AT&T VERIFY CONNECT (V3.2.0) GETTING STARTED GUIDE FOR MOBILE SDK

Size: px
Start display at page:

Download "AT&T VERIFY CONNECT (V3.2.0) GETTING STARTED GUIDE FOR MOBILE SDK"

Transcription

1 AT&T VERIFY CONNECT (V3.2.0) GETTING STARTED GUIDE FOR MOBILE SDK AT&T Verify Connect is powered by SecureKey Technologies Inc. briidge.net Connect service platform. No part of this document may be copied, modified or disseminated without permission of SecureKey and AT&T. AT&T and the AT&T logo are trademarks of AT&T Intellectual Property. SecureKey and briidge.net are trademarks of SecureKey Technologies. Other marks are property of their respective owners SecureKey Technologies Inc. and AT&T Intellectual Page 1 of 53

2 Document Control Change Record Date Revision Section(s) Editor Change Reference 27/11/ DH Initial Release 28/11/ Authenticate User DH Added use case for authenticate user. 05/01/ Integration Prerequisites 30/03/ SDK Methods: Enroll User Authenticate User VM DH Added instruction for Android applications using ProGuard Updated methods for v New global listeners Briidge.UserEnrollmentListener and Briidge.UserAuthenticationListener. Server APIs: Authenticate User (Init) Authenticate User (Result) Enroll User (Init) Enroll User (Result) Updated URL endpoints for v SecureKey Technologies Inc. and AT&T Intellectual Page 2 of 53

3 Table of Contents 1. Introduction About briidge.net Connect Audience Notation Integration Overview Server API briidge.net Connect URLs Integration Prerequisites Device Provisioning User Authentication Enroll User Authenticate User Device Authentication Authenticate Device Provision Device User Management APIs Get Paired Users per Device Unpair User from Device Change Crypto PIN EMV Card Services Card Read Authenticate with Card Key Management Inter-Channel Communication Server Reference API Reference Parameter Descriptions Page 3 of 53

4 1. Introduction 1.1 About Verify Connect and briidge.net Connect briidge.net Connect is a cloud-based multi-factor authentication service platform that provides customers the ability to strongly authenticate their users, and facilitate strong authentication. Verify Connect powered by bridge.net is the AT&T instance of the solution. The platform is designed to support many in-market devices today, enabling strong security across all delivery channels. 1.2 Audience This guide introduces several usage scenarios for the briidge.net Connect Mobile SDK. It is assumed the reader is familiar with JSON requests and objects. 1.3 Notation briidge.net Connect uses the following terms: Relying Party - to describe a person or organization that is interested in verifying and establishing the credential of another person using the briidge.net Connect platform. Crypto PIN (or Cryptographic PIN) - to describe the briidge.net Connect managed passcode. Use of passcode, QuickCode, and Crypto PIN may be used interchangeably. Page 4 of 53

5 2. Integration Overview To integrate the SecureKey briidge.net Connect platform with a Relying Party (RP) application involves the following: Integrating the briidge.net Connect SDK into your application client. The client integration process involves implementing callback functions in support of the SDK methods. The callback functions return either the applicable data or an identifier that will enable your application server to retrieve the data. Implementing server endpoints to communicate identifiers and statuses between your application server and client. Implementing JSON server endpoints to call and receive data from the briidge.net Connect Server. Note: In some cases, additional processing is required between the RP server and client to complete a request. The following diagram shows the logical communication lines between briidge.net Connect components and your application. Figure 1: briidge.net Connect System Overview Most requests involve both a client and server call to complete a transaction. Transactions can be initiated by calling either the briidge.net Connect Server API or briidge.net Connect SDK (depicted by side A in the diagram above) and then involves passing some data between the RP client and server to access the resulting data (depicted by side B in the diagram above). Finally, another call to the briidge.net Connect platform can be made to retrieve the resultant data. Page 5 of 53

6 A Represents communication lines between the RP and briidge.net Connect: Client calls can be made to the briidge.net Connect SDK, and Server calls can be made to the briidge.net Connect Server. B Represents communication lines between the RP application client and RP application server. 2.1 Server API The briidge.net Connect JSON API is a server-to-server API that facilitates initiation of functional briidge.net Connect methods. The following points are common to all calls described in this section: Transport Protocol HTTPS (or TLS 1.0+) is required for communication between the RP's web site and the briidge.net Connect server. Authentication is performed via a client X.509 certificate. Requests will use the POST method. JSON Requests Many of the requests exposed through the API provide parameters. These parameters are passed in JSON format in the body of the HTTP POST message. HTTP Responses The HTTP response code will report the status of the HTTP communication and no the status of the briidge.net Connect transaction. This means that all messages that are accepted and processed by the server will return an HTTP 200 status code. Responses provided with a 200 response code must be checked for an error element to determine if the request was successful. 2.2 briidge.net Connect URLs In the following sections, URLs will be shown with the host portion as HOST. HOST is a placeholder for the briidge.net Connect server hostname for the environment you are assigned. There are various briidge.net Connect environments for development and production. The appropriate host value to use for a particular purpose is provided by SecureKey. 2.3 Integration Prerequisites Prior to integration, ensure you have all development tools and components SecureKey Mobile SDK You will need the SecureKey Mobile SDK libraries as well as any dependencies for your platform. Consult the README file for detailed requirements (available with platform libraries). Page 6 of 53

7 Copy the SecureKey Mobile SDK files to the appropriate location to include them in your project. For example, if developing Android, copy skaplibobf-sandbox.jar to your lib folder and include it in your Eclipse project for Android development. Note: If using ProGuard to obfuscate your Android application, add the following lines to the end of the ProGuard configuration file (proguard-project.txt) to use the briidge.net Connect SDK: # Following warnings can be ignored -dontwarn com.samsung.android.** briidge.net Connect Server API Certificates RPs and the briidge.net Connect Administrator must exchange certificates to perform mutual authentication during server-to-server connections; a trusted connection using HTTPS (TLS 1.0+) must be established for the RP server to make API calls to the briidge.net Connect server. Authentication is performed via a client X.509 certificate Domain Name Registration As part of the on-boarding process, RPs must register their domain name with SecureKey to ensure the RP application is recognized by the briidge.net Connect server. This information is used to uniquely identify an RP and ensures that only registered domains are served by the briidge.net Connect server Using Sample RP Server To use the SDK samples as-is, you can download and run the Sample RP Server on a local Java App Server (such as Tomcat 7). This sample server provides full implementation for all briidge.net Connect Server APIs and exposes only the required subset to the sample client application. You can easily extend the sample code to add support for additional features. The Sample RP Server includes applicable certificates to establish trusted server-to-server connections with the briidge.net Connect server. The certificates are located under a resources/keystores folder, in a samplerp.jks file. 2.4 Device Provisioning All devices must be provisioned prior to use with the briidge.net Connect SDK. Provisioning a device enables briidge.net Connect to identify device specifications and assign a device identifier that is unique to the device and the requesting RP. The RP will use this device identifier in all device-related transactions performed on the briidge.net Connect platform. Note: Device provisioning can be completed during user enrollment (see Enroll User), or can be done separately (see Provision Device). Page 7 of 53

8 3. User Authentication Use briidge.net Connect as a first-factor form of authentication, or enhance an existing RP implementation to introduce second-factor or multi-factor authentication. The following section introduces briidge.net Connect Server APIs related to authentication. 3.1 Enroll User This method is used to perform several registration operations in one call. It enables you to: Add a user (if not registered with briidge.net Connect), Provision and register a device to the user, Select and set up authentication methods (for example, Passcode (QuickCode) or local authentication methods such as fingerprint and device pin), and Set a Passcode (QuickCode) for the user. The following sequence diagram illustrates the calls made to enroll a user: Page 8 of 53

9 Figure 2: Enrolling a user Procedure 1. Call briidge.net Connect Server Initialize the enrollment process by calling enroll. Pass a new or existing userid. The method to call is ENROLL: Where, HOST, is provided to you by SecureKey. The result is a transaction identifier, txnid, to be passed to the client application. 2. Initialize the SDK Initialize the Mobile SDK to access the briidge.net platform. Briidge briidge = SKBriidgeFactory.getBriidgePlatform(context); 3. Call SDK Make a call to briidge.enroll. Ensure to pass the transaction identifier (txnid) obtained in previous steps and a class that implements the Briidge.EnrollListener interface. briidge.enroll(transactionid, new public void getcurrentactivity(getcurrentactivitycallback callback) public void verifypinrequested(final VerifyPinCallback callback) // Get Pin from user public void setupquickcode(final SetQuickCodeCallback callback) //The app should ask the user to enter a new quick code if(usercancels) callback.cancel();//in this case enrollcomplete will not be called. else public void enrollcomplete(int status) if (status == Briidge.STATUS_OK) // success else if (status == Briidge.STATUS_CONNECTIVITY_ERROR) // tell user that there is a connectivity error else if (status == Briidge.STATUS_FATAL_CONNECTIVITY_ERROR_UPDATE_SDK) Page 9 of 53

10 // tell user that there is a fatal connectivity // error that requires app developer to update sdk else // could not set the quick code (null, empty, server error, publc void selectauthenticationmethods( List<AuthenticationMethod> authenticationmethods, List<AuthenticationMethod> existingauthenticationmethods, SelectAuthenticationMethodsCallback callback) // Example of Passcode (QuickCode) Authentication // Note: The auth method is used only if it is in the authenticationmethods list callback.selectauthenticationmethods (Arrays.asList(AuthenticationMethod.QuickCodeAuthentication)); ); Note: If multiple authentication methods are available - for example, Passcode (QuickCode) and local authentication methods such as fingerprint or device pin - then the callback selectauthenticationmethodsrequested may be called for the client application to select the authentication methods to register. See the Mobile SDK reference for more details. 4. Call briidge.net Connect Server After a period of time, the RP can call the briidge.net Connect server to check on the status of enrollment and retrieve the corresponding device information, deviceinfo. Pass the same transaction identifier from previous steps. The endpoint for this call is ENROLL-DATA: Where, HOST, is provided to you by SecureKey. If enrollment was successful, the result will be a JSON object containing the device information: "deviceinfo" : "deviceid" : "04a96c35-aef5-4ad7-ac6b-6c5c890d3b1b", "devicetype" : "SW_SE", "supportsnfc" : true, "devicename" : "LGE", "model" : "LGE OCCAM", "lastconnected" : " T15:20: ", "pushable" : false Otherwise, an error is returned with error code and description. Page 10 of 53

11 3.2 Authenticate User This method is used to perform authentication of a user's device and user's selected authentication method (for example, Passcode (QuickCode) or local authentication methods such as fingerprint or device pin) in a single call. The following sequence diagram illustrates the calls made to authenticate a user: Prerequisites Figure 3: Authenticating a user User must be enrolled on the briidge.net Connect platform. For more information, see Enroll User. Note: Although RPs can make separate calls to the API (ADD-USER, ADD-DEVICE, and INIT-SET- PASSCODE), it is recommended that they use the enroll API for ease of use and to streamline code. Page 11 of 53

12 3.2.2 Procedure 1. Call briidge.net Connect Server to initiate Initiate the user authentication process by calling the authenticate server API. Pass an existing userid. The method to call is AUTHENTICATE: Where, HOST, is provided to you by SecureKey. The result is a transaction identifier, txnid, to be passed to the client application. 2. Initialize the SDK Initialize the Mobile SDK to access the briidge.net platform. Briidge briidge = SKBriidgeFactory.getBriidgePlatform(context); 3. Call SDK Make a call to briidge.authenticate. Ensure to pass the transaction identifier (txnid) obtained in previous steps and a class that implements the Briidge.AuthenticateListener interface with the following callback methods: getcurrentactivity(getcurrentactivitycallback callback) If the registered authentication method is local fingerprint authentication, then use this callback to request the current UI activity. Note: This is only applicable for Samsung devices with TEE. quickcoderequested(final VerifyQuickCodeCallback callback) If the registered authentication method is Passcode (QuickCode), then use this callback to authenticate the user. For more information, see the selectauthenticationmethodsrequested callback for Enroll User. Implement code that prompts the user for their Passcode (QuickCode) and verify it by passing the Passcode (QuickCode) to VerifyQuickCodeCallback.verifyQuickCode. If the user cancels the request, call VerifyQuickCodeCallback.cancel(). authenticatecomplete(int status, String transactionid) Check the status of the result and if successful, pass the transaction identifier to your RP server to retrieve the result of the authentication. 4. Call briidge.net Connect Server to retrieve results Once the RP server receives the transaction identifier, txnid, they can call the briidge.net Connect server to confirm the results of the authentication. Page 12 of 53

13 The endpoint for this call is AUTHENTICATE-DATA: Where, HOST, is provided to you by SecureKey. If authentication was successful, the result will be a JSON object containing the user identifier and device information: "userid" : "user123", "deviceinfo" : "deviceid" : "04a96c35-aef5-4ad7-ac6b-6c5c890d3b1b", "devicetype" : "SW_SE", "supportsnfc" : true, "devicename" : "LGE", "model" : "LGE OCCAM", "lastconnected" : " T15:20: ", "pushable" : false Otherwise, an error is returned with error code and description. Page 13 of 53

14 4. Device Authentication 4.1 Authenticate Device Device authentication enables RPs to independently verify device specifications using briidge.net Connect. There are two options for performing device authentication: Requesting a transaction identifier to retrieve the resulting data from the briidge.net Connect server, or Requesting a signed JSON Web Token (JWS) that is returned directly to the client Transaction Identifier The following sequence diagram illustrates the calls made to authenticate a device. Figure 4: Authenticate Device Procedure 1. Initialize the SDK Initialize the Mobile SDK to access the briidge.net platform. Briidge briidge = SKBriidgeFactory.getBriidgePlatform(context); Page 14 of 53

15 2. Call SDK Make a call to briidge.authenticatedevice. Ensure to pass a class that implements the Briidge.AuthenticateDeviceListener interface. This callback function has only one method that requires implementing: briidge.authenticatedevice(authenticatedevicelistener( void authenticatedevicecomplete(int status, string txnid) //Check status //Pass txnid to server if request is successful ) 3. Call briidge.net Connect Server Obtain the results of the device authentication by passing the transaction identifier (txnid) in the call to your server. The method to call is DEVICE-INITIATED-GET-DEVICE: Where, HOST, is provided to you by SecureKey. The JSON body of the request is simply: "txnid" : "7b632adf-ee64-4a49-9d42-5cb95d5edc1f" If device validation is successful, the result is a JSON object containing the device information; otherwise, an error is returned. For example: "deviceinfo" : "softwareavailable": true, "nfc" : false, "deviceavailable" : true, "provisioned" : false, "setype" : "WEB_VSE", "deviceinterface" : "webvse", "id" : "webvse WEB_VSE" 4. Pass result to application client Complete the authentication by passing the results back to your application client. At this point, if the authentication was satisfactory, then the end user can be given access to the protected resource. That's it. Your application client now knows that it is running on the authenticated device. Page 15 of 53

16 4.1.2 JWT Token The following sequence diagram illustrates the calls made to authenticate a device using a JWT signed or encrypted assertion. Figure 5: Authenticate Device with JWT Procedure 1. Initialize the SDK Initialize the Mobile SDK to access the briidge.net platform. Briidge briidge = SKBriidgeFactory.getBriidgePlatform(context); 2. Call SDK Make a call to briidge.assertdevice. Ensure to pass a class that implements the Briidge.AssertDeviceListener interface. This callback function has only one method that requires implementing: briidge.assertdevicecomplete(assertdevicelistener( void assertdevicecomplete(int status, string resultdata) //Check status //Pass txnid to server if request is successful ) 3. Interpreting Result The resultdata in the example code from the previous step is a signed JWT containing three (3) parts delimited by a period ("."): a header, a payload, and a signature. Page 16 of 53

17 The device information is contained in the payload under the key securekey.com/deviceinfo. "deviceinfo" : "softwareavailable": true, "nfc" : false, "deviceavailable" : true, "provisioned" : false, "setype" : "WEB_VSE" "deviceinterface" : "webvse", "id" : "webvse WEB_VSE" That's it. Your app now knows that it is running on the authenticated device. 4.2 Provision Device Provisioning a device enables briidge.net Connect to identify device specifications and assign a device identifier that is unique to the device and the requesting RP. The RP will use this device identifier in all device-related transactions performed on the briidge.net Connect platform. Note: Every device must be provisioned on first use. The following sequence diagram illustrates the calls made to provision a device Procedure 1. Initialize the SDK Figure 6: Initialize SDK and Provision Device Page 17 of 53

18 Initialize the Mobile SDK to access the briidge.net platform. Briidge briidge = SKBriidgeFactory.getBriidgePlatform(context); Tip: Add a check after initialization to ensure all transactions are performed on a provisioned device. if (!briidge.isprovisioned()) //Request provision id through RP server. 2. Call briidge.net Connect Server Obtain a provisioning authorization code from the server to complete the provisioning. The method to call is GET-DEVICE-PROVISION-ID: Where, HOST, is provided to you by SecureKey. The result is a transaction identifier, txnid, to be used as the provisioning authorization code. Pass the authorization code to your application client to provision the device. "txnid" : "7b632adf-ee64-4a49-9d42-5cb95d5edc1f" 3. Provision device Complete the provisioning by calling setprovisionid(). Pass the txnid as obtained by your server in the previous step. That's it. You application can now perform authentication. Page 18 of 53

19 5. User Management APIs briidge.net Connect offers user registration and management functions to enable RPs to set up user profiles in the cloud. RPs can securely store and access user information such as identifiers, phone numbers, and device information. Note: RPs can only access users that they have registered. Third party applications cannot directly access this data. The following sections describe the methods to register and access users; method typically do not involve user interaction and may not require an initiation request. 5.1 Get Paired Users per Device Getting a list of users paired to a device enables RPs to track which users can set up a Passcode (QuickCode) or perform other device-related operations such as device-based authentication Procedure 1. Initialize the SDK Initialize the Mobile SDK to access the briidge.net platform. Briidge briidge = SKBriidgeFactory.getBriidgePlatform(context); 2. Call SDK Make a call to briidge.getpairedusers. Ensure to pass a class the implements the GetPairedUsers interface. This interface has one callback method that needs to be implemented: briidge.getpairedusers( new public void getpaireduserscomplete(int status, Vector users) if(status!= Briidge.STATUS_OK) // check which status, possibly try again // or maybe authentication problems else Vector <SKPairedUser> skusers = (Vector <SKPairedUser>) users; for( SKPairedUser user: skusers) Log.d("Users: ", user.getuserid() + " " + user.getcreationdate()); if (skusers.size() == 0) Page 19 of 53

20 ); // no users 5.2 Unpair User from Device Unpairing removes the relationship established between a user and device. Use this method if a user changes devices or is removed. Calling this method also removes any associations established as a result of such a pairing, such as passcodes. Note: briidge.net Connect allows multiple users to pair to the same device. Unpairing one user disassociates the relationship between that user and the device and does not impact any other users Procedure 1. Initialize the SDK Initialize the Mobile SDK to access the briidge.net platform. Briidge briidge = SKBriidgeFactory.getBriidgePlatform(context); 2. Call SDK Make a call to briidge.unpair. Pass the user identifier (userid) and a class that implements the UnpairListener interface. This interface has one callback method that needs to be implemented: briidge.unpair( userid, new public void unpaircomplete(int status) ); if (status == Briidge.STATUS_OK) // success else if (status == Briidge.STATUS_CONNECTIVITY_ERROR) // tell user that there is a connectivity error else // could not un-pair That's it. The user and device are now unpaired. Page 20 of 53

21 5.3 Change Crypto PIN Changing a user Passcode (QuickCode) is a simple operation that does not require communication between the application client and RP app server. However, there is, communication between the Mobile SDK and briidge.net services that is transparent to the application client developer Procedure 1. Initialize the SDK Initialize the Mobile SDK to access the briidge.net platform. Briidge briidge = SKBriidgeFactory.getBriidgePlatform(context); 2. Call SDK Make a call to briidge.changequickcode. briidge.changequickcode( oldquickcode, newquickcode, userid, new public void changequickcodecomplete(int status) ); if (status == Briidge.STATUS_OK) // success else if (status == Briidge.STATUS_INVALID_QUICK_CODE) // Failed to verify old passcode. else if (status == Briidge.STATUS_UNPAIRED_USER) // User is not paired on this device. else if (status == Briidge.STATUS_PASS_CODE_NOT_SET) // User has no passcode set, nothing to change. else if ( status == Briidge.STATUS_TRY_LATER_TOO_MANY_INVALID_QUICKCODE_ATTEMPTS) // too many failed attempts to change passcode - try later else // could not change the passcode // (null, empty, server error, etc) Page 21 of 53

22 6. EMV Card Services 6.1 Card Read Use briidge.net Connect to authenticate users or transactions with RP-issued or RP-approved contactless credentials. Contactless credentials are typically cards that users can tap on supported near field communication (NFC) enabled terminals. Terminals can include NFC-enabled USB sticks or certain mobile devices. Note: When using mobile device terminals, this method is only applicable for select Android devices with NFC capability. Many contactless cards allow the terminal to provide data to the card during transactions. briidge.net Connect enables RPs to specify terminal option data for this purpose. If a required terminal option data element is not provided by the RP, or the provided value does not meet the requirement of the card, the device terminal will provide the terminal option data. The actual values used will be provided in the response Procedure 1. Initialize the SDK Initialize the Mobile SDK to access the briidge.net platform. Briidge briidge = SKBriidgeFactory.getBriidgePlatform(context); 2. Call SDK Make a call to briidge.readcard. Ensure to pass a class that implements the Briidge.ReadCardListener interface. Several callback functions must be implemented, including: void presentcardreadui(cardreadtransaction transaction) void cardreadstatus(int status) void cardreadcomplete(int status, Sting transactionidentifier) presentcardreadui This method is called when the SDK is ready to perform card reading. The RP should present a user interface to indicate to the user to tap their card. The app MUST set up an NFC intent filter to receive Android NFC events at this time (see below for clarification). cardreadstatus This method is called when the state of the card read is available. States include when the card read completes, when an error occurs, or when a wrong intent was passed. cardreadcomplete Page 22 of 53

23 This method is called when the card read completes. If successful, a transaction identifier is returned. briidge.readcard(null, new public void presentcardreadui(cardreadtransaction transaction) this.transaction = transaction; // Prepare for reading NFC to pass the Intent from it to the public void cardreadstatus(int status) if (status == Briidge.STATUS_CARD_READ_READING_DONE) // inform user of success and wait for cardreadcomplete to be called. else if (status == Briidge.STATUS_CARD_READ_ERROR) // inform user of tap error and ask to tap again or cancel. else if (status == Briidge.STATUS_CARD_READ_NON_NFC_INTENT) // Wrong Intent was passed to transaction.readcard. // Use transaction.isnfcintent to determine if you received an NFC public void cardreadcomplete(int status, String transactionid) if (status == Briidge.STATUS_OK) // API finished without errors, //use transactionid to get the API result from the RP server. else if (status == Briidge.STATUS_CONNECTIVITY_ERROR) // tell user that there is a connectivity error else if (status == Briidge.STATUS_FATAL_CONNECTIVITY_ERROR_UPDATE_SDK) // tell user that there is a fatal connectivity error that requires // app developer to update sdk else // Server error while performing card tap API. ); 3. Call briidge.net Connect Server Obtain the card information by passing the transaction identifier to the briidge.net Connect server. The method to call is device-initiated-card-read-data.action Where, HOST, is provided to you by SecureKey. The JSON body of the request is simply: "txnid" : "7b632adf-ee64-4a49-9d42-5cb95d5edc1f" If card validation is successful, the result is a JSON object containing the card and device information; otherwise, an error is returned. For example: Note: The data returned by briidge.net Connect server is the raw card data and is different for each card type. The RP must be familiar with the card specification standards. Page 23 of 53

24 "deviceinfo" : "deviceid" : "04a96c35-aef5-4ad7-ac6b-6c5c890d3b1b", "devicetype" : "SW_SE", "supportsnfc" : true, "devicename" : "LGE", "model" : "LGE OCCAM", "lastconnected" : " T15:20: ", "pushable" : false, "cardtype" : "DISCOVER_DCVV", "interfacetype" : "Contactless", "carddata":[ "tag":"84", "value":"a ", "tag":"50", "value":" f766572", "tag":"87", "value":"01", "tag":"9f38", "value":"9f3701", "tag":"82", "value":"0000", "tag":"94", "value":" ", "tag":"9f80", "value":"040608", "tag":"56", "value":" f23", "tag":"57", "value":"3b f3e" ], "cardterminaloptionsused":[ "tag":"9f37", "value":"65" ] 4. Pass result to application client The RP server can now interpret the data and pass the result back to the application client. That's it. Your application client has finished reading the card NFC Intent When presentcardreadui is called, the RP app should begin filtering for the intent nfcadaptor.action_tech_discovered and save the CardReadTransaction object received by this method. To be able to capture the NFC intent, you have to add android.permission.nfc to permissions in your manifest. For example: // Begins filtering for the NFC intent. private void enableforegrounddispatch() if (NfcAdapter.getDefaultAdapter(this)!= null) try NfcAdapter.getDefaultAdapter(this).enableForegroundDispatch(this, PendingIntent.getActivity(this, 0, new Intent(this, this.getclass()).addflags(intent.flag_activity_single_top), 0), new IntentFilter[] new IntentFilter(NfcAdapter.ACTION_TECH_DISCOVERED), new String[][] new String[] NfcA.class.getName(), new String[] NfcB.class.getName() ); Page 24 of 53

25 catch (Exception e) // Show error to user. // Stops filtering for the NFC intent. private void disableforegrounddispatch() if (NfcAdapter.getDefaultAdapter(this)!= null) try NfcAdapter.getDefaultAdapter(this).disableForegroundDispatch(this); catch (Exception e) 6.2 Authenticate with Card This method enables you to perform user authentication and read card in a single transaction. It is similar to the card read method, except the server response returns a user identifier instead of card data. RPs must first set up a Credential Mapper Class with the briidge.net Connect administrator to provide mappings between user identifier and card data. To perform user authentication and card read together, call briidge.authenticatewithcard method. This method takes cardterminaloptions and timeout as parameters to specify the accepted types of terminals and to place a time limit on the card read itself. Callback methods will have to be implemented as well to track the card read progress Procedure 1. Initialize the SDK Initialize the Mobile SDK to access the briidge.net platform. Briidge briidge = SKBriidgeFactory.getBriidgePlatform(context); 2. Call SDK Make a call to briidge.authenticatewithcard. briidge.authenticatewithcard(null, new public void presentcardreadui(cardreadtransaction transaction) this.transaction = transaction; // Prepare for reading NFC to pass the Intent from it to the public void cardreadstatus(int status) if (status == Briidge.STATUS_CARD_READ_READING_DONE) // inform user of success and wait for cardreadcomplete to be called. else if (status == Briidge.STATUS_CARD_READ_ERROR) // inform user of tap error and ask to tap again or cancel. else if (status == Briidge.STATUS_CARD_READ_NON_NFC_INTENT) // Wrong Intent was passed to transaction.readcard. // Use transaction.isnfcintent to determine if you received an NFC intent. Page 25 of 53

26 @Override public void cardreadcomplete(int status, String transactionid) if (status == Briidge.STATUS_OK) // API finished without errors, //use transactionid to get the API result from the RP server. else if (status == Briidge.STATUS_CONNECTIVITY_ERROR) // tell user that there is a connectivity error else if (status == Briidge.STATUS_FATAL_CONNECTIVITY_ERROR_UPDATE_SDK) // tell user that there is a fatal connectivity error that requires // app developer to update sdk else // Server error while performing card tap API. ); 3. Call briidge.net Connect Server Obtain the results of the card authentication by passing the transaction identifier (txnid) in the call to your server. The method to call is AUTHENTICATE-WITH-CARD: Where, HOST, is provided to you by SecureKey. The JSON body of the request is simply: "txnid" : "7b632adf-ee64-4a49-9d42-5cb95d5edc1f" If card validation is successful, the result is a JSON object containing the user identifier, userid, and device information, deviceinfo; otherwise, an error is returned. For example: "userid" : "user123", "deviceinfo" : "deviceid" : "04a96c35-aef5-4ad7-ac6b-6c5c890d3b1b", "devicetype" : "SW_SE", "supportsnfc" : true, "devicename" : "LGE", "model" : "LGE OCCAM", "lastconnected" : " T15:20: ", "pushable" : false That's it. Your mobile app has now authenticated the user using a card. Page 26 of 53

27 7. Key Management briidge.net Connect offers a suite of key management services that enable Relying Parties (RPs) to securely synchronize and store keys or key components to perform encrypt/decrypt operations, sign data, and generate cryptograms locally from a user s mobile device. Once transmitted to the device, RPs can perform operations such as OTP transactions, encrypting and/or decrypting data, signing data, and generate cryptograms locally from the mobile device. For more information, see the briidge.net Connect - RP Key Management and Operations guide. Page 27 of 53

28 8. Inter-Channel Communication Inter-channel communication refers to messages that are passed between user-facing applications on different devices for various consumer channels such as web, mobile, call center, and so forth. The ability to send messages between multiple channels enable implementations involving out-of-band second factor authentication, transaction confirmation, credential transfer from one device to another, and so on. One example of a user flow that incorporates inter-channel communication is Web-to-Mobile; where an end user may first engage with a web application and then engage with a mobile application to complete the task. For example, the user can be performing a money transfer from the web application. The web application may then request that the user provide confirmation through a mobile application to complete the transfer. Another example is a user leveraging their mobile ID (that is, using their mobile device as their user credential) to sign-in to a web application by snapping a QR code presented on the web page. The web application can have a companion mobile app to process the code for verification. For more information, see the briidge.net Connect - Solution Guide - Web to Mobile guide. Page 28 of 53

29 9. Server Reference The following sections provide additional details and descriptions for briidge.net Connect Server APIs and JSON parameters applicable to this guide. 9.1 API Reference Add Device Use this method to associate a provisioned device to an existing user. Endpoint: Request Requests can contain the following data: Request Parameter Type Short Description userid [Required] String A user identifier in the RP s namespace. For example: "userid" : "user123" deviceid [Required] String A unique identifier for the mobile device. For example: "deviceid" : "04a96c35-aef5-4ad7-ac6b-6c5c890d3b1b" verifieddevice [Optional] Boolean Indicates whether or not the device used to authenticate the user was in a verified state according to RP policy rules. For example: "verifieddevice" : true Response Response Parameter Type Short Description txnid [Required] String The identifier for the current transaction. The transaction identifier is supplied by briidge.net Connect - Server, Web SDK, or Mobile SDK. For example: "txnid" : "7b632adf-ee64-4a49-9d42-5cb95d5edc1f" Page 29 of 53

30 Error Codes Error codes for this response can include: invalid_credentials no_device unknown_user Add User Use this method to register a user with briidge.net Connect. Endpoint: Request Requests can contain the following data: Request Parameter Type Short Description userid [Required] String A user identifier in the RP s namespace. For example: "userid" : "user123" phone [Optional] Array An array of objects listing the user's contact details. For example: "phone" : [ "name" : "Home", "number" : " ", "name" : "Mobile", "number" : " " ] Response Response Parameter Type Short Description txnid [Required] String The identifier for the current transaction. The transaction identifier is supplied by briidge.net Connect - Server, Web SDK, or Mobile SDK. For example: "txnid" : "7b632adf-ee64-4a49-9d42-5cb95d5edc1f" phone [Optional] Array An array of objects listing the user's contact details. For example: "phone" : [ "name" : "Home", "number" : " ", "name" : "Mobile", "number" : " " ] Page 30 of 53

31 Error Codes Error codes for this response can include: invalid_access_token user_exists system_error Authenticate User (Init) Use this method to authenticate a user. Initiation Endpoint: Initiation Request Requests can contain the following data: Request Parameter Type Short Description userid [Required] String A user identifier in the RP s namespace. For example: "userid" : "user123" Initiation Response Request Parameter Type Short Description txnid [Required] String The identifier for the current transaction. The transaction identifier is supplied by briidge.net Connect - Server, Web SDK, or Mobile SDK. For example: "txnid" : "7b632adf-ee64-4a49-9d42-5cb95d5edc1f" Error Codes Error codes for this response can include: unsupported_authentication invalid_credentials invalid_request_property invalid_request Authenticate User (Result) Use this method to authenticate a user. Page 31 of 53

32 Result Retrieval Endpoint: Result Retrieval Request Request Parameter Type Short Description txnid [Required] String The identifier for the current transaction. The transaction identifier is supplied by briidge.net Connect - Server, Web SDK, or Mobile SDK. For example: "txnid" : "7b632adf-ee64-4a49-9d42-5cb95d5edc1f" Result Retrieval Response Request Parameter Type Short Description userid [Required] String A user identifier in the RP s namespace. For example: "userid" : "user123" deviceinfo [Required] Object An object listing information about the device if the authentication was successful. For example: "deviceinfo" : "deviceid" : "04a96c35-aef5-4ad7-ac6b- 6c5c890d3b1b", "devicetype" : "SW_SE", "supportsnfc" : true, "devicename" : "LGE", "model" : "LGE OCCAM", "lastconnected" : " T15:20: ", "pushable" : false Error Codes Error codes from this response can include: invalid_access_token unknown_txn authentication_failed unknown_user user_declined user_cancelled device_preempted user_cancelled_update Page 32 of 53

33 system_error txn_not_complete no_device invalid_device device_update_required timeout card_read_error unrecognized_card_type invalid_card_data device_removed device_network_error Authenticate with Card Use this method to perform user authentication and read card in a single transaction. Endpoint: Request Requests can contain the following data: Request Parameter Type Short Description txnid [Required] String The identifier for the current transaction. The transaction identifier is supplied by briidge.net Connect - Server, Web SDK, or Mobile SDK. For example: "txnid" : "7b632adf-ee64-4a49-9d42-5cb95d5edc1f" Response Response Parameter Type Short Description userid [Required] String A user identifier in the RP s namespace. For example: "userid" : "user123" deviceinfo [Required] String An object listing information about the device if the authentication was successful. For example: "deviceinfo" : "deviceid" : "04a96c35-aef5-4ad7-ac6b- 6c5c890d3b1b", Page 33 of 53

34 Response Parameter Type Short Description "devicetype" : "SW_SE", "supportsnfc" : true, "devicename" : "LGE", "model" : "LGE OCCAM", "lastconnected" : " T15:20: ", "pushable" : false Error Codes Error codes for this response can include: unknown_txn authentication_failed request_mismatch Enroll User (Init) This method is used to perform several registration operations in one call. It enables you to: Add a user (if not registered with briidge.net Connect), Provision and register a device to the user, Select and set up authentication methods (for example, Passcode (QuickCode) or local authentication methods such as fingerprint and device pin), and Set a Passcode (QuickCode) for the user. Endpoint: Initiation Request The body of the request can contain the following data: Request Parameter Type Short Description userid [Required] String A user identifier in the RP s namespace. For example: "userid" : "user123" Initiation Response The body of the response can contain the following data: Response Parameter Type Short Description txnid [Required] String The identifier for the current transaction. The transaction identifier is supplied by briidge.net Connect - Server, Web SDK, or Mobile Page 34 of 53

35 Response Parameter Type Short Description SDK. For example: "txnid" : "7b632adf-ee64-4a49-9d42-5cb95d5edc1f" Error Codes Error codes for this response can include: invalid_credentials invalid_request_property invalid_request unknown_user Enroll User (Result) This method is used to perform several registration operations in one call. It enables you to: Add a user (if not registered with briidge.net Connect), Provision and register a device to the user, Select and set up authentication methods (for example, Passcode (QuickCode) or local authentication methods such as fingerprint and device pin), and Set a Passcode (QuickCode) for the user. Endpoint: Result Retrieval Request The body of the request can contain the following data: Request Parameter Type Short Description txnid [Required] String The identifier for the current transaction. The transaction identifier is supplied by briidge.net Connect - Server, Web SDK, or Mobile SDK. For example: "txnid" : "7b632adf-ee64-4a49-9d42-5cb95d5edc1f" Result Retrieval Response The body of the response can contain the following data: Response Parameter Type Short Description Page 35 of 53

36 Response Parameter Type Short Description deviceinfo Object An object listing information about the device if the authentication was successful. For example: "deviceinfo" : "deviceid" : "04a96c35-aef5-4ad7-ac6b- 6c5c890d3b1b", "devicetype" : "SW_SE", "supportsnfc" : true, "devicename" : "LGE", "model" : "LGE OCCAM", "lastconnected" : " T15:20: ", "pushable" : false Error Codes Error codes for this response can include: invalid_access_token user_exists system_error Get Device (Device Initiated) Use this method to retrieve user device information after initiating an SDK call using the briidge.net Connect Web or Mobile SDKs. Endpoint: Request Requests can contain the following data: Request Parameter Type Short Description txnid [Required] String The identifier for the current transaction. The transaction identifier is supplied by briidge.net Connect - Server, Web SDK, or Mobile SDK. For example: "txnid" : "7b632adf-ee64-4a49-9d42-5cb95d5edc1f" useripaddress [Optional] String An IP address for the device as identified by the RP for the connecting user. For example: "useripadress" : " " Page 36 of 53

37 Response Response Parameter Type Short Description deviceinfo [Required] String An object listing information about the device if the authentication was successful. For example: "deviceinfo" : "deviceid" : "04a96c35-aef5-4ad7-ac6b- 6c5c890d3b1b", "devicetype" : "SW_SE", "supportsnfc" : true, "devicename" : "LGE", "model" : "LGE OCCAM", "lastconnected" : " T15:20: ", "pushable" : false Error Codes Error codes for this response can include: unknown_txn system_error Get Device Provision ID Use this method to provision a device for use with briidge.net Connect. Endpoint: Request There is no request body for this request Response Response Parameter Type Short Description txnid [Required] String The identifier for the current transaction. The transaction identifier is supplied by briidge.net Connect - Server, Web SDK, or Mobile SDK. For example: "txnid" : "7b632adf-ee64-4a49-9d42-5cb95d5edc1f" Note: The transaction identifier, txnid, is the provisioning authorization code. Pass this value to the SDK to complete provisioning. Page 37 of 53

38 Note: txnid is used as the provisioning authorization code in the SDK Error Codes Error codes for this response can include: invalid_credentials unknown_user Pair Device (Init) Use this method to initiate device association with an existing user. When a device is "paired" with a user, a user Passcode (QuickCode) can be set up for this user. Endpoint: Initiation Request Requests can contain the following data: Request Parameter Type Short Description userid [Required] String A user identifier in the RP s namespace. For example: "userid" : "user123" expiry [Required] String The expiry date and time for the pairing request. For example: "expiry" : " T00:00:00.000Z" If the pairing is not complete within the specified expiry, the pairing request terminates in failure. language [Optional] String A two character language code and optional two character country/region code to specify the language for text appearing in the widget. For example: "language" : "en-ca" Where, en-ca represents Canadian English. context [Optional] String A custom text field for specifying the context of the request. For example: Page 38 of 53

39 Request Parameter Type Short Description "context" : "Device Authentication" deviceconstraints [Optional] Array An array of constraints on the type of devices accepted (by the RP) for device pairing. For example: "deviceconstraints": "remoteallowed" : true, "nfcrequired" : false, "apptype" : null verifydevice [Optional] Boolean Indicates if a device should be marked as verified for the specified user. For example: "verifydevice" : true Initiation Response Response Parameter Type Short Description txnid [Required] String The identifier for the current transaction. The transaction identifier is supplied by briidge.net Connect - Server, Web SDK, or Mobile SDK. For example: "txnid" : "7b632adf-ee64-4a49-9d42-5cb95d5edc1f" pairingcode [Required] String A code used to initiate pairing from the client application. The pairingcode is referenced in the SDK call from the client. "paircode" : "XVTBMNCUVEXA" pairingurl [Optional] URL A URL to a SecureKey landing page where links and instructions (specific to a client platform) will be provided to invoke the SDK from the client application to initiate pairing. "pairingurl" : " notificationchannel [Optional] URI A notification channel handle to enable a client to wait for a response notification. This will be provided if the request indicated Page 39 of 53

40 Response Parameter Type Short Description that the notification should be through a notification channel. "notificationchannel" : "..." Error Codes Error codes for this response can include: invalid_request invalid_request_property unknown_user system_error Pair Device (Result) Use this method to retrieve the result after initiating device association with an existing user. When a device is "paired" with a user, a user Passcode (QuickCode) can be set up for this user. Endpoint: Result Retrieval Request Requests can contain the following data: Request Parameter Type Short Description txnid [Required] String The identifier for the current transaction. The transaction identifier is supplied by briidge.net Connect - Server, Web SDK, or Mobile SDK. For example: "txnid" : "7b632adf-ee64-4a49-9d42-5cb95d5edc1f" Result Retrieval Response Response Parameter Type Short Description deviceinfo Object An object listing information about the device if the authentication was successful. For example: "deviceinfo" : "deviceid" : "04a96c35-aef5-4ad7-ac6b- 6c5c890d3b1b", "devicetype" : "SW_SE", "supportsnfc" : true, "devicename" : "LGE", Page 40 of 53

Axway API Gateway. Version 7.4.1

Axway API Gateway. Version 7.4.1 O A U T H U S E R G U I D E Axway API Gateway Version 7.4.1 3 February 2016 Copyright 2016 Axway All rights reserved. This documentation describes the following Axway software: Axway API Gateway 7.4.1

More information

SECURITY IMPLICATIONS OF NFC IN AUTHENTICATION AND IDENTITY MANAGEMENT

SECURITY IMPLICATIONS OF NFC IN AUTHENTICATION AND IDENTITY MANAGEMENT SECURITY IMPLICATIONS OF NFC IN AUTHENTICATION AND IDENTITY MANAGEMENT Dmitry Barinov SecureKey Technologies Inc. Session ID: MBS-W09 Session Classification: Advanced Session goals Appreciate the superior

More information

How To Use Kiteworks On A Microsoft Webmail Account On A Pc Or Macbook Or Ipad (For A Webmail Password) On A Webcomposer (For An Ipad) On An Ipa Or Ipa (For

How To Use Kiteworks On A Microsoft Webmail Account On A Pc Or Macbook Or Ipad (For A Webmail Password) On A Webcomposer (For An Ipad) On An Ipa Or Ipa (For GETTING STARTED WITH KITEWORKS DEVELOPER GUIDE Version 1.0 Version 1.0 Copyright 2014 Accellion, Inc. All rights reserved. These products, documents, and materials are protected by copyright law and distributed

More information

Fairsail REST API: Guide for Developers

Fairsail REST API: Guide for Developers Fairsail REST API: Guide for Developers Version 1.02 FS-API-REST-PG-201509--R001.02 Fairsail 2015. All rights reserved. This document contains information proprietary to Fairsail and may not be reproduced,

More information

Oracle Fusion Middleware Oracle API Gateway OAuth User Guide 11g Release 2 (11.1.2.4.0)

Oracle Fusion Middleware Oracle API Gateway OAuth User Guide 11g Release 2 (11.1.2.4.0) Oracle Fusion Middleware Oracle API Gateway OAuth User Guide 11g Release 2 (11.1.2.4.0) July 2015 Oracle API Gateway OAuth User Guide, 11g Release 2 (11.1.2.4.0) Copyright 1999, 2015, Oracle and/or its

More information

PingFederate. Windows Live Cloud Identity Connector. User Guide. Version 1.0

PingFederate. Windows Live Cloud Identity Connector. User Guide. Version 1.0 Windows Live Cloud Identity Connector Version 1.0 User Guide 2011 Ping Identity Corporation. All rights reserved. Windows Live Cloud Identity Connector User Guide Version 1.0 April, 2011 Ping Identity

More information

[MS-DVRD]: Device Registration Discovery Protocol. Intellectual Property Rights Notice for Open Specifications Documentation

[MS-DVRD]: Device Registration Discovery Protocol. Intellectual Property Rights Notice for Open Specifications Documentation [MS-DVRD]: Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation. Microsoft publishes Open Specifications documentation for protocols, file formats, languages,

More information

Two-Factor Authentication over Mobile: Simplifying Security and Authentication

Two-Factor Authentication over Mobile: Simplifying Security and Authentication SAP Thought Leadership Paper SAP Mobile Services Two-Factor Authentication over Mobile: Simplifying Security and Authentication Controlling Fraud and Validating End Users Easily and Cost-Effectively Table

More information

Salesforce Files Connect Implementation Guide

Salesforce Files Connect Implementation Guide Salesforce Files Connect Implementation Guide Salesforce, Winter 16 @salesforcedocs Last updated: December 10, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered

More information

Configuring Salesforce

Configuring Salesforce Chapter 94 Configuring Salesforce The following is an overview of how to configure the Salesforce.com application for singlesign on: 1 Prepare Salesforce for single sign-on: This involves the following:

More information

For details about using automatic user provisioning with Salesforce, see Configuring user provisioning for Salesforce.

For details about using automatic user provisioning with Salesforce, see Configuring user provisioning for Salesforce. Chapter 41 Configuring Salesforce The following is an overview of how to configure the Salesforce.com application for singlesign on: 1 Prepare Salesforce for single sign-on: This involves the following:

More information

Adobe Marketing Cloud Bloodhound for Mac 3.0

Adobe Marketing Cloud Bloodhound for Mac 3.0 Adobe Marketing Cloud Bloodhound for Mac 3.0 Contents Adobe Bloodhound for Mac 3.x for OSX...3 Getting Started...4 Processing Rules Mapping...6 Enable SSL...7 View Hits...8 Save Hits into a Test...9 Compare

More information

Department Service Integration with e-pramaan

Department Service Integration with e-pramaan Department Service Integration with e-pramaan How to integrate a.net Application.NET specific integration details are provided in this document. Read e-pramaan Departments Integration Document before proceeding.

More information

Dell One Identity Cloud Access Manager 8.0.1 - How to Develop OpenID Connect Apps

Dell One Identity Cloud Access Manager 8.0.1 - How to Develop OpenID Connect Apps Dell One Identity Cloud Access Manager 8.0.1 - How to Develop OpenID Connect Apps May 2015 This guide includes: What is OAuth v2.0? What is OpenID Connect? Example: Providing OpenID Connect SSO to a Salesforce.com

More information

Integration Guide. SafeNet Authentication Service. Oracle Secure Desktop Using SAS RADIUS OTP Authentication

Integration Guide. SafeNet Authentication Service. Oracle Secure Desktop Using SAS RADIUS OTP Authentication SafeNet Authentication Service Integration Guide Oracle Secure Desktop Using SAS RADIUS OTP Authentication Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013

More information

Administration Guide for the System Center Cloud Services Process Pack

Administration Guide for the System Center Cloud Services Process Pack Administration Guide for the System Center Cloud Services Process Pack Microsoft Corporation Published: May 7, 2012 Author Kathy Vinatieri Applies To System Center Cloud Services Process Pack This document

More information

vcloud Air Platform Programmer's Guide

vcloud Air Platform Programmer's Guide vcloud Air Platform Programmer's Guide vcloud Air OnDemand 5.7 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition.

More information

Enroll a Windows Phone 8 Device

Enroll a Windows Phone 8 Device Enroll a Windows Phone 8 Device Download Process Enrolling your Windows 8 device is a quick and easy process that takes around 2 minutes to complete. Your IT administrator will send you a MaaS360 enrollment

More information

Connected Data. Connected Data requirements for SSO

Connected Data. Connected Data requirements for SSO Chapter 40 Configuring Connected Data The following is an overview of the steps required to configure the Connected Data Web application for single sign-on (SSO) via SAML. Connected Data offers both IdP-initiated

More information

Contents. 2 Alfresco API Version 1.0

Contents. 2 Alfresco API Version 1.0 The Alfresco API Contents The Alfresco API... 3 How does an application do work on behalf of a user?... 4 Registering your application... 4 Authorization... 4 Refreshing an access token...7 Alfresco CMIS

More information

White Paper March 1, 2005. Integrating AR System with Single Sign-On (SSO) authentication systems

White Paper March 1, 2005. Integrating AR System with Single Sign-On (SSO) authentication systems White Paper March 1, 2005 Integrating AR System with Single Sign-On (SSO) authentication systems Copyright 2005 BMC Software, Inc. All rights reserved. BMC, the BMC logo, all other BMC product or service

More information

Login with Amazon Getting Started Guide for Android. Version 2.0

Login with Amazon Getting Started Guide for Android. Version 2.0 Getting Started Guide for Android Version 2.0 Login with Amazon: Getting Started Guide for Android Copyright 2016 Amazon.com, Inc., or its affiliates. All rights reserved. Amazon and the Amazon logo are

More information

How Secure are Contactless Payment Systems?

How Secure are Contactless Payment Systems? SESSION ID: HT-W01 How Secure are Contactless Payment Systems? Matthew Ngu Engineering Manager RSA, The Security Division of EMC Chris Scott Senior Software Engineer RSA, The Security Division of EMC 2

More information

9243054 Issue 1. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation

9243054 Issue 1. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation 9243054 Issue 1 Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation VPN Client User s Guide 9243054 Issue 1 Reproduction, transfer, distribution or storage of part or all of

More information

Online signature API. Terms used in this document. The API in brief. Version 0.20, 2015-04-08

Online signature API. Terms used in this document. The API in brief. Version 0.20, 2015-04-08 Online signature API Version 0.20, 2015-04-08 Terms used in this document Onnistuu.fi, the website https://www.onnistuu.fi/ Client, online page or other system using the API provided by Onnistuu.fi. End

More information

Login with Amazon. Getting Started Guide for Websites. Version 1.0

Login with Amazon. Getting Started Guide for Websites. Version 1.0 Login with Amazon Getting Started Guide for Websites Version 1.0 Login with Amazon: Getting Started Guide for Websites Copyright 2016 Amazon Services, LLC or its affiliates. All rights reserved. Amazon

More information

Amazon Simple Notification Service. Developer Guide API Version 2010-03-31

Amazon Simple Notification Service. Developer Guide API Version 2010-03-31 Amazon Simple Notification Service Developer Guide Amazon Simple Notification Service: Developer Guide Copyright 2014 Amazon Web Services, Inc. and/or its affiliates. All rights reserved. The following

More information

Android pay. Frequently asked questions

Android pay. Frequently asked questions Android pay Frequently asked questions June 2015 Android Pay - FAQs In May 2015, Android Pay was announced by Google. Android Pay is Google s payments solution that allows consumers to do in-store and

More information

WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS

WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS WHITEPAPER SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS EXECUTIVE OVERVIEW 2-Factor as a Service (2FaaS) is a 100% cloud-hosted authentication solution that offers flexible security without compromising user

More information

Introduction to Mobile Access Gateway Installation

Introduction to Mobile Access Gateway Installation Introduction to Mobile Access Gateway Installation This document describes the installation process for the Mobile Access Gateway (MAG), which is an enterprise integration component that provides a secure

More information

Login with Amazon. Developer Guide for Websites

Login with Amazon. Developer Guide for Websites Login with Amazon Developer Guide for Websites Copyright 2014 Amazon Services, LLC or its affiliates. All rights reserved. Amazon and the Amazon logo are trademarks of Amazon.com, Inc. or its affiliates.

More information

Department Service Integration with e-pramaan

Department Service Integration with e-pramaan Department Service Integration with e-pramaan How to integrate a PHP Application PHP specific integration details are provided in this document. Read e-pramaan Departments Integration Document before proceeding.

More information

Developer Guide: REST API Applications. SAP Mobile Platform 2.3 SP03

Developer Guide: REST API Applications. SAP Mobile Platform 2.3 SP03 Developer Guide: REST API Applications SAP Mobile Platform 2.3 SP03 DOCUMENT ID: DC01926-01-0233-01 LAST REVISED: September 2013 Copyright 2013 by Sybase, Inc. All rights reserved. This publication pertains

More information

Uila Management and Analytics System Installation and Administration Guide

Uila Management and Analytics System Installation and Administration Guide USER GUIDE Uila Management and Analytics System Installation and Administration Guide October 2015 Version 1.8 Company Information Uila, Inc. 2905 Stender Way, Suite 76E Santa Clara, CA 95054 USER GUIDE

More information

Mobility, Security and Trusted Identities: It s Right In The Palm of Your Hands. Ian Wills Country Manager, Entrust Datacard

Mobility, Security and Trusted Identities: It s Right In The Palm of Your Hands. Ian Wills Country Manager, Entrust Datacard Mobility, Security and Trusted Identities: It s Right In The Palm of Your Hands Ian Wills Country Manager, Entrust Datacard WHO IS ENTRUST DATACARD? 2 Entrust DataCard Datacard Corporation. Corporation.

More information

Centrify Mobile Authentication Services

Centrify Mobile Authentication Services Centrify Mobile Authentication Services SDK Quick Start Guide 7 November 2013 Centrify Corporation Legal notice This document and the software described in this document are furnished under and are subject

More information

Android on Intel Course App Development - Advanced

Android on Intel Course App Development - Advanced Android on Intel Course App Development - Advanced Paul Guermonprez www.intel-software-academic-program.com paul.guermonprez@intel.com Intel Software 2013-02-08 Persistence Preferences Shared preference

More information

TROUBLESHOOTING RSA ACCESS MANAGER SINGLE SIGN-ON FOR WEB-BASED APPLICATIONS

TROUBLESHOOTING RSA ACCESS MANAGER SINGLE SIGN-ON FOR WEB-BASED APPLICATIONS White Paper TROUBLESHOOTING RSA ACCESS MANAGER SINGLE SIGN-ON FOR WEB-BASED APPLICATIONS Abstract This white paper explains how to diagnose and troubleshoot issues in the RSA Access Manager single sign-on

More information

Device-Centric Authentication and WebCrypto

Device-Centric Authentication and WebCrypto Device-Centric Authentication and WebCrypto Dirk Balfanz, Google, balfanz@google.com A Position Paper for the W3C Workshop on Web Cryptography Next Steps Device-Centric Authentication We believe that the

More information

DIGIPASS CertiID. Getting Started 3.1.0

DIGIPASS CertiID. Getting Started 3.1.0 DIGIPASS CertiID Getting Started 3.1.0 Disclaimer Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis, without any other warranties, or conditions, express

More information

SAP Mobile - Webinar Series SAP Mobile Platform 3.0 Security Concepts and Features

SAP Mobile - Webinar Series SAP Mobile Platform 3.0 Security Concepts and Features SAP Mobile - Webinar Series SAP Mobile Platform 3.0 Security Concepts and Features Dirk Olderdissen Solution Expert, Regional Presales EMEA SAP Brought to you by the Customer Experience Group 2014 SAP

More information

Salesforce Mobile Push Notifications Implementation Guide

Salesforce Mobile Push Notifications Implementation Guide Salesforce.com: Summer 14 Salesforce Mobile Push Notifications Implementation Guide Last updated: May 6, 2014 Copyright 2000 2014 salesforce.com, inc. All rights reserved. Salesforce.com is a registered

More information

HTTPS hg clone https://bitbucket.org/dsegna/device plugin library SSH hg clone ssh://hg@bitbucket.org/dsegna/device plugin library

HTTPS hg clone https://bitbucket.org/dsegna/device plugin library SSH hg clone ssh://hg@bitbucket.org/dsegna/device plugin library Contents Introduction... 2 Native Android Library... 2 Development Tools... 2 Downloading the Application... 3 Building the Application... 3 A&D... 4 Polytel... 6 Bluetooth Commands... 8 Fitbit and Withings...

More information

e-filing Secure Web Service User Manual

e-filing Secure Web Service User Manual e-filing Secure Web Service User Manual Page1 CONTENTS 1 BULK ITR... 6 2 BULK PAN VERIFICATION... 9 3 GET ITR-V BY TOKEN NUMBER... 13 4 GET ITR-V BY ACKNOWLEDGMENT NUMBER... 16 5 GET RETURN STATUS... 19

More information

Enabling Single-Sign-On between IBM Cognos 8 BI and IBM WebSphere Portal

Enabling Single-Sign-On between IBM Cognos 8 BI and IBM WebSphere Portal Guideline Enabling Single-Sign-On between IBM Cognos 8 BI and IBM WebSphere Portal Product(s): IBM Cognos 8 BI Area of Interest: Security Copyright Copyright 2008 Cognos ULC (formerly Cognos Incorporated).

More information

IBM Security Access Manager for Enterprise Single Sign-On Version 8.2.1. User Guide IBM SC23-9950-05

IBM Security Access Manager for Enterprise Single Sign-On Version 8.2.1. User Guide IBM SC23-9950-05 IBM Security Access Manager for Enterprise Single Sign-On Version 8.2.1 User Guide IBM SC23-9950-05 IBM Security Access Manager for Enterprise Single Sign-On Version 8.2.1 User Guide IBM SC23-9950-05

More information

Middleware- Driven Mobile Applications

Middleware- Driven Mobile Applications Middleware- Driven Mobile Applications A motwin White Paper When Launching New Mobile Services, Middleware Offers the Fastest, Most Flexible Development Path for Sophisticated Apps 1 Executive Summary

More information

McAfee Cloud Identity Manager

McAfee Cloud Identity Manager SAML2 Cloud Connector Guide McAfee Cloud Identity Manager version 1.2 or later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

AUTHENTIFIERS. Authentify Authentication Factors for Constructing Flexible Multi-Factor Authentication Processes

AUTHENTIFIERS. Authentify Authentication Factors for Constructing Flexible Multi-Factor Authentication Processes AUTHENTIFIERS Authentify Authentication Factors for Constructing Flexible Multi-Factor Authentication Processes Authentify delivers intuitive and consistent authentication technology for use with smartphones,

More information

Meeting Rooms User Manual

Meeting Rooms User Manual Meeting Rooms User Manual Document Identifier: iqmrum Document Statu\Version: Draft\0.0.3 Document Publication Date: 2015.05.12 Template Identifier\Version: iquest Document Template T-1\2.0.0 Table of

More information

Final Year Project Interim Report

Final Year Project Interim Report 2013 Final Year Project Interim Report FYP12016 AirCrypt The Secure File Sharing Platform for Everyone Supervisors: Dr. L.C.K. Hui Dr. H.Y. Chung Students: Fong Chun Sing (2010170994) Leung Sui Lun (2010580058)

More information

Setting up single signon with Zendesk Remote Authentication

Setting up single signon with Zendesk Remote Authentication Setting up single signon with Zendesk Remote Authentication Zendesk Inc. 2 Zendesk Developer Library Introduction Notice Copyright and trademark notice Copyright 2009 2013 Zendesk, Inc. All rights reserved.

More information

IBM Campaign Version-independent Integration with IBM Engage Version 1 Release 3 April 8, 2016. Integration Guide IBM

IBM Campaign Version-independent Integration with IBM Engage Version 1 Release 3 April 8, 2016. Integration Guide IBM IBM Campaign Version-independent Integration with IBM Engage Version 1 Release 3 April 8, 2016 Integration Guide IBM Note Before using this information and the product it supports, read the information

More information

Configuring. Moodle. Chapter 82

Configuring. Moodle. Chapter 82 Chapter 82 Configuring Moodle The following is an overview of the steps required to configure the Moodle Web application for single sign-on (SSO) via SAML. Moodle offers SP-initiated SAML SSO only. 1 Prepare

More information

Windows Azure Pack Installation and Initial Configuration

Windows Azure Pack Installation and Initial Configuration Windows Azure Pack Installation and Initial Configuration Windows Server 2012 R2 Hands-on lab In this lab, you will learn how to install and configure the components of the Windows Azure Pack. To complete

More information

OAuth 2.0 Developers Guide. Ping Identity, Inc. 1001 17th Street, Suite 100, Denver, CO 80202 303.468.2900

OAuth 2.0 Developers Guide. Ping Identity, Inc. 1001 17th Street, Suite 100, Denver, CO 80202 303.468.2900 OAuth 2.0 Developers Guide Ping Identity, Inc. 1001 17th Street, Suite 100, Denver, CO 80202 303.468.2900 Table of Contents Contents TABLE OF CONTENTS... 2 ABOUT THIS DOCUMENT... 3 GETTING STARTED... 4

More information

Introduction to Building Windows Store Apps with Windows Azure Mobile Services

Introduction to Building Windows Store Apps with Windows Azure Mobile Services Introduction to Building Windows Store Apps with Windows Azure Mobile Services Overview In this HOL you will learn how you can leverage Visual Studio 2012 and Windows Azure Mobile Services to add structured

More information

An Oracle White Paper Dec 2013. Oracle Access Management OAuth Service

An Oracle White Paper Dec 2013. Oracle Access Management OAuth Service An Oracle White Paper Dec 2013 Oracle Access Management OAuth Service Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only, and may

More information

Mobile Push Architectures

Mobile Push Architectures Praktikum Mobile und Verteilte Systeme Mobile Push Architectures Prof. Dr. Claudia Linnhoff-Popien Michael Beck, André Ebert http://www.mobile.ifi.lmu.de WS 2015/2016 Asynchronous communications How to

More information

McAfee Cloud Single Sign On

McAfee Cloud Single Sign On Setup Guide Revision B McAfee Cloud Single Sign On COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee

More information

INTEGRATE SALESFORCE.COM SINGLE SIGN-ON WITH THIRD-PARTY SINGLE SIGN-ON USING SENTRY A GUIDE TO SUCCESSFUL USE CASE

INTEGRATE SALESFORCE.COM SINGLE SIGN-ON WITH THIRD-PARTY SINGLE SIGN-ON USING SENTRY A GUIDE TO SUCCESSFUL USE CASE INTEGRATE SALESFORCE.COM SINGLE SIGN-ON WITH THIRD-PARTY SINGLE SIGN-ON USING SENTRY A GUIDE TO SUCCESSFUL USE CASE Legal Marks No portion of this document may be reproduced or copied in any form, or by

More information

NetIQ Advanced Authentication Framework

NetIQ Advanced Authentication Framework NetIQ Advanced Authentication Framework Security Officer Guide Version 5.2.0 1 Table of Contents 1 Table of Contents 2 Introduction 3 About This Document 3 Authenticators Management 4 Card 8 Email OTP

More information

MiniPOS and BluePad-50 user manual

MiniPOS and BluePad-50 user manual MiniPOS and BluePad-50 user manual Welcome to MiniPOS application for mobile and card payments! +386 (30) 70 4444 +386 (30) 70 5555 sales@intech.si www.paywiser.si Slovenska ulica 54 Ljubljana, Slovenija

More information

ADFS Integration Guidelines

ADFS Integration Guidelines ADFS Integration Guidelines Version 1.6 updated March 13 th 2014 Table of contents About This Guide 3 Requirements 3 Part 1 Configure Marcombox in the ADFS Environment 4 Part 2 Add Relying Party in ADFS

More information

CA Performance Center

CA Performance Center CA Performance Center Single Sign-On User Guide 2.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is

More information

Installation and Administration Guide

Installation and Administration Guide Installation and Administration Guide BlackBerry Enterprise Transporter for BlackBerry Enterprise Service 12 Version 12.0 Published: 2014-11-06 SWD-20141106165936643 Contents What is BES12?... 6 Key features

More information

PHP Integration Kit. Version 2.5.1. User Guide

PHP Integration Kit. Version 2.5.1. User Guide PHP Integration Kit Version 2.5.1 User Guide 2012 Ping Identity Corporation. All rights reserved. PingFederate PHP Integration Kit User Guide Version 2.5.1 December, 2012 Ping Identity Corporation 1001

More information

ACI TOKEN MANAGER FOR MOBILE: TOKEN SERVICE PROVISION, HCE AND EMBEDDED SECURE ELEMENT IN THE CLOUD

ACI TOKEN MANAGER FOR MOBILE: TOKEN SERVICE PROVISION, HCE AND EMBEDDED SECURE ELEMENT IN THE CLOUD DELIVERS PEACE OF MIND PRODUCT FLYER ACI TOKEN MANAGER FOR MOBILE: TOKEN SERVICE PROVISION, HCE AND EMBEDDED SECURE ELEMENT IN THE CLOUD ENABLE FULL SUPPORT OF THE MOBILE PAYMENTS PROCESS FOR EMBEDDED

More information

Tutorial: BlackBerry Object API Application Development. Sybase Unwired Platform 2.2 SP04

Tutorial: BlackBerry Object API Application Development. Sybase Unwired Platform 2.2 SP04 Tutorial: BlackBerry Object API Application Development Sybase Unwired Platform 2.2 SP04 DOCUMENT ID: DC01214-01-0224-01 LAST REVISED: May 2013 Copyright 2013 by Sybase, Inc. All rights reserved. This

More information

HOTPin Integration Guide: Google Apps with Active Directory Federated Services

HOTPin Integration Guide: Google Apps with Active Directory Federated Services HOTPin Integration Guide: Google Apps with Active Directory Federated Services Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as

More information

NetIQ Advanced Authentication Framework - Smartphone Applications

NetIQ Advanced Authentication Framework - Smartphone Applications NetIQ Advanced Authentication Framework - Smartphone Applications User Guide Version 3.0 1 Table of Contents 1 Table of Contents 2 Introduction 3 About This Document 3 System Requirements 4 Install Smartphone

More information

No Trade Secrets. Microsoft does not claim any trade secret rights in this documentation.

No Trade Secrets. Microsoft does not claim any trade secret rights in this documentation. [MS-SPWFCSOM]: Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation. Microsoft publishes Open Specifications documentation for protocols, file formats, languages,

More information

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android GO!Enterprise MDM for Android, Version 3.x GO!Enterprise MDM for Android 1 Table of Contents GO!Enterprise MDM

More information

SafeNet Authentication Service

SafeNet Authentication Service SafeNet Authentication Service Push OTP Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have

More information

Setup Guide Access Manager 3.2 SP3

Setup Guide Access Manager 3.2 SP3 Setup Guide Access Manager 3.2 SP3 August 2014 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE

More information

How To Use Salesforce Identity Features

How To Use Salesforce Identity Features Identity Implementation Guide Version 35.0, Winter 16 @salesforcedocs Last updated: October 27, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of

More information

CA Nimsoft Service Desk

CA Nimsoft Service Desk CA Nimsoft Service Desk Single Sign-On Configuration Guide 6.2.6 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation

More information

HOTPin Integration Guide: DirectAccess

HOTPin Integration Guide: DirectAccess 1 HOTPin Integration Guide: DirectAccess Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is'; Celestix assumes no responsibility

More information

Enabling SSO between Cognos 8 and WebSphere Portal

Enabling SSO between Cognos 8 and WebSphere Portal Guideline Enabling SSO between Cognos 8 and WebSphere Portal Product(s): Cognos 8 Area of Interest: Security Enabling SSO between Cognos 8 and WebSphere Portal 2 Copyright Your use of this document is

More information

Developing Microsoft Azure Solutions 20532A; 5 days

Developing Microsoft Azure Solutions 20532A; 5 days Lincoln Land Community College Capital City Training Center 130 West Mason Springfield, IL 62702 217-782-7436 www.llcc.edu/cctc Developing Microsoft Azure Solutions 20532A; 5 days Course Description This

More information

IBM Watson Ecosystem. Getting Started Guide

IBM Watson Ecosystem. Getting Started Guide IBM Watson Ecosystem Getting Started Guide Version 1.1 July 2014 1 Table of Contents: I. Prefix Overview II. Getting Started A. Prerequisite Learning III. Watson Experience Manager A. Assign User Roles

More information

Introduction to the EIS Guide

Introduction to the EIS Guide Introduction to the EIS Guide The AirWatch Enterprise Integration Service (EIS) provides organizations the ability to securely integrate with back-end enterprise systems from either the AirWatch SaaS environment

More information

NetIQ Access Manager. Developer Kit 3.2. May 2012

NetIQ Access Manager. Developer Kit 3.2. May 2012 NetIQ Access Manager Developer Kit 3.2 May 2012 Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE AGREEMENT OR A NON DISCLOSURE

More information

Entrust IdentityGuard

Entrust IdentityGuard +1-888-437-9783 sales@identisys.com IdentiSys.com Distributed by: Entrust IdentityGuard is an award-winning software-based authentication enterprises and governments. The solution serves as an organization's

More information

Flowpack Single sign-on Server Documentation

Flowpack Single sign-on Server Documentation Flowpack Single sign-on Server Documentation Release 1.0.0 Author name(s) August 21, 2013 CONTENTS 1 Contents 3 1.1 Overview................................................. 3 1.2 Getting started..............................................

More information

This chapter describes how to use the Junos Pulse Secure Access Service in a SAML single sign-on deployment. It includes the following sections:

This chapter describes how to use the Junos Pulse Secure Access Service in a SAML single sign-on deployment. It includes the following sections: CHAPTER 1 SAML Single Sign-On This chapter describes how to use the Junos Pulse Secure Access Service in a SAML single sign-on deployment. It includes the following sections: Junos Pulse Secure Access

More information

bbc Developing Service Providers Adobe Flash Media Rights Management Server November 2008 Version 1.5

bbc Developing Service Providers Adobe Flash Media Rights Management Server November 2008 Version 1.5 bbc Developing Service Providers Adobe Flash Media Rights Management Server November 2008 Version 1.5 2008 Adobe Systems Incorporated. All rights reserved. Adobe Flash Media Rights Management Server 1.5

More information

SAP NetWeaver Fiori. For more information, see "Creating and enabling a trusted provider for Centrify" on page 108-10.

SAP NetWeaver Fiori. For more information, see Creating and enabling a trusted provider for Centrify on page 108-10. Chapter 108 Configuring SAP NetWeaver Fiori The following is an overview of the steps required to configure the SAP NetWeaver Fiori Web application for single sign-on (SSO) via SAML. SAP NetWeaver Fiori

More information

Configuration Guide. BES12 Cloud

Configuration Guide. BES12 Cloud Configuration Guide BES12 Cloud Published: 2016-04-08 SWD-20160408113328879 Contents About this guide... 6 Getting started... 7 Configuring BES12 for the first time...7 Administrator permissions you need

More information

No Trade Secrets. Microsoft does not claim any trade secret rights in this documentation.

No Trade Secrets. Microsoft does not claim any trade secret rights in this documentation. [MS-EDCSOM]: Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation. Microsoft publishes Open Specifications documentation for protocols, file formats, languages,

More information

www.novell.com/documentation Policy Guide Access Manager 3.1 SP5 January 2013

www.novell.com/documentation Policy Guide Access Manager 3.1 SP5 January 2013 www.novell.com/documentation Policy Guide Access Manager 3.1 SP5 January 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this documentation,

More information

SAP NetWeaver AS Java

SAP NetWeaver AS Java Chapter 75 Configuring SAP NetWeaver AS Java SAP NetWeaver Application Server ("AS") Java (Stack) is one of the two installation options of SAP NetWeaver AS. The other option is the ABAP Stack, which is

More information

DigitalPersona, Inc. Altus AUTH SDK. Version 1.1. Developer Guide

DigitalPersona, Inc. Altus AUTH SDK. Version 1.1. Developer Guide DigitalPersona, Inc. Altus AUTH SDK Version 1.1 Developer Guide DigitalPersona, Inc. 2012-2014 DigitalPersona, Inc. All Rights Reserved. All intellectual property rights in the DigitalPersona software,

More information

APPFORUM2014. Helping the developer community build next-generation, multi-platform apps. SCHAUMBURG, ILLINOIS SEPTEMBER 8-10

APPFORUM2014. Helping the developer community build next-generation, multi-platform apps. SCHAUMBURG, ILLINOIS SEPTEMBER 8-10 APPFORUM2014 Helping the developer community build next-generation, multi-platform apps. SCHAUMBURG, ILLINOIS SEPTEMBER 8-10 NFC OVERVIEW Chuck Bolen Chief Architect Enterprise Mobile Computing APPFORUM2014

More information

Leverage Your EMC Storage Investment with User Provisioning for Syncplicity:

Leverage Your EMC Storage Investment with User Provisioning for Syncplicity: Leverage Your EMC Storage Investment with User Provisioning for Syncplicity: Automate and simplify Syncplicity user/group management tasks EMC Global Solutions Abstract Make the most of your existing EMC

More information

How To Integrate An Ipm With Airwatch With Big Ip On A Server With A Network (F5) On A Network With A Pb (Fiv) On An Ip Server On A Cloud (Fv) On Your Computer Or Ip

How To Integrate An Ipm With Airwatch With Big Ip On A Server With A Network (F5) On A Network With A Pb (Fiv) On An Ip Server On A Cloud (Fv) On Your Computer Or Ip F5 Networks, Inc. F5 Recommended Practices for BIG-IP and AirWatch MDM Integration Contents Introduction 4 Purpose 5 Requirements 6 Prerequisites 6 AirWatch 6 F5 BIG-IP 6 Network Topology 7 Big-IP Configuration

More information

CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module MaaS360 Version 1.0.1. ForeScout Mobile

CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module MaaS360 Version 1.0.1. ForeScout Mobile CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module Version 1.0.1 ForeScout Mobile Table of Contents About the Integration... 3 ForeScout MDM... 3 Additional Documentation...

More information

IBM SPSS Collaboration and Deployment Services Version 6 Release 0. Single Sign-On Services Developer's Guide

IBM SPSS Collaboration and Deployment Services Version 6 Release 0. Single Sign-On Services Developer's Guide IBM SPSS Collaboration and Deployment Services Version 6 Release 0 Single Sign-On Services Developer's Guide Note Before using this information and the product it supports, read the information in Notices

More information

EMV-TT. Now available on Android. White Paper by

EMV-TT. Now available on Android. White Paper by EMV-TT A virtualised payment system with the following benefits: MNO and TSM independence Full EMV terminal and backend compliance Scheme agnostic (MasterCard and VISA supported) Supports transactions

More information

Amazon Glacier. Developer Guide API Version 2012-06-01

Amazon Glacier. Developer Guide API Version 2012-06-01 Amazon Glacier Developer Guide Amazon Glacier: Developer Guide Copyright 2016 Amazon Web Services, Inc. and/or its affiliates. All rights reserved. Amazon's trademarks and trade dress may not be used in

More information