Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 6

1.

Different types of Authentications in CPI


Basic Authentication
 Basic authentication is a simple authentication where client is authenticated using simple
username and password.
 Authentication header is sent over HTTP headers.
 Authentication header is encoded using base-64.
 Basic authentication is supported for SOAP, REST/HTTP and ODATA services.
 401 unauthorizes https error code will be return when client pass wrong credentials in HTTP
header.

OAuth

 Allowing applications to access resources on behalf owner.

SAML (Security Assertion Markup Language)

 SAML is an XML-based open standard for exchanging authentication and authorization data
between parties(Only for ODATA).

Client Certificate Authentication

 Each client is issued a unique certificate which is presented to the server during the
authentication process.
2. How to configure SFTP server
 Hostname or IP address of the SFTP server.
 Port number (usually 22 for SFTP).
 SFTP Server Path: The directory on the SFTP server where files will be uploaded or
downloaded.
 Authentication Method: Choose the authentication method (e.g., Username/Password, SSH
Key, etc.).
 Credentials: Provide the username and password or SSH key for authenticating with the SFTP
server.
3. what is multi-mapping?
 Multi-mapping refers to a technique used in integration scenarios where data from a
single source needs to be mapped to multiple target structures or formats.
 Advanced Adapter Engine is often used for multi-mapping scenarios.
4. Difference between Business System and Business Component

Business System Business Component


Created in SLD (System Landscape Directory) Created in integration builder
Binding through SAP system No binding
BS is imported Is created
Name convention based on SAP No name convention

5. What is Dynamic Configuration


 Dynamic Configuration allows you to manipulate metadata or configuration
parameters of a message during its runtime processing. Metadata includes
information about the message itself, such as headers, properties, or context-related
details.
 In SAP PI/PO, Dynamic Configuration is commonly used in the Advanced Adapter
Engine (AAE) to set adapter-specific parameters dynamically during message
processing.
 It can be used in Message Mapping or Operation Mappings to manipulate values in
the message context.
 In SAP CPI, Dynamic Configuration is utilized in message processing steps within
integration flows.
 It can be used in Groovy scripts, Content Enrichers, or other mapping steps to
dynamically set values in the message context.
6. How do you change the name of the file in runtime?
 It can be done dynamically at runtime, by using a variable Substitution. We create a
variable and assign that variable to the file name.
 Enable the variable substitution checkbox, Under ADVANCED TAB in the communication
channel, add and create a variable.
 Append the variable name in File name scheme in the syntax : %variable_name%.csv.
7. What is FCC?.
FCC stands for File Content Conversion in the context of SAP PI/PO. It refers to a module used
within the File Adapter to convert the content of files between different formats during file-
based integration scenarios. FCC enables format conversion, content enrichment,
transformation, and character encoding conversion.
8. Types of adapter in CPI

Sender Adapters Receiver Adapters


• AMQP • AMQP
• Ariba • Ariba
• AS4 • AS4
• FTP • Elster
• HTTPS • Facebook
• IDOC • FTP
• Mail • OData
• OData • HTTP
• Process Direct • IDOC
• SFTP • JDBC
• SOAP • LDAP
• SuccessFactors • Mail
• XI • ODC
• Open Connectors
• Process Direct
• RFC
• SFTP
• SOAP
• SuccessFactors
• Twitter
• XI

9. What are the different views that you see in CPI home screen views that you see in the home
screen?
Discover, Design, Monitor
10. Where do you save user password credentials and all that?
In manage security there is Security material. (CPI provides a feature called Security Material,
which allows you to securely store sensitive information like usernames and passwords.
You can define security materials in the Security Material section of the SAP CPI Cockpit.)
11. Where do you generally perform checks for connections?
To perform checks for connections in CPI, you can use the Connectivity Tests feature in the
Manage Security section of the Overview page2.
12. What is multi mapping?
When I want to map one source structure to multiple target structures.
13. What are the different modes of Content Enricher?

Is a function of External Call under Call in the palette.


Combine – extra Xml data incoming is appended to the end of the payload
Enrich – extra xml data incoming is append at the path that you have queried in the payload

14. What is the UDF?


 User Defined function are functions defined by a programmer, which can be used in SAP PI
graphical mappings.
 We can used UDF in a direct mapping.
 Use UDF when inbuild functions is not available.
15. Differences between content enricher and reply request?

Request Reply flow step sends the request message, waits for the reply message, then processes
the reply.

Content Enricher accesses an external data source in order to augment a message with missing
information.

Reply request and content enricher both are synchronous and wait for response but reply
request response from external system is replaced with old payload but enricher only merge the
old payload with new payload

16. what types of structures that we create in PI


 Data Type
 Message Type
 Service Interface
 Message Mapping
 Operation Mapping
17. what are the two types of structures that we create
18. what u do with WSDL FILE
19. What is WSDL file
20. what is full form of WSDL
Web Service Description Language
21. I gave you a wsdl file what u will do now , how will u use the file to create a structure in PI
We import the WSDL file as an External Definition in ESR to use as a structure for our message
22. in ESR where we use that WSDL file to create a structure
In IDOC Case
23. what is multi mapping
24. If i need to configure my system to form to ECC to send or receiver what settings do i need to do
in PI
25. inbound RA, OUTBOUND RA
it is used to maintain RFC name and program ID. Outbound RA is not in use now, but it was used
to configure details for Outbound Message when Dual stack was used.
26. what are components in PI
ESR,ID,SLD
27. name few node functions
 removeContext
 collapseContext
 formatByExample
 splitByValue
 createContext
 createIf
 mapWithDefault
 sortByindex

28. types of mapping in PI


Graphical, Java, ABAP, XSLT
29. what are the different adapters in
30. what is proxy
 Proxy are executable interfaces which converts non-language specific interface descriptions
into WSDL. i.e you use proxies to implement the actual message exchange that is describe in
the integration builder.
 Two types of proxy- ABAP Proxy Objects, JAVA proxy Objects.

31. what is a lookup


 It typically refers to the process of retrieving/Searching for specific information in a data
source, often using a key or identifier.
 Lookups are commonly used in mapping and integration scenario to transform data by
feteching additional details from external source.
32. what is datastore in CPI
 Manage Stores allows us to manage temporary data storages on the tenant.
 Data Stores provides an overview of storages on the tenant, which are temporarily used to
persist data of different kind during message processing
33. what is CPI
34. what is the different options on CPI home page
Discover,Design,Monitor
35. what is content modifier
 You use the content modifier step to modify the content of incoming message by
providing additional information in the header or body of the message.
 The Content Modifier allows you to modify a message by changing the content of the
data containers that are involved in message processing (message header, message
body, or message exchange).
36. what is splitter?
 The General Splitter breaks down a composite message containing n messages into n
individual messages.
 Two Types
 General splitter – one message split into two
 Iterating splitter – header gets removed only message split.
37. What is gather?
 The Gather step enables user to merge messages from more than one route in an integration
process.
 Its similar to aggregator.
 We can combine XML of same or different format.,
 No last message required.
38. What is difference between Join and Aggregator?
 The Join element used to collect different path into single path.
 Combines Same type of multiple payload into s single payload. – combine, Combine sequence.

39. what is router


Routes the message to the specific path based on the conditions provided.
40. what is reverse proxy
We create a virtual host, the virtual host then connects to the real host at backend, however
the Real host ID remains unknown.
41. how u connect the CPi to onprimise system
We use Cloud connector to connect to on premise services.
42. if i have multiple on primise systems do we need multiple cloud connecters
No, cloud connectors are reusable.
43. how do u do unit testing in PI.
We can do unit testing in Operation mapping, under Test tab.
44. have we use any tools that we use for testing
45. how do u do exception handling in CPI
By adding Exception Subprocess in the Iflow , it would check for any error for the entire Iflow.
46. what is diff types of subprocess

47. what is a looping process call?


The call will be initiated multiple times till the condition is met or the max iterations allowed
is reached, whichever comes first.
48. Explain the one scenario in Pipo?
Scenario Specific
49. How do you know which IDOC is going to push the data?
Scenario Specific
50. How do you import the IDOC file in Pipo?
Scenario Specific
51. Have you used any conditions in message mapping and what condition is that?
Scenario Specific
52. How you test the Scenario in sap Pipo?
Go to NetWeaver, under message monitoring, we have a send test message option that is
use for testing.
53. Which file you are sending in Pipo?
Scenario Specific
54. did you do any module configuration in common channel?
Scenario Specific
55. What are the types of node functions in your mapping?
Scenario Specific
56. Explain exception sub process?
It is a subprocess used to capture exceptions and handling them.
57. Explain the one Scenario in CPI?
Scenario Specific
58. What is the configuration you are doing in PGP Encryption and what are mandatory fields to
configure PGP Encryption?
Used to convert data in a non-readable format.
A user is required for the generation of the key.
59. What are the pallet functions in CPI?
60. How do you test the scenario in CPI?
By using Postman and Soap UI
61. How do you troubleshoot the error in CPI Scenarios?
We can use the Trace in the Manage Integration content and then, open the trace log, to
view where the message is failing, then we can click that step to understand what error is
there and proceed accordingly.
62. What are the Status messages received in IFLOW?
Started, Completed, Retry, Discarded,Holding,Waiting
63. What is Escalated status message?
It raised a flag in case an error occurs, however it does not stops the message processing
altogether.
64. How do you display the payloads in CPI monitoring?
By using groovy script to log a payload as attachment.

You might also like