DEP RSA Key Loading Program User Manual
|
|
|
- Dennis Lawrence
- 10 years ago
- Views:
Transcription
1 Technologies & Products Haachtsesteenweg Brussels Belgium DEP Documentation DEP RSA Key Loading Program User Manual Version: 03.04
2 banksys - Technologies & Products Page: 2/45 Version Management Report Version Name(s) Date Comments Paul Stiénon 15/02/2002 First Draft Paul Stiénon 25/02/2002 Second draft Paul Stiénon 19/09/2002 Verification Certificates/ new RSA Key Filip Demaertelaere 27/02/2003 Documentation Platform Independent Paul Stiénon 15/09/2003 Add of 3DSecure Pkcs10 Certificate Request Sam Yala 18/09/2003 Add Annex D New screen captures Changes in section 4 and in section Paul STIENON 24/05/2005 More details in order of commands for self sign certificates Paul STIENON 03/04/2006 New disclaimer
3 banksys - Technologies & Products Page: 3/45 CONFIDENTIALITY The information in this document is confidential and shall not be disclosed to any third party in whole or in part without the prior written consent of Banksys S.A./N.V. COPYRIGHT The information in this document is subject to change without notice and shall not be construed as a commitment by Banksys S.A./N.V. The content of this document, including but not limited to trademarks, designs, logos, text, images, is the property of Banksys S.A/N.V. and is protected by the Belgian Act of related to author s right and by the other applicable Acts. The contents of this document must not be reproduced in any form whatsoever, by or on behalf of third parties, without the prior written consent of Banksys S.A./N.V. Except with respect to the limited license to download and print certain material from this document for non-commercial and personal use only, nothing contained in this document shall grant any license or right to use any of Banksys S.A./N.V. s proprietary material. LEGAL DISCLAIMER While Banksys S.A./N.V. has made every attempt to ensure that the information contained in this document is correct, Banksys S.A./N.V. does not provide any legal or commercial warranty on the document that is described in this specification. The technology is thus provided as is without warranties of any kind, expressed or implied, included those of merchantability and fitness for a particular purpose. Banksys S.A./N.V. does not warrant or assume any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, product or process disclosed. To the fullest extent permitted under applicable law, neither Banksys S.A./N.V. nor its affiliates, directors, employees and agents shall be liable to any party for any damages that might result from the use of the technology as described in this document (including without limitation direct, indirect, incidental, special, consequential and punitive damages, lost profits). JURISDICTION AND APPLICABLE LAW These terms shall be governed by and construed in accordance with the laws of Belgium. You irrevocably consent to the jurisdiction of the courts located in Brussels for any action arising from or related to the use of this document. sa Banksys nv Chaussée de Haecht 1442 Haachtsesteenweg B-1130 Bruxelles-Brussel - Belgium RPM-RPR Bruxelles-Brussel - TVA-BTW BE
4 banksys - Technologies & Products Page: 4/45 1. TABLE OF CONTENTS 1. TABLE OF CONTENTS SCOPE OF THE DOCUMENT REFERENCES PURPOSE OF DEP RSA KEY LOADING PROGRAM GENERAL PARAMETERS START-UP SERVICE COMMUNICATION DEP Modules/Protocol Communication Status MEMO Clear Memo Save Memo To File TOOLS Visualize Hash & Request Files Check Certificates HELP OPERATIONS GENERATE RSA KEY OPERATION Size of Modulus in Bits Public Exponent Running the Generate RSA key Operation IMPORT RSA KEY OPERATION Definition of the RSA Key File Running the RSA Key Import PUT RSA KEY INTO THE KEY TABLE OPERATION Definition of the Key Destination Tag Running the Put RSA Key Into The Key Table Operation EXPORT RSA KEY Directory Path GENERATE CERTIFICATE REQUESTS BASED ON SELF-SIGNED CERTIFICATES (SSC) Choosing a CA Certifier Filling the Values in the Grid Defining the Target file name Generating the Certificate Request based on SSC Generating PKCS #10 Certificates Generating EMV Certificates RUNNING ALL IN ONCE... 31
5 banksys - Technologies & Products Page: 5/45 7. TROUBLESHOOTING PARAMETERS NOT/NOT WELL DEFINED PROBLEM OF CONNECTION MISSING KEY/CAPABILITY ANNEX A: CA_CERTIFIER.INI FILE ANNEX B: SAVING OF A MEMO ANNEX C: INSTALLATION PROCEDURE WELCOME USER INFORMATION CHOOSE DESTINATION LOCATION SELECT PROGRAM FOLDER START COPYING FILES INSTALLING SET-UP COMPLETE ANNEX D: REMARKS ON THE DATA USED FOR DEFINING THE CERTIFICATE REQUEST REFERENCES CA TARGET = EUROPAY CA TARGET= VISA CA TARGET=3DSECURE... 45
6 banksys - Technologies & Products Page: 6/45 2. SCOPE OF THE DOCUMENT This document describes the DEP RSA Key Loading Program. This PC program can be used to generate RSA keys, to import them from files, to export them into files and to put them into the key table of the DEP Crypto Module. The program also allows generating EMV and PKCS#10 public key certificate requests based on the certificate s requester Self-Signed Certificate (SSC). This program can also read and check EMV certificates files. The document does explain neither the functionalities of the PKI library (most of the DEP functionality used by this program is based on the PKI library) nor the detailed specific data that must be given in order to get the SSC. 3. REFERENCES This document contains references to other documents about the DEP. This paragraph gives a list of all the documents referred to. DEP Host Interface Protocol DEP/NT DEP Handler Supervision Program User Manual DEP/Linux User Manual There are no references made to the following documents, but they could be useful to understand this document. PKI Library for DEP - Reference DFS Manual DEP Introduction to DEP DEP General Architecture DEP Glossary 4. PURPOSE OF DEP RSA KEY LOADING PROGRAM The main purpose of this program is to make the DEP generating an RSA key or importing such a key from an external file, and to use that key for the following purposes: - Put the RSA key in the key table of the DEP crypto module - Export the RSA key on files - Generate EMV and PKCS#10 certificate requests. These certificates are based on self-signed public key certificates. In addition, the program provides some other facilities for managing public key certificates.
7 banksys - Technologies & Products Page: 7/45 Generate Import Generate Certificate Request RSA Key Buffer Put in Key Table Export Purpose of the program The program is intended to be used on a DEP/NT that can generate RSA keys (configuration 1) or on a PC that is connected to a DEP Platform that can generate RSA keys (configuration 2). DEP RSA Key Loading Program Program A Module i DEP/NT Configuration 1: the program is running on the DEP/NT itself.
8 banksys - Technologies & Products Page: 8/45 DEP RSA Key Loading Program Host PC Module i DEP Platform Configuration 2: the program is running on a Pc that is connected to the DEP Platform. 5. GENERAL PARAMETERS The installation procedure is reported in paragraph 10 on page START-UP The DEP RSA Key Loading Program could be launched by executing: C:\Depnt\Tools\RSA KEY LOADING\RSAKEYLOADING.exe This is the default path. Possibly another path could be defined during the installation (paragraph 10 on page 36). Once the DEP RSA Key Loading Program is started, a dedicated RSA KEY LOADING window is opened.
9 banksys - Technologies & Products Page: 9/45 In this window, the user can find: a memo (blank part) which will log the operations and their results a menu at the top of the window, that allows to define communication, operate on the memo, have a look at the program version or to exit a Select Operation(s) panel which defines all the possible operations that can be done: generation or import, put in key table, get SSC, another panel named Parameters that allows the definition of the needed parameters for the preceding operations and execute them (through the use of the Previous/Next and Go! Buttons) 5.2. SERVICE Use the Exit in order to exit of the application.
10 banksys - Technologies & Products Page: 10/45 A Confirmation window is displayed, click YES to exit COMMUNICATION Click on Communication and select Define Communication in the menu, to define all the communication properties that are necessary to communicate with the DEP Crypto Module(s) of the DEP Platform that will be connected to this program. A Communication window appears DEP Modules/Protocol The used protocol is the Enhanced DEP Protocol (for more information, refer to the DEP Host Interface Protocol Manual). Select Pool if the DEP Crypto Modules you want to use are working in Pool, otherwise you select a specific DEP Crypto Module. Define also the DEP Magic Number and the DEP Version Number. The standard
11 banksys - Technologies & Products Page: 11/45 values are shown in default Communication The user must select either the DEP TCP Address or the DEP TCP Name of the DEP Platform that will communicate in TCP/IP with the DEP RSA Key Loading Program. The DEP TCP Port and the Time Out of this DEP Platform must also be defined. Please note that this time out must be a little bigger than the one that is defined on the DEP Platform (see DEP/NT DEP Handler Supervision Program User Manual or DEP/Linux User Manual for more details). Be aware that the generation of RSA keys could take some time. Therefore it is required that the timeout on the DEP Platform is high enough (three minutes seems a good value) Status The value Maximum Number Of Try defines the maximum number of time an action with a bad response will be repeated (bad or closed TCP/IP connection, DEP Crypto Module offline, missing capability for a DEP Crypto Module ). When this value is reached, the program stops all the operations MEMO Selecting Memo in the menu allows the user to realize actions on the memo (i.e. the large white band with/without text).
12 banksys - Technologies & Products Page: 12/ Clear Memo The effect of this is the clearing of the text of the memo. Remember that this memo will contain information on the evolution of all the selected operations Save Memo To File A Save Memo As window appears when the user clicks on the Save Memo To File item of the menu. First specify the directory then the file where the text of the memo should be saved, then click on the SAVE button to confirm the selection. An example of file that contains the content of the memo is given in paragraph 9 on page TOOLS If the user clicks on the Tools item of the menu, he/she can select the operation on the certificate files he/she is going to realize: either reading an EMV certificate file, certificate hash file or certificate request file (without any check), either checking a list of EMV certificate files (Issuer request file, CA public key file, CA certificate file, CA hash file).
13 banksys - Technologies & Products Page: 13/ Visualize Hash & Request Files Once the user selects the Visualize Hash & Request Files item of the Tools menu, an Open window appears, whose filter is automatically adapted from the CA_CERTIFIER.INI file in order to look for hash and request files. As soon as the user has chosen his/her file, the Open windows closes and the content of the selected file appears in the memo. In this phase, no check is realized during the reading of the files.
14 banksys - Technologies & Products Page: 14/ Check Certificates With this operation, the user will not only read the content of the certificates files but can also realize a crosscheck between these files. The selection of the Check Certificates item of the Tool menu leads to the appearance of a Check Certificate window that allows the selection of several certificate files. To choose one of the files, the user must click on one of the BROWSE button; this leads to the appearance of an Open window with a filter on the possible extensions of the corresponding files (coming from the CA_CERTIFIER.INI file).
15 banksys - Technologies & Products Page: 15/45 The user has to select the files for the first three fields, the last one (CA hash file is optional) in order to allow the crosscheck between different files. The operation is launched while clicking on the CHECK button. The success or not of the check is shown with the buttons V or X at the right of the BROWSE buttons.
16 banksys - Technologies & Products Page: 16/45 In order to have a look at the results, the user have to close the Check Certificate window.
17 banksys - Technologies & Products Page: 17/45 When an error is found, a warning is given and the process of checking certificate files is stopped. The user can save this information of the memo in a file using the Save to File item of the Memo menu. Pay attention that this type of crosscheck is not available for all type of certificate requests HELP When clicking on the About RSA KEY LOADING item of the Help in the menu, an About window appears with information on the DEP RSA Key Loading Program (version ) and on the system using it.
18 banksys - Technologies & Products Page: 18/45 6. OPERATIONS There are two basic operations: 1. Generate RSA Key (Generation radio button) 2. Import RSA Key (Import radio button) Besides these basic operations, three associated operations (also called functions) are defined: a. Put RSA Key Into The Key Table (Put In Key Table checkbox) b. Generate Certificate Requests (Self Signed Certificates checkbox) c. Export RSA Key (Export checkbox) To obtain a useful functionality, one must combine a basic operation with at least one associated operation. This is explained in the next sections.
19 banksys - Technologies & Products Page: 19/ GENERATE RSA KEY OPERATION The user must select the radio button Generation in order to set the size of the modulus and the public exponent value needed for this operation Size of Modulus in Bits Here, the user must give the length in bits of the modulus he/she wants to create (decimal value). For the modulus, the minimum size is 512 bits and the maximum size is 2048 bits Public Exponent Here, the user must give the Public Exponent he/she wants to use for the generation of RSA keys (uneven decimal value between 3 and 65537) Running the Generate RSA key Operation
20 banksys - Technologies & Products Page: 20/45 Generating an RSA key pair is completely useless unless it is combined with at least one of the following associated operations (functions) a. Put RSA Key Into The Key Table b. Generate certificate requests. In this case, only the option EMV (Visa or Europay) certificate request is applicable. c. Export RSA key. These associated operations are explained in the next sections. Once the operation and the associated operation(s) are selected and the corresponding fields are filled, the user can click on the GO! button IMPORT RSA KEY OPERATION The Import RSA Key operation allows the DEP getting the RSA key that is written in an.rsa file. The radio button Import allows selecting this operation.
21 banksys - Technologies & Products Page: 21/ Definition of the RSA Key File The definition of the name of the RSA key file can be done either by writing it into the Edit box or by clicking on the button BROWSE. In this case, an Open window appears that allows the browsing along the files and directories. The user must confirm his/her selection by clicking on the OPEN button Running the RSA Key Import Importing an RSA key pair is completely useless unless it is combined with at least one of the following associated operations a. Put RSA Key Into The Key Table b. Generate Certificate Request. These associated operations are explained in the next sections. Once the operation and the associated operation(s) are selected and the corresponding fields are correctly filled, the user can click on the GO! button. Information on the evolution of the import is given in the memo (name of the RSA key file, version and date of this file, clear modulus and public key, encrypted part). Note that when an import has been done, the Edit box with the name of the imported file is erased PUT RSA KEY INTO THE KEY TABLE OPERATION The activation of the Put RSA Key Into The Key Table operation is done as follows: the user must select the checkbox Put In Key Table. Immediately, the Parameters panel adjusts itself in order to present the data for this function.
22 banksys - Technologies & Products Page: 22/ Definition of the Key Destination Tag In order to properly define the data necessary for the different operations, the user must click on the PREVIOUS and NEXT buttons, which allow the move through all windows defining parameters. In this case, a panel appears with the capability of defining the identification tag for the RSA key pair. This tag should correspond to an RSA registered key in the key table of the DEP Crypto Module. Please note that an empty Tag means that this RSA key pair will not be put into the key table of the DEP Crypto Module Running the Put RSA Key Into The Key Table Operation As an associated operation, this operation must be combined with the Generate RSA Key operation (generation radio button selected) or with Import RSA Key operation (import radio button selected). By clicking on the PREVIOUS/NEXT
23 banksys - Technologies & Products Page: 23/45 buttons, the user can define/redefine the parameters necessary for the associated operation and the basic operation. Then the user can click on the GO! button in order to execute the selected operations (the basic operation and the associated operation). Again some information on the whole process is given in the memo. The user can see that the PREVIOUS/NEXT buttons are disabled when he/she is defining the first/last operation EXPORT RSA KEY When selecting the Export RSA Key operation (Checkbox Export), the user can have a copy of the generated RSA key pair into files: one.rsa file and one.pub file The.RSA file contains the RSA key pair, where the public part of the key is recorded in clear, and the secret part of the key is recorded encrypted. The.PUB file only contains the public part of the key, in clear. Export RSA Key is an associated operation. Hence, it must be selected in combination with the Generate RSA Key operation.
24 banksys - Technologies & Products Page: 24/ Directory Path The user must select a directory to store the RSA keys that will be generated by the DEP Crypto Module, he/she can do that: either by choosing a complete path and writing it into the Edit box or selecting one by clicking on the BROWSE button. In this case a Select Directory window will appear. Click on the OK button to confirm the choice of the selected directory.
25 banksys - Technologies & Products Page: 25/45 In the memo, the user can find the public part of the generated RSA keys (length of Modulus in Bits, Modulus, Public Exponent) and the name of the generated files *.RSA and *.PUB. These two files have the structure of windows.ini files. Here is an example of an.rsa file: [Infos] Version=01 Datim=18/02/ :58:20 [Crypto] nlen=1024 n=a4d360ca19b98b9ba05c32e a791960afed19073aa0d014b8ea79676a9b9862b70f716bce E89DE189D8B79BAD457E48CDD2B44B634B97334E C05D9DAB19C525CFB850CC71A45E2F8A891 62DCF903D1E3628A9CE2D0AE123FB1075FB6913C9A07AA0C D9DBD2DF1CA0220BF925EAF0602CB e=65537 enckey=028f f8109fe9359f15ab63b2cd90f349e0a9af e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he meanings of the different fields are: Version: version of the file structure of the.rsa and.pub files Datim: date and time of creation of the file Nlen: length in bits of the modulus N: modulus
26 banksys - Technologies & Products Page: 26/45 E: public exponent Enckey: secret part of the key encrypted with the transport key. This is an example of the corresponding.pub file with the public part only: [Infos] Version=01 Datim=18/02/ :58:20 [Crypto] nlen=1024 n=a4d360ca19b98b9ba05c32e a791960afed19073aa0d014b8ea79676a9b9862b70f716bce E89DE189D8B79BAD457E48CDD2B44B634B97334E C05D9DAB19C525CFB850CC71A45E2F8A891 62DCF903D1E3628A9CE2D0AE123FB1075FB6913C9A07AA0C D9DBD2DF1CA0220BF925EAF0602CB e= GENERATE CERTIFICATE REQUESTS BASED ON SELF-SIGNED CERTIFICATES (SSC) In this case, the user must activate the checkbox Self Signed Certificates. Immediately, the Parameters panel adjusts its content to show the data needed for the get SSC operation.
27 banksys - Technologies & Products Page: 27/ Choosing a CA Certifier Selecting the CA Certifier in the scroll box CA Target automatically adjust the panel in order to show the necessary data to get the certificate requests files for that CA Certifier. Only the second column ( Value ) can be modified with a given value, the two other columns ( Field and Length (in bytes) ) are not to modify. With the version of the program, three values are defined for CA Target: 1. EUROPAY: Selecting this value allows generating an EMV Certificate Request to submit to EUROPAY according to the following specifications: 2. VISA - EUROPAY, Registration Authority (RA) Interface Specification, version 2.1, November EUROPAY, Registration Authority (RA), member Procedures, version 5.3, November Selecting this value allows generating an EMV Certificate Request to submit to VISA according to the following specification: - VISA, Visa CA User s Guide, version 2.1, 31 March 2001.
28 banksys - Technologies & Products Page: 28/ DSecure Selecting this value allows generating a PKCS#10 Certificate Request to submit to VISA within the framework of 3-D Secure protocol, according to the following specification: - VISA, 3-D Secure Certificates. Certificate Request Process for Protocol 1.0.1, Member Version 1.2.5, June 24, The number of CA Certifiers and their corresponding fields (name, length ) are defined in an.ini file (CA_Certifier.INI) that is delivered by banksys. It must be present in the same directory than the DEP RSA Key Loading Program. The user can have a look at an example of such a file in the paragraph 8 on page Filling the Values in the Grid The user must fill the grid to define the necessary parameters to get the certificate request files. Please note that the DEP RSA Key Loading Program does not verify these fields, it only verifies the lengths of all the values. A null value in the length column means no check is performed on the length of the corresponding field. The meaning of the fields in the panel is given in ANNEX D: remarks on the data used for defining the Certificate request.
29 banksys - Technologies & Products Page: 29/45 When a field is optional and no value is entered, the corresponding information is not sent to the DEP Platform (i.e. Common Name for the 3Dsecure certificate) Defining the Target file name The result of Generate Certificates operation consists in one or more files. Files that are created are named filename.ext, where filename is the name indicated as Target Filename (if an extension is present, it will be ignored). The program, depending on the CA Certifier indicated in CA Target, automatically adds the correct extension ext (see paragraph 8 on page 34) for each created file. Indicating the name of the file in Target Filename can be done either by giving it explicitly or by clicking on the BROWSE button. A confirmation must be done to activate the selection. If no directory is specified in the field of the Target Filename, the default directory where the DEP RSA Key Loading Program is will be used.
30 banksys - Technologies & Products Page: 30/ Generating the Certificate Request based on SSC The user must click on the GO! button to launch the operation. Remember that it is not a stand-alone operation: it must be associated with Generate RSA key operation or Import RSA key operation Generating PKCS #10 Certificates The generation of this type of certificate can only be done in 2 steps, because the input data needed for the generation of the PKCS #10 certificate need public parts of the newly generated RSA key: First step: Generate operation (i.e. Generate radio button) and Export operation (i.e. Export radio button), Final step: Import RSA Key operation (i.e. Import radio button) and Generate Certificates (i.e. Self Signed Certificates checkbox) Generating EMV Certificates For the generation of EMV Certificates (i.e. CA Target = EUROPAY or VISA), two options exist: A simultaneous selection of - Generate RSA Key operation (i.e. Generation radio button) - Generate Certificates (i.e. Self Signed Certificates checkbox) Or a simultaneous selection of - Import RSA Key operation (i.e. Import radio button)
31 banksys - Technologies & Products Page: 31/45 - Generate Certificates (i.e. Self Signed Certificates checkbox) A summary of the process is given in the memo RUNNING ALL IN ONCE The program also allows selecting one operation and all the three associated operations
32 banksys - Technologies & Products Page: 32/45 Please note that it is only allowed for EMV certificates. 7. TROUBLESHOOTING In this chapter we show some of the troubleshooting that can occur when using the DEP RSA Key Loading Program PARAMETERS NOT/NOT WELL DEFINED For example, when the user does not enter the TCP/IP address of the DEP Platform but nevertheless clicks on the GO! button, an information window appears. In this case, one must click on the OK button, define correctly the needed parameters
33 banksys - Technologies & Products Page: 33/45 and launch again the operation. When an error occurs, the current operation is stopped and the whole process ends. Some verification on parameters is also realized : e.g. when trying to get the SSC and the fields do not have the good length, an error is generated. Here the import has been realized but the operation of getting the SSC has aborted. The user must correct the data and launch the process again PROBLEM OF CONNECTION If there is a problem with the connection, or with the answer of the DEP Platform to a message, some information is reported in the memo. Usually, when a problem occurs, the DEP RSA Key Loading Program will try several times to do its current action before eventually stopping (see paragraph on page 11).
34 banksys - Technologies & Products Page: 34/ MISSING KEY/CAPABILITY In order to use the interfaces of the library PKI, the user must not forget to introduce the transport key into the key table of the DEP Crypto Module and to activate the required capability to insert a generated RSA key pair in the key table (see PKI Library for DEP - Reference DFS Manual). 8. ANNEX A: CA_CERTIFIER.INI FILE The content of the file is as follows: [NbCertifier] Nb=3 [Certifier_1] name=europay NbField=4 Extension_hash=.hip Extension_selfcertisspk=.sip Extension_CAPublic=.sep Extension_CACertificate=.CFE Extension_CAhash=.hep CA_Target=01 Field_1=ID of Certificate Issuer Length_1=4 Tag_1=81 Field_2=Certificate Expiry Date
35 banksys - Technologies & Products Page: 35/45 Length_2=2 Tag_2=82 Field_3=Certificate Serial Number Length_3=3 Tag_3=84 Field_4=Issuer Public Key Index Length_4=3 Tag_4=83 [Certifier_2] name=visa NbField=4 Extension_hash=.vis Extension_selfcertisspk=.inp Extension_CAPublic=.v* Extension_CACertificate=.i* Extension_CAhash=.* CA_Target=02 Field_1=Service Identifier Length_1=4 Tag_1=94 Field_2=Issuer Identification Number Length_2=4 Tag_2=91 Field_3=Certificate Expiry Date Length_3=2 Tag_3=92 Field_4=Tracking Number Length_4=3 Tag_4=93 [Certifier_3] name=3dsecure NbField=9 Extension_hash=.* Extension_selfcertisspk=*.bin;*.b64 Extension_CAPublic=.* Extension_CACertificate=.* Extension_CAhash=.* Extension_SELFPKCS10=.bin;.b64 CA_Target=03 Field_1=Hash Algo ID Length_1=1 Tag_1=67 Field_2=Version Length_2=1 Tag_2=67 Field_3=Signature Algo MaxLength_3=2 Length_3=1 Tag_3=69 Field_4=Country Name Length_4=0 Tag_4=69 Field_5=Organization Name MaxLength_5=64 Length_5=0 Tag_5=69 Field_6=Organizational Unit Name MaxLength_6=64 Length_6=0 Tag_6=69 Field_7=Locality Name MaxLength_7=64 Length_7=0 Tag_7=69 Field_8=State/Province MaxLength_8=128 Length_8=0 Tag_8=69 Field_9=Common Name MaxLength_9=64 Length_9=0 Tag_9=69
36 banksys - Technologies & Products Page: 36/45 The meanings of the different fields are: Nb: number of certifier authorities Name: name of the certifier number x Nbfield: number of field for SSC for certifier number x Extension_hash: extension of the file for will contain the hash of the Issuer Extension_selfcertisspk: extension of the file that will contain the SSC of the Issuer Extension_CAPublic : extension of the Public Key File coming from the CA Extension_CACertificate : extension of the certificate that comes from the CA Extension_CAHash : extension of the hash file coming back from the CA Extension_SELFPKCS10 : extensions for the PKCS10 self signed certificate request CA_Target: sequence number of the CA Field_y: signification of field y of certifier x Length_y: length of field y of certifier x Tag_y: internal tag of field y of certifier x 9. ANNEX B: SAVING OF A MEMO This is an example of file that contains the information that was given in the memo: ================================================== Generation + Put In Key Table One Tag + Self Signed Certificates + Export : started... Size of modulus in bits used for generation : 1024 Public exponent used for generation : 3 Creating files : C:\Depnt\Tools\RSA KEY GEN&USE\RSAkeys\L1024E00003\ RSA(+.PUB) in msec Modulus : 87C8E27ADC137F58442FCDF19B8321B769C6060CAE939ED4FDCCBDEEB3948F6E6A45B9F6EA F1A8 CE2DDE403B9D0EA855B40CE040A316A36D9A03C153A66183FF35F78BA13F107AEB124CB0EE88CE4ABB9CD F4B1B22BA4684BCE7F24700B297E3F A12F4B96A621035E985C96FA6E60F Public Exponent : 3 Creating hash file : C:\Depnt\Tools\RSA KEY GEN&USE\europay.hip Creating self signed certificate file : C:\Depnt\Tools\RSA KEY GEN&USE\europay.sip Tag used for Put in key table one tag operation : Generation + Put In Key Table One Tag + Self Signed Certificates + Export : done ANNEX C: INSTALLATION PROCEDURE There exists an installation procedure for the DEP RSA Key Loading Program. To begin the installation wizard of the program, insert first the installation diskette or the CD-ROM and start the Setup.exe.
37 banksys - Technologies & Products Page: 37/ WELCOME The execution of the Setup.exe launches the installation by Install Shield of the Program RSA KEY LODADING. A Welcome window appears at the center of a Setup screen. It contains general recommendations and warnings about copyright laws and international treaties. Click the NEXT button to continue the installation or click CANCEL to abort it USER INFORMATION The User Information screen allows the user to enter the names of the person and the company that performs the installation.
38 banksys - Technologies & Products Page: 38/45 Enter the name and the company, and click NEXT to continue, BACK to return to previous screen and CANCEL to abort the installation procedure CHOOSE DESTINATION LOCATION The Choose Destination Location window allows defining the path where the DEP RSA Key Loading Program is installed. The default path is C:\Depnt\Tools\RSA KEY LOADING.
39 banksys - Technologies & Products Page: 39/45 Although it is recommended to use the default path, click the BROWSE button to select another directory for the installation of the DEP RSA Key Loading Program software. Click the NEXT button to continue, BACK to return to previous screen or CANCEL to abort the installation procedure SELECT PROGRAM FOLDER The Select Program Folder window is used to define the Program Folder where the program icons will be created.
40 banksys - Technologies & Products Page: 40/45 By default, the Program Folders field contains RSA KEY LOADING. Although it is recommended to leave the default setting, it is possible to select another existing program folder or to enter a new one. Click the NEXT button to continue, BACK to return to previous screen or CANCEL to abort the installation procedure START COPYING FILES The Start Copying Files window gives an overview of the settings selected during the installation procedure.
41 banksys - Technologies & Products Page: 41/45 When the information is correct, click the NEXT button to continue, go BACK to modify some settings or use CANCEL to abort the installation procedure INSTALLING After having clicked on the NEXT button of the Start Copying Files window, all the required installations are executed.
42 banksys - Technologies & Products Page: 42/45 A progress bar and one or more status messages shall appear during the installation of the files SET-UP COMPLETE When all the files and information are copied, a Set-up Complete window appears to confirm a successful installation.
43 banksys - Technologies & Products Page: 43/45 Click FINISH to end the installation. 11. ANNEX D: REMARKS ON THE DATA USED FOR DEFINING THE CERTIFICATE REQUEST REFERENCES This annex contains references to some standards documents: ref 1: EUROPAY, Registration Authority (RA) Interface Specification, version 2.1, November 2000 ref 2: EUROPAY, Registration Authority (RA), member Procedures, version 5.3, November 2000For the purpose of this annex, some references are ref 3: VISA, Visa CA User s Guide, version 2.1, 31 March 2001 ref 4: VISA, 3-D Secure Certificates. Certificate Request Protocol 1.0.1, member version 1.2.5, June 24, 2002.
44 banksys - Technologies & Products Page: 44/ CA TARGET = EUROPAY Field Length/Format Description ID of Certificate Issuer 8 hexadecimal digits, Left-most 3-8 digits from consisting in numeric digits left justified and padded on the PAN, right-padded with hexadecimal F the right with hex. F s Certificate Expiry Date 4 numeric digits Month and Year (MMYY) after which this certificate is invalid Certificate Serial Number 6 hexadecimal digits Number chosen by the issuer Issuer Public Key index 6 hexadecimal digits Number chosen by the issuer, to uniquely identify the public key Remarks: 1. In the table above, issuer also means the requester of the certificate. 2. Fields that have fixed value are not mentioned here. These fixed values are hard-coded in the program, and are according to the specifications ref 1 and ref CA TARGET= VISA Field Length/ Format Description Service Identifier 8 hexadecimal digits Identifies a Visa Service. The proprietary Application Identifier Extension (PIX) is left justified and padded on the right with hex zeroes. Valid values for VSDC: 1010 = Credit/Debit 2010= Electron 3010 = Interlink 8010 = PLUS = Proprietary ATM Issuer Number Identification 8 hexadecimal digits, consisting in numeric digits left justified and padded on the right with hex. F s Issuer BIN, left justified and padded on the right with hex. F s Certificate Expiry Date 4 numeric digits Month and Year (MMYY) after which this certificate is invalid Tracking Number 6 numeric digits Tracking number, to identify a request for a Public Key Certificate Remark: 1. In the text above, issuer also means the requester of the
45 banksys - Technologies & Products Page: 45/45 certificate. 2. Fields that have a fixed value are not mentioned here. These fixed values are hard-coded in the program, and are according to the specification ref CA TARGET=3DSECURE Field Length/Format Description Hash Algo ID 2 digits. Possible values are 33: SHA1 34: SHA256 To indicate the hash algorithm used. It shall be 33 in order to comply with the VISA s 3-D 35: MD5 Secure Certificate Request 40: ISO (MDC2) Procedure [ref 4]. Version 2 digits. Version number related to the version of PKCS#10 defining the syntax of the certificate request. It shall be 00 for the version 1.7 of PKCS#10 standard. Signature Algo 2 digits To comply with the VISA s 3-D Secure Certificate Request Procedure [ref 4] it shall be 05 to indicate the PKCS #1 s sha1withrsaencryption Country Name 2 characters ISO country It shall be BE for Belgium codes Organization Name Max 32 characters Organization Name Organizational Unit Name Max 32 characters Organizational Unit Name Locality Name Max 64 characters Locality Name State/Province Max 64 characters State/Province Common Name Max 32 characters Common Name The table below gives the only permitted character set to use for Organization Name, Organization Unit Name, Locality Name, State/Province, Common Name in order to comply with the VISA s 3-D Secure Certificate Request Procedure [ref 4] Permitted Character Set A..Z Uppercase alphabetic letters a..z Lowercase alphabetic letters 0..9 Decimal digits _ Underscore Space character ' Apostrophe - Hyphen. Period
DEP Documentation DEP/EM User Manual
Haachtsesteenweg 1442 1130 Brussels Belgium DEP Documentation DEP/EM User Manual Version: 04.00 Atos Worldline - Technology & Products / Engineering / DEP Page: 2/19 Version Management Report Version Name(s)
DEP Documentation DEP Customer's Host Programmers Guidelines
Haachtsesteenweg 1442 1130 Brussels Belgium DEP Documentation DEP Customer's Host Programmers Guidelines Version: 04.01 Atos Worldline - Technology & Products / Engineering / DEP Page: 2/10 Version Management
DEP Documentation DEP ATOS Worldline Security Officer Guide
Haachtsesteenweg 1442 1130 Brussels Belgium DEP Documentation DEP ATOS Worldline Security Officer Guide ATOS Worldline - Technologies & Products Page: 2/31 Version Management Report Version Name(s) Date
Secure IIS Web Server with SSL
Secure IIS Web Server with SSL EventTracker v7.x Publication Date: Sep 30, 2014 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Abstract The purpose of this document is to help
Dell Statistica 13.0. Statistica Enterprise Installation Instructions
Dell Statistica 13.0 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or
DIGIPASS CertiID. Getting Started 3.1.0
DIGIPASS CertiID Getting Started 3.1.0 Disclaimer Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis, without any other warranties, or conditions, express
Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide
Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide Windows 2000, Windows Server 2003 5.0 11293743 Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide Copyright
Getting Started with IntelleView POS Administrator Software
Getting Started with IntelleView POS Administrator Software Administrator s Guide for Software Version 1.2 About this Guide This administrator s guide explains how to start using your IntelleView POS (IntelleView)
Dell Statistica Document Management System (SDMS) Installation Instructions
Dell Statistica Document Management System (SDMS) Installation Instructions 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described
X.509 Certificate Generator User Manual
X.509 Certificate Generator User Manual Introduction X.509 Certificate Generator is a tool that allows you to generate digital certificates in PFX format, on Microsoft Certificate Store or directly on
CA Nimsoft Service Desk
CA Nimsoft Service Desk Single Sign-On Configuration Guide 6.2.6 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation
Microsoft Dynamics GP. Engineering Data Management Integration Administrator s Guide
Microsoft Dynamics GP Engineering Data Management Integration Administrator s Guide Copyright Copyright 2007 Microsoft Corporation. All rights reserved. Complying with all applicable copyright laws is
CA Nimsoft Unified Management Portal
CA Nimsoft Unified Management Portal HTTPS Implementation Guide 7.6 Document Revision History Document Version Date Changes 1.0 June 2014 Initial version for UMP 7.6. CA Nimsoft Monitor Copyright Notice
NCD ThinPATH Load Balancing Startup Guide
NCD ThinPATH Load Balancing Startup Guide Copyright Copyright 1999 by Network Computing Devices, Inc. (NCD).The information contained in this document is subject to change without notice. Network Computing
MobileStatus Server Installation and Configuration Guide
MobileStatus Server Installation and Configuration Guide Guide to installing and configuring the MobileStatus Server for Ventelo Mobilstatus Version 1.2 June 2010 www.blueposition.com All company names,
Craig Pelkie Bits & Bytes Programming, Inc. [email protected]
Using the Operations Navigator Backup Utility Craig Pelkie Bits & Bytes Programming, Inc. [email protected] Edition OPSNAVBACKUP_20020219 Published by Bits & Bytes Programming, Inc. Valley Center, CA 92082
Installing Act! for New Users
Installing Act! for New Users Installing Act! for New Users 2014 Swiftpage ACT! LLC. All Rights Reserved. Swiftpage, Act!, and the Swiftpage product and service names mentioned herein are registered trademarks
Setup and Configuration Guide for Pathways Mobile Estimating
Setup and Configuration Guide for Pathways Mobile Estimating Setup and Configuration Guide for Pathways Mobile Estimating Copyright 2008 by CCC Information Services Inc. All rights reserved. No part of
DME-N Network Driver Installation Guide for M7CL/LS9/DSP5D
DME-N Network Driver Installation Guide for M7CL/LS9/DSP5D ATTENTION SOFTWARE LICENSE AGREEMENT PLEASE READ THIS SOFTWARE LICENSE AGREEMENT ( AGREEMENT ) CAREFULLY BEFORE USING THIS SOFTWARE. YOU ARE ONLY
INSTALLING AND USING ENTEL PROGRAMMER IN WINDOWS 7 Technical Support Bulletin
INSTALLING AND USING ENTEL PROGRAMMER IN WINDOWS 7 Rev 1.1 Technical Support Bulletin 1 GENERAL DESCRIPTION: Due to the structural changes in Windows 7 compared to previous Windows versions the following
Installing Sage ACT! 2013 for New Users
Installing Sage ACT! 2013 for New Users Installing Sage ACT! 2013 for New Users Copyright 2012 Sage Software, Inc. All Rights Reserved. Sage, the Sage logos, ACT!, and the Sage product and service names
RSA Authentication Manager 7.1 Basic Exercises
RSA Authentication Manager 7.1 Basic Exercises Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks RSA and the RSA logo
Symantec Backup Exec System Recovery Granular Restore Option User's Guide
Symantec Backup Exec System Recovery Granular Restore Option User's Guide Symantec Backup Exec System Recovery Granular Restore Option User's Guide The software described in this book is furnished under
Digipass Plug-In for IAS. IAS Plug-In IAS. Microsoft's Internet Authentication Service. Getting Started
Digipass Plug-In for IAS IAS Plug-In IAS Microsoft's Internet Authentication Service Getting Started Disclaimer of Warranties and Limitations of Liabilities Disclaimer of Warranties and Limitations of
Upgrade: SAP Mobile Platform Server for Windows SAP Mobile Platform 3.0 SP02
Upgrade: SAP Mobile Platform Server for Windows SAP Mobile Platform 3.0 SP02 Windows DOCUMENT ID: DC80003-01-0302-01 LAST REVISED: February 2014 Copyright 2014 by SAP AG or an SAP affiliate company. All
Symantec Backup Exec System Recovery Exchange Retrieve Option User's Guide
Symantec Backup Exec System Recovery Exchange Retrieve Option User's Guide Symantec Backup Exec System Recovery Exchange Retrieve Option User's Guide The software described in this book is furnished under
Using Self Certified SSL Certificates. Paul Fisher. Quest Software. Systems Consultant. Desktop Virtualisation Group
Using Self Certified SSL Certificates Paul Fisher Systems Consultant [email protected] Quest Software Desktop Virtualisation Group Quest Software (UK) Limited Ascot House Maidenhead Office Park Westacott
Application Note Gemalto.NET 2.0 Smart Card Certificate Enrollment using Microsoft Certificate Services on Windows 2008
7 Application Note Gemalto.NET 2.0 Smart Card Certificate Enrollment using Microsoft Certificate Services on Windows 2008 All information herein is either public information or is the property of and owned
Setting Up and Using the Funambol Windows Mobile Sync Client v7.1
Setting Up and Using the Funambol Windows Mobile Sync Client v7.1 (For use in both Pocket PCs and Smartphones) Contents Introduction.......................................... 2 Requirements for PC-to-Device
User Guide. DocAve Lotus Notes Migrator for Microsoft Exchange 1.1. Using the DocAve Notes Migrator for Exchange to Perform a Basic Migration
User Guide DocAve Lotus Notes Migrator for Microsoft Exchange 1.1 Using the DocAve Notes Migrator for Exchange to Perform a Basic Migration This document is intended for anyone wishing to familiarize themselves
CA Clarity Project & Portfolio Manager
CA Clarity Project & Portfolio Manager Using CA Clarity PPM with Open Workbench and Microsoft Project v12.1.0 This documentation and any related computer software help programs (hereinafter referred to
AIMS Installation and Licensing Guide
AIMS Installation and Licensing Guide Version 9 2603 Camino Ramon Suite 110 San Ramon, CA 94583 Toll Free: 800-609-8610 Direct: 925-217-5170 FAX: 925-217-0853 Email: [email protected] Limited Warranty
How To Set Up Total Recall Web On A Microsoft Memorybook 2.5.2.2 (For A Microtron)
Total Recall Web Web Module Manual and Customer Quick Reference Guides COPYRIGHT NOTICE Copyright 1994-2009 by DHS Associates, Inc. All Rights Reserved. All TOTAL RECALL, TOTAL RECALL SQL, TOTAL RECALL
Baylor Secure Messaging. For Non-Baylor Users
Baylor Secure Messaging For Non-Baylor Users TABLE OF CONTENTS SECTION ONE: GETTING STARTED...4 Receiving a Secure Message for the First Time...4 Password Configuration...5 Logging into Baylor Secure Messaging...7
Dell Spotlight on Active Directory 6.8.3. Server Health Wizard Configuration Guide
Dell Spotlight on Active Directory 6.8.3 Server Health Wizard Configuration Guide 2013 Dell Software Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software
OptionsLink Utility Guide Version 5.1
OptionsLink Utility Guide Version 5.1 OptionsLink Utility Guide Trademarks The software described in this manual is furnished under the license agreement included in the software package. The software
Mobile Secure Cloud Edition Document Version: 2.0-2014-06-26. ios Application Signing
Mobile Secure Cloud Edition Document Version: 2.0-2014-06-26 Table of Contents 1 Introduction.... 3 2 Apple Team Membership....4 3 Building a Team by Adding Team Admins and Team Members.... 5 4 App Protection
How to Time Stamp PDF and Microsoft Office 2010/2013 Documents with the Time Stamp Server
How to Time Stamp PDF and Microsoft Office 2010/2013 Documents with the Time Stamp Server Introduction Time stamping is an important mechanism for the long-term preservation of digital signatures, time
DME-N Network Driver Installation Guide for LS9
DME-N Network Driver Installation Guide for LS9 ATTENTION SOFTWARE LICENSE AGREEMENT PLEASE READ THIS SOFTWARE LICENSE AGREEMENT ( AGREEMENT ) CAREFULLY BEFORE USING THIS SOFTWARE. YOU ARE ONLY PERMITTED
Application Note Gemalto Access Client for windows smart card and EFS on Microsoft Windows Vista
Application Note Gemalto Access Client for windows smart card and EFS on Microsoft Windows Vista [email protected] [email protected] November 2007 www.gemalto.com All information herein
NetBak Replicator 4.0 User Manual Version 1.0
NetBak Replicator 4.0 User Manual Version 1.0 Copyright 2012. QNAP Systems, Inc. All Rights Reserved. 1 NetBak Replicator 1. Notice... 3 2. Install NetBak Replicator Software... 4 2.1 System Requirements...
HP ProtectTools Embedded Security Guide
HP ProtectTools Embedded Security Guide Document Part Number: 364876-001 May 2004 This guide provides instructions for using the software that allows you to configure settings for the HP ProtectTools Embedded
Network FAX Driver. Operation Guide
Network FAX Driver Operation Guide About this Operation Guide This Operation Guide explains the settings for the Network FAX driver as well as the procedures that are required in order to use the Network
Microsoft Small Business Financials. Small Business Center Integration
Microsoft Small Business Financials Small Business Center Integration Copyright Copyright 2005 Microsoft Corporation. All rights reserved. Complying with all applicable copyright laws is the responsibility
FOR WINDOWS FILE SERVERS
Quest ChangeAuditor FOR WINDOWS FILE SERVERS 5.1 User Guide Copyright Quest Software, Inc. 2010. All rights reserved. This guide contains proprietary information protected by copyright. The software described
Installation Guide Installing / Licensing / Unlocking Kepware Products
Installation Guide Installing / Licensing / Unlocking Kepware Products License Registration & Unlock online at https://my.kepware.com/mykepware Kepware Technologies is a private software development company
formerly Help Desk Authority 9.1.3 HDAccess Administrator Guide
formerly Help Desk Authority 9.1.3 HDAccess Administrator Guide 2 Contacting Quest Software Email: Mail: Web site: [email protected] Quest Software, Inc. World Headquarters 5 Polaris Way Aliso Viejo, CA 92656
UX Mail Fax Features. Empowered by Innovation. P/N 0913251 Rev 1, September 15, 2008 Printed in U.S.A. V4.21
Empowered by Innovation UX Mail Fax Features P/N 0913251 Rev 1, September 15, 2008 Printed in U.S.A. V4.21 For additional resources, visit UX5000 on the web at http://www.necux5000.com. This manual has
Empowered by Innovation. Setting Up and Using Fax Mail. P/N 1770087 July 2006 Printed in U.S.A.
Empowered by Innovation Setting Up and Using Fax Mail P/N 1770087 July 2006 Printed in U.S.A. This manual has been developed by NEC Unified Solutions, Inc. It is intended for the use of its customers and
BrightStor ARCserve Backup for Linux
BrightStor ARCserve Backup for Linux Agent for MySQL Guide r11.5 D01213-2E This documentation and related computer software program (hereinafter referred to as the "Documentation") is for the end user's
020112 2008 Blackbaud, Inc. This publication, or any part thereof, may not be reproduced or transmitted in any form or by any means, electronic, or
Point of Sale Guide 020112 2008 Blackbaud, Inc. This publication, or any part thereof, may not be reproduced or transmitted in any form or by any means, electronic, or mechanical, including photocopying,
Symantec AntiVirus Corporate Edition Patch Update
Symantec AntiVirus Corporate Edition Patch Update Symantec AntiVirus Corporate Edition Update Documentation version 10.0.1.1007 Copyright 2005 Symantec Corporation. All rights reserved. Symantec, the Symantec
Microsoft Dynamics GP. Electronic Signatures
Microsoft Dynamics GP Electronic Signatures Copyright Copyright 2006 Microsoft Corporation. All rights reserved. Complying with all applicable copyright laws is the responsibility of the user. Without
Xcalibur Global Version 1.2 Installation Guide Document Version 3.0
Xcalibur Global Version 1.2 Installation Guide Document Version 3.0 December 2010 COPYRIGHT NOTICE TRADEMARKS 2010 Chip PC Inc., Chip PC (Israel) Ltd., Chip PC (UK) Ltd., Chip PC GmbH All rights reserved.
Third-party software is copyrighted and licensed from Kofax s suppliers. This product is protected by U.S. Patent No. 5,159,667.
2006-2008 Kofax, Inc., 16245 Laguna Canyon Road, Irvine, California 92618, U.S.A. All right reserved. Portions 2002-2006 Kofax Development GmbH. Portions 1997-2006 Kofax Development UK Ltd. All Rights
Desktop Deployment Guide ARGUS Enterprise 10.6. 5/29/2015 ARGUS Software An Altus Group Company
ARGUS Enterprise 10.6 5/29/2015 ARGUS Software An Altus Group Company for ARGUS Enterprise Version 10.6 5/29/2015 Published by: ARGUS Software, Inc. 3050 Post Oak Boulevard Suite 900 Houston, Texas 77056
Important Notes for WinConnect Server VS Software Installation:
Important Notes for WinConnect Server VS Software Installation: 1. Only Windows Vista Business, Windows Vista Ultimate, Windows 7 Professional, Windows 7 Ultimate, Windows Server 2008 (32-bit & 64-bit),
SecureStore I.CA. User manual. Version 2.16 and higher
User manual Version 2.16 and higher Contents SecureStore I.CA 1. INTRODUCTION...3 2. ACCESS DATA FOR THE CARD...3 2.1 Card initialisation...3 3. MAIN SCREEN...4 4. DISPLAYING INFORMATION ABOUT THE PAIR
HART INSTALLATION GUIDE
HART INSTALLATION GUIDE VERSION 1.0 JULY 01, 2014 Page 1 of 23 Table of Content Introduction... 3 Hardware/Software Specifications... 3 Software Downloads... 3 Installation Guide General Overview... 5
Meridian 1 Meridian 1 Attendant PC LAN Interface Installation Guide
Meridian 1 Meridian 1 Attendant PC LAN Interface Installation Guide Document Number: P0874391 Document Release: Standard 1.00 Date: November 1997 Year Publish FCC TM 1997 All rights reserved Printed in
Event Manager. LANDesk Service Desk
Event Manager LANDesk Service Desk LANDESK SERVICE DESK EVENT MANAGER GUIDE This document contains information that is the proprietary and confidential property of LANDesk Software, Inc. and/or its affiliated
FLoader User's Manual
FLoader User's Manual Version 1.0.07 Build February 12, 2002 Copyright Topcon Positioning Systems, Inc. 2002 All rights reserved Last Revised February 14, 2002 INTRODUCTION / TERMS AND CONDITIONS Thank
WhatsUp Gold v16.2 Installation and Configuration Guide
WhatsUp Gold v16.2 Installation and Configuration Guide Contents Installing and Configuring Ipswitch WhatsUp Gold v16.2 using WhatsUp Setup Installing WhatsUp Gold using WhatsUp Setup... 1 Security guidelines
HP IMC Firewall Manager
HP IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW102-20120420 Legal and notice information Copyright 2012 Hewlett-Packard Development Company, L.P. No part of this
Crystal Reports Installation Guide
Crystal Reports Installation Guide Version XI Infor Global Solutions, Inc. Copyright 2006 Infor IP Holdings C.V. and/or its affiliates or licensors. All rights reserved. The Infor word and design marks
Moxa Device Manager 2.3 User s Manual
User s Manual Third Edition, March 2011 www.moxa.com/product 2011 Moxa Inc. All rights reserved. User s Manual The software described in this manual is furnished under a license agreement and may be used
HP LaserJet MFP Analog Fax Accessory 300 Send Fax Driver Guide
HP LaserJet MFP Analog Fax Accessory 300 Send Fax Driver Guide Copyright and License 2008 Copyright Hewlett-Packard Development Company, L.P. Reproduction, adaptation, or translation without prior written
Exeba -ATS. User Guide. Escan Technologies Corporation
Escan Technologies Corporation Exeba -ATS User Guide Escan Technologies Corp. 12140 Severn Way Riverside, CA 92503 Phone (909) 270-0043 Fax (909) 270-0920 1 ESCAN TECHNOLOGIES CORPORATION Exeba -ATS User
Installing the BlackBerry Enterprise Server Management Software on an administrator or remote computer
Installing the BlackBerry Enterprise Server Management Software on an administrator or Introduction Some administrators want to install their administrative tools on their own Windows 2000 computer. This
Business Portal for Microsoft Dynamics GP. Electronic Document Delivery Release 10.0
Business Portal for Microsoft Dynamics GP Electronic Document Delivery Release 10.0 Copyright Copyright 2007 Microsoft Corporation. All rights reserved. Complying with all applicable copyright laws is
Unicenter NSM Integration for BMC Remedy. User Guide
Unicenter NSM Integration for BMC Remedy User Guide This documentation and any related computer software help programs (hereinafter referred to as the Documentation ) is for the end user s informational
Python for Series 60 Platform
F O R U M N O K I A Getting Started with Python for Series 60 Platform Version 1.2; September 28, 2005 Python for Series 60 Platform Copyright 2005 Nokia Corporation. All rights reserved. Nokia and Nokia
RSA Security Analytics Netflow Collection Configuration Guide
RSA Security Analytics Netflow Collection Configuration Guide Copyright 2010-2015 RSA, the Security Division of EMC. All rights reserved. Trademarks RSA, the RSA Logo and EMC are either registered trademarks
HP Application Lifecycle Management
HP Application Lifecycle Management Software Version: 11.00 Microsoft Word Add-in Guide Document Release Date: November 2010 Software Release Date: October 2010 Legal Notices Warranty The only warranties
Ascent Capture Internet Server
Ascent Capture Internet Server Distributed Production Document and Data Capture Version 3.1 Release Notes 10000809-000 Revision A June 28, 2000 Copyright Copyright 2000 Kofax Image Products. All Rights
Email Data Protection. Administrator Guide
Email Data Protection Administrator Guide Email Data Protection Administrator Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2015 Symantec Corporation. All rights reserved. Symantec,
Server Installation Guide ZENworks Patch Management 6.4 SP2
Server Installation Guide ZENworks Patch Management 6.4 SP2 02_016N 6.4SP2 Server Installation Guide - 2 - Notices Version Information ZENworks Patch Management Server Installation Guide - ZENworks Patch
Microsoft Dynamics GP. Workflow Installation Guide Release 10.0
Microsoft Dynamics GP Workflow Installation Guide Release 10.0 Copyright Copyright 2008 Microsoft Corporation. All rights reserved. Complying with all applicable copyright laws is the responsibility of
SolarWinds Technical Reference
SolarWinds Technical Reference Using SSL Certificates in Web Help Desk Introduction... 1 How WHD Uses SSL... 1 Setting WHD to use HTTPS... 1 Enabling HTTPS and Initializing the Java Keystore... 1 Keys
Millennium Drive. Installation Guide
Millennium Drive Installation Guide This is a publication of Abila, Inc. Version 2015.1 2015 Abila, Inc. and its affiliated entities. All rights reserved. Abila, the Abila logos, and the Abila product
Title Page. Installation Guide. PowerChute plus Version 5.0.1. for Windows 95
Title Page PowerChute plus Version 5.0.1 for Windows 95 Notice Page : PowerChute plus for Windows 95 version 5.0.1 PowerChute plus License Statement This software is protected by both United States copyright
RDC-7 Windows XP Installation Guide
RDC-7 Windows XP Installation Guide CONTENTS 1. End User License Agreement...3 2. Important notes...4 3. Customer support...4 4. Installing the USB driver...4 I. Prior to installation...4 II. Installation
Texas Sales Tax Electronic Reporting Using Electronic Data Interchange (EDI)
Texas Sales Tax Electronic Reporting Using Electronic Data Interchange (EDI) Quick Reference Guide Susan Combs Texas Comptroller of Public Accounts Texas Sales Tax Electronic Reporting Using Electronic
Banyon Data Systems BDS BACKUP VAULT
Banyon Data Systems BDS BACKUP VAULT 2 BDS BACKUP VAULT INSTALLATION / SETUP Thank you for your purchase of the BDS Backup Vault program. This program is designed to protect each of your entities installed
Check Point FDE integration with Digipass Key devices
INTEGRATION GUIDE Check Point FDE integration with Digipass Key devices 1 VASCO Data Security Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document
Introduction. Before you begin. Installing efax from our CD-ROM. Installing efax after downloading from the internet
Introduction Before you begin Before you begin installing efax, please check the following: You have received confirmation that your application for the efax service has been processed. The confirmation
TECHNICAL BULLETIN. Configuring Wireless Settings in an i-stat 1 Wireless Analyzer
i-stat TECHNICAL BULLETIN Configuring Wireless Settings in an i-stat 1 Wireless Analyzer Before configuring wireless settings, please enable the wireless functionality by referring to the Technical Bulletin
Quick Connect Express for Active Directory
Quick Connect Express for Active Directory Version 5.2 Quick Start Guide 2012 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in
Business Portal for Microsoft Dynamics GP. Key Performance Indicators Release 10.0
Business Portal for Microsoft Dynamics GP Key Performance Indicators Release 10.0 Copyright Copyright 2007 Microsoft Corporation. All rights reserved. Complying with all applicable copyright laws is the
Symantec Backup Exec TM 11d for Windows Servers. Quick Installation Guide
Symantec Backup Exec TM 11d for Windows Servers Quick Installation Guide September 2006 Symantec Legal Notice Copyright 2006 Symantec Corporation. All rights reserved. Symantec, Backup Exec, and the Symantec
Quest ChangeAuditor 5.1 FOR ACTIVE DIRECTORY. User Guide
Quest ChangeAuditor FOR ACTIVE DIRECTORY 5.1 User Guide Copyright Quest Software, Inc. 2010. All rights reserved. This guide contains proprietary information protected by copyright. The software described
User Installation Guide for SAS 9.1 Foundation for 64-bit Microsoft Windows
User Installation Guide for SAS 9.1 Foundation for 64-bit Microsoft Windows Installation Instructions Where to Begin SAS Setup Wizard Repair or Remove SAS Software Glossary Where to Begin Most people who
IDGo 800 Minidriver for Windows. User Guide
IDGo 800 Minidriver for Windows User Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and keep the
ANSYS, Inc. Installation and Licensing Tutorials
ANSYS, Inc. Installation and Licensing Tutorials ANSYS, Inc. Release 15.0 Southpointe November 2013 275 Technology Drive 000508 Canonsburg, PA 15317 ANSYS, Inc. is [email protected] certified to ISO
Windows 98 Workstation Install
Windows 98 Workstation Install To install the Oracle Client Software on a Windows 98 workstation you need to do a manual install installing the Oracle Client Software first then the Infinitime software.
4.0. Offline Folder Wizard. User Guide
4.0 Offline Folder Wizard User Guide Copyright Quest Software, Inc. 2007. All rights reserved. This guide contains proprietary information, which is protected by copyright. The software described in this
HIGHSEC eid App Administration User Manual
HIGHSEC eid App Administration User Manual Contents 1 Introduction... 3 2 Application overview... 3 3 Managing HIGHSEC eid App... 3 3.1 Deleting card pairings... 4 4 Inspecting smart card contents... 5
