Return-Path: Delivered-To: apmail-camel-users-archive@www.apache.org Received: (qmail 50843 invoked from network); 2 Jun 2010 01:51:58 -0000 Received: from unknown (HELO mail.apache.org) (140.211.11.3) by 140.211.11.9 with SMTP; 2 Jun 2010 01:51:58 -0000 Received: (qmail 2414 invoked by uid 500); 2 Jun 2010 01:51:58 -0000 Delivered-To: apmail-camel-users-archive@camel.apache.org Received: (qmail 2372 invoked by uid 500); 2 Jun 2010 01:51:58 -0000 Mailing-List: contact users-help@camel.apache.org; run by ezmlm Precedence: bulk List-Help: List-Unsubscribe: List-Post: List-Id: Reply-To: users@camel.apache.org Delivered-To: mailing list users@camel.apache.org Received: (qmail 2364 invoked by uid 99); 2 Jun 2010 01:51:58 -0000 Received: from nike.apache.org (HELO nike.apache.org) (192.87.106.230) by apache.org (qpsmtpd/0.29) with ESMTP; Wed, 02 Jun 2010 01:51:58 +0000 X-ASF-Spam-Status: No, hits=0.0 required=10.0 tests=FREEMAIL_FROM,SPF_HELO_PASS,SPF_PASS,T_TO_NO_BRKTS_FREEMAIL X-Spam-Check-By: apache.org Received-SPF: pass (nike.apache.org: domain of lists@nabble.com designates 216.139.236.158 as permitted sender) Received: from [216.139.236.158] (HELO kuber.nabble.com) (216.139.236.158) by apache.org (qpsmtpd/0.29) with ESMTP; Wed, 02 Jun 2010 01:51:52 +0000 Received: from isper.nabble.com ([192.168.236.156]) by kuber.nabble.com with esmtp (Exim 4.63) (envelope-from ) id 1OJd7D-0008GM-Ac for users@camel.apache.org; Tue, 01 Jun 2010 18:51:31 -0700 Message-ID: <28749325.post@talk.nabble.com> Date: Tue, 1 Jun 2010 18:51:31 -0700 (PDT) From: "John J. Franey" To: users@camel.apache.org Subject: surrogate key and integration pattern MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit X-Nabble-From: jjfraney@gmail.com X-Virus-Checked: Checked by ClamAV on apache.org Hi, I'm looking for a discussion regarding the temptation to use surrogate keys in integration data. I know that exposing a surrogate key to an external system will naturalize the key, it would become a business data element. I want to avoid that. However, we find we have a requirement to use a unique identifier to correlate the entity among the systems that share the entity. That identifier would likely be called an 'id', just like the surrogate key. Are you successful in keeping your surrogate key hidden, and how do you do that? I want to keep the surrogate key of a Customer, named 'id', hidden. Unfortunately, a business level identifier would also be called a 'customer id'. In order to avoid a confusion, there is temptation to expose the Customer id field. I don't have a good name for the business level identifier. Thanks, John -- View this message in context: http://old.nabble.com/surrogate-key-and-integration-pattern-tp28749325p28749325.html Sent from the Camel - Users mailing list archive at Nabble.com.