PDG Software. Encryption Guide



Similar documents
PDG Software. PDG Key Manager User Guide

PDG Software. Keyman Encryption Guide

PDG Shopping Cart 4.0. Quick Start Guide

How To Encrypt A Traveltrax Report On Gpg On A Pc Or Mac Or Mac (For A Free Download) On A Thumbdrive Or Ipad Or Ipa (For Free) On Pc Or Ipo (For An Ipo)

PDG Software. VeriSign Payflow Pro Recurring Billing Guide

PDG Software. QuickBooks Financial Guide

PDG Software. QuickBooks Point of Sale Guide

User guide. Business

Please note that a username and password will be made available upon request. These are necessary to transfer files.

Banyon Data Systems BDS BACKUP VAULT

LiteCommerce Advanced Security Module. Version 2.8

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

PDG Software. Site Design Guide

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Microsoft Dynamics GP. Business Analyzer

4. Click Next and then fill in your Name and address. Click Next again.

14.1. bs^ir^qfkd=obcib`qflk= Ñçê=emI=rkfuI=~åÇ=léÉåsjp=eçëíë

How to Setup Privacy Guard Encryption.

GETTING STARTED SECURE FILE TRANSFER PROCEDURES A. Secure File Transfer Protocol (SFTP) Procedures

KEPServerEX Client Connectivity Guide

AXIS 70U - Using Scan-to-File

Dwebs IIS Log Archiver Installation and Configuration Guide for Helm 4

Secure File Transfer Protocol Updated Procedures. June 20, 2011

Tutorial: Encrypted with Thunderbird and Enigmail. Author: Shashank Areguli. Published: Ed (August 9, 2014)

NetBak Replicator 4.0 User Manual Version 1.0

Dell Statistica Statistica Enterprise Installation Instructions

The KGpg Handbook. Jean-Baptiste Mardelle Rolf Eike Beer

Encrypting Your Using the free COMODO Secure Certificate

How To Restore Your Data On A Backup By Mozy (Windows) On A Pc Or Macbook Or Macintosh (Windows 2) On Your Computer Or Mac) On An Pc Or Ipad (Windows 3) On Pc Or Pc Or Micro

Resource Online User Guide JUNE 2013

How to use PGP Encryption with iscribe

HP Application Lifecycle Management

GPG installation and configuration

AdminToys Suite. Installation & Setup Guide

Shopping Cart Software

Install and configure SSH server

Virtual Owl. Guide for Windows. University Information Technology Services. Training, Outreach, Learning Technologies & Video Production

8.7. Resource Kit User Guide

4.0. Offline Folder Wizard. User Guide

HP Quality Center. Software Version: Microsoft Word Add-in Guide

MY WORLD GIS. Installation Instructions

NCD ThinPATH Load Balancing Startup Guide versions and 2.8.1

ARGUS SUPPORT: (03) ARGUS V4.3.X TO ARG US V5.0.X

1. Scope of Service. 1.1 About Boxcryptor Classic

Adding Outlook to a Blackberry, Downloading, Installing and Configuring Blackberry Desktop Manager

ACS EPF Download Manager Technical Guide. Table of Contents

gpg4o Manual Version 3.0

ecstudent-ts Terminal Server How to Use

Active Directory Change Notifier Quick Start Guide

Xopero Backup Build your private cloud backup environment. Getting started

LogMeIn Backup. Getting Started Guide

Quick Guide to Using your Nokia Phone with Windows 95 Fax - Exchange for Windows 95 or Windows Messaging for Windows 95

NCD ThinPATH Load Balancing Startup Guide

DOMAIN CENTRAL HOSTING

Cisco UCS Director Payment Gateway Integration Guide, Release 4.1

Microsoft Small Business Financials. Small Business Center Integration

How to install and use the File Sharing Outlook Plugin

Access your directories (home directory and shared directories) outside Tilburg University

Personal Call Manager User Guide. BCM Business Communications Manager

MiSync Personal for Beams

SECURE USER GUIDE OUTLOOK 2000

Lepide Event Log Manager: Installation Guide. Installation Guide. Lepide Event Log Manager. Lepide Software Private Limited

SiteBuilder E-Shop User Guide

Installing Microsoft Outlook on a Macintosh. This document explains how to download, install and configure Microsoft Outlook on a Macintosh.

HP ProtectTools Embedded Security Guide

RealShot Manager Compression Server software

FOR WINDOWS FILE SERVERS

Bridging People and Process. Bridging People and Process. Bridging People and Process. Bridging People and Process

Fax User Guide 07/31/2014 USER GUIDE

Microsoft Dynamics GP. Engineering Data Management Integration Administrator s Guide

HP ARCHIVING SOFTWARE FOR EXCHANGE

Activelock Customer Management 1.0

NETGATE Data Backup. User Manual. Document version 1. 1 EN ( ) Copyright (c) 2010 NETGATE Technologies s.r.o. All rights reserved.

Contents First Time Setup... 2 Setting up the Legal Vault Client (KiteDrive)... 3 Setting up the KiteDrive Outlook Plugin Using the Legal Vault

Outlook . Step 1: Open and Configure Outlook

DigiDelivery Client Quick Start

The Reprographics Online E-Copy Process is used to submit print jobs to the RUSD Reprographics department.

Stellar Phoenix Exchange Server Backup

Configuring Microsoft Internet Information Service (IIS6 & IIS7)

Configuring your client to connect to your Exchange mailbox

HMRC Secure Electronic Transfer (SET)

Avaya Network Configuration Manager User Guide

Credit Card Encryption 9.0

Figure 1: Restore Tab

Transferring Your Hosting Account

Using Internet or Windows Explorer to Upload Your Site

PGP Desktop Quick Start Guide version 9.6

Overview of edx Analytics

Price list update. What this exercise is about What you should be able to do Introduction Requirements... 2

Creating Reports with Microsoft Dynamics AX SQL Reporting Services

STEP 01 Nortel Contivity VPN Client Installation

PayFlex FTP - Wired Commute

Kaspersky Password Manager USER GUIDE

Installing SQL Express. For CribMaster 9.2 and Later

DEP S REMOTE ACCESS USER GUIDE

Centran Version 4 Getting Started Guide KABA MAS. Table Of Contents

Skipjack ezpay Secure Online Order Form User Guide

RemotePC Lite User Manual. Table of Contents

Microsoft Business Contact Manager Version 2.0 New to Product. Module 4: Importing and Exporting Data

FileCruiser. Desktop Agent Guide

Transcription:

Encryption Guide

, Inc. 1751 Montreal Circle, Suite B Tucker, Georgia 30084-6802 Copyright 1998-2006 PDG Software, Inc.; All rights reserved. PDG Software, Inc. ("PDG Software") retains all ownership rights to the software programs (referred to herein as "Software") offered by PDG Software and related documentation. Use of the Software and related documentation is governed by the license agreement accompanying the Software and applicable copyright law. THIS DOCUMENTATION IS PROVIDED "AS-IS" WITHOUT WARRANTY OF ANY KIND. IN NO EVENT SHALL PDG SOFTWARE BE LIABLE FOR ANY LOSS OF PROFITS, LOSS OF BUSINESS, LOSS OF USE OR DATA, INTERRUPTION OF BUSINESS, OR FOR INDIRECT, SPECIAL, INCIDENTAL, OR CONSEQUENTIAL DAMAGES OF ANY KIND, ARISING FROM ANY ERROR IN THIS DOCUMENTATION. PDG Software, Inc. http://www.pdgsoft.com June, 2006

Chapter 1 Encryption and PDG Software Using encryption with PDG Software T his guide assumes you have installed and have a basic familiarity with PDG Shopping Cart or PDG Commerce. This manual also assumes that you have a basic understanding of zip/unzip utilities and file transfer protocol (FTP) programs. If not, you may want to enlist additional help or familiarize yourself with these programs before proceeding. Introduction You can protect the privacy of your customer order email messages and your order log files by encrypting them so that only you can read them. To do so, you will need to download and configure two software programs. You will use the PGP Keys tool to create your security keys and GNU Privacy Guard to encrypt your customer order email and order logs. You will import the key to your PDG Shopping Cart or PDG Commerce program through the PDG Merchant Administrator. 1. GNU Privacy Guard (GNUPG) - This encryption software is available free from: http://www.gnupg.org/download.html 2. PGP Keys tool - This tool is contained inside the PGP free 30 day trial package available from: http://www.pgp.com/downloads/desktoptrial.php The PGP Desktop Security software may be purchased from: http://www.pgp.com/products/index.html PDG Software does not provide technical support for these products. This guide is provided as a courtesy to our software users who wish to use encryption to protect their order email and order log files. Note: PGP is not a free program. At the end of the 30 day trial, it must be purchased. The version explained in this guide is PDG Desktop Security. PDG Software Encryption Guide 5

Quick Overview These are the basic steps necessary to use encryption with PDG software. 1. Download two encryption software programs to your local computer and place them in different folders. 2. Uncompress the archived (compressed) programs and install them as appropriate. 3. Create your security keys using PGP Keys and export your key. 4. Copy or FTP the GNUPG file to your host server in the correct file format. 5. Use the Encryption section of the PDG Merchant Administrator to import your security key into GNUPG. 6. Configure PDG software to use GNUPG to encrypt vendor emails sent to you. 7. Configure PDG software to use GNUPG to encrypt your order log files. 8. Configure your email program (e.g., Microsoft Outlook) to decrypt order emails you receive. 9. Test your configuration. Note: We strongly recommend you follow these steps in the order shown. Detailed explanations of each step in the process are shown below. Download/Uncompress You must download two encryption software programs to your local computer. First, create two folders on your local computer and name them gnupg and pgp. Second, connect to the Internet and go to http://www.gnupg.org/download.html. Download the appropriate GNU Privacy Guard version for your host server s operating system, e.g. Windows, UNIX, etc. This is a compressed archive containing all the program s files. Place it in the gnupg folder you created. Uncompress this archive. Note: If you are using Windows and your shopping cart is running on a UNIX machine, you will have to uncompress the -.tar.gz archive appropriately. If you need assistance obtaining the gnupg program, please contact PDG technical staff. Next, go to http://www.pgpi.org and download the appropriate PGP version for your local computer s operating system, e.g. Windows, UNIX, etc. and place it in the pgp folder you created. Uncompress this archive, then run 'Setup' to install PGP onto your local computer. Follow the on screen instructions for installation. We recommend you accept the default settings. 6 PDG Software Encryption Guide

Create Security Keys Now you can create your security keys using PGP Keys. When you install PGP, the installation program should have placed shortcuts in your Start - Programs menus and an icon on your system tray. You can start PGP Keys by clicking on the entry in the Start - Programs menu or click on the lock icon in the system tray and click on PGP Keys. Note: The first time you run PGP Keys, a wizard screen will appear to assist you in creating your keys. Follow the on screen instructions in the wizard to create your keys. Be sure to remember your passphrase. When you finish creating your keys, a screen similar to the following should appear. Scroll down to the new keyring you created to view it. It should show up in bold face type to indicate it is the default. Close PGP Keys. PDG Software Encryption Guide 7

Export Key Now you must export your security key FROM PGP Keys. First, Open PGP Keys and Highlight the key you created. Select Keys - Export from the menu. A screen similar to the following will appear. Enter a filename (e.g. JohnSmith) and make sure the file type is ASCII (this will add a.asc file extension). Click the Save button. Close PGP Keys. Copy/FTP Now you must copy or FTP the following file to your host server. If you are NOT using Windows on your server there will be no.exe extension to the file name for executable files (the file will be named gpg). gpg.exe--> \cgi-bin\pdg_cart\ or \cgi-bin\pdg_commerce\ You must set the permissions for this file as 755 (Read, Write, Execute). 8 PDG Software Encryption Guide

Import Key After you have exported the key, you must then import the key into PDG Software. Open a web browser and log into your PDG Merchant Administrator. Click the Encryption link on the Main Menu to access the encryption settings in your Cart or Commerce Administrator. The following screen will appear: Remember in our example, we saved the exported key file with the name, JohnSmith.asc. Open the exported file in Notepad or other text editor, NOT a word processing program. Select ALL of the text shown in the file and press Control + c to copy it into the clipboard. Place the cursor in the Key Box and press Control + v to paste the info in the GPG Add Encryption key box. Click on the Add Key button. The page will then refresh, and the key should now be listed in the GPG keys portion of the page. PDG Software Encryption Guide 9

Configure PDG Software You can configure two items in PDG software for encryption. 1. Vendor emails - These are the customer order emails sent to you, the vendor. 2. Order logs - the order logs are the files in which your customer orders are stored on the server. To configure these two items for encryption, go to the Merchant Administrator and click the E-mail link on the Main Menu. In the E-mail Vendor Notifications To: field, enter your email address, e.g. jsmith@yourwebsite.com followed by the '<' symbol, then enter your email address again, followed by the '>' symbol. The text contained within the < and > symbols must be the name of the key you imported. The entry should appear similar to the following with NO SPACES. jsmith@yourwebsite.com<jsmith@yourwebsite.com> Click the Submit Changes button. Click the Return to Main Menu link. Click the Make Changes Live link. To encrypt your order log, click the Order link on the Main Menu. In the Order Log text File field, add the '<' symbol after the name of the log, then enter your email address, followed by the '>' symbol with NO SPACES. The text contained within the < and > symbols must be the name of the key you imported. 10 PDG Software Encryption Guide

The entry should appear similar to the following: order.log<jsmith@yourwebsite.com> You may also encrypt the Order Log CSV File and Order Log XML File fields in the same manner. Note: If you have an existing order log files, ONLY orders received AFTER configuring PDG for encryption will be encrypted. These new orders will be appended to the end of the existing order log files. Configure your Email Program Next you may configure your email program to decrypt the customer order emails you receive. For assistance with this configuration, you should contact PGP technical support or consult their online documentation (accessible at http://www.pgp.com). Test your settings The simplest way to test your settings is to send yourself a test order. Go to your web site and enter a test order to buy a product. Be sure to enter all the proper order information in the order fields. You should receive two emails: 1. One plain text confirmation email, just like a customer buying a product would receive 2. One encrypted email of the order, just as you would receive as the vendor Getting Help Note: PDG Software does not provide technical support for PGP programs. This guide is provided as a courtesy to our software users who wish to use encryption to protect their order email and order log files. However, PDG technical support staff is available for support of PDG products via our web site at http://www.pdgsoft.com and through e-mail at support@pdgsoft.com. Also you may reach us directly by phone at (770) 270-0062 extension 3. PDG Software Encryption Guide 11

12 PDG Software Encryption Guide