Aloaha Sign! (English Version)
|
|
- Ann Hardy
- 8 years ago
- Views:
Transcription
1 Aloaha Sign! (English Version)
2 Aloaha Sign! (English Version) All rights reserved. No parts of this work may be reproduced in any form or by any means - graphic, electronic, or mechanical, including photocopying, recording, taping, or information storage and retrieval systems - without the written permission of the publisher. Products that are referred to in this document may be either trademarks and/or registered trademarks of the respective owners. The publisher and the author make no claim to these trademarks. While every precaution has been taken in the preparation of this document, the publisher and the author assume no responsibility for errors or omissions, or for damages resulting from the use of information contained in this document or from the use of programs and source code that may accompany it. In no event shall the publisher and the author be liable for any loss of profit or any other commercial damage caused or alleged to have been caused directly or indirectly by this document. Printed: Dezember 2009
3 Contents 3 Table of Contents Page 1. Introduction 4 2. Installation 5 3. Usage Open Files Save as Print View Sign Documents Digitally Sign / Signature check Digitally Sign Signature check Card Reader Certificate check Aloaha Bulk Validator FAQ 26 Index 27
4 4 Aloaha Sign! (English Version) 1. Introduction Aloaha Sign! Aloaha Sign! was developed to view digitally signed files and to check digital signatures. Furthermore all kind of files can be signed. Signature types which can be checked: PKCS7 XMLDSIG PDF P7M / SMIME The signing of files can be done in the following formats: PKCS7 XMLDSIG PDF (if Aloaha Signator is installed on your System) P7M / SMIME Of course you can use the digital signatures with native smartcard support. Other Aloaha products: Aloaha PDF Suite - Creates your PDF files. This suite may be the PDF software with the most functions in the market. Supports PDF Signature, Mass signing and native signing smartcards. Aloaha PDF Saver - Fill your data to PDF Forms, save it to the PDF File and open it later for correction... Aloaha Crypto Service Provider - Use your smartcards for signing and authentication in standard office applications such as MS Outlook, Adobe Acrobat or Internet Explorer.
5 Introduction 5 2. Installation Installation Requirements: Windows 2000/3/8 Windows XP (Service Pack 3 suggested but not required) Windows Vista Windows 7 To install Aloaha Sign, start the installation file. (aloaha_sign_setup.exe). After the installation language is chosen, the following dialogue opens.
6 6 Aloaha Sign! (English Version) Setup will ask you for the installation folder before it begins to install the product. For using a different folder, click the Browse button and select the folder you want to install to. Note: It is suggested to install all Aloaha products in the same directory. If setup has installed successful the application you have to click the finish button.
7 Usage 7 3. Usage To launch Aloaha Sign, select the program Aloaha Sign! in Windows start menu: Start>All Programs>Aloaha>Aloaha Sign! Now following options are available: Files View Sign Card Reader
8 8 Aloaha Sign! (English Version) 3.1 Open Files If you liked to open an encrypted document, it is necessary that your digital ID is correctly installed. If necessary contact the author of the document. If there is no digital ID available in your system the document cannot be opened.
9 Usage Save as If you liked to save a signed PDF file, select "save as" in the directory you choose.
10 10 Aloaha Sign! (English Version) 3.3 Print Print: If you choose "print" the document is sent directly to the installed printer. Print on different printers: For this printing option all installed printers in the system are available. The default printer can also be selected than every other.
11 Usage View Views: In the menu View you have following possibilities to display documents: View Original means the fact that if the original document was created in MS Word, this is opened to view also in MS Word! View Source means the fact that the suitable source is indicated to the respective document. View ASCII means the fact that the suitable document is indicated in the ASCII format.
12 12 Aloaha Sign! (English Version) 3.5 Sign Documents With Aloaha Sign! you have the possibility to sign documents. Following signature formats are available: D2D Signature P7M Signature XML Signature PKCS7 Signature PDF Signature More informations you find in the column "Digitally Sign / Signature check"
13 Usage Digitally Sign / Signature check PDF files electronically sign With Aloaha Sign! you can sign files digitally. An electronic signature is supported after the default of the signature law (SigG) of the Federal Republic of Germany. Legal electronic calculations can be created. Calculations which are transmitted by fax or and/or are provided to download from the Internet (e.g., as a PDF document) and no "certified electronic signature" carry, display no calculation for the purposes of the section 14 to paragraph 3 sales tax law. Digital Signature A digital signature for the purposes of the law is a seal generated with a private signature key to digital data which with the help of an accompanying public key, with a signature key certificate of a certification authority stock is, the owner of the signature key and the unadulterated quality of the data reveals (SigG.). With the development of the digital signature the destination was traced to develop one of the personal signature equivalent signature method with which on electronic way data can be signed. The main problem by transmission of electronic data is the manipulability. The problem could be eliminated only by electronic signature, because an unnoticed manipulation of data is no more possible. Requirement is that the electronic signature is connected like a handwritten signature inseparably with the respective document. It can be seen by everybody, but only be changed by the signer itself. The signer can be identified and the signature makes every possible manipulation, like additional pranks or changing text passages, immediately recognizable. By the certificate check can be proved that the signature was not faked and the certificate owner is real. except his name no personal data is revealed. Legal regulations Definitions of different kinds of the digital signature are found in the signature law (SigG) and in the order to the signature law (SigV). In it demands for the electronic signatures are as well displayed as Certification Service Provider (ZDA) were defined. It is distinguished in easy, advanced and certified digital signatures. Every signature stands for a certain quality level. The higher valued the signature, the more meaning she has for the legal relations, and the greater is her functionality. Only certified signatures fulfil the demands concerning electronic data just as the handwritten signature demands concerning data in paper form. They are admitted in court as an evidence. The cryptographic algorithms admitted for certified electronic signatures are approved and published by the federal network agency. under you find a list of all accredited Certification Service Provider (trust centres). There are also listed the products admitted for a certified electronic signature. The requirements for a certified signature are given when: this can be associated exclusively to the signatory who admits unequivocal identification of the signatory with means is created which only the signatory controls makes every additional update of the signed data evident is based on a certified certificate A certified certificate can only be issued by an accredited Certification Service Provider. Particularly strict demands concerning the security of the key creation and the organisation of the trust centre are valid. The observance of the legal instructions through the trust centre is in Germany also controlled by the federal network agency.
14 14 Aloaha Sign! (English Version) Public Key procedures Digital signatures are based on asymmetrical Crypto systems and use a key pair which passes signature key of a private (confidential one) and public (not confidential). The data which were encoded with one key can be opened again only with the other. In order to sign the private key is used. The key is on the chip of the card and cannot be read out. The data to be processed are loaded on the chip, are encrypted or decrypted there and transmitted again back to the computer. To use the private key, the right PIN which guarantees additional security is required. The signature can be only from the card owner, because only he is in possession of card and PIN. The public key is integrated into a certificate and is available for everyone. This can also be retrieved by directory services via LDAP or HTTP. Of course he can also be dispatched by . To guarantee that the certificate and therefore the key was not faked, every certificate is signed by the publisher. Therefore checks up to themselves whether the certificate of a trustworthy place was published. While checking the signature the public key of the receiver is used. The encrypted Hash value of the publisher is decrypted and compared to the Hash value of the document. If both values agree the document was not modified. While signing a file a Hash value which is comparable with a fingerprint is formed. Two different documents can never have the same Hash value. The Hash value is encrypted under use of a key with a length of at least 1024 bits (depending on the used card) after the procedure RSA. The encryption of the Hash value takes place on the card with electronic chip processor which can process smaller data volumes. Thus it is made sure that the private key does not leave the card. The encoded Hash value is sent back again to the computer and is seated in the document to be signed. Before the document could be signed the private key must be released by the right PIN (Personal Identification Number).
15 Usage Digitally Sign This software is developed to be able to check or to indicate digital signatures. Moreover, every file can be signed digitally. Signing of files is supported in following formats: - PKCS7 - XMLDSIG - PDF (only if the Aloaha Sigantor / PDF Suite is installed on the system) - P7M / SMIME Sign: With Aloaha Sign! you have the possibility to sign documents. Following signature formats are available: D2D Signature P7M Signature XML Signature PKC#7 Signature PDF Signature
16 16 Aloaha Sign! (English Version) Signature process: If you liked to sign an opened document, you are asked first for the file store where the document should be saved after occurred signature. After you have selected the file store and have fixed the filename, a window with "Cetificate Properties" opens.
17 Usage 17 Confirm the certificate while you click on the field with the green hook. Now you are requested to enter the PIN associated to the certificate. Enter the PIN and confirm the input. After the signature process the document shall be found at the memory place you selected. Note: Embedded files are also signed.
18 18 Aloaha Sign! (English Version) Signature check Supported to check of digital signatures are: - PKCS7 - XMLDSIG - PDF - P7M / SMIME To be able to use Aloaha Sign! in full extent, it makes sense to instal also the Aloaha PDF suite or the Aloaha Signator. If you liked to check a signature or open a document which was created with another application, you can select the file in the Windows explorer with the right mouse button and afterwards open with Aloaha Sign!. Afterwards you are asked whether you want to open or save the file. After the file was imported the Aloaha PDF Editor shows the file.
19 Usage 19 Note: If the file is not encrypted/signed, the document will be opened in the application in which it was created although you have selected the command "Open" in Aloaha Sign!. In case of encrypted / signed PDF documents the Aloaha PDF Editor is used. Here another window opens. Before another window opens to indicate the properties associated to the certificate like "validity, exhibitor, etc.". If signed documents are edited afterwards, the signature loses her validity.
20 20 Aloaha Sign! (English Version) 3.7 Card Reader In the menu item Card Reader you can see whether and which Reader is connected with the system. By a click with the right mouse button on the Card Reader's icon you will get informations to the used signature card.
21 Usage Certificate check In this item you find information to the particular certificate. Here you receive informations about: Alaoaha Certification Authority - Informations to the currently used certificate
22 22 Aloaha Sign! (English Version) Demo User / TestCert - currently used card in the Card Reader
23 Usage 23 Get Report - displays the report about the signature check and the currently used signature setting.
24 24 Aloaha Sign! (English Version) 3.9 Aloaha Bulk Validator The Aloaha PDF Signature Bulk Validator is an commercial add-on to the popular Aloaha sign!. It is being delivered as a simple.exe file which can be started with some parameters to bulk validate PDF signatures. Validated PDF Documents are being sorted into sub directories. To validate a complete directory of PDF Documents just start AloSiVal.exe <Directory>. It is IMPORTANT that <Directory> ends with a backslash!. For example AloSiVal.exe C: \PDF\ Validated documents will be sorted into subdirectories under \ValidatedPDF\. This subdirectory can be configured in HKEY_LOCAL_MACHINE\SOFTWARE\Aloaha\Validator\TargetDir. Suspicious PDF Documents are sorted into the subdirectory suspicious. Such documents have been edited AFTER having been signed. For evey status of a signature a bitmask representing the signature quality is being created and used as the directory name. In HKEY_LOCAL_MACHINE\SOFTWARE\Aloaha\Validator it is possible to give those directories a clear text name. Possible Bitmask Values IS NOT TIME VALID = &H1 This certificate or one of the certificates in the certificate chain is not time valid. IS NOT TIME NESTED = &H2 Certificates in the chain are not properly time nested. IS REVOKED = &H4 Trust for this certificate or one of the certificates in the certificate chain has been revoked. NOT SIGNATURE VALID = &H8 The certificate or one of the certificates in the certificate chain does not have a valid signature. NOT VALID FOR USAGE = &H10 The certificate or certificate chain is not valid for its proposed usage. IS UNTRUSTED ROOT = &H20 The certificate or certificate chain is based on an untrusted root. REVOCATION STATUS UNKNOWN = &H40 The revocation status of the certificate or one of the certificates in the certificate chain is unknown. IS CYCLIC = &H80 One of the certificates in the chain was issued by a certification authority that the original certificate had certified. INVALID EXTENSION = &H100 One of the certificates has an extension that is not valid. INVALID POLICY CONSTRAINTS = &H200 The certificate or one of the certificates in the certificate chain has a policy constraints extension, and one of the issued certificates has a disallowed policy mapping extension or does not have a required issuance policies extension. INVALID BASIC CONSTRAINTS = &H400 The certificate or one of the certificates in the certificate chain has a basic constraints extension, and either the certificate cannot be used to issue other certificates, or the chain path length has been exceeded. INVALID NAME CONSTRAINTS = &H800 The certificate or one of the certificates in the certificate chain has a name constraints extension that is not valid.
25 Usage 25 HAS NOT SUPPORTED NAME CONSTRAINT = &H1000 The certificate or one of the certificates in the certificate chain has a name constraints extension that contains unsupported fields. The minimum and maximum fields are not supported. Thus minimum must always be zero and maximum must always be absent. Only UPN is supported for an Other Name. The following alternative name choices are not supported: - X400 Address - EDI Party Name - Registered Id HAS NOT DEFINED NAME CONSTRAINT = &H2000 The certificate or one of the certificates in the certificate chain has a name constraints extension, and a name constraint is missing for one of the name choices in the end certificate. HAS NOT PERMITTED NAME CONSTRAINT = &H4000 The certificate or one of the certificates in the certificate chain has a name constraints extension, and there is not a permitted name constraint for one of the name choices in the end certificate. HAS EXCLUDED NAME CONSTRAINT = &H8000 The certificate or one of the certificates in the certificate chain has a name constraints extension, and one of the name choices in the end certificate is explicitly excluded. IS OFFLINE REVOCATION = &H The revocation status of the certificate or one of the certificates in the certificate chain is either offline or stale. NO ISSUANCE CHAIN POLICY = &H The end certificate does not have any resultant issuance policies, and one of the issuing CA certificates has a policy constraints extension requiring it. IS PARTIAL CHAIN = &H10000 The certificate chain is not compete. CTL IS NOT TIME VALID = &H20000 A CTL used to create this chain was not time valid. CTL IS NOT SIGNATURE VALID = &H40000 A CTL used to create this chain did not have a valid signature. CTL IS NOT VALID FOR USAGE = &H80000 A CTL used to create this chain is not valid for this usage. Every possible value can be mapped to a clear text name in HKEY_LOCAL_MACHINE\SOFTWARE\Aloaha\Validator
26 26 Aloaha Sign! (English Version) 4. FAQ Can I use Aloaha sign! to apply a digital signature to PDF Documents? You need one of the Aloaha PDF Products to apply digital signatures to PDF Documents. Aloaha sign! is designed to sign NON PDF documents. Do I need a CSP to be able to sign a file? Aloahas innovative technology supports a broad range of smartcards native. That means that no CSP is required for such smart cards! Which type of signatures can I create with sign! sign! is able to create p7m, PKCS#7 and XMLDSIG Signatures. What is a p7m file? A p7m file is a digitally signed electronic envelope containing the original file. P7M is also called s/ Mime. What is a PKCS7 file? A PKCS7 file contains the digital signature and the signing certificate. Unlike s/mime it does NOT contain the original data. What is xmldsig? When signing a XML file it is possible to place the signature itself directly inside the XML itself. This is called xmldsig. How can I validate p7m and p7s signatures? Just right click on them and choose validate!
27 Index 27 Index - A - Aloaha Bulk Validator 24 - B - Bitmask Values 24 - C - Card reader 20 Certificate check 21 Certification Authority 21 - D - Print on different printers: 10 Public Key procedures 13 - S - Save as 9 Sign Documents 12 Signature check 18 Signature process 15 - U - Usage 7 - V - View 11 Views 11 Demo User 21 Digitally Sign 15 Digitally Sign / Signature check 13 - F - FAQ 26 - G - Get Report 21 - I - Installation 5 Installation Requirements 5 Introduction 4 - L - Legal regulations 13 - O - Open 8 - P - Print 10
Aloaha Mulitsignator EN
Aloaha Mulitsignator EN Aloaha Mulitsignator EN All rights reserved. No parts of this work may be reproduced in any form or by any means - graphic, electronic, or mechanical, including photocopying, recording,
More informationDIGIPASS CertiID. Getting Started 3.1.0
DIGIPASS CertiID Getting Started 3.1.0 Disclaimer Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis, without any other warranties, or conditions, express
More informationAdobe Digital Signatures in Adobe Acrobat X Pro
Adobe Digital Signatures in Adobe Acrobat X Pro Setting up a digital signature with Adobe Acrobat X Pro: 1. Open the PDF file you wish to sign digitally. 2. Click on the Tools menu in the upper right corner.
More informationDigital Signatures on iqmis User Access Request Form
Digital Signatures on iqmis User Access Request Form When a user clicks in the User Signature block on the iqmis Access Form, the following window appears: Click Save a Copy and rename it with your name,
More informationX.509 Certificate Generator User Manual
X.509 Certificate Generator User Manual Introduction X.509 Certificate Generator is a tool that allows you to generate digital certificates in PFX format, on Microsoft Certificate Store or directly on
More informationSecureStore I.CA. User manual. Version 2.16 and higher
User manual Version 2.16 and higher Contents SecureStore I.CA 1. INTRODUCTION...3 2. ACCESS DATA FOR THE CARD...3 2.1 Card initialisation...3 3. MAIN SCREEN...4 4. DISPLAYING INFORMATION ABOUT THE PAIR
More informatione-builder Online User Assistance esignature Setup Guide
esignature Setup Guide 2013 e-builder, Inc. e-builder 8.3 Help by e-builder, Inc. 2013 e-builder, Inc. All rights reserved. No parts of this work may be reproduced in any form or by any means - graphic,
More informationGuide to Obtaining Your Free WISeKey CertifyID Personal Digital Certificate (Personal eid) WISeKey 2010 / Alinghi 2010 Smartcards
The World Internet Security Company Solutions for Security Guide to Obtaining Your Free WISeKey CertifyID Personal Digital Certificate (Personal eid) WISeKey 2010 / Alinghi 2010 Smartcards Wherever Security
More informationPDF Signer User Manual
PDF Signer User Manual Introduction The main function of PDF Signer is to sign PDF documents using X.509 digital certificates. Using this product you can quickly sign multiple PDF files (bulk sign) by
More informationTrustKey Tool User Manual
TrustKey Tool User Manual 1 Table of Contents 1 Introduction... 5 2 TrustKey Product...6 2.1 TrustKey Tool... 6 2.2 TrustKey function modules...7 2.3 TrustKey using environment...7 3 TrustKey Tool Installation...
More informationHow to Time Stamp PDF and Microsoft Office 2010/2013 Documents with the Time Stamp Server
How to Time Stamp PDF and Microsoft Office 2010/2013 Documents with the Time Stamp Server Introduction Time stamping is an important mechanism for the long-term preservation of digital signatures, time
More informationInstalling your Digital Certificate & Using on MS Out Look 2007.
Installing your Digital Certificate & Using on MS Out Look 2007. Note: This technical paper is only to guide you the steps to follow on how to configure and use digital signatures. Therefore Certificate
More informationHP ProtectTools Embedded Security Guide
HP ProtectTools Embedded Security Guide Document Part Number: 364876-001 May 2004 This guide provides instructions for using the software that allows you to configure settings for the HP ProtectTools Embedded
More informationOB10 - Digital Signing and Verification
Global Headquarters 90 Fetter Lane London EC4A 1EN Tel: +44 (0) 870 165 7410 Fax: +44 (0) 207 240 2696 OB10 - Digital Signing and Verification www.ob10.com Version 2.4 March 2013 Summary In order to comply
More informationBuilding a Digital Signature to Meet State Statute Requirements Using a Certificate Authority. Adobe Acrobat Pro DC (Released July 2015)
DIGITAL SIGNATURES eplans REVIEW Building a Digital Signature to Meet State Statute Requirements Using a Certificate Authority Adobe Acrobat Pro DC (Released July 2015) 8 12 15 DIGITAL SEAL AND SIGNATURE
More informationEntrust Managed Services PKI
Entrust Managed Services PKI Entrust Managed Services PKI Windows Smart Card Logon Configuration Guide Using Web-based applications Document issue: 1.0 Date of Issue: June 2009 Copyright 2009 Entrust.
More informationSECURE EMAIL USER GUIDE OUTLOOK 2000
WELLS FARGO AUTHENTICATION SERVICES DATED: MAY 2003 TABLE OF CONTENTS GENERAL INFORMATION... 1 INSTALLING THE WELLS FARGO ROOT CERTIFICATE CHAIN.. 2 INSTALLING THE CERTIFICATES INTO IE... 3 SETTING UP
More informationUniversal Management Service 2015
Universal Management Service 2015 UMS 2015 Help All rights reserved. No parts of this work may be reproduced in any form or by any means - graphic, electronic, or mechanical, including photocopying, recording,
More informationE-CERT C ONTROL M ANAGER
E-CERT C ONTROL M ANAGER for e-cert on Smart ID Card I NSTALLATION G UIDE Version v1.7 Copyright 2003 Hongkong Post CONTENTS Introduction About e-cert Control Manager... 3 Features... 3 System requirements...
More informationPKI Contacts PKI for Fraunhofer Contacts
Fraunhofer Competence Center PKI PKI Contacts PKI for Fraunhofer Contacts User manual for communication partners of the Fraunhofer-Gesellschaft Author[s]: Uwe Bendisch, Maximilian Gottwald As at: 15.10.2013
More informationUser Guide Supplement. S/MIME Support Package for BlackBerry Smartphones BlackBerry Pearl 8100 Series
User Guide Supplement S/MIME Support Package for BlackBerry Smartphones BlackBerry Pearl 8100 Series SWD-292878-0324093908-001 Contents Certificates...3 Certificate basics...3 Certificate status...5 Certificate
More informationDigital Signatures. To learn more about digital signatures view this White Paper by Adobe.
Digital Signatures This tutorial was designed to help you learn to use digital signatures for signing PDF forms with Adobe Acrobat. This tutorial covers: how to create a digital signature, how to customize
More informationDjigzo S/MIME setup guide
Author: Martijn Brinkers Table of Contents...1 Introduction...3 Quick setup...4 Create a CA...4 Fill in the form:...5 Add certificates for internal users...5 Add certificates for external recipients...7
More informationUsing Entrust certificates with Adobe PDF files and forms
Entrust Managed Services PKI Using Entrust certificates with Adobe PDF files and forms Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust is a trademark or
More informationWatchManager Data Backup
WatchManager Data Backup WatchManager Data Backup All rights reserved. No parts of this work may be reproduced in any form or by any means - graphic, electronic, or mechanical, including photocopying,
More informationEntrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0
Entrust Managed Services PKI Getting started with digital certificates and Entrust Managed Services PKI Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust
More informationFEC Secure IPSec Client
FEC Secure IPSec Client Software Activtion User's Guide FEC Secure IPSec Client 1 Copyright Trademarks All rights are reserved. No part of this publication may be reproduced or transmitted in any form
More informationDigital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University October 2015 1 List of Figures Contents 1 Introduction 1 2 History 2 3 Public Key Infrastructure (PKI) 3 3.1 Certificate
More informationCA Nimsoft Service Desk
CA Nimsoft Service Desk Single Sign-On Configuration Guide 6.2.6 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation
More informationGuide for Securing E-mail With WISeKey CertifyID Personal Digital Certificate (Personal eid)
The World Internet Security Company Solutions for Security Guide for Securing E-mail With WISeKey CertifyID Personal Digital Certificate (Personal eid) Wherever Security relies on Identity, WISeKey has
More informationHow to use Certificate in Microsoft Outlook
How to use Certificate in Microsoft Outlook Macau Post esigntrust Version. 2006-01.01p Agenda Configure Microsoft Outlook for using esigntrust Certificate Use certificate to sign e-mail Use Microsoft Outlook
More informationTechnical Description. DigitalSign 3.1. State of the art legally valid electronic signature. The best, most secure and complete software for
Technical Description DigitalSign 3.1 State of the art legally valid electronic signature The best, most secure and complete software for Adding digital signatures to any document, in conformance with
More informationOpen a PDF document using Adobe Reader, then click on the Tools menu on the upper left hand corner.
This document illustrates how to digitally sign PDF documents using Acrobat Reader 11. The illustrations assume that the user already has a digital certificate. You will need the latest version of Adobe
More informationDescription of the Technical Component:
Confirmation concerning Products for Qualified Electronic Signatures according to 15 Sec. 7 S. 1, 17 Sec. 4 German Electronic Signature Act 1 and 11 Sec. 2 and 15 German Electronic Signature Ordinance
More informationYubiKey PIV Deployment Guide
YubiKey PIV Deployment Guide Best Practices and Basic Setup YubiKey 4, YubiKey 4 Nano, YubiKey NEO, YubiKey NEO-n YubiKey PIV Deployment Guide 2016 Yubico. All rights reserved. Page 1 of 27 Copyright 2016
More informationChapter 6 Electronic Mail Security
Cryptography and Network Security Chapter 6 Electronic Mail Security Lectured by Nguyễn Đức Thái Outline Pretty Good Privacy S/MIME 2 Electronic Mail Security In virtually all distributed environments,
More informationCA Nimsoft Unified Management Portal
CA Nimsoft Unified Management Portal HTTPS Implementation Guide 7.6 Document Revision History Document Version Date Changes 1.0 June 2014 Initial version for UMP 7.6. CA Nimsoft Monitor Copyright Notice
More informationCheck Point FDE integration with Digipass Key devices
INTEGRATION GUIDE Check Point FDE integration with Digipass Key devices 1 VASCO Data Security Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document
More informationShakambaree Technologies Pvt. Ltd.
Welcome to Support Express by Shakambaree Technologies Pvt. Ltd. Introduction: This document is our sincere effort to put in some regular issues faced by a Digital Signature and USB Token user doing on
More informationBrowser-based Support Console
TECHNICAL PAPER Browser-based Support Console Mass deployment of certificate Netop develops and sells software solutions that enable swift, secure and seamless transfer of video, screens, sounds and data
More informationVeriSign PKI Client Government Edition v 1.5. VeriSign PKI Client Government. VeriSign PKI Client VeriSign, Inc. Government.
END USER S GUIDE VeriSign PKI Client Government Edition v 1.5 End User s Guide VeriSign PKI Client Government Version 1.5 Administrator s Guide VeriSign PKI Client VeriSign, Inc. Government Copyright 2010
More informationPage de signatures électroniques / Electronic Signatures Page
Page de signatures électroniques / Electronic Signatures Page Information Documentaire / Document Information Titre / Title : Auteur / Author : Reference : This document has been digitally signed and timestamped.
More informationTechnical notes for HIGHSEC eid App Middleware
Technical notes for HIGHSEC eid App Middleware Version 2.1 February 2014. 1 Contents 1 Technical Notes... 3 1.1 All Operating Systems... 3 1.1.1 Slowing down of the cards while pairing... 3 1.1.2 Load
More informationCreating a New Digital ID or Signature for Adobe Acrobat
Creating a New Digital ID or Signature for Adobe Acrobat If you are not using a third-party digital ID, you can create your own in Adobe Acrobat Professional or in Adobe Reader 9, 10 or X. Follow these
More informationProject management integrated into Outlook
y Project management integrated into Outlook InLoox PM 7.x Help for the configuration for MySQL-Server An InLoox Whitepaper Published: October 2011 Copyright: InLoox GmbH 2011 You find up-to-date information
More informationHow to use Certificate in Outlook Express
How to use Certificate in Outlook Express Macau Post esigntrust Version. 2006-01.01p Agenda Configure Outlook Express for using esigntrust Certificate Use certificate to sign email Use Outlook Express
More informationGlobalSign Enterprise Solutions
GlobalSign Enterprise Solutions Secure Email & Key Recovery Using GlobalSign s Auto Enrollment Gateway (AEG) 1 v.1.2 Table of Contents Table of Contents... 2 Introduction... 3 The Benefits of Secure Email...
More informationNovell ZENworks 10 Configuration Management SP3
AUTHORIZED DOCUMENTATION Software Distribution Reference Novell ZENworks 10 Configuration Management SP3 10.3 November 17, 2011 www.novell.com Legal Notices Novell, Inc., makes no representations or warranties
More informationHow to Order and Install Odette Certificates. Odette CA Help File and User Manual
How to Order and Install Odette Certificates Odette CA Help File and User Manual 1 Release date 28.07.2014 Contents Preparation for Ordering an Odette Certificate... 3 Step 1: Prepare the information you
More informationSSL Configuration on Weblogic Oracle FLEXCUBE Universal Banking Release 12.0.87.01.0 [August] [2014]
SSL Configuration on Weblogic Oracle FLEXCUBE Universal Banking Release 12.0.87.01.0 [August] [2014] Table of Contents 1. CONFIGURING SSL ON ORACLE WEBLOGIC... 1-1 1.1 INTRODUCTION... 1-1 1.2 SETTING UP
More informationUser Guide. DocAve Lotus Notes Migrator for Microsoft Exchange 1.1. Using the DocAve Notes Migrator for Exchange to Perform a Basic Migration
User Guide DocAve Lotus Notes Migrator for Microsoft Exchange 1.1 Using the DocAve Notes Migrator for Exchange to Perform a Basic Migration This document is intended for anyone wishing to familiarize themselves
More informationEmail-Encryption with business partners
Email-Encryption with business partners Date: 02. November 2006 Document type: User description Version: 1.2 Author: Volker Gebhard, Redaktionsteam WG PKI cio.siemens.com Table of contents: 1. Intention
More informationMAPI Acceleration. Exinda ExOS Version 6.3 2012 Exinda, Inc
Exinda ExOS Version 6.3 2 Table of Contents Part I Introduction 4 1 Using... this Guide 4 Part II Overview 6 Part III Enable MAPI Accleration on the Exinda Appliances 8 Part IV Turn off MAPI Encryption
More informationGuidance for the verification of qualified digital signatures following Swiss signature law
Guidance for the verification of qualified digital signatures following Swiss signature law Swiss signature law (ZertES) is the legal basis for qualified digital signatures for details see http://www.admin.ch/ch/d/sr/c943_03.html.
More informationGuide Configuration of Adobe Reader for document Signature Validation
Guide Configuration of Adobe Reader for document Signature Validation Document SIGNE_PAPET. Ver. 1.0 Date of application 14/01/2011 Seguridad documental This document has been generated by the Information
More informationVerification of digitally signed PDFs
Verification of digitally signed PDFs Configuring Adobe Reader to verify digitally signed PDFs This document is freely redistributable. You can find the latest version at: http://www.netlock.hu/useren
More informationThe cloud server setup program installs the cloud server application, Apache Tomcat, Java Runtime Environment, and PostgreSQL.
GO-Global Cloud 4.1 QUICK START SETTING UP A WINDOWS CLOUD SERVER AND HOST This guide provides instructions for setting up a cloud server and configuring a host so it can be accessed from the cloud server.
More informationCreating a Digital Signature in Adobe Acrobat Created on 1/11/2013 2:48:00 PM
Creating a Digital Signature in Adobe Acrobat Created on 1/11/2013 2:48:00 PM Table of Contents Creating a Digital Signature in Adobe Acrobat... 1 Page ii Creating a Digital Signature in Adobe Acrobat
More informationAssigning a Digital Signature to Electronic Documents Guide
Assigning a Digital Signature to Electronic Documents Guide This guide will take you through how to add/view and remove a digital signature from electronic documents. The most common types of document
More informationUsing CertAgent to Obtain Domain Controller and Smart Card Logon Certificates for Active Directory Authentication
Using CertAgent to Obtain Domain Controller and Smart Card Logon Certificates for Active Directory Authentication Contents Domain Controller Certificates... 1 Enrollment for a Domain Controller Certificate...
More informationElectronic Mail Security. Email Security. email is one of the most widely used and regarded network services currently message contents are not secure
Electronic Mail Security CSCI 454/554 Email Security email is one of the most widely used and regarded network services currently message contents are not secure may be inspected either in transit or by
More informationIBM Client Security Solutions. Client Security User's Guide
IBM Client Security Solutions Client Security User's Guide December 1999 1 Before using this information and the product it supports, be sure to read Appendix B - Notices and Trademarks, on page 22. First
More informationSoftware Manual Part IV: FDA 21 CFR part 11. Version 2.20
Software Manual Part IV: FDA 21 CFR part 11 Version 2.20 OPTIMA Software Manual Part IV: FDA 21 CFR part 11 BMG LABTECH This manual was designed to guide OPTIMA users through the software features related
More informationToken User Guide. Version 1.0/ July 2013
Token User Guide Version 1.0/ July 2013 Index Overview... 3 Usage requirements... 4 KIT contents... 5 Smart Card installation... 6 Reader driver installation... 7 In the case of Windows XP... 7 In the
More informationI. Configuring Digital signature certificate in Microsoft Outlook 2003:
I. Configuring Digital signature certificate in Microsoft Outlook 2003: In order to configure Outlook 2003 to use the new message security settings please follow these steps: 1. Open Outlook. 2. Go to
More informationDigital Signatures. Digital Signatures - How to enable validation of Siemens PKI signatures in Adobe Reader? Issued by: Date 01/2016
Digital Signatures Digital Signatures - How to enable validation of Siemens PKI signatures in Adobe Reader? Issued by: Company SIEMENS NV/SA Name Digital Signatures Date 01/2016 Author: Siemens File: Validating
More informationGuidelines Related To Electronic Communication And Use Of Secure E-mail Central Information Management Unit Office of the Prime Minister
Guidelines Related To Electronic Communication And Use Of Secure E-mail Central Information Management Unit Office of the Prime Minister Central Information Management Unit Office of the Prime Minister
More informationHow to Order and Install Odette Certificates. Odette CA Help File and User Manual
How to Order and Install Odette Certificates Odette CA Help File and User Manual 1 Release date 24.02.2014 Contents Preparation for Ordering an Odette Certificate... 3 Step 1: Prepare the information you
More informationPROXKey Tool User Manual
PROXKey Tool User Manual 1 Table of Contents 1 Introduction...4 2 PROXKey Product... 5 2.1 PROXKey Tool... 5 2.2 PROXKey function modules...6 2.3 PROXKey using environment...6 3 PROXKey Tool Installation...7
More informationExploring ADSS Server Signing Services
ADSS Server is a multi-function server providing digital signature creation and signature verification services, as well as supporting other infrastructure services including Time Stamp Authority (TSA)
More informationPGP from: Cryptography and Network Security
PGP from: Cryptography and Network Security Fifth Edition by William Stallings Lecture slides by Lawrie Brown (*) (*) adjusted by Fabrizio d'amore Electronic Mail Security Despite the refusal of VADM Poindexter
More informationwww.novell.com/documentation Administration Guide Certificate Server 3.3.8 May 2013
www.novell.com/documentation Administration Guide Certificate Server 3.3.8 May 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this documentation,
More informationExostar LDAP Proxy / SecureEmail Setup Guide. This document provides information on the following topics:
This document provides information on the following topics: Email Encryption set-up Outlook 2003 Email Encryption set-up Outlook 2007 Email Encryption set-up Outlook 2010 Email Encryption set-up Outlook
More informationCiphermail S/MIME Setup Guide
CIPHERMAIL EMAIL ENCRYPTION Ciphermail S/MIME Setup Guide September 23, 2014, Rev: 6882 Copyright 2008-2014, ciphermail.com. CONTENTS CONTENTS Contents 1 Introduction 3 2 S/MIME 3 2.1 PKI...................................
More informationDigital Signature User Guide for Acrobat 9.0 and Adobe Reader 9.0
bc PDF Creation Date: November 17, 2008 Digital Signature User Guide for Acrobat 9.0 and Adobe Reader 9.0 Acrobat and Adobe Reader Version 9.0 2008 Adobe Systems Incorporated. All rights reserved. Digital
More informationUser Guide. MailMarshal Secure 5.5. August 2006
User Guide MailMarshal Secure 5.5 August 2006 THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE AGREEMENT OR A NON-DISCLOSURE AGREEMENT.
More informationCarillon eshop User s Guide
Carillon eshop User s Guide Prepared by: Carillon Information Security, Inc. Version: 3.0 Updated on: 2015-01-29 Status: PUBLIC Contents Carillon eshop User Guide 1 Introduction... 4 1.1 Prerequisites...
More informationSecurity Digital Certificate Manager
System i Security Digital Certificate Manager Version 5 Release 4 System i Security Digital Certificate Manager Version 5 Release 4 Note Before using this information and the product it supports, be sure
More informationContents PAYMENTS...1 PAYMENT TABLES...67
Payments Guide 062212 2012 Blackbaud, Inc. This publication, or any part thereof, may not be reproduced or transmitted in any form or by any means, electronic, or mechanical, including photocopying, recording,
More informationDocument Management Getting Started Guide
Document Management Getting Started Guide Version: 6.6.x Written by: Product Documentation, R&D Date: February 2011 ImageNow and CaptureNow are registered trademarks of Perceptive Software, Inc. All other
More informationSecurity Digital Certificate Manager
IBM i Security Digital Certificate Manager 7.1 IBM i Security Digital Certificate Manager 7.1 Note Before using this information and the product it supports, be sure to read the information in Notices,
More informationDIGIPASS KEY series and smart card series for Juniper SSL VPN Authentication
DIGIPASS KEY series and smart card series for Juniper SSL VPN Authentication Certificate Based 2010 Integration VASCO Data Security. Guideline All rights reserved. Page 1 of 31 Disclaimer Disclaimer of
More informationUser Guide May 2013. Using Certificates in Outlook Express
User Guide May 2013 Using Certificates in Outlook Express FIGU RES... FIGURES.... T I TL E..............................................................................................................................
More informationCryptography and Network Security Chapter 15
Cryptography and Network Security Chapter 15 Fourth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 15 Electronic Mail Security Despite the refusal of VADM Poindexter and LtCol North
More informationFoxit Reader Deployment and Configuration
Copyright 2004-2015 Foxit Software Incorporated. All Rights Reserved. No part of this document can be reproduced, transferred, distributed or stored in any format without the prior written permission of
More informationSmart Card Authentication. Administrator's Guide
Smart Card Authentication Administrator's Guide October 2012 www.lexmark.com Contents 2 Contents Overview...4 Configuring the applications...5 Configuring printer settings for use with the applications...5
More informationElectronic Mail Security
Electronic Mail Security Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-11/
More informationE-mail encryption with business partners
(Guideline for ) Date: 2013-07-15 Document type: user description Version: 3.2 : Editorial team PKI cio.siemens.com Table of contents 1. Intention of the document:... 3 2. Prerequisites on business partner
More informationConfiguration (X87) SAP Mobile Secure: SAP Afaria 7 SP5 September 2014 English. Building Block Configuration Guide
SAP Mobile Secure: SAP Afaria 7 SP5 September 2014 English Afaria Network Configuration (X87) Building Block Configuration Guide SAP SE Dietmar-Hopp-Allee 16 69190 Walldorf Germany Copyright 2014 SAP SE
More informationIceBreak FileShare. Quick Guide. File sharing with workflow management
IceBreak FileShare Quick Guide File sharing with workflow management on IBM i 2 IceBreak FileShare Content IceBreak FileShare... 3 Features... 4 Requirements... 6 Limitations... 6 Test sites... 6 Install
More informationHow to Order and Install Odette Certificates. Odette CA Help File and User Manual
How to Order and Install Odette Certificates Odette CA Help File and User Manual 1 Release date 20.07.2015 Contents Preparation for Ordering an Odette Certificate... 3 Step 1: Prepare the information you
More informationSecure e-mail transaction guidelines for external users with Commission personnel.
Secure e-mail transaction guidelines for external users with Commission personnel. This document describes in general the basic requirements to set up secure (encrypted) e- mail communication between external
More informationDVS DCI Signing Certificate Tool
DVS DCI Signing Tool User Guide (Version 1.0) DVS DCI Signing Tool User Guide User Guide Version 1.0 for the DVS DCI Signing Tool Version 1.0 Copyright 2008 by DVS Digital Video Systems AG, Hanover. All
More informationTrend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
More informationStoneGate SSL VPN Technical Note 2068. Adding Bundled Certificates
StoneGate SSL VPN Technical Note 2068 Adding Bundled Certificates Table of Contents Introduction................................... page 3 Overview..................................... page 3 Splitting
More informationSEZ SEZ Online Manual Digital Signature Certficate [DSC] V Version 1.2
SEZ SEZ Online Manual Digital Signature Certficate [DSC] V Version 1.2 Table of Contents 1 Introduction...2 2 Procurement of DSC...3 3 Installation of DSC...4 4 Procedure for entering the DSC details of
More informationOverview Keys. Overview
Overview Keys Overview The PGPmail program performs fast, high-security, public-key encrypting (with optional compression), decrypting, and authenticating of electronic messages and files. The program
More informationUsing etoken for Securing E-mails Using Outlook and Outlook Express
Using etoken for Securing E-mails Using Outlook and Outlook Express Lesson 15 April 2004 etoken Certification Course Securing Email Using Certificates Unprotected emails can be easily read and/or altered
More informationdobe Acrobat XI Pro Digital Signatures
dobe Acrobat XI Pro Digital Signatures Intermediate Adobe Acrobat XI Pro is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License. To view a copy of this
More informationNetwork Security Essentials Chapter 7
Network Security Essentials Chapter 7 Fourth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 7 Electronic Mail Security Despite the refusal of VADM Poindexter and LtCol North to appear,
More information