Retailer Operating Manual for e-books
|
|
|
- Jayson Anderson
- 10 years ago
- Views:
Transcription
1 Retailer Operating Manual for e-books Wholesale Distribution and Fulfillment Services Volume 1.1a
2 Ingram Content Group, through its CoreSource and Lightning Source (LSI) companies, provides content fulfillment to industry partners via Ingram Partner Web Services (IPWS). This document describes partner integration with the e-book fulfillment services and how a developer would implement the services. The web services are RESTful (REST-based) to offer the optimal integration in terms of speed to market, security, and simplicity. Prior to implementing these services you must have an account with Lightning Source. The document attempts to be language agnostic, but example code is provided in Java and from the command line. In your environment, you will be able to harness these services with PHP, Ruby, JavaScript, Perl, Python, ASP, Java, C, C++, C#, VB, etc. This integration manual is a living document ; periodic updates will be distributed. 1 Definition of Terms The following terms are used throughout the document and are defined below: Customer/Consumer Any individual or entity to whom the Retail Partner sells content and for whom Ingram provides fulfillment. IPWS Ingram Partner Web Service. Retail Partner/Retailer The seller of the digital content. REST The style of software architecture for distributed hypermedia systems such as the World Wide Web. The term was introduced in 2000 by Roy Fielding, one of the principal authors of the Hypertext Transfer Protocol (HTTP) specification, and has come into widespread use in the Internet community. We recommend O Reilly s RESTful Web Services as a supplement for understanding RESTful architecture and integration. Secure Hash Algorithm (SHA-1) A 1-way hash designed by the National Security Agency (NSA) and published by NIST. It is used to encrypt data, such as a username, in such a way that it would be computationally infeasible to decrypt and identify the original data. Single Sign-on (SSO) A transaction approach that leverages an existing authentication mechanism. As a partner integrating with IPWS, you will use your existing account management and authentication mechanisms. Ingram only sees minimal, anonymous information necessary to fulfill transactions. Web Service A software system designed to support interoperable Machine to Machine interaction over a network. Web Services use Web APIs that can be accessed over a network, such as the Internet, and executed on a remote system hosting the requested services. The Ingram web services are RESTful and therefore use the HTTP specification.
3 2 DRM Formats Supported Ingram supports the following DRM formats: Adobe Digital Editions (EPUB and.pdf) encrypted using Adobe Content Server 4 (ACS4) Adobe standard (.pdf unencrypted) ereader (formerly Palm) encrypted using ereader DRM The specific format(s) available are determined by the Publisher. All DRM encryption/encapsulation is managed by Ingram for both title setup and title fulfillment. Note: While DRM suppliers and Ingram have taken significant steps to provide deterrents to piracy, none would suggest that the mechanisms deployed are unbreakable. Ingram cannot guarantee the security of DRM. 3 The Wholesale Distribution Model: Retail The Wholesale Distribution model is a wholesale buy/sell transaction between the Publisher and Ingram and Ingram and the Retailer. 1. Retailer takes an order from Consumer and performs commercial transaction. 2. Retailer provides a link to Consumer who in turn clicks on the link and sends a download request to Ingram. 3. Ingram prepares content in requested format and applies DRM as required for electronic delivery. 4. Ingram distributes content via the Internet to Consumer. 5. Ingram bills Retailer for the content and distribution services performed. 6. Ingram pays Publisher wholesale price of the content. (5) Invoice Retailer Publisher Ingram (6) Payment (3) Product (2) Order (1) Order/ Payment (4) digital e-book Customer
4 4 Fulfillment Services The Fulfillment Services model is a direct business relationship between the Publisher and Retailer. Ingram hosts the content for the publisher and distributes the content to the consumer on behalf of the Retailer. This model is also used for situations where publishers are retailing content from their own web sites. 1. Retailer takes an order from Consumer and performs commercial transaction. 2. Retailer sends the order via the Internet to Ingram, including the consumer s bill-to country. 3. Ingram prepares content in requested format and DRM required for electronic delivery 4. Ingram distributes content via the Internet to Consumer. 5. Ingram bills Retailer for transaction cost of distribution to Consumer. 6. Retailer pays Publisher for negotiated cost of the content. (5) Invoice Publisher (6) Ingram (3) Product (2) Order (4) digital e-book Retailer Customer (1) Order/ Payment 5 Integration Overview The IPWS is a collection of REST-based web services that securely provide product fulfillment to Retail Partners and their customers. In order to integrate the IPWS with your offerings, you will need to work with three primary services. Product Catalog Provides product metadata, including links to product images in multiple sizes, DRM usage rules, and support URLs. Territory File Provides allowed sales countries for each SKU. Publishers can optionally require retailers to enforce territory restrictions based on the Customer s credit card Bill to country. Fulfillment Web Service Receives fulfillment requests via post and provides embeddable code back from which your customer can click through to the download.
5 5.1 Catalog Integration Overview The Ingram e-book catalog includes all the metadata you need to make downloadable e-books available on your site. Titles, descriptions, authors, and all other available metadata can be found in the catalog. Most importantly, it includes the unique identifier required to make a download request to our fulfillment systems. Every IPWS fulfillment request must contain the unique identifier for the title and format requested. The simple steps for catalog integration are below: 1. Download catalog feed(s). 2. Import titles and image links. 3. Import the allowed sales countries. 4. Render available titles on your site. 5.2 Fulfillment Integration Overview Once titles are available in the catalog, and the catalog has been integrated, e-book fulfillment occurs through the Ingram Partner Web Service (IPWS). The fulfillment web services are Single Sign-on (SSO) and allow your users to stay on your site for the duration of the transaction. Ingram e-book fulfillment works as follows: 1. Your customer selects and purchases a title from a Retailer s website. 7. Once the purchase is complete, and while the consumer is still signed into your website (from the purchase transaction) the Retailer s server sends a request for fulfillment to IPWS. This request includes the unique SKU (the SKU field in catalog), the customer s Bill-to country, and any other parameters necessary for the fulfillment. a. If successful, IPWS returns an encrypted download URL to embed in your target page. b. If unsuccessful, IPWS returns an HTTP error code that tells the partner what the problem was. 1. The URL is embedded, user clicks link. 2. The encrypted URL opens the Ingram hosted Preparing page and starts the content download. 3. Once the download begins, the user is taken to the Ingram hosted Thank You page. 4. If the Retailer chooses, a callback message can be sent to them stating the result of the customer experience. 6 Technical Support Services Ingram provides 2nd-level technical support as part of the E-book Retailer Agreement. This function serves to backup customer support services provided by the Retailer. The Ingram Technical Support service is not intended to interface directly with e-book consumers, but to provide technical services behind the scenes. This section outlines the e-book technical support services provided by Ingram.
6 6.1 Technical Support Services Members of the Retailer s support team have direct access to Ingram s Technical Support services. These services are currently available during normal business hours Monday through Friday from 8 a.m. to 5 p.m. Central Standard Time to provide Retailers support in delivering e-books to the consumer. The services are there to handle problems with e-book downloads, questions concerning e-book content and other content delivery issues. 6.2 Common Issues Many consumer questions and problems are addressed on Ingram s e-book support web site, This web site has information on typical issues that arise when downloading e-books. For instance, it includes details on how to obtain and install popular e-book reader software products such as ereader and Adobe Digital Editions. There is also a Frequently Asked Questions section and Tutorial. This is the best source for first level support and Retailers should either use this site or direct consumers to this site. If the Retailer s first level support is unable to resolve the issue then they may contact Ingram Technical Support for assistance with issue resolution. 6.3 Problem Reports Second level issues should be directed to Ingram s Technical Support team. To do this, send an to [email protected]. Please include the following information on download problems: E-book title SKU E-book Reference Number (the Order ID from the download URL) Nature of problem/question Date and time of problem(s) Error message received, if applicable Desired method of response and associated address/number ( reply, phone, page) Problem reports received via this address will be addressed quickly and effectively. A response will be delivered back to the Retailer s support personnel within four business hours acknowledging receipt of the message and outlining the steps for resolution. It will be the responsibility of the Retailer to contact the consumer to bring the issue to resolution.
7 6.4 Hacker and Fraud Control There are times when attempts are made to hack into the Ingram e-book fulfillment site. In response to these attempts, Ingram may elect to block the originating IP address(es) of the hacker from further e-book download access. Ingram will not block IP addresses for issues that stem from the Retailer transaction, such as credit card fraud. It is the Retailer s responsibility to manage credit card risk and deny access to users who engage in fraudulent or criminal e-commerce activity. In addition, while Ingram, upon request of the Retailer, will disable future transactions originating from a particular location, Ingram will not issue a credit for any transaction that has already been fulfilled by Ingram. 7 Billing and Payment Procedures The month-end cutoff schedule for accounting purposes is based upon a four/four/five-week monthly cycle. The reporting of processed business transactions, compensation for services and the reimbursement of expenses to Lightning Source (LSI) are cut-off each accounting month on this schedule. This schedule is published each new calendar year, and is available in November of the current year from the Retailer s assigned Account Manager. Retailers who currently have an active account in good standing with LSI are invoiced weekly for titles sales and fulfillment services. Remittance is due 30 days from the end of the month in which the invoice is dated. Retailers who do not have an account or are not in good standing with LSI must submit a credit application for approval prior to ID initiating any integration or e-book distribution services. LSI may request payment in advance via a cashier s check based on the credit standing of the Retailer.
Operating Manual Publisher Customers V4.6.1
Wholesale Distribution Services for e-books Operating Manual Publisher Customers V4.6.1 Table of Contents 1.0 OVERVIEW...2 2.0 DEFINITIONS OF TERMS...2 3.0 THE WHOLESALE DISTRIBUTION MODEL...3 4.0 PROCEDURES
NEWFOUNDLAND AND LABRADOR ELECTRONIC TAX SERVICE (NLETS)
Government of Newfoundland and Labrador Department of Finance Taxation and Fiscal Policy Branch Tax Administration Division NEWFOUNDLAND AND LABRADOR ELECTRONIC TAX SERVICE (NLETS) TAX ADMINISTRATION DIVISION
Gardners ebooks frequently asked questions
How does the web service work? The technical process is covered in our I24 ebook Ordering via Web Services.pdf which explains all the web service file layout and method. It is recommended that you read
How To Use Saml 2.0 Single Sign On With Qualysguard
QualysGuard SAML 2.0 Single Sign-On Technical Brief Introduction Qualys provides its customer the option to use SAML 2.0 Single Sign On (SSO) authentication with their QualysGuard subscription. When implemented,
Step-by-Step guide for SSO from MS Sharepoint 2010 to SAP EP 7.0x
Step-by-Step guide for SSO from MS Sharepoint 2010 to SAP EP 7.0x Sverview Trust between SharePoint 2010 and ADFS 2.0 Use article Federated Collaboration with Shibboleth 2.0 and SharePoint 2010 Technologies
ITP 140 Mobile Technologies. Mobile Topics
ITP 140 Mobile Technologies Mobile Topics Topics Analytics APIs RESTful Facebook Twitter Google Cloud Web Hosting 2 Reach We need users! The number of users who try our apps Retention The number of users
Tableau Server Trusted Authentication
Tableau Server Trusted Authentication When you embed Tableau Server views into webpages, everyone who visits the page must be a licensed user on Tableau Server. When users visit the page they will be prompted
Web Applications Access Control Single Sign On
Web Applications Access Control Single Sign On Anitha Chepuru, Assocaite Professor IT Dept, G.Narayanamma Institute of Technology and Science (for women), Shaikpet, Hyderabad - 500008, Andhra Pradesh,
Is your data safe out there? -A white Paper on Online Security
Is your data safe out there? -A white Paper on Online Security Introduction: People should be concerned of sending critical data over the internet, because the internet is a whole new world that connects
This chapter describes how to use the Junos Pulse Secure Access Service in a SAML single sign-on deployment. It includes the following sections:
CHAPTER 1 SAML Single Sign-On This chapter describes how to use the Junos Pulse Secure Access Service in a SAML single sign-on deployment. It includes the following sections: Junos Pulse Secure Access
Absorb Single Sign-On (SSO) V3.0
Absorb Single Sign-On (SSO) V3.0 Overview Absorb allows single sign-on (SSO) with third-party systems, regardless of the programming language. SSO is made secure by a series of calls (between Absorb and
Working with Indicee Elements
Working with Indicee Elements How to Embed Indicee in Your Product 2012 Indicee, Inc. All rights reserved. 1 Embed Indicee Elements into your Web Content 3 Single Sign-On (SSO) using SAML 3 Configure an
DIGIMARC CORPORATION 9405 SW Gemini Drive Beaverton, Oregon 97008 www.digimarc.com
DIGITAL WATERMARKING: FOSTERING AND ENHANCING LEGITIMATE PEER-TO-PEER (P2P) ECOSYSTEMS DIGIMARC CORPORATION 9405 SW Gemini Drive Beaverton, Oregon 97008 www.digimarc.com Copyright 2006 1 TABLE OF CONTENTS
Islington ebooks Help / FAQs
Islington ebooks Help / FAQs How does the ebook Service work? Using your Library Card and pin, an Islington Libraries user can login into a secure ebook service and select up to 4 ebooks to download at
RDM on Demand Privacy Policy
RDM on Demand Privacy Policy Ataccama Corp. www.ataccama.com [email protected] Toronto, CA Prague, CZ London, UK Stamford, US 1 ATACCAMA RDM ON DEMAND PRIVACY POLICY 1. Ataccama Corp. ("Ataccama") and
CA Performance Center
CA Performance Center Single Sign-On User Guide 2.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is
Exploring ADSS Server Signing Services
ADSS Server is a multi-function server providing digital signature creation and signature verification services, as well as supporting other infrastructure services including Time Stamp Authority (TSA)
Single Sign-On in PHP & HATS Applications using Hashed Cookies
Single Sign-On in PHP & HATS Applications using Hashed Cookies Royal Cyber Inc. Modernized e-business solutions 1 Modernized e-business solutions Royal Cyber Inc. Overview This white paper focuses on how
ERserver. iseries. Securing applications with SSL
ERserver iseries Securing applications with SSL ERserver iseries Securing applications with SSL Copyright International Business Machines Corporation 2000, 2001. All rights reserved. US Government Users
Unless otherwise stated, our SaaS Products and our Downloadable Products are treated the same for the purposes of this document.
Privacy Policy This Privacy Policy explains what information Fundwave Pte Ltd and its related entities ("Fundwave") collect about you and why, what we do with that information, how we share it, and how
Evaluation of different Open Source Identity management Systems
Evaluation of different Open Source Identity management Systems Ghasan Bhatti, Syed Yasir Imtiaz Linkoping s universitetet, Sweden [ghabh683, syeim642]@student.liu.se 1. Abstract Identity management systems
Using Foundstone CookieDigger to Analyze Web Session Management
Using Foundstone CookieDigger to Analyze Web Session Management Foundstone Professional Services May 2005 Web Session Management Managing web sessions has become a critical component of secure coding techniques.
Privacy Policy. Introduction. Scope of Privacy Policy. 1. Definitions
Privacy Policy Introduction This Privacy Policy explains what information TORO Limited and its related entities ("TORO") collect about you and why, what we do with that information, how we share it, and
Interoperable Cloud Storage with the CDMI Standard
Interoperable Cloud Storage with the CDMI Standard Storage and Data Management in a post-filesystem World Mark Carlson, SNIA TC and Oracle Co-Chair, SNIA Cloud Storage TWG and Initiative Author: Mark Carlson,
INTEGRATION GUIDE. IDENTIKEY Federation Server for Juniper SSL-VPN
INTEGRATION GUIDE IDENTIKEY Federation Server for Juniper SSL-VPN Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is'; VASCO
Single Sign-On Implementation Guide
Single Sign-On Implementation Guide Salesforce, Winter 16 @salesforcedocs Last updated: November 4, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark
Single Sign On. SSO & ID Management for Web and Mobile Applications
Single Sign On and ID Management Single Sign On SSO & ID Management for Web and Mobile Applications Presenter: Manish Harsh Program Manager for Developer Marketing Platforms of NVIDIA (Visual Computing
BANK LINK USE AGREEMENT NO. Representative:
BANK LINK USE AGREEMENT NO. Bank Merchant Swedbank AS Registration No.: 40003074764 Registration No.: Registered office: Balasta dambis 1a, Riga, LV-1048 Address: E-mail address: [email protected] E-mail
DIGITAL RIGHTS MANAGEMENT SYSTEM FOR MULTIMEDIA FILES
DIGITAL RIGHTS MANAGEMENT SYSTEM FOR MULTIMEDIA FILES Saiprasad Dhumal * Prof. K.K. Joshi Prof Sowmiya Raksha VJTI, Mumbai. VJTI, Mumbai VJTI, Mumbai. Abstract piracy of digital content is a one of the
Recon and Mapping Tools and Exploitation Tools in SamuraiWTF Report section Nick Robbins
Recon and Mapping Tools and Exploitation Tools in SamuraiWTF Report section Nick Robbins During initial stages of penetration testing it is essential to build a strong information foundation before you
Tableau Server Trusted Authentication
Tableau Server Trusted Authentication When you embed Tableau Server views into webpages, everyone who visits the page must be a licensed user on Tableau Server. When users visit the page they will be prompted
Tenrox. Single Sign-On (SSO) Setup Guide. January, 2012. 2012 Tenrox. All rights reserved.
Tenrox Single Sign-On (SSO) Setup Guide January, 2012 2012 Tenrox. All rights reserved. About this Guide This guide provides a high-level technical overview of the Tenrox Single Sign-On (SSO) architecture,
bbc Overview Adobe Flash Media Rights Management Server September 2008 Version 1.5
bbc Overview Adobe Flash Media Rights Management Server September 2008 Version 1.5 2008 Adobe Systems Incorporated. All rights reserved. Adobe Flash Media Rights Management Server 1.5 Overview for Microsoft
Section 1 CREDIT UNION Member Information Security Due Diligence Questionnaire
SAMPLE CREDIT UNION INFORMATION SECURITY DUE DILIGENCE QUESTIONNAIRE FOR POTENTIAL VENDORS Section 1 CREDIT UNION Member Information Security Due Diligence Questionnaire 1. Physical security o Where is
Webmail Using the Hush Encryption Engine
Webmail Using the Hush Encryption Engine Introduction...2 Terms in this Document...2 Requirements...3 Architecture...3 Authentication...4 The Role of the Session...4 Steps...5 Private Key Retrieval...5
ICE Futures Europe. AFTS Technical Guide for Large Position Reporting V1.0
ICE Futures Europe AFTS Technical Guide for Large Position Reporting V1.0 ICE FUTURES EUROPE Page 1 of 7 Contents 1. Introduction... 3 2. Online access to Clearing Systems... 4 3. Uploading Data... 5 4.
NeoSoar s etextbooks for Education platform a win-win-win for students, schools and publishers
White Paper NeoSoar s etextbooks for Education platform a win-win-win for students, schools and publishers Taiwanese software developer NeoSoar, Inc. develops an innovative etextbook delivery platform
Configuring ADFS 3.0 to Communicate with WhosOnLocation SAML
Configuring ADFS 3.0 to Communicate with WhosOnLocation SAML --------------------------------------------------------------------------------------------------------------------------- Contents Overview...
Learn about OverDrive APIs and how they can benefit search, discovery and reporting services at your library. Contact: training@overdrive.
v.10012010 v.10042013 v.11012010 OverDrive, Inc. 2010 2013 Page 1 1 OverDrive APIs Learn about OverDrive APIs and how they can benefit search, discovery and reporting services at your library. Contact:
Ciphermail Gateway PDF Encryption Setup Guide
CIPHERMAIL EMAIL ENCRYPTION Ciphermail Gateway PDF Encryption Setup Guide March 6, 2014, Rev: 5454 Copyright c 2008-2014, ciphermail.com. CONTENTS CONTENTS Contents 1 Introduction 4 2 Portal 4 3 PDF encryption
ProjectManager.com Security White Paper
ProjectManager.com Security White Paper Standards & Practices www.projectmanager.com Introduction ProjectManager.com (PM) developed its Security Framework to continue to provide a level of security for
SSO Plugin. HP Service Request Catalog. J System Solutions. http://www.javasystemsolutions.com Version 3.6
SSO Plugin HP Service Request Catalog J System Solutions Version 3.6 Page 2 of 7 Introduction... 3 Adobe Flash and NTLM... 3 Enabling the identity federation service... 4 Federation key... 4 Token lifetime...
Implementing Secure Sockets Layer on iseries
Implementing Secure Sockets Layer on iseries Presented by Barbara Brown Alliance Systems & Programming, Inc. Agenda SSL Concepts Digital Certificate Manager Local Certificate Authority Server Certificates
Single Sign-on (SSO) technologies for the Domino Web Server
Single Sign-on (SSO) technologies for the Domino Web Server Jane Marcus December 7, 2011 2011 IBM Corporation Welcome Participant Passcode: 4297643 2011 IBM Corporation 2 Agenda USA Toll Free (866) 803-2145
Q&A: Your Ebook Engine
Your books. Your brand. Your customer. Q&A: Your Ebook Engine 1. What is Ebook Engine? Ebook Engine enables you to sell electronic books with your existing e-commerce infrastructure. 2. So how exactly
Connect Getting Started Guide. Connect 2.1.1 Getting Started Guide
Connect 2.1.1 Getting Started Guide Page 1 of 22 Internetware Limited, 2008 Welcome...3 Introduction...3 What s new in 2.1...3 Technical Requirements...4 How does Connect work?...5 Application Connectors...5
Security Service tools user IDs and passwords
System i Security Service tools user IDs and passwords Version 5 Release 4 System i Security Service tools user IDs and passwords Version 5 Release 4 Note Before using this information and the product
INTEGRATION GUIDE. DIGIPASS Authentication for Salesforce using IDENTIKEY Federation Server
INTEGRATION GUIDE DIGIPASS Authentication for Salesforce using IDENTIKEY Federation Server Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is
GS1 Trade Sync Connectivity guide
GS1 Trade Sync Connectivity guide Date: 2015-12-01 Version: v1.8 Page: 2/17 Revision history Version Date Description Author 1.0 2013-11-14 Initial version Fernando Pereira 1.1 2014-01-16 Added FTP and
Xerox DocuShare Security Features. Security White Paper
Xerox DocuShare Security Features Security White Paper Xerox DocuShare Security Features Businesses are increasingly concerned with protecting the security of their networks. Any application added to a
User Guide. Version R91. English
AuthAnvil User Guide Version R91 English August 25, 2015 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated from
ERserver. iseries. Secure Sockets Layer (SSL)
ERserver iseries Secure Sockets Layer (SSL) ERserver iseries Secure Sockets Layer (SSL) Copyright International Business Machines Corporation 2000, 2002. All rights reserved. US Government Users Restricted
Allidm.com. SSO Introduction. Discovering IAM Solutions. Leading the IAM Training. @aidy_idm facebook/allidm
Discovering IAM Solutions Leading the IAM Training @aidy_idm facebook/allidm SSO Introduction Disclaimer and Acknowledgments The contents here are created as a own personal endeavor and thus does not reflect
How to Change Your Send Options
How to Change Your Send Options You may need to switch from your default Send Option for one reason or another when sending files. For example, the recipient may not be able to receive the embedded link
How to use Certificate in Microsoft Outlook
How to use Certificate in Microsoft Outlook Macau Post esigntrust Version. 2006-01.01p Agenda Configure Microsoft Outlook for using esigntrust Certificate Use certificate to sign e-mail Use Microsoft Outlook
Guardian Digital Secure Mail Suite Quick Start Guide
Guardian Digital Secure Mail Suite Quick Start Guide Copyright c 2004 Guardian Digital, Inc. Contents 1 Introduction 1 2 Contacting Guardian Digital 2 3 Purpose of This Document 3 3.1 Terminology...............................
JPX-LEI User Guide 2014/8/1. Japan Exchange Group, Inc. / Tokyo Stock Exchange, Inc. Copyright 2014 Tokyo Stock Exchange, Inc. All rights reserved.
JPX-LEI User Guide 2014/8/1 Japan Exchange Group, Inc. / Tokyo Stock Exchange, Inc. Copyright 2014 Tokyo Stock Exchange, Inc. All rights reserved. 1 Contents Outline General User JPX-LEI Search File Download
Thales ncipher modules. Version: 1.2. Date: 22 December 2009. Copyright 2009 ncipher Corporation Ltd. All rights reserved.
ncipher modules Integration Guide for IBM Tivoli Access Manager for e-business 6.1 Windows Server 2003 32-bit and 64-bit Windows Server 2008 32-bit and 64-bit Version: 1.2 Date: 22 December 2009 Copyright
Protected PDF Common Installation Issues
Protected PDF Common Installation Issues July 14, 2011 Version 1.1 TABLE OF CONTENTS Basic Instructions for Readers ------------------------------------------------------------------------- 2 Common Questions
A Java proxy for MS SQL Server Reporting Services
1 of 5 1/10/2005 9:37 PM Advertisement: Support JavaWorld, click here! January 2005 HOME FEATURED TUTORIALS COLUMNS NEWS & REVIEWS FORUM JW RESOURCES ABOUT JW A Java proxy for MS SQL Server Reporting Services
Project Orwell: Distributed Document Integrity Verification
1 Project Orwell: Distributed Document Integrity Verification Tommy MacWilliam [email protected] Abstract Project Orwell is a client and server application designed to facilitate the preservation
Real Vision Imaging. Use a Proxy Server to Connect Your IBM i to the Web. IBM Has Discontinued Service and Support for ALL 3995/3996 Optical Libraries
January 2013 YOUR DOCUMENT MANAGEMENT SOLUTION Real Vision Imaging Use a Proxy Server to Connect Your IBM i to the Web Real Vision Software, Inc. P.O. Box 12958 Alexandria, LA 71315-2958 3700 Jackson Street
Remote Authentication and Single Sign-on Support in Tk20
Remote Authentication and Single Sign-on Support in Tk20 1 Table of content Introduction:... 3 Architecture... 3 Single Sign-on... 5 Remote Authentication... 6 Request for Information... 8 Testing Procedure...
VPN. VPN For BIPAC 741/743GE
VPN For BIPAC 741/743GE August, 2003 1 The router supports VPN to establish secure, end-to-end private network connections over a public networking infrastructure. There are two types of VPN connections,
Mutual Fund Web Service Developer Guide
Mutual Fund Web Service Developer Guide Version 1.0 1 Table of Contents 1 Introduction 3 1.1 Summary 3 1.2 Audience 3 1.3 Terminology 3 1.4 What Kind of a Partner Site Am I? 3 1.4.1 Affiliate site 3 1.4.2
Single Sign-On Implementation Guide
Single Sign-On Implementation Guide Salesforce, Summer 15 @salesforcedocs Last updated: July 1, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of
E-BOOKS GLOBAL DISTRIBUTION. Andrew Weinstein Vice President, & General Manager, Retail Solutions
E-BOOKS GLOBAL DISTRIBUTION Andrew Weinstein Vice President, & General Manager, Retail Solutions The world s largest and most trusted distributor of physical & digital content Helping content reach its
Google Integration Instructions
SAFARI Montage Google Integration Instructions SAFARI Montage now offers Interoperability Support Services subscribers a powerful new integration option that links SAFARI Montage directly with Google,
Design Notes for an Efficient Password-Authenticated Key Exchange Implementation Using Human-Memorable Passwords
Design Notes for an Efficient Password-Authenticated Key Exchange Implementation Using Human-Memorable Passwords Author: Paul Seymer CMSC498a Contents 1 Background... 2 1.1 HTTP 1.0/1.1... 2 1.2 Password
Sharp Remote Device Manager (SRDM) Server Software Setup Guide
Sharp Remote Device Manager (SRDM) Server Software Setup Guide This Guide explains how to install the software which is required in order to use Sharp Remote Device Manager (SRDM). SRDM is a web-based
Visa Checkout Integration Guide V1.0
Visa Checkout Integration Guide V1.0 IP Payments Pty Ltd Level 3, 441 Kent Street Sydney NSW 2000 Australia (ABN 86 095 635 680) T +61 2 9255 9500 F +61 2 8248 1276 www.ippayments.com No part of this document
Configuring Single Sign-on for WebVPN
CHAPTER 8 This chapter presents example procedures for configuring SSO for WebVPN users. It includes the following sections: Using Single Sign-on with WebVPN, page 8-1 Configuring SSO Authentication Using
Privacy Policy. If you have questions or complaints regarding our Privacy Policy or practices, please see Contact Us. Introduction
Privacy Policy This Privacy Policy will be effective from September 1 st, 2014. Please read Pelican Technologies Privacy Policy before using Pelican Technologies services because it will tell you how we
Use Enterprise SSO as the Credential Server for Protected Sites
Webthority HOW TO Use Enterprise SSO as the Credential Server for Protected Sites This document describes how to integrate Webthority with Enterprise SSO version 8.0.2 or 8.0.3. Webthority can be configured
SAML-Based SSO Solution
About SAML SSO Solution, page 1 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 2 SAML SSO Web Browsers, page 3 Cisco Unified Communications Applications that Support SAML SSO,
Norton Mobile Privacy Notice
Effective: April 12, 2016 Symantec and the Norton brand have been entrusted by consumers around the world to protect their computing devices and most important digital assets. This Norton Mobile Privacy
Web Cloud Architecture
Web Cloud Architecture Introduction to Software Architecture Jay Urbain, Ph.D. [email protected] Credits: Ganesh Prasad, Rajat Taneja, Vikrant Todankar, How to Build Application Front-ends in a Service-Oriented
By : Khalid Alfalqi Department of Computer Science, Umm Al-Qura University
By : Khalid Alfalqi Department of Computer Science, Umm Al-Qura University History of Web History of the Internet Basic Web System Architecture URL DNS Creating Static and Dynamic Information Security
LexisNexis Law School ebooks / etextbooks FAQs LexisNexis Store Purchases
LexisNexis Law School ebooks / etextbooks FAQs LexisNexis Store Purchases General Questions about ebooks/etextbooks Digital Rights Management/Adobe/User Accounts LexisNexis Store Purchases/Downloading
If you have any questions about our privacy practices, please refer to the end of this privacy policy for information on how to contact us.
c4m Privacy Policy Last Modified: July 20, 2015 Colbette II Ltd., Block 1, 195-197 Old Nicosia-Limassol Road, Dali Industrial Zone, Cyprus 2540 (hereinafter "c4m", Colbette we", "our" or "us") is always
Copyright 2014 Jaspersoft Corporation. All rights reserved. Printed in the U.S.A. Jaspersoft, the Jaspersoft
5.6 Copyright 2014 Jaspersoft Corporation. All rights reserved. Printed in the U.S.A. Jaspersoft, the Jaspersoft logo, Jaspersoft ireport Designer, JasperReports Library, JasperReports Server, Jaspersoft
SOA, case Google. Faculty of technology management 07.12.2009 Information Technology Service Oriented Communications CT30A8901.
Faculty of technology management 07.12.2009 Information Technology Service Oriented Communications CT30A8901 SOA, case Google Written by: Sampo Syrjäläinen, 0337918 Jukka Hilvonen, 0337840 1 Contents 1.
CA Nimsoft Service Desk
CA Nimsoft Service Desk Single Sign-On Configuration Guide 6.2.6 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation
Advanced Administration
BlackBerry Enterprise Service 10 BlackBerry Device Service Version: 10.2 Advanced Administration Guide Published: 2014-09-10 SWD-20140909133530796 Contents 1 Introduction...11 About this guide...12 What
Implementation Overview. Digital Rights Management (DRM) Solution
Implementation Overview Digital Rights Management (DRM) Solution DRM Introduction E-Book Sytems Digital Rights Management solution allows for a secure distribution of FlipBooks to their readers. DRM can
v7.1 Technical Specification
v7.1 Technical Specification Copyright 2011 Sage Technologies Limited, publisher of this work. All rights reserved. No part of this documentation may be copied, photocopied, reproduced, translated, microfilmed,
WiNG5 CAPTIVE PORTAL DESIGN GUIDE
WiNG5 DESIGN GUIDE By Sriram Venkiteswaran WiNG5 CAPTIVE PORTAL DESIGN GUIDE June, 2011 TABLE OF CONTENTS HEADING STYLE Introduction To Captive Portal... 1 Overview... 1 Common Applications... 1 Authenticated
Configuring Security Features of Session Recording
Configuring Security Features of Session Recording Summary This article provides information about the security features of Citrix Session Recording and outlines the process of configuring Session Recording
Living Requirements Document: Sniffit
Living Requirements Document: Sniffit RFID locator system Andrew Pang Braulio Fonseca Enrique Gutierrez Nader Khalil Sohan Shah Victor Porter Introduction Sniffit is a handy tracking application that helps
Internet Technologies_1. Doc. Ing. František Huňka, CSc.
1 Internet Technologies_1 Doc. Ing. František Huňka, CSc. Outline of the Course 2 Internet and www history. Markup languages. Software tools. HTTP protocol. Basic architecture of the web systems. XHTML
How-to: Single Sign-On
How-to: Single Sign-On Document version: 1.02 nirva systems [email protected] nirva-systems.com How-to: Single Sign-On - page 2 This document describes how to use the Single Sign-On (SSO) features
Hushmail Express Password Encryption in Hushmail. Brian Smith Hush Communications
Hushmail Express Password Encryption in Hushmail Brian Smith Hush Communications Introduction...2 Goals...2 Summary...2 Detailed Description...4 Message Composition...4 Message Delivery...4 Message Retrieval...5
AEL Data Services LLP. LEKTZ - Digital Rights Management (DRM) Solutions
AEL Data Services LLP LEKTZ - Digital Rights Management (DRM) Solutions Overview Though digitization of assets provides business with a lot of benefits with respect to - ease of reproduction, distribution,
Jaspersoft APIs. Integrating BI with your Applications. Community and Professional Editions
Jaspersoft s Integrating BI with your Applications Community and Professional Editions Jaspersoft Headquarters: 539 Bryant Street, Suite 100 San Francisco, CA 94107, USA www.jaspersoft.com Email: [email protected]
