cancel
Showing results for 
Search instead for 
Did you mean: 

Which RFC Destination need to create while calling Remote Enabled Function Module of SAP from Java Application(developed using Jco Programming)?

Former Member
0 Kudos

We are having a scenario for which we have written an application in Java using SAP JCo Programming which is trying to Connect with SAP using Following information available :- ( SAP Connect Information is available with us)

a)  IP address of the SAP  Server

b) Client of the SAP  system

c) System Number of the SAP system.

d) User credential of the SAP user which must have rights to execute RFC.

e) SAP Gateway(sapgwxx) is enabled.

Working of our Application :-

Step 1 : Our application is calling Remote Enabled Function Module using RFC ("Connecting to SAP using information mentioned above")

Step 2 : Sending data Import Parameters and Table Parameters and after executing the remote enabled function

Step 3 : In the End SAP send output of the execution to our application.In this case RFC Destination may be required.

Step 4 : Receiving output of the execution through Export and Table Parameters.

 

Till now i am able to find that "SAPGUI RFC Destination" will be required for the same.

Also we are not having any scenario in which  ABAP call API of our Java application, so RFC Destinaion related to the same is not required.

Can anyone tell me if there is any other RFC Destination need to be created in SAP in the case when Java Application call Remote Enabled Function present in SAP..

Accepted Solutions (1)

Accepted Solutions (1)

MarkusTolksdorf
Product and Topic Expert
Product and Topic Expert
0 Kudos

Hi Tanvi,

when calling a function module in ABAP from the Java application via JCo you don't have to do anything on ABAP server side. The response is sent via the channel over which the request was sent to ABAP.

Best regards,

Markus

HAL9000
Product and Topic Expert
Product and Topic Expert
0 Kudos

Hi Markus and Tanvi,

well, yes, usually no need to do something at ABAP side in such a scenario. But as always, the appropriate authorizations need to be configured for the used User IDs. Further information can be found in note 460089.

Best regards,

Stefan

Answers (0)