Royal Mail Business Integration Gateway Specification

Size: px
Start display at page:

Download "Royal Mail Business Integration Gateway Specification"

Transcription

1 FSpec401 FSpec401 Royal Mail Customer Solutions Royal Mail Business Integration Gateway Specification - XB60 The FSpec401 document details, for customers, the various methods of connecting to Royal Mail s Business Integration Gateway, specifically covering Inbound and Outbound connections for data transfer. 29 th March 2011 Version 1.4 Page 1 of 13

2 Contents 1 Introduction Description and Purpose Audience BIG Integration Service Overview BIG Communication Protocols Supported Standards COLLECT Data from BIG Security Unsupported Standards FTP SMTP Transfers ISDN Lines Future Standards Document Control References and related documents Terms and abbreviations Appendix A Benefits of AS Appendix B Connecting via FTPS PREREQUISITES FTP Client An Internet Connection with fixed public IP Address Royal Mail SSL Certificates CONNECTION DETAILS Connecting to the Server Page 2 of 13

3 1 Introduction This document defines the approved communication transport protocols for Royal Mail Group s (RMG) Business Customers to use in the exchange of electronic business information with RMG s Business Integration Gateway (BIG) service. BIG provides a means for RMG s Business Customers to securely exchange business documents electronically using standardised communication transport protocols for Electronic Data Interchange (EDI), traditional File Transfer methods and Web Services. 1.1 Description and Purpose This document acts as a guide for RMG s Business Customers as to the supported communication transport protocols to interface with BIG. This document will assist the reader to identify the appropriate choice of BIG interface solution applicable to meet the integration requirements. 1.2 Audience This document is intended to be read by all of RMG Business Customers that exchange data with RMG. 2 BIG Integration Service 2.1 Overview BIG is a new service that offers Business to Business (B2B) Integration capabilities between RMG and its Business Customers. As such it facilitates the secure exchange of business data between RMG systems and external party systems to provide a replacement to RMG s existing External Data Gateway (EDG) service. The main objectives of BIG are to provide a replacement platform for data exchange that: Drives standardisation for data exchange transport over the internet and trusted networks where appropriate. Provides agility in responding to the changing needs of RMG business customers and trading partners. Provides a rapid technical on-boarding process once customer agreements have been established. Provides the ability for non-repudiation of data exchanges. Meets the RMG security requirements. Page 3 of 13

4 3 BIG Communication Protocols This section documents the approved and supported transport protocol standards for both new external and interfaces migrated onto the new BIG environment. Standards are classified as follows: PREFERRED these are the generally accepted and widely used industry standards in existence for EDI over the Internet. These standards provide the most straightforward method for exchanging data using BIG. SUPPORTED these are standards offered to provide additional interoperability with trading partners that are unable to use the preferred standards. UNSUPPORTED these are standards where no new implementations will be permitted. FUTURE these are standards that whilst available for adoption, have not been widely adopted or can be considered emerging standards that may become relevant to RMG in the medium to long-term. 3.1 Supported Standards Category Transport Notes Protocol Preferred AS2 For data exchange, the preferred protocol on interaction with BIG is AS2. This is the generally accepted industry standard in existence today and brings with it many setup and maintenance advantages such as encryption of message content and non-repudiation. The technology used within BIG has been certified by the Drummond Group to conform to the standard and interoperate with other certified products. A full list of currently certified products can be found on the Drummond Group International website In addition to the certified products there are a number of free or open source software implementations that may also be used and the following have been seen to work with BIG: Single Partner Version of the /n software AS2 Connector (http://www.freeas2.com) OpenAS2 (http://sourceforge.net/projects/openas2) Mendelson AS2 (http://as2.mendelson-e-c.com/) Because AS2 has been specifically designed to provide secure data exchange over the internet it has become the de facto standard for EDI-INT and is the preferred method of exchanging data with BIG. Page 4 of 13

5 Category Transport Notes Protocol Supported FTPS Secure method of file transfer that secures the control and data channels using Transport Layer Security (TLS) defined by the IETF standard RFC This standard specifies that the connecting client software must explicitly request the security method to be used from the FTPS server and use a mutually agreed encryption method to secure the channels used. This is commonly referred to as explicit FTPS and is the only form of FTPS supported by BIG. The following FTPS software has been fully approved to interoperate with BIG: CoreFTP LE (http://www.coreftp.com) CuteFTP 8 Professional (http://www.globalscape.com/cuteftppro/) Ipswitch WS_FTP Professional (http://www.ipswitchft.com/products/ws_ftp_pro/index.aspx?n=1) FTPS secures the control and data channels it does not offer non repudiation of receipt or use Trading Partner Management unlike AS2. Supported Supported Web Services Connect: Direct NOTE: There are two patterns supported: 1) COLLECT refers to either BIG polling a system for data or an RMG Buisness Customer polling BIG for data. Supported for FTPS only and not SFTP. 2) PUSH refers to an RMG Business Customer sending data to BIG or BIG sending data to an RMG Business Customer. This is the preferred pattern as it offers event driven data exchange, reduces security risk and interface implementation costs and directly supports rapid customer take-on processes. Supported for both FTPS and SFTP. Offers high level of interoperability and standard API s for ease of data exchange. Enhancements to the accepted standards including Secure B2B Document transfer using Web Services based methods will be introduced in the future based on demand. NOTE: BIG does not provide Web Service APIs but provides Web Service proxy facility. Proprietary file transfer product. The use of Connect:Direct is supported for specific connections where this method is a requirement. Page 5 of 13

6 Category Transport Notes Protocol Supported SFTP SFTP provides a method of sending data securely using Secure Shell (SSH) to secure the data channel using public encryption keys exchanged between the SFTP Client and Server. SFTP is a secure protocol but the management of its associated encryption keys is inconsistent with RMG standard which is X509 certificate based. There are no IETF standards for SFTP but there are a number of expired draft standards that relate to SFTP. BIG only supports SFTP Version 3 defined by the draft-ietfsecsh-filexfer-02.txt Internet-Draft. The following SFTP client software is supported: CuteFTP Professional 8.3 OpenSSH 3.1p1 (Red Hat Linux 7.3) OpenSSH 4.6p1 (Ubuntu Linux) OpenSSH 5.1p1 PuTTY PSFTP, version 0.60 SmartFTP, version 3.0 Sun Microsystems, Sun_SSH_1.1 WinSCP, version Due to the variance in software implementations of SFTP its interoperability with BIG cannot be guaranteed and additional testing will be required. SFTP functionality can be offered on an exception basis where FTPS or AS2 cannot be accommodated. NOTE: SFTP functionality will be allowed for event driven transfers only (i.e. the source must push to BIG and BIG will push to the target, SFTP COLLECT is not supported). Table 1 - BIG Approved Communication Protocols COLLECT Data from BIG One of the principles of BIG is to encourage event driven transactions so that the source always initiates the information transfer to BIG and BIG pushes the information to the target. However if a Business Customer is unable to provide this capability to allow BIG to push information to them once it is available, they will be allowed to COLLECT (or pull) the information at their convenience. NOTE: Collect functionality will only be offered for FTPS Security RMG require the use of digital certificates for authentication with BIG. The preferred approach is mutual authentication, i.e. digital certificates signed by a recognised Certificate Authority (see Appendix B) are exchanged between RMG and a Business Customer. For information classified as INTERNAL or PUBLIC, customer self signed certificates would be acceptable on an exception only basis. Page 6 of 13

7 For data classified as CONFIDENTIAL, digital certificates must always be used on the server side, i.e. at the RMG end of the FTPS connection. If the business customer cannot implement client-side certificates due to: a) the urgency of the implementation; b) customer is unable to implement certificates; c) customer software problems that prevent the use of certificate; then the use of username and password authentication at the customer end will be permitted if their access is restricted to a virtual directory only where no other customer data is present and the customer takes full responsibility for authorising their admin access to BIG at their end. NOTE: Business Customers with no server side digital certificate will not be able to receive data from BIG, i.e. they can only COLLECT data. Where the data is classified as STRICTLY CONFIDENTIAL, the use of client-side certificates must be in place. 3.2 Unsupported Standards NOTE: A standard is to be considered as unsupported unless explicitly listed as being supported FTP FTP is not a secure protocol for communication. The use of FTP with business customers carries certain risks for RMG. The acceptable level of risk depends on the Information Classification. As a rule of thumb, if the information is STRICTLY CONFIDENTIAL then encryption is always required, whether the information is at rest or in motion. If the information is classified as CONFIDENTIAL then encryption is required for communication with business customers, if transmitted over the Internet or a public network. RMG s rules for dealing with requests from business customers who wish to communication with BIG using FTP are as follows: 1. For new interfaces with new partners FTP is not permitted. 2. For existing interfaces that need to be migrated to BIG: a. If the information is classified as STRICLY CONFIDENTIAL - a secure protocol needs to be used. b. If the information is classified as CONFIDENTIAL, INTERNAL or PUBLIC - investigate if there are alternative solutions available (e.g. FileSafe for adhoc transfers from person to person or the ebusiness platform for HTTPS transfers over the Internet). c. If the information is classified as CONFIDENTIAL, INTERNAL or PUBLIC and a business customer still wishes to adopt FTP via BIG, this would be acceptable on an exception only basis. The customer also would need to sign a disclaimer accepting the risks associated with this protocol where the data is classified as CONFIDENTIAL or INTERNAL. Page 7 of 13

8 3.2.2 SMTP Transfers facility is not provided on BIG and this will not be allowed going forward ISDN Lines As defined above, RMG preference is for the adoption of AS2 or FTPS over the Internet only. Users of existing ISDN lines are encouraged to switch to an Internet based protocol as a more cost effective solution. Existing Business Customers that wish to continue to use an ISDN line will be accepted for information classified as PUBLIC. However, information classified as INTERNAL, CONFIDENTIAL or STRICTLY CONFIDENTIAL would be acceptable on an exception only basis. 3.3 Future Standards AS3 (Applicability Statement 3) is the draft specification standard by which vendor applications communicate EDI (or other data such as XML) over the Internet using File Transfer Protocol (FTP). ebms although supported is an emerging standard and would require additional testing if specific requirement is identified. NOTE: Future Standards will be included when known together with any dates where they are planned to be considered as supported as standard. Page 8 of 13

9 4 Document Control 4.1 References and related documents Reference Document Title RMG Third Party Guide to Exchanging Data Using BIG Version Author 1.0 Gordon McMullan 4.2 Terms and abbreviations Term AS2 AS3 B2B BIG Confidential EDI FTP Gateway HTML HTTP HTTPS Internal Meaning Applicability Statement 2 is a specification on how to transport Data securely and reliably over the Internet. Defined by IETF in RFC4130. Applicability Statement 3 is a draft specification standard by which vendor Systems communicate EDI (or other Data such as XML) over the Internet using FTP. Defined by IETF in RFC4823. Business to Business Relationship. Business Integration Gateway replacement of RMG s External Data Gateway service. Information that has been assessed to be of a sensitive nature and likely to cause damage following unauthorised disclosure Confidential information requires additional protection over and above that afforded to INTERNAL information Confidential information should represent only a small proportion of information present in Royal Mail and its subsidiary businesses Electronic Data Interchange refers to the structured transmission of Data between organisations by electronic means. File Transfer Protocol. Provides access security services (e.g Authentication and Authorisation, Encryption/Decryption) for a System requiring data. Hyper Text Markup Language. Hyper Text Transfer Protocol; A standard communications protocol used for HTML and web-based Systems. Hyper Text Markup Language Secure. Internal information accessible to all employees, agents and contractors that relates to the ongoing business of Royal Mail and its subsidiaries Internal information should be protected from unauthorised disclosure by treating it like any other organisational asset, i.e. by employing common sense measures Page 9 of 13

10 Term MQ NFS SFTP Strictly Confidential Systems TCP/IP Meaning IBM Messaging Technology. Network File Storage. Secure File Transfer Protocol. Internet standard protocol for secure File Transfer using SSH. SFTP tunnels RCP (remote copy) over SSH to provide a secure service, allowing the server to encrypt the data and handle the file transfer. Information that must meet classification standards of government departments, security services or clients, or assessed as so sensitive that unauthorised disclosure would cause acute organisational damage Strictly Confidential information requires additional protection that will meet the standards required by third parties or Security & Investigation Services Computer programs or software components that provide functionality in direct support of a business process Transmission Control Protocol/Internet Protocol. UN/EDIFACT United Nations/Electronic Data Interchange For Administration, Commerce and Transport - international EDI standard developed under the United Nations and adopted by the International Organisation for Standardisation (ISO) as standard ISO 9735 URL Uniform Resource Location. Web Service Web services are most often web APIs that can be accessed over a network, such as the Internet, and executed on a remote system hosting the requested services. In common usage the term refers to clients and servers that communicate over the Hypertext Transfer Protocol (HTTP) protocol used on the web. XML Extensible Mark-up Language. Page 10 of 13

11 5 Appendix A Benefits of AS2 The preferred connectivity standard for exchanging electronic information using BIG is the Applicability Statement 2 (AS2) standard. AS2 adoption applies to any business customer needing to send electronic data to or receive data from RMG. AS2 is RMG s preferred connectivity standard for the following reasons: Rapid Customer Take-On AS2 maximises RMG s ability to offer efficient technical implementation. Reduces time to market AS2 allows RMG s business partners to create standardised and re-usable interfaces thus reducing project lifespan. Many of RMG larger business partners already see the benefits of using AS2 such as Amazon, HMRC and ASDA have all successfully implemented AS2 connections. Tesco, Sainsbury s and Bupa have all expressed an interest in moving to this standard. AS2 is implemented via Commercial Off the Shelf (COTS) products that have been independently tested and signed off as interoperable with other AS2 products thus reducing time required for technical integration and improving supportability (a list of compatible products is available on request). Reduced costs for communication as AS2 uses the internet rather than private connections so that standard firewalls rules can be in place instead of new firewall rules per customer. Real-time data delivery, business data is immediately pushed rather than being held in a mail box or location waiting to be fetched. Enhanced security as part of the standard: o Encryption ensures that only the sender and receiver are able to view the data. o Digital signatures ensure authentication; only messages from authorised senders are accepted. o Guaranteed delivery as part of the standard o Ensures data integrity by detecting whether the data was altered during transmission o Provides a mechanism for non-repudiation of receipt, ensuring that the intended party did receive the data. Disadvantages of File Based Transfers (FTP, FTPS, SFTP) No standard implementation. Most interfaces are unique given a lack of standardisation despite fulfilling similar functions. No retry on file transfer without bespoke code development. FTP does not support event driven processing. There are no external bodies that certify File Transfer products are interoperable. Not all FTP/s implementations follow the set standards defined for FTP/s. Page 11 of 13

12 Requires a scheduler to trigger events, thus removing any real time availability of information to applications and customers. No receipt or non-repudiation features. 6 Appendix B Connecting via FTPS 6.1 PREREQUISITES FTP Client Any FTPS client should be able to connect to BIG as long as it follows the SSL AUTH/EXPLICIT mode standards correctly. Customers who are proposing to use third party FTPS software are advised to test that the prospective FTPS client software can connect to the BIG server before purchasing the software. The FTPS client must also support passive mode connections. With Passive mode all connections will be initiated from the FTPS client and not Royal Mail s server An Internet Connection with fixed public IP Address For security reasons access to Royal Mail s servers are restricted to connections from authorised public IP addresses only. In order to connect to BIG clients are required to provide a valid fixed IP address of their FTPS client to Royal Mail Royal Mail SSL Certificates Authentication and Encryption is implemented using SSL certificates downloaded from Royal Mail s server. Most FTPS clients will accept this certificate automatically or will prompt the user to accept them during the login process. If the certificates cannot be downloaded then they can be provided in DER encoded X509 file format. Please contact Royal Mail s Customer Solutions team for provision if needed. Page 12 of 13

13 6.2 CONNECTION DETAILS Customer s firewalls are required to be configured to allow outbound initiated connections to the IP addresses and ports outlined in the table below. As FTPS passive mode is used then there should be no need to open the ports completely. Please also ensure that your firewall is configured to accept responses from Royal Mail s servers on the designated command port of your FTPS client. Detail Description IP Address / Pre-Production BIG Test environment DNS Name ftp://lfttest.bdtg.royalmailgroup.com IP Address / Production BIG Live environment DNS Name ftp://lft.bdtg.royalmailgroup.com FTPS Command 8021 Port used to initiate FTPS client connections Port FTPS Passive Data Ports utilized in data transfer Port Range FTPS UserID Uniquely assigned by Royal User ID to log onto BIG server. Mail FTPS user Password Uniquely assigned by Royal Password set by Royal Mail and is unique to Mail each customer. Incoming Directory /pub/tracked/incoming Location on BIG server where client pushes data files. Outgoing Directory /pub/tracked/outgoing Location on BIG server where client collects /pub/rmgtt/outgoing data files. Tracked relates to Royal Mail Tracked products and RMGTT to Special Delivery/International products. A file pushed onto BIG incoming folder does not require to be renamed. BIG automatically processes data on arrival and the file is deleted once processed. 6.3 Connecting to the Server Although in most cases this process will be automated, a manual connection process may be useful in troubleshooting connectivity problems. Enter FTPS client and configure connection and login details. During the initial login ensure that any certificate download requests are accepted. Also ensure that AUTH mode is also selected. Users should use their unique user name and enter the correct IP address for Preproduction or Production environments. Initiate the connection and place the pre-advice file in the incoming Directory. Once processed by the BIG server the files will be automatically erased. Page 13 of 13

GS1 Trade Sync Connectivity guide

GS1 Trade Sync Connectivity guide GS1 Trade Sync Connectivity guide Date: 2015-12-01 Version: v1.8 Page: 2/17 Revision history Version Date Description Author 1.0 2013-11-14 Initial version Fernando Pereira 1.1 2014-01-16 Added FTP and

More information

II. Implementation and Service Information

II. Implementation and Service Information II. Implementation and Service Information A. Responsibilities The procedure for setup with KeyBank s standard transmission services consists of three phases: 1) communications testing, 2) applications

More information

Methods available to GHP for out of band PUBLIC key distribution and verification.

Methods available to GHP for out of band PUBLIC key distribution and verification. GHP PGP and FTP Client Setup Document 1 of 7 10/14/2004 3:37 PM This document defines the components of PGP and FTP for encryption, authentication and FTP password changes. It covers the generation and

More information

CreationDirect. Clearstream file transfer connectivity solutions

CreationDirect. Clearstream file transfer connectivity solutions CreationDirect Clearstream file transfer connectivity solutions CreationDirect - Clearstream file transfer connectivity solutions Document number: 6731 This document is the property of Clearstream Banking

More information

Section I Transmission Modes

Section I Transmission Modes Transmission Modes Transmission Options Available...2 Value Added Networks (VAN)...2 File Transfer Protocol (FTP)...2 HTTPS File Upload (WEB)...3 Storing and Receiving Data with File Transfer Protocol...3

More information

Global Client Access Managed Communications Solutions. JPMorgan - Global Client Access. Managed Internet Solutions (EC Gateway)

Global Client Access Managed Communications Solutions. JPMorgan - Global Client Access. Managed Internet Solutions (EC Gateway) Managed Communications JPMorgan - Global Client Access Managed Internet (EC Gateway) Managed Communications Overview JPMorgan offers a variety of electronic communications services that are reliable and

More information

MOVEIT: SECURE, GUARANTEED FILE DELIVERY BY JONATHAN LAMPE, GCIA, GSNA

MOVEIT: SECURE, GUARANTEED FILE DELIVERY BY JONATHAN LAMPE, GCIA, GSNA MOVEIT: SECURE, GUARANTEED FILE DELIVERY BY JONATHAN LAMPE, GCIA, GSNA The MOVEit line of secure managed file transfer software products by Ipswitch File Transfer consists of two flagship products, the

More information

Online Banking for Business Secure FTP with SSH (Secure Shell) USER GUIDE

Online Banking for Business Secure FTP with SSH (Secure Shell) USER GUIDE Online Banking for Business Secure FTP with SSH (Secure Shell) USER GUIDE Contents Secure FTP Setup... 1 Introduction... 1 Before You Set Up S/FTP... 1 Setting Up FTP with SSH... 2 Sending Files... 3 Address

More information

AS2 or FTP: What s Best for Your Company. John Radko, Chief Technology Strategist, GXS Rochelle Cohen, Sr. Product Marketing Manager, GXS

AS2 or FTP: What s Best for Your Company. John Radko, Chief Technology Strategist, GXS Rochelle Cohen, Sr. Product Marketing Manager, GXS AS2 or : What s Best for Your Company John Radko, Chief Technology Strategist, GXS Rochelle Cohen, Sr. Product Marketing Manager, GXS Family Feud: AS2 Versus the Clan Selecting the Right Option for Your

More information

SECURE FTP CONFIGURATION SETUP GUIDE

SECURE FTP CONFIGURATION SETUP GUIDE SECURE FTP CONFIGURATION SETUP GUIDE CONTENTS Overview... 3 Secure FTP (FTP over SSL/TLS)... 3 Connectivity... 3 Settings... 4 FTP file cleanup information... 5 Troubleshooting... 5 Tested FTP clients

More information

Data Transfer Service A Migration tool to replace current X.400 messaging between NHS workflow applications

Data Transfer Service A Migration tool to replace current X.400 messaging between NHS workflow applications Data Transfer Service A Migration tool to replace current X.400 messaging between NHS workflow applications Submitter: Richard Corbridge Sponsorship: Gwyn Thomas 1. Introduction 1.1 This paper proposes

More information

Xerox FreeFlow Digital Publisher Information Assurance Disclosure. Onsite, Cloud and epublishing Configurations

Xerox FreeFlow Digital Publisher Information Assurance Disclosure. Onsite, Cloud and epublishing Configurations Xerox FreeFlow Digital Publisher Information Assurance Disclosure Onsite, Cloud and epublishing Configurations May 2016 2016 Xerox Corporation. All rights reserved. Xerox and Xerox and Design are trademarks

More information

File transfer clients manual File Delivery Services

File transfer clients manual File Delivery Services File transfer clients manual File Delivery Services Publisher Post CH Ltd Information Technology Webergutstrasse 12 CH-3030 Berne (Zollikofen) Contact Post CH Ltd Information Technology Webergutstrasse

More information

Corporate Access File Transfer Service Description Version 1.0 01/05/2015

Corporate Access File Transfer Service Description Version 1.0 01/05/2015 Corporate Access File Transfer Service Description Version 1.0 01/05/2015 This document describes the characteristics and usage of the Corporate Access File Transfer service, which is for transferring

More information

Unifying Information Security. Implementing TLS on the CLEARSWIFT SECURE Email Gateway

Unifying Information Security. Implementing TLS on the CLEARSWIFT SECURE Email Gateway Unifying Information Security Implementing TLS on the CLEARSWIFT SECURE Email Gateway Contents 1 Introduction... 3 2 Understanding TLS... 4 3 Clearswift s Application of TLS... 5 3.1 Opportunistic TLS...

More information

Setting Up an AS4 System

Setting Up an AS4 System INT0697_150625 Setting up an AS4 system V1r0 1 Setting Up an AS4 System 2 Version 1r0 ENTSOG AISBL; Av. de Cortenbergh 100, 1000-Brussels; Tel: +32 2 894 5100; Fax: +32 2 894 5101; info@entsog.eu, www.entsog.eu,

More information

Experian Secure Transport Service

Experian Secure Transport Service Experian Secure Transport Service Secure Transport Overview In an effort to provide higher levels of data protection and standardize our file transfer processes, Experian will be utilizing the Secure Transport

More information

File Transfer. User Guide For Clients and Vendors. Last Revised: October 21 2014

File Transfer. User Guide For Clients and Vendors. Last Revised: October 21 2014 File Transfer User Guide For Clients and Vendors Table of Contents File Transfer User Guide for Clients & Vendors... 3 Section 1: Overview... 3 Confidentiality... 3 Contact Information & Technical Support...

More information

CASHNet Secure File Transfer Instructions

CASHNet Secure File Transfer Instructions CASHNet Secure File Transfer Instructions Copyright 2009, 2010 Higher One Payments, Inc. CASHNet, CASHNet Business Office, CASHNet Commerce Center, CASHNet SMARTPAY and all related logos and designs are

More information

STERLING SECURE PROXY. Raj Kumar Integration Management, Inc. Raj.Kumar@integrationmgmt.com

STERLING SECURE PROXY. Raj Kumar Integration Management, Inc. Raj.Kumar@integrationmgmt.com STERLING SECURE PROXY Raj Kumar Integration Management, Inc. Raj.Kumar@integrationmgmt.com Agenda Terminology Proxy Definition Sterling Secure Proxy Overview Architecture Components Architecture Diagram

More information

IBM Campaign Version-independent Integration with IBM Engage Version 1 Release 3 April 8, 2016. Integration Guide IBM

IBM Campaign Version-independent Integration with IBM Engage Version 1 Release 3 April 8, 2016. Integration Guide IBM IBM Campaign Version-independent Integration with IBM Engage Version 1 Release 3 April 8, 2016 Integration Guide IBM Note Before using this information and the product it supports, read the information

More information

Device Log Export ENGLISH

Device Log Export ENGLISH Figure 14: Topic Selection Page Device Log Export This option allows you to export device logs in three ways: by E-Mail, FTP, or HTTP. Each method is described in the following sections. NOTE: If the E-Mail,

More information

File Transfer And Access (FTP, TFTP, NFS) Chapter 25 By: Sang Oh Spencer Kam Atsuya Takagi

File Transfer And Access (FTP, TFTP, NFS) Chapter 25 By: Sang Oh Spencer Kam Atsuya Takagi File Transfer And Access (FTP, TFTP, NFS) Chapter 25 By: Sang Oh Spencer Kam Atsuya Takagi History of FTP The first proposed file transfer mechanisms were developed for implementation on hosts at M.I.T.

More information

Shipping Services Files (SSF) Secure File Transmission Account Setup

Shipping Services Files (SSF) Secure File Transmission Account Setup Company This template is provided to document all of the materials and information needed for configuring secure file transmission for Shipping Services Files. Version 1.3 Page 1 of 5 1. Enter Date Submitted:

More information

In-Network Translation User s Guide

In-Network Translation User s Guide GXS EDI Services In-Network Translation User s Guide GC34-3282-02 Third Edition (November 2005) This book replaces GC34-3282-01. Copyright GXS, Inc. 1998, 2005. All rights reserved. Government Users Restricted

More information

Customer information on the replacement of LUA/CDIF access technology. Last revised: Mar. 17, 2015

Customer information on the replacement of LUA/CDIF access technology. Last revised: Mar. 17, 2015 access technology 1. GENERAL At the moment, your EDI application (e.g., your EDI converter) uses our interactive interface, Local User Agent (LUA) or the CDIF protocol embedded in it (for a proprietary

More information

The following multiple-choice post-course assessment will evaluate your knowledge of the skills and concepts taught in Internet Business Associate.

The following multiple-choice post-course assessment will evaluate your knowledge of the skills and concepts taught in Internet Business Associate. Course Assessment Answers-1 Course Assessment The following multiple-choice post-course assessment will evaluate your knowledge of the skills and concepts taught in Internet Business Associate. 1. A person

More information

GXS Trading Grid Messaging Service. Connectivity Overview. A GXS Transact SM Messaging Service for the Active Business

GXS Trading Grid Messaging Service. Connectivity Overview. A GXS Transact SM Messaging Service for the Active Business GXS Trading Grid Messaging Service A GXS Transact SM Messaging Service for the Active Business Table of Contents Introduction... 3 Trading Grid Messaging Service Connectivity Options Matrix... 4 AS2...

More information

WS_FTP Professional 12. Security Guide

WS_FTP Professional 12. Security Guide WS_FTP Professional 12 Security Guide Contents CHAPTER 1 Secure File Transfer Selecting a Secure Transfer Method... 1 About SSL... 2 About SSH... 2 About OpenPGP... 2 Using FIPS 140-2 Validated Cryptography...

More information

Online Banking for Business Secure FTP with SSL (Secure Socket Layer) USER GUIDE

Online Banking for Business Secure FTP with SSL (Secure Socket Layer) USER GUIDE Online Banking for Business Secure FTP with SSL (Secure Socket Layer) USER GUIDE Contents Secure FTP Setup... 1 Introduction...1 Secure FTP Setup Diagram...1 Before You Set Up S/FTP...2 Setting Up S/FTP...2

More information

FTP Use. Internal NPS FTP site instructions using Internet Explorer:

FTP Use. Internal NPS FTP site instructions using Internet Explorer: FTP Use File Transfer Protocol (FTP), a standard Internet protocol, is the simplest way to exchange files between computers on the Internet. Like the Hypertext Transfer Protocol (HTTP), which transfers

More information

State of Nevada Department of Health and Human Services (DHHS) Division of Health Care Financing and Policy (DHCFP)

State of Nevada Department of Health and Human Services (DHHS) Division of Health Care Financing and Policy (DHCFP) Hewlett Packard Enterprise for HIPAA Compliant Electronic Transactions Nevada Medicaid Management Information System (NV MMIS) State of Nevada Department of Health and Human Services (DHHS) Division of

More information

DMZ Gateways: Secret Weapons for Data Security

DMZ Gateways: Secret Weapons for Data Security A L I N O M A S O F T W A R E W H I T E P A P E R DMZ Gateways: Secret Weapons for Data Security A L I N O M A S O F T W A R E W H I T E P A P E R DMZ Gateways: Secret Weapons for Data Security EXECUTIVE

More information

BlackBerry Enterprise Service 10. Version: 10.2. Configuration Guide

BlackBerry Enterprise Service 10. Version: 10.2. Configuration Guide BlackBerry Enterprise Service 10 Version: 10.2 Configuration Guide Published: 2015-02-27 SWD-20150227164548686 Contents 1 Introduction...7 About this guide...8 What is BlackBerry Enterprise Service 10?...9

More information

Canada Savings Bonds Program. FTP Server User Guide. Version 2.5

Canada Savings Bonds Program. FTP Server User Guide. Version 2.5 Canada Savings Bonds Program FTP Server User Guide Version 2.5 September 1, 2015 FTPS Server User Guide FTPS Server User Guide Revision History Use the following table to track the revision history for

More information

Indiana Health Coverage Programs. Communications Guide

Indiana Health Coverage Programs. Communications Guide Indiana Health Coverage Programs Communications Guide Companion Guide Version Number: 2.1 Library Reference Number: CLEL10010 Revision Date: December 2013 Contents Contents... iii Introduction... 4 Connectivity

More information

AS2 or FTP: What s Best for Your Company. John Radko, Chief Technology Strategist, GXS Rochelle Cohen, Sr. Product Marketing Manager, GXS

AS2 or FTP: What s Best for Your Company. John Radko, Chief Technology Strategist, GXS Rochelle Cohen, Sr. Product Marketing Manager, GXS AS2 or : What s Best for Your Company John Radko, Chief Technology Strategist, GXS Rochelle Cohen, Sr. Product Marketing Manager, GXS Family Feud: AS2 Versus the Clan Selecting the Right Option for Your

More information

Quick Start Guide. Cerberus FTP is distributed in Canada through C&C Software. Visit us today at www.ccsoftware.ca!

Quick Start Guide. Cerberus FTP is distributed in Canada through C&C Software. Visit us today at www.ccsoftware.ca! Quick Start Guide Cerberus FTP is distributed in Canada through C&C Software. Visit us today at www.ccsoftware.ca! How to Setup a File Server with Cerberus FTP Server FTP and SSH SFTP are application protocols

More information

Secure Data Exchange Protocols

Secure Data Exchange Protocols Secure Data Exchange Protocols Comparing transport protocols to securely exchange business data within and beyond the enterprise COMPARISON GUIDE 1 OVERVIEW ABOUT THIS GUIDE Each data transport protocol

More information

ICE Futures Europe. AFTS Technical Guide for Large Position Reporting V1.0

ICE Futures Europe. AFTS Technical Guide for Large Position Reporting V1.0 ICE Futures Europe AFTS Technical Guide for Large Position Reporting V1.0 ICE FUTURES EUROPE Page 1 of 7 Contents 1. Introduction... 3 2. Online access to Clearing Systems... 4 3. Uploading Data... 5 4.

More information

Network Configuration Settings

Network Configuration Settings Network Configuration Settings Many small businesses already have an existing firewall device for their local network when they purchase Microsoft Windows Small Business Server 2003. Often, these devices

More information

Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference

Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise

More information

Network-Enabled Devices, AOS v.5.x.x. Content and Purpose of This Guide...1 User Management...2 Types of user accounts2

Network-Enabled Devices, AOS v.5.x.x. Content and Purpose of This Guide...1 User Management...2 Types of user accounts2 Contents Introduction--1 Content and Purpose of This Guide...........................1 User Management.........................................2 Types of user accounts2 Security--3 Security Features.........................................3

More information

Obtaining a user account and password: To obtain a user account, please submit the following information to AJRR staff:

Obtaining a user account and password: To obtain a user account, please submit the following information to AJRR staff: AJRR Secure FTP Site Usage www.ajrr-registry.net port 22 Contacts: Randolph Meinzer meinzer@ajrr.net Steve Hamada hamada@ajrr.net 6300 North River Road Rosemont, IL 60018 p: 847-292-0530 f: 847-292-0531

More information

Access Instructions for United Stationers ECDB (ecommerce Database) 2.0

Access Instructions for United Stationers ECDB (ecommerce Database) 2.0 Access Instructions for United Stationers ECDB (ecommerce Database) 2.0 Table of Contents General Information... 3 Overview... 3 General Information... 3 SFTP Clients... 3 Support... 3 WinSCP... 4 Overview...

More information

Configure Backup Server for Cisco Unified Communications Manager

Configure Backup Server for Cisco Unified Communications Manager Configure Backup Server for Cisco Unified Communications Manager Document ID: 110309 Contents Introduction Prerequisites Requirements Components Used Conventions Configure a Backup Server for Cisco Unified

More information

Safe Financials Limited. The CREST Simulator. File Transfer Overview and SFL Gateway

Safe Financials Limited. The CREST Simulator. File Transfer Overview and SFL Gateway Safe Financials Limited Ascension House 2 nd Floor First Avenue Burton on Trent DE14 2WW Tel : 01283 500255 Web : www.safefinancials.co.uk Email : enquiries@safefinancials.co.uk The CREST Simulator File

More information

SECTION 1: INTRODUCTION

SECTION 1: INTRODUCTION 3117 NETWORK ARCHITECTURE STANDARD OWNER: Security Management Branch ISSUE DATE: 10/25/2011 DISTRIBUTION: All Employees REVISED DATE: 7/1/2013 SECTION 1: INTRODUCTION The California Department of Technology

More information

Backup & Restore Guide

Backup & Restore Guide The email Integrity Company Sendio Email Security Platform Appliance Backup & Restore Guide Sendio, Inc. 4911 Birch St. Suite 150 Newport Beach, CA 92660 USA +1.949.274.4375 www.sendio.com 2010 Sendio,

More information

SECURE YOUR DATA EXCHANGE WITH SAFE-T BOX

SECURE YOUR DATA EXCHANGE WITH SAFE-T BOX SECURE YOUR DATA EXCHANGE SAFE-T BOX WHITE PAPER Safe-T. Smart Security Made Simple. 1 The Costs of Uncontrolled Data Exchange 2 Safe-T Box Secure Data Exchange Platform 2.1 Business Applications and Data

More information

Secure File Transfer Protocol User Guide. Date Created: November 10, 2009 Date Updated: April 14, 2014 Version: 1.7

Secure File Transfer Protocol User Guide. Date Created: November 10, 2009 Date Updated: April 14, 2014 Version: 1.7 Secure File Transfer Protocol User Guide Date Created: November 10, 2009 Date Updated: April 14, 2014 Version: 1.7 Secure File Transfer Protocol User Guide Table of Contents 1 Overview... 1 1.1 Purpose

More information

CONNECTING TO DEPARTMENT OF COMPUTER SCIENCE SERVERS BOTH FROM ON AND OFF CAMPUS USING TUNNELING, PuTTY, AND VNC Client Utilities

CONNECTING TO DEPARTMENT OF COMPUTER SCIENCE SERVERS BOTH FROM ON AND OFF CAMPUS USING TUNNELING, PuTTY, AND VNC Client Utilities CONNECTING TO DEPARTMENT OF COMPUTER SCIENCE SERVERS BOTH FROM ON AND OFF CAMPUS USING TUNNELING, PuTTY, AND VNC Client Utilities DNS name: turing.cs.montclair.edu -This server is the Departmental Server

More information

Electronic Data Interchange (EDI) 5010 Clearinghouse Services Guide

Electronic Data Interchange (EDI) 5010 Clearinghouse Services Guide Electronic Data Interchange (EDI) 5010 Clearinghouse Services Guide A PUBLICATION OF THE EDI DEPARTMENT OF BLUE CROSS AND BLUE SHIELD OF LOUISIANA 18NW1935 R02/12 Blue Cross and Blue Shield of Louisiana

More information

Cloud Control Panel (CCP) Installation Guide

Cloud Control Panel (CCP) Installation Guide Cloud Control Panel (CCP) Installation Guide Version 3.2.0: 17.05.12 Copyright 2012 DNS Europe Ltd. All rights reserved. Cloud Control Panel (CCP) Installation Guide v3.2.0 Table of Contents Table of Contents

More information

Clearswift Information Governance

Clearswift Information Governance Clearswift Information Governance Implementing the CLEARSWIFT SECURE Encryption Portal on the CLEARSWIFT SECURE Email Gateway Version 1.10 02/09/13 Contents 1 Introduction... 3 2 How it Works... 4 3 Configuration

More information

ASX SFTP External User Guide

ASX SFTP External User Guide ASX SFTP External User Guide Table of Contents 1. SOLUTION OVERVIEW... 3 1.1. BUSINESS CONTINUITY SOLUTION... 3 1.2. USER MANUAL AUDIENCE... 3 2. REQUESTING SFTP ACCESS... 4 2.1. SFTP ACCOUNTS... 4 2.2.

More information

Using www.bcidaho.net

Using www.bcidaho.net Using www.bcidaho.net Blue Cross supports a wide variety of clients and protocols for uploading and downloading files from our servers, including web-based tools, traditional clients and batch processing.

More information

Sonian Getting Started Guide October 2008

Sonian Getting Started Guide October 2008 Sonian Getting Started Guide October 2008 Sonian, Inc. For Authorized Use Only 1 Create your new archiving account 3 Configure your firewall for IMAP collections 4 (Skip this step if you will be using

More information

Secure FTP. Client user guide. Author: Steria A/S Version: 2.2 Date: 20 January 2010 Document SecureFtpClientUserguideV2_2.doc

Secure FTP. Client user guide. Author: Steria A/S Version: 2.2 Date: 20 January 2010 Document SecureFtpClientUserguideV2_2.doc Secure FTP Client user guide Author: Steria A/S Version: 2.2 Date: 20 January 2010 Document SecureFtpClientUserguideV2_2.doc Steria A/S, Tonsbakken 16-18, 2740 Skovlunde, Denmark Phone +45 4450 6000, Fax

More information

Mobile Admin Security

Mobile Admin Security Mobile Admin Security Introduction Mobile Admin is an enterprise-ready IT Management solution that generates significant cost savings by dramatically increasing the responsiveness of IT organizations facing

More information

File Transmission Methods Monday, July 14, 2014

File Transmission Methods Monday, July 14, 2014 Slide 1 - of 27 Version 4.4, 7/14/14 CMS reserves the right to modify this presentation. To ensure you have the most current version, verify that the version and date on this page match the version and

More information

SOSFTP Managed File Transfer

SOSFTP Managed File Transfer Open Source File Transfer SOSFTP Managed File Transfer http://sosftp.sourceforge.net Table of Contents n Introduction to Managed File Transfer n Gaps n Solutions n Architecture and Components n SOSFTP

More information

Effective Data Inc. White Paper: EDIINT EDI Over the Internet

Effective Data Inc. White Paper: EDIINT EDI Over the Internet Effective Data Inc. White Paper: EDIINT EDI Over the Internet 1515 E. Woodfield Road Suite 770 Schaumburg, IL 60173 Ph (847) 969-9300 Fx (847) 969-9350 www.effective-data.com TABLE OF CONTENTS Executive

More information

AS2 Disaster Recovery Implementation Guide Issue 1, Approved, 18-Nov-2010

AS2 Disaster Recovery Implementation Guide Issue 1, Approved, 18-Nov-2010 AS2 Disaster Recovery Implementation Guide Issue 1, Approved, 18-Nov-2010 18-Nov-2010, Issue 1 All contents copyright GS1 Page 1 of 19 Document Summary Document Item Document Title Date Last Modified Current

More information

freesshd SFTP Server on Windows

freesshd SFTP Server on Windows freesshd SFTP Server on Windows Configuration Steps: Setting up the Bridgestone User ID... 2 Setup the freesshd Server... 3 Login as the Bridgestone User ID using WinSCP... 5 Create Default Bridgestone

More information

Installation and configuration guide

Installation and configuration guide Installation and Configuration Guide Installation and configuration guide Adding X-Forwarded-For support to Forward and Reverse Proxy TMG Servers Published: May 2010 Applies to: Winfrasoft X-Forwarded-For

More information

fåíéêåéí=péêîéê=^çãáåáëíê~íçêûë=dìáçé

fåíéêåéí=péêîéê=^çãáåáëíê~íçêûë=dìáçé fåíéêåéí=péêîéê=^çãáåáëíê~íçêûë=dìáçé Internet Server FileXpress Internet Server Administrator s Guide Version 7.2.1 Version 7.2.2 Created on 29 May, 2014 2014 Attachmate Corporation and its licensors.

More information

Secure Data Transfer

Secure Data Transfer Secure Data Transfer INSTRUCTIONS 3 Options to SECURELY TRANSMIT DATA 1. FTP 2. WinZip 3. Password Protection Version 2.0 Page 1 Table of Contents Acronyms & Abbreviations...1 Option 1: File Transfer Protocol

More information

Accessing the FTP Server - User Manual

Accessing the FTP Server - User Manual CENTRAL BANK OF CYPRUS Accessing the FTP Server - User Manual IT Department, CENTRAL BANK OF CYPRUS TABLE OF CONTENTS 1 EXECUTIVE SUMMARY... 1 1.1 AUDIENCE... 1 1.2 SCOPE... 1 2 CHANGES FROM THE OLD FTP

More information

IBM Campaign and IBM Silverpop Engage Version 1 Release 2 August 31, 2015. Integration Guide IBM

IBM Campaign and IBM Silverpop Engage Version 1 Release 2 August 31, 2015. Integration Guide IBM IBM Campaign and IBM Silverpop Engage Version 1 Release 2 August 31, 2015 Integration Guide IBM Note Before using this information and the product it supports, read the information in Notices on page 93.

More information

Securing Ship-to-Shore Data Flow

Securing Ship-to-Shore Data Flow Securing Ship-to-Shore Data Flow Background on Common File Transfer Methods Today corporations, government entities, and other organizations rely on Electronic File Transfers as an important part of their

More information

Version 1.0 January 2011. Xerox Phaser 3635MFP Extensible Interface Platform

Version 1.0 January 2011. Xerox Phaser 3635MFP Extensible Interface Platform Version 1.0 January 2011 Xerox Phaser 3635MFP 2011 Xerox Corporation. XEROX and XEROX and Design are trademarks of Xerox Corporation in the United States and/or other countries. Changes are periodically

More information

F-Secure Messaging Security Gateway. Deployment Guide

F-Secure Messaging Security Gateway. Deployment Guide F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4

More information

IBM Unica emessage Version 8 Release 6 February 13, 2015. Startup and Administrator's Guide

IBM Unica emessage Version 8 Release 6 February 13, 2015. Startup and Administrator's Guide IBM Unica emessage Version 8 Release 6 February 13, 2015 Startup and Administrator's Guide Note Before using this information and the product it supports, read the information in Notices on page 83. This

More information

LifeSize Control Installation Guide

LifeSize Control Installation Guide LifeSize Control Installation Guide April 2005 Part Number 132-00001-001, Version 1.0 Copyright Notice Copyright 2005 LifeSize Communications. All rights reserved. LifeSize Communications has made every

More information

/ Preparing to Manage a VMware Environment Page 1

/ Preparing to Manage a VMware Environment Page 1 Configuring Security for a Managed VMWare Enviroment in VMM Preparing to Manage a VMware Environment... 2 Decide Whether to Manage Your VMware Environment in Secure Mode... 2 Create a Dedicated Account

More information

Data Exchange Preparation Procedures_006. Document Control Number - 1609

Data Exchange Preparation Procedures_006. Document Control Number - 1609 _006 Document Control Number - 1609 January 20, 2010 Copyright Notices Connect:Direct is a trademark of Sterling Commerce, a subsidiary of SBC Communications, Inc. All rights reserved. Gentran:Server rights

More information

Linux VPS with cpanel. Getting Started Guide

Linux VPS with cpanel. Getting Started Guide Linux VPS with cpanel Getting Started Guide First Edition October 2010 Table of Contents Introduction...1 cpanel Documentation...1 Accessing your Server...2 cpanel Users...2 WHM Interface...3 cpanel Interface...3

More information

Dove User Guide Copyright 2010-2011 Virgil Trasca

Dove User Guide Copyright 2010-2011 Virgil Trasca Dove User Guide Dove User Guide Copyright 2010-2011 Virgil Trasca Table of Contents 1. Introduction... 1 2. Distribute reports and documents... 3 Email... 3 Messages and templates... 3 Which message is

More information

Secure, Reliable Messaging Comparisons between PHINMS, SFTP, and SSH. Public Health Information Network Messaging System (PHINMS)

Secure, Reliable Messaging Comparisons between PHINMS, SFTP, and SSH. Public Health Information Network Messaging System (PHINMS) Secure, Reliable Messaging Comparisons between PHINMS, SFTP, and SSH Public Health Information Network Messaging System (PHINMS) Version: 1.0 Prepared by: U.S. Department of Health & Human Services Date:

More information

Exam Questions SY0-401

Exam Questions SY0-401 Exam Questions SY0-401 CompTIA Security+ Certification http://www.2passeasy.com/dumps/sy0-401/ 1. A company has implemented PPTP as a VPN solution. Which of the following ports would need to be opened

More information

GS1 Newcomers to AS2. Implementation Guide. Issue 1, 23-June-2008. GS1 Newcomers to AS2 Implementation Guide

GS1 Newcomers to AS2. Implementation Guide. Issue 1, 23-June-2008. GS1 Newcomers to AS2 Implementation Guide GS1 Newcomers to AS2 Implementation Guide Issue 1, 23-June-2008 23-June-2008, Issue 1 All contents copyright GS1 2008 Page 1 of 14 Document Summary Document Item Document Title Date Last Modified Current

More information

New GoAnywhere File Transfer Set Up Tasks

New GoAnywhere File Transfer Set Up Tasks New GoAnywhere File Transfer Set Up Tasks 1 Task Name Comments Assigned To Duration NEW GO ANYWHERE FILE TRANSFER SETUP TASKS 2 STANDARDS 3 4 PCSSC will be encrypting all files whether they contain PII

More information

Using Avaya Aura Messaging

Using Avaya Aura Messaging Using Avaya Aura Messaging Release 6.3.2 Issue 1 December 2014 Contents Chapter 1: Getting Started... 4 Messaging overview... 4 Prerequisites... 4 Accessing your mailbox from any phone... 4 Accessing the

More information

Astaro Mail Archiving Getting Started Guide

Astaro Mail Archiving Getting Started Guide Connect With Confidence Astaro Mail Archiving Getting Started Guide About this Getting Started Guide The Astaro Mail Archiving Service is an archiving platform in the form of a fully hosted service. E-mails

More information

MOVEIT CENTRAL: MANAGED FILE TRANSFER WORKFLOW ENGINE

MOVEIT CENTRAL: MANAGED FILE TRANSFER WORKFLOW ENGINE MOVEIT CENTRAL: MANAGED FILE TRANSFER WORKFLOW ENGINE ABSTRACT Data workflows are truly the lifeblood of organizations today, yet the infrastructure supporting these workflows are typically less than ideal.

More information

Quickstream Connectivity Options

Quickstream Connectivity Options A division of Westpac Banking Corporation ABN 33 007 457 141 Quickstream Connectivity Options Document History Date 25-Jun-2003 1-Jul-2003 3-July-2003 18-July-2003 18-Aug-2003 8-Sep-2003 19-Sep-2003 31-Oct-2003

More information

TELNET Basics BUPT/QMUL 2015-04-14. Refer to Chapter 24, Textbook

TELNET Basics BUPT/QMUL 2015-04-14. Refer to Chapter 24, Textbook TELNET Basics BUPT/QMUL 2015-04-14 Refer to Chapter 24, Textbook Agenda A brief introduction to TELNET Concept of remote/virtual terminal TELNET operations TELNET protocol TELNET options negotiation Other

More information

SFTP (Secure Shell FTP using SSH2 protocol)

SFTP (Secure Shell FTP using SSH2 protocol) SFTP (Secure Shell FTP using SSH2 protocol) Technical Manual March 2014 1. Contents 1. 1. Table of contents 2. Introduction... 3 3. Criteria for SFTP... 5 4. Preparations for connecting to SFTP... 7 5.

More information

Download.nuance.com GroupAdmin Guide

Download.nuance.com GroupAdmin Guide Download.nuance.com GroupAdmin Guide Policy 1. Download.nuance.com accounts are assigned to an individual, not a department or group and should not be shared under any circumstances. It is the responsibility

More information

Stealth OpenVPN and SSH Tunneling Over HTTPS

Stealth OpenVPN and SSH Tunneling Over HTTPS Stealth OpenVPN and SSH Tunneling Over HTTPS Contents Tunneling OpenVPN and SSH via HTTPS for Windows,MAC and Linux... 1 Benefits of HTTPS Tunneling:... 2 Pre-Requisites:... 3 Part A: Step by Step Instructions

More information

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise

More information

User Guide & Implementation Guidelines for using the Transaction Delivery Agent (TDA) 3.0

User Guide & Implementation Guidelines for using the Transaction Delivery Agent (TDA) 3.0 Using SWIFTNet to communicate with the Deriv/SERV system at DTCC User Guide & Implementation Guidelines for using the Transaction Delivery Agent (TDA) 3.0 Version 2.0 August 2009 Deriv/SERV through SWIFTNet

More information

Michaels Quick Start Guide

Michaels Quick Start Guide Michaels Quick Start Guide Document Version 2.1, June 18, 2003 Copyright 2003 Cleo Communications In this document Process Map Overview Configure Your Client-Side Firewall Configuration Activate the Michaels

More information

redcoal EmailSMS for MS Outlook and Lotus Notes

redcoal EmailSMS for MS Outlook and Lotus Notes redcoal EmailSMS for MS Outlook and Lotus Notes Technical Support: support@redcoal.com Or visit http://www.redcoal.com/ All Documents prepared or furnished by redcoal Pty Ltd remains the property of redcoal

More information

Preparing for GO!Enterprise MDM On-Demand Service

Preparing for GO!Enterprise MDM On-Demand Service Preparing for GO!Enterprise MDM On-Demand Service This guide provides information on...... An overview of GO!Enterprise MDM... Preparing your environment for GO!Enterprise MDM On-Demand... Firewall rules

More information

System to System Interface Guide

System to System Interface Guide System to System Interface Guide Overview What does this guide cover? This guide describes the interface definition to firms intending to submit their TRS Product Sales Data (PSD) or Securities Trades

More information

Barracuda Networks Technical Documentation. Barracuda SSL VPN. Administrator s Guide. Version 2.x RECLAIM YOUR NETWORK

Barracuda Networks Technical Documentation. Barracuda SSL VPN. Administrator s Guide. Version 2.x RECLAIM YOUR NETWORK Barracuda Networks Technical Documentation Barracuda SSL VPN Administrator s Guide Version 2.x RECLAIM YOUR NETWORK Copyright Notice Copyright 2004-2011, Barracuda Networks, Inc. www.barracuda.com v20-110511w-02-110915jc

More information

Authentication and Single Sign On

Authentication and Single Sign On Contents 1. Introduction 2. Fronter Authentication 2.1 Passwords in Fronter 2.2 Secure Sockets Layer 2.3 Fronter remote authentication 3. External authentication through remote LDAP 3.1 Regular LDAP authentication

More information

Configuration Guide BES12. Version 12.2

Configuration Guide BES12. Version 12.2 Configuration Guide BES12 Version 12.2 Published: 2015-07-07 SWD-20150630131852557 Contents About this guide... 8 Getting started... 9 Administrator permissions you need to configure BES12... 9 Obtaining

More information