0% found this document useful (0 votes)
61 views12 pages

EDI Protocols - EDI Messaging Protocols - Types of EDI - CData Arc

The document discusses different types of EDI messaging protocols including AS1, AS2, AS3, and AS4. It describes the technologies used, when each was developed, their popularity and status, and security features. The protocols enable secure electronic data interchange over different transmission methods like email, HTTP, and FTP.

Uploaded by

suresh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
61 views12 pages

EDI Protocols - EDI Messaging Protocols - Types of EDI - CData Arc

The document discusses different types of EDI messaging protocols including AS1, AS2, AS3, and AS4. It describes the technologies used, when each was developed, their popularity and status, and security features. The protocols enable secure electronic data interchange over different transmission methods like email, HTTP, and FTP.

Uploaded by

suresh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

1/5/23, 2:39 PM EDI Protocols | EDI Messaging Protocols | Types of EDI - CData Arc

(/)
  (tel:8007438232) 

EDI Resource Center

Resources (/resources/) > EDI Protocols (/resources/edi/protocols.rst)

Types of EDI: Messaging Protocols


Electronic data interchange (EDI) is a communications technology used to exchange business
documents between organizations via computers. Handling everything from purchase orders and
invoices to health insurance codes and shipments, EDI is a crucial business communications tool.

See EDI: The Complete Guide (default.rst)

So What Are The Different Types of EDI?


EDI protocols are the technologies used by EDI software to transfer data securely from one computer
to another. Each protocol reflects a set of universal guidelines that dictate how the data is encrypted
and configured while in transit.

There are many types of EDI messaging protocols, each created to use different types of data
exchange technologies and EDI software to send and receive data.

EDI protocols have evolved for more than 50 years, since a group of companies created EDI in 1968,
with new protocols pioneered every few years to capture the benefits of newer technologies. In this
guide, we give you an overview of the different types of EDI protocols, the technologies they use and
their applications.

Direct vs. VAN


AS1
AS2
AS3
AS4
FTP
OFTP
Web EDI
Mobile EDI

https://arc.cdata.com/resources/edi/protocols.rst 1/12
1/5/23, 2:39 PM EDI Protocols | EDI Messaging Protocols | Types of EDI - CData Arc

A Quick Word on Direct EDI vs. VANs  (tel:8007438232) 


(/)
It's worth noting you have a key decision to make about how to set up any EDI protocol: use direct EDI
with each trading partner or go through a Value Added Network, or VAN.

In direct EDI, also known as point-to-point EDI, you establish a specific connection with each business
partner using an agreed-upon protocol.

VANs act as middlemen, translating EDI messages between protocols and partners, while enabling you
to use your own, single protocol no matter which protocol your partners use.

Traditionally, VANs were the only option, but as Internet EDI technology has improved and EDI software
has emerged, direct EDI is used more and more. VANs generally reduce initial setup costs, but they
charge a fee for every document, or even line item, they process. Depending on how much you trade
with a given partner or use a certain protocol, you can save money over time with direct EDI. But along
with setup comes ongoing management and maintenance, which can cut into savings. There are other
considerations as well, such as control over your setup, partner requirements and more.

Given these considerations, you'll want to evaluate the software options out there and may even
consider a hybrid setup that could incorporate a B2B managed services provider experienced in both
approaches.

AS1 EDI Protocol


AS1 stands for Applicability Statement 1 and specificies how to transport data securely and reliably via
the Internet using email protocols.

Technology and Features


The AS1 protocol is based on SMTP and S/MIME (email technologies). It was the first AS protocol
developed and uses signing, encryption and MDN conventions. It works as follows:

Files are sent as "attachments" in a specially coded SMIME email message


Messages can, but aren't required to be signed
Messages can, but aren't required to be encrypted
Messages may, but aren't required to, request Message Disposition Notifications, or MDNs, to
ensure the recipient gets the message.
If an MDN is requested, upon receipt and successful decryption or signature validation, a
"success" MDN goes from the recipient to the original sender
Upon receipt and verification of the signature on the MDN, the original sender knows the
recipient got their message, providing "non-repudiation"
If there are any problems receiving or interpreting the original AS1 message, a "failed" MDN may
be sent back

https://arc.cdata.com/resources/edi/protocols.rst 2/12
1/5/23, 2:39 PM EDI Protocols | EDI Messaging Protocols | Types of EDI - CData Arc

Age
  (tel:8007438232)
(/)was developed by EDI over the Internet (EDIINT), a working group of the Internet Engineering Task

AS1
Force (IETF) during the 1990s to help facilitate web-based EDI communications between partners. At
the time, it was a major technological step forward that delivered higher security with reduced setup
costs over the Internet.

Status and Popularity


The AS1 EDI specification is largely superseded by the Applicability Statement 2 (AS2) standard, which
uses HTTP.

Security
AS1 achieves security with digital certificates and encryption. AS1 (like all AS file transfers) generally
requires both sides of the exchange to trade X.509 certificates and specific "trading partner" names
before transferring any EDI documents.

AS2 EDI Protocol


AS2 is the next generation of open-standards EDI protocol developed by the IETF and replaced AS1.
For millions of companies, AS2 is the EDI messaging protocol used to transfer files between trading
partners.

Technology and Features


AS2 enables secure data transmission over the Internet using HTTPS. In doing so, AS2 massively
extends EDI functionality through the ubiquity of Internet access. It involves two computers, a client
and a server, connecting in a point-to-point manner via the web.

Age
AS2 was developed and pioneered in the early 2000s ('02 - '04) and has only grown since.

Status and Popularity


AS2 is one of the most popular methods for transporting data, especially EDI data, securely and reliably
over the Internet. It's used by many major retailers worldwide and has become an ubiquitous standard
that still draws new companies to it.

In addition, AS2 is backed by the Drummond Group, an organization that certifies the compatibility of
versions from different vendors and certifies EDI Software. If you purchase any two products from the
list of Drummond-certified products, they will work well together - i.e. they'll have strong
interoperability.

https://arc.cdata.com/resources/edi/protocols.rst 3/12
1/5/23, 2:39 PM EDI Protocols | EDI Messaging Protocols | Types of EDI - CData Arc

Security
  (tel:8007438232)
(/)creates an "envelope" for the EDI data, allowing it to be sent securely - using digital certificates and

AS2
encryption - over the Internet. It also supports signed receipts to ensure that your trading partner
received the message after it has been delivered.

Who Uses It?


Walmart famously championed EDI via AS2 and has driven its mass adoption within the broader retail
industry in particular. AS2 is the de facto standard for EDI transactions in the U.S.

Learn More About AS2


See our complete AS2 guide to learn how AS2 works, understand its benefits and get a brief, step-by-
step breakdown on AS2 implementation.

LEARN MORE (as2.rst)

AS3 EDI Protocol


Developed by the IETF, Applicability Statement 3 (AS3) is an open-standards protocol promoting secure
EDI data transportation and application interoperability. It is not intended as a next version or
replacement for AS2, simply as a protocol using a different technology that benefits different users.

Technology and Features


AS3 is built on File Transfer Protocol (FTP). Since the 1960s, companies have used FTP to send data,
including EDI data, across the Internet to partners. The problem is FTP isn't secure by itself. AS3 adds
MDNs, similar to AS1, to provide verification known as non-repudiation. It also enables organizations to
securely send and receive XML documents, in addition to EDI documents. AS3 enables push and pull
FTP capabilities, similar to setups in asynchronous and bi-synchronous environments.

Age
The IETF developed AS3 in 2006.

Status and Popularity


AS3 is used across industry, for many companies that use FTP. But it's not nearly as popular as AS2 or
AS4.

Security
AS3 provides tight security on par with that of AS2 by implementing MDNs in combination with
encryption. This 1-2 punch of digital signatures and encryption makes AS3 more secure than both
traditional FTP and File Transfer Protocol Secure (FTPS), which uses Secure Sockets Layer (SSL) in
combination with FTP. It improves on the way FTPS encrypts data by allowing firewalls to inspect the
flow of network traffic.
https://arc.cdata.com/resources/edi/protocols.rst 4/12
1/5/23, 2:39 PM EDI Protocols | EDI Messaging Protocols | Types of EDI - CData Arc

Who Uses It?


(/)
  (tel:8007438232) 
Organizations worldwide that use FTP in their technology framework rely on AS3. It's particularly useful
for organizations with a sizable IT investment in FTP scripting, applications or security. It's even useful
for many financial and healthcare organizations that need to send highly sensitive information via EDI
and want to use FTP.

AS4 EDI Protocol


Applicability Statement 4 (AS4) is a web-services update to AS2, built largely on the OASIS ebMS 3.0
framework. Its lightweight nature, which strips out much of the bulk from the ebMS 3.0 framework,
makes AS4 a relatively low-cost communications standard to implement for organizations with a
minimal IT infrastructure, as its built with a light client setup option.

Technology and Features


Organizations often use SOAP-based web services as an application programming interface (API) to
securely transmit large, complex documents, such as product catalogs. AS4 is actually a SOAP-based
web API layered over HTTP from a technical viewpoint and can be EDI from a business use
perspective.

As a SOAP-based web service, AS4 is an open standard and is more compatible with standard
environments than AS2. Many organizations use these API technologies for internal integrations, so it's
a natural way to extend integrations to external sources.

Key Features:

Built on proven interoperability standards: MIME, SOAP and WS-Security


Provides rich support for metadata and is payload agnostic - document types, such as purchase
orders aren't tied to any defined SOAP action, providing flexibility
AS4 can transport any type of payload (multiple if needed), including: legacy EDI, binary, XML,
JSON and more
Lets receivers reroute messages and correlate them with past or future messages
Resends messages in case of temporary network disturbance and ensures a message is only
received once, detecting and eliminating duplicates
Offers large file compression and transfer support
Error generation, reports any errors to the message sender of the message receiver
Allows rich variety of interactions between sender and receiver: PUSH, PULL, etc.

Age
The IETF created AS4 in 2013. It's the newest, most modern EDI protocol in widespread use.

https://arc.cdata.com/resources/edi/protocols.rst 5/12
1/5/23, 2:39 PM EDI Protocols | EDI Messaging Protocols | Types of EDI - CData Arc

Status and Popularity


  (tel:8007438232)
(/)is gaining increasing adoption as more and more organizations strive to modernize their data

AS4
communications. However, many major retailers and organizations still use AS2 and have not yet
upgraded to AS4.

Security
AS4 ensures enterprise-class security in document exchange, using a subset of WS-Security. It
maintains the integrity of document messages and the confidentiality of sensitive data.

The AS4 EDI protocol:

Provides password authentication, digital signatures and encryption


Achieves transport security with TLS
Confirms authenticity of the sender and ensures messages are unaltered in transit
Uses XML Digital Signatures and MDN receipts, providing non-repudiation - both senders and
receivers can't deny sending or receiving messages
Supports a whole range of encrypting, including XML encryption
Uses X.509 security tokens and username/password tokens

Who Uses It?


AS4 is increasingly being adopted in the European government and energy sectors and is also gaining
increasing popularity and use among all manner of organizations modernizing their internal
technologies as well as extending their standards-based internal integrations. Its structure also makes
it ideal for use with trading partners based in emerging markets, such as Southeast Asia, who don't
have extensive IT infrastructures.

EDI via FTP: VPN, SFTP and FTPS


File Transfer Protocol (FTP) is a protocol for computers connected through the Internet (and other
TCP/IP networks) to securely transfer files between each other. FTP is commonly used to transfer
webpage files from their creator to the computer that acts as their server for everyone on the Internet.
It's also used to download programs and other files to your computer from other servers.

But FTP is not a highly secure protocol; for EDI scenarios, it usually requires additional layers of
security. The three options for added security include:

Transmitting FTP messages via a virtual private network (VPN)


Using Secure Shell File Transfer Protocol (SFTP): This is FTP in conjunction with Secure Shell
(SSH), a protocol used for secure, remote logins
Using File Transfer Protocol Secure (FTPS): This is FTP in conjunction with SSL/TLS (Secure
Sockets Layer or Transport Layer Security) and was created in later versions of FTP by the
original creators of FTP

All three methods, FTP via VPN, SFTP and FTPS, can connect using direct EDI or over a VAN.

https://arc.cdata.com/resources/edi/protocols.rst 6/12
1/5/23, 2:39 PM EDI Protocols | EDI Messaging Protocols | Types of EDI - CData Arc

Technology and Features


  (tel:8007438232)
(/)uses a client-server model with separate control and data connections linking the client and

FTP
server. Each trading partner generally uses a clear-text sign-in protocol for authentication.

Age
FTP is the oldest file transfer and EDI protocol and has seen use in EDI from the beginning in the
1960s.

Status and Popularity


FTP is used ubiquitously throughout the web, including for website updates and employing bulk file
transfers. Users can quickly and easily install an FTP server in all major operating systems, including
Windows, Linux, UNIX and Mac OS. In use for decades, FTP is the most widely used file transfer
protocol. But due to security issues, most organizations only use FTP for transferring files within the
organization. For EDI applications, only a secure FTP option will do.

Security Issues
The big drawbacks are that FTP by itself doesn't encrypt data in transit and FTP uses separate
command and data channels. That's why it's not considered secure and why SFTP, FTPS and FTP via
VPN standards have emerged. We'll break down each of the three major types of secure FTP options.

FTP WITH VPN


Often, businesses connecting through FTP use a virtual private network (VPN), which provides an extra
layer of security around transactions. But FTP with VPN isn't perfect. It's biggest drawback is a lack of
non-repudiation, which verifies the identity of each party and prevents receivers from denying the
receipt of a transaction from a verified sender.

SFTP
SFTP is essentially FTP with a different security layer, Secure Shell (SSH), developed by the Internet
Engineering Task Force (IETF), which originally created FTP. This security layer encrypts the message
while in transit and decrypts the message upon arrival. SFTP requires the server to authenticate the
client computer. All commands and data are encrypted to prevent passwords and other sensitive
information from being exposed to the network in plain text. Unlike FTP, SFTP does protect data during
transmission and doesn't use separate command and data channels - it transfers data and commands
in formatted packets with one secure connection.

But like FTP with a VPN, SFTP doesn't provide non-repudiation, which makes it unsuitable for many EDI
applications.

https://arc.cdata.com/resources/edi/protocols.rst 7/12
1/5/23, 2:39 PM EDI Protocols | EDI Messaging Protocols | Types of EDI - CData Arc

FTPS
  (tel:8007438232)
(/) - FTP over SSL/TSL - adds a secure encryption layer (Secure Sockets Layer) around the FTP

FTPS
protocol to secure the commands and data transferred between client and server. FTPS is similar to
SFTP. The only major difference is the additional security layer for FTPS was developed by web
browser company, Netscape, instead of the IETF. Both FTPS and SFTP work the same way. And both
have the same setbacks - the lack of non-repudiation and message management. Both protocols
encrypt the data while in transit, keeping it safe while moving over the Internet, and then decrypt it upon
arrival at its destination. As with FTP with VPN above, interoperability is a major issue.

OFTP and OFTP2 EDI Protocols


Odette File Transfer Protocol (OFTP) is a communications technology built specifically for B2B
document exchange. Like all the AS protocols and unlike the other FTP protocols, it can provide
digitally signed electronic delivery receipts. Though OFTP was originally designed for direct, point-to-
point EDI, both OFTP and OFTP2 can work with a VAN as well.

OFTP is simple to use, consisting of just fourteen commands. It's designed for maximum efficiency,
enabling large transmission windows with file restart, data compression and security.

Technology and Features


It was designed in the spirit of the Open System Interconnection (OSI) model using the Network
Service provided by CCITT X.25 recommendation. It works with:

TCP/IP
X.25/ISDN
And native X.25

A single OFTP2 entity can make and receive calls, exchanging files in both directions. This means that
OFTP2 can work in a PUSH or PULL mode, as opposed to AS2, which can only use PUSH.

Age
OFTP was created in 1986 specifically to meet the EDI needs of the European automotive industry. Its
name comes from the Odette Organisation (the Organization for data exchange by teletransmission in
Europe).

In 2007, Data Interchange (http://www.datainterchange.com/) created an update, OFTP2, as a


specification for the secure transfer of business documents over the Internet, ISDN and X.25 networks.

Status and Popularity


OFTP2 is in widespread use throughout Europe. Originally developed for the European automotive
industry, it touches many more organizations throughout the supply chain, including global parts
manufacturers. OFTP has also seen adoption across the retail, white label goods, manufacturing,
government, transport, insurance, banking industries and many more.

https://arc.cdata.com/resources/edi/protocols.rst 8/12
1/5/23, 2:39 PM EDI Protocols | EDI Messaging Protocols | Types of EDI - CData Arc

Who Uses It?


(/) is most common in Europe. If you work with any European company or have operations in
  (tel:8007438232) 
OFTP
Europe, there's a good chance you'll be using OFTP2. But it has also spread throughout the world to
supply chain partners of European companies and organizations. It's a global standard and can be
used by companies of any size, regardless of geographical location and connection reliability.

Security
OFTP 2 can encrypt and digitally sign message data, request signed receipts and provide mass data
compression. All of these services are available for OFTP2 over TCP/IP, X.25/ISDN or native X.25.
When used over a TCP/IP network, increased session level security is available for OFTP 2 over TLS.

OFTP vs. OFTP2


OFTP was developed to offer a standard communication platform in the mid-1980s. OFTP2 has been
designed from the outset for use across the web, with key advantages over OFTP, including:

Data compression
Exchange of digital certificates between trading partners (to improve security)
It handles massive files (greater than 500 GB)
OFTP2 supports additional character sets, such as Chinese and Japanese

OFTP2 extended the reach of OFTP well beyond Europe, connecting trading partners across the globe.

Web EDI Using Smart Forms


Web EDI is simply conducting EDI through an Internet browser, enabling trading partners to use online
forms to create, exchange, and manage electronic documents. Web EDI makes it easy and affordable
for small and medium-size organizations that only sporadically need EDI.

It replicates paper-based documents using simple, pre-populated forms to help businesses


communicate and comply with their business partners using built-in logic - e.g. if a form is filled out
with X data, do Y with the data. Business partners anywhere in the world can connect without
dedicating IT resources to their EDI implementation.

The forms contains fields where users enter information that's automatically converted into an EDI
message and sent via secure Internet protocols, such as FTPS, Hypertext Transport Protocol Secure
(HTTPS) or AS2.

The ease of web EDI reduces the need for each partner to install EDI software or manage a complex
EDI environment, opening the benefits of EDI to more trading partners. It's particularly useful for
extending EDI to partners in countries with limited IT and EDI specialist resources.

Web EDI is traditionally based around a hub and spoke model, where a major business partner acts as
the hub and smaller partners act as spokes. It looks like this:

https://arc.cdata.com/resources/edi/protocols.rst 9/12
1/5/23, 2:39 PM EDI Protocols | EDI Messaging Protocols | Types of EDI - CData Arc

The hub organization implements EDI and develops a web forms option for its small and mid-

(/)
size partners   (tel:8007438232) 
The web forms are hosted, either on the hub's site or by an EDI network service provider
EDI partners connect to the web forms via web browser to exchange documents as forms
converted to EDI documents behind the scenes
The forms are then processed by the hub

Mobile EDI
As more and more firms seek to mobilize the supply chain and develop corporate apps, new EDI mobile
apps are beginning to appear. In particular, apps for iPads and other tablets are gaining popularity in
the supply chain space.

One emerging use case is the adoption of Direct Exchange (DEX) in the retail industry, in which delivery
personnel scan item barcodes into mobile devices to create invoices. Data is transmitted to receivers
via in-store docking stations, and receivers then open the invoice in the docking system, right then and
there, and scan delivered goods to verify quantities. After data is reconciled, the digital invoice is
automatically closed, and a finalized copy is then transmitted to the supplier system via mobile device.
Some retailers can save half an hour per delivery using this technology, which quickly adds up to
massive time and money savings.

More and more mobile EDI opportunities emerge continuously, though right now there is not a
particular standard transaction set in the space.

Easily Use Any Major EDI Protocol with CData Arc


CData Arc is a convenient, all-in-one EDI software solution that enables you to use any major EDI
protocol to easily connect with your trading partners. In combination with our managed file transfer
(MFT) capabilities and expert EDI integrator network, we make it as fast and easy as humanly possible
to set up EDI for your business - without the costs of a VAN.

Try CData Arc Free for 30 Days (https://arc.cdata.com/edi/)

 EDI: Complete Guide


(/resources/edi/)

 EDI Standards
(/resources/edi/standards.rst)

 EDI Protocols
(/resources/edi/protocols.rst)

 Direct vs. VAN


 AS1
 AS2
 AS3

https://arc.cdata.com/resources/edi/protocols.rst 10/12
1/5/23, 2:39 PM EDI Protocols | EDI Messaging Protocols | Types of EDI - CData Arc

 AS4

(/)
  (tel:8007438232)
 FTP 
 OFTP
 Web EDI
 Mobile EDI

 EDI Integration
(/resources/edi/integration.rst)

 EDI Transactions
(/resources/edi/transactions.rst

 EDI Software
(/resources/edi/software.rst)

Features Solutions

CData Software is a leading


Visual No Code B2B Integration (/b2b-integration/) Logistic
provider of data access and
(/solutions/logist
Managed File Transfer (/mft/)
connectivity solutions. Our Ecommerce
standards-based Electronic Data Interchange (/edi/) (/solutions/ecom
connectors streamline data
access and insulate
API and App Integration (/integration/) Suppliers
customers from the Best In Class Connectivity (/apps/) (/solutions/suppl
complexities of integrating
with on-premise or cloud
Retailers
databases, SaaS, APIs,
(/solutions/retaile
NoSQL, and Big Data. Support Healthcare
(/solutions/health
Download Latest Version (/support/builds/)
CONNECT WITH US
Documentation (/kb/documentation.aspx)
   
(https://www.facebook.com/cdatasoftware)
(https://twitter.com/cdatasoftware/) Downloadable Sample Flows (/flows/)
(https://www.linkedin.com/company/cdatasoftware)
(https://www.youtube.com/c/CDataSoftware) Order

Submit Support Issue (/support/submit.aspx) Ordering


Online
Learn More (Https://Www.Cdata.Com/) Feature Request (/forms/request/)
(/order/)
Premium Support (/support/) Ordering Info
Professional Services (/order/integration/) (/order/info.aspx)

Sales FAQ
(/order/faq.aspx)

Shopping Cart
(/order/cart.aspx)

Resources

Getting Started (/start/)

https://arc.cdata.com/resources/edi/protocols.rst 11/12
1/5/23, 2:39 PM EDI Protocols | EDI Messaging Protocols | Types of EDI - CData Arc

Free Trials (/trial/)

Partners
(/) (/company/partners/)
  (tel:8007438232) 
Case Studies (/case-study/)
Testimonials (/company/testimonials.aspx)

Blog (/blog/)

Knowledge Base (/kb/)

B2B Resources (/resources/)


Whitepapers & Webinars (/guides/)

Copyright © 2023 CData Software Contact (https://www.cdata.com/company/contact.aspx) Terms of Use (/company/legal/terms.aspx)


Privacy Statement (/company/legal/privacy.aspx)
 Chat  800.743.8232 (tel:8007438232)

https://arc.cdata.com/resources/edi/protocols.rst 12/12

You might also like