DEP Documentation DEP ATOS Worldline Security Officer Guide
|
|
|
- Camilla Lindsey
- 10 years ago
- Views:
Transcription
1 Haachtsesteenweg Brussels Belgium DEP Documentation DEP ATOS Worldline Security Officer Guide
2 ATOS Worldline - Technologies & Products Page: 2/31 Version Management Report Version Name(s) Date Comments TheSteamFactory 23/05/2000 First Draft TheSteamFactory 05/06/2000 Second Draft TheSteamFactory 04/10/2000 Third Draft TheSteamFactory 20/11/2000 Final Draft F. Demaertelaere 01/03/2001 Final version F. Demaertelaere 20/02/2003 Documentation Platform Independent F. Demaertelaere 31/07/2003 Update to new DEP PC AUX Program P.Stienon, P.Verbelen 21/04/2006 New disclaimer, review P.Stienon 29/08/2006 Merge of document Delivery Procedures 1.0(6) P.Stienon 27/03/2008 Take into account of the Fips140-2 validation, disclaimer, ATOS Atos Worldline N. Aboudagga, P. Stienon 01/04/2008 Update for FIPS certification P.VERBELEN 26/05/2008 Few typo corrections P.Stienon 20/06/2008 Idem, versions, number of DCCs P.Stienon 01/09/2008 Correction for alarm software Anna Papayan 16/02/2011 Information about DCS, KAWLs and hardware delivery report.
3 ATOS Worldline - Technologies & Products Page: 3/31 CONFIDENTIALITY The information in this document is confidential and shall not be disclosed to any third party in whole or in part without the prior written consent of Atos Worldline S.A./N.V. COPYRIGHT The information in this document is subject to change without notice and shall not be construed as a commitment by Atos Worldline S.A./N.V. The content of this document, including but not limited to trademarks, designs, logos, text, images, is the property of Atos Worldline S.A/N.V. and is protected by the Belgian Act of related to author s right and by the other applicable Acts. The contents of this document must not be reproduced in any form whatsoever, by or on behalf of third parties, without the prior written consent of Atos Worldline S.A./N.V. Except with respect to the limited license to download and print certain material from this document for non-commercial and personal use only, nothing contained in this document shall grant any license or right to use any of Atos Worldline S.A./N.V. s proprietary material. LEGAL DISCLAIMER While Atos Worldline S.A./N.V. has made every attempt to ensure that the information contained in this document is correct, Atos Worldline S.A./N.V. does not provide any legal or commercial warranty on the document that is described in this specification. The technology is thus provided as is without warranties of any kind, expressed or implied, included those of merchantability and fitness for a particular purpose. Atos Worldline S.A./N.V. does not warrant or assume any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, product or process disclosed. To the fullest extent permitted under applicable law, neither Atos Worldline S.A./N.V. nor its affiliates, directors, employees and agents shall be liable to any party for any damages that might result from the use of the technology as described in this document (including without limitation direct, indirect, incidental, special, consequential and punitive damages, lost profits). JURISDICTION AND APPLICABLE LAW These terms shall be governed by and construed in accordance with the laws of Belgium. You irrevocably consent to the jurisdiction of the courts located in Brussels for any action arising from or related to the use of this document. sa Atos Worldline nv Chaussée de Haecht 1442 Haachtsesteenweg B-1130 Bruxelles-Brussel - Belgium RPM-RPR Bruxelles-Brussel - TVA-BTW BE
4 ATOS Worldline - Technologies & Products Page: 4/31 1. TABLE OF CONTENTS 1. TABLE OF CONTENTS SCOPE OF THE DOCUMENT REFERENCES ATOS WORLDLINE ENVIRONMENT AUTHORITY LEVELS AND MODES OF OPERATION SET-UPS KAWL KEY SET-UP KBKS KEYS SET-UP DCCS AND MODES OF OPERATION CREATING BANKSYS DEFINITION LIST CREATE THE BKS SECRET SHARING DEFINITION LIST CREATE BKS CAPABILITY DEFINITION LIST CREATE BKS KEY DEFINITION LIST SAVE THE DEFINITION LISTS ON THE PC CREATING A NEW CUSTOMER CREATING CUSTOMER IDENTIFICATION CREATING BANKSYS AUTHORITY KEYS CREATING PRE-EXPIRED USERNAMES AND PASSWORDS CREATING KAWL KEY CREATING DCCS CREATION PROCESS Personalization of the Storage DCCs Customer and Cust_ID Mode Card type and number Card Parameters and Version Number Write the Storage DCC Personalization of the List DCCs List Init Number sets of cards Write the List DCCs Personalization of the DCSs Card type and number Write the Dual Control Storage DATABASE STORAGE APPLICATION SOFTWARE INTEGRITY AND CONFIDENTIALITY PROTECTION OF CONFIDENTIALITY FOR FIPS-CERTIFIED DEPS PROTECTION OF CONFIDENTIALITY FOR NON-FIPS DEPS DELIVERY DELIVERY HARDWARE... 21
5 ATOS Worldline - Technologies & Products Page: 5/ DEP Platform C-ZAM/DEP Xentissimo Cust_ID Pre-expired usernames & passwords KAWL key components DCC Smart cards Use DCC Personalisation System Labelling Delivery Documentation Hardware Delivery Report DELIVERY SOFTWARE DEP Software Handover Form Delivery Confirmation Document DELIVERY DOCUMENTATION MANAGEMENT ISSUES ANNEXES DELIVERY CONFIRMATION DOCUMENT DEP SOFTWARE HANDOVER FORM DEP HARDWARE DELIVERY REPORT... 31
6 ATOS Worldline - Technologies & Products Page: 6/31 2. SCOPE OF THE DOCUMENT This document provides an overview of all operations that have to be performed by the DEP Atos Worldline Security Officer (DEP AWL security officer) or by the Third Party s Security Officer to set-up and maintain a DEP Environment. The document describes how to create a new customer to be managed, together with the management of the KAWL key, the BKS Authority Keys, DEP Control Cards (DCCs) and Application Software integrity/confidentiality. It deals also with the delivery procedures that have to be followed to maintain security when distributing the DEP products.. This guide is especially intended for the DEP AWL Security Officer or the Third Party s Security Officer but could offer additional information to other audience REFERENCES This document contains references to other documents about the DEP. This paragraph gives a list of all the documents referred to: DEP PC-AUX Program User Manual DEP C-ZAM/DEP User Manual DEP Customer s Security Officer s Guide DEP Security Mechanisms DEP/T6 Owner s Manual DCC Personalisation System User Manual DEP General Architecture DEP/PCI Security Policy There are no references made to the following documents, but they could be useful to understand this document. DEP Introduction to DEP DEP Glossary
7 ATOS Worldline - Technologies & Products Page: 7/31 3. ATOS WORLDLINE ENVIRONMENT The DEP AWL Security Officer maintains the environment that is used for generating the deliveries. This environment is located at the Atos Worldline office. Only DEP AWL Security Officers are allowed to use this environment. The environment consists of: A PC connected to DEP ( not connected to any network), containing: o The DCC Personalisation System for the creation of DCCs and software signature, o The DEP Signing Tool to generate KAWLs, o Logbooks containing the created deliveries. A C-ZAM/PC, serving as a Smart Card Reader/Writer, A printer directly connected to the DEP/T6 via the COM port to print the KAWLs; The PC, C-ZAM/PC and printer are located in a secure room at the Atos Worldline security department.
8 ATOS Worldline - Technologies & Products Page: 8/31 4. AUTHORITY LEVELS AND MODES OF OPERATION 4.1. SET-UPS The DEP/PCI must be first configured from the Original Password State (initial state with the boot software) to the state DEP Application loaded. During this phase, the KAWL key will play an important role for software integrity checking. As described in the document DEP General Architecture, in the state DEP Application loaded, there are different Authority Levels. All the devices of a functional operational DEP Environment should be set to the Customer Authority Level. To increase the security and the manageability of the system, it is decided that every customer receives a unique KAWL key and a unique set of BKS Authority Keys. Because these keys are different/unique per customer, they can be given to the specific Customer s Security Officer without jeopardising the DEP Environment of other customers. The Customer s Security Officer can reload the C-ZAM/DEP and the DEP Platform on his own without any intervention by DEP AWL Security Officer. For more information about Authority Levels, refer to the document DEP General Architecture KAWL KEY SET-UP This key will be used by the Customer administrators to initialise the DEP/PCI. random generator KAWL Key for Customer A KAWL Key for Customer B KAWL Key for Customer C 4.3. KBKS KEYS SET-UP These keys are used at the application-loaded phase to personalize the DEP/PCI so that it can use the cryptographic functions.
9 ATOS Worldline - Technologies & Products Page: 9/31 INIT Authority Keys BKS Authority Keys for Customer A BKS Authority Keys for Customer B BKS Authority Keys for Customer C CUST Authority Keys Customer A CUST Authority Keys Customer B CUST Authority Customer C These 2 set-ups are the basis for the DEP AWL Security Officer operations DCCS AND MODES OF OPERATION A standard distribution of DCCs is defined. This package contains DCCs for the Test Mode of Operation and the Live Mode of Operation. The Customer Identification 0001 is used for the entire set of Test DCCs and the real Cust ID is used for the Live DCCs. All the delivered DCCs are at BKS Authority Level. The following DCCs are handed over to the Customer s Security Officer when the standard package is delivered: 2 DCC Storage with TEST mode of operation (CUST ID 0001) containing the KM_AUTH_BKS and the CAP_AUTH_CUST 2 virgin DCC Storage with TEST mode of operation (CUST ID 0001) 1 DCC List with TEST mode of operation (CUST ID 0001) containing the Atos Worldline Definition List (see paragraph 5 on page 11) 2 virgin Dual Control Storage with TEST mode of operation (CUST ID 0001) 2x2 DCC Storage with LIVE mode of operation containing the KM_AUTH_BKS and the CAP_AUTH_CUST 16 virgin DCC Storage with LIVE mode of operation 5 DCC List with LIVE mode of operation containing the Atos Worldline Definition List (see paragraph 5 on page 11) 10 virgin Dual Control Storage with LIVE mode of operation
10 ATOS Worldline - Technologies & Products Page: 10/31 The DCCs are PIN protected to avoid un-allowed access to the information on the DCCs. The DCCs given to the customer are protected by the PIN 1234, it is the responsibility of the Customer Security Officer to change this PIN. The DCCs with the KM_AUTH_BKS and CAP_AUTH_CUST contain sufficient information for the Customer s Security Officer to generate the CUST Authority Keys. Note that the DEP AWL Security Officer will not define the CUST Authority Keys. The Customer s Security Officer will define his own CUST Authority Keys. In this way he can be certain he is the only one knowing the secret values. More information on the creation of the CUST Authority Keys can be found in the document DEP Customer s Security Officer s Guide. The DCS are used for FIPS certified DEP/PCI and used to store the credentials of customer administrators and software-loading operators, KAWL components, and key parts for key reconstruction in DEP. Additional DCCs can be obtained on request. E.g. it could also be possible that the customer needs additional DCCs for storing keys and capabilities; although the Customer s Security Officer has received two identical DCC sets containing the necessary information to create the CUST Authority Keys, it could always be possible that the customer needs additional DCCs containing the BKS Authority Keys and the CUST Authority Capability (e.g. in case of defect)
11 ATOS Worldline - Technologies & Products Page: 11/31 5. CREATING BANKSYS DEFINITION LIST The banksys Definition Lists are the Definitions Lists at BKS Authority Level. They need to be generated before DCCs can be created. The creation of the Atos Worldline Definition Lists is done using the DEP PC-AUX Program. For a detailed description of how to use this program, refer to the DEP PC- AUX Program User Manual. The following Definition Lists must be created: BKS Secret Sharing Definition List BKS Capability Definition List BKS Key Definition List Of course, these Definition Lists should only be created when they do not exist yet CREATE THE BKS SECRET SHARING DEFINITION LIST Enter the following secret sharing scheme in the Secret Sharing Definition List (refer to the DEP PC-AUX Program User Manual) CREATE BKS CAPABILITY DEFINITION LIST Enter the following capability definitions in the Capability Definition List (refer to the DEP PC-AUX Program User Manual) CREATE BKS KEY DEFINITION LIST Enter the following key definitions in the Key Definition List (refer to the DEP PC- AUX Program User Manual).
12 ATOS Worldline - Technologies & Products Page: 12/31 NEW DEFINITION LIST FORMAT 5.4. SAVE THE DEFINITION LISTS ON THE PC When the Definition Lists are created they must be saved (refer to the DEP PC-AUX Program User Manual). Afterwards they are included (through a shortcut) in the DCC Personalisation System.
13 ATOS Worldline - Technologies & Products Page: 13/31 6. CREATING A NEW CUSTOMER As described in the document DEP Security Mechanisms, there are two alternative methods to bring the DEP Environment in BKS Authority Level: BKS Authority Keys are generated inside the C-ZAM/DEP BKS Authority Keys are generated by the DCC Personalisation System Creating a new customer is different between the two methods, especially for the creation of the DCCs and the management of the BKS Authority Keys. Because in practice only the latter alternative is used, the paragraphs below do not explain the use of the C-ZAM/DEP when creating a new customer CREATING CUSTOMER IDENTIFICATION Each customer has to be assigned a unique Customer Identification number (CUST ID), identifying the customer in the DEP Environment. A CUST ID is defined as a 2 byte hexadecimal value. To guarantee the uniqueness, it is necessary to keep a table with the names of the customers and their CUST ID. This table is managed in the DCC Personalisation System. This task has to be performed only once for each new customer. Remark that one CUST ID (0001) is dedicated to a Test Customer. This CUST ID is then used for setting up a test environment CREATING BANKSYS AUTHORITY KEYS For every customer, a unique set of BKS Authority Keys has to be defined. The DCC Personalisation System generates automatically new and random BKS Authority Keys when creating a new Customer (Identification). After the generation of the BKS Authority Keys, they will be saved in a passwordencrypted database and will remain under control of the DEP AWL Security Officer that possesses the password. This task has to be performed only once for every new customer. For more information, refer to the DCC Personalisation System User Manual.
14 ATOS Worldline - Technologies & Products Page: 14/ CREATING PRE-EXPIRED USERNAMES AND PASSWORDS The Security Officers in the security department of Atos Worldline have generated the pre-expired passwords and usernames for the customer administrators to be used as the initial authentication credentials for the FIPS certified DEP Platforms. These credentials are identical for all the customers. However, the DEP cannot perform any security operation, unless the pre-expired credentials have been changed by the Customer Administrator (crypto officers) of the customer CREATING KAWL KEY For every customer, a unique KAWL key has to be defined. The random KAWL key is generated in the DEP. The DEP Signing Tool is used for KAWL generation, which is running on PC directly connected to the DEP. After the generation, the KAWL keys are kept in the DEP memory and printed in two key components using the printer directly connected to the DEP/T6. Each customer administrator receives one KAWL component. This task has to be performed only once for every new customer. 7. CREATING DCCS DCCs can only be created for customers previously created and still available in the DCC Personalisation System. During the creation of the DCCs, different information should be delivered to the DCC Personalisation System: Indication whether a DCC List,a DCC Storage or a DCS is personalised The Mode of Operation is TST or LIV, depending on a test environment or live environment The destination customer is selected by its unique CUST ID as generated (see paragraph 6.1 on page 13) The total number of DCCs and DCSs, and (only for DCC Storage) how many DCCs need to be created with the BKS Authority Key and the CUST Authority Capability Optionally, a dedicated PIN code should be entered (PIN 1234 is used for all DCCs) The earlier created Atos Worldline Definition Lists (see paragraph 5 on page 11) implicitly used by the DCC Personalisation System
15 ATOS Worldline - Technologies & Products Page: 15/ CREATION PROCESS During the personalisation process of the DCC, the DCC Personalisation System writes all the necessary information to obtain the DCCs defined in paragraph 4.4 on page 9. The personalisation of DCCs is under control of the DEP AWL Security Officer that manages the password delivering access to the DCC Personalisation System. During personalisation, the DCCs are put at BKS Authority Level. This means that: The complete directory structure of the DCC is created (INIT BKS CUST), At INIT Authority Level, the keys IK and AK, and the PIN are stored. Three different DEP control cards are personalized: a DCC Storage, a DCC List and a DCS: DCC List: the lists with keys, capabilities and secret sharing schemes are stored on INIT Authority Level, DCC Storage: the KM_AUTH_BKS at INIT Authority Level and the CAP_AUTH_CUST are generated and stored at BKS Authority Level. DCS: only the file structure is created. No data is available except the CUST ID and the Mode of Operation Personalization of the Storage DCCs During the personalization of the DCCs Storage, the following parameters must be defined: Customer Cust_ID Mode Card type and number Card Parameters Version number Customer and Cust_ID The Customer and its CUST_ID selected by default is the first one in the database. Select the correct customer and Cust_ID needed. If the customer does not exist yet, create a new, unique, Cust_ID.
16 ATOS Worldline - Technologies & Products Page: 16/ Mode Select the correct mode needed. Following modes are available: LIV DEV TST Card type and number Select Storage and enter the number of cards that will be personalized with the KM_AUTH_BKS and CAP_AUTH_CUST. The total number of cards will increase at the same time Card Parameters and Version Number Pin Code: The Pin code for all the DCCs is 1234 ; the Pin code should be filled in manually. DCC ID: The DCC_ID is extracted from the database and automatically incremented with 1 hex. Version Nb: The version number equals Write the Storage DCC The application checks the data and after the confirmation of the DEP AWL Security Officer and the insertion of the First Storage DCC, the personalization will start. The DCC Personalisation System asks automatically for following DCCs to be inserted. Each Liv DCC Storage and its PIN is delivered in a separate secure envelope. The secure envelopes provide tamper evidence. The customer Security Officer can contact the Atos Worldline sales representative to obtain the identification numbers of the secure envelopes Personalization of the List DCCs During the personalization of the DCCs list, the following parameters must be defined: Customer Cust_ID Mode List Init Total number of cards Version number The Customer, Cust_ID, Mode and version number are handled in the same way as the personalization of the Storage DCCs.
17 ATOS Worldline - Technologies & Products Page: 17/ List Init Personalizing a DCC List, the List Init must be selected because every customer has his own Definition Lists. List Init indicates that the default Definition Lists containing the capabilities and Authority keys will be written at INIT Authority Level on the DCC card Number sets of cards For the DCC List, Nbr sets of cards are equal to 2. It indicates how many times the Security Officer wants to write the Definition Lists Write the List DCCs The application checks the data and after the confirmation of the Security Officer and the insertion of the First List DCC, the personalization will start. The DCC Personalisation System asks automatically for following DCCs to be inserted. For more information, refer to the DCC Personalisation System User Manual Personalization of the DCSs During the personalization of the DCSs, the following parameters must be defined: Customer Cust_ID Mode Card type and number Version number The Customer, Cust_ID, Mode and version number are handled in the same way as the personalization of the Storage DCCs Card type and number Select Dual Control Storage and enter the number of cards Write the Dual Control Storage The application checks the data and after the confirmation of the DEP AWL Security Officer and the insertion of DCS, the personalization will start. The DCC Personalisation System asks automatically for following DCSs to be inserted DATABASE STORAGE For each created DCC following information is stored (encrypted) in a database: Cust_ID Date of creation
18 ATOS Worldline - Technologies & Products Page: 18/31 Pin Code Mode Atos Worldline Authority Key For each customer, the Application Software is kept in the database. This database is kept on the stand alone PC and protected by a pass-phrase. The passphrase is required once during the following operations: To add, to delete or to edit a customer To change the pass-phrase, to compute a certificate (SAC) To decrypt a PIN To write a DCC. A logging is kept of all the personalised DCCs containing the personalisation date and time, the DCC ID, the CUST ID and the PIN code. There is a different logging for DCC List, DCC Storage and DCS. For more information, refer to the DCC Personalisation System User Manual.
19 ATOS Worldline - Technologies & Products Page: 19/31 8. APPLICATION SOFTWARE INTEGRITY AND CONFIDENTIALITY For every customer and every Application Software version, a Software Authentication Code needs to be calculated to guarantee the integrity of the Application Software and to identify the supplier. A Software Authentication Code is a Message Authentication Code calculated over the DEP Application Software 1. It is calculated by the DEP Atos Worldline Security Officer PROTECTION OF CONFIDENTIALITY FOR FIPS- CERTIFIED DEPS In addition, for FIPS certified DEP/PCI the KAWL secret is used for protection of confidentiality and authenticity of the DEP Application Software. The Application Software must be signed by the DEP AWL Security Officer, otherwise it will be rejected by the DEP. The KAWL key is unique for every customer, and thus the verification of the Software Authentication Code and the decryption of the Application Software are done by the DEP/PCI itself using the KAWL key. For this operation, the following information is needed: The Mode of Operation is TST or LIV, depending on a test environment or live environment The destination customer is selected together with its unique CUST ID as generated (see paragraph 6.1 on page 13) The clear-text Application Software The output is the encrypted Application Software and a Software Authentication Code File containing the Software Authentication Codes for the selected Application Software and the selected customer(s) PROTECTION OF CONFIDENTIALITY FOR NON-FIPS DEPS The Application Software is encrypted by the DEP AWL Security Officer to guarantee the confidentiality. 1 It is an AES256 CMAC evaluated on the DEP Application Software for FIPS-certified DEP Crypto Modules, and a SHA1 encrypted with the Banksys Authority Keys over the DEP Application Software for non-fips DEP Crypto Modules.
20 ATOS Worldline - Technologies & Products Page: 20/31 For non-fips DEP Crypto Modules only the DCC Personalisation System is able to generate encrypted Application Software and to calculate the Software Authentication Code. For this operation, the following information is needed: * The Mode of Operation is TST or LIV, depending on a test environment or live environment * The destination customer is selected together with its unique CUST ID as generated (see paragraph 6.1 on page 13) * The clear-text Application Software The output is the encrypted Application Software and a Software Authentication Code File containing the Software Authentication Codes for the selected Application Software and the selected customer(s). The BKS Authority Keys are used for both the decryption of the Application Software and the verification of the Software Authentication Code. For more information, refer to the DCC Personalisation System User Manual.
21 ATOS Worldline - Technologies & Products Page: 21/31 9. DELIVERY A DEP AWL Security Officer creates all deliveries. All deliveries are handed over to the Security Officer of the customer. The Cust_ID (Customer Identification Number) is communicated to the Customer Security Officer by the DEP technician (DEP TECH) during the first delivery DELIVERY HARDWARE A DEP technician always does the delivery. It consists of: Depending on the configuration: o A DEP Platform with at least one DEP Crypto Module, or o One or more DEP Crypto Modules, One or more C-ZAM/DEPs Xentissimo, A four digit Customer Identification number (Cust_ID), The following DCCs together with their PIN: o Test DCC Lists o Test DCC Storage o Liv DCC lists o Liv DCC Storage o Test DCSs o Liv DCSs 2 envelopes with the pre-expired usernames and passwords for the Customer Administrators, 2 envelopes with the KAWL key component with their corresponding key Check Values (key check of type NORM). All the envelopes with the pre-expired credentials and KAWL key components are delivered to the right recipients. It is the task of DEP marketing and sales (DEP MKT) to provide the DEP technician with the contact information head Security Officer of the customer. The customer can ask for the name of the DEP technician to his Atos Worldline sales representative. Atos Worldline DEP technicians always carry their identity card. This allows the customer to verify the identity of the person presenting himself as being the DEP technician DEP Platform A DEP Platform is a DEP/T6. For more information about DEP/T6 refer to the DEP/T6 Owner s Manual document. DEP Platforms are installed and configured by the DEP technician. The DEP technician can collect DEP Platforms at the DEP manufacturer site.
22 ATOS Worldline - Technologies & Products Page: 22/ C-ZAM/DEP Xentissimo The C-ZAM/DEP is delivered to the customer at NONE authority level. This means that there are no keys or capabilities loaded in it (except for the hard-coded INIT authority level keys that are the same for each customer). The DEP technician can order C-ZAM/DEPs at the Atos Worldline warehouse Cust_ID The DEP AWL Security Officer guarantees that the customer identification number Cust_ID is unique. This is done using the DCC Personalisation System (see the DCC Personalisation System User Manual). The DEP AWL Security Officer communicates the Cust_ID to the DEP technician Pre-expired usernames & passwords Each customer administrator receives independently his own pre-expired credentials in a secure way and in nominative sealed secure envelope KAWL key components Each component of the KAWL key is send to the adequate customer administrator via a secure way and a nominative sealed secure envelope. The special DMT tool is being used for printing the 2 KAWL components DCC The DCCs are packaged in a secured envelope together with the corresponding PIN codes. The secured envelope contains the reference of the destination Customer s Security Officer. This package is handed over to the Customer s Security Officer by a DEP technician Smart cards When receiving a request of a customer, the DEP AWL Security Officer can order empty Smart Cards (type: Bull CP8 Integrated Chip Cards (ICC) with the TB Operating System) at the Atos Worldline warehouse. These are standard Smart Cards, delivered by the Smart Card manufacturer, which did not go through any procedure yet Use DCC Personalisation System To convert the standard Smart Cards into the different DCCs that can be used in the DEP environment, the DCC Personalisation System is used. Only DEP AWL Security Officers are allowed to personalize the DCCs.
23 ATOS Worldline - Technologies & Products Page: 23/31 This tool performs the following actions: Bring the DCCs to the Banksys Authority level, Write the default Definition List on the DCCs. Detailed information regarding this tool can be found in the DCC Personalisation System User Manual Labelling For the Storage DCCs labels, following parameters are defined: Cust_ID: Customer identification. First STO: Number that is given to the first Storage DCC. The numbers for the following 3 DCCs are automatically incremented with 1. For the List DCCs labels, following parameters are defined: Cust_ID: Customer identification. First List: Number that is given to the first List DCC. The numbers for the second DCC is automatically incremented with 1. For the DCS labels, following parameters are defined: Cust_ID: Customer identification. First DCS: Number that is given to the first DCS. The numbers for the second DCS is automatically incremented with 1. Note: If the labels are created for Test Mode DCCs, the Cust_IDs are always 0001
24 ATOS Worldline - Technologies & Products Page: 24/31 Example of Live Storage label: DEP Control Card Example of Test Storage label: DEP Control Card Delivery Documentation When the DEP technician delivers the DEP system, the hardware delivery report should be signed by both the Customer and the DEP Technician Hardware Delivery Report A DEP Hardware Delivery Report document (see paragraph 11.3 on page 31) contains the following information: Client Name: name of the client, Customer ID: the Customer identification, Location/Site: location, Date and Time: the date and the time of the delivery, Item details o DEP/T6 Platform Serial Number: the serial number of the delivered DEP/T6, o DEP/T6 Platform Physical Key Serial Number: the serial number of physical key, o DEP/PCI Card NON-FIPS / FIPS: indicated if the DEP/T6 is FIPS-certified or NON-FIPS (strikeout the non-applicable option), TEST / LIVE: indicated the operation mode of the DEP/T6 (strikeout the non-applicable option), Internal Serial Number: internal serial number, External Serial Number: external serial number, o C-ZAM/DEP Serial Number: the serial number of C-ZAM-DEP, o # DCC: the number of DCCs, o # DCS: the number of DCSs,
25 ATOS Worldline - Technologies & Products Page: 25/31 Incidents & Remarks: information about the incidents and additional remarks, Persons present at the deployment Chain of Custody o Function: delivered by manufacturer hardware engineer and received by Customer, o Name: names of the Manufacturer Hardware Engineer and the Customer, o Signature: signatures of the Manufacturer Hardware Engineer and the Customer DELIVERY SOFTWARE The software delivery consists of: DEP Application Software Software Authentication Code Hand Over Form document Delivery Confirmation Document The role of the DEP AWL Security Officer is to guarantee the integrity (and confidentiality) of the Application Software. Once the Software Authentication Code is calculated (and the Application Software is encrypted), the DEP AWL Security Officer gives the right to distribute/deliver the Application Software to the corresponding customer. Before the Software Authentication Code File is transferred it has to be guaranteed that only the Software Authentication Codes for the dedicated customer are mentioned. Possibly other Software Authentication Codes must be deleted on the temporary copy. It is not necessarily the DEP AWL Security Officer that sends the (encrypted) Application Software and Software Authentication Code to the Customer Security Officer. The media for distributing the (encrypted) Application Software and the SAC is not defined. Different alternatives are possible: encrypted , CD Together with the DEP Application Software and the SAC, a Hand Over Form document (see paragraph 11.2) is delivered to formalise the delivery of the DEP Software. A Delivery Confirmation Document (see paragraph 11.1) is also forwarded to allow the customer to confirm the receipt of the delivery. When the customer receives the delivery, the customer should confirm the delivery by returning the Delivery Confirmation Document.
26 ATOS Worldline - Technologies & Products Page: 26/ DEP Software Handover Form A DEP Software Handover Form document (see paragraph 11.2 on page 30) contains the following information: Description o Software Name: name of the delivered software, o Date: finalization date of the software, o Project Leader: name of the Atos Worldline project leader, o Customer: name of the customer, o Short History: short history of the software, o Remarks: Additional remarks (optional) Acceptation Team o Release and Sub-Release Number tested: release and sub-release number that is tested, o Test Report: name of the Test Report, Software Details o Indicates if it is a Final or a Beta release, o Filename/Label: the file name of the software, o Version: software version, o File Date: Creation date of the software, o Size: Size of the software, o Support: How the software is delivered (e.g.cd-rom, ) Dependencies: o DEP PCI board: version number o Venus: version number o Alarm Software Version: version number o Boot Software Version: version number o Cloning Software Version: version number o DEP/NMS: version number o C-ZAM/DEP Version: version number Project and Team Leaders o Release Accepted: indicates if the current release accepted or no, o Replaces previous version: indicates if the previous version is replaced with the new one or no, o Date, o Names of the Project and Team leader.
27 ATOS Worldline - Technologies & Products Page: 27/ Delivery Confirmation Document A Delivery Confirmation document (see paragraph 11.1 on page 29) contains the following information: General information: general guidelines concerning the delivery. DEP Software information: Software name: name of the delivered Software including the version number. DEP Software Binary Name/Date: the file name and the delivery date of the Software. Document references: this is an overview of all DFS/ADD documentation, which is delivered. Delivery Confirmation: confirmation of the receipt of the software, DEP Software Hand Over Form and documentation with the above references. Signature Company: the name of the company, Date, Customer s Signature: customer signature DELIVERY DOCUMENTATION However, detailed information is available on the DEP and other Atos Worldline products from the following sources: The Atos Worldline internet site contains information on the full line of security products at In order to properly install the DEP/PCI, the ATOS Worldline administrators have to read the documents on the site of the DEP products: There are several documents as DEP Documents 1-1 DEP Document Overview (new version) 1-2 DEP Introduction to DEP 1-3 DEP General Architecture 1-4 DEP Glossary 2-1 DEP Host Interface Protocol 2-2 DEP DS3 and DS4 Principles 2-3 DEP Secret Sharing Mechanism 2-4 DEP Security Mechanisms 3-1 DEP/NT Host Interface Supervision User Manual 3-2 DEP/NT DEP Handler Supervision User Manual 3-3 C-ZAM/DEP User Manual 3-4 DEP PC-AUX Program User Manual 3-5 DEP Key Derivation Tool User Manual 3-6 DEP RSA Key Gen&Use Program User Manual 3-7 DEP RSA Key Loading Program User Manual (new version) 3-8 DEP/Linux User Manual 3-8 DEP/T6 Owner Manual
28 ATOS Worldline - Technologies & Products Page: 28/ DEP/NMS User Manual 3-8 DEP/EM User Manual 3-8 DEP/CTAP Certificate Generation User Manual 3-8 DEP/RSA Key Generation User Manual 3-8 DEP/RSA Key Import in Keytable Linux User Manual 3-8 DEP/NCR self-signed Certificate User Manual 3-8 STD Import Export Tool User Manual 4-1 DEP/NT Installation Guide 4-2 DEP Atos Worldline' Security Officer's Guide 4-3 DEP Customer's Security Officer's Guide 4-4 DEP Key Backup Conversion Guide 4-5 DEP Customer Host Programmers Guidelines 4-6 DEP Key Entry Guide 4-7 DEP QUICK load Guide 3-8 DEP/PCI Installation Guide 3-8 DEP Software Cloning Guide 4-10 DEP PKCS#11 User Guide 10. MANAGEMENT ISSUES Because the DCC Personalisation contains a lot of sensitive and important information, the necessary precautions must be taken to avoid leakage loss of sensitive information. Therefore it is important that the access to the DCC Personalisation System is limited and under control of the DEP AWL Security Officer. Regular backup of the database are important to avoid loss of information.
29 ATOS Worldline - Technologies & Products Page: 29/ ANNEXES DELIVERY CONFIRMATION DOCUMENT
30 ATOS Worldline - Technologies & Products Page: 30/ DEP SOFTWARE HANDOVER FORM
31 ATOS Worldline - Technologies & Products Page: 31/ DEP HARDWARE DELIVERY REPORT
DEP Documentation DEP Customer's Host Programmers Guidelines
Haachtsesteenweg 1442 1130 Brussels Belgium DEP Documentation DEP Customer's Host Programmers Guidelines Version: 04.01 Atos Worldline - Technology & Products / Engineering / DEP Page: 2/10 Version Management
DEP Documentation DEP/EM User Manual
Haachtsesteenweg 1442 1130 Brussels Belgium DEP Documentation DEP/EM User Manual Version: 04.00 Atos Worldline - Technology & Products / Engineering / DEP Page: 2/19 Version Management Report Version Name(s)
DEP Documentation DEP Glossary
Haachtsesteenweg 1442 1130 Brussels Belgium DEP Documentation DEP Glossary Version: 04.00 Atos Worldline - Technology & Products / Engineering / DEP Page: 2/29 Version Management Report Version Name(s)
DEP RSA Key Loading Program User Manual
Technologies & Products Haachtsesteenweg 1442 1130 Brussels Belgium DEP Documentation DEP RSA Key Loading Program User Manual Version: 03.04 banksys - Technologies & Products Page: 2/45 Version Management
RELEASE NOTES. Table of Contents. Scope of the Document. [Latest Official] ADYTON Release 2.12.9 - corrections. ADYTON Release 2.12.
Table of Contents Scope of the Document... 1 [Latest Official] ADYTON Release 2.12.9... 1 ADYTON Release 2.12.4... 1 ADYTON Release 2.9.3... 3 ADYTON Release 2.7.7... 3 ADYTON Release 2.6.2... 4 ADYTON
DIGIPASS CertiID. Getting Started 3.1.0
DIGIPASS CertiID Getting Started 3.1.0 Disclaimer Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis, without any other warranties, or conditions, express
Application Note Gemalto.NET 2.0 Smart Card Certificate Enrollment using Microsoft Certificate Services on Windows 2008
7 Application Note Gemalto.NET 2.0 Smart Card Certificate Enrollment using Microsoft Certificate Services on Windows 2008 All information herein is either public information or is the property of and owned
CA DLP. Release Notes for Advanced Encryption. r12.0
CA DLP Release Notes for Advanced Encryption r12.0 This documentation and any related computer software help programs (hereinafter referred to as the "Documentation") are for your informational purposes
SafeNet Cisco AnyConnect Client. Configuration Guide
SafeNet Cisco AnyConnect Client Configuration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and
Dell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0
Dell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0 May 2015 About this guide Prerequisites and requirements NetWeaver configuration Legal notices About
Application Note Gemalto Access Client for windows smart card and EFS on Microsoft Windows Vista
Application Note Gemalto Access Client for windows smart card and EFS on Microsoft Windows Vista [email protected] [email protected] November 2007 www.gemalto.com All information herein
SafeNet Authentication Service
SafeNet Authentication Service Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and keep
Dell One Identity Cloud Access Manager 8.0.1 - How to Develop OpenID Connect Apps
Dell One Identity Cloud Access Manager 8.0.1 - How to Develop OpenID Connect Apps May 2015 This guide includes: What is OAuth v2.0? What is OpenID Connect? Example: Providing OpenID Connect SSO to a Salesforce.com
RSA Two Factor Authentication. Feature Description
RSA Two Factor Authentication Feature Description VERSION: 3.0 UPDATED: SEPTEMBER 2015 Copyright Notices Copyright 2002 2015 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP
RSA Two Factor Authentication
RSA Two Factor Authentication VERSION: 1.0 UPDATED: MARCH 2014 Copyright 2002-2014 KEMP Technologies, Inc. All Rights Reserved. Page 1 / 16 Copyright Notices Copyright 2002-2014 KEMP Technologies, Inc..
Application Note. Gemalto s SA Server and OpenLDAP
Application Note Gemalto s SA Server and OpenLDAP ii Preface All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall
Check Point FDE integration with Digipass Key devices
INTEGRATION GUIDE Check Point FDE integration with Digipass Key devices 1 VASCO Data Security Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document
Dell Statistica 13.0. Statistica Enterprise Installation Instructions
Dell Statistica 13.0 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or
SecureDoc Disk Encryption Cryptographic Engine
SecureDoc Disk Encryption Cryptographic Engine FIPS 140-2 Non-Proprietary Security Policy Abstract: This document specifies Security Policy enforced by SecureDoc Cryptographic Engine compliant with the
Secure Installation and Operation of Your Xerox Multi-Function Device. Version 1.0 August 6, 2012
Secure Installation and Operation of Your Xerox Multi-Function Device Version 1.0 August 6, 2012 Secure Installation and Operation of Your Xerox Multi-Function Device Purpose and Audience This document
Dell One Identity Cloud Access Manager 8.0.1- How to Configure for High Availability
Dell One Identity Cloud Access Manager 8.0.1- How to Configure for High Availability May 2015 Cloning the database Cloning the STS host Cloning the proxy host This guide describes how to extend a typical
IDGo 800 Minidriver for Windows. User Guide
IDGo 800 Minidriver for Windows User Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and keep the
HP A-IMC Firewall Manager
HP A-IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW101-20110805 Legal and notice information Copyright 2011 Hewlett-Packard Development Company, L.P. No part of this
APPLICATION NOTE. Secure Personalization with Transport Key Authentication. ATSHA204A, ATECC108A, and ATECC508A. Introduction.
APPLICATION NOTE Secure Personalization with Transport Key Authentication ATSHA204A, ATECC108A, and ATECC508A Introduction The Atmel CryptoAuthentication ATSHA204A, ATECC108A, and ATECC508A devices (crypto
ZIMPERIUM, INC. END USER LICENSE TERMS
ZIMPERIUM, INC. END USER LICENSE TERMS THIS DOCUMENT IS A LEGAL CONTRACT. PLEASE READ IT CAREFULLY. These End User License Terms ( Terms ) govern your access to and use of the zanti and zips client- side
FIPS 140-2 Security Policy LogRhythm 6.0.4 Log Manager
FIPS 140-2 Security Policy LogRhythm 6.0.4 Log Manager LogRhythm 3195 Sterling Circle, Suite 100 Boulder CO, 80301 USA September 17, 2012 Document Version 1.0 Module Version 6.0.4 Page 1 of 23 Copyright
CITRIX SYSTEMS, INC. SOFTWARE LICENSE AGREEMENT
CITRIX SYSTEMS, INC. SOFTWARE LICENSE AGREEMENT PLEASE READ THIS SOFTWARE LICENSE AGREEMENT CAREFULLY BEFORE DOWNLOADING, INSTALLING OR USING CITRIX OR CITRIX-SUPPLIED SOFTWARE. BY DOWNLOADING OR INSTALLING
By placing an order with International Checkout Inc. and / or using its website, you agree and are bound to the Terms & Conditions below.
By placing an order with International Checkout Inc. and / or using its website, you agree and are bound to the Terms & Conditions below. 1. How It Works International Checkout Inc. ( we / us ) has agreements
HP ProtectTools Embedded Security Guide
HP ProtectTools Embedded Security Guide Document Part Number: 364876-001 May 2004 This guide provides instructions for using the software that allows you to configure settings for the HP ProtectTools Embedded
TEXTURA AUSTRALASIA PTY LTD ACN 160 777 088 ( Textura ) CONSTRUCTION PAYMENT MANAGEMENT SYSTEM TERMS AND CONDITIONS OF USE
TEXTURA AUSTRALASIA PTY LTD ACN 160 777 088 ( Textura ) CONSTRUCTION PAYMENT MANAGEMENT SYSTEM TERMS AND CONDITIONS OF USE Welcome to the Textura Construction Payment Management ( CPM ) System. By clicking
Windows Server 2008 R2 Boot Manager Security Policy For FIPS 140-2 Validation
Boot Manager Security Policy Windows Server 2008 R2 Boot Manager Security Policy For FIPS 140-2 Validation v 1.3 6/8/11 1 INTRODUCTION... 1 1.1 Cryptographic Boundary for BOOTMGR... 1 2 SECURITY POLICY...
HP IMC Firewall Manager
HP IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW102-20120420 Legal and notice information Copyright 2012 Hewlett-Packard Development Company, L.P. No part of this
Dell Statistica. Statistica Document Management System (SDMS) Requirements
Dell Statistica Statistica Document Management System (SDMS) Requirements 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described
Apple Corporate Email Certificates Certificate Policy and Certification Practice Statement. Apple Inc.
Apple Inc. Certificate Policy and Certification Practice Statement Version 2.0 Effective Date: April 10, 2015 Table of Contents 1. Introduction... 4 1.1. Trademarks... 4 1.2. Table of acronyms... 4 1.3.
Administration Guide. Wireless software upgrades
Administration Guide Wireless software upgrades SWDT207654-207654-0727045705-001 Contents Upgrading the BlackBerry Device Software over the wireless network... 3 Wireless software upgrades... 3 Sources
Azure Multi-Factor Authentication. KEMP LoadMaster and Azure Multi- Factor Authentication. Technical Note
KEMP LoadMaster and Azure Multi- Factor Authentication Technical Note VERSION: 1.0 UPDATED: APRIL 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies
Provider Web Portal Registration Form
Provider Web Portal Registration Form Thank you for your interest in registering for the Maryland Physicians Care provider web portal. Maryland Physicians Care is committed to protecting the privacy of
CA Performance Center
CA Performance Center Single Sign-On User Guide 2.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is
Temperature & Humidity SMS Alert Controller
Temperature & Humidity SMS Alert Controller Version 7 [Windows XP/Vista/7] GSMS THR / GSMS THP Revision 110507 [Version 2.2.14A] ~ 1 ~ SMS Alarm Messenger Version 7 [Windows XP/Vista/7] SMS Pro series
Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates. September 2006
Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates September 2006 Copyright 2006 Entrust. All rights reserved. www.entrust.com Entrust is a registered trademark
RSA Authentication Manager 7.1 Basic Exercises
RSA Authentication Manager 7.1 Basic Exercises Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks RSA and the RSA logo
How To Secure An Rsa Authentication Agent
RSA Authentication Agents Security Best Practices Guide Version 3 Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com. Trademarks RSA,
NCD ThinPATH Load Balancing Startup Guide
NCD ThinPATH Load Balancing Startup Guide Copyright Copyright 1999 by Network Computing Devices, Inc. (NCD).The information contained in this document is subject to change without notice. Network Computing
Dell One Identity Cloud Access Manager 8.0.1 - How to Configure Microsoft Office 365
Dell One Identity Cloud Access Manager 8.0.1 - How to Configure Microsoft Office 365 May 2015 This guide describes how to configure Microsoft Office 365 for use with Dell One Identity Cloud Access Manager
"Certification Authority" means an entity which issues Certificates and performs all of the functions associated with issuing such Certificates.
QUICKSSL PREMIUM(tm) SUBSCRIBER AGREEMENT Please read the following agreement carefully. By submitting an application to obtain a QuickSSL Premium(tm) Certificate and accepting and using such certificate,
Document Digital Signature
Supplier handbook Software Configuration for Digital Signature and Timestamp to certificate-based signature Document objectives and structure The document aims to support suppliers during the following
Dell Spotlight on Active Directory 6.8.3. Server Health Wizard Configuration Guide
Dell Spotlight on Active Directory 6.8.3 Server Health Wizard Configuration Guide 2013 Dell Software Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software
SafeNet Authentication Service
SafeNet Authentication Service All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and keep the sole right to
HIGHSEC eid App Administration User Manual
HIGHSEC eid App Administration User Manual Contents 1 Introduction... 3 2 Application overview... 3 3 Managing HIGHSEC eid App... 3 3.1 Deleting card pairings... 4 4 Inspecting smart card contents... 5
Xerox Security Bulletin XRX13-006
Cumulative update for Common Criteria Certification Background The System Software Versions listed below for the WorkCentre 5845/5855/5865/5875/5890, WorkCentre 7220/7225, WorkCentre 7830/7835/7845/7855
If you do not wish to agree to these terms, please click DO NOT ACCEPT and obtain a refund of the purchase price as follows:
IMPORTANT: READ THIS AGREEMENT CAREFULLY. THIS IS A LEGAL AGREEMENT BETWEEN AVG TECHNOLOGIES CY, Ltd. ( AVG TECHNOLOGIES ) AND YOU (ACTING AS AN INDIVIDUAL OR, IF APPLICABLE, ON BEHALF OF THE INDIVIDUAL
Strong Authentication for Microsoft SharePoint
Strong Authentication for Microsoft SharePoint with Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright Copyright 2011. CRYPTOCard
Application Note. Intelligent Application Gateway with SA server using AD password and OTP
Application Note Intelligent Application Gateway with SA server using AD password and OTP ii Preface All information herein is either public information or is the property of and owned solely by Gemalto
CCA DSS SP 2 Release Notes. For Microsoft Dynamics GP v10.0, v2010 and v2013
CCA DSS SP 2 Release Notes For Microsoft Dynamics GP v10.0, v2010 and v2013 April 2013 Copyright Information Copyright 2012 Nodus Technologies, Inc. All rights reserved. Copyright 2004, 2005, 2006, 2007,
Application Note. Atmel CryptoAuthentication Product Uses. Atmel ATSHA204. Abstract. Overview
Application Note Atmel CryptoAuthentication Product Uses Atmel Abstract Companies are continuously searching for ways to protect property using various security implementations; however, the cost of security
DIGIPASS Authentication for Windows Logon Getting Started Guide 1.1
DIGIPASS Authentication for Windows Logon Getting Started Guide 1.1 Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis, without any other warranties, or
LDAP Synchronization Agent Configuration Guide for
LDAP Synchronization Agent Configuration Guide for Powerful Authentication Management for Service Providers and Enterprises Version 3.x Authentication Service Delivery Made EASY LDAP Synchronization Agent
The name of the Contract Signer (as hereinafter defined) duly authorized by the Applicant to bind the Applicant to this Agreement is.
Trustwave Subscriber Agreement for Digital Certificates Ver. 11JUL14 PLEASE READ THIS AGREEMENT AND THE TRUSTWAVE CERTIFICATION PRACTICES STATEMENTS ( CPS ) CAREFULLY BEFORE USING THE CERTIFICATE ISSUED
Transglobal Secure Collaboration Program Secure E-mail v.1 Gateway Design Principles
Transglobal Secure Collaboration Program Secure E-mail v.1 Gateway Design Principles Prepared by: CP Secure E-mail v.1 Project Team Version: 2.0.2 Date: 16 July 2012 Page i Copyright 2012 Transglobal Secure
Dell One Identity Cloud Access Manager 8.0 - How to Configure vworkspace Integration
Dell One Identity Cloud Access Manager 8.0 - How to Configure vworkspace Integration February 2015 This guide describes how to configure Dell One Identity Cloud Access Manager to communicate with a Dell
Spotlight Management Pack for SCOM
Spotlight Management Pack for SCOM User Guide January 2015 The is used to display data from alarms raised by Spotlight on SQL Server Enterprise in SCOM (System Center Operations Manager). About System
Canadian Pharmaceutical Distribution Network Certificate Authority Services Agreement. In this document:
Canadian Pharmaceutical Distribution Network Certificate Authority Services Agreement In this document: Company refers to the hospital, hospital group, or other entity that has been pre- registered by
Cyberoam Configuration Guide for VPNC Interoperability Testing using DES Encryption Algorithm
Cyberoam Configuration Guide for VPNC Interoperability Testing using DES Encryption Algorithm Document Version:2.0-12/07/2007 IMPORTANT NOTICE Elitecore has supplied this Information believing it to be
CA Nimsoft Unified Management Portal
CA Nimsoft Unified Management Portal HTTPS Implementation Guide 7.6 Document Revision History Document Version Date Changes 1.0 June 2014 Initial version for UMP 7.6. CA Nimsoft Monitor Copyright Notice
Security Guide. BES12 Cloud
Security Guide BES12 Cloud Published: 2015-08-20 SWD-20150812133927242 Contents Security features of BES12 Cloud...4 How BES12 Cloud protects data stored in BlackBerry data centers...4 How BES12 Cloud
SUBSCRIPTION SERVICES.
SUSE Manager Server SUSE Manager Server with Database SUSE Software License Agreement PLEASE READ THIS AGREEMENT CAREFULLY. BY PURCHASING, INSTALLING AND/OR USING THE SOFTWARE (INCLUDING ITS COMPONENTS),
MIGRATION GUIDE. Authentication Server
MIGRATION GUIDE RSA Authentication Manager to IDENTIKEY Authentication Server Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as
epass2003 User Guide V1.0 Feitian Technologies Co., Ltd. Website: www.ftsafe.com
epass2003 User Guide V1.0 Feitian Technologies Co., Ltd. Revision History: Date Revision Description June 2013 V1.0 Release of the first version i Software Developer s Agreement All Products of Feitian
VeriSign PKI Client Government Edition v 1.5. VeriSign PKI Client Government. VeriSign PKI Client VeriSign, Inc. Government.
END USER S GUIDE VeriSign PKI Client Government Edition v 1.5 End User s Guide VeriSign PKI Client Government Version 1.5 Administrator s Guide VeriSign PKI Client VeriSign, Inc. Government Copyright 2010
Provider secure web portal & Member Care Information portal Registration Form
Provider secure web portal & Member Care Information portal Registration Form Thank you for your interest in registering for the Aetna Better Health Provider Secure Web Portal and the Aetna Better Health
BlackBerry Enterprise Server Resource Kit BlackBerry Analysis, Monitoring, and Troubleshooting Tools Version: 5.0 Service Pack: 2.
BlackBerry Enterprise Server Resource Kit BlackBerry Analysis, Monitoring, and Troubleshooting Tools Version: 5.0 Service Pack: 2 Release Notes Published: 2010-06-04 SWD-1155103-0604111944-001 Contents
Dell NetVault Backup Plug-in for Advanced Encryption 2.2. User s Guide
Dell Backup Plug-in for Advanced Encryption 2.2 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished
4.0. Offline Folder Wizard. User Guide
4.0 Offline Folder Wizard User Guide Copyright Quest Software, Inc. 2007. All rights reserved. This guide contains proprietary information, which is protected by copyright. The software described in this
IBM Crypto Server Management General Information Manual
CSM-1000-0 IBM Crypto Server Management General Information Manual Notices The functions described in this document are IBM property, and can only be used, if they are a part of an agreement with IBM.
Digipass Plug-In for IAS. IAS Plug-In IAS. Microsoft's Internet Authentication Service. Installation Guide
Digipass Plug-In for IAS IAS Plug-In IAS Microsoft's Internet Authentication Service Installation Guide Disclaimer of Warranties and Limitations of Liabilities Disclaimer of Warranties and Limitations
Microsoft SQL Server Integration Guide
Microsoft SQL Server Integration Guide Document Information Document Part Number 007-011108-001 (Rev J) Release Date August 2013 Trademarks All intellectual property is protected by copyright. All trademarks
Oracle Cloud. Creating a Business Intelligence Cloud Extract 11.1.1.10.1 E59934 01
Oracle Cloud Creating a Business Intelligence Cloud Extract 11.1.1.10.1 E59934 01 June 2015 Oracle Cloud Creating a Business Intelligence Cloud Extract, 11.1.1.10.1 E59934 01 Copyright 2014, 2015, Oracle
JCB Terminal Requirements
Version 1.0 April, 2008 2008 JCB International Co., Ltd. All rights reserved. All rights regarding this documentation are reserved by JCB Co., Ltd. ( JCB ). This documentation contains confidential and
ELECTRONIC SIGNATURE AGREEMENT
ELECTRONIC SIGNATURE AGREEMENT 1. Agreement If you contract with us electronically or otherwise request documentation or disclosures electronically, you specifically consent and agree that we may provide
PKZIP 6.0. Command Line for Windows Getting Started Manual
PKZIP 6.0 Command Line for Windows Getting Started Manual Copyright 2000-2002 PKWARE, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval
Strong Authentication for Cisco ASA 5500 Series
Strong Authentication for Cisco ASA 5500 Series with Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright Copyright 2011. CRYPTOCard
Dell One Identity Cloud Access Manager 7.0.2. Installation Guide
Dell One Identity Cloud Access Manager 7.0.2 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under
Using the RS232 serial evaluation boards on a USB port
Document information Info Content Keywords Serial evaluation Board, PN512,PN532, MFRC663, MFRC522, MFRC523, MFRC52x, MFRD522, MFRD523, MFRD52x MIFARE Contactless Smart Card Reader Reference Design, MIFARE
AN11241. AES encryption and decryption software on LPC microcontrollers. Document information
AES encryption and decryption software on LPC microcontrollers Rev. 1 25 July 2012 Application note Document information Info Content Keywords AES, encryption, decryption, FIPS-197, Cortex-M0, Cortex-M3
Table of Content. Introduction. Software Install and Uninstall. Software Features and GUI. Quick Getting Started Guide. Frequently Asked Questions
Table of Content Introduction Overview System Requirements Software Install and Uninstall Install Uninstall Software Features and GUI Software Menu Options Software Navigation Quick Getting Started Guide
Dell Recovery Manager for Active Directory 8.6. Quick Start Guide
Dell Recovery Manager for Active Directory 8.6 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished
Use QNAP NAS for Backup
Use QNAP NAS for Backup BACKUP EXEC 12.5 WITH QNAP NAS Copyright 2010. QNAP Systems, Inc. All Rights Reserved. V1.0 Document revision history: Date Version Changes Apr 2010 1.0 Initial release Note: Information
Trouble Shooting SiteManager to GateManager access
Trouble Shooting SiteManager to GateManager access If you are unsure if a SiteManager will be able to access the GateManager through the corporate firewall, or you experience connection issues, this document
Software Token. Installation and User Guide. 2013 MasterCard Proprietary. All rights reserved.
Software Token Installation and User Guide 2013 MasterCard Proprietary. All rights reserved. Contents Overview... 1 Install the RSA Client Desktop Application... 1 Download and Save the RSA Desktop Application...
AN4108 Application note
Application note How to set up a HTTPS server for In-Home display with HTTPS Introduction This application note describes how to configure a simple SSL web server using the EasyPHP free application to
E-Sign Disclosure & E-Statements Terms and Conditions
(888) 734-4567 [email protected] www.allianceassociationbank.com E-Sign Disclosure & E-Statements Terms and Conditions E-Sign Disclosure Alliance Association Bank is a division of Western
MDM Zinc 3.0 End User License Agreement (EULA)
MDM Zinc 3.0 End User License Agreement (EULA) THIS AGREEMENT (or "EULA") IS A LEGAL AGREEMENT BETWEEN THE PERSON, COMPANY, OR ORGANIZATION THAT HAS LICENSED THIS SOFTWARE ("YOU" OR "CUSTOMER") AND MULTIDMEDIA
Introducing etoken. What is etoken?
Introducing etoken Nirit Bear September 2002 What is etoken? Small & portable reader-less Smartcard Standard USB connectivity Logical and physical protection Tamper evident (vs. tamper proof) Water resistant
Strong Authentication for Microsoft TS Web / RD Web
Strong Authentication for Microsoft TS Web / RD Web with Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright Copyright 2011. CRYPTOCard
END USER LICENSE AGREEMENT FOR SLICKEDIT(R) CORE SOFTWARE IMPORTANT
END USER LICENSE AGREEMENT FOR SLICKEDIT(R) CORE SOFTWARE IMPORTANT THIS IS A LEGAL AGREEMENT BETWEEN YOU ("You" or "Your") AND SLICKEDIT INC. ("SlickEdit"). SLICKEDIT IS WILLING TO (1) LICENSE THE SLICKEDIT
Using Self Certified SSL Certificates. Paul Fisher. Quest Software. Systems Consultant. Desktop Virtualisation Group
Using Self Certified SSL Certificates Paul Fisher Systems Consultant [email protected] Quest Software Desktop Virtualisation Group Quest Software (UK) Limited Ascot House Maidenhead Office Park Westacott
Omniquad Exchange Archiving
Omniquad Exchange Archiving Deployment and Administrator Guide Manual version 3.1.2 Revision Date: 20 May 2013 Copyright 2012 Omniquad Ltd. All rights reserved. Omniquad Ltd Crown House 72 Hammersmith
PLEASE READ THIS AGREEMENT CAREFULLY. BY INSTALLING, DOWNLOADING OR OTHERWISE USING THE SOFTWARE, YOU AGREE TO THE TERMS OF THIS AGREEMENT.
Access Governance Suite 6 Lifecycle Manager 6 Compliance Manager 6 Software License Agreement PLEASE READ THIS AGREEMENT CAREFULLY. BY INSTALLING, DOWNLOADING OR OTHERWISE USING THE SOFTWARE, YOU AGREE
Dell InTrust 11.0. Preparing for Auditing Microsoft SQL Server
2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement.
