PHINMS Acronyms & Glossary List
|
|
|
- Nicholas Potter
- 10 years ago
- Views:
Transcription
1 PHINMS Acronyms & Glossary List Version: Prepared by: U.S. Department of Health & Human Services Date: March 27, 2008
2 VERSION HISTORY VERSION # IMPLEMENTER DATE EXPLANATION Wendy Fama Create version Rajeev Seenappa Updates Wendy Fama Updates Wendy Fama Added terms and acronyms Wendy Fama Added terms and acronyms Wendy Fama Added acronyms Wendy Fama Updated with Content Sensitive Help definitions. PHINMS Acronyms Glossary List 1.0.3_ doc Page ii of 20
3 EXECUTIVE SUMMARY PHINMS Acronym & Glossary List The Public Health Information Network Messaging System (PHINMS) is a secure and reliable data transport system built to open standards. PHINMS is the primary data transport mechanism for the Centers for Disease Control and Prevention (CDC) Public Health Information Network (PHIN). This document lists the acronyms and common terms with definitions used by PHINMS. PHINMS Acronyms Glossary List 1.0.3_ doc Page iii of 20
4 TABLE OF CONTENTS PHINMS Acronym & Glossary List 1.0 Acroynms Common Terms...9 PHINMS Acronyms Glossary List 1.0.3_ doc Page iv of 20
5 1.0 ACROYNMS AH AJAX AJP API ATO B2B BA BSIO BPSS CA C&A CCB CDC CDS CSC CM CMVP COBRA COTS CPA CPP CPS CRA CSE DMZ DN DNS DPiT DSN ebms E-SIGN ebxml EJB ELR ErrorQ ESP Authentication Header AJAX Asynchronous Javascript and XML Apache JServ Protocol Application Program Interface Authority to Operate Business to Business Basic Authentication Business Services Improvement Office Business Process Specification Schema Certificate Authority Certification and Accreditation Configuration Change Board Centers for Disease Control and Prevention Common Data Store Customer Service Center Configuration Management Cryptographic Module Validation Program Common Object Request Broker Architecture Commercial Off-the-Shelf Collaboration Protocol Agreement Collaboration Protocol Profile Certification Practice Statement Countermeasure Response Administration Communications Security Establishment De-Militarized Zone Distinguished Name Domain Name System Data Provisioning Info Technology Data Source Name ebxml Messaging Services Electronic Signatures in Global and National Commerce Act Electronic Business Extensible Markup Language Enterprise Java Beans Electronic Lab Reports Error Queue Encapsulating Security Payload PHINMS Acronyms Glossary List 1.0.3_ doc Page 5 of 20
6 FAQs FIPS FTP GA GB GIS GPEA GUI Frequently Asked Questions Federal Information Processing Standard File Transfer Protocol General Availability Gigabyte Geographic Information System Government Paperwork Elimination Act Graphical User Interface PHINMS Acronym & Glossary List HCN HIPPAA HL7 HSM HSQL HSQLDB HTML HTTP HTTPS IBMJCE IIS IMAP IP IPSEC ISAKMP ISAPI ITL J2EE J2SE JAX JAX-WS JDBC JDK JMS JMSQ JSP JVM KB LAN LDAP LDF LRN Healthcare Collaborative Network Health Insurance Portability and Accountability Act Health Level Seven Hardware-Based Security Modules HyperXtreme Structured Query Language HyperXtreme Structured Query Language Database Hyper Text Markup Language Hyper Text Transfer Protocol Hyper Text Transfer Protocol over Secure Sockets Layer (SSL) International Business Networks Java Cryptography Extension Internet Information Server Internet Message Access Protocol Internet Protocol Internet Protocol Security Internet Security Association and Key Management Protocol Internet Server Application Programming Interface Information Technology Laboratory Java 2 Platform, Enterprise Edition Java 2 Platform Standard Edition Java API for XML Java API for XML Web Services Java Database Connectivity Java Development Kit Java Messaging Service Java Messaging Service Queue Java Server Pages Java Virtual Memory Kilobyte Local Area Network Lightweight Directory Access Protocol Locally Defined Fields Laboratory Response Network PHINMS Acronyms Glossary List 1.0.3_ doc Page 6 of 20
7 MB MMC MTDC MTOM NBS NCPHI NEDSS NHSN NIST NND NNDM NPP NVLAP NYC NYS OASIS ODBC OID OMB OMG OMS PAMS PC PDW PEMS PFS PHIN PHINMS PKCS PKI PM POP PS PSK PTP QA R&D RAD RC RDBMS RNR PHINMS Acronym & Glossary List megabit Microsoft Management Console Mid-Tier Data Center Message Transmission Optimization Mechanism NEDSS Based System National Center for Public Health Information National Electronic Disease Surveillance System National Healthcare Safety Network National Institute for Standards and Technology Nationally Notifiable Disease Nationally Notifiable Disease Manager NEDSS PAMS Platform National Voluntary Laboratory Accreditation Program New York City New York State Organization for the Advancement of Structured Information Standards Open Database Connectivity Object Identifier Office of Management and Budget Object Management Group Outbreak Management System Program Area Modules Personal Computer Preparedness Data Warehouse Program Evaluation & Monitoring System perfect forward secrecy Public Health Information Network Public Health Information Network Messaging System Public-Key Cryptography Standards Public Key Infrastructure Project Manager Post Office Protocol Product Support Pre-Shared Key Point-to-Point Quality Assurance Research and Development Rapid Application Development Release Candidate Relational Database Management System Route-not-Read PHINMS Acronyms Glossary List 1.0.3_ doc Page 7 of 20
8 RPC RT SAML SCM SDK SDN SMTP SOA SOAP SP SQL SRP SSL SSO StatusQ STP TCP TLS TransportQ Remote Procedure Call Real Time Security Assertion Markup Language Software Configuration Management Software Development Kit Secure Data Network Simple Mail Transport Protocol Service-Oriented Architecture Simple Object Access Protocol Service Pack Structured Query Language Security Rollup Package Secure Socket Layer Single Sign-On Status Queue Secure Transport Protocol Transmission Control Protocol Transport Layer Security Transport Queue PHINMS Acronym & Glossary List UAT UDDI UDP UID UNIX UML URI URL VPN W3C WAR WorkerQ WS WSA WSDL WSRP XACML XML XMLDSIG XMLENC User Acceptance Test Universal Description, Discovery, and Integration User Datagram Protocol User Identifier Universal Network Information Exchange Unified Modeling Language Uniform Resource Identifier Uniform Resource Locator Virtual Private Network World-Wide-Web Consortium Web Archive Worker Queue Web Services Web Service Adapter Web Service Description Language Web services for Remote Portlets extensible Access Control Markup Language extensible Markup Language extensible Markup Language Digital Signature extensible Markup Language Encryption PHINMS Acronyms Glossary List 1.0.3_ doc Page 8 of 20
9 2.0 COMMON S Acknowledge Folder Acknowledge Request Acknowledge to File Action Application Error Code Application Level Caching Application Response Application Status Archive Log Arguments Authentication Type Basic Authentication Index Page Basic Authentication Password Basic Authentication User Name The location used to store messages received from the Receiver. The Message Receiver sends the Message Sender an acknowledgement after the Message Receiver receives the message. The status of messages attempted to be sent or successful sent from the Acknowledgement folder. The name of the one (Action) of a two-part combination (Service/Action pair) which establishes the address of the WorkerQ where the message is received. Indicates the application which received the message experienced some kind of error while trying to process the message. The error codes vary depending on the type of application used. PHINMS does not determine the error codes. A process which uses the combination of Message ID, Record ID, and PartyID to determine if a message has been sent. The application sends a response to the Message Sender after processing the message. The response contains the application status and/or error codes. This field is populated with the status of the PHINMS application. Indicates whether to Archive Log files when the configured size limit has been reached. When the log is archived and a new log is created when the size is reached as indicated in the Max Log Size field. The log is deleted and a new log is created when the size is reached as indicated in the Max Log Size field when the Archive Log is not selected. A field not used specifically by PHINMS but a third party application. PHINMS provides this additional metadata field. The third party can provide specific processing instructions to the receiving application. Identifies what kind of security measures are used to verify identity. The validation of the User s access allowing log in to an index page utilizing the User Name and Password. The confidential sequence of characters required by the Basic Authentication Index Page. The unique name or log on used in conjunction with the password required by the Basic Authentication Index Page. PHINMS Acronyms Glossary List 1.0.3_ doc Page 9 of 20
10 Cache Entry Max Age Certification URL Chunk Size Chunking Repository Client Connection Timeout Console Core Transport CPA CPA Location Creation Time Custom Authentication Login Page Custom Authentication Public Parameters Custom Authentication Secret Parameters Data Read Timeout Database Driver Database ID Database Password Database Polling Interval The maximum age in hours entries are cached in the database. The entry is deleted when the age indicated has been reached. The uniform resource locator (URL) of the recipient's public key. The size of the increments to be sent. The directory where received message chunks are stored. Also referred to as a Sender. The number of seconds the Message Sender waits before timing out the attempt to connect to the SSL. The PHINMS GUI interface which manipulates the Core Transport. The method PHINMS uses to send and receive messages securely and reliably over the internet. A Collaboration Protocol Agreement is a necessary agreement between two messaging partners stored in an.xml file. The relative path name to the directory storing the Collaboration Protocol Agreement. The time stamp which records were created in universal time coordinated (UTC) format. The validation of the User s access which allows a user to log into a customized index page utilizing the User Name and Password. The relative path name of the Message Sender's Key Store which includes the certificate name and extension. A secured word or string of characters assigned to the Sender s Key Store Private Key. The configured number of seconds the Message Sender waits to receive a response from the Message Receiver before the Message Sender times out. The type of Java Database Connectivity translator between the device and the PHINMS application. The unique user defined name of the PHINMS database connection pool. The confidential sequence of characters created on the database associated with the User Name to gain access to the database. The number of seconds between polls. PHINMS Acronyms Glossary List 1.0.3_ doc Page 10 of 20
11 Database Type Database URL Database URL Prefix Database URL Suffix Database User Database User Delayed Retry Delayed Retry Interval Delete Records Delete Start Time Deletion Interval Destination File Name Documentation Domain Name Dual Sender Duplicate Message Detection ebxml Acknowledge Request ebxml Signed Acknowledge The type of database used to store PHINMS messages such as MS Access, MySQL, HSQL, etc. The Uniform Resource Locator (URL) of the database connection. The database driver portion of the database s Uniform Resource Locator connection. The server and user name portion of the database s Uniform Resource Locator connection. The database user s name. The database s user identification. Automatically retries sending failed records at intervals specified by the configured value in the Max Delayed Retries field. The number of seconds configured before failed messages are requeued to be sent out. The amount of records to be deleted determined by the administrator. Identifies when the deletion process will begin according to the date and time determined by the administrator. The frequency to perform the deletion process determined by the administrator. The name of the payload file when it is stored on the Receiver. Applicable PHINMS documentation used to reference implementation, technical guidance, processes, etc. See also the term for Web Information. An added identifier maintained for future PHINMS compatibility unique to an organization. The installation of multiple PHINMS instances which can be hosted on the same machine. The approach used by the PHINMS Receiver to detect duplicate received messages under the Multi-Transport Queue. This duplicate message detection is beyond the persistent cache s duplicate message detection and is database neutral. The Message Receiver sends the Message Sender an acknowledgement after the receiving the message. The digitally signed acknowledgement which comes from the Message Receiver to the Message Sender. PHINMS Acronyms Glossary List 1.0.3_ doc Page 11 of 20
12 ebxml Synchronous Reply Enable Chunking Encryption End Point Entry Age Error Code Error Message ErrorQ File Name Folder Based Polling From PartyID From User High Priority In Use Incoming Directory Install Wizard Instance Java JBoss Selected when the Message Sender wants to wait for a reply from the Message Receiver for the previous message before attempting to send the next message. When this feature is enabled, PHINMS will send a large file in smaller sizes depending on the maximum file size configured. The value is Yes if the payload is unintelligible to unauthorized parties. A final destination for the message. The maximum time in hours when records are cached. Used to identify the status of the sent message processed which is either success or failed at the Receiver. This field is populated identifying a failed response when trying to process a message A PHINMS database table which stores error messages of the delivery failure status. The nomenclature of the outgoing message being sent. Messages which are sent from a folder instead of a database. The unique identifier for each instance of the PHINMS Sender of the message. The Route-not-Read user name used by the Poller to identify where the message originated. Checked when the message needs to be sent immediately. An indication the database is currently running or available. A directory where messages are stored if the incoming message is not placed in the database. The PHINMS install wizard provides upgrades, fresh installs, and different Solaris, Linux, and Windows builds at the operating system level. The application sever level contains JBoss, Web Logic, and Tomcat. Also referred to as a PHINMS installation or node. A general purpose, high-level, object-oriented, cross-platform programming language. Open source Java 2 enterprise application server used for developing and deploying applications. PHINMS Acronyms Glossary List 1.0.3_ doc Page 12 of 20
13 JDBC Driver JMS Message Handler JMS Queue Key Store Key Store Location Key Store Password Last Update time LDAP Cache LDAP Cache Path LDAP Cache Timeout LDAP Key Retrieval LDAP Proxy LDAP Proxy Action LDAP Proxy Route LDAP Proxy Service The driver name which the Transports Queue database table uses. The Java Message Service Message Handler is a Java Message Service client application polling (surveying) the Worker Queue at a configurable time interval which sends the payload and metadata information to a Java Message Service Queue. A Java Message Service Queue is a storage area where messages are stored by the PHINMS Receiver, it contains messages ready to be sent and have been sent with different processing status. As the name Queue suggests, the messages are ready to be sent in order. Processing status of the Queue is changed when the message has been sent. The full path name of the Message Sender's Key Store including the certificate name and extension. The relative path name of the Message Sender's Key Store including the certificate name and extension. A secured word or string of characters assigned to the Sender s Key Store Private Key. A time stamp indicating the latest modification to the message. When selected, the public keys are retrieved from the stored Lightweight Directory Access Protocol (LDAP) searches. The location of the Lightweight Directory Access Protocol (LDAP) cache. Configured hours to wait before refreshing the Lightweight Directory Access Protocol (LDAP) cache. Configured when the Lightweight Directory Access Protocol (LDAP) search is used to retrieve the public key of the recipient to encrypt the message. Use when PHINMS clients are unable to send Lightweight Directory Access Protocol (LDAP) lookup requests to directory.verisign.com over port 389. The ebxml action performed when forwarding the Lightweight Directory Access Protocol (LDAP) request. The route used when the proxy server sends the Lightweight Directory Access Protocol (LDAP) request. The ebxml service forwarding the Lightweight Directory Access Protocol (LDAP) request. PHINMS Acronyms Glossary List 1.0.3_ doc Page 13 of 20
14 Location Log Directory Log Level Log Location Master Password Max Cache Entries Max Cache Size Max Chunk Age Max Delayed Retries Max Last Update Max Log Size Max Multi-Block Size Max Resend Attempts Max Retry Attempts Maximum Threads Message ID The area in the directory the acknowledgement, outgoing, and processed folders are created to store for PHINMS messages used with the Folder Based Polling feature. The relative path where PHINMS stores the Sender log files. The amount of detail written to a log file. The lowest level of detail is None and the highest level of detail is Messages. All details are written to the log file including the contents of the message when the Message level is selected. The directory the log files are stored. The password used to decrypt the password file with the PBE utility. The maximum number of entries which can be stored in the persistent cache. The entries are deleted when the maximum number has been cached. The maximum number of bytes which can be stored in persistent cache. The entries are deleted when the maximum number of bytes has been cached. The age of the cache before it is cleared. When receiving a chunk from a Sender, this setting is used to determine the hours the chunk should remain on the system before deleting. The maximum number of times the Message Sender will automatically retry sending failed records. The frequency to check and process PHINMS messages from the outgoing folder. An indicator used to determine when the configured size indicated has been reached; the current log will be deleted or archived depending on whether the Archive Log check box is selected. A new log file will be created when the Maximum Log Size has been reached. The chunk size configured to send large messages. The maximum number of times the Message Sender will automatically retry sending failed records. The maximum number of retry attempts before marking a message permanently failed. The total number of Threads which can be connected. An assigned unique identifier created by the application for each message. PHINMS Acronyms Glossary List 1.0.3_ doc Page 14 of 20
15 Message Recipient Message Table Name Multi-Block Multi-Block Directory Multi-Threading Name Node Origin Outgoing Directory Outgoing Folder PartyID Password Payload File Payload to Disk Persistent Cache PHINMS PHINMS Software Poll Directory Poll Mode Polling Destination Polling Interval A field used for the Sender to identify a receiver of a Message. The table name of the Transport Queue. Used to breaks up large messages into chunks before sending. The location of stored message chunks. The number of threads or connections which can run at the same time without interfering with each other. The identity of a regional file which stores processed messages. Also referred to as a PHINMS installation or instance. The name of the Message Poller. A folder which contains files queued for sending to an application or server. A folder used to store messages to be sent. A unique identifier for each instance of the PHINMS Sender used when sending messages to the Centers for Disease Control and Prevention (CDC). The PHINMS Help Desk assigns the PartyID. The PartyID value must be the same as the Message Receiver's PartyID in the Collaboration Protocol Agreement. The challenge phrase created when enrolling for a SDN Digital Certificate. Also used to refer to the login phrase used to open the PHINMS console. File name of an outgoing message relative to a local directory such as myinputs.txt. Select when the incoming payload needs to be written to disk, if not selected, the payload will be written to the database. Detects duplicate messages. CDC s implementation of Secure and Reliable Messaging System An application which provides language neutral queue-based interfaces for sending and receiving secure messages. The relative path where outgoing payload files to be polled are stored. A select loop and an outgoing directory which is continually polled. The intermediary server used for Route-not-Read. The number of seconds between polls. PHINMS Acronyms Glossary List 1.0.3_ doc Page 15 of 20
16 Pool Size Priority Process ID Process Status Processed Folder Protocol Proxy Host Proxy Password Proxy Port Proxy User Public Key LDAP Address Public Key LDAP Base DN Public Key LDAP DN Queue ID Queue Map Queue Map ID Received Time Receiver Receiver Logs Recipient Record ID Resend Delay Interval PHINMS Acronym & Glossary List The number of database connections established by the Receiver. An integer indicating the request s precedence. The unique identification of a series of actions the transportation of the message is performing. The current condition of the message at the Sender. The status identifiers are queued, attempted, sent, and done. A regional file which store successfully sent messages. Use either HTTP or HTTPS to send messages. The host name or the IP address of the proxy server. The password for the proxy user. The port number used by the proxy. The name of the proxy user. The Lightweight Directory Access Protocol (LDAP) address for the LDAP Directory Server. The Lightweight Directory Access Protocol (LDAP) Base Distinguished Name of the public key such as an organization. The Lightweight Directory Access Protocol (LDAP) Distinguished Name of the public key such as a common name. A unique identifier assigned to each Worker Queue which is associate with the table name. The Queue Map indicates which database and table to store incoming messages. The unique ID created by the user referenced by the service map entry. The time stamp which records when the message was received. A server which is used to send and/or receive messages. Stored information on the status of received messages. A field identifying the addressee of the destination. An accumulating auto field value assigning a unique numeric number to a message. The Record ID is the table s unique key. The number of seconds the system will wait before failed records are re-queued and sent again. Resend Failed Messages Activates the option to send unsuccessful sent messages again. PHINMS Acronyms Glossary List 1.0.3_ doc Page 16 of 20
17 Response Arguments Response File Name Response Local File Name Response Message ID Response Message Origin Response Message Signature Response to Database Retention Period Route Route Map Route Map Location Route Name RouteInfo Route-not-Read SDN Challenge Phrase SDN Login Page Sender Sender Logs Used in the Route-not-Read scenario to convey arguments being sent by the Sender to the Receiver. The field is the response file name used in Route-not-Read. The response to a poll type request which may contain a payload file. The payload file is written to a local folder under a unique file name used in Route-not-Read. The Message ID of the received message in the Route-not-Read scenario. The PartyID of the user which originally created the message used in a Route-not-Read scenario. The PartyID of the user which originally signed the message used in a Route-not-Read scenario. An acknowledgement which indicates an entry was made into the database. The period of time during records are determined to be retained before final disposition or deletion. A path created and stored in the Route Map. The Route includes the To PartyID, Path, Host, Port, Protocol, and Authentication Type assigned to a specific recipient. Used to store the recipient s attributes, such as the URL, transport protocol, and authentication type. The relative path name of the Route Map. The name of the route which maps to the CPA files. A configuration file which maps to the uniform resource locator (URL) of the message Receiver. It contains the address of the Receiver. The process used by the Message Sender which an intermediary server receives its messages allowing the Message Sender to later retrieve the messages by the polling server. Formatted security password with special characters created by the user based upon parameters set by the Secure Data Network (SDN). The Centers for Disease Control and Prevention s (CDC) secured environment used to request the SND Challenge Phrase. A server used to send messages. Information stored on the status of sent messages. PHINMS Acronyms Glossary List 1.0.3_ doc Page 17 of 20
18 Sent Time Service Service/Action Pair Signature Signature Required Signed Acknowledgement Signing Certificate Location Synchronous Message Handler Synchronous Message Handler Read Timeout Synchronous Reply System Level Table ID Table Name Text Payload Transport Error Code The time stamp which records when the message was sent. The name of the one (Service) of a two-part combination (Service/Action pair) which establishes the address of the WorkerQ where the message is received. Attributes which are based upon the ebxml transport specification. When Yes is selected, the extensible markup language (ebxml) signature is applied to the payload. The setting which indicates whether a digital signature is required on the incoming payload. The payload will fail when a required digital signature is missing. The digitally signed acknowledgement which comes from the Message Receiver to the Message Sender. The relative path which signed certificates is stored. A message handler which processes incoming messages at the same time and responds. The amount of time the Receiver should timeout after trying to connect to a Message Handler when doing a synchronous call from a Sender. When the Message Sender waits for a reply from the Message Receiver for the previous message before the Message Sender attempts to send the next message. System Methodologies and practices which enable quick integration of newly designed components. Additionally, this area will have integration points through out design, development, and deployment. This non-tangible component area will cultivate and insure interoperability and standards compliance for the PHINMS Product Level. The PHINMS identification tag within the.xml file in relation to the external database table name. The database table name which the Service/Action pair is linked. Selecting this option allows payloads to be received in text format, if not selected, the payloads will be written to the database as binary. The error code describing the transport failure. The error codes are Security Failure, Delivery Failure, Not Supported, Unknown, and No Such Service. PHINMS Acronyms Glossary List 1.0.3_ doc Page 18 of 20
19 Transport Status TransportQ Trusted Certificate Trusted Store Location Trusted Store Password Type UDDI URL Usage Use Persistent Cache Use Web Proxy User Name Web Information Web Services Adapter WorkerQ The existing condition of the received message either being a transport success, attempted, or transport failure. A relational database table which interfaces between the application creating the message and PHINMS. The database table where the meta-base information and data is stored. Consists of a public key and a private key. Contains Intermediate or Root certificate authority from the trusted source. The relative path of the Message Sender's Trusted Store. A secured word or string of characters for the Trusted Store file. Identifies the approach (Worker Queue, Servlet, or Error Queue) used to route a message. Worker Queues are used to make connections to the database. Servlet are used to interface with thirdparty applications. Error Queues interface with an error log or error databases to track errors. An agreement to operate solutions conforming to a specification for how to build a registry of business services and how to connect to them. Denotes the Domain Name System and the path of the Receiver. The defined purpose for the database connection. Indicates whether to use a database to store message information which prevents duplicate messages from being written to the service. The message information is automatically cached in the memory of the Message Receiver when the Use Persistent Cache check box is not selected. Used when the PHINMS client wants to send HTTP requests through a proxy server. A unique name or logon used in conjunction with the password to gain access to the system. PHINMS intranet, internet, online help, and applicable documentation used to reference implementation, technical guidance, processes, etc. Web service components which allow entries into the Transport and Worker Queues via Web Services Clients. A relational database table which interfaces between the application receiving the message and PHINMS. The database table which stores meta-base information and the payload. PHINMS Acronyms Glossary List 1.0.3_ doc Page 19 of 20
20 PHINMS Acronyms Glossary List 1.0.3_ doc Page 20 of 20
PHIN MS Detailed Security Design
The Public Health Information Network Messaging System (PHINMS) sends and receives sensitive data over the internet to the public health information systems using Electronic Business Extensible Markup
Implementation Guide. Public Health Information Network Messaging System (PHINMS)
Implementation Guide Public Health Information Network Messaging System (PHINMS) Version: 2.8.02 Prepared by: U.S. Department of Health & Human Services November 1, 2012 EXECUTIVE SUMMARY PHINMS 2.8.02
Secure, Reliable Messaging Comparisons between PHINMS, SFTP, and SSH. Public Health Information Network Messaging System (PHINMS)
Secure, Reliable Messaging Comparisons between PHINMS, SFTP, and SSH Public Health Information Network Messaging System (PHINMS) Version: 1.0 Prepared by: U.S. Department of Health & Human Services Date:
The Public Health Information Network Messaging System
The Public Health Information Network Messaging System Tim Morris Director, Division of Informatics Shared Services (DISS) National Center for Public Health Informatics (NCPHI) Centers for Disease Control
Centers for Disease Control and Prevention, Public Health Information Network Messaging System (PHINMS)
1 ebxml Case Study 2 3 4 5 Centers for Disease Control and Prevention, Public Health Information Network Messaging System (PHINMS) 4 October 2003 6 7 8 9 10 11 12 13 14 15 16 17 Document identifier: (Word)
PHINMS Alarms. Version: 1.0.0. Prepared by: U.S. Department of Health & Human Services
PHINMS Alarms Version: 1.0.0 Prepared by: U.S. Department of Health & Human Services Date: January 11, 2008 VERSION HISTORY VERSION # IMPLEMENTER DATE EXPLANATION 1.0.0 Chris Childs 01/11/08 Create version
Collaboration Protocol Agreement Guide. Public Health Information Network Messaging System (PHINMS)
Collaboration Protocol Agreement Guide Public Health Information Network Messaging System (PHINMS) Version: 1.0.0 Prepared by: U.S. Department of Health & Human Services Date: April 15, 2008 EXECUTIVE
Setup Guide Access Manager 3.2 SP3
Setup Guide Access Manager 3.2 SP3 August 2014 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE
Feature and Technical
BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 4 Feature and Technical Overview Published: 2013-11-07 SWD-20131107160132924 Contents 1 Document revision history...6 2 What's
StreamServe Persuasion SP5 StreamStudio
StreamServe Persuasion SP5 StreamStudio Administrator s Guide Rev B StreamServe Persuasion SP5 StreamStudio Administrator s Guide Rev B OPEN TEXT CORPORATION ALL RIGHTS RESERVED United States and other
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
E-mail Listeners. E-mail Formats. Free Form. Formatted
E-mail Listeners 6 E-mail Formats You use the E-mail Listeners application to receive and process Service Requests and other types of tickets through e-mail in the form of e-mail messages. Using E- mail
Optus EmailSMS for MS Outlook and Lotus Notes
Optus EmailSMS for MS Outlook and Lotus Notes Service Description, August 2005. OVERVIEW This document provides an overview of the Optus EmailSMS service delivered jointly by Optus and redcoal. It highlights
IBM SPSS Collaboration and Deployment Services Version 6 Release 0. Single Sign-On Services Developer's Guide
IBM SPSS Collaboration and Deployment Services Version 6 Release 0 Single Sign-On Services Developer's Guide Note Before using this information and the product it supports, read the information in Notices
Setup Guide Access Manager Appliance 3.2 SP3
Setup Guide Access Manager Appliance 3.2 SP3 August 2014 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS
BlackBerry Enterprise Service 10. Version: 10.2. Configuration Guide
BlackBerry Enterprise Service 10 Version: 10.2 Configuration Guide Published: 2015-02-27 SWD-20150227164548686 Contents 1 Introduction...7 About this guide...8 What is BlackBerry Enterprise Service 10?...9
Advanced Administration
BlackBerry Enterprise Service 10 BlackBerry Device Service Version: 10.2 Advanced Administration Guide Published: 2014-09-10 SWD-20140909133530796 Contents 1 Introduction...11 About this guide...12 What
Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference
Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise
www.novell.com/documentation Policy Guide Access Manager 3.1 SP5 January 2013
www.novell.com/documentation Policy Guide Access Manager 3.1 SP5 January 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this documentation,
How To Use Netiq Access Manager 4.0.1.1 (Netiq) On A Pc Or Mac Or Macbook Or Macode (For Pc Or Ipad) On Your Computer Or Ipa (For Mac) On An Ip
Setup Guide Access Manager 4.0 SP1 May 2014 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE
CA Single Sign-On r12.x (CA SiteMinder) Implementation Proven Professional Exam
CA Single Sign-On r12.x (CA SiteMinder) Implementation Proven Professional Exam (CAT-140) Version 1.4 - PROPRIETARY AND CONFIDENTIAL INFORMATION - These educational materials (hereinafter referred to as
DEPLOYMENT GUIDE Version 2.1. Deploying F5 with Microsoft SharePoint 2010
DEPLOYMENT GUIDE Version 2.1 Deploying F5 with Microsoft SharePoint 2010 Table of Contents Table of Contents Introducing the F5 Deployment Guide for Microsoft SharePoint 2010 Prerequisites and configuration
CA Adapter. Installation and Configuration Guide for Windows. r2.2.9
CA Adapter Installation and Configuration Guide for Windows r2.2.9 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation
BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2. Feature and Technical Overview
BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2 Feature and Technical Overview Published: 2010-06-16 SWDT305802-1108946-0615123042-001 Contents 1 Overview: BlackBerry Enterprise
SOA Software: Troubleshooting Guide for Agents
SOA Software: Troubleshooting Guide for Agents SOA Software Troubleshooting Guide for Agents 1.1 October, 2013 Copyright Copyright 2013 SOA Software, Inc. All rights reserved. Trademarks SOA Software,
User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream
User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner
Configuration Guide. BES12 Cloud
Configuration Guide BES12 Cloud Published: 2016-04-08 SWD-20160408113328879 Contents About this guide... 6 Getting started... 7 Configuring BES12 for the first time...7 Administrator permissions you need
MEGA Web Application Architecture Overview MEGA 2009 SP4
Revised: September 2, 2010 Created: March 31, 2010 Author: Jérôme Horber CONTENTS Summary This document describes the system requirements and possible deployment architectures for MEGA Web Application.
Enabling SSL and Client Certificates on the SAP J2EE Engine
Enabling SSL and Client Certificates on the SAP J2EE Engine Angel Dichev RIG, SAP Labs SAP AG 1 Learning Objectives As a result of this session, you will be able to: Understand the different SAP J2EE Engine
Novell Access Manager
J2EE Agent Guide AUTHORIZED DOCUMENTATION Novell Access Manager 3.1 SP3 February 02, 2011 www.novell.com Novell Access Manager 3.1 SP3 J2EE Agent Guide Legal Notices Novell, Inc., makes no representations
000-284. Easy CramBible Lab DEMO ONLY VERSION 000-284. Test284,IBM WbS.DataPower SOA Appliances, Firmware V3.6.0
Easy CramBible Lab 000-284 Test284,IBM WbS.DataPower SOA Appliances, Firmware V3.6.0 ** Single-user License ** This copy can be only used by yourself for educational purposes Web: http://www.crambible.com/
Authentication and Single Sign On
Contents 1. Introduction 2. Fronter Authentication 2.1 Passwords in Fronter 2.2 Secure Sockets Layer 2.3 Fronter remote authentication 3. External authentication through remote LDAP 3.1 Regular LDAP authentication
redcoal EmailSMS for MS Outlook and Lotus Notes
redcoal EmailSMS for MS Outlook and Lotus Notes Technical Support: [email protected] Or visit http://www.redcoal.com/ All Documents prepared or furnished by redcoal Pty Ltd remains the property of redcoal
Administrator Guide. v 11
Administrator Guide JustSSO is a Single Sign On (SSO) solution specially developed to integrate Google Apps suite to your Directory Service. Product developed by Just Digital v 11 Index Overview... 3 Main
Sophos UTM. Remote Access via PPTP. Configuring UTM and Client
Sophos UTM Remote Access via PPTP Configuring UTM and Client Product version: 9.000 Document date: Friday, January 11, 2013 The specifications and information in this document are subject to change without
NetIQ Identity Manager Setup Guide
NetIQ Identity Manager Setup Guide July 2015 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE
AquaLogic Service Bus
AquaLogic Bus Wolfgang Weigend Principal Systems Engineer BEA Systems 1 What to consider when looking at ESB? Number of planned business access points Reuse across organization Reduced cost of ownership
OnCommand Performance Manager 1.1
OnCommand Performance Manager 1.1 Installation and Setup Guide For Red Hat Enterprise Linux NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501
Securing SAS Web Applications with SiteMinder
Configuration Guide Securing SAS Web Applications with SiteMinder Audience Two application servers that SAS Web applications can run on are IBM WebSphere Application Server and Oracle WebLogic Server.
Ameritas Single Sign-On (SSO) and Enterprise SAML Standard. Architectural Implementation, Patterns and Usage Guidelines
Ameritas Single Sign-On (SSO) and Enterprise SAML Standard Architectural Implementation, Patterns and Usage Guidelines 1 Background and Overview... 3 Scope... 3 Glossary of Terms... 4 Architecture Components...
vcloud Director User's Guide
vcloud Director 5.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of
Application Note. Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder )
Application Note Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder ) This document describes how to configure McAfee Firewall Enterprise to provide
Implementation Guide SAP NetWeaver Identity Management Identity Provider
Implementation Guide SAP NetWeaver Identity Management Identity Provider Target Audience Technology Consultants System Administrators PUBLIC Document version: 1.10 2011-07-18 Document History CAUTION Before
BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2. Administration Guide
BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2 Administration Guide Published: 2010-06-16 SWDT487521-1041691-0616023638-001 Contents 1 Overview: BlackBerry Enterprise
Setting Up Resources in VMware Identity Manager
Setting Up Resources in VMware Identity Manager VMware Identity Manager 2.4 This document supports the version of each product listed and supports all subsequent versions until the document is replaced
SSL VPN Server Guide. Access Manager 3.2 SP2. June 2013
SSL VPN Server Guide Access Manager 3.2 SP2 June 2013 Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE AGREEMENT OR A
Introduction to the EIS Guide
Introduction to the EIS Guide The AirWatch Enterprise Integration Service (EIS) provides organizations the ability to securely integrate with back-end enterprise systems from either the AirWatch SaaS environment
Web Services Implementation: The Beta Phase of EPA Network Nodes
Web Services Implementation: The Beta Phase of EPA Network Nodes Connie Dwyer and Chris Clark U.S. Environmental Protection Agency, 1200 Pennsylvania Avenue, N. W., Washington, D.C. [email protected]
Thales ncipher modules. Version: 1.2. Date: 22 December 2009. Copyright 2009 ncipher Corporation Ltd. All rights reserved.
ncipher modules Integration Guide for IBM Tivoli Access Manager for e-business 6.1 Windows Server 2003 32-bit and 64-bit Windows Server 2008 32-bit and 64-bit Version: 1.2 Date: 22 December 2009 Copyright
Tenrox. Single Sign-On (SSO) Setup Guide. January, 2012. 2012 Tenrox. All rights reserved.
Tenrox Single Sign-On (SSO) Setup Guide January, 2012 2012 Tenrox. All rights reserved. About this Guide This guide provides a high-level technical overview of the Tenrox Single Sign-On (SSO) architecture,
NETASQ MIGRATING FROM V8 TO V9
UTM Firewall version 9 NETASQ MIGRATING FROM V8 TO V9 Document version: 1.1 Reference: naentno_migration-v8-to-v9 INTRODUCTION 3 Upgrading on a production site... 3 Compatibility... 3 Requirements... 4
CA SiteMinder. SAML Affiliate Agent Guide. 6.x QMR 6
CA SiteMinder SAML Affiliate Agent Guide 6.x QMR 6 This documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is
Configuring Digital Certificates
CHAPTER 36 This chapter describes how to configure digital certificates and includes the following sections: Information About Digital Certificates, page 36-1 Licensing Requirements for Digital Certificates,
Configuration Worksheets for Oracle WebCenter Ensemble 10.3
Configuration Worksheets for Oracle WebCenter Ensemble 10.3 This document contains worksheets for installing and configuring Oracle WebCenter Ensemble 10.3. Print this document and use it to gather the
A DEPLOYMENT-READY SOLUTION FOR ADDING QUALITY-OF-SERVICE FEATURES TO WEB SERVICES
A DEPLOYMENT-READY SOLUTION FOR ADDING QUALITY-OF-SERVICE FEATURES TO WEB SERVICES O. Hasan Department of Computer Science, Drexel University, Philadelphia, PA 19104, USA B.W. Char Department of Computer
http://docs.trendmicro.com
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,
Contents at a Glance. 1 Introduction 17. 2 Basic Principles of IT Security 23. 3 Authentication and Authorization in
at a Glance 1 Introduction 17 2 Basic Principles of IT Security 23 3 Authentication and Authorization in SAP NetWeaver Application Server Java 53 4 Single Sign-On 151 5 Identity Provisioning 289 6 Secure
NSi Mobile Installation Guide. Version 6.2
NSi Mobile Installation Guide Version 6.2 Revision History Version Date 1.0 October 2, 2012 2.0 September 18, 2013 2 CONTENTS TABLE OF CONTENTS PREFACE... 5 Purpose of this Document... 5 Version Compatibility...
Web Development. Owen Sacco. ICS2205/ICS2230 Web Intelligence
Web Development Owen Sacco ICS2205/ICS2230 Web Intelligence Brief Course Overview An introduction to Web development Server-side Scripting Web Servers PHP Client-side Scripting HTML & CSS JavaScript &
CA Performance Center
CA Performance Center Single Sign-On User Guide 2.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is
Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment
White Paper Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment Cisco Connected Analytics for Network Deployment (CAND) is Cisco hosted, subscription-based
CA Harvest Software Change Manager
CA Harvest Software Change Manager Implementation Guide Release 12.5 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation
Astaro Security Gateway V8. Remote Access via L2TP over IPSec Configuring ASG and Client
Astaro Security Gateway V8 Remote Access via L2TP over IPSec Configuring ASG and Client 1. Introduction This guide contains complementary information on the Administration Guide and the Online Help. If
CA Identity Manager. Installation Guide (WebLogic) r12.5 SP8
CA Identity Manager Installation Guide (WebLogic) r12.5 SP8 This documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation
Enterprise Security Critical Standards Summary
Enterprise Security Critical Standards Summary The following is a summary of key points in the Orange County Government Board of County Commissioners (OCGBCC) security standards. It is necessary for vendors
Use Enterprise SSO as the Credential Server for Protected Sites
Webthority HOW TO Use Enterprise SSO as the Credential Server for Protected Sites This document describes how to integrate Webthority with Enterprise SSO version 8.0.2 or 8.0.3. Webthority can be configured
RoomWizard Synchronization Software Manual Installation Instructions
2 RoomWizard Synchronization Software Manual Installation Instructions Table of Contents Exchange Server Configuration... 4 RoomWizard Synchronization Software Installation and Configuration... 5 System
How to Install Microsoft Mobile Information Server 2002 Server ActiveSync. Joey Masterson
How to Install Microsoft Mobile Information Server 2002 Server ActiveSync Joey Masterson How to Install Microsoft Mobile Information Server 2002 Server ActiveSync Joey Masterson Copyright Information
Installation and Configuration Guide
Entrust Managed Services PKI Auto-enrollment Server 7.0 Installation and Configuration Guide Document issue: 1.0 Date of Issue: July 2009 Copyright 2009 Entrust. All rights reserved. Entrust is a trademark
Configuration Guide BES12. Version 12.2
Configuration Guide BES12 Version 12.2 Published: 2015-07-07 SWD-20150630131852557 Contents About this guide... 8 Getting started... 9 Administrator permissions you need to configure BES12... 9 Obtaining
Installing Management Applications on VNX for File
EMC VNX Series Release 8.1 Installing Management Applications on VNX for File P/N 300-015-111 Rev 01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com Copyright
HP Device Manager 4.6
Technical white paper HP Device Manager 4.6 Installation and Update Guide Table of contents Overview... 3 HPDM Server preparation... 3 FTP server configuration... 3 Windows Firewall settings... 3 Firewall
F-Secure Messaging Security Gateway. Deployment Guide
F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4
administrator are Console Users that can log on to the Web Management console and
Q and A Can I control what ObserveIT records? Yes, within the Web Console it is possible to define what the Agent records. By using inclusion or exclusion, you can control many aspects of the recording
Apigee Gateway Specifications
Apigee Gateway Specifications Logging and Auditing Data Selection Request/response messages HTTP headers Simple Object Access Protocol (SOAP) headers Custom fragment selection via XPath Data Handling Encryption
IDENTIKEY Server Windows Installation Guide 3.2
IDENTIKEY Server Windows Installation Guide 3.2 Disclaimer of Warranties and Limitations of Liabilities Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis,
SSL VPN Portal Options
1. ProSecure UTM Quick Start Guide This quick start guide describes how to use the SSL VPN Wizard to configure SSL VPN portals on the ProSecure Unified Threat Management (UTM) Appliance. The Secure Sockets
A Survey Study on Monitoring Service for Grid
A Survey Study on Monitoring Service for Grid Erkang You [email protected] ABSTRACT Grid is a distributed system that integrates heterogeneous systems into a single transparent computer, aiming to provide
Filr 2.0 Administration Guide. April 2016
Filr 2.0 Administration Guide April 2016 Legal Notice For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions, U.S. Government rights, patent policy,
Network Security Fundamentals
APNIC elearning: Network Security Fundamentals 27 November 2013 04:30 pm Brisbane Time (GMT+10) Introduction Presenter Sheryl Hermoso Training Officer [email protected] Specialties: Network Security IPv6
Replacements TECHNICAL REFERENCE. DTCCSOLUTIONS Dec 2009. Copyright 2009 Depository Trust Clearing Corporation. All Rights Reserved.
TECHNICAL REFERENCE Replacements Page 1 Table of Contents Table of Contents 1 Overview... 3 1.1 Replacements Features... 3 2 Roles and Responsibilities... 4 2.1 Sender (Receiving Carrier)... 4 2.2 Recipient
9236245 Issue 2EN. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation
9236245 Issue 2EN Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation Nokia 9300 Configuring connection settings Legal Notice Copyright Nokia 2005. All rights reserved. Reproduction,
This Working Paper provides an introduction to the web services security standards.
International Civil Aviation Organization ATNICG WG/8-WP/12 AERONAUTICAL TELECOMMUNICATION NETWORK IMPLEMENTATION COORDINATION GROUP EIGHTH WORKING GROUP MEETING (ATNICG WG/8) Christchurch New Zealand
CA SOA Security Manager
CA SOA Security Manager Implementation Guide r12.1 Second Edition This documentation and any related computer software help programs (hereinafter referred to as the "Documentation") are for your informational
DEPLOYMENT GUIDE Version 1.2. Deploying the BIG-IP System v10 with Microsoft IIS 7.0 and 7.5
DEPLOYMENT GUIDE Version 1.2 Deploying the BIG-IP System v10 with Microsoft IIS 7.0 and 7.5 Table of Contents Table of Contents Deploying the BIG-IP system v10 with Microsoft IIS Prerequisites and configuration
APNIC elearning: Network Security Fundamentals. 20 March 2013 10:30 pm Brisbane Time (GMT+10)
APNIC elearning: Network Security Fundamentals 20 March 2013 10:30 pm Brisbane Time (GMT+10) Introduction Presenter/s Nurul Islam Roman Senior Training Specialist [email protected] Specialties: Routing &
Executive summary. Table of Contents. Benefits of an integration platform. Technical paper Infor Cloverleaf Integration Suite
Technical paper Infor Cloverleaf Integration Suite Executive summary Many hospitals struggle with managing the increasing amounts of information coming from multiple data sources. Not only can it be difficult
Customer Tips. Basic E-mail Configuration and Troubleshooting. for the user. Overview. Basic Configuration. Xerox Multifunction Devices.
Xerox Multifunction Devices Customer Tips November 24, 2003 This document applies to these Xerox products: x WC Pro 32/40 Color x WC Pro 65/75/90 x WC Pro 35/45/55 WC M35/M45/M55 x DC 555/545/535 x DC
Using LDAP Authentication in a PowerCenter Domain
Using LDAP Authentication in a PowerCenter Domain 2008 Informatica Corporation Overview LDAP user accounts can access PowerCenter applications. To provide LDAP user accounts access to the PowerCenter applications,
FEATURE COMPARISON BETWEEN WINDOWS SERVER UPDATE SERVICES AND SHAVLIK HFNETCHKPRO
FEATURE COMPARISON BETWEEN WINDOWS SERVER UPDATE SERVICES AND SHAVLIK HFNETCHKPRO Copyright 2005 Shavlik Technologies. All rights reserved. No part of this document may be reproduced or retransmitted in
www.novell.com/documentation SSL VPN Server Guide Access Manager 3.1 SP5 January 2013
www.novell.com/documentation SSL VPN Server Guide Access Manager 3.1 SP5 January 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this documentation,
CA SiteMinder Secure Proxy Server
CA SiteMinder Secure Proxy Server Administration Guide 12.52 SP1 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation
What's New in BlackBerry Enterprise Server 5.0 SP4 for Novell GroupWise
What's New in BlackBerry Enterprise Server 5.0 SP4 for Novell GroupWise Upgrade paths Enhancements to the setup application Administrators can upgrade to BlackBerry Enterprise Server 5.0 SP4 for Novell
Configuration Guide BES12. Version 12.3
Configuration Guide BES12 Version 12.3 Published: 2016-01-19 SWD-20160119132230232 Contents About this guide... 7 Getting started... 8 Configuring BES12 for the first time...8 Configuration tasks for managing
A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.
A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules. Firewalls can be categorized by their location on the network: A network-based
Enhanced Connector Applications SupportPac VP01 for IBM WebSphere Business Events 3.0.0
Enhanced Connector Applications SupportPac VP01 for IBM WebSphere Business Events 3.0.0 Third edition (May 2012). Copyright International Business Machines Corporation 2012. US Government Users Restricted
PrinterOn Enterprise Administration Support Guide
PrinterOn Enterprise Administration Support Guide Version 2.5 Doc Rev: 1.1 Table of Contents 1. Overview...4 2. Hardware and Operating System Requirements...5 2.1. Hardware Requirements...5 2.2. Software
www.novell.com/documentation Jobs Guide Identity Manager 4.0.1 February 10, 2012
www.novell.com/documentation Jobs Guide Identity Manager 4.0.1 February 10, 2012 Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use of this documentation,
IBM Campaign and IBM Silverpop Engage Version 1 Release 2 August 31, 2015. Integration Guide IBM
IBM Campaign and IBM Silverpop Engage Version 1 Release 2 August 31, 2015 Integration Guide IBM Note Before using this information and the product it supports, read the information in Notices on page 93.
Single Sign On. Configuration Checklist for Single Sign On CHAPTER
CHAPTER 39 The single sign on feature allows end users to log into a Windows client machine on a Windows domain, then use certain Cisco Unified Communications Manager applications without signing on again.
