Issues in Smart Card Development
|
|
|
- Silvester Lindsey
- 10 years ago
- Views:
Transcription
1 Middleware Issues in Smart Card Development Simplifying Smart Card Access under Windows a White Paper Abstract In todays business environment there is an increased awarness of security, which is driving smart card application development. The Microsoft Windows operating systems are ubiqutious in this enviroment and some of these operating systems ship with difficult to use base components with for hooks for smart cards. CardLogix has developed an alternative middleware solution to this problem. The CardLogix Winplex API works across all win32 environments. It is easier to develop with, more cost effective and still maintains a complete level of compatiblity within the Microsoft architecture.
2 CONTENTS INTRODUCTION...1 MICROSOFT SMART CARD API...2 WINPLEX API...3 CONCLUSION...4 ADDITIONAL REFERENCES...5 Resources 5 Documents CardLogix Corporation All rights Reserved This document contains information that represents the present view of CardLogix Corporation on the issues discussed as of the date of publication. Because CardLogix must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Cardlogix, and CardLogix cannot guarantee the accuracy of any information presented after the date of publication. This White Paper is for informational purposes only. CARDLOGIX MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. Winplex is a registered trademark of CardLogix Corporation in the United States and/or other countries. Other product or company names mentioned herein may be the trademarks of their respective owners. CardLogix Corporation 16 Hughes Irvine, CA USA
3 INTRODUCTION As smart cards are becoming more common, they are being used in more and more applications. Unfortunately, the task of actually building a Windows application that uses a smart card can be quite daunting. If a programmer chooses to work with the base level Microsoft smart card components, they will requires the programmer to have a great deal of knowledge of the Microsoft APIs, limit the types of cards the programmer can choose to use, and add unnecessary complexity for the programmer. CardLogix has developed the Winplex API as an alternative to the Microsoft approach for developing smart card applications under Windows. This API simplifies and speeds smart card access while maintaining support for the Microsoft API. The CardLogix approach also supports third party developer tools such as Borland's Delphi programming language. 1 Issues in Smart Card Development White Paper
4 MICROSOFT SMART CARD API Microsoft has defined an API for using smart cards in its operating systems (Windows, 98, 2000, NT, ME, and XP professional) that is based on the Personal Computer/Smart Card (PC/SC) specification (see This interface is quite complex and can be difficult for both experienced and novice programmers. The API (called Scard) requires the programmer to be familiar with the Microsoft Platform Software Development Kit (SDK). The Platform SDK is not a familiar tool to most mainstream programmers and is available only through the Microsoft Developer Network (MSDN) or the Microsoft website. To use the Microsoft API, the programmer must learn things like the name of the reader (instead of the COM port to which it is attached) and the name of the card. Before the programmer can access the card, they must first establish a context with the Scard manager. They must then get a handle to the card. It is only at this point that they can actually access the card to read/write data. Once the programmer is done with the card, they must release the handle to the card and release the context. The PC/SC specification only defines support for microprocessor cards. For many applications, the use of a microprocessor card is overkill and not cost effective. Also, the PC/SC defined commands represent only a small subset of the commands most smart cards actually support, so special commands (i.e. support for a purse) are only possible by the application developer building their own as Application Protocol Data Units (or APDUs) and sending those down to the card. This requires the programmer to have a detailed understanding of APDU structures and the command specification for the card being supported. If the programmer wants to change to a different card, the APDUs will most likely change requiring more work by the programmer. When deploying an actual system in a real world environment, the Microsoft API presents some issues. Because of the large number of Windows Operating Systems (95, 98, 2000, NT, ME, XP) and their various flavors and patches, the native operating system support for Scard may be missing or out of date. The installation program for the developed application must be very intelligent to determine what drivers are loaded, their version numbers, what drivers are missing, and then install only the appropriate components. 2 Issues in Smart Card Development White Paper
5 WINPLEX API The Winplex API from CardLogix addresses the complexities and deficiencies of the Scard API. Winplex presents a very simple interface to the programmer and has a very rich command set. To add support for an existing application, all the programmer must do is add the appropriate header file and library file (in the case of a C program) or include the proper.bas file (in the case of the Visual Basic program). Having added these files, talking to the card is simply a matter of opening the reader, reading/writing to the card, and closing the reader. Winplex uses the familiar COM port interface for connecting to a reader. It does not depend on things such as reader names and card names. Winplex also supports the full line of CardLogix cards and their commands. This allows the programmer to choose on a card type that best fits their application. For those applications that require little storage and little or no security, a memory card may do the trick. Winplex will support all the features of the selected card. If the card requires more memory or more complex features such as on-board encryption, authentication, or password protection, a CardLogix microprocessor card is the better choice (again, completely supported by Winplex). If the programmer wants to use CardLogix s advanced purse features, Winplex simplifies this task. The Winplex API also supports custom commands for specific readers that PC/SC does not, such as LED indicator control, pin-pad reading, mag-stripe reading, reader card latching, and biometric commands. It also includes simple to execute software encryption/decryption routines for DES, triple-des, and AES. These algorithms allow the programmer to easily encrypt/decrypt data that is stored on any type of card without the need for developing complex mathematical routines, or developing with additional APIs. Winplex has also been designed to be fully compatible with the Scard API. A special reader type has been defined in the Winplex OpenReader command that allows the programmer to specify the exact reader they want or to let Winplex use the first reader it determines is connected to the system. The second alternative allows the programmer to build and deploy their application without having to worry about the reader they ship. If the shipped reader changes, the application will still use the first reader found, ignoring the fact that the actual reader name has changed. Additionally, Winplex simplifies application installation and customer support. The installation program for the end user application only needs to install the Winplex.dll in the appropriate system directory. It does not need to be concerned with the version of Windows or the presence/non-presence of the Scard DLLs and libraries. 3 Issues in Smart Card Development White Paper
6 CONCLUSION Microsoft has developed a complex smart card API for some of their Windows Operating Systems. This complexity, and the fact that the Scard API only supports microprocessor cards, makes it difficult to use and limits the card choices for the programmer and their issuer. To overcome these deficiencies, CardLogix has developed the Winplex API. Winplex simplifies the interface for the programmer, adds support for non-microprocessor cards, takes advantage of reader specific functions and increases the native command set for cards. It does all of these things while maintaining a PC/SC compatible interface for those customers that require PC/SC. 4 Issues in Smart Card Development White Paper
7 ADDITIONAL REFERENCES Resources CardLogix Corporation Smart Card Basics Microsoft Test Certificate Server: Documents Microsoft CryptoAPI and other public-key technologies: 5 Issues in Smart Card Development White Paper
Introducing etoken. What is etoken?
Introducing etoken Nirit Bear September 2002 What is etoken? Small & portable reader-less Smartcard Standard USB connectivity Logical and physical protection Tamper evident (vs. tamper proof) Water resistant
Smart Card Two Factor Authentication
January 2013 Page 1 Smart Card Two Factor Authentication The combination of a smart card and PIN provides Two-Factor Authentication, where two items are needed: something physical the user has (a smart
Microsoft Identity Lifecycle Manager & Gemalto.NET Solutions. Jan 23 rd, 2007
Microsoft Identity Lifecycle Manager & Gemalto.NET Solutions Jan 23 rd, 2007 Microsoft ILM is a comprehensive, integrated, identity and access solution within the Microsoft system architecture. It includes
Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates. September 2006
Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates September 2006 Copyright 2006 Entrust. All rights reserved. www.entrust.com Entrust is a registered trademark
Building Applications Using Micro Focus COBOL
Building Applications Using Micro Focus COBOL Abstract If you look through the Micro Focus COBOL documentation, you will see many different executable file types referenced: int, gnt, exe, dll and others.
Smart Card Application Development Using Java
Uwe Hansmann Martin S. Nicklous Thomas Schack Frank Seliger Smart Card Application Development Using Java With 98 Figures, 16 Tables and a Multi Function Smart Card Springer Table of Contents Preface 1
Windows Embedded Security and Surveillance Solutions
Windows Embedded Security and Surveillance Solutions Windows Embedded 2010 Page 1 Copyright The information contained in this document represents the current view of Microsoft Corporation on the issues
CardWerk SmartCard API (Professional)
auth: Marc Jacquinot date: 02JAN2012 CardWerk Technologies 50 Barrett Parkway, Suite 3005 #412 Marietta, GA 30066 USA [email protected] www.smartcard-api.com CardWerk SmartCard API (Professional)
Application Note Gemalto.NET 2.0 Smart Card Certificate Enrollment using Microsoft Certificate Services on Windows 2008
7 Application Note Gemalto.NET 2.0 Smart Card Certificate Enrollment using Microsoft Certificate Services on Windows 2008 All information herein is either public information or is the property of and owned
Citrix MetaFrame XP Security Standards and Deployment Scenarios
Citrix MetaFrame XP Security Standards and Deployment Scenarios Including Common Criteria Information MetaFrame XP Server for Windows with Feature Release 3 Citrix Systems, Inc. Information in this document
etrust Audit Using the Recorder for Check Point FireWall-1 1.5
etrust Audit Using the Recorder for Check Point FireWall-1 1.5 This documentation and related computer software program (hereinafter referred to as the Documentation ) is for the end user s informational
Mobile App Containers: Product Or Feature?
ANALYST BRIEF Mobile App Containers: Product Or Feature? APPLE AND SAMSUNG HAVE TAKEN BIG STEPS WITH CONTAINERIZATION Author Andrew Braunberg Overview Secure workspaces, or containers, used for isolating
Virtual Machine Encryption Basics
VMWARE TECHNICAL NOTE VMware ACE Virtual Machine Encryption Basics VMware ACE gives administrators the option of enhancing the security of virtual machines they distribute to end users by encrypting key
Title Page. Reflex USB v2. Reader Installation Guide
Title Page Reflex USB v2 Reader Installation Guide 1 2 Copyrights and Trademarks Trademarks Schlumberger, Cryptoflex, Cyberflex, Cyberflex Access, and e-gate are trademarks or registered trademarks of
Secure USB Flash Drive. Biometric & Professional Drives
Secure USB Flash Drive Biometric & Professional Drives I. CONTENTS II. INTRODUCTION... 2 OVERVIEW... 2 COPYRIGHTS AND TRADEMARKS... 2 III. SECURE FLASH DRIVE... 3 DESCRIPTION... 3 IV. MODULES OF SECURE
SUPPORT GUIDE FOR. NOKIA MODEM DRIVER AND DIAL-UP for the Nokia 610. Copyright Nokia. All rights reserved Issue 0.4
SUPPORT GUIDE FOR NOKIA MODEM DRIVER AND DIAL-UP for the Nokia 610 Copyright Nokia. All rights reserved Issue 0.4 Contents 1. INTRODUCTION...1 2. SYSTEM REQUIREMENTS...1 3. INSTALLING THE NOKIA 610 MODEM
Secure Data Exchange Solution
Secure Data Exchange Solution I. CONTENTS I. CONTENTS... 1 II. INTRODUCTION... 2 OVERVIEW... 2 COPYRIGHTS AND TRADEMARKS... 2 III. SECURE DOCUMENT EXCHANGE SOLUTIONS... 3 INTRODUCTION... 3 Certificates
Global eid Developments. Detlef Eckert Chief Security Advisor Microsoft Europe, Middle East, and Africa
Global eid Developments Detlef Eckert Chief Security Advisor Microsoft Europe, Middle East, and Africa Agenda Country View on eid initiatives Trustworthy Identity Scenarios Microsoft eid update Summary
How to Configure Informix Connect and ODBC
Informix User Forum 2005 Moving Forward With Informix How to Configure Informix Connect and ODBC James Edmiston Informix DBA Consultant Quest Information Systems, Inc. Atlanta, Georgia December 8-9, 2005
AllJoyn Android Environment Setup Guide
80-BA001-2 Rev. A June 21, 2011 Submit technical questions at: http:///forums The information contained in this document is licensed under a Creative Commons Attribution-ShareAlike 3.0 Unported License;
X.509 Certificate Generator User Manual
X.509 Certificate Generator User Manual Introduction X.509 Certificate Generator is a tool that allows you to generate digital certificates in PFX format, on Microsoft Certificate Store or directly on
Smart Card Evolution
Smart Card Evolution Fernando Ferreira Departamento de Informática, Universidade do Minho 4710-057 Braga, Portugal [email protected] Abstract. This comunnication describes the state of
FTP Client Engine Library for Visual dbase. Programmer's Manual
FTP Client Engine Library for Visual dbase Programmer's Manual (FCE4DB) Version 3.3 May 6, 2014 This software is provided as-is. There are no warranties, expressed or implied. MarshallSoft Computing, Inc.
CA Repository for Distributed. Systems r2.3. Benefits. Overview. The CA Advantage
PRODUCT BRIEF: CA REPOSITORY FOR DISTRIBUTED SYSTEMS r2.3 CA Repository for Distributed Systems r2.3 CA REPOSITORY FOR DISTRIBUTED SYSTEMS IS A POWERFUL METADATA MANAGEMENT TOOL THAT HELPS ORGANIZATIONS
IBM Client Security Solutions. Client Security User's Guide
IBM Client Security Solutions Client Security User's Guide December 1999 1 Before using this information and the product it supports, be sure to read Appendix B - Notices and Trademarks, on page 22. First
Network FAX Driver. Operation Guide
Network FAX Driver Operation Guide About this Operation Guide This Operation Guide explains the settings for the Network FAX driver as well as the procedures that are required in order to use the Network
Parallels Mac Management v4.0
Parallels Mac Management v4.0 Deployment Guide July 18, 2015 Copyright 1999 2015 Parallels IP Holdings GmbH and its affiliates. All rights reserved. All other marks and names mentioned herein may be trademarks
Configuring and Monitoring Bluecoat AntiVirus
Configuring and Monitoring Bluecoat AntiVirus eg Enterprise v5.6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this
Whitepaper: Manage Access Control for Network Resources with Securitay s Security Policy Manager
Whitepaper: Manage Access Control for Network Resources with Securitay s Security Policy Manager Introduction The past several years has seen an increase in the amount of attention paid to security management
MetaFrame Presentation Server Security Standards and Deployment Scenarios Including Common Criteria Information
MetaFrame Presentation Server Security Standards and Deployment Scenarios Including Common Criteria Information Citrix MetaFrame Presentation Server 4.0 for Windows Information in this document is subject
Programmabilty. Programmability in Microsoft Dynamics AX 2009. Microsoft Dynamics AX 2009. White Paper
Programmabilty Microsoft Dynamics AX 2009 Programmability in Microsoft Dynamics AX 2009 White Paper December 2008 Contents Introduction... 4 Scenarios... 4 The Presentation Layer... 4 Business Intelligence
Draft Middleware Specification. Version X.X MM/DD/YYYY
Draft Middleware Specification Version X.X MM/DD/YYYY Contents Contents... ii 1. Introduction... 1 1.2. Purpose... 1 1.3. Audience... 1 1.4. Document Scope... 1 1.5. Document Objectives... 1 1.6. Assumptions
CSI Software Development Kit Beginner s Guide Revision: 8/06
CSI Software Development Kit Beginner s Guide Revision: 8/06 Copyright 2002-2006 Campbell Scientific, Inc. CSI Software Development Kit Beginner s Guide Table of Contents PDF viewers note: These page
EXPLORING SMARTCARDS: AN INDEPENDENT LOOK TO TECHNOLOGIES AND MARKET
EXPLORING SMARTCARDS: AN INDEPENDENT LOOK TO TECHNOLOGIES AND MARKET Giuseppe Gippa Paternò [email protected] June 2008 WHO AM I Experienced architect Linux, Networking and Security Focused on Telcos
[email protected]
[email protected] Agenda Get Current Upgrade Plan Segment Current OS Upgrade To RTW RTW + 1 year Consumer Commercial Windows 8/8.1 Windows 7 Home Basic, Home Premium Windows 8/8.1 Pro Windows 7
Use of any trademarks in this report is not intended in any way to infringe upon the rights of the trademark holder.
2005 SURFnet bv and DFN-CERT Services GmbH. This report is the result of a cooperative effort of SURFnet and DFN-CERT Services GmbH, under subcontract by PRESECURE Consulting GmbH and is published under
Two Factor Authentication in SonicOS
Two Factor Authentication in SonicOS 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION indicates potential damage
IDGo 800 Minidriver for Windows. User Guide
IDGo 800 Minidriver for Windows User Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and keep the
What s New in Juniper s SSL VPN Version 6.0
What s New in Juniper s SSL VPN Version 6.0 This application note describes the new features available in Version 6.0 of the Secure Access SSL VPN products. This document assumes familiarity with the Juniper
Basic Exchange Setup Guide
Basic Exchange Setup Guide The following document and screenshots are provided for a single Microsoft Exchange Small Business Server 2003 or Exchange Server 2007 setup. These instructions are not provided
SUPPORT GUIDE FOR. NOKIA MODEM DRIVER AND DIAL-UP for the Nokia 810. Copyright Nokia. All rights reserved Issue 0.4
SUPPORT GUIDE FOR NOKIA MODEM DRIVER AND DIAL-UP for the Nokia 810 Copyright Nokia. All rights reserved Issue 0.4 Contents 1. INTRODUCTION...1 2. SYSTEM REQUIREMENTS...1 3. INSTALLING THE NOKIA 810 MODEM
Course Syllabus. Configuring and Troubleshooting Internet Information Services in Windows Server 2008. Key Data. Audience. At Course Completion
Key Data Product #: 3728 Course #: 6427A Number of Days: 3 Format: Instructor-Led Certification Exams: 70-643 This course syllabus should be used to determine whether the course is appropriate for the
Contact for more Information: http://www.dameware.com or http://www.dameware.com/products/vpat.asp
Date: 2/10/2003 Name of Product: Contact for more Information: http://www.dameware.com or http://www.dameware.com/products/vpat.asp Summary Table Criteria Supporting Features Remarks and explanations Section
APPLICATION PROGRAMMING INTERFACE
APPLICATION PROGRAMMING INTERFACE Advanced Card Systems Ltd. Website: www.acs.com.hk Email: [email protected] Table of Contents 1.0. Introduction... 4 2.0.... 5 2.1. Overview... 5 2.2. Communication Speed...
NVIDIA CUDA GETTING STARTED GUIDE FOR MICROSOFT WINDOWS
NVIDIA CUDA GETTING STARTED GUIDE FOR MICROSOFT WINDOWS DU-05349-001_v6.0 February 2014 Installation and Verification on TABLE OF CONTENTS Chapter 1. Introduction...1 1.1. System Requirements... 1 1.2.
An Esri White Paper June 2010 Tracking Server 10
An Esri White Paper June 2010 Tracking Server 10 Esri 380 New York St., Redlands, CA 92373-8100 USA TEL 909-793-2853 FAX 909-793-5953 E-MAIL [email protected] WEB www.esri.com Copyright 2010 Esri All rights
Resco Mobile CRM Security
Resco Mobile CRM Security Out-of-the-box Security 1. Overview The Resco Mobile CRM application (client) communicates directly with the Dynamics CRM server. The communication uses standard Dynamic CRM Web
Statement of Direction
Mobile First: Taking Mobile CRM to the Next Level 1 January 2013 Mobile First: Taking Mobile CRM to the Next Level Whitepaper Mobile First: Taking Mobile CRM to the Next Level 2 Table of Contents Notes...
Citrix Systems, Inc.
Citrix Systems, Inc. Notice The information in this publication is subject to change without notice. THIS PUBLICATION IS PROVIDED AS IS WITHOUT WARRANTIES OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING ANY
Preliminary Course Syllabus
Preliminary Course Syllabus Designing Security for Microsoft SQL Server 2005 Elements of this syllabus are subject to change. Key Data Product #: 1917 Course #: 2787A Number of Days: 2 Format: Instructor-Led
Active Directory Rights Management Services integration (AD RMS)
MOSS Information Rights Management Ashish Bahuguna [email protected] Active Directory Rights Management Services integration (AD RMS) Agenda AD RMS Overview AD RMS Architecture Components MOSS
Client Monitoring with Microsoft System Center Operations Manager 2007
Client Monitoring with Microsoft System Center Operations Manager 2007 Microsoft Corporation Published: December 18, 2006 Updated: December 18, 2006 Executive Summary Client monitoring is a new feature
Oracle9i Application Server: Options for Running Active Server Pages. An Oracle White Paper July 2001
Oracle9i Application Server: Options for Running Active Server Pages An Oracle White Paper July 2001 Oracle9i Application Server: Options for Running Active Server Pages PROBLEM SUMMARY...3 INTRODUCTION...3
Smart Card Deployment in the Data Center: Best Practices for Integrating Smart Card Authentication in a Secure KVM Environment
Smart Card Deployment in the Data Center: Best Practices for Integrating Smart Card Authentication in a Secure KVM Environment 2009, Raritan Inc. Executive Summary While many organizations have employed
BYOD Guidance: BlackBerry Secure Work Space
GOV.UK Guidance BYOD Guidance: BlackBerry Secure Work Space Published 17 February 2015 Contents 1. About this guidance 2. Summary of key risks 3. Secure Work Space components 4. Technical assessment 5.
Windows Server Virtualization An Overview
Microsoft Corporation Published: May 2006 Abstract Today s business climate is more challenging than ever and businesses are under constant pressure to lower costs while improving overall operational efficiency.
F O U N D A T I O N. Using OPC via DCOM with Microsoft Windows XP Service Pack 2. Karl-Heinz Deiretsbacher, Siemens AG
Using OPC via DCOM with Karl-Heinz Deiretsbacher, Siemens AG Jim Luth, ICONICS, Inc. OPC Foundation Technical Director Rashesh Mody, Invensys/Wonderware OPC Foundation Chief Architect Abstract The major
Load Manager Administrator s Guide For other guides in this document set, go to the Document Center
Load Manager Administrator s Guide For other guides in this document set, go to the Document Center Load Manager for Citrix Presentation Server Citrix Presentation Server 4.5 for Windows Citrix Access
MAS 200. MAS 200 for SQL Server Introduction and Overview
MAS 200 MAS 200 for SQL Server Introduction and Overview March 2005 1 TABLE OF CONTENTS Introduction... 3 Business Applications and Appropriate Technology... 3 Industry Standard...3 Rapid Deployment...4
Out n About! for Outlook Electronic In/Out Status Board. Administrators Guide. Version 3.x
Out n About! for Outlook Electronic In/Out Status Board Administrators Guide Version 3.x Contents Introduction... 1 Welcome... 1 Administration... 1 System Design... 1 Installation... 3 System Requirements...
EMC DATA DOMAIN ENCRYPTION A Detailed Review
White Paper EMC DATA DOMAIN ENCRYPTION A Detailed Review Abstract The proliferation of publicized data loss, coupled with new governance and compliance regulations, is driving the need for customers to
Smart Card Setup Guide
Smart Card Setup Guide K Apple Computer, Inc. 2006 Apple Computer, Inc. All rights reserved. Under the copyright laws, this manual may not be copied, in whole or in part, without the written consent of
Key Benefits of Microsoft Visual Studio 2008
Key Benefits of Microsoft Visual Studio 2008 White Paper December 2007 For the latest information, please see www.microsoft.com/vstudio The information contained in this document represents the current
Document Capture and Distribution
Document Capture and Distribution WHITE PAPER SmarThru TM Workflow 2 Document Capture and Distribution Introduction This white paper describes the design and the features used by the Samsung SmarThru TM
Python for Series 60 Platform
F O R U M N O K I A Getting Started with Python for Series 60 Platform Version 1.2; September 28, 2005 Python for Series 60 Platform Copyright 2005 Nokia Corporation. All rights reserved. Nokia and Nokia
WHITE PAPER. Smart Card Authentication for J2EE Applications Using Vintela SSO for Java (VSJ)
WHITE PAPER Smart Card Authentication for J2EE Applications Using Vintela SSO for Java (VSJ) SEPTEMBER 2004 Overview Password-based authentication is weak and smart cards offer a way to address this weakness,
Netop Remote Control Security Server
A d m i n i s t r a t i o n Netop Remote Control Security Server Product Whitepaper ABSTRACT Security is an important factor when choosing a remote support solution for any enterprise. Gone are the days
Ensuring the security of your mobile business intelligence
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
Basic Exchange Setup Guide
Basic Exchange Setup Guide The following document and screenshots are provided for a single Microsoft Exchange Small Business Server 2003 or Exchange Server 2007 setup. These instructions are not provided
BarTender Integration Methods. Integrating BarTender s Printing and Design Functionality with Your Custom Application WHITE PAPER
BarTender Integration Methods Integrating BarTender s Printing and Design Functionality with Your Custom Application WHITE PAPER Contents Introduction 3 Integrating with External Data 4 Importing Data
Windows Authentication on Microsoft SQL Server
Windows Authentication on Microsoft SQL Server Introduction Microsoft SQL Server offers two types of security authentication: SQL Server authentication and Windows authentication. SQL Server authentication
Overview. Business value
PRODUCT SHEET CA VM:Backup for z/vm CA VM:Backup for z/vm CA VM:Backup for z/vm (CA VM:Backup) provides an efficient and reliable means of backing up CMS and non-cms data in z/vm and mainframe Linux systems.
WHITE PAPER ENTRUST ENTELLIGENCE SECURITY PROVIDER 7.0 FOR WINDOWS PRODUCT OVERVIEW. Entrust 2003. All rights reserved.
WHITE PAPER ENTRUST ENTELLIGENCE SECURITY PROVIDER 7.0 FOR WINDOWS PRODUCT OVERVIEW Entrust 2003. All rights reserved. Entrust is a registered trademark of Entrust, Inc. in the United States and certain
Skynax. Mobility Management System. System Manual
Skynax Mobility Management System System Manual Intermec by Honeywell 6001 36th Ave. W. Everett, WA 98203 U.S.A. www.intermec.com The information contained herein is provided solely for the purpose of
73S1215F, 73S1217F Device Firmware Upgrade Host Driver/Application Development User s Guide April 27, 2009 Rev. 1.00 UG_12xxF_029
Simplifying System Integration TM 73S1215F, 73S1217F Device Firmware Upgrade Host Driver/Application Development User s Guide April 27, 2009 Rev. 1.00 UG_12xxF_029 73S1215, 73S1217F DFU Host Driver/Application
Moving to Multi-factor Authentication. Kevin Unthank
Moving to Multi-factor Authentication Kevin Unthank What is Authentication 3 steps of Access Control Identification: The entity makes claim to a particular Identity Authentication: The entity proves that
Configuring and Monitoring Citrix Branch Repeater
Configuring and Monitoring Citrix Branch Repeater eg Enterprise v5.6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of
RVS Seminar Deployment and Performance Analysis of JavaCards in a Heterogenous Environment. Carolin Latze University of Berne
RVS Seminar Deployment and Performance Analysis of JavaCards in a Heterogenous Environment Carolin Latze University of Berne Table of contents > Introduction Smartcards > Deployment Overview Linux Windows
Unicenter Remote Control r11
Data Sheet Unicenter Remote Control r11 Unicenter Remote Control TM is a highly reliable and secure application for controlling and supporting remote Windows and Linux systems. It delivers all of the features
Implementing and Supporting Microsoft Windows XP Professional
Implementing and Supporting Microsoft Windows XP Professional Key Data Course #: 2272C Number of Days: 5 Format: Instructor-led The purpose of this course is to address the implementation and desktop support
Smart Card Certificate Authentication with VMware View 4.5 and Above WHITE PAPER
Smart Card Certificate Authentication with VMware View 4.5 and Above WHITE PAPER Table of Contents.... About This Paper.... 3 Introduction... 3 Smart Card Overview.... 3 Getting Started... 4 Authenticating
Navigating Endpoint Encryption Technologies
Navigating Endpoint Encryption Technologies Whitepaper November 2010 THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL ERRORS AND TECHNICAL INACCURACIES. THE CONTENT IS
Deploying Adobe Acrobat Using Microsoft Windows Terminal Service ADOBE SYSTEMS INCORPORATED
bbc Deploying Adobe Acrobat Using Microsoft Windows Terminal Service Technical Note #5421 Version :Acrobat 5.0 ADOBE SYSTEMS INCORPORATED Corporate Headquarters 345 Park Avenue San Jose, CA 95110-2704
Sharpen your document and data security HP Security solutions for imaging and printing
Sharpen your document and data security HP Security solutions for imaging and printing Recognize hidden risks You know how valuable data is to your organization. But the more data you acquire and share,
EMC Celerra Version 5.6 Technical Primer: Public Key Infrastructure Support
EMC Celerra Version 5.6 Technical Primer: Public Key Infrastructure Support Technology Concepts and Business Considerations Abstract Encryption plays an increasingly important role in IT infrastructure
Windows Server 2003 Active Directory: Perspective
Mary I. Hubley, MaryAnn Richardson Technology Overview 25 September 2003 Windows Server 2003 Active Directory: Perspective Summary The Windows Server 2003 Active Directory lies at the core of the Windows
epass2003 User Guide V1.0 Feitian Technologies Co., Ltd. Website: www.ftsafe.com
epass2003 User Guide V1.0 Feitian Technologies Co., Ltd. Revision History: Date Revision Description June 2013 V1.0 Release of the first version i Software Developer s Agreement All Products of Feitian
GoldKey Product Info. Do not leave your Information Assets at risk Read On... Detailed Product Catalogue for GoldKey
GoldKey Product Info Detailed Product Catalogue for GoldKey Do not leave your Information Assets at risk Read On... GoldKey: Reinventing the Security Strategy The Changing Landscape of Data Security With
TFS ApplicationControl White Paper
White Paper Transparent, Encrypted Access to Networked Applications TFS Technology www.tfstech.com Table of Contents Overview 3 User Friendliness Saves Time 3 Enhanced Security Saves Worry 3 Software Componenets
Product Overview. Contents
Contents Product Overview Copyright 2002 - Xware AB. All rights reserved. xtrade is a registered trademark of Xware AB. Symphonia is a trademark of Orion Systems New Zealand Ltd. All rights reserved. 2
Deploying Adobe Acrobat Using Microsoft Windows Terminal Service ADOBE SYSTEMS INCORPORATED
bbc Deploying Adobe Acrobat Using Microsoft Windows Terminal Service Technical Note #5421 Version :Acrobat 5.0 ADOBE SYSTEMS INCORPORATED Corporate Headquarters 345 Park Avenue San Jose, CA 95110-2704
MBAM Self-Help Portals
MBAM Self-Help Portals Authoring a self-help portal workflow for BitLocker Recovery Using Microsoft BitLocker Administration and Monitoring (MBAM) Technical White Paper Published: September 2011 Priyaa
How to Time Stamp PDF and Microsoft Office 2010/2013 Documents with the Time Stamp Server
How to Time Stamp PDF and Microsoft Office 2010/2013 Documents with the Time Stamp Server Introduction Time stamping is an important mechanism for the long-term preservation of digital signatures, time
Nortel Networks, Inc. VPN Client Software (Software Version: 7_11.101) FIPS 140-2 Non-Proprietary Security Policy
Nortel Networks, Inc. VPN Client Software (Software Version: 7_11.101) FIPS 140-2 Non-Proprietary Security Policy Level 1 Validation Document Version 0.5 Prepared for: Prepared by: Nortel Networks, Inc.
Statement of Direction
Microsoft Dynamics NAV Statement of Direction Product strategy and roadmap for Microsoft Dynamics NAV Date: May 2012 www.microsoft.com/dynamics/nav Page 1 CONTENTS Welcome... 3 Overview of Microsoft Dynamics
