CVR Online User Guide. June 2009

Size: px
Start display at page:

Download "CVR Online 3.0. - User Guide. June 2009"

Transcription

1 CVR Online User Guide June 2009

2 Version Dato Beskrivelse Forfatter Version December 2007 Creation Erik W. Rasmussen Version January 2008 Added payment information. Changed various formulations. Erik W. Rasmussen Version April 2008 Changed various URLs Erik W. Rasmussen Version July 2008 Added access via SSL. Fixed metadata URL s. Erik W. Rasmussen Version August 2008 OIOWSDL reference added. Erik W. Rasmussen Version May 2009 Added access via client authenticated SSL. Removed WS- Security access description. Erik W. Rasmussen Version June 2009 Added reference to OSWA Model T Erik W. Rasmussen 2

3 Table of contents 1 Introduction Definition WSDL Other URL s Further information Data model Introduction Temporal data The basic model Details in the model Common data types for legal unit and production unit Legal unit Production unit Participant Main description of the web services Introduction Access Web services for searching Web services for retrieval Security Introduction Usage of SSL Error handling Introduction Fatal errors Other errors XML Examples Appendix I: Structure of unique identifiers Introduction Legal unit identifier Example Production unit identifier Example Participant identifier Appendix II: Code example of SSL access

4 1 Introduction 1.1 Definition CVR Online 3.0 is a collection of stateless SOAP based web services that provide access to some of the data from the CVR system (in Danish: Det Centrale Virksomhedsregister). It is a requirement that one has a subscription in order to use these web services. 1.2 WSDL The web services are defined by a number WSDL files. They can be found at the site along with other information 1. The individual WSDL files are complete in the sense that they contain all used types, i.e. all XML Schema definitions are embedded in the files. All XML Schema definitions conform to the rules specified by Offentlig Information Online (OIO). These rules among other things require that all the XML Schema definitions must be published along with separate metadata files containing a textual description of the type definition. 1.3 Other URL s The current version number of the web services can be acquired by calling the site 2. This URL can be used to ping the web services if required. The public certificate of E&S can also be found at the site Further information For further information about subscriptions and other general information, please refer to the CVR web site at For information about the rules concerning the XML Schema definitions made by OIO ( OIOXML Naming and Design Rules ), please refer to 4. For information about the rules concerning the WSDL files made by OIO (Vejledning for udvikling og anvendelse af OIOWSDL. In English: Guide for development and usage of OIOWSDL), Download from URL: 2 URL: 3 URL: 4 Full path: 4

5 The individual XML Schema definitions and metadata files are published with the namespace in accordance to the rules specified by the OIO rules version 3.1. The definitions can be searched for and retrieved at The security model is conformant with the OWSA Model T specification, please refer to: Full path: 6 Full path: 5

6 2 Data model 2.1 Introduction The data model describes data and their relations in CVR Online. The data model is illustrated using UML class diagrams. 2.2 Temporal data Data in the CVR system are but a few exceptions fully temporal, i.e. all data are valid in a certain time interval only (including for ever). This can be illustrated with a time axis: X Y Z Here a datum has the value X in the interval 15th February 2005 to 31st December 2005 (both dates inclusive. The first date is known as the validfrom date and the last date is known as the validto date). Afterwards it has no value defined until the interval 1st February 2007 to 10th April 2007 where it has the value Y, which changes to the value Z from 11th April 2007 (inclusive). The point is that these data are all in the CVR system at the same time, i.e. data are time varying. Hence the retrieved value depends on the date of inquiry. This for example enables changing a telephone number in advance by setting the validfrom date for the telephone number in the future. It also enables a change backward in time. The telephone number can for example be changed with effect from the first day in the previous month. CVR Online only returns some of these data namely the data valid today s date at the time of inquiry. In the example above a request made the 1st May 2005 would return the value X, while a request made the 1st April 2006 would not return any value. Metadata are also returned along with the normal data, consisting of a validfrom and validto date, although the validto date will not be present for data that are valid for ever on (the value Z in the example above). Thus it is possible to see when data was created, changed and when they expire. 2.3 The basic model Data in the CVR system are based on three basic entities: Legal unit, production unit, and participant (in Danish: juridisk enhed, produktionsenhed og fuldt ansvarlig deltager). 6

7 The legal unit is defined as the legal entity that performs some kind of activity. An example of a legal unit is the Danish entity aktieselskab. A production unit is defined as a physical location where the legal unit permanently operates. Hence, if the activity is temporary by nature the physical location does not count as a production unit. Construction sites, for example, are thus not counted as production units. A legal unit can have multiple production units associated, for example corresponding to the case of an audit firm having multiple office locations around the country. A production unit does not have to be affiliated with a legal unit. This is for example the case if the legal unit is based abroad. A participant is a special kind of person that has special obligations related to a legal unit. The participant can either be a real person or a legal person, and either Danish or of other type (i.e. person that cannot be identified by a CPR-number or CVR-number, typically foreign persons). In total, there are three participant variants: legal unit, Danish real person, and other persons (real or legal). An example of a participant is the Danish term interessent for the Danish legal unit type called I/S. A legal unit can have multiple participants associated and a participant can be associated with multiple legal units. The resulting basic UML data model looks like this: * Participant * Legal unit Danish person Other persons 0..1 * Production unit 7

8 2.4 Details in the model Below is a more detailed description of the basic entities. For the very detailed description of the data, please refer to the metadata files, see paragraph Common data types for legal unit and production unit Both legal and production units are associated with information about their life cycle, addresses, activities, contact information, employment, and advertising protection. The life cycle contains the dates for the start and cessation of the unit. If the unit is active for ever on then no cessation date is present. If today s date is after the cessation date the unit is no longer active. Both legal and production units have an associated physical address (called official address for legal units and location address for production units). The physical address will normally have codes from the road register of CPR associated (see and for a further description). In addition to the physical address, a unit can also have a postal address and/or a post office box address. These addresses indicate that the unit wishes to have its mail forwarded to theses addresses. A unit has activity information attached consisting of activity codes defined by Statistics Denmark (see All units have a main activity. In addition a unit can have one or more secondary activity codes attached. Contact information is information about the unit telephone number, fax number, and address. The information is optional, i.e. a unit does not necessarily have this information attached. Information about the number of employees is retrieved from external authorities. Therefore, all units do not have this information. Furthermore, one cannot expect that the newest data are available. Legal units have both yearly and quarterly numbers while production units only have yearly numbers. Both legal and production units can have an advertising protection flag. In the model this flag is attached to the individual unit. If a unit has this flag set, the information in the CVR system must not be used in unsolicited mail campaigns or for other contact purposes Legal unit A legal unit is uniquely identified by a legal unit identifier (CVR number). In addition to the data listed in the previous paragraph a legal unit has the following data attached: Business format, creditor status, and obligations. The business format is a code that represents the legal identity of the legal unit. Examples of business formats are the Danish legal formats aktieselskab, frivillig forening, filial af udenlandsk aktieselskab, etc. The creditor status is only present if a legal unit is in a state of bankruptcy. The information indicates the detailed state of the bankruptcy. 8

9 Currently only one type of obligation is defined, namely the Danish term arbejdsgiver Production unit A production unit is uniquely defined using a production unit identifier (P-number). Data for a production unit consists primarily of the data mentioned in the paragraph Participant A participant is uniquely identified by a participant identifier (FAD-number). If the participant in question is a legal unit, the legal unit identifier is returned as well. If the participant is a Danish person the CPR-number is returned as well, if and only if the user in question is authorized to have access to these (see the next chapters). 9

10 3 Main description of the web services 3.1 Introduction This chapter describes the individual web services from a main point of view including input and output. 3.2 Access Authentication and authorization is done by attaching a user name and password to each web service call. Each user has individual access rights that determine whether protected data are returned or not. Usage and payment is also individual for each user. 3.3 Web services for searching There are two web services used for searching: One for searching legal units and one for searching production units. Both web services have a single operation that accepts an arbitrary combination of search terms and performs a search. The result is a list of found legal unit or production unit identifiers. Usage of the two web services is not charged. The table below gives an overview of the input and output: 10

11 Legal unit search Input (possible search terms): Name Address (street name, street building identifier, C/O name, postal code, municipality code, region code) Contact information Activity code Start date (life cycle) Status (life cycle) as active/all Number of employee interval (quarterly) Advertising protection Business format code Creditor status code Number of production units CPR-number (participant) Production unit search Input (possible search terms): Name Address (street name, street building identifier, C/O name, postal code, municipality code, region code) Contact information Activity code Start date (life cycle) Status (life cycle) as active/all Number of employee interval (quarterly) Advertising protection Legal unit identifier (affiliation) Output: List of legal unit identifiers Output: List of production unit identifiers Per default only active units are searched. By using the Status search term, it is possible to extend the search to include units currently not active. This can also be achieved by using the Start date search term. Wildcard searches are possible for the name and street name search terms. A wildcard is expressed with a star (*) in the end of a search word and multiple search words are possible. A search term for street names can thus look like this: mørk* vej. Regarding start date, number of employees and number of production units, the search is performed using an interval, i.e. the search term is an interval and only units having a value inside the interval are returned. All intervals are finite, i.e. the from and to values are included in the search. For all other data searching is done using an exact match of the search term. All search terms must match, i.e. a logical AND of the search terms is enforced. 3.4 Web services for retrieval There are two web services for retrieval of units: One for retrieving a legal unit and one for retrieving a production unit. Usage of these web services are charged. Both web services have a single operation that takes a unique identification identifier as input (legal unit identifier for legal units, production unit identifier for production units). As output the details of the unit are returned. 11

12 Furthermore a level parameter is also part of the input with the values 1, 2 or 3. This parameter dictates which type of data is to be returned. This parameter is inclusive i.e. level 2 includes data for both level 1 and 2. Usage charging depends on the level parameter and increases with the level. The table below presents an overview: Retrieval of legal unit Level 1: Legal unit identifier Name Official address Postal address Post office box address Start- and cessation dates Advertising protection Export/import flag Affiliated production unit identifiers Retrieval of production unit Level 1: Production unit identifier Name Official address Postal address Post office box address Start- and cessation dates Advertising protection Ancillary/main division flag Legal unit identifier affiliation Level 2: Main and secondary activities Activity responsability Number of employees interval (yearly + quarterly) Exact number of employees (yearly + quarterly) Business format Data supplier identifier Obligations Creditor status Participants Level 2: Main and secondary activities Activity responsability Number of employees interval (yearly) Exact number of employees (yearly) Level 3: Telephone number Fax number address Foreign telephone number Foreign fax number Level 3: Telephone number Fax number address Foreign telephone number Foreign fax number Data is returned regardless of whether the unit is active or not. The CPR-numbers of participants and the exact number of employees are only returned if the user is authorized to have access to these, see paragraph 3.2. Note that if data for level 3 are requested but no data exist for level 3, then the user is only charged for level 2. 12

13 4 Security 4.1 Introduction Communication with the individual web services is done by using a number of security techniques. Authentication and authorization are identical for all the web services. Authentication is achieved using a user name. Authorization is achieved using a password and attached roles in the CVR Online system. Confidentiality is achieved by using encryption. As encryption mechanism standard SSL or client authenticated SSL is used (refer to OWSA Model T). Note that customers CANNOT freely choose between the two protocols: If access to sensitive information (like e.g. CPR numbers) is required then client authenticated SSL must be used. Also note that a user name may be tied to a particular SSL mechanism, i.e. a user name issued to use client authenticated SSL cannot access the web services using standard SSL. 4.2 Usage of SSL Standard HTTP over SSL is used as the transport protocol (HTTPS). If access is by client authenticated SSL then the client must do a SSL handshake using a valid OCES certificate. An OCES certificate is a variant of X509 certificates, see The certificate is valid if it is not expired, not revoked and is signed by the TDC OCES CA root certificate. 13

14 5 Error handling 5.1 Introduction Different error situations can occur when calling CVR Online. Two types of errors are considered here: Fatal errors and other errors, as these are handled differently. 5.2 Fatal errors Fatal errors prevent the request from being processed or terminated. These include: The received XML does not validate against the XML Schema Illegal/missing user name and/or password Serious internal errors in CVROnline In these cases, a SOAP fault is generated. According to the SOAP standard the response will contain a header with a SOAPFault element describing the error. 5.3 Other errors Other errors are errors in the requests, e.g. originating from the user. Examples of this include: Wrong usage of wildcards (see paragraph 3.3). Illegal legal unit identifier (i.e. the modulo-11 check fails, see the appendix I) The approach used by the CVR Online system is one of fault tolerance: If at all possible, an error is not returned. Instead CVR Online either repairs the request (for example in the case of wrong wildcards) or ignores the error (for example by an illegal legal unit identifier: an empty response is returned). 14

15 6 XML Examples A number of examples of requests and responses exist in a separate zip file. The following xml examples exist: Service Files LegalUnitGet LegalUnitSearch ProductionUnitGet ProductionUnitSearch lug_request.xml lug_response.xml lus_request.xml lus_response.xml pug_request.xml pug_response.xml pus_request.xml pus_response.xml For each individual web service there is an example of a request and response. 15

16 7 Appendix I: Structure of unique identifiers 7.1 Introduction Each of the three basic entities legal unit, production unit and participant has a unique identifier attached. This appendix describes their structure. 7.2 Legal unit identifier A legal unit identifier is an eight-digit number that uniquely identifies a legal unit. A legal unit identifier is assigned by the CVR system. A legal unit identifier is structured in order to validate using a modulo-11 check, i.e. it is possible to check whether a legal unit identifier has a legal structure or not. The following weights are used in this control: Position Weight The modulo-11 check is performed as follows: for each digit position in the legal unit identifier the value is multiplied with the corresponding weight. All these values are added together and a modulo-11 operation is performed. If the result of this modulo-11 operation is not zero, then the legal unit identifier is invalid Example Description Value Legal unit identifier Sum of position multiplied weight 2*2+9*7+9*6+7*5+3*4+3*3+3*2+4*1 = 187 Modulo modulo 11 = Production unit identifier A production unit identifier is a ten-digit number that uniquely identifies a production unit. A production unit identifier is assigned by the CVR system. A production unit identifier is structured in order to validate using a modulo-11 check, i.e. it is possible to check whether a production unit identifier has a legal structure or not. Depending 16

17 of the value of the production unit identifier the following weights are used (this is because the weights have changed): For production unit identifiers less than or equal to : Position Weight For all other production unit identifiers: Position Weight The modulo-11 check is performed as follows: for each digit position in the production unit identifier the value is multiplied with the corresponding weight. All these values are added together and a modulo-11 operation is performed. If the result of this modulo-11 operation is not zero then the production unit identifier is invalid Example Description Value Production unit identifier Sum of position multiplied weight 1*4+0*3+1*2+2*7+6*6+9*5+9*4+2*3+9*2+4*1 = 165 Modulo modulo 11 = Participant identifier A participant identifier is a ten-digit number that uniquely identifies a participant. A participant identifier is assigned by the CVR system. A participant identifier is not subject to modulo-11 checks. 17

18 8 Appendix II: Code example of SSL access Two small clients have been produced that accesses the web services using client authenticated SSL: A Java client and a.net client. The example clients are not meant for production usage, but rather for demonstrating how to access the web services code wise (among other things the clients are bound to the preproduction environment). Both clients use the LegalUnitGet web service as an example. 18

Den Gode Webservice - Security Analysis

Den Gode Webservice - Security Analysis Den Gode Webservice - Security Analysis Cryptomathic A/S September, 2006 Executive Summary This report analyses the security mechanisms provided in Den Gode Web Service (DGWS). DGWS provides a framework

More information

The presentation explains how to create and access the web services using the user interface. WebServices.ppt. Page 1 of 14

The presentation explains how to create and access the web services using the user interface. WebServices.ppt. Page 1 of 14 The presentation explains how to create and access the web services using the user interface. Page 1 of 14 The aim of this presentation is to familiarize you with the processes of creating and accessing

More information

Server based signature service. Overview

Server based signature service. Overview 1(11) Server based signature service Overview Based on federated identity Swedish e-identification infrastructure 2(11) Table of contents 1 INTRODUCTION... 3 2 FUNCTIONAL... 4 3 SIGN SUPPORT SERVICE...

More information

Developer Guide to Authentication and Authorisation Web Services Secure and Public

Developer Guide to Authentication and Authorisation Web Services Secure and Public Government Gateway Developer Guide to Authentication and Authorisation Web Services Secure and Public Version 1.6.3 (17.04.03) - 1 - Table of Contents Government Gateway 1 Developer Guide to Authentication

More information

Replacements TECHNICAL REFERENCE. DTCCSOLUTIONS Dec 2009. Copyright 2009 Depository Trust Clearing Corporation. All Rights Reserved.

Replacements TECHNICAL REFERENCE. DTCCSOLUTIONS Dec 2009. Copyright 2009 Depository Trust Clearing Corporation. All Rights Reserved. TECHNICAL REFERENCE Replacements Page 1 Table of Contents Table of Contents 1 Overview... 3 1.1 Replacements Features... 3 2 Roles and Responsibilities... 4 2.1 Sender (Receiving Carrier)... 4 2.2 Recipient

More information

The Direct Project. Implementation Guide for Direct Project Trust Bundle Distribution. Version 1.0 14 March 2013

The Direct Project. Implementation Guide for Direct Project Trust Bundle Distribution. Version 1.0 14 March 2013 The Direct Project Implementation Guide for Direct Project Trust Bundle Distribution Version 1.0 14 March 2013 Version 1.0, 14 March 2013 Page 1 of 14 Contents Change Control... 3 Status of this Guide...

More information

Oracle Service Bus Examples and Tutorials

Oracle Service Bus Examples and Tutorials March 2011 Contents 1 Oracle Service Bus Examples... 2 2 Introduction to the Oracle Service Bus Tutorials... 5 3 Getting Started with the Oracle Service Bus Tutorials... 12 4 Tutorial 1. Routing a Loan

More information

Most common problem situations in direct message exchange

Most common problem situations in direct message exchange Page 1 / 7 Message Exchange Direct Message Exchange Most common problem situations in direct message exchange v. 1.0, 11.8.2014 Page 2 / 7 Most common problem situations in direct message exchange This

More information

e-filing Secure Web Service User Manual

e-filing Secure Web Service User Manual e-filing Secure Web Service User Manual Page1 CONTENTS 1 BULK ITR... 6 2 BULK PAN VERIFICATION... 9 3 GET ITR-V BY TOKEN NUMBER... 13 4 GET ITR-V BY ACKNOWLEDGMENT NUMBER... 16 5 GET RETURN STATUS... 19

More information

CHAPTER 2 DATABASE MANAGEMENT SYSTEM AND SECURITY

CHAPTER 2 DATABASE MANAGEMENT SYSTEM AND SECURITY CHAPTER 2 DATABASE MANAGEMENT SYSTEM AND SECURITY 2.1 Introduction In this chapter, I am going to introduce Database Management Systems (DBMS) and the Structured Query Language (SQL), its syntax and usage.

More information

Introduction to Web Services

Introduction to Web Services Department of Computer Science Imperial College London CERN School of Computing (icsc), 2005 Geneva, Switzerland 1 Fundamental Concepts Architectures & escience example 2 Distributed Computing Technologies

More information

Paladin Computers Privacy Policy Last Updated on April 26, 2006

Paladin Computers Privacy Policy Last Updated on April 26, 2006 Paladin Computers Privacy Policy Last Updated on April 26, 2006 At Paladin Computers ( Service Provider ), we respect our Users and Clients right to privacy with regards to the use of their email and our

More information

Real-Time Connectivity Specifications For. 270/271 and 276/277 Inquiry Transactions. United Concordia Dental (UCD)

Real-Time Connectivity Specifications For. 270/271 and 276/277 Inquiry Transactions. United Concordia Dental (UCD) Real-Time Connectivity Specifications For 270/271 and 276/277 Inquiry Transactions United Concordia Dental (UCD) May 15, 2015 1 Contents 1. Overview 2. Trading Partner Requirements 3. Model SOAP Messages

More information

EUR-Lex 2012 Data Extraction using Web Services

EUR-Lex 2012 Data Extraction using Web Services DOCUMENT HISTORY DOCUMENT HISTORY Version Release Date Description 0.01 24/01/2013 Initial draft 0.02 01/02/2013 Review 1.00 07/08/2013 Version 1.00 -v1.00.doc Page 2 of 17 TABLE OF CONTENTS 1 Introduction...

More information

SafeNet KMIP and Google Cloud Storage Integration Guide

SafeNet KMIP and Google Cloud Storage Integration Guide SafeNet KMIP and Google Cloud Storage Integration Guide Documentation Version: 20130719 Table of Contents CHAPTER 1 GOOGLE CLOUD STORAGE................................. 2 Introduction...............................................................

More information

HOB WebSecureProxy as an SSL Terminal for E-Mail Clients

HOB WebSecureProxy as an SSL Terminal for E-Mail Clients HOB GmbH & Co. KG Schwadermühlstr. 3 90556 Cadolzburg Tel: 09103 / 715-0 Fax: 09103 / 715-271 E-Mail: support@hob.de Internet: www.hob.de HOB WebSecureProxy as an SSL Terminal for E-Mail Clients November

More information

Creating a Secure Web Service In Informatica Data Services

Creating a Secure Web Service In Informatica Data Services Creating a Secure Web Service In Informatica Data Services 2013 Informatica Corporation. No part of this document may be reproduced or transmitted in any form, by any means (electronic, photocopying, recording

More information

Chapter 17. Transport-Level Security

Chapter 17. Transport-Level Security Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics

More information

Integration of Hotel Property Management Systems (HPMS) with Global Internet Reservation Systems

Integration of Hotel Property Management Systems (HPMS) with Global Internet Reservation Systems Integration of Hotel Property Management Systems (HPMS) with Global Internet Reservation Systems If company want to be competitive on global market nowadays, it have to be persistent on Internet. If we

More information

17 March 2013 NIEM Web Services API Version 1.0 URI: http://reference.niem.gov/niem/specification/web-services-api/1.0/

17 March 2013 NIEM Web Services API Version 1.0 URI: http://reference.niem.gov/niem/specification/web-services-api/1.0/ 17 March 2013 NIEM Web Serv vices API Version 1.0 URI: http://reference.niem.gov/niem/specification/web-services-api/1.0/ i Change History No. Date Reference: All, Page, Table, Figure, Paragraph A = Add.

More information

Cleaning Encrypted Traffic

Cleaning Encrypted Traffic Optenet Documentation Cleaning Encrypted Traffic Troubleshooting Guide iii Version History Doc Version Product Date Summary of Changes V6 OST-6.4.300 01/02/2015 English editing Optenet Documentation

More information

IBM SPSS Collaboration and Deployment Services Version 6 Release 0. Single Sign-On Services Developer's Guide

IBM SPSS Collaboration and Deployment Services Version 6 Release 0. Single Sign-On Services Developer's Guide IBM SPSS Collaboration and Deployment Services Version 6 Release 0 Single Sign-On Services Developer's Guide Note Before using this information and the product it supports, read the information in Notices

More information

PRIVACY POLICY. The Policy is incorporated into Terms of Use and is subject to the terms laid down therein.

PRIVACY POLICY. The Policy is incorporated into Terms of Use and is subject to the terms laid down therein. PRIVACY POLICY This Privacy Policy ( Policy ) applies to the website Creditseva.com which is an online internet portal ( Creditseva ), offering credit repair, credit monitoring and credit consulting services

More information

Copyright 2013 Consona Corporation. All rights reserved www.compiere.com

Copyright 2013 Consona Corporation. All rights reserved www.compiere.com COMPIERE 3.8.1 SOAP FRAMEWORK Copyright 2013 Consona Corporation. All rights reserved www.compiere.com Table of Contents Compiere SOAP API... 3 Accessing Compiere SOAP... 3 Generate Java Compiere SOAP

More information

RoomWizard Synchronization Software Manual Installation Instructions

RoomWizard Synchronization Software Manual Installation Instructions 2 RoomWizard Synchronization Software Manual Installation Instructions Table of Contents Exchange Server Configuration... 4 RoomWizard Synchronization Software Installation and Configuration... 5 System

More information

Mutual Fund Web Service Developer Guide

Mutual Fund Web Service Developer Guide Mutual Fund Web Service Developer Guide Version 1.0 1 Table of Contents 1 Introduction 3 1.1 Summary 3 1.2 Audience 3 1.3 Terminology 3 1.4 What Kind of a Partner Site Am I? 3 1.4.1 Affiliate site 3 1.4.2

More information

ONVIF TM. ONVIF Specification Version 2.4 Release Notes. ONVIF www.onvif.org info@onvif.org

ONVIF TM. ONVIF Specification Version 2.4 Release Notes. ONVIF www.onvif.org info@onvif.org ONVIF TM ONVIF Specification Version 2.4 Release Notes ONVIF www.onvif.org info@onvif.org 2008-2013 by ONVIF TM All rights reserved. Recipients of this document may copy, distribute, publish, or display

More information

Siebel Application Services Interface Reference. Siebel Innovation Pack 2013 Version 8.1/8.2 September 2013

Siebel Application Services Interface Reference. Siebel Innovation Pack 2013 Version 8.1/8.2 September 2013 Siebel Application Services Interface Reference Siebel Innovation Pack 2013 Version 8.1/8.2 September 2013 Copyright 2005, 2013 Oracle and/or its affiliates. All rights reserved. This software and related

More information

Transport Layer Security Protocols

Transport Layer Security Protocols SSL/TLS 1 Transport Layer Security Protocols Secure Socket Layer (SSL) Originally designed to by Netscape to secure HTTP Version 2 is being replaced by version 3 Subsequently became Internet Standard known

More information

Job Reference Guide. SLAMD Distributed Load Generation Engine. Version 1.8.2

Job Reference Guide. SLAMD Distributed Load Generation Engine. Version 1.8.2 Job Reference Guide SLAMD Distributed Load Generation Engine Version 1.8.2 June 2004 Contents 1. Introduction...3 2. The Utility Jobs...4 3. The LDAP Search Jobs...11 4. The LDAP Authentication Jobs...22

More information

www.novell.com/documentation Jobs Guide Identity Manager 4.0.1 February 10, 2012

www.novell.com/documentation Jobs Guide Identity Manager 4.0.1 February 10, 2012 www.novell.com/documentation Jobs Guide Identity Manager 4.0.1 February 10, 2012 Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use of this documentation,

More information

OIOIDWS for Healthcare Token Profile for Authentication Tokens

OIOIDWS for Healthcare Token Profile for Authentication Tokens OIOIDWS for Healthcare Token Profile for Authentication Tokens Common Web Service Profile for Healthcare in the Danish Public Sector, version 2.0 Content Document History...3 Introduction...4 Notation...

More information

OpenScape Voice V8 Application Developers Manual. Programming Guide A31003-H8080-R100-2-7620

OpenScape Voice V8 Application Developers Manual. Programming Guide A31003-H8080-R100-2-7620 OpenScape Voice V8 Application Developers Manual Programming Guide A31003-H8080-R100-2-7620 Our Quality and Environmental Management Systems are implemented according to the requirements of the ISO9001

More information

OpenCable Specifications Stewardship and Fulfillment Interfaces. Service Measurement Summary Interface Specification. OC-SP-SaFI-SMSv3.

OpenCable Specifications Stewardship and Fulfillment Interfaces. Service Measurement Summary Interface Specification. OC-SP-SaFI-SMSv3. OpenCable Specifications Service Measurement Summary Interface Specification ISSUED Notice This OpenCable document is the result of a cooperative effort undertaken at the direction of Cable Television

More information

Sophos SafeGuard Native Device Encryption for Mac Administrator help. Product version: 7

Sophos SafeGuard Native Device Encryption for Mac Administrator help. Product version: 7 Sophos SafeGuard Native Device Encryption for Mac Administrator help Product version: 7 Document date: December 2014 Contents 1 About SafeGuard Native Device Encryption for Mac...3 1.1 About this document...3

More information

NEMSIS v3 Web Services Guide

NEMSIS v3 Web Services Guide NEMSIS TAC Whitepaper NEMSIS v3 Web Services Guide Date November 2, 2011 November 14, 2011 (FINAL) April 24, 2012 (Updated) May 09, 2012 (Updated) August 27, 2012 (updated) September 13, 2012 (updated)

More information

T his feature is add-on service available to Enterprise accounts.

T his feature is add-on service available to Enterprise accounts. SAML Single Sign-On T his feature is add-on service available to Enterprise accounts. Are you already using an Identity Provider (IdP) to manage logins and access to the various systems your users need

More information

Single Sign-On Implementation Guide

Single Sign-On Implementation Guide Salesforce.com: Salesforce Winter '09 Single Sign-On Implementation Guide Copyright 2000-2008 salesforce.com, inc. All rights reserved. Salesforce.com and the no software logo are registered trademarks,

More information

Order Notifications - reporting a payment status

Order Notifications - reporting a payment status Corporate Gateway Order Notifications - reporting a payment status V5.0 May 2014 Use this guide to: Understand order notifications. Learn how to use the Order Notification Service. New to Order Notifications?

More information

PRIVACY POLICY. Last Revised: June 23, 2014 1. About this Privacy Policy.

PRIVACY POLICY. Last Revised: June 23, 2014 1. About this Privacy Policy. Last Revised: June 23, 2014 1. About this Privacy Policy. PRIVACY POLICY This Privacy Policy is a statement by Active Data, Inc. ( Active Data ) that describes how we collect, store, process, and share

More information

PUBLIC Connecting a Customer System to SAP HCI

PUBLIC Connecting a Customer System to SAP HCI SAP HANA Cloud Integration for process integration 2015-05-10 PUBLIC Connecting a Customer System to SAP HCI Content 1 Introduction....4 2 Overview of Connection Setup, Tasks, and Roles.... 5 3 Operating

More information

White Paper BMC Remedy Action Request System Security

White Paper BMC Remedy Action Request System Security White Paper BMC Remedy Action Request System Security June 2008 www.bmc.com Contacting BMC Software You can access the BMC Software website at http://www.bmc.com. From this website, you can obtain information

More information

TIBCO Spotfire Automation Services 6.5. User s Manual

TIBCO Spotfire Automation Services 6.5. User s Manual TIBCO Spotfire Automation Services 6.5 User s Manual Revision date: 17 April 2014 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED OR BUNDLED TIBCO

More information

IF YOU CHOOSE NOT TO ACCEPT THIS AGREEMENT, WHICH INCLUDES THE CERTIFICATE POLICY, THEN CLICK THE "DECLINE" BUTTON BELOW.

IF YOU CHOOSE NOT TO ACCEPT THIS AGREEMENT, WHICH INCLUDES THE CERTIFICATE POLICY, THEN CLICK THE DECLINE BUTTON BELOW. United States Department of Justice Drug Enforcement Administration Controlled Substance Ordering System (CSOS) Subscriber Agreement (Revision 8, February 7, 2007) SUBSCRIBERS MUST READ THIS SUBSCRIBER

More information

The Danish Act on the Central Business Register

The Danish Act on the Central Business Register The Danish Act on the Central Business Register Consolidated Act No. 598 of June 22, 2000 cf. Act No. 417 of May 22, 1996, as subsequently amended by section 2 in Act No. 295 of May 2, 2000 Unauthorized

More information

Archival Data Format Requirements

Archival Data Format Requirements Archival Data Format Requirements July 2004 The Royal Library, Copenhagen, Denmark The State and University Library, Århus, Denmark Main author: Steen S. Christensen The Royal Library Postbox 2149 1016

More information

File Transfer Service (Batch SOAP) User Guide. A Guide to Submitting batches through emedny FTS

File Transfer Service (Batch SOAP) User Guide. A Guide to Submitting batches through emedny FTS File Transfer Service (Batch SOAP) User Guide A Guide to Submitting batches through emedny FTS June 1, 2013 TABLE OF CONTENTS TABLE OF CONTENTS 1 Introduction... 4 2 Requirements... 5 2.1 Exchange mailboxes...

More information

GetLibraryUserOrderList

GetLibraryUserOrderList GetLibraryUserOrderList Webservice name: GetLibraryUserOrderList Adress: https://www.elib.se/webservices/getlibraryuserorderlist.asmx WSDL: https://www.elib.se/webservices/getlibraryuserorderlist.asmx?wsdl

More information

Oracle Discoverer 4i Plus Firewall and SSL Tips. An Oracle White Paper February 2002

Oracle Discoverer 4i Plus Firewall and SSL Tips. An Oracle White Paper February 2002 Oracle Discoverer 4i Plus Firewall and SSL Tips An Oracle White Paper February 00 Introduction...1 Background...1 Scenarios... Basics of Starting Discoverer...3 Firewalls...4 Discoverer Problems Due to

More information

Setup Guide Access Manager Appliance 3.2 SP3

Setup Guide Access Manager Appliance 3.2 SP3 Setup Guide Access Manager Appliance 3.2 SP3 August 2014 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS

More information

OMU350 Operations Manager 9.x on UNIX/Linux Advanced Administration

OMU350 Operations Manager 9.x on UNIX/Linux Advanced Administration OMU350 Operations Manager 9.x on UNIX/Linux Advanced Administration Instructor-Led Training For versions 9.0, 9.01, & 9.10 OVERVIEW This 5-day instructor-led course focuses on advanced administration topics

More information

Magensa Services. Administrative Account Services API Documentation for Informational Purposes Only. September 2014. Manual Part Number: 99810058-1.

Magensa Services. Administrative Account Services API Documentation for Informational Purposes Only. September 2014. Manual Part Number: 99810058-1. Magensa Services Administrative Account Services API Documentation for Informational Purposes Only September 2014 Manual Part Number: 99810058-1.01 REGISTERED TO ISO 9001:2008 Magensa I 1710 Apollo Court

More information

Criteria for web application security check. Version 2015.1

Criteria for web application security check. Version 2015.1 Criteria for web application security check Version 2015.1 i Content Introduction... iii ISC- P- 001 ISC- P- 001.1 ISC- P- 001.2 ISC- P- 001.3 ISC- P- 001.4 ISC- P- 001.5 ISC- P- 001.6 ISC- P- 001.7 ISC-

More information

The City of New York

The City of New York The Policy All passwords and personal identification numbers (PINs) used to protect City of New York systems shall be appropriately configured, periodically changed, and issued for individual use. Scope

More information

Driver for Salesforce.com Implementation Guide

Driver for Salesforce.com Implementation Guide www.novell.com/documentation Driver for Salesforce.com Implementation Guide Identity Manager 4.0.2 August 2013 Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents

More information

Integrated SSL Scanning

Integrated SSL Scanning Software Version 9.0 Copyright Copyright 1996-2008. Finjan Software Inc. and its affiliates and subsidiaries ( Finjan ). All rights reserved. All text and figures included in this publication are the exclusive

More information

Cisco TelePresence Authenticating Cisco VCS Accounts Using LDAP

Cisco TelePresence Authenticating Cisco VCS Accounts Using LDAP Cisco TelePresence Authenticating Cisco VCS Accounts Using LDAP Deployment Guide Cisco VCS X8.1 D14465.06 December 2013 Contents Introduction 3 Process summary 3 LDAP accessible authentication server configuration

More information

United Concordia (UCD) Real Time Claim Submission & Adjudication Connectivity Specifications

United Concordia (UCD) Real Time Claim Submission & Adjudication Connectivity Specifications United Concordia (UCD) Real Time Claim Submission & Adjudication Connectivity Specifications May 15, 2015 Contents 1. Real Time Overview 2. Requirements 3. SOAP Messages 4. SOAP Faults 5. CORE-Compliant

More information

Setup Guide Access Manager 3.2 SP3

Setup Guide Access Manager 3.2 SP3 Setup Guide Access Manager 3.2 SP3 August 2014 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE

More information

SSL VPN Technology White Paper

SSL VPN Technology White Paper SSL VPN Technology White Paper Keywords: SSL VPN, HTTPS, Web access, TCP access, IP access Abstract: SSL VPN is an emerging VPN technology based on HTTPS. This document describes its implementation and

More information

SHARPCLOUD SECURITY STATEMENT

SHARPCLOUD SECURITY STATEMENT SHARPCLOUD SECURITY STATEMENT Summary Provides details of the SharpCloud Security Architecture Authors: Russell Johnson and Andrew Sinclair v1.8 (December 2014) Contents Overview... 2 1. The SharpCloud

More information

Documentation to use the Elia Infeed web services

Documentation to use the Elia Infeed web services Documentation to use the Elia Infeed web services Elia Version 1.0 2013-10-03 Printed on 3/10/13 10:22 Page 1 of 20 Table of Contents Chapter 1. Introduction... 4 1.1. Elia Infeed web page... 4 1.2. Elia

More information

MONTANA INSURANCE VERIFICATION SYSTEM (MTIVS) Implementation Guide for Insurance Companies. Version 1.1 October 4, 2011

MONTANA INSURANCE VERIFICATION SYSTEM (MTIVS) Implementation Guide for Insurance Companies. Version 1.1 October 4, 2011 MONTANA INSURANCE VERIFICATION SYSTEM (MTIVS) Implementation Guide for Insurance Companies Version 1.1 October 4, 2011 MV Solutions, Inc. 2011 Table of Contents 1. INTRODUCTION...3 2. BOOK OF BUSINESS

More information

Wind Plant Operator Data Guide

Wind Plant Operator Data Guide GUIDE 09 Wind Plant Operator Data Guide June 2016 Version: 2.1 Effective Date: 06/23/2016 This document was prepared by: NYISO Customer Support New York Independent System Operator 10 Krey Blvd Rensselaer,

More information

IBM Campaign Version-independent Integration with IBM Engage Version 1 Release 3 April 8, 2016. Integration Guide IBM

IBM Campaign Version-independent Integration with IBM Engage Version 1 Release 3 April 8, 2016. Integration Guide IBM IBM Campaign Version-independent Integration with IBM Engage Version 1 Release 3 April 8, 2016 Integration Guide IBM Note Before using this information and the product it supports, read the information

More information

PROGRESS Portal Access Whitepaper

PROGRESS Portal Access Whitepaper PROGRESS Portal Access Whitepaper Maciej Bogdanski, Michał Kosiedowski, Cezary Mazurek, Marzena Rabiega, Malgorzata Wolniewicz Poznan Supercomputing and Networking Center April 15, 2004 1 Introduction

More information

Content Protection in Silverlight. Microsoft Corporation

Content Protection in Silverlight. Microsoft Corporation Content Protection in Silverlight Microsoft Corporation April 2010 Contents Contents...2 Introduction...3 What is Content Protection?... 3 Why Should You Protect Online Content?... 3 Techniques for Protecting

More information

Getting Started Guide

Getting Started Guide Snap-Link Mobile allows you to monitor and control lights, security, audio, temperatures and webcams on handheld mobile devices, such as Smartphones, PDAs or other devices running Windows Mobile operating

More information

Message Containers and API Framework

Message Containers and API Framework Message Containers and API Framework Notices Copyright 2009-2010 Motion Picture Laboratories, Inc. This work is licensed under the Creative Commons Attribution-No Derivative Works 3.0 United States License.

More information

Smart Card Authentication Client. Administrator's Guide

Smart Card Authentication Client. Administrator's Guide Smart Card Authentication Client Administrator's Guide April 2013 www.lexmark.com Contents 2 Contents Overview...3 Configuring Smart Card Authentication Client...4 Configuring printer settings for use

More information

JVA-561. Developing SOAP Web Services in Java

JVA-561. Developing SOAP Web Services in Java JVA-561. Developing SOAP Web Services in Java Version 2.2 A comprehensive look at the state of the art in developing interoperable web services on the Java EE 6 platform. Students learn the key standards

More information

Implementation Guide SAP NetWeaver Identity Management Identity Provider

Implementation Guide SAP NetWeaver Identity Management Identity Provider Implementation Guide SAP NetWeaver Identity Management Identity Provider Target Audience Technology Consultants System Administrators PUBLIC Document version: 1.10 2011-07-18 Document History CAUTION Before

More information

Service Description. Ericsson IPX

Service Description. Ericsson IPX Service Description Ericsson IPX Disclaimer Please be advised that the information included in this document is based on generic Operator integrations. This document does not constitute a commitment from

More information

How-To Guide SAP NetWeaver Document Version: 1.0-2013-12-22. How To Guide - Configure SSL in ABAP System

How-To Guide SAP NetWeaver Document Version: 1.0-2013-12-22. How To Guide - Configure SSL in ABAP System How-To Guide SAP NetWeaver Document Version: 1.0-2013-12-22 Document History Document Version Description 1.0 First official release of this guide Document History 2013 SAP AG or an SAP affiliate company.

More information

Copyright 2012, Oracle and/or its affiliates. All rights reserved.

Copyright 2012, Oracle and/or its affiliates. All rights reserved. 1 OTM and SOA Mark Hagan Principal Software Engineer Oracle Product Development Content What is SOA? What is Web Services Security? Web Services Security in OTM Futures 3 PARADIGM 4 Content What is SOA?

More information

ABB solar inverters. User s manual ABB Remote monitoring portal

ABB solar inverters. User s manual ABB Remote monitoring portal ABB solar inverters User s manual ABB Remote monitoring portal List of related manuals Title ABB Remote monitoring portal User s manual NETA-01 Ethernet adapter module User s manual Code (English) 3AUA0000098904

More information

PRIVACY AND SECURITY POLICY

PRIVACY AND SECURITY POLICY assess, align, achieve PRIVACY AND SECURITY POLICY ath Power Consulting is a professional market research and consulting firm. We are committed to maintaining the privacy of our website users, clients,

More information

WINGS WEB SERVICE MODULE

WINGS WEB SERVICE MODULE WINGS WEB SERVICE MODULE GENERAL The Wings Web Service Module is a SOAP (Simple Object Access Protocol) interface that sits as an extra layer on top of the Wings Accounting Interface file import (WAIimp)

More information

Manual for the daily cooperation related to the supply of

Manual for the daily cooperation related to the supply of Manual for the daily cooperation related to the supply of Medicinal products to Amgros and the hospital pharmacies in Denmark Version 4.0 Page 1 Contents Instruction in relation to the framework agreement...

More information

Recurring payments manual

Recurring payments manual Recurring payments manual SmartPay Contents Introduction 3 Audience 3 What is a recurring contract? 4 Recurring vs One-Click 4 Usual workflow 4 Creating a recurring contract 5 Setting up the payment 5

More information

ESPA 4.4.4 Nov 1984 PROPOSAL FOR SERIAL DATA INTERFACE FOR PAGING EQUIPMENT CONTENTS 1. INTRODUCTION 2. CHARACTER DESCRIPTION

ESPA 4.4.4 Nov 1984 PROPOSAL FOR SERIAL DATA INTERFACE FOR PAGING EQUIPMENT CONTENTS 1. INTRODUCTION 2. CHARACTER DESCRIPTION PROPOSAL FOR SERIAL DATA INTERFACE FOR PAGING EQUIPMENT CONTENTS 1. INTRODUCTION 2. CHARACTER DESCRIPTION 2.1 CHARACTER STRUCTURE 2.2 THE CHARACTER SET 2.3 CONTROL CHARACTERS 2.3.1 Transmission control

More information

WIRIS quizzes web services Getting started with PHP and Java

WIRIS quizzes web services Getting started with PHP and Java WIRIS quizzes web services Getting started with PHP and Java Document Release: 1.3 2011 march, Maths for More www.wiris.com Summary This document provides client examples for PHP and Java. Contents WIRIS

More information

App Orchestration 2.5

App Orchestration 2.5 App Orchestration 2.5 Configuring SSL for App Orchestration 2.5 Prepared by: Andy Zhu Last Updated: July 25, 2014 Contents Introduction... 3 Configure SSL on the App Orchestration configuration server...

More information

Tele-Media Cable Internet Acceptable Use Policy

Tele-Media Cable Internet Acceptable Use Policy Tele-Media Cable Internet Acceptable Use Policy Important Note: Tele-Media may revise this Acceptable Use Policy (the "Policy") from time to time without notice by posting a new version of this document

More information

The IVE also supports using the following additional features with CA certificates:

The IVE also supports using the following additional features with CA certificates: 1 A CA certificate allows you to control access to realms, roles, and resource policies based on certificates or certificate attributes. For example, you may specify that users must present a valid client-side

More information

PHINMS Alarms. Version: 1.0.0. Prepared by: U.S. Department of Health & Human Services

PHINMS Alarms. Version: 1.0.0. Prepared by: U.S. Department of Health & Human Services PHINMS Alarms Version: 1.0.0 Prepared by: U.S. Department of Health & Human Services Date: January 11, 2008 VERSION HISTORY VERSION # IMPLEMENTER DATE EXPLANATION 1.0.0 Chris Childs 01/11/08 Create version

More information

Table of contents. 2. Technical details... 7 2.1. Protocols used... 7 2.2. Messaging security... 7 2.3. Encoding... 7 2.4. Input and output...

Table of contents. 2. Technical details... 7 2.1. Protocols used... 7 2.2. Messaging security... 7 2.3. Encoding... 7 2.4. Input and output... Table of contents Revision history... 3 Introduction... 4 1. Environments... 5 1.1. Test/ acceptance environment... 5 1.2. Production environment... 5 1.3. Methods... 5 1.3.1. DataRequest... 5 1.3.2. StandardDataRequest...

More information

Measurabl, Inc. Attn: Measurabl Support 1014 W Washington St, San Diego CA, 92103 +1 619.719.1716

Measurabl, Inc. Attn: Measurabl Support 1014 W Washington St, San Diego CA, 92103 +1 619.719.1716 Measurabl, Inc. ( Company ) is committed to protecting your privacy. We have prepared this Privacy Policy to describe to you our practices regarding the Personal Data (as defined below) we collect from

More information

Iowa Immunization Registry Information System (IRIS) Web Services Data Exchange Setup. Version 1.1 Last Updated: April 14, 2014

Iowa Immunization Registry Information System (IRIS) Web Services Data Exchange Setup. Version 1.1 Last Updated: April 14, 2014 Iowa Immunization Registry Information System (IRIS) Web Services Data Exchange Setup Version 1.1 Last Updated: April 14, 2014 Table of Contents SSL Certificate Creation... 3 Option 1: Complete the Provider

More information

Password Self Help Password Reset for IBM i

Password Self Help Password Reset for IBM i Password Self Help Password Reset for IBM i White Paper from Safestone Technologies Contents Overview... 2 Making the Case... 2 Setting the Stage... 3 1. Configure Product Settings... 4 2. Register Users...

More information

Securing Web Services From Encryption to a Web Service Security Infrastructure

Securing Web Services From Encryption to a Web Service Security Infrastructure Securing Web Services From Encryption to a Web Service Security Infrastructure Kerberos WS-Security X.509 TLS Gateway OWSM WS-Policy Peter Lorenzen WS-Addressing Agent SAML Policy Manager Technology Manager

More information

WHITE PAPER SECURITY IN A WEB SERVICES WORLD

WHITE PAPER SECURITY IN A WEB SERVICES WORLD WHITE PAPER SECURITY IN A WEB SERVICES WORLD Author: Tim Moses Date: 3 February 2004 Copyright 2004 Entrust. All rights reserved. Entrust is a registered trademark of Entrust, Inc. in the United States

More information

An Oracle White Paper June 2014. Security and the Oracle Database Cloud Service

An Oracle White Paper June 2014. Security and the Oracle Database Cloud Service An Oracle White Paper June 2014 Security and the Oracle Database Cloud Service 1 Table of Contents Overview... 3 Security architecture... 4 User areas... 4 Accounts... 4 Identity Domains... 4 Database

More information

Collax Mail Server. Howto. This howto describes the setup of a Collax server as mail server.

Collax Mail Server. Howto. This howto describes the setup of a Collax server as mail server. Collax Mail Server Howto This howto describes the setup of a Collax server as mail server. Requirements Collax Business Server Collax Groupware Suite Collax Platform Server including Collax Communication

More information

Corporate Access File Transfer Service Description Version 1.0 01/05/2015

Corporate Access File Transfer Service Description Version 1.0 01/05/2015 Corporate Access File Transfer Service Description Version 1.0 01/05/2015 This document describes the characteristics and usage of the Corporate Access File Transfer service, which is for transferring

More information

CONNECTICUT INSURANCE VERIFICATION SYSTEM (CTIVS)

CONNECTICUT INSURANCE VERIFICATION SYSTEM (CTIVS) CONNECTICUT INSURANCE VERIFICATION SYSTEM (CTIVS) Implementation Guide for Insurance Companies Version 1 December 15, 2014 MV Solutions, Inc. 2014 Table of Contents 1. INTRODUCTION... 3 2. BOOK OF BUSINESS

More information

HP Operations Manager Incident Web Service

HP Operations Manager Incident Web Service HP Operations Manager Incident Web Service for the UNIX and Windows operating systems Software Version: 8.00 Integration Guide Document Release Date: July 2008 Software Release Date: July 2008 Legal Notices

More information

Oracle Directory Services Integration with Database Enterprise User Security O R A C L E W H I T E P A P E R F E B R U A R Y 2 0 1 5

Oracle Directory Services Integration with Database Enterprise User Security O R A C L E W H I T E P A P E R F E B R U A R Y 2 0 1 5 Oracle Directory Services Integration with Database Enterprise User Security O R A C L E W H I T E P A P E R F E B R U A R Y 2 0 1 5 Disclaimer The following is intended to outline our general product

More information