[Last Call] Learn how to a build a cloud-first strategyRegister Now


What does "posting well formed XML" mean?

Posted on 2012-08-15
Medium Priority
Last Modified: 2012-08-15
I have a vendor provided WSDL. I'm trying to call their methods but can't get the code working. I can use a Soap emulator and call their WSDl XML. I emailed the vendor and that is what they wrote:

In the general case, yes, you will need to post well formed XML content to the API, but whether you do that manually or via some stub generator is up to you.

Not sure what that means. This is one example of their XML:
<soap:Envelope xmlns:soap="http://www.w3.org/2003/05/soap-envelope" xmlns:xsd="http://www.test.com/IpsApi/xsd" xmlns:ns="http://www.test.com/IpsApi/xsd/2010-01-31">


Open in new window

Question by:Camillia
1 Comment
LVL 60

Accepted Solution

Julian Hansen earned 2000 total points
ID: 38297193
You can find more information here


It basically means the document must follow certain rules with respect to what is contained in the document and how you put data in the document.

Another article that discusses this in detail


Featured Post

Important Lessons on Recovering from Petya

In their most recent webinar, Skyport Systems explores ways to isolate and protect critical databases to keep the core of your company safe from harm.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

One of the pain points with developing AJAX, JavaScript, JQuery, and other client-side behaviors is that JavaScript doesn’t allow for cross domain request for pulling content. For example, JavaScript code on www.johnchapman.name could not pull conte…
IntroductionWhile developing web applications, a single page might contain many regions and each region might contain many number of controls with the capability to perform  postback. Many times you might need to perform some action on an ASP.NET po…
Integration Management Part 2
Is your data getting by on basic protection measures? In today’s climate of debilitating malware and ransomware—like WannaCry—that may not be enough. You need to establish more than basics, like a recovery plan that protects both data and endpoints.…
Suggested Courses
Course of the Month18 days, 13 hours left to enroll

834 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question