DLNA Guidelines March 2014
|
|
|
- Tracy Ryan
- 10 years ago
- Views:
Transcription
1 DLNA Guidelines March 2014 Part 7: Authentication An Industry Guide for Building Interoperable Platforms, Devices, and Applications Fulfilling the promise of the digital home requires a cross-industry effort to develop and promote a common industry framework for interoperability. This industry framework is expressed through the DLNA Guidelines document that has been developed to provide Consumer Electronic, Mobile Device and PC companies with the information needed to build interoperable platforms, devices, and application for the digital home. Do Not Copy Copyright 2014 Digital Living Network Alliance. Any form of reproduction and/or distribution of these works is prohibited.
2 Legal Disclaimer NOTHING CONTAINED IN THIS DOCUMENT SHALL BE DEEMED AS GRANTING YOU ANY KIND OF LICENSE IN ITS CONTENT, EITHER EXPRESSLY OR IMPLIEDLY, OR TO ANY INTELLECTUAL PROPERTY OWNED OR CONTROLLED BY ANY OF THE AUTHORS OR DEVELOPERS OF THIS DOCUMENT. THE INFORMATION CONTAINED HEREIN IS PROVIDED ON AN "AS IS" BASIS, AND TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, THE AUTHORS AND DEVELOPERS OF THIS SPECIFICATION HEREBY DISCLAIM ALL OTHER WARRANTIES AND CONDITIONS, EITHER EXPRESS OR IMPLIED, STATUTORY OR AT COMMON LAW, INCLUDING, BUT NOT LIMITED TO, IMPLIED WARRANTIES OF MERCHANTABILITY OF FITNESS FOR A PARTICULAR PURPOSE. DLNA FURTHER DISCLAIMS ANY AND ALL WARRANTIES OF NONINFRINGEMENT, ACCURACY OR LACK OF VIRUSES. DLNA, DLNA CERTIFIED, and the logo are trademarks, registered trademarks, or servicemarks of Digital Living Network Alliance in the United State or other countries. *Other names and brands may be claimed as the property of others. Copyright Digital Living Network Alliance. All rights reserved. Copying or other form of reproductions and/or distribution of these works is strictly prohibited DLNA Guidelines; Part 7: Authentication
3 i CONTENTS 1 Scope Normative References Terms, definitions, symbols and abbreviated terms General Terms Authentication Client Authentication Server Client Authentication DTCP Method Server Authentication X. 509 Method Networking Architecture and Guideline Conventions DLNA Home Networking Architecture Document conventions Guideline structure DLNA Device Model Authentication Device Functions Device Options System Usages Theory of Operation Guideline requirements Device discovery and control Authentication Server discovery Authentication Client discovery Authentication guidelines Authentication Server protocols Authentication Client protocols Client Authentication guidelines Server Authentication guidelines... 8 Figure 1 Authentication functions... 3 Copyright 2014 Digital Living Network Alliance. Any form of reproduction and/or distribution of these works is prohibited.
4
5 1 1 Scope DIGITAL LIVING NETWORK ALLIANCE (DLNA) GUIDELINES Part 7: Authentication This part of IEC specifies DLNA interoperability guidelines for device authentication. The DLNA interoperability guidelines are based on a device authentication solution, which is defined as methods to enable authentication of a client device as DLNA Certified. Methods are included to allow a client device to authenticate a server device as trusted by a Certificate Authority. The guidelines are intended to supplement other interoperability mechanisms already defined for DLNA link protection and DLNA DRM interoperability solutions. 2 Normative References The following documents, in whole or in part, are normatively referenced in this document and are indispensable for its application. For dated references, only the edition cited applies. For undated references, the latest edition of the referenced document (including any amendments) applies. IEC , Digital living network allianc e (DLNA) home network ed devic e interoperability guidelines - Part 1: Architecture and protocols IETF RFC 2616, Hypertext Transfer Protocol, IETF RFC 2818, HTTP over TLS, Informational, IETF RFC 4680, TLS Handshake Message for Supplemental Data, IETF RFC 5246, The Transport Layer Security (TLS) Protocol Version 1.2, IETF RFC 5280, Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile, IETF RFC 5878, Transport Layer Security (TLS) Authorization Extensions, IETF RFC XXXX, <TDB> Authentication Credential Exchange Using TLS Supplemental Data, DTCP Volume 1 (informational vers ion), Digital Transmission Content Protection Specification Volume 1, Revision 1.7, 3 Terms, definitions, symbols and abbreviated terms For the purposes of this document, the terms, definitions, symbols and abbreviated terms in IEC and the following apply. 3.1 General Terms Authentication Client a set of device functions, as part of the Client Authentication Device Option, provides the protocols to allow a client to be authenticated and the protocols to authenticate an Authentication Server by verifying the Server credentials. Copyright 2014 Digital Living Network Alliance. Any form of reproduction and/or distribution of these works is prohibited.
6 Authentication Server a Device Function that, as part of the Server Authentication Device Option, provides the protocols to allow a server to be authenticated and the protocols to authenticate an Authentication Client by verifying the Client credentials Client Authentication process or action where the Authentication Client initiates the authentication request for the Authentication Server to authenticate the Client DTCP Method occurs when a device uses a device certificate for itself during DLNA Authentication Server Authentication process or action where the Authentication Server is authenticated by the Authentication Client X.509 Method occurs when a device uses an X.509 credential for itself during DLNA Authentication. No DTCP device certificate is used with this method 3.2 Conventions In IEC and this document, a number of terms, conditions, mechanisms, sequences, parameters, events, states, or similar terms are printed with the first letter of each word in uppercase and the rest lowercase (e.g. Move.) Any lowercase uses of these words have the normal technical English meanings. 4 Networking Architecture and Guideline Conventions 4.1 DLNA Home Networking Architecture This document extends the DLNA Home Networking Architecture that is defined in clause 4, IEC Document conventions See clause 6, IEC , for a description of the DLNA document conventions. 4.3 Guideline structure See clause 7.1 in IEC , for guideline and attribute table layout descriptions. 5 DLNA Device Model Refer to clause 5, IEC , for detailed descriptions of existing DLNA Home Networking Architecture Device Model. This document extends the existing DLNA System Usages. 5.1 Authentication Device Functions The architecture consists of system elements in the home and outside the home used to implement the DLNA authentication feature. These elements support both service provider and home owner use cases. Figure 1 is an overview of the architecture. DLNA Guidelines; Part 7: Authentication
7 3 Server Authentication Device Option Client Authentication Device Option Specified Unspecified Authentication Server Authentication Client Server Credential Storage Client Credential Storage Credential Authority Credential Installation Figure 1 Authentication functions The architecture defines the following functions. Credential Authority Creates client and server credentials for use by manufacturers in their devices. Provides root certificate(s) to the Authentication Server and the Authentication Client. Defines the robustness requirements. Client Credential Installation Installs the credentials into the client device. Performed by the manufacturer. Client Credential Storage Stores the credentials according to the robustness requirements. Provides access to the credentials by the Authentication Server. Server Credential Storage Stores the credentials according to the robustness requirements. Provides access to the credentials by the Authentication Server. Authentication Client Authenticates with the Authentication Server and authenticates servers using the Server Credentials. Authentication Server Authenticates with the Authentication Client and authenticates clients using the Client Credentials. Copyright 2014 Digital Living Network Alliance. Any form of reproduction and/or distribution of these works is prohibited.
8 4 The DLNA guidelines will cover interoperability between the Authentication Client Function and the Authentication Server Function. 5.2 Device Options For the Authentication Interoperability Guidelines and System Usages, the following Device Options are defined. Client Authentication: A Device Option that consists of an Authentication Client Function and Client Credentials. Server Authentication: A Device Option that consists of an Authentication Server Function and Server Credentials. 5.3 System Usages DLNA Authentication Guidelines are designed to complement all DLNA Device Classes and Device Capabilities in all System Usages, providing and enabling them the ability to authenticate each other securely before other functions, such as content transports, can be performed. Other than adding the authentication process es as described in and 3.1.5, all DLNA System Usages stay the same. While some of the implementations of DLNA System Usages require device authentication, many do not. As such, DLNA Authentication Guidelines are optional (a.k.a Device Options) and it is an implementer s choice to implement them. Although an Authentication Server or an Authentication Client may be implemented as an independent entity that performs authentication only without any other function, this type of implementation does not make sense because there is no purpose to authenticate. Therefore, the authentication services are designed as Device Options that shall be a part of a Device Class or Device Capability when implemented. 5.4 Theory of Operation The enclosed guidelines enable the ability for a server to authenticate a client as a DLNA certified device using either X.509 credentials or device certificates. Conversely the ability for a client to authenticate a server is also supported. The TLS protocol using the SupplementalData payload mechanism is defined herein to support both client and server authentication using DTCP certificates. The authentication scenarios covered are as follows. 1. Server uses trusted X.509 and client uses trusted X Server uses trusted X.509 and client uses DTCP 3. Server uses (trusted or self-signed X. 509) + DTCP, and client uses trusted X Server uses (trusted or self-signed X. 509) + DTCP, and client uses DTCP The first scenario is supported by standard TLS protocol. The rest of the scenarios require use of SupplementalData extensions to TLS protocol. Scenario #3 is highly unlikely to occur in practice due to the typical nature of a TLS handshake. A TLS handshake is triggered by a TLS client sending a ClientHello message and if the TLS client does not indicate support for the DTCP method, a TLS server will not be allowed to send the DTCP certificate. So a TLS client is required to have a priori knowledge that a particular TLS server is using DTCP certificate. 6 Guideline requirements 6.1 Device discovery and control Authentication Server discovery [GUIDELINE] A DLNA Device Class or Device Capability that indicates support for the Server Authentication Device Option shall implement the requirements specified for Authentication Server. DLNA Guidelines; Part 7: Authentication
9 5 M- DMS n/a n/a W3UP4 N [COMM ENT] Support for Server Authentication Device Option is indicated at the time of registration for certification [GUIDELINE] A DLNA Device Class or Device Capability that implements the Authentication Server shall have the capid value of authentication-server for the dlnacap-value in the <dlna:x_dlnacap> element, as defined in IEC , of the Device Description document. M- DMS n/a IEC GX4I8 N [COMM ENT] This is where a UPnP control point checks if the DLNA Device Class or Device Capability implemented the Authentication Server after retrieving the Device Description document of the UPnP Device Authentication Client discovery [GUIDELINE] A DLNA Device Class or Device Capability that indicates support for the Client Authentication Device Option shall implement the requirements specified for Authentication Client. M- DMP M-DMC n/a n/a ENEWV N [COMM ENT] Support for Client Authentication Device Option is indicated at the time of registration for certification. 6.2 Authentication guidelines Authentication Server protocols [GUIDELINE] The Authentication Server shall implement HTTP 1.1 Server. M- DMS n/a IETF RFC LRZP N [COMM ENT] The Device Class or Device Capability that implements the Authentication Server could already have the HTTP 1.1 Server implemented. This guideline establishes the basis for interoperability however other protocols could also be used [GUIDELINE] The Authentication Server shall implement HTTPS (HTTP over TLS). M- DMS n/a IETF RFC 2818 ABKQG N [COMM ENT] The Device Class or Device Capability that implements the Authentication Server Copyright 2014 Digital Living Network Alliance. Any form of reproduction and/or distribution of these works is prohibited.
10 6 could already have HTTPS implemented. This guideline establishes the basis for interoperability however other protocols could also be used [GUIDELINE] The Authentication Server shall implement the TLS1.2 protocol as defined in IETF RFC M- DMS n/a IETF RFC 5246 WM9P4 N [GUIDELINE] The Authentication Server shall implement the TLS SupplementalData handshake message as defined in IETF RFC M- DMS n/a IETF RFC 4680 JY8N9 N [GUIDELINE] The Authentication Server shall implement the client_authz and server_authz TLS Hello message extensions as defined in IETF RFC 5878 M- DMS n/a IETF RFC TRPH N [COMM ENT] When a server uses the TLS SupplementalData message to send its credentials, it will do so by indicating support for these extensions in the Hello message Authentication Client protocols [GUIDELINE] The Authentication Client shall implement HTTP 1.1 Client. M- DMP M-DMC n/a IETF RFC 2616 ME837 N [COMM ENT] The Device Class or Device Capability that implements the Authentication Client could already have the HTTP 1.1 Client implemented. This guideline establishes the basis for interoperability however other protocols could also be used [GUIDELINE] The Authentication Client shall implement HTTPS (HTTP over TLS). M- DMP M-DMC n/a IETF RFC USPH N [COMM ENT] The Device Class or Device Capability that implements the Authentication Client could already have HTTPS implemented. This guideline establishes the basis for interoperability however other protocols could also be used [GUIDELINE] The Authentication Client shall implement the TLS1.2 protocol as defined in IETF RFC DLNA Guidelines; Part 7: Authentication
11 M- DMP M-DMC n/a IETF RFC 5246 BC6YY N [GUIDELINE] An Authentication Client that implements the DTCP Method shall implement the TLS SupplementalData handshake message as defined in IETF RFC M- DMP M-DMC n/a IETF RFC 4680 GM2LB N [GUIDELINE] An Authentication Client that implements the DTCP Method shall implement the client_authz and server_authz TLS Hello message extensions as defined in IETF RFC 5878 M- DMP M-DMC n/a IETF RFC 5878 TCEMN N [COMM ENT] When a client uses the TLS SupplementalData message to send its credentials, it will do so by indicating support for these extensions in the Hello message Client Authentication guidelines [GENERAL] defines all functionality required for performing Client Authentication [GUIDELINE] An Authentication Client shall implement one of the following authentication methods for client authentication: X. 509 Method as defined in DTCP Method as defined in through M- DMP M-DMC n/a n/a AQ7AC N [COM M ENT] Authentication occurs via one of 2 separate credential mechanisms [GUIDELINE] If an Authentication Client implements the X. 509 Method as defined in IETF RFC 5280 for Client Authentication, then it shall support TLS1.2 for Client Authentication as defined in IETF RFC M- DMP M-DMC n/a IETF RFC 5246 IETF RFC 5280 LWI79 N [GUIDELINE] If an Authentication Client implements the DTCP Method, then it shall implement all client requirements defined in IETF RFC XXXX including generating, processing and error handling of SupplementalData messages. Copyright 2014 Digital Living Network Alliance. Any form of reproduction and/or distribution of these works is prohibited.
12 , M- DMP M-DMC n/a IETF RFC XXXX 52ZEM N [GUIDELINE] If an Authentication Client implements the DTCP Method, then it shall use the TLS SupplementalData Double Handshake as defined in IETF RFC XXXX M- DMP M-DMC n/a IETF RFC XXXX L8SLI N [GUIDELINE] If an Authentication Client implements the DTCP Method, then it shall generate the SupplementalData message as defined in IETF RFC XXXX that includes the device certificate as defined in DTCP Volume 1. M- DMP M-DMC n/a IETF RFC XXXX DTCP Volume 1 QA9QL N [COMM ENT] The device certificate will include sufficient information that authenticates the client [GUIDELINE] An Authentication Server shall implement the DTCP Method as defined in for Client Authentication M- DMS n/a IETF RFC 5246 R9BV I N [GUIDELINE] An Authentication Server shall implement the X.509 Method as defined in for Client Authentication Server Authentication guidelines M- DMS n/a IETF RFC 5246 V224M N [GENERAL] defines all functionality required for performing server authentication [GUIDELINE] An Authentication Server shall implement one of the following authentication methods for Server Authentication: X. 509 Method as defined in DTCP Method as defined in through M- DMS n/a n/a H9CSO N DLNA Guidelines; Part 7: Authentication
13 9 [COMM ENT] Authentication occurs via one of 2 separate credential mechanisms. An Authentication Server using device certificates also provides an X.509 credential in order to establish a secure TLS session. The client can determine the authentication method based on the payload of the SupplementalData message [GUIDELINE] If an Authentication Server implements the X. 509 Method as defined in IETF RFC 5280 for Server Authentication then it shall support TLS 1.2 for Server Authentication as defined in IETF RFC M- DMS n/a IETF RFC 5246 IETF RFC 5280 OGMFZ N [COM M ENT] The X.509 credential includes sufficient information to authenticate the server [GUIDELINE] If an Authentication Server indicates support for the server_authz extension as defined in IETF RFC 5878, then it shall also indicate support for the client_authz extension as defined in IETF RFC M- DMS n/a IETF RFC 5878 SEAU2 N [COMM ENT] The server_authz and client_authz extensions are carried within the SupplementalData payload [GUIDELINE] The Authentication Server shall implement all server requirements defined in 3.4 of IETF RFC XXXX including generating, processing and error handling of SupplementalData messages M- DMS n/a IETF RFC XXXX TUX52 N [GUIDELINE] If an Authentication Server implements the DTCP Method for Server Authentication, then it shall create and send the SupplementalData message that includes the device certificate as per IETF RFC XXXX. M- DMS n/a IETF RFC XXXX DTCP Volume 1 ZOETF N [COMM ENT] The device certificate will include sufficient information that authenticates the server [GUIDELINE] An Authentication Client should implement the DTCP Method as defined in for Server Authentication. Copyright 2014 Digital Living Network Alliance. Any form of reproduction and/or distribution of these works is prohibited.
14 10 S A DMC, DMP, XDMR, M- DMP M-DMC n/a IETF RFC VRO9 N [COMM ENT] A Client Authentication Device Option will determine the authentication method the Server supports and respond accordingly [GUIDELINE] An Authentication Client should implement the X.509 Method as defined in for Server Authentication. S A DMC, DMP, XDMR, M- DMP M-DMC n/a IETF RFC 5246 CA V 9Q N [COMM ENT] A Client Authentication Device Option will determine the authentication method the Server supports and respond accordingly. DLNA Guidelines; Part 7: Authentication
OPEN DATA CENTER ALLIANCE SM CLOUD ADOPTION SURVEY
OPEN DATA CENTER ALLIANCE SM CLOUD ADOPTION SURVEY 2014 TABLE OF CONTENTS 3 Legal Notice 5 Executive Summary 5 ODCA Members Respond to Survey on Data Center Practices and Plans 6 Methodology 6 Growth in
OPEN DATA CENTER ALLIANCE SM USAGE MODEL: E-DISCOVERY AND FORENSICS
OPEN DATA CENTER ALLIANCE SM USAGE MODEL: E-DISCOVERY AND FORENSICS Version Date Editor Description of Change 1.0 27 Aug 2014 Security WG Initial release Contributors Christophe Gévaudan UBS Tino Hirschmann
Open Data Center Alliance Usage: Infrastructure as a Service (IaaS) Privileged User Access rev. 1.0
sm Open Data Center Alliance Usage: Infrastructure as a Service (IaaS) Privileged User Access rev. 1.0 Table of Contents Legal Notice... 3 Executive Summary... 4 Related Usage Models... 5 Reference Framework...
Open Data Center Alliance Usage: Single Sign On Authentication REv. 1.0
sm Open Data Center Alliance Usage: Single Sign On Authentication REv. 1.0 Table of Contents Legal Notice... 3 Executive Summary... 4 Reference Framework... 5 Applicability... 6 Related Usage Models...
Sage HRMS 2014 Sage Employee Self Service Tech Installation Guide for Windows 2003, 2008, and 2012. October 2013
Sage HRMS 2014 Sage Employee Self Service Tech Installation Guide for Windows 2003, 2008, and 2012 October 2013 This is a publication of Sage Software, Inc. Document version: October 17, 2013 Copyright
CLOUD TECH SOLUTION AT INTEL INFORMATION TECHNOLOGY ICApp Platform as a Service
CLOUD TECH SOLUTION AT INTEL INFORMATION TECHNOLOGY ICApp Platform as a Service Open Data Center Alliance, Inc. 3855 SW 153 rd Dr. Beaverton, OR 97003 USA Phone +1 503-619-2368 Fax: +1 503-644-6708 Email:
ETSI TS 102 778 V1.1.1 (2009-04) Technical Specification
TS 102 778 V1.1.1 (2009-04) Technical Specification Electronic Signatures and Infrastructures (ESI); PDF Advanced Electronic Signature Profiles; CMS Profile based on ISO 32000-1 2 TS 102 778 V1.1.1 (2009-04)
UPnP Logo Usage Guidelines 2016 Open Interconnect Consortium, Inc. All rights reserved. UPnP Logo Usage Guidelines
UPnP Logo Usage Guidelines Prepared by Updated January 2016 1 Legal Disclaimer LEGAL DISCLAIMER: NOTHING CONTAINED IN THIS DOCUMENT SHALL BE DEEMED AS GRANTING YOU ANY KIND OF LICENSE IN ITS CONTENT, EITHER
[MS-CCEIP]: Corporate Customer Experience Improvement Program Client-to-Server Protocol
[MS-CCEIP]: Corporate Customer Experience Improvement Program Client-to-Server Protocol Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation. Microsoft publishes
Internet Protocol Support Profile
Bluetooth Specification Date 2014-Dec-16 Revision Group Prepared By Internet WG Feedback Email [email protected] Abstract: This Profile Specification proposes the support of exchanging IPv6 packets
Lab Exercise SSL/TLS. Objective. Step 1: Open a Trace. Step 2: Inspect the Trace
Lab Exercise SSL/TLS Objective To observe SSL/TLS (Secure Sockets Layer / Transport Layer Security) in action. SSL/TLS is used to secure TCP connections, and it is widely used as part of the secure web:
ETSI TS 124 423 V8.4.0 (2012-01)
TS 124 423 V8.4.0 (2012-01) Technical Specification Digital cellular telecommunications system (Phase 2+); Universal Mobile Telecommunications System (UMTS); LTE; TISPAN; PSTN/ISDN simulation services;
QUADRO POWER GUIDELINES
QUADRO POWER GUIDELINES DA-07261-001_v03 July 2015 Application Note DOCUMENT CHANGE HISTORY DA-07261-001_v03 Version Date Authors Description of Change 01 June 6, 2014 VL, SM Initial Release 02 June 2,
Certificate Management Profile
1 2 3 4 Document Number: DSP1096 Date: 2011-09-16 Version: 1.0.0 5 6 7 8 Document Type: Specification Document Status: DMTF Standard Document Language: en-us 9 DSP1096 10 11 Copyright notice Copyright
IVOA Single-Sign-On Profile: Authentication Mechanisms Version 2.0
International Virtual Observatory Alliance IVOA Single-Sign-On Profile: Authentication Mechanisms Version 2.0 IVOA Proposed Recommendation 20151029 Working group http://www.ivoa.net/twiki/bin/view/ivoa/ivoagridandwebservices
beginners guide Beginners Guide Certificates the best decision when considering your online security options.
Beginners Guide to Digital SSL Certificates the best decision when considering your online security options. Beginners Guide to Digital SSL Certificates introduction Whether you are an individual or a
New Security Features
New Security Features BlackBerry 10 OS Version 10.3.2 Published: 2015-06-08 SWD-20150608104314635 Contents About this guide... 4 What's new... 4 NFC smart card support... 5 OCSP stapling support in the
XML Document Management Architecture
XML Document Management Architecture Candidate Version 2.0 02 Dec 2010 Open Mobile Alliance OMA-AD-XDM-V2_0-20101202-C OMA-AD-XDM-V2_0-20101202-C Page 2 (30) Use of this document is subject to all of the
Document Exchange Server 2.5
KOFAX Document Exchange Server 2.5 Administrator s Guide for Fujitsu Network Scanners 10001820-000 2008-2009 Kofax, Inc., 16245 Laguna Canyon Road, Irvine, California 92618, U.S.A. All rights reserved.
BEGINNERS GUIDE BEGINNERS GUIDE TO SSL CERTIFICATES: MAKING THE BEST CHOICE WHEN CONSIDERING YOUR ONLINE SECURITY OPTIONS
BEGINNERS GUIDE TO SSL CERTIFICATES: MAKING THE BEST CHOICE WHEN CONSIDERING YOUR ONLINE SECURITY OPTIONS BEGINNERS GUIDE TO SSL CERTIFICATES INTRODUCTION Whether you are an individual or a company, you
OPEN DATA CENTER ALLIANCE USAGE: Data Security Rev. 1.0
OPEN DATA CENTER ALLIANCE USAGE: Data Security Rev. 1.0 Table of Contents Legal Notice...3 Executive Summary...4 Purpose...5 Reference Framework...5 Taxonomy...5 Usage Scenarios...6 Usage Scenario Transfer
Technical Brief for Windows Home Server Remote Access
Technical Brief for Windows Home Server Remote Access Microsoft Corporation Published: October, 2008 Version: 1.1 Abstract This Technical Brief provides an in-depth look at the features and functionality
ETSI TR 103 123 V1.1.1 (2012-11)
TR 103 123 V1.1.1 (2012-11) Technical Report Electronic Signatures and Infrastructures (ESI); Guidance for Auditors and CSPs on TS 102 042 for Issuing Publicly-Trusted TLS/SSL Certificates 2 TR 103 123
What are cookies and how does Glendale Career College use them?
Privacy Policy Glendale Career College is committed to safeguarding your privacy online. Please read the following policy to understand how your personal information will be treated as you make full use
IBM WebSphere Application Server
IBM WebSphere Application Server OAuth 2.0 service provider and TAI 2012 IBM Corporation This presentation describes support for OAuth 2.0 included in IBM WebSphere Application Server V7.0.0.25. WASV70025_OAuth20.ppt
TERMS OF USE 1. Definitions
TERMS OF USE 1. Definitions This website (website) is owned and operated by BATS Trading Limited a company applying to be authorised and regulated by the Financial Services Authority, whose registered
Rethinking Schools Limited Institutional Site License
Rethinking Schools Limited Institutional Site License This License Agreement ( License ) is entered into the day of [20 ] ( Effective Date ) between Rethinking Schools Limited, a Wisconsin Corporation,
Requesting Access to IBM Director Agent on Windows Planning / Implementation
Requesting Access to IBM Director Agent on Windows Planning / Implementation Main When IBM Director Server first discovers a managed system, that system might be initially locked (represented by padlock
DLNA for Streaming Subscription TV Content in the Home
DLNA for Streaming Subscription TV Content in the Home Whitepaper Digital Living Network Alliance March 2014 Table of Contents Introduction... 2 1 The Problem -- Why VIDIPATH is needed.... 2 2 Solving
Presence SIMPLE Architecture
Presence SIMPLE Architecture Approved Version 1.1 27 Jun 2008 Open Mobile Alliance OMA-AD-Presence_SIMPLE-V1_1-20080627-A OMA-AD-Presence_SIMPLE-V1_1-20080627-A Page 2 (21) Use of this document is subject
DUAL MONITOR DRIVER AND VBIOS UPDATE
DUAL MONITOR DRIVER AND VBIOS UPDATE RN-07046-001_v01 September 2013 Release Notes DOCUMENT CHANGE HISTORY RN-07046-001_v01 Version Date Authors Description of Change 01 September 30, 2013 MD, SM Initial
Open Networking Foundation (ONF) Trademark Usage Guidelines for ONF and OpenFlow Trademarks
Open Networking Foundation (ONF) Trademark Usage Guidelines for ONF and OpenFlow Trademarks These guidelines (the Guidelines ) describe the proper way of using and displaying the various trademarks of
[MS-DVRD]: Device Registration Discovery Protocol. Intellectual Property Rights Notice for Open Specifications Documentation
[MS-DVRD]: Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation. Microsoft publishes Open Specifications documentation for protocols, file formats, languages,
Identity and Access Management (IAM) Across Cloud and On-premise Environments: Best Practices for Maintaining Security and Control
Identity and Access Management (IAM) Across Cloud and On-premise Environments: Best Practices for Maintaining Security and Control agility made possible Enterprises Are Leveraging Both On-premise and Off-premise
Chapter 17. Transport-Level Security
Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics
Email Encryption. Administrator Guide
Email Encryption Administrator Guide Email Encryption Administrator Guide Documentation version: 1.0 Legal Notice Copyright 2015 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo,
This Specification is provided for future development work within onem2m only. The Partners accept no liability for any use of this Specification.
This Specification is provided for future development work within onem2m only. The Partners accept no liability for any use of this Specification. The present document has not been subject to any approval
[MS-SPACSOM]: Intellectual Property Rights Notice for Open Specifications Documentation
[MS-SPACSOM]: Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation. Microsoft publishes Open Specifications documentation for protocols, file formats, languages,
BEGINNERS GUIDE TO SSL CERTIFICATES: Making the BEST choice when considering your online security options
BEGINNERS GUIDE TO SSL CERTIFICATES: Making the BEST choice when considering your online security options BEGINNERS GUIDE TO SSL CERTIFICATES Introduction Whether you are an individual or a company, you
About Contract Management
Contract Management System Architecture Data Sheet June 2015 About Contract Management Oracle Primavera Contract Management is a multi-user, multi-project Web-based application that manages all aspects
Microsoft Windows Server System White Paper
Introduction to Network Access Protection Microsoft Corporation Published: June 2004, Updated: May 2006 Abstract Network Access Protection, a platform for Microsoft Windows Server "Longhorn" (now in beta
Software License Monitoring
LANDESK Quick Start Guide Software License Monitoring VERSION 2 Introduction This guide was designed to help those users new to Software License Monitoring (SLM) introduced in LANDESK Management Suite
Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates. September 2006
Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates September 2006 Copyright 2006 Entrust. All rights reserved. www.entrust.com Entrust is a registered trademark
Web Admin Console - Release Management. Steve Parker Richard Lechner
Web Admin Console - Release Management Steve Parker Richard Lechner Terms of This Presentation This presentation was based on current information and resource allocations as of October 2009 and is subject
ATSC Standard: ATSC Security and Service Protection Standard
ATSC Standard: ATSC Security and Service Protection Standard Doc. A/106 28 September 2015 Advanced Television Systems Committee 1776 K Street, N.W. Washington, D.C. 20006 202-872-9160 1 The Advanced Television
QLIKVIEW MOBILE SECURITY
QLIKVIEW MOBILE SECURITY QlikView Technical Brief Published: March, 2011 qlikview.com QlikView Mobile Security Mobile devices are convenient, versatile and, for many employees, they are indispensable.
ELECTRONIC ARTS SOFTWARE END USER LICENSE AGREEMENT
ELECTRONIC ARTS SOFTWARE END USER LICENSE AGREEMENT This End User License Agreement ( License ) is an agreement between you and Electronic Arts Inc., its subsidiaries and affiliates ( EA ). This License
Vodafone Group Certification Authority Test House Subscriber Agreement
Vodafone Group Certification Authority Test House Subscriber Agreement Publication Date: 12/05/09 Copyright 2009 Vodafone Group Table of Contents Vodafone Group Certification Authority Test House Subscriber
Dell One Identity Cloud Access Manager 8.0 - How to Configure vworkspace Integration
Dell One Identity Cloud Access Manager 8.0 - How to Configure vworkspace Integration February 2015 This guide describes how to configure Dell One Identity Cloud Access Manager to communicate with a Dell
TERMS AND CONDITIONS
TERMS AND CONDITIONS 1. Your Acceptance Welcome to the website operated by Joint Aid Management ( JAM ) International. By using or visiting this website, you signify your agreement to the terms and conditions
Cisco Network Admission Control and Microsoft Network Access Protection Interoperability Architecture
Cisco Network Admission Control and Microsoft Network Access Protection Interoperability Architecture Cisco Systems and Microsoft Corporation Published: September 2006 Abstract Cisco Systems, Inc. and
CA Mobile Device Management 2014 Q1 Getting Started
CA Mobile Device Management 2014 Q1 Getting Started This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is
New Security Features
New Security Features BlackBerry 10 OS Version 10.3.1 Published: 2014-12-17 SWD-20141211141004210 Contents About this guide... 4 Advanced data at rest protection... 5 System requirements... 6 Managing
Application Note Gemalto Access Client for windows smart card and EFS on Microsoft Windows Vista
Application Note Gemalto Access Client for windows smart card and EFS on Microsoft Windows Vista [email protected] [email protected] November 2007 www.gemalto.com All information herein
Gandi CA Certification Practice Statement
Gandi CA Certification Practice Statement Gandi SAS 15 Place de la Nation Paris 75011 France Version 1.0 TABLE OF CONTENTS 1.INTRODUCTION...10 1.1.Overview...10 1.2.Document Name and Identification...10
Spotlight Management Pack for SCOM
Spotlight Management Pack for SCOM User Guide January 2015 The is used to display data from alarms raised by Spotlight on SQL Server Enterprise in SCOM (System Center Operations Manager). About System
Placing the BlackBerry Enterprise Server for Microsoft Exchange in a demilitarized zone
Placing the for Originally posted: June 2002 Affected software versions BlackBerry Enterprise version 2.0 for Microsoft Exchange version 2.1 for Microsoft Exchange version 3.5 for Microsoft Exchange Summary
CA Business Service Insight
DATA SHEET CA Business Service Insight With CA Business Service Insight, you can know what services are being used within your business, improve service performance while helping to reduce operating costs,
HTTP State Management
HTTP State Management Candidate Version 1.1 27 Feb 2007 Open Mobile Alliance OMA-TS-HTTPSM-V1_1-20070227-C OMA-TS-HTTPSM-V1_1-20070227-C Page 2 (17) Use of this document is subject to all of the terms
LAN API FOR DOORBIRD AND BIRDGUARD
OVERVIEW LAN API FOR DOORBIRD AND BIRDGUARD Revision: 0.4 Date: 19th of January 2019 This document specifies the external API of Bird Home Automation products. The interface provides the functionality
AN4108 Application note
Application note How to set up a HTTPS server for In-Home display with HTTPS Introduction This application note describes how to configure a simple SSL web server using the EasyPHP free application to
EMC Data Protection Search
EMC Data Protection Search Version 1.0 Security Configuration Guide 302-001-611 REV 01 Copyright 2014-2015 EMC Corporation. All rights reserved. Published in USA. Published April 20, 2015 EMC believes
4K Network Security Proposal Discussion with Studios. UXTC - Technical Planning Group Sony Electronics 8/10/2014
4K Network Security Proposal Discussion with Studios UXTC - Technical Planning Group Sony Electronics 8/10/2014 Overview Sony s 4K Network Security Proposal: Our authentication protocol uses certificates
Transglobal Secure Collaboration Program Secure E-mail v.1 Gateway Design Principles
Transglobal Secure Collaboration Program Secure E-mail v.1 Gateway Design Principles Prepared by: CP Secure E-mail v.1 Project Team Version: 2.0.2 Date: 16 July 2012 Page i Copyright 2012 Transglobal Secure
http://support.oracle.com/
Contract Management System Architecture Data Sheet October 2012 Legal Notices Copyright 1997, 2012, Oracle and/or its affiliates. All rights reserved. Oracle and Java are registered trademarks of Oracle
Beginner s Guide to SSL Certificates
WHITE PAPER: BEGINNER S GUIDE TO SSL CERTIFICATES White Paper Beginner s Guide to SSL Certificates Making the Best Choice When Considering Your Online Security Options Beginner s Guide to SSL Certificates
WiMAX Forum Network Requirements
Requirements for WiMAX VoIP Services (WVS) Phase- WMF Approved (0-0-0) WiMAX Forum Proprietary Copyright 0 WiMAX Forum. All Rights Reserved. 0 0 0 0 Copyright Notice, Use Restrictions, Disclaimer, and
CRM to Exchange Synchronization
CRM to Exchange Synchronization Product Registration Instructions VERSION 2.0 DATE PREPARED: 1/1/2013 DEVELOPMENT: BRITE GLOBAL, INC. 2012 Brite Global, Incorporated. All rights reserved. The information
Self Help Guides. Create a New User in a Domain
Self Help Guides Create a New User in a Domain Creating Users & Groups This document is to be used as a guide to creating users and/or groups in a Domain Server environment; 1. Windows Server Domain exists,
Xerox SMart esolutions. Security White Paper
Xerox SMart esolutions Security White Paper 1 Xerox SMart esolutions White Paper Network and data security is one of the many challenges that businesses face on a daily basis. Recognizing this, Xerox Corporation
Open Data Center Alliance Usage: Identity Management Interoperability Guide rev. 1.0
sm Open Data Center Alliance Usage: Identity Interoperability Guide rev. 1.0 Open Data Center Alliance Usage: Identity Interoperability Guide Rev. 1.0 Table of Contents Legal Notice... 3 Executive Summary...
ETSI TS 102 640-5 V2.1.1 (2010-01) Technical Specification
TS 102 640-5 V2.1.1 (2010-01) Technical Specification Electronic Signatures and Infrastructures (ESI); Registered Electronic Mail (REM); Part 5: REM-MD Interoperability Profiles 2 TS 102 640-5 V2.1.1 (2010-01)
TLS and SRTP for Skype Connect. Technical Datasheet
TLS and SRTP for Skype Connect Technical Datasheet Copyright Skype Limited 2011 Introducing TLS and SRTP Protocols help protect enterprise communications Skype Connect now provides Transport Layer Security
Self Help Guides. Setup Exchange Email with Outlook
Self Help Guides Setup Exchange Email with Outlook Setting up Exchange Email Connection This document is to be used as a guide to setting up an Exchange Email connection with Outlook; 1. Microsoft Outlook
CA Service Desk Manager - Mobile Enabler 2.0
This Document is aimed at providing information about the (CA SDM) Mobile Enabler and mobile capabilities that is typically not available in the product documentation. This is a living document and will
ADP Ambassador /Referral Rewards Program. Terms and Conditions of Use
ADP Ambassador /Referral Rewards Program Terms and Conditions of Use These Terms and Conditions ("Terms") are an agreement between ADP, LLC ("ADP"), on behalf of its Major Accounts Services Division ("MAS"),
Installation and configuration guide
Installation and Configuration Guide Installation and configuration guide Adding X-Username support to Forward and Reverse Proxy TMG Servers Published: December 2010 Applies to: Winfrasoft X-Username for
Sage Cloud Connector Getting Started Guide. January 2014
Sage Cloud Connector Getting Started Guide January 2014 This is a publication of Sage Software, Inc. Copyright 2014 Sage Software, Inc. All rights reserved. Sage, the Sage logos, and the Sage product and
NIST Test Personal Identity Verification (PIV) Cards
NISTIR 7870 NIST Test Personal Identity Verification (PIV) Cards David A. Cooper http://dx.doi.org/10.6028/nist.ir.7870 NISTIR 7870 NIST Text Personal Identity Verification (PIV) Cards David A. Cooper
Reference Architecture: Enterprise Security For The Cloud
Reference Architecture: Enterprise Security For The Cloud A Rackspace Whitepaper Reference Architecture: Enterprise Security for the Cloud Cover Table of Contents 1. Introduction 2 2. Network and application
ETSI TS 102 640-4 V2.1.1 (2010-01) Technical Specification
TS 102 640-4 V2.1.1 (2010-01) Technical Specification Electronic Signatures and Infrastructures (ESI); Registered Electronic Mail (REM) Part 4: REM-MD Conformance Profiles 2 TS 102 640-4 V2.1.1 (2010-01)
CA Spectrum and CA Embedded Entitlements Manager
CA Spectrum and CA Embedded Entitlements Manager Integration Guide CA Spectrum Release 9.4 - CA Embedded Entitlements Manager This Documentation, which includes embedded help systems and electronically
Pervasive Software Inc. Pervasive PSQL v11 Insurance License Agreement
Pervasive Software Inc. Pervasive PSQL v11 Insurance License Agreement IMPORTANT: DO NOT INSTALL THE ENCLOSED OR DOWNLOADED SOFTWARE UNTIL YOU HAVE READ THIS PERVASIVE PSQL LICENSE AGREEMENT ( AGREEMENT
Pipeliner CRM Phaenomena Guide Sales Pipeline Management. 2015 Pipelinersales Inc. www.pipelinersales.com
Sales Pipeline Management 2015 Pipelinersales Inc. www.pipelinersales.com Sales Pipeline Management Learn how to manage sales opportunities with Pipeliner Sales CRM Application. CONTENT 1. Configuring
Application Note Gemalto.NET 2.0 Smart Card Certificate Enrollment using Microsoft Certificate Services on Windows 2008
7 Application Note Gemalto.NET 2.0 Smart Card Certificate Enrollment using Microsoft Certificate Services on Windows 2008 All information herein is either public information or is the property of and owned
END- USER LICENSE AGREEMENT FOR Helpdesk Pilot
END- USER LICENSE AGREEMENT FOR Helpdesk Pilot Last Updated: 01st May 2014 IMPORTANT: PLEASE READ THE TERMS AND CONDITIONS OF THIS LICENSE AGREEMENT CAREFULLY BEFORE CONTINUING WITH THIS PROGRAM INSTALL.
EXEDE (R) ANALYTICS APPLICATION END USER LICENSE AGREEMENT
EXEDE (R) ANALYTICS APPLICATION END USER LICENSE AGREEMENT This Application End User License Agreement ( License ) is an agreement between you and ViaSat, Inc., with its principal place of business at
GLOBAL CUSTOMER SUPPORT SERVICES
GLOBAL CUSTOMER SUPPORT SERVICES TERMS AND CONDITIONS Please read these terms and conditions carefully. These Global Customer Support Services Terms and Conditions ( Agreement ) set forth the terms and
SSL Certificates 101
Whether you are an individual or a company, you should approach online security in the same way that you would approach physical security for your home or business. Not only does it make you feel safer
SSL Certificate Verification
SSL Certificate Verification Websense Content Gateway v7.8.x Websense Content Gateway SSL Certificate Verification October, 2013 R221013781 Copyright 1996-2013 Yahoo, Inc., and Websense, Inc. All rights
Using EMC Unisphere in a Web Browsing Environment: Browser and Security Settings to Improve the Experience
Using EMC Unisphere in a Web Browsing Environment: Browser and Security Settings to Improve the Experience Applied Technology Abstract The Web-based approach to system management taken by EMC Unisphere
The National Library of Ireland Terms of Use of Material made available on registers.nli.ie
The National Library of Ireland Terms of Use of Material made available on registers.nli.ie PLEASE READ THE FOLLOWING TERMS AND CONDITIONS CAREFULLY. THESE SET OUT THE BASIS UPON WHICH YOU ARE PERMITTED
