secure2sign: Secure and Seamless Enterprise Signing for Word (including 2007).

Size: px
Start display at page:

Download "secure2sign: Secure and Seamless Enterprise Signing for Word (including 2007)."

Transcription

1 secure2sign: Secure and Seamless Enterprise Signing for Word (including 2007). Ensure integrity Checks for certificate revocation Support for two-factor digital signing Support for smart cards and etokens Electronic approval process, sign-off documents as approved, etc Time-stamping Checks for hidden data and embedded documents Support for unlimited number of signatures on the same document Includes objects that are embedded into content, such as a worksheet embedded into a Word document, in the signature. Helps with compliance such as ESIGN, etc secure2sign is an advanced digital signing tool which is integrated into Office in a manner that allows and encourages natural document signing. secure2sign makes signing documents as quick and easy as picking up a pen. Advanced security features ensure that documents are signed in a secure manner such that revoked certificates are not allowed to be used to sign documents. In addition, hidden data and embedded documents are supported. secure2sign supports the use of smart cards and two factor authentication such as the use of a PIN. 1 of 15

2 What Does secure2sign Offer? secure2sign enables you to digitally sign and timestamp documents so that it can be shown that the document: Has not been altered since it was signed this gives proof of content and assures integrity. Existed in this form at the time it was it was time-stamped, i.e. proof of existence. Unlike other digital signing tools, secure2sign: Does not use ActiveX controls, macros or Visual Basic code. The ability to sign without introducing active content: o o o o Eliminates the possibility of active content being maliciously exploited. Prevents the problem of firewalls filtering out documents with active content. Avoids conflicts with using documents with active content in secure environments. Ensures compatibility with Microsoft Office 2007 default native file formats (.docx) that specifically exclude any active elements (ActiveX, scripts or macros). Checks Microsoft Office documents for potentially malicious content before you sign, to ensure that you don't sign content that you are unaware of or that may display differently at a later date. Uses patent applied for techniques to prevent spoofing of the windows that display signature details. This prevents malicious programs from altering the display of signatures e.g. displaying an invalid signature as valid. Is resistant to the attacks that have been shown to affect other signing programs. Other features include: Full integration with Microsoft Word. Supports Microsoft Word 2000, 2002 (XP), 2003, Timestamping from an authorised time stamp time source to RFC Multiple signatures with co-signing and countersigning. Supports certificate validation using OCSP or CRL. (OSCP validation requires third party OCSP client.) Optional visible signature. Option to store detached signature independently for audit, etc., purposes. Display of signatures from Microsoft Office signing. Signs Office native file formats for Microsoft Office Word (.doc,.docm,.docx) as well as.rtf. mht..xml,.htm files created by Word. Signature includes objects that are embedded into content, such as a worksheet embedded into a Word document, etc. Stores log entry, from OCSP client validation of certificate at signing time, with signature. This enables the log entry to be viewed at any time after the signing for audit purposes, independent of the OCSP client software. (Requires third party OCSP client.) Full administrator control over functions, acceptable certificate revocation, etc. 2 of 15

3 An example of document signing using IdenTrust banking (x509) digital certificates on a smartcard with a pin number in Word Secure2sign is fully integrated into Office 2007 applications such as Word. Tool Bar menu items allow you to sign the document and view the signatures Secure2sign is found in the Add- Ins menu. Click here Click here 3 of 15

4 You can choose to sign only, sign with time stamp or timestamp only. secure2sign will allow signing with or without a visible graphic signature being added to the document. There is also the option to add a graphic image e.g. company logo, hand written signature etc You can choose to select a certificate from this drop down menu. 4 of 15

5 You also have a choice of text options that show why you have signed the document. You can type in your own reason for signing. In addition you can chose to sign all of the file or just the content. 5 of 15

6 6 of 15 secure2sign supports Smart cards and etokens Secure2sign supports two-factor authentication, e.g. if a PIN is required when using a certificate the PIN will be required when signing the document

7 Window showing an audit of signing, time stamping, reason for signing and status of certificate when signing is available via this button. This audit remains with the document and is added to every time a document is signed. 7 of 15

8 Click here to launch the audit window. The audit window includes the ability to view Microsoft Office 2007 signatures. When a user opens a document a window will be launched for a few seconds to advise them that the document is a signed and/or time stamped document 8 of 15

9 Revoked certificates: Revoked certificates cannot be used to sign documents. This is an important feature because legally they should be validated at the time of signing. If the signer's cert expires or otherwise becomes invalid later this is not relevant to a signature made earlier. 9 of 15

10 Hidden Metadata: secure2sign will warn you if hidden metadata could compromise you when you are about to sign a document. 10 of 15

11 With secure2sign a document can be Co-signed and/or Counter-signed: Co-signing process: secure2sign will allow users in an Enterprise to add multiple co-signing of a document. The original digital signature in the document. 11 of 15

12 Counter-signing: secure2sign will allow users in an Enterprise to add multiple counter-signing of a document. Prior to applying a counter signature secure2sign verifies the validity of the existing signatures at the time of signing. 12 of 15

13 Additional signature validation and audit with secure2sign: secure2sign supports both OCSP and CRL validation of certificates: OCSP call being made to a IdenTrust banking environment using CoreStreet s OCSP client. secure2sign timestamp and signature audit which is viewable by double clicking a visible graphic signature or via the verify certificate button on the tool bar. 13 of 15

14 Audit Logs: Certificate signing audit logs. Certificate validation history. secure2sign embedded log in the document from the OCSP validation call when the signature was applied to the document. 14 of 15

15 secure2sign works with any x509 certificates not just those stored on smartcards. It works both with and without the use of a pin. secure2sign works with joint US/UK certified T scheme digital certificates and the IdenTrust Banking digital certificate scheme. secure2sign will also support the US government HSPD-12 PIV cards. secure2sign supports two factor authentication such as the use of a PIN. With secure2sign, both signers and systems administrators can: Restrict choice of certificates to those from specified certificate authorities. Enforce certificate validation on signing. Enforce the use of OCSP validated certificates. Disable editing of the document, except for form fields, after signing. (Users with selected certificates can be allowed to edit the document.) These restrictions may be applied within an enterprise, so that documents signed within the enterprise can conform with the enterprise s signing policies. However, uniquely, secure2sign stores these rules within the signed document, so that signers outside of the enterprise can be forced to comply with them. Unlike other digital signing tools, secure2sign checks Microsoft Office documents for potentially malicious content before you sign, to ensure that you don't sign content that you are unaware of, or that may display differently at a later date. For example, a field could be set to change a number, such as $45,000 to $450,000 on a given date, you would have signed the document showing the lesser amount and unbeknown to you, that amount would be changed at a later date with no associated acknowledgement of that change. Below are two examples of "identity" smartcards containing digital certificates that are supported by secure2trust for digitally signing and accessing documents. [email protected] US Europe Avoco Secure All rights reserved. 15 of 15

GlobalSign PDF Signing Tool

GlobalSign PDF Signing Tool GlobalSign PDF Signing Tool Before you Begin- Please Note the Following: 1. Please note that this tool currently only works with Internet Explorer 2. This is a Free tool available to test sign PDFs, GlobalSign

More information

E-Lock ProSigner vs. In-built Acrobat 6.0 signatures

E-Lock ProSigner vs. In-built Acrobat 6.0 signatures E-Lock ProSigner vs. In-built Acrobat 6.0 signatures Table of Contents 1 INTRODUCTION... 2 1.1 E-LOCK PROSIGNER WORKS WITH ANY SECURITY FRAMEWORK... 2 1.2 EASY WIZARD BASED SIGNING OPERATION... 2 1.3 BACKWARD

More information

SAFE Digital Signatures in PDF

SAFE Digital Signatures in PDF SAFE Digital Signatures in PDF Ed Chase Adobe Systems Digital Signatures in PDF Digital Signature Document Digital ID Doc Digest Signer s digital identity is bound to document Modifying document invalidates

More information

Validating Digital Signatures in Adobe

Validating Digital Signatures in Adobe Validating Digital Signatures in Adobe Table of Contents Validating Digital Signatures in Adobe...1 1. Validate the Signature using Windows Integration...3 2. Add the Root Certificate on Adobe Trusted

More information

Using Entrust certificates with Adobe PDF files and forms

Using Entrust certificates with Adobe PDF files and forms Entrust Managed Services PKI Using Entrust certificates with Adobe PDF files and forms Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust is a trademark or

More information

Intertek esignature Customer Reference Document Author: Application Support. Page 1 of 17

Intertek esignature Customer Reference Document Author: Application Support. Page 1 of 17 Page 1 of 17 Document History Version Amendments Date Amended by 2.1 Corrected index numbering, revised Section 30-Jul-2014 Application Support 1.6 and references to 1.6; Corrected formatting 2.2 Added:

More information

An Introduction to CODE SIGNING

An Introduction to CODE SIGNING An Introduction to CODE SIGNING CONTENTS. 1 What is Code Signing. 03 2 Code Signing Certificates 101...05 3 Why & When to Digitally Sign Code.09 4 Self Signing vs. Publicly Trusted...12 5 Code Signing

More information

Getting Started 2. Inserting a Digital Signature Field without Signing 3. Signing an Unsigned Digital Signature Field 3

Getting Started 2. Inserting a Digital Signature Field without Signing 3. Signing an Unsigned Digital Signature Field 3 CoSign Quick Guide Signing Microsoft Office 2007/2010 Documents Contents Getting Started 2 Inserting a Digital Signature Field without Signing 3 Signing an Unsigned Digital Signature Field 3 Validating

More information

Publicly trusted certification authorities (CAs) confirm signers identities and bind their public key to a code signing certificate.

Publicly trusted certification authorities (CAs) confirm signers identities and bind their public key to a code signing certificate. Code Signing Code signing is the process of digitally signing executables and scripts to confirm the identity of the software author and guarantee that the code has not been altered or corrupted since

More information

CoSign by ARX for PIV Cards

CoSign by ARX for PIV Cards The Digital Signature Company CoSign by ARX for PIV Cards Seamless and affordable digital signature processes across FIPS 201-compliant systems Introduction to Personal Identity Verification (PIV) In response

More information

Adobe Acrobat 9 Digital Signatures, Changes and Improvements

Adobe Acrobat 9 Digital Signatures, Changes and Improvements Technical White Paper Updated for Adobe Acrobat and Adobe Reader 9.1 CONTENTS Introduction 1 Indication of overall validity state 3 Revision tracking in Signature panel 7 Change in status of forms that

More information

Adobe Acrobat Version 8, 9, 10, and 11 Instructions

Adobe Acrobat Version 8, 9, 10, and 11 Instructions Adobe Acrobat Version 8, 9, 10, and 11 Instructions Forms to be digitally signed Exceptions Contact Information Design Exception/Design Waiver Form (Interactive PDF form predesigned) Deviation from Standards

More information

Digital signature Solution for the Secure Electronic invoicing application

Digital signature Solution for the Secure Electronic invoicing application Contents Contents...1 Introduction...1 More detail...2 Certification Status Symbols...4 The signature properties...4 The invisible/visible watermark...7 How to set up the signature process for your country...8

More information

Verification of digitally signed PDFs

Verification of digitally signed PDFs Verification of digitally signed PDFs Configuring Adobe Reader to verify digitally signed PDFs This document is freely redistributable. You can find the latest version at: http://www.netlock.hu/useren

More information

Digital Signatures with AutoCAD and CoSign

Digital Signatures with AutoCAD and CoSign Digital Signatures with AutoCAD and CoSign 2 Contents Introduction... 2 Supported File Types... 3 Digitally Signing PDF Files or Drawings?... 3 Digitally Signing Drawing files with CoSign... 3 Configure

More information

Creating Digital Signatures

Creating Digital Signatures About Security You can secure a PDF using any of the following security methods: Add passwords and set security options to restrict opening, editing, and printing PDFs. Encrypt a document so that only

More information

X.509 Certificate Generator User Manual

X.509 Certificate Generator User Manual X.509 Certificate Generator User Manual Introduction X.509 Certificate Generator is a tool that allows you to generate digital certificates in PFX format, on Microsoft Certificate Store or directly on

More information

Instructions to operating forms created in MSWord and Excel

Instructions to operating forms created in MSWord and Excel Instructions to operating forms created in MSWord and Excel Forms created in MSWord and Excel can contain macros. In order for the form to work correctly, your MSWord/Excel security level must be set at

More information

PDF Signer User Manual

PDF Signer User Manual PDF Signer User Manual Introduction The main function of PDF Signer is to sign PDF documents using X.509 digital certificates. Using this product you can quickly sign multiple PDF files (bulk sign) by

More information

eadvantage Certificate Enrollment Procedures

eadvantage Certificate Enrollment Procedures eadvantage Certificate Enrollment Procedures Purpose: Instructions for members to obtain a digital certificate which is a requirement to conduct financial transactions with the Federal Home Loan Bank of

More information

Implementing Federal Personal Identity Verification for VMware View. By Bryan Salek, Federal Desktop Systems Engineer, VMware

Implementing Federal Personal Identity Verification for VMware View. By Bryan Salek, Federal Desktop Systems Engineer, VMware Implementing Federal Personal Identity Verification for VMware View By Bryan Salek, Federal Desktop Systems Engineer, VMware Technical WHITE PAPER Introduction This guide explains how to implement authentication

More information

Future directions of the AusCERT Certificate Service

Future directions of the AusCERT Certificate Service Future directions of the AusCERT Certificate Service QV Advanced Plus certificates Purpose Digital signatures non-repudiation, authenticity and integrity Encryption - confidentiality Client authentication

More information

Procedure for How to Enroll for Digital Signature

Procedure for How to Enroll for Digital Signature Procedure for How to Enroll for Digital Signature In Online Processing System getting to implement Digital Signature and Electronic Token for security and Authentication Purpose. For that bidder must have

More information

.NET Digital Signature Library User Manual

.NET Digital Signature Library User Manual .NET Digital Signature Library User Manual Introduction The main function of.net Digital Signature Library is to digitally sign files in PDF or PKCS#7 cryptographic standard (.P7S or.p7m files) using X.509

More information

Department of Veterans Affairs Two-Factor Authentication MobilePASS Quick Start Guide November 18, 2015

Department of Veterans Affairs Two-Factor Authentication MobilePASS Quick Start Guide November 18, 2015 Department of Veterans Affairs Two-Factor Authentication Quick Start Guide November 18, 2015 Introduction: This guide provides instructions for installation of the soft token on your non-piv enabled or

More information

Concept of Electronic Approvals

Concept of Electronic Approvals E-Lock Technologies Contact [email protected] Table of Contents 1 INTRODUCTION 3 2 WHAT ARE ELECTRONIC APPROVALS? 3 3 HOW DO INDIVIDUALS IDENTIFY THEMSELVES IN THE ELECTRONIC WORLD? 3 4 WHAT IS THE TECHNOLOGY

More information

OB10 - Digital Signing and Verification

OB10 - Digital Signing and Verification Global Headquarters 90 Fetter Lane London EC4A 1EN Tel: +44 (0) 870 165 7410 Fax: +44 (0) 207 240 2696 OB10 - Digital Signing and Verification www.ob10.com Version 2.4 March 2013 Summary In order to comply

More information

INDEPENDENT AUDIT REPORT BASED ON THE REQUIREMENTS OF ETSI TS 101 456. Aristotle University of Thessaloniki PKI (www.pki.auth.gr) WHOM IT MAY CONCERN

INDEPENDENT AUDIT REPORT BASED ON THE REQUIREMENTS OF ETSI TS 101 456. Aristotle University of Thessaloniki PKI (www.pki.auth.gr) WHOM IT MAY CONCERN Title INDEPENDENT AUDIT REPORT BASED ON THE REQUIREMENTS OF ETSI TS 101 456 Customer Aristotle University of Thessaloniki PKI (www.pki.auth.gr) To WHOM IT MAY CONCERN Date 18 March 2011 Independent Audit

More information

Wimba Create. Version 2.6. Installation Guide

Wimba Create. Version 2.6. Installation Guide Wimba Create Version 2.6 Installation Guide 1 Wimba Create Installation Guide Before Installing Wimba Create 1 Installing Wimba Create 2 Wimba Create Licenses and Trial Versions 4 Macro Security in Microsoft

More information

User Guide Supplement. S/MIME Support Package for BlackBerry Smartphones BlackBerry Pearl 8100 Series

User Guide Supplement. S/MIME Support Package for BlackBerry Smartphones BlackBerry Pearl 8100 Series User Guide Supplement S/MIME Support Package for BlackBerry Smartphones BlackBerry Pearl 8100 Series SWD-292878-0324093908-001 Contents Certificates...3 Certificate basics...3 Certificate status...5 Certificate

More information

Sinadura Free digital signature

Sinadura Free digital signature Sinadura Free digital signature 1 License This work is licenced under a Creative Commons License. zylk.net logo is a registered trademark of zylk.net S.L.L. Irontec Logo is a registered trademark of Irontec

More information

CODE SIGNING. Why Developers Need to Digitally Sign Code and Applications. +1-888-690-2424 entrust.com

CODE SIGNING. Why Developers Need to Digitally Sign Code and Applications. +1-888-690-2424 entrust.com CODE SIGNING Why Developers Need to Digitally Sign Code and Applications +1-888-690-2424 entrust.com Table of contents Why Code Sign? Page 3 What is Code Signing? Page 4 Verifying Code Authenticity Page

More information

Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008

Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008 Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008 Contents Authentication and Identity Assurance The Identity Assurance continuum Plain Password Authentication

More information

RPost Outlook Quick Start Guide

RPost Outlook Quick Start Guide RPost Outlook Quick Start Guide This document outlines the steps to send an email using the RPost services and a brief description of the features available with the RPost add-in for Microsoft Outlook.

More information

HOW IT WORKS E-SIGNLIVE 1 INTRODUCTION 2 OVERVIEW

HOW IT WORKS E-SIGNLIVE 1 INTRODUCTION 2 OVERVIEW HOW IT WORKS E-SIGNLIVE 1 INTRODUCTION With e-signlive, Silanis hosted service, you can invite other people to conveniently and securely sign documents over the web. Your documents can be easily signed

More information

Smart Card Setup Guide

Smart Card Setup Guide Smart Card Setup Guide K Apple Computer, Inc. 2006 Apple Computer, Inc. All rights reserved. Under the copyright laws, this manual may not be copied, in whole or in part, without the written consent of

More information

Digital Signature Verification using Historic Data

Digital Signature Verification using Historic Data Digital Signature Verification using Historic Data Digital signatures are now relatively common; however historic verification of digitally signed data is not so widely understood. As more data is held

More information

Introducing Director 11

Introducing Director 11 Introducing Director 11 Agenda Director 11 Introduction Mobile Certificate Manager - CA Import - Mobile Device Management (MDM) Integration - New Certificate Types - User Certificate Mapping - Single-

More information

Working with Macros and VBA in Excel 2007

Working with Macros and VBA in Excel 2007 Working with Macros and VBA in Excel 2007 With the introduction of Excel 2007 Microsoft made a number of changes to the way macros and VBA are approached. This document outlines these special features

More information

Document Management Getting Started Guide

Document Management Getting Started Guide Document Management Getting Started Guide Version: 6.6.x Written by: Product Documentation, R&D Date: February 2011 ImageNow and CaptureNow are registered trademarks of Perceptive Software, Inc. All other

More information

Email-Encryption with business partners

Email-Encryption with business partners Email-Encryption with business partners Date: 02. November 2006 Document type: User description Version: 1.2 Author: Volker Gebhard, Redaktionsteam WG PKI cio.siemens.com Table of contents: 1. Intention

More information

Exploring ADSS Server Signing Services

Exploring ADSS Server Signing Services ADSS Server is a multi-function server providing digital signature creation and signature verification services, as well as supporting other infrastructure services including Time Stamp Authority (TSA)

More information

SEZ SEZ Online Manual Digital Signature Certficate [DSC] V Version 1.2

SEZ SEZ Online Manual Digital Signature Certficate [DSC] V Version 1.2 SEZ SEZ Online Manual Digital Signature Certficate [DSC] V Version 1.2 Table of Contents 1 Introduction...2 2 Procurement of DSC...3 3 Installation of DSC...4 4 Procedure for entering the DSC details of

More information

Plug-In How-To Guide

Plug-In How-To Guide Plug-In How-To Guide Microsoft Word XP - 2003 Copyright Topaz Systems Inc. All rights reserved. For Topaz Systems, Inc. trademarks and patents, visit www.topazsystems.com/legal. Table of Contents Overview...

More information

Meeting the FDA s Requirements for Electronic Records and Electronic Signatures (21 CFR Part 11)

Meeting the FDA s Requirements for Electronic Records and Electronic Signatures (21 CFR Part 11) Meeting the FDA s Requirements for Electronic Records and Electronic Signatures (21 CFR Part 11) Executive Summary...3 Background...4 Internet Growth in the Pharmaceutical Industries...4 The Need for Security...4

More information

Installation and configuration guide

Installation and configuration guide Installation and Configuration Guide Installation and configuration guide Adding X-Username support to Forward and Reverse Proxy TMG Servers Published: December 2010 Applies to: Winfrasoft X-Username for

More information

Digital Signature: Efficient, Cut Cost and Manage Risk. Formula for Strong Digital Security

Digital Signature: Efficient, Cut Cost and Manage Risk. Formula for Strong Digital Security Digital Signature: Efficient, Cut Cost and Manage Risk Formula for Strong Digital Security Signature Rafidah Ariffin A person s name written in a distinctive way, pattern or characteristic as a form of

More information

SECO Whitepaper. SuisseID Smart Card Logon Configuration Guide. Prepared for SECO. Publish Date 19.05.2010 Version V1.0

SECO Whitepaper. SuisseID Smart Card Logon Configuration Guide. Prepared for SECO. Publish Date 19.05.2010 Version V1.0 SECO Whitepaper SuisseID Smart Card Logon Configuration Guide Prepared for SECO Publish Date 19.05.2010 Version V1.0 Prepared by Martin Sieber (Microsoft) Contributors Kunal Kodkani (Microsoft) Template

More information

HKUST CA. Certification Practice Statement

HKUST CA. Certification Practice Statement HKUST CA Certification Practice Statement IN SUPPORT OF HKUST CA CERTIFICATION SERVICES Version : 2.1 Date : 12 November 2003 Prepared by : Information Technology Services Center Hong Kong University of

More information

Microsoft Office Macro Security

Microsoft Office Macro Security Microsoft Macro Security March 2016 Introduction 1. Microsoft applications can execute macros to automate routine tasks. However, macros can contain malicious code resulting in unauthorised access to sensitive

More information

Signature policy for TUPAS Witnessed Signed Document

Signature policy for TUPAS Witnessed Signed Document Signature policy for TUPAS Witnessed Signed Document Policy version 1.0 Document version 1.1 1 Policy ID and location Policy ID Name URL urn:signicat:signaturepolicy:tupas wsd:1.0 Signature policy for

More information

Two Factor Authentication in SonicOS

Two Factor Authentication in SonicOS Two Factor Authentication in SonicOS 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION indicates potential damage

More information

Smart Card Certificate Authentication with VMware View 4.5 and Above WHITE PAPER

Smart Card Certificate Authentication with VMware View 4.5 and Above WHITE PAPER Smart Card Certificate Authentication with VMware View 4.5 and Above WHITE PAPER Table of Contents.... About This Paper.... 3 Introduction... 3 Smart Card Overview.... 3 Getting Started... 4 Authenticating

More information

Adobe PDF for electronic records

Adobe PDF for electronic records White Paper Adobe PDF for electronic records Digital signatures and PDF combine for definitive electronic records and transactions Contents 1 PDF and electronic records 2 Digital certification 3 Validating

More information

Access 2003 Macro Security Levels, Sandbox Mode, and Digitally Signed Files

Access 2003 Macro Security Levels, Sandbox Mode, and Digitally Signed Files Access 2003 Macro Security Levels, Sandbox Mode, and Digitally Signed Files Tim Gordon [email protected] Programming Plus (816) 333-7357 About dangerous code Dangerous code can consist of powerful

More information

Application Note Gemalto.NET 2.0 Smart Card Certificate Enrollment using Microsoft Certificate Services on Windows 2008

Application Note Gemalto.NET 2.0 Smart Card Certificate Enrollment using Microsoft Certificate Services on Windows 2008 7 Application Note Gemalto.NET 2.0 Smart Card Certificate Enrollment using Microsoft Certificate Services on Windows 2008 All information herein is either public information or is the property of and owned

More information

TechNote 0006: Digital Signatures in PDF/A-1

TechNote 0006: Digital Signatures in PDF/A-1 TechNote 0006: Digital Signatures in PDF/A-1 Digital signatures are primarily used to check the integrity of the signed part of the document. They also can be used to authenticate the signer s identity

More information

dobe Acrobat XI Pro Digital Signatures

dobe Acrobat XI Pro Digital Signatures dobe Acrobat XI Pro Digital Signatures Intermediate Adobe Acrobat XI Pro is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License. To view a copy of this

More information

Yale Software Library

Yale Software Library Yale Software Library http://www.yale.edu/its/software/ For assistance contact the ITS Help Desk 203-432-9000, [email protected] Two-factor authentication: Installation and configuration instructions for

More information

INFORMATION TECHNOLOGY CERES DEPARTMENT

INFORMATION TECHNOLOGY CERES DEPARTMENT INFORMATION TECHNOLOGY CERES DEPARTMENT LRA APPLICATION MANUAL Name Date Written by: Technical support 18/10/2010 Revised by: Approved by: DOCUMENT TRACEABILITY Version Date Description Author 1.0 18/10/2010

More information

Revu validates and signs documents based on the Windows Certificate Store and the PKCS #12 standards. Revu also supports Adobe CDS signatures.

Revu validates and signs documents based on the Windows Certificate Store and the PKCS #12 standards. Revu also supports Adobe CDS signatures. Digital Signatures Revu supports digital certification of PDFs and digitally signing PDFs. These two actions have some similarities, and can be done at the same time, but they are distinct. Before beginning,

More information

Technical Description. DigitalSign 3.1. State of the art legally valid electronic signature. The best, most secure and complete software for

Technical Description. DigitalSign 3.1. State of the art legally valid electronic signature. The best, most secure and complete software for Technical Description DigitalSign 3.1 State of the art legally valid electronic signature The best, most secure and complete software for Adding digital signatures to any document, in conformance with

More information

Plug-In How-To Guide

Plug-In How-To Guide Plug-In How-To Guide Microsoft Word 2007-2010 Copyright Topaz Systems Inc. All rights reserved. For Topaz Systems, Inc. trademarks and patents, visit www.topazsystems.com/legal. Table of Contents Overview...

More information

Extended SSL Certificates

Extended SSL Certificates Introduction Widespread usage of internet has led to the growth of awareness amongst users, who now associate green address bar with security. Though people are able to recognize the green bar, there is

More information

Table of Contents. Oracle/Sun JRE Upgrade Instructions. Verify Hard Disk Space JRE 1.6.0.35

Table of Contents. Oracle/Sun JRE Upgrade Instructions. Verify Hard Disk Space JRE 1.6.0.35 Table of Contents Oracle/Sun JRE Upgrade Instructions... 1 Verify Hard Disk Space... 1 JRE Install Directions for Windows Vista or Windows 7... 2 EWB Sign-on with the New JRE... 7 Problem and Resolution

More information

The Benefits of SSL Content Inspection ABSTRACT

The Benefits of SSL Content Inspection ABSTRACT The Benefits of SSL Content Inspection ABSTRACT SSL encryption is the de-facto encryption technology for delivering secure Web browsing and the benefits it provides is driving the levels of SSL traffic

More information

Public Key Infrastructure (PKI)

Public Key Infrastructure (PKI) Public Key Infrastructure (PKI) In this video you will learn the quite a bit about Public Key Infrastructure and how it is used to authenticate clients and servers. The purpose of Public Key Infrastructure

More information

SEZ SEZ Online Manual- DSC Signing with Java Applet. V Version 1.0 ersion 1.0

SEZ SEZ Online Manual- DSC Signing with Java Applet. V Version 1.0 ersion 1.0 SEZ SEZ Online Manual- V Version 1.0 ersion 1.0 Table of Contents 1 Introduction...2 2 DSC signing functionality with java applet...2 3 Troubleshooting...5 4 Annexure I: JAVA Console Setting... 13 5 Annexure

More information

Instructions for Acquiring a Digital Signature

Instructions for Acquiring a Digital Signature Applying for a Digital Signature Instructions for Acquiring a Digital Signature Any person may obtain a qualified digital certificate and secure signature creation device (SSCD) with his presence at the

More information

2. Each server or domain controller requires its own server certificate, DoD Root Certificates and enterprise validator installed.

2. Each server or domain controller requires its own server certificate, DoD Root Certificates and enterprise validator installed. Purpose and Scope The purpose of this policy is to define the roles and responsibilities on implementing the Homeland Security Presidential Directive 12 (HSPD-12) Logical Access Control (LAC) throughout

More information

Building a Digital Signature to Meet State Statute Requirements Using a Certificate Authority. Adobe Acrobat Pro DC (Released July 2015)

Building a Digital Signature to Meet State Statute Requirements Using a Certificate Authority. Adobe Acrobat Pro DC (Released July 2015) DIGITAL SIGNATURES eplans REVIEW Building a Digital Signature to Meet State Statute Requirements Using a Certificate Authority Adobe Acrobat Pro DC (Released July 2015) 8 12 15 DIGITAL SEAL AND SIGNATURE

More information

Installation and configuration guide

Installation and configuration guide Installation and Configuration Guide Installation and configuration guide Adding X-Forwarded-For support to Forward and Reverse Proxy TMG Servers Published: May 2010 Applies to: Winfrasoft X-Forwarded-For

More information

Wimba Create. Version 2.5. Installation Guide

Wimba Create. Version 2.5. Installation Guide Wimba Create Version 2.5 Installation Guide Wimba Create Installation Guide 1 Before Installing Wimba Create 1 Previous Versions 1 System Requirements 1 Installing Wimba Create 2 Wimba Create Licenses

More information

Websense Content Gateway HTTPS Configuration

Websense Content Gateway HTTPS Configuration Websense Content Gateway HTTPS Configuration web security data security email security Support Webinars 2010 Websense, Inc. All rights reserved. Webinar Presenter Title: Sr. Tech Support Specialist Cisco

More information

CoSign for 21CFR Part 11 Compliance

CoSign for 21CFR Part 11 Compliance CoSign for 21CFR Part 11 Compliance 2 Electronic Signatures at Company XYZ Company XYZ operates in a regulated environment and is subject to compliance with numerous US government regulations governed

More information

Important Notes for WinConnect Server VS Software Installation:

Important Notes for WinConnect Server VS Software Installation: Important Notes for WinConnect Server VS Software Installation: 1. Only Windows Vista Business, Windows Vista Ultimate, Windows 7 Professional, Windows 7 Ultimate, Windows Server 2008 (32-bit & 64-bit),

More information

Installing the Driver of your Plotter- / Engraver

Installing the Driver of your Plotter- / Engraver Installing the Driver of your Plotter- / Engraver By installing your plotter / engraver software the driver for your device will be pre-installed. When the device is switched on after the software setup,

More information

Guide Installing Digital Certificates in Outlook 2000

Guide Installing Digital Certificates in Outlook 2000 Guide Installing Digital Certificates in Outlook 2000 Document SIGNE_PAPET. Ver. 1.0 Date of application 06/08/2012 Seguridad documental 2 Introduction This document describes the steps for configuring

More information

DigitalPersona Privacy Manager Pro

DigitalPersona Privacy Manager Pro DigitalPersona Privacy Manager Pro DigitalPersona Privacy Manager Pro is a centrally-managed secure communication solution for businesses. It allows sensitive documents and communications to remain private,

More information

Hang Seng HSBCnet Security. May 2016

Hang Seng HSBCnet Security. May 2016 Hang Seng HSBCnet Security May 2016 1 Security The Bank aims to provide you with a robust, reliable and secure online environment in which to do business. We seek to achieve this through the adoption of

More information

Installing your Digital Certificate & Using on MS Out Look 2007.

Installing your Digital Certificate & Using on MS Out Look 2007. Installing your Digital Certificate & Using on MS Out Look 2007. Note: This technical paper is only to guide you the steps to follow on how to configure and use digital signatures. Therefore Certificate

More information

Guidance for the verification of qualified digital signatures following Swiss signature law

Guidance for the verification of qualified digital signatures following Swiss signature law Guidance for the verification of qualified digital signatures following Swiss signature law Swiss signature law (ZertES) is the legal basis for qualified digital signatures for details see http://www.admin.ch/ch/d/sr/c943_03.html.

More information

Extended Validation SSL Certificates

Extended Validation SSL Certificates Extended Validation SSL Certificates A NEW STANDARD TO INSPIRE TRUST, improve confidence and increase sales... INDEX 1. Extended Validation (EV) SSL Certificates solving a trust problem 2. Traditional

More information

21 CFR Part 11 Compliance Using STATISTICA

21 CFR Part 11 Compliance Using STATISTICA 21 CFR Part 11 Compliance Using STATISTICA Last Updated: April 2003 This document was updated to reflect the FDA s latest guidance (released February, 2003) and the withdrawal of previous guidance.! STATSOFT

More information

Helm 4 Windows Event Viewer

Helm 4 Windows Event Viewer WebHost Automation Ltd http://www.webhostautomation.com/ January 2007 Doc: HELM 4.0.0.0 Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under

More information

SAS Add in to MS Office A Tutorial Angela Hall, Zencos Consulting, Cary, NC

SAS Add in to MS Office A Tutorial Angela Hall, Zencos Consulting, Cary, NC Paper CS-053 SAS Add in to MS Office A Tutorial Angela Hall, Zencos Consulting, Cary, NC ABSTRACT Business folks use Excel and have no desire to learn SAS Enterprise Guide? MS PowerPoint presentations

More information

Microsoft Windows Server 2003 Integration Guide

Microsoft Windows Server 2003 Integration Guide 15370 Barranca Parkway Irvine, CA 92618 USA Microsoft Windows Server 2003 Integration Guide 2008 HID Global Corporation. All rights reserved. 47A3-905, A.1 C200 and C700 December 1, 2008 Crescendo Integration

More information

Securing your Online Data Transfer with SSL

Securing your Online Data Transfer with SSL Securing your Online Data Transfer with SSL A GUIDE TO UNDERSTANDING SSL CERTIFICATES, how they operate and their application 1. Overview 2. What is SSL? 3. How to tell if a Website is Secure 4. What does

More information

Mobile OTPK Technology for Online Digital Signatures. Dec 15, 2015

Mobile OTPK Technology for Online Digital Signatures. Dec 15, 2015 Mobile OTPK Technology for Online Digital Signatures Dec 15, 2015 Presentation Agenda The presentation will cover Background Traditional PKI What are the issued faced? Alternative technology Introduction

More information

Using etoken for Securing E-mails Using Outlook and Outlook Express

Using etoken for Securing E-mails Using Outlook and Outlook Express Using etoken for Securing E-mails Using Outlook and Outlook Express Lesson 15 April 2004 etoken Certification Course Securing Email Using Certificates Unprotected emails can be easily read and/or altered

More information

Important Notes for WinConnect Server ES Software Installation:

Important Notes for WinConnect Server ES Software Installation: Important Notes for WinConnect Server ES Software Installation: 1. Only Windows 8/8.1 Enterprise, Windows 8/8.1 Professional (32-bit & 64-bit) or Windows Server 2012 (64-bit) or Windows Server 2012 Foundation

More information

How to Install CoSign Connector for SharePoint

How to Install CoSign Connector for SharePoint How to Install CoSign Connector for SharePoint Version 6.2 Quick Guide Notice This manual contains information that is proprietary to ARX (Algorithmic Research) Ltd. No part of this manual may be reproduced

More information

Windows Remote Access

Windows Remote Access Windows Remote Access A newsletter for IT Professionals Education Sector Updates Issue 1 I. Background of Remote Desktop for Windows Remote Desktop Protocol (RDP) is a proprietary protocol developed by

More information

Integrated SSL Scanning

Integrated SSL Scanning Software Version 9.0 Copyright Copyright 1996-2008. Finjan Software Inc. and its affiliates and subsidiaries ( Finjan ). All rights reserved. All text and figures included in this publication are the exclusive

More information

Computer and Network Security. Outline

Computer and Network Security. Outline Computer and Network Security Lecture 10 Certificates and Revocation Outline Key Distribution Certification Authorities Certificate revocation 1 Key Distribution K A, K B E KA ( K AB, E KB (KAB) ) K A

More information