Skip to Content
Cloud Integration

How to Optimize and Encrypt Your Exchange Infrastructure Java Mappings

This article describes the process of optimizing and encrypting SAP XI Java mappings. The process is based on a technique called "obfuscation." This consists of removing unused code and replacing Java classes, methods, and attributes with encrypted names. The code becomes harder to reverse-engineer, but the functionalities are unaffected by the changes.

View this Document

Former Member

No comments