E-Signing Functional description

Size: px
Start display at page:

Download "E-Signing Functional description"

Transcription

1 Nets Norway AS Haavard Martinsens Vei 54 NO-0045 Oslo T F Foretaksregisteret NO E-Signing Functional description Version: 2.9 Date: p. 1-59

2 Contents 1. Introduction... 5 Purpose... 5 Intended audience... 5 Referenced documentation... 5 Terms and definitions... 6 Acronym... 7 Change log... 8 Contact information E-Signing overview and functions... 9 Architecture... 9 Interfaces... 9 Security... 9 Notification eid providers eid hosting E-Ident E-Archive ID-Rights SDO PAdES Use cases Become customer Multisignature signing flow Gathering an InsertOrder The InsertOrder message Documents One or several documents Document formats and sizes The XML document format XML Examples Identification before signing (RequiresAuthentication) Signers End user Merchant Notification XML example Merchant Channels Notification Web context WebContext element Normal GUI Reduced GUI XML example Execution details Deadlines Signing process Steps Sequential signing Parallel signing Combination signing

3 Summary of order execution Post processing Archive Administration of orders Intro Order status Step status Signing process status Administration messages Get signing processes Get order status Get order details Get order Get orders Cancel order Modify order deadline Modify Signing Processes Get documents Get SDO Get SDO details Merge SDOs Validate SDO GetNotificationLog Delete Document Data Get PAdES Generate PAdES SignWeb Intro Normal GUI Reduced GUI Iframe in Iframe Forcepkivendor Using ID-Rights with E-Signing Overview Functions The Organizations element The B2BPostProcessing element Response messages affected by ID-Rights Example Notices Notifications Intro Notification triggers Reminder settings and SMS notification Useful information Intro E-Signing java client API Supported XML schema versions System requirements SDO validator Support Request new functionality Appendix A: A complete example of an InsertOrder. 54 Content of example

4 XML example

5 1. Introduction Purpose This document is a functional description and will detail the concept of E- Signing. E-Signing aims to offer Merchants: - Advanced, yet user friendly, signing services based on digital IDs independent of eid providers. - An easy way to integrate systems to E-Signing - Notification services and interfaces Intended audience This document is intended for business integrators and application developers. Referenced documentation Document Nets E-Archive-E- Signing Implementation Guide Nets E-Archive Implementation Guide Nets E-Signing Sign- Web Integration Guide Nets RMS Interface Specification Nets TrustNotificationMessage Interface Specification Nets TrustSign- Message Interface Specification Nets UDD Style Guide RMSMessage XML Schema TrustNotification- Message XML Schema TrustSignMessage XML Schema Description An implementation guide on how to use the E- Archive together with E-Signing. An implementation guide on how to integrate directly to the E-Archive web services. This document describes the integration to SignWeb like the use of WebContexts, technicalities involved with reconfiguring sign process page flows and more. A detailed description of the RMSMessage XML schema A detailed description of the E-Signing Notification service. This document describes the XML messages in the TrustSignMessage communication protocol for accessing E-Signing. The UDD Style guide gives guidelines on how to implement custom style sheets and information on various constraints involved with implementing the SignWeb application within the Merchant site. The schema defining the RMSMessage XML message structure. The schema defining the TrustNotification XML message structure. A schema defining the TrustSignmessage XML message structure. 5-59

6 Terms and definitions Term eid provider End user Merchant Merchant certificate Order Partial SDO Reminder Signed Data Object Signer Signing order Description Equivalent to ID provider or PKI provider, i.e. BankID, BuyPass, NemID etc. The Customer s customer, signatory, signer or other physical person with which the Customer has a relationship regarding signing of electronic documents utilising E-Signing. A legal entity that is a E-Signing customer. Websites or electronic services that use the Service for secure identification, signing, archiving and/or inquiries to ID-Rights. A company can have one or more Merchants. The company/merchants eid certificate. This is equivalent to the Norwegian Virksomhetssertifikat or Brukerstedssertifikat, the Swedish Förlitande sertifikat and the Danish Virksomhedssignatur (VOCES). A construct holding documents, End users, notification rules and execution details. A Partial SDO is an SDO including only one document and all signers that have signed the document at the requested time. A partial SDO is generated after each Signing process in the order. A reminder is a setting that may only exist on a Signing process and is a notification message. A reminder has a StartTime and an interval in hours. A reminder is sent to the signer referenced to in a SigningProcess if the Start- Time is reached. The reminder is sent after every interval period. A reminder is sent to all channels defined on the referenced signer that has the OnReminderEvent trigger set. A Signed Data Object (SDO) is an XML document holding signatures and certificate revocation data along with the signed documents. This structure may be considered as an obliging digital contract and is the outcome of all SignProcesses. See the SDO section in chapter 2. An End user or Merchant that performs a signing operation. Documents, signing rules and information on the End user and/or signatory, submitted by the customer to the signing solution. A Signing order is an order to E-Signing. The Signing order consists of the document(s) to be signed, the Signer(s), the web context, execution details. The Signing order may be equivalent to the InsertOrder message in the 6-59

7 TrustSignMessage XML interface. Signing process Signing URL Step StepNumber Trigger A Signing process is constructed holding information about a single signer, a single document, a single WebContext and optionally a deadline and reminder settings. A Signer may only sign one document at a time. An URL that is constructed by E-Signing. If accessed, this URL will start a Signing process. A Step is a collection of Signing processes that may be executed simultaneously. The Step with the lowest StepNumber is executed first. An order may consist of many steps. Only one Step may be Active at any given time. Each Step has a StepNumber. The Step- Numbers are given in ascending order, and the Step with the lowest StepNumber is executed first. A Trigger is a setting that is found on the NotificationChannel element in the TrustSign- Message InsertOrder request. The value of this element tells E-Signing when to trigger a notification to the channel this element resides in. Acronym Acronym Description HTML HTTP HTTPS NTP PDF PKI SDO SEID SDO SMS SSL UTC HyperText Markup Language HyperText Transfer Protocol Secure HTTP Network Time Protocol Portable Document Format Public Key Infrastructure Signed Data Object Samarbeidet om Elektronisk ID Detailed information about SEID SDO: SEID_Leveranse_3_v1.0.pdf Short Message Service Secure Socket Layer Coordinated Universal Time UTF-8 A character encoding format of ISO (RFC 3629) XML XMLDSIG XSL extensible Markup Language XML Digital Signature XML Stylesheet Language 7-59

8 Change log This is a list of the changes done to this document: Version Description Date 2.0 The document has been restructured and updated with new word template and new service name. 2.1 Updated with: Merchant signing is no longer limited to BankID (NO) and Buypass in the eid hosting section of chapter2. - New version of SDO list figure in the SDOsection of chapter2. - Information about document sizes in Document formats and sizes 2.2 Information about a SDO validator added to chapter 9. Updated list of supported eids. Information about identification before signing and the use of the GetSigningProcesses message. 2.3 Added information about the parameter forcepkivendor. Removed Mobile BankID (SE) from list of eid s as this is now a part of BankID (SE). 2.4 Updated information about E Archive, a new XML message (DeleteDocumentData) and a new order status. 2.5 Minor error correction Error corrections Added information about PAdES Updated with new last page picture for PAdES 2.9 Added note in the PAdES section Contact information Nets Signing and Identification Services has its own support. All technical questions can be directed to the support. The support can be reached at: support.esecurity@nets.eu. Business related questions should be directed to: sales.esecurity@nets.eu. 8-59

9 2. E-Signing overview and functions Architecture Interfaces Merchants and End users communicates with E-Signing through the following interfaces: - TrustSignMessage XML scheme - TrustNotificationMessage XML scheme o This is the XML notification interface used to notify Merchants about changes to Signing orders in E-Signing. See chapter 8 about notifications and the Nets TrustNotificationMessage XML Interface specification for more information. - SignWeb o This is the interface between E-Signing and the End user (Signer). See chapter 6 for more information about Sign- Web. Security The service uses signed XML messages when interacting with E-Signing. All messages to the service are signed using a signing certificate issued from Nets CA Eurida. E-Signing validates the signature, authenticates the calling party and performs authorization checks based on the request at hand. If the calling party is authenticated and authorized then the request are handled by E-Signing. The communication line between the Merchant and Nets is based on twoway SSL using client certificates issued by the Nets CA Eurida. 9-59

10 Notification eid providers Notifications may be sent to both the Merchant and the Signer. More information about notifications is found in chapter 8. The following eid s are supported in E-Signing: - BankID (Norway) / BankID-app (Norway) - BankID on mobile phones ( BankID på mobil ) (Norway) - Buypass Smartcard (Norway) - BankID including Mobile BankID and Nordea e-legitimation (Sweden) - Telia e-legitimation (Sweden) - NemID POCES (Denmark) - NemID MOCES (Denmark) Information about the eid providers can be found in Appendix 2 eid providers in the Nets E-Signing Integration guide. Note: There might be some functions that are only available for some eid providers. The restrictions are found in both the above referred to integration guide and the Nets TrustSignMessage XML Interface specification. eid hosting E-Ident E-Archive E-Signing hosts a customer s Merchant certificate on behalf of the Merchant. The Merchant certificate is issued to the Merchants organization. The following is the usage of the Merchant certificate in E-Signing: - Communication with eid providers: When using the signing applet and to validate a Signers certificate. - To seal the SDO: The entire SDO is signed to ensure its integrity. - Merchant signing: A Merchant may be one of the Signers of a document, and this is specified in the Signing order. If the Merchant has more than one eid enabled, the signing eid must be specified as well. The E-Ident service has been integrated with E-Signing to identify a user prior to presenting the document. The functionality used here is Identification before signing, and if confidentiality protection of the document to be signed is required this function can be used. A signed document (SDO) may be archived automatically in E-Archive with indexes specified when adding a Signing order to E-Signing. Documents stored in E-Archive can be retrieved using the E-Archive portal through Nets customer portal or by integrating the E-Archive web services in your Merchant application. It is also possible to archive documents to another organisation s E-Archive as long as that organisation is whitelisted in the customer configuration. This may be useful when an organisation is operating in different countries with different organisation numbers. The archival status can be retrieved from E-Signing using any of the administration messages GetOrder, GetOrders, GetDocuments, GetOrderDetails and GetOrderStatus. These messages are described more in chapter 5 and in the Nets TrustSignMessage XML Interface specification. ID-Rights The ID-Rights service has been integrated with E-Signing offering the possibility to verify procuration and signing rights after all documents in a Signing order have been signed. It is also possible to fetch and attach Business certificates to the signed document (attached in the SDO structure)

11 More information about the use of ID-Rights together with E-Signing is found in chapter 7. SDO A digitally signed document is often represented in formats that are challenging to visualize for the customer. Digitally signed documents also require a compilation of data to be able to prove in a future conflict (court case, dispute etc.) that a specific person actually signed this specific document at a proven time in the past. The SEID SDO is a XML based data package designed to act as a selfcontained validation of one or more digital signatures on one or more documents. The reason for this format is to be able to confirm non repudiation and integrity of the signed document independent of time. Thus the result of a digital signing process can be packaged into a SEID SDO format to simplify validation, traceability and visualization of the signed document. A comparable format is PAdES which uses Acrobat reader to visualize the digital signature embedded in a.pdf document. The Nets E-Signing service produces both a SDO and a PAdES file (if requested) as the result of a digital signing process. The format is structured as an SDOlist with one or more SDOs. Each SDO consist of - One document - One or more signatures - One seal - Signing time or validation time SDOLIST SDO1 SIGNATURES 1-n SIGNATURE VALIDATION DATA (OCSP or CRL) SIGNATURE DATA SEAL SIGNATURE VALIDATION DATA (OCSP or CRL) SIGNATURE DATA DOCUMENT META DATA 1-n KEYVALUEPAIR SDO2 SIGNATURES 1-n SIGNATURE VALIDATION DATA (OCSP or CRL) SIGNATURE DATA SEAL SIGNATURE VALIDATION DATA (OCSP or CRL) SIGNATURE DATA DOCUMENT META DATA 1-n KEYVALUEPAIR A seal is a signature over the document and the signatures. The customer s merchant/organization certificate hosted by E-Signing is used to seal 11-59

12 the document. The E-Signing service can also make partial SDO s available. A Partial SDO is a SDO including only one document and one signer. A partial SDO is generated after each signing process in the Signing order. The partial SDO is available using the GetDocuments message in the TrustSignMessage XML interface. More information about the SEID SDO standard can be found here: Nets offers a SDO validator to view and validate SDO s. More information about the validator is found in chapter 9. PAdES PAdES (PDF Advanced Electronic Signatures) is a standard for signed documents, and the standard is maintained by ETSI (ETSI TS ). Information about the standard and links to documents may be found at Wikipedia: As a customer of the E-Signing service you may choose to get the signed documents in the PAdES format. E-Signing is using the PAdES-BES standard without the use of signature policy. The signed document are following the LTV-profile (TS ) with the use of a TSA service from GlobalSign. To retrieve the signed documents in accordance with PAdES standard there is two ways to do so in E-Signing. Firstly, you may request the document using the GetPAdES XML message, or secondly request the generation of a signed document based on a SDO using the GeneratePAdES XML message. The retrieval of the document from E-Signing with the GetPAdES message is only available for 90 days after the order has been completed. A PDF signed document from E-Signing may only be generated from a PDF file (and not from a text or XML document signed through E-Signing). When generating the PDF signed document, the E-Signing service is appending the following to the original document: - A document reference on each side of the document - A last page with the document reference and information about the signer(s) of this particular document. - An extract of the signature from each signer (as an attachment in the document) The document is sealed using a certificate issued to Nets Norway AS from GlobalSign

13 The last page is added by Nets may look like this: The last page is available in four languages: - English (default if no other language are specified) - Norwegian - Danish - Swedish The default format for signed documents through E-Signing is still SDO, and this document should always be used in case of conflicts. The signed PDF document (PAdES) only includes extracts of the original signatures and not the entire signature. Note: The use of this function may have an extra cost. If it is not already priced in your agreement, please contact sales.esecurity@nets.eu to retrieve the price list and an offer

14 3. Use cases This chapter includes a use case become customer with a single user and a single document and a use case with a multi signature flow. Become customer This use case describes a scenario where an End user becomes a customer of the Merchant. The use case involves the signing of one document by the End user. The agreement to become a customer is signed when the customer is inside the Merchant s web site, and is a synchronised work flow. 1. The End user accesses the Merchant s web site with the purpose of becoming a customer. At the Merchant s web site the End users finds information about how to become a customer and a form to supply contact information. 2. The Merchant uses the below information to assemble a Signing order to use E-Signing in the signing flow. The Signing order is sent to E-Signing when completed: a. A Signer ID like SSN or another unique ID b. The preferred eid the End user will use to sign the document with (for example NemID, Buypass, BankID or other eid supported by E-Signing) c. The document to be signed. This can be a preconfigured agreement that is automatically filled out with the End user s contact information. The document format is depending on the eid to be used. Most eid s support TEXT or PDF. d. The execution details about signing deadlines and archival information. e. Merchant XML notification when the Signing order is com

15 plete ( OnOrderCompletion trigger). 3. The E-Signing service receives the InsertOrder XML message, and performs some internal actions before a response ok message is returned. 4. Based on the InsertOrderResponse message the Merchants requests E-Signing for a Signing URL using the GetSigningProcesses message. 5. The E-signing service replies with at Signing URL to the End user s signing process. 6. The Merchant redirects the End user to the E-Signing SignWeb interface. This redirect may happen inside an IFRAME at the Merchant s web site or as a redirect to a Nets branded web site. E- Signing display s the specified eid providers signing client with the document to be signed. The End user s reads the document and signs it inside the eid provider s applet. 7. The E-Signing SignWeb interface redirects the End user back to the Merchant s web site. 8. The E-Signing service generates a SDO (the format of the signed document) and archives the document in Nets E-Archive (if specified in the Signing order). 9. The E-Signing notification service sends a XML notification to the Merchant s system informing the Merchant that the signing process is complete. The Merchant has just got a new customer. 10. A customer service representative at the Merchant may access the E-Archive using either a portal or web services to view the new agreement. The sequence in this use case shows how the simplest possible Signing order is executed. This order fulfils the minimum criteria s: one signer and one document. The figure illustrates a synchronous signing workflow where the order is created and signed by the End user within the current End user session/sequence. E-Signing also supports asynchronous workflow. Asynchronous workflows allow Merchants to create orders not initiated by the End user. These could be created by merchant applications as part of internal processes (e.g. by customer service representatives). For such a workflow, step 1 in the above sequence does not exist and the End user is notified ( or SMS) when the Signing URL is ready

16 Multisignature signing flow The figure above is a sequence diagram describing the workflow in a Signing order that involves three signers. The three signers complete their signing processes one after the other. The signers do not have the option of signing in the same time frame (parallel signing). We will have a look at how such a Signing order is assembled. The order should fulfil the following merchant criteria s: - There are three documents. It is crucial that document one is signed by signer one before document two is signed by signer two. And then document three should be signed by signer three to complete the order. - The merchant wants a notification after each signing operation (Signing process) and when the Signing order is completed. - It is important that the merchant gets notified if any of the signers reject their Signing processes, since a rejection could terminate the entire order. - Each signer must get a notification by when his Signing process is ready for signing - The Signers have to use the eid defined by the Merchant for signing - The order must be completed by :00 AM. The sequence diagram in the figure shows the following: 1. The merchant assembles an InsertOrder request according to its own criterias and sends it to E-Signing. E-Signing sends a success response. The order contains the following: a. 3 documents. b. 3 signers. Each signer is defined with a social security number and an notification channel. The notification channel is set to be triggered when the signer s 16-59

17 Signing process is ready. c. An XML service notification channel for the merchant itself (The InsertOrder Merchant element. See the Merchant section in chapter 4). This channel is set to be triggered if a Signing order is rejected and each time a Signing process is completed and when the Signing order as a whole is complete. d. The order deadline. e. 3 steps. i. Step 1 holds a Signing process that references signer1 and document 1. The Signing process rejection flag, TerminateOnSignerRejection, is set to true. This means that the order is terminated if this signer rejects signing the document. ii. Step 2 holds a Signing process that references signer2 and document 2. The Signing process rejection flag, TerminateOnSignerRejection, is set to true. iii. Step 3 holds a Signing process that references to signer3 and document 3. The SigningProcess rejection flag, TerminateOnSignerRejection, is set to true. 2. The first signing process with signer 1 and document 1 is set to the Active status. This triggers an notification to signer 1 from the E-Signing notification service. The requests signer1 to sign document 1 by accessing the Signing URL attached to the Signer1 accesses the Signing URL and completes his Signing process. The signing process is completed and receives the Complete status. As this is the only signing process in the first step, the step is also set to Complete. 4. The Merchant has requested to be notified when each signing process is complete. Therefore, the E-Signing notification service sends an XML message to the Merchant saying just that. 5. The signing process in step 2 is now Active. This triggers an notification to signer 2. The requests signer2 to sign document 2 by accessing the Signing URL attached to the Signer2 accesses the Signing URL and completes his Signing process. The signing process is completed and receives the Complete status. As this is the only signing process in the second step, the 17-59

18 step is also set to Complete. 7. The Merchant is again notified about the completed signing process. 8. The signing process in step 3 is now Active. This triggers an notification to signer 3. The requests signer3 to sign document 3 by accessing the Signing URL attached to the Signer3 accesses the Signing URL and completes his Signing process. The signing process is completed and receives the Complete status. As this is the only signing process in the second step, the step is also set to Complete. This is also the last step in the Signing order. The order is set to Complete 10. The Merchant is again notified about both the completed signing process and the completed Signing order. The merchant has the option to retrieve information about the Signing order, both during and after completion of the Signing order. The Merchant can use any of the administration messages in the TrustSignMessage web service to request information. The GetOrderStatus is a useful message. The signed document (SDO) holds all the signer signatures along with the signed documents and acts as a digital contract. The SDO is the proof that the signing processes took place. The SDO can either be archived in E- Archive (this must be defined in the InsertOrder message) or the Merchant can use the GetSDO message to retrieve the signed document container

19 4. Gathering an InsertOrder The InsertOrder message The InsertOrder message in the TrustSignmessage interface is the main XML message to E-Signing. This chapter aims to give Merchants guidance on how to assemble a Signing order. The figure below shows an overview of this message. Each Signing order must have a unique OrderID. The OrderID is used to keep track of Signing orders sent to E-Signing. The OrderID is a string with a maximum length of 40 characters. Each Signing order may have an OrderDescription describing this particular Signing order. In the following section the rest of the elements in the InsertOrder are described in details. A complete example of an InsertOrder message involving two signers and three documents is shown as an appendix in chapter

20 Documents One or several documents A Signing order must contain one or more documents. For each document that is going to be added to the Signing order, a new Document element must be created (InsertOrder Documents Document). To add a document to the InsertOrder request do the following: - Create a new Document-element - Give the document a LocalDocumentReference. This is a label that must be unique for every Document-element in the current InsertOrder request. This label is referenced later in the InsertOrder request when the Signing Processes are assembled. - Give the document a Title. This will be displayed to the Signer and should give him an idea of the contents of the document. - Give the document a Description. This should be something that gives meaning to the Signer of this document. The description is presented to all End users signing this document. - If the document is a PDF, provide the document content as a base64-encoded byte-array If the document is a TEXT, provide the document UTF-8 bytes. The document UTF-8 bytes must be Base64-encoded

21 Document formats and sizes The support of document formats are depending on the eid the End user is going to use when signing the document. The formats supported in E-Signing are: - PDF - Text - XML Regarding which document format supported for your eids, see one of the appendices in the Nets E-Signing Integration guide. There is a maximum limit for the size of each Signing order and the size of a document. This limit is currently set to 5 MB for both. This means that it is possible to create a Signing order with one document with the size of 5 MB. If there are several documents in the Signing order, the total must not exceed 5 MB. However, Nets has tested the document sizes for some of the eids, and below is the currently recommended size limit of a document for a particular eid. eid BankID (NO) / Bank- ID-app BankID på mobil (NO) BankID (SE) NemID with keycard ( nøglekort ) (DK) NemID with keyfile ( nøglefil ) (DK) Telia e-legitimation (SE) Recommended document size (base64 encoded) 3 MB 116 characters 2 MB 3 MB 1 MB 1 MB Note: It is recommended to test the size of your document. When testing the document sizes, test both to add an InsertOrder to E-Signing and to fetch the document using GetSDO or GetDocuments. Further, when using NemID, be aware that the SDO may become quite large when using both a large document and several signers. This is due to the fact that a SDO with NemID signatures includes the document itself + NemID signatures, and all NemID signatures include both the signature and the document itself. The SDO may therefore be doubled, tripled, and so on in size dependent on the number of signers. This may result in problems using the GetSDO and GetSDODetails functions from E-Signing

22 The XML document format Signing an XML-document is supported, but must be handled slightly different from the merchant s point of view. The issue to keep in mind here is how to present the XML to the End user. XML Examples The Document element XML for a PDF document will be like: <Document> <LocalDocumentReference>DOC1</LocalDocumentReference> <Presentation> <Title>This is the title</title> <Description>This is the desc</description> </Presentation> <DocType> <PDF> <B64DocumentBytes>ANSGKFLSDSF==</B64DocumentBytes> </PDF> </DocType> </Document> The Document element XML for a TEXT document will be like: <Document> <LocalDocumentReference>DOC1</LocalDocumentReference> <Presentation> <Title>This is the title</title> <Description>This is the desc</description> </Presentation> <DocType> <TEXT> <B64DocumentBytes> ANSGKFLSDSF==</B64DocumentBytes> </TEXT> </DocType> </Document> The Document element XML for a XML document will be like: <Document> <LocalDocumentReference>DOC3</LocalDocumentReference> <Presentation> <Title>The title for DOC3</Title> <Description>The description for DOC3</Description> </Presentation> <DocType> <XML> <B64XMLBytes>the xml bytes b64 encoded</b64xmlbytes> <B64XSLBytes>the xsl bytes b64 encoded</b64xslbytes> </XML> </DocType> </Document> 22-59

23 Identification before signing (RequiresAuthentic ation) It is possible to force End users to identify themselves before presenting the document to be signed. The Identification before signing (RequiresAuthentication) function is typically used when the content of the document to be signed is sensitive. This field is a true/false parameter. If the parameter is set to true, the End users will need to identify themselves before signing. The identification and signing will be performed using the same eid provider. For some eid s the SSN from the InsertOrder will be used as a presetid, and the End user will not be presented with the page in the applet where the SSN is provided. The eid s having this feature is dependent on eid s with the possibility to set SSN as PresetID in E-Ident. Signers The Signers element is mandatory and must contain at least one Signer element. A Merchant may want to sign a document with its own eid, hosted by E-Signing (often referred to as Merchant certificate). This is done by specifying a MerchantSigner. A Signer may either be an EndUserSigner or a MerchantSigner. End user An EndUserSigner is typically an End user who is the merchant s customer. This signer signs documents using a web browser

24 To add an EndUserSigner to the InsertOrder request we have to do the following: - Create new Signer EndUserSigner elements - Give each EndUserSigner a LocalSignerReference. This is a label that must be unique for every Signer element in the InsertOrder request. The LocalSignerReference value does not need to be something meaningful since it will not be displayed during signingoperation. But it must be unique because it is referenced to later in the InsertOrder request. - Provide a name for each EndUserSigner. This element is optional and cannot be verified by E-Signing, but it is highly recommended using the persons real name since this may be shown in the GUI during the End user signing process. - The Merchant may define the AcceptedPKIs element. This element tells E-Signing which eid provider the End user can choose from when signing a document. The Merchant s supported eid providers are already registered in E-Signing. The AcceptedPKIs must only contain eids that are also supported by the Merchant. For each eid specified in the AcceptedPKIs element, the Merchant may tell which SignerID the End user must have. In the CertificatePolicy element the Merchant has the option to mandate which eid (profile) the End user must use when signing a document. See the description about the forcepkivendor parameter as an option to the AcceptePKIs element in section Forcepkivendor of chapter 6. Merchant By defining a MerchantSigner, the Merchant tells E-Signing to sign a document on behalf of the Merchant using its own eid. The signer is not a physical person. E-Signing uses the Merchant s eid hosted by E-Signing to sign the document. To add an MerchantSigner to the InsertOrder request you have to do the following: - Create new Signer MerchantSigner element Give the MerchantSigner a LocalSignerReference. This is a label that must be unique for every Signer element in the InsertOrder request. The LocalSignerReference value does not need to be something meaningful since it will not be displayed during the signing operation. But it must be unique because it is referenced to later in the InsertOrder request

25 Notification The Merchant may want to notify End users or get notified itself on special events regarding a Signing order. To setup End user notification, the Notification element must reside in the EndUserSigner element. The Notification element holds NotificationChannels which may contain at least 1 NotificationChannel element. A NotificationChannel element holds a Channel and a Triggers element. This is where the actual notification settings are defined. A Channel element may represent an , an SMS or an XML Service channel. The NotificationChannel holds a communication channel and the Triggers. The Triggers element may hold one or more Trigger elements. A Trigger element describes an event that should triggee a notification to the channel. Supported triggers for End user notifications are: - OnOrderCancellation - OnOrderCompletion - OnOrderRejection - OnOrderExpiration - OnSignProcessReady - OnSignProcessExpiration - OnReminderEvent - OnOrderFailed See chapter 8 for detailed description about notifications and the different triggers. XML example An XML example of the Signer element. Here the Signer must use BankID (NO) as the eid, the Signer will be notified using when a Signing process is ready and when a Signing order is complete. If the Signer has not signed the document after some time, an reminder is sent. <Signer> <EndUserSigner> <LocalSignerReference> </LocalSignerReference> <Name>Signer1</Name> <AcceptedPKIs> <BankID> 25-59

26 <CertificatePolicy>Employee</CertificatePolicy> <SignerID> <IDType>SSN</IDType> <IDValue> </IDValue> </SignerID> </BankID> </AcceptedPKIs> <Notification> <NotificationChannels> <NotificationChannel> <Channel> < > </ > </Channel> <Triggers> <Trigger>OnSignProcessReady</Trigger> <Trigger>OnOrderCompletion</Trigger> <Trigger>OnReminderEvent</Trigger> </Triggers> </NotificationChannel> </NotificationChannels> </Notification> </EndUserSigner> </Signer> Merchant The InsertOrder offers the merchant the ability to get notified on events regarding a Signing order. The Merchant element, similar to the EndUser- Signer element, may hold the Notification element

27 Channels The Merchant can set up a Signing order with a number of notification channels. The supported merchant communication channels are: - XML - SMS - Note: Fax is no longer supported as a notification channel. Notification Supported triggers for merchant channels are: - OnOrderCancellation - OnOrderCompletion - OnOrderExpiration - OnOrderFailed - OnStepReady - OnStepExpiration - OnStepCompletion - OnSignProcessRejection - OnSignProcessExpiration - OnSignProcessCompletion Web context WebContext element A WebContext is a set of URLs that tells E-Signing where an End user is supposed to perform the signing process. A Merchant inserts a Signing order with the intent to have End users sign documents on the web. The E- Signing service that handles the actual signing processes is SignWeb

28 After inserting a Signing order, the Merchant may retrieve a Signing URL. This URL is a pointer to a signing process involving an End user and a document. The Merchant chooses how the End user experiences the signing process by either redirecting the End user to SignWeb or presenting its own signing page. The SignURL can also be distributed to Endu sers via notification channels. If an End user is registered with the channel and the trigger OnSignProcessReady, the End user will receive an holding the SignURL when it is his turn to sign. The SignURLBase is the signing URL prefix. When a Signing order is inserted into E-Signing the WebContext is registered for later use. When a Merchant asks for the signing URL, E-Signing generates a unique reference and appends it to the end of the SignURLBase. Signing URL = SignURLBase + <generated reference>. Normal GUI By redirecting an End user to SignWeb, the End user s browser will display E-Signing s GUI. This is referred to as the normal GUI. There is no need to define a WebContext element when using this user interface. Reduced GUI The merchant may want to present its own look-and-feel by having the End user sign documents on its own web portal. This is referred to as the reduced GUI user interface. Details on WebContexts and the different GUIs may be found in the document Nets E-Signing SignWeb Integration guide. XML example <WebContext> <LocalWebContextRef>WebCtx_1</LocalWebContextRef> <SignURLBase> <ErrorURL- Base> <StyleURL> <ExitURL> </WebContext> 28-59

29 Execution details The ExecutionDetails element in the InsertOrder message is where the execution of the order is defined. This element holds the following information: - The order deadline - An option to set the DisplayProcessInfo element. The presence of this element with the value true tells E-Signing to display additional information about the document being signed to the End user. In a Signing order, many signers may sign the same document. The DisplayProcessInfo element tells E-Signing to display the Name, NameStatus or NameStatusTime concerning the signers of the document involved. (Not all eid providers can show this info.) - An option to set the GenerateOneTimeURL element. This element, if the value is true, forces E-Signing to generate OneTimeURL. A OneTimeURL can only be used once. If a End user accesses a signing URL, this URL is marked as used and cannot be accessed again. The second time an End user tries to access it, they would get an error message. A OneTimeURL also has a deadline which allows it to be accessible only for a limited amount of time. The time limit is set to 10 minutes. The Merchant can get new unused URLs using the GetSigningProcesses message. The OneTimeURL functionality is meant to be used in a synchronous process. - Steps and Signing processes

30 Deadlines E-Signing gives the merchant the option to set a deadline on the order, on each Step and on each Signing process in a Step. The rules for order, step and signing processes deadlines: - The OrderDeadline must be after NOW (the time E-Signing receives the order) and before NOW + 90 days. This is a limit set by E- Signing. - A Step has a step number. Step 1 s deadline must be after NOW and before the OrderDeadline. Deadlines for Step 1+x must be after the previous step s deadline and before the OrderDeadline. - A Signing process deadline for Signing process must be after NOW and before the StepDeadline of which the Signing process is in. If the Step and Signing process deadlines are not set by the integrator, they are automatically to set the same as OrderDeadline. Signing process A Signing process is constructed holding information about a single signer, a single document, a single WebContext and optionally a deadline and reminder settings. A signer may only sign one document at a time. Steps A Step may hold one or more Signing processes. A Signing order may contain many Steps but only one Step may be active at a time. Each Step must contain a StepNumber which tells E-Signing the order of execution. Steps are numbered sequentially, beginning at

31 - Step 1 with StepNumber 1. This tells E-Signing that this Step is going to be executed first. All Signing processes in a Step must be complete in order for a Step to get the Complete status. - Step 2 with StepNumber 2. This tells E-Signing that this Step is going to be executed after Step 1 has completed successfully. In the meantime this Step has the Pending status. - Step 3 with StepNumber 3. This tells E-Signing that this Step is going to be executed after Step 2 has completed successfully. In the meantime this Step has the Pending status. Sequential signing A sequential workflow is illustrated above. The figure illustrates three signers. Signer1 has to complete his signing process before signer 2 and signer 2 has to complete his signing process before signer 3 is enabled to execute his signing operation. The order of execution, in this example, is sequential and is regulated by E-Signing by the use of Steps and Signing processes. In this example, the Merchant should define three Steps with one Signing process in each Step. Parallel signing A parallel signing workflow is illustrated in the figure above. A Signing order containing a parallel signing workflow has to define only one step. All Signing processes residing in a Step are allowed to be executed simultaneously

32 Combination signing If we merge the sequential and parallel Signing process examples we get a combination. The figure above illustrates a signing workflow that combines the sequential and the parallel workflows. Below is an illustration of three steps. The first step includes one signing process, step two includes two Signing processes (parallel) and the last step includes one Signing process. Summary of order execution The following summarizes the concept of the order of execution : - An order consist of one or more documents and one or more signers - A signer may sign many documents within the same Signing order - One signer and one document make up a Signing process. - Steps mandate the order of execution. - A Step s StepNumber tells E-Signing the order of execution. All Steps must be numbered from 1 and upwards. - A Signing order may only have one Active Step at any moment. All other steps are pending or complete. - A Step may consist of one or more Signing processes. All Signing processes within a Step may be executed in parallel (at the same time)

33 Post processing The PostProcessing element includes all information about archival. The PostProcessing element was introduced in the XML schema version Archive When the Signing order is completed and a SDO is generated, E-Signing can archive the SDO in the Nets E-Archive. This is specified in the PostProcessing element in the InsertOrder message. The name of the archive and the archival indexes must be supplied. The archive indexes are used to locate this particular signed document in E-Archive. By using the MetaData element, the customer may archive a document to another organisation number than the one registered in the customer configuration. This may only be done if the other organisation number is whitelisted in the customers E-Signing configuration. Note: If the Signing order includes more than one document, the SDO is divided into as many SDO s as there are documents in the Signing order. Each SDO includes one document with all its signatures, and will be handled as one archive object. The E-Archive can be accessed either through a portal or through a web services. More information about E- Archive is found in Nets E-Archive User guide and Nets E-Archive Implementation Guide

34 5. Administration of orders Intro Order status E-Signing keeps track by giving the Signing order, each Step and each Signing process in each Step a status. The status hierarchy is managed by strict rules. The different Signing order statuses are listed in the table below Status Active Description The Active status is the first status a Signing order will be given. The Signing order is in this status as long as there are Steps with the Active status. When the Signing order is registered it gets the Active status. Step 1 and all its Signing processes get the Active status. The rest of the Steps, and their Signing processes, get the Pending status. Can- celledby- Merchant Expired The Signing order is expired. This state is applied when a deadline is reached. The Signing order can be returned to an Active status using the ModifyOrderDeadline message. ExpiredBy- Proxy RejectedBySigner The CancelledByMerchant status is given to a Signing order when the Merchant sends a CancelOrder message on a specified Signing order to E-Signing. The Signing order is cancelled. This is a final state. The Signing order is set to the ExpiredByProxy status when either a Step or a Signing process has reached its deadline. The deadline can be modified using the ModifyOrderDeadline message. A Signing order is set to RejectedBySigner if the following occurs: - The End user has rejected to sign a document. - The TerminateOrderOnRejection setting in the InsertOrder is set to true This state may also be reached if the Merchant uses the ModifySigningProcess message. This state is a final state. Complete Failed The Signing order is set to Complete when all steps and signing processes are completed and all post processing of an order has been completed. Post processing includes creating and sealing the SDO, send notifications and archival. The Signing order will also reach this state if one or more of the Signing processes have been rejected, but the TerminateOrderOnRejection is set to false. This is a final state. A Signing order is set to Failed if one of the Signers of a document did not have the right to sign the document. This state will only occur in conjunction with the use of 34-59

35 ID-Rights functionality. This is a final state. Deleted The Signing order is set to Deleted if the XML message DeleteDocumentData has been performed for that particular order. Step status The different Step statuses are listed in the table below: Status Active Pending CancelledBy- Merchant Expired ExpiredBy- Proxy RejectedBySigner Description A Step is set to the Active status when the Steps prior to this Step have been completed with either a Complete or RejectedBySigner status. The first Step is set to Active at the same time as the Signing order is set to Active. Only one step may be in the Active status at the same time. A Step is set to Pending if the previous Steps have not been completed. The Step is given the CancelledByMerchant status is the Merchant sends a CancelOrder message to E-Signing. The Step is set to Expired if the Step s deadline has been reached. This can be modified using the ModifyOrderDeadline message. The Step is set to ExpiredByProxi if one or more of the Signing processes in the step have reached its deadline. This can be modified using the ModifyOrderDeadline message. A Step is set to RejectedBySigner if the following occurs: - The End user has rejected to sign a document. - The TerminateOrderOnRejection setting in the InsertOrder is set to true This state may also be reached if the Merchant uses the ModifySigningProcess message. This state is a final state. Complete The Step is set to Complete when all Signing processes are completed. The Step will also reach this state if one or more of the Signing processes have been rejected, but the TerminateOrderOnRejection is set to false. This is a final state. The next step will now reach the Active state. Signing process status The different Signing process statuses are listed in the table below: Status Description Active All Signing processes in a Step are set to Active when the Step reaches the Active status. A SignURL for the Active Signing processes are now available, and the End user can sign the document in this Signing process

36 Pending CancelledBy- Merchant Expired RejectedBySigner A Signing process is set to Pending if the Signing process is not ready for signing. The previous Steps have not been completed. The Signing process is given the CancelledByMerchant status is the Merchant sends a CancelOrder message to E-Signing. The Signing process is set to Expired if the Signing process deadline has been reached. This can be modified using the ModifyOrderDeadline message. The End user has rejected to sign the document in the Signing process. This state may also be reached if the Merchant uses the ModifySigningProcess message. This state is a final state. Complete The End user has signed the document, and the signing process is completed. The Signing process is set to Complete. This is a final state. Administration messages Get signing processes The GetSigningProcesses message is used to fetch all signing processes for a given order and signer. The message uses OrderID and LocalSignerReference as input. Optionally, the Signing processes status can be specified. In return the asking application will among other get a list of all Signing processes for this signer, status of the Signing processes, details about the document in the Signing process, the SignURL (if not signed and the Signing process status is Active) and the SigningTime (if signed) This message is often used to fetch the particular SignURL that the Signer must access to sign a document. Other ways to get a signing URL is to use either notification sent directly to the Signer or XML notification sent to the Merchant application/system. This message is also used to check the status of a Signing process. The status of a Signing process is set to complete immediately after the signing has been performed. As a comparison, the status of an order is set to complete after all signatures has been set to complete and all post processing of the order has been done. Post processing includes creating and sealing the SDO, send notifications and archival. Note: This message must be implemented when using E-Signing to check the status of specific Signing processes. If notification is not used this message must be implemented to retrieve the signing URL

E-Signing Integration guide

E-Signing Integration guide Nets Branch Norway Haavard Martinsens Vei 54 NO-0045 Oslo T +47 22 89 89 89 www.nets.eu Foretaksregisteret NO 996 345 734 E-Signing Integration guide Version: 3.4 Date: 03.06.2016 p. 1-41 Contents 1. Introduction...

More information

Signature policy for TUPAS Witnessed Signed Document

Signature policy for TUPAS Witnessed Signed Document Signature policy for TUPAS Witnessed Signed Document Policy version 1.0 Document version 1.1 1 Policy ID and location Policy ID Name URL urn:signicat:signaturepolicy:tupas wsd:1.0 Signature policy for

More information

Server based signature service. Overview

Server based signature service. Overview 1(11) Server based signature service Overview Based on federated identity Swedish e-identification infrastructure 2(11) Table of contents 1 INTRODUCTION... 3 2 FUNCTIONAL... 4 3 SIGN SUPPORT SERVICE...

More information

Corporate Access File Transfer Service Description Version 1.0 01/05/2015

Corporate Access File Transfer Service Description Version 1.0 01/05/2015 Corporate Access File Transfer Service Description Version 1.0 01/05/2015 This document describes the characteristics and usage of the Corporate Access File Transfer service, which is for transferring

More information

Signicat white paper. Signicat Solutions. This document introduces the Signicat solutions for digital identities and electronic signatures 2015-08

Signicat white paper. Signicat Solutions. This document introduces the Signicat solutions for digital identities and electronic signatures 2015-08 Signicat white paper Signicat Solutions This document introduces the Signicat solutions for digital identities and electronic signatures 2015-08 Version 1.1 2015-08-20 Disclaimer Please note that this

More information

Title Page. Hosted Payment Page Guide ACI Commerce Gateway

Title Page. Hosted Payment Page Guide ACI Commerce Gateway Title Page Hosted Payment Page Guide ACI Commerce Gateway Copyright Information 2008 by All rights reserved. All information contained in this documentation, as well as the software described in it, is

More information

Exploring ADSS Server Signing Services

Exploring ADSS Server Signing Services ADSS Server is a multi-function server providing digital signature creation and signature verification services, as well as supporting other infrastructure services including Time Stamp Authority (TSA)

More information

StartCom Certification Authority

StartCom Certification Authority StartCom Certification Authority Intermediate Certification Authority Policy Appendix Version: 1.5 Status: Final Updated: 05/04/11 Copyright: Start Commercial (StartCom) Ltd. Author: Eddy Nigg Introduction

More information

Introduction to NemID and the NemID Service Provider Package

Introduction to NemID and the NemID Service Provider Package Nets DanID A/S Lautrupbjerg 10 DK 2750 Ballerup T +45 87 42 45 00 F +45 70 20 66 29 info@danid.dk www.nets-danid.dk CVR no. 30808460 Introduction to NemID and the NemID Service Provider Package Page 1

More information

Fairsail REST API: Guide for Developers

Fairsail REST API: Guide for Developers Fairsail REST API: Guide for Developers Version 1.02 FS-API-REST-PG-201509--R001.02 Fairsail 2015. All rights reserved. This document contains information proprietary to Fairsail and may not be reproduced,

More information

ETSI TS 102 778-1 V1.1.1 (2009-07) Technical Specification

ETSI TS 102 778-1 V1.1.1 (2009-07) Technical Specification TS 102 778-1 V1.1.1 (2009-07) Technical Specification Electronic Signatures and Infrastructures (ESI); PDF Advanced Electronic Signature Profiles; Part 1: PAdES Overview - a framework document for PAdES

More information

www.novell.com/documentation Jobs Guide Identity Manager 4.0.1 February 10, 2012

www.novell.com/documentation Jobs Guide Identity Manager 4.0.1 February 10, 2012 www.novell.com/documentation Jobs Guide Identity Manager 4.0.1 February 10, 2012 Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use of this documentation,

More information

www.novell.com/documentation Policy Guide Access Manager 3.1 SP5 January 2013

www.novell.com/documentation Policy Guide Access Manager 3.1 SP5 January 2013 www.novell.com/documentation Policy Guide Access Manager 3.1 SP5 January 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this documentation,

More information

Technical Description. DigitalSign 3.1. State of the art legally valid electronic signature. The best, most secure and complete software for

Technical Description. DigitalSign 3.1. State of the art legally valid electronic signature. The best, most secure and complete software for Technical Description DigitalSign 3.1 State of the art legally valid electronic signature The best, most secure and complete software for Adding digital signatures to any document, in conformance with

More information

SVEA HOSTED SERVICE SPECIFICATION V1.13

SVEA HOSTED SERVICE SPECIFICATION V1.13 SVEA HOSTED SERVICE SPECIFICATION V1.13 Table of Contents Abstract... 2 Modes of operation... 2 Interactive Mode details... 2 Integration... 2 Input parameters... 3 Output parameters... 8 Error Codes...

More information

SAFE Digital Signatures in PDF

SAFE Digital Signatures in PDF SAFE Digital Signatures in PDF Ed Chase Adobe Systems Digital Signatures in PDF Digital Signature Document Digital ID Doc Digest Signer s digital identity is bound to document Modifying document invalidates

More information

Online signature API. Terms used in this document. The API in brief. Version 0.20, 2015-04-08

Online signature API. Terms used in this document. The API in brief. Version 0.20, 2015-04-08 Online signature API Version 0.20, 2015-04-08 Terms used in this document Onnistuu.fi, the website https://www.onnistuu.fi/ Client, online page or other system using the API provided by Onnistuu.fi. End

More information

HOW IT WORKS E-SIGNLIVE 1 INTRODUCTION 2 OVERVIEW

HOW IT WORKS E-SIGNLIVE 1 INTRODUCTION 2 OVERVIEW HOW IT WORKS E-SIGNLIVE 1 INTRODUCTION With e-signlive, Silanis hosted service, you can invite other people to conveniently and securely sign documents over the web. Your documents can be easily signed

More information

Ciphermail Gateway PDF Encryption Setup Guide

Ciphermail Gateway PDF Encryption Setup Guide CIPHERMAIL EMAIL ENCRYPTION Ciphermail Gateway PDF Encryption Setup Guide March 6, 2014, Rev: 5454 Copyright c 2008-2014, ciphermail.com. CONTENTS CONTENTS Contents 1 Introduction 4 2 Portal 4 3 PDF encryption

More information

CyberSource PayPal Services Implementation Guide

CyberSource PayPal Services Implementation Guide CyberSource PayPal Services Implementation Guide Simple Order API SCMP API September 2015 CyberSource Corporation HQ P.O. Box 8999 San Francisco, CA 94128-8999 Phone: 800-530-9095 CyberSource Contact Information

More information

Portals and Hosted Files

Portals and Hosted Files 12 Portals and Hosted Files This chapter introduces Progress Rollbase Portals, portal pages, portal visitors setup and management, portal access control and login/authentication and recommended guidelines

More information

Introduction to XML Applications

Introduction to XML Applications EMC White Paper Introduction to XML Applications Umair Nauman Abstract: This document provides an overview of XML Applications. This is not a comprehensive guide to XML Applications and is intended for

More information

Copyright 2014 Jaspersoft Corporation. All rights reserved. Printed in the U.S.A. Jaspersoft, the Jaspersoft

Copyright 2014 Jaspersoft Corporation. All rights reserved. Printed in the U.S.A. Jaspersoft, the Jaspersoft 5.6 Copyright 2014 Jaspersoft Corporation. All rights reserved. Printed in the U.S.A. Jaspersoft, the Jaspersoft logo, Jaspersoft ireport Designer, JasperReports Library, JasperReports Server, Jaspersoft

More information

Secure Envelope specification

Secure Envelope specification Secure Envelope specification for Corporate Access File Transfer 2/13/2015 Version 1.0.3 This document defines how a file (e.g. a payment file) which will be sent to the bank is digitally signed by the

More information

PayPal Express Checkout Services

PayPal Express Checkout Services Title Page PayPal Express Checkout s Using the Simple Order API January 2016 CyberSource Corporation HQ P.O. Box 8999 San Francisco, CA 94128-8999 Phone: 800-530-9095 CyberSource Contact Information For

More information

OASIS Standard Digital Signature Services (DSS) Assures Authenticity of Data for Web Services

OASIS Standard Digital Signature Services (DSS) Assures Authenticity of Data for Web Services www.oasis-open.org OASIS Standard Digital Signature Services (DSS) Assures Authenticity of Data for Web Services Juan Carlos Cruellas UPC Spain Nick Pope Thales esecurity (Co-Chairs Chairs DSS Technical

More information

Best prac*ces in Cer*fying and Signing PDFs

Best prac*ces in Cer*fying and Signing PDFs over 10 years of securing identities, web sites & transactions Best prac*ces in Cer*fying and Signing PDFs Paul van Brouwershaven Business Development Director EMEA, GlobalSign @vanbroup on TwiEer INTERNATIONAL

More information

Setup Guide Access Manager 3.2 SP3

Setup Guide Access Manager 3.2 SP3 Setup Guide Access Manager 3.2 SP3 August 2014 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE

More information

PI Cloud Connect Overview

PI Cloud Connect Overview PI Cloud Connect Overview Version 1.0.8 Content Product Overview... 3 Sharing data with other corporations... 3 Sharing data within your company... 4 Architecture Overview... 5 PI Cloud Connect and PI

More information

HKUST CA. Certification Practice Statement

HKUST CA. Certification Practice Statement HKUST CA Certification Practice Statement IN SUPPORT OF HKUST CA CERTIFICATION SERVICES Version : 2.1 Date : 12 November 2003 Prepared by : Information Technology Services Center Hong Kong University of

More information

Software Requirement Specification For Flea Market System

Software Requirement Specification For Flea Market System Software Requirement Specification For Flea Market System By Ilya Verlinsky, Alexander Sarkisyan, Ambartsum Keshishyan, Igor Gleyser, Andrey Ishuninov 1 INTRODUCTION 1.1 Purpose 1.1.1 Purpose of SRS document

More information

Setup Guide Access Manager Appliance 3.2 SP3

Setup Guide Access Manager Appliance 3.2 SP3 Setup Guide Access Manager Appliance 3.2 SP3 August 2014 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS

More information

Electronic Signature. István Zsolt BERTA istvan@berta.hu. Public Key Cryptographic Primi4ves

Electronic Signature. István Zsolt BERTA istvan@berta.hu. Public Key Cryptographic Primi4ves Electronic Signature István Zsolt BERTA istvan@berta.hu Public Key Cryptographic Primi4ves 1 Electronic Signatures - Contents 1. Public key cryptography primiaves 2. CerAficates, CerAficate AuthoriAes,

More information

The Vetuma Service of the Finnish Public Administration SAML interface specification Version: 3.5

The Vetuma Service of the Finnish Public Administration SAML interface specification Version: 3.5 The Vetuma Service of the Finnish Public Administration SAML interface specification Version: 3.5 Vetuma Authentication and Payment Table of Contents 1. Introduction... 3 2. The General Features of the

More information

Easy CollECt and the transaction ManagEr interface

Easy CollECt and the transaction ManagEr interface Easy Collect and the Transaction Manager Interface Table of Contents 1 2 3 Easy Collect... 4 1.1. Configuring your account for Easy Collect... 4 1.1.1. Creating your Easy Collect ID... 4 1.1.1.1. Transaction

More information

CCH esign. Quick Start Guide

CCH esign. Quick Start Guide CCH esign Quick Start Guide December 2015 2015 CCH Incorporated and its affiliates and licensors. All rights reserved. Material in this publication may not be reproduced or transmitted, in any form or

More information

DEPARTMENT OF DEFENSE PUBLIC KEY INFRASTRUCTURE EXTERNAL CERTIFICATION AUTHORITY MASTER TEST PLAN VERSION 1.0

DEPARTMENT OF DEFENSE PUBLIC KEY INFRASTRUCTURE EXTERNAL CERTIFICATION AUTHORITY MASTER TEST PLAN VERSION 1.0 DEFENSE INFORMATION SYSTEMS AGENCY JOINT INTEROPERABILITY TEST COMMAND FORT HUACHUCA, ARIZONA DEPARTMENT OF DEFENSE PUBLIC KEY INFRASTRUCTURE EXTERNAL CERTIFICATION AUTHORITY MASTER TEST PLAN VERSION 1.0

More information

DJIGZO EMAIL ENCRYPTION. Djigzo white paper

DJIGZO EMAIL ENCRYPTION. Djigzo white paper DJIGZO EMAIL ENCRYPTION Djigzo white paper Copyright 2009-2011, djigzo.com. Introduction Most email is sent as plain text. This means that anyone who can intercept email messages, either in transit or

More information

Djigzo email encryption. Djigzo white paper

Djigzo email encryption. Djigzo white paper Djigzo email encryption Djigzo white paper Copyright 2009-2011, djigzo.com. Introduction Most email is sent as plain text. This means that anyone who can intercept email messages, either in transit or

More information

Visa Checkout Integration Guide V1.0

Visa Checkout Integration Guide V1.0 Visa Checkout Integration Guide V1.0 IP Payments Pty Ltd Level 3, 441 Kent Street Sydney NSW 2000 Australia (ABN 86 095 635 680) T +61 2 9255 9500 F +61 2 8248 1276 www.ippayments.com No part of this document

More information

Building a protocol validator for Business to Business Communications. Abstract

Building a protocol validator for Business to Business Communications. Abstract Building a protocol validator for Business to Business Communications Rudi van Drunen, Competa IT B.V. (r.van.drunen@competa.com) Rix Groenboom, Parasoft Netherlands (rix.groenboom@parasoft.nl) Abstract

More information

Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference

Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise

More information

Reducing fragmentation in a scattered eid marked

Reducing fragmentation in a scattered eid marked Reducing fragmentation in a scattered eid marked Norstella, eid workshop Oslo, 16 th September 2014 Arne Vidar Haug VP Business Development / Co-Founder, Signicat About Signicat Cloud eid / esignature

More information

Merchant Service Provider Guide for Mobilpenge Based Acquiring

Merchant Service Provider Guide for Mobilpenge Based Acquiring Merchant Service Provider Guide for Mobilpenge Based Acquiring November 14, 2011 Version 1.07 Nets Technical Guide Copyright Nets Danmark A/S Page 1 Contents 1 Introduction... 4 1.1 Notation convention...

More information

EMA esignature capabilities: frequently asked questions relating to practical and technical aspects of the implementation

EMA esignature capabilities: frequently asked questions relating to practical and technical aspects of the implementation August 2013 EMA/264709/2013 EMA esignature capabilities: frequently asked questions relating to practical and technical aspects of the implementation This question and answer document aims to address the

More information

AccountView. Single Sign-On Guide

AccountView. Single Sign-On Guide AccountView Single Sign-On Guide 2014 Morningstar. All Rights Reserved. AccountView Version: 1.4 Document Version: 2 Document Issue Date: March 09, 2013 Technical Support: (866) 856-4951 Telephone: (781)

More information

Network Detective. Network Detective Inspector. 2015 RapidFire Tools, Inc. All rights reserved 20151013 Ver 3D

Network Detective. Network Detective Inspector. 2015 RapidFire Tools, Inc. All rights reserved 20151013 Ver 3D Network Detective 2015 RapidFire Tools, Inc. All rights reserved 20151013 Ver 3D Contents Overview... 3 Components of the Inspector... 3 Inspector Appliance... 3 Inspector Diagnostic Tool... 3 Network

More information

Installing and Sending with DocuSign for NetSuite v2.2

Installing and Sending with DocuSign for NetSuite v2.2 DocuSign Quick Start Guide Installing and Sending with DocuSign for NetSuite v2.2 This guide provides information on installing and sending documents for signature with DocuSign for NetSuite. It also includes

More information

Danske Bank Group Certificate Policy

Danske Bank Group Certificate Policy Document history Version Date Remarks 1.0 19-05-2011 finalized 1.01 15-11-2012 URL updated after web page restructuring. 2 Table of Contents 1. Introduction... 4 2. Policy administration... 4 2.1 Overview...

More information

SECURE MESSAGING PLATFORM

SECURE MESSAGING PLATFORM SECURE MESSAGING PLATFORM WEB ADMIN CONSOLE ADMIN USER GUIDE Introduction... 2 Customer Management... 3 Dashboard... 3 User Account... 5 General & Feature Settings... 7 Secure Message Disclaimers... 9

More information

MasterPass Service Provider Onboarding & Integration Guide Fileand API-Based Merchant Onboarding Version 6.10

MasterPass Service Provider Onboarding & Integration Guide Fileand API-Based Merchant Onboarding Version 6.10 MasterPass Service Provider Onboarding & Integration Guide Fileand API-Based Merchant Onboarding Version 6.10 7 January 2016 SPBM Summary of Changes, 7 January 2016 Summary of Changes, 7 January 2016 This

More information

CA SiteMinder. SAML Affiliate Agent Guide. 6.x QMR 6

CA SiteMinder. SAML Affiliate Agent Guide. 6.x QMR 6 CA SiteMinder SAML Affiliate Agent Guide 6.x QMR 6 This documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is

More information

NYS OCFS CMS Contractor Manual

NYS OCFS CMS Contractor Manual NYS OCFS CMS Contractor Manual C O N T E N T S CHAPTER 1... 1-1 Chapter 1: Introduction to the Contract Management System... 1-2 CHAPTER 2... 2-1 Accessing the Contract Management System... 2-2 Shortcuts

More information

Managed Services PKI 60-day Trial Quick Start Guide

Managed Services PKI 60-day Trial Quick Start Guide Entrust Managed Services PKI Managed Services PKI 60-day Trial Quick Start Guide Document issue: 3.0 Date of issue: Nov 2011 Copyright 2011 Entrust. All rights reserved. Entrust is a trademark or a registered

More information

ipayment Gateway API (IPG API)

ipayment Gateway API (IPG API) ipayment Gateway API (IPG API) Accepting e-commerce payments for merchants Version 3.2 Intercard Finance AD 2007 2015 Table of Contents Version control... 4 Introduction... 5 Security and availability...

More information

E*TRADE Developer Platform. Developer Guide and API Reference. October 24, 2012 API Version: v0

E*TRADE Developer Platform. Developer Guide and API Reference. October 24, 2012 API Version: v0 E*TRADE Developer Platform Developer Guide and API Reference October 24, 2012 API Version: v0 Contents Getting Started... 5 Introduction... 6 Architecture... 6 Authorization... 6 Agreements... 7 Support

More information

CIPHERMAIL EMAIL ENCRYPTION. CipherMail white paper

CIPHERMAIL EMAIL ENCRYPTION. CipherMail white paper CIPHERMAIL EMAIL ENCRYPTION CipherMail white paper Copyright 2009-2014, ciphermail.com. Introduction Most email is sent as plain text. This means that anyone who can intercept email messages, either in

More information

Adyen Merchant Manual. Version 1.10 Adyen B.V.

Adyen Merchant Manual. Version 1.10 Adyen B.V. Adyen Merchant Manual Version 1.10 Adyen B.V. Introduction3 Table of Contents Introduction... 3 Audience...3 Changelog...3 1 Payment Life-cycle in the Adyen System... 4 What Happens to a Payment After

More information

Platron API. Technical description. version 3.5

Platron API. Technical description. version 3.5 Platron API Technical description version 3.5 2 Contents Contents... 3 Version History... 5 The Goal of the Service... 10 Payment Scenario... 10 General Principles of Interaction Between Merchant and Platron...

More information

AliPay International Services

AliPay International Services Title Page AliPay International Services Using the Simple Order API September 2015 CyberSource Corporation HQ P.O. Box 8999 San Francisco, CA 94128-8999 Phone: 800-530-9095 CyberSource Contact Information

More information

Safewhere*Identify 3.4. Release Notes

Safewhere*Identify 3.4. Release Notes Safewhere*Identify 3.4 Release Notes Safewhere*identify is a new kind of user identification and administration service providing for externalized and seamless authentication and authorization across organizations.

More information

WEBKINCSTAR ONLINE SECURITIES TRADING - TERMS AND CONDITIONS OF USE

WEBKINCSTAR ONLINE SECURITIES TRADING - TERMS AND CONDITIONS OF USE WEBKINCSTAR ONLINE SECURITIES TRADING - TERMS AND CONDITIONS OF USE The Hungarian State Treasury (hereinafter: Distributor) provides general information (on its website) and executes securities trading

More information

IBM Campaign and IBM Silverpop Engage Version 1 Release 2 August 31, 2015. Integration Guide IBM

IBM Campaign and IBM Silverpop Engage Version 1 Release 2 August 31, 2015. Integration Guide IBM IBM Campaign and IBM Silverpop Engage Version 1 Release 2 August 31, 2015 Integration Guide IBM Note Before using this information and the product it supports, read the information in Notices on page 93.

More information

This chapter describes how to use the Junos Pulse Secure Access Service in a SAML single sign-on deployment. It includes the following sections:

This chapter describes how to use the Junos Pulse Secure Access Service in a SAML single sign-on deployment. It includes the following sections: CHAPTER 1 SAML Single Sign-On This chapter describes how to use the Junos Pulse Secure Access Service in a SAML single sign-on deployment. It includes the following sections: Junos Pulse Secure Access

More information

Kaldeera Workflow Designer 2010 User's Guide

Kaldeera Workflow Designer 2010 User's Guide Kaldeera Workflow Designer 2010 User's Guide Version 1.0 Generated May 18, 2011 Index 1 Chapter 1: Using Kaldeera Workflow Designer 2010... 3 1.1 Getting Started with Kaldeera... 3 1.2 Importing and exporting

More information

CERTIFICATION PRACTICE STATEMENT UPDATE

CERTIFICATION PRACTICE STATEMENT UPDATE CERTIFICATION PRACTICE STATEMENT UPDATE Reference: IZENPE-CPS UPDATE Version no: v 5.03 Date: 10th March 2015 IZENPE 2015 This document is the property of Izenpe. It may only be reproduced in its entirety.

More information

NETASQ MIGRATING FROM V8 TO V9

NETASQ MIGRATING FROM V8 TO V9 UTM Firewall version 9 NETASQ MIGRATING FROM V8 TO V9 Document version: 1.1 Reference: naentno_migration-v8-to-v9 INTRODUCTION 3 Upgrading on a production site... 3 Compatibility... 3 Requirements... 4

More information

1. What is Long-Term Docs... 5

1. What is Long-Term Docs... 5 Contents 1. What is Long-Term Docs... 5 1.1. General Properties of Long-Term Docs... 5 1.2. The Features of Long-Term Docs... 5 1.2.1. Long-Term Document Validity (LTV)... 6 1.2.2. Long-Term Document Archiving

More information

Optus EmailSMS for MS Outlook and Lotus Notes

Optus EmailSMS for MS Outlook and Lotus Notes Optus EmailSMS for MS Outlook and Lotus Notes Service Description, August 2005. OVERVIEW This document provides an overview of the Optus EmailSMS service delivered jointly by Optus and redcoal. It highlights

More information

DEPLOYMENT GUIDE Version 1.1. Deploying the BIG-IP LTM v10 with Citrix Presentation Server 4.5

DEPLOYMENT GUIDE Version 1.1. Deploying the BIG-IP LTM v10 with Citrix Presentation Server 4.5 DEPLOYMENT GUIDE Version 1.1 Deploying the BIG-IP LTM v10 with Citrix Presentation Server 4.5 Table of Contents Table of Contents Deploying the BIG-IP system v10 with Citrix Presentation Server Prerequisites

More information

Guide. - How to setup secure communication for REST services in Automatisk kortbetaling. Revision 1.3. Nets A/S. Lautrupbjerg 10.

Guide. - How to setup secure communication for REST services in Automatisk kortbetaling. Revision 1.3. Nets A/S. Lautrupbjerg 10. Guide - How to setup secure communication for REST services in Automatisk kortbetaling Revision 1.3 Nets A/S Lautrupbjerg 10 2750 Ballerup DK T +45 44 68 44 68 F +45 44 86 09 30 www.nets.eu Table of Contents

More information

DiskPulse DISK CHANGE MONITOR

DiskPulse DISK CHANGE MONITOR DiskPulse DISK CHANGE MONITOR User Manual Version 7.9 Oct 2015 www.diskpulse.com info@flexense.com 1 1 DiskPulse Overview...3 2 DiskPulse Product Versions...5 3 Using Desktop Product Version...6 3.1 Product

More information

Domino Certification Authority and SSL Certificates

Domino Certification Authority and SSL Certificates Domino Certification Authority and SSL Certificates Setup Domino as Certification Authority Process Client Certificate Requests Mike Bartlett ibm.com/redbooks Redpaper Redpaper International Technical

More information

Digital Signature Verification using Historic Data

Digital Signature Verification using Historic Data Digital Signature Verification using Historic Data Digital signatures are now relatively common; however historic verification of digitally signed data is not so widely understood. As more data is held

More information

Taxi Service Design Description

Taxi Service Design Description Taxi Service Design Description Version 2.0 Page 1 Revision History Date Version Description Author 2012-11-06 0.1 Initial Draft DSD staff 2012-11-08 0.2 Added component diagram Leon Dragić 2012-11-08

More information

Criteria for web application security check. Version 2015.1

Criteria for web application security check. Version 2015.1 Criteria for web application security check Version 2015.1 i Content Introduction... iii ISC- P- 001 ISC- P- 001.1 ISC- P- 001.2 ISC- P- 001.3 ISC- P- 001.4 ISC- P- 001.5 ISC- P- 001.6 ISC- P- 001.7 ISC-

More information

Pay with Amazon Integration Guide

Pay with Amazon Integration Guide 2 2 Contents... 4 Introduction to Pay with Amazon... 5 Before you start - Important Information... 5 Important Advanced Payment APIs prerequisites... 5 How does Pay with Amazon work?...6 Key concepts in

More information

Documentum Content Distribution Services TM Administration Guide

Documentum Content Distribution Services TM Administration Guide Documentum Content Distribution Services TM Administration Guide Version 5.3 SP5 August 2007 Copyright 1994-2007 EMC Corporation. All rights reserved. Table of Contents Preface... 7 Chapter 1 Introducing

More information

Deploying the BIG-IP System with Oracle E-Business Suite 11i

Deploying the BIG-IP System with Oracle E-Business Suite 11i Deploying the BIG-IP System with Oracle E-Business Suite 11i Introducing the BIG-IP and Oracle 11i configuration Configuring the BIG-IP system for deployment with Oracle 11i Configuring the BIG-IP system

More information

Release Notes. DocuSign Spring 15 Release Notes. Contents

Release Notes. DocuSign Spring 15 Release Notes. Contents Release Notes Updated March 6, 2015 DocuSign Spring 15 Release Notes This document provides information about the updates deployed to the DocuSign Production environment as part of the March 6, 2015 DocuSign

More information

OPENID AUTHENTICATION SECURITY

OPENID AUTHENTICATION SECURITY OPENID AUTHENTICATION SECURITY Erik Lagercrantz and Patrik Sternudd Uppsala, May 17 2009 1 ABSTRACT This documents gives an introduction to OpenID, which is a system for centralised online authentication.

More information

Secure XML API Integration Guide. (with FraudGuard add in)

Secure XML API Integration Guide. (with FraudGuard add in) Secure XML API Integration Guide (with FraudGuard add in) Document Control This is a control document DESCRIPTION Secure XML API Integration Guide (with FraudGuard add in) CREATION DATE 02/04/2007 CREATED

More information

Securing Web Services With SAML

Securing Web Services With SAML Carl A. Foster CS-5260 Research Project Securing Web Services With SAML Contents 1.0 Introduction... 2 2.0 What is SAML?... 2 3.0 History of SAML... 3 4.0 The Anatomy of SAML 2.0... 3 4.0.1- Assertion

More information

WildFire Cloud File Analysis

WildFire Cloud File Analysis WildFire Cloud File Analysis The following topics describe the different methods for sending files to the WildFire Cloud for analysis. Forward Files to the WildFire Cloud Verify Firewall File Forwarding

More information

IBM Campaign Version-independent Integration with IBM Engage Version 1 Release 3 April 8, 2016. Integration Guide IBM

IBM Campaign Version-independent Integration with IBM Engage Version 1 Release 3 April 8, 2016. Integration Guide IBM IBM Campaign Version-independent Integration with IBM Engage Version 1 Release 3 April 8, 2016 Integration Guide IBM Note Before using this information and the product it supports, read the information

More information

Security Digital Certificate Manager

Security Digital Certificate Manager System i Security Digital Certificate Manager Version 5 Release 4 System i Security Digital Certificate Manager Version 5 Release 4 Note Before using this information and the product it supports, be sure

More information

COMPANIES REGISTRY. Third Party Software Interface Specification. (Part 1 Overview)

COMPANIES REGISTRY. Third Party Software Interface Specification. (Part 1 Overview) COMPANIES REGISTRY Third Party Software Interface Specification () of Integrated Companies Registry Information System Version 1.3 March 2014 The Government of the Hong Kong Special Administrative Region

More information

Security Digital Certificate Manager

Security Digital Certificate Manager IBM i Security Digital Certificate Manager 7.1 IBM i Security Digital Certificate Manager 7.1 Note Before using this information and the product it supports, be sure to read the information in Notices,

More information

DIRECTOR GENERAL OF THE LITHUANIAN ARCHIVES DEPARTMENT UNDER THE GOVERNMENT OF THE REPUBLIC OF LITHUANIA

DIRECTOR GENERAL OF THE LITHUANIAN ARCHIVES DEPARTMENT UNDER THE GOVERNMENT OF THE REPUBLIC OF LITHUANIA Non-official translation DIRECTOR GENERAL OF THE LITHUANIAN ARCHIVES DEPARTMENT UNDER THE GOVERNMENT OF THE REPUBLIC OF LITHUANIA ORDER ON THE CONFIRMATION OF THE SPECIFICATION ADOC-V1.0 OF THE ELECTRONIC

More information

ADP Workforce Now Security Guide. Version 2.0-1

ADP Workforce Now Security Guide. Version 2.0-1 ADP Workforce Now Security Guide Version 2.0-1 ADP Trademarks The ADP logo, ADP, and ADP Workforce Now are registered trademarks of ADP, Inc. Third-Party Trademarks Microsoft, Windows, and Windows NT are

More information

Offline Payment Methods

Offline Payment Methods Offline Payment Methods STRONGVON Tournament Management System 1 Overview The STRONGVON Tournament Management System allows you to collect online registration, while arranging for offline payment methods

More information

Set Up and Maintain Customer Support Tools

Set Up and Maintain Customer Support Tools Set Up and Maintain Customer Support Tools Salesforce, Winter 16 @salesforcedocs Last updated: December 10, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered

More information

Implementation Guide SAP NetWeaver Identity Management Identity Provider

Implementation Guide SAP NetWeaver Identity Management Identity Provider Implementation Guide SAP NetWeaver Identity Management Identity Provider Target Audience Technology Consultants System Administrators PUBLIC Document version: 1.10 2011-07-18 Document History CAUTION Before

More information

How to implement esignature validation

How to implement esignature validation www.peppol.eu How to implement esignature validation EU-Supply experience How to implement online validation Background Desired user experience How to implement Piloting, initial experiences Further information

More information

Ciphermail Gateway Administration Guide

Ciphermail Gateway Administration Guide CIPHERMAIL EMAIL ENCRYPTION Ciphermail Gateway Administration Guide September 23, 2014, Rev: 9112 Copyright 2008-2014, ciphermail.com. Acknowledgements: Thanks goes out to Andreas Hödle for feedback. CONTENTS

More information

Digital Signature Service. e-contract.be BVBA info@e-contract.be 2 september 2015

Digital Signature Service. e-contract.be BVBA info@e-contract.be 2 september 2015 Digital Signature Service e-contract.be BVBA info@e-contract.be 2 september 2015 About e-contract.be BVBA Consultancy Projects: eid/security related only SOA security From analysis to operational hosting

More information

Design Document. Offline Charging Server (Offline CS ) Version 1.0. - i -

Design Document. Offline Charging Server (Offline CS ) Version 1.0. - i - Design Document Offline Charging Server (Offline CS ) Version 1.0 - i - Document Scope Objective The information provided in this document specifies the design details of Operations of Offline Charging

More information

WinSen Online Payment / Prelease Service

WinSen Online Payment / Prelease Service WinSen Online Payment / Prelease Service SENTINEL SYSTEMS CORPORATION 1620 Kipling St Lakewood, CO 80215 800-456-9955 303-242-2010 FAX www.sentinelsystems.com Revised 11/06/2006 Introduction This service

More information

User Guide Supplement. S/MIME Support Package for BlackBerry Smartphones BlackBerry Pearl 8100 Series

User Guide Supplement. S/MIME Support Package for BlackBerry Smartphones BlackBerry Pearl 8100 Series User Guide Supplement S/MIME Support Package for BlackBerry Smartphones BlackBerry Pearl 8100 Series SWD-292878-0324093908-001 Contents Certificates...3 Certificate basics...3 Certificate status...5 Certificate

More information