Online signature API. Terms used in this document. The API in brief. Version 0.20,
|
|
|
- Merilyn Lucas
- 9 years ago
- Views:
Transcription
1 Online signature API Version 0.20, Terms used in this document Onnistuu.fi, the website Client, online page or other system using the API provided by Onnistuu.fi. End user, using the clients online page or other system. Document, the file, in PDF format, to be signed. Signature, the document signing performed using Onnistuu.fi, relating to the client, end user and document. The API in brief 1. Client collects the information required for signing. The required information consists of the required company registration codes and/or personal identification codes (i.e. social security numbers), and possible invitation parameters like addresses. 2. Client generates the document to be signed. 3. Client transmits the needed information about the signatures, invitations and document to Onnistuu.fi and transfers the end user to the Onnistuu.fi site, if there are signatures that should be collected immediately. 4. Onnistuu.fi collects the document from the clients server. 5. Onnistuu.fi collects the immediately required electronic signatures from the end user. 6. Onnistuu.fi transfers the end user back to the clients site and transmits information of the new, signed document version and the signatures collected. 7. If signature invitations need to be sent via or SMS message, they are sent. See more on this in section 3.3.
2 API access point Provided client information The client will receive the following information Name Type Example Client / customer identifier Encryption key Unique UUIDv4 string 256 bits encoded as a base64 string 3e c48-90defde5dbba5e9e Dw0coe6YCFdFZkHuALwsZjMd2PQuOC m2qfazkhc6qlc= The client identifier is public and is transmitted publicly on each API usage. The encryption key is secret and must never be revealed to end users or their browsers. The encryption key is used in its binary form, decoded from the base64 representation. Encryption The encryption used is Rijndael, CBC mode. Specifics of the encryption used: (Defaults in bold) Rijndael CBC mode A block size of 256 or 128 bits. An encryption key size of 256 bits. An initialization vector size of 256 or 128 bits. (depending on block size) Null or PKCS#5 padding. An initialization vector is generated for each API usage. The encrypted data and initialization vector are both transmitted. For AES compatibility, use block size 128, iv size 128 and PKCS#5 padding. Changing these options is discussed below in a section called Encryption options. With the AES compatible settings, you can test the encryption with these commands: openssl enc -aes-256-cbc -a -A -K <key-as-hex> -iv <iv-as-hex> -in plain.txt -out data.b64 openssl enc -aes-256-cbc -d -a -A -K <key-as-hex> -iv <iv-as-hex> -in data.b64 -out plain.txt
3 Detailed API phase documentation 1. Required information The client collects the required identification information for collecting the signatures. For private end users, this means their personal identification number (social security number), and for companies their company registration code. 2. Document requirements The document should be in the Adobe PDF format and under 2 megabytes in size. 3. Transmitting information and moving the end user The signature information and end user are transferred to Onnistuu.fi using a POSTrequest to the API access point Most information is kept secret by using the encryption that has been discussed earlier in this document. Required POST request fields (public) customer return_failure data iv The clients client / customer identifier as provided by Onnistuu.fi URL to return to in case of failure. Error codes are defined later in this document. The protected data fields, encrypted as discussed below. The initialization vector used for the encryption. Required protected data fields (encrypted) stamp return_success document requirements An identifier string generated by the client for this document / signing process URL to return a possible end user to, with the return data. The end user returning to this URL does not indicate success, the return data must be checked. URL from which Onnistuu.fi can fetch the document to be signed with a GET request. An array of requirements. The types and options are discussed below. Further optional fields are discussed later on.
4 Protected data representation The protected data fields are presented as JSON, for example: { } "stamp": " ", "return_success": " "document": " "requirements": [ {"type": "person", "identifier": " N"} ] This JSON string is encrypted with Rijndael 256 CBC with the key delivered to the client, using a unique initialization vector generated by the client for each request. POST request The clients customer id, the encrypted data (base64-encoded), the initialization vector (base64-encoded) and error condition return address are transmitted to Onnistuu.fi as a POST request, for example: <form method="post" action=" <input type="hidden" name="return_failure" value=" /> <input type="hidden" name="customer" value="90e07b0a-1ee6-4da0-92cc-bcea0d2af4e7" /> <input type="hidden" name="data" value="5gttb8nufmjty5nxz9m5f7thtxg5ujwlnnntpq5osdmuvoum8jyk3vr7t87 zcbej8yqsxi840pr2f6plp07/fsyis6wqqtdqcweizsx08dokdbhlaqblgqjfplytu Tmrzcm3KAeOJm12BFhn79NZQfy5HBCxb0rn+MAVEZzb9JAz3jH5iyX5ITXTHhfagX4 Bjyc44rObJ4Xjj1WK0oYX20mnr/M0ARDzm29mSbKVEF/Q7fxOMr2yp6ODij3vcPnGi qyv0eqvyjw4xjfbh4l0x7vnan9pfbgwg6m2kreuryykhnseo5jm8rqsvlph1p2vsht W1DND/npwDFxozI6QlaT31BlPZwJbwTxjkK5lBaXBUQNQx0Mwu7G1AVL8W+otS1Uin d5xwovl/xlmyuiwmgq8yv/7r75vpejmq/oja0adnhq/1huvo1mggj0yeb8wt1tx3/7 TLQLY+MDsTP27gA==" /> <input type="hidden" name="iv" value="zrde/ +5twpwPD6nrrUo9E/2oJqYHFpsAtUoSTMX0Pn4=" /> <input type="submit" value="sign" /> </form> Encryption options The encryption used can be modified with POST parameters: <form...> <input type="hidden" name="cipher" value="rijndael-128" /> <input type="hidden" name="padding" value="pkcs5" />... </form> These options will also be used for responses to this request. When left undefined, the options default to rijndael-256 and null.
5 3.1 Handling of failed signature situations By default, if an immediately required signature addition fails, Onnistuu.fi presents a page for selecting a new signing method. If the client wants the end user to return to their system after such failures, they can define the parameter return_after_failures in the request:... <input type="hidden" name="return_after_failures" value="1" />... Be aware, that in this case the end user is returned to the URI given in return_success. The return data will only include information about the signatures that were successful. 3.2 Defining an identification method in the request If only one signing is to be done, the identification method can be defined in the request, in which case Onnistuu.fi will directly forward the end user to the service:... <input type="hidden" name="auth_service" value="tupas-nordea" />... A list of available identification methods can be obtained with a GET request: 1ee6-4da0-92cc-bcea0d2af4e7/ It is returned as JSON: [{"name": "Osuuspankki", "value": "tupas-osuuspankki", "img": " {"name": "Nordea", "value": "tupas-nordea", "img": "
6 3.3 Sending signature invitations with the API request The request can contain requirements of the type " ". These requirements will cause invitations to be sent after the immediate signings. The client organization administrator will be sent notifications of new signatures. {... "requirements": [{"type": " ", "identifier": " D", " ": Return request for invitation requirements After each signing, Onnistuu.fi can send a return GET request to the client, if requested. (Note that this needs to be defined for each requirement) {... "requirements": [{"type": " ", "identifier": " D", " ": "[email protected]", "return_request_on_sign": "1"}]} The GET request is made to the return_success URL defined in the original API request SMS invitations A mobile phone number (MSISDN) can also be defined in the requirement, and will receive an SMS message with an invitation link and the confirmation hash. {... "requirements": [{"type": " ", "identifier": " D", " ": "[email protected]", "sms": " "}]} When using an SMS message, the invitation parts can be separated, such that the url is sent through and the hash in an SMS message. {... "requirements": [{..., "sms": " ", "separate_invite_parts":"1"}]} It is also possible to send a custom SMS message: {... "requirements": [{..., "sms": " ", "customized_sms": "You have received an invitation to sign contract ABC123 -ExampleCompany"}]} When sending a custom SMS message, the normal invitation SMS is not sent by default. There is an option to send both the custom SMS and the invitation SMS: {... "requirements": [{..., "sms": " ", "customized_sms": "You have received an invitation to sign contract ABC123 -ExampleCompany", "customized_sms_both":"1"}]}
7 3.3.3 Inviter details The request can also define inviter details to be shown in the invitation s and during the signing process. Onnistuu.fi doesn't cache the possibly defined logo image or css file, both of which should be served through HTTPS to avoid browser warnings. The given inviter address will be sent notifications on new signatures, is shown as the invitation sender, and will receive the possible comments from signers. Depending on the address' DNS settings this may affect delivery of invitations. {... "requirements": [{"type": " ", "identifier": " D", " ": xample.org/signature_logo.jpg","inviter_css":" nnistuu.css"}]} Disabling signer capabilities Each requirement can define certain signer capabilities to be disabled. This will only affect the user interface. The capabilities that can be disabled are 'download', 'comment' and 'remove'. { "requirements": [{"type":" ", "identifier": " D", " ": "[email protected]", "disable_capabilities": ["download", "comment", "remove"]}]} Invitation signing order requirements Ordering requirements can be defined for the invitations, and the invitations will be sent accordingly: type identifier order require_order [email protected] [email protected] F [email protected] 3 0 Here, the invitations with order numbers 1 and 2 will be sent at the time of the API request, and invitation 3 only after the first two signatures have been collected. The 'order' and 'require_order' fields should be integers in json. {... "requirements": [{..., "order":1, "require_order":1}]}
8 3.3.6 Disabling the 'all signed' for a signer The 'all signed' that notifies signers of the completion of the document signing process can be disabled. {..., "requirements": [ { "type": " ", "identifier": " D", " ": "[email protected]", "no_all_signed_mail": "1" } ]} Disabling the invitation for a signer The invitation itself can be disabled, if you wish to deliver the invitation yourself. The invitation details necessary are given in the api return data. The invitation will still be visible for the user if they log into onnistuu.fi and have the correct verified address. {..., "requirements": [ { "type": " ", "identifier": " D", " ": "[email protected]", "no_invitation_mail": "1" } ]} Disabling the signature added s for the inviter By default, the first organization contact of an inviting organization is sent an for each collected signature. This can be disabled: {..., "requirements": [ { "type": " ", "identifier": " D", " ": "[email protected]", "no_signature_added_mail": "1" } ]}
9 3.3.9 Requiring organization signatures The signature to be collected can be required to be made as an organization. If the signer has signing rights in an organization registered at Onnistuu.fi, they can use that validated information. Otherwise they will be asked for the name of the organization and their position giving the right to sign. This information is not checked for validity by Onnistuu.fi. {..., "requirements": [ { "type": " ", "identifier": " D", " ": "[email protected]", "sign_as_organization": "1" } ]} 3.4 Document category The request can define a category for the document. The category is identified by name and must already exist at Onnistuu.fi. Categories are organization specific. { } "stamp": " ", "return_success": " "document": " "category": "Example category", "requirements": [ {"type": "person", "identifier": " N"} ] 4. Document availability requirement The document to be signed needs to be available at the clients server for Onnistuu.fi, using a GET request. 5. Signature methods The end user signs the document in the Onnistuu.fi service.
10 6. Return data Onnistuu.fi returns the end user and return data as a redirected GET request. The return data consists of the new document version URI and information on the made signings. The data is delivered encrypted with Rijndael 256 CBC, using the clients encryption key and an initialization vector generated by Onnistuu.fi. The client decrypts the information using their key and the given initialization vector. data=5gttb8nufmjty5nxz9m5f7thtxg5ujwlnnntpq5osdmuvoum8jyk3vr7t87zc Bej8yQsxI840pr2f6plp07/FsyiS6wqQtDqcweIzsX08DOKdbHlaQBLgqjFpLYtuTm rzcm3kaeojm12bfhn79nzqfy5hbcxb0rn+mavezzb9jaz3jh5iyx5itxthhfagx4bj yc44robj4xjj1wk0oyx20mnr/m0ardzm29msbkvef/q7fxomr2yp6odij3vcpngiqy v0eqvyjw4xjfbh4l0x7vnan9pfbgwg6m2kreuryykhnseo5jm8rqsvlph1p2vshtw1 DND/npwDFxozI6QlaT31BlPZwJbwTxjkK5lBaXBUQNQx0Mwu7G1AVL8W+otS1Uind5 XWOvl/xLmyUIwmgq8yv/7R75VpEJMq/OJa0adNHq/1HuVo1MgGj0yEb8Wt1tx3/7TL QLY+MDsTP27gA== &iv=tuswcc8jsrjlexzzthir0lr3fc0qjsxsjvvnz2umzwe= The decrypted return data is presented as JSON: {"stamp": " ", "document": " 1621dc4ac8e6db32be3a7a/", "cancel": " c6ccbba5ae1d170b313f8/", "signatures": [{"type": "person", "identifier": " N", "name": "John Smith", "timestamp": " :23:34", "uuid": "544b78a2-e db9159d"}, {"type": "company", "identifier": " ", "name": "Example Oy", "timestamp": " :24:45", "uuid": "7aa3dd3d-b adb-e788e "}]} The return data fields are described in more detail on the next page. Note that the response information should not be made directly available to end users at any point Return information without a redirection When the api is used only for invitations, the client can request the return data to be served by Onnistuu.fi as JSON instead of redirecting to the return_success url with GET parameters. return_success is still required and will be used in return_request_on_sign cases. (3.3.1.) {"stamp": " ",..., "return_success": " "return_success_json":"1"} causes the response {"data":"...", "iv":"..."}
11 Return data fields stamp document cancel signatures invitations The API process identifier, as defined by the client system in the request. An URL for retrieval of the new document PDF file with a GET request. The document is embedded with the signature information. An URL for canceling the signing process with a GET request. Can only be used if there are still signatures missing. Returns a JSON true/false. The immediately collected signatures as an array. In the return_request_on_sign case, only includes the signature the request is being made for. The signature invitations created as described in section 3.3. If your system has existing authentication for the invited end users, you can provide them with links and keys to their invitations. Signature data fields type identifier name timestamp uuid Either "person" or "company". Should be used for determining how to process the identifier field. Either a PIN/SSN for a person or a company registration code for a company. The name of the signing entity. In the case of persons, provided by the bank on each authentication. An ISO 8601 date and time for when the signature was processed. An UUIDv4 identifier for the signature, for verifying the document and signatures at a later date. Invitation data fields url key The address the invitation was sent to, as defined in the request. The invitation url the end user will use to add the document to their signing cart. A string the end user will be asked to enter to add the document.
12 Document verification The documents can be verified in the client system with a GET request to Onnistuu.fi: df43e7ed272e/ or optionally df43e7ed272e/sha1/a584099c99c103a57b2364b0d904c5f0c3971f09/ where the customer field is the clients customer id, the document field a documents UUID id and the optional sha1 field a hex encoded SHA1 hash of the document file. Onnistuu.fi will return JSON: {"document":"b c-477a-abd8-df43e7ed272e","signatures": [{"uuid":"a34a664e-57f4-45e4-b33b-9d4b b","name":"demo Nordea","timestamp":" :38:14"},{"uuid":"4a981a1c-2d b-59d641b3c4c5","name":"Testaaja Teemu, Testiyritys Oy","timestamp":" :39:53"}]} where the document field confirms the existence of the document and the signatures list the added signatures. The signer names and timestamps are only shown if the given SHA1 hash corresponds to a version of the document containing the signature. The beginning of the document verification URI shown on top of each document page can be defined with the field "document_check_url" in the JSON request: {"stamp": " ",..., "document_check_url": " If the verification address beginning is not specified, the Onnistuu.fi default verification service URI is used.
13 Error situations In the case of errors, Onnistuu.fi returns the end user to the given error page with an error message: onnistuu_error=60&onnistuu_message=could%20not%20fetch%20document Error codes 10 Invalid client customer id 20 The request could not be decrypted 21 The requested cipher is invalid 22 The requested padding is invalid 30 The success return address is invalid 40 The document retrieval address is invalid 50 The signature requirements are erroneous 60 The document could not be retrieved from the client system 70 The document file is too large 80 The document is not a valid PDF file 90 The requested identification service provider is invalid 100 return_failure address is invalid 110 Request was not POST 111 Request POST data was empty 120 An internal error occurred at Onnistuu.fi 140 Document check address invalid 150 Document category invalid 210 User cancelled signing before selecting an identity provider 220 User cancelled signing at an identity provider 230 User cancelled signing, last error was possible ssn mismatch
MONETA.Assistant API Reference
MONETA.Assistant API Reference Contents 2 Contents Abstract...3 Chapter 1: MONETA.Assistant Overview...4 Payment Processing Flow...4 Chapter 2: Quick Start... 6 Sandbox Overview... 6 Registering Demo Accounts...
Package PKI. July 28, 2015
Version 0.1-3 Package PKI July 28, 2015 Title Public Key Infrastucture for R Based on the X.509 Standard Author Maintainer Depends R (>= 2.9.0),
INTEGRATE SALESFORCE.COM SINGLE SIGN-ON WITH THIRD-PARTY SINGLE SIGN-ON USING SENTRY A GUIDE TO SUCCESSFUL USE CASE
INTEGRATE SALESFORCE.COM SINGLE SIGN-ON WITH THIRD-PARTY SINGLE SIGN-ON USING SENTRY A GUIDE TO SUCCESSFUL USE CASE Legal Marks No portion of this document may be reproduced or copied in any form, or by
Salesforce1 Mobile Security Guide
Salesforce1 Mobile Security Guide Version 1, 1 @salesforcedocs Last updated: December 8, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of salesforce.com,
AS DNB banka. DNB Link specification (B2B functional description)
AS DNB banka DNB Link specification (B2B functional description) DNB_Link_FS_EN_1_EXTSYS_1_L_2013 Table of contents 1. PURPOSE OF THE SYSTEM... 4 2. BUSINESS PROCESSES... 4 2.1. Payment for goods and services...
InternetVista Web scenario documentation
InternetVista Web scenario documentation Version 1.2 1 Contents 1. Change History... 3 2. Introduction to Web Scenario... 4 3. XML scenario description... 5 3.1. General scenario structure... 5 3.2. Steps
TechNote 0006: Digital Signatures in PDF/A-1
TechNote 0006: Digital Signatures in PDF/A-1 Digital signatures are primarily used to check the integrity of the signed part of the document. They also can be used to authenticate the signer s identity
Qualtrics Single Sign-On Specification
Qualtrics Single Sign-On Specification Version: 2010-06-25 Contents Introduction... 2 Implementation Considerations... 2 Qualtrics has never been used by the organization... 2 Qualtrics has been used by
Paynow 3rd Party Shopping Cart or Link Integration Guide
Paynow 3rd Party Shopping Cart or Link Integration Guide Version 1.0.5 15 August 2014 A guide outlining merchant integration into Paynow for externally hosted shopping carts or applications. For details
Fairsail REST API: Guide for Developers
Fairsail REST API: Guide for Developers Version 1.02 FS-API-REST-PG-201509--R001.02 Fairsail 2015. All rights reserved. This document contains information proprietary to Fairsail and may not be reproduced,
Symmetric and Public-key Crypto Due April 14 2015, 11:59PM
CMSC 414 (Spring 2015) 1 Symmetric and Public-key Crypto Due April 14 2015, 11:59PM Updated April 11: see Piazza for a list of errata. Sections 1 4 are Copyright c 2006-2011 Wenliang Du, Syracuse University.
Dashlane Security Whitepaper
Dashlane Security Whitepaper November 2014 Protection of User Data in Dashlane Protection of User Data in Dashlane relies on 3 separate secrets: The User Master Password Never stored locally nor remotely.
GTPayment Merchant Integration Manual
GTPayment Merchant Integration Manual Version: Page 1 of 7 What s New in version 1.2.0? 1. Price format limit. Only number or decimal point What s New in version 1.2.1? 1. Take out the Moneybookers
Introduction...3 Terms in this Document...3 Conditions for Secure Operation...3 Requirements...3 Key Generation Requirements...
Hush Encryption Engine White Paper Introduction...3 Terms in this Document...3 Conditions for Secure Operation...3 Requirements...3 Key Generation Requirements...4 Passphrase Requirements...4 Data Requirements...4
Ciphermail Gateway PDF Encryption Setup Guide
CIPHERMAIL EMAIL ENCRYPTION Ciphermail Gateway PDF Encryption Setup Guide March 6, 2014, Rev: 5454 Copyright c 2008-2014, ciphermail.com. CONTENTS CONTENTS Contents 1 Introduction 4 2 Portal 4 3 PDF encryption
SeChat: An AES Encrypted Chat
Name: Luis Miguel Cortés Peña GTID: 901 67 6476 GTG: gtg683t SeChat: An AES Encrypted Chat Abstract With the advancement in computer technology, it is now possible to break DES 56 bit key in a meaningful
MarshallSoft AES. (Advanced Encryption Standard) Reference Manual
MarshallSoft AES (Advanced Encryption Standard) Reference Manual (AES_REF) Version 3.0 May 6, 2015 This software is provided as-is. There are no warranties, expressed or implied. Copyright (C) 2015 All
ipayment Gateway API (IPG API)
ipayment Gateway API (IPG API) Accepting e-commerce payments for merchants Version 3.2 Intercard Finance AD 2007 2015 Table of Contents Version control... 4 Introduction... 5 Security and availability...
Virtual Payment Client Integration Reference. April 2009 Software version: 3.1.21.1
Virtual Payment Client Integration Reference April 2009 Software version: 3.1.21.1 Copyright MasterCard and its vendors own the intellectual property in this Manual exclusively. You acknowledge that you
SSL Protect your users, start with yourself
SSL Protect your users, start with yourself Kulsysmn 14 december 2006 Philip Brusten Overview Introduction Cryptographic algorithms Secure Socket Layer Certificate signing service
How to Time Stamp PDF and Microsoft Office 2010/2013 Documents with the Time Stamp Server
How to Time Stamp PDF and Microsoft Office 2010/2013 Documents with the Time Stamp Server Introduction Time stamping is an important mechanism for the long-term preservation of digital signatures, time
[SMO-SFO-ICO-PE-046-GU-
Presentation This module contains all the SSL definitions. See also the SSL Security Guidance Introduction The package SSL is a static library which implements an API to use the dynamic SSL library. It
Contents. 2 Alfresco API Version 1.0
The Alfresco API Contents The Alfresco API... 3 How does an application do work on behalf of a user?... 4 Registering your application... 4 Authorization... 4 Refreshing an access token...7 Alfresco CMIS
OpenADR 2.0 Security. Jim Zuber, CTO QualityLogic, Inc.
OpenADR 2.0 Security Jim Zuber, CTO QualityLogic, Inc. Security Overview Client and server x.509v3 certificates TLS 1.2 with SHA256 ECC or RSA cipher suites TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 TLS_RSA_WITH_AES_128_CBC_SHA256
Release Notes. DocuSign Spring 15 Release Notes. Contents
Release Notes Updated March 6, 2015 DocuSign Spring 15 Release Notes This document provides information about the updates deployed to the DocuSign Production environment as part of the March 6, 2015 DocuSign
Login with Amazon. Getting Started Guide for Websites. Version 1.0
Login with Amazon Getting Started Guide for Websites Version 1.0 Login with Amazon: Getting Started Guide for Websites Copyright 2016 Amazon Services, LLC or its affiliates. All rights reserved. Amazon
API Integration Payment21 Button
API Integration Payment21 Button The purpose of this document is to describe the requirements, usage, implementation and purpose of the Payment21 Application Programming Interface (API). The API will allow
Managed Services PKI 60-day Trial Quick Start Guide
Entrust Managed Services PKI Managed Services PKI 60-day Trial Quick Start Guide Document issue: 3.0 Date of issue: Nov 2011 Copyright 2011 Entrust. All rights reserved. Entrust is a trademark or a registered
CONTRACT MODEL IPONZ DESIGN SERVICE VERSION 2. Author: Foster Moore Date: 20 September 2011 Document Version: 1.7
CONTRACT MODEL IPONZ DESIGN SERVICE VERSION 2 Author: Foster Moore Date: 20 September 2011 Document Version: 1.7 Level 6, Durham House, 22 Durham Street West PO Box 106857, Auckland City Post Shop, Auckland
Verification of digitally signed PDFs
Verification of digitally signed PDFs Configuring Adobe Reader to verify digitally signed PDFs This document is freely redistributable. You can find the latest version at: http://www.netlock.hu/useren
Digital Signatures on iqmis User Access Request Form
Digital Signatures on iqmis User Access Request Form When a user clicks in the User Signature block on the iqmis Access Form, the following window appears: Click Save a Copy and rename it with your name,
Package PKI. February 20, 2013
Package PKI February 20, 2013 Version 0.1-1 Title Public Key Infrastucture for R based on the X.509 standard Author Maintainer Depends R (>=
SELF SERVICE RESET PASSWORD MANAGEMENT ARCHITECTURE GUIDE
SELF SERVICE RESET PASSWORD MANAGEMENT ARCHITECTURE GUIDE Copyright 1998-2015 Tools4ever B.V. All rights reserved. No part of the contents of this user guide may be reproduced or transmitted in any form
Forumbee Single Sign- On
Forumbee Single Sign- On What is Single Sign- On? In basic terms, Single Sign- On (SSO) allows users of your web site to log into your Forumbee community automatically, without needing to sign up and create
How To Electronically Sign A Document On Docusign.Com
Receiving a Document for Free-Form Signing This guide provides information about how to electronically sign a document using the DocuSign Service with Free-Form signing. Electronic signing provides a quick,
Configuring SSL Termination
CHAPTER 4 This chapter describes the steps required to configure a CSS as a virtual SSL server for SSL termination. It contains the following major sections: Overview of SSL Termination Creating an SSL
PGP - Pretty Good Privacy
I should be able to whisper something in your ear, even if your ear is 1000 miles away, and the government disagrees with that. -- Philip Zimmermann PGP - Pretty Good Privacy - services - message format
The Vetuma Service of the Finnish Public Administration SAML interface specification Version: 3.5
The Vetuma Service of the Finnish Public Administration SAML interface specification Version: 3.5 Vetuma Authentication and Payment Table of Contents 1. Introduction... 3 2. The General Features of the
MERCHANT INTEGRATION GUIDE. Version 2.8
MERCHANT INTEGRATION GUIDE Version 2.8 CHANGE LOG 1. Added validation on allowed currencies on each payment method. 2. Added payment_method parameter that will allow merchants to dynamically select payment
Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0
Entrust Managed Services PKI Getting started with digital certificates and Entrust Managed Services PKI Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust
SSO Eurécia. and external Applications. Purpose
SSO Eurécia Purpose This document describes the way to manage SSO connection and external applications. The users logged to the external application by entering his credentials then access to Eurécia without
EVault Endpoint Protection 7.0 Single Sign-On Configuration
Revision: This manual has been provided for Version 7.0 (July 2014). Software Version: 7.0 2014 EVault Inc. EVault, A Seagate Company, makes no representations or warranties with respect to the contents
Absorb Single Sign-On (SSO) V3.0
Absorb Single Sign-On (SSO) V3.0 Overview Absorb allows single sign-on (SSO) with third-party systems, regardless of the programming language. SSO is made secure by a series of calls (between Absorb and
HMRC Secure Electronic Transfer (SET)
HM Revenue & Customs HMRC Secure Electronic Transfer (SET) Installation and key renewal overview Version 3.0 Contents Welcome to HMRC SET 1 What will you need to use HMRC SET? 2 HMRC SET high level diagram
WildFire Cloud File Analysis
WildFire Cloud File Analysis The following topics describe the different methods for sending files to the WildFire Cloud for analysis. Forward Files to the WildFire Cloud Verify Firewall File Forwarding
Copyright: WhosOnLocation Limited
How SSO Works in WhosOnLocation About Single Sign-on By default, your administrators and users are authenticated and logged in using WhosOnLocation s user authentication. You can however bypass this and
ETSI TS 102 176-2 V1.2.1 (2005-07)
TS 102 176-2 V1.2.1 (2005-07) Technical Specification Electronic Signatures and Infrastructures (ESI); Algorithms and Parameters for Secure Electronic Signatures; Part 2: Secure channel protocols and algorithms
ETSI TS 102 778 V1.1.1 (2009-04) Technical Specification
TS 102 778 V1.1.1 (2009-04) Technical Specification Electronic Signatures and Infrastructures (ESI); PDF Advanced Electronic Signature Profiles; CMS Profile based on ISO 32000-1 2 TS 102 778 V1.1.1 (2009-04)
SAFE Digital Signatures in PDF
SAFE Digital Signatures in PDF Ed Chase Adobe Systems Digital Signatures in PDF Digital Signature Document Digital ID Doc Digest Signer s digital identity is bound to document Modifying document invalidates
mod_ssl Cryptographic Techniques
mod_ssl Overview Reference The nice thing about standards is that there are so many to choose from. And if you really don t like all the standards you just have to wait another year until the one arises
Methods available to GHP for out of band PUBLIC key distribution and verification.
GHP PGP and FTP Client Setup Document 1 of 7 10/14/2004 3:37 PM This document defines the components of PGP and FTP for encryption, authentication and FTP password changes. It covers the generation and
Network-Enabled Devices, AOS v.5.x.x. Content and Purpose of This Guide...1 User Management...2 Types of user accounts2
Contents Introduction--1 Content and Purpose of This Guide...........................1 User Management.........................................2 Types of user accounts2 Security--3 Security Features.........................................3
Waspmote Encryption Libraries. Programming guide
Waspmote Encryption Libraries Programming guide Index Document version: v4.3-01/2015 Libelium Comunicaciones Distribuidas S.L. INDEX 1. General Concepts... 4 2. Integrity... 7 2.1. Waspmote Libraries...7
Lab Exercise SSL/TLS. Objective. Requirements. Step 1: Capture a Trace
Lab Exercise SSL/TLS Objective To observe SSL/TLS (Secure Sockets Layer / Transport Layer Security) in action. SSL/TLS is used to secure TCP connections, and it is widely used as part of the secure web:
GNUTLS. a Transport Layer Security Library This is a Draft document Applies to GnuTLS 1.0.13. by Nikos Mavroyanopoulos
GNUTLS a Transport Layer Security Library This is a Draft document Applies to GnuTLS 1.0.13 by Nikos Mavroyanopoulos ii Copyright c 2001,2002,2003 Nikos Mavroyanopoulos Permission is granted to copy, distribute
Digital Signatures in a PDF
This document describes how digital signatures are represented in a PDF document and what signature-related features the PDF language supports. Adobe Reader and Acrobat have implemented all of PDF s features
OPENID AUTHENTICATION SECURITY
OPENID AUTHENTICATION SECURITY Erik Lagercrantz and Patrik Sternudd Uppsala, May 17 2009 1 ABSTRACT This documents gives an introduction to OpenID, which is a system for centralised online authentication.
Enhanced Password Security - Phase I
Enhanced Password Security - Phase I Feature History 120(18)S 121(8a)E 122(14)S This feature was introduced Support for this feature was integrated into Cisco IOS Release 121(8a)E This feature was integrated
How to Order and Install Odette Certificates. Odette CA Help File and User Manual
How to Order and Install Odette Certificates Odette CA Help File and User Manual 1 Release date 24.02.2014 Contents Preparation for Ordering an Odette Certificate... 3 Step 1: Prepare the information you
SRFax Fax API Web Services Documentation
SRFax Fax API Web Services Documentation Revision Date: July 2015 The materials and sample code are provided only for the purpose of an existing or potential customer evaluating or implementing a programmatic
E-payment. Service description
E-payment Service description Page 2 (15) Content 1 E-payment... 3 1.1 General description... 3 1.2 Advantages... 3 1.3 Availability... 3 1.4 Security... 3 2 Service agreement, instructions and start-up...
MiGS Virtual Payment Client Integration Guide. July 2011 Software version: MR 27
MiGS Virtual Payment Client Integration Guide July 2011 Software version: MR 27 Copyright MasterCard and its vendors own the intellectual property in this Manual exclusively. You acknowledge that you must
This chapter describes how to use the Junos Pulse Secure Access Service in a SAML single sign-on deployment. It includes the following sections:
CHAPTER 1 SAML Single Sign-On This chapter describes how to use the Junos Pulse Secure Access Service in a SAML single sign-on deployment. It includes the following sections: Junos Pulse Secure Access
HOW IT WORKS E-SIGNLIVE 1 INTRODUCTION 2 OVERVIEW
HOW IT WORKS E-SIGNLIVE 1 INTRODUCTION With e-signlive, Silanis hosted service, you can invite other people to conveniently and securely sign documents over the web. Your documents can be easily signed
Credomatic Integration Resources. Browser Redirect API Documentation June 2007
Credomatic Integration Resources Browser Redirect API Documentation June 2007 Table of Contents Methodology... 2 Browser Redirect Method (Browser to Server) FIG. 1... 2 API Authentication Parameters...
COMMERCIAL-IN-CONFIDENCE
CardEaseMPI a technical manual describing the use of CardEaseMPI 3-D Secure Merchant Plug-In. Authors: Nigel Jewell Issue 2.9. November 2014. COMMERCIAL-IN-CONFIDENCE Copyright CreditCall Limited 2007-2014
IBM Aspera Add-in for Microsoft Outlook 1.3.2
IBM Aspera Add-in for Microsoft Outlook 1.3.2 Windows: 7, 8 Revision: 1.3.2.100253 Generated: 02/12/2015 10:58 Contents 2 Contents Introduction... 3 System Requirements... 5 Setting Up... 6 Account Credentials...6
Using CertAgent to Obtain Domain Controller and Smart Card Logon Certificates for Active Directory Authentication
Using CertAgent to Obtain Domain Controller and Smart Card Logon Certificates for Active Directory Authentication Contents Domain Controller Certificates... 1 Enrollment for a Domain Controller Certificate...
Setting up single signon with Zendesk Remote Authentication
Setting up single signon with Zendesk Remote Authentication Zendesk Inc. 2 Zendesk Developer Library Introduction Notice Copyright and trademark notice Copyright 2009 2013 Zendesk, Inc. All rights reserved.
Merchant Card Payment Engine
Merchant Card Payment Engine GATEWAY FREEDOM +IMA 3D SECURE INTEGRATION SUPPLEMENT Copyright PayPoint.net 2010 This document contains the proprietary information of PayPoint.net and may not be reproduced
CCH esign. Quick Start Guide
CCH esign Quick Start Guide December 2015 2015 CCH Incorporated and its affiliates and licensors. All rights reserved. Material in this publication may not be reproduced or transmitted, in any form or
Chapter 17. Transport-Level Security
Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics
Traitware Authentication Service Integration Document
Traitware Authentication Service Integration Document February 2015 V1.1 Secure and simplify your digital life. Integrating Traitware Authentication This document covers the steps to integrate Traitware
Bank link technical specifications. Information for programmers
Bank link technical specifications Information for programmers 2015 01 08 1 Content Content...2 Rules of services...3 Queries...3 Queries from the merchant to the bank...4 Queries from the bank to the
Security Digital Certificate Manager
IBM i Security Digital Certificate Manager 7.1 IBM i Security Digital Certificate Manager 7.1 Note Before using this information and the product it supports, be sure to read the information in Notices,
php-crypto-params Documentation
php-crypto-params Documentation Release 1.0.0 Gian Luca Dalla Torre January 17, 2016 Contents 1 Purpose 3 2 How it works 5 2.1 Documentation.............................................. 5 i ii php-crypto-params
Security Digital Certificate Manager
System i Security Digital Certificate Manager Version 5 Release 4 System i Security Digital Certificate Manager Version 5 Release 4 Note Before using this information and the product it supports, be sure
You re FREE Guide SSL. (Secure Sockets Layer) webvisions www.webvisions.com +65 6868 1168 [email protected]
SSL You re FREE Guide to (Secure Sockets Layer) What is a Digital Certificate? SSL Certificates, also known as public key certificates or Digital Certificates, are essential to secure Internet browsing.
Digital Signature: Efficient, Cut Cost and Manage Risk. Formula for Strong Digital Security
Digital Signature: Efficient, Cut Cost and Manage Risk Formula for Strong Digital Security Signature Rafidah Ariffin A person s name written in a distinctive way, pattern or characteristic as a form of
Detailed Specifications
1 of 6 Appendix Detailed Specifications 1. Standards The following standards are used in the document under the following abbreviations: - BASE32, BASE64, BASE64-URL: Network Working Group: Request for
Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0
Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features
Wakefield Council Secure email and file transfer User guide for customers, partners and agencies
Wakefield Council Secure email and file transfer User guide for customers, partners and agencies The nature of the work the council carries out means that we often deal with information that is sensitive
<option> eggs </option> <option> cheese </option> </select> </p> </form>
FORMS IN HTML A form is the usual way information is gotten from a browser to a server HTML has tags to create a collection of objects that implement this information gathering The objects are called widgets
Communication Security for Applications
Communication Security for Applications Antonio Carzaniga Faculty of Informatics University of Lugano March 10, 2008 c 2008 Antonio Carzaniga 1 Intro to distributed computing: -server computing Transport-layer
Network FAX Driver. Operation Guide
Network FAX Driver Operation Guide About this Operation Guide This Operation Guide explains the settings for the Network FAX driver as well as the procedures that are required in order to use the Network
ipay Checkout API (IPC API)
ipay Checkout API (IPC API) Accepting e-commerce payments for merchants Version 2.1 Intercard Finance AD 2007 2013 Table of Contents Introduction... 9 Scope... 10 the merchant / commercial decision makers...
PDFSealer User s Guide. ITEKSOFT Corporation Copyright 2002-2014 All rights reserved
PDFSealer User s Guide ITEKSOFT Corporation Copyright 2002-2014 All rights reserved Copyright ITEKSOFT Corporation. All rights reserved. You may make and distribute unlimited copies of this document as
Single Sign On Guide. Table of Contents
Single Sign On Guide Table of Contents I. Overview II. Benefits III. How SSO Works IV. Set-up Requirements and Recommendations V. Set-up Instructions a. Required Parameters b. Optional Parameters c. Error
Creating Digital Signatures
About Security You can secure a PDF using any of the following security methods: Add passwords and set security options to restrict opening, editing, and printing PDFs. Encrypt a document so that only
WiMAX Public Key Infrastructure (PKI) Users Overview
WiMAX Public Key Infrastructure (PKI) Users Overview WiMAX, Mobile WiMAX, Fixed WiMAX, WiMAX Forum, WiMAX Certified, WiMAX Forum Certified, the WiMAX Forum logo and the WiMAX Forum Certified logo are trademarks
RMFT Web Client User Guide
RMFT Web Client User Guide Software Version 2.5 Supported Browsers: Browser Internet Explorer Firefox Safari Google Chrome Version 7.0 and above 3 and above 3.2 and above 1.0 and above August 7, 2011 RepliWeb,
CyberSource Payer Authentication
Title Page CyberSource Payer Authentication Using the Simple Order API September 2015 CyberSource Corporation HQ P.O. Box 8999 San Francisco, CA 94128-8999 Phone: 800-530-9095 CyberSource Contact Information
Enhanced Password Security - Phase I
Enhanced Password Security - Phase I Feature History 120(18)S This feature was introduced This document describes the Enhanced Password Security feature in It includes the following sections: Feature Overview,
Secure Envelope specification
Secure Envelope specification for Corporate Access File Transfer 2/13/2015 Version 1.0.3 This document defines how a file (e.g. a payment file) which will be sent to the bank is digitally signed by the
Document Digital Signature
Supplier handbook Software Configuration for Digital Signature and Timestamp to certificate-based signature Document objectives and structure The document aims to support suppliers during the following
Lab Exercise SSL/TLS. Objective. Step 1: Open a Trace. Step 2: Inspect the Trace
Lab Exercise SSL/TLS Objective To observe SSL/TLS (Secure Sockets Layer / Transport Layer Security) in action. SSL/TLS is used to secure TCP connections, and it is widely used as part of the secure web:
Einführung in SSL mit Wireshark
Einführung in SSL mit Wireshark Chemnitzer Linux-Tage 16. März 2014 Martin Kaiser What? SSL/TLS is the most widely used security protocol on the Internet there's lots of parameters, options, extensions
How to Order and Install Odette Certificates. Odette CA Help File and User Manual
How to Order and Install Odette Certificates Odette CA Help File and User Manual 1 Release date 28.07.2014 Contents Preparation for Ordering an Odette Certificate... 3 Step 1: Prepare the information you
Forumbee Single Sign- On
Forumbee Single Sign- On What is Single Sign- On? In basic terms, Single Sign- On (SSO) allows users of your web site to log into your Forumbee community automatically, without needing to sign up and create
