ID.
v Lookup IDs, which is configured for each entity as an alternative lookup
field to the VAT ID. Requires either SupplierVAT and BuyerVAT or
SupplierLookupID and BuyerLookupID.
v Message-Type, which is required if there are multiple agreements set up for
the same pair of entities for different message types.
2. Invokes the eInvoice Agreement Lookup service to populate ProcessData with
all the specified agreement information (canonical format translation map, error
notification e-mail, and so on). In case of errors, the eInvoice Event service is
invoked to log the event, send e-mail notifications, and processing is halted.
3. Invokes the supplier process, buyer process, or both depending upon
agreement configuration. Any errors occurring during the execution of these
processes are already handled, so the processing is stopped.
4. Invokes the normal post-processing business process, if configured in the
agreement.
One trading partner may sign, validate, and archive on behalf of the other trading
partner. Archived invoices with the country code IT (Italy) are timestamped (due to
special Italian tax regulations) by an accredited Italian time stamp authority (TSA).
Any operation performed on the integrated archive like downloading,
timestamping, or re-validating, is recorded to maintain an audit trail. If any error
occurs during the signing, validation, or archiving, the specified users are notified
through e-mail.
Size limit settings are added to the interchange envelopes and (if applicable)
transaction envelopes. The transaction level settings apply only if the interchange
envelope is set to use the smallest transaction limit and the standard uses
transaction-level envelopes.
Sterling e-Invoicing enables you to set global parameters to specify the number of
retries allowed when a self-correcting, transient error (essentially a hiccup in the
processing that is not expected to be repeated, or not expected to last for long) is
returned by the TrustWeaver Server. This parameter specifies the number of times
to loop with a small pause between each loop. You are also able to configure the
number of retries allowed when a delaying error (a self-correcting, transient error,
but an error that is expected to take some time to resolve) is returned by the
TrustWeaver Server. This parameter specifies the number of times to loop with a
pause between each loop. Thus, the Sterling B2B Integrator automatically pauses
the connection to TrustWeaver when processing errors occur, but you can manually
unpause the connection using the Lock Manager.
For more information on the Semaphore service, see Managing Services and
Adapters.
Validating e-Invoices
Invoices may be in different formats for different trading partners. The invoices
handled by Sterling e-Invoicing are converted into a canonical format for uniform
processing. The system also extracts the relevant mandatory invoice data from
these invoices and stores it in a uniform format in the integrated archive database.
Also, the invoices are validated for compliance.
Archiving e-Invoices
Sterling e-Invoicing supports three archival methods:
v Integrated archive: In this method, invoices are stored in a database that is
managed by Sterling e-Invoicing and the archive is managed automatically. Also,
Sterling e-Invoicing provides user interface to support viewing of the archive.
The Integrated Archive is not stored in the existing Sterling B2B Integrator
database--all the invoice data is stored in a separate database. If you handle
e-Invoicing on behalf of your trading partners, the Integrated Archive may contain
invoices for many distinct legal entities.
The Integrated Archive specifies whether the invoice is archived from the buyer or
supplier. If a user has only the buyer permission associated with his or her user
account, he or she cannot access (even to view) the supplier side invoices, and vice
versa. If a user has buyer and supplier permissions, he or she can view all the
invoices. The archive stores a canonical format of the invoice data, so that it can be
easily viewed and retrieved. Reports are also generated using the data stored in
the archive. All the operations performed on the invoice in the integrated archive
are tracked and audited. Also, the timestamping information of the invoices is
maintained in the integrated archive.
Note: The JAR file contains only the signed invoice file, detail file, and individual
invoice files in canonical format.
You can also download a human readable report in different file formats.
If any failure occurs while connecting to the TrustWeaver server due to any reason,
an error message Not Found is displayed and re-validation fails. If any of the
errors cannot be resolved, then an e-mail notification is sent to the specified users.
The e-mail addresses are configurable through the eInvoice Agreement Lookup
service. If a TrustWeaver error occurs while processing an invoice, then all the
processes involving the buyer and supplier countries are paused for the time
period specified in Delayed Retry Wait parameter (when you set global e-Invoice
configuration options). For example, if an error occurs while processing an invoice
from UK to PL, all processing of invoices to and from UK, and to and from PL will
be paused for this interval.
The eInvoice Agreement Lookup service searches for these parameters mentioned
above from the agreement and creates the content required for the e-mail.
Note: The e-mail address of the users is configurable through the Identities screen.
E-mail notifications are sent to the specified users in the following scenarios:
v On the supplier side, if signing fails, the business process that handles the
signing process invokes the eInvoice Event service and passes the relevant
information including the reason for failure and failure code if any. An e-mail is
sent to the specific supplier stating that the signing process failed.
v On the buyer side, if validation fails, the business process that handles the
validation process invokes the eInvoice Event service and passes the relevant
information including the reason for failure and failure code if any. An e-mail is
sent to the specific buyer stating that the validation process failed.
v Notifications are also sent if the external or internal archiving fails, including
failure to store canonical data, timestamped invoice, raw invoice, and audit
information.
Workflow Scenario 1
The following diagram shows the scenario where the buyer runs Sterling
e-Invoicing and receives signed invoices.
Note: In the diagram above, Sterling e-Invoicing software resides in the Sterling
B2B Integrator box.
Workflow Scenario 2
The following diagram shows a scenario where the buyer runs IBM Sterling
Gentran:Server for Microsoft Windows and Sterling e-Invoicing and receives signed
invoices:
Note: In the diagram above, Sterling e-Invoicing software resides in the Sterling
Gentran:Server box.
Workflow Scenario 3
The following diagram shows a scenario where the buyer runs Sterling e-Invoicing,
receives unsigned invoices, TrustWeaver signs and archives the invoice on behalf of
the supplier, and returns the signed invoice to the supplier:
Note: In the diagram above, Sterling e-Invoicing software resides in the Sterling
B2B Integrator box.
Workflow Scenario 4
The following diagram shows a scenario where the buyer runs IBM Sterling
Gentran:Server for Microsoft Windows and Sterling e-Invoicing, receives an
unsigned invoice, TrustWeaver signs and archives on behalf of supplier, and
returns the signed invoice to the supplier:
Workflow Scenario 5
The following diagram shows a scenario where the supplier runs Sterling
e-Invoicing, TrustWeaver signs the invoices, and sends the invoices to the buyer:
Note: In the diagram above, Sterling e-Invoicing software resides in the Sterling
B2B Integrator box.
Note: In the diagram above, Sterling e-Invoicing software resides in the Sterling
Gentran:Server box.
Workflow Scenario 7
The following diagram shows a scenario where supplier runs Sterling e-Invoicing,
TrustWeaver signs the invoice, archives and validates it on behalf of the buyer, and
sends the validated invoice to the buyer:
Note: In the diagram above, Sterling e-Invoicing software resides in the Sterling
B2B Integrator box.
Note: The validated invoice will take either path 13 or 14 to 15, depending on the
configuration. The invoice data is always routed to the buyer system.
1. The raw invoice data and validated invoice are sent to the normal buyer-side
processing.
Worklfow Scenario 8
The following diagram shows a scenario where the supplier runs IBM Sterling
Gentran:Server for Microsoft Windows and Sterling e-Invoicing, TrustWeaver signs
the invoice, archives, and validates it on behalf of the buyer, and sends the
validated invoice to the buyer:
Note: The validated invoice will take either path 14, or 15 to 17, depending on the
configuration. The invoice data is always routed to the buyer system.
1. The validated invoice is archived.
2. The raw invoice data and the validated invoice are sent for normal processing.
3. The raw invoice data and the validated invoice are sent to Sterling
Gentran:Server system from the Sterling B2B Integrator through the Sterling
B2B Integrator adapters.
4. The raw invoice data and the validated invoice are sent to the buyer system
from the Sterling Gentran:Server system through a communication channel.
B
BPML Business Process Modeling Language (BPML) is an XML-based language for
describing business processes designed by the Business Process
Management Initiative (http://www.bpmi.org).
business process
Business process is a series of activities that accomplishes a business
objective.
business process model
Business process model is an executable graphical (or BPML) representation
of a business process.
C
CA Certificate authority (CA) is a company that is responsible for verifying and
processing certificate requests and for issuing and managing digital
certificates. The CA you choose should be one that your trading partners
will trust. You must meet the requirements for the CA you choose.
CA certificate
CA certificate is a digital certificate issued by a certificate authority (CA) for
verifying trusted certificates. A CA certificate contains a public key
corresponding to the private key, which the CA owns to sign certificates it
issues.
category
Category is a classification assigned to an item that indicates the higher
D
digital certificate
Digital certificates attach to an electronic document for security purposes. A
digital certificate verifies the identity of the document sender and gives the
document receiver the means to encode a reply. To provide a chain of
verification and prevent tampering, the digital certificate contains a public
key, identity information, and one or more signatures.
digital signature
Digital signature is a digital code attached to an electronic message. Just as
you sign a document as an indication that you are the person you claim to
be, a digital signature indicates to the receiver that you are who you claim
to be. Anyone who has the public key in the key pair can use it to decrypt
the digital signature. If the results match, the signature verifies. Assuming
that the private key is known only to its owner, a matching digital
signature also authenticates the signer.
E
e-Invoice
e-Invoice (electronic invoice) enables elimination of paper trails that
companies must maintain to comply with Value Added Tax (VAT) laws.
Extensible Markup Language (XML)
Extensible Markup Language (XML) is a language specification designed
especially for Web documents. It allows designers to create their own
customized tags, enabling the definition, transmission, validation, and
interpretation of data between applications and organizations.
H
human interaction
Human interaction is any action taken by a human being on a business
process as it executes.
I
identity
Identity describes the trading partner and contains information referenced
by the application when it executes a business process involving the
trading partner.
L
license
License is a file downloaded from the Self-Service Licensing site and
installed in the application. The license enables the application components
that a customer has purchased (for example, Sterling e-Invoicing).
P
permissions
Permissions provide access to different modules within the application and
are the foundation of role-based security.
predefined business processes
Predefined business processes are business processes that are ready to use
upon installation of the application.
S
Service Level Agreement (SLA)
Service Level Agreement (SLA) is an agreement between two parties. It is a
contract that exists between a customer and its service provider, or
between service providers, which defines the understanding of both parties
regarding the level of service that will be provided, including services,
priorities, responsibilities, guarantee, and so on.
Simple Object Access Protocol (SOAP)
Simple Object Access Protocol (SOAP) is a lightweight protocol for the
exchange of information in a decentralized, distributed environment. It is
an XML-based protocol with three parts: an envelope that defines a
Chapter 7. Glossary 35
framework for describing what is in a message and how to process it, a set
of encoding rules for expressing instances of application-defined data
types, and a convention for representing remote procedure calls and
responses.
source map
Source map contains the mapping instructions for translation. A source map
file has the extension .mxl or .map.
system administrator
System administrator is the technical expert on the hardware, connections,
and software that the application needs to work, and is responsible for
administering the application.
T
trading partner
Trading partner is a company or business entity within a company that
participates in the exchange of business application data.
U
user account
User account contains the groups that the application user belongs to and
the permissions associated with each group or user.
V
value added tax (VAT)
Value added tax (VAT) is a tax applied by most countries to the value added
to goods and services in each step of the economic chain. Most countries
use a VAT code. Within the European Union, the initial two characters of
the VAT registration numbers are the country codes.
IBM may not offer the products, services, or features discussed in this document in
other countries. Consult your local IBM representative for information on the
products and services currently available in your area. Any reference to an IBM
product, program, or service is not intended to state or imply that only that IBM
product, program, or service may be used. Any functionally equivalent product,
program, or service that does not infringe any IBM intellectual property right may
be used instead. However, it is the user's responsibility to evaluate and verify the
operation of any non-IBM product, program, or service.
IBM may have patents or pending patent applications covering subject matter
described in this document. The furnishing of this document does not grant you
any license to these patents. You can send license inquiries, in writing, to:
IBM Corporation
Armonk, NY 10504-1785
U.S.A.
The following paragraph does not apply to the United Kingdom or any other
country where such provisions are inconsistent with local law:
INTERNATIONAL BUSINESS MACHINES CORPORATION PROVIDES THIS
PUBLICATION "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER
EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
WARRANTIES OF NON-INFRINGEMENT, MERCHANTABILITY OR FITNESS
FOR A PARTICULAR PURPOSE. Some states do not allow disclaimer of express or
implied warranties in certain transactions, therefore, this statement may not apply
to you.
Any references in this information to non-IBM Web sites are provided for
convenience only and do not in any manner serve as an endorsement of those Web
sites. The materials at those Web sites are not part of the materials for this IBM
product and use of those Web sites is at your own risk.
IBM may use or distribute any of the information you supply in any way it
believes appropriate without incurring any obligation to you.
Licensees of this program who wish to have information about it for the purpose
of enabling: (i) the exchange of information between independently created
programs and other programs (including this one) and (ii) the mutual use of the
information which has been exchanged, should contact:
IBM Corporation
J46A/G4
U.S.A.
The licensed program described in this document and all licensed material
available for it are provided by IBM under terms of the IBM Customer Agreement,
IBM International Program License Agreement or any equivalent agreement
between us.
All statements regarding IBM's future direction or intent are subject to change or
withdrawal without notice, and represent goals and objectives only.
All IBM prices shown are IBM's suggested retail prices, are current and are subject
to change without notice. Dealer prices may vary.
This information contains examples of data and reports used in daily business
operations. To illustrate them as completely as possible, the examples include the
names of individuals, companies, brands, and products. All of these names are
fictitious and any similarity to the names and addresses used by an actual business
enterprise is entirely coincidental.
COPYRIGHT LICENSE:
Each copy or any portion of these sample programs or any derivative work, must
include a copyright notice as follows:
IBM 2011. Portions of this code are derived from IBM Corp. Sample Programs.
Copyright IBM Corp. 2011.
If you are viewing this information softcopy, the photographs and color
illustrations may not appear.
Trademarks
IBM, the IBM logo, and ibm.com are trademarks or registered trademarks of
International Business Machines Corp., registered in many jurisdictions worldwide.
Other product and service names might be trademarks of IBM or other companies.
A current list of IBM trademarks is available on the Web at Copyright and
trademark information at http://www.ibm.com/legal/copytrade.shtml.
Adobe, the Adobe logo, PostScript, and the PostScript logo are either registered
trademarks or trademarks of Adobe Systems Incorporated in the United States,
and/or other countries.
Intel, Intel logo, Intel Inside, Intel Inside logo, Intel Centrino, Intel Centrino logo,
Celeron, Intel Xeon, Intel SpeedStep, Itanium, and Pentium are trademarks or
registered trademarks of Intel Corporation or its subsidiaries in the United States
and other countries.
Notices 39
Microsoft, Windows, Windows NT, and the Windows logo are trademarks of
Microsoft Corporation in the United States, other countries, or both.
UNIX is a registered trademark of The Open Group in the United States and other
countries.
Java and all Java-based trademarks and logos are trademarks or registered
trademarks of Oracle and/or its affiliates.
Linear Tape-Open, LTO, the LTO Logo, Ultrium and the Ultrium Logo are
trademarks of HP, IBM Corp. and Quantum in the U.S. and other countries.
Other company, product, and service names may be trademarks or service marks
of others.
Printed in USA