xUML Microservices are at the heart of E2E technology

They consist of the xUML Runtime (the UML interpreter), the model that executes this as well as the adapters used in the models.

xUML Runtime

Our engine for the execution of UML models with a minimal footprint. Via Runtime, traces and transaction logs can be generated directly form the execution of a model. These traces and transaction logs can be subsequently evaluated with our Analyzer and in the Dashboards.

Result: unique traceability, gifted to you as the service modeller need do nothing for it.

BPMN/UML model

The model describes the data structure (classes) and process logic (state machines and activities) of the service as well as the interfaces to other systems

SOAP and/or REST interfaces which the service offers externally Adapter calls for the communication with external interfaces which the service consumes

Result: simple to read models with minimal documentation requirements that are easy to capture and to change, years later or for other modellers.


Powerful, enclosed logic for interaction with the most diverse protocols.

Result: Service modellers can concentrate on the task required and don’t need to grapple with the complicated details of a particular protocol.

E2E services

E2E services communicate among themselves exclusively via standard interfaces (SOAP/REST) and use no proprietary protocols.

Result: any of the services can be exchanged and can be tested in isolation.

PersistentState Adapter

The special persistent state adapter encapsulates the storage of internal statuses. They are stored in one transaction.

Result: no data is lost, even with a power-outage, during longer-duration transactions

More information on this topic:


Transaction security

Transaction security in modelled integration processes: with persistent state services we guarantee that even with long-duration transactions no data will be lost. In addition, these services can be easily generated by BPMN models.

> Further information

Security Interceptor

Modelled security and forensic analysis through model-based integration in any IAM system.

› Further information

Learn more about the strengths of E2E BRIDGE: 

Trusted Technology