摘要:
The disclosure generally describes computer-implemented methods, software, and systems for cloud-based single sign-on (SSO) capabilities. A computer-implemented method includes operations for identifying a first system for single sign-on capabilities, identifying a second system disparate from the first system for providing a single sign-on capability with the first system through a cloud-based SSO configuration manager, automatically accessing metadata associated with the sign-on information of the second system, the set of metadata identifying sign-on-related information for sharing at least one credential/certificate for logging in to the second system, using the metadata to obtain an authorization for a single sign-on between the first and second systems, receiving a request from the first system for authorization at the second system, and, in response to the request, providing the authorization and creating a cloud-based SSO system that includes the first and second systems.
摘要:
The disclosure generally describes computer-implemented methods, software, and systems for cloud-based single sign-on (SSO) capabilities. A computer-implemented method includes operations for identifying a first system for single sign-on capabilities, identifying a second system disparate from the first system for providing a single sign-on capability with the first system through a cloud-based SSO configuration manager, automatically accessing metadata associated with the sign-on information of the second system, the set of metadata identifying sign-on-related information for sharing at least one credential/certificate for logging in to the second system, using the metadata to obtain an authorization for a single sign-on between the first and second systems, receiving a request from the first system for authorization at the second system, and, in response to the request, providing the authorization and creating a cloud-based SSO system that includes the first and second systems.
摘要:
In accordance with aspects of the disclosure, a system and methods are provided for managing a business process flow based on business process constraints for structured business activities and collaborative process demands for unstructured business activities while maintaining a collaboration stream between the structured and unstructured business activities. The systems and methods may include integrating a collaboration business process integration model with a collaboration metadata model by aligning the business process constraints for the structured business activities with the collaborative process demands for the unstructured business activities. Further, the systems and methods may include scheduling a sequence of structured business activities based on the business process constraints for the structured business activities and the collaborative process demands for the unstructured business activities while maintaining the collaboration stream between the structured and unstructured business activities.
摘要:
A system, a method, and a computer-program product for providing multi-language support in applications are disclosed. A first textual expression contained within an application is obtained. The first textual expression is expressed in a first language. A unique key from a hash of the first textual expression is generated. A language code representative of a second language is determined. Based on the generated unique key and the determined language code, a second textual expression in the second language representative of a translation from the first language into the second language indicated by the language code is determined. The second textual expression is provided to the application to replace the first textual expression in a view presented to a user.
摘要:
In accordance with aspects of the disclosure, a system and methods are provided for managing development of business applications. The system and methods may be provided for defining security relevance for data types associated with business objects, defining security rules for the data types associated with the business objects, and defining validation and test fulfillment of the security rules by providing one or more security runtime modules for each security rule defined by the security rules handler to ensure validation and test fulfillment of each security rule.
摘要:
The present disclosure describes methods, systems, and computer program products for semantically analyzing modeled objects. One method includes identifying an object model created in a distributed development system for semantic analysis, where the distributed development system is associated with a software platform. The identified object model is then semantically analyzed based on a predetermined algorithm. A set of at least one pre-existing object models associated with the software platform is compared to the semantically analyzed object model, and a level of semantic overlap between the semantically analyzed object model and each of the set of at least one pre-existing object models is determined. In some instances, the predetermined algorithm may be selected based on and correspond to the object model type of the identified object model. The set of at least one pre-existing object models may comprise a subset of pre-existing object models available in a development system or associated with a software platform.
摘要:
A computer-implemented system may include an application platform comprising a platform model of a plurality of business objects, each of the business objects comprising a model of data and associated logic, and a public solution model comprising a subset of the platform model. The system may also include a business application, wherein a data model and access logic of the business application are defined based on the public solution model, and wherein the application platform is to provide services to the business application based on the data model, the access logic and the platform model.
摘要:
Systems, methods, computer program code, and means are provided for processing retrieve requests received in a business software system. Pursuant to some embodiments, a retrieve request is processed by identifying that the requested node is a retrieve transformation node, determining that the node relates to one of a currently selected business object and a secondary business object, and retrieving the node data from one of a persistence buffer and a secondary buffer based on the determining.
摘要:
A system for managing user interface events in user interface of a client system. The system includes a service layer including a business object. The system also includes an intermediate object layer comprising an intermediate object associated with the business object, wherein the intermediate object handles user interface messages raised by the business object and retrieves data from the business object for user interface. The system further includes a service manager that provides the retrieved data from the intermediate object for display on the user interface.
摘要:
In accordance with aspects of the disclosure, a system and methods are provided for managing development of business applications. The system and methods may be provided for defining security relevance for data types associated with business objects, defining security rules for the data types associated with the business objects, and defining validation and test fulfillment of the security rules by providing one or more security runtime modules for each security rule defined by the security rules handler to ensure validation and test fulfillment of each security rule.