GestPay Security with Encryption Technical Specifications

Size: px
Start display at page:

Download "GestPay Security with Encryption Technical Specifications"

Transcription

1 GestPay Security with Encryption Technical Specifications Page 1 of 46

2 Summary Document information...3 Version information Introduction System Architecture Description of Process Phases Phase I: Transaction Data Encryption Phase II: Payment Page Call Phase III: Communication of Transaction Result Response to Merchant Response to Buyer Phase IV: Decryption of Transaction Result Authentication Structure of Transaction Data Transaction Data to Send to GestPay...13 Transaction Data Received by GestPay Merchant s Profile Authentication Configuration Configuration of response url and Configuration of Fields & Parameters Description of GestPayCrypt Object WebService...23 Instructions for use of encryption module with WEBSERVICE interface...23 List of calls available with WSCryptDecrypt webservice Software requirements Buyer browser requirements Merchant server requirements Installation of GestPayCrypt.class (Java) Installation of GestPayCrypt.dll (COM) Example transactions Transaction number Transaction number Examples of implementation Table of errors Table of currency codes Table of language codes Table of Verified by Visa codes Payment orders in test environment Links...46 Page 2 of 46

3 Document Information Project name: Title: Creation date Language: Company: GestPay GestPay - Security with Encryption Technical Specifications Marco Loro English EasyNolo Page 3 of 46

4 Version Information Version Description Date Author Initial version Sellanet Handling of TransactionResult attribute Sellanet Chapter 2, list corrected GestPay url modified Sellanet Document totally revised Sellanet Browser requirements updated Sellanet Server requirements updated Sellanet Custom field requirements updated Sellanet Error Codes updated Sellanet Language Codes updated Sellanet Custom code requirements and gestpay Sellanet parameters updated Currency codes updated Sellanet D Secure Sellanet Errata Corrige Easy Nolo S.p.A Specific domain for test codes Easy Nolo S.p.A. introduced New 3DLevel response parameter Easy Nolo S.p.A. introduced 2.1 Webservice Encryption Specifications EasyNolo S.p.a Payment page URL updated EasyNolo S.p.A. Page 4 of 46

5 1 Introduction The purpose of this document is to illustrate the architectural and functional aspects of the GestPay platform and to provide the necessary indications regarding the interface. The chapter System architecture describes the various components of the system and the modes of interaction between them and between the parties involved (merchant, buyer and GestPay). The chapter Description of process phases details all of the phases that make up the payment process, in particular the information that must be passed to GestPay and the information that will be returned. The chapter Authentication describes how GestPay authenticates the merchant server that makes calls to the system. The chapter Payment transaction data structure describes the information that identifies a payment transaction and the result that GestPay returns after processing the transaction. The chapter Merchant profile describes how to configure the merchant profile that allows GestPay to process transactions correctly. The chapter GestPayCrypt object description examines the use of the component that handles server-to-server communication during the phases in which this kind of communication is sent between the server that receives the virtual shop as guest and GestPay. The chapter WebService focuses on the use of the webservice responsible for handling the encryption and decryption services substituting the GestpayCrypt object described above between the server which hosts the virtual store and GestPay. The chapter Software requirements illustrates the minimum requirements for installation of the software required to interface with GestPay. The chapter Example transactions describes a number of typical transactions, highlighting the information exchanged and the modes of interaction between the various components. In addition, there are some tables that make it possible to code certain information sent by or received from GestPay. Page 5 of 46

6 2 System Architecture Within the system architecture, 3 components can be identified: Buyer client Merchant Server GestPay Server Communication between the various components takes place over the Internet using the http or https protocols (the GestPay server has a 128-bit Verisign digital certificate). The payment process is split into communication steps in which the components interact, exchanging the information needed to complete the transaction. Merchant 1 4 8b Customer 2 7a 9b 3 6 8a 10b PRE-payment POST-payment Request Responses GestPay Architecture scheme 1. The buyer selects the items to buy and decides to proceed with payment. 2. The merchant s server contacts GestPay server via the Internet to encrypt the payment transaction data. 3. GestPay performs the necessary controls to authenticate the merchant s server and validate the transaction data, returning, in the event of an affirmative response, an encrypted parameter string that represents the payment transaction to be processed. 4. The encrypted parameter string is communicated to the customer s browser. The customer is directed to the GestPay server to complete the payment process. 5. The merchant s browser calls back the payment page, passing the encrypted parameter string and the code assigned to the merchant (Shop Login). Data security checks are performed on the transaction: if the checks are passed, the payment page can be displayed and the the data needed to complete the transaction Page 6 of 46

7 can be entered. The following steps describe the process by which the transaction result is communicated both to the merchant and to the buyer. 6. GestPay communicates to the merchant s server an encrypted parameter string which returns the result of the transaction. 7a.The merchant s server contacts the GestPay server via Internet to decrypt the encrypted data string which returns the result of the transaction. 8a.GestPay decrypts the string and returns the parameters which return the result of the transaction in unencrypted form. 7b.GestPay communicates the encrypted parameter string which brings the transaction result to the browser of the customer, who is directed to the merchant s server. 8b.The buyer s browser calls back the response page created by the merchant, passing the encrypted parameter string. 9b.The merchant s server contacts the GestPay server via Internet to decrypt the encrypted data string that returns the transaction result. 10b. GestPay decrypts the string and returns, in unencrypted form, the parameters that return the transaction result, allowing the merchant to provide the buyer with the references required to complete the purchase process. The following scheme analyses the payment process, underlining the chronological order in which the communication steps take place. Notice that in some cases (steps 7 and 8) simultaneous communications are established between the components under consideration when they implement the procedures that must manage the information exchanged between the steps. Components GestPay Server Merchant Server Customer Client Step Page 7 of 46

8 3 Description of Process Phases A payment transaction is made up of 4 basic phases in which there are one or more communication steps. In each phase, the information necessary to process the transaction is exchanged between the various components. 3.1 Phase I: transaction data encryption The information required for the payment is previously communicated to GestPay to be encrypted. To guarantee an optimum security level, no sensitive information is communicated in unencrypted form to the buyer s server. In this phase, the merchant s server requests the encryption service from GestPay, obtaining the encrypted string that represents the transaction to process. The data that identify a transaction and their use will be described in chapter 4. Encryption can be handled in one of two ways: Use of the GestPayCrypt object Server-to-server communication is handled by the GestPayCrypt object released by EasyNolo, which must be previously installed on the merchant s server. The virtual shop pages concerned with handling information required for the payment call the object. Use of the WSCryptDecrypt WebService The use of the webservice does not require any installation on the server, but simply a call to the webservice using the https protocol. The response is in the XML format. If the merchant s authentication checks and validation of transaction data are passed, GestPay returns the encrypted data string to the merchant s server to be sent to the buyer s server to continue the payment process. Otherwise, a specific error code will be returned to allow the problem detected to be identified. 3.2 Phase II: payment page call After obtaining the encrypted data string (as described in the preceding section), the buyer s browser is directed to the payment page on the GestPay server at the following address: string> for test codes: string> The call to the page will be made passing two parameters: a The code identifying the merchant (Shop Login) b The encrypted data string identifying the transaction The payment page will acquire the parameters and verify the identity checks (parameter a must refer to a recognised merchant) and transaction data security (parameter b must Page 8 of 46

9 correspond to the encrypted data string communicated by the merchant during the previous phase). If the checks are passed, the payment page will be displayed to the buyer, who must enter the data required to complete the payment process. If the checks are not passed, the payment page is not displayed and the process passes to the following phase in order to communicate the negative transaction result. Page 9 of 46

10 3.3 Phase III: communication of transaction result GestPay communicates the transaction result both to the merchant and the buyer Response to merchant Notification is forwarded with a server-to-server call to the page specifically configured on the merchant s server (the notification page URL is one of the items of information that make up the merchant s profile, configurable through the GestPay Back Office environment). Call syntax is the following: server to server>?a=<shoplogin>&b=<encrypted string> The call to the page will be made passing two parameters: a the code which identifies merchant (Shop Login) b the encrypted data string which contains the result of the transaction The page residing on the merchant s server must have the html tags <HTML></HTML> in the source. If there are communication errors, GestPay will make several forwarding attempts for two days after the transaction. The merchant will also receive a transaction result notification at the address configured in his/her profile. In addition, the processed transaction can be viewed by accessing the GestPay Back Office environment in the Active Report section Response to Buyer GestPay immediately communicates the result of the transaction by displaying a virtual receipt showing essential transaction data. GestPay directs the buyer s browser to the merchant s server to conclude the purchasing process. The merchant must prepare two urls (and configure them in the merchant s profile) which will be called in the event of a negative or positive response and will allow the merchant to manage communication with the buyer while maintaining the editorial style that characterises the virtual shop. The call syntax is the following: merchant>?a=<shoplogin>&b=<encrypted string> If there is an anomaly in the server-to-server communication described above, GestPay displays a message to the buyer warning that there may be problems directing him/her to the merchant s server to conclude the purchasing process. In this situation, the buyer receives a notification from GestPay about the transaction result and is invited, if there are anomalies, to contact the merchant by other means (e.g. ) to conclude the purchasing process. The buyer will also receive a transaction result notification at the address provided on the payment page, if indicated. 3.4 Phase IV: decryption of transaction result GestPay communicates the transaction result through an encrypted string (parameter b of the call to the url preconfigured by the merchant). The string is initially forwarded to Page 10 of 46

11 the merchant during server-to-server communication and makes it possible once it has been decrypted to update the status of the transaction recorded in the merchant s information system. The same string is also sent from the buyer s browser to the merchant s server and makes it possible once it has been decrypted to complete the payment process. Web pages preconfigured by the merchant for receiving the transaction result (in the case of both server-to-server communication and through the buyer s browser) must call the GestPay server to request the decryption service and obtain the information that represents the result of the processed transaction in unencrypted form. The request to decrypt the string received can be made through: GestPayCrypt Object Server-to-server communication is handled by the GestPayCrypt object released by EasyNolo and which must be installed on the merchant s server in advance. WebService WSCryptDecrypt The use of the webservice does not require any installation on the server, but simply a call to the webservice using the https protocol. The response is in the XML format. Page 11 of 46

12 4 Authentication Server-to-server calls are managed by a component released by EasyNolo. Server authentication of the merchant requesting encryption or decryption services is made by verifying: Shop Login validity: ShopLogin parameter must correspond to a code recorded in GestPay customers details. IP address server: the calling server IP address must correspond to one of the IP addresses configured in the merchant s profile. Shop Login status: the merchant s status must be active (the merchant s status is managed by the GestPay administrator and not directly by the merchant) If the authentication checks are not passed, a specific error will be returned, making it possible to identify the anomaly found in the authentication process. Page 12 of 46

13 5 Structure of Transaction Data A transaction is characterised by a series of information that must be communicated to GestPay to complete the payment process and by information returned to the system as the transaction result. By suitably configuring his/her profile within the Back Office environment, the merchant can define what information to send to or receive from GestPay, and by what means. 5.1 Transaction Data to Send to GestPay Some of the information to communicate to GestPay is required in order to complete the payment Some information process, while that is other essential information to the payment can be process omitted is without configured compromising as compulsory the processing by GestPay. of This the attribute transaction.through cannot be modified. the GestPay Back Office environment, merchants The can define following what table information gives the is required information and what that must information be communicated is optional. to GestPay in order to make a transaction: Name Format Type R/O Description ShopLogin VarChar (30) P R ShopLogin Currency Num (3) P R Code identifying currency in which transaction amount is denominated (see Currency Codes table) Amount Num (9) P R Transaction amount. Do not insert thousands separator. Decimals (max. 2 numbers) are optional and separator is the point (see examples) ShopTransactionID VarChar (50) P R Identifier attributed to merchant s transaction CardNumber VarChar (20) I/P R Credit card number ExpMonth Char (2) I/P R Credit card expiry month (01, 02 12) ExpYear Char (2) I/P R Credit card expiry year (01, 02 99) BuyerName VarChar (50) I/P O Buyer s name and surname Buyer VarChar (50) I/P O Buyer s address Language Num (2) P O Code identifying language used in communication with buyer String containing specific CustomInfo (1) VarChar (1000) P O information as configured in the merchant s profile 1 Each field can be up to a maximum of 300 characters in length The Name column contains the attribute identifier with which a specific item of information is communicated to the GestPayCrypt object, which handles server-toserver communication for the encryption services. The Format column indicates whether the information value is numeric or alphanumeric. If it is alphanumeric, the maximum allowable number of characters is given in brackets. Page 13 of 46

14 The Type column specifies whether the information must be communicated to the component (passed as Parameter) or if it can be entered by the buyer (passed as Input) in the payment page. The R/O column specifies whether the information is Required (if omitted the transaction cannot be completed) or Optional. However, the minimum quantity of information configured, which allows phase I to be processed, is made up of: Currency Amount Shop TransactionID This information, in fact, is defined as required and must be communicated to GestPay using the GestPayCrypt component. During phase I, GestPay makes validation checks on the information that constitutes the payment transaction, verifying consistency with the merchant s profile setup. If anomalies are detected, the transaction is abandoned, returning a specific error. This approach makes it possible to identify possible anomalies connected with the transaction immediately, preventing the buyer from being directed to the payment page with an encrypted data string that corresponds to an invalid transaction. The CustomInfo attribute contains specific information that the merchant wishes to communicate to or receive from GestPay. What information is included in the CustomInfo attribute is defined in the Back Office environment in the Fields & Parameters section. The information included will follow this form: datum1=value1*p1*datum2=value2*p1* *P1*datumn=valuen The separator between logically different information is the reserved sequence of characters *P1*. Other characters that must not be used within the parameters encoded by GestPay and in customised information are: & (space) ( ) * < >, ; : *P1* / [ ]? = -- /* % // Page 14 of 46

15 Transaction data received by GestPay GestPay communicates the payment transaction result to the merchant through an encrypted data string that contains a series of information returned. Using the GestPayCrypt object, merchants will obtain the information reporting the transaction result in unencrypted form and will be able to update their own information system, allowing buyers to complete the purchasing process. The following table contains the information returned by GestPay as transaction result. Name Format Type R/O Description ShopLogin VarChar (30) P R ShopLogin Currency Num (3) P R Code identifying currency in which transaction amount is denominated (see Currency Codes table) Amount Num (9) P R Transaction amount. Do not insert thousands separator. Decimals (max. 2 numbers) are optional and separator is the point (see examples) ShopTransactionID VarChar (50) P R Identifier attributed to merchant s transaction BuyerName VarChar (50) I/P O Buyer s name and surname Buyer VarChar (50) I/P O Buyer s address TransactionResult Char (2) P R Transaction result AuthorizationCode VarChar (6) P R Transaction authorisation code BankTransactionID Num (9) P R Identifier attributed to the transaction by GestPay Nationality of institute issuing card Country VarChar (30) P O VbV VarChar (50) P O Flag for Verified by Visa transactions (see table of VbV Codes) ErrorCode Num (9) P R Error code ErrorDescription VarChar (255) P R Error description AlertCode Num (9) P O Alert code 3DLevel VarChar(255) P O Level of authentication for VBV Visa / Mastercard Securecode transactions. The string may have the value FULL or HALF AlertDescription VarChar (255) P O Alert description in chosen language CustomInfo (1) VarChar (1000) P O String that has the specific information as configured in the merchant s profile 1 Each field can be up to a maximum of 300 characters in length. The minimum information required to report the transaction result (defined as required) is made up of: Currency Amount ShopTransactionID TransactionResult AuthorizationCode ErrorCode Page 15 of 46

16 ErrorDescription BankTransactionID Other information is defined as optional and will be returned according to the merchant s profile settings made in the GestPay Back Office environment. A transaction result can be interpreted by verifying the TransactionResult field value. The possible values are: TransactionResult OK KO XX Description Positive transaction result Negative transaction result Suspended transaction result (only in the case of money transfers) Page 16 of 46

17 6 Merchant s Profile Each merchant can configure his/her profile by accessing the GestPay Back Office environment at: for test codes Some settings regard the procedure and the information that must be sent to or will be returned by GestPay. 6.1 Authentication configuration GestPay identifies the merchant requesting the encryption service through the GestPayCrypt component by comparing the calling server IP address to the IP addresses configured in the profile associated with the Shop Login used for the call. If the calling server is not recognised, the transaction process ends and a specific error is returned. In the Configuration IP Addresses section of the Back Office environment, the merchant can enter up to a maximum of 10 IP addresses (if calls to GestPay originate from a server farm). Configuration IP Addresses Page 17 of 46

18 6.2 Configuration of response url and GestPay communicates the transaction result with a server-to-server call to the page specifically prepared by the merchant and by directing the buyer s browser to the pages configured by the merchant (different pages for positive or negative results). In the Configuration Responses section in the Back Office environment, it is possible to specify the URLs used by the system to communicate the transaction result. In this section it is also possible to specify the addresses that will be used for notifications via . Configuration Responses Page 18 of 46

19 6.3 Configuration of Fields & Parameters Merchants can define the transaction structure (specifying what information beside the required information will have to be sent to GestPay) by configuring in the Back Office environment what information is to be sent in phase I and what information must be returned when the transaction result is communicated. This system allows the merchant to customise the transaction structure with proprietary information that will be stored in the GestPay archives and will allow each transaction to be identified using customised search keys. Moreover, customised information can be returned with the transaction result communication, thus allowing the merchant s information system to manage this information appropriately. Merchant s profile configuration - Fields & Parameters Page 19 of 46

20 7 Description of GestPayCrypt Object Server-to-server communication between GestPay and merchant is automatically handled by the GestPayCrypt component released by EasyNolo. This component is a Java library that will be called by the web pages preconfigured by the merchant to handle encryption of the transaction data and decryption of the result communicated by GestPay. The GestPayCrypt library is available as open source on the EasyNolo website. Table 1 contains the attributes and the methods made available by the Java library. In the virtual shop pages configured to handle payments the merchant implements a call to the GestPayCrypt component which handles requests to use the GestPay encryption service. Class attributes will be filled in with data that identify the transaction. To request the encryption service it is necessary to call the Encrypt method. If the encryption operation has concluded correctly (value of ErrorCode attribute = 0), the encrypted data string returned by GestPay will be available by reading the EncryptedString attribute value. Otherwise, the values of the ErrorCode and ErrorDescription attributes will allow the reasons that have prevented the encryption operation to be identified. To request the decryption service, it is necessary to call the Decrypt method, after filling in the Shop Login and EncryptedString attributes with values communicated by GestPay in Phase III. Information containing the result of the transaction will be available by reading the Java library attributes that correspond to the information regarding the transaction result. Page 20 of 46

21 The attributes and methods of the GestPayCrypt Java library are described below: Class: GestPayCrypt Attributes AlertCode AlertDescription Amount AuthorizationCode BankTransactionID Buyer BuyerName CardNumber Country Currency CustomInfo CVV EncryptedString Encryption ErrorCode ErrorDescription ExpMonth ExpYear Language MIN PasswordEncrypt ShopLogin ShopTransactionID TransactionResult VBV VBVrisp 3DLevel SET Methods SetAmount (val) SetBuyer (val) SetBuyerName (val) SetCardNumber (val) SetCurrency (val) SetCustomInfo (val) SetCVV SetExpMonth (val) SetExpYear (val) SetEncryptedString (val) SetEncryption SetLanguage (val) SetMIN SetPasswordEncrypt SetShopLogin (val) SetShopTransactionID (val) SetWithoutEncryption Alert code Alert description Transaction amount Transaction authorisation code Identifier assigned to transaction by GestPay Buyer s address Buyer s name and surname Credit card number Nationality of institute issuing card Code identifying currency in which transaction amount is denominated String containing specific merchant information String containing value of Cvv2 / Cvc2 / 4dbc code of credit card Encrypted string Flag to activate local encryption Error code Error description Credit card expiry month Credit card expiry year Language code for communication with buyer Not used Password for local encryption Shop login identifying merchant Identifier assigned to transaction by merchant Transaction result Flag for Verified by Visa transactions Not used Level of authentication for Visa VBV / Mastercard Securecode transactions Used to set Amount attribute Used to set Buyer attribute Used to set BuyerName attribute Used to set CardNumber attribute Used to set Currency attribute Used to set CustomInfo attribute Used to set CVV attribute Used to set ExpMonth attribute Used to set ExpYear attribute Used to set EncryptedString attribute Used to set Encryption attribute to TRUE Used to set Language attribute Not used Used to set PasswordEncrypt attribute Used to set ShopLogin attribute Used to set ShopTransactionID attribute Used to set Encryption attribute to FALSE Page 21 of 46

22 GET methods Decrypt Encrypt GetAlertCode GetAlertDescription GetAmount GetAuthorizationCode GetBankTransactionID GetBuyer GetBuyerName GetCountry GetCurrency GetCustomInfo GetEncryptedString GetErrorCode GetErrorDescription GetShopLogin GetShopTransactionID GetTransactionResult GetVBV GetVBVrisp Get3DLevel Used to request encryption service attribute Used to request decryption service attribute Used to read AlertCode attribute attribute Used to read AlertDescription attribute Used to read Amount attribute Used to read AuthorizationCode attribute Used to read BankTransactionID attribute Used to read Buyer attribute Used to read BuyerName attribute Not used Used to read Currency attribute Used to read CustomInfo attribute Used to read EncryptedString attribute Used to read ErrorCode attribute Used to read ErrorDescription attribute Used to read ShopLogin attribute Used to read ShopTransactionID attribute Used to read TransactionResult attribute Used to read VbV attribute Not used Used to read 3DLevel attribute Page 22 of 46

23 8 Webservice Instructions for the use of the encryption module with the WEBSERVICE interface This document contains the necessary instructions for using the WSCryptDecrypt webservice. This component is a library that must be called from the web pages configured by the merchant to handle transaction data encryption and decryption of the result communicated by GestPay. The WSCryptDecrypt web service is available on the production and test servers and does not require any installation on the merchant s server. The merchant must implement in the page(s) of the virtual store configured to handle payments a call to the webservice which handles requests to use the GestPay encryption service. To request the encryption service it is necessary to call the Encrypt method. An example of a positive XML response returned by the web service is given below: <?xml version="1.0" encoding="utf-8"?> <GestPayCryptDecrypt> <TransactionType>ENCRYPT</TransactionType> <TransactionResult>OK</TransactionResult> <CryptDecryptString>CF66F38B4EC881.</CryptDecryptstring> <ErrorCode>0</ErrorCode> <ErrorDescription /> </GestPayCryptDecrypt> If the encryption operation is concluded correctly (TransactionResult value = OK), the encrypted data string returned by GestPay will be available by reading the value of the CryptDecryptString attribute. If this is not the case, the values of the ErrorCode and ErrorDescription attributes will make it possible to identify the reasons that prevented the encryption operation. To request the decryption service it is necessary to call the Decrypt method, passing the Shoplogin and EncryptedString attributes with the values communicated by GestPay in Phase III. The information containing the transaction result will be available by reading the information in the XML response file corresponding to the result of the transaction. The webservice must be called from the application configured by the merchant to handle the sending of transaction data and reading the result communicated by GestPay in XML format. The address of the service is the following URL: for test codes Page 23 of 46

24 Generation of Proxy Class to use webservice functions from various languages The proxy class in the chosen language can be created automatically through the wsdl.exe program (in this case provided by Microsoft) simply by specifying the contract file relating to the webservice, in this case: The addresses of descriptions of the service are found at the following URLs: For production codes: For test codes: For example: wsdl /language:vb /out: wss2sproxyclass.vb The.vb file will be generated, with handling of the proxy class relating to the webservice which will simply be imported into the project and used. With visual Studio.net it is possible to add the webservice references in order to have the classes of the referenced webservice automatically available in the project (see Add Web Reference ). For other languages, verify normal operations for interfacing with webservices. Page 24 of 46

25 List of calls available with WSCryptDecrypt webservice. A complete list of methods for the WSCryptDecrypt object is provided below. WEBService methods Method name Encrypt Decrypt Description Encryption Decryption The various method calls are handled as function calls to the web service without passing an XML string. The values of the various calls must be passed as parameters. Input parameters, Encrypt method Method name Description ShopLogin Used to set value of ShopLogin attribute UICCode Assigns currency code Amount Assigns transaction amount ShopTransactionID (val) Assigns code attributed by merchant to transaction CardNumber (val) Assigns card number ExpMonth (val) Assigns card expiry month ExpYear (val) Assigns card expiry year BuyerName (val) Assigns buyer s name Buyer Assigns buyer s Language (val) Assigns language for s to buyer CVV (val) Assigns security code printed on card CustomInfo (val) Assigns string containing any customised parameters Input parameters, Decrypt method Method name ShopLogin CryptedString Description Used to set value of ShopLogin attribute String to decrypt received from GestPay Page 25 of 46

26 Il file XML e descritto e può essere validato tramite il relativo file GestPayCryptDecrypt.xsd che qui andiamo a descrivere nel dettaglio XML values returned Method name TransactionType TransactionResult (E,D) CryptDecryptString (E) ShopTransactionID (D) BankTransactionID (D) AuthorizationCode (D) Currency (D) Amount (D) Country (D) CustomInfo (D) BuyerType (D) ErrorCode (E,D) ErrorDescription (E,D) AlertCode (D) AlertDescription (D) Description The type of request executed can have the following values: ENCRYPT (E) DECRYPT (D) Returns result of transaction with values OK and KO Returns encrypted string Returns code attributed by merchant to transaction Returns code attributed by bank to transaction Returns authorisation code Returns currency code Returns transactio amount Returns nationality of institute issuing card Returns any aditional parameters Returns buyer s name and address, separated as follows: Buyer Returns buyer s address BuyerName Returns buyer s name Returns a code referring to result of transaction Returns description associated with value of ErrorCode Returns code for violation of risk management criteria Returns description associated with value of AlertCode Page 26 of 46

27 Doc: GestPay - Security with Encryption Technical Specications 9 Software Requirements GestPay software requirements concern the buyer s browser and the server hosting the virtual store. 9.1 Buyer browser requirements The domain is associated with a 128-bit Verisign The digital buyer s certificate. browser Browsers must be must configured be compatible to accept cookies with this and level Javascript. of encryption. The minimum recommended required versions are Internet Explorer 4.0 and Netscape Merchant server requirements Check with the server administrator that the computer can reach the following addresses: If http (port 80) communication is used: For test codes: If https (port 443) communication is used: For test codes: Installation of GestPayCrypt.class (Java) The GestPayCrypt Java library (GestPayCrypt. class) must be copied into the web server directory containing the Java libraries. For example, in a system with architecture based on Windows NT and Internet Information Server it must be installed in the following directory:...\java\trustlib On the web server that hosts web pages that call the GestPayCrypt library, Java Virtual Machine (from version on) must be installed. Page 27 of 46

28 Doc: GestPay - Security with Encryption Technical Specications Installation of GestPayCrypt.dll (COM) The COM object can be installed only in Windows environments (NT 4.0 or above; MTS; IE 4.x or above installed with Microsoft VM Java), saved at any location on the disk and subsequently registered using one of the following operations: Windows NT from the command prompt using the command: REGSVR32 path (e.g. c:\winnt\system32\gestpaycrypt.dll) Note. For Windows Server 2003 and Windows Xp versions this registration method is not recommended. Through Com+ (for Windows 2000 or above) or MTS (for NT 4.0) Path: Left panel consoleroot /Microsoft transaction server/computer/mycomputer (or other computer name)/packages Installed Right-click > Create new package (taking care not to use Interactive User, but assign an account with sistem administrator privileges for the package) Open the package /Components Right-click > New Component > Install new component >Add Select the Dll OK Note. For more information consult the Microsoft website at the following address: Page 28 of 46

29 Doc: GestPay - Security with Encryption Technical Specications Windows 2003 Follow the manual available at the following address: Page 29 of 46

30 Doc: GestPay - Security with Encryption Technical Specications 10 Example Transactions This chapter describes a number of significant examples of interfacing with Gestpay. The ShopLogin used in the examples is The merchant s profile is the following: Merchant s Profile IP Address Server-to-server Communication Url Url for positive responses Url for negative responses for sending OK result result_ok@myshop.com for sending KO result result_ko@myshop.com for sending information info@myshop.com 9.1 Transaction # 1 The merchant decides to communicate to GestPay only the essential information to allow the buyer to make the payment. The payment page must be displayed to the buyer who enters the sensitive data requie to complete the payment in protected (SSL 128-bit) mode. The transaction to process has the following characteristics: Merchant s Transaction Shop Transaction ID 34az85ord19 Transaction Amount Currency Transaction euro Let us suppose that the transaction is concluded positively (payment will be made), returning the following result: Result Authorisation code 54e813 Bank transaction ID 216 In the following pages, each individual phase that makes up the payment process will be described, highlighting the information exchanged between GestPay and the merchant s server. Page 30 of 46

31 Phase I The merchant s server communicates the information that characterises the transaction to GestPay, setting the value of the GestPayCrypt attributes: GestPayCrypt ShopLogin Currency 242 Amount ShopTransactionID 34az85ord19 Language 2 GestPay authenticates the calling server and validates the information characterising the transaction. If the checks are passed, it returns an encrypted string to GestPay: Encrypted Data String ShopLogin EncryptString 2C53F1B5... Phase II The buyer s server is directed to the GestPay server to complete the payment process. The call to the payment page is made passing two parameters that correspond to the shop login and to the encrypted data string received in the previous phase by GestPay: Payment page Url GestPay authenticates the Shop login (parameter a) and performs security checks on the encrypted data string (parameter b). If the checks are passed, the payment page is displayed to the buyer, who can enter the data necessary to complete the payment. Otherwise, an error will be communicated. Phase III After processing the transaction, GestPay communicates the transaction result (encrypted data string) to the merchant. Server-to-server communication After server-to-server communication has concluded positively, GestPay directs the buyer s browser to the merchant s server (in this case to the Url for positive responses). If this is not the case, the buyer is informed that it is not possible to direct him/her to the merchant s server to conclude the purchasing process. Page 31 of 46

32 Redirection of buyer s client The transaction result is also communicated to the merchant via . Send Result_OK@myshop.com Phase IV GestPay communicates the transaction result to the merchant, sending an encrypted data string. Using the GestPayCrypt object, the merchant must request the string decryption service to interpret the transaction result correctly and update the information in his/her own information system, thus allowing the buyer to complete the purchasing process. The merchant s server communicates the encrypted data string containing the transaction result to GestPay, through GestPayCrypt. Encrypted Data String ShopLogin EncryptedString 4D341A8B... GestPay authenticates the calling server and the integrity of the encrypted data string. If the controls are passed, it returns the unencrypted information to GestPayCrypt allowing the merchant to interpret the transaction result correctly: GestPay Result ShopLogin Currency 242 Amount ShopTransactionID 34az85ord19 TransactionResult OK AuthorizationCode 54e813 BankTransactionID 216 ErrorCode 0 ErrorDescription Transaction Executed Page 32 of 46

33 10.2 Transaction #2 The merchant decides to communicate to GestPay not only the information that is indispensable to allow the buyer to make the payment, but also the buyer s name, surname and address (this information is suggested by default on the payment page so that the buyer does not need to enter it a second time). Other customised information is sent by the merchant (the client code attributed to the buyer and technical information). The payment page must be displayed to the buyer who enters any sensitive data necessary to complete the payment in protected mode (128 bit SSL). In addition, one of the customised items of information (client code) must be displayed on the payment page. The transaction to process has the following characteristics: Transaction Shop Transaction ID 34az85ord19 Transaction Amount Currency Transaction Euro Language Spanish Buyer s Name and Surname Mario Bianchi Buyer s Address mario.bianchi@isp.it Customised info 1 BV_CODCLIENTE=12 Customised info 2 BV_SESSIONID=398 We shall assume that the transaction is concluded positively (payment is made), reporting the following result: Result Authorisation code 9823y5 Bank transaction ID 860 The following pages describe each individual phase that makes up the payment process, highlighting the information exchanged between GestPay and the merchant s server. Phase I The merchant s server communicates the information that characterises the transaction to GestPay, setting the value of the GestPayCrypt attributes: GestPayCrypt ShopLogin Currency 242 Amount 15.6 ShopTransactionID 34az85ord19 Language 3 BuyerName Mario Bianchi Buyer mario.bianchi@isp.it CustomInfo BV_CODCLIENTE=12*P1*SESSIONID=398 Page 33 of 46

34 GestPay authenticates the calling server and validates the information that characterises the transaction. If the controls are passed, it returns an encrypted string to GestPay: Encrypted Data String ShopLogin EncryptString 30715CA8.. Phase II The buyer s server is directed to the GestPay server to complete the payment process. The call to the payment page is made passing two parameters that correspond to Shop login and to the encrypted data string received in the previous phase by GestPay: Payment page Url GestPay verifies the Shop login (parameter a) and performs security checks on the encrypted data string (parameter b). If the checks are passed, the buyer, who can now enter the data necessary to complete the payment, views the payment page. If the checks are not passed, an error will be communicated. Phase III After processing the transaction, GestPay communicates the transaction result (encrypted data string) to the merchant. Server-to-server communication After server-to-server communication has concluded positively, GestPay directs the buyer s browser to the merchant s server (in this case to the Url for positive responses). If this is not the case, the buyer is informed that it is not possible to direct him/her to the merchant s server to complete the purchasing process. Redirection of Buyer s Client F45E129A... The transaction result is also communicated to the merchant and the buyer via . Send result_ok@myshop.com mario.bianchi@isp.it Page 34 of 46

35 Phase IV GestPay communicates the transaction result to the merchant, sending an encrypted data string. Using the GestPayCrypt object, the merchant must request string encryption to interpret the transaction result correctly and update the information in his/her own system, thus allowing the buyer to complete the purchasing process. The merchant s server communicates the encrypted data string containing the transaction result to GestPay, through GestPayCrypt. Encrypted Data String ShopLogin EncryptedString 6C12459A... GestPay authenticates the calling server and checks the encrypted data string. If the checks are passed, it returns an unencrypted data string containing the transaction result: GestPay Result ShopLogin Currency 242 Amount 15.6 ShopTransactionID 34az85ord19 TransactionResult OK AuthorisationCode 9823y5 BankTransactionID 860 CustomInfo BV_CODCLIENTE=12*P1*SESSIONID=398 ErrorCode 0 ErrorDescription Transaction Executed Page 35 of 46

36 11 Examples of Implementation This chapter describes an example of interfacing with GestPay created using the ASP language. Working scripts created using some of the most widely distributed development languages (ASP,JSO,PHP ) can be downloaded from ASP Example PAGE FOR CONNECTING TO PAYMENT PAGE (PAYMENT REQUEST) <% START OF ENCRYPTION SCRIPT DO NOT MODIFY THIS PART Set objcrypt = GetObject("java:GestPayCrypt") if Err.number <> 0 then Response.Write Err.number & Err.description end if MODIFY THIS PART (SETTING VALUES OF TRANSACTION ATTRIBUTES) Replace text contained between square brackets [] with data required to carry out transaction. The lines containing data marked as NOT REQUIRED must be deleted if not used REQUIRED FIELDS myshoplogin= [SHOP LOGIN] e.g mycurrency=[currency CODE] e.g. 242 for euro or 18 for lira myamount=[amount WITHOUT THOUSANDS SEPARATOR WITH POINT AS DECIMAL SEPARATOR] e.g myshoptransactionid= [TRANSACTION IDENTIFIER] e.g. 34az85ord19 FIELDS NOT REQUIRED (DELETE ANY LINES WHICH ARE NOT RELEVANT) mybuyername= [BUYER S NAME AND SURNAME] e.g. Mario Bianchi mybuyer = [BUYER S ] e.g. Mario.bianchi@isp.it mylanguage=[code FOR LANGUAGE TO USE IN COMMUNICATION] e.g. 3 for Spanish mycustominfo= [CUSTOMISED PARAMETERS] e.g. BV_CODCLIENTE=12*P1*BV_SESSIONID=398 Page 36 of 46

37 DO NOT MODIFY THIS PART objcrypt.setshoplogin(myshoplogin) objcrypt.setcurrency(mycurrency) objcrypt.setamount(myamount) objcrypt.setshoptransactionid(myshoptransactionid) objcrypt.setbuyername(mybuyername) objcrypt.setbuyer (mybuyer ) objcrypt.setlanguage(mylanguage) objcrypt.setcustominfo(mycustominfo) call objcrypt.encrypt if objcrypt.geterrorcode = 0 then b = objcrypt.getencryptedstring a = objcrypt.getshoplogin end if END OF ENCRYPTION SCRIPT. IF ALL OK 2 VARIABLES, A AND B, ARE OBTAINED, TO BE USED TO PASS PARAMETERS TO BANCA SELLA EXAMPLE WITH HTML FORM %> <form action= > <input name= a type= hidden value= <%=a%> > <input name= b type= hidden value= <%=b%> > <input type= submit value= OK > </form> Page 37 of 46

38 PAGE FOR HANDLING PAYMENT RESPONSE <% START OF DECRYPTION SCRIPT DO NOT MODIFY INPUT PARAMTERS ARE READ AND PARAMETER B IS DECRYPTED parameter_a = trim(request( a )) parameter_b = trim(request( b )) Set objdecrypt = GetObject("java:GestPayCrypt") if Err.number <> 0 then Response.Write Err.number & Err.description end if objdecrypt.setshoplogin(parameter_a) objdecrypt.setencryptedstring(parameter_b) call objdecrypt.decrypt THERE FOLLOWS A SERIES OF VARIABLES WHOSE VALUE IS SET TO THE DATA RECEIVED BY GESTPAY TO BE USED TO INTEGRATE WITH MERCHANT S OWN SYSTEM myshoplogin=trim(objdecrypt.getshoplogin) mycurrency=objdecrypt.getcurrency myamount=objdecrypt.getamount myshoptransactionid=trim(objdecrypt.getshoptransactionid) mybuyername=trim(objdecrypt.getbuyername) mybuyer =trim(objdecrypt.getbuyer ) mytransactionresult=trim(objdecrypt.gettransactionresult) myauthorizationcode=trim(objdecrypt.getauthorizationcode) myerrorcode=trim(objdecrypt.geterrorcode) myerrordescription=trim(objdecrypt.geterrordescription) myerrorbanktransactionid=trim(objdecrypt.getbanktransacti onid) myalertcode=trim(objdecrypt.getalertcode) myalertdescription=trim(objdecrypt.getalertdescription) mycustominfo=trim(objdecrypt.getcustominfo) END OF DECRYPTION SCRIPT %> Page 38 of 46

39 12 Table of Errors Code Description 0 Transaction correctly processed 57 Credit card frozen 58 Confirmed amount exceeds authorised amount 63 Demand for settlement of a non-existent transaction 64 Pre-authorisation expired 65 Incorrect currency 66 Pre-authorisation already notified 74 Authorisation denied 97 Authorisation denied 100 Transaction interrupted by bank authorisation system 150 Incorrect merchant configuration in bank authorisation system 208 Incorrect expiry date 212 Bank authorisation system unavailable 251 Insufficient credit 810 Bank authorisation system not available 811 Incorrect merchant configuration in bank authorisation system 901 Authorisation denied 902 Authorisation denied 903 Authorisation denied 904 Authorisation denied 905 Authorisation denied 906 Authorisation denied 907 Authorisation denied 908 Authorisation denied 910 Authorisation denied 911 Authorisation denied 913 Authorisation denied 914 Authorisation denied 915 Authorisation denied 916 Authorisation denied 917 Authorisation denied 918 Authorisation denied 919 Authorisation denied 920 Authorisation denied 950 Credit card not authorised 951 Incorrect merchant configuration in bank authorisation system 998 Incorrect credit card check-digit 999 Operation not performed 1100 Empty parameter string 1101 Invalid format of parameter string 1102 No parameter name precedes = symbol 1103 Parameter string ending with a separator 1104 Invalid parameter name Doc: GestPay - Security with Encryption Technical Specifications Page 39 of 46

GestPay Technical Specifications iframe Payment Page

GestPay Technical Specifications iframe Payment Page GestPay Technical Specifications iframe Payment Page Summary About this Document...4 About this version...5 1. Introduction... 6 2. System Architecture... 7 2.1 Architecture scheme... 7 3. Process phases

More information

Setting Up SSL on IIS6 for MEGA Advisor

Setting Up SSL on IIS6 for MEGA Advisor Setting Up SSL on IIS6 for MEGA Advisor Revised: July 5, 2012 Created: February 1, 2008 Author: Melinda BODROGI CONTENTS Contents... 2 Principle... 3 Requirements... 4 Install the certification authority

More information

Order Notifications - reporting a payment status

Order Notifications - reporting a payment status Corporate Gateway Order Notifications - reporting a payment status V5.0 May 2014 Use this guide to: Understand order notifications. Learn how to use the Order Notification Service. New to Order Notifications?

More information

MIGS Payment Client Installation Guide. EGate User Manual

MIGS Payment Client Installation Guide. EGate User Manual MIGS Payment Client Installation Guide EGate User Manual April 2004 Copyright The information contained in this manual is proprietary and confidential to MasterCard International Incorporated (MasterCard)

More information

InternetVista Web scenario documentation

InternetVista Web scenario documentation InternetVista Web scenario documentation Version 1.2 1 Contents 1. Change History... 3 2. Introduction to Web Scenario... 4 3. XML scenario description... 5 3.1. General scenario structure... 5 3.2. Steps

More information

New World Construction FTP service User Guide

New World Construction FTP service User Guide New World Construction FTP service User Guide A. Introduction... 2 B. Logging In... 4 C. Uploading Files... 5 D. Sending Files... 6 E. Tracking Downloads... 10 F. Receiving Files... 11 G. Setting Download

More information

PaperCut Payment Gateway Module - RBS WorldPay Quick Start Guide

PaperCut Payment Gateway Module - RBS WorldPay Quick Start Guide PaperCut Payment Gateway Module - RBS WorldPay Quick Start Guide This guide is designed to supplement the Payment Gateway Module documentation and provides a guide to installing, setting up and testing

More information

JPMorgan Chase Treasury Workstation. Certification Setup Guide Version 2.0

JPMorgan Chase Treasury Workstation. Certification Setup Guide Version 2.0 EMENTS JPMorgan Chase Treasury Workstation Certification Setup Guide Version 2.0 December 2010 TABLE OF CONTENTS Introduction... 1 About this Guide... 1 When to Create the Certificates... 2 Getting Help...

More information

COMMERCIAL-IN-CONFIDENCE

COMMERCIAL-IN-CONFIDENCE CardEaseMPI a technical manual describing the use of CardEaseMPI 3-D Secure Merchant Plug-In. Authors: Nigel Jewell Issue 2.9. November 2014. COMMERCIAL-IN-CONFIDENCE Copyright CreditCall Limited 2007-2014

More information

Merchant Card Payment Engine

Merchant Card Payment Engine Merchant Card Payment Engine GATEWAY FREEDOM +IMA 3D SECURE INTEGRATION SUPPLEMENT Copyright PayPoint.net 2010 This document contains the proprietary information of PayPoint.net and may not be reproduced

More information

STATISTICA VERSION 10 STATISTICA ENTERPRISE SERVER INSTALLATION INSTRUCTIONS

STATISTICA VERSION 10 STATISTICA ENTERPRISE SERVER INSTALLATION INSTRUCTIONS Notes: STATISTICA VERSION 10 STATISTICA ENTERPRISE SERVER INSTALLATION INSTRUCTIONS 1. The installation of the STATISTICA Enterprise Server entails two parts: a) a server installation, and b) workstation

More information

TOSHIBA GA-1310. Printing from Windows

TOSHIBA GA-1310. Printing from Windows TOSHIBA GA-1310 Printing from Windows 2009 Electronics for Imaging, Inc. The information in this publication is covered under Legal Notices for this product. 45081979 04 February 2009 CONTENTS 3 CONTENTS

More information

MT4 Multiterminal USER MANUAL

MT4 Multiterminal USER MANUAL MT4 Multiterminal USER MANUAL MT4 MultiTerminal User Manual 1. Getting Started... 3 1.1 General... 3 1.2 Security System... 3 1.3 Live Update... 3 1.4 Terminal Settings... 4 2. Client Accounts... 9 2.1

More information

Cloud Director User's Guide

Cloud Director User's Guide Cloud Director 1.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this

More information

Configuring Single Sign-on for WebVPN

Configuring Single Sign-on for WebVPN CHAPTER 8 This chapter presents example procedures for configuring SSO for WebVPN users. It includes the following sections: Using Single Sign-on with WebVPN, page 8-1 Configuring SSO Authentication Using

More information

Java SFA merchant integration guide

Java SFA merchant integration guide Java SFA merchant integration guide Installing the SFA JAVA Library Pre-requisites 1. The Merchant's machine where SFA will be installed should have JDK1.3 installed. 2. The Merchant must possess the

More information

Bitrix Site Manager 4.0. Quick Start Guide to Newsletters and Subscriptions

Bitrix Site Manager 4.0. Quick Start Guide to Newsletters and Subscriptions Bitrix Site Manager 4.0 Quick Start Guide to Newsletters and Subscriptions Contents PREFACE...3 CONFIGURING THE MODULE...4 SETTING UP FOR MANUAL SENDING E-MAIL MESSAGES...6 Creating a newsletter...6 Providing

More information

CA Clarity Project & Portfolio Manager

CA Clarity Project & Portfolio Manager CA Clarity Project & Portfolio Manager Using CA Clarity PPM with Open Workbench and Microsoft Project v12.1.0 This documentation and any related computer software help programs (hereinafter referred to

More information

API Integration Payment21 Button

API Integration Payment21 Button API Integration Payment21 Button The purpose of this document is to describe the requirements, usage, implementation and purpose of the Payment21 Application Programming Interface (API). The API will allow

More information

SysPatrol - Server Security Monitor

SysPatrol - Server Security Monitor SysPatrol Server Security Monitor User Manual Version 2.2 Sep 2013 www.flexense.com www.syspatrol.com 1 Product Overview SysPatrol is a server security monitoring solution allowing one to monitor one or

More information

Microsoft Dynamics GP Release

Microsoft Dynamics GP Release Microsoft Dynamics GP Release Workflow Installation and Upgrade Guide February 17, 2011 Copyright Copyright 2011 Microsoft. All rights reserved. Limitation of liability This document is provided as-is.

More information

Batch Processing. Specification. Version 4.1. 110.0087 SIX Payment Services

Batch Processing. Specification. Version 4.1. 110.0087 SIX Payment Services Batch Processing Specification Version 4.1 110.0087 SIX Payment Services Contents 1 Introduction... 3 1.1 Requirements... 3 1.2 Security and PCI DSS... 3 1.3 Other Information... 4 1.4 Supported Payment

More information

CA Performance Center

CA Performance Center CA Performance Center Single Sign-On User Guide 2.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is

More information

WebLogic Server 6.1: How to configure SSL for PeopleSoft Application

WebLogic Server 6.1: How to configure SSL for PeopleSoft Application WebLogic Server 6.1: How to configure SSL for PeopleSoft Application 1) Start WebLogic Server... 1 2) Access Web Logic s Server Certificate Request Generator page.... 1 3) Fill out the certificate request

More information

Cardsave Payment Gateway

Cardsave Payment Gateway Cardsave Payment Gateway Cart Implementation David McCann Cardsave Online Version 1 1 st August 2010 Contents Page Overview 3-4 o Integration Types 3 Direct/Integrated (Preferred Method) Re-direct/Hosted

More information

SharePoint Password Change & Expiration 3.0 User Guide

SharePoint Password Change & Expiration 3.0 User Guide SharePoint Password Change & Expiration 3.0 User Guide Copyright Copyright 2008-2013 BoostSolutions Co., Ltd. All rights reserved. All materials contained in this publication are protected by Copyright

More information

AS DNB banka. DNB Link specification (B2B functional description)

AS DNB banka. DNB Link specification (B2B functional description) AS DNB banka DNB Link specification (B2B functional description) DNB_Link_FS_EN_1_EXTSYS_1_L_2013 Table of contents 1. PURPOSE OF THE SYSTEM... 4 2. BUSINESS PROCESSES... 4 2.1. Payment for goods and services...

More information

Lepide Active Directory Self Service. Configuration Guide. Follow the simple steps given in this document to start working with

Lepide Active Directory Self Service. Configuration Guide. Follow the simple steps given in this document to start working with Lepide Active Directory Self Service Configuration Guide 2014 Follow the simple steps given in this document to start working with Lepide Active Directory Self Service Table of Contents 1. Introduction...3

More information

Bitrix Site Manager ASP.NET. Installation Guide

Bitrix Site Manager ASP.NET. Installation Guide Bitrix Site Manager ASP.NET Installation Guide Contents Introduction... 4 Chapter 1. Checking for IIS Installation... 5 Chapter 2. Using An Archive File to Install Bitrix Site Manager ASP.NET... 7 Preliminary

More information

E-payment. Service description

E-payment. Service description E-payment Service description Page 2 (15) Content 1 E-payment... 3 1.1 General description... 3 1.2 Advantages... 3 1.3 Availability... 3 1.4 Security... 3 2 Service agreement, instructions and start-up...

More information

PROCESS TRANSACTION API

PROCESS TRANSACTION API PROCESS TRANSACTION API Document Version 8.7 May 2015 For further information please contact Digital River customer support at (888) 472-0811 or support@beanstream.com. 1 TABLE OF CONTENTS 2 Lists of tables

More information

UPG plc Atlas Technical Integration Guide

UPG plc Atlas Technical Integration Guide UPG plc Atlas Technical Integration Guide Version 13.8.16 Released Aug 2013 Description Integrating your website or payment system into the UPG plc Atlas ecommerce gateway platform UPG Plc. version 13.8.16

More information

technical brief browsing to an installation of HP Web Jetadmin. Internal Access HTTP Port Access List User Profiles HTTP Port

technical brief browsing to an installation of HP Web Jetadmin. Internal Access HTTP Port Access List User Profiles HTTP Port technical brief in HP Overview HP is a powerful webbased software utility for installing, configuring, and managing networkconnected devices. Since it can install and configure devices, it must be able

More information

Xerox EX Print Server, Powered by Fiery, for the Xerox 700 Digital Color Press. Printing from Windows

Xerox EX Print Server, Powered by Fiery, for the Xerox 700 Digital Color Press. Printing from Windows Xerox EX Print Server, Powered by Fiery, for the Xerox 700 Digital Color Press Printing from Windows 2008 Electronics for Imaging, Inc. The information in this publication is covered under Legal Notices

More information

StruxureWare Power Monitoring 7.0.1

StruxureWare Power Monitoring 7.0.1 StruxureWare Power Monitoring 7.0.1 Installation Guide 7EN02-0308-01 07/2012 Contents Safety information 5 Introduction 7 Summary of topics in this guide 7 Supported operating systems and SQL Server editions

More information

SonicWALL Email Security Quick Start Guide. Version 4.6

SonicWALL Email Security Quick Start Guide. Version 4.6 SonicWALL Email Security Quick Start Guide Version 4.6 Quick Start Guide - Introduction This document guides you through the most basic steps to set up and administer SonicWALL Email Security. For more

More information

How to Order and Install Odette Certificates. Odette CA Help File and User Manual

How to Order and Install Odette Certificates. Odette CA Help File and User Manual How to Order and Install Odette Certificates Odette CA Help File and User Manual 1 Release date 24.02.2014 Contents Preparation for Ordering an Odette Certificate... 3 Step 1: Prepare the information you

More information

TIBCO Spotfire Automation Services Installation and Configuration

TIBCO Spotfire Automation Services Installation and Configuration TIBCO Spotfire Automation Services Installation and Configuration Software Release 7.0 February 2015 Updated March 2015 Two-Second Advantage 2 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES

More information

FileMaker 14. ODBC and JDBC Guide

FileMaker 14. ODBC and JDBC Guide FileMaker 14 ODBC and JDBC Guide 2004 2015 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker and FileMaker Go are trademarks of FileMaker,

More information

DiskPulse DISK CHANGE MONITOR

DiskPulse DISK CHANGE MONITOR DiskPulse DISK CHANGE MONITOR User Manual Version 7.9 Oct 2015 www.diskpulse.com info@flexense.com 1 1 DiskPulse Overview...3 2 DiskPulse Product Versions...5 3 Using Desktop Product Version...6 3.1 Product

More information

SharePoint Password Reset 1.0 User Guide

SharePoint Password Reset 1.0 User Guide SharePoint Password Reset 1.0 User Guide Copyright Copyright 2008-2013 BoostSolutions Co., Ltd. All rights reserved. All materials contained in this publication are protected by Copyright Law and no part

More information

Content Filtering Client Policy & Reporting Administrator s Guide

Content Filtering Client Policy & Reporting Administrator s Guide Content Filtering Client Policy & Reporting Administrator s Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION

More information

MasterCard In tern et Gatew ay Service (MIGS)

MasterCard In tern et Gatew ay Service (MIGS) Master Card Inter national MasterCard In tern et Gatew ay Service (MIGS) MIGS Payment Client Reference Manual Prepared By: Patrick Hayes Department: Principal Consultant, ebusiness Solutions Date Written:

More information

UBS KeyLink Quick reference WEB Installation Guide

UBS KeyLink Quick reference WEB Installation Guide ab UBS KeyLink Quick reference WEB Installation Guide Table of contents 1. Introduction 3 1.1. Why is an Installation needed? 3 1.2. Is UBS KeyLink secure? 3 1.3. Information about Secure Sockets Layer

More information

Integration Guide Last Revision: July 2004

Integration Guide Last Revision: July 2004 Last Revision: July 2004 PayPal Integration Guide 2004 PayPal, Inc. All Rights Reserved. PayPal and the PayPal logo are registered trademarks of PayPal, Inc. Designated trademarks and brands are the property

More information

Administrators Help Manual

Administrators Help Manual Administrators Help Manual Lepide Active Directory Self Service Lepide Software Private Limited Page 1 Administrators Help Manual for Active Directory Self-Service Lepide Active Directory Self Service

More information

Sage Pay Direct Integration and Protocol Guidelines 3.00. Published: 01/08/2014

Sage Pay Direct Integration and Protocol Guidelines 3.00. Published: 01/08/2014 Sage Pay Direct Integration and Protocol Guidelines 3.00 Published: 01/08/2014 Table of Contents Document Details 4 Version History 4 Legal Notice 4 1.0 Introduction 5 2.0 Overview of Direct Integration

More information

Virtual Payment Client Integration Reference. April 2009 Software version: 3.1.21.1

Virtual Payment Client Integration Reference. April 2009 Software version: 3.1.21.1 Virtual Payment Client Integration Reference April 2009 Software version: 3.1.21.1 Copyright MasterCard and its vendors own the intellectual property in this Manual exclusively. You acknowledge that you

More information

MGC WebCommander Web Server Manager

MGC WebCommander Web Server Manager MGC WebCommander Web Server Manager Installation and Configuration Guide Version 8.0 Copyright 2006 Polycom, Inc. All Rights Reserved Catalog No. DOC2138B Version 8.0 Proprietary and Confidential The information

More information

WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide

WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide This document is intended to help you get started using WebSpy Vantage Ultimate and the Web Module. For more detailed information, please see

More information

Process Transaction API

Process Transaction API Process Transaction API Document Version 5.9 March 2011 For further information please contact Beanstream customer support at (250) 472-2326 or support@beanstream.com. BEAN # Page 2 of 90 Date Overview...

More information

Nokia E90 Communicator Using WLAN

Nokia E90 Communicator Using WLAN Using WLAN Nokia E90 Communicator Using WLAN Nokia E90 Communicator Using WLAN Legal Notice Nokia, Nokia Connecting People, Eseries and E90 Communicator are trademarks or registered trademarks of Nokia

More information

MONETA.Assistant API Reference

MONETA.Assistant API Reference MONETA.Assistant API Reference Contents 2 Contents Abstract...3 Chapter 1: MONETA.Assistant Overview...4 Payment Processing Flow...4 Chapter 2: Quick Start... 6 Sandbox Overview... 6 Registering Demo Accounts...

More information

Virtual Data Centre. User Guide

Virtual Data Centre. User Guide Virtual Data Centre User Guide 2 P age Table of Contents Getting Started with vcloud Director... 8 1. Understanding vcloud Director... 8 2. Log In to the Web Console... 9 3. Using vcloud Director... 10

More information

September 2012 Page 1 of 12

September 2012 Page 1 of 12 Reference Guide SendSuite Shipping 6.80: Security Overview September 2012 Page 1 of 12 Purpose This document details the permissions required by SendSuite Shipping version 6.80. Document Contents SendSuite

More information

BZWBK24 Internet. How to access the Bank? Logging on to BZWBK24 Internet: Step-by-step instruction

BZWBK24 Internet. How to access the Bank? Logging on to BZWBK24 Internet: Step-by-step instruction BZWBK24 Internet BZWBK24 Internet is a service which offers quick and easy access to bank accounts using a personal computer connected to the Internet. This service ensures the most comprehensive access

More information

ResPAK Internet Module

ResPAK Internet Module ResPAK Internet Module This document provides an overview of the ResPAK Internet Module which consists of the RNI Web Services application and the optional ASP.NET Reservations web site. The RNI Application

More information

Description of Microsoft Internet Information Services (IIS) 5.0 and

Description of Microsoft Internet Information Services (IIS) 5.0 and Page 1 of 10 Article ID: 318380 - Last Review: July 7, 2008 - Revision: 8.1 Description of Microsoft Internet Information Services (IIS) 5.0 and 6.0 status codes This article was previously published under

More information

E-Commerce: Designing And Creating An Online Store

E-Commerce: Designing And Creating An Online Store E-Commerce: Designing And Creating An Online Store Introduction About Steve Green Ministries Solo Performance Artist for 19 Years. Released over 26 Records, Several Kids Movies, and Books. My History With

More information

Objectives. At the end of this chapter students should be able to:

Objectives. At the end of this chapter students should be able to: NTFS PERMISSIONS AND SECURITY SETTING.1 Introduction to NTFS Permissions.1.1 File Permissions and Folder Permission.2 Assigning NTFS Permissions and Special Permission.2.1 Planning NTFS Permissions.2.2

More information

Software Version 1.0 ConnectKey TM Share to Cloud April 2013. Xerox ConnectKey Share to Cloud User / Administrator s Guide

Software Version 1.0 ConnectKey TM Share to Cloud April 2013. Xerox ConnectKey Share to Cloud User / Administrator s Guide Software Version 1.0 ConnectKey TM Share to Cloud April 2013 Xerox ConnectKey Share to Cloud User / Administrator s Guide 2013 Xerox Corporation. All rights reserved. Xerox, Xerox and Design, and Xerox

More information

Novell Identity Manager

Novell Identity Manager AUTHORIZED DOCUMENTATION Manual Task Service Driver Implementation Guide Novell Identity Manager 4.0.1 April 15, 2011 www.novell.com Legal Notices Novell, Inc. makes no representations or warranties with

More information

ANZ egate Virtual Payment Client

ANZ egate Virtual Payment Client ANZ egate Virtual Payment Client Integration Notes Contents Purpose of notes 3 For enquiries and support 3 Contents of ANZ egate kit 3 Sample Codes 3 Bank Hosted, Merchant Hosted and Merchant Hosted with

More information

Fiery EX4112/4127. Printing from Windows

Fiery EX4112/4127. Printing from Windows Fiery EX4112/4127 Printing from Windows 2008 Electronics for Imaging, Inc. The information in this publication is covered under Legal Notices for this product. 45083884 01 April 2009 CONTENTS 3 CONTENTS

More information

Alpha e-pay v2 Merchant User Manual (v1.9)

Alpha e-pay v2 Merchant User Manual (v1.9) Alpha e-pay v2 Merchant User Manual (v1.9) Overview NOTE: Alpha e-pay, Alpha Bank s e-commerce solution, is currently using the DeltaPAY e- commerce platform. Therefore, Alpha e-pay and DeltaPAY are used

More information

FocusOPEN Deployment & Configuration Guide

FocusOPEN Deployment & Configuration Guide FocusOPEN Deployment & Configuration Guide Revision: 7 Date: 13 September 2010 Contents A. Overview...2 B. Target Readership...2 C. Prerequisites...2 D. Test Installation Instructions...2 1. Download the

More information

Oracle Forms Services Secure Web.Show_Document() calls to Oracle Reports

Oracle Forms Services Secure Web.Show_Document() calls to Oracle Reports Oracle Forms Services Secure Web.Show_Document() calls to Oracle Reports $Q2UDFOH7HFKQLFDO:KLWHSDSHU )HEUXDU\ Secure Web.Show_Document() calls to Oracle Reports Introduction...3 Using Web.Show_Document

More information

Easy Setup Guide for the Sony Network Camera

Easy Setup Guide for the Sony Network Camera -878-191-11 (1) Easy Setup Guide for the Sony Network Camera For setup, a computer running the Microsoft Windows Operating System is required. For monitoring camera images, Microsoft Internet Explorer

More information

Ipswitch Client Installation Guide

Ipswitch Client Installation Guide IPSWITCH TECHNICAL BRIEF Ipswitch Client Installation Guide In This Document Installing on a Single Computer... 1 Installing to Multiple End User Computers... 5 Silent Install... 5 Active Directory Group

More information

Manual. Netumo NETUMO HELP MANUAL WWW.NETUMO.COM. Copyright Netumo 2014 All Rights Reserved

Manual. Netumo NETUMO HELP MANUAL WWW.NETUMO.COM. Copyright Netumo 2014 All Rights Reserved Manual Netumo NETUMO HELP MANUAL WWW.NETUMO.COM Copyright Netumo 2014 All Rights Reserved Table of Contents 1 Introduction... 0 2 Creating an Account... 0 2.1 Additional services Login... 1 3 Adding a

More information

Address Phone & Fax Internet

Address Phone & Fax Internet Smilehouse Workspace 1.13 Payment Gateway API Document Info Document type: Technical document Creator: Smilehouse Workspace Development Team Date approved: 31.05.2010 Page 2/34 Table of Content 1. Introduction...

More information

This Annex uses the definitions set out in the Agreement on service of payment cards on the Internet (hereinafter the Agreement).

This Annex uses the definitions set out in the Agreement on service of payment cards on the Internet (hereinafter the Agreement). SERVICE OF PAYMENT CARDS ON THE INTERNET ANNEX 2 TO AGREEMENT Requirements for Queries to I-Payment Terminal This Annex uses the definitions set out in the Agreement on service of payment cards on the

More information

Title Page. Hosted Payment Page Guide ACI Commerce Gateway

Title Page. Hosted Payment Page Guide ACI Commerce Gateway Title Page Hosted Payment Page Guide ACI Commerce Gateway Copyright Information 2008 by All rights reserved. All information contained in this documentation, as well as the software described in it, is

More information

RMFT Outlook Add-In User Guide

RMFT Outlook Add-In User Guide RMFT Outlook Add-In User Guide Software Version 2.5 November 23, 2011 RepliWeb, Inc., 6441 Lyons Road, Coconut Creek, FL 33073 Tel: (954) 946-2274, Fax: (954) 337-6424 E-mail: info@repliweb.com, Support:

More information

vcloud Director User's Guide

vcloud Director User's Guide vcloud Director 5.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of

More information

Secret Server Installation Windows Server 2008 R2

Secret Server Installation Windows Server 2008 R2 Table of Contents Introduction... 2 ASP.NET Website... 2 SQL Server Database... 2 Administrative Access... 2 Prerequisites... 2 System Requirements Overview... 2 Additional Recommendations... 3 Beginning

More information

Clientless SSL VPN Users

Clientless SSL VPN Users Manage Passwords, page 1 Username and Password Requirements, page 3 Communicate Security Tips, page 3 Configure Remote Systems to Use Clientless SSL VPN Features, page 3 Manage Passwords Optionally, you

More information

Quadro Configuration Console User's Guide. Table of Contents. Table of Contents

Quadro Configuration Console User's Guide. Table of Contents. Table of Contents Epygi Technologies Table of Contents Table of Contents About This User s Guide... 3 Introducing the Quadro Configuration Console... 4 Technical Specification... 6 Requirements... 6 System Requirements...

More information

Fraud Detection. Configuration Guide for the Fraud Detection Module v.4.2.0. epdq 2014, All rights reserved.

Fraud Detection. Configuration Guide for the Fraud Detection Module v.4.2.0. epdq 2014, All rights reserved. Configuration Guide for the Fraud Detection Module v.4.2.0 Table of Contents 1 What is the... Fraud Detection Module? 4 1.1 Benefits 1.2 Access 1.3 Contents... 4... 4... 4 2 Fraud detection... activation

More information

Enterprise Manager. Version 6.2. Installation Guide

Enterprise Manager. Version 6.2. Installation Guide Enterprise Manager Version 6.2 Installation Guide Enterprise Manager 6.2 Installation Guide Document Number 680-028-014 Revision Date Description A August 2012 Initial release to support version 6.2.1

More information

Fraud Detection Module (basic)

Fraud Detection Module (basic) Table of contents 1. Introduction 1.1 Benefits 1.2 Contents 2. Activation and configuration 2.1 Blocking rules 2.1.1 Card country 2.1.2 IP address country 2.1.3 Country consistency 2.1.4 3-D Secure 2.2

More information

MiGS PC Integration Guide. November 2008 Software version: 3.1.21.0

MiGS PC Integration Guide. November 2008 Software version: 3.1.21.0 MiGS PC Integration Guide November 2008 Software version: 3.1.21.0 Copyright MasterCard and its vendors own the intellectual property in this Manual exclusively. You acknowledge that you must not perform

More information

MiGS Virtual Payment Client Integration Guide. July 2011 Software version: MR 27

MiGS Virtual Payment Client Integration Guide. July 2011 Software version: MR 27 MiGS Virtual Payment Client Integration Guide July 2011 Software version: MR 27 Copyright MasterCard and its vendors own the intellectual property in this Manual exclusively. You acknowledge that you must

More information

EPM Performance Suite Profitability Administration & Security Guide

EPM Performance Suite Profitability Administration & Security Guide BusinessObjects XI R2 11.20 EPM Performance Suite Profitability Administration & Security Guide BusinessObjects XI R2 11.20 Windows Patents Trademarks Copyright Third-party Contributors Business Objects

More information

Refer to the Integration Guides for the Connect solution and the Web Service API for integration instructions and issues.

Refer to the Integration Guides for the Connect solution and the Web Service API for integration instructions and issues. Contents 1 Introduction 4 2 Processing Transactions 5 2.1 Transaction Terminology 5 2.2 Using Your Web Browser as a Virtual Point of Sale Machine 6 2.2.1 Processing Sale transactions 6 2.2.2 Selecting

More information

Secure XML API Integration Guide. (with FraudGuard add in)

Secure XML API Integration Guide. (with FraudGuard add in) Secure XML API Integration Guide (with FraudGuard add in) Document Control This is a control document DESCRIPTION Secure XML API Integration Guide (with FraudGuard add in) CREATION DATE 02/04/2007 CREATED

More information

NATIONAL BANK s MasterCard SecureCode / Verified by VISA Service - Questions and Answers

NATIONAL BANK s MasterCard SecureCode / Verified by VISA Service - Questions and Answers Learn more about MasterCard SecureCode / Verified by VISA service of NATIONAL BANK. You can use the links below to jump to specific topics, or scroll down the page to read the full list of questions and

More information

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise

More information

e Merchant Plug-in (MPI) Integration & User Guide

e Merchant Plug-in (MPI) Integration & User Guide e Merchant Plug-in (MPI) Integration & User Guide Enabling merchants to integrate their payment processing with SECPay s 3-D Secure Merchant Plug In (MPI) solution. This document provides the details of

More information

Administrator Guide. v 11

Administrator Guide. v 11 Administrator Guide JustSSO is a Single Sign On (SSO) solution specially developed to integrate Google Apps suite to your Directory Service. Product developed by Just Digital v 11 Index Overview... 3 Main

More information

I. Payment request by WEB merchant II. Payment request by WEB merchant (direct credit card payment) III. Payment request - "Free transfer"

I. Payment request by WEB merchant II. Payment request by WEB merchant (direct credit card payment) III. Payment request - Free transfer epay.bg communication package for merchants I. Payment request by WEB merchant II. Payment request by WEB merchant (direct credit card payment) III. Payment request - "Free transfer" epay.bg communication

More information

Server Installation Guide ZENworks Patch Management 6.4 SP2

Server Installation Guide ZENworks Patch Management 6.4 SP2 Server Installation Guide ZENworks Patch Management 6.4 SP2 02_016N 6.4SP2 Server Installation Guide - 2 - Notices Version Information ZENworks Patch Management Server Installation Guide - ZENworks Patch

More information

How to Order and Install Odette Certificates. Odette CA Help File and User Manual

How to Order and Install Odette Certificates. Odette CA Help File and User Manual How to Order and Install Odette Certificates Odette CA Help File and User Manual 1 Release date 28.07.2014 Contents Preparation for Ordering an Odette Certificate... 3 Step 1: Prepare the information you

More information

Practice Fusion API Client Installation Guide for Windows

Practice Fusion API Client Installation Guide for Windows Practice Fusion API Client Installation Guide for Windows Quickly and easily connect your Results Information System with Practice Fusion s Electronic Health Record (EHR) System Table of Contents Introduction

More information

NeoMail Guide. Neotel (Pty) Ltd

NeoMail Guide. Neotel (Pty) Ltd NeoMail Guide Neotel (Pty) Ltd NeoMail Connect Guide... 1 1. POP and IMAP Client access... 3 2. Outlook Web Access... 4 3. Outlook (IMAP and POP)... 6 4. Outlook 2007... 16 5. Outlook Express... 24 1.

More information

The full setup includes the server itself, the server control panel, Firebird Database Server, and three sample applications with source code.

The full setup includes the server itself, the server control panel, Firebird Database Server, and three sample applications with source code. Content Introduction... 2 Data Access Server Control Panel... 2 Running the Sample Client Applications... 4 Sample Applications Code... 7 Server Side Objects... 8 Sample Usage of Server Side Objects...

More information

TIBCO Spotfire Web Player 6.0. Installation and Configuration Manual

TIBCO Spotfire Web Player 6.0. Installation and Configuration Manual TIBCO Spotfire Web Player 6.0 Installation and Configuration Manual Revision date: 12 November 2013 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED

More information

Using Microsoft Windows Authentication for Microsoft SQL Server Connections in Data Archive

Using Microsoft Windows Authentication for Microsoft SQL Server Connections in Data Archive Using Microsoft Windows Authentication for Microsoft SQL Server Connections in Data Archive 2014 Informatica Corporation. No part of this document may be reproduced or transmitted in any form, by any means

More information