• 0Shopping Cart
SiXe Ingeniería
  • Data Center
    • Consulting
      • High Availability with IBM PowerHA
      • AIX and Linux
      • VIOs & PowerVM deployment and migration
      • SUSE and Red Hat Linux
      • IBM Spectrum Storage
    • Infrastructure
      • IBM Power Systems
      • IBM Storage Systems
      • IBM Spectrum Scale (GPFS)
    • Solutions
      • SAP HANA on Power9
      • IBM Cloud Private
    • Services
      • Maintenance of AIX and Linux systems
      • Professional services and turnkey projects
  • Cibersecurity
    • IT Security
      • IBM QRadar SIEM
      • Sealpath IRM. Solution for document protection and GDPR compliance
      • IBM Resilient Incident Response Platform
      • Security and compliance on AIX with PowerSC
      • IBM i Series / AS400
      • Checkpoint
      • Other Services
        • Audit (ISO 27001)
    • OT Security
      • Industrial & IoT cybersecurity solution with Indegy ICS and QRadar
      • Device Integrity
      • Risk Assessment
  • Training
    • AIX, PowerHA & PowerVM
      • IBM AIX V7 Certified Administrator Preparation Workshop
      • High availability with PowerHA Systems Mirror for AIX and Linux
      • AIX administration for UNIX professionals
    • Linux & Cloud
      • Linux Engineer training for RHCE, SCE and LFCE certifications.
      • What’s new on Red Hat Linux 8 – Workshop for Linux Administrators
      • Linux virtualization course with KVM and Ovirt
      • Virtualization with VMWare ESXi & vSphere
      • Red Hat OpenShift 4. Architecture, operations and administration
      • Red Hat Ansible Course. Automation and orchestration for Linux
    • IBM QRadar SIEM
      • QRadar Certification Bootcamp
      • Cybersecurity analyst training with IBM QRadar SIEM
      • IBM QRadar SIEM Threat and Operation Analysis
      • IBM QRadar SIEM. Advanced Operations
      • IBM QRadar SIEM Administration (BQ150)
    • IBM Spectrum Suite
      • IBM Spectrum Computing (LSF)
      • IBM Spectrum Scale (GPFS)
      • IBM Spectrum Protect v8 (Tivoli Storage Manager – TSM)
    • Other technologies
      • IBM Tivoli Monitoring
      • IBM Guardium Operations and Administration course
      • COBOL, ILE & RPG Analyst Course for IBM i systems
      • Tailor-made trainings
    • Official IBM Trainings (worldwide delivery)
  • Request a demo
  • About us
  • Contact us!
  • Search
  • Menu

Other technologies

  • Blockchain (1)
  • CICS (9)
  • Cognos (39)
  • DB2 (32)
  • IBM AIX (8)
  • IBM Algo One (17)
  • IBM API Connect (2)
  • IBM BigInsights (7)
  • IBM BladeCenter (3)
  • IBM Business Process Manager (29)
  • IBM Case Foundation (11)
  • IBM Case Manager (9)
  • IBM Cloud Management (3)
  • IBM Content Navigator (6)
  • IBM Curam (13)
  • IBM Datacap (11)
  • IBM DataPower (5)
  • IBM Decision Server (4)
  • IBM Disk Systems (3)
  • IBM Enterprise Records (8)
  • IBM FileNet (11)
  • IBM Flash (2)
  • IBM i (13)
  • IBM Informix Database Administration (1)
  • IBM Infosphere (31)
  • IBM Integration Bus (3)
  • IBM Open Platform (1)
  • IBM OpenPages (5)
  • IBM Operational Decision Manager (8)
  • IBM Operations Analytics (3)
  • IBM Planning Analytics (4)
  • IBM PureData Systems (7)
  • IBM Rational (6)
  • IBM Security (3)
  • IBM SmartCloud (5)
  • IBM Spectrum (10)
  • IBM SPSS Modeler (11)
  • IBM Sterling (15)
  • IBM Storage (4)
  • IBM TRIRIGA (5)
  • IBM Watson (6)
  • IMS (30)
  • Informix (1)
  • Linux (15)
  • Miscellaneous (5)
  • Other Programming Languages (2)
  • Power Systems (14)
  • PowerHA (3)
  • SPSS (8)
  • Tivoli (26)
  • WebSphere (21)
  • z/OS (46)

Other popular trainings

  • IBM FileNet Content Manager 5.2.1: Administration
  • TCP/IP for z/OS Implementation Workshop
  • IBM Cognos Analytics: Enterprise Administration (v11.0.x)
  • IBM Open Platform with Apache Hadoop
  • Developing Applications in IBM Business Process Manager Advanced V8.5.7 - I
  • Supporting REST and JOSE in IBM DataPower Gateway V7.5
  • InfoSphere MDM Workbench V11
  • IBM Spectrum Protect Plus 10.1.4 - Implementation and Administration
  • Predictive Modeling for Continuous Targets Using IBM SPSS Modeler (v18.1.1)
  • Jazz for Service Management 1.1 Dashboarding Made Simple

IBM Sterling Order Management (V9.5) Configuring Participant Modeling, Process Modeling, and User Security

This course provides students with an understanding of the configurations required to map participants in a supply chain to the corresponding roles in Sterling Order Management. The course also teaches students the process of setting up the Sterling Selling and Fulfillment Foundation business process workflow. This course is primarily designed for developers and implementers.

This course begins with an overview of Sterling Order Management and the business models it supports. The course then describes how to define participants and create organizations and users.  Through a combination of procedural information and exercises, students will learn about topics such as how to assign attributes to the different roles defined in Sterling Order Management and configure user access policies.

The course also covers Process Modeling features, including how to set up a business process workflow for an organization. Students are then introduced to statuses, conditions, transactions, and other components of a process type pipeline. The course then describes how to create a process type pipeline.

Category: IBM Sterling
  • Description

Description

At Sixe Engineering we have been providing official IBM training around the world for over 12 years. Get the best training from our specialists in Europe. We have important discounts and offers for two or more students.

Course details

IBM course code: 6F91GCategory: IBM Sterling / Selling and Fulfillment
Delivery: Online & on-site**Course length in days: 3

Target audience

This course is designed to train developers and implementrs.

Desired Prerequisites:

None.

Instructors

The great majority of the IBM courses we offer are taught directly by our engineers. This is the only way we can guarantee the highest quality. We complement all the training with our own materials and laboratories, based on our experience during the deployments, migrations and courses that we have carried out during all these years.

Added value

Our courses are deeply role oriented. To give an example, the needs for technology mastery are different for developer teams and for the people in charge of deploying and managing the underlying infrastructure. The level of previous experience is also important and we take it very seriously. That is why beyond (boring) commands and tasks, we focus on solving the problems that arise in the day to day of each team. Providing them with the knowledge, competencies and skills required for each project. In addition, our documentation is based on the latest version of each product.

Agenda and course syllabus

The following topics will be covered during this course:

  • Course Overview
  • Unit 1: Overview of Applications Manager
    • Exercise 1.1: Navigate to Application Platform
  • Unit 2: Configuring Organizations
    • Lesson 2.1: Defining Participants and Roles
    • Lesson 2.2: Creating Organizations
    • Exercise 2.2.1: Create Child Organizations and Department
    • Lesson 2.3: Assigning Attributes to Roles
  • Unit 3: Creating Users and Configuring Access Policies
    • Lesson 3.1: Prerequisites for User Creation
    • Exercise 3.1.1: Create a User Group and Team
    • Lesson 3.2: Configuring Users and Access Policies
    • Exercise 3.2.1: Create a User
  • Unit 4: Case Study
    • Lesson 4.1: Case Study
  • Unit 5: Overview of Process Modeling
    • Lesson 5.1: Overview of Process Modeling
  • Unit 6: Configuration Basics
    • Lesson 6.1: Statuses and Conditions
    • Exercise 6.1.1: Create a Status and Condition
    • Lesson 6.2: Services, Events, Actions, and Transactions
    • Exercise 6.2.1: Create an Action and Service
    • Exercise 6.2.2: Configure Drop-Ship Fulfillment
    • Lesson 6.3: Pipeline Creation and Determination
    • Exercise 6.3.1: Create an Order, Pipeline, and Pipeline Determination Rule
  • Course Wrap Up

Do you need to adapt this syllabus to your needs? Are you interested in other courses?  Ask us without obligation.

Locations for on-site delivery

  • Austria: Vienna
  • Belgium: Brussels, Ghent
  • Denmark: Cophenhagen
  • Estonia: Tallinn
  • Finland: Helsinki
  • France: Paris, Marseille, Lyon
  • Germany: Berlin, Munich, Cologne, Hamburg
  • Greece: Athens, Thessaloniki
  • Italy: Rome
  • Louxemburg: Louxembourg (city)
  • Netherlands: Amsterdam
  • Norway: Oslo
  • Portugal: Lisbon, Braga, Porto, Coimbra
  • Slovakia: Bratislava
  • Slovenia: Bratislava
  • Spain: Madrid, Sevilla, Valencia, Barcelona, Bilbao, Málaga
  • Sweden: Stockholm
  • Turkey: Ankara
  • United Kingdom: London

Related products

  • IBM Sterling Order Management (V9.5) Inventory Management and Order Management Business Rules

    Number of students / Número de estudiantes Show Details
  • IBM Sterling Connect:Direct for z/OS v5.2.0 Fundamentals

    Number of students / Número de estudiantes Show Details
  • IBM Sterling Secure Proxy Technical Fundamentals v3.4.2

    Number of students / Número de estudiantes Show Details
  • IBM Sterling B2B Integrator Fundamentals

    Number of students / Número de estudiantes Show Details

Latest news!

  • Red-Hat-Enterprise-Linux-8.1What’s new in Red Hat 8.1. Live kernel patching and Red Hat Insights6 November, 2019 - 11:35
  • End of IBM Power6/7 support. Shall we migrate?13 July, 2019 - 12:41
  • Certified QRadar Analyst SIEM 7.3.2 C0003502 trainingWhich IBM QRadar SIEM certification shall I choose?12 July, 2019 - 21:32

Contact us!

Request a demo

Contact form

+34 91 198 02 43 (EU)

+1 628 90 03 024 (US)

Mon – Fri | 8:30 – 16:30 (GMT + 1)

Partners

  • CyberArk
  • Docker
  • Fortinet
  • IBM
  • Indegy
  • Kaspersky
  • Lenovo
  • Red Hat
  • Sealpath
  • SUSE

Most popular trainings

  • IBM Integration Bus V10 System Administration
  • IBM Spectrum Protect 8.1.6 Implementation and Administration
  • IBM FlashSystem V9000 Storage Implementation
  • Move to Cloud with IBM Cloud PowerVC Manager
  • Introducing z/OS UNIX System Services
© 2019 All rights reserved - SiXe Engineering | IBM, Docker, Red Hat , Indegy, Veeam, Sealpath & SUSE Authorized Business Partner. Company registered in Catalogue of companies and cybersecurity solutions of INCIBE.
  • Twitter
  • Dribbble
IBM Sterling Connect:Direct for z/OS v5.2.0 Fundamentals IBM Cúram SPM for Developers (ADE) 7.X
Scroll to top

This site uses cookies. By continuing to browse the site, you are agreeing to our use of cookies.

OKLearn more

Cookie and Privacy Settings



How we use cookies

We may request cookies to be set on your device. We use cookies to let us know when you visit our websites, how you interact with us, to enrich your user experience, and to customize your relationship with our website.

Click on the different category headings to find out more. You can also change some of your preferences. Note that blocking some types of cookies may impact your experience on our websites and the services we are able to offer.

Essential Website Cookies

These cookies are strictly necessary to provide you with services available through our website and to use some of its features.

Because these cookies are strictly necessary to deliver the website, refuseing them will have impact how our site functions. You always can block or delete cookies by changing your browser settings and force blocking all cookies on this website. But this will always prompt you to accept/refuse cookies when revisiting our site.

We fully respect if you want to refuse cookies but to avoid asking you again and again kindly allow us to store a cookie for that. You are free to opt out any time or opt in for other cookies to get a better experience. If you refuse cookies we will remove all set cookies in our domain.

We provide you with a list of stored cookies on your computer in our domain so you can check what we stored. Due to security reasons we are not able to show or modify cookies from other domains. You can check these in your browser security settings.

Other external services

We also use different external services like Google Webfonts, Google Maps, and external Video providers. Since these providers may collect personal data like your IP address we allow you to block them here. Please be aware that this might heavily reduce the functionality and appearance of our site. Changes will take effect once you reload the page.

Google Webfont Settings:

Google Map Settings:

Google reCaptcha Settings:

Vimeo and Youtube video embeds:

Privacy Policy

You can read about our cookies and privacy settings in detail on our Privacy Policy Page.

Más información sobre las cookies
Accept settingsHide notification only