Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

  • If supplier Y uses the API to send messages to customer X, only customer X has to enterĀ https://edi4steel.eu. The API will take care of hashing and encryption. Decryption and hash checking still has to be done on customer X side. See example code.

  • If customer X send back messages through the API to the supplier Y then supplier Y can use the key fromĀ https://edi4steel.eu. The API will take care of hashing and encryption. Decryption and hash checking still has to be done on supplier Y side. See example code.

  • If supplier Z does not use the API to send messages to customer X, supplier Z has to implement the setup process themselves.

...