A. Sales Orders and Quotes
B. Accounts and Contacts
C. Invoice and Delivery Note
D. Products and Van Stock
A. SRTIDOC and SICF, respectively
B. IDoc and RBDMIDOC, respectively
C. SICF and IDoc, respectively
D. SICF and RBDMIDOC, respectively
A. When using a user ID and password for the authentication
B. After configuring the communication arrangement for the first time
C. When using client certificates for the authentication
D. After adding an extension field using the adaptation tools
A. No installation inside the on-premise network necessary
B. Built-in malware detection engine
C. Fine grained access control to multiple systems and resources
D. No changes to inbound firewall settings necessary
A. By the mapping icon
B. By the used namespace
C. By the mapping functions
D. By the extension field view in message mapping
A. Object navigation
B. Batch Processing
C. Filtering Data
D. Automatic WSDL Generation
E. Intelligent Message Mapping
A. Configure the CO_CRMPCD_ATTACHMENT_FOLDER RE consumer proxy in SOAMANAGER
B. Configure the ATTACHMENTFOLDERREPLICATIONREQ service definition in transaction WE20
C. Configure the ATTACHMENTFOLDERREPLICATIONREQservice definition in SOAMANAGER
D. Configure the CO_CRMPCD_ATTACHMENT_FOLDER RE message type in transaction WE20
A. It provides a secure connectivity to SAP applications and is fully built on open source
B. It receives SAP support for the open source environment version.
C. It allows building event and API-based applications side-by-side
D. It provides a service catalog for easy instantiation and consumption of services.
E. It supports building functionality directly inside the core solution.