HTTPS File Transfer. Specification
|
|
- Edgar Byrd
- 6 years ago
- Views:
Transcription
1 HTTPS File Transfer Specification Version Apr-2017
2 Date Version Description 30-Aug Original Version 30-Jun Added FAQ 29-Jun ilink administration added 1-Sep Updated for new layout 4-Apr Revised TLS version to 1.2 minimum Page 2
3 Table of Contents 1 Introduction Quick Start Integration Options ilink connectivity setup ilink URLs Setup Connectivity Form Using the Command Line Scripts Downloading curl Configuration Uploading Files Example File Names Handling Errors Downloading Files Example Handling Errors Developing Custom HTTPS Connectivity Recommendations Handling Errors Installing the Client Certificate Protecting Your Certificate Upgrading Your Certificate Appendix: File Transfer Protocol Uploading Files HTTP Request HTTP Response Handling Errors Listing Files for Download HTTP Request Page 3
4 7.2.2 HTTP Response Handling Errors Downloading a File HTTP Request HTTP Response Handling Errors Deleting a File HTTP Request HTTP Response Handling Errors Appendix: Westpac HTTPS addresses Test Environment Production Environment Appendix D FAQ Page 4
5 1 Introduction This document defines Westpac s WIBS HTTPS file transfer protocol. The HTTPS file transfer protocol allows partners to transfer files securely and reliably over the internet. It provides a standard mechanism for transport using existing infrastructure (such as web servers, proxy servers and firewalls). Communication uses standard TCP/IP ports to prevent the need for network firewall changes. SSL is used to provide encryption of data between partners, and authorisation assures the identity of each partner. The intended audience of this document is: Server administrators who wish to use the provided command line scripts, and Software developers who wish to implement this messaging protocol in their software. Knowledge of HTTP and SSL is assumed. Page 5
6 2 Quick Start Customer task Westpac task 1. Qvalent implementation consultant creates an ilink test account for the customer s technical contact. 2. Customer contact completes ilink connectivity form in test ilink. 3. Customer develops HTTPS connectivity solution 4. Qvalent implementation consultant configures file routing. 5. Customer undertakes testing in the test environment. 6. Once customer is satisfied that testing is complete a sign off is required to progress into production. 7. Qvalent implementation consultant creates an ilink production account for the customer s technical contact. 8. Customer contact completes ilink connectivity form in production ilink. 9. Qvalent implementation consultant configures file routing. 10. Customer tests the HTTPS connection in the live environment. 11. Once this testing is successful customers can perform low value live testing of the other Westpac products that are being implemented. Page 6
7 3 Integration Options The HTTPS file transfer service is provided to allow your system to easily upload files to Westpac and download files from Westpac. You have two integration options: 1. Use the provided command-line scripts. These scripts use the curl commandline program and standard in and out streams to transfer files. Minimal configuration work is required. 2. Write code to generate HTTPS requests sent to Westpac and interpret the responses you receive. A moderate amount of development work is required, and you will need previous expertise with HTTPS. These options are further detailed in the following sections. Page 7
8 4 ilink connectivity setup In the early stages of your Westpac project you will be asked to provide the contact details of the IT person who will be responsible for setting up your HTTPS connection. Once these details are received you will be provided with an ilink login to enter your IP addresses. The ilink connectivity process has the following steps 1. The Qvalent implementation consultant will provide the user s technical contact with a login to the ilink test instance. 2. Fill in the setup connectivity form and submit 3. Notify your Qvalent and Westpac implementation managers that you have completed the connectivity form 4. The Qvalent implementation consultant will configure the file routing and notify all stakeholders when this is done 5. User to send and receive test files to confirm the HTTPS connection 6. Once the Qvalent implementation consultant has received confirmation that all relevant testing has been completed steps 1 5 will need to be repeated in the production environment. 4.1 ilink URLs Test Production Setup Connectivity Form To setup your connectivity, click the Connectivity menu option at the top of the screen, then press the Setup Connectivity button. The Setup Connectivity will be displayed where you can enter the following details: PGP Key If you have elected to PGP encrypt files sent to Westpac, upload your PGP key here. Otherwise, this field will not be shown on the screen. IP addresses The WIBS solution has a white list of IP addresses accepted for each user. Users need to provide the IP address or addresses that their incoming requests will be coming from, this is the external IP address taking into account any proxy servers or other externally facing network infrastructure. This can be found by logging on to ilink on your server and taking the browser address shown in the IP addresses section of the connectivity form. After you press Save, you will see the WIBS server details on the Setup connectivity page. Westpac s key this is the public key that you will need to use to decrypt the files you receive from WIBS. This will only be displayed if encryption is enabled. Your key - You can use these fields during testing to confirm which keys you have loaded into ilink. This will only be displayed if encryption is enabled. Your credentials - This section contains the details of the client certificate that you will use to authenticate with the WIBS server. IP Addresses lists the IP addresses allowed to access this connectivity Page 8
9 5 Using the Command Line Scripts Command line scripts have been provided for Unix and Windows that demonstrate the use of curl to upload and download files. The scripts have been designed to exit with an error code if the file could not be successfully uploaded or download. Error details will be written to the standard error stream. 5.1 Downloading curl You will need to download the curl client for your platform from Be sure to download the correct distribution for your server s operating system. You must download a version that includes SSL support. If you are using Windows, we recommend that you download the binary distribution listed under the heading Win32 - Generic labelled Win /XP, binary and SSL and maintained by Günter Knauf. This document does not provide a direct link because you should always download the latest version. 5.2 Configuration You need to edit the configuration script before you can use the upload or download scripts. The configuration script is named config.cmd on Windows and config.sh on Unix. Open the file in a text editor and make the following changes: 1. Set the CERT_FILE variable to the file path of your.pem certificate file, e.g. c:\filetransfer\certificate.pem 2. Set the CERT_PASSWORD variable to the password for your.pem certificate file. 3. If you require a proxy to connect to the internet: a. Uncomment the first PROXY_OPTIONS line and change proxy_address to the host name of your proxy server, and proxy_port to the port number your proxy server listens on. b. If your proxy server requires authentication, uncomment the second PROXY_OPTIONS line and change username to your proxy username and password to your proxy password. 4. If you are uploading and downloading files in the test environment, leave the BASE_URL variable set to If you are uploading and downloading files in the production environment, set the BASE_URL variable to 5. Set the CURL_EXE variable to the file path of the curl executable file, e.g. C:\curl \curl.exe 5.3 Uploading Files The upload script is named uploadfile.cmd on Windows and uploadfile.sh on Unix. It takes one argument, which is the file name to send to Westpac. The file contents are read from standard in. Page 9
10 5.3.1 Example The following example shows how to send a file from the file system: Windows: Unix: uploadfile.cmd mts _01.txt < c:\mts txt uploadfile.sh mts _01.txt < c:\mts txt Note that this allows the file name sent to Westpac to be different from the file name on disk. Important Security Note: If the file contains credit card numbers, PCI DSS regulations require that you do not store the file unencrypted on disk. Instead, you must decrypt the file in memory and stream that data to the input stream of the upload script File Names The file name sent to Westpac must be unique. If you send a different file with the same name as a previous file, you will receive a HTTP 400 Bad Request error response. To ensure uniqueness of file names, include the file type, date and a daily sequence number in the file name Handling Errors If you receive a network error while transmitting your file, you can simply run the same upload command again (re-using the same file name). This will never result in a duplicate file because Westpac will silently ignore duplicate files with the same name. If you receive any other error, it is likely a configuration issue you need to investigate based on the error message provided. 5.4 Downloading Files The download files script is named downloadfiles.cmd on Windows and downloadfiles.sh on Unix. It downloads all your available files and removes them from the download list (preventing duplicate downloads). By default, the file contents are echoed to standard out. You will need to modify this script to save the files to an appropriate location and trigger any required file processing. Important Security Note: If the file contains credit card numbers, PCI DSS regulations require that you do not store the file unencrypted on disk. Instead, you must read the standard out stream from the script and encrypt the file in memory before saving it to disk Example To download all available files, run the following command: Windows: Unix: downloadfiles.cmd downloadfiles.sh Handling Errors To download the available files, the script performs the following operations: 1. Get a list of all the available files. 2. For each file in that list: a. Download the file. Page 10
11 b. If the file has not already been processed, run your custom file processing. c. Delete the file (removing it from the available file list). Operations 1, 2a and 2c can fail due to network errors. In that event, simply run the download script again and the file will be downloaded again. The file is not deleted until it is downloaded and processed, which allows you to retry the download operation in the event of a failure. If you receive an error not related to network connectivity or your processing, it is likely a configuration issue you need to investigate based on the error message provided. Page 11
12 6 Developing Custom HTTPS Connectivity This section gives an overview of developing your own connectivity code to use the HTTPS file transfer service. It details the requirements of your system and gives instruction on how to integrate the file transfer protocol into your system. This section does not contain details of the file transfer protocol itself. That information is in section 7. Note that this section only gives a general overview of what needs to be done. Specific details are not provided since they vary depending on the actual technology you use. For this reason, Westpac can provide only limited assistance to customers using custom integration. We recommend that you only undertake a custom integration if you have previous experience with HTTPS and client certificates. To use the Westpac HTTPS file transfer service, you will need a HTTP client that supports the following standards: HTTP TLS 1.2 or higher Recommendations Log detailed information about each file you upload and download. This information will help you diagnose any potential problems you may encounter later. You should not log your certificate details or any full credit card numbers contained in the file. Protect your certificate file. If necessary, restrict the permissions on this file so that only your application can access the certificate. 6.2 Handling Errors If you encounter a network error or HTTP 500 response code, your system should automatically retry the request. You should wait at least 5 minutes before retrying the request, and you should only retry for a maximum of 4 hours before you investigate the cause of the issue manually. 6.3 Installing the Client Certificate You must use an SSL client certificate to communicate with the Westpac server. This certificate will be provided to you by Westpac. You may not use a certificate from another source (e.g. Verisign). Your certificate is generally provided in PKCS12 (or PFX) format. This file format requires a password for the certificate. You will be provided with this certificate password. Do not confuse this password with the password you use to login to any Westpac websites. Your certificate password will always start with a C. A few HTTP libraries require the client certificate file to be in PEM format. If this is the case, please ensure that you get the certificate in the correct format. Once you have obtained your certificate in the correct format, you must reference it from your HTTP library. The details of this will vary between HTTP libraries, so consult the documentation for your HTTP library. Page 12
13 Be sure to document the procedure to install the certificate, since the certificate must be replaced every 2 years. 6.4 Protecting Your Certificate Your certificate file is used to authorise your requests to the Westpac server. Do not give your certificate file to anyone. Never your certificate in clear text. Always use a secure method to copy your certificate file to your server. 6.5 Upgrading Your Certificate Your certificate is valid for a maximum of 2 years. When your certificate is near expiry, you will be contacted by Westpac with details on how to get a new certificate file. The steps to install your new certificate will vary depending on your technology, so it is important to document this procedure for later use. Page 13
14 7 Appendix: File Transfer Protocol This section documents the HTTPS file transfer protocol for uploading and downloading files. Authentication is based on your client certificate and the IP address that your request comes from. 7.1 Uploading Files HTTP Request To upload a file, send a HTTPS POST to the following URL: You must choose a unique file name for each file you upload. To ensure uniqueness of file names, include the file type, date and a daily sequence number in the file name. An example upload HTTP request is shown below. Note that represents an ASCII carriage-return line-feed sequence. POST /services/messaging/rest/uploadedfiles/de _01.txt HTTP/1.1 Content-Type: application/octet-stream Host: ws.support.qvalent.com:443 Content-Length: 19 This is a test file Note that no special HTTP headers are required. You simply include the file name in the URL and the file contents in the HTTP request body HTTP Response The table below lists the possible HTTP status codes that can be returned. HTTP Status Code Meaning 202 Accepted The file has been accepted for processing. The file can still be rejected at a later time if it is malformed, but the file transfer has been successful. 400 Bad Request You have reused an old file name for a new file. You must use a unique file name for each file you upload. 403 Forbidden Either: You have not specified your client certificate correctly. Check your configuration. Or your request has come from an IP address that has not been registered in Westpac s system. 404 Not Found The file name you have specified is not acceptable. The file name may contain letters, numbers underscores, dashes and full stops. Retry your upload request with a different file name. 500 Internal Server Error 503 Service Unavailable The Westpac server has encountered an internal error. Retry the same upload request again later. You have tried to upload too many files at the same time. You should upload only one file at a time. Page 14
15 An example upload HTTP response is shown below. Note that represents an ASCII carriage-return line-feed sequence. HTTP/ Accepted Content-Length: 0 Date: Mon, 30 Aug :24:20 GMT Handling Errors If you receive a network error or HTTP 500 status when transmitting your file, you can simply run the same upload command again (re-using the same file name). This will never result in a duplicate file because Westpac will silently ignore duplicate files with the same name. If you receive any other error, it is likely a configuration issue you need to investigate based on the error message provided. 7.2 Listing Files for Download HTTP Request To get the list of files for download, send a HTTP GET to the following URL: You can choose the format of the file list using the HTTP Accept header as shown in the following table: HTTP Accept Header text/plain text/xml or application/xml Response Format The list of files is in plain text with each file name on a different line. If no files are available for download, the HTTP status code will be 204. If files are available for download, the HTTP status code will be 200. The list of files is in XML format as shown in the example in the next section. An example HTTP request is shown below where the file list is requested in plain text format: GET /services/messaging/rest/filesfordownload/ HTTP/1.1 Accept: text/plain Host: ws.support.qvalent.com:443 An example HTTP request is shown below where the file list is requested in XML format: GET /services/messaging/rest/filesfordownload/ HTTP/1.1 Accept: application/xml Host: ws.support.qvalent.com: HTTP Response The table below lists the possible HTTP status codes that can be returned. HTTP Status Code Meaning 200 OK The list of files for download is returned in the response body. 204 No Content No files are available for download (plain text only). Page 15
16 HTTP Status Code Meaning 403 Forbidden Either: You have not specified your client certificate correctly. Check your configuration. Or your request has come from an IP address that has not been registered in our system. 404 Not Found The URL in the request is incorrect. It should be /services/messaging/rest/filesfordownload/ 500 Internal Server Error The Westpac server has encountered an internal error. Retry the same request again later. An example plain text HTTP response is shown below. Note that represents an ASCII carriage-return line-feed sequence. HTTP/ OK Expires: 0 Pragma: no-cache Cache-Control: no-store, no-cache, must-revalidate, proxy-revalidate Content-Type: text/plain Date: Mon, 30 Aug :24:20 GMT Transfer-Encoding: chunked 16 File1.txt File2.txt 0 An example XML HTTP response is shown below. Note that represents an ASCII carriage-return line-feed sequence. HTTP/ OK Expires: 0 Pragma: no-cache Cache-Control: no-store, no-cache, must-revalidate, proxy-revalidate Content-Type: text/xml Date: Mon, 30 Aug :24:20 GMT Transfer-Encoding: chunked e8 <?xml version="1.0" encoding="utf-8"?> <downloadfilelist xmlns=" <file> <filename>file1.txt</filename> <filename>file2.txt</filename> </file> </downloadfilelist> Handling Errors Requesting the list of files for download does not change the server state in any way, so you can safely request the list as many times as you need to. If you receive a network error or HTTP 500 status when requesting the list, you can simply repeat the same request again. Page 16
17 If you receive any other error, it is likely a configuration issue you need to investigate based on the error message provided. 7.3 Downloading a File HTTP Request To download a file, select the file name from the list of files available for download and send a HTTP GET to the following URL: An example download HTTP request is shown below: GET /services/messaging/rest/filesfordownload/file1.txt HTTP/1.1 Host: ws.support.qvalent.com: HTTP Response The table below lists the possible HTTP status codes that can be returned. HTTP Status Code Meaning 200 OK The file contents are returned in the response body. 403 Forbidden Either: You have not specified your client certificate correctly. Check your configuration. Or your request has come from an IP address that has not been registered in our system. 404 Not Found The file name you specified no longer exists in the list of files available for download. 500 Internal Server Error The Westpac server has encountered an internal error. Retry the same download request again later. An example plain text HTTP response is shown below. Note that represents an ASCII carriage-return line-feed sequence. HTTP/ OK Expires: 0 Pragma: no-cache Cache-Control: no-store, no-cache, must-revalidate, proxy-revalidate Content-Type: application/octet-stream Date: Mon, 30 Aug :24:20 GMT Transfer-Encoding: chunked 13 This is a test file Handling Errors Downloading a file does not change the server state in any way, so you can safely download the file as many times as you need to. If you receive a network error or HTTP 500 status when downloading the file, you can simply repeat the same download request again. Page 17
18 If you receive any other error, it is likely a configuration issue you need to investigate based on the error message provided. 7.4 Deleting a File HTTP Request To delete a file from the list of files available for download, send a HTTP DELETE to the following URL: An example download HTTP request is shown below: DELETE /services/messaging/rest/filesfordownload/file1.txt HTTP/1.1 Host: ws.support.qvalent.com: HTTP Response The table below lists the possible HTTP status codes that can be returned. HTTP Status Code Meaning 204 No Content The file was deleted from the list successfully. 403 Forbidden Either: You have not specified your client certificate correctly. Check your configuration. Or your request has come from an IP address that has not been registered in our system. 404 Not Found The file name you specified is not valid. Ensure that the file name you are trying to delete was copied exactly from the list of files for download. 500 Internal Server Error The Westpac server has encountered an internal error. Retry the same delete request again later. An example delete HTTP response is shown below. Note that represents an ASCII carriage-return line-feed sequence. HTTP/ No Content Date: Mon, 30 Aug :24:20 GMT Transfer-Encoding: chunked Handling Errors If you receive a network error or HTTP 500 status, you can simply repeat the same delete request again. If the file has already been deleted, the server will ignore the delete request and return a HTTP 204 status. If you receive any other error, it is likely a configuration issue you need to investigate based on the error message provided. Page 18
19 8 Appendix: Westpac HTTPS addresses 8.1 Test Environment Upload File Files for Download List Download/Delete File Production Environment Upload File Files for Download List Download/Delete File Page 19
20 Appendix D FAQ Q) I execute the downloadfile.cmd and receive the following error: Curl: (22) The requested URL returned error: 502 A) The file you are trying to fetch may have a space in its name. Contact Westpac and ask them to check that there is no space in the filenames being fetched. Page 20
SOAP File Transfer. Specification
SOAP File Transfer Specification Version 1.4 1-Sep-2015 Date Version Description 18-Aug-2009 1.0 Original Version 30-Aug-2010 1.1 Added section on sample code 30-Jun-2011 1.2 Added FAQ section 03-Jul-2015
More informationThe HTTP protocol. Fulvio Corno, Dario Bonino. 08/10/09 http 1
The HTTP protocol Fulvio Corno, Dario Bonino 08/10/09 http 1 What is HTTP? HTTP stands for Hypertext Transfer Protocol It is the network protocol used to delivery virtually all data over the WWW: Images
More informationWeb Services User Guide
This document covers how to process XML Requests and Responses using the Secure Trading Web Services interface. Published: 28 March 2018 3.8 (a) Table of Contents 1 Introduction... 3 1.1 Required steps...
More informationConfiguring SSL. SSL Overview CHAPTER
CHAPTER 8 Date: 4/23/09 This topic describes the steps required to configure your ACE (both the ACE module and the ACE appliance) as a virtual Secure Sockets Layer (SSL) server for SSL initiation or termination.
More informationHow to Configure Authentication and Access Control (AAA)
How to Configure Authentication and Access Control (AAA) Overview The Barracuda Web Application Firewall provides features to implement user authentication and access control. You can create a virtual
More informationConfiguring SSL. SSL Overview CHAPTER
7 CHAPTER This topic describes the steps required to configure your ACE appliance as a virtual Secure Sockets Layer (SSL) server for SSL initiation or termination. The topics included in this section are:
More informationTroubleshooting Guide ir Advance Series
e Maintenance Troubleshooting Guide Last Revised 20/02/2013 Contents Introduction... 3 Possible Causes... 3 Models Supported by this Document... 3 Things to check... 4 How to check if the date, time and
More informationOracle Payment Interface Token Proxy Service Security Guide Release 6.1 E November 2017
Oracle Payment Interface Token Proxy Service Security Guide Release 6.1 E87635-01 November 2017 Copyright 2017, Oracle and/or its affiliates. All rights reserved. This software and related documentation
More informationOracle Hospitality OPERA Exchange Interface HTTP Communication Specification for Business Event XML Retrieval. October 2017
Oracle Hospitality OPERA Exchange Interface HTTP Communication Specification for Business Event XML Retrieval October 2017 Copyright 2008, 2017, Oracle and/or its affiliates. All rights reserved. This
More informationInternet Architecture. Web Programming - 2 (Ref: Chapter 2) IP Software. IP Addressing. TCP/IP Basics. Client Server Basics. URL and MIME Types HTTP
Web Programming - 2 (Ref: Chapter 2) TCP/IP Basics Internet Architecture Client Server Basics URL and MIME Types HTTP Routers interconnect the network TCP/IP software provides illusion of a single network
More informationConfiguring SSL CHAPTER
7 CHAPTER This chapter describes the steps required to configure your ACE appliance as a virtual Secure Sockets Layer (SSL) server for SSL initiation or termination. The topics included in this section
More information1-1. Switching Networks (Fall 2010) EE 586 Communication and. September Lecture 10
EE 586 Communication and Switching Networks (Fall 2010) Lecture 10 September 17 2010 1-1 Announcement Send me your group and get group ID HW3 (short) out on Monday Personal leave for next two weeks No
More informationBROADBEAN Administrators Guide to managing failures
BROADBEAN Administrators Guide to managing failures BROADBEAN TECHNOLOGY support@broadbean.com 020 7536 1668 www.broadbean.com The purpose of this guide is to help you manage the failure notifications
More informationCYAN SECURE WEB HOWTO. SSL Intercept
CYAN SECURE WEB HOWTO January 2009 Applies to: CYAN Secure Web 1.6 and above allows you to inspect SSL encrypted traffic. Therefore all filter mechanisms can be applied to HTTPS traffic. Without, all data
More informationWeb, HTTP and Web Caching
Web, HTTP and Web Caching 1 HTTP overview HTTP: hypertext transfer protocol Web s application layer protocol client/ model client: browser that requests, receives, displays Web objects : Web sends objects
More informationConfiguring Remote Access using the RDS Gateway
Configuring Remote Access using the RDS Gateway Author: AC, SNE Contents Introduction... 3 Pre-requisites... 3 Supported Operating Systems... 3 Installing the I.T. Services Certificate Authority Root Certificate...
More informationComputer Networks. Wenzhong Li. Nanjing University
Computer Networks Wenzhong Li Nanjing University 1 Chapter 8. Internet Applications Internet Applications Overview Domain Name Service (DNS) Electronic Mail File Transfer Protocol (FTP) WWW and HTTP Content
More informationCombating Common Web App Authentication Threats
Security PS Combating Common Web App Authentication Threats Bruce K. Marshall, CISSP, NSA-IAM Senior Security Consultant bmarshall@securityps.com Key Topics Key Presentation Topics Understanding Web App
More informationLecture 7b: HTTP. Feb. 24, Internet and Intranet Protocols and Applications
Internet and Intranet Protocols and Applications Lecture 7b: HTTP Feb. 24, 2004 Arthur Goldberg Computer Science Department New York University artg@cs.nyu.edu WWW - HTTP/1.1 Web s application layer protocol
More informationSecurity Guide Release 4.0
[1]Oracle Communications Session Monitor Security Guide Release 4.0 E89197-01 November 2017 Oracle Communications Session Monitor Security Guide, Release 4.0 E89197-01 Copyright 2017, Oracle and/or its
More informationConfiguring 802.1X Settings on the WAP351
Article ID: 5078 Configuring 802.1X Settings on the WAP351 Objective IEEE 802.1X authentication allows the WAP device to gain access to a secured wired network. You can configure the WAP device as an 802.1X
More informationManaging Certificates
CHAPTER 12 The Cisco Identity Services Engine (Cisco ISE) relies on public key infrastructure (PKI) to provide secure communication for the following: Client and server authentication for Transport Layer
More informationnew world ERP Server Migration Checklist New World ERP TMS
new world ERP Server Migration Checklist Revised 2/20/17 Table of Contents Overview... 3 Document and Build Environments... 4 Test the New Servers... 7 Cut Over to New Servers... 8 Appendix A: Server Documentation
More informationSolibri Solution Center Guide for Account Administrators
Guide for Account Administrators Copyright 2016 Solibri, Inc. Content... 1 1 Terminology... 2 2 Accessing the... 4 2.1 Account Registration... 4 2.1.1 New Customer... 4 2.1.2 Existing Customer with Known
More informationScan Report Executive Summary
Scan Report Executive Summary Part 1. Scan Information Scan Customer Company: Date scan was completed: Vin65 ASV Company: Comodo CA Limited 08/28/2017 Scan expiration date: 11/26/2017 Part 2. Component
More informationNasuni Data API Nasuni Corporation Boston, MA
Nasuni Corporation Boston, MA Introduction The Nasuni API has been available in the Nasuni Filer since September 2012 (version 4.0.1) and is in use by hundreds of mobile clients worldwide. Previously,
More informationGatesms.eu Mobile Solutions for Business
TECHNICAL SPECIFICATIONS XML Web API GATESMS.EU, version 1.1 Prepared by: Gatesms.eu Contents Document version history...3 Security...3 General requirements...3 HTTP transmission security mechanism...3
More informationCMSC 332 Computer Networking Web and FTP
CMSC 332 Computer Networking Web and FTP Professor Szajda CMSC 332: Computer Networks Project The first project has been posted on the website. Check the web page for the link! Due 2/2! Enter strings into
More informationConfiguring Cisco Unity and Unity Connection Servers
CHAPTER 6 Configuring Cisco Unity and Unity Connection Servers Cisco Unity Servers Cisco Unity receives calls, plays greetings, and records and encodes voicemail. When a voicemail is received, Cisco Unity
More informationCompliance with RFC 3261
APPENDIX A Compliance with RFC 3261 This appendix describes how the Cisco Unified IP Phone 7960G and 7940G complies with the IETF definition of SIP as described in RFC 3261. It contains compliance information
More informationNasuni Data API Nasuni Corporation Boston, MA
Nasuni Corporation Boston, MA Introduction The Nasuni API has been available in the Nasuni Filer since September 2012 (version 4.0.1) and is in use by hundreds of mobile clients worldwide. Previously,
More informationHow to work with HTTP requests and responses
How a web server processes static web pages Chapter 18 How to work with HTTP requests and responses How a web server processes dynamic web pages Slide 1 Slide 2 The components of a servlet/jsp application
More informationSecure Web Appliance. SSL Intercept
Secure Web Appliance SSL Intercept Table of Contents 1. Introduction... 1 1.1. About CYAN Secure Web Appliance... 1 1.2. About SSL Intercept... 1 1.3. About this Manual... 1 1.3.1. Document Conventions...
More informationProgramming basics Integration Guide. Version 6.2.1
Programming basics Integration Guide Version 6.2.1 As of: 04.10.2016 Table of Contents Programming... 4 Merchant Interface variants... 4 Security: Payment Card Industry Data Security Standard (PCI DSS)...
More informationInternet Script Editor
ISE Application, page 1 ISE Functionality, page 1 ISE Requirements, page 2 TLS Requirements for ISE, page 2 ISE Installation and Upgrades, page 5 Troubleshooting Tools for, page 7 ISE Application You can
More informationHow to Set Up External CA VPN Certificates
To configure a client-to-site, or site-to-site VPN using s created by External CA, you must create the following VPN s for the VPN service to be able to authenticate Before you begin Use an external CA
More informationEnhancements Added support for VLProxy thread dumps in support bundles. Requires VersaLex or later.
* RELEASE 2.9-2011/11/14 * - Added support for VLProxy thread dumps in support bundles. Requires VersaLex 4.3.42 or later. - VLProxy takes approximately 90 seconds to recognize that a VLTrader has abnormally
More informationSophos Mobile as a Service
startup guide Product Version: 8 Contents About this guide... 1 What are the key steps?... 2 Change your password... 3 Change your login name... 4 Activate Mobile Advanced licenses...5 Check your licenses...6
More informationOracle Fusion Middleware
Oracle Fusion Middleware Quick Installation Guide for Oracle Identity Management 11g Release 1 (11.1.1) E10033-01 May 2009 This guide is designed to help you quickly install the most common Oracle Identity
More informationSystem Administration
Most of SocialMiner system administration is performed using the panel. This section describes the parts of the panel as well as other administrative procedures including backup and restore, managing certificates,
More informationInstall Certificate on the Cisco Secure ACS Appliance for PEAP Clients
Install Certificate on the Cisco Secure ACS Appliance for PEAP Clients Document ID: 64067 Contents Introduction Prerequisites Requirements Components Used Conventions Microsoft Certificate Service Installation
More informationCopyright 2017 Softerra, Ltd. All rights reserved
Copyright 2017 Softerra, Ltd. All rights reserved Contents Introduction Security Considerations Installation Configuration Uninstallation Automated Bulk Enrollment Troubleshooting Introduction Adaxes Self-Service
More informationEtasoft XT Server 1.x
Etasoft XT Server 1.x XT Server is a set of tools for automated data translation, validation and file processing. Setup Install software using setup program xtserver_setup.exe. Package contains both GUI
More informationUSER GUIDELINES. Q 2. Is it necessary to configure password retrieval question and answer? How can I do that? Q 3. How can I change password?
USER GUIDELINES Revision 1.8 20 August, 2015 Q 1. How can I log into my webmail? Q 2. Is it necessary to configure password retrieval question and answer? How can I do that? Q 3. How can I change password?
More informationCNIT 129S: Securing Web Applications. Ch 3: Web Application Technologies
CNIT 129S: Securing Web Applications Ch 3: Web Application Technologies HTTP Hypertext Transfer Protocol (HTTP) Connectionless protocol Client sends an HTTP request to a Web server Gets an HTTP response
More informationScan Report Executive Summary
Scan Report Executive Summary Part 1. Scan Information Scan Customer Company: Date scan was completed: Vin65 ASV Company: Comodo CA Limited 11/20/2017 Scan expiration date: 02/18/2018 Part 2. Component
More informationCisco Threat Intelligence Director (TID)
The topics in this chapter describe how to configure and use TID in the Firepower System. Overview, page 1 Using TID Sources to Ingest Feed Data, page 6 Using Access Control to Publish TID Data and Generate
More informationTroubleshooting CHAPTER
CHAPTER 10 This chapter provides information for diagnosing and correcting common problems that may occur when you install and operate the client adapter. The following topics are covered in this chapter:
More informationHighwinds CDN Content Protection Products. August 2009
Highwinds CDN Content Protection Products August 2009 1 Highwinds CDN Content Protection Products August 2009 Table of Contents CDN SECURITY INTRO... 3 CONTENT PROTECTION BY CDN DELIVERY PRODUCT... 3 HTTP
More informationCisco Plug and Play Feature Guide Cisco Services. Cisco Plug and Play Feature Guide Cisco and/or its affiliates.
Cisco Services TABLE OF CONTENTS Configuring Cisco Plug and Play... 14 Contents Introduction... 3 Cisco Plug and Play Components... 3 Plug-n-Play Agent... 3 Key Benefits... 4 Plug and Play Server... 4
More informationeroaming platform Secure Connection Guide
eroaming platform Secure Connection Guide Contents 1. Revisions overview... 3 2. Abbrevations... 4 3. Preconditions... 5 3.1. OpenSSL... 5 3.2. Requirements for your PKCS10 CSR... 5 3.3. Java Keytool...
More informationRESTFUL WEB SERVICES - INTERVIEW QUESTIONS
RESTFUL WEB SERVICES - INTERVIEW QUESTIONS http://www.tutorialspoint.com/restful/restful_interview_questions.htm Copyright tutorialspoint.com Dear readers, these RESTful Web services Interview Questions
More informationCOMPUTER NETWORKS AND COMMUNICATION PROTOCOLS. Web Access: HTTP Mehmet KORKMAZ
COMPUTER NETWORKS AND COMMUNICATION PROTOCOLS Web Access: HTTP 16501018 Mehmet KORKMAZ World Wide Web What is WWW? WWW = World Wide Web = Web!= Internet Internet is a global system of interconnected computer
More informationTACHO ONLINE API. TUNGVOGNSSPECIALISTEN APS Københavnsvej 265, DK-4000 Roskilde
2018 TACHO ONLINE API TUNGVOGNSSPECIALISTEN APS Københavnsvej 265, DK-4000 Roskilde CONTENT What s new?... 5 Tacho activities... 5 Welcome... 5 More information... 5 Terminology... 5 TVS... 5 Tacho Online...
More informationAspera Connect Windows XP, 2003, Vista, 2008, 7. Document Version: 1
Aspera Connect 2.6.3 Windows XP, 2003, Vista, 2008, 7 Document Version: 1 2 Contents Contents Introduction... 3 Setting Up... 4 Upgrading from a Previous Version...4 Installation... 4 Set Up Network Environment...
More informationThe CartIt Commerce System Installation Guide
The CartIt Commerce System Installation Guide On Windows Operating Systems Version 8.0 February 3, 2003 Copyright 2001 CartIt Corporation. All Rights Reserved. Page 1 of 10 THE CART IT COMMERCE SYSTEM
More informationAppDirector and AppXcel With Oracle Application Server 10g Release 3 ( ) - Oracle SOA Suite Enterprise Deployment
AppDirector, AppXcel with Oracle SOA Suite 7/16/2008 TESTING & INTEGRATION GROUP AppDirector and AppXcel With Oracle Application Server 10g Release 3 (10.1.3.1.0) - Oracle SOA Suite Enterprise Deployment
More informationOracle Hospitality OPERA Exchange Interface Communication Vendor Specification. October 2017
Oracle Hospitality OPERA Exchange Interface Communication Vendor Specification October 2017 Copyright 1987, 2017, Oracle and/or its affiliates. All rights reserved. This software and related documentation
More informationDRAFT COPY
Inter-Entity Payment Protocol (IPP) The Inter-Entity Payment Protocol (IPP) facilitates adhoc interactions between independent accounting systems on the web. It is a server-to-server protocol. 1 Brands,
More informationAustralia Online Forms for Research Software User Manual
Australia Online Forms for Research Software User Manual Version 1.3 Released 21 August 2010 2 P a g e A u s t r a l i a O n l i n e F o r m s f o r R e s e a r c h Contents 1. Introduction 5 2. Getting
More informationOracle Payment Interface Oracle Hospitality Simphony FE MGDH Installation Guide Release E April 2017
Oracle Payment Interface Oracle Hospitality Simphony FE MGDH Installation Guide Release 6.1.1 E85861-01 April 2017 Copyright 2010, 2017, Oracle and/or its affiliates. All rights reserved. This software
More informationInstall and upgrade Qlik Sense. Qlik Sense 3.2 Copyright QlikTech International AB. All rights reserved.
Install and upgrade Qlik Sense Qlik Sense 3.2 Copyright 1993-2017 QlikTech International AB. All rights reserved. Copyright 1993-2017 QlikTech International AB. All rights reserved. Qlik, QlikTech, Qlik
More informationSIP Compliance APPENDIX
APPENDIX E This appendix describes Cisco SIP proxy server (Cisco SPS) compliance with the Internet Engineering Task Force (IETF) definition of Session Initiation Protocol (SIP) as described in the following
More informationInformation About SIP Compliance with RFC 3261
APPENDIX A Information About SIP Compliance with RFC 3261 This appendix describes how the Cisco SIP IP phone complies with the IETF definition of SIP as described in RFC 3261. It has compliance information
More informationHelp Document Series: Connecting to your Exchange mailbox via Outlook from off-campus
Help Document Series: Connecting to your Exchange mailbox via Outlook from off-campus This document will take you through setting up your Clark Exchange mailbox in Outlook 2003 from off-campus. This will
More informationNetwork Working Group Internet Draft: SMTP Authentication Document: draft-myers-smtp-auth-00.txt April SMTP Service Extension for Authentication
HTTP/1.1 200 OK Date: Tue, 09 Apr 2002 10:24:33 GMT Server: Apache/1.3.20 (Unix) Last-Modified: Mon, 01 May 1995 22:00:00 GMT ETag: "361c6c-32a5-2fa559e0" Accept-Ranges: bytes Content-Length: 12965 Connection:
More informationDTrade Frequently Asked Questions (FAQs)
DTrade Frequently Asked Questions (FAQs) BASIC USE Q: I m new to DTrade. Where can I find information on how to start using DTrade? A: The DTrade Information Center web page is accessible via the DDTC
More informationScan Report Executive Summary. Part 2. Component Compliance Summary Component (IP Address, domain, etc.):
Scan Report Executive Summary Part 1. Scan Information Scan Customer Company: Date scan was completed: Vin65 ASV Company: Comodo CA Limited 02/18/2018 Scan expiration date: 05/19/2018 Part 2. Component
More informationREST. Lecture BigData Analytics. Julian M. Kunkel. University of Hamburg / German Climate Computing Center (DKRZ)
REST Lecture BigData Analytics Julian M. Kunkel julian.kunkel@googlemail.com University of Hamburg / German Climate Computing Center (DKRZ) 11-12-2015 Outline 1 REST APIs 2 Julian M. Kunkel Lecture BigData
More informationInstallation guide for Choic Multi User Edition
Installation guide for ChoiceMail Multi User Edition March, 2004 Version 2.1 Copyright DigiPortal Software Inc., 2002 2004 All rights reserved ChoiceMail Multi User Installation Guide 1. Go to the URL
More informationVendor Interface Specification
Connecticut XIX HIPAA Translator Vendor Interface Specification DXC Technology 195 Scott Swamp Road Farmington, CT 06032, USA Page 1 of 31 Version 4.0 -- Approval Date November April 10, 2017 Table of
More informationSophos Mobile in Central
startup guide Product Version: 8.1 Contents About this guide... 1 What are the key steps?... 2 Activate Mobile Advanced licenses... 3 Configure settings... 4 Configure personal settings...4 Configure technical
More informationIntegration Architecture Of SDMS
Integration Architecture Of SDMS 20 May 2017 Version 1.0 (Rakesh Ranjan, Consultant-IT) Table of Content 1 ABOUT SDMS...2 2 OBJECTIVE & STRUCTURE OF THIS DOCUMENT...2 3 TRANSACTIONAL SERVICES...3 3.1 HIGH
More informationAccella Toolbar. User Guide. Release 20.0
Accella Toolbar User Guide Release 20.0 Table of Contents 2 Introduction... 9 2.1 About Accella Toolbar... 9 2.2 About This Guide... 9 2.3 Accessing Toolbar... 9 2.4 First Time Login... 10 2.5 Subsequent
More informationCONFIGURATION MANUAL. English version
CONFIGURATION MANUAL English version Frama F-Link Configuration Manual (EN) All rights reserved. Frama Group. The right to make changes in this Installation Guide is reserved. Frama Ltd also reserves the
More informationTelephony Toolbar Enterprise. User Guide
Telephony Toolbar Enterprise User Guide Release 4.4 October 2009 Table of Contents 1 Summary of Changes... 7 1.1 Changes for this Release... 7 2 About This Guide... 8 2.1 Open Telephony Toolbar-Corporate...
More informationBEAAquaLogic. Service Bus. MQ Transport User Guide
BEAAquaLogic Service Bus MQ Transport User Guide Version: 3.0 Revised: February 2008 Contents Introduction to the MQ Transport Messaging Patterns......................................................
More informationCONTENTS IN DETAIL INTRODUCTION 1 THE FAQS OF LIFE THE SCRIPTS EVERY PHP PROGRAMMER WANTS (OR NEEDS) TO KNOW 1 2 CONFIGURING PHP 19
CONTENTS IN DETAIL INTRODUCTION xiii 1 THE FAQS OF LIFE THE SCRIPTS EVERY PHP PROGRAMMER WANTS (OR NEEDS) TO KNOW 1 #1: Including Another File as a Part of Your Script... 2 What Can Go Wrong?... 3 #2:
More informationTOA4 Remote Procedure Call (RPC) API
TOA4 Remote Procedure Call (RPC) API Introduction The purpose of the TOA4 RPC API is to allow external software applications to exchange data with TOA4 and activate certain TOA4 functions. The TOA4 RPC
More informationDCCKI Interface Design Specification. and. DCCKI Repository Interface Design Specification
DCCKI Interface Design Specification and DCCKI Repository Interface Design Specification 1 INTRODUCTION Document Purpose 1.1 Pursuant to Section L13.13 of the Code (DCCKI Interface Design Specification),
More informationReconfiguring VMware vsphere Update Manager. 17 APR 2018 VMware vsphere 6.7 vsphere Update Manager 6.7
Reconfiguring VMware vsphere Update Manager 17 APR 2018 VMware vsphere 6.7 vsphere Update Manager 6.7 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/
More informationMicrosoft OWA 2013 IIS Integration
Microsoft OWA 2013 IIS Integration Contents 1 Introduction 2 Compatibility 3 Prerequisites 4 File Downloads 5 Architecture 6 Installation 6.1 Software Installation 6.2 Configuration of the IIS Filter 6.2.1
More informationWWW: the http protocol
Internet apps: their protocols and transport protocols Application e-mail remote terminal access Web file transfer streaming multimedia remote file Internet telephony Application layer protocol smtp [RFC
More informationConfiguring Virtual Servers
3 CHAPTER This section provides an overview of server load balancing and procedures for configuring virtual servers for load balancing on an ACE appliance. Note When you use the ACE CLI to configure named
More informationHeader Status Codes Cheat Sheet
Header Status Codes Cheat Sheet Thanks for downloading our header status codes cheat sheet! Below you ll find all the header status codes and their meanings. They are organized by sections, starting with
More informationSophos Mobile Control SaaS startup guide. Product version: 7
Sophos Mobile Control SaaS startup guide Product version: 7 Contents 1 About this guide...4 2 About Sophos Mobile Control...5 3 What are the key steps?...7 4 Change your password...8 5 Change your login
More informationvcloud Director User's Guide
vcloud Director 5.6 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of
More informationDestiny Library Manager
Destiny Library Manager Setting Up One Search Your teachers and students can take advantage of your school s subscription databases all in one place through Destiny One Search. One Search saves staff and
More informationEasy UI Solution 2.1 Installation Guide
Easy UI Solution 2.1 Installation Guide Thank you for selecting our product. This guide is intended for System Administrators, and describes how to install Easy UI Solution 2.1 (hereafter referred to as
More informationCisco Prime Optical 9.5 Basic External Authentication
Cisco Prime Optical 9.5 Basic External Authentication June 6, 2012 This document describes the basic external authentication functionality in Cisco Prime Optical 9.5 running on a Solaris server. External
More informationOracle Communications WebRTC Session Controller
Oracle Communications WebRTC Session Controller Security Guide Release 7.0 E40975-01 November 2013 Oracle Communications WebRTC Session Controller Security Guide, Release 7.0 E40975-01 Copyright 2013,
More informationOracle Fusion Middleware
Oracle Fusion Middleware Using Oracle Eloqua Cloud Adapter Release 12.2.1.1.0 E73562-01 June 2016 Oracle Fusion Middleware Using Oracle Eloqua Cloud Adapter, Release 12.2.1.1.0 E73562-01 Copyright 2015,
More informationContents. SSL-Based Services: HTTPS and FTPS 2. Generating A Certificate 2. Creating A Self-Signed Certificate 3. Obtaining A Signed Certificate 4
Contents SSL-Based Services: HTTPS and FTPS 2 Generating A Certificate 2 Creating A Self-Signed Certificate 3 Obtaining A Signed Certificate 4 Enabling Secure Services 5 SSL/TLS Security Level 5 A Note
More informationKYOCERA Net Admin User Guide
KYOCERA Net Admin User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable
More informationHow SMART (Secure Malware Alert and Removal Tool) Works
FAQ How SMART (Secure Malware Alert and Removal Tool) Works 1. SMART downloads a copy of the files from your server to ours. 2. SMART scans a file for any malicious code on our end. 3. From here, there
More informationKernel Migrator. for SharePoint. Configuration Guide
Kernel Migrator for SharePoint Table of Contents 1. System Requirements... 4 1.1 Minimum System Requirements... 4 1.2 Required Operating Systems... 4 1.3 Supported Virtual Environment... 4 1.4 Supported
More informationCrystal Enterprise. Overview. Contents. Web Server Overview - Internet Information System (IIS)
Overview Contents This document provides an overview to web server technology particularly Microsoft s Internet Information Server (IIS) and its relationship with. Although this article has been written
More informationUsing SSL to Secure Client/Server Connections
Using SSL to Secure Client/Server Connections Using SSL to Secure Client/Server Connections, page 1 Using SSL to Secure Client/Server Connections Introduction This chapter contains information on creating
More informationCisco Threat Intelligence Director (TID)
The topics in this chapter describe how to configure and use TID in the Firepower System. Overview, page 1 Requirements for Threat Intelligence Director, page 4 How To Set Up, page 6 Analyze TID Incident
More informationAspera Connect Mac: OS X 10.6, 10.7, 10.8, Revision: Generated: 11/11/ :29
Aspera Connect 3.5.2 Mac: OS X 10.6, 10.7, 10.8, 10.9. 10.10 Revision: 3.5.2.95905 Generated: 11/11/2014 17:29 Contents 2 Contents Introduction... 3 System Requirements... 4 Setting up Connect... 5 Part
More information