Interface Certification for a RMA Interface
|
|
|
- Esther Rose Lamb
- 10 years ago
- Views:
Transcription
1 Title Page Interface Certification for a RMA Interface STAR/RMA Conformance Statement
2 Table of Contents Title Page General Information Supplier Product Information Operational Environment Customer Implementation Environment Packaging Statement Integration support Conformance Requirements Relationship Management Protocol Commonalities Sending Authorisations Receiving Authorisations Sending revocations Receiving revocations Usage of InterAct Store-and-forward Import/Export Authorisations from/to File Local RMA Update Data Store Security ing Message Generating Applications BIC file integration ability... 9 Legal Notices January
3 1 General Information 1.1 Supplier Full name of the organisation that has registered this interface product and the name of the author of this Conformance Statement. Organisation Software Integrators Ltd Author Phil Hollman and Paul Hastings Date March 2011 ( Renewal 2015 ) 1.2 Product Information The name and version numbers of the interface product to which this certification and conformance claim applies. Product Name Product Version Number 1.3 Operational Environment STAR/RMA RKA14001 The hardware platform(s) and/or software platforms for which this product s performance is guaranteed. Hardware Platform on which product is guaranteed Software Platform on which product is guaranteed HP/NSK Integrity / Blade HP Proliant DL160 Guardian H06.23 / J06.14 Windows Server 2008 R2 Standard 1.4 Customer Implementation Environment The hardware platform and software environment in which this interface product s customer implementation is defined (as required to achieve full certification after an interim certification). Hardware Platform on which product was implemented Software Platform on which product was implemented 1.5 Packaging Statement The main possibilities are: STAR Hosted on HP NonStop Guardian H STAR Swiftnet Communication layer hosted on Windows 2008 R2 The RMA Interface is stand-alone and runs on its own platform. The RMA Interface is integrated on the same platform as a SWIFTNet Messaging Interface and a SWIFTNet Communication Interface The RMA Interface is integrated on the same platform as a SWIFTNet Messaging Interface but requires a separately packaged SWIFTNet Communication Interface to access SWIFTNet. Other variations are possible. If used, these should be described below. Product is stand-alone Product is integrated with another (which) The STAR/RMA is integrated on the same platform as the STAR messaging interface and STAR Communication Interface with its own security administration. January
4 1.6 Integration support The table describes if the product uses the Message Queue Host Adapter or Remote API Host Adapter as specified by SWIFT, or if it uses a proprietary or other industry standard solution. MQHA RAHA Other Yes No STAR integrated communications interface January
5 2 Conformance Requirements An RMA interface for SWIFTNet release 7 must support the mandatory items referred to in the messaging interface specifications and any of the additional optional items. The tables below identify the mandatory and optional features that an RMA interface product may support. Column 1 identifies the feature. Column 2 contains references to notes which describe the feature in more detail and where appropriate gives reference to the specification source. Column 3 describes whether the feature is Mandatory or. o A Mandatory feature must be available for all users of the product. o An feature, if implemented, is also subject to certification. Column 4 is ticked Y or N to indicate support of the feature. The certification of some items as mandatory or optional can depend on the context. For example support of item D.2 is mandatory for use with a bilateral service such as FIN but optional otherwise, or support of the Export feature is mandatory if the RMA product is standalone but optional if it is integrated with a SWIFTNet Messaging 2.1 Relationship Management Protocol Commonalities Handle set of 8 protocol elements supporting RMA in all their defined versions A.1 M Y Follow state table for authorisations held in data store A.2 M Y Import the RMA application service profile A.3 M Y A.1 The product must be capable of handling the 8 different cases of the RMA protocol A.2 The product must be capable of controlling the status of RMA authorisations A.3 The RMA service profile defines the details on using the RMA service Sending Authorisations Authorisations have to be created and sent over SWIFTNet according to the specifications. Create the authorisation B.1 M Y Off-line creation of authorisations B.2 O Y Audit log of sent authorisations B.3 O Y Using the application service profiles B.4 M Y Check for authorisations reaching end of validity period B.5 O Y Generate multiple authorisations B.6 O N B.1 The product should be capable of creating and sending an authorisation according to the application service profile for a given service, being FIN, InterAct or FileAct. B.2 The product may support off-line creation of authorisation. These authorisations will be transmitted to SWIFTNet when the connectivity is established. B.3 An audit log may be kept of sent authorisations B.4 The application service profile defines the usage of the service, especially which requests are subject to authorisations and when authorisations are mandated. B.5 A warning could be issued near the end of a validity period to allow prolongation and avoid unexpected rejections. B.6 When several services are available for which authorisations can be exchanged, the RMA interface can propose to send multiple authorisations in one go for the different services. January
6 2.1.3 Receiving Authorisations Authorisations have to be received from SWIFTNet, safely stored in the Data Store and handled accordingly. Process received authorisation C.1 M Y Generate matching authorisation to send C.2 M Y Off-line processing of received authorisations C.3 O Y Audit log of received authorisations C.4 O Y Automatic acceptance of authorisations C.5 O Y C.1 The product should be capable of processing a received authorisation. C.2 The product should be capable of responding with a matching authorisation in bilateral business relationships. C.3 Received authorisations may be manually verified rather than automatically accepted. C.4 An audit log may be kept of received authorisations. C.5 Received authorisations may be automatically accepted based on certain criteria such as BIC Sending revocations The RMA interface must be able to send revocation messages to SWIFTNet, based on the status of its underlying authorisation. Create revocation PDU D.1 M Y Off-line creation of revocation PDU D.2 O Y Audit log of sent revocations D.3 O Y D.1 The product should be capable of sending a revocation. D.2 The product may support off-line creation of revocations. These revocations will be transmitted to SWIFTNet when the connectivity is established. D.3 An audit log may be kept of sent revocations Receiving revocations The RMA interface must be able to receive revocation messages from SWIFTNet, match it to its underlying authorisation and take appropriate actions on the authorisation. Feature Note Mand. / Process received revocation PDU E.1 M Y Off-line processing of revocation PDU E.2 O Y Audit log of received revocations E.3 O Y E.1 The product should be capable of receiving a revocation. E.2 Received revocations may be manually processed rather than automatically accepted. E.3 An audit log may be kept of received revocations Usage of InterAct Store-and-forward The RMA interface can support the InterAct store-and-forward protocol or connect a messaging interface supporting this protocol. Exchange messages over InterAct store-and-forward. At least one of the following has to be supported: F.1 M Y January
7 Pull mode is supported F.2 O Y Push mode is supported F.3 O Y Supplier identification is supported (ProductInfo) F.4 M Y Configure the reception queue F.5 O Y multiple reception queues for service segregation F.6 O Y Configure the delivery notification queue F.7 O Y multiple delivery notification queues for service F.8 O Y segregation Processing of received store-and-forward delivery notifications F.9 O Y F.1 InterAct store-and-forward is the only SWIFTNet messaging supporting the exchange of RMA messages. F.2 The product may use Pull mode to fetch messages from its queues. F.3 The product may use Push mode to receive messages from its queues automatically. F.4 The Supplier Name (PIC) and Supplier Product name should appear in each RMA request ProductInfo section. F.5 Allow configuration of the reception queue. It allows service segregation. F.6 Segregated services could be supported by using multiple reception queues. F.7 Segregated services could be supported through configuration of different notification queues (delivery monitoring). F.8 Allow configuration of the delivery notification queue. It allows service segregation. F.9 Delivery notification indicates when an RMA message was delivered to the correspondent or if it was not. 2.2 Import/Export Authorisations from/to File Import and Export functions are very important in order to restore a complete set of authorisations to a secondary instance or to propagate authorisation to subscriber application performing the message filtering. Export all authorisations to a file (complete file) G.1 M/O Y Export authorisations (partial). Single criteria is G.2 M/O Y mandatory, but it may combine several of the following: Received or issued authorisations G.3 O Y For a specific service G.4 O Y For a specific BIC-8 mask G.5 O Y Since a specific date/time G.6 O Y Audit log of export G.7 O Y Export file are secured with an local authentication G.8 M Y Import authorisations from a file (complete file) G.9 M Y Import authorisations from a file (partial file) G.10 M Y Check import file for relevance (without import) G.11 M Y Audit log of import G.12 M Y Validate the local authentication value before importing file G.13 M Y G.1 The product must be able to issue a distribution file of authorisations either for all services or for a specific service. If the data store is shared between the RMA interface and the subscriber application, this test is optional. G.2 The product must be able to issue a partial distribution file of authorisations. Several criteria are possible, which are left to the implementer. If the data store is shared between the RMA interface and the subscriber application, this test is optional. January
8 G.3 The product may be able to issue a partial distribution file of authorisations send or issued. G.4 The product may be able to issue a partial distribution file of authorisations for a specific set of services. G.5 The product may be able to issue a partial distribution file of authorisations for a specific BIC-8 mask. G.6 The product may be able to issue a partial distribution file of authorisation modified since a date/time. G.7 An audit log may be kept of exportations. G.8 A valid Local Authentication must be computed and added to the export file. G.9 The product should be able to replace the content of its Data Store by importing authorisations from a complete distribution file (may be limited to a single service). G.10 The product should be able to import authorisations from a partial distribution file. G.11 The product should be able to report on the contents of the import file prior to import to validate if the import is worth doing. G.12 An audit log must be kept of importations (if the product supports import). G.13 The Local Authentication value must be validated before importing the file. The file is processed only if the validation succeeds. 2.3 Local RMA Update Sometimes, it is necessary to manually take some actions on the RMA Data Store. This is important for bootstrap records and stale records. Report on the content of authorisations in the data store H.1 O Y Delete stale authorisations from the RMA data store H.2 M Y Delete bootstrap authorisation from the RMA data store H.3 O Y Add bootstrap records within RMA Data Store H.4 M Y Import the application service profile of that service H.5 M Y H.1 Reports could detail the content and nature of authorisations. H.2 Deleting authorisations for correspondent which no longer exist (under controlled access) must be possible. H.3 Deleting bootstrap authorisations for services in migration period. The migration period is specified in the application service profile. H.4 Bootstrap records are authorisation to send or authorisation to receive, created without an exchange over SWIFTNet. A bootstrap authorisation cannot be added if the application service profile forbids it. H.5 The application service profile contains important parameters on how to use the service, including the list of messages subject to authorisation, the activation date and the bootstrapping options. 2.4 Data Store Security This section covers the minimum security requirements related to the RMA Data Store. Access control protected I.1 M Y Audit log of failed logins, and important updates I.2 M Y Access control on part of the RMA Data Store. Criteria I.3 O N may contain one or more of the following: list of BIC I.3 O N list of services I.3 O N Environment (live, pilot, development) I.3 O N January
9 Access control by 4-eyes I.4 O N Warning when export is needed (including revocation) I.5 O N Issued authorisations not deleted, only revoked I.6 M Y Received authorisations cannot be added or modified I.7 M Y other than through SWIFTNet Re-verify signature I.8 O N Availability in line with service description I.9 M Y I.1 The product must secure the user access to its data store. I.2 Audit logs of all important events should be made. I.3 The product may segregate access on BICs, services and environment basis. I.4 The product may rely on 2 secure users to deal with data store access. I.5 User should be warned of an incoming revocation or of new updates. I.6 Sent authorisations may not be deleted only revoked. I.7 Received authorisations cannot be added or modified unless there is a Request delivered by SWIFTNet, signed by the organisation of the Requestor and related to the Issuer. I.8 Signatures must be able to be verified up to 6 months after an authorisation or revocation has been sent. I.9 Availability requirements of the RMA service (for subscriber and manager) should meet the SWIFTNet Service Description. 2.5 ing Message Generating Applications Not all message generating applications are aware of RMA Data Store authorisations. This is typically true of legacy applications. The check of the RMA Data Store could be performed by a SWIFTNet Interface application on behalf of the message generating application. Provide support for filtering functionally J.1 O Y Trial run of application against RMA data J.2 O Y J.1 Application generating message could request the RMA interface to check the presence of an authorisation based on service, request type, sender and receiver. J.2 The application may have a mode, where it checks the presence of valid authorisation and report on mismatch. This is possible when the deployment of RMA within the service is in a trial stage. 2.6 BIC file integration The RMA Interface uses BIC for identifying correspondents. BIC can be integrated or uploaded from the BIC directory. Expand BIC K.1 O N Validate BIC K.2 O Y K.1 BICs can be expanded in reports and displays. K.2 BICs can be verified on entry. 2.7 ability Adhering to the same terminology in RMA products allows easy communication between users when they are using products from different Suppliers. January
10 Adhere to common terminology L.1 M Y L.1 Adhering to RMA vendor specification terminology ease communication between parties January
11 Legal Notices Copyright SWIFT All rights reserved. Restricted Distribution Do not distribute this publication outside your organisation unless your subscription or order expressly grants you that right, in which case ensure you comply with any other applicable conditions. Disclaimer The information in this publication may change from time to time. You must always refer to the latest available version. Translations The English version of SWIFT documentation is the only official and binding version. Trademarks SWIFT is the trade name of S.W.I.F.T. SCRL. The following are registered trademarks of SWIFT: the SWIFT logo, SWIFT, SWIFTNet, Accord, Sibos, 3SKey, Innotribe, the Standards Forum logo, MyStandards, and SWIFT Institute. Other product, service, or company names in this publication are trade names, trademarks, or registered trademarks of their respective owners. January
Interface Certification for a Store-andforward InterAct Messaging Interface
Title Page Interface Certification for a Store-andforward InterAct Messaging Interface IBM Sterling B2B Integrator SWIFTNet MEFG Server Conformance Statement Table of Contents Title Page... 1 1 General
Interface Certification for a FIN Interface
Title Page Interface Certification for a FIN Interface BOX Messaging Hub (formerly known as BOX For SWIFTNet) Conformance Statement Table of Contents Title Page... 1 1 General Information... 3 1.1 Supplier...
Connectivity. SWIFTNet Link 7.0. Functional Overview
Connectivity SWIFTNet Link 7.0 Functional Overview December 2010 SWIFTNet Link 7.0 Table of Contents 1 Introduction... 3 2 Enhancements and features... 4 2.1 Message and File Copy... 4 2.2 Message and
SWIFT Certified Application Payments
SWIFT Certified Application Payments Technical validation Guide 2014 Version 1.1 April 2014 Legal notices Copyright SWIFT 2014. All rights reserved. You may copy this publication within your organisation.
Connectivity. Alliance 7.0. Alliance Interfaces. FileAct support in SWIFTNet Release 7.0
Connectivity Alliance Alliance Interfaces Act support in SWIFTNet Release February 2012 Table of Contents Preface... 3 1 Introduction... 4 2 Portfolio Act Support... 6 2.1 Alliance Gateway... 6 2.1.1 Overview...
Service Description. 3SKey. Connectivity
Connectivity 3SKey Service Description This document describes the features and functions of the components of the 3SKey solution and the roles and responsibilities of all parties involved in the 3SKey
SWIFTReady for Corporates Cash Management
Service Partners SWIFTReady for Corporates Cash Management Label Criteria 2012 This document explains the business criteria needed to obtain the SWIFTReady for Corporates Cash Management label, aimed at
SWIFT Certified Specialist - Consultancy for Trade and Supply Chain Finance Track Criteria
Service Partners SWIFT Certified Specialist - Consultancy for Trade and Supply Chain Finance Track Criteria This document introduces the framework of the SWIFT Certified Specialist (formerly, SWIFTReady
SWIFT Certified Application - Exceptions and Investigations
Service Partner Programme SWIFT Certified Application - Exceptions and Investigations Label Criteria 2016 This document explains the criteria required to obtain the SWIFT Certified Application - Exceptions
How much do you pay for your PKI solution?
Information Paper Understand the total cost of your PKI How much do you pay for your PKI? A closer look into the real costs associated with building and running your own Public Key Infrastructure and 3SKey.
Alliance Access Integration MQ Host Adaptor
Alliance Access Integration MQ Host Adaptor Technical Qualification Test 2014 This document lists the tests for application providers that integrate their back-office application or middleware with Alliance
Personal Token Software Installation Guide
This document explains how to install and how to remove the token software for your personal token. 20 May 2016 Table of Contents Table of Contents Preface...3 1 Token Software Installation Prerequisites...4
SWIFT Certified Application for Corporates - Trade and Supply Chain Finance
Service Partner Programme SWIFT Certified Application for Corporates - Trade and Supply Chain Finance Label Criteria 2016 This document explains the business criteria required to obtain the SWIFT Certified
Customer Testing Policy
SWIFT Customer Testing Policy This document provides specific conditions for performance or vulnerability testing of SWIFT services and products and non-swift services and products. This document covers
Corporate Access File Transfer Service Description Version 1.0 01/05/2015
Corporate Access File Transfer Service Description Version 1.0 01/05/2015 This document describes the characteristics and usage of the Corporate Access File Transfer service, which is for transferring
Frequently Asked Questions
Reference Data SEPA Plus Frequently Asked Questions This document describes the most Frequently Asked Questions (FAQs) about the SEPA Plus product. This includes information about the SEPA Plus files and
Alliance Access Integration SOAP Host Adaptor
Alliance Access Integration SOAP Host Adaptor Technical Qualification Test 2013 This document lists the tests for application providers that integrate their back-office application or middleware with Alliance
Alliance Access Integration Automated File Transfer
Alliance Access Integration Automated File Transfer Technical Qualification Test 2011 This document lists the tests for application providers that integrate their middleware or back-office application
RS MDM. Integration Guide. Riversand
RS MDM 2009 Integration Guide This document provides the details about RS MDMCenter integration module and provides details about the overall architecture and principles of integration with the system.
Connectivity. Alliance Access 7.0. Database Recovery. Information Paper
Connectivity Alliance Access 7.0 Database Recovery Information Paper Table of Contents Preface... 3 1 Overview... 4 2 Resiliency Concepts... 6 2.1 Database Loss Business Impact... 6 2.2 Database Recovery
Connectivity. Alliance Access 7.0. Database Recovery. Information Paper
Connectivity Alliance 7.0 Recovery Information Paper Table of Contents Preface... 3 1 Overview... 4 2 Resiliency Concepts... 6 2.1 Loss Business Impact... 6 2.2 Recovery Tools... 8 3 Manual Recovery Method...
User Guide & Implementation Guidelines for using the Transaction Delivery Agent (TDA) 3.0
Using SWIFTNet to communicate with the Deriv/SERV system at DTCC User Guide & Implementation Guidelines for using the Transaction Delivery Agent (TDA) 3.0 Version 2.0 August 2009 Deriv/SERV through SWIFTNet
DigitalPersona Privacy Manager Pro
DigitalPersona Privacy Manager Pro DigitalPersona Privacy Manager Pro is a centrally-managed secure communication solution for businesses. It allows sensitive documents and communications to remain private,
Install Guide VirusBlokAda
Antivirus / Anti-spam Vba32 for Microsoft Exchange VirusBlokAda Copyright 1993-2011 ОДО VirusBlokAda Ltd. Documentation version: 0.5 (March 2011) All rights reserved. All contents, graphics and texts,
About This Guide... 4. Signature Manager Outlook Edition Overview... 5
Contents About This Guide... 4 Signature Manager Outlook Edition Overview... 5 How does it work?... 5 But That's Not All...... 6 And There's More...... 6 Licensing... 7 Licensing Information... 7 System
SWIFTNet Online Operations Manager
Messaging SWIFTNet 7.0 SWIFTNet Online Operations Manager Quick Overview December 2010 Table of Contents Preface... 3 1 Introduction... 4 1.1 Background... 4 1.2 SWIFTNet Online Operations Manager... 4
Installing and Administering VMware vsphere Update Manager
Installing and Administering VMware vsphere Update Manager Update 1 vsphere Update Manager 5.1 This document supports the version of each product listed and supports all subsequent versions until the document
Certification Practice Statement
FernUniversität in Hagen: Certification Authority (CA) Certification Practice Statement VERSION 1.1 Ralph Knoche 18.12.2009 Contents 1. Introduction... 4 1.1. Overview... 4 1.2. Scope of the Certification
Certificate Policy. SWIFT Qualified Certificates SWIFT
SWIFT SWIFT Qualified Certificates Certificate Policy This Certificate Policy applies to Qualified Certificates issued by SWIFT. It indicates the requirements and procedures to be followed, and the responsibilities
Overview of Message Retrieval capabilities on SWIFTNet
of Message Retrieval capabilities on SWIFTNet V1.0-27 September 2013 As of 2014, SWIFT is offering several ways to retrieve messages that were received through a store-and-forward service. This paper outlines
WatchDox Administrator's Guide. Application Version 3.7.5
Application Version 3.7.5 Confidentiality This document contains confidential material that is proprietary WatchDox. The information and ideas herein may not be disclosed to any unauthorized individuals
Trustis FPS PKI Glossary of Terms
Trustis FPS PKI Glossary of Terms The following terminology shall have the definitions as given below: Activation Data Asymmetric Cryptosystem Authentication Certificate Certificate Authority (CA) Certificate
Configuration Information
This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard. Other topics covered include Email Security interface navigation,
Getting Started With Delegated Administration
Getting Started With Delegated Administration Delegated Administration (available with Websense v6.1 Corporate Editions) is a powerful tool for distributing filtering and reporting responsibilities for
IDENTIKEY Appliance Administrator Guide 3.3.5.0 3.6.8
IDENTIKEY Appliance Administrator Guide 3.3.5.0 3.6.8 Disclaimer of Warranties and Limitations of Liabilities Legal Notices Copyright 2008 2015 VASCO Data Security, Inc., VASCO Data Security International
Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations Version 1.14 Effective Date: September 9, 2015
Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations Version 1.14 Effective Date: September 9, 2015 Table of Contents 1. Introduction... 5 1.1. Trademarks...
Security FAQs (Frequently Asked Questions) for Xerox Remote Print Services
Security FAQs (Frequently Asked Questions) for Xerox Remote Print Services February 30, 2012 2012 Xerox Corporation. All rights reserved. Xerox and Xerox and Design are trademarks of Xerox Corporation
SECTION C SCHEDULE A: PROJECT BRIEF PART 1: SCOPE OF SERVICES
Table of Contents Page C1/ 1 Statement of Work and Business Requirements... 2 1.1 Objective... 2 1.2 General Requirements... 2 1.3 Technical Requirements... 2 1.4 Services List... 4 1.5 Implementation
Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide
Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your computer.
Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: [email protected]
Manual Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: [email protected] Information in this document is subject to change without notice. Companies names and data used in examples herein are fictitious
Monitoring Replication
Monitoring Replication Article 1130112-02 Contents Summary... 3 Monitor Replicator Page... 3 Summary... 3 Status... 3 System Health... 4 Replicator Configuration... 5 Replicator Health... 6 Local Package
VIETNAM LAWS ONLINE DATABASE License Agreement Multi-user Subscription
VIETNAM LAWS ONLINE DATABASE License Agreement Multi-user Subscription A multi-user subscription to the Vietnam Laws Online Database is governed by the terms and conditions of this License Agreement. If
Installation Guide to the Snare Server Installation Guide to the Snare Server
Installation Guide to the Snare Server InterSect Alliance International Pty Ltd Page 1 of 19 Intersect Alliance International Pty Ltd. All rights reserved worldwide. Intersect Alliance Pty Ltd shall not
Introduction. Document Conventions. Administration. In This Section
MS Project Integration Guide March 2014 Contents Introduction... 5 Document Conventions... 5 Administration... 5 MS Project Template... 6 MS Project Template Usage... 6 Project Metadata... 6 Project WBS/Assignments...
Information paper. Best Practice for Successful Implementation of ISO 20022 for Financial Institutions
Information paper Best Practice for Successful Implementation of ISO 20022 for Financial Institutions Contents Executive summary...3 The ISO 20022 standard...3 Growth of ISO 20022 adoption...4 Adoption
All rights reserved. Trademarks
All rights reserved This manual, as well as the software described in it, is furnished under license and may be used or copied only in accordance with the terms of such license. The content of this manual
SWIFT Certified Application - Alliance Monitoring Add-On
Service Partner Programme SWIFT Certified Application - Alliance Monitoring Add-On Label Criteria 2015 This document provides a structured and detailed view of the criteria that an add-on application must
Adobe Marketing Cloud First-Party Cookies
Adobe Marketing Cloud First-Party Cookies Contents About First-Party Cookies...3 Adobe Managed Certificate Program...4 Create CNAME Records...5 Ping the hostname...5 Update implementation code...6 Legacy
HP A-IMC Firewall Manager
HP A-IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW101-20110805 Legal and notice information Copyright 2011 Hewlett-Packard Development Company, L.P. No part of this
STEP2 Pan-European Bulk Payment Processing System. Functional Overview
STEP2 Pan-European Bulk Payment Processing System Functional Overview Final 3v1 of 11 th September 2006 1 Contents 1 Introduction...4 1.1 References...4 1.2 Modification History...4 2 The Scope Of The
Optus EmailSMS for MS Outlook and Lotus Notes
Optus EmailSMS for MS Outlook and Lotus Notes Service Description, August 2005. OVERVIEW This document provides an overview of the Optus EmailSMS service delivered jointly by Optus and redcoal. It highlights
VMware Mirage Web Manager Guide
Mirage 5.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,
www.novell.com/documentation Jobs Guide Identity Manager 4.0.1 February 10, 2012
www.novell.com/documentation Jobs Guide Identity Manager 4.0.1 February 10, 2012 Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use of this documentation,
Netwrix Auditor for Exchange
Netwrix Auditor for Exchange Quick-Start Guide Version: 8.0 4/22/2016 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment from Netwrix
CreationDirect. Clearstream file transfer connectivity solutions
CreationDirect Clearstream file transfer connectivity solutions CreationDirect - Clearstream file transfer connectivity solutions Document number: 6731 This document is the property of Clearstream Banking
Bitrix Site Manager ASP.NET. Installation Guide
Bitrix Site Manager ASP.NET Installation Guide Contents Introduction... 4 Chapter 1. Checking for IIS Installation... 5 Chapter 2. Using An Archive File to Install Bitrix Site Manager ASP.NET... 7 Preliminary
Copyright 2012 Trend Micro Incorporated. All rights reserved.
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
Two Factor Authentication in SonicOS
Two Factor Authentication in SonicOS 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION indicates potential damage
Secure Email Frequently Asked Questions
Secure Email Frequently Asked Questions Frequently Asked Questions Contents General Secure Email Questions and Answers Forced TLS Questions and Answers SecureMail Questions and Answers Glossary Support
What s New in Juniper Networks Secure Access (SA) SSL VPN Version 6.4
Page 1 Product Bulletin What s New in Juniper Networks Secure Access (SA) SSL VPN Version 6.4 This document lists the new features available in Version 6.4 of the Secure Access SSL VPN product line. This
RSA Authentication Manager 7.1 to 8.1 Migration Guide: Upgrading RSA SecurID Appliance 3.0 On Existing Hardware
RSA Authentication Manager 7.1 to 8.1 Migration Guide: Upgrading RSA SecurID Appliance 3.0 On Existing Hardware Contact Information Go to the RSA corporate website for regional Customer Support telephone
NetIQ Identity Manager Setup Guide
NetIQ Identity Manager Setup Guide July 2015 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE
Getting Started With SAM Director SAM Director User Guide
Getting Started With SAM Director SAM Director User Guide Copyright 2014 License Dashboard Limited. License Dashboard Limited is a trading subsidiary of the Blenheim Group. License Dashboard Limited -
HP IMC Firewall Manager
HP IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW102-20120420 Legal and notice information Copyright 2012 Hewlett-Packard Development Company, L.P. No part of this
Veeam Backup Enterprise Manager. Version 7.0
Veeam Backup Enterprise Manager Version 7.0 User Guide August, 2013 2013 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication may
NetIQ AppManager for Self Monitoring UNIX and Linux Servers (AMHealthUNIX) Management Guide
NetIQ AppManager for Self Monitoring UNIX and Linux Servers (AMHealthUNIX) Management Guide September 2014 Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND
System Compatibility. Enhancements. Email Security. SonicWALL Email Security 7.3.2 Appliance Release Notes
Email Security SonicWALL Email Security 7.3.2 Appliance Release Notes System Compatibility SonicWALL Email Security 7.3.2 is supported on the following SonicWALL Email Security appliances: SonicWALL Email
Frequently Asked Questions
This document describes (FAQs) about IBAN Plus. This includes the IBAN Plus product, how to use the product, the quality of the data, and IBAN regulations and standards. This document is for anyone who
Interworks. Interworks Cloud Platform Installation Guide
Interworks Interworks Cloud Platform Installation Guide Published: March, 2014 This document contains information proprietary to Interworks and its receipt or possession does not convey any rights to reproduce,
PKI Adoption Case Study (for the OASIS PKIA TC) ClinPhone Complies with FDA Regulations Using PKIbased Digital Signatures
PKI Adoption Case Study (for the OASIS PKIA TC) ClinPhone Complies with FDA Regulations Using PKIbased Digital Signatures PKI Project Title Digital Signatures for ClinPhone Organisation concerned ClinPhone
Oracle Communications Connector for Microsoft Outlook
Oracle Communications Connector for Microsoft Outlook Release Notes Release 9.0 E63672-01 September 2015 This document provides release notes for Oracle Communications Connector for Microsoft Outlook,
VMware vcenter Operations Manager Enterprise Administration Guide
VMware vcenter Operations Manager Enterprise Administration Guide vcenter Operations Manager Enterprise 5.0 This document supports the version of each product listed and supports all subsequent versions
Mobile Device Management Version 8. Last updated: 17-10-14
Mobile Device Management Version 8 Last updated: 17-10-14 Copyright 2013, 2X Ltd. http://www.2x.com E mail: [email protected] Information in this document is subject to change without notice. Companies names
Dropbox for Business. Secure file sharing, collaboration and cloud storage. G-Cloud Service Description
Dropbox for Business Secure file sharing, collaboration and cloud storage G-Cloud Service Description Table of contents Introduction to Dropbox for Business 3 Security 7 Infrastructure 7 Getting Started
DocuSign for Salesforce Administrator Guide v6.1.1 Rev A Published: July 16, 2015
DocuSign for Salesforce Administrator Guide v6.1.1 Rev A Published: July 16, 2015 Copyright Copyright 2003-2015 DocuSign, Inc. All rights reserved. For information about DocuSign trademarks, copyrights
Policy Patrol 7 Upgrade Guide
Policy Patrol 7 technical documentation September 4, 2012 www.policypatrol.com If you have Policy Patrol 4, 5 or 6 installed you can upgrade to version 7 and keep your existing configuration. Please follow
Self Testing and Product Qualification Processes
GlobalPlatform Self Testing and Product Qualification Processes Version 1.2.1 Public Release May 2013 Document Reference: GPC_PRO_042 Recipients of this document are invited to submit, with their comments,
Ericsson Group Certificate Value Statement - 2013
COMPANY INFO 1 (23) Ericsson Group Certificate Value Statement - 2013 COMPANY INFO 2 (23) Contents 1 Ericsson Certificate Value Statement... 3 2 Introduction... 3 2.1 Overview... 3 3 Contact information...
MultiSite Manager. User Guide
MultiSite Manager User Guide Contents 1. Getting Started... 2 Opening the MultiSite Manager... 2 Navigating MultiSite Manager... 2 2. The All Sites tabs... 3 All Sites... 3 Reports... 4 Licenses... 5 3.
Administrator s Guide for the Polycom Video Control Application (VCA)
Administrator s Guide for the Polycom Video Control Application (VCA) Version 1.1 November 2007 Edition 3725-26448-004/A Trademark Information Polycom and the Polycom logo design are registered trademarks
Electronic Bank Account Management - EBAM
Electronic Bank Account Management - EBAM This guide provides an overview of s EBAM offering. It includes a definition of the scope of the offering as well as a high level description of its building blocks.
SC-A-063 (Ver 10-09/15) Page 3 of 6
Singapore Customs, Procedures & Systems Branch 55 Newton Road, #07-01, Revenue House Singapore 307987 Contact.: 6355 2000 Fax.: 6355 2156 Email: [email protected] APPLICATION FOR PERMIT TO TRANSMIT
SafeCom Smart Printing Administrator s Quick Guide
SafeCom Smart Printing Administrator s Quick Guide D10600-08 March 2012 Trademarks: SafeCom, SafeCom Go, SafeCom P:Go, SafeCom epay and the SafeCom logo are trademarks of SafeCom a/s. Company and product
Parallels Plesk Panel
Parallels Plesk Panel Copyright Notice Parallels Holdings, Ltd. c/o Parallels International GMbH Vordergasse 49 CH8200 Schaffhausen Switzerland Phone: +41 526320 411 Fax: +41 52672 2010 Copyright 1999-2011
Manage Licenses and Updates
Manage Licenses and Updates Palo Alto Networks Panorama Administrator s Guide Version 6.1 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054
apple WWDR Certification Practice Statement Version 1.8 June 11, 2012 Apple Inc.
Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations Version 1.8 Effective Date: June 11, 2012 Table of Contents 1. Introduction... 4 1.1. Trademarks... 4 1.2.
Advanced Configuration Steps
Advanced Configuration Steps After you have downloaded a trial, you can perform the following from the Setup menu in the MaaS360 portal: Configure additional services Configure device enrollment settings
Installation & Configuration Guide User Provisioning Service 2.0
Installation & Configuration Guide User Provisioning Service 2.0 NAVEX Global User Provisioning Service 2.0 Installation Guide Copyright 2015 NAVEX Global, Inc. NAVEX Global is a trademark/service mark
Use of Exchange Mail and Diary Service Code of Practice
Use of Exchange Mail and Diary Service Code of Practice Introduction This code of practice outlines the support mechanisms in place for the security of the Exchange mail and diary service. References are
CA Single Sign-On r12.x (CA SiteMinder) Implementation Proven Professional Exam
CA Single Sign-On r12.x (CA SiteMinder) Implementation Proven Professional Exam (CAT-140) Version 1.4 - PROPRIETARY AND CONFIDENTIAL INFORMATION - These educational materials (hereinafter referred to as
How To Set Up Egnyte For Netapp Sync For Netapp
Egnyte Storage Sync For NetApp Installation Guide Introduction... 2 Architecture... 2 Key Features... 3 Access Files From Anywhere With Any Device... 3 Easily Share Files Between Offices and Business Partners...
Dell Active Administrator 8.0
What s new in Dell Active Administrator 8.0 January 2016 Dell Active Administrator 8.0 is the upcoming release of Dell Software's complete solution for managing Microsoft Active Directory security auditing,
COUS - Conditional/user, i.e. test case becomes mandatory, if the user intends to use this functionality in live operations 2 AS - Ancillary system
The table below provides an overview of the connectivity test cases. The detailed description of individual scenarios is provided in the following pages of this annex. TARGET platform Test-ID Type 1 Applicable
Instant Buddy-List Toolkit for IBM Sametime
Instant Technologies Instant Buddy-List Toolkit for IBM Sametime High Level Technical Overview Guide Instant Technologies March 2013 Copyright and Disclaimer This document, as well as the software described
Oracle Utilities Work and Asset Management
Oracle Utilities Work and Asset Management User Guide Release 2.1.0 E61870-01 May 2015 Oracle Utilities Work and Asset Management User Guide Release 2.1.0 E61870-01 May 2015 Documentation build: 4.30.2015
Netwrix Auditor for SQL Server
Netwrix Auditor for SQL Server Quick-Start Guide Version: 8.0 4/22/2016 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment from
Configuration Information
Configuration Information Email Security Gateway Version 7.7 This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard.
RSA Authentication Manager 7.1 Security Best Practices Guide. Version 2
RSA Authentication Manager 7.1 Security Best Practices Guide Version 2 Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com. Trademarks
