Corporate Access File Transfer Service Description Version /05/2015

Size: px
Start display at page:

Download "Corporate Access File Transfer Service Description Version 1.0 01/05/2015"

Transcription

1 Corporate Access File Transfer Service Description Version /05/2015 This document describes the characteristics and usage of the Corporate Access File Transfer service, which is for transferring cash management files (e.g. a payment file) between Nordea and a corporate customer via a public network. Technical details, such as Secure envelope specification and communication protocol dependent instructions are explained in a separate, related document. 1/17

2 1 Introduction File transfer is used for exchanging files and messages via a network. Nordea s new file transfer service for corporate customers is called Corporate Access File Transfer (CAF). Corporate Access File Transfer will be the entry point for Nordic and Baltic customers, and will support various file transfer protocols and different cash management file formats, including XML in the ISO20022 standard. The service is used by customers banking software products for automatic host-to-host file transfer. Besides the secure exchange of files, CAF also includes a user interface for a set of additional services to view the status of file transfers. With the user interface the customer can view the status, a history of transferred files and manually upload and download files. Manual File Transfer can also be used in cases when a backup channel for host-to-host channel is needed. The user interface is provided via Corporate Netbank (CN) service. Global services currently available in Corporate Access include: File Transfer for the data communication and Payables for payment services. In the future, Corporate Access will include other services, such as Receivables, Account reporting etc. This document describes the usage of the Corporate Access File Transfer service. The document will be continually updated. Structure of documentation The latest version of documents for Corporate Access File Transfer can be found at The structure of the various documents is shown below. 2/17

3 1.1 Corporate Access File Transfer The Corporate Access File Transfer service operates via a new global file transfer platform, intended for the transmission of cash management files (payments, account statements) and local file types. It will be a single entry point for Nordea s file-based services in different countries. The number of services included is still limited but it will increase as more countries are integrated into the service over the next few years. The company needs a bank connectivity program which supports one of the available protocols. Nordea does not offer bank connectivity software, but suggests that companies contact software suppliers to obtain a suitable program. The CAF service can currently be used to access file transfer services available in Sweden, Denmark and Norway. However, more countries will be integrated. The file transfer connection can be used to transmit files based on the XML standard and in addition, local cash management service files. Files targeted at Corporate Access Payables can only be enabled either via the Corporate Access File Transfer or manual file transfer via Corporate Netbank (CN). See list of currently supported file types/services in Appendix B. Technical details regarding connectivity and end-to-end security in file transfer are described in a separate document called Content Signature Specification. The technical details of different protocols are described in relevant documents available on Nordea s website 2 Prerequisites for using Corporate Access File Transfer The customer has a valid agreement with Nordea on the use of the Corporate Access File Transfer connection. See Chapter 2.1. The customer or a user must have a company-specific key and ID received from the bank upon signing the agreement. See Chapter 2.2. The company has software (one or multiple programs) which is able to: create the file which will be sent to the bank (the payload) create a security envelope, including digital signature, and establish a bank connection via available communication protocols. See Chapter Agreement Before the file transfer service can be used, an agreement (Corporate Cash Management/CAF Agreement) must be signed by the customer. By virtue of this agreement the company can upload and download batch files using the Corporate Access File Transfer data communication. In the agreement the parties specify the company and the company contact (administrator) representing the company s users, and if necessary any other users. The administrator is also authorised to download one or multiple certificates which are connected to agreed services. See Chapter 2.2 Certificates and keys. The agreement is in technical data communication level represented by an ID called SenderID. In the agreement it is possible to set up authorisations to one or several IDs. Each of the IDs is represented in an agreement by a SignerID. The user of the SignerID is authorised to use services assigned to that SignerID. 3/17

4 SignerIDs are connected to certificates, so that if multiple SignerIDs have been agreed, then an equal number of certificates will exist. Each certificate is used to digitally sign content to be sent to the bank, and each of them is authorised to use the services by the corresponding SignerID. The customer can choose to use host-to-host communication only, or in combination with the user interface via Corporate Netbank. The Corporate Netbank offers additional tools for users to view the file transfer status and maintain files, which is why it is highly recommended. In CN the customer s administrator can appoint users to have access to manual file transfer services. The same interface is used for Corporate Access Payables for online services. When a corporate customer switches starts using Corporate Access File Transfer, a new schedule must be signed. Agreements are available and can be signed at Nordea branch office Using outsourced parties to send files It is possible for a corporate customer to use a bookkeeping company or other service bureau to act on behalf of the corporate customer that owns the debit account. In such cases there must be a Power of Attorney from the corporate customer to the service bureau and it must be registered at the bank. If the file sender and signer of the security envelope is a third party that has entered into an agreement with the company and is acting on behalf of the company, the sender is a party to the agreement between Nordea and the company. If the file sender is a fourth party that has entered into an agreement with the company or with the third party, and is not acting on behalf of these, i.e. is not a signer of the envelope, the sender is not a party to the agreement between Nordea and the company or the third party. 2.2 Certificates and keys In the customer file transfer agreement it is possible to assign one or more SignerIDs. Each SignerID can be authorised to different services or respective file types. Nordea provides each SignerID with a unique certificate. The certificate is used to digitally sign the security envelope before sending files to Nordea. The persons who receives the certificate activation code for each SignerID are named by the corporate administrator in CCM agreement. When Nordea receives files, authorisation for customers to use a cash management service is always verified by the bank from the digital signature of the security envelope. If authorisation fails, the files will be rejected and a response will be sent by Nordea. Further information about the certificate download process is provided in Appendix D. 2.3 Bank connectivity software Files are sent/uploaded to Nordea using bank connectivity software which supports one of the available secure communication protocols. There are multiple software vendors locally and globally, which provide adequate software to enable Nordea Corporate Access to automatically transfer files. 4/17

5 Alternatively, files can be sent/retrieved from the bank manually by using Nordea Corporate Netbank File transfer (CN), a web-based service for interactive operations. Nordea s instructions for using the file transfer service are provided in this service description and in a more technical document entitled Content Signature Specification. In addition, there is separate documentation describing various communication protocols in detail, as well as associated use of security keys. Before the connection is established, the payload file to be uploaded to the bank must be signed digitally using the private key linked to the user/company s PKI certificate. The digital signature can be created: a. b. c. in the ERP system where the actual payload file is created (recommended) using separate software similar to the ERP system, or using a function integrated in the bank connectivity program. Alternative a) is the most secure, enabling end-to-end security, including the corporate customer s own internal network, because the file content is protected while it is being created. Before sending files to the bank production system, their structural correctness must be ensured by using the test system. See section 3.2 Testing. Character set and encoding The files sent to Nordea must be in UTF-8 format and Nordea will use UTF-8 format for all Messages sent to customers. 3 Schedules and availability Files can be uploaded and downloaded 24 hours a day, seven days a week. The execution of uploaded files will not happen in real-time, so the processing and response schedules vary depending on the service. Further information about schedules can be found in the respective service descriptions in Nordea.com. Nordea will have scheduled service breaks in Corporate Access. The file transfer service is not available during these periods. The breaks are scheduled to take place at night and over the weekend, when traffic is very limited. Such service breaks will be announced according to Nordea s policy. 3.1 Corporate Access File Transfer connectivity Nordea Corporate Access can be reached via different communication protocols. The host-to-host (H2H) protocols and their URL addresses are listed below. Instead of using IP addresses, Nordea recommends that only the URL s mentioned below be used. IP addresses are at times subject to changes, but URL addresses are static and therefore require no changes by the customer. Addresses for the Corporate Access File Transfer production systems are: sftp sftp.ebridge. AS2 as2.ebridge. 5/17

6 FTP (VPN) vpn.ebridge. Addresses for the test environment are: sftp sftp.ebridge.test. AS2 as2.ebridge.test. FTP (VPN) vpn.ebridge test. Besides the above-mentioned protocols used for connection via the internet, it is possible to connect to Nordea via the SWIFTNet FileAct. Please contact your Cash Management advisor at Nordea for further information about FileAct connection. 3.2 Testing It is possible to test the security envelope with online connection by uploading the signed file with a browser to Nordea s Corporate Access Test solution. The link can be found at www. / Information for ERP Vendors. The same test solution can also be used for testing Corporate Access Payable files. Bank connection software must be tested with Nordea s test system before it can be used in production. The connection with the test environment uses test certificates and other Nordea test IDs. Separate documentation is provided regarding testing. 3.3 Security instruction Certificates and their private keys are solely for their proper owners, to safeguard against inappropriate use of the certificate. Orders made using the customer s certificate are always assumed to have been issued by the customer, therefore the certificate and the computer, along with the software in which the certificate is saved, must be properly and securely protected. 4 User support 4.1 User support Global Nordea provide support for Corporate Access File Transfer. You find more information on, how to get help, Q&A, and Support contact information at the our ERP Vendors site at Nordea.com. 6/17

7 Appendix A Abbreviations and terms used in the service description The following table provides a list of commonly used abbreviations and terms in this document. CAF Corporate Access File Transfer. A global data communication hub at Nordea complying with international specifications such as PKI and XML. PKI Public Key Infrastructure. International specification for the identification of a party in communication (owner of certificate). XML Extensible Markup language. Format used, for instance, with the payments service and in content signature envelope messages. UI User Interface. Usually an online manual service used with a browser. CA Certificate Authority. Issuer of the PKI certificate. SSL Secure Sockets Layer. Encryption scheme used with Internet connections. HTTPS Hypertext Transfer Protocol Secure. Encrypted version of the http protocol. Administrator A special user named in company agreements, to which the company gives authorisation to receive company-specific identification data from the bank. The administrator manages the user rights related to the identification data and handles other administrative matters on behalf of the company. User A user using the service on behalf of the company. In host-tohost channels there are no users from an agreement perspective, but users may be assigned by the company administrator to connect to services via online UI Signer SignerID The party (company) that owns the digitally signed content to be sent. One agreement can have several signers, represented by SignerID s, each with their own signing certificate. Signature is an XML digital signature made with PKI keys, given to the party by the bank. Sender SenderID The party (company) that actually sends the message. Authorised to communicate with the bank using the connection and to send files signed by the Signer. The sender (identified by SenderID in agreement) can be a third or fourth party that has an agreement for file communication with the bank. Certificate A key pair with private and public keys. The private key is used by the signer to digitally sign the content (payload). The public key is included in the signature element. The Certificate is connected to the SignerID in the CAF schedule of the CA agreement. 7/17

8 Signer certificate receiver A person in the corporate, who is named in agreement scheduleto receive the certificate activation code via SMS CN An abbreviation of Corporate Netbank. Also CN FT: a manual File Transfer in Corporate Netbank BICOrBEI An identifier in payment file, used only in SWIFTNet FileAct channel SWIFTNet FileAct ID In SWIFTNet FileAct a Security Envelope is not mandatory and if not used, then the user can use only one SignerID which is used as default. The used SignerID is agreed in agreement schedule as FileAct ID. 8/17

9 Appendix B Available File types File to Nordea File type Supported Countries Comments Payment file to Corporate Access Payables NDCAPXMLI SE Pain.001 File from Nordea File type Supported Countries Comments Status file from Payables NDCAPXMLO SE Pain.002 Debit advice from Payables NDCAPXMLD54O SE Camt54D 9/17

10 Appendix C Data communication in File Transfer The following describes the data communication process steps. Identification of the user and authorisation to use the service Authorisation to use the Nordea Cash Management file-based services in Corporate Access is based on the digital signature of the content and the envelope. The envelope is signed in advance before transmission. The security envelope can be used in all file transfer channels connected to Corporate Access. It is mandatory in other channels but optional when using CN manual file transfer or SWIFTNet FileAct connections, for which special rules apply. Picture below describes connections between the file to be sent (the payload) and the envelope based on ApplicationRequest schema, to be signed and sent to Nordea. To avoid interdependencies of nested XML structures the payload message is base64 coded before it is placed as text in the content element. 1. Create payload file in corporate legacy 2. Create XML Envelope and import the pyload 3. Sign the XML wrapper with XML Dsig 4. Send the package with any protocol Figure 1 10/17

11 The structure of the security envelope message described above applies regardless of the type of the PKI certificate used. Use of certificates and PKI keys in bank connections In Corporate Access File Transfer, the customer is identified by using Public Key Infrastructure (PKI) certificates. The certificates referred to here are in X.509 format and issued by Nordea. A certificate is issued, on the basis of the Corporate Access File Transfer Agreement, to an individual or individuals working at the company. The certificate, or rather the private and public keys belonging to it, is used by the customer to digitally sign the file and by Nordea to identify the customer. Nordea can use the signature to verify that files were confirmed and signed by the company authorised to use the certificate and the requested cash management service. It also proves that the files were not altered after they were signed. The file-based certificate is valid for two years, after which it must be renewed. Instructions on how to renew the file-based certificate are provided under Appendix D/Renewal of certificate. The digital signature is created in the manner described in the Content Signature Specification, where an envelope using ApplicationRequest schema is the object of the signature. The envelope is a simple XML structure that includes information specifying the customer and the file content to be protected. The digital signature both identifies the signer and ensures content integrity. Any modification to the content ruins the signature, which would be recognised by Nordea s receiving system. In such cases, the connection would be rejected. Correspondingly, the bank s system signs an envelope using ApplicationResponse schema and Nordea s signing key, when sending files to the customer. The signature provides assurance to the user that the message has come from an agreed party and that the information has not been altered during transmission. While the security envelope ensures the identification of parties and integrity control of the message, confidentiality is achieved via encrypted communication lines. General description of data communication protocols Corporate Access File Transfer data communication consists of various protocols in pushpush or push-pull mode. Push-Push protocol means that a party that wants to send data over the internet establishes a connection. The bank can then set up a connection and transport data, such as an account statement, to the customer. The bank must have customer-specific IP addresses and keys registered to be able to set up the connection. The customer must allow the bank to connect via their firewall. Typical push-push protocols include ftp, sftp, AS2 and SWIFTNet FileAct. Push-Pull protocol means the bank server does not connect to the customer, but the customer server connects to the bank when requesting data, such as account statements from the bank. In push-pull connections, the bank does not need to maintain customer-specific information 11/17

12 about IP addresses and customer server keys, and no firewall opening is needed. Typical pushpull connections include Web Services, EBICS and manual File Transfer in Netbank. A signed security envelope is used in all the protocols mentioned above, including manual file transfer in Corporate Netbank. However, the security envelope is not mandatory in manual file transfer and SWIFTNet FileAct. If not used, the payment transactions must be confirmed manually via netbank UI after transmission (exception: not in FileAct). Nordea replies to each request message with a response message. When managing very large files, the creation of a response message may take some time. Creating and uploading files To follow is a description of the steps needed to create and upload a file. Usually a bank connection program performs these steps without the user seeing them. If files are signed and uploaded using separate software, the message is signed in accordance with steps 1-5 and uploaded in accordance with steps 6-8. See also Figure 1 on the interconnection of the messages in Appendix C Data communication in File Transfer. Signing the file 1. Create the payment file (e.g. for Corporate Access Payables) in your system. If the file is very large, it must be compressed. Convert the file or compressed file into base64 code for the uploading. The file content is called the Payload. 2. Create an envelope, an XML structure following ApplicationRequest schema. 3. Place the Payload in the Content element of the envelope. 4. Digitally sign the envelope using the company-specific certificate. 5. Transfer the message to communication software. Uploading the file 6. Establish a connection to Nordea using your preferred communication protocol. 7. Upload the message and wait for a reply from Nordea. Confirm the signature in the reply and show the content of the response to the user. Nordea s reply complies with the signed envelope following ApplicationResponse schema. The reply includes a status code indicating whether the transmission has succeeded (=0) or failed (>0). File compression If a large file in XML format (e.g. Corporate Access Payables) is sent to the bank, the file must be compressed. This enables the size of the file to be decreased significantly, which helps the signature process and transmission. A compressed payment file can easily hold 100,000 transactions in one file. The only supported compression algorithm is GZIP. See more detailed instructions in the Content Signature Specification for Corporate Access File Transfer Compression is also used in files retrieved from the bank. Receiving files from the bank Files can be received from the bank in various ways via different communication protocols. Files are always in signed envelopes so the customer can verify that the file is coming from the correct partner and to enable compression of the file content. Only GZIP algorithm is supported. 12/17

13 In push-push protocols (like sftp) Nordea will send a file (e.g. an account statement or a feedback status message) as soon as it has been created. If the file is not successfully sent, for example due to an internet connection error, the customer can retrieve the file manually later using Corporate Netbank File Transfer. Nordea will not try to send the file automatically again to avoid duplicate processing of customer transactions. In push-pull protocols (like Web Services) the customer sends a signed request to the bank and the response contains the requested file, e.g. an account statement. The response is always signed by the bank s system, so the customer s software can verify that the message was sent by the agreed party. Push-pull protocol has not yet been implemented. Technical instructions for bank connection software In addition to this service description, Nordea s Corporate Access File Transfer and data communication protocols are described in more detail in separate documents. These guidelines are mainly intended for companies producing bank connection software and are available at /vendor pages. The documentation is divided up as follows: Content signature specification for Corporate Access File Transfer This specification is used to develop software for creating a security envelope and digital signature for files to be sent to Nordea Corporate Access. Protocol specification documents for sftp, SWIFTNet FileAct and AS2. These specification documents can be used to develop or configure banking software communicating with Nordea Corporate Access. The documents are available at Vendor pages. 3. Specification documents for Web Services and EBICS will be published once those protocols have been implemented into Corporate Access. Technical documentation for testing This document specifies how testing can be performed at Nordea using one or multiple alternatives. 13/17

14 Appendix D Certificate download processes The following describes the certificate download process using software or alternatively downloading the certificate manually from Nordea s website. Downloading the certificate is secured using an activation code which is sent to the customer via SMS. The mobile phone number for SMS codes is registered in the customer s agreement, or it can be added to the agreement at a Nordea branch by an administrator. The received SMS activation code is valid for seven days. If necessary, the administrator can order a new code by calling customer support for Corporate Customers (see contact information in Chapter 4) A certificate is always attached to a company in the bank s register, even if the certificate is used by automated systems between Nordea and the customer. It is the company s responsibility to ensure that certificates are duly stored and that they are only used in the authorised manner. Backup copies of the certificates, if any, must also be stored in a secure manner. When sending a service request signed with the certificate, a user (the signer of the file) represents the company that has entered into the Corporate Access File Transfer agreement. Certificates must be renewed before the current certificate expires, in order to ensure uninterrupted use of the services. Only one version of the certificate can be in force at a time, so when a certificate is renewed, the previous one is automatically revoked. Automatic download The administrator creates a CSR (Certificate Signing Request) using a bank connection program and enters the agreement data, which will also be added to the data in the certificate: company name signerid country code (two letters, eg FI, SE ) activation code from the SMS message to the administrator. The bank connection program creates a key pair and sends the public key to Nordea for signature. If the request is accepted, the program receives the certificate, which it will use in subsequent bank connections. If there is an old certificate, it can no longer be used after this. The process is described in more detail in the guidelines intended for companies producing software. The address of the automatic certificate service is Currently only Web Services protocol is supported for automated download (see service description for Web Services communication for further information). Manual download The certificate can be downloaded manually to the customer s system from Nordea s website using the web browser ( Identification data for downloading, such as company name and SignerID, can be found in the CAF schedule of the Corporate Cash Management Agreement. To follow is a description of how to download the certificate in a Windows environment. A downloaded certificate can be used in any environment. Log in to the service address with the browser in order to download the certificate The Nexus Personal Client application must be installed before the certificate can be downloaded to the computer (see link on the screen). The Nexus Personal Client application 14/17

15 is only needed for downloading the certificate. The software only operates in a Windows environment. Fill in the company name and user ID (=SignerID) from the agreement and the activation code received in an SMS message. The country code is the same as used in customer address. Enter the password to protect the certificate when it has been received. The password must be sufficiently secure. If the password is too simple it will not be accepted and a new password will need to be entered. Finally select Download certificate. See next picture for details. 15/17

16 Image 1 16/17

17 If you want to save the certificate straight onto a USB stick, you must insert the stick into your PC before you select the Download button. Next the program will ask you to select the directory into which the certificate is to be saved and you will be asked for the password again. Enter the same password in the field as above (image 2) Image 2 Banking software must have access to the certificate file. More detailed instructions are available in each bank connection program s own instructions. If the certificate is temporarily saved on the hard drive, it is not advisable to leave it there for security reasons. Make a backup copy and delete the copies from the hard drive and the Nexus Personal program. When you no longer need Nexus Personal, you can delete it. It can be reinstalled later, if necessary Renewal of certificate A file-based PKI certificate used in the Corporate Access File Transfer protocol is valid for two (2) years. After a certificate has expired it cannot be used for bank connections. The certificate must be renewed before the current certificate expires. Nordea recommends that a new certificate is downloaded at least one month before the expiry of the current certificate. The bank connection program should give you plenty of advance warning of when your certificate is due to expire. When a certificate is renewed, the previous certificate will be closed. A new certificate can be downloaded at any time, but only one certificate is valid at a time. If the certificate has already expired, in order to receive a new certificate you must order an SMS activation code first by calling User support, or from your Nordea branch. Invalidation of certificates To invalidate the certificate, and to order a new one, if necessary, customers should contact their Nordea branch. Customers must inform the bank of the agreement and Signer ID connected to the certificate. 17/17

Web Services. File transfer Service description

Web Services. File transfer Service description Web Services File transfer Service description Content 1 General... 2 1.1 Web Services... 2 2 Agreement on the use of the WS connection... 3 2.1 Certificates and keys... 3 2.2 Prerequisites for using the

More information

Service description. Corporate Access Payables

Service description. Corporate Access Payables Service description Corporate Access Payables Table of contents Page 2 of 12 1 INTRODUCTION... 3 2 STRUCTURE OF DOCUMENTATION... 4 3 AGREEMENT SET-UP... 4 4 AVAILABLE MESSAGE TYPES... 5 5 OFFERED PAYMENT

More information

Secure Envelope specification

Secure Envelope specification Secure Envelope specification for Corporate Access File Transfer 2/13/2015 Version 1.0.3 This document defines how a file (e.g. a payment file) which will be sent to the bank is digitally signed by the

More information

How To Understand And Understand The Security Of A Key Infrastructure

How To Understand And Understand The Security Of A Key Infrastructure Security+ Guide to Network Security Fundamentals, Third Edition Chapter 12 Applying Cryptography Objectives Define digital certificates List the various types of digital certificates and how they are used

More information

Most common problem situations in direct message exchange

Most common problem situations in direct message exchange Page 1 / 7 Message Exchange Direct Message Exchange Most common problem situations in direct message exchange v. 1.0, 11.8.2014 Page 2 / 7 Most common problem situations in direct message exchange This

More information

Security Digital Certificate Manager

Security Digital Certificate Manager IBM i Security Digital Certificate Manager 7.1 IBM i Security Digital Certificate Manager 7.1 Note Before using this information and the product it supports, be sure to read the information in Notices,

More information

Security Digital Certificate Manager

Security Digital Certificate Manager System i Security Digital Certificate Manager Version 5 Release 4 System i Security Digital Certificate Manager Version 5 Release 4 Note Before using this information and the product it supports, be sure

More information

User Guide & Implementation Guidelines for using the Transaction Delivery Agent (TDA) 3.0

User Guide & Implementation Guidelines for using the Transaction Delivery Agent (TDA) 3.0 Using SWIFTNet to communicate with the Deriv/SERV system at DTCC User Guide & Implementation Guidelines for using the Transaction Delivery Agent (TDA) 3.0 Version 2.0 August 2009 Deriv/SERV through SWIFTNet

More information

Royal Mail Business Integration Gateway Specification

Royal Mail Business Integration Gateway Specification FSpec401 FSpec401 Royal Mail Customer Solutions Royal Mail Business Integration Gateway Specification - XB60 The FSpec401 document details, for customers, the various methods of connecting to Royal Mail

More information

The following multiple-choice post-course assessment will evaluate your knowledge of the skills and concepts taught in Internet Business Associate.

The following multiple-choice post-course assessment will evaluate your knowledge of the skills and concepts taught in Internet Business Associate. Course Assessment Answers-1 Course Assessment The following multiple-choice post-course assessment will evaluate your knowledge of the skills and concepts taught in Internet Business Associate. 1. A person

More information

Network-Enabled Devices, AOS v.5.x.x. Content and Purpose of This Guide...1 User Management...2 Types of user accounts2

Network-Enabled Devices, AOS v.5.x.x. Content and Purpose of This Guide...1 User Management...2 Types of user accounts2 Contents Introduction--1 Content and Purpose of This Guide...........................1 User Management.........................................2 Types of user accounts2 Security--3 Security Features.........................................3

More information

Foreign Account Tax Compliance Act (FATCA) IDES Implementation Update. April 2015

Foreign Account Tax Compliance Act (FATCA) IDES Implementation Update. April 2015 Foreign Account Tax Compliance Act (FATCA) IDES Implementation Update April 2015 IDES Implementation Developments 2 The IRS has made significant progress in developing and deploying technology capabilities

More information

II. Implementation and Service Information

II. Implementation and Service Information II. Implementation and Service Information A. Responsibilities The procedure for setup with KeyBank s standard transmission services consists of three phases: 1) communications testing, 2) applications

More information

Section I Transmission Modes

Section I Transmission Modes Transmission Modes Transmission Options Available...2 Value Added Networks (VAN)...2 File Transfer Protocol (FTP)...2 HTTPS File Upload (WEB)...3 Storing and Receiving Data with File Transfer Protocol...3

More information

The Benefits of SSL Content Inspection ABSTRACT

The Benefits of SSL Content Inspection ABSTRACT The Benefits of SSL Content Inspection ABSTRACT SSL encryption is the de-facto encryption technology for delivering secure Web browsing and the benefits it provides is driving the levels of SSL traffic

More information

E-payment. Service description

E-payment. Service description E-payment Service description Page 2 (15) Content 1 E-payment... 3 1.1 General description... 3 1.2 Advantages... 3 1.3 Availability... 3 1.4 Security... 3 2 Service agreement, instructions and start-up...

More information

About Data File Exchange

About Data File Exchange Methods for Service Providers to maintain accurate employer data September 2012 Tax and General Accounting Unemployment Insurance State of Wisconsin Contents Introduction Submitting a File through Secure

More information

SSL Guide. (Secure Socket Layer)

SSL Guide. (Secure Socket Layer) SSL Guide (Secure Socket Layer) To find basic information about network and advanced network features of your Brother machine: uu Network User's Guide. To download the latest manual, please visit the Brother

More information

Adobe Marketing Cloud First-Party Cookies

Adobe Marketing Cloud First-Party Cookies Adobe Marketing Cloud First-Party Cookies Contents About First-Party Cookies...3 Adobe Managed Certificate Program...4 Create CNAME Records...5 Ping the hostname...5 Update implementation code...6 Legacy

More information

Technical Certificates Overview

Technical Certificates Overview Technical Certificates Overview Version 8.2 Mobile Service Manager Legal Notice This document, as well as all accompanying documents for this product, is published by Good Technology Corporation ( Good

More information

Case Study for Layer 3 Authentication and Encryption

Case Study for Layer 3 Authentication and Encryption CHAPTER 2 Case Study for Layer 3 Authentication and Encryption This chapter explains the basic tasks for configuring a multi-service, extranet Virtual Private Network (VPN) between a Cisco Secure VPN Client

More information

GS1 Trade Sync Connectivity guide

GS1 Trade Sync Connectivity guide GS1 Trade Sync Connectivity guide Date: 2015-12-01 Version: v1.8 Page: 2/17 Revision history Version Date Description Author 1.0 2013-11-14 Initial version Fernando Pereira 1.1 2014-01-16 Added FTP and

More information

Chapter 7 Managing Users, Authentication, and Certificates

Chapter 7 Managing Users, Authentication, and Certificates Chapter 7 Managing Users, Authentication, and Certificates This chapter contains the following sections: Adding Authentication Domains, Groups, and Users Managing Certificates Adding Authentication Domains,

More information

Corporate egateway Supports a centralised payment and collection factory

Corporate egateway Supports a centralised payment and collection factory Corporate Supports a centralised payment and collection factory Corporate is Nordea s file based mass payment service for customers demanding one point of entry for bulk payments and collections in the

More information

Customer Tips. Xerox Network Scanning HTTP/HTTPS Configuration using Microsoft IIS. for the user. Purpose. Background

Customer Tips. Xerox Network Scanning HTTP/HTTPS Configuration using Microsoft IIS. for the user. Purpose. Background Xerox Multifunction Devices Customer Tips June 5, 2007 This document applies to these Xerox products: X WC Pro 232/238/245/ 255/265/275 for the user Xerox Network Scanning HTTP/HTTPS Configuration using

More information

HMRC Secure Electronic Transfer (SET)

HMRC Secure Electronic Transfer (SET) HM Revenue & Customs HMRC Secure Electronic Transfer (SET) Installation and key renewal overview Version 3.0 Contents Welcome to HMRC SET 1 What will you need to use HMRC SET? 2 HMRC SET high level diagram

More information

Direct message exhange with Finnish Customs

Direct message exhange with Finnish Customs Direct message exhange with Finnish Customs Technical guidebook Finnish Customs Uppdated 20 August 2015 Message Exhange Support Message exchange with Finnish Customs, Technical guidebook, updated 20 August

More information

User Guide Supplement. S/MIME Support Package for BlackBerry Smartphones BlackBerry Pearl 8100 Series

User Guide Supplement. S/MIME Support Package for BlackBerry Smartphones BlackBerry Pearl 8100 Series User Guide Supplement S/MIME Support Package for BlackBerry Smartphones BlackBerry Pearl 8100 Series SWD-292878-0324093908-001 Contents Certificates...3 Certificate basics...3 Certificate status...5 Certificate

More information

CreationDirect. Clearstream file transfer connectivity solutions

CreationDirect. Clearstream file transfer connectivity solutions CreationDirect Clearstream file transfer connectivity solutions CreationDirect - Clearstream file transfer connectivity solutions Document number: 6731 This document is the property of Clearstream Banking

More information

Certificate Management. PAN-OS Administrator s Guide. Version 7.0

Certificate Management. PAN-OS Administrator s Guide. Version 7.0 Certificate Management PAN-OS Administrator s Guide Version 7.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us

More information

Using etoken for Securing E-mails Using Outlook and Outlook Express

Using etoken for Securing E-mails Using Outlook and Outlook Express Using etoken for Securing E-mails Using Outlook and Outlook Express Lesson 15 April 2004 etoken Certification Course Securing Email Using Certificates Unprotected emails can be easily read and/or altered

More information

Security Policy Revision Date: 23 April 2009

Security Policy Revision Date: 23 April 2009 Security Policy Revision Date: 23 April 2009 Remote Desktop Support Version 3.2.1 or later for Windows Version 3.1.2 or later for Linux and Mac 4 ISL Light Security Policy This section describes the procedure

More information

SSL Overview for Resellers

SSL Overview for Resellers Web Security Enterprise Security Identity Verification Services Signing Services SSL Overview for Resellers What We ll Cover Understanding SSL SSL Handshake 101 Market Opportunity for SSL Obtaining an

More information

Version 1.0 January 2011. Xerox Phaser 3635MFP Extensible Interface Platform

Version 1.0 January 2011. Xerox Phaser 3635MFP Extensible Interface Platform Version 1.0 January 2011 Xerox Phaser 3635MFP 2011 Xerox Corporation. XEROX and XEROX and Design are trademarks of Xerox Corporation in the United States and/or other countries. Changes are periodically

More information

Corporate egateway Supports a centralised payment and collection factory

Corporate egateway Supports a centralised payment and collection factory Corporate Supports a centralised payment and collection factory Corporate is Nordea s file based mass payment service for customers demanding one point of entry for bulk payments and collections in the

More information

Experian Secure Transport Service

Experian Secure Transport Service Experian Secure Transport Service Secure Transport Overview In an effort to provide higher levels of data protection and standardize our file transfer processes, Experian will be utilizing the Secure Transport

More information

Replacements TECHNICAL REFERENCE. DTCCSOLUTIONS Dec 2009. Copyright 2009 Depository Trust Clearing Corporation. All Rights Reserved.

Replacements TECHNICAL REFERENCE. DTCCSOLUTIONS Dec 2009. Copyright 2009 Depository Trust Clearing Corporation. All Rights Reserved. TECHNICAL REFERENCE Replacements Page 1 Table of Contents Table of Contents 1 Overview... 3 1.1 Replacements Features... 3 2 Roles and Responsibilities... 4 2.1 Sender (Receiving Carrier)... 4 2.2 Recipient

More information

E-invoice in file transfer Service description

E-invoice in file transfer Service description E-invoice in file transfer Service description Content Receiving invoices through Netbank or file transfer... 3 Who can use the service?... 3 How to adopt the service... 4 File formats... 4 Finvoice...

More information

Quickstream Connectivity Options

Quickstream Connectivity Options A division of Westpac Banking Corporation ABN 33 007 457 141 Quickstream Connectivity Options Document History Date 25-Jun-2003 1-Jul-2003 3-July-2003 18-July-2003 18-Aug-2003 8-Sep-2003 19-Sep-2003 31-Oct-2003

More information

Installing and Configuring vcenter Support Assistant

Installing and Configuring vcenter Support Assistant Installing and Configuring vcenter Support Assistant vcenter Support Assistant 5.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced

More information

Interface Certification for a RMA Interface

Interface Certification for a RMA Interface Title Page Interface Certification for a RMA Interface STAR/RMA Conformance Statement Table of Contents Title Page... 1 1 General Information... 3 1.1 Supplier... 3 1.2 Product Information... 3 1.3 Operational

More information

Wakefield Council Secure email and file transfer User guide for customers, partners and agencies

Wakefield Council Secure email and file transfer User guide for customers, partners and agencies Wakefield Council Secure email and file transfer User guide for customers, partners and agencies The nature of the work the council carries out means that we often deal with information that is sensitive

More information

Ciphermail Gateway PDF Encryption Setup Guide

Ciphermail Gateway PDF Encryption Setup Guide CIPHERMAIL EMAIL ENCRYPTION Ciphermail Gateway PDF Encryption Setup Guide March 6, 2014, Rev: 5454 Copyright c 2008-2014, ciphermail.com. CONTENTS CONTENTS Contents 1 Introduction 4 2 Portal 4 3 PDF encryption

More information

Xerox Multifunction Devices. Verify Device Settings via the Configuration Report

Xerox Multifunction Devices. Verify Device Settings via the Configuration Report Xerox Multifunction Devices Customer Tips March 15, 2007 This document applies to these Xerox products: X WC 4150 X WCP 32/40 X WCP 35/45/55 X WCP 65/75/90 X WCP 165/175 X WCP 232/238 X WCP 245/255 X WCP

More information

How to Order and Install Odette Certificates. Odette CA Help File and User Manual

How to Order and Install Odette Certificates. Odette CA Help File and User Manual How to Order and Install Odette Certificates Odette CA Help File and User Manual 1 Release date 24.02.2014 Contents Preparation for Ordering an Odette Certificate... 3 Step 1: Prepare the information you

More information

Optus EmailSMS for MS Outlook and Lotus Notes

Optus EmailSMS for MS Outlook and Lotus Notes Optus EmailSMS for MS Outlook and Lotus Notes Service Description, August 2005. OVERVIEW This document provides an overview of the Optus EmailSMS service delivered jointly by Optus and redcoal. It highlights

More information

Secure Email Frequently Asked Questions

Secure Email Frequently Asked Questions Secure Email Frequently Asked Questions Frequently Asked Questions Contents General Secure Email Questions and Answers Forced TLS Questions and Answers SecureMail Questions and Answers Glossary Support

More information

ODEX Enterprise. Introduction to ODEX Enterprise 3 for users of ODEX Enterprise 2

ODEX Enterprise. Introduction to ODEX Enterprise 3 for users of ODEX Enterprise 2 ODEX Enterprise Introduction to ODEX Enterprise 3 for users of ODEX Enterprise 2 Copyright Data Interchange Plc Peterborough, England, 2013. All rights reserved. No part of this document may be disclosed

More information

System to System Interface Guide

System to System Interface Guide System to System Interface Guide Overview What does this guide cover? This guide describes the interface definition to firms intending to submit their TRS Product Sales Data (PSD) or Securities Trades

More information

Swedbank Payment Portal Implementation Overview

Swedbank Payment Portal Implementation Overview Swedbank Payment Portal Implementation Overview Product: Hosted Pages Region: Baltics September 2015 Version 1.0 Contents 1. Introduction 1 1.1. Audience 1 1.2. Hosted Page Service Features 1 1.3. Key

More information

HMRC Secure Electronic Transfer (SET)

HMRC Secure Electronic Transfer (SET) HMRC Secure Electronic Transfer (SET) How to use HMRC SET using PGP Desktop Version 2.0 Contents Welcome to HMRC SET 1 HMRC SET overview 2 Encrypt a file to send to HMRC 3 Upload files to the Government

More information

Connectivity. SWIFTNet Link 7.0. Functional Overview

Connectivity. SWIFTNet Link 7.0. Functional Overview Connectivity SWIFTNet Link 7.0 Functional Overview December 2010 SWIFTNet Link 7.0 Table of Contents 1 Introduction... 3 2 Enhancements and features... 4 2.1 Message and File Copy... 4 2.2 Message and

More information

Secure Data Transfer

Secure Data Transfer Secure Data Transfer INSTRUCTIONS 3 Options to SECURELY TRANSMIT DATA 1. FTP 2. WinZip 3. Password Protection Version 2.0 Page 1 Table of Contents Acronyms & Abbreviations...1 Option 1: File Transfer Protocol

More information

Integrated SSL Scanning

Integrated SSL Scanning Software Version 9.0 Copyright Copyright 1996-2008. Finjan Software Inc. and its affiliates and subsidiaries ( Finjan ). All rights reserved. All text and figures included in this publication are the exclusive

More information

KAZAKHSTAN STOCK EXCHANGE

KAZAKHSTAN STOCK EXCHANGE KAZAKHSTAN STOCK EXCHANGE A p p r o v e d by Kazakhstan Stock Exchange Board of Directors decision (minutes No. 15 of November 6, 2002) Effective from November 7, 2002 N O T I C E Rules have been translated

More information

CTS2134 Introduction to Networking. Module 8.4 8.7 Network Security

CTS2134 Introduction to Networking. Module 8.4 8.7 Network Security CTS2134 Introduction to Networking Module 8.4 8.7 Network Security Switch Security: VLANs A virtual LAN (VLAN) is a logical grouping of computers based on a switch port. VLAN membership is configured by

More information

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0 Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features

More information

Deployment Guide Microsoft IIS 7.0

Deployment Guide Microsoft IIS 7.0 Deployment Guide Microsoft IIS 7.0 DG_IIS_022012.1 TABLE OF CONTENTS 1 Introduction... 4 2 Deployment Guide Overview... 4 3 Deployment Guide Prerequisites... 4 4 Accessing the AX Series Load Balancer...

More information

How to Order and Install Odette Certificates. Odette CA Help File and User Manual

How to Order and Install Odette Certificates. Odette CA Help File and User Manual How to Order and Install Odette Certificates Odette CA Help File and User Manual 1 Release date 28.07.2014 Contents Preparation for Ordering an Odette Certificate... 3 Step 1: Prepare the information you

More information

Managed File Transfer

Managed File Transfer Managed File Transfer How do most organizations move files today? FTP Typically File Transfer Protocol (FTP) is combined with writing and maintaining homegrown code to address its limitations Limited Reliability

More information

Table of Contents. 1 Overview 1-1 Introduction 1-1 Product Design 1-1 Appearance 1-2

Table of Contents. 1 Overview 1-1 Introduction 1-1 Product Design 1-1 Appearance 1-2 Table of Contents 1 Overview 1-1 Introduction 1-1 Product Design 1-1 Appearance 1-2 2 Features and Benefits 2-1 Key Features 2-1 Support for the Browser/Server Resource Access Model 2-1 Support for Client/Server

More information

White Paper. Securing and Integrating File Transfers Over the Internet

White Paper. Securing and Integrating File Transfers Over the Internet White Paper Securing and Integrating File Transfers Over the Internet While the integrity of data during transfer has always been a concern the desire to use the Internet has highlighted the need to secure

More information

How to Order and Install Odette Certificates. Odette CA Help File and User Manual

How to Order and Install Odette Certificates. Odette CA Help File and User Manual How to Order and Install Odette Certificates Odette CA Help File and User Manual 1 Release date 20.07.2015 Contents Preparation for Ordering an Odette Certificate... 3 Step 1: Prepare the information you

More information

Secure Transfers. Contents. SSL-Based Services: HTTPS and FTPS 2. Generating A Certificate 2. Creating A Self-Signed Certificate 3

Secure Transfers. Contents. SSL-Based Services: HTTPS and FTPS 2. Generating A Certificate 2. Creating A Self-Signed Certificate 3 Contents SSL-Based Services: HTTPS and FTPS 2 Generating A Certificate 2 Creating A Self-Signed Certificate 3 Obtaining A Signed Certificate 4 Enabling Secure Services 5 A Note About Ports 5 Connecting

More information

Configuring Digital Certificates

Configuring Digital Certificates CHAPTER 36 This chapter describes how to configure digital certificates and includes the following sections: Information About Digital Certificates, page 36-1 Licensing Requirements for Digital Certificates,

More information

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University October 2015 1 List of Figures Contents 1 Introduction 1 2 History 2 3 Public Key Infrastructure (PKI) 3 3.1 Certificate

More information

Service Description. 3SKey. Connectivity

Service Description. 3SKey. Connectivity Connectivity 3SKey Service Description This document describes the features and functions of the components of the 3SKey solution and the roles and responsibilities of all parties involved in the 3SKey

More information

MAXIMUM DATA SECURITY with ideals TM Virtual Data Room

MAXIMUM DATA SECURITY with ideals TM Virtual Data Room MAXIMUM DATA SECURITY with ideals TM Virtual Data Room WWW.IDEALSCORP.COM ISO 27001 Certified Account Settings and Controls Administrators control users settings and can easily configure privileges for

More information

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

2. From a control perspective, the PRIMARY objective of classifying information assets is to: MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected

More information

BeamYourScreen Security

BeamYourScreen Security BeamYourScreen Security Table of Contents BeamYourScreen Security... 1 The Most Important Facts in a Nutshell... 3 Content Security... 3 User Interface Security... 3 Infrastructure Security... 3 In Detail...

More information

Data Transfer Service A Migration tool to replace current X.400 messaging between NHS workflow applications

Data Transfer Service A Migration tool to replace current X.400 messaging between NHS workflow applications Data Transfer Service A Migration tool to replace current X.400 messaging between NHS workflow applications Submitter: Richard Corbridge Sponsorship: Gwyn Thomas 1. Introduction 1.1 This paper proposes

More information

ANZ transactive 05.2012

ANZ transactive 05.2012 ANZ transactive TECHNICAL SPECIFICATIONS GUIDE 05.2012 contents 1. Summary 3 2. Systems overview 4 3. Client technical specification 5 3.1 Usage Considerations 5 3.2 Summary Specification 5 > > 3.2.1 Summary

More information

Estate Agents Authority

Estate Agents Authority INFORMATION SECURITY AND PRIVACY PROTECTION POLICY AND GUIDELINES FOR ESTATE AGENTS Estate Agents Authority The contents of this document remain the property of, and may not be reproduced in whole or in

More information

Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment

Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment White Paper Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment Cisco Connected Analytics for Network Deployment (CAND) is Cisco hosted, subscription-based

More information

ShareFile Security Overview

ShareFile Security Overview ShareFile Security Overview ShareFile Company Policy All ShareFile employees undergo full background checks and sign our information security policy prior to beginning employment with the company. The

More information

MadCap Software. Upgrading Guide. Pulse

MadCap Software. Upgrading Guide. Pulse MadCap Software Upgrading Guide Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software described in this document is furnished

More information

IBM Campaign and IBM Silverpop Engage Version 1 Release 2 August 31, 2015. Integration Guide IBM

IBM Campaign and IBM Silverpop Engage Version 1 Release 2 August 31, 2015. Integration Guide IBM IBM Campaign and IBM Silverpop Engage Version 1 Release 2 August 31, 2015 Integration Guide IBM Note Before using this information and the product it supports, read the information in Notices on page 93.

More information

Djigzo S/MIME setup guide

Djigzo S/MIME setup guide Author: Martijn Brinkers Table of Contents...1 Introduction...3 Quick setup...4 Create a CA...4 Fill in the form:...5 Add certificates for internal users...5 Add certificates for external recipients...7

More information

NETWRIX EVENT LOG MANAGER

NETWRIX EVENT LOG MANAGER NETWRIX EVENT LOG MANAGER ADMINISTRATOR S GUIDE Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment

More information

SFTP (Secure Shell FTP using SSH2 protocol)

SFTP (Secure Shell FTP using SSH2 protocol) SFTP (Secure Shell FTP using SSH2 protocol) Technical Manual March 2014 1. Contents 1. 1. Table of contents 2. Introduction... 3 3. Criteria for SFTP... 5 4. Preparations for connecting to SFTP... 7 5.

More information

File Transmission Methods Monday, July 14, 2014

File Transmission Methods Monday, July 14, 2014 Slide 1 - of 27 Version 4.4, 7/14/14 CMS reserves the right to modify this presentation. To ensure you have the most current version, verify that the version and date on this page match the version and

More information

PHIN MS Detailed Security Design

PHIN MS Detailed Security Design The Public Health Information Network Messaging System (PHINMS) sends and receives sensitive data over the internet to the public health information systems using Electronic Business Extensible Markup

More information

IBM Campaign Version-independent Integration with IBM Engage Version 1 Release 3 April 8, 2016. Integration Guide IBM

IBM Campaign Version-independent Integration with IBM Engage Version 1 Release 3 April 8, 2016. Integration Guide IBM IBM Campaign Version-independent Integration with IBM Engage Version 1 Release 3 April 8, 2016 Integration Guide IBM Note Before using this information and the product it supports, read the information

More information

redcoal EmailSMS for MS Outlook and Lotus Notes

redcoal EmailSMS for MS Outlook and Lotus Notes redcoal EmailSMS for MS Outlook and Lotus Notes Technical Support: support@redcoal.com Or visit http://www.redcoal.com/ All Documents prepared or furnished by redcoal Pty Ltd remains the property of redcoal

More information

ABB solar inverters. User s manual ABB Remote monitoring portal

ABB solar inverters. User s manual ABB Remote monitoring portal ABB solar inverters User s manual ABB Remote monitoring portal List of related manuals Title ABB Remote monitoring portal User s manual NETA-01 Ethernet adapter module User s manual Code (English) 3AUA0000098904

More information

ipayment Gateway API (IPG API)

ipayment Gateway API (IPG API) ipayment Gateway API (IPG API) Accepting e-commerce payments for merchants Version 3.2 Intercard Finance AD 2007 2015 Table of Contents Version control... 4 Introduction... 5 Security and availability...

More information

SolarWinds Technical Reference

SolarWinds Technical Reference SolarWinds Technical Reference Using SSL Certificates in Web Help Desk Introduction... 1 How WHD Uses SSL... 1 Setting WHD to use HTTPS... 1 Enabling HTTPS and Initializing the Java Keystore... 1 Keys

More information

ADFS Integration Guidelines

ADFS Integration Guidelines ADFS Integration Guidelines Version 1.6 updated March 13 th 2014 Table of contents About This Guide 3 Requirements 3 Part 1 Configure Marcombox in the ADFS Environment 4 Part 2 Add Relying Party in ADFS

More information

Installation Guide for Pulse on Windows Server 2012

Installation Guide for Pulse on Windows Server 2012 MadCap Software Installation Guide for Pulse on Windows Server 2012 Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software

More information

Shared Accounting Module Trading Partner Integration Guide

Shared Accounting Module Trading Partner Integration Guide Trading Partner Integration Guide Document Version 2.2 Table of Contents How to Use This Document... 2 Section 1: Services and Options... 2 Section 2: SAM Technical Overview... 7 Section 3: Getting Started...

More information

Standard and Advantage SSL Certificate

Standard and Advantage SSL Certificate Entrust Certificate Services Standard and Advantage SSL Certificate Enrollment Guide Software release: 11.7 Date of Issue: July 2015 Document issue: 1.0 Copyright 2008-2015 Entrust. All rights Reserved.

More information

Norton Mobile Privacy Notice

Norton Mobile Privacy Notice Effective: April 12, 2016 Symantec and the Norton brand have been entrusted by consumers around the world to protect their computing devices and most important digital assets. This Norton Mobile Privacy

More information

Guideline on Auditing and Log Management

Guideline on Auditing and Log Management CMSGu2012-05 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Auditing and Log Management National Computer Board Mauritius

More information

Customer Tips. Xerox Network Scanning TWAIN Configuration for the WorkCentre 7328/7335/7345. for the user. Purpose. Background

Customer Tips. Xerox Network Scanning TWAIN Configuration for the WorkCentre 7328/7335/7345. for the user. Purpose. Background Xerox Multifunction Devices Customer Tips dc07cc0432 October 19, 2007 This document applies to these Xerox products: X WC 7328/7335/7345 for the user Xerox Network Scanning TWAIN Configuration for the

More information

Chapter 4 Virtual Private Networking

Chapter 4 Virtual Private Networking Chapter 4 Virtual Private Networking This chapter describes how to use the virtual private networking (VPN) features of the FVL328 Firewall. VPN tunnels provide secure, encrypted communications between

More information

Licensing Guide BES12. Version 12.1

Licensing Guide BES12. Version 12.1 Licensing Guide BES12 Version 12.1 Published: 2015-04-02 SWD-20150402115554403 Contents Introduction... 5 About this guide...5 What is BES12?...5 Key features of BES12... 5 About licensing...7 Steps to

More information

Configuring DoD PKI. High-level for installing DoD PKI trust points. Details for installing DoD PKI trust points

Configuring DoD PKI. High-level for installing DoD PKI trust points. Details for installing DoD PKI trust points Configuring DoD PKI This document describes the procedures to configure an XML Firewall that is interoperable with the United Stated Department of Defense (DoD) Public Key Infrastructure (PKI). High-level

More information

Security & Privacy on the WWW. Topic Outline. Information Security. Briefing for CS4173

Security & Privacy on the WWW. Topic Outline. Information Security. Briefing for CS4173 Security & Privacy on the WWW Briefing for CS4173 Topic Outline 1. Information Security Relationship to safety Definition of important terms Where breaches can occur Web techniques Components of security

More information

Deploying the BIG-IP System with Oracle E-Business Suite 11i

Deploying the BIG-IP System with Oracle E-Business Suite 11i Deploying the BIG-IP System with Oracle E-Business Suite 11i Introducing the BIG-IP and Oracle 11i configuration Configuring the BIG-IP system for deployment with Oracle 11i Configuring the BIG-IP system

More information