Office of Court Administration Automated Registry (AR) Interface Design Document for DSHS - Clinical Management for Behavioral Health Services (CMBHS)

Size: px
Start display at page:

Download "Office of Court Administration Automated Registry (AR) Interface Design Document for DSHS - Clinical Management for Behavioral Health Services (CMBHS)"

Transcription

1 Office of Court Administration Automated Registry (AR) Interface Design Document for DSHS - Clinical Management for Behavioral Health Services (CMBHS) August 04, 2009 Interface Design Document for CMBHS 1 of 27

2 Contents 1. Revision History 4 2. Introduction Purpose Assumptions and Constraints Requirements Implementation Design Static View Dynamic View Error Handling Security Network Authentication Audit Tracking Data Retention Data Design DSHS-CMBHS Transaction CMBHS Web Service Methods Error Message Formats DSHS-CMBHS Code Tables Gender Race Match Type Interface Design Document for CMBHS 2 of 27

3 5. Deployment Design Issues/Questions Glossary References CMBHS Webservice File (WSDL) Interface Design Document for CMBHS 3 of 27

4 1. Revision History Version Date Name Description /26/2008 Faizal Pakrudeen /10/2009 Jeff Corn First Draft Created with Questions based on the agency meeting 11/13/2008 Revised draft based on agency meeting (03/27/2009), provided WSDL, and correspondence on specific questions. 1 04/13/2009 Paul Falkenberg Final Edits and Formatting /13/2009 Thomas Sullivan OCA and DSHS edits /29/2009 Jeff Corn Accepted the changes/feedback from the client /30/2009 Jeff Corn Modified Section Race Code Table /04/2009 Jeff Corn Modified Section Race Code Table Interface Design Document for CMBHS 4 of 27

5 2. Introduction The Interface Design Document provides the details of the DSHS-CMBHS Interface for Automated Registry (AR) System. The AR System will interface with the DSHS-CMBHS data source to query the data from the data source mentioned below. Clinical Management for Behavioral Health Services (CMBHS): A clinical management system containing information about a consumer s mental health treatments. This information will be used for providing for the continuity of care and/or case management. The CMBHS system provides mental health information including Most Recent Date of Treatment, Current Provider, Diagnosis, Mental Health History, Alerts (future capability) and Drug Treatment. 2.1 Purpose This document lays out the interface details, including the design aspects of the adapters that connect to the DSHS-CMBHS data source, details about the needed transactions, data formats involved in various transactions between the AR System and the DSHS-CMBHS System and security design aspects of the interface. 2.2 Assumptions and Constraints The table below lists the Assumptions and Constraints made for the Interface Design for the DSHS-CMBHS Interface. Number Assumption/Constraint This document assumes the interface to CMBHS data source will meet the requirement The technical low-level design aspect of the CMBHS Webservice based Adapter will be part of the AR Software Architecture Document. 2.3 Requirements This document provides the details of the interface between the AR System and the DSHS- CMBHS data source, a requirement stated in the OCA Request for Offers for Automated Registry System (Final Offer). Number Requirement The system must interface with the following mandatory data sources: The Texas Department of State Health Services CMBHS system Interface Design Document for CMBHS 5 of 27

6 3. Implementation Design The AR System will query the CMBHS data source using a Webservice based adapter. The WS Adapter s Webservice client will invoke the query request method exposed in the WSDL. The CMBHS Webservice implementation will process the request message and return the response message to the AR system. The interface will request the individual information based on provided search criteria. The CMBHS will perform the search based on its algorithms and return the request to the AR System. The AR system will convert the query result to NIEM based XML format and display the results to the user. 3.1 Static View The Static View demonstrates the various components involved in the DSHS-CMBHS Interface. Microsoft Biztalk Server AR Security Active Directory Certificate Authority Authorized Personnel Token MSAD Two Factor Authentication AR Query Portal Microsoft IIS ASP.NET AR Integration Broker Microsoft BizTalk Server 2006R2.NET 2.0 AR MetaStore Database BizTalk MessageBox Microsoft SQL Server 2005 WS Client CMBHS Adapter WSDL CMBHS Webservices DSHS- CMBHS System TXOCA-Automated Registry The AR System user will be authenticated using a two-factor authentication mechanism. Using a token-based authentication, the AR System user will be directed to the AR Login page. In the AR Query Portal, the user will be authenticated based on an active directory user ID and Password and the user can issue an Identifier-based query for the allowed query types for that user. The CMBHS adapter s Webservice client will invoke the methods exposed in the WSDL. The CMBHS Webservice implementation will in turn query the CMBHS Oracle database and return the results. The AR System will compile the results and display the Query Responses to the AR System User in a well defined format. Interface Design Document for CMBHS 6 of 27

7 3.2 Dynamic View The AR Query System will interface to the DSHS-CMBHS data source through the CMBHS Adapter. This adapter is a webservice based adapter. This distributed query data flow between the AR and DSHS-CMBHS is explained below. The following diagram shows the distributed query flow between AR System and the CMBHS System. Authorized User Web Browser 1 OCA - AR Hub DSHS-CMBHS AR Query Portal 2 Send Port Request Metadata AR BizTalk Server CMBHS Adapter DSHS- CMBHS 4 4 AR Metastore Database AR SQL Server 6 Receive Port 5 AR Security Active Directory, CA, SSL Query Result Step 1: When a user attempts to access the AR Query Portal, a logon page welcomes the user and presents them with a form to enter their user name and password. The system validates the user s credentials against the central active directory and caches the user authorization privileges. This information is used throughout the session to define what this user is allowed to do or what data they are allowed to see. The user s role defined in the Active Directory will specify which systems he or she can query and what data they can see. The user enters the query criteria and submits the query. Step 2: The AR Query Portal collects the person query search criteria. Step 3: The CMBHS Adapter s webservice client will call the method exposed in WSDL and will pass search parameters entered by the user Step 4: The CMBHS Webservices will process the request and return the result to the receive port of the WS adapter. Step 5: The CMBHS adapter will get the results and convert the results to a common format. Step 6: The CMBHS Adapter writes the response message to the AR meta-store database. Interface Design Document for CMBHS 7 of 27

8 Step 7: The AR Query Portal s Web application displays the aggregated query results to the user. Step 8: The AR System updates the AR Meta-Store Database s SQL Server table with the Audit data related to the Query. 3.3 Error Handling The AR System will have an Error Handling Mechanism that handles the Error Messages from the DSHS-CMBHS System. If the AR System receives an Error Message as response to a Query Request, the AR System will clean up the entire transaction that is associated with that Query. The CMBHS Webservices will respond with the SOAP Exceptions for the following cases: Soap Header Authentication failures service account (User ID/Password) incorrect, etc. Web Method Parameters failures If the parameters passed to the method are not valid, a data rejected error message will be send by the CMBHS Web service. CMBHS Application Errors If any application errors behind the CMBHS Webservices occur (like DB connection failures, timeouts, etc), then an appropriate error message will be sent by the CMBHS Webservice. Finally, if the CMBHS Webservice is unable to find a record matching the query criteria then the CMBHS System will send a response indicating no record found. 3.4 Security The CMBHS can be accessed through an existing SOAP WS-I Basic Profile. The AR system will be provided a single service account (user name and password) for all Webservice calls to the CMBHS system. This service account will passed in SOAP header of every webservice call. The AR system will access the CMBHS Webservices using an HTTPS connection Network The DSHS-CMBHS System will be accessible from Texas OCA AR System using a public HTTPS connection. (The Server Name and URL details will be updated later.) System Server Name URL Authentication The AR System will send a single Service Account (user-id and password) as part of the SOAP header. Interface Design Document for CMBHS 8 of 27

9 3.4.3 Audit Tracking The AR System will keep the Audit data related to a query transaction between the AR System and the DSHS-CMBHS System. The audit records will cover the information mentioned in the table below. Data Element User ID Reason Date/Time Stamp of send Date/Time Stamp of received Query String Data Sources Queried Query Type Transaction Transaction Description The User ID who sent the Query The Reason for the Query The Date/Time Stamp of the Query Request The Date/Time Stamp of the Query Response This field will contain the Query Criteria used for a specific query. The name of the data source The AR System Query Type used for the transaction. The AR System will maintain the Audit Trail for each transaction. Audit records will be kept for a minimum of one year. Finally, the AR System will send the AR User ID (Active Directory User ID) along with the search criteria to the CMBHS Webservice calls, supporting CMBHS audit trails for users performing queries Data Retention The AR System will retain the Query Results data while the User Session is active. This information is stored temporarily and discarded once the user ends the session or the session times out. Interface Design Document for CMBHS 9 of 27

10 4. Data Design 4.1 DSHS-CMBHS Transaction This section covers the CMBHS Inquiry message formats and its response formats. The AR System will access DSHS-CMBHS information through a name based query to obtain a pick list and then use an identifier to obtain the detailed information. The CMBHS adapter will aggregate data from the CMBHS Webservices and provide the AR System with a result set. The details of the request and response data elements are described in the subsections below CMBHS Web Service Methods The CMBHS Inquiry is used to obtain the mental health information of an individual. The AR system will collect all query criteria entered by the user and pass them as parameters to a webservice method exposed in the WSDL and invoke that method. CMBHS Webservice Methods ProcessClientMatch (TLETSQueryMessage) : TLETSQueryResponseMessage Interface Design Document for CMBHS 10 of 27

11 Web Method ProcessClientMatch Below are the request and response messages for the webservice method Web Method ProcessClientMatch (Request Message Format) The following table shows the details of the request methods exposed in the WSDL. TLETSQueryMessage Field(s) Data Type(s) Description/Edits TLETSQueryMessage Complex Version String Version Information. Example: <?xml version=\"1.0\" encoding=\"utf- 8\"?> <TLETSQueryMessage xmlns:xsi=\" Schema-instance\" xmlns:xsd=\" LSchema\" xmlns=\" hs/\"> Initiator String Constant value = OCA Destination String Constant value = DSHS ControlField String Not used. Leave blank UserID String AR User ID performing the query Alphanumeric; Max Length = 255 QueryID String AR Query ID (GUID) associated with the query Alphanumeric; Max Length = 255 QueryTime DateTime The date and time the query is sent. Format: CCYY-MM-DDTHH:MI:SS Interface Design Document for CMBHS 11 of 27

12 Example: T09:02:30 Note: The Hours is 1-24 hour scale. FacilityName String AR system is not using. Leave Blank FacilityStreetAddress String AR system is not using. Leave Blank FacilityCity String AR system is not using. Leave Blank FacilityZip String AR system is not using. Leave Blank FacilityCountyCode String AR system is not using. Leave Blank FacilityContactPersonName String AR system is not using. Leave Blank String AR system is not using. Leave Blank FacilityContactPhoneNumber FirstName String First Name of the Individual Alphanumeric; Max Length = 50 LastName String Last Name of the Individual Alphanumeric; Max Length = 50 SSN String Social Security Number Num(9) - Numeric values only converted to a string data type. Example: DateofBirth DateTime Date of Birth Format: CCYY-MM-DDTHH:MI:SS Example: T0000:00 Note: The time portion will be zeros. Gender String See Code Table values (Section 4.2) CMBHS value will be sent and received. Interface Design Document for CMBHS 12 of 27

13 Race String See Code Table values (Section 4.2) CMBHS value will be sent and received Web Method ProcessClientMatch (Response Message Format) The response message will be in SOAP based XML format. The response message will have a SOAP header and followed by the response data elements. TLETSQueryResponseMessage Field(s) Data Type(s) Description/Edits TLETSQueryResponseMessa ge Complex Version String Version Information. Example: <?xml version=\"1.0\" encoding=\"utf- 8\"?> <TLETSQueryResponseMessage xmlns:xsi=\" Schema-instance\" xmlns:xsd=\" LSchema\" xmlns=\" hs/\"> Initiator String Constant value = OCA Destination String Constant value = DSHS ControlField String Not used. Leave blank UserID String AR User ID performing the query Alphanumeric; Max Length = 255 QueryID String AR Query ID (GUID) associated with the query Alphanumeric; Max Length = 255 QueryTime DateTime The date and time the query is sent. Interface Design Document for CMBHS 13 of 27

14 Format: CCYY-MM-DDTHH:MI:SS Example: T09:02:30 Note: The Hours is 1-24 hour scale. FacilityName String AR system is not using. Leave Blank FacilityStreetAddress String AR system is not using. Leave Blank FacilityCity String AR system is not using. Leave Blank FacilityZip String AR system is not using. Leave Blank FacilityCountyCode String AR system is not using. Leave Blank FacilityContactPersonName String AR system is not using. Leave Blank String AR system is not using. Leave Blank FacilityContactPhoneNumber FirstName String First Name of the Individual Alphanumeric; Max Length = 50 LastName String Last Name of the Individual Alphanumeric; Max Length = 50 SSN String Social Security Number Num(9) - Numeric values only converted to a string data type. Example: DateofBirth DateTime Date of Birth Format: CCYY-MM-DDTHH:MI:SS Example: T0000:00 Note: The time portion will be zeros. Interface Design Document for CMBHS 14 of 27

15 Gender String See Code Table values (Section 4.2) Race String See Code Table values (Section 4.2) ErrorMessage String If any errors occur on the CMBHS WebService, the error messages will be sent back in this field. Alphanumeric; Max Length = 255 BusyMessage String CMBHS is not using this field. TLETSResponse ArrayOfPerson See below complex XML Element ArrayOfPerson Complex CMBHSID Int CMBHS Unique ID for Person Record AR System is not using. MatchType String See Code Table values (Section 4.2) CMBHS value will be sent and received. LastName String Last Name of the Individual Alphanumeric; Max Length = 50 FirstName String First Name of the Individual Alphanumeric; Max Length = 50 MiddleName String Middle Name of the Individual Alphanumeric; Max Length = 50 SSN String Social Security Number Format: Num(9) - Numeric values only converted to a string data type Example: DateofBirth DateTime Date of Birth Interface Design Document for CMBHS 15 of 27

16 Format: CCYY-MM-DDTHH:MI:SS Example: T0000:00 Note: The time portion will be zeros. Gender String See Code Table values (Section 4.2) CMBHS value will be sent and received. Race String See Code Table values (Section 4.2) CMBHS value will be sent and received. County String County of the individual Alphanumeric; Max Length = 50 FacilityName String The Facility where the Individual is/was located. Alphanumeric; Max Length = 80 PhoneNumber String Phone Number Numeric; Max Length = 10 CaseID String The Case Number associated with the Individual. Alphanumeric; Max Length = 20 Interface Design Document for CMBHS 16 of 27

17 4.1.2 Error Message Formats The Error Message formats that will be used to handle the various Exceptions during the transactions are mentioned below. The errors will be sent back to the AR System in the returned XML (TLETSQueryResponse ErrorMessage field) Error Message Formats (Response Error Messages) Some example error messages are in the table below. Response Fields ErrorMessage ErrorMessage ErrorMessage Description/Edits User not authenticated or not successfully loaded from DB Authentication header needs to be provided for authorization Gender in the request has to be 'male' or 'female'. Interface Design Document for CMBHS 17 of 27

18 4.2 DSHS-CMBHS Code Tables This section covers the CMBHS Code Table values used in the request and/or response message exchanges. The tables below contain the CMBHS values and Descriptions. Any message exchanges requiring these code values between AR & CMBHS will be translate the system specific values as required. Note: The AR & CMBHS Code Table value translations will be defined in the Use Case as some code tables may be used across multiple interfaces. This document will only define the CMBHS values. The details of the request and response data elements are described in the subsections below Gender The Gender code table has different types of individual genders supported by the CMBHS System. Please see the Use Case for system to system value translations. CMBHS Value male female Description Male Female Race The Race code table has different ethnic types listed and supported by the CMBHS System. Please see the Use Case for system to system value translations. CMBHS Value American Indian or Alaskan Native Asian Black or African American Native Hawaiian or Pacific Islander White Unknown Description American Indian or Alaskan Native Asian Black or African American Native Hawaiian or Pacific Islander White Unknown Match Type The Match Type code table will have values that indicate whether the individual search found the person or not. These matches will vary depending on the search criteria. Please see the Use Case for system to system value translations. CMBHS Value E P Description An Exact match was found. *** See Match Rules below. A Probable match was found. Interface Design Document for CMBHS 18 of 27

19 *** See Match Rules below. Interface Design Document for CMBHS 19 of 27

20 Match Rule Definition(s) Logic performed by CMBHS WebService Exact Match Data Inquiry matches the following combination: o Combination # 1 Last Name First Name Date of Birth Gender Social Security Number Race Probable Match Data Inquiry matches on one of the following combinations: o Combination # 1 Last Name First Name Initial Date of Birth Gender o Combination # 2 Last Name First Name Initial Date of Birth Year only (will extract from input DOB) Gender Social Security Number o Combination # 3 Last Name First 3 letters First Name Initial Date of Birth Year & Month only (will extract from input DOB) Gender Social Security Number o Combination # 4 Last Name (Note: Matches to any others found) First Name Initial (Note: Matches to any other found) Date of Birth (Note: current Age calculation is within 5 years) Gender Social Security Number (Note: Matches to any others found) Note: AR System will always pass the entire DOB, not partials. The CMBHS Service will extract Year, Month, etc as required to perform the search as outlined in logic above. Interface Design Document for CMBHS 20 of 27

21 5. Deployment Design The OCA will host the AR System in various environments and communicate with the DSHS-CMBHS over public HTTPS connection. The following table will outline the various environments. Environment AR (IP Address / Port) CMBHS System (URL / Port) Integration System Test Pilot User Acceptance Production 6. Issues/Questions # Issue/Question Status Interface Design Document for CMBHS 21 of 27

22 7. Glossary Term AR System CMBHS OCA DSHS SOAP WS WSDL Definition Automated Registry System Clinical Management for Behavioral Health Services Office of Courts Administration Department of State Health Services Simple Object Access Protocol Webservice Webservice Definition Language Interface Design Document for CMBHS 22 of 27

23 8. References This section provides a complete list of all documents referenced elsewhere in the Interface Design Document. No. Reference Title Version [1] OCA Request for Offers for Automated Registry System (Final Offer). [2] WDSL provide by CMBHS agency (see below) Interface Design Document for CMBHS 23 of 27

24 8.1 CMBHS Webservice File (WSDL) <?xml version="1.0" encoding="utf-8"?> - <wsdl:definitions xmlns:soap=" xmlns:tm=" xmlns:soapenc=" xmlns:mime=" xmlns:tns=" xmlns:s=" xmlns:soap12=" xmlns:http=" targetnamespace=" xmlns:wsdl=" - <wsdl:types> - <s:schema elementformdefault="qualified" targetnamespace=" - <s:element name="processclientmatch"> - <s:complextype> - <s:sequence> <s:element minoccurs="0" maxoccurs="1" name="tletsquerymessagerequest" type="tns:tletsquerymessage" /> </s:sequence> </s:complextype> </s:element> - <s:complextype name="tletsquerymessage"> - <s:sequence> <s:element minoccurs="0" maxoccurs="1" name="version" type="s:string" /> <s:element minoccurs="0" maxoccurs="1" name="initiator" type="s:string" /> <s:element minoccurs="0" maxoccurs="1" name="destination" type="s:string" /> <s:element minoccurs="0" maxoccurs="1" name="controlfield" type="s:string" /> <s:element minoccurs="0" maxoccurs="1" name="userid" type="s:string" /> <s:element minoccurs="0" maxoccurs="1" name="queryid" type="s:string" /> <s:element minoccurs="1" maxoccurs="1" name="querytime" type="s:datetime" /> <s:element minoccurs="0" maxoccurs="1" name="facilityname" type="s:string" /> <s:element minoccurs="0" maxoccurs="1" name="facilitystreetaddress" type="s:string" /> <s:element minoccurs="0" maxoccurs="1" name="facilitycity" type="s:string" /> <s:element minoccurs="0" maxoccurs="1" name="facilityzip" type="s:string" /> <s:element minoccurs="0" maxoccurs="1" name="facilitycountycode" type="s:string" /> <s:element minoccurs="0" maxoccurs="1" name="facilitycontactpersonname" type="s:string" /> <s:element minoccurs="0" maxoccurs="1" name="facilitycontactphonenumber" type="s:string" /> <s:element minoccurs="0" maxoccurs="1" name="firstname" type="s:string" /> <s:element minoccurs="0" maxoccurs="1" name="lastname" type="s:string" /> <s:element minoccurs="0" maxoccurs="1" name="ssn" type="s:string" /> <s:element minoccurs="1" maxoccurs="1" name="dateofbirth" type="s:datetime" /> <s:element minoccurs="0" maxoccurs="1" name="gender" type="s:string" /> <s:element minoccurs="0" maxoccurs="1" name="race" type="s:string" /> </s:sequence> </s:complextype> - <s:element name="processclientmatchresponse"> - <s:complextype> - <s:sequence> <s:element minoccurs="0" maxoccurs="1" name="processclientmatchresult" type="tns:tletsqueryresponsemessage" /> </s:sequence> </s:complextype> </s:element> - <s:complextype name="tletsqueryresponsemessage"> - <s:sequence> <s:element minoccurs="0" maxoccurs="1" name="version" type="s:string" /> <s:element minoccurs="0" maxoccurs="1" name="initiator" type="s:string" /> Interface Design Document for CMBHS 24 of 27

25 <s:element minoccurs="0" maxoccurs="1" name="destination" type="s:string" /> <s:element minoccurs="0" maxoccurs="1" name="controlfield" type="s:string" /> <s:element minoccurs="0" maxoccurs="1" name="userid" type="s:string" /> <s:element minoccurs="0" maxoccurs="1" name="queryid" type="s:string" /> <s:element minoccurs="1" maxoccurs="1" name="querytime" type="s:datetime" /> <s:element minoccurs="0" maxoccurs="1" name="facilityname" type="s:string" /> <s:element minoccurs="0" maxoccurs="1" name="facilitystreetaddress" type="s:string" /> <s:element minoccurs="0" maxoccurs="1" name="facilitycity" type="s:string" /> <s:element minoccurs="0" maxoccurs="1" name="facilityzip" type="s:string" /> <s:element minoccurs="0" maxoccurs="1" name="facilitycountycode" type="s:string" /> <s:element minoccurs="0" maxoccurs="1" name="facilitycontactpersonname" type="s:string" /> <s:element minoccurs="0" maxoccurs="1" name="facilitycontactphonenumber" type="s:string" /> <s:element minoccurs="0" maxoccurs="1" name="firstname" type="s:string" /> <s:element minoccurs="0" maxoccurs="1" name="lastname" type="s:string" /> <s:element minoccurs="0" maxoccurs="1" name="ssn" type="s:string" /> <s:element minoccurs="1" maxoccurs="1" name="dateofbirth" type="s:datetime" /> <s:element minoccurs="0" maxoccurs="1" name="gender" type="s:string" /> <s:element minoccurs="0" maxoccurs="1" name="race" type="s:string" /> <s:element minoccurs="0" maxoccurs="1" name="tletsresponse" type="tns:arrayofperson" /> <s:element minoccurs="0" maxoccurs="1" name="errormessage" type="s:string" /> <s:element minoccurs="0" maxoccurs="1" name="busymessage" type="s:string" /> </s:sequence> </s:complextype> - <s:complextype name="arrayofperson"> - <s:sequence> <s:element minoccurs="0" maxoccurs="unbounded" name="person" nillable="true" type="tns:person" /> </s:sequence> </s:complextype> - <s:complextype name="person"> - <s:sequence> <s:element minoccurs="1" maxoccurs="1" name="cmbhsid" type="s:int" /> <s:element minoccurs="0" maxoccurs="1" name="matchtype" type="s:string" /> <s:element minoccurs="0" maxoccurs="1" name="lastname" type="s:string" /> <s:element minoccurs="0" maxoccurs="1" name="firstname" type="s:string" /> <s:element minoccurs="0" maxoccurs="1" name="middlename" type="s:string" /> <s:element minoccurs="0" maxoccurs="1" name="ssn" type="s:string" /> <s:element minoccurs="1" maxoccurs="1" name="dateofbirth" type="s:datetime" /> <s:element minoccurs="0" maxoccurs="1" name="gender" type="s:string" /> <s:element minoccurs="0" maxoccurs="1" name="race" type="s:string" /> <s:element minoccurs="0" maxoccurs="1" name="county" type="s:string" /> <s:element minoccurs="0" maxoccurs="1" name="facilityname" type="s:string" /> <s:element minoccurs="0" maxoccurs="1" name="phonenumber" type="s:string" /> <s:element minoccurs="0" maxoccurs="1" name="caseid" type="s:string" /> </s:sequence> </s:complextype> <s:element name="cmbhsauthenticationheader" type="tns:cmbhsauthenticationheader" /> - <s:complextype name="cmbhsauthenticationheader"> - <s:sequence> <s:element minoccurs="0" maxoccurs="1" name="cmbhsusername" type="s:string" /> <s:element minoccurs="0" maxoccurs="1" name="cmbhspassword" type="s:string" /> </s:sequence> <s:anyattribute /> </s:complextype> </s:schema> </wsdl:types> - <wsdl:message name="processclientmatchsoapin"> <wsdl:part name="parameters" element="tns:processclientmatch" /> </wsdl:message> Interface Design Document for CMBHS 25 of 27

26 - <wsdl:message name="processclientmatchsoapout"> <wsdl:part name="parameters" element="tns:processclientmatchresponse" /> </wsdl:message> - <wsdl:message name="processclientmatchcmbhsauthenticationheader"> <wsdl:part name="cmbhsauthenticationheader" element="tns:cmbhsauthenticationheader" /> </wsdl:message> - <wsdl:porttype name="clientmatchservicesoap"> - <wsdl:operation name="processclientmatch"> <wsdl:documentation xmlns:wsdl=" generic request for data from CMBHS</wsdl:documentation> <wsdl:input message="tns:processclientmatchsoapin" /> <wsdl:output message="tns:processclientmatchsoapout" /> </wsdl:operation> </wsdl:porttype> - <wsdl:binding name="clientmatchservicesoap" type="tns:clientmatchservicesoap"> <soap:binding transport=" /> - <wsdl:operation name="processclientmatch"> <soap:operation soapaction=" style="document" /> - <wsdl:input> <soap:body use="literal" /> <soap:header message="tns:processclientmatchcmbhsauthenticationheader" part="cmbhsauthenticationheader" use="literal" /> </wsdl:input> - <wsdl:output> <soap:body use="literal" /> <soap:header message="tns:processclientmatchcmbhsauthenticationheader" part="cmbhsauthenticationheader" use="literal" /> </wsdl:output> </wsdl:operation> </wsdl:binding> - <wsdl:binding name="clientmatchservicesoap12" type="tns:clientmatchservicesoap"> <soap12:binding transport=" /> - <wsdl:operation name="processclientmatch"> <soap12:operation soapaction=" style="document" /> - <wsdl:input> <soap12:body use="literal" /> <soap12:header message="tns:processclientmatchcmbhsauthenticationheader" part="cmbhsauthenticationheader" use="literal" /> </wsdl:input> - <wsdl:output> <soap12:body use="literal" /> <soap12:header message="tns:processclientmatchcmbhsauthenticationheader" part="cmbhsauthenticationheader" use="literal" /> </wsdl:output> </wsdl:operation> </wsdl:binding> - <wsdl:service name="clientmatchservice"> - <wsdl:port name="clientmatchservicesoap" binding="tns:clientmatchservicesoap"> <soap:address location=" ce.asmx" /> </wsdl:port> - <wsdl:port name="clientmatchservicesoap12" binding="tns:clientmatchservicesoap12"> <soap12:address location=" ce.asmx" /> </wsdl:port> Interface Design Document for CMBHS 26 of 27

27 </wsdl:service> </wsdl:definitions> Interface Design Document for CMBHS 27 of 27

Interface Between Illinois Workforce Development System and Third-Party Services Tracking Systems

Interface Between Illinois Workforce Development System and Third-Party Services Tracking Systems WIA Policy Letter No. 06-PL-24, Change 1 Attachment C Illinois Department of Commerce and Economic Opportunity Interface Between Illinois Workforce Development System and Third-Party Services Tracking

More information

Replacements TECHNICAL REFERENCE. DTCCSOLUTIONS Dec 2009. Copyright 2009 Depository Trust Clearing Corporation. All Rights Reserved.

Replacements TECHNICAL REFERENCE. DTCCSOLUTIONS Dec 2009. Copyright 2009 Depository Trust Clearing Corporation. All Rights Reserved. TECHNICAL REFERENCE Replacements Page 1 Table of Contents Table of Contents 1 Overview... 3 1.1 Replacements Features... 3 2 Roles and Responsibilities... 4 2.1 Sender (Receiving Carrier)... 4 2.2 Recipient

More information

e-filing Secure Web Service User Manual

e-filing Secure Web Service User Manual e-filing Secure Web Service User Manual Page1 CONTENTS 1 BULK ITR... 6 2 BULK PAN VERIFICATION... 9 3 GET ITR-V BY TOKEN NUMBER... 13 4 GET ITR-V BY ACKNOWLEDGMENT NUMBER... 16 5 GET RETURN STATUS... 19

More information

How to consume a Domino Web Services from Visual Studio under Security

How to consume a Domino Web Services from Visual Studio under Security How to consume a Domino Web Services from Visual Studio under Security Summary Authors... 2 Abstract... 2 Web Services... 3 Write a Visual Basic Consumer... 5 Authors Andrea Fontana IBM Champion for WebSphere

More information

KMx Enterprise: Integration Overview for Member Account Synchronization and Single Signon

KMx Enterprise: Integration Overview for Member Account Synchronization and Single Signon KMx Enterprise: Integration Overview for Member Account Synchronization and Single Signon KMx Enterprise includes two api s for integrating user accounts with an external directory of employee or other

More information

ACCREDITATION COUNCIL FOR PHARMACY EDUCATION. CPE Monitor. Technical Specifications

ACCREDITATION COUNCIL FOR PHARMACY EDUCATION. CPE Monitor. Technical Specifications ACCREDITATION COUNCIL FOR PHARMACY EDUCATION CPE Monitor Technical Specifications Prepared by Steven Janis, RWK Design, Inc. Created: 02/10/2012 Revised: 09/28/2012 Revised: 08/28/2013 This document describes

More information

P20 WIN Query Number: P20 WIN 1508_3_0006

P20 WIN Query Number: P20 WIN 1508_3_0006 Question/Purpose for P20 WIN Data Request Item Short explanation Detailed explanation 1 wage and employment outcomes This data request will enable analysis of the degree to which completing credentials

More information

Web Application Hosting Cloud Architecture

Web Application Hosting Cloud Architecture Web Application Hosting Cloud Architecture Executive Overview This paper describes vendor neutral best practices for hosting web applications using cloud computing. The architectural elements described

More information

Avatier Identity Management Suite

Avatier Identity Management Suite Avatier Identity Management Suite Migrating AIMS Configuration and Audit Log Data To Microsoft SQL Server Version 9 2603 Camino Ramon Suite 110 San Ramon, CA 94583 Phone: 800-609-8610 925-217-5170 FAX:

More information

Clever SFTP Instructions

Clever SFTP Instructions Clever SFTP Instructions November 10, 2015 Contents 1 Introduction 2 2 General SFTP Setup 2 3 Preparing CSV Files 3 3.1 Preparing schools.csv............................... 4 3.2 Preparing students.csv...............................

More information

Developer Guide to Authentication and Authorisation Web Services Secure and Public

Developer Guide to Authentication and Authorisation Web Services Secure and Public Government Gateway Developer Guide to Authentication and Authorisation Web Services Secure and Public Version 1.6.3 (17.04.03) - 1 - Table of Contents Government Gateway 1 Developer Guide to Authentication

More information

Software Architecture Document

Software Architecture Document Software Architecture Document Project Management Cell 1.0 1 of 16 Abstract: This is a software architecture document for Project Management(PM ) cell. It identifies and explains important architectural

More information

SalesForce SSO with Active Directory Federated Services (ADFS) v2.0 Authenticating Users Using SecurAccess Server by SecurEnvoy

SalesForce SSO with Active Directory Federated Services (ADFS) v2.0 Authenticating Users Using SecurAccess Server by SecurEnvoy SalesForce SSO with Active Directory Federated Services (ADFS) v2.0 Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 Merlin House

More information

Aras Innovator Authentication Setup

Aras Innovator Authentication Setup Aras Innovator Authentication Setup Aras Innovator 9.1 Document #: 9.1.009032008 Last Modified: 3/12/2009 Copyright 2009 Aras Corporation ARAS CORPORATION Copyright 2009 All rights reserved Aras Corporation

More information

LearningServer Portal Manager

LearningServer Portal Manager Overview LearningServer Portal Manager Portal Manager is a web-based, add-on module to LearningServer that allows organizations to create multiple LearningServer web sites. Each site services different

More information

Clever + DreamBox SFTP Instructions

Clever + DreamBox SFTP Instructions Clever + DreamBox SFTP Instructions 1. Introduction Clever is a service for transferring school information in a secure manner from a school database to applications. This document explains how to use

More information

Twinfield Single Sign On

Twinfield Single Sign On Twinfield Single Sign On manual, version 5.4 April 2009 For general information about our webservices see the Twinfield Webservices Manual Twinfield International NV De Beek 9-15 3871 MS Hoevelaken Netherlands

More information

ISSUE TRACK FOR WINDOWS INSTALLATION GUIDE VERSION 4.0.0.XX

ISSUE TRACK FOR WINDOWS INSTALLATION GUIDE VERSION 4.0.0.XX ISSUE TRACK FOR WINDOWS INSTALLATION GUIDE VERSION 4.0.0.XX Contents CONTENTS Chapter 1 Introduction 1-1 Welcome to Issue Track for Windows 1-1 About this Guide 1-1 Product Name 1-1 Documentation Roadmap

More information

Contents About the Contract Management Post Installation Administrator's Guide... 5 Viewing and Modifying Contract Management Settings...

Contents About the Contract Management Post Installation Administrator's Guide... 5 Viewing and Modifying Contract Management Settings... Post Installation Guide for Primavera Contract Management 14.1 July 2014 Contents About the Contract Management Post Installation Administrator's Guide... 5 Viewing and Modifying Contract Management Settings...

More information

Total Males Females 34.4 36.7 (0.4) 12.7 17.5 (1.6) Didn't believe entitled or eligible 13.0 (0.3) Did not know how to apply for benefits 3.4 (0.

Total Males Females 34.4 36.7 (0.4) 12.7 17.5 (1.6) Didn't believe entitled or eligible 13.0 (0.3) Did not know how to apply for benefits 3.4 (0. 2001 National Survey of Veterans (NSV) - March, 2003 - Page 413 Table 7-10. Percent Distribution of Veterans by Reasons Veterans Don't Have VA Life Insurance and Gender Males Females Not Applicable 3,400,423

More information

Authentication and Single Sign On

Authentication and Single Sign On Contents 1. Introduction 2. Fronter Authentication 2.1 Passwords in Fronter 2.2 Secure Sockets Layer 2.3 Fronter remote authentication 3. External authentication through remote LDAP 3.1 Regular LDAP authentication

More information

Configuring SonicWALL TSA on Citrix and Terminal Services Servers

Configuring SonicWALL TSA on Citrix and Terminal Services Servers Configuring on Citrix and Terminal Services Servers Document Scope This solutions document describes how to install, configure, and use the SonicWALL Terminal Services Agent (TSA) on a multi-user server,

More information

Oracle Service Bus Examples and Tutorials

Oracle Service Bus Examples and Tutorials March 2011 Contents 1 Oracle Service Bus Examples... 2 2 Introduction to the Oracle Service Bus Tutorials... 5 3 Getting Started with the Oracle Service Bus Tutorials... 12 4 Tutorial 1. Routing a Loan

More information

Secure Authentication and Session. State Management for Web Services

Secure Authentication and Session. State Management for Web Services Lehman 0 Secure Authentication and Session State Management for Web Services Clay Lehman CSC 499: Honors Thesis Supervised by: Dr. R. Michael Young Lehman 1 1. Introduction Web services are a relatively

More information

Secret Server Qualys Integration Guide

Secret Server Qualys Integration Guide Secret Server Qualys Integration Guide Table of Contents Secret Server and Qualys Cloud Platform... 2 Authenticated vs. Unauthenticated Scanning... 2 What are the Advantages?... 2 Integrating Secret Server

More information

Web Plus Security Features and Recommendations

Web Plus Security Features and Recommendations Web Plus Security Features and Recommendations (Based on Web Plus Version 3.x) Centers for Disease Control and Prevention National Center for Chronic Disease Prevention and Health Promotion Division of

More information

OQ Analyst Web Service Interface Specifications. Version 2.0

OQ Analyst Web Service Interface Specifications. Version 2.0 OQ Analyst Version 2.0 1. Introduction This document outlines the current specifications for the OQ -Analyst Web Service Interface (also referred to as the WSI) that can be used to allow external programs

More information

Leveraging Service Oriented Architecture (SOA) to integrate Oracle Applications with SalesForce.com

Leveraging Service Oriented Architecture (SOA) to integrate Oracle Applications with SalesForce.com Leveraging Service Oriented Architecture (SOA) to integrate Oracle Applications with SalesForce.com Presented by: Shashi Mamidibathula, CPIM, PMP Principal Pramaan Systems shashi.mamidi@pramaan.com www.pramaan.com

More information

IBM SPSS Collaboration and Deployment Services Version 6 Release 0. Single Sign-On Services Developer's Guide

IBM SPSS Collaboration and Deployment Services Version 6 Release 0. Single Sign-On Services Developer's Guide IBM SPSS Collaboration and Deployment Services Version 6 Release 0 Single Sign-On Services Developer's Guide Note Before using this information and the product it supports, read the information in Notices

More information

External Authentication with Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy

External Authentication with Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy External Authentication with Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 1210 Parkview Arlington

More information

CICS Web Service Security. Anthony Papageorgiou IBM CICS Development March 13, 2012 Session: 10282

CICS Web Service Security. Anthony Papageorgiou IBM CICS Development March 13, 2012 Session: 10282 Web Service Security Anthony Papageorgiou IBM Development March 13, 2012 Session: 10282 Agenda Web Service Support Overview Security Basics and Terminology Pipeline Security Overview Identity Encryption

More information

Active Directory Management. Agent Deployment Guide

Active Directory Management. Agent Deployment Guide Active Directory Management Agent Deployment Guide Document Revision Date: April 26, 2013 Active Directory Management Deployment Guide i Contents System Requirements... 1 Hardware Requirements... 2 Agent

More information

P-Synch by M-Tech Information Technology, Inc. ID-Synch by M-Tech Information Technology, Inc.

P-Synch by M-Tech Information Technology, Inc. ID-Synch by M-Tech Information Technology, Inc. P-Synch by M-Tech Information Technology, Inc. ID-Synch by M-Tech Information Technology, Inc. Product Category: Password Management/Provisioning Validation Date: TBD Product Abstract M-Tech software streamlines

More information

Cisco ASA Authentication QUICKStart Guide

Cisco ASA Authentication QUICKStart Guide Cisco ASA Authentication QUICKStart Guide Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright 2012 SafeNet, Inc. All rights reserved.

More information

Portals and Hosted Files

Portals and Hosted Files 12 Portals and Hosted Files This chapter introduces Progress Rollbase Portals, portal pages, portal visitors setup and management, portal access control and login/authentication and recommended guidelines

More information

How to Configure Captive Portal

How to Configure Captive Portal How to Configure Captive Portal Captive portal is one of the user identification methods available on the Palo Alto Networks firewall. Unknown users sending HTTP or HTTPS 1 traffic will be authenticated,

More information

Sage 100 ERP. ebusiness Web Services Installation and Reference Guide

Sage 100 ERP. ebusiness Web Services Installation and Reference Guide Sage 100 ERP ebusiness Web Services Installation and Reference Guide 2012 Sage Software, Inc. All rights reserved. Sage, the Sage logos, and the Sage product and service names mentioned herein are registered

More information

User-ID Best Practices

User-ID Best Practices User-ID Best Practices PAN-OS 5.0, 5.1, 6.0 Revision A 2011, Palo Alto Networks, Inc. www.paloaltonetworks.com Table of Contents PAN-OS User-ID Functions... 3 User / Group Enumeration... 3 Using LDAP Servers

More information

Adaptive Authentication Integration Options. John Murray Manager, RSA Systems Engineering

Adaptive Authentication Integration Options. John Murray Manager, RSA Systems Engineering Adaptive Authentication Integration Options John Murray Manager, RSA Systems Engineering What is RSA Adaptive Authentication? Comprehensive authentication and fraud detection platform Powered by Risk-Based

More information

multiple placeholders bound to one definition, 158 page approval not match author/editor rights, 157 problems with, 156 troubleshooting, 156 158

multiple placeholders bound to one definition, 158 page approval not match author/editor rights, 157 problems with, 156 troubleshooting, 156 158 Index A Active Directory Active Directory nested groups, 96 creating user accounts, 67 custom authentication, 66 group members cannot log on, 153 mapping certificates, 65 mapping user to Active Directory

More information

PortWise Access Management Suite

PortWise Access Management Suite Create secure virtual access for your employees, partners and customers from any location and any device. With todays global and homogenous economy, the accuracy and responsiveness of an organization s

More information

Scholastic Hosting Services User s Guide

Scholastic Hosting Services User s Guide Scholastic Hosting Services User s Guide and Data Management Guide July 11, 2011 For use with Scholastic Hosting Services and SAM 2.0 or later Copyright 2011, 2009, 2008, 2005 by Scholastic Inc. All rights

More information

The presentation explains how to create and access the web services using the user interface. WebServices.ppt. Page 1 of 14

The presentation explains how to create and access the web services using the user interface. WebServices.ppt. Page 1 of 14 The presentation explains how to create and access the web services using the user interface. Page 1 of 14 The aim of this presentation is to familiarize you with the processes of creating and accessing

More information

Configuration Worksheets for Oracle WebCenter Ensemble 10.3

Configuration Worksheets for Oracle WebCenter Ensemble 10.3 Configuration Worksheets for Oracle WebCenter Ensemble 10.3 This document contains worksheets for installing and configuring Oracle WebCenter Ensemble 10.3. Print this document and use it to gather the

More information

CoCreate Manager Server Installation Guide. CoCreate Manager Server Installation Guide 1

CoCreate Manager Server Installation Guide. CoCreate Manager Server Installation Guide 1 CoCreate Manager Server Installation Guide CoCreate Manager Server Installation Guide 1 CoCreate Manager Server Installation Guide 2 Table Of Contents 1. CoCreate Manager Server 2008 4 1.1. Installation

More information

Apigee Gateway Specifications

Apigee Gateway Specifications Apigee Gateway Specifications Logging and Auditing Data Selection Request/response messages HTTP headers Simple Object Access Protocol (SOAP) headers Custom fragment selection via XPath Data Handling Encryption

More information

Microsoft Office Communications Server 2007 & Coyote Point Equalizer Deployment Guide DEPLOYMENT GUIDE

Microsoft Office Communications Server 2007 & Coyote Point Equalizer Deployment Guide DEPLOYMENT GUIDE Microsoft Office Communications Server 2007 & Coyote Point Equalizer DEPLOYMENT GUIDE Table of Contents Unified Communications Application Delivery...2 General Requirements...6 Equalizer Configuration...7

More information

Installation Guide. SafeNet Authentication Service

Installation Guide. SafeNet Authentication Service SafeNet Authentication Service Installation Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information

More information

Research on the Model of Enterprise Application Integration with Web Services

Research on the Model of Enterprise Application Integration with Web Services Research on the Model of Enterprise Integration with Web Services XIN JIN School of Information, Central University of Finance& Economics, Beijing, 100081 China Abstract: - In order to improve business

More information

Software Requirement Specification Web Services Security

Software Requirement Specification Web Services Security Software Requirement Specification Web Services Security Federation Manager 7.5 Version 0.3 (Draft) Please send comments to: dev@opensso.dev.java.net This document is subject to the following license:

More information

STUDENT PARTICIPATION AGREEMENT

STUDENT PARTICIPATION AGREEMENT Help Desk Track (A+) Cisco Track Microsoft Office Specialist Microsoft Technical Assoc. Programming Track Mobile App. Programming Design Track Informational STUDENT PARTICIPATION AGREEMENT Welcome aboard

More information

Online eopf Self-service Feature for Login ID and Password Retrieval for New Users

Online eopf Self-service Feature for Login ID and Password Retrieval for New Users For Employees Online eopf Self-service Feature for Login ID and Password Retrieval for New Users eopf provides web-based access for Federal personnel to view and print employment documents. Employees are

More information

Owner of the content within this article is www.isaserver.org Written by Marc Grote www.it-training-grote.de

Owner of the content within this article is www.isaserver.org Written by Marc Grote www.it-training-grote.de Owner of the content within this article is www.isaserver.org Written by Marc Grote www.it-training-grote.de Microsoft Forefront TMG How to use SQL Server 2008 Express Reporting Services Abstract In this

More information

Installing the ASP.NET VETtrak APIs onto IIS 5 or 6

Installing the ASP.NET VETtrak APIs onto IIS 5 or 6 Installing the ASP.NET VETtrak APIs onto IIS 5 or 6 2 Installing the ASP.NET VETtrak APIs onto IIS 5 or 6 3... 3 IIS 5 or 6 1 Step 1- Install/Check 6 Set Up and Configure VETtrak ASP.NET API 2 Step 2 -...

More information

ipad or iphone with Junos Pulse and Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy

ipad or iphone with Junos Pulse and Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy ipad or iphone with Junos Pulse and Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 1210 Parkview Arlington

More information

Cloud Services ADM. Agent Deployment Guide

Cloud Services ADM. Agent Deployment Guide Cloud Services ADM Agent Deployment Guide 10/15/2014 CONTENTS System Requirements... 1 Hardware Requirements... 1 Installation... 2 SQL Connection... 4 AD Mgmt Agent... 5 MMC... 7 Service... 8 License

More information

IDENTITY INFORMATION MANAGMENT ARCHITECTURE SUMMARY Architecture and Standards Branch Office of the CIO Province of BC People Collaboration Innovation

IDENTITY INFORMATION MANAGMENT ARCHITECTURE SUMMARY Architecture and Standards Branch Office of the CIO Province of BC People Collaboration Innovation IDENTITY INFORMATION MANAGMENT ARCHITECTURE SUMMARY Architecture and Standards Branch Author: Creation Date: Last Updated: Version: I. Bailey May 28, 2008 March 23, 2009 0.7 Reviewed By Name Organization

More information

SOA Software: Troubleshooting Guide for Agents

SOA Software: Troubleshooting Guide for Agents SOA Software: Troubleshooting Guide for Agents SOA Software Troubleshooting Guide for Agents 1.1 October, 2013 Copyright Copyright 2013 SOA Software, Inc. All rights reserved. Trademarks SOA Software,

More information

AquaLogic Service Bus

AquaLogic Service Bus AquaLogic Bus Wolfgang Weigend Principal Systems Engineer BEA Systems 1 What to consider when looking at ESB? Number of planned business access points Reuse across organization Reduced cost of ownership

More information

Java Access to Oracle CRM On Demand. By: Joerg Wallmueller Melbourne, Australia

Java Access to Oracle CRM On Demand. By: Joerg Wallmueller Melbourne, Australia Java Access to Oracle CRM On Demand Web Based CRM Software - Oracle CRM...페이지 1 / 12 Java Access to Oracle CRM On Demand By: Joerg Wallmueller Melbourne, Australia Introduction Requirements Step 1: Generate

More information

Copyright 2013 Consona Corporation. All rights reserved www.compiere.com

Copyright 2013 Consona Corporation. All rights reserved www.compiere.com COMPIERE 3.8.1 SOAP FRAMEWORK Copyright 2013 Consona Corporation. All rights reserved www.compiere.com Table of Contents Compiere SOAP API... 3 Accessing Compiere SOAP... 3 Generate Java Compiere SOAP

More information

XIA Configuration Server

XIA Configuration Server XIA Configuration Server XIA Configuration Server v7 Installation Quick Start Guide Monday, 05 January 2015 1 P a g e X I A C o n f i g u r a t i o n S e r v e r Contents Requirements... 3 XIA Configuration

More information

Embedded Document Accounting Solution (edas) for Cost Recovery. Administrator's Guide

Embedded Document Accounting Solution (edas) for Cost Recovery. Administrator's Guide Embedded Document Accounting Solution (edas) for Cost Recovery Administrator's Guide September 2013 www.lexmark.com Contents 2 Contents Overview...4 Getting started...5 Understanding installation requirements...5

More information

Deploying RSA ClearTrust with the FirePass controller

Deploying RSA ClearTrust with the FirePass controller Deployment Guide Deploying RSA ClearTrust with the FirePass Controller Deploying RSA ClearTrust with the FirePass controller Welcome to the FirePass RSA ClearTrust Deployment Guide. This guide shows you

More information

BlackShield ID Agent for Remote Web Workplace

BlackShield ID Agent for Remote Web Workplace Agent for Remote Web Workplace 2010 CRYPTOCard Corp. All rights reserved. http:// www.cryptocard.com Copyright Copyright 2010, CRYPTOCard All Rights Reserved. No part of this publication may be reproduced,

More information

Deliverable: 2.1 VoteCal System Requirements Specification

Deliverable: 2.1 VoteCal System Requirements Specification Deliverable: 2.1 VoteCal System Requirements Specification VoteCal Statewide Voter Registration System Project State of California, Secretary of State (SOS) Work Product Acceptance Catalyst Consulting

More information

Workday Mobile Security FAQ

Workday Mobile Security FAQ Workday Mobile Security FAQ Workday Mobile Security FAQ Contents The Workday Approach 2 Authentication 3 Session 3 Mobile Device Management (MDM) 3 Workday Applications 4 Web 4 Transport Security 5 Privacy

More information

Millennium Drive. Installation Guide

Millennium Drive. Installation Guide Millennium Drive Installation Guide This is a publication of Abila, Inc. Version 2015.1 2015 Abila, Inc. and its affiliated entities. All rights reserved. Abila, the Abila logos, and the Abila product

More information

DualShield. for. Microsoft TMG. Implementation Guide. (Version 5.2) Copyright 2011 Deepnet Security Limited

DualShield. for. Microsoft TMG. Implementation Guide. (Version 5.2) Copyright 2011 Deepnet Security Limited DualShield for Implementation Guide (Version 5.2) Copyright 2011 Deepnet Security Limited Copyright 2011, Deepnet Security. All Rights Reserved. Page 1 Trademarks DualShield Unified Authentication, MobileID,

More information

Strong Authentication for Cisco ASA 5500 Series

Strong Authentication for Cisco ASA 5500 Series Strong Authentication for Cisco ASA 5500 Series with Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright Copyright 2011. CRYPTOCard

More information

Requirements Collax Security Gateway Collax Business Server or Collax Platform Server including Collax SSL VPN module

Requirements Collax Security Gateway Collax Business Server or Collax Platform Server including Collax SSL VPN module Collax SSL VPN Howto This howto describes the easy configuration of a Collax server as SSL VPN gateway in order to enable external access to selected applications in the company network. Except for a common

More information

API Integration Payment21 Button

API Integration Payment21 Button API Integration Payment21 Button The purpose of this document is to describe the requirements, usage, implementation and purpose of the Payment21 Application Programming Interface (API). The API will allow

More information

API Integration Payment21 Recurring Billing

API Integration Payment21 Recurring Billing API Integration Payment21 Recurring Billing The purpose of this document is to describe the requirements, usage, implementation and purpose of the Payment21 Application Programming Interface (API). The

More information

IBM Security QRadar Version 7.2.5. Vulnerability Assessment Configuration Guide IBM

IBM Security QRadar Version 7.2.5. Vulnerability Assessment Configuration Guide IBM IBM Security QRadar Version 7.2.5 Vulnerability Assessment Configuration Guide IBM Note Before using this information and the product that it supports, read the information in Notices on page 93. Product

More information

Implementation Guide

Implementation Guide Implementation Guide PayLINK Implementation Guide Version 2.1.252 Released September 17, 2013 Copyright 2011-2013, BridgePay Network Solutions, Inc. All rights reserved. The information contained herein

More information

Authentication Methods

Authentication Methods Authentication Methods Overview In addition to the OU Campus-managed authentication system, OU Campus supports LDAP, CAS, and Shibboleth authentication methods. LDAP users can be configured through the

More information

Grandstream Networks, Inc.

Grandstream Networks, Inc. Grandstream Networks, Inc. XML Based Downloadable Phone Book Guide GXP21xx/GXP14xx/GXP116x IP Phone Version 2.0 XML Based Downloadable Phone Book Guide Index INTRODUCTION... 4 WHAT IS XML... 4 WHY XML...

More information

Websense Support Webinar: Questions and Answers

Websense Support Webinar: Questions and Answers Websense Support Webinar: Questions and Answers Configuring Websense Web Security v7 with Your Directory Service Can updating to Native Mode from Active Directory (AD) Mixed Mode affect transparent user

More information

EMC Documentum Repository Services for Microsoft SharePoint

EMC Documentum Repository Services for Microsoft SharePoint EMC Documentum Repository Services for Microsoft SharePoint Version 6.5 SP2 Installation Guide P/N 300 009 829 A01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748 9103 1 508 435 1000 www.emc.com

More information

Vendor Questionnaire

Vendor Questionnaire Instructions: This questionnaire was developed to assess the vendor s information security practices and standards. Please complete this form as completely as possible, answering yes or no, and explaining

More information

RFID Tracking System Installation

RFID Tracking System Installation RFID Tracking System Installation Installation Guide Version 3.x 3M Track and Trace Solutions 3M Center, Building 225-4N-14 St. Paul, Minnesota 55144-1000 78-8123-9919-0, Rev. E 2003-2009, 3M. All rights

More information

Ameritas Single Sign-On (SSO) and Enterprise SAML Standard. Architectural Implementation, Patterns and Usage Guidelines

Ameritas Single Sign-On (SSO) and Enterprise SAML Standard. Architectural Implementation, Patterns and Usage Guidelines Ameritas Single Sign-On (SSO) and Enterprise SAML Standard Architectural Implementation, Patterns and Usage Guidelines 1 Background and Overview... 3 Scope... 3 Glossary of Terms... 4 Architecture Components...

More information

LDAP User Guide PowerSchool Premier 5.1 Student Information System

LDAP User Guide PowerSchool Premier 5.1 Student Information System PowerSchool Premier 5.1 Student Information System Document Properties Copyright Owner Copyright 2007 Pearson Education, Inc. or its affiliates. All rights reserved. This document is the property of Pearson

More information

StreamServe Persuasion SP5 StreamStudio

StreamServe Persuasion SP5 StreamStudio StreamServe Persuasion SP5 StreamStudio Administrator s Guide Rev B StreamServe Persuasion SP5 StreamStudio Administrator s Guide Rev B OPEN TEXT CORPORATION ALL RIGHTS RESERVED United States and other

More information

SAP Business Objects Business Intelligence platform Document Version: 4.1 Support Package 7 2015-11-24. Data Federation Administration Tool Guide

SAP Business Objects Business Intelligence platform Document Version: 4.1 Support Package 7 2015-11-24. Data Federation Administration Tool Guide SAP Business Objects Business Intelligence platform Document Version: 4.1 Support Package 7 2015-11-24 Data Federation Administration Tool Guide Content 1 What's new in the.... 5 2 Introduction to administration

More information

Introductions. Christopher Cognetta Practice Manager Client Field Engineering Microsoft Dynamics CRM MVP chris.cognetta@tribridge.

Introductions. Christopher Cognetta Practice Manager Client Field Engineering Microsoft Dynamics CRM MVP chris.cognetta@tribridge. Hosted by Introductions Christopher Cognetta Practice Manager Client Field Engineering Microsoft Dynamics CRM MVP chris.cognetta@tribridge.com CRMUG Chairperson Miami & Tampa Co Chair 250+ Dynamics CRM

More information

An Interface from YAWL to OpenERP

An Interface from YAWL to OpenERP An Interface from YAWL to OpenERP Joerg Evermann Faculty of Business Administration, Memorial University of Newfoundland, Canada jevermann@mun.ca Abstract. The paper describes an interface from the YAWL

More information

Product Manual. MDM On Premise Installation Version 8.1. Last Updated: 06/07/15

Product Manual. MDM On Premise Installation Version 8.1. Last Updated: 06/07/15 Product Manual MDM On Premise Installation Version 8.1 Last Updated: 06/07/15 Parallels IP Holdings GmbH Vordergasse 59 8200 Schaffhausen Switzerland Tel: + 41 52 632 0411 Fax: + 41 52 672 2010 www.parallels.com

More information

Application Discovery Manager User s Guide vcenter Application Discovery Manager 6.2.1

Application Discovery Manager User s Guide vcenter Application Discovery Manager 6.2.1 Application Discovery Manager User s Guide vcenter Application Discovery Manager 6.2.1 This document supports the version of each product listed and supports all subsequent versions until the document

More information

Customer Tips. Configuring Color Access on the WorkCentre 7328/7335/7345 using Windows Active Directory. for the user. Overview

Customer Tips. Configuring Color Access on the WorkCentre 7328/7335/7345 using Windows Active Directory. for the user. Overview Xerox Multifunction Devices Customer Tips February 13, 2008 This document applies to the stated Xerox products. It is assumed that your device is equipped with the appropriate option(s) to support the

More information

SchoolBooking SSO Integration Guide

SchoolBooking SSO Integration Guide SchoolBooking SSO Integration Guide Before you start This guide has been written to help you configure SchoolBooking to operate with SSO (Single Sign on) Please treat this document as a reference guide,

More information

Kaseya 2. User Guide. Version 6.1

Kaseya 2. User Guide. Version 6.1 Kaseya 2 Kaseya SQL Server Reporting Services (SSRS) Configuration User Guide Version 6.1 January 28, 2011 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and

More information

How To Integrate Watchguard Xtm With Secur Access With Watchguard And Safepower 2Factor Authentication On A Watchguard 2T (V2) On A 2Tv 2Tm (V1.2) With A 2F

How To Integrate Watchguard Xtm With Secur Access With Watchguard And Safepower 2Factor Authentication On A Watchguard 2T (V2) On A 2Tv 2Tm (V1.2) With A 2F External Authentication with Watchguard XTM Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 1210 Parkview Arlington Business Park

More information

PaperClip Incorporated 3/7/06; Rev 9/18/09. PaperClip Compliant Email Service Whitepaper

PaperClip Incorporated 3/7/06; Rev 9/18/09. PaperClip Compliant Email Service Whitepaper Incorporated 3/7/06; Rev 9/18/09 PaperClip Compliant Email Service Whitepaper Overview The FTC Safeguard Rules require Financial, Insurance and Medical providers to protect their customer s private information

More information

SonicWALL SSL VPN 3.0 HTTP(S) Reverse Proxy Support

SonicWALL SSL VPN 3.0 HTTP(S) Reverse Proxy Support SonicWALL SSL VPN 3.0 HTTP(S) Reverse Proxy Support Document Scope This document describes the implementation of reverse proxy to provide HTTP and HTTPS access to Microsoft Outlook Web Access (OWA) Premium

More information

Interwise Connect. Working with Reverse Proxy Version 7.x

Interwise Connect. Working with Reverse Proxy Version 7.x Working with Reverse Proxy Version 7.x Table of Contents BACKGROUND...3 Single Sign On (SSO)... 3 Interwise Connect... 3 INTERWISE CONNECT WORKING WITH REVERSE PROXY...4 Architecture... 4 Interwise Web

More information

Configuring Single Sign-On from the VMware Identity Manager Service to Office 365

Configuring Single Sign-On from the VMware Identity Manager Service to Office 365 Configuring Single Sign-On from the VMware Identity Manager Service to Office 365 VMware Identity Manager JULY 2015 V1 Table of Contents Overview... 2 Passive and Active Authentication Profiles... 2 Adding

More information

Active Directory Management. Agent Deployment Guide

Active Directory Management. Agent Deployment Guide Active Directory Management Agent Deployment Guide Document Revision Date: June 12, 2014 Active Directory Management Deployment Guide i Contents System Requirements...1 Hardware Requirements...1 Installation...3

More information

Sample Configuration: Cisco UCS, LDAP and Active Directory

Sample Configuration: Cisco UCS, LDAP and Active Directory First Published: March 24, 2011 Last Modified: March 27, 2014 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS

More information