for Financial Messages using Web Services
|
|
|
- Lindsey Walters
- 10 years ago
- Views:
Transcription
1 Copyright 2008 All rights reserved Security and Message Specification for Financial Messages using Web Services Published - Version.05 Security and Message Specification (46) Security and Message Specification for Financial Messages using Web Services Version
2 All rights reserved 2(46) TABLE OF CONTENTS VERSION HISTORY INTRODUCTION Background The new Web Services Channel Security Requirements SECURITY SPECIFICATION Usage Scenarios Message Lifecycle Example Message Generation Steps Simplified Description Message Lifecycle Diagram Security Infrastructure Role Specification Levels of Security Level Business Authentication Level 2 Communication Authentication SOAP Message and Content Structure Optional Content Encryption Keys and Certificates Introduction Types of Keys and Certificates Private Keys Public Keys Root Certificates Cryptographic Algorithms and Key Lengths Standards Used and Limitations Nonrepudiation Transport Security Performance Issues Limitations Terminology Requirements Outside This Specification Recommended Reading MESSAGE SPECIFICATION General Information Operations UploadFile DownloadFileList DownloadFile DeleteFile ConfirmFile GetUserInfo GetFileDetails WSDL XML Schemas ApplicationRequest ApplicationResponse Using RequestHeader and ResponseHeader Elements Field by Field RequestHeader Sender Identification <SenderId> RequestId <RequestId> Timestamp <Timestamp> Language <Language> UserAgent <UserAgent> ReceiverId <ReceiverId> ResponseHeader...29
3 All rights reserved 3(46) SenderId <SenderId> RequestId <RequestId> Timestamp <Timestamp> ResponseCode <ResponseCode> ResponseText <ResponseText> ReceiverId <ReceiverId> Using ApplicationRequest and ApplicationResponse Elements Field by Field ApplicationRequest CustomerId <CustomerId> Command <Command> Timestamp <Timestamp> StartDate <StartDate> EndDate <EndDate> Status <Status> ServiceId <ServiceId> EnvironmentId <EnvironmentId> FileReference <FileReference> UserFileName <UserFileName> TargetId <TargetId> ExecutionSerial <ExecutionSerial> Encryption <Encryption> EncryptionMethod <EncryptionMethod> Compression <Compression> CompressionMethod <CompressionMethod> AmountTotal <AmountTotal> TransactionCount <TransactionCount> SoftwareId <SoftwareId> CustomerExtension <CustomerExtension> FileType <FileType> Content <Content> (the content in the UploadFile) Signature <Signature> (the digital signature for the ApplicationRequest) ApplicationResponse CustomerId <CustomerId> Timestamp <Timestamp> ResponseCode <ResponseCode> ResponseText <ResposeText> ExecutionSerial <ExecutionSerial> Encrypted <Encrypted> EncryptionMethod <EncryptionMethod> Compressed <Compressed> CompressionMethod <CompressionMethod> AmountTotal <AmountTotal> TransactionCount <TransactionCount> CustomerExtension <CustomerExtension> FileDescriptors<FileDescriptors> (in response to DownloadFileList) FileDescriptor <FileDescriptor> FileReference <FileReference> TargetId <TargetId> ServiceId <ServiceId> ServiceIdOwnerName <ServiceIdOwnerName> UserFileName <UserFileName> ParentFileReference <ParentFileReference> FileType <FileType> FileTimestamp <FileTimestamp> Status <Status> AmountTotal <AmountTotal>...39
4 All rights reserved 4(46) TransactionCount <TransactionCount> LastDownloadTimestamp <LastDownloadTimestamp> ForwardedTimestamp <ForwardedTimestamp> Confirmable <Confirmable> Deletable <Deletable> SubStatusCode <SubStatusCode> SubStatusText <SubStatUsText> MissingTransactions <MissingTransactions> SubType <SubType> FeedbackFileAttributes <FeedbackFileAttributes> FeedbackFileReference <FeedbackFileReference> FeedbackFileType < FeedbackFileType> FeedbackFileTypeName <FeedbackTypeName> FeedbackFileStatus <FeedbackFileStatus> FeedbackFileDate <FeedbackFileDate> FeedbackTimestamp <FeedTimestamp> FeedbackServiceId <FeedbackFileServiceId> FileActionHistory <FileActioHistory> UserFileTypes <UserFileTypes> (in response to GetUserInfo) TargetId <TargetId> FileType <FileType> FileTypeName <FileTypeName> Country <Country> Direction <Direction> FileTypeServices <FileTypeServices> FileTypeService <FileTypeService> ServiceId <ServiceId> ServiceIdOwnerName <ServiceIdOwnerName> ServiceIdType <ServiceIdType> ServiceIdText <ServiceIdText> Content <Content> (response to DownloadFile) Signature <Signature> (digital signature of the ApplicationResponse) Sample Messages and Application Requests Request SOAP Message Response SOAP Message UploadFile ApplicationRequest...46
5 All rights reserved 5(46) VERSION HISTORY 2 INTRODUCTION Version Date Description of changes Status of document Added simplified client side process Preliminary description Detailing work. Schema pictures added. Preliminary XML examples corrected to comply with schema. November 2007 Circulated to banks for comments through Federation of Finnish Financial Services (Finanssialan Keskusliitto) Finalised to draft status. Draft Published. Published Updated copyright notice. Published Added ResponseCodes 3 and 32 for duplicate rejection reporting UserFileTypes.Country changed from ISO-366- alpha 2 to alpha 3; modified examples; corrected typographical errors Added cryptographic algorithms; new message samples; removed SSL arrows from use case diagram. Draft update Draft update Draft update Published. Published This document is the security and message specificiation for a new Web Services technology based standardised solution to be used for automated communications between banks and corporate customers. This document is controlled and maintained by Nordea, OP-Pohjola Group and Sampo Bank. This document can be utilised for implementations freely and without royalties. The latest version of this document is available from each of the aforementioned banks and in addition from Federation of Finnish Financial Services (Finanssialan Keskusliitto). This document describes the security solutions for this Web Services channel. This document is one of a set of documents. The documents are:. Web Services Security and Message Specification. 2. Web Services Description Language (BankCorporateFileService.wsdl). 3. ApplicationRequest XML Schema. 4. ApplicationResponse XML Schema. Banks will publish independently the following bank specific documentation:
6 All rights reserved 6(46) 2. Background. PKI specification, especially the method of certificate delivery to customers. 2. Test services for customers. 3. List of supported data formats, file types, operations and services. 4. Bank specific instructions on the usage of message elements not covered in this common Security and Message Specification document. Bank customers have used bank specific or nationally standardised connectivity and security solutions to send computer generated financial data, e.g. payments, to their banks. Web Services was chosen as the technology for the next generation connectivity solution for automated machine-to-machine communication between banks and corporate customers. This new solution is based on international standards to enable implementation with modern software development tools and to encourage ERP and financial software vendors to implement client side adapters and communication solutions. 2.2 The new Web Services Channel Security Requirements The security solution of the new Web Services channel security has to fulfill the following requirements. Be based on international standards thus enabling implementations with modern software development tools and encourage domestic and international software vendors to provide off-the-shelf adapters and software solutions. Allow each bank to choose the certificate issuing authorities they trust (CA Certificate Authority). Use cryptographic algorithms and key lengths to allow at least a 20 year life cycle with security robust enough for financial transactions. Separate communication security from business data security to allow for the bank clients to outsource data generation and/or Web Services communications to separate external entities. Communication security limited to point-to-point connections between the bank and the communicating customer, be it the end customer or a service center or other intermediary. This means that end-to-end encryption and Web Services message level encryption are not required since SSL or VPN provide transport security. An optional XML Encryption mechanism for data content will be specified, but this encryption mechanism is not part of the Web Services layer of the services and is not based on Web Services Standards. XML Encryption is an XML standard and is used here for data protection, not Web Services message protection. XML Encryption and Decryption is performed by
7 All rights reserved 7(46) business applications at both ends, not by the Web Services client and server applications.
8 All rights reserved 8(46) 3 SECURITY SPECIFICATION 3. Usage Scenarios This chapter contains the security specification of the Web Services channel. The diagrams that follow help to visualise the message structure and the different levels of authentication and security. Let us begin with the four basic usage scenarios. Bank Customer s software Bank Customer s software Bank Customer s software Bank Customer s software Operation/Data XXX SOAP Operation/Data SOAP Operation/Data Service center Service center Service center SOAP Operation/Data SOAP Operation/Data SOAP Operation/Data https SSL https SSL https SSL https SSL Bank Web Services Server Bank Web Services Server Bank Web Services Server Bank Web Services Server This arrow depicts the owner of the private key used for signing The arrows in this diagram depict where the keys for digital signing and SSL encryption reside. The first scenario shows the simplest setup where the Customer performs all the steps necessary: creates and signs the data content (payload),
9 All rights reserved 9(46) 3.2 Message Lifecycle Example creates and signs the SOAP message, sends the SOAP message over HTTPS. In the second scenario the Customer creates and signs the payload, but has outsourced the Web Services layer to another party or the Customer's internal service center. Thus the key used to sign the payload reside with the Customer, but the Sender key and SSL key are in the Service center. The third scenario is a variation of the second one. The difference is that the Customer software does not create content in the format required by the channel. Thus the customer software cannot sign the payload and the key used for payload signing has to reside in the Service center. In the fourth scenario the Customer generates and signs both the payload and the SOAP message. The Customer has outsourced only the HTTPS connection Message Generation Steps Simplified Description If you think this of the process at a corporate customer who is sending payment file to the bank, the steps would be as follows:. Create (ascii) payment file in corporate legacy. This is called the "Payload". 2. Perform Base64 -coding to the Payload. 3. Create a XML file called "Application Request", having elements such as Content and Signature ("command=uploadfile"). 4. Put the Base64-coded Payload into Content element of the "Application Request". 5. Digitally sign (Enveloped -type) the whole "Application Request" with the Private Key of the Signing Certificate. 6. Perform Base64-coding to the signed Application Request. 7. Create a SOAP message for "Upload File" Use Case based on the WSDL. 8. Insert Signed and Base64-coded Application Request into SOAP message Body part. 9. Digitally sign (detached type XML Digital Signature) the whole SOAP message with the Private Key of Sender Certificate and put the signature into SOAP-header This step is usually performed by the SOAP software based on a security configuration. 0. Send the SOAP request and wait for a response. The steps from to 5 can be done in corporate legacy department and steps 6-0 will be done in corporate data communication department after receiving the signed Application Request.
10 All rights reserved 0(46) Message Lifecycle Diagram The next diagram shows how the roles evident in the four basic scenarios interact in a service "Upload". The Customer Legacy system generates a unit of data. This could be for example a batch of payments. The Customer side XML Processor transform the legacy data to a format acceptable to the bank, e.g. SEPA C2B Credit Transfer Initiation XML document. The transformed content is signed next with the Customer's private key. The XML Processor can optionally encrypt and compress the content. Please note an important point: the original Content is signed first, and only then it can be encrypted or compressed. Only after this point does the process enter the Web Services domain. The Customer side Web Services Client received the content next. It gnerates the Content Header which contains information related to the delivery of this Content, e.g. user ids, timestamps. The Web Services Client generates the SOAP Message, which contains the Content, Content Header. Then the Web Services Client applies security operations to the SOAP message, in practice this means signing the SOAP Message with the Sender private key. The SOAP Message is then delivered to the bank's Web Services Server over secure HTTP (SSL or VPN protected). The receiving Web Services Server authenticates and validates the SOAP Message. This means identifying the Sender and checking the SOAP Message signature to verify the identification and the integrity of SOAP Message. This ends the Web Services part of the process. The Content is extracted from the SOAP Message and passed to the Bank XML Processor. If the Content was compressed and/or encrypted, it is decompressed and decrypted by the Bank XML Processor. Then the Content is authenticated and validated. Authentication consists of identifying the Customer that generated the Content, verifying this identity against the Content signature(s) and verifying the integrity of the Content with the signature(s). The protocol provides for up to three Content Signatures (Data Generator, Verifier and Acceptor). The number of signatures depends on the type of Content and the business contract between bank and Customer. The Content signatures are Enveloped type, as opposed to Detached signatures used in the SOAP layer.
11 All rights reserved (46) Validation of the content means checking it against an appropriate business content XML Schema. The Enveloped signatures have to be removed from the Content before performing Schema validation. If the Content passed the checks described in the previous paragraph, the Bank XML Processor transforms the data to a format understood by the Bank Business Application. The transformed data is then passed to the Bank Business Application for processing. After passing the Data to be processed the Bank XML Processor generates an acknowledgment message that is passed back to the Customer Legacy through all the layers. The processing of the Data is performed asynchronously. The Customer Legacy system has to have a mechanism to request for an application level response after an appropriate delay, e.g. two hours later. This request for application level response is shown in simplified form in this diagram. In practice it goes through the same processing as the request message. This type of communication could be called Request with Acknowledgment. The immediate reply from the receiver is in the context of the delivery: message integrity, identification, authentication, content validation etc. The application level processing of the data is not performed during the HTTP connection so the application level response has to be fetched separately. This does not preclude introducing new real time services in the future, where the Data is processed during the HTTP connection and the acknowledgment will thus be an application level response. The Response Message sent by the Bank to the Sender contains symmetrically the same two signatures (SOAP Signature and Content Signature) as the Request Message. But in the Response Message these two signatures are made with the Bank's Private Key and are used by the Sender and Customer to verify the authenticity and integrity of the Response Message.
12 All rights reserved 2(46) Customer: Legacy Customer: XML Processor Sender: Web Services Client Bank: Web Services Server Bank: XML Processor Bank: Business Application Generate Legacy Data Send Legacy Data Transform to XML, create ApplicationRequest and Sign (Compress and/or Encrypt ApplicationRequest) Send ApplicationRequest Create RequestHeader Create and Sign SOAP Message Send SOAP Message Authenticate and Validate SOAP Message Send ApplicationRequest (Decrypt and/or Decompress ApplicationRequest) Validate and Authenticate ApplicationRequest, Convert XML to Legacy Send Legacy Data Ack Reception of Data Ack Ack Process Data Ack Request Status Report (simplified depiction) Provide Status Report (simplified depiction)
13 All rights reserved 3(46) 3.3 Security Infrastructure 3.4 Role Specification 3.5 Levels of Security The Web Services channel security and authentication is based on a PKI Public Key Infrastructure. Each bank can specify which Certificate Authorities they trust and thus which Certificates they accept. The message protocol allows for both server installed "soft" certificates and personal, card based "hard" certificates. The card based certificates require a physical reader terminal and the user has to enter a PIN number every the time certificate is used. The Web Services solution has two distinct client side roles:. Customer this is the business customer of the bank, the party generating and processing business data to be exchanged with the bank. The Customer role can further be divided into three roles: a. Data Generator. b. Data Verifier. c. Data Acceptor Level Business Authentication These three roles can be used only when they are required by the business contract between the bank and the Customer. Usually only one signature is required. 2. Sender this is the intermediator handling the actual Web Services communications with the bank. The Customer can act in this role or this role can be outsourced to a third party. The security is handled at two distinctly different levels business data and communications. This reflects the two roles Cutomer and Sender. Separating these two levels allows using the business data security mechanisms for data delivered through different types of channels, e.g. Web Services, ftps or proprietary delivery systems. The business payload contained in the Web Services message is authenticated for business purposes. As the business payload contains sensitive data, e.g. instructions for money transfers, this authentication is essential for establishing the authority to perform the requested operation, e.g. access bank accounts.
14 All rights reserved 4(46) From a pure business perspective this level of authentication is sufficient. There is no business need to authenticate the communicating party, because the business payload in itself is authenticated Level 2 Communication Authentication The second level of security is for communication and other technical purposes. One of the major reasons for authenticating the communicating party is to prevent Denial-of-Service attacks. If the other party is authenticated early in the transaction, fraudulent parties can be blocked out without too much processing strain on the bank servers. The bank business applications will thus be shielded from malicious content that would result in unnecessary processing. 3.6 SOAP Message and Content Structure The SOAP message and data content structure is described in more detail in another document: Web Services Message Structure. This document contains just a brief overview. This diagram shows the high level structure of the SOAP message, with emphasis on the security elements.
15 All rights reserved 5(46) soapenv:envelope soapenv:header soapenv:body wsse:security RequestHeader (ResponseHeader) ApplicationRequest (ApplicationResponse) wsse:binarysecuritytoken dsig:signature wsu_timestamp Signature..* 0.. Content X509v3 in Base64 format SignedInfo SignatureValue KeyInfo dsig:signedinfo dsig:signaturevalue dsig:keyinfo X509Data X509v3 in Base64 format..* dsig:reference The root element is the SOAP Envelope. The SOAP Envelope consists of the SOAP Header and the SOAP Body. The SOAP Header contains only elements added by the Web Services Stack based on a Security Configuration. The SOAP Body is divided into a RequestHeader and an ApplicationRequest. ApplicationRequest may contain the element Content, which is the actual Data to be transmitted this data is always in Base64 format and thus can be any type of data. RequestHeader contains information pertaining to the transfer of the operation request or data, e.g. SenderId, timestamp, language code. This header is built by the Sender. The ApplicationRequest contains information related to the operation itself or the transmitted data. This header is built and signed by the Customer. In operations where the request does not contain any data, the operation is authenticated and authorised by the Customer signature of the ApplicationRequest.
16 All rights reserved 6(46) The Web Services operations are defined in the WSDL. If the structure of the messages is updated, there will be a new WSDL. The ApplicationRequest can contain one, two or three XML Digital Signatures. These are used to authenticate the operation request or data and ensure its integrity. The three signatures correspond to the Customer roles Data Generator, Data Verifier, Data Acceptor (in Finnish: tekijä, tarkastaja, hyväksyjä). The XML signature mechanism used in Content signing is called Enveloped Signature the signatures are placed inside the ApplicationRequest element which is the object of the signature. This is in contrast to the SOAP Message signature, which is placed in the SOAP Header and contains a reference to the SOAP Body. This signature mechanism is called Detached Signature. The XML Digital Signature contained in the SOAP Header signs the whole SOAP Body element, thus authenticating the message and ensuring its integrity. The layering of data in the SOAP Message is shown in the following diagram. Please note that the SOAP layers are optional the authentication mechanisms for the data can be used even withouth SOAP or Web Services, e.g. if the data is delivered with ftps or some other delivery method. SOAP Message (optional) SOAP Envelope (optional) SOAP Header (optional) SOAP Body (optional) Transmitted Data RequestHeader XML Encryption (optional) Compression (optional) Authenticated Data XML Digital Signature ApplicationRequest/ApplicationResponse XML Data [Content] Legacy Data (optional)
17 All rights reserved 7(46) 3.7 Optional Content Encryption The Content can optionally be encrypted. The encryption mechanism used is XML Encryption. Please note that this encryption mechanism is not part of Web Services. The Web Services level security is provided at transport level by SSL or VPN. XML Encryption is performed with a symmetric algorithm. The encryption is done with a generated, one time symmetric key. This symmetric key is encrypted with the receiver's public key and the resulting encrypted symmetric key is attached to the encrypted data. The receiver first decrypts the symmetric key with its private key. Then it uses the decrypted symmetric key to decrypt the actual data content. This process is visualised in the following diagram.
18 All rights reserved 8(46) Data Generate One-Time Key Symmetric Key Encrypt Receiver s Public Key Encrypt Transported Unit Encrypted Symmetric Key Encrypted Data Receiver s Private Key Decrypt Decrypted Symmetric Key Decrypt Data The three potential encryption domains are visualised in the following diagram. Transport Security applies only to the delivery which is performed between two communications servers. SOAP Message Security applies only to the Web Services domain. This is closely related to the Transport domain and is thus considered redundant in this service. Business Payload Security is applied from one business application to another business application. This security is useful because it works the same regardless of the delivery method. This is the optional XML Encryption specified in this document. Please note that it is not dependent on Web Services. Also note that Business Payload encryption means that Web Services and lower transport layers do not have any access to the contents of the Business Payload.
19 All rights reserved 9(46) Customer Bank Legacy XML Processor Web Services Comm Server Comm Server Web Services XML Processor Business Application Transport Security (SSL, TSL, VPN) SOAP Message Security (SOAP Encryption) [not used] Business Payload Security (XML Encryption) 3.8 Keys and Certificates 3.8. Introduction The Content, i.e the actual business data, the payload and its header fields, is signed with a private key. This key is called the Customer Key. This signature is used to authenticate the bank business Customer and ensure integrity of the Content (i.e. the Content has not been modified after it has been signed). The SOAP message is signed with another private key, the Sender Key. This signature is used to authenticate the Sender and ensure integrity of the message. The HTTP SSL connection is established with its own keys which are separate from the Customer Key and Sender Key. The Customer and Sender keys can be the same key if the Customer does not outsource parts of the process. It is essential that all three keys can be different so the business process and communications security issues are decoupled. This means for example the possibility for customers to outsource the generation and delivery of SOAP Messages to a third party but retain the data generation in-house. Please note that the signatures are used for two logically separate purposes:. To authenticate the party which generated the signed data. 2. To ensure that the signed data has not been modified in transit.
20 All rights reserved 20(46) 3.9 Types of Keys and Certificates 3.9. Private Keys Public Keys Root Certificates The signing of the Content can be performed in the business application which generates the Content. This signing can happen long before the SOAP Envelope is generated and in a different environment. The signing of the SOAP Message that is placed in the SOAP Header is performed in the Web Services Client or Server application at the time the SOAP Message is generated. Each party has in its possession three types of keys. Some of these key are delivered to the parties as certificates (X.509v3) either beforehand or in a received SOAP Message. Private keys are used for signing and decryption. Private keys have to protected against unauthorised and protected against unauthorised modifications. Private keys are strictly not to be shared with anyone. Private keys have to be stored very securily, since in wrong hands they can be used to sign fraudulent Content. Public keys are used for verifying signatures and performing encryption. Public keys have to be protected against unauthorised modifications. Each party already has in its possession or receives in a SOAP message the public key(s) of the other party. When the key(s) are delivered in a SOAP message, they are in X.509v3 certificate format. Root certificates are used to verify and authenticate the certificates containing public keys of other parties. Root certificates are issued by trusted Certificate Authorities. The banks have the authority to decide which Certificate Authorities they trust, in effect deciding which certificates are accepted by the bank. Root certificates have be extremely protected against unauthorised modifications. By changing a root certificate fraudulently a malicious party could make the security mechanism trust false certificates. 3.0 Cryptographic Algorithms and Key Lengths The hash algorithm used in XML Digital Signatures is SHA.
21 All rights reserved 2(46) 3. Standards Used and Limitations The cryptographic algorithm used in XML Digital Signatures is RSA. Key lengths are determined by the certificates used for signing and are thus bank specific. The solution is based on the following Web Services standards: WS-I Basic Profile. WS-I Basic Security Profile.0 WS Security X.509v3 Certificate Token, OASIS Standard WS Security SOAP./.2 WSDL. HTTPS. SSL 2.0 (TSL.0) 3.2 Nonrepudiation 3.3 Transport Security 3.4 Performance Issues WS Reliability Standards are not used, as they are not mature enough, they do not have WS Interoperability Status and they would make the solution unnecessarily complex. Additionally, no communication method is reliable enough to be trusted for banking use without application level verification of message delivery. The nonrepudiation chain has to be unbroken. To be expanded (an explanation of how nonrepudiation is achieved). Transport security can be provided by SSL 3.0 protocol or VPN. Other transport protocol can also be used, but they are out of scope of this specification and are left to be agreed upon by the bank and its customers. Web Services Encryption uses asymmetric, CPU intensive algorithms and thus encryption of the whole SOAP message is not feasible, as this service has to support high volume traffic. If symmetric encyption were to be used, there would still be another problem: it would require a mechanism for exchanging symmetric keys between the parties. Another reason for not using SOAP Encryption is that it is applied almost at the same time and almost in the same place as SSL or VPN encryption and is thus pretty much redundant. There is no sense in encrypting only parts of the SOAP message as the whole Content is considered sensitive.
22 All rights reserved 22(46) 3.5 Limitations 3.6 Terminology Protection from third party access is provided by SSL/TLS or VPN protected HTTP connection used between the customer and the bank. SSL uses symmetric encryption which is less CPU intensive than asymmetric PKI encryption. The Content can be protected at application level using symmetric XML Encrpytion. Please note that this encryption is not a concern of the Web Services layer. XML Encryption of the Content is provided as an option for those Customers who want to protect the Content while moving it in their internal or partner networks. This encryption is based on XML Encryption standard. The encryption is done with a symmetric algorithm and the symmetric key is sent along with the encrypted data, the symmetric key itself being asymmetrically encrypted with the recipient's public key. Business Application CA Certificate Authority Certificate Content ContentHeader Customer Data Intermediary Legacy PKI a software application which does not necessarily support XML and Content security mechanisms specified for this Web Services channel; ; in this document this term is used mainly on the Bank side see Certificate Authority an organisation which authenticates certificates of other parties by signing them with the CA's private key a file containing a public key with administrative information and signed by a Certificate Authority (with the Certificate Authority's private key) bank service data in a format specified by this Web Services channel, e.g. Base64 encoded XML document; also contains signature(s) of the content (Enveloped Signature) an XML element containing information related to a bank service request, e.g. Customer userid, Timestamp, Data encoding. bank business customer that creates and receives bank service data; has an agreement with a bank to use certain bank services bank service data in a native or legacy format, e.g. LMP or LUM party that handles bank service request on behalf of a Customer; a future option, not used in this version of the specifications a software application which does not necessarily support XML and Content security mechanisms specified for this Web Services channel; in this document this term is used mainly on the Customer side see Private Key Infrastructure Private Key Infrastructure an infrastructure where parties use private and public keys to perform encryption, decryption, signing using asymmetric algorithms
23 All rights reserved 23(46) Private Key a PKI asymmetric key which is kept secret Public Key a PKI asymmetric key which can be published to other parties Sender party that communicates with a bank using this Web Services channel; has an agreement with a bank to use the Web Services channel Web Services Client the client (Customer) side Web Services application that posts Web Services service requests to a bank Web Services Server the server (Bank) side Web Services application that received and processes Web Services service requests from Customers WS Interoperability a guideline that specifies how to apply and implement different WS standards; applications built according to WS Interoperability rules can cooperate because they are implemented the same way WSDL an XML document describing a set of Web Services services, their operations and parameters X.509 an XML document schema for a certificate XML Encryption a standard for encryptin XML documents XML Processor a software application that handles data transformations between Legacy and XML (Data and Content) and security operations related to the Content 3.7 Requirements Outside This Specification 3.8 Recommended Reading The generation, distribution, administration and use of PKI key pairs and certificates is outside the scope of this specification. Bishop, Matt. Computer Security Art and Science. Addison Wesley ISBN Cauldwell Patrick etc. Professional XML Web Services. Wrox Press 200. ISBN Panko, Raymond R. Corporate Computer and Network Security. Prentice Hall ISBN Web Services Interoperability WS-I
24 All rights reserved 24(46) 4 MESSAGE SPECIFICATION 4. General Information 4.2 Operations 4.2. UploadFile DownloadFileList DownloadFile DeleteFile ConfirmFile GetUserInfo Every SOAP message contains the operation and data, parameters and filters in an XML element called ApplicationRequest or ApplicationResponse. Every ApplicationRequest element must be signed by the customer and this signature is of type XML Signature Enveloped and thus is contained within the ApplicationRequest element itself. This signature is used by the bank to authenticate the operation and to verify the integrity of the operation request and data. Every ApplicationResponse element is signed by the bank and this signature is of type XML Signature Enveloped and thus is contained within the ApplicationResponse element itself. This signature is used by the customer to authenticate the response and to verify the integrity of the response and data. Used to upload data to the bank. One file per message. Used to get a list of files in the bank both files uploaded by the customer and files waiting to be downloaded by the customer. Used to download one file from the bank. This operation requires that the customer has used the DownloadFileList operation or other means to obtain the unique file reference. This file reference is used to identify the exact file to be downloaded. Delete a file. Can be used for example to cancel a file uploaded by the customer, but only if the file has not been processed yet. If the file is already forwarded to processing, it cannot be deleted anymore, i.e. the bank system will refuse to delete it. Used to get information on file types which are accessible to the user.
25 All rights reserved 25(46) GetFileDetails 4.3 WSDL 4.4 XML Schemas Used to get detailed information on an individual file. WSDL file is provided separately. XML schema files are provided separately. This section contains graphical representations of the two XML schemas.
26 All rights reserved 26(46) 4.4. ApplicationRequest
27 All rights reserved 27(46) ApplicationResponse
28 All rights reserved 28(46) 4.5 Using RequestHeader and ResponseHeader Elements Field by Field 4.5. RequestHeader Sender Identification <SenderId> Presence: [..] Definition: The unique identification of the sender of this request message. The message sender can be a 3 rd party service bureau. This indentification is issued and managed by the receiver of this message (the bank). The SenderId identity is authenticated by the digital signature in the SOAP Header. Data Type: Max35Text RequestId <RequestId> Presence: [..] Definition: The unique identification for this request. Data Type: Max35Text Rule: This unique ID is copied to the response header. This value must be unique for three months Timestamp <Timestamp> Presence: [..] Definition: Time and date when the request was sent. Data Type: ISODateTime, if no time zone specified, UTC time zone assumed Language <Language> Definition: Language attribute. Used to request language version for certain information in display (human readable) format. Data Type: Max6Text If Code, one of the following codes must be used: Code EN SV FI Name Enlish Swedish Finnish UserAgent <UserAgent> Presence: [..] Definition: The name and version of the software which was used to send this request. Data Type: Max35Text ReceiverId <ReceiverId> Presence: [..] Definition: Identification of the receiver of this request message Data Type: BIC for the bank
29 All rights reserved 29(46) ResponseHeader SenderId <SenderId> Presence: [..] Definition: The unique identification of the sender of the original request message for this response (the receiver of this response). Data Type: Max35Text RequestId <RequestId> Presence: [..] Definition: The unique identification copied from the original request for this response. Data Type: Max35Text Timestamp <Timestamp> Presence: [..] Definition: Time and date when the response was sent. Data Type: ISODateTime ResponseCode <ResponseCode> Presence: [..] Definition: This code is used to indicate the file delivery (send receive) condition. Data Type: Code, Max6Text If Code One of the following codes must be used: Code Name Remarks 00 OK. 0 Pending. not used 02 SOAP signature error. signature verification failed 03 SOAP signature error. certificate not valid for this id 04 SOAP signature error. certificate not valid 05 Operation unknown. 06 Operation is restricted. 07 SenderID not found. 08 SenderID locked. 09 Contract locked. 0 SenderID outdated Contract outdated 2 Schemavalidation failed. 3 CustomerID not found. 4 CustomerID locked. 5 CustomerID outdated. 6 Product contract outdated. 7 Product contract locked. 8 Content digital signature not valid. 9 Content certificate not valid. 20 Content type not valid. 2 Deflate error. 22 Decrypt error. 23 Content processing error. 24 Content not found. 25 Content not allowed.
30 All rights reserved 30(46) 26 Technical error. 27 Cannot be deleted. 28 [not used] not used 29 Invalid parameters. 30 Authentication failed 3 Duplicate message rejected. SOAP.Body.RequestHeader.SenderId + SOAP.Body.ReqhestHeader.RequestId 32 Duplicate ApplicationRequest rejected. ApplicationRequest.CustomerId + ApplicationRequest.Timestamp ResponseText <ResponseText> Definition: The textual explanation of the condition. Data Type: Max52Text Rule: See the response code list ReceiverId <ReceiverId> Presence: [..] Definition: Identification of the receiver of the original request message for this response (the sender of this response) Data Type: BIC for the bank 4.6 Using ApplicationRequest and ApplicationResponse Elements Field by Field 4.6. ApplicationRequest This section describes the use of XML element ApplicationRequest field by field CustomerId <CustomerId> Presence: [..] Definition: Code used by the bank to identify the customer who originated this request. This code is bank specific, i.e. each bank issues and manages its own CustomerIds. When signing the ApplicationRequest element, the certificate used to verify the Signature must be associated with the CustomerId given in this field. CustomerId identifies the customer, the Signature authenticates the identity of the customer. This element is always mandatory in all operations. Data Type: Max6Text (min, max6) Rule: If rejected, mandatory field missing field=xxx Command <Command> Definition: This element specifies the requested operation. The values are not case sensitive. This element is optional if the bank can determine the operation by other means. For example in the SOAP message the name of a higher level XML element can already specify the operation. In such a case, the Command element can be left out, but if it is included in the request, its content must match the operation specified by other means. Data Type: Code, Max32Text Rule: If the command is specified by two separate means and they do not specify the same command, the request is rejected (Status = Command Mismatch)
31 All rights reserved 3(46) If Code, one of the following codes must be used: Code UploadFile DownLoadFileList DownloadFile DeleteFile ConfirmFile GetUserInfo Name send a file request a list and detailed information of downloadable files download a file delete a file confirm a file request Timestamp <Timestamp> Presence: [..] Definition: Time and date when the Application Request Header was created Data Type: ISODateTime StartDate <StartDate> Definition: When requesting data from the bank, e.g. with the DownloadFileList operation, this element can be used to specify filtering criteria. This element contains a date which specifies the starting point of the time filter, inclusive. If this element is not present, but EndDate is given, it means the filtering criteria does not have a starting point. Data Type: ISODate EndDate <EndDate> Definition: When requesting data from the bank, e.g. with the DownloadFileList operation, this element can be used to specify filtering criteria. This element contains a date which specifies the ending point of the time filter, inclusive. If this element is not present, but StartDate is given, it means the filtering criteria does not have an ending point. Data Type: ISODate Status <Status> Definition: When requesting data from the bank, e.g. with the DownloadFileList operation, this element can be used to specify filtering criteria. One status can be specified in this element and this status is used to filter the requested data. For example only a list of files with status "NEW" can be fetched. Data Type: Code, Max0Text Rule: If omitted, default value is all files, Code = ALL If Code, one of the following codes must be used: Code NEW DLD ALL Name Give me a list those files that haven t been downloaded, yet Give me a list of those files that have already been downloaded Give me a list of both new and already downloaded files
32 All rights reserved 32(46) ServiceId <ServiceId> Definition: Additional identification information of the Customer, for example a Contract Number, Account Number or similar. This element is used if the CustomerId alone does not give identification that is specific enough to process the request. Data Type: Max256Text EnvironmentId <EnvironmentId> Presence: [..] Definition: This field specifies which environment the request is meant for. The values are not case sensitive. This element must be agree with the URL the request was sent to. For example if this element says "Production", but the request was sent to a test URL, the bank will reject the request. The customer can use this element to add a level of redundancy which helps to catch situations when a wrong URL is used. Data Type: Code, Max6Text Rule: In case of URL and code mismach the following Response code is given Environment mismatch If Code, one of the following codes must be used: Code Production Test Name Production environment Testing environment FileReference <FileReference> Definition: Unique identification of the file that is the target of the operation. This element is used in operations DownloadFile, DeleteFile and ConfirmFile to specify which file is to be operated upon. The customer must have obtained the FileReference value beforehand, e.g. using the DownloadFileList or UploadFile operations. The customer never generates the FileReference. This value is generated in the bank. It is comparable to a file system File Handle. Data Type: Max6Text Rule: This element mandatory in operations DownloadFile, DeleteFile and ConfirmFile, where there is a need to specify one specific file as the target of the operation. This element is ignored in other operations UserFileName <UserFileName> Definition: A name given to the file by the customer. The value given in this element in the UploadFile operation is stored in the bank and shown in various listings to help the customer identify the file. Please note that the real identification of a file is the FileReference. The UserFileName field is just comment type information and is not used by bank systems. Data Type: Max80Text Rule: This element is mandatory in the operation UploadFile and ignored in all other operations. If missing, request will be rejected, responsecode = No File Name TargetId <TargetId> Presence: [..]
33 All rights reserved 33(46) Definition: The logical folder name where the file(s) of the customer are stored in the bank. A user can have access to several folders. A customer may want to give their users different views of files and assets that are included in the customer agreement. That can be achieved by organizing file types and assets associated to those file types into separate folders. Data Type: Max80Text Rule: Optional for information requests, if omitted the response will cover all files that the user has access to ExecutionSerial <ExecutionSerial> Definition: An identifier given the customer to identify this particular request. The bank does not enforce the uniqueness of this identifier the value is used only by the customer. This element could be used for example to uniquely identify all ConfirmFile operations. This element is optional. Using ISO timestamp is recommended. Data Type: Max32Text Encryption <Encryption> Definition: Encrytion indicator for the content or encryption request for the responses Data Type: Boolean Rule: If this element is present and the content is the string "true" (case-sensitive) it means that the Content is encrypted or the requested data should be encrypted by the bank. If this element is present and the content is the string "false" (case-sensitive) it means that the Content is NOT encrypted or the requested data should NOT be encrypted by the bank. Code true false Name Content and resonses are encrypted Content and responses are not encrypted EncryptionMethod <EncryptionMethod> Definition : Name of the encryption algorithm DataType: Max35Text Compression <Compression> Definition: Compression indicator for the content and compression request for the responses. Data Type: Boolean Rule: If this element is present and the content is string true (case-sensitive) or it means that the Content is compressed or the requested data should be compressed. If this element is present and the content is string false (case-sensitive) or 0 it means that the Content is NOT compressed or the requested data should NOT be compressed. Code true () false (0) Name Content and resonses are compressed Content and resonses are not compressed CompressionMethod <CompressionMethod> Definition : Name of the compression algorithm DataType: Max35Text
34 All rights reserved 34(46) AmountTotal <AmountTotal> Definition: Total sum of amounts in the file. If the data contained in this request has monetary values, the customer can calculate the total amount of these values and place it in this field. If this element is present, the bank can compare the values in the data against the value in this element and reject the request if they do not match. The use of this check is to be agreed between the customer and the bank. This element can also be used in file listings and reports as comment type information to help identify data files. It is easier for the customer to say "file sent last week with total amount around euros", instead of "file with FileReference ". It is up to the bank to decide if it takes the Amount information from this element in the request or if it calculates it from the data file. Data Type: Double TransactionCount <TransactionCount> Definition: The same use as element AmountTotal, but contains the total number of transactions in the data. What "transaction" means varies with type of data, e.g. in C2B pain payment data TransactionCount is the number of <CdtTrfTxInf> elements. Data Type: Long SoftwareId <SoftwareId> Presence: [..] Definition: This element contains the name and version of the client side software that generated the request. It is used for customer support purposes. Data Type: Max80Text CustomerExtension <CustomerExtension> Definition: Customer, bank, country or region specific elements not already contained in the schema. This element allows adding new element without changing the ApplicationRequest schema. Both customer and bank must agree on the structure of this element. Data Type: Complex AnyType FileType <FileType> Definition: Specified the type of file in the request. Can also be used as a filter in the operation DownloadFileList. The values accepted in this element are agreed upon between the customer and the bank. New file types will be added, and they will not affect the schema. An appendix will be provided listing commonly used FileTypes. Data Type: Max40Text Rule: For ISO messages, the ISO name must be used. This element is mandatory in operation UploadFile, optional in DownloadFileList, ignored in other operations Content <Content> (the content in the UploadFile) Definition: The actual file in the UploadFile operation. The file is in Base64 format. Data Type: Base64Binary Rule: This element is mandatory in operation UploadFile, ignored in other operations Signature <Signature> (the digital signature for the ApplicationRequest)
35 All rights reserved 35(46) Definition: Digital signature. This element is created by the XML Digital Signature operation by the customer. It is included in this schema as optional element to allow schema validation of the ApplicationRequest element with or without the Signature. Its content is specified by the XML Digital Signature standard. Data Type: MaxUnlimitedDSIG (AnyType) Rule: This element is mandatory when sending any request to the bank as it is used for integrity verification and authentication. This element is defined as optional in the schema because the recipient can remove the signature element after verification of the signature ApplicationResponse This section describes the use of XML element ApplicationResponse field by field CustomerId <CustomerId> Presence: [..] Definition: Returns the customer identification that was in the corresponding ApplicationRequest. Data Type: Max6Text Timestamp <Timestamp> Presence: [..] Definition: Time and date when the Application Response Header was created Data Type: ISODateTime, if no time zone specified, UTC time zone assumed ResponseCode <ResponseCode> Presence: [..] Definition: The response code given by the bank to indicate the result of the requested operation. The codes are: Data Type: Code Max6Text If Code One of the following codes must be used: Code Name Remarks 00 OK. 0 Pending. not used 02 SOAP signature error. signature verification failed 03 SOAP signature error. certificate not valid for this id 04 SOAP signature error. certificate not valid 05 Operation unknown. 06 Operation is restricted. 07 SenderID not found. 08 SenderID locked. 09 Contract locked. 0 SenderID outdated Contract outdated 2 Schemavalidation failed. 3 CustomerID not found. 4 CustomerID locked. 5 CustomerID outdated. 6 Product contract outdated. 7 Product contract locked. 8 Content digital signature not valid. 9 Content certificate not valid.
36 All rights reserved 36(46) 20 Content type not valid. 2 Deflate error. 22 Decrypt error. 23 Content processing error. 24 Content not found. 25 Content not allowed. 26 Technical error. 27 Cannot be deleted. 28 [not used] not used 29 Invalid parameters. 30 Authentication failed. 3 Duplicate message rejected. SOAP.Body.RequestHeader.SenderId + SOAP.Body.ReqhestHeader.RequestId 32 Duplicate ApplicationRequest rejected. ApplicationRequest.CustomerId + ApplicationRequest.Timestamp ResponseText <ResposeText> Presence: [..] Definition: A text string (human readable) explaining the response code given in the ResponseCode element. Do not rely on the exact contents of this string, use the ResponseCode value instead. Data Type: Max80Text ExecutionSerial <ExecutionSerial> Definition: The bank returns the ExecutionSerial unique identification code for the operation given by the customer in the ApplicationRequest Header. Data Type: Max32Text Encrypted <Encrypted> Definition: Encrytion indicator for the content or encryption request for the responses Data Type: Boolean Rule: If this element is present and the content is the string "true" (case-sensitive) it means that the Content is encrypted or the requested data should be encrypted by the bank. If this element is present and the content is the string "false" (case-sensitive) it means that the Content is NOT encrypted or the requested data should NOT be encrypted by the bank. Code true false Name Content and resonses are encrypted Content and responses are not encrypted EncryptionMethod <EncryptionMethod> Definition : Name of the encryption algorithm DataType: Max35Text Compressed <Compressed> Definition: Compression indicator for the content and compression request for the responses. Data Type: Boolean
37 All rights reserved 37(46) Rule: If this element is present and the content is string true (case-sensitive) or it means that the Content is compressed or the requested data should be compressed. If this element is present and the content is string false (case-sensitive) or 0 it means that the Content is NOT compressed or the requested data should NOT be compressed. Code true () false (0) Name Content and resonses are compressed Content and resonses are not compressed CompressionMethod <CompressionMethod> Definition : Name of the compression algorithm DataType: Max35Text AmountTotal <AmountTotal> Definition: Total sum of amounts in the file. If the data contained in this request has monetary values, the customer can calculate the total amount of these values and place it in this field. If this element is present, the bank can compare the values in the data against the value in this element and reject the request if they do not match. The use of this check is to be agreed between the customer and the bank. This element can also be used in file listings and reports as comment type information to help identify data files. It is easier for the customer to say "file sent last week with total amount around euros", instead of "file with FileReference ". It is up to the bank to decide if it takes the Amount information from this element in the request or if it calculates it from the data file. Data Type: Double Rule: There is no requirement for the bank to use this element even if the file type would allow for it TransactionCount <TransactionCount> Definition: The same use as element AmountTotal, but contains the total number of transactions in the data. What "transaction" means varies with type of data, e.g. in C2B pain payment data TransactionCount is the number of <CdtTrfTxInf> elements. Data Type: Long Rule: There is no requirement for the bank to use this element even if the file type would allow for it CustomerExtension <CustomerExtension> Definition: Customer, bank, country or region specific elements not already contained in the schema. This element allows adding new element without changing the ApplicationRequest schema. Both customer and bank must agree on the structure of this element. Data Type: MaxUnlimitexText FileDescriptors<FileDescriptors> (in response to DownloadFileList) Definition: An element containing number of FileDescriptor elements below. Data Type: Complex FileDescriptor <FileDescriptor> Presence: [..n]
38 All rights reserved 38(46) Definition: An element containing file attributes below. Data Type: Complex FileReference <FileReference> Presence: [..] Definition: The unique identifier for this file. The identifier is unique in the bank system within one TargetId (folder). File reference is fixed for the entire duration of the file s lifecycle. Therefore, if the client already knows the file references of the desired files (and the file type and the folder) then, for example, it is not mandatory to do a DowloadFileList operation each time prior to the DownLoadFile operation Data Type: Max6Text TargetId <TargetId> Presence: [..] Definition: The logical folder name where the file(s) of the customer are stored in the bank. A user can have access to several folders. A customer may want to give their users different views of files and assets that are included in the customer agreement. That can be achieved by organizing file types and assets associated to those file types into separate folders. Data Type: Max80Text Rule: Optional for information requests, if omitted the response will cover all files that the user has access to ServiceId <ServiceId> Presence: [..] Definition: Additional identification information of the Customer, for example a Contract Number, Account Number or similar. This element is used if the CustomerId alone does not give identification that is specific enough to process the request. Data Type: Max256Text ServiceIdOwnerName <ServiceIdOwnerName> Definition: Owner of the service identified by ServiceId Data Type: Max256Text UserFileName <UserFileName> Definition: A name given to the file by the customer. The value given in this element in the UploadFile operation is stored in the bank and shown in various listings to help the customer identify the file. Please note that the real identification of a file is the FileReference. The UserFileName field is just comment type information and is not used by bank systems. Data Type: Max80Text Rule: This element is mandatory in the operation UploadFile and ignored in all other operations. If missing, request will be rejected, responsecode = No File Name ParentFileReference <ParentFileReference> Definition: A file reference to a file to which this file is related. For example this file could be a status response file to another file. This element indicates the relationship. Data Type: Max6Text Rule: This element is mandatory in the operation UploadFile and ignored in all other operations. If missing, request will be rejected, responsecode = No File Name
39 All rights reserved 39(46) FileType <FileType> Presence: [..] Definition: Specifies the type of file in the request. Can also be used as a filter in the operation DownloadFileList. The values accepted in this element are agreed upon between the customer and the bank. New file types will be added, and they will not affect the schema. A bank specific document will be provided listing commonly used FileTypes. Data Type: Max40Text Rule: For ISO messages, the ISO name must be used. This element is mandatory in operation UploadFile, optional in DownloadFileList, ignored in other operations FileTimestamp <FileTimestamp> Presence: [..] Definition: The timestamp of the moment the file was created in the bank system. Data Type: ISODateTime Status <Status> Presence: [..] Definition: The status (state) of the file. Data Type: Code, Max0Text If Code One of the following codes must be used: Code WFP WFC FWD DLD DEL NEW KIN Name Waiting for processing Waiting for confirmation Forwardet to processing Downloaded Deleted New file Key-in AmountTotal <AmountTotal> Definition: Total sum of amounts in the file. If the data contained in this request has monetary values, the customer can calculate the total amount of these values and place it in this field. If this element is present, the bank can compare the values in the data against the value in this element and reject the request if they do not match. The use of this check is to be agreed between the customer and the bank. This element can also be used in file listings and reports as comment type information to help identify data files. It is easier for the customer to say "file sent last week with total amount around euros", instead of "file with FileReference ". It is up to the bank to decide if it takes the Amount information from this element in the request or if it calculates it from the data file. Data Type: Double Rule: There is no requirement for the bank to use this element even if the file type would allow for it TransactionCount <TransactionCount> Definition: The same use as element AmountTotal, but contains the total number of transactions in the data. What "transaction" means varies with type of data, e.g. in C2B pain payment data TransactionCount is the number of <CdtTrfTxInf> elements.
40 All rights reserved 40(46) Data Type: Long Rule: There is no requirement for the bank to use this element even if the file type would allow for it LastDownloadTimestamp <LastDownloadTimestamp> Definition: The timestamp of the moment this file was last downloaded by the customer. Data Type: ISODateTime Rule: This element does not exist, the file has not been downloaded ForwardedTimestamp <ForwardedTimestamp> Definition: The timestamp of the moment this file was forwarded to processing in the bank. Data Type: ISODateTime Rule: This element does not exist, the file has not been forwarded to processing Confirmable <Confirmable> Definition: Tells whether the file needs confirmation before being forwarded for processing or allowed to be downloaded. Data Type: Boolean Rule: If this element does not exist, it implies the value false, i.e. not confirmable Deletable <Deletable> Definition: Tells whether the file can be deleted by the customer. Data Type: Boolean Rule: If this element does not exist, it implies the value false, i.e. not deletable SubStatusCode <SubStatusCode> Definition: Some filetypes can have a substatus (substate), eg. Finish Payment Service filetype (LMP300) Data Type: Max35Text If Code One of the following codes must be used: Code HIGH NORM Name High Normal SubStatusText <SubStatUsText> Definition: A text descring the FileSubStatus Data Type: Max70Text MissingTransactions <MissingTransactions> Definition: Checksum error indicator for certain filetypes Data Type: Boolean Rule: true if the validation of the file has discovered that the checksum in the file does not match, otherwise false SubType <SubType> Definition: Valid for some filetypes describibg in more detail what the file content is
41 All rights reserved 4(46) Data Type: Max35Text FeedbackFileAttributes <FeedbackFileAttributes> Definition: Feedback file attributes Data Type : Complex FeedbackFileReference <FeedbackFileReference> Presence: [..] Definition: The unique identifier for this file. The identifier is unique in the bank system within one TargetId (folder). This element is mandatory. File reference is fixed for the entire duration of the file s lifecycle. Therefore, if the client already knows the file references of the desired files (and the file type and the folder) then it is not mandatory to do a DowloadFileList operation each time prior to the DownLoadFile operation Data Type: Max6Text FeedbackFileType < FeedbackFileType> Definition: Specifies the file type of the feedback file to be used for download or detailed info. The file types are bank dependent. Data Type: Max35Text FeedbackFileTypeName <FeedbackTypeName> Definition: The name of the feedback filetype. Data Type: Max80Text FeedbackFileStatus <FeedbackFileStatus> Definition: Has the feedback file already been downloaded or not. Data Type: Code, Max6Text If Code One of the following codes must be used: Code New Downloaded Name the file is new the file has been downloaded FeedbackFileDate <FeedbackFileDate> Definition: The date when the file was created Data Type: ISODate FeedbackTimestamp <FeedTimestamp> Definition: The timestamp of the moment the file was created in the bank system. Data Type: ISODateTime FeedbackServiceId <FeedbackFileServiceId>
42 All rights reserved 42(46) Definition: Some upload filetypes have a feedback filetype. When a feedback filetype exists the feedback-fields will be provided after a upload has been executed to help the client/user to pinpoint the feedback to the correct upload. Data Type: Max35Text Rule: The internal ServiceId associated with this feedback file and the feedback information is bank dependent FileActionHistory <FileActioHistory> Definition: A list of actions for the file. Examples of actions are new, download etc. Data Type: Max6Text UserFileTypes <UserFileTypes> (in response to GetUserInfo) Presence: [..n] Definition: The response for GetUserInfo contains number of UserFileType elements that describe which file types are accessible to this user and their attributes. It is possible to filter the view by specifyingtargetid and/or FileType in the ApplicationRequest for GetUserInfo request Data Type: Complex TargetId <TargetId> Presence: [..] Definition: The folder where the file is located. Data Type: Max80Text FileType <FileType> Definition: External file type of the file. Data Type: Max35Text FileTypeName <FileTypeName> Definition: Display name for the file type Data Type: Max 80 text Rule: Empty for files with Upload Direction Country <Country> Definition: Specifies which country where the file type is available in Data Type: Code, Max3Text, ISO 366- alpha-2 country code If Code One of the following codes must be used: Code FIN DNK etc. Name Finland Denmark etc Direction <Direction> Definition: Specifies whether the file is upload or download - type Data Type: Code, Max6Text
43 All rights reserved 43(46) If Code One of the following codes must be used: Code Upload Download Name upload direction download direction FileTypeServices <FileTypeServices> Definition: Each UserFileType element contains number of FileTypeService descriptions Data Type: complex FileTypeService <FileTypeService> Presence: [..n] Definition: Each UserfileType element can contain a number of FileTypeService elements that specify which services are available for the file type in the TargetId specified by this UserFileType element. For example, services associated with an account statement file type are represented by account numbers. Data Type: complex ServiceId <ServiceId> Presence: [..] Definition: Internal representation of service identification Data Type: Max35Text ServiceIdOwnerName <ServiceIdOwnerName> Definition: Owner of the service identified by ServiceId Data Type: Max256Text ServiceIdType <ServiceIdType> Definition: (reserved for the future use) Data Type: Max80Text ServiceIdText <ServiceIdText> Definition: Display format for the ServiceId Data Type: Max80Text Content <Content> (response to DownloadFile) Presence: [..] Definition: The actual content, payload in the DownloadFile operation. The file is in Base64 format. Data Type: MaxUnlimitedBase64 Rule: This element is mandatory in operation DownloadFile, ignored in other operations Signature <Signature> (digital signature of the ApplicationResponse) Definition: Digital signature. This element is created by the XML Digital Signature operation by the bank. It is included in this schema as optional element to allow schema validation of the
44 All rights reserved 44(46) ApplicationRequest element with or without the Signature. Its content is specified by the XML Digital Signature standard. Data Type: MaxUnlimitedDSIG (AnyType) Rule: This element is mandatory when sending ApplicationResponse to the customer as it is used for integrity verification and authentication of the bank. This element is defined as optional in the schema because the recipient can remove the signature element after verification of the signature. 4.7 Sample Messages and Application Requests 4.7. Request SOAP Message <env:envelope xmlns:env=" <env:header> <wsse:security xmlns:wsse=" wss-wssecurity-secext-.0.xsd" env:mustunderstand=""> <wsse:binarysecuritytoken wsu:id="bst_zkt4e6ppc4atk272" xmlns:wsu=" ValueType=" EncodingType=" Base64 removed for clarity)...8xx60=</wsse:binarysecuritytoken> <dsig:signature xmlns:dsig=" <dsig:signedinfo> <dsig:canonicalizationmethod Algorithm=" <dsig:signaturemethod Algorithm=" <dsig:reference URI="#Body_SJqHqDhuSvW7UkFo"> <dsig:transforms> <dsig:transform Algorithm=" <exc4n:inclusivenamespaces xmlns:exc4n=" PrefixList=""/> </dsig:transform> </dsig:transforms> <dsig:digestmethod Algorithm=" <dsig:digestvalue>4yzyxo6f0w9wu4ykqf4zayxtils=</dsig:digestvalue> </dsig:reference> </dsig:signedinfo> <dsig:signaturevalue>pbvgxh7x2kzfynkrl5zmqtla5rhuqvrvefcibqzaivgnjjjte3foozbab3stzht jwcykx/zwp+npne9kvtab959jve3zuzbnradeyg7gnaqqadfbngxw6uooyqop+xwosoiqdbvp83nigdkfsehokt6ewm Mug+Ovw6V8Cxvk=</dsig:SignatureValue> <dsig:keyinfo> <wsse:securitytokenreference xmlns:wsse=" xmlns:wsu=" wsu:id="str_pqf55eqfnl5tjot"> <wsse:reference URI="#bst_Zkt4E6PpC4aTK272" ValueType=" </wsse:securitytokenreference> </dsig:keyinfo> </dsig:signature> <wsu:timestamp xmlns:wsu=" wss-wssecurity-utility-.0.xsd"> <wsu:created> t0:07:3z</wsu:created> <wsu:expires> t0:08:3z</wsu:expires> </wsu:timestamp> </wsse:security> </env:header> <env:body wsu:id="body_sjqhqdhusvw7ukfo" xmlns:wsu=" <cor:uploadfilein xmlns:cor=" <java:requestheader xmlns:java="java:fi.bxd.model"> <java:senderid> </java:senderid>
45 All rights reserved 45(46) <java:requestid>234567</java:requestid> <java:timestamp> t3:07: :00</java:timestamp> <java:language>fi</java:language> <java:useragent>testclient.00</java:useragent> <java:receiverid>bankcode</java:receiverid> </java:requestheader> <java:applicationrequest xmlns:java="java:fi.bxd.model">pd94b... (most Base64 removed for clarity)...lc3q+</java:applicationrequest> </cor:uploadfilein> </env:body> </env:envelope> Response SOAP Message <env:envelope xmlns:env=" xmlns:xsi=" <env:header> <wsse:security xmlns:wsse=" wss-wssecurity-secext-.0.xsd" env:mustunderstand=""> <wsse:binarysecuritytoken wsu:id="bst_q8bymu9ucbcf6oq" xmlns:wsu=" ValueType=" EncodingType=" (most Base64 removed for clarity)...cmfp5</wsse:binarysecuritytoken> <dsig:signature xmlns:dsig=" <dsig:signedinfo> <dsig:canonicalizationmethod Algorithm=" <dsig:signaturemethod Algorithm=" <dsig:reference URI="#Body_y5xWczgM0hNrIJb"> <dsig:transforms> <dsig:transform Algorithm=" <exc4n:inclusivenamespaces xmlns:exc4n=" PrefixList=""/> </dsig:transform> </dsig:transforms> <dsig:digestmethod Algorithm=" <dsig:digestvalue>q6htqyuzuvjunjepb3pykh9qecu=</dsig:digestvalue> </dsig:reference> </dsig:signedinfo> <dsig:signaturevalue>jcxxjbi7mf70vf/gaxb97bu9g3rxbxpp/ofanhwlc54mh0kgixm/p3mywzh0bpy lne0yhbq80bsfhmxkzfsw==</dsig:signaturevalue> <dsig:keyinfo> <wsse:securitytokenreference xmlns:wsse=" xmlns:wsu=" wsu:id="str_mhku7v4pbvdxwxxn"> <wsse:reference URI="#bst_q8bYMu9uCbcF6oq" ValueType=" </wsse:securitytokenreference> </dsig:keyinfo> </dsig:signature> <wsu:timestamp xmlns:wsu=" wss-wssecurity-utility-.0.xsd"> <wsu:created> t09:58:9z</wsu:created> <wsu:expires> t09:59:9z</wsu:expires> </wsu:timestamp> </wsse:security> </env:header> <env:body wsu:id="body_y5xwczgm0hnrijb" xmlns:wsu=" <cor:downloadfilelistout xmlns:cor=" <java:responseheader xmlns:java="java:fi.bxd.model"> <java:senderid> </java:senderid>
46 All rights reserved 46(46) <java:requestid>234567</java:requestid> <java:timestamp> t3:07:3.2+00:00</java:timestamp> <java:responsecode>00</java:responsecode> <java:responsetext>ok.</java:responsetext> <java:receiverid>bankcode</java:receiverid> </java:responseheader> <java:applicationresponse xmlns:java="java:fi.bxd.model">pd94b... (most Base64 removed for clarity)...lpg==</java:applicationresponse> </cor:downloadfilelistout> </env:body> </env:envelope> UploadFile ApplicationRequest <?xml version=".0" encoding="utf-8"?> <ApplicationRequest xmlns=" <CustomerId> </CustomerId> <Timestamp> T3:07: :00</Timestamp> <Environment>TEST</Environment> <TargetId>target</TargetId> <Compression>true</Compression> <SoftwareId>TestSoft.00</SoftwareId> <FileType>pain </FileType> <Content>eJydV... (most Base64 removed for clarity)...zoy0=</content> <Signature xmlns=" <SignedInfo> <CanonicalizationMethod Algorithm=" #WithComments"/> <SignatureMethod Algorithm=" <Reference URI="#xpointer(/)"> <Transforms> <Transform Algorithm=" </Transforms> <DigestMethod Algorithm=" <DigestValue>5PsKL0uX0HMiXN4704l28qdK0NQ=</DigestValue> </Reference> </SignedInfo> <SignatureValue>NOHlZ5FZVZuprzKtDzViVfi/lIRjlftImW7wfmf8HVm8ojxdfralzmLIRVKI0d6RVHEx 09Qy/kJhBdAKnJnKYeKBMuDfEDRtZu+9jI4Ijwm4Q0i2CNeA8Qh8ijq++kkGDl7X5oF+fTvVQs+IFVgZWdgTmT8yfas VskxyOG3Q=</SignatureValue> <KeyInfo> <X509Data> <X509Certificate>MIIDF... (most Base64 removed for clarity)...97cpc=</x509certificate> </X509Data> </KeyInfo> </Signature> </ApplicationRequest>
Version 3.8, June 14th, 2015
in Version 3.8, June 14 th, 2015 Contents 0. Background... 3 1. General notes... 4 2. Information about the functions of the EDI Web Services.... 5 2.1 Using the RequestHeader... 6 2.2 Using the ResponseHeader...
Secure Envelope specification
Secure Envelope specification for Corporate Access File Transfer 2/13/2015 Version 1.0.3 This document defines how a file (e.g. a payment file) which will be sent to the bank is digitally signed by the
Encryption, Signing and Compression in Financial Web Services
Danske Bank Encryption, Signing and Compression in Financial Web Services Details of how to call the Danske Bank financial web service Version 2.4.7 Encryption, Signing and Compression in Financial Web
Web Services. File transfer Service description
Web Services File transfer Service description Content 1 General... 2 1.1 Web Services... 2 2 Agreement on the use of the WS connection... 3 2.1 Certificates and keys... 3 2.2 Prerequisites for using the
Direct message exhange with Finnish Customs
Direct message exhange with Finnish Customs Technical guidebook Finnish Customs Uppdated 20 August 2015 Message Exhange Support Message exchange with Finnish Customs, Technical guidebook, updated 20 August
Corporate Access File Transfer Service Description Version 1.0 01/05/2015
Corporate Access File Transfer Service Description Version 1.0 01/05/2015 This document describes the characteristics and usage of the Corporate Access File Transfer service, which is for transferring
Message Containers and API Framework
Message Containers and API Framework Notices Copyright 2009-2010 Motion Picture Laboratories, Inc. This work is licensed under the Creative Commons Attribution-No Derivative Works 3.0 United States License.
Chapter 17. Transport-Level Security
Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics
Most common problem situations in direct message exchange
Page 1 / 7 Message Exchange Direct Message Exchange Most common problem situations in direct message exchange v. 1.0, 11.8.2014 Page 2 / 7 Most common problem situations in direct message exchange This
Replacements TECHNICAL REFERENCE. DTCCSOLUTIONS Dec 2009. Copyright 2009 Depository Trust Clearing Corporation. All Rights Reserved.
TECHNICAL REFERENCE Replacements Page 1 Table of Contents Table of Contents 1 Overview... 3 1.1 Replacements Features... 3 2 Roles and Responsibilities... 4 2.1 Sender (Receiving Carrier)... 4 2.2 Recipient
Key Management Interoperability Protocol (KMIP)
(KMIP) Addressing the Need for Standardization in Enterprise Key Management Version 1.0, May 20, 2009 Copyright 2009 by the Organization for the Advancement of Structured Information Standards (OASIS).
Using etoken for SSL Web Authentication. SSL V3.0 Overview
Using etoken for SSL Web Authentication Lesson 12 April 2004 etoken Certification Course SSL V3.0 Overview Secure Sockets Layer protocol, version 3.0 Provides communication privacy over the internet. Prevents
United Concordia (UCD) Real Time Claim Submission & Adjudication Connectivity Specifications
United Concordia (UCD) Real Time Claim Submission & Adjudication Connectivity Specifications May 15, 2015 Contents 1. Real Time Overview 2. Requirements 3. SOAP Messages 4. SOAP Faults 5. CORE-Compliant
Server based signature service. Overview
1(11) Server based signature service Overview Based on federated identity Swedish e-identification infrastructure 2(11) Table of contents 1 INTRODUCTION... 3 2 FUNCTIONAL... 4 3 SIGN SUPPORT SERVICE...
Certificate Management. PAN-OS Administrator s Guide. Version 7.0
Certificate Management PAN-OS Administrator s Guide Version 7.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us
WEB SERVICES SECURITY
WEB SERVICES SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
Developer Guide to Authentication and Authorisation Web Services Secure and Public
Government Gateway Developer Guide to Authentication and Authorisation Web Services Secure and Public Version 1.6.3 (17.04.03) - 1 - Table of Contents Government Gateway 1 Developer Guide to Authentication
System to System Interface Guide
System to System Interface Guide Overview What does this guide cover? This guide describes the interface definition to firms intending to submit their TRS Product Sales Data (PSD) or Securities Trades
Setting Up an AS4 System
INT0697_150625 Setting up an AS4 system V1r0 1 Setting Up an AS4 System 2 Version 1r0 ENTSOG AISBL; Av. de Cortenbergh 100, 1000-Brussels; Tel: +32 2 894 5100; Fax: +32 2 894 5101; [email protected], www.entsog.eu,
OpenADR 2.0 Security. Jim Zuber, CTO QualityLogic, Inc.
OpenADR 2.0 Security Jim Zuber, CTO QualityLogic, Inc. Security Overview Client and server x.509v3 certificates TLS 1.2 with SHA256 ECC or RSA cipher suites TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 TLS_RSA_WITH_AES_128_CBC_SHA256
02267: Software Development of Web Services
02267: Software Development of Web Services Week 11 Hubert Baumeister [email protected] Department of Applied Mathematics and Computer Science Technical University of Denmark Fall 2015 1 Contents WS-Policy Web
CICS Web Service Security. Anthony Papageorgiou IBM CICS Development March 13, 2012 Session: 10282
Web Service Security Anthony Papageorgiou IBM Development March 13, 2012 Session: 10282 Agenda Web Service Support Overview Security Basics and Terminology Pipeline Security Overview Identity Encryption
XML Signatures in an Enterprise Service Bus Environment
XML Signatures in an Enterprise Bus Environment Eckehard Hermann Research & Development XML Integration Uhlandstraße 12 64297 Darmstadt, Germany [email protected] Dieter Kessler Research
Criteria for web application security check. Version 2015.1
Criteria for web application security check Version 2015.1 i Content Introduction... iii ISC- P- 001 ISC- P- 001.1 ISC- P- 001.2 ISC- P- 001.3 ISC- P- 001.4 ISC- P- 001.5 ISC- P- 001.6 ISC- P- 001.7 ISC-
The Vetuma Service of the Finnish Public Administration SAML interface specification Version: 3.5
The Vetuma Service of the Finnish Public Administration SAML interface specification Version: 3.5 Vetuma Authentication and Payment Table of Contents 1. Introduction... 3 2. The General Features of the
Chapter 7 Transport-Level Security
Cryptography and Network Security Chapter 7 Transport-Level Security Lectured by Nguyễn Đức Thái Outline Web Security Issues Security Socket Layer (SSL) Transport Layer Security (TLS) HTTPS Secure Shell
Djigzo S/MIME setup guide
Author: Martijn Brinkers Table of Contents...1 Introduction...3 Quick setup...4 Create a CA...4 Fill in the form:...5 Add certificates for internal users...5 Add certificates for external recipients...7
A Signing Proxy for Web Services Security. Dr. Ingo Melzer RIC/ED
A Signing Proxy for Web Services Security Dr. Ingo Melzer RIC/ED What is a Web Service? Infrastructure Web Service I. Melzer -- A Signing Proxy for Web Services Security 2 What is a Web Service? basic
Ciphire Mail. Abstract
Ciphire Mail Technical Introduction Abstract Ciphire Mail is cryptographic software providing email encryption and digital signatures. The Ciphire Mail client resides on the user's computer between the
Quickstream Connectivity Options
A division of Westpac Banking Corporation ABN 33 007 457 141 Quickstream Connectivity Options Document History Date 25-Jun-2003 1-Jul-2003 3-July-2003 18-July-2003 18-Aug-2003 8-Sep-2003 19-Sep-2003 31-Oct-2003
Den Gode Webservice - Security Analysis
Den Gode Webservice - Security Analysis Cryptomathic A/S September, 2006 Executive Summary This report analyses the security mechanisms provided in Den Gode Web Service (DGWS). DGWS provides a framework
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
Exploring ADSS Server Signing Services
ADSS Server is a multi-function server providing digital signature creation and signature verification services, as well as supporting other infrastructure services including Time Stamp Authority (TSA)
OSCI Transport 1.2 Specification Status: FINAL OSCI Leitstelle
OSCI Transport 1.2 Specification Status: FINAL OSCI Leitstelle Bremen/Germany, June 2002 OSCI Transport 1.2 2 The following companies and institutions have been involved in the creation of this specification:
Service description. Corporate Access Payables
Service description Corporate Access Payables Table of contents Page 2 of 12 1 INTRODUCTION... 3 2 STRUCTURE OF DOCUMENTATION... 4 3 AGREEMENT SET-UP... 4 4 AVAILABLE MESSAGE TYPES... 5 5 OFFERED PAYMENT
e-filing Secure Web Service User Manual
e-filing Secure Web Service User Manual Page1 CONTENTS 1 BULK ITR... 6 2 BULK PAN VERIFICATION... 9 3 GET ITR-V BY TOKEN NUMBER... 13 4 GET ITR-V BY ACKNOWLEDGMENT NUMBER... 16 5 GET RETURN STATUS... 19
Chapter 10. Cloud Security Mechanisms
Chapter 10. Cloud Security Mechanisms 10.1 Encryption 10.2 Hashing 10.3 Digital Signature 10.4 Public Key Infrastructure (PKI) 10.5 Identity and Access Management (IAM) 10.6 Single Sign-On (SSO) 10.7 Cloud-Based
Securing your Online Data Transfer with SSL
Securing your Online Data Transfer with SSL A GUIDE TO UNDERSTANDING SSL CERTIFICATES, how they operate and their application 1. Overview 2. What is SSL? 3. How to tell if a Website is Secure 4. What does
SSL/TLS: The Ugly Truth
SSL/TLS: The Ugly Truth Examining the flaws in SSL/TLS protocols, and the use of certificate authorities. Adrian Hayter CNS Hut 3 Team [email protected] Contents Introduction to SSL/TLS Cryptography
Key Management Interoperability Protocol (KMIP)
www.oasis-open.org Management Interoperability Protocol (KMIP) Storage Developer s Introduction SNIA Fall 2009 Gordon Arnold, [email protected] Chair, Storage Security Industry Forum 1 2009 Insert Copyright
FileCloud Security FAQ
is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file
This Working Paper provides an introduction to the web services security standards.
International Civil Aviation Organization ATNICG WG/8-WP/12 AERONAUTICAL TELECOMMUNICATION NETWORK IMPLEMENTATION COORDINATION GROUP EIGHTH WORKING GROUP MEETING (ATNICG WG/8) Christchurch New Zealand
Securing your Online Data Transfer with SSL A GUIDE TO UNDERSTANDING SSL CERTIFICATES, how they operate and their application INDEX 1. Overview 2. What is SSL? 3. How to tell if a Website is Secure 4.
The following multiple-choice post-course assessment will evaluate your knowledge of the skills and concepts taught in Internet Business Associate.
Course Assessment Answers-1 Course Assessment The following multiple-choice post-course assessment will evaluate your knowledge of the skills and concepts taught in Internet Business Associate. 1. A person
Security Digital Certificate Manager
System i Security Digital Certificate Manager Version 5 Release 4 System i Security Digital Certificate Manager Version 5 Release 4 Note Before using this information and the product it supports, be sure
Security Digital Certificate Manager
IBM i Security Digital Certificate Manager 7.1 IBM i Security Digital Certificate Manager 7.1 Note Before using this information and the product it supports, be sure to read the information in Notices,
Using etoken for Securing E-mails Using Outlook and Outlook Express
Using etoken for Securing E-mails Using Outlook and Outlook Express Lesson 15 April 2004 etoken Certification Course Securing Email Using Certificates Unprotected emails can be easily read and/or altered
Network Security - Secure upper layer protocols - Background. Email Security. Question from last lecture: What s a birthday attack? Dr.
Network Security - Secure upper layer protocols - Dr. John Keeney 3BA33 Question from last lecture: What s a birthday attack? might think a m-bit hash is secure but by Birthday Paradox is not the chance
A Noval Approach for S/MIME
Volume 1, Issue 7, December 2013 International Journal of Advance Research in Computer Science and Management Studies Research Paper Available online at: www.ijarcsms.com A Noval Approach for S/MIME K.Suganya
Secure XML API Integration Guide. (with FraudGuard add in)
Secure XML API Integration Guide (with FraudGuard add in) Document Control This is a control document DESCRIPTION Secure XML API Integration Guide (with FraudGuard add in) CREATION DATE 02/04/2007 CREATED
17 March 2013 NIEM Web Services API Version 1.0 URI: http://reference.niem.gov/niem/specification/web-services-api/1.0/
17 March 2013 NIEM Web Serv vices API Version 1.0 URI: http://reference.niem.gov/niem/specification/web-services-api/1.0/ i Change History No. Date Reference: All, Page, Table, Figure, Paragraph A = Add.
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University October 2015 1 List of Figures Contents 1 Introduction 1 2 History 2 3 Public Key Infrastructure (PKI) 3 3.1 Certificate
Websense Content Gateway HTTPS Configuration
Websense Content Gateway HTTPS Configuration web security data security email security Support Webinars 2010 Websense, Inc. All rights reserved. Webinar Presenter Title: Sr. Tech Support Specialist Cisco
Single Sign-On Implementation Guide
Salesforce.com: Salesforce Winter '09 Single Sign-On Implementation Guide Copyright 2000-2008 salesforce.com, inc. All rights reserved. Salesforce.com and the no software logo are registered trademarks,
Functional Design ecm Test scenarios for the EFET Test facility Broker Tests Product tests
Functional Design ecm Test scenarios for the EFET Test facility Broker Tests Product tests Arnhem, May 2006 Author M. Adriaensen / Y. Slee / L. van Vught By order of EFET author : M. Adriaensen / Y. Slee
Lab Exercise SSL/TLS. Objective. Step 1: Open a Trace. Step 2: Inspect the Trace
Lab Exercise SSL/TLS Objective To observe SSL/TLS (Secure Sockets Layer / Transport Layer Security) in action. SSL/TLS is used to secure TCP connections, and it is widely used as part of the secure web:
Cleaning Encrypted Traffic
Optenet Documentation Cleaning Encrypted Traffic Troubleshooting Guide iii Version History Doc Version Product Date Summary of Changes V6 OST-6.4.300 01/02/2015 English editing Optenet Documentation
Internet Programming. Security
Internet Programming Security Introduction Security Issues in Internet Applications A distributed application can run inside a LAN Only a few users have access to the application Network infrastructures
Secure Email Frequently Asked Questions
Secure Email Frequently Asked Questions Frequently Asked Questions Contents General Secure Email Questions and Answers Forced TLS Questions and Answers SecureMail Questions and Answers Glossary Support
PKI Contacts PKI for Fraunhofer Contacts
Fraunhofer Competence Center PKI PKI Contacts PKI for Fraunhofer Contacts User manual for communication partners of the Fraunhofer-Gesellschaft Author[s]: Uwe Bendisch, Maximilian Gottwald As at: 15.10.2013
NISTIR 7676 Maintaining and Using Key History on Personal Identity Verification (PIV) Cards
NISTIR 7676 Maintaining and Using Key History on Personal Identity Verification (PIV) Cards David A. Cooper NISTIR 7676 Maintaining and Using Key History on Personal Identity Verification (PIV) Cards David
User Guide Supplement. S/MIME Support Package for BlackBerry Smartphones BlackBerry Pearl 8100 Series
User Guide Supplement S/MIME Support Package for BlackBerry Smartphones BlackBerry Pearl 8100 Series SWD-292878-0324093908-001 Contents Certificates...3 Certificate basics...3 Certificate status...5 Certificate
Content Teaching Academy at James Madison University
Content Teaching Academy at James Madison University 1 2 The Battle Field: Computers, LANs & Internetworks 3 Definitions Computer Security - generic name for the collection of tools designed to protect
Connectivity. Alliance 7.0. Alliance Interfaces. FileAct support in SWIFTNet Release 7.0
Connectivity Alliance Alliance Interfaces Act support in SWIFTNet Release February 2012 Table of Contents Preface... 3 1 Introduction... 4 2 Portfolio Act Support... 6 2.1 Alliance Gateway... 6 2.1.1 Overview...
Security. 2014 Yokogawa Users Group Conference & Exhibition Copyright Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX - 1 -
Security - 1 - OPC UA - Security Security Access control Wide adoption of OPC SCADA & DCS Embedded devices Performance Internet Scalability MES Firewalls ERP Communication between distributed systems OPC
Secure Transfers. Contents. SSL-Based Services: HTTPS and FTPS 2. Generating A Certificate 2. Creating A Self-Signed Certificate 3
Contents SSL-Based Services: HTTPS and FTPS 2 Generating A Certificate 2 Creating A Self-Signed Certificate 3 Obtaining A Signed Certificate 4 Enabling Secure Services 5 A Note About Ports 5 Connecting
RS MDM. Integration Guide. Riversand
RS MDM 2009 Integration Guide This document provides the details about RS MDMCenter integration module and provides details about the overall architecture and principles of integration with the system.
Enabling SSO between Cognos 8 and WebSphere Portal
Guideline Enabling SSO between Cognos 8 and WebSphere Portal Product(s): Cognos 8 Area of Interest: Security Enabling SSO between Cognos 8 and WebSphere Portal 2 Copyright Your use of this document is
Unifying Information Security. Implementing TLS on the CLEARSWIFT SECURE Email Gateway
Unifying Information Security Implementing TLS on the CLEARSWIFT SECURE Email Gateway Contents 1 Introduction... 3 2 Understanding TLS... 4 3 Clearswift s Application of TLS... 5 3.1 Opportunistic TLS...
Secure XML API Integration Guide - Periodic and Triggered add in
Secure XML API Integration Guide - Periodic and Triggered add in Document Control This is a control document DESCRIPTION Secure XML API Integration Guide - Periodic and Triggered add in CREATION DATE 15/05/2009
SecureStore I.CA. User manual. Version 2.16 and higher
User manual Version 2.16 and higher Contents SecureStore I.CA 1. INTRODUCTION...3 2. ACCESS DATA FOR THE CARD...3 2.1 Card initialisation...3 3. MAIN SCREEN...4 4. DISPLAYING INFORMATION ABOUT THE PAIR
Semantic based Web Application Firewall (SWAF V 1.6) Operations and User Manual. Document Version 1.0
Semantic based Web Application Firewall (SWAF V 1.6) Operations and User Manual Document Version 1.0 Table of Contents 1 SWAF... 4 1.1 SWAF Features... 4 2 Operations and User Manual... 7 2.1 SWAF Administrator
Security Goals Services
1 2 Lecture #8 2008 Freedom from danger, risk, etc.; safety. Something that secures or makes safe; protection; defense. Precautions taken to guard against crime, attack, sabotage, espionage, etc. An assurance;
2014 IBM Corporation
2014 IBM Corporation This is the 27 th Q&A event prepared by the IBM License Metric Tool Central Team (ICT) Currently we focus on version 9.x of IBM License Metric Tool (ILMT) The content of today s session
www.novell.com/documentation Policy Guide Access Manager 3.1 SP5 January 2013
www.novell.com/documentation Policy Guide Access Manager 3.1 SP5 January 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this documentation,
MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE
WHITE PAPER MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE 1. OVERVIEW Do you want to design a file transfer process that is secure? Or one that is compliant? Of course, the answer is both. But it s
The BritNed Explicit Auction Management System. Kingdom Web Services Interfaces
The BritNed Explicit Auction Management System Kingdom Web Services Interfaces Version 5.1 November 2014 Contents 1. PREFACE... 6 1.1. Purpose of the Document... 6 1.2. Document Organization... 6 2. Web
The basic groups of components are described below. Fig X- 1 shows the relationship between components on a network.
Elements of Email Email Components There are a number of software components used to produce, send and transfer email. These components can be broken down as clients or servers, although some components
PHIN MS Detailed Security Design
The Public Health Information Network Messaging System (PHINMS) sends and receives sensitive data over the internet to the public health information systems using Electronic Business Extensible Markup
1 Proposed model for trademark claims. 2 Details of the proposed model
This document has been prepared by ARI Registry Services in consultation with Neustar, Verisign and Demand Media. This document has also been reviewed by the TMCH-Tech working group and is now offered
[SMO-SFO-ICO-PE-046-GU-
Presentation This module contains all the SSL definitions. See also the SSL Security Guidance Introduction The package SSL is a static library which implements an API to use the dynamic SSL library. It
SolarWinds Technical Reference
SolarWinds Technical Reference Using SSL Certificates in Web Help Desk Introduction... 1 How WHD Uses SSL... 1 Setting WHD to use HTTPS... 1 Enabling HTTPS and Initializing the Java Keystore... 1 Keys
Chapter 4 Virtual Private Networking
Chapter 4 Virtual Private Networking This chapter describes how to use the virtual private networking (VPN) features of the FVL328 Firewall. VPN tunnels provide secure, encrypted communications between
Guide for Securing E-mail With WISeKey CertifyID Personal Digital Certificate (Personal eid)
The World Internet Security Company Solutions for Security Guide for Securing E-mail With WISeKey CertifyID Personal Digital Certificate (Personal eid) Wherever Security relies on Identity, WISeKey has
HMRC Secure Electronic Transfer (SET)
HM Revenue & Customs HMRC Secure Electronic Transfer (SET) Installation and key renewal overview Version 3.0 Contents Welcome to HMRC SET 1 What will you need to use HMRC SET? 2 HMRC SET high level diagram
DIGITAL SIGNATURE FOR EANCOM MESSAGES
Digital Signatures for EACOM Messages DIGITAL SIGATURE FOR EACOM MESSAGES GS1 Implementation Guidelines EACOM TDT DOCUMET v1.0 Page 1 Digital Signatures for EACOM Messages TABLE OF COTETS 1 Introduction...
Foreign Account Tax Compliance Act (FATCA) Foreign Account Tax Compliance Act (FATCA) FATCA Reports
Foreign Account Tax Compliance Act (FATCA) August 2015 Foreign Account Tax Compliance Act (FATCA) FATCA Reports International Compliance Management Model (ICMM) Notifications User Guide FATCA Reports Foreign
ETSI TS 102 778 V1.1.1 (2009-04) Technical Specification
TS 102 778 V1.1.1 (2009-04) Technical Specification Electronic Signatures and Infrastructures (ESI); PDF Advanced Electronic Signature Profiles; CMS Profile based on ISO 32000-1 2 TS 102 778 V1.1.1 (2009-04)
How to configure SSL proxying in Zorp 3 F5
How to configure SSL proxying in Zorp 3 F5 June 14, 2013 This tutorial describes how to configure Zorp to proxy SSL traffic Copyright 1996-2013 BalaBit IT Security Ltd. Table of Contents 1. Preface...
Security and Security Certificates for OpenADR systems. Background. Content:
Security and Security Certificates for OpenADR systems Content: Background... 1 Setup for OpenADR... 2 Test-, Evaluation-, and Production Certificates... 3 Responsibilities... 3 Certificate Requesting
Enabling Single-Sign-On between IBM Cognos 8 BI and IBM WebSphere Portal
Guideline Enabling Single-Sign-On between IBM Cognos 8 BI and IBM WebSphere Portal Product(s): IBM Cognos 8 BI Area of Interest: Security Copyright Copyright 2008 Cognos ULC (formerly Cognos Incorporated).
Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference
Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise
Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified
Standard: Data Security Standard (DSS) Requirement: 6.6 Date: February 2008 Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified Release date: 2008-04-15 General PCI
Feature and Technical
BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 4 Feature and Technical Overview Published: 2013-11-07 SWD-20131107160132924 Contents 1 Document revision history...6 2 What's
Securing your Microsoft Internet Information Services (MS IIS) Web Server with a thawte Digital Certificate thawte thawte thawte thawte thawte 10.
Securing your Microsoft Internet Information Services (MS IIS) Web Server with a thawte Digital Certificate A STEP-BY-STEP GUIDE to test, install and use a thawte Digital Certificate on your MS IIS Web
IBM SPSS Collaboration and Deployment Services Version 6 Release 0. Single Sign-On Services Developer's Guide
IBM SPSS Collaboration and Deployment Services Version 6 Release 0 Single Sign-On Services Developer's Guide Note Before using this information and the product it supports, read the information in Notices
What Are Certificates?
The Essentials Series: Code-Signing Certificates What Are Certificates? sponsored by by Don Jones W hat Are Certificates?... 1 Digital Certificates and Asymmetric Encryption... 1 Certificates as a Form
Secure Authentication and Session. State Management for Web Services
Lehman 0 Secure Authentication and Session State Management for Web Services Clay Lehman CSC 499: Honors Thesis Supervised by: Dr. R. Michael Young Lehman 1 1. Introduction Web services are a relatively
