Implementation of Digital Signature Solution
|
|
|
- Benedict Gordon
- 10 years ago
- Views:
Transcription
1 Implementation of Digital Signature Solution Nuno Filipe Jorge Guedes Extended Abstract April, 2008
2 1. Introduction The scope of this study points to security area and has its own focus on digital signatures over documents. In nowadays Portugal is giving the first steps towards the creation of an infrastructure of support to qualified digital certificates. The recent initiatives with the National Government Electronic Certification System (SCEE) or the latest Citizen Single Card as draw attention to digital signatures reflecting a window of opportunity for spreading its use and featuring generalization. With the massive usage of personal digital certificates, obtained through the Citizen Card, seek to broaden the use of them not only to interact with the services of the state but also with other entities that need to guarantee the authenticity, integrity and nonrepudiation of data exchanged with customers. Banks are a clear example of such entities. 2. Problem to Solve Today, even with the use of digital certificates, there s not a single solution, widely known, that ensures the legal value of documents digitally signed. There exists some secure web applications, which allow the deal of state issues such as the declaration of IRS, but they are not using the potential of digital signatures on the documents and their receipt. The Citizen Card has two certificates: one for authentication and another for the creation of digital signatures. Thus is eliminated a problem that came to see: the acquisition of qualified certificates for personal use. The focus of the problem now lies in the application of signing certificates because it doesn t exist, so far, a solution to achieve integration of digital signatures with various business contexts and that is considered a reference in the area. This thesis seeks to identify the mechanisms and technologies to be used in the submission via the Internet of digitally signed documents that serve as substitutes of documents signed on paper. As a result, it is expected to reach a solution which manipulates digital signatures representing a kind of "middleware" between web applications from different business contexts and its users (Figure 1). Users Digital Signatures Solution Business Business Business Figure 1 - Solution as "middleware" between users and business 2
3 The solution should be as generic as possible to facilitate integration with various applications of different business areas. The solution must ensure the execution of basic digital signatures functionalities, sign and verify, and also the extraction of the original document from the signed version and the acquiring of signed document with only the signatures desired by the user. Any type of document can be signed (XML, text file, image, etc.). Special attention should be paid to the architecture for ensure the use of the system in several scenarios and maximize safety. The creation and the verification of signatures and the association between the digitally signed document and the original document are crucial to ensure the properties inherent to digital signatures. Thus, in order to ensure greater security, the proceedings shall be executed as much as possible under the control of the user, preventing communication with external entities and reducing the threat of imminent capture and manipulation of messages. The solution must be complied with latest standards, taking special attention to EU directives and national legislation. This requirement implies the use of XAdES (version 1.3.2) as format of digital signatures and the support for all levels of the same. 3. State of the art 3.1. Solutions Some existing solutions that could solve the problem in question were analyzed: OpensTrust-SPI, OpenTrust (OpenTrust-SPI) WebSign Project (Cardon de Licthbuer) TrustedX, Safelayer (Safelayer) The solutions for integration of digital signatures in web applications are reduced. Additionally if we eliminate those that don t support XAdES we obtain an even lower number. The solutions that were studied are a sample of the existent universe. After the examination of each one is clear that none responds effectively to the aimed objectivesc closest ones do not allow the addition of development. Faced with this analysis is possible to conclude that none of the solutions presented is a valid option to resolve the issues proposed. Thus, it becomes evident the need to develop a customized solution. This option leads to the interest for analysis of libraries that manage XAdES signatures Libraries There exist some libraries on the market for the manipulation of digital signatures. The follow ones were studied: OpenXAdES (OpenXAdES) IAIK XML Advanced Electronic Signatures (IAIK) DContract Core: Digital Contract Core Library (DContract), EldoS (EldoS - SBB) 3
4 Although there are other libraries to support XAdES, these were the ones that seemed more appropriate to face the proposed problem. Among analyzed libraries there are two that stand out clearly, the one provided by IAIK and the one supplied by EldoS. Despite the entail a greater effort to support the higher levels of XAdES, factors such as the possibility of obtaining the trial version without functional limitations or its low cost, in a potential purchase, compared with its rival, were instrumental in its choice. The effort referenced can be offset by the extensive documentation provided by EldoS. 4. Developed Solution In the absence of a solution that met all the objectives proposed, it was developed, in this dissertation, a customized solution using a set of libraries of EldoS for XAdES support. The picture that follows (Figure 2) presents the architecture of the developed solution. The implementation of the solution in various scenarios would only lead to the replacement of the module "Business" by the module corresponding to the desired scenario, without changing the surrounding architecture. Thus it's guaranteed one of the objectives proposed: the solution must be as generic as possible to be integrated in several scenarios. Solution Advanced Digital Signatures SIMESEGSERVER.SIME.LINK - Microsoft Windows Server 2003 Standard Edition SP1; - IIS v6.0; - Microsoft.NET Framework 2.0; - - version (March 9, 2008); - Microsoft.NET Framework 2.0; - Microsoft Internet Explorer; VerifierUserControl Business SignerUserControl Methods: - (string) SignsDocument - (void) StartSignerUserControl - (string) DownloadFile VerifierUserControl Methods: - (void) StartVerifierUserControl SignerUserControl PKI Timestamp Authority AdvancedDigitalSignatureWS WebMethods: - (string) ValidateAndCounterSigns - (byte[]) GetOriginalDocument StorageWS WebMethods: - (string) StoresSignedDocumentInRepository - (string) GetSignedDocumentFromRepository - (void) DeleteSignedDocumentFromRepository Figure 2 - Architecture of the solution developed The module of the solution consists in four components: SignerUserControl, VerifierUserControl, AdvancedDigitalSignatureWS and StorageWS. 4
5 4.1. SignerUserControl The SignerUserControl is a Windows Control Library that is materialized as a dynamiclink library (DLL). It is embedded in a web page and its main feature is the creation of signatures through interaction with the module of EldoS. This component will run in the user's machine and arises from the need to ensure that the creation of signatures takes place in a secure form. The SignerUserControl presents an interface (Figure 3) that can be broken into four areas, which are highlighted in the figure and presented below: 1) Details of the document target of the signature; 2) Certificates available to create the signature; 3) Signature configuration showing the different levels of XAdES and ensuring the dependencies between the various levels; 4) Name of the target document in the form of link. The selection of the same provokes the contents display of the document to sign. Figure 3 - Graphical interface of SignerUserControl 4.2. VerifierUserControl The VerifierUserControl is very similar to SignerUserControl only differing in functionality. This component main functionality is the verification of signatures, but also allows the extraction of the original document from signed file and gets a document signed only with the signatures desired by the user. 5
6 The VerifierUserControl presents an interface (Figure 4) that can be decomposed into six areas, which are highlighted in the figure and presented below: 1) Details of the document target of the signature; 2) Signatures affixed to the document, for each signature appears the name of the subscriber, the name of the certification authority, the date on which the signature was created, a link to cause the verification of signatures and the state of signature validity; 3) Checkboxes for signatures selection. They are directly linked to the "Get File With Signatures" ( Obter Ficheiro Com Assinaturas ) (4); 4) Link to get the signed file with the signatures previously selected (3); 5) Link to obtain the original document; 6) Details of the verification of a signature, provides information on the signature and its first counter-signature, if exists. They are actualized after being selected the link "Check" ( Verificar ) (2) associated with a signature. Figure 4 - Graphical interface of VerifierUserControl 4.3. AdvancedDigitalSignatureWS The AdvancedDigitalSignatureWS is a Web Service whose primary purpose is the handling of files containing signatures, in particular it s responsible for validating and counter-signing signed documents. Meets the objectives proposed by interactions with the module of EldoS. 6
7 4.4. StorageWS The StorageWS is a Web service that provides the basic functionality of a file repository (add, delete and get). This is a temporary repository because it stores only documents signed by a short period of time. This Web Service only exists as result of storage limitation regarding variables in javascript Signed Documents Format As one of the requirements was the possibility of sign any type of file it has been established a format for the signed documents. The developed format is based on XML document because the signatures XAdES are only applied to such documents. The structure starts with a root element with the name SignedBinaryFile under which it is created another element designated as BinaryData that has as value the contents of the document to sign on the base 64 binary format. This last element has an attribute "Id" filled with the name of the document target of signatures, allowing the extraction of the target document with its original name. Through the attributes of this element it could be stored more information about the original document, if necessary. The signatures created on the document are added to the root element SignedBinaryFile because they are enveloped signatures. 5. Validation The developed solution has fulfilled all the objectives that were set initially. However it has some limitations properly documented. The created signatures were successfully validated, assuring a platform of understanding, the so-called policy of use. The modules for create and validate signatures are executed on the user s machine, thus ensuring greater security. Any type of file can be target of signing thanks to the implemented format for signed documents. The solution guarantees compliance with the standards and legislation in force, including technical specification for XAdES (ETSI). The solution was successfully applied for two different scenarios. First was implemented in ebanka, a system for home banking, and successfully validated by a set of use cases. Later it was integrated with edoc, a document management system. The SharePoint and an application of workflow are the future testing scenarios. The use of both applications, ebanka and edoc, integrated with the developed solution, ensured the acceptance of the solution. 7
8 6. Conclusions Over the work produced in conjunction with the results obtained there can be drawn some conclusions. The library used to support XAdES, the, supports all levels of the format but for those above the XAdES-T requires some effort. This effort was facilitated by the extensive and diverse support information, through the specifications, tutorials or even the forum. However, the crucial point was the verification of signatures given the surrounding complexity. Is in this critical process that there is still a lack of information. I personally think that the existing information in the technical specification of XAdES is insufficient. The two components developed for creating and verifying signatures, which will run on the user's machine, have major limitations because they are only supported by Internet Explorer and force a particular configuration in the environment system. Because of the technical impossibility to transfer the contents of the document signed by SignerUserControl for the business layer it was necessary to include a temporary repository and, consequently, additional security measures. Through the practical use of the signature features on the two scenarios it was possible to withdraw some conclusions regarding the relation between the document size and the time taken to validate and counter-sign it. The documents in ebanka are usually transactions applications like wage payments translating into reduced size files and with a maximum of four signatures. The documents size in edoc is relative, there may be documents with a few Kb and others with some Mb, adding the possibility of being signed numerous times. In the latter scenario was possible to identify situations where the validation of signatures for a document, with about 1 Mb and two signatures, and the addition of a counter-signature were extended by more than 3 minutes, which is not at all bearable by all users. Notice that in the scenario described the chains of certification only has two certificates and Certification Authority is in the internal network. In normal environment the time would increase. This is a negative point to be considered and that has the power to require a weighting to signing documents known as "heavy", threatening the common use of signatures as it was desired. The area of digital signatures is still maturing and, as such, are expected major developments in short term. For the solution presented in this thesis it becomes interesting to pay attention to any new technological develop that may create an alternative to the components of creation and verification of signatures (Windows Control Library), solving existing limitations, and to any addition or modification of information associated with the process of verification of digital signatures. 8
9 7. References Cardon de Licthbuer, R. (s.d.). WebSign Project. Accessed on 15 January 2008, from DContract. (s.d.). Accessed on 15 January 2008, from EldoS - SBB. (s.d.). Accessed on 15 January 2008, from ETSI. (s.d.). Accessed from ETSI. ETSI TS v IAIK. (s.d.). Accessed on 15 January 2008, from OpenTrust-SPI. (s.d.). Accessed on 15 January 2008, from OpentTrust: OpenXAdES. (s.d.). Accessed on 15 January 2008, from Safelayer. (s.d.). Accessed on 15 January 2008, from SCEE. (s.d.). Accessed from Sistema de Certificação Electrónica do Estado: 9
XML Advanced Electronic Signatures (XAdES)
XML Advanced Electronic Signatures (XAdES) What is XAdES? The XML Advanced Electronic Signatures (XAdES) standard is an extension of the IETF XMLDSIG specification. The XAdES specification is designed
ETSI TS 102 778 V1.1.1 (2009-04) Technical Specification
TS 102 778 V1.1.1 (2009-04) Technical Specification Electronic Signatures and Infrastructures (ESI); PDF Advanced Electronic Signature Profiles; CMS Profile based on ISO 32000-1 2 TS 102 778 V1.1.1 (2009-04)
Technical Description. DigitalSign 3.1. State of the art legally valid electronic signature. The best, most secure and complete software for
Technical Description DigitalSign 3.1 State of the art legally valid electronic signature The best, most secure and complete software for Adding digital signatures to any document, in conformance with
Multiple electronic signatures on multiple documents
Multiple electronic signatures on multiple documents Antonio Lioy and Gianluca Ramunno Politecnico di Torino Dip. di Automatica e Informatica Torino (Italy) e-mail: [email protected], [email protected] web
ETSI TS 102 778-1 V1.1.1 (2009-07) Technical Specification
TS 102 778-1 V1.1.1 (2009-07) Technical Specification Electronic Signatures and Infrastructures (ESI); PDF Advanced Electronic Signature Profiles; Part 1: PAdES Overview - a framework document for PAdES
DIRECTOR GENERAL OF THE LITHUANIAN ARCHIVES DEPARTMENT UNDER THE GOVERNMENT OF THE REPUBLIC OF LITHUANIA
Non-official translation DIRECTOR GENERAL OF THE LITHUANIAN ARCHIVES DEPARTMENT UNDER THE GOVERNMENT OF THE REPUBLIC OF LITHUANIA ORDER ON THE CONFIRMATION OF THE SPECIFICATION ADOC-V1.0 OF THE ELECTRONIC
User guide. procertum SmartSign 6.0 Version 1.05. Unizeto Technologies SA - www.unizeto.pl
User guide procertum SmartSign 6.0 Version 1.05 Unizeto Technologies SA - www.unizeto.pl Copyrights of this documentation and software described belong to Unizeto Technologies SA seated in Szczecin, Poland,
Embedding digital signature technology to other systems - Estonian practice. Urmo Keskel SK, DigiDoc Product Manager
Embedding digital signature technology to other systems - Estonian practice Urmo Keskel SK, DigiDoc Product Manager E-stonia? Population: 1.35M Internet usage: 54% Internet banking: 72% Mobile penetration:
How to Time Stamp PDF and Microsoft Office 2010/2013 Documents with the Time Stamp Server
How to Time Stamp PDF and Microsoft Office 2010/2013 Documents with the Time Stamp Server Introduction Time stamping is an important mechanism for the long-term preservation of digital signatures, time
Digital Signature: Efficient, Cut Cost and Manage Risk. Formula for Strong Digital Security
Digital Signature: Efficient, Cut Cost and Manage Risk Formula for Strong Digital Security Signature Rafidah Ariffin A person s name written in a distinctive way, pattern or characteristic as a form of
Electronic Submission of Medical Documentation (esmd) CDA Digital Signatures. January 8, 2013
Electronic Submission of Medical Documentation (esmd) CDA Digital Signatures January 8, 2013 Wet Signatures Standards and legal standing Standards are based on legal precedence Non-repudiation inherent
ETSI TS 102 778-5 V1.1.1 (2009-07) Technical Specification
TS 102 778-5 V1.1.1 (2009-07) Technical Specification Electronic Signatures and Infrastructures (ESI); PDF Advanced Electronic Signature Profiles; Part 5: PAdES for XML Content - Profiles for XAdES signatures
3GPP TS 24.623 V8.1.0 (2008-09)
TS 24.623 V8.1.0 (2008-09) Technical Specification 3rd Generation Partnership Project; Technical Specification Group Core Network and Terminals; Extensible Markup Language (XML) Configuration Access Protocol
Exploring ADSS Server Signing Services
ADSS Server is a multi-function server providing digital signature creation and signature verification services, as well as supporting other infrastructure services including Time Stamp Authority (TSA)
FOR A PAPERLESS FUTURE. Petr DOLEJŠÍ Senior Solution Consultant SEFIRA Czech Republic
FOR A PAPERLESS FUTURE Petr DOLEJŠÍ Senior Solution Consultant SEFIRA Czech Republic PAPER IS EVERYWHERE WHY IS THAT? Please no more! Every large organization is typically large paper producer Banks, insurance,
1. What is Long-Term Docs... 5
Contents 1. What is Long-Term Docs... 5 1.1. General Properties of Long-Term Docs... 5 1.2. The Features of Long-Term Docs... 5 1.2.1. Long-Term Document Validity (LTV)... 6 1.2.2. Long-Term Document Archiving
Representation of E-documents in AIDA Project
Representation of E-documents in AIDA Project Diana Berbecaru Marius Marian Dip. di Automatica e Informatica Politecnico di Torino Corso Duca degli Abruzzi 24, 10129 Torino, Italy Abstract Initially developed
ETSI TS 102 640-3 V2.1.1 (2010-01) Technical Specification
TS 102 640-3 V2.1.1 (2010-01) Technical Specification Electronic Signatures and Infrastructures (ESI); Registered Electronic Mail (REM); Part 3: Information Security Policy Requirements for REM Management
CA Data Protection. Content Provider Development Guide. Release 15.0
CA Data Protection Content Provider Development Guide Release 15.0 This Documentation, which includes embedded help systems and electronically distributed materials (hereinafter referred to as the Documentation
How To Test Your Web Site On Wapt On A Pc Or Mac Or Mac (Or Mac) On A Mac Or Ipad Or Ipa (Or Ipa) On Pc Or Ipam (Or Pc Or Pc) On An Ip
Load testing with WAPT: Quick Start Guide This document describes step by step how to create a simple typical test for a web application, execute it and interpret the results. A brief insight is provided
CA DLP. Stored Data Integration Guide. Release 14.0. 3rd Edition
CA DLP Stored Data Integration Guide Release 14.0 3rd Edition This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation
The Recipe for Sarbanes-Oxley Compliance using Microsoft s SharePoint 2010 platform
The Recipe for Sarbanes-Oxley Compliance using Microsoft s SharePoint 2010 platform Technical Discussion David Churchill CEO DraftPoint Inc. The information contained in this document represents the current
Developing Microsoft SharePoint Server 2013 Core Solutions
Course 20488B: Developing Microsoft SharePoint Server 2013 Core Solutions Course Details Course Outline Module 1: SharePoint as a Developer Platform This module examines different approaches that can be
ETSI TS 102 640-3 V1.1.1 (2008-10) Technical Specification
TS 102 640-3 V1.1.1 (2008-10) Technical Specification Electronic Signatures and Infrastructures (ESI); Registered Electronic Mail (REM); Architecture, Formats and Policies; Part 3: Information Security
Rotorcraft Health Management System (RHMS)
AIAC-11 Eleventh Australian International Aerospace Congress Rotorcraft Health Management System (RHMS) Robab Safa-Bakhsh 1, Dmitry Cherkassky 2 1 The Boeing Company, Phantom Works Philadelphia Center
Mobile OTPK Technology for Online Digital Signatures. Dec 15, 2015
Mobile OTPK Technology for Online Digital Signatures Dec 15, 2015 Presentation Agenda The presentation will cover Background Traditional PKI What are the issued faced? Alternative technology Introduction
PkBox Technical Overview. Ver. 1.0.7
PkBox Technical Overview Ver. 1.0.7 14 September 2015 All the information in this document is and can t be used entirely or in part without a written permission from Intesi Group S.p.A. Le informazioni
1 (11) Paperiton DMS Document Management System System Requirements Release: 2012/04 2012-04-16
1 (11) Paperiton DMS Document Management System System Requirements Release: 2012/04 2012-04-16 2 (11) 1. This document describes the technical system requirements for Paperiton DMS Document Management
Bitrix Site Manager ASP.NET. Installation Guide
Bitrix Site Manager ASP.NET Installation Guide Contents Introduction... 4 Chapter 1. Checking for IIS Installation... 5 Chapter 2. Using An Archive File to Install Bitrix Site Manager ASP.NET... 7 Preliminary
UNICORN 6.4. Administration and Technical Manual
UNICORN 6.4 Administration and Technical Manual Page intentionally left blank Table of Contents Table of Contents 1 Introduction... 1.1 Administrator functions overview... 1.2 Network terms and concepts...
ETSI TS 102 640-5 V2.1.1 (2010-01) Technical Specification
TS 102 640-5 V2.1.1 (2010-01) Technical Specification Electronic Signatures and Infrastructures (ESI); Registered Electronic Mail (REM); Part 5: REM-MD Interoperability Profiles 2 TS 102 640-5 V2.1.1 (2010-01)
UNICORN 7.0. Administration and Technical Manual
UNICORN 7.0 Administration and Technical Manual Page intentionally left blank Table of Contents Table of Contents 1 Introduction... 1.1 Administrator functions overview... 1.2 Network terms and concepts...
Rights Management Services
www.css-security.com 425.216.0720 WHITE PAPER Microsoft Windows (RMS) provides authors and owners the ability to control how they use and distribute their digital content when using rights-enabled applications,
CALIFORNIA SOFTWARE LABS
; Digital Signatures and PKCS#11 Smart Cards Concepts, Issues and some Programming Details CALIFORNIA SOFTWARE LABS R E A L I Z E Y O U R I D E A S California Software Labs 6800 Koll Center Parkway, Suite
Windows Azure Data Services (basics) 55093A; 3 Days
Lincoln Land Community College Capital City Training Center 130 West Mason Springfield, IL 62702 217-782-7436 www.llcc.edu/cctc Windows Azure Data Services (basics) 55093A; 3 Days Course Description This
Patterns for Secure Boot and Secure Storage in Computer Systems
Patterns for Secure Boot and Secure Storage in Computer Systems Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy Horst Görtz Institute for IT Security, Ruhr-University Bochum, Germany {hans.loehr,ahmad.sadeghi,marcel.winandy}@trust.rub.de
The IDA Catalogue. of GENERIC SERVICES. Interchange of Data between Administrations
Interchange of Data between Administrations EUROPEAN COMMISSION ENTERPRISE DIRECTORATE- GENERAL INTERCHANGE OF DATA BETWEEN ADMINISTRATIONS PROGRAMME Interchange of Data between Administrations 2 of Generic
Dell PowerVault MD Storage Array Management Pack Suite Version 6.0 for Microsoft System Center Operations Manager Installation Guide
Dell PowerVault MD Storage Array Management Pack Suite Version 6.0 for Microsoft System Center Operations Manager Installation Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information
esign Online Digital Signature Service
esign Online Digital Signature Service Government of India Ministry of Communications and Information Technology Department of Electronics and Information Technology Controller of Certifying Authorities
irods and Metadata survey Version 0.1 Date March Abhijeet Kodgire [email protected] 25th
irods and Metadata survey Version 0.1 Date 25th March Purpose Survey of Status Complete Author Abhijeet Kodgire [email protected] Table of Contents 1 Abstract... 3 2 Categories and Subject Descriptors...
Implementing Active Directory Rights Management Services with Exchange and SharePoint
Course 50403B: Implementing Active Directory Rights Management Services with Exchange and SharePoint Course Details Course Outline Module 1: Why Rights Management? This module provides an overview of Microsoft
Developing a Web Server Platform with SAPI Support for AJAX RPC using JSON
Revista Informatica Economică, nr. 4 (44)/2007 45 Developing a Web Server Platform with SAPI Support for AJAX RPC using JSON Iulian ILIE-NEMEDI, Bucharest, Romania, [email protected] Writing a custom web
Performance Tuning Guide for ECM 2.0
Performance Tuning Guide for ECM 2.0 Rev: 20 December 2012 Sitecore ECM 2.0 Performance Tuning Guide for ECM 2.0 A developer's guide to optimizing the performance of Sitecore ECM The information contained
Information security controls. Briefing for clients on Experian information security controls
Information security controls Briefing for clients on Experian information security controls Introduction Security sits at the core of Experian s operations. The vast majority of modern organisations face
Polish Financial Supervision Authority. Guidelines
Polish Financial Supervision Authority Guidelines on the Management of Information Technology and ICT Environment Security for Insurance and Reinsurance Undertakings Warsaw, 16 December 2014 Table of Contents
Understanding Business Process Management
Title Page Understanding Business Process Management Version 8.2 April 2012 Copyright This document applies to webmethods Product Suite Version 8.2 and to all subsequent releases. Specifications contained
Secure Data Exchange Solution
Secure Data Exchange Solution I. CONTENTS I. CONTENTS... 1 II. INTRODUCTION... 2 OVERVIEW... 2 COPYRIGHTS AND TRADEMARKS... 2 III. SECURE DOCUMENT EXCHANGE SOLUTIONS... 3 INTRODUCTION... 3 Certificates
Best prac*ces in Cer*fying and Signing PDFs
over 10 years of securing identities, web sites & transactions Best prac*ces in Cer*fying and Signing PDFs Paul van Brouwershaven Business Development Director EMEA, GlobalSign @vanbroup on TwiEer INTERNATIONAL
Application Note Gemalto.NET 2.0 Smart Card Certificate Enrollment using Microsoft Certificate Services on Windows 2008
7 Application Note Gemalto.NET 2.0 Smart Card Certificate Enrollment using Microsoft Certificate Services on Windows 2008 All information herein is either public information or is the property of and owned
NTP Software File Reporter Analysis Server
NTP Software File Reporter Analysis Server Installation Guide Version 7.5 - September 2015 This guide provides quick instructions for installing NTP Software File Reporter Analysis Server from an administrator
Siebel Installation Guide for UNIX. Siebel Innovation Pack 2013 Version 8.1/8.2, Rev. A April 2014
Siebel Installation Guide for UNIX Siebel Innovation Pack 2013 Version 8.1/8.2, Rev. A April 2014 Copyright 2005, 2014 Oracle and/or its affiliates. All rights reserved. This software and related documentation
NETWRIX EVENT LOG MANAGER
NETWRIX EVENT LOG MANAGER QUICK-START GUIDE FOR THE ENTERPRISE EDITION Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not
PDF Forms Advantages and application possibilities of electronic forms in PDF format
White Paper PDF Forms Advantages and application possibilities of electronic forms in PDF format Copyright 2002-2009 soft Xpansion GmbH & Co. KG White Paper PDF Forms 1 Table of Contents Usage of Forms...
Global eid Developments. Detlef Eckert Chief Security Advisor Microsoft Europe, Middle East, and Africa
Global eid Developments Detlef Eckert Chief Security Advisor Microsoft Europe, Middle East, and Africa Agenda Country View on eid initiatives Trustworthy Identity Scenarios Microsoft eid update Summary
Update and Installation Guide for Microsoft Management Reporter 2.0 Feature Pack 1
Update and Installation Guide for Microsoft Management Reporter 2.0 Feature Pack 1 Microsoft Corporation Published: December 2010 Microsoft Dynamics is a line of integrated, adaptable business management
NEXT GENERATION ARCHIVE MIGRATION TOOLS
NEXT GENERATION ARCHIVE MIGRATION TOOLS Cloud Ready, Scalable, & Highly Customizable - Migrate 6.0 Ensures Faster & Smarter Migrations EXECUTIVE SUMMARY Data migrations and the products used to perform
Information Security for Modern Enterprises
Information Security for Modern Enterprises Kamal Jyoti 1. Abstract Many enterprises are using Enterprise Content Management (ECM) systems, in order to manage sensitive information related to the organization.
PBS ContentLink. Easy and Flexible Connection between Storage, SharePoint and SAP Solutions
Easy and Flexible Connection between, SharePoint and SAP Solutions Table of Contents Enterprise Content Management with Efficient Usage of Modern Systems as an Archive...3 and External Systems...3 Direct
Setup Guide Access Manager Appliance 3.2 SP3
Setup Guide Access Manager Appliance 3.2 SP3 August 2014 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS
Digital Signing without the Headaches
Digital Signing without the Headaches Nick Pope 1 Juan Carlos Cruellas 2 1 Security & Standards Associates Grays, Essex, United Kingdom [email protected] 2 Universitat Politècnica de Catalunya Barcelona,
Guide for Securing E-mail With WISeKey CertifyID Personal Digital Certificate (Personal eid)
The World Internet Security Company Solutions for Security Guide for Securing E-mail With WISeKey CertifyID Personal Digital Certificate (Personal eid) Wherever Security relies on Identity, WISeKey has
DocuSign for SharePoint 2010 1.5.1
Quick Start Guide DocuSign for SharePoint 2010 1.5.1 Published December 22, 2014 Overview DocuSign for SharePoint 2010 allows users to sign or send documents out for signature from a SharePoint library.
ETSI SECURITY WEEK EIDAS Overview CEN/ETSI esignature Standardization including standards for TSP Compliance. ETSI 2015. All rights reserved
ETSI SECURITY WEEK EIDAS Overview CEN/ETSI esignature Standardization including standards for TSP Compliance esignature Standards Framework Certificate Authority Time-stamping Signing Servers Validation
White Paper BMC Remedy Action Request System Security
White Paper BMC Remedy Action Request System Security June 2008 www.bmc.com Contacting BMC Software You can access the BMC Software website at http://www.bmc.com. From this website, you can obtain information
QUALITYMATE FOR LOAD TESTING
QUALITYMATE FOR LOAD TESTING QualityMate suite of tools enables organizations to industrialize the software development process providing support for different process activities like Requirements Management,
Cache Configuration Reference
Sitecore CMS 6.2 Cache Configuration Reference Rev: 2009-11-20 Sitecore CMS 6.2 Cache Configuration Reference Tips and Techniques for Administrators and Developers Table of Contents Chapter 1 Introduction...
Title Release Notes PC SDK 5.14.01. Date 2011-06-15. Dealt with by, telephone. Table of Content GENERAL... 2
1/10 Table of Content GENERAL... 2 Release Information... 2 Introduction... 2 Installation... 3 Hardware and Software requirements... 4 Compatibility... 5 Updates in PC SDK 5.14.01 vs. 5.14... 6 Updates
Draft Middleware Specification. Version X.X MM/DD/YYYY
Draft Middleware Specification Version X.X MM/DD/YYYY Contents Contents... ii 1. Introduction... 1 1.2. Purpose... 1 1.3. Audience... 1 1.4. Document Scope... 1 1.5. Document Objectives... 1 1.6. Assumptions
Integrating LANGuardian with Active Directory
Integrating LANGuardian with Active Directory 01 February 2012 This document describes how to integrate LANGuardian with Microsoft Windows Server and Active Directory. Overview With the optional Identity
SharePoint Configuration Guidance for 21 CFR Part 11 Compliance
SharePoint Configuration Guidance for 21 CFR Part 11 Compliance Published: April 2012 Microsoft Corporation Health and Life Sciences Industry Unit Paragon Solutions Health and Life Sciences Practice Introduction...
User Guide of edox Archiver, the Electronic Document Handling Gateway of
User Guide of edox Archiver, the Electronic Document Handling Gateway of project v0.7 SCI-BUS is supported by the FP7 Capacities Programme under contract nr RI-283481 Table of Contents 1 INTRODUCTION...
EVTXtract. Recovering EVTX Records from Unallocated Space PRESENTED BY: Willi Ballenthin OCT 6, 2013. Mandiant Corporation. All rights reserved.
EVTXtract Recovering EVTX Records from Unallocated Space PRESENTED BY: Willi Ballenthin OCT 6, 2013 What do we have here today? A technical presentation on a novel forensic technique for recovering past
CA ARCserve Backup for Windows
CA ARCserve Backup for Windows Agent for Microsoft SharePoint Server Guide r15 This documentation and any related computer software help programs (hereinafter referred to as the "Documentation") are for
Microsoft Dynamics CRM Adapter for Microsoft Dynamics GP
Microsoft Dynamics Microsoft Dynamics CRM Adapter for Microsoft Dynamics GP May 2010 Find updates to this documentation at the following location. http://go.microsoft.com/fwlink/?linkid=162558&clcid=0x409
The Connected Business Support Center
t At Connected Business, we develop powerful, fully integrated applications designed to bring all the major business processes together via a single comprehensive solution. Our applications are powerful,
COMMISSION OF THE EUROPEAN COMMUNITIES
EN EN EN COMMISSION OF THE EUROPEAN COMMUNITIES Brussels, 28.11.2008 COM(2008) 798 final COMMUNICATION FROM THE COMMISSION TO THE COUNCIL, THE EUROPEAN PARLIAMENT, THE EUROPEAN ECONOMIC AND SOCIAL COMMITTEE
OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES
OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES Table of contents 1.0 SOFTWARE 1 2.0 HARDWARE 2 3.0 TECHNICAL COMPONENTS 2 3.1 KEY MANAGEMENT
Integration of DB oriented CAD systems with Product Lifecycle Management
Integration of DB oriented CAD systems with Product Lifecycle Management Roberto Penas, SENER Ingeniería y Sistemas S.A., Tres Cantos/Spain, [email protected] Carlos González, SENER Ingeniería y Sistemas
Long term electronic signatures or documents retention
Long term electronic s or documents retention IWAP 2004 Yuichi Suzuki SECOM IS Laboratory IWAP 2004 Yuichi Suzuki (SECOM IS Lab) 1 Problem of validity period of certificate PKI does work well in a validity
DocAve 6 Quickr Migrator
DocAve 6 Quickr Migrator User Guide Service Pack 6, Cumulative Update 1 Issued December 2015 1 Table of Contents What s New in this Guide... 5 About Quickr Migrator... 6 Complementary Products... 6 Submitting
System Requirements for Microsoft Dynamics NAV 2013 R2
System Requirements for Microsoft Dynamics NAV 2013 R2 February 2014 Contents 3 System Requirements for the Microsoft Dynamics NAV Windows Client 3 Web Client 4 System Requirements for Microsoft Dynamics
The Intelligent Content Framework
The Intelligent Content Framework A practical approach to accelerating the Study Design and Regulatory Documentation Development Processes using a Rules-driven, Structured Content Authoring Solution Framework
Configuring and Administering Microsoft SharePoint 2010
Course 10174 : Configuring and Administering Microsoft SharePoint 2010 Page 1 of 7 Configuring and Administering Microsoft SharePoint 2010 Course 10174: 4 days; Instructor-Led Introduction This four-day
Title Release Notes PC SDK 5.14.03. Date 2012-03-30. Dealt with by, telephone. Table of Content GENERAL... 3. Corrected Issues 5.14.03 PDD...
1/15 Table of Content GENERAL... 3 Release Information... 3 Introduction... 3 Installation... 4 Hardware and Software requirements... 5 Deployment... 6 Compatibility... 7 Updates in PC SDK 5.14.03 vs.
The biggest challenges of Life Sciences companies today. Comply or Perish: Maintaining 21 CFR Part 11 Compliance
S E P T E M B E R 2 0 1 3 Comply or Perish: The biggest challenges of Life Sciences companies today are maintaining a robust product pipeline and reducing time to market while complying with an increasing
Network device management solution
iw Management Console Network device management solution iw MANAGEMENT CONSOLE Scalability. Reliability. Real-time communications. Productivity. Network efficiency. You demand it from your ERP systems
ETSI TS 102 640-3 V2.1.2 (2011-09)
TS 102 640-3 V2.1.2 (2011-09) Technical Specification Electronic Signatures and Infrastructures (ESI); Registered Electronic Mail (REM); Part 3: Information Security Policy Requirements for REM Management
Novell ZENworks 10 Configuration Management SP3
AUTHORIZED DOCUMENTATION Software Distribution Reference Novell ZENworks 10 Configuration Management SP3 10.3 November 17, 2011 www.novell.com Legal Notices Novell, Inc., makes no representations or warranties
A SECURITY ARCHITECTURE FOR AGENT-BASED MOBILE SYSTEMS. N. Borselius 1, N. Hur 1, M. Kaprynski 2 and C.J. Mitchell 1
A SECURITY ARCHITECTURE FOR AGENT-BASED MOBILE SYSTEMS N. Borselius 1, N. Hur 1, M. Kaprynski 2 and C.J. Mitchell 1 1 Royal Holloway, University of London 2 University of Strathclyde ABSTRACT Future mobile
PERAGO360. Trust and Innovation in Business Critical Solutions
PERAGO360 Trust and Innovation in Business Critical Solutions PERAGO360 Trust and Innovation in Business Critical Solutions Traditional IT implementations have been hampered by the inability to execute
