Royal Mail Business Integration Gateway Specification
|
|
- Grant Bates
- 8 years ago
- Views:
Transcription
1 FSpec401 FSpec401 Royal Mail Customer Solutions Royal Mail Business Integration Gateway Specification - XB60 The FSpec401 document details, for customers, the various methods of connecting to Royal Mail s Business Integration Gateway, specifically covering Inbound and Outbound connections for data transfer. 29 th March 2011 Version 1.4 Page 1 of 13
2 Contents 1 Introduction Description and Purpose Audience BIG Integration Service Overview BIG Communication Protocols Supported Standards COLLECT Data from BIG Security Unsupported Standards FTP SMTP Transfers ISDN Lines Future Standards Document Control References and related documents Terms and abbreviations Appendix A Benefits of AS Appendix B Connecting via FTPS PREREQUISITES FTP Client An Internet Connection with fixed public IP Address Royal Mail SSL Certificates CONNECTION DETAILS Connecting to the Server Page 2 of 13
3 1 Introduction This document defines the approved communication transport protocols for Royal Mail Group s (RMG) Business Customers to use in the exchange of electronic business information with RMG s Business Integration Gateway (BIG) service. BIG provides a means for RMG s Business Customers to securely exchange business documents electronically using standardised communication transport protocols for Electronic Data Interchange (EDI), traditional File Transfer methods and Web Services. 1.1 Description and Purpose This document acts as a guide for RMG s Business Customers as to the supported communication transport protocols to interface with BIG. This document will assist the reader to identify the appropriate choice of BIG interface solution applicable to meet the integration requirements. 1.2 Audience This document is intended to be read by all of RMG Business Customers that exchange data with RMG. 2 BIG Integration Service 2.1 Overview BIG is a new service that offers Business to Business (B2B) Integration capabilities between RMG and its Business Customers. As such it facilitates the secure exchange of business data between RMG systems and external party systems to provide a replacement to RMG s existing External Data Gateway (EDG) service. The main objectives of BIG are to provide a replacement platform for data exchange that: Drives standardisation for data exchange transport over the internet and trusted networks where appropriate. Provides agility in responding to the changing needs of RMG business customers and trading partners. Provides a rapid technical on-boarding process once customer agreements have been established. Provides the ability for non-repudiation of data exchanges. Meets the RMG security requirements. Page 3 of 13
4 3 BIG Communication Protocols This section documents the approved and supported transport protocol standards for both new external and interfaces migrated onto the new BIG environment. Standards are classified as follows: PREFERRED these are the generally accepted and widely used industry standards in existence for EDI over the Internet. These standards provide the most straightforward method for exchanging data using BIG. SUPPORTED these are standards offered to provide additional interoperability with trading partners that are unable to use the preferred standards. UNSUPPORTED these are standards where no new implementations will be permitted. FUTURE these are standards that whilst available for adoption, have not been widely adopted or can be considered emerging standards that may become relevant to RMG in the medium to long-term. 3.1 Supported Standards Category Transport Notes Protocol Preferred AS2 For data exchange, the preferred protocol on interaction with BIG is AS2. This is the generally accepted industry standard in existence today and brings with it many setup and maintenance advantages such as encryption of message content and non-repudiation. The technology used within BIG has been certified by the Drummond Group to conform to the standard and interoperate with other certified products. A full list of currently certified products can be found on the Drummond Group International website In addition to the certified products there are a number of free or open source software implementations that may also be used and the following have been seen to work with BIG: Single Partner Version of the /n software AS2 Connector ( OpenAS2 ( Mendelson AS2 ( Because AS2 has been specifically designed to provide secure data exchange over the internet it has become the de facto standard for EDI-INT and is the preferred method of exchanging data with BIG. Page 4 of 13
5 Category Transport Notes Protocol Supported FTPS Secure method of file transfer that secures the control and data channels using Transport Layer Security (TLS) defined by the IETF standard RFC This standard specifies that the connecting client software must explicitly request the security method to be used from the FTPS server and use a mutually agreed encryption method to secure the channels used. This is commonly referred to as explicit FTPS and is the only form of FTPS supported by BIG. The following FTPS software has been fully approved to interoperate with BIG: CoreFTP LE ( CuteFTP 8 Professional ( Ipswitch WS_FTP Professional ( FTPS secures the control and data channels it does not offer non repudiation of receipt or use Trading Partner Management unlike AS2. Supported Supported Web Services Connect: Direct NOTE: There are two patterns supported: 1) COLLECT refers to either BIG polling a system for data or an RMG Buisness Customer polling BIG for data. Supported for FTPS only and not SFTP. 2) PUSH refers to an RMG Business Customer sending data to BIG or BIG sending data to an RMG Business Customer. This is the preferred pattern as it offers event driven data exchange, reduces security risk and interface implementation costs and directly supports rapid customer take-on processes. Supported for both FTPS and SFTP. Offers high level of interoperability and standard API s for ease of data exchange. Enhancements to the accepted standards including Secure B2B Document transfer using Web Services based methods will be introduced in the future based on demand. NOTE: BIG does not provide Web Service APIs but provides Web Service proxy facility. Proprietary file transfer product. The use of Connect:Direct is supported for specific connections where this method is a requirement. Page 5 of 13
6 Category Transport Notes Protocol Supported SFTP SFTP provides a method of sending data securely using Secure Shell (SSH) to secure the data channel using public encryption keys exchanged between the SFTP Client and Server. SFTP is a secure protocol but the management of its associated encryption keys is inconsistent with RMG standard which is X509 certificate based. There are no IETF standards for SFTP but there are a number of expired draft standards that relate to SFTP. BIG only supports SFTP Version 3 defined by the draft-ietfsecsh-filexfer-02.txt Internet-Draft. The following SFTP client software is supported: CuteFTP Professional 8.3 OpenSSH 3.1p1 (Red Hat Linux 7.3) OpenSSH 4.6p1 (Ubuntu Linux) OpenSSH 5.1p1 PuTTY PSFTP, version 0.60 SmartFTP, version 3.0 Sun Microsystems, Sun_SSH_1.1 WinSCP, version Due to the variance in software implementations of SFTP its interoperability with BIG cannot be guaranteed and additional testing will be required. SFTP functionality can be offered on an exception basis where FTPS or AS2 cannot be accommodated. NOTE: SFTP functionality will be allowed for event driven transfers only (i.e. the source must push to BIG and BIG will push to the target, SFTP COLLECT is not supported). Table 1 - BIG Approved Communication Protocols COLLECT Data from BIG One of the principles of BIG is to encourage event driven transactions so that the source always initiates the information transfer to BIG and BIG pushes the information to the target. However if a Business Customer is unable to provide this capability to allow BIG to push information to them once it is available, they will be allowed to COLLECT (or pull) the information at their convenience. NOTE: Collect functionality will only be offered for FTPS Security RMG require the use of digital certificates for authentication with BIG. The preferred approach is mutual authentication, i.e. digital certificates signed by a recognised Certificate Authority (see Appendix B) are exchanged between RMG and a Business Customer. For information classified as INTERNAL or PUBLIC, customer self signed certificates would be acceptable on an exception only basis. Page 6 of 13
7 For data classified as CONFIDENTIAL, digital certificates must always be used on the server side, i.e. at the RMG end of the FTPS connection. If the business customer cannot implement client-side certificates due to: a) the urgency of the implementation; b) customer is unable to implement certificates; c) customer software problems that prevent the use of certificate; then the use of username and password authentication at the customer end will be permitted if their access is restricted to a virtual directory only where no other customer data is present and the customer takes full responsibility for authorising their admin access to BIG at their end. NOTE: Business Customers with no server side digital certificate will not be able to receive data from BIG, i.e. they can only COLLECT data. Where the data is classified as STRICTLY CONFIDENTIAL, the use of client-side certificates must be in place. 3.2 Unsupported Standards NOTE: A standard is to be considered as unsupported unless explicitly listed as being supported FTP FTP is not a secure protocol for communication. The use of FTP with business customers carries certain risks for RMG. The acceptable level of risk depends on the Information Classification. As a rule of thumb, if the information is STRICTLY CONFIDENTIAL then encryption is always required, whether the information is at rest or in motion. If the information is classified as CONFIDENTIAL then encryption is required for communication with business customers, if transmitted over the Internet or a public network. RMG s rules for dealing with requests from business customers who wish to communication with BIG using FTP are as follows: 1. For new interfaces with new partners FTP is not permitted. 2. For existing interfaces that need to be migrated to BIG: a. If the information is classified as STRICLY CONFIDENTIAL - a secure protocol needs to be used. b. If the information is classified as CONFIDENTIAL, INTERNAL or PUBLIC - investigate if there are alternative solutions available (e.g. FileSafe for adhoc transfers from person to person or the ebusiness platform for HTTPS transfers over the Internet). c. If the information is classified as CONFIDENTIAL, INTERNAL or PUBLIC and a business customer still wishes to adopt FTP via BIG, this would be acceptable on an exception only basis. The customer also would need to sign a disclaimer accepting the risks associated with this protocol where the data is classified as CONFIDENTIAL or INTERNAL. Page 7 of 13
8 3.2.2 SMTP Transfers facility is not provided on BIG and this will not be allowed going forward ISDN Lines As defined above, RMG preference is for the adoption of AS2 or FTPS over the Internet only. Users of existing ISDN lines are encouraged to switch to an Internet based protocol as a more cost effective solution. Existing Business Customers that wish to continue to use an ISDN line will be accepted for information classified as PUBLIC. However, information classified as INTERNAL, CONFIDENTIAL or STRICTLY CONFIDENTIAL would be acceptable on an exception only basis. 3.3 Future Standards AS3 (Applicability Statement 3) is the draft specification standard by which vendor applications communicate EDI (or other data such as XML) over the Internet using File Transfer Protocol (FTP). ebms although supported is an emerging standard and would require additional testing if specific requirement is identified. NOTE: Future Standards will be included when known together with any dates where they are planned to be considered as supported as standard. Page 8 of 13
9 4 Document Control 4.1 References and related documents Reference Document Title RMG Third Party Guide to Exchanging Data Using BIG Version Author 1.0 Gordon McMullan 4.2 Terms and abbreviations Term AS2 AS3 B2B BIG Confidential EDI FTP Gateway HTML HTTP HTTPS Internal Meaning Applicability Statement 2 is a specification on how to transport Data securely and reliably over the Internet. Defined by IETF in RFC4130. Applicability Statement 3 is a draft specification standard by which vendor Systems communicate EDI (or other Data such as XML) over the Internet using FTP. Defined by IETF in RFC4823. Business to Business Relationship. Business Integration Gateway replacement of RMG s External Data Gateway service. Information that has been assessed to be of a sensitive nature and likely to cause damage following unauthorised disclosure Confidential information requires additional protection over and above that afforded to INTERNAL information Confidential information should represent only a small proportion of information present in Royal Mail and its subsidiary businesses Electronic Data Interchange refers to the structured transmission of Data between organisations by electronic means. File Transfer Protocol. Provides access security services (e.g Authentication and Authorisation, Encryption/Decryption) for a System requiring data. Hyper Text Markup Language. Hyper Text Transfer Protocol; A standard communications protocol used for HTML and web-based Systems. Hyper Text Markup Language Secure. Internal information accessible to all employees, agents and contractors that relates to the ongoing business of Royal Mail and its subsidiaries Internal information should be protected from unauthorised disclosure by treating it like any other organisational asset, i.e. by employing common sense measures Page 9 of 13
10 Term MQ NFS SFTP Strictly Confidential Systems TCP/IP Meaning IBM Messaging Technology. Network File Storage. Secure File Transfer Protocol. Internet standard protocol for secure File Transfer using SSH. SFTP tunnels RCP (remote copy) over SSH to provide a secure service, allowing the server to encrypt the data and handle the file transfer. Information that must meet classification standards of government departments, security services or clients, or assessed as so sensitive that unauthorised disclosure would cause acute organisational damage Strictly Confidential information requires additional protection that will meet the standards required by third parties or Security & Investigation Services Computer programs or software components that provide functionality in direct support of a business process Transmission Control Protocol/Internet Protocol. UN/EDIFACT United Nations/Electronic Data Interchange For Administration, Commerce and Transport - international EDI standard developed under the United Nations and adopted by the International Organisation for Standardisation (ISO) as standard ISO 9735 URL Uniform Resource Location. Web Service Web services are most often web APIs that can be accessed over a network, such as the Internet, and executed on a remote system hosting the requested services. In common usage the term refers to clients and servers that communicate over the Hypertext Transfer Protocol (HTTP) protocol used on the web. XML Extensible Mark-up Language. Page 10 of 13
11 5 Appendix A Benefits of AS2 The preferred connectivity standard for exchanging electronic information using BIG is the Applicability Statement 2 (AS2) standard. AS2 adoption applies to any business customer needing to send electronic data to or receive data from RMG. AS2 is RMG s preferred connectivity standard for the following reasons: Rapid Customer Take-On AS2 maximises RMG s ability to offer efficient technical implementation. Reduces time to market AS2 allows RMG s business partners to create standardised and re-usable interfaces thus reducing project lifespan. Many of RMG larger business partners already see the benefits of using AS2 such as Amazon, HMRC and ASDA have all successfully implemented AS2 connections. Tesco, Sainsbury s and Bupa have all expressed an interest in moving to this standard. AS2 is implemented via Commercial Off the Shelf (COTS) products that have been independently tested and signed off as interoperable with other AS2 products thus reducing time required for technical integration and improving supportability (a list of compatible products is available on request). Reduced costs for communication as AS2 uses the internet rather than private connections so that standard firewalls rules can be in place instead of new firewall rules per customer. Real-time data delivery, business data is immediately pushed rather than being held in a mail box or location waiting to be fetched. Enhanced security as part of the standard: o Encryption ensures that only the sender and receiver are able to view the data. o Digital signatures ensure authentication; only messages from authorised senders are accepted. o Guaranteed delivery as part of the standard o Ensures data integrity by detecting whether the data was altered during transmission o Provides a mechanism for non-repudiation of receipt, ensuring that the intended party did receive the data. Disadvantages of File Based Transfers (FTP, FTPS, SFTP) No standard implementation. Most interfaces are unique given a lack of standardisation despite fulfilling similar functions. No retry on file transfer without bespoke code development. FTP does not support event driven processing. There are no external bodies that certify File Transfer products are interoperable. Not all FTP/s implementations follow the set standards defined for FTP/s. Page 11 of 13
12 Requires a scheduler to trigger events, thus removing any real time availability of information to applications and customers. No receipt or non-repudiation features. 6 Appendix B Connecting via FTPS 6.1 PREREQUISITES FTP Client Any FTPS client should be able to connect to BIG as long as it follows the SSL AUTH/EXPLICIT mode standards correctly. Customers who are proposing to use third party FTPS software are advised to test that the prospective FTPS client software can connect to the BIG server before purchasing the software. The FTPS client must also support passive mode connections. With Passive mode all connections will be initiated from the FTPS client and not Royal Mail s server An Internet Connection with fixed public IP Address For security reasons access to Royal Mail s servers are restricted to connections from authorised public IP addresses only. In order to connect to BIG clients are required to provide a valid fixed IP address of their FTPS client to Royal Mail Royal Mail SSL Certificates Authentication and Encryption is implemented using SSL certificates downloaded from Royal Mail s server. Most FTPS clients will accept this certificate automatically or will prompt the user to accept them during the login process. If the certificates cannot be downloaded then they can be provided in DER encoded X509 file format. Please contact Royal Mail s Customer Solutions team for provision if needed. Page 12 of 13
13 6.2 CONNECTION DETAILS Customer s firewalls are required to be configured to allow outbound initiated connections to the IP addresses and ports outlined in the table below. As FTPS passive mode is used then there should be no need to open the ports completely. Please also ensure that your firewall is configured to accept responses from Royal Mail s servers on the designated command port of your FTPS client. Detail Description IP Address / Pre-Production BIG Test environment DNS Name ftp://lfttest.bdtg.royalmailgroup.com IP Address / Production BIG Live environment DNS Name ftp://lft.bdtg.royalmailgroup.com FTPS Command 8021 Port used to initiate FTPS client connections Port FTPS Passive Data Ports utilized in data transfer Port Range FTPS UserID Uniquely assigned by Royal User ID to log onto BIG server. Mail FTPS user Password Uniquely assigned by Royal Password set by Royal Mail and is unique to Mail each customer. Incoming Directory /pub/tracked/incoming Location on BIG server where client pushes data files. Outgoing Directory /pub/tracked/outgoing Location on BIG server where client collects /pub/rmgtt/outgoing data files. Tracked relates to Royal Mail Tracked products and RMGTT to Special Delivery/International products. A file pushed onto BIG incoming folder does not require to be renamed. BIG automatically processes data on arrival and the file is deleted once processed. 6.3 Connecting to the Server Although in most cases this process will be automated, a manual connection process may be useful in troubleshooting connectivity problems. Enter FTPS client and configure connection and login details. During the initial login ensure that any certificate download requests are accepted. Also ensure that AUTH mode is also selected. Users should use their unique user name and enter the correct IP address for Preproduction or Production environments. Initiate the connection and place the pre-advice file in the incoming Directory. Once processed by the BIG server the files will be automatically erased. Page 13 of 13
GS1 Trade Sync Connectivity guide
GS1 Trade Sync Connectivity guide Date: 2015-12-01 Version: v1.8 Page: 2/17 Revision history Version Date Description Author 1.0 2013-11-14 Initial version Fernando Pereira 1.1 2014-01-16 Added FTP and
More informationII. Implementation and Service Information
II. Implementation and Service Information A. Responsibilities The procedure for setup with KeyBank s standard transmission services consists of three phases: 1) communications testing, 2) applications
More informationMethods available to GHP for out of band PUBLIC key distribution and verification.
GHP PGP and FTP Client Setup Document 1 of 7 10/14/2004 3:37 PM This document defines the components of PGP and FTP for encryption, authentication and FTP password changes. It covers the generation and
More informationCreationDirect. Clearstream file transfer connectivity solutions
CreationDirect Clearstream file transfer connectivity solutions CreationDirect - Clearstream file transfer connectivity solutions Document number: 6731 This document is the property of Clearstream Banking
More informationSection I Transmission Modes
Transmission Modes Transmission Options Available...2 Value Added Networks (VAN)...2 File Transfer Protocol (FTP)...2 HTTPS File Upload (WEB)...3 Storing and Receiving Data with File Transfer Protocol...3
More informationMOVEIT: SECURE, GUARANTEED FILE DELIVERY BY JONATHAN LAMPE, GCIA, GSNA
MOVEIT: SECURE, GUARANTEED FILE DELIVERY BY JONATHAN LAMPE, GCIA, GSNA The MOVEit line of secure managed file transfer software products by Ipswitch File Transfer consists of two flagship products, the
More informationAS2 or FTP: What s Best for Your Company. John Radko, Chief Technology Strategist, GXS Rochelle Cohen, Sr. Product Marketing Manager, GXS
AS2 or : What s Best for Your Company John Radko, Chief Technology Strategist, GXS Rochelle Cohen, Sr. Product Marketing Manager, GXS Family Feud: AS2 Versus the Clan Selecting the Right Option for Your
More informationXerox FreeFlow Digital Publisher Information Assurance Disclosure. Onsite, Cloud and epublishing Configurations
Xerox FreeFlow Digital Publisher Information Assurance Disclosure Onsite, Cloud and epublishing Configurations May 2016 2016 Xerox Corporation. All rights reserved. Xerox and Xerox and Design are trademarks
More informationSECURE FTP CONFIGURATION SETUP GUIDE
SECURE FTP CONFIGURATION SETUP GUIDE CONTENTS Overview... 3 Secure FTP (FTP over SSL/TLS)... 3 Connectivity... 3 Settings... 4 FTP file cleanup information... 5 Troubleshooting... 5 Tested FTP clients
More informationOnline Banking for Business Secure FTP with SSH (Secure Shell) USER GUIDE
Online Banking for Business Secure FTP with SSH (Secure Shell) USER GUIDE Contents Secure FTP Setup... 1 Introduction... 1 Before You Set Up S/FTP... 1 Setting Up FTP with SSH... 2 Sending Files... 3 Address
More informationGlobal Client Access Managed Communications Solutions. JPMorgan - Global Client Access. Managed Internet Solutions (EC Gateway)
Managed Communications JPMorgan - Global Client Access Managed Internet (EC Gateway) Managed Communications Overview JPMorgan offers a variety of electronic communications services that are reliable and
More informationData Transfer Service A Migration tool to replace current X.400 messaging between NHS workflow applications
Data Transfer Service A Migration tool to replace current X.400 messaging between NHS workflow applications Submitter: Richard Corbridge Sponsorship: Gwyn Thomas 1. Introduction 1.1 This paper proposes
More informationFile transfer clients manual File Delivery Services
File transfer clients manual File Delivery Services Publisher Post CH Ltd Information Technology Webergutstrasse 12 CH-3030 Berne (Zollikofen) Contact Post CH Ltd Information Technology Webergutstrasse
More informationExperian Secure Transport Service
Experian Secure Transport Service Secure Transport Overview In an effort to provide higher levels of data protection and standardize our file transfer processes, Experian will be utilizing the Secure Transport
More informationShipping Services Files (SSF) Secure File Transmission Account Setup
Company This template is provided to document all of the materials and information needed for configuring secure file transmission for Shipping Services Files. Version 1.3 Page 1 of 5 1. Enter Date Submitted:
More informationCorporate Access File Transfer Service Description Version 1.0 01/05/2015
Corporate Access File Transfer Service Description Version 1.0 01/05/2015 This document describes the characteristics and usage of the Corporate Access File Transfer service, which is for transferring
More informationUnifying Information Security. Implementing TLS on the CLEARSWIFT SECURE Email Gateway
Unifying Information Security Implementing TLS on the CLEARSWIFT SECURE Email Gateway Contents 1 Introduction... 3 2 Understanding TLS... 4 3 Clearswift s Application of TLS... 5 3.1 Opportunistic TLS...
More informationSetting Up an AS4 System
INT0697_150625 Setting up an AS4 system V1r0 1 Setting Up an AS4 System 2 Version 1r0 ENTSOG AISBL; Av. de Cortenbergh 100, 1000-Brussels; Tel: +32 2 894 5100; Fax: +32 2 894 5101; info@entsog.eu, www.entsog.eu,
More informationFile Transfer. User Guide For Clients and Vendors. Last Revised: October 21 2014
File Transfer User Guide For Clients and Vendors Table of Contents File Transfer User Guide for Clients & Vendors... 3 Section 1: Overview... 3 Confidentiality... 3 Contact Information & Technical Support...
More informationSTERLING SECURE PROXY. Raj Kumar Integration Management, Inc. Raj.Kumar@integrationmgmt.com
STERLING SECURE PROXY Raj Kumar Integration Management, Inc. Raj.Kumar@integrationmgmt.com Agenda Terminology Proxy Definition Sterling Secure Proxy Overview Architecture Components Architecture Diagram
More informationCASHNet Secure File Transfer Instructions
CASHNet Secure File Transfer Instructions Copyright 2009, 2010 Higher One Payments, Inc. CASHNet, CASHNet Business Office, CASHNet Commerce Center, CASHNet SMARTPAY and all related logos and designs are
More informationDevice Log Export ENGLISH
Figure 14: Topic Selection Page Device Log Export This option allows you to export device logs in three ways: by E-Mail, FTP, or HTTP. Each method is described in the following sections. NOTE: If the E-Mail,
More informationWS_FTP Professional 12. Security Guide
WS_FTP Professional 12 Security Guide Contents CHAPTER 1 Secure File Transfer Selecting a Secure Transfer Method... 1 About SSL... 2 About SSH... 2 About OpenPGP... 2 Using FIPS 140-2 Validated Cryptography...
More informationIBM Campaign Version-independent Integration with IBM Engage Version 1 Release 3 April 8, 2016. Integration Guide IBM
IBM Campaign Version-independent Integration with IBM Engage Version 1 Release 3 April 8, 2016 Integration Guide IBM Note Before using this information and the product it supports, read the information
More informationICE Futures Europe. AFTS Technical Guide for Large Position Reporting V1.0
ICE Futures Europe AFTS Technical Guide for Large Position Reporting V1.0 ICE FUTURES EUROPE Page 1 of 7 Contents 1. Introduction... 3 2. Online access to Clearing Systems... 4 3. Uploading Data... 5 4.
More informationState of Nevada Department of Health and Human Services (DHHS) Division of Health Care Financing and Policy (DHCFP)
Hewlett Packard Enterprise for HIPAA Compliant Electronic Transactions Nevada Medicaid Management Information System (NV MMIS) State of Nevada Department of Health and Human Services (DHHS) Division of
More informationFTP Use. Internal NPS FTP site instructions using Internet Explorer:
FTP Use File Transfer Protocol (FTP), a standard Internet protocol, is the simplest way to exchange files between computers on the Internet. Like the Hypertext Transfer Protocol (HTTP), which transfers
More informationSecure File Transfer Protocol User Guide. Date Created: November 10, 2009 Date Updated: April 14, 2014 Version: 1.7
Secure File Transfer Protocol User Guide Date Created: November 10, 2009 Date Updated: April 14, 2014 Version: 1.7 Secure File Transfer Protocol User Guide Table of Contents 1 Overview... 1 1.1 Purpose
More informationSafe Financials Limited. The CREST Simulator. File Transfer Overview and SFL Gateway
Safe Financials Limited Ascension House 2 nd Floor First Avenue Burton on Trent DE14 2WW Tel : 01283 500255 Web : www.safefinancials.co.uk Email : enquiries@safefinancials.co.uk The CREST Simulator File
More informationASX SFTP External User Guide
ASX SFTP External User Guide Table of Contents 1. SOLUTION OVERVIEW... 3 1.1. BUSINESS CONTINUITY SOLUTION... 3 1.2. USER MANUAL AUDIENCE... 3 2. REQUESTING SFTP ACCESS... 4 2.1. SFTP ACCOUNTS... 4 2.2.
More informationThe following multiple-choice post-course assessment will evaluate your knowledge of the skills and concepts taught in Internet Business Associate.
Course Assessment Answers-1 Course Assessment The following multiple-choice post-course assessment will evaluate your knowledge of the skills and concepts taught in Internet Business Associate. 1. A person
More informationConfigure Backup Server for Cisco Unified Communications Manager
Configure Backup Server for Cisco Unified Communications Manager Document ID: 110309 Contents Introduction Prerequisites Requirements Components Used Conventions Configure a Backup Server for Cisco Unified
More informationSecure Data Exchange Protocols
Secure Data Exchange Protocols Comparing transport protocols to securely exchange business data within and beyond the enterprise COMPARISON GUIDE 1 OVERVIEW ABOUT THIS GUIDE Each data transport protocol
More informationOnline Banking for Business Secure FTP with SSL (Secure Socket Layer) USER GUIDE
Online Banking for Business Secure FTP with SSL (Secure Socket Layer) USER GUIDE Contents Secure FTP Setup... 1 Introduction...1 Secure FTP Setup Diagram...1 Before You Set Up S/FTP...2 Setting Up S/FTP...2
More informationAS2 or FTP: What s Best for Your Company. John Radko, Chief Technology Strategist, GXS Rochelle Cohen, Sr. Product Marketing Manager, GXS
AS2 or : What s Best for Your Company John Radko, Chief Technology Strategist, GXS Rochelle Cohen, Sr. Product Marketing Manager, GXS Family Feud: AS2 Versus the Clan Selecting the Right Option for Your
More informationGXS Trading Grid Messaging Service. Connectivity Overview. A GXS Transact SM Messaging Service for the Active Business
GXS Trading Grid Messaging Service A GXS Transact SM Messaging Service for the Active Business Table of Contents Introduction... 3 Trading Grid Messaging Service Connectivity Options Matrix... 4 AS2...
More informationBlackBerry Enterprise Service 10. Version: 10.2. Configuration Guide
BlackBerry Enterprise Service 10 Version: 10.2 Configuration Guide Published: 2015-02-27 SWD-20150227164548686 Contents 1 Introduction...7 About this guide...8 What is BlackBerry Enterprise Service 10?...9
More informationQuick Start Guide. Cerberus FTP is distributed in Canada through C&C Software. Visit us today at www.ccsoftware.ca!
Quick Start Guide Cerberus FTP is distributed in Canada through C&C Software. Visit us today at www.ccsoftware.ca! How to Setup a File Server with Cerberus FTP Server FTP and SSH SFTP are application protocols
More informationObtaining a user account and password: To obtain a user account, please submit the following information to AJRR staff:
AJRR Secure FTP Site Usage www.ajrr-registry.net port 22 Contacts: Randolph Meinzer meinzer@ajrr.net Steve Hamada hamada@ajrr.net 6300 North River Road Rosemont, IL 60018 p: 847-292-0530 f: 847-292-0531
More informationfreesshd SFTP Server on Windows
freesshd SFTP Server on Windows Configuration Steps: Setting up the Bridgestone User ID... 2 Setup the freesshd Server... 3 Login as the Bridgestone User ID using WinSCP... 5 Create Default Bridgestone
More informationCanada Savings Bonds Program. FTP Server User Guide. Version 2.5
Canada Savings Bonds Program FTP Server User Guide Version 2.5 September 1, 2015 FTPS Server User Guide FTPS Server User Guide Revision History Use the following table to track the revision history for
More informationNetwork Configuration Settings
Network Configuration Settings Many small businesses already have an existing firewall device for their local network when they purchase Microsoft Windows Small Business Server 2003. Often, these devices
More informationArchitecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference
Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise
More informationElectronic Data Interchange (EDI) 5010 Clearinghouse Services Guide
Electronic Data Interchange (EDI) 5010 Clearinghouse Services Guide A PUBLICATION OF THE EDI DEPARTMENT OF BLUE CROSS AND BLUE SHIELD OF LOUISIANA 18NW1935 R02/12 Blue Cross and Blue Shield of Louisiana
More informationAccess Instructions for United Stationers ECDB (ecommerce Database) 2.0
Access Instructions for United Stationers ECDB (ecommerce Database) 2.0 Table of Contents General Information... 3 Overview... 3 General Information... 3 SFTP Clients... 3 Support... 3 WinSCP... 4 Overview...
More informationSetup Guide Access Manager 3.2 SP3
Setup Guide Access Manager 3.2 SP3 August 2014 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE
More informationAccessing the FTP Server - User Manual
CENTRAL BANK OF CYPRUS Accessing the FTP Server - User Manual IT Department, CENTRAL BANK OF CYPRUS TABLE OF CONTENTS 1 EXECUTIVE SUMMARY... 1 1.1 AUDIENCE... 1 1.2 SCOPE... 1 2 CHANGES FROM THE OLD FTP
More informationSecure Data Transfer
Secure Data Transfer INSTRUCTIONS 3 Options to SECURELY TRANSMIT DATA 1. FTP 2. WinZip 3. Password Protection Version 2.0 Page 1 Table of Contents Acronyms & Abbreviations...1 Option 1: File Transfer Protocol
More informationCloud Control Panel (CCP) Installation Guide
Cloud Control Panel (CCP) Installation Guide Version 3.2.0: 17.05.12 Copyright 2012 DNS Europe Ltd. All rights reserved. Cloud Control Panel (CCP) Installation Guide v3.2.0 Table of Contents Table of Contents
More informationIBM Campaign and IBM Silverpop Engage Version 1 Release 2 August 31, 2015. Integration Guide IBM
IBM Campaign and IBM Silverpop Engage Version 1 Release 2 August 31, 2015 Integration Guide IBM Note Before using this information and the product it supports, read the information in Notices on page 93.
More informationIndiana Health Coverage Programs. Communications Guide
Indiana Health Coverage Programs Communications Guide Companion Guide Version Number: 2.1 Library Reference Number: CLEL10010 Revision Date: December 2013 Contents Contents... iii Introduction... 4 Connectivity
More informationFile Transfer And Access (FTP, TFTP, NFS) Chapter 25 By: Sang Oh Spencer Kam Atsuya Takagi
File Transfer And Access (FTP, TFTP, NFS) Chapter 25 By: Sang Oh Spencer Kam Atsuya Takagi History of FTP The first proposed file transfer mechanisms were developed for implementation on hosts at M.I.T.
More informationSECTION 1: INTRODUCTION
3117 NETWORK ARCHITECTURE STANDARD OWNER: Security Management Branch ISSUE DATE: 10/25/2011 DISTRIBUTION: All Employees REVISED DATE: 7/1/2013 SECTION 1: INTRODUCTION The California Department of Technology
More informationBackup & Restore Guide
The email Integrity Company Sendio Email Security Platform Appliance Backup & Restore Guide Sendio, Inc. 4911 Birch St. Suite 150 Newport Beach, CA 92660 USA +1.949.274.4375 www.sendio.com 2010 Sendio,
More informationClearswift Information Governance
Clearswift Information Governance Implementing the CLEARSWIFT SECURE Encryption Portal on the CLEARSWIFT SECURE Email Gateway Version 1.10 02/09/13 Contents 1 Introduction... 3 2 How it Works... 4 3 Configuration
More informationAS2 Disaster Recovery Implementation Guide Issue 1, Approved, 18-Nov-2010
AS2 Disaster Recovery Implementation Guide Issue 1, Approved, 18-Nov-2010 18-Nov-2010, Issue 1 All contents copyright GS1 Page 1 of 19 Document Summary Document Item Document Title Date Last Modified Current
More informationUser's Guide. Product Version: 2.5.0 Publication Date: 7/25/2011
User's Guide Product Version: 2.5.0 Publication Date: 7/25/2011 Copyright 2009-2011, LINOMA SOFTWARE LINOMA SOFTWARE is a division of LINOMA GROUP, Inc. Contents GoAnywhere Services Welcome 6 Getting Started
More informationNetwork-Enabled Devices, AOS v.5.x.x. Content and Purpose of This Guide...1 User Management...2 Types of user accounts2
Contents Introduction--1 Content and Purpose of This Guide...........................1 User Management.........................................2 Types of user accounts2 Security--3 Security Features.........................................3
More informationIn-Network Translation User s Guide
GXS EDI Services In-Network Translation User s Guide GC34-3282-02 Third Edition (November 2005) This book replaces GC34-3282-01. Copyright GXS, Inc. 1998, 2005. All rights reserved. Government Users Restricted
More informationSecure, Reliable Messaging Comparisons between PHINMS, SFTP, and SSH. Public Health Information Network Messaging System (PHINMS)
Secure, Reliable Messaging Comparisons between PHINMS, SFTP, and SSH Public Health Information Network Messaging System (PHINMS) Version: 1.0 Prepared by: U.S. Department of Health & Human Services Date:
More informationNew GoAnywhere File Transfer Set Up Tasks
New GoAnywhere File Transfer Set Up Tasks 1 Task Name Comments Assigned To Duration NEW GO ANYWHERE FILE TRANSFER SETUP TASKS 2 STANDARDS 3 4 PCSSC will be encrypting all files whether they contain PII
More informationSecure FTP. Client user guide. Author: Steria A/S Version: 2.2 Date: 20 January 2010 Document SecureFtpClientUserguideV2_2.doc
Secure FTP Client user guide Author: Steria A/S Version: 2.2 Date: 20 January 2010 Document SecureFtpClientUserguideV2_2.doc Steria A/S, Tonsbakken 16-18, 2740 Skovlunde, Denmark Phone +45 4450 6000, Fax
More informationFile Transmission Methods Monday, July 14, 2014
Slide 1 - of 27 Version 4.4, 7/14/14 CMS reserves the right to modify this presentation. To ensure you have the most current version, verify that the version and date on this page match the version and
More informationConfiguration Guide BES12. Version 12.1
Configuration Guide BES12 Version 12.1 Published: 2015-04-22 SWD-20150422113638568 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12... 8 Product documentation...
More informationData Exchange Preparation Procedures_006. Document Control Number - 1609
_006 Document Control Number - 1609 January 20, 2010 Copyright Notices Connect:Direct is a trademark of Sterling Commerce, a subsidiary of SBC Communications, Inc. All rights reserved. Gentran:Server rights
More informationConfiguration Guide. BlackBerry Enterprise Service 12. Version 12.0
Configuration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2014-12-19 SWD-20141219132902639 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12...
More informationUsing Avaya Aura Messaging
Using Avaya Aura Messaging Release 6.3.2 Issue 1 December 2014 Contents Chapter 1: Getting Started... 4 Messaging overview... 4 Prerequisites... 4 Accessing your mailbox from any phone... 4 Accessing the
More informationStealth OpenVPN and SSH Tunneling Over HTTPS
Stealth OpenVPN and SSH Tunneling Over HTTPS Contents Tunneling OpenVPN and SSH via HTTPS for Windows,MAC and Linux... 1 Benefits of HTTPS Tunneling:... 2 Pre-Requisites:... 3 Part A: Step by Step Instructions
More informationGS1 Newcomers to AS2. Implementation Guide. Issue 1, 23-June-2008. GS1 Newcomers to AS2 Implementation Guide
GS1 Newcomers to AS2 Implementation Guide Issue 1, 23-June-2008 23-June-2008, Issue 1 All contents copyright GS1 2008 Page 1 of 14 Document Summary Document Item Document Title Date Last Modified Current
More informationUsing www.bcidaho.net
Using www.bcidaho.net Blue Cross supports a wide variety of clients and protocols for uploading and downloading files from our servers, including web-based tools, traditional clients and batch processing.
More informationCustomer information on the replacement of LUA/CDIF access technology. Last revised: Mar. 17, 2015
access technology 1. GENERAL At the moment, your EDI application (e.g., your EDI converter) uses our interactive interface, Local User Agent (LUA) or the CDIF protocol embedded in it (for a proprietary
More information/ Preparing to Manage a VMware Environment Page 1
Configuring Security for a Managed VMWare Enviroment in VMM Preparing to Manage a VMware Environment... 2 Decide Whether to Manage Your VMware Environment in Secure Mode... 2 Create a Dedicated Account
More informationSonian Getting Started Guide October 2008
Sonian Getting Started Guide October 2008 Sonian, Inc. For Authorized Use Only 1 Create your new archiving account 3 Configure your firewall for IMAP collections 4 (Skip this step if you will be using
More informationSECURE YOUR DATA EXCHANGE WITH SAFE-T BOX
SECURE YOUR DATA EXCHANGE SAFE-T BOX WHITE PAPER Safe-T. Smart Security Made Simple. 1 The Costs of Uncontrolled Data Exchange 2 Safe-T Box Secure Data Exchange Platform 2.1 Business Applications and Data
More informationHOW TO RETRIEVE FILES FROM THE TARGET ANALYTICS FTP SITE
HOW TO RETRIEVE FILES FROM THE TARGET ANALYTICS FTP SITE Note: These instructions direct you to download a free secure FTP client called FileZilla. If you already use a secure client such as WS-FTP Pro
More informationShareFile Security Overview
ShareFile Security Overview ShareFile Company Policy All ShareFile employees undergo full background checks and sign our information security policy prior to beginning employment with the company. The
More informationMOVEIT CENTRAL: MANAGED FILE TRANSFER WORKFLOW ENGINE
MOVEIT CENTRAL: MANAGED FILE TRANSFER WORKFLOW ENGINE ABSTRACT Data workflows are truly the lifeblood of organizations today, yet the infrastructure supporting these workflows are typically less than ideal.
More informationQuickstream Connectivity Options
A division of Westpac Banking Corporation ABN 33 007 457 141 Quickstream Connectivity Options Document History Date 25-Jun-2003 1-Jul-2003 3-July-2003 18-July-2003 18-Aug-2003 8-Sep-2003 19-Sep-2003 31-Oct-2003
More informationExam Questions SY0-401
Exam Questions SY0-401 CompTIA Security+ Certification http://www.2passeasy.com/dumps/sy0-401/ 1. A company has implemented PPTP as a VPN solution. Which of the following ports would need to be opened
More informationEffective Data Inc. White Paper: EDIINT EDI Over the Internet
Effective Data Inc. White Paper: EDIINT EDI Over the Internet 1515 E. Woodfield Road Suite 770 Schaumburg, IL 60173 Ph (847) 969-9300 Fx (847) 969-9350 www.effective-data.com TABLE OF CONTENTS Executive
More informationInterwise Connect. Working with Reverse Proxy Version 7.x
Working with Reverse Proxy Version 7.x Table of Contents BACKGROUND...3 Single Sign On (SSO)... 3 Interwise Connect... 3 INTERWISE CONNECT WORKING WITH REVERSE PROXY...4 Architecture... 4 Interwise Web
More informationLinux VPS with cpanel. Getting Started Guide
Linux VPS with cpanel Getting Started Guide First Edition October 2010 Table of Contents Introduction...1 cpanel Documentation...1 Accessing your Server...2 cpanel Users...2 WHM Interface...3 cpanel Interface...3
More informationLinux MDS Firewall Supplement
Linux MDS Firewall Supplement Table of Contents Introduction... 1 Two Options for Building a Firewall... 2 Overview of the iptables Command-Line Utility... 2 Overview of the set_fwlevel Command... 2 File
More informationVersion 1.0 January 2011. Xerox Phaser 3635MFP Extensible Interface Platform
Version 1.0 January 2011 Xerox Phaser 3635MFP 2011 Xerox Corporation. XEROX and XEROX and Design are trademarks of Xerox Corporation in the United States and/or other countries. Changes are periodically
More informationSFTP (Secure Shell FTP using SSH2 protocol)
SFTP (Secure Shell FTP using SSH2 protocol) Technical Manual March 2014 1. Contents 1. 1. Table of contents 2. Introduction... 3 3. Criteria for SFTP... 5 4. Preparations for connecting to SFTP... 7 5.
More informationConfiguration Guide BES12. Version 12.2
Configuration Guide BES12 Version 12.2 Published: 2015-07-07 SWD-20150630131852557 Contents About this guide... 8 Getting started... 9 Administrator permissions you need to configure BES12... 9 Obtaining
More informationQuick Reference Guide. Online Courier: FTP. Signing On. Using FTP Pickup. To Access Online Courier. https://onlinecourier.suntrust.
Quick Reference Guide Online Courier: FTP https://onlinecourier.suntrust.com With SunTrust Online Courier, you can have reports and files delivered to you using an FTP connection. There are two delivery
More informationAloaha Mail and Archive
Aloaha Mail and Archive Aloaha Mail and Archive is an email archiving solution that can archive inbound-, internal and outbound emails directly and transparently into a central mailstore. Additionally
More information9236245 Issue 2EN. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation
9236245 Issue 2EN Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation Nokia 9300 Configuring connection settings Legal Notice Copyright Nokia 2005. All rights reserved. Reproduction,
More informationFDS manual File Delivery Services SFTP and FTP file transfer
FDS manual File Delivery Services SFTP and FTP file transfer Publisher Post CH Ltd Information Technology Webergutstrasse 12 CH-3030 Berne (Zollikofen) Contact Post CH Ltd Information Technology Webergutstrasse
More informationSecure File Transfer Protocol User Guide
Ministry of Health Secure File Transfer Protocol User Guide Date Created: November 10, 2009 Date Updated: November 12, 2013 Next Update: Version: 1.6 Approvals Signature Date Director, DA&IM Signature
More informationSecuring Ship-to-Shore Data Flow
Securing Ship-to-Shore Data Flow Background on Common File Transfer Methods Today corporations, government entities, and other organizations rely on Electronic File Transfers as an important part of their
More informationCONNECTING TO DEPARTMENT OF COMPUTER SCIENCE SERVERS BOTH FROM ON AND OFF CAMPUS USING TUNNELING, PuTTY, AND VNC Client Utilities
CONNECTING TO DEPARTMENT OF COMPUTER SCIENCE SERVERS BOTH FROM ON AND OFF CAMPUS USING TUNNELING, PuTTY, AND VNC Client Utilities DNS name: turing.cs.montclair.edu -This server is the Departmental Server
More informationIBM Unica emessage Version 8 Release 6 February 13, 2015. Startup and Administrator's Guide
IBM Unica emessage Version 8 Release 6 February 13, 2015 Startup and Administrator's Guide Note Before using this information and the product it supports, read the information in Notices on page 83. This
More informationDMZ Gateways: Secret Weapons for Data Security
A L I N O M A S O F T W A R E W H I T E P A P E R DMZ Gateways: Secret Weapons for Data Security A L I N O M A S O F T W A R E W H I T E P A P E R DMZ Gateways: Secret Weapons for Data Security EXECUTIVE
More informationInstallation and configuration guide
Installation and Configuration Guide Installation and configuration guide Adding X-Forwarded-For support to Forward and Reverse Proxy TMG Servers Published: May 2010 Applies to: Winfrasoft X-Forwarded-For
More informationGlobalSCAPE DMZ Gateway, v1. User Guide
GlobalSCAPE DMZ Gateway, v1 User Guide GlobalSCAPE, Inc. (GSB) Address: 4500 Lockhill-Selma Road, Suite 150 San Antonio, TX (USA) 78249 Sales: (210) 308-8267 Sales (Toll Free): (800) 290-5054 Technical
More informationHow Managed File Transfer Addresses HIPAA Requirements for ephi
How Managed File Transfer Addresses HIPAA Requirements for ephi 1 A White Paper by Linoma Software INTRODUCTION As the healthcare industry transitions from primarily using paper documents and patient charts
More informationNovell Access Manager
J2EE Agent Guide AUTHORIZED DOCUMENTATION Novell Access Manager 3.1 SP3 February 02, 2011 www.novell.com Novell Access Manager 3.1 SP3 J2EE Agent Guide Legal Notices Novell, Inc., makes no representations
More informationUser Guide. WS_FTP Server
WS_FTP Server Contents CHAPTER 1 WS_FTP Server Overview What is WS_FTP Server?... 1 System requirements for WS_FTP Server... 2 WS_FTP Server... 2 Ipswitch Notification Server... 3 WS_FTP Server Manager...
More information