Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

The relevant jar files required for the preparations must be obtained from the SAP CC server provider.

...

Info
titleExample - Setting classpath


Code Block
$ mzsh topo set topo://container:<container>/pico:<ec name>/obj:config.classpath.jars ' 
["lib/picostart.jar",
"3pp/common_message.jar",
"3pp/common_util.jar",
"3pp/core_chargingplan.jar",
"3pp/core_chargingprocess.jar",
"3pp/core_client.jar",
"3pp/logging.jar",
"3pp/sap.com~tc~logging~java.jar"]'


After setting the classpath has been set, manually distribute the jar file should be manually distributed to be so it is in place when the EC/ECSA is startedrestarted.


You can then restart the EC/ECSA to register the changes in the configuration above for the SAP CC Online agent.


The agent can be configured for secure communication via SSLTLS. This requires that a keystore is created for each EC/ECSA host.   For For more information about setting up a keystore, see the next section. secure communication, refer to 9.69.5 SAP CC Secured Connection.

Note

It is required to add the hostname information of the SAP Convergent Charging Core server Dispatcher Instance(s). This information is needed by the  execution execution content server. The IP address needs to be explicitly mentioned. Refer to the 9.69.1.2 SAP CC Online Agent Configuration page. 

Creating a New Keystore File

Follow the steps below to create a new Java Keystore File using the mzsh keytool command.

Run the mzsh keytool generate command to create a new certificate and keystore file. The certificate generated by the command will have the alias: Platform.

Code Block
$ mzsh keytool generate -k <keystore file/>


$ mzsh keytool generate -k $MZ_HOME/keys/container.keys
Info
titleExample - Creating a keystore
Code Block
Scroll ignore
scroll-viewportfalse
scroll-pdftrue
scroll-officefalse
scroll-chmtrue
scroll-docbooktrue
scroll-eclipsehelptrue
scroll-epubtrue
scroll-htmlfalse


Next: