EDI Protocols - EDI Messaging Protocols - Types of EDI - CData Arc
EDI Protocols - EDI Messaging Protocols - Types of EDI - CData Arc
(/)
(tel:8007438232)
There are many types of EDI messaging protocols, each created to use different types of data
exchange technologies and EDI software to send and receive data.
EDI protocols have evolved for more than 50 years, since a group of companies created EDI in 1968,
with new protocols pioneered every few years to capture the benefits of newer technologies. In this
guide, we give you an overview of the different types of EDI protocols, the technologies they use and
their applications.
https://arc.cdata.com/resources/edi/protocols.rst 1/12
1/5/23, 2:39 PM EDI Protocols | EDI Messaging Protocols | Types of EDI - CData Arc
In direct EDI, also known as point-to-point EDI, you establish a specific connection with each business
partner using an agreed-upon protocol.
VANs act as middlemen, translating EDI messages between protocols and partners, while enabling you
to use your own, single protocol no matter which protocol your partners use.
Traditionally, VANs were the only option, but as Internet EDI technology has improved and EDI software
has emerged, direct EDI is used more and more. VANs generally reduce initial setup costs, but they
charge a fee for every document, or even line item, they process. Depending on how much you trade
with a given partner or use a certain protocol, you can save money over time with direct EDI. But along
with setup comes ongoing management and maintenance, which can cut into savings. There are other
considerations as well, such as control over your setup, partner requirements and more.
Given these considerations, you'll want to evaluate the software options out there and may even
consider a hybrid setup that could incorporate a B2B managed services provider experienced in both
approaches.
https://arc.cdata.com/resources/edi/protocols.rst 2/12
1/5/23, 2:39 PM EDI Protocols | EDI Messaging Protocols | Types of EDI - CData Arc
Age
(tel:8007438232)
(/)was developed by EDI over the Internet (EDIINT), a working group of the Internet Engineering Task
AS1
Force (IETF) during the 1990s to help facilitate web-based EDI communications between partners. At
the time, it was a major technological step forward that delivered higher security with reduced setup
costs over the Internet.
Security
AS1 achieves security with digital certificates and encryption. AS1 (like all AS file transfers) generally
requires both sides of the exchange to trade X.509 certificates and specific "trading partner" names
before transferring any EDI documents.
Age
AS2 was developed and pioneered in the early 2000s ('02 - '04) and has only grown since.
In addition, AS2 is backed by the Drummond Group, an organization that certifies the compatibility of
versions from different vendors and certifies EDI Software. If you purchase any two products from the
list of Drummond-certified products, they will work well together - i.e. they'll have strong
interoperability.
https://arc.cdata.com/resources/edi/protocols.rst 3/12
1/5/23, 2:39 PM EDI Protocols | EDI Messaging Protocols | Types of EDI - CData Arc
Security
(tel:8007438232)
(/)creates an "envelope" for the EDI data, allowing it to be sent securely - using digital certificates and
AS2
encryption - over the Internet. It also supports signed receipts to ensure that your trading partner
received the message after it has been delivered.
Age
The IETF developed AS3 in 2006.
Security
AS3 provides tight security on par with that of AS2 by implementing MDNs in combination with
encryption. This 1-2 punch of digital signatures and encryption makes AS3 more secure than both
traditional FTP and File Transfer Protocol Secure (FTPS), which uses Secure Sockets Layer (SSL) in
combination with FTP. It improves on the way FTPS encrypts data by allowing firewalls to inspect the
flow of network traffic.
https://arc.cdata.com/resources/edi/protocols.rst 4/12
1/5/23, 2:39 PM EDI Protocols | EDI Messaging Protocols | Types of EDI - CData Arc
As a SOAP-based web service, AS4 is an open standard and is more compatible with standard
environments than AS2. Many organizations use these API technologies for internal integrations, so it's
a natural way to extend integrations to external sources.
Key Features:
Age
The IETF created AS4 in 2013. It's the newest, most modern EDI protocol in widespread use.
https://arc.cdata.com/resources/edi/protocols.rst 5/12
1/5/23, 2:39 PM EDI Protocols | EDI Messaging Protocols | Types of EDI - CData Arc
Security
AS4 ensures enterprise-class security in document exchange, using a subset of WS-Security. It
maintains the integrity of document messages and the confidentiality of sensitive data.
But FTP is not a highly secure protocol; for EDI scenarios, it usually requires additional layers of
security. The three options for added security include:
All three methods, FTP via VPN, SFTP and FTPS, can connect using direct EDI or over a VAN.
https://arc.cdata.com/resources/edi/protocols.rst 6/12
1/5/23, 2:39 PM EDI Protocols | EDI Messaging Protocols | Types of EDI - CData Arc
Age
FTP is the oldest file transfer and EDI protocol and has seen use in EDI from the beginning in the
1960s.
Security Issues
The big drawbacks are that FTP by itself doesn't encrypt data in transit and FTP uses separate
command and data channels. That's why it's not considered secure and why SFTP, FTPS and FTP via
VPN standards have emerged. We'll break down each of the three major types of secure FTP options.
SFTP
SFTP is essentially FTP with a different security layer, Secure Shell (SSH), developed by the Internet
Engineering Task Force (IETF), which originally created FTP. This security layer encrypts the message
while in transit and decrypts the message upon arrival. SFTP requires the server to authenticate the
client computer. All commands and data are encrypted to prevent passwords and other sensitive
information from being exposed to the network in plain text. Unlike FTP, SFTP does protect data during
transmission and doesn't use separate command and data channels - it transfers data and commands
in formatted packets with one secure connection.
But like FTP with a VPN, SFTP doesn't provide non-repudiation, which makes it unsuitable for many EDI
applications.
https://arc.cdata.com/resources/edi/protocols.rst 7/12
1/5/23, 2:39 PM EDI Protocols | EDI Messaging Protocols | Types of EDI - CData Arc
FTPS
(tel:8007438232)
(/) - FTP over SSL/TSL - adds a secure encryption layer (Secure Sockets Layer) around the FTP
FTPS
protocol to secure the commands and data transferred between client and server. FTPS is similar to
SFTP. The only major difference is the additional security layer for FTPS was developed by web
browser company, Netscape, instead of the IETF. Both FTPS and SFTP work the same way. And both
have the same setbacks - the lack of non-repudiation and message management. Both protocols
encrypt the data while in transit, keeping it safe while moving over the Internet, and then decrypt it upon
arrival at its destination. As with FTP with VPN above, interoperability is a major issue.
OFTP is simple to use, consisting of just fourteen commands. It's designed for maximum efficiency,
enabling large transmission windows with file restart, data compression and security.
TCP/IP
X.25/ISDN
And native X.25
A single OFTP2 entity can make and receive calls, exchanging files in both directions. This means that
OFTP2 can work in a PUSH or PULL mode, as opposed to AS2, which can only use PUSH.
Age
OFTP was created in 1986 specifically to meet the EDI needs of the European automotive industry. Its
name comes from the Odette Organisation (the Organization for data exchange by teletransmission in
Europe).
https://arc.cdata.com/resources/edi/protocols.rst 8/12
1/5/23, 2:39 PM EDI Protocols | EDI Messaging Protocols | Types of EDI - CData Arc
Security
OFTP 2 can encrypt and digitally sign message data, request signed receipts and provide mass data
compression. All of these services are available for OFTP2 over TCP/IP, X.25/ISDN or native X.25.
When used over a TCP/IP network, increased session level security is available for OFTP 2 over TLS.
Data compression
Exchange of digital certificates between trading partners (to improve security)
It handles massive files (greater than 500 GB)
OFTP2 supports additional character sets, such as Chinese and Japanese
OFTP2 extended the reach of OFTP well beyond Europe, connecting trading partners across the globe.
The forms contains fields where users enter information that's automatically converted into an EDI
message and sent via secure Internet protocols, such as FTPS, Hypertext Transport Protocol Secure
(HTTPS) or AS2.
The ease of web EDI reduces the need for each partner to install EDI software or manage a complex
EDI environment, opening the benefits of EDI to more trading partners. It's particularly useful for
extending EDI to partners in countries with limited IT and EDI specialist resources.
Web EDI is traditionally based around a hub and spoke model, where a major business partner acts as
the hub and smaller partners act as spokes. It looks like this:
https://arc.cdata.com/resources/edi/protocols.rst 9/12
1/5/23, 2:39 PM EDI Protocols | EDI Messaging Protocols | Types of EDI - CData Arc
The hub organization implements EDI and develops a web forms option for its small and mid-
(/)
size partners (tel:8007438232)
The web forms are hosted, either on the hub's site or by an EDI network service provider
EDI partners connect to the web forms via web browser to exchange documents as forms
converted to EDI documents behind the scenes
The forms are then processed by the hub
Mobile EDI
As more and more firms seek to mobilize the supply chain and develop corporate apps, new EDI mobile
apps are beginning to appear. In particular, apps for iPads and other tablets are gaining popularity in
the supply chain space.
One emerging use case is the adoption of Direct Exchange (DEX) in the retail industry, in which delivery
personnel scan item barcodes into mobile devices to create invoices. Data is transmitted to receivers
via in-store docking stations, and receivers then open the invoice in the docking system, right then and
there, and scan delivered goods to verify quantities. After data is reconciled, the digital invoice is
automatically closed, and a finalized copy is then transmitted to the supplier system via mobile device.
Some retailers can save half an hour per delivery using this technology, which quickly adds up to
massive time and money savings.
More and more mobile EDI opportunities emerge continuously, though right now there is not a
particular standard transaction set in the space.
EDI Standards
(/resources/edi/standards.rst)
EDI Protocols
(/resources/edi/protocols.rst)
https://arc.cdata.com/resources/edi/protocols.rst 10/12
1/5/23, 2:39 PM EDI Protocols | EDI Messaging Protocols | Types of EDI - CData Arc
AS4
(/)
(tel:8007438232)
FTP
OFTP
Web EDI
Mobile EDI
EDI Integration
(/resources/edi/integration.rst)
EDI Transactions
(/resources/edi/transactions.rst
EDI Software
(/resources/edi/software.rst)
Features Solutions
Sales FAQ
(/order/faq.aspx)
Shopping Cart
(/order/cart.aspx)
Resources
https://arc.cdata.com/resources/edi/protocols.rst 11/12
1/5/23, 2:39 PM EDI Protocols | EDI Messaging Protocols | Types of EDI - CData Arc
Partners
(/) (/company/partners/)
(tel:8007438232)
Case Studies (/case-study/)
Testimonials (/company/testimonials.aspx)
Blog (/blog/)
https://arc.cdata.com/resources/edi/protocols.rst 12/12