Guide for installation and use of Sterling Commerce Command Line Client (CLC) in Unix Operating System

Size: px
Start display at page:

Download "Guide for installation and use of Sterling Commerce Command Line Client (CLC) in Unix Operating System"

Transcription

1 Guide for installation and use of Sterling Commerce Command Line Client (CLC) in Unix Operating System Page 1 of 29

2 Table of contents Changes made in this version : PBS A/S has changed its name to Nets Danmark A/S (Nets is a result of the merge between PBS and the Norwegian BBS). Nets has implemented a new server, which already now can be reached. The old IP-adress is planned to be inactivated in the beginning of february Introduction... 4 Content... 4 Preparations before installation... 4 Rights... 4 Limitations... 4 Installation guide... 5 Download installation files from the Internet... 5 Change file extension CLC.pbs to CLC.exe... 6 Start installation... 7 Updates for the current software version Use of CLC Requirements for using CLC Your key Server's public keys CLC files cesshsftp Return codes sshclc.properties sshlog.properties autoscript_file <install>/.ssh/known_hosts Development and use of SFTP commands Limitations in use Term explanation Wildcard syntax Naming of files from PBS SFTP commands Introduction List Syntax descriptions dir or ls put mput get mget rm or delete quit or bye Example of a set up for automatic file exchange Introduction Important information Example Page 2 of 29

3 Detailed description Example Detailed description Example Detailed description Manual logon First time Subsequent manual logon Support Contact information Business hours Page 3 of 29

4 Introduction Content Preparations before installation Rights This guide is for users who want to use Sterling Commerce's Command Line Client (CLC) in UNIX, Linux and AIX computers that will be used for exchanging data with Nets via the SFTP protocol. The guide describes how the CLC software can be downloaded and then be used for controlling data communication with Nets. Please read the entire guide before starting the installation. CLC can always be uninstalled and re-installed without problems. You must make sure you have installed Winzip. You must make sure that Java ver. 1.3 (or newer version) has been installed. Contact your system administrator, if necessary. All rights to this guide and communication solution belongs to Nets. You may not copy, forward or in any other way make the material of parts thereof available to a third party without permission from Nets. Limitations The following platforms are supported by CLC: UNIX, Linux, AIX, HP-UX and SUN Solaris. Page 4 of 29

5 Installation guide Download installation files from the Internet To be able to install CLC you need to download the zipped file clcnix.pbs. It is assumed that the download will take place from a Windows computer. Log on to the Web site Select Data Communication and you will find the software to be downloaded. Choose "CLC installation program for Unix (23.3 MB)" The following screen will be displayed: Click Gem to save the file on your PC. Choose the folder on your PC where you want the file to be located and then press Gem. When the file has been transferred, the following screen will be displayed. Page 5 of 29

6 Change file extension CLC.pbs to CLC.exe Before you can run the installation of the program the file "clcnix.pbs" must be unpacked and moved to the computer where the program will be run. The file is unpacked by pressing Åbn mappe, which causes you to open an explorer. If the above dialog box is closed automatically you can rename the file in the following way: Choose "Stifinder", which can be done by right-clicking on "Start" and choosing "Stifinder". Choose the folder where you saved the file "clcnix.pbs" by left-clicking on the folder. The file "clcnix.pbs" is now displayed. Right-click on the file and choose "Omdøb". Now edit the file name to be "clcnix.exe" by typing this file name over the old file name. You unpack the file by clicking on it and choosing where it will be located on your Windows computer. Then it must be moved to the Unix computer where the program will run. There are several methods to do this and you must contact your system administrator to find out how you move files between Windows and Unix. When the files have been moved you are ready to begin the installation. Page 6 of 29

7 Start installation The following is an example of an installation of CLC on an AIX system: ============================================== Sterling Commerce, Inc.,(TM) Connect:Enterprise Command Line Client (Secure FTP) Installation Procedure: You are beginning the Connect:Enterprise Command Line Client (Secure FTP) Installation Procedure. You will be asked to specify a directory (called the destination directory) where the Connect:Enterprise Command Line Client (Secure FTP) files are stored. Sterling Commerce, Inc.(TM) and Connect:Enterprise(TM) are trademarks of Sterling Commerce, Inc. in the U.S.A. and other countries. UNIX is a trademark of UNIX Systems Laboratories, Inc. ============================================== Press ENTER to continue: Enter the path where the CD-ROM drive is mounted (e.g. /cdrom or '.'):. Enter the destination directory path where the Connect:Enterprise Command Line Client (Secure FTP) is to be installed [$HOME/clcftp]: /ceunix/clc/clcftp You have selected /ceunix/clc/clcftp for installation. Do you want to continue?:[y n] clc_us_license.txt Page 7 of 29

8 clc_int_license.txt 7406 blocks Please specify whether you are a U.S.(domestic) or International user. Type "US" if you are located within the U.S. Type "INT" if you are located outside of the U.S.: Enter [US or INT]: INT Connect:Enterprise Command Line Client (Secure FTP) Carefully read all of the terms and conditions of this Agreement prior to opening or installing the Product. Sterling Commerce B.V, Sterling Commerce International, Inc. or any of its affiliated Sterling Commerce entities or such third party to whom either entity has granted certain marketing, redistribution or sublicensing rights ("Provider") will grant a right of use for the enclosed Connect:Enterprise Command Line Client and related documentation (the "Product") to You only on the condition that You accept all of the terms and conditions of this Agreement. USE OF THE PRODUCT INDICATES YOUR ACCEPTANCE OF THE TERMS AND CONDITIONS OF THIS AGREEMENT. You understand that by selecting the "ACCEPT" option at the bottom of this Agreement that You are agreeing to the terms of this Agreement. If You do not agree with the terms and conditions of this Agreement, You should select the "DECLINE" option at the bottom of this Agreement that will allow You to exit and terminate this transaction. Upon exiting, You should promptly return the Product to Your Provider. Upon return of the Product, this Agreement shall terminate. If applicable, Your Provider shall be solely responsible for refunding to You any applicable fees paid by You for the terminated Product. USE OF THE PRODUCT INDICATES YOUR ACCEPTANCE OF THE TERMS AND CONDITIONS OF THIS AGREEMENT. 1. Grant Of Right of Use. Provider hereby grants to You a nonexclusive and nontransferable right of use to use a single copy of the object code version of the Product under the terms and conditions of this Agreement. You may use this copy of the Product on a single compatible computer located within Your country in which it is originally located. Your right to use the Product is limited to Your transmittal of data solely to and from your Provider. The Product is not to be used for any other purpose, including but not limited to, the processing of data of any third parties or in connection with the operation of a service bureau. Except for a copy to be used for backup purposes, You may not copy or distribute the Product in whole or in part. You may not alter, modify, decompile, disassemble or reverse engineer the Product or apply any process or technique to the Product for the purposes of ascertaining the source code. 2. Title, Confidentiality. You acknowledge that this is an agreement for right of use and not an agreement for sale. Provider and/or its licensor ("Licensor") continue to own the copy of the Product for which a right of use is granted hereunder. You further acknowledge that title and all trade secrets, copyright, patent rights, trademarks, and other intellectual property rights in and to the shall remain with Provider and/or its Licensor. You may not disclose, or transfer the Product to any party. Your rights under this Agreement not be assigned, sublicensed, pledged, or otherwise transferred. You may not alter, remove or conceal any copyright, trade secret, or other proprietary rights notices that may appear on or Page 8 of 29

9 within the Product. You must reproduce all proprietary rights notices on any copies of the Product which are allowed under this Agreement. 3. Term. The right of use is effective until terminated. Termination of the right of use shall occur if: (i) You fail to comply with any term or condition of this Agreement; (ii) You cease to transmit data to and from the Provider for any reason, (iii) You elect to terminate the right of use for any reason, or (iv)you or Your Provider is in breach. Upon termination, You agree to destroy all copies of the Product, including backup copies. Section 2 shall survive termination of this Agreement for any reason. 4. Maintenance Support. Maintenance support for this copy of the Product may be offered by the Provider, at its sole discretion. You should direct any questions to Your Provider regarding whether or not maintenance support is being offered for the Product and, if applicable, the terms of maintenance support. 5. "As Is" Warranty. YOU UNDERSTAND AND AGREE THAT PROVIDER GRANTS THIS RIGHT OF USE FOR THIS PRODUCT "AS IS" AND NEITHER PROVIDER OR ITS LICENSOR(S) MAKES ANY WARRANTY, REPRESENTATION OR PROMISE OF ANY KIND. PROVIDER AND ITS LICENSOR(S) DISCLAIM AND EXCLUDE ANY AND ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, ANY WARRANTY OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. NEITHER PROVIDER NOR ITS LICENSOR(S) WARRANT THAT THE PRODUCT WILL SATISFY YOUR REQUIREMENTS OR THAT THE PRODUCT IS WITHOUT DEFECT OR ERROR OR THAT THE OPERATION OF THE PRODUCT WILL BE UNINTERRUPTED. 6. Limitations of Remedies. YOU ACKNOWLEDGE AND AGREE THAT IN NO EVENT SHALL PROVIDER OR ITS LICENSOR(S) BE LIABLE TO YOU OR ANY OTHER PARTY FOR ANY DIRECT, INDIRECT, SPECIAL, INCIDENTAL, CONSEQUENTIAL OR SIMILAR DAMAGES OR FOR LOST DATA OR PROFITS RESULTING IN ANY WAY FROM THE USE OR POSSESSION OF THE PRODUCT. 7. General. This Agreement shall be governed by the laws of Your country in which the Product is originally located and is the complete and exclusive statement of the agreement between You and Your Provider. This Agreement supersedes any proposal or prior agreement, oral or written, and any other communications between You and Your Provider relating to the subject matter herein. 8. Export Restrictions. You acknowledge that the Product is subject to United export controls under applicable export control regulations, including without limitation, the United States Export Administration Regulations. The Product, and underlying information and technology, may not be downloaded or exported or re-exported. Do you accept the above license agreement?:[y n] y Installing Connect:Enterprise Command Line Client (Secure FTP) Page 9 of 29

10 ... Extracting Command Line Client Base components. PwdTerm.so cesftp.jar cesshsftp.jar ceuftpcust java_check sample_secureftp.cfg sshclc.properties sshlog.properties trusted.txt Readme.txt commons-logging.license EccpressoAll.jar SterlingUtil.jar TrustpointAll.jar TrustpointProviders.jar commons-logging.jar jce-jdk jar scisecurelib.jar scisecurelib_props.jar sslplus_jsse.jar 7406 blocks... Done. Verifying Command Line Client Base components are extracted.... Done. Do you want to setup the Java environment for the Connect:Enterprise Command Line Client (Secure FTP)?:[Y n] y ============================================== Sterling Commerce, Inc.,(TM) Connect:Enterprise Command Line Client (Secure FTP) Customization. To abort the process, enter Control-C. ============================================== Page 10 of 29

11 Please press ENTER to continue... Searching for Java... ******************************************************** Select the appropriate Java interpreter program. Contact your System Administrator if you are unsure about the appropriate selection. ******************************************************** 0 = User enters the absolute path to Java. 1 = version at /usr/java130/bin/java 2 = version at /usr/java130/jre/bin/java 3 = version at /usr/java131/bin/java 4 = version at /usr/java131/jre/bin/java 5 = version at /usr/java14/bin/java 6 = version at /usr/java14/jre/bin/java 7 = version at /usr/java14/.private142/bin/java 8 = version at /usr/java14/.private142/jre/bin/java Select [0-8]: 4 Creating /ceunix/clc/clcftp/secureftp.cfg Creating /ceunix/clc/clcftp/ceftp Creating /ceunix/clc/clcftp/cesshsftp Creating /ceunix/clc/clcftp/ssh-keygen.sh ============================================== The script files ceftp, cesshsftp and ssh-keygen.sh have been created. To bring up the Connect:Enterprise Command Line Client (Secure FTP), type ceftp or cesshsftp from the installation destination directory. ============================================== Building license.install file Connect:Enterprise Command Line Client (Secure FTP) installation has completed. Page 11 of 29

12 Updates for the current software version There may be updates available for the software you have just installed. You can control this on our web site Current updates (if any) are shown. Just download the zip file containing the updates and install them into the library, where your CLC client has been installed. Page 12 of 29

13 Use of CLC Requirements for using CLC The following must be in place before you can use CLC: You must have receive a User ID (name of your mailbox) and an associated password You must have retrieved your key and placed it correctly You must be able to remember the pass phrase you used when generating your private key You must have the server's public key You must know the IP address for the server, which is You must know the port, which is You must have opened your firewall to the combination of IP address and port Your key Retrieval of key occurs via the Web page by using your chip card, the associated User ID and password. (If necessary, see "User guide for key generation"). You can place your key wherever you wish, but please see the section "The private key" in the user guide named above where security issues surrounding storage of the key are described. Server's public keys CLC files cesshsftp You must have the server's public keys in the file with "known hosts". The best way to place it in the correct place is to manually start a session with the server from your computer. You will be prompted to save the server's public keys. By answering "always" the key will be saved correctly. This is described in more detail in the section about manual logon. After installation of CLC there will be a number of files in the directory that was chosen as the installation directory. In the following sections this will be referred to as <install>. In the example <install> is set to /ceunix/clc/clcftp. The following files are the most important: <install>.\cesshsftp the SFTP client program itself <install>.\sshclc.properties contains ssh parameters <install>\ sshlog.properties contains parameters to control logging <install>.\autoscript_file contains parameters and commands <install>\.ssh\known_hosts contains the public key from the host(s) that are being used to exchange files It must be emphasised that several of the files may be located in places other than <install> because they can be directly referred to via the parameters and configuration files. The program can be used together with a number of parameters: cesshsftp [-a autoscript_file] [-s propertyfile] [-d [debug_file]] [-r] [-x] [-h] [-L key_file] [-P passphrase] Page 13 of 29

14 -a autoscript Specifies the location and file name of the automation script file. Refer to Writing Automation under autoscript_file -s propertyfile Indicates to override the default property file (sshclc.properties) with propertyfile. -d newloglevel Indicate newloglevel to override the default log level. Valid values are: 0 = No logging. 1 = General information. 2 = Debug information. 3 = Trace information. debugfile Indicate newlogfilename to override the default log file. -h Returns the command line syntax -L newkeyfile Indicates to override the default public authentication key file with newkeyfile. If you use this parameter, you can use the -P parameter to specify the passphrase. If you do not include the -P parameter in the command, you will be prompted for the passphrase. -P passphrase Specifies the passphrase associated with the newkeyfile specified with the -L parameter. -r Returns the product name, release, and build. -x Turns on result code exiting for the entire instance of the client. Used with automation scripts to exit if a command fails. Return codes Using the parameter x, the CLC delivers a return code after completion. The return codes are : 15 SSH key failed 14 ssh scripting failure 13 SSH command failure 12 SSH Disconnect 11 SSH TIMEOUT 10 Catatrophic failure 9 Reserved 8 Locsite parameter invalid 7 Command line parameter invalid 6 SSL file parameter invalid 5 get subcommand failed 4 put subcommand failed 3 Command failed 2 Authetication/login failure 1 Connection establishment failure 0 Good return code Page 14 of 29

15 sshclc.properties sshlog.properties autoscript_file <install>/.ssh/kno wn_hosts An example of property file is displayed here: # Sample ResourceBundle properties file #sockettimeout time=seconds, 1800=30 minutes sockettimeout=1800 compression=yes passwordauth=no publickeyauth=yes #cipherlist=3des-cbc,blowfish-cbc,aes256-cbc,aes192-cbc,aes128- cbc,cast128-cbc #maclist=hmac-sha1,hmac-md5-96,hmac-md5,hmac-sha1-96 keyfile=c:/<path for the file containing the key id_dsa>/newkey knownhostkeyfile=myknown_host An example of log-property is displayed here: ############################################## # Default Logging Configuration File ############################################## # Handler specific properties. # Describes specific configuration info for Handlers. ############################################## # default file output is in user's runtime directory. # Limit the message that are printed on the console to INFO and above. # the valid values are TRACE,DEBUG,INFO,WARN,ERROR,FATAL # the writelogfile value=true will write to log file com.sterlingcommerce.sshclc.sftplogger.defaultlog = INFO com.sterlingcommerce.sshclc.sftplogger.writelogfile = true Example of an autoscript file: ############################################## open <ip adresse> <mailboksid> c:\<path for the file containing the key id_dsa\id_dsa <passphrase> put filer\testfil3_8.mby dir quit ############################################## id_dsa is a reference to the user's key retrieved from Nets' Web site. Contains public keys for the hosts that have been contacted and always responded. You can also add keys manually, e.g. keys that have been downloaded. Page 15 of 29

16 Development and use of SFTP commands Limitations in use Important: You must always use a binary transfer for transmission of data to Nets. The data files you send to your mailbox at Nets must always have the same code page because your mailbox has been predefined for one of the code pages Nets supports. Guides and software from other software suppliers may contain SFTP commands other than those that have been specified in this guide. Nets is not obligated to support such commands or guarantee that they will work correctly when used for this SFTP solution. Page 16 of 29

17 Term explanation In the chart below you will find explanations of the terms that are used in this document. Term Explanation Marking SFTP command The commands the Nets supports in this solution bold Variable The possible variable parameters you can use in your command strings. See the Wildcard syntax section <wildcard> Server_id Address of the Nets SFTP server that can either be a Web address, e.g. ft.pbs.dk, if it is possible to create a name reference with the customer in italics id_dsa The private key when you receive it from Nets Bold The SFTP port on Nets s SFTP server No marking cesshsftp Client prompt in the software that is delivered from Nets. This will vary if you use other client software No marking -C SFTP parameter that activates compression of data No marking -b <path>whatever_script> SFTP parameter that executes a batch job The content of the batch job is described in whateverscript. No marking -oport= SFTP syntax for definition of port number on Nets s SFTP server. No marking MAILBXID The userid you received from Nets No Divider between userid and server name No marking Userid Your local UNIX/Linux user Bold passphrase What you typed in when you generated your key No marking Page 17 of 29

18 Wildcard syntax The chart below displays the supported syntax for use of wildcards Wildcard character Effect? The search with? entails selection of all occurrences. For example, a search with a wildcard 2? will entail selection of 22, 29 or 2a. * Search with * will entail selection of all occurrences regardless of the value in * and subsequent characters. For example, a search with a wildcard 2* will entail selection of 2, 23 or 23aa. [ ] This search entails selection of all occurrences that match what has been specified as a value within the two brackets. For example, the search [2*3] will select 23, and 233. Similarly, the search [b-k,p] will select all occurrences with values between b and k, as well as p. The search criterion [abc]* selects all occurrences starting with a, b or c. Naming of files from Nets Nets has used the naming convention below for data files that are delivered to you. This naming standard makes it possible to select special file types in building your scripts for retrieving files. Files that begin with T are transmission receipts. This allows you to see if the delivery has been received correctly on the Nets server. Files that begin with V are validation receipts. Here you can see if your data delivery has been accepted by the Nets system that will process it. Files that begin with D are files to you from a Nets system in unzipped format. Files that begin with Z are files to you from a Nets system in zipped format. To receive files in zipped format your mailbox must be set up for this. Note that, as a rule, there is no purpose in using this facility when you are using SFTP. Files that begin with F are delivery notes that certain Nets systems form together with D files. Page 18 of 29

19 Page 19 of 29

20 SFTP commands Introduction This section describes the SFTP commands that can be used in the SFTP solution. It is important to adhere to the described syntax rules to ensure correct data exchange with Nets. The examples assume that a command line client has been used but the commands can also be coded into a script for automatic execution. List The table below displays the supported SFTP commands and their meaning Command Meaning dir or ls Displays a list of your files in your mailbox at Nets put Sends a file to your mailbox at Nets (see note) mput Sends several files to your mailbox at Nets (see note) get Retrieves a file from you mailbox at Nets mget Retrieves several files from your mailbox at Nets rm or del Deletes a file from your mailbox at Nets quit or bye Logs you off from the SFTP server at Nets Page 20 of 29

21 Syntax descriptions dir or ls Syntax: dir or ls When this command is issued, a list of the files that are in your mailbox at Nets are delivered. The list you receive contains only files that are available to be downloaded to your computer. The files you have sent yourself to the mailbox will therefore NOT be displayed. put Syntax: put<path><filnavn> When this command is issued you can send one file at a time to your mailbox at Nets. <filnavn> is the name of the file that must be sent to your mailbox at Nets. <path> is the location of <filnavn> on your computer, for example for Windows: c:\nets-upload\ mput Syntax: mput<path><wildcard> When this command is issued you can send several files at a time to your mailbox at Nets. <wildcard> is selection criteria for files found in <path>, for example C:\nets-upload\netsdata.* get Syntax: GET <filnavn> <path><nytfilnavn> When this command is issued you can retrieve one file at a time from your mailbox at Nets. <filnavn> is the name of the file in your mailbox at Nets. <path> is the name of the directory on your computer where you wish to save the file. If you do not specify <path>, the file will be placed in the directory that is active. <nytfilnavn> is the name you want to give the file when it is stored on your computer. If you do not specify anything in <nytfilnavn> the file will be saved with the same name that is specified in <filnavn>. If you do not specify any <nytfilnavn> you can not use the <path> parameter either. Page 21 of 29

22 mget Syntax: mget <wildcard> When this command is issued you can retrieve several files at a time from your mailbox at Nets. <wildcard> is the selection criteria among the files that are available in your mailbox at Nets. Example : mget D* or only mget* mget D* will copy all files from the mailbox that start with D and mget * will copy all files from the mailbox. No result list is given when executing the mget command. Because there is no option of specifying a file name or directory, the files will have the same name as in the mailbox at Nets and they will all be placed in the active directory on your computer. rm or delete Syntax: rm or delete <filnavn> or <wildcard> The commands give you the ability to delete files in your mailbox at Nets. <filnavn> is the name of the file in the mailbox that you wish to delete. When using the parameter <wildcard> it is possible to delete all files that meet the selection criteria in your wildcard parameter. Always use caution when using this command and consider the exact relevance of deleting files from your mailbox yourself. You can not delete files that you yourself have sent to the mailbox at Nets. You cannot delete files that you have already retrieved one time. - In other words, you can only delete files that Nets has generated for you and that you have not yet retrieved. If you delete files from Nets without having checked the content of the file, Nets's information obligation to you is no longer valid. Page 22 of 29

23 quit or bye Syntax: quit or bye These commands mean you can log off from the SFTP server at Nets. Page 23 of 29

24 Example of a set up for automatic file exchange Introduction In this section we provide an example of setting up automatic file exchange. The requirement for this script is that you have downloaded the Command Line Client, which you can retrieve at The purpose of the script is to retrieve all available files in your mailbox at Nets. Important information To be able to execute scripts to the Nets server you need to have received its public key. The best way to have it delivered is to start your first session to Nets manually. The system will ask you to save the public key. If you answer "Always" to the question about the extent to which you accept the public key, the file "known-hosts" will be updated for you. To automatically perform data transmission, it is important that you answer "Always". See the "Manual logon" section. Example Put in crontab with the desired time interval: get.sh This must have the content: cesshsftp a getscript.txt -x The content in getcript.txt is open serverid MAILBXID <install>/key/id_dsa passphrase lcd c:\receive\library mget * quit Page 24 of 29

25 Detailed description In the script above, the cesshsftp command starts the sshftp command line client. This must always be installed on your computer equipment. (See "Guide for installation of Command Line Client for SFTP solution".) The parameter a specifies that a script file must always be used that automates logon to the Nets server. The parameter x specifies that cesshsftp must deliver return codes upon completion of the program. (Refer to chapter about Return codes) MAILBXID in the script "getscript.txt" must always be replaced by the mailbox ID you received from Nets. The path <install>/key/id_dsa must be replaced by the path that shows the location of the private key. The lcd command is changing the local library in the example above to c:\receive\library Example Put in crontab with the desired time interval: put.sh This must have the content: cesshsftp a putscript.txt. The content in getcript.txt is open serverid MAILBXID <install>/key/id_dsa passphrase lcd <install>pbs mput * quit Detailed description In the script above, the cesshsftp command starts the sshftp command line client. This must always be installed on your computer equipment. (See "Guide for installation of Command Line Client for SFTP solution".) The parameter a specifies that a script file must always be used that automates logon to the Nets server. MAILBXID in the script "putscript.txt" must always be replaced by the mailbox ID you received from Nets and passphrase must be replaced by the passphrase you entered when receiving your private key. The path <install>/key/id_dsa must be replaced by the path that shows Page 25 of 29

26 the location of the private key. <install>/pbs must be replaced with the path, where you have placed the data files you want to send to Nets. Example Create a shell script file e.g. ft.sh with the content as follows : #!/bin/sh # retc=0 #Set user return value to 0 (zero) #Invoke the C:E CLC with return code checking on (-x) #./cesshsftp -a askopi01.txt -x retc=$? echo "Returkoden was: "$retc #Check return code if [ $retc -gt 1 ]; then echo "File transfer ended with error" else echo "File transfer ended OK" fi exit $retc Detailed description In the example above, you want to run ft.sh to start cesshsftp using a script file with the parameter a and ending the cesshsftp with delivering and processing the return code. Remember to reset the return code by starting with the command retc=0. Upon completion of cesshsftp, the return code is checked for being equal to or greater than 1. If so an error message is displayed otherwise a good message is displayed. The script can off course be extended to react upon certain return codes e.g. deleting files or copying files to other libraries. Page 26 of 29

27 Manual logon First time The example below shows how you log on to Nets' SFTP server the first time with the command line interface you can receive from Nets. Text in bold is your entry <install>/./cesshsftp ============================================ Sterling Commerce, Inc.,(TM) Connect:Enterprise Command Line SSH SFTP Client ============================================ cesshsftp> Enter Host Name: server_id The host ft.pbs.dk is currently unknown to the system The host key fingerprint is: :3d:18:0d:90:fe:20:f9:83:e9:3f:1f:90:78:e6:ef Do you want to allow this host key? [Yes No Always]: Always cesshsftp> Enter User Name: MAILBXID (replaced with your userid) cesshsftp> Subsequent manual logon The example below shows a subsequent manual logon. Text with fed is your entry <install>/./cesshsftp ===================================================== Sterling Commerce, Inc.,(TM) Connect:Enterprise Command Line SSH SFTP Client ===================================================== Page 27 of 29

28 cesshsftp> Enter Host Name: server_id cesshsftp> Enter User Name: MAILBXID (must be replaced with your user id/user) cesshsftp> Page 28 of 29

29 Support Contact information If you have problems with the installation you can contact Nets' technical service department ServiceDesk in the following ways: Telephone number: , press 3 address: servicedesk@pbs.dk Business hours Monday - Thursday Friday Page 29 of 29

PN 00651. Connect:Enterprise Secure FTP Client Release Notes Version 1.2.00

PN 00651. Connect:Enterprise Secure FTP Client Release Notes Version 1.2.00 PN 00651 Connect:Enterprise Secure FTP Client Release Notes Version 1.2.00 Connect:Enterprise Secure FTP Client Release Notes Version 1.2.00 First Edition This documentation was prepared to assist licensed

More information

Centers for Medicare and Medicaid Services. Connect: Enterprise Secure Client (SFTP) Gentran. Internet Option Manual 2006-2007

Centers for Medicare and Medicaid Services. Connect: Enterprise Secure Client (SFTP) Gentran. Internet Option Manual 2006-2007 Centers for Medicare and Medicaid Services Connect: Enterprise Secure Client (SFTP) Gentran Internet Option Manual 2006-2007 Version 8 The Connect: Enterprise Secure Client (SFTP) Manual is not intended

More information

THOMSON REUTERS (TAX & ACCOUNTING) INC. FOREIGN NATIONAL INFORMATION SYSTEM TERMS OF USE

THOMSON REUTERS (TAX & ACCOUNTING) INC. FOREIGN NATIONAL INFORMATION SYSTEM TERMS OF USE THOMSON REUTERS (TAX & ACCOUNTING) INC. FOREIGN NATIONAL INFORMATION SYSTEM TERMS OF USE 1. License and Permitted Use The Foreign National Information System (FNIS) is licensed, not sold. Subject to the

More information

Copy Tool For Dynamics CRM 2013

Copy Tool For Dynamics CRM 2013 Copy Tool For Dynamics CRM 2013 Page 1 of 15 Copy Tool 2013 Copyright Warranty disclaimer Limitation of liability License agreement Copyright 2013 Dynamics Professional Solutions. All rights reserved.

More information

Administration Guide. SafeWord for Internet Authentication Service (IAS) Agent Version 2.0

Administration Guide. SafeWord for Internet Authentication Service (IAS) Agent Version 2.0 Administration Guide SafeWord for Internet Authentication Service (IAS) Agent Version 2.0 Copyright 2004 Secure Computing Corporation. All rights reserved. No part of this publication may be reproduced,

More information

FRANZ SOFTWARE LICENSE AGREEMENT

FRANZ SOFTWARE LICENSE AGREEMENT NOTICE TO USER: BY INSTALLING THIS SOFTWARE YOU ACCEPT ALL OF THE FOLLOWING TERMS AND CONDITIONS AND THOSE CONTAINED IN THE ATTACHED LICENSE AGREEMENT. PLEASE READ IT CAREFULLY. THE ATTACHED SOFTWARE LICENSE

More information

ZIMPERIUM, INC. END USER LICENSE TERMS

ZIMPERIUM, INC. END USER LICENSE TERMS ZIMPERIUM, INC. END USER LICENSE TERMS THIS DOCUMENT IS A LEGAL CONTRACT. PLEASE READ IT CAREFULLY. These End User License Terms ( Terms ) govern your access to and use of the zanti and zips client- side

More information

Studio 5.0 User s Guide

Studio 5.0 User s Guide Studio 5.0 User s Guide wls-ug-administrator-20060728-05 Revised 8/8/06 ii Copyright 2006 by Wavelink Corporation All rights reserved. Wavelink Corporation 6985 South Union Park Avenue, Suite 335 Midvale,

More information

CITRIX SYSTEMS, INC. SOFTWARE LICENSE AGREEMENT

CITRIX SYSTEMS, INC. SOFTWARE LICENSE AGREEMENT CITRIX SYSTEMS, INC. SOFTWARE LICENSE AGREEMENT PLEASE READ THIS SOFTWARE LICENSE AGREEMENT CAREFULLY BEFORE DOWNLOADING, INSTALLING OR USING CITRIX OR CITRIX-SUPPLIED SOFTWARE. BY DOWNLOADING OR INSTALLING

More information

Symantec AntiVirus Corporate Edition Patch Update

Symantec AntiVirus Corporate Edition Patch Update Symantec AntiVirus Corporate Edition Patch Update Symantec AntiVirus Corporate Edition Update Documentation version 10.0.1.1007 Copyright 2005 Symantec Corporation. All rights reserved. Symantec, the Symantec

More information

PLEASE READ THIS AGREEMENT CAREFULLY. BY INSTALLING, DOWNLOADING OR OTHERWISE USING THE SOFTWARE, YOU AGREE TO THE TERMS OF THIS AGREEMENT.

PLEASE READ THIS AGREEMENT CAREFULLY. BY INSTALLING, DOWNLOADING OR OTHERWISE USING THE SOFTWARE, YOU AGREE TO THE TERMS OF THIS AGREEMENT. Access Governance Suite 6 Lifecycle Manager 6 Compliance Manager 6 Software License Agreement PLEASE READ THIS AGREEMENT CAREFULLY. BY INSTALLING, DOWNLOADING OR OTHERWISE USING THE SOFTWARE, YOU AGREE

More information

PointCentral Subscription Agreement v.9.2

PointCentral Subscription Agreement v.9.2 PointCentral Subscription Agreement v.9.2 READ THIS SUBSCRIPTION AGREEMENT ( AGREEMENT ) CAREFULLY BEFORE INSTALLING THIS SOFTWARE. THIS AGREEMENT, BETWEEN CALYX TECHNOLOGY, INC., DBA CALYX SOFTWARE (

More information

Pervasive Software Inc. Pervasive PSQL v11 Insurance License Agreement

Pervasive Software Inc. Pervasive PSQL v11 Insurance License Agreement Pervasive Software Inc. Pervasive PSQL v11 Insurance License Agreement IMPORTANT: DO NOT INSTALL THE ENCLOSED OR DOWNLOADED SOFTWARE UNTIL YOU HAVE READ THIS PERVASIVE PSQL LICENSE AGREEMENT ( AGREEMENT

More information

Scanner Wedge for Windows Software User Guide

Scanner Wedge for Windows Software User Guide Scanner Wedge for Windows Software User Guide Contents INSTALLING THE SCANNER WEDGE SOFTWARE 2 ACTIVATING THE SCANNER CONNECTION 3 TRACING SCANNER OUTPUT 7 FORMATTING OUTPUT 9 SELECTING START-UP OPTIONS

More information

Mobile Banking Service Agreement (Addendum to your Primary Online Banking Service Agreement)

Mobile Banking Service Agreement (Addendum to your Primary Online Banking Service Agreement) Mobile Banking Service Agreement (Addendum to your Primary Online Banking Service Agreement) I. INTRODUCTION PARTIES AND DEFINITIONS This Mobile Banking Service Agreement (as amended from time to time,

More information

Mobility Services Platform 3.1.1 Software Installation Guide

Mobility Services Platform 3.1.1 Software Installation Guide Mobility Services Platform 3.1.1 Software Installation Guide Mobility Services Platform 3.1.1 Software Installation Guide 72E-100159-04 Revision D January 2008 2007 by Motorola, Inc. All rights reserved.

More information

EXEDE (R) ANALYTICS APPLICATION END USER LICENSE AGREEMENT

EXEDE (R) ANALYTICS APPLICATION END USER LICENSE AGREEMENT EXEDE (R) ANALYTICS APPLICATION END USER LICENSE AGREEMENT This Application End User License Agreement ( License ) is an agreement between you and ViaSat, Inc., with its principal place of business at

More information

Partners in Care Welch Allyn Connex Software Development Kit License Agreement

Partners in Care Welch Allyn Connex Software Development Kit License Agreement This Software Development Kit End User ( Agreement ) is between Welch Allyn, Inc. ( Welch Allyn ) and the Customer identified in the purchase order ( Customer or You ), and it governs the Software Development

More information

FME SOFTWARE LICENSE AGREEMENT

FME SOFTWARE LICENSE AGREEMENT FME SOFTWARE LICENSE AGREEMENT IMPORTANT READ CAREFULLY: This FME Software License Agreement ("Agreement") is a legal agreement between You (either an individual or a single legal entity) and Safe Software

More information

BROCADE COMMUNICATIONS SYSTEMS, INC. END USER SOFTWARE LICENSE AGREEMENT FOR BROCADE IP ANALYTICS PACK FOR VMWARE VREALIZE OPERATIONS

BROCADE COMMUNICATIONS SYSTEMS, INC. END USER SOFTWARE LICENSE AGREEMENT FOR BROCADE IP ANALYTICS PACK FOR VMWARE VREALIZE OPERATIONS BROCADE COMMUNICATIONS SYSTEMS, INC. END USER SOFTWARE LICENSE AGREEMENT FOR BROCADE IP ANALYTICS PACK FOR VMWARE VREALIZE OPERATIONS IMPORTANT: READ THIS CAREFULLY BEFORE INSTALLING, USING OR ELECTRONICALLY

More information

Sun Microsystems, Inc. ("Sun") ENTITLEMENT for SOFTWARE. Licensee/Company: Entity receiving Software.

Sun Microsystems, Inc. (Sun) ENTITLEMENT for SOFTWARE. Licensee/Company: Entity receiving Software. Sun Microsystems, Inc. ("Sun") ENTITLEMENT for SOFTWARE Licensee/Company: Entity receiving Software. Effective Date: Date of delivery of the Software to You. Software: JavaFX 1.2 Software Development Kit

More information

Canon USA, Inc. WEBVIEW LIVESCOPE SOFTWARE DEVELOPMENT KIT DEVELOPER LICENSE AGREEMENT

Canon USA, Inc. WEBVIEW LIVESCOPE SOFTWARE DEVELOPMENT KIT DEVELOPER LICENSE AGREEMENT Canon USA, Inc. WEBVIEW LIVESCOPE SOFTWARE DEVELOPMENT KIT DEVELOPER LICENSE AGREEMENT This Webview Livescope Software Development Kit Developer License ("Agreement") between you, the "Developer" and the

More information

If you do not wish to agree to these terms, please click DO NOT ACCEPT and obtain a refund of the purchase price as follows:

If you do not wish to agree to these terms, please click DO NOT ACCEPT and obtain a refund of the purchase price as follows: IMPORTANT: READ THIS AGREEMENT CAREFULLY. THIS IS A LEGAL AGREEMENT BETWEEN AVG TECHNOLOGIES CY, Ltd. ( AVG TECHNOLOGIES ) AND YOU (ACTING AS AN INDIVIDUAL OR, IF APPLICABLE, ON BEHALF OF THE INDIVIDUAL

More information

DME-N Network Driver Installation Guide for LS9

DME-N Network Driver Installation Guide for LS9 DME-N Network Driver Installation Guide for LS9 ATTENTION SOFTWARE LICENSE AGREEMENT PLEASE READ THIS SOFTWARE LICENSE AGREEMENT ( AGREEMENT ) CAREFULLY BEFORE USING THIS SOFTWARE. YOU ARE ONLY PERMITTED

More information

How To Use A Pmsft On A Pc Or Mac Or Mac (For Mac) With A Pmf (For Pc) Or Mac Mac (Or Mac) On A Mac Or Pc (For Pmsf) On An Ipad

How To Use A Pmsft On A Pc Or Mac Or Mac (For Mac) With A Pmf (For Pc) Or Mac Mac (Or Mac) On A Mac Or Pc (For Pmsf) On An Ipad Capario Secure File Transfer User Guide Notices This user guide (the Guide ) is provided by Capario in order to facilitate your use of the Capario Secure File Transfer Software. This Guide is subject to

More information

End User License Agreement South Jersey CrashPlan: Managed Backup Solutions Last Updated 4/14/2011

End User License Agreement South Jersey CrashPlan: Managed Backup Solutions Last Updated 4/14/2011 End User License Agreement South Jersey CrashPlan: Managed Backup Solutions Last Updated 4/14/2011 We appreciate your selection of South Jersey CrashPlan, the premier online/offsite backup service offered

More information

Software Hosting and End-User License Subscription Agreement

Software Hosting and End-User License Subscription Agreement Software Hosting and End-User License Subscription Agreement (Last Updated October 31, 2015) IMPORTANT! The Contrail software (the "SOFTWARE") that you seek to use was developed by OneRain Incorporated

More information

WORKFLOW INTEGRATOR INSTALLATION GUIDE

WORKFLOW INTEGRATOR INSTALLATION GUIDE WORKFLOW INTEGRATOR INSTALLATION GUIDE Introduction Welcome to Parity Software s Workflow Integrator! Workflow Integrator addresses the business demand for easy to use SharePoint integration as well the

More information

User Guide for Paros v2.x

User Guide for Paros v2.x Table of Contents 1 Introduction...1 1.1 Paros Overview...1 1.2 History...1 2 Copyright...2 3 Installation...3 4 Configuration...4 5 Functions...6 5.1 Spider...6 5.2 Scanner...6 5.3 Filter...7 5.4 Trapping

More information

MiSync Personal for Beams

MiSync Personal for Beams Using MiSync Personal for Beams V4.3.1.0 by Metisc Copyright Printed: 16 January 2015 2014 by Metisc. All rights reserved. Notice This user guide and the software it describes are furbished under a license

More information

WinSCP PuTTY as an alternative to F-Secure July 11, 2006

WinSCP PuTTY as an alternative to F-Secure July 11, 2006 WinSCP PuTTY as an alternative to F-Secure July 11, 2006 Brief Summary of this Document F-Secure SSH Client 5.4 Build 34 is currently the Berkeley Lab s standard SSH client. It consists of three integrated

More information

RockWare Click-Wrap Software License Agreement ( License )

RockWare Click-Wrap Software License Agreement ( License ) RockWare, Inc. ( RockWare ) 2221 East Street, Suite 101 Golden CO 80401 USA RockWare Click-Wrap Software License Agreement ( License ) IMPORTANT - READ ALL OF THE TERMS AND CONDITIONS IN THIS LICENSE CAREFULLY

More information

empower Authentication Manual, Version 3.7

empower Authentication Manual, Version 3.7 empower Authentication Manual, Version 3.7 i Copyright 2002 Ektron, Inc. All rights reserved. EKTRON is a registered trademark of Ektron, Inc. Version 3.7, February, 2002 empower Authentication Manual,

More information

Quick Start Guide 82099700

Quick Start Guide 82099700 82099700 Quick Start Guide MultiVOIPManager MultiVOIPManager Quick Start Guide P/N 82099700 Revision A Copyright 2001 by Multi-Tech Systems, Inc. All rights reserved. This publication may not be reproduced,

More information

MULTIFUNCTIONAL DIGITAL COLOR SYSTEMS. User Management Guide

MULTIFUNCTIONAL DIGITAL COLOR SYSTEMS. User Management Guide MULTIFUNCTIONAL DIGITAL COLOR SYSTEMS User Management Guide SOFTWARE LICENSE AGREEMENT INSTALLING OR OTHERWISE USING THIS SOFTWARE PRODUCT CONSTITUTES YOUR ACCEPTANCE OF THE FOLLOWING TERMS AND CONDITIONS

More information

Service Description: Cisco Prime Home Hosted Services. This document describes the Cisco Prime Home Hosted Services.

Service Description: Cisco Prime Home Hosted Services. This document describes the Cisco Prime Home Hosted Services. Service Description: Cisco Prime Home Hosted Services This document describes the Cisco Prime Home Hosted Services. Related Documents: The following documents also posted at www.cisco.com/go/servicedescriptions/

More information

C-DAC Medical Informatics Software Development Kit End User License Agreement

C-DAC Medical Informatics Software Development Kit End User License Agreement C-DAC Medical Informatics Software Development Kit End User License Agreement BY DOWNLOADING AND INSTALLING, COPYING OR OTHERWISE USING THE CENTRE FOR DEVELOPMENT OF ADVANCED COMPUTING ( C-DAC ) MEDICAL

More information

Infor Cloud Printing Service Administration Guide

Infor Cloud Printing Service Administration Guide Infor Cloud Printing Service Administration Guide Copyright 2015 Infor Important Notices The material contained in this publication (including any supplementary information) constitutes and contains confidential

More information

Installing CPV Lab Version 2.17

Installing CPV Lab Version 2.17 Installing CPV Lab Version 2.17 END-USER LICENSE AGREEMENT ( EULA ) FOR CPV LAB This End-User License Agreement ("EULA") pertains to the CPV Lab product (called Software" in this Agreement). Read the terms

More information

FILEMAKER PRO ADVANCED SOFTWARE LICENSE

FILEMAKER PRO ADVANCED SOFTWARE LICENSE FILEMAKER PRO ADVANCED SOFTWARE LICENSE IMPORTANT -- READ CAREFULLY: BY INSTALLING, COPYING, DOWNLOADING, ACCESSING OR OTHERWISE USING THE SOFTWARE, YOU AGREE TO BE BOUND BY THE TERMS OF THIS LICENSE.

More information

CORE TECHNOLOGIES CONSULTING, LLC SOFTWARE UNLIMITED ENTERPRISE LICENSE AGREEMENT

CORE TECHNOLOGIES CONSULTING, LLC SOFTWARE UNLIMITED ENTERPRISE LICENSE AGREEMENT CORE TECHNOLOGIES CONSULTING, LLC SOFTWARE UNLIMITED ENTERPRISE LICENSE AGREEMENT IMPORTANT-READ CAREFULLY: This license agreement is a legal agreement between you and Core Technologies Consulting, LLC,

More information

ALPHA TEST LICENSE AGREEMENT

ALPHA TEST LICENSE AGREEMENT ALPHA TEST LICENSE AGREEMENT IMPORTANT NOTICE! PLEASE READ THIS STATEMENT AND THE ALPHA TEST LICENSE AGREEMENT COMPLETELY BEFORE USING THIS ALPHA SOFTWARE. BY CLICKING ON THE BUTTON MARKED YES BELOW OR

More information

MDM Zinc 3.0 End User License Agreement (EULA)

MDM Zinc 3.0 End User License Agreement (EULA) MDM Zinc 3.0 End User License Agreement (EULA) THIS AGREEMENT (or "EULA") IS A LEGAL AGREEMENT BETWEEN THE PERSON, COMPANY, OR ORGANIZATION THAT HAS LICENSED THIS SOFTWARE ("YOU" OR "CUSTOMER") AND MULTIDMEDIA

More information

NOTICE SOFTWARE END USER LICENSE AGREEMENT

NOTICE SOFTWARE END USER LICENSE AGREEMENT NOTICE SOFTWARE END USER LICENSE AGREEMENT THIS SOFTWARE END USER LICENSE AGREEMENT ( THIS AGREEMENT ) IS A LEGAL AND BINDING AGREEMENT BETWEEN YOU (EITHER AN INDIVIDUAL OR ENTITY) AND TP VISION NETHERLANDS

More information

TotalShredder USB. User s Guide

TotalShredder USB. User s Guide TotalShredder USB User s Guide Copyright Notice No part of this publication may be copied, transmitted, stored in a retrieval system or translated into any language in any form or by any means without

More information

REPAIRING THE "ORACLE VM VIRTUALBOX" VIRTUAL MACHINE PROGRAM

REPAIRING THE ORACLE VM VIRTUALBOX VIRTUAL MACHINE PROGRAM REPAIRING THE "ORACLE VM VIRTUALBOX" VIRTUAL MACHINE PROGRAM Objective: If one or more of the features of the "Oracle VM VirtualBox" program fail, you can usually repair it by starting the installation

More information

Adaptec Event Monitor Utility. User s Guide

Adaptec Event Monitor Utility. User s Guide Adaptec Event Monitor Utility User s Guide 2 Copyright Copyright 2013 PMC-Sierra, Inc. All rights reserved. The information in this document is proprietary and confidential to PMC-Sierra, Inc., and for

More information

Universal File Mover Status Monitor Installation and Operation Manual

Universal File Mover Status Monitor Installation and Operation Manual Universal File Mover Status Monitor Installation and Operation Manual Capitalware Inc. Unit 11, 1673 Richmond Street, PMB524 London, Ontario N6G2N3 Canada sales@capitalware.com http://www.capitalware.com

More information

System Requirements. Installation. Microsoft SQL Express 2008 R2 Installation

System Requirements. Installation. Microsoft SQL Express 2008 R2 Installation Contents System Requirements... 3 Installation... 3 Microsoft SQL Express 2008 R2 Installation... 3 Microsoft.NET Framework 4.0 Installation... 7 InFocus Management Tool Installation... 8 Log In... 10

More information

TechSPEC Database Installation Guide. Version 1.0

TechSPEC Database Installation Guide. Version 1.0 TechSPEC Database Installation Guide Version 1.0 Special Notices TechSPEC Database Installation Guide ii Tech Data Corporation TechSPEC Database Installation Guide Special Notices Special Notices Information

More information

4.0. Offline Folder Wizard. User Guide

4.0. Offline Folder Wizard. User Guide 4.0 Offline Folder Wizard User Guide Copyright Quest Software, Inc. 2007. All rights reserved. This guide contains proprietary information, which is protected by copyright. The software described in this

More information

MULTIFUNCTIONAL DIGITAL SYSTEMS. User Management Guide

MULTIFUNCTIONAL DIGITAL SYSTEMS. User Management Guide MULTIFUNCTIONAL DIGITAL SYSTEMS User Management Guide SOFTWARE LICENSE AGREEMENT INSTALLING OR OTHERWISE USING THIS SOFTWARE PRODUCT CONSTITUTES YOUR ACCEPTANCE OF THE FOLLOWING TERMS AND CONDITIONS (UNLESS

More information

END USER LICENSE AGREEMENT

END USER LICENSE AGREEMENT END USER LICENSE AGREEMENT 1. SCOPE OF THIS AGREEMENT. This END USER LICENSE AGREEMENT ("EULA") is a legal agreement between you (either an individual or a single entity) and TradeStation ("TS") governing

More information

user Management Guide - The Basics

user Management Guide - The Basics MULTIFUNCTIONAL DIGITAL SYSTEMS User Management Guide SOFTWARE LICENSE AGREEMENT INSTALLING OR OTHERWISE USING THIS SOFTWARE PRODUCT CONSTITUTES YOUR ACCEPTANCE OF THE FOLLOWING TERMS AND CONDITIONS (UNLESS

More information

Dell Recovery Manager for Active Directory 8.6. Quick Start Guide

Dell Recovery Manager for Active Directory 8.6. Quick Start Guide Dell Recovery Manager for Active Directory 8.6 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

Infor Warehouse Mobility for Infor ERP LN Installation Guide

Infor Warehouse Mobility for Infor ERP LN Installation Guide Infor Warehouse Mobility for Infor ERP LN Installation Guide Important Notices The material contained in this publication (including any supplementary information) constitutes and contains confidential

More information

SOLARWINDS, INC. ipmonitor 8.0 MANAGER END USER LICENSE AGREEMENT REDISTRIBUTION NOT PERMITTED

SOLARWINDS, INC. ipmonitor 8.0 MANAGER END USER LICENSE AGREEMENT REDISTRIBUTION NOT PERMITTED SOLARWINDS, INC ipmonitor 8.0 MANAGER END USER LICENSE AGREEMENT REDISTRIBUTION NOT PERMITTED IMPORTANT -- READ CAREFULLY BEFORE USING THIS SOFTWARE: THIS IS A LEGAL AGREEMENT BETWEEN YOU (EITHER AN INDIVIDUAL

More information

Affiliate means a legal entity that is owned by or under common ownership with Stratus Technologies Ireland Limited.

Affiliate means a legal entity that is owned by or under common ownership with Stratus Technologies Ireland Limited. STRATUS TECHNOLOGIES IRELAND LIMITED ( STRATUS ) END-USER LICENSE AGREEMENT AND SOFTWARE SUPPORT TERMS AND CONDITIONS FOR STRATUS everrun SOFTWARE PRODUCTS Please read this end user license agreement ("EULA")

More information

SYMANTEC SOFTWARE SERVICE LICENSE AGREEMENT Norton 360

SYMANTEC SOFTWARE SERVICE LICENSE AGREEMENT Norton 360 SYMANTEC SOFTWARE SERVICE LICENSE AGREEMENT Norton 360 IMPORTANT: PLEASE READ THE TERMS AND CONDITIONS OF THIS LICENSE AGREEMENT ( LICENSE AGREEMENT ) CAREFULLY BEFORE USING THE SOFTWARE (AS DEFINED BELOW).

More information

C. System Requirements. Apple Software is supported only on Apple-branded hardware that meets specified system requirements as indicated by Apple.

C. System Requirements. Apple Software is supported only on Apple-branded hardware that meets specified system requirements as indicated by Apple. ENGLISH APPLE INC. SOFTWARE LICENSE AGREEMENT FOR APPLE STORE APPLICATION PLEASE READ THIS SOFTWARE LICENSE AGREEMENT ("LICENSE") CAREFULLY BEFORE USING THE APPLE SOFTWARE. BY USING THE APPLE SOFTWARE,

More information

Front-Office Server 2.7

Front-Office Server 2.7 This release connector is deprecated. Use Kofax Capture and the appropriate Kofax Capture release script to release documents to a specific destination. KOFAX Front-Office Server 2.7 Configuration Guide

More information

These TERMS AND CONDICTIONS (this Agreement ) are agreed to between InfluencersAtWork,

These TERMS AND CONDICTIONS (this Agreement ) are agreed to between InfluencersAtWork, TERMS AND CONDITIONS INFLUENCERS AT WORK These TERMS AND CONDICTIONS (this Agreement ) are agreed to between InfluencersAtWork, Ltd. ( InfluencerAtWork ) and you, or if you represent a company or other

More information

Database Binary Backup PC Utility

Database Binary Backup PC Utility Database Binary Backup PC Utility Reference Manual (Version 3.xx) DRAFT 2 The flexible way to communicate The information contained in this document is proprietary and is subject to all relevant copyright,

More information

SMARTDRAW SOFTWARE LICENSE AGREEMENT

SMARTDRAW SOFTWARE LICENSE AGREEMENT SMARTDRAW SOFTWARE LICENSE AGREEMENT PLEASE READ CAREFULLY: SMARTDRAW SOFTWARE, LLC ("SMARTDRAW") IS WILLING TO LICENSE THE SMARTDRAW SOFTWARE ONLY UPON THE CONDITION THAT YOU ACCEPT ALL OF THE TERMS CONTAINED

More information

Specific Program Documentation ( License SPD )

Specific Program Documentation ( License SPD ) Specific Program Documentation ( License SPD ) 1. CA Europe sarl ( CA ) licenses to Customer the CA software program(s) listed below under the following terms and conditions. By using the CA Software,

More information

NovaNet-WEB Client User s Guide. Version 5.1

NovaNet-WEB Client User s Guide. Version 5.1 NovaNet-WEB Client User s Guide Version 5.1 October 2003 Warranty Information NovaStor NovaNet-WEB Software License Agreement All NovaStor users must agree to the following terms and conditions before

More information

Secure Data Transfer

Secure Data Transfer Secure Data Transfer INSTRUCTIONS 3 Options to SECURELY TRANSMIT DATA 1. FTP 2. WinZip 3. Password Protection Version 2.0 Page 1 Table of Contents Acronyms & Abbreviations...1 Option 1: File Transfer Protocol

More information

END USER LICENSE AGREEMENT FOR SLICKEDIT(R) CORE SOFTWARE IMPORTANT

END USER LICENSE AGREEMENT FOR SLICKEDIT(R) CORE SOFTWARE IMPORTANT END USER LICENSE AGREEMENT FOR SLICKEDIT(R) CORE SOFTWARE IMPORTANT THIS IS A LEGAL AGREEMENT BETWEEN YOU ("You" or "Your") AND SLICKEDIT INC. ("SlickEdit"). SLICKEDIT IS WILLING TO (1) LICENSE THE SLICKEDIT

More information

HSS Specific Terms HSS SOFTWARE LICENSE AGREEMENT

HSS Specific Terms HSS SOFTWARE LICENSE AGREEMENT HSS Specific Terms HSS SOFTWARE LICENSE AGREEMENT 1. LICENSE 2. TERMINATION Subject to the terms and conditions of this HSS Software License Agreement (the Agreement ), HSS hereby grants to Client (herein

More information

SOFTWARE LICENSE AGREEMENT (Web Version October 18, 2002)

SOFTWARE LICENSE AGREEMENT (Web Version October 18, 2002) SOFTWARE LICENSE AGREEMENT (Web Version October 18, 2002) Whenever LICENSEE licenses software products ( Program(s) as further defined herein), a License Form shall be executed which shall refer to this

More information

IBM Sterling Connect:Enterprise for UNIX

IBM Sterling Connect:Enterprise for UNIX IBM Sterling Connect:Enterprise for UNIX Installation and Administration Guide Version 2.5 This edition applies to the 2.5 Version of IBM Sterling Connect:Enterprise for UNIX and to all subsequent releases

More information

Kaiser Permanente Affiliate Link Provider Web Site Application

Kaiser Permanente Affiliate Link Provider Web Site Application Kaiser Foundation Health Plan of Colorado Kaiser Permanente Affiliate Link Provider Web Site Application FOR PROVIDERS CONTRACTED WITH KAISER IN THE COLORADO REGION ONLY Page 1 of 7 Kaiser Permanente Affiliate

More information

CCA DSS SP 2 Release Notes. For Microsoft Dynamics GP v10.0, v2010 and v2013

CCA DSS SP 2 Release Notes. For Microsoft Dynamics GP v10.0, v2010 and v2013 CCA DSS SP 2 Release Notes For Microsoft Dynamics GP v10.0, v2010 and v2013 April 2013 Copyright Information Copyright 2012 Nodus Technologies, Inc. All rights reserved. Copyright 2004, 2005, 2006, 2007,

More information

MyShortcut. Administrator's Guide

MyShortcut. Administrator's Guide MyShortcut Administrator's Guide January 2011 www.lexmark.com Lexmark and Lexmark with diamond design are trademarks of Lexmark International, Inc., registered in the United States and/or other countries.

More information

Installing the IPSecuritas IPSec Client

Installing the IPSecuritas IPSec Client Mac Install Installing the IPSecuritas IPSec Client IPSecuritasMac201003-01 Global Technology Associates 3505 Lake Lynda Drive Suite 109 Orlando, FL 32817 Tel: +1.407.380.0220 Fax. +1.407.380.6080 Email:

More information

ZENworks Patch Management. Your license to use ZENworks Patch Management is also subject to the terms and conditions in the attached Appendix.

ZENworks Patch Management. Your license to use ZENworks Patch Management is also subject to the terms and conditions in the attached Appendix. Novell Endpoint Lifecycle Management Suite Novell ZENworks Configuration Management Advanced Edition Novell ZENworks Configuration Management Enterprise Edition Novell ZENworks Configuration Management

More information

IPInfoDB Web Service Agreement

IPInfoDB Web Service Agreement IPInfoDB Web Service Agreement PLEASE READ THIS WEB SERVICE AGREEMENT CAREFULLY BEFORE DOWNLOADING, INSTALLING OR USING IPINFODB SERVICES. BY CHECKING THE I HAVE READ, UNDERSTAND AND AGREE WITH THE SERVICE

More information

SUBSCRIPTION SERVICES.

SUBSCRIPTION SERVICES. SUSE Manager Server SUSE Manager Server with Database SUSE Software License Agreement PLEASE READ THIS AGREEMENT CAREFULLY. BY PURCHASING, INSTALLING AND/OR USING THE SOFTWARE (INCLUDING ITS COMPONENTS),

More information

ALL WEATHER, INC. SOFTWARE END USER LICENSE AGREEMENT

ALL WEATHER, INC. SOFTWARE END USER LICENSE AGREEMENT ALL WEATHER, INC. SOFTWARE END USER LICENSE AGREEMENT THIS SOFTWARE END USER LICENSE AGREEMENT (THIS AGREEMENT ) IS DATED FOR REFERENCE PURPOSES ONLY AS OF MARCH 26, 2009, AND IS BY AND BETWEEN ALL WEATHER,

More information

TRIAL AGREEMENT FOR QUALIANCE

TRIAL AGREEMENT FOR QUALIANCE TRIAL AGREEMENT FOR QUALIANCE PLEASE READ THE TERMS OF THIS TRIAL AGREEMENT (THIS AGREEMENT ) CAREFULLY BEFORE SUBMITTING YOUR TRIAL REGISTRATION REQUEST THIS AGREEMENT GOVERNS ACCESS TO AND USE BY THE

More information

Database Client/Server

Database Client/Server Part IV Database Client/Server Database Server 1. Run srvadmin.exe (you can add to the Windows Startup folder). Figure IV.1 DBISAM Database Server Icon Figure IV.2 DBISAM Database Server Status E-Mon Energy

More information

PERFORCE End User License Agreement for Open Source Software Development

PERFORCE End User License Agreement for Open Source Software Development Perforce Open Source End User License Agreement Page 1 1. Introduction PERFORCE End User License Agreement for Open Source Software Development This is a License Agreement ( Agreement ) between Perforce

More information

DME-N Network Driver Installation Guide for M7CL/LS9/DSP5D

DME-N Network Driver Installation Guide for M7CL/LS9/DSP5D DME-N Network Driver Installation Guide for M7CL/LS9/DSP5D ATTENTION SOFTWARE LICENSE AGREEMENT PLEASE READ THIS SOFTWARE LICENSE AGREEMENT ( AGREEMENT ) CAREFULLY BEFORE USING THIS SOFTWARE. YOU ARE ONLY

More information

ENROLLMENT AGREEMENT FOR QUALIANCE

ENROLLMENT AGREEMENT FOR QUALIANCE ENROLLMENT AGREEMENT FOR QUALIANCE PLEASE READ THE TERMS OF THIS ENROLLMENT AGREEMENT (THIS AGREEMENT ) CAREFULLY BEFORE SUBMITTING YOUR SUBSCRIPTION ORDER THIS AGREEMENT GOVERNS ACCESS TO AND USE BY THE

More information

APP SOFTWARE LICENSE AGREEMENT

APP SOFTWARE LICENSE AGREEMENT APP SOFTWARE LICENSE AGREEMENT This App Software License Agreement (the Agreement ) is made by and between AvePoint, Inc., a Delaware company, with offices at Harborside Financial Center, Plaza 10, 3 Second

More information

Copyright 2015 SolarWinds Worldwide, LLC. All rights reserved worldwide. No part of this document may be reproduced by any means nor modified,

Copyright 2015 SolarWinds Worldwide, LLC. All rights reserved worldwide. No part of this document may be reproduced by any means nor modified, Copyright 2015 SolarWinds Worldwide, LLC. All rights reserved worldwide. No part of this document may be reproduced by any means nor modified, decompiled, disassembled, published or distributed, in whole

More information

Corrosion Data Management Software Version 3.1.3

Corrosion Data Management Software Version 3.1.3 Corrosion Data Management Software Version 3.1.3 Metal Samples Corrosion Monitoring Systems A Division of Alabama Specialty Products, Inc. 152 Metal Samples Road, Munford, AL 36268 Phone: 256-358-4202

More information

COMPUTER SOFTWARE AS A SERVICE LICENSE AGREEMENT

COMPUTER SOFTWARE AS A SERVICE LICENSE AGREEMENT COMPUTER SOFTWARE AS A SERVICE LICENSE AGREEMENT This Agreement is binding on the individual and the company, or other organization or entity, on whose behalf such individual accepts this Agreement, that

More information

Kofax Export Connector 8.3.0 for Microsoft SharePoint

Kofax Export Connector 8.3.0 for Microsoft SharePoint Kofax Export Connector 8.3.0 for Microsoft SharePoint Administrator's Guide 2013-02-27 2013 Kofax, Inc., 15211 Laguna Canyon Road, Irvine, California 92618, U.S.A. All rights reserved. Use is subject to

More information

Crestron VMK-WIN TouchPoint Virtual Mouse & Keyboard Software for Windows Installation Guide

Crestron VMK-WIN TouchPoint Virtual Mouse & Keyboard Software for Windows Installation Guide Crestron VMK-WIN TouchPoint Virtual Mouse & Keyboard Software for Windows Installation Guide This document was prepared and written by the Technical Documentation department at: Crestron Electronics, Inc.

More information

Online Banking for Business Secure FTP with SSH (Secure Shell) USER GUIDE

Online Banking for Business Secure FTP with SSH (Secure Shell) USER GUIDE Online Banking for Business Secure FTP with SSH (Secure Shell) USER GUIDE Contents Secure FTP Setup... 1 Introduction... 1 Before You Set Up S/FTP... 1 Setting Up FTP with SSH... 2 Sending Files... 3 Address

More information

INTEL SOFTWARE LICENSE AGREEMENT (OEM / IHV / ISV Distribution & Single User)

INTEL SOFTWARE LICENSE AGREEMENT (OEM / IHV / ISV Distribution & Single User) INTEL SOFTWARE LICENSE AGREEMENT (OEM / IHV / ISV Distribution & Single User) By clicking the Accept button, I signify that I have read and accept the terms below. IMPORTANT - READ BEFORE COPYING, INSTALLING

More information

Mayfair EULA for Journal Office

Mayfair EULA for Journal Office Mayfair EULA for Journal Office 9-April-2014 Page 1 of 9 Mayfair EULA for Journal Office Mayfair Software End User License Agreement Software programs which you received either installed on on the device

More information

WE RECOMMEND THAT YOU PRINT OUT AND KEEP A COPY OF THIS AGREEMENT FOR YOUR FUTURE REFERENCE.

WE RECOMMEND THAT YOU PRINT OUT AND KEEP A COPY OF THIS AGREEMENT FOR YOUR FUTURE REFERENCE. RAPID CONNECT SERVICES(sm) and SPECIFICATION LICENSE AGREEMENT THIS RAPID CONNECT SERVICES AND SPECIFICATION LICENSE AGREEMENT IS BETWEEN FIRST DATA MERCHANT SERVICES CORPORATION ( FDMS ) FDMS AND YOU,

More information

Self Help Guides. Create a New User in a Domain

Self Help Guides. Create a New User in a Domain Self Help Guides Create a New User in a Domain Creating Users & Groups This document is to be used as a guide to creating users and/or groups in a Domain Server environment; 1. Windows Server Domain exists,

More information

Installing the Shrew Soft VPN Client

Installing the Shrew Soft VPN Client Windows Install Installing the Shrew Soft VPN Client ShrewVPNWindows201003-01 Global Technology Associates 3505 Lake Lynda Drive Suite 109 Orlando, FL 32817 Tel: +1.407.380.0220 Fax. +1.407.380.6080 Email:

More information

SOFTWARE AS A SERVICE AGREEMENT

SOFTWARE AS A SERVICE AGREEMENT SOFTWARE AS A SERVICE AGREEMENT YOU SHOULD READ CAREFULLY THE FOLLOWING TERMS AND CONDITIONS BEFORE UTILIZING THE SOFTWARE This is an agreement to remotely provide you with access to the functionality

More information

ZConverter. Windows Backup v 3.5

ZConverter. Windows Backup v 3.5 ZConverter ZConverter Windows Backup v 3.5 [User Guide] NOTE : DO NOT COPY, REPRODUCE OR REDISTRIBUTE WITHOUT EXPRESS WRITTEN CONSENT OF THE AUTHOR Copyright 2004-2010 ISA Technologies, Inc. ZConverter

More information

Version 2.17 Update Installation Guide

Version 2.17 Update Installation Guide Page 1 of 11 Version 2.17 Update Installation Guide Page 2 of 11 END-USER LICENSE AGREEMENT ( EULA ) FOR CPV LAB This End-User License Agreement ("EULA") pertains to the CPV Lab product (called Software"

More information

SAP Business Intelligence Suite Patch 10.x Update Guide

SAP Business Intelligence Suite Patch 10.x Update Guide SAP BusinessObjects Business Intelligence Suite Document Version: 4.0 Support Package 10-2014-07-25 SAP Business Intelligence Suite Patch 10.x Update Guide Table of Contents 1 Introduction.... 3 1.1 About

More information