Zed E-Commerce and WebCRM 7.5. Release Notes 11/29/2011
|
|
|
- Ursula Kelley
- 10 years ago
- Views:
Transcription
1 Zed E-Commerce and WebCRM 7.5 Release Notes 11/29/2011
2 PA-DSS 2.0 Validated What is PA-DSS? (Payment Application Data Security Standard) The global security standard created by the Payment Card Industry Security Standards Council (PCI SSC). [1] PA-DSS was implemented in an effort to provide the definitive data standard for software vendors that develop payment applications. The standard aims to prevent developed payment applications for third parties from storing prohibited secure data including magnetic stripe, CVV2, or PIN. In that process, the standard also dictates that software vendors develop payment applications that are compliant with the Payment Card Industry Data Security Standards (PCI DSS). To whom does it apply? The PA-DSS applies to software vendors and others who develop payment applications that store, process, or transmit cardholder data as part of authorization or settlement, where these payment applications are sold, distributed, or licensed to third parties.
3 PCI and PA-DSS Use of a PA-DSS compliant application by itself does not make an entity PCI DSS compliant, since that application must be implemented into a PCI DSS compliant environment and according to the PA-DSS Implementation Guide provided by the payment application vendor.
4 Changes required for validation - Storage and handling of credit card details - Encryption - Logging - User Authentication - Plug-in available to force use of https for all login, account details, and checkout traffic - Application or server level security against sql injection, cross-site scripting, buffer overflows
5 Storage and handling of credit card details Storage of the credit card number, CVC(card verification code) in the e-commerce and webcrm database has been removed. During checkout, credit card details are encrypted using dynamic encryption and only stored in web server session memory. After checkout completes or times out from inactivity, the data is removed. Wallet functionality(ability for customer to store payment information in their profile) has also been removed. Each time a customer checks out they will need to enter their credit card data, or choose another payment method.
6 Encryption Private keys are no longer used for data encryption in either the installer, synch manager or API. PA-DSS requires that at no time is a key stored in plain text, no one person can know the entire key, and in the event of a personnel change all keys must be changed. Users passwords are hashed Instances.xml connection strings are encrypted using dynamic key Web.config connection string is still optionally encrypted per choice during instance creation using IIS encryption Session cookies are encrypted
7 Logging Enhanced logging of user and super user actions and changes to system configuration. - Order placed - Bad password - Account locked out - Role definition changed and assigned - Credit Card Gateway config changed - Log viewed - Password changed
8 User Authentication Requirement of strong passwords, inactivity timeouts, and password expiration for all users. Unique userid s are enforced. No two users can use the same userid for login The value for address is no longer read during login. A user can only use their address for login when it is entered into the userid field when creating a new account
9 User passwords and synchronization Internal B1 users passwords are no longer displayed in plain text in a UDF in B1 and are not synchronized to B1. Business Partner Contact passwords are not updated in B1 after they have been changed in E-Commerce. Random passwords are assigned to Bp Contacts and Internal users upon initial synch.
10 User passwords and synchronization All users passwords can be changed by a super user, or with the Reset User program After a user logs in for the first time, or after their password has been changed by the Reset User tool, they will have to choose a new, strong password. Bp Contacts passwords can be set before the initial synch, after they login for the first time, a password change is required. Basically the requirement from PA-DSS is that at no time is any users password stored in plain text, and is only known to the user.
11 Upgrades Card numbers, expiry and CCV - Installer will decrypt, update using new dynamic key, then overwrite 3x to ensure original data is not retrievable via data forensics Users passwords are decrypted and then re-encrypted to one-way hash Private key is removed from instances.xml after data has been upgraded Web.config is recreated with private key removed Synch manager does not do any encryption, private key is removed from synchconfig.xml during upgrade step of running a synch
12 Compatibility Solution Component Compatible Notes SAP Business One PL9 SAP Business One 8.8 PL22 Windows Server 2003 SP2 32-bit with IIS 6 64-bit was not tested, however no 64-bit related issues found with Server bit Windows Server 2008 R2 64-bit with IIS 7.5 Windows 7 (any edition) 32 or 64-bit with IIS 7 Windows Vista 32-bit or 64-bit with IIS 7 Not tested This was not tested, however, as Server 2008 uses IIS 7, there should not be any issues Windows XP SP3 32-bit or 64-bit with IIS 5.1 No SQL bit* 64-bit was not tested, however no 64-bit related issues found with Server bit SQL 2008 R2 64-bit* Google Chrome 10 Firefox 8 Internet Explorer 8 and 9 Version 8 may have minor display issues in the Admin Apple Safari 5
13 Changes Removed field for private key on instance list screen Removed private key from instance records in instances.xml Removed private key from web.config Delete verification code from userswallet and orderpayment tables Drop userswallet table Disable Back and Upgrade buttons while upgrade or installation is in process Updated icon for system task bar and title bar, desktop shortcut, and start menu item Added password validation to Reset User New background image in setup.exe program Remove private key parameter from NPAccount constructor Removed max user functionality from My Account > Fixed issue where order confirmation s weren t being sent if account had more than 500 orders Fixed issue where order confirmation error prevents remaining s from sending Fixed issue where Messaging service does not work and throws event log error (object reference error) upon startup Commas not allowed in usernames Functionality to prevent password re-use added Implemented password expiration Prohibit auto-complete on password field on login.aspx Users must change password upon first login Queueing BP with Add multiple times will duplicate tax exemption records
14 Changes All passwords are reset upon forgot password request, removed config option Creating an account also now logs user in Prevent ReturnTo URL parameter from redirecting to external page Insecure webflow will redirect to non-ssl Prevent login and checkout pages from caching in the browser Webflow entries now trim trailing spaces Require that passwords contain at least one non-numeric character Users can no longer login with address, only userid(which could also happen to be their address) Removed password fields from user edit screen on my account section Removed username from change password screen Not synching passwords back to B1 Fixed issue with deleting user Fixed issue with renaming contact User can request password using userid Logout deletes all session data Including plug-in to enforce https on all login, checkout, my account pages
zed E-Commerce 7.0.1 Release Notes
zed E-Commerce 7.0.1 Release Notes What s new in 7.0.1 Additions Express Checkout Service Tab on Business Partner detail screen Previously Purchased Item view Special Pricing view SQL 2008 compatibility
Table of Contents. Welcome... 2. Login... 3. Password Assistance... 4. Self Registration... 5. Secure Mail... 7. Compose... 8. Drafts...
Table of Contents Welcome... 2 Login... 3 Password Assistance... 4 Self Registration... 5 Secure Mail... 7 Compose... 8 Drafts... 10 Outbox... 11 Sent Items... 12 View Package Details... 12 File Manager...
MRU Secure Remote Access Service (SRAS) External User Guide
MRU Secure Remote Access Service (SRAS) External User Guide The MRU Secure Remote Access Service (SRAS) allows MRU approved vendors and external clients, restricted remote access to internal computing
Sale Grammar School Remote Desktop Services User Instructions
Sale Grammar School Remote Desktop Services User Instructions Sale Grammar School Remote Desktop Services allows Staff and Students access to a virtual school computer while connected to the internet at
Instructions For Opening UHA Encrypted Email
Receiving Encrypted Email You have received a secure, encrypted message from UHA. The message will contain the following notice and an attachment named SecureMessageAtt.hml. The attachment is shown circled
User Guide. The AMF's File Transfer Service (FTS)
User Guide The AMF's File Transfer Service (FTS) TABLE OF CONTENTS 1 INTENDED USERS... 3 2 SCOPE OF GUIDE... 3 3 BACKGROUND... 3 4 REQUIRED CONFIGURATION... 3 5 CONTACT INFORMATION FOR SUPPORT... 4 6 SECURITY...
MRU Secure Remote Access Service (SRAS) External User Guide
MRU Secure Remote Access Service (SRAS) External User Guide The MRU Secure Remote Access Service (SRAS) allows MRU approved vendor and external clients restricted remote access to MRU internal computing
Web Conferencing Version 8.3 Troubleshooting Guide
System Requirements General Requirements Web Conferencing Version 8.3 Troubleshooting Guide Listed below are the minimum requirements for participants accessing the web conferencing service. Systems which
Catapult PCI Compliance
Catapult PCI Compliance Table of Contents Catapult PCI Compliance...1 Table of Contents...1 Overview Catapult (PCI)...2 Support and Contact Information...2 Dealer Support...2 End User Support...2 Catapult
Implementation Guide
Implementation Guide PayLINK Implementation Guide Version 2.1.252 Released September 17, 2013 Copyright 2011-2013, BridgePay Network Solutions, Inc. All rights reserved. The information contained herein
Application Security Policy
Purpose This document establishes the corporate policy and standards for ensuring that applications developed or purchased at LandStar Title Agency, Inc meet a minimum acceptable level of security. Policy
VPN Web Portal Usage Guide
VPN Web Portal Usage Guide Table of Contents WHAT IS VPN WEB CLIENT 4 SUPPORTED WEB BROWSERS 4 LOGGING INTO VPN WEB CLIENT 5 ESTABLISHING A VPN CONNECTION 6 KNOWN ISSUES WITH MAC COMPUTERS 6 ACCESS INTRANET
New Online Banking Guide for FIRST time Login
New Online Banking Guide for FIRST time Login Step 1: Login Enter your existing Online Banking User ID and Password. Click Log-In. Step 2: Accepting terms and Conditions to Proceed Click on See the terms
CUNY TUMBLEWEED (SECURE TRANSPORT) USER GUIDE
CUNY TUMBLEWEED (SECURE TRANSPORT) USER GUIDE INTRODUCTION Tumbleweed (Secure Transport) is used to provide secure file transfer of critical business files, financial transactions and sensitive data such
Startup guide for Zimonitor
Page 1 of 5 Startup guide for Zimonitor This is a short introduction to get you started using Zimonitor. Start by logging in to your version of Zimonitor using the URL and username + password sent to you.
PUBLIC. SAP Business One E-Commerce and Web CRM Administrator s Guide. Solutions from SAP. SAP Business One E-Commerce and Web CRM 6
PUBLIC SAP Business One E-Commerce and Web CRM Solutions from SAP SAP Business One E-Commerce and Web CRM 6 June 2008 Contents SAP Business One E-Commerce and Web CRM Overview...4 Product Name...4 Product
Credit Card Security
Credit Card Security Created 16 Apr 2014 Revised 16 Apr 2014 Reviewed 16 Apr 2014 Purpose This policy is intended to ensure customer personal information, particularly credit card information and primary
A MERCHANTS GUIDE TO THE PAYMENT APPLICATION DATA SECURITY STANDARD (PA-DSS)
A MERCHANTS GUIDE TO THE PAYMENT APPLICATION DATA SECURITY STANDARD (PA-DSS) The mandatory guide for storing, processing or transmitting cardholder information Overview and applicability Any application
PA-DSS Implementation Guide: Steps to ensure that your POS system is secure
PA-DSS Implementation Guide: Steps to ensure that your POS system is secure About the PCI Security Standards The PCI Security Standards Council is an open global forum, launched in 2006, that is responsible
PCI DSS FAQ. The twelve requirements of the PCI DSS are defined as follows:
What is PCI DSS? PCI DSS is an acronym for Payment Card Industry Data Security Standards. PCI DSS is a global initiative intent on securing credit and banking transactions by merchants & service providers
8/17/2010. Over 90% of all compromised merchants are PCI level 4 (small) merchants or merchants with less than 1 million transactions per year
Over 90% of all compromised merchants are PCI level 4 (small) merchants or merchants with less than 1 million transactions per year Over 80% of compromised systems were card present or in-person transactions
Are you having trouble logging in with a Username that contains special characters or spaces?
Troubleshooting Guide Forgot your Username or Password? Are you having trouble logging in with a Username that contains special characters or spaces? Can t launch a course in InfoComm University? Can t
PCI Compliance Updates
PCI Compliance Updates E-Commerce / Cloud Security Adam Goslin, Chief Operations Officer [email protected] Direct: 248.388.4328 PCI Guidance Google: PCI e-commerce guidance https://www.pcisecuritystandards.org/pdfs/pci_dss_v2_ecommerce_guidelines.pdf
RMFT Web Client User Guide
RMFT Web Client User Guide Software Version 2.5 Supported Browsers: Browser Internet Explorer Firefox Safari Google Chrome Version 7.0 and above 3 and above 3.2 and above 1.0 and above August 7, 2011 RepliWeb,
Sophos Mobile Control SaaS startup guide. Product version: 6
Sophos Mobile Control SaaS startup guide Product version: 6 Document date: January 2016 Contents 1 About this guide...4 2 About Sophos Mobile Control...5 3 What are the key steps?...7 4 Change your password...8
SpringCM Troubleshooting Guide for Salesforce
SpringCM Troubleshooting Guide for Salesforce July 2013 TABLE OF CONTENTS FAQS:... 3 WHY DID I NOT RECEIVE A SPRINGCM ACTIVATION EMAIL?... 3 WHY DON T MY SALESFORCE USERS HAVE ACCESS TO SPRINGCM?... 3
Installation and Setup Guide
Installation and Setup Guide Contents 1. Introduction... 1 2. Before You Install... 3 3. Server Installation... 6 4. Configuring Print Audit Secure... 11 5. Licensing... 16 6. Printer Manager... 17 7.
Sophos UTM. Remote Access via IPsec Configuring Remote Client
Sophos UTM Remote Access via IPsec Configuring Remote Client Product version: 9.300 Document date: Tuesday, October 14, 2014 The specifications and information in this document are subject to change without
Payment Application Data Security Standard
Payment Card Industry (PCI) Payment Application Data Security Standard ROV Reporting Instructions for PA-DSS v2.0 March 2012 Changes Date March 2012 Version Description Pages 1.0 To introduce PA-DSS ROV
Visa Asia Pacific Account Information Security (AIS) Program Payment Application Best Practices (PABP)
Visa Asia Pacific Account Information Security (AIS) Program Payment Application Best Practices (PABP) This document is to be used for payment application vendors to validate that the payment application
How to complete the Secure Internet Site Declaration (SISD) form
1 How to complete the Secure Internet Site Declaration (SISD) form The following instructions are designed to assist you in completing the SISD form that forms part of your Merchant application. Once completed,
Vendor User Accounts managing your NAP User Account
This guide explains how to request and manage your NAP User Account so that you may access Web Status. Topics include: Reactivating an existing NAP User Account Requesting a NAP User Account Managing your
Contents. Before You Install... 3. Server Installation... 5. Configuring Print Audit Secure... 10
Installation Guide Contents Before You Install... 3 Server Installation... 5 Configuring Print Audit Secure... 10 Configuring Print Audit Secure to use with Print Audit 6... 15 Licensing Print Audit Secure...
Experian Secure Transport Service
Experian Secure Transport Service Secure Transport Overview In an effort to provide higher levels of data protection and standardize our file transfer processes, Experian will be utilizing the Secure Transport
www.rohos.com Two-factor authentication Free portable encryption for USB drive Hardware disk encryption Face recognition logon
Two-factor authentication Free portable encryption for USB drive Hardware disk encryption Face recognition logon Secure Windows and Mac login by USB key www.rohos.com Rohos Logon Key Secure two-factor
PA-DSS Implementation Guide. Version 1.2.1. Document Owners. Approval Date: January 2012
v Tuition Express PA-DSS Implementation Guide Version 1.2.1 Approval Date: January 2012 Document Owners Brad Olson Operations Director Darren Gapp Chief System/Software Engineer Procare Software Tuition
How To Sync Google Drive On A Mac Computer With A Gmail Account On A Gcd (For A Student) On A Pc Or Mac Or Mac (For An Older Person) On An Ipad Or Ipad (For Older People) On
Installation and Setup of Google Drive for Students on Mac OS X Purpose: This guide will lead you through the Google Drive Installation and Configuration. Pre-requisites: 1) ODU Student Gmail account 2)
Citrix : Remediation - MAC
Citrix : Remediation - MAC Key Points: 1. 2. 3. 4. 5. 6. 7. Understanding End Point Scan Analysis Supported anti-virus and firewall products Configuring AVAST/SOPHOS and the Mac OS X Firewall Installing
Recommended Browser Setting for MySBU Portal
The MySBU portal is built using Microsoft s SharePoint technology framework, therefore, for the best viewing experience, Southwest Baptist University recommends the use of Microsoft s Internet Explorer,
PCI PA - DSS. Point BKX Implementation Guide. Version 2.01. Atos Xenta, Atos Xenteo and Atos Yomani using the Point BKX Payment Core
PCI PA - DSS Point BKX Implementation Guide Atos Xenta, Atos Xenteo and Atos Yomani using the Point BKX Payment Core Version 2.01 POINT TRANSACTION SYSTEMS AB Box 92031, 120 06 Stockholm, Tel. +46 8 566
SECURITY DOCUMENT. BetterTranslationTechnology
SECURITY DOCUMENT BetterTranslationTechnology XTM Security Document Documentation for XTM Version 6.2 Published by XTM International Ltd. Copyright XTM International Ltd. All rights reserved. No part of
To install Multifront you need to have familiarity with Internet Information Services (IIS), Microsoft.NET Framework and SQL Server 2008.
Znode Multifront - Installation Guide Version 6.2 1 System Requirements To install Multifront you need to have familiarity with Internet Information Services (IIS), Microsoft.NET Framework and SQL Server
Frequently Asked Questions for logging in to Online Banking
Frequently Asked Questions for logging in to Online Banking Why don t I recognize any of the phone numbers on the Secure Code page? I can t remember my password; can I reset it myself? I know I have the
paypoint implementation guide
paypoint implementation guide PCI PA-DSS Implementation guide 1. Introduction This PA-DSS Implementation Guide contains information for proper use of the paypoint application. Point Transaction Systems
Infor Xtreme Browser References
Infor Xtreme Browser References This document describes the list of supported browsers, browser recommendations and known issues. Contents Infor Xtreme Browser References... 1 Browsers Supported... 2 Browser
RBackup Server Installation and Setup Instructions and Worksheet. Read and comply with Installation Prerequisites (In this document)
RBackup Server Installation and Setup Instructions and Worksheet Fill out the Installation Worksheet. (In this document) Read and comply with Installation Prerequisites (In this document) Review the Partner
Using Access.Centegra.Com (Physician Access) Secure Remote Access from the Internet
System Requirements These are the minimum requirements necessary to ensure the proper operation of Centegra Health System s Access.Centegra.Com. Administrative level access to the PC or other device used
NeuralStar Installation Guide
NeuralStar Installation Guide Version 9.8 Release 2 October 2011 1st Edition Preface Software License Agreement Software is defined as the Kratos Technology & Training Solutions, Inc. computer programs
Criteria for web application security check. Version 2015.1
Criteria for web application security check Version 2015.1 i Content Introduction... iii ISC- P- 001 ISC- P- 001.1 ISC- P- 001.2 ISC- P- 001.3 ISC- P- 001.4 ISC- P- 001.5 ISC- P- 001.6 ISC- P- 001.7 ISC-
Unipass Securemail Client. User Guide v1.2
Unipass Securemail Client User Guide v1.2 This document provides a step by step illustrated user guide for the Unipass Securemail desktop software client / plug-in. UIdP Project Team 28/06/2015 Contents
Release Notes for Websense Email Security v7.2
Release Notes for Websense Email Security v7.2 Websense Email Security version 7.2 is a feature release that includes support for Windows Server 2008 as well as support for Microsoft SQL Server 2008. Version
Using desktop ANYWHERE
Using desktop ANYWHERE A facility for students and staff which provides access to University IT facilities from most computers which have a connection to the Internet. Using a web browser you can access:
FINAL DoIT 04.01.2013- v.8 APPLICATION SECURITY PROCEDURE
Purpose: This procedure identifies what is required to ensure the development of a secure application. Procedure: The five basic areas covered by this document include: Standards for Privacy and Security
Vanguard Secure E-Mail Service (VSES) User Guide
Vanguard Secure E-Mail Service (VSES) User Guide Information Security Department January 8, 2013 Contents Guide for Users of Secure E-Mail From Vanguard 1 View Secure E-Mail 1 New Registration 3 Compose
isupplygw Site Login Troubleshooting
Site Login Troubleshooting Tips User name is administrator s email address Password requirements: o Passwords must be at least 8 characters long and can be as long as 30 characters. o Passwords must contain
PCI PA - DSS. Point XSA Implementation Guide. Atos Worldline Banksys XENTA SA. Version 1.00
PCI PA - DSS Point XSA Implementation Guide Atos Worldline Banksys XENTA SA Version 1.00 POINT TRANSACTION SYSTEMS AB Box 92031, 120 06 Stockholm, Tel. +46 8 566 287 00 www.point.se Page number 2 (16)
DPH TOKEN SELF SERVICE SITE INSTRUCTIONS:
DPH TOKEN SELF SERVICE SITE INSTRUCTIONS: The purpose of this document is to provide users with assistance on resolving connection issues with Department of Public Health (DPH) Entrust tokens. These instructions
MSGCU SECURE MESSAGE CENTER
MSGCU SECURE MESSAGE CENTER Welcome to the MSGCU Secure Message Center. Email is convenient, but is it secure? Before reaching the intended recipient, email travels across a variety of public servers and
Manual. Netumo NETUMO HELP MANUAL WWW.NETUMO.COM. Copyright Netumo 2014 All Rights Reserved
Manual Netumo NETUMO HELP MANUAL WWW.NETUMO.COM Copyright Netumo 2014 All Rights Reserved Table of Contents 1 Introduction... 0 2 Creating an Account... 0 2.1 Additional services Login... 1 3 Adding a
Single Sign-On Administrator s Guide
Single Sign-On Administrator s Guide Released 11/22/2013 About this Guide This guide is designed for the people who handle software administrative duties for their agency or organization, and have the
PA-DSS Implementation Guide for. Sage MAS 90 and 200 ERP. Credit Card Processing
for Sage MAS 90 and 200 ERP Credit Card Processing Version 4.30.0.18 and 4.40.0.1 - January 28, 2010 Sage, the Sage logos and the Sage product and service names mentioned herein are registered trademarks
NETWRIX IDENTITY MANAGEMENT SUITE
NETWRIX IDENTITY MANAGEMENT SUITE FEATURES AND REQUIREMENTS Product Version: 3.3 February 2013. Legal Notice The information in this publication is furnished for information use only, and does not constitute
MY HELPDESK - END-USER CONSOLE...
Helpdesk User Guide Page 1 Helpdesk User Guide Table of Contents 1 INTRODUCTION... 3 1.1. OBJECTIVES... 3 1.2. END-USER CONSOLE... 3 1.3. SUMMARY OF RESPONSIBILITY... 3 1.4. HELPDESK INCIDENT LIFE CYCLE...
Resource Guide INSTALL AND CONNECT TO CISCO ANYCONNECT VPN CLIENT (FOR WINDOWS COMPUTERS)
INSTALL AND CONNECT TO CISCO ANYCONNECT VPN CLIENT (FOR WINDOWS COMPUTERS) PLEASE READ BEFORE INSTALLING THE CISCO ANYCONNECT SECURE MOBILITY CLIENT SOFTWARE: The VPN is to be used on computers that are
Payment Card Industry (PCI) Data Security Standard
Payment Card Industry (PCI) Data Security Standard Attestation of Compliance for Onsite Assessments Service Providers Version 3.0 February 2014 Section 1: Assessment Information Instructions for Submission
Instructions for Configuring Your Browser Settings and Online Security FAQ s. ios8 Settings for iphone and ipad app
Instructions for Configuring Your Browser Settings and Online Security FAQ s ios8 Settings for iphone and ipad app General Settings The following browser settings and plug-ins are required to properly
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
Advantage for Windows Copyright 2012 by The Advantage Software Company, Inc. All rights reserved. Client Portal blue Installation Guide v1.
Advantage for Windows Copyright 2012 by The Advantage Software Company, Inc. All rights reserved Client Portal blue Installation Guide v1.1 Overview This document will walk you through the process of installing
Bode Collection Point Electronic DNA Sample Information Program Technical Specifications
Bode Collection Point Electronic DNA Sample Information Program Technical Specifications Product Definition Bode Collection Point software is used to collect and report personal information and other meta
Manual for configuring NIC VPN in Windows OS
Manual for configuring NIC VPN in Windows OS NIC is introducing a new web based VPN interface to allow s to connect to NICNET through VPN. Apart from existing Client based VPN service, this new interface
FAQ. How does the new Big Bend Backup (powered by Keepit) work?
FAQ How does the new Big Bend Backup (powered by Keepit) work? Once you establish which of the folders on your hard drive you ll be backing up, you ll log into myaccount.bigbend.net and from your control
HELP DOCUMENTATION E-SSOM INSTALLATION GUIDE
HELP DOCUMENTATION E-SSOM INSTALLATION GUIDE Copyright 1998-2013 Tools4ever B.V. All rights reserved. No part of the contents of this user guide may be reproduced or transmitted in any form or by any means
Sophos Mobile Control user help. Product version: 6.1
Sophos Mobile Control user help Product version: 6.1 Document date: May 2016 Contents 1 About this help...4 2 About Sophos Mobile Control...5 3 Login to the Self Service Portal...6 3.1 First login...6
PCI PA - DSS. Point ipos Implementation Guide. Version 1.01. VeriFone Vx820 using the Point ipos Payment Core
PCI PA - DSS Point ipos Implementation Guide VeriFone Vx820 using the Point ipos Payment Core Version 1.01 POINT TRANSACTION SYSTEMS AB Box 92031, 120 06 Stockholm, Tel. +46 8 566 287 00 www.point.se Page
NETePay 5.0. FDMS Nashville. Installation & Configuration Guide. Part Number: 8660.54
NETePay 5.0 Installation & Configuration Guide FDMS Nashville Part Number: 8660.54 NETePay Installation & Configuration Guide Copyright 2011 Datacap Systems Inc. All rights reserved. This manual and the
Visa U.S.A Cardholder Information Security Program (CISP) Payment Application Best Practices
This document is to be used to verify that a payment application has been validated against Visa U.S.A. Payment Application Best Practices and to create the Report on Validation. Please note that payment
HHS Remote Access. End User Reference Guide VERSION 2.2
HHS Remote Access End User Reference Guide VERSION 2.2 5/08/2013 Table of Contents INTRODUCTION... 3 Purpose of This Document... 3 Intended Audience... 3 REQUIREMENTS... 3 Supported Devices... 3 Supported
Novi Survey Installation & Upgrade Guide
Novi Survey Installation & Upgrade Guide Introduction This procedure documents the step to create a new install of Novi Survey and to upgrade an existing install of Novi Survey. By installing or upgrading
You re FREE Guide SSL. (Secure Sockets Layer) webvisions www.webvisions.com +65 6868 1168 [email protected]
SSL You re FREE Guide to (Secure Sockets Layer) What is a Digital Certificate? SSL Certificates, also known as public key certificates or Digital Certificates, are essential to secure Internet browsing.
What is WS_FTP? How WS_FTP Works
What is WS_FTP? WS_FTP is the leading file transfer client with millions of users worldwide. You can easily and securely transfer files between your home and office and to and from customers, clients,
Payment Application Data Security Standards Implementation Guide
Payment Application Data Security Standards Implementation Guide 062212 PADSS 2012 Blackbaud, Inc. This publication, or any part thereof, may not be reproduced or transmitted in any form or by any means,
Request Manager Installation and Configuration Guide
Request Manager Installation and Configuration Guide vcloud Request Manager 1.0.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced
Payment Card Industry (PCI) Data Security Standard
Payment Card Industry (PCI) Data Security Standard Attestation of Compliance for Self-Assessment Questionnaire D Service Providers For use with PCI DSS Version 3.1 Revision 1.1 July 2015 Section 1: Assessment
Flexible Identity. OTP software tokens guide. Multi-Factor Authentication. version 1.0
Flexible Identity Multi-Factor Authentication OTP software tokens guide version 1.0 Publication History Date Description Revision 2014.02.07 initial release 1.0 Copyright Orange Business Services 2 of
MyanPay API Integration with Magento CMS
2014 MyanPay API Integration with Magento CMS MyanPay Myanmar Soft Gate Technology Co, Ltd. 1/1/2014 MyanPay API Integration with Magento CMS 1 MyanPay API Integration with Magento CMS MyanPay API Generating
Perceptive Intelligent Capture Solution Configration Manager
Perceptive Intelligent Capture Solution Configration Manager Installation and Setup Guide Version: 1.0.x Written by: Product Knowledge, R&D Date: February 2016 2015 Lexmark International Technology, S.A.
CDUfiles User Guide. Chapter 1: Accessing your data with CDUfiles. Sign In. CDUfiles User Guide Page 1. Here are the first steps to using CDUfiles.
CDUfiles User Guide Chapter 1: Accessing your data with CDUfiles Here are the first steps to using CDUfiles. Sign In Open your web browser and enter cdufiles.cdu.edu.au or Note: Use cdufiles.egnyte.com
Reference Guide for WebCDM Application 2013 CEICData. All rights reserved.
Reference Guide for WebCDM Application 2013 CEICData. All rights reserved. Version 1.2 Created On February 5, 2007 Last Modified August 27, 2013 Table of Contents 1 SUPPORTED BROWSERS... 3 1.1 INTERNET
Configuring Internet Explorer for Voyager on Client Computers
1 Configuring Internet Explorer for Voyager on Client Computers You must configure Microsoft Internet Explorer settings on each of your client computers so that your users can properly access and operate
Sophos UTM. Remote Access via PPTP Configuring Remote Client
Sophos UTM Remote Access via PPTP Configuring Remote Client Product version: 9.300 Document date: Tuesday, October 14, 2014 The specifications and information in this document are subject to change without
Conformance of Avaya Aura Workforce Optimization Quality Monitoring Recording Solution with the PCI Data Security Standard
Conformance of Avaya Aura Workforce Optimization Quality Monitoring Recording Solution with the PCI Data Security Standard August 2014 Table of Contents Introduction... 1 PCI Data Security Standard...
How To Login To A Website On A Pc Or Mac Or Mac (For Pc Or Ipad)
What browser types are supported? Do I need to allow cookies? What are session cookies? The system is asking me to login again and says my session has timed out. What does this mean? I am locked out after
MyNet FAQ s GETTING STARTED: Q: What is the MyNet website address? A: http://mynet.englandnetball.co.uk
MyNet FAQ s GETTING STARTED: Q: What is the MyNet website address? A: http://mynet.englandnetball.co.uk Q: Can I use any computer? A: The MyNet system is viewed using an internet browser on any computer
BT Lancashire Services
In confidence BT Lancashire Services Remote Access to Corporate Desktop (RACD) Getting Started Guide Working in partnership Confidentiality Statement BT Lancashire Services Certain information given to
Installation and Administration Guide
Installation and Administration Guide BlackBerry Enterprise Transporter for BlackBerry Enterprise Service 12 Version 12.0 Published: 2014-11-06 SWD-20141106165936643 Contents What is BES12?... 6 Key features
Baltimore County Public Schools Department of Information Technology Network Support Services System Engineering Document
Contents Access Windows... 1 Access Macintosh... 6 Access iphone/ipad... 12 Junos Pulse Installation for Android & Others... 15 Additional/Important Information... 16 Access Windows (return to top) The
