Web Services User Guide

Size: px
Start display at page:

Download "Web Services User Guide"

Transcription

1 This document covers how to process XML Requests and Responses using the Secure Trading Web Services interface. Published: 28 March (a)

2 Table of Contents 1 Introduction Required steps Pre-Requisites Internet Merchant Account Secure Trading Account PCI Accreditation MyST Configuration Configure your server Firewall Secure Connection Load Balancing Timeouts XML Code Construct XML Request Listen for XML Response from Secure Trading Testing Test site reference Sending a request Troubleshooting Authorization Required Malformed XML error ( ) Going Live Notifications and Redirects for Live Site Reference Update your XML Requests Contact Secure Trading Further Information and Support Secure Trading Support Secure Trading Sales Useful Documents Frequently Asked Questions Appendix Downloadable Java Example Secure Trading Limited March 2018 Page 2 / 17

3 1 Introduction Secure Trading Web Services is for merchants who want to use their own secure servers, but wish to use Secure Trading s payment network as part of their own ecommerce application. The Web Services interface allows merchants to submit a request to Secure Trading using a client program, providing a username and password for authentication. Web Services offers similar functionality to the STAPI client interface, but does not require the STAPI Java client to be installed on your server. Using Secure Trading Web Services you can: 1.1 Required steps Automate refunds and authorisation reversals, and control the settlement schedule for each transaction. Have development capability and write applications that can process payments. Integrate a payment solution into back-office or legacy systems. Before you can begin processing live transactions using Web Services, please complete the steps listed below. These are to ensure requests are sent securely and reliably: (You can begin testing before these steps are completed.) Obtain Internet merchant account See section 2.1 Sign up for Secure Trading account See section 2.2 Ensure you are PCI accredited when handling card details on your servers See section 2.3 Register Web Services user on MyST See section 3 Open your firewall for Secure Trading s IP ranges See section 4.1 Use SSL for connections and check certificates against up-to-date CRL See section 4.2 Configure your system to work with Secure Trading s load-balancer See section 4.3 Implement timeouts handling See section 4.4 Construct an XML Request See section 5.1 Listen for an XML Response See section 5.2 Perform test transactions See section 6 Go live See section 8 To demonstrate how Web Services can be implemented on your system, a Java code example can be downloaded, which submits an XML Request to Secure Trading and listens for and displays the XML Response. See section Secure Trading Limited March 2018 Page 3 / 17

4 2 Pre-Requisites The pre-requisites that you will need to complete in order to begin processing payments through Secure Trading Payment Platform (STPP) are outlined in this section of the document. 2.1 Internet Merchant Account An Internet Merchant Account is required if you would like to process online transactions. Secure Trading have relationships in place with certain acquirers and will therefore be able to assist you. For contact details of our sales team, please refer to section Secure Trading Account In order to process transactions through Secure Trading s servers, you will need to have an account with us and a site reference. You are provided with two Secure Trading site references when you sign up (one for live transactions and another for test purposes) and these are used to uniquely identify your account when you submit any data to Secure Trading. It should also be quoted in any correspondence with Secure Trading. Site references consist of an alphanumeric string (usually including your company name) which is unique to your account. When referencing a site reference, you will need to be aware it is case sensitive. You will also be provided with a MyST username and password to allow you to perform certain management tasks on your account. For more information on becoming a Secure Trading merchant, please contact our Sales team (see section 9.2). If you already have a Secure Trading account, but do not know your site reference, please contact our support team (see section 9.1). If you do need to contact Secure Trading support, please be aware that for security reasons we may only speak to an authorised contact of the account. 2.3 PCI Accreditation When card details are handled on your servers, you will be required to undertake a form of PCI accreditation, which will differ depending on the size of your company and the volume of transactions that are processed by your system. For more information on PCI accreditation, please visit: Care must be taken to ensure that sensitive information remains secure on your server. It is recommended that you do not store credit card details on your server. Secure Trading Limited March 2018 Page 4 / 17

5 3 MyST Configuration Sign in to MyST and add a user with role Webservices to your account. 1. Navigate to Sign in using your provided username & password. 2. Click Add new username from the left side-menu. 3. Fill in the fields shown (all required). Ensure you select Webservices for the role. Please note that Web Services usernames are addresses that can have a maximum length of 255 (maximum of 64 characters before symbol). Valid IP/network(s) field In the interest of security, you are required to enter your system s IP (or range of IPs) in this field. Secure Trading will only accept Web Services requests originating from this IP. This means that even if your Web Services credentials have been compromised, requests cannot be performed without access to your IP network. Multiple IP addresses can be separated with either a semicolon (;) or a comma (,). Ranges of IPs may be specified by using a netmask in the format /8. Role if invalid IP must be set to Prevent login. 4. Allocate the sites through which you wish to process Web Services payments, by clicking the green arrows next to the corresponding sites and ensuring they move from the Available column to the Allocated column. 5. Click Save. Adding users is described in further detail in the MyST User Guide. Secure Trading Limited March 2018 Page 5 / 17

6 4 Configure your server 4.1 Firewall You may need to open your firewall for Secure Trading s IP Ranges. Current IP Ranges can be viewed at Secure Connection It is imperative that any connections between your server and Secure Trading Web Services are properly authenticated and encrypted. Secure Trading use industry standard high-strength TLS encryption. We recommend that you use an up-to-date SSL/TLS library implementation for your chosen language. You should ensure it has the following capabilities: TLSv1.0 or higher capabilities (use TLSv1.1 or TLSv1.2 if available). Server authentication must be performed by validating a certificate chain up to a known, trusted Certificate Authority (see below). Server authentication must check the Common Name (CN) of the server certificate matches the domain to which you are connecting. If the Common Name does not match, you are not connected to Secure Trading and the connection MUST be rejected. Server authentication must be performed on the expiry date of the server certificate. Any expired certificates MUST be rejected. It is imperative that you check all SSL certificates against an up-to-date certificate revocation list (CRL). Your library and code base must be maintained and you must regularly update to the latest security patches and/or features. Secure Trading uses the Verisign Certificate Authority to sign all certificates. Your SSL/TLS library must be configured to trust all Verisign certificates: Your SSL/TLS policy should include reviewing and updating these Certificate Authorities on a regular basis (e.g. once a year). Validating a chain to a trusted Certificate Authority means your implementation will not need any changes when Secure Trading regularly updates server certificates. In particular you should NOT verify using a single certificate fingerprint, as this will require updating whenever the server certificate is updated and will not work if our distributed system provides different individual certificates. (More information on Certificate Authorities can be found at although this should not be necessary to integrate with Secure Trading Web Services). Most SSL/TLS library implementations will fulfil all the above requirements but may need to be configured to enable them. It is your responsibility to ensure that all such security requirements are correctly enabled; otherwise the security of the connections may be compromised. It is also your responsibility to ensure the operating system and software used for connections is kept up to date with security patches. If you are in any doubt of the ability of your application to perform all of the aforementioned DNS and SSL/TLS requirements, Secure Trading recommends you instead use the STAPI client, which fulfils all these requirements. Secure Trading Limited March 2018 Page 6 / 17

7 4.3 Load Balancing Secure Trading employs DNS load balancing. DNS load balancing is designed to return a single IP, which will be the preferred destination for your server to connect to at that moment in time. In addition to returning a single IP, the DNS load balancers will return a low TTL, currently set to less than 60 seconds. This TTL has been deliberately kept low in order to maximize your server s exposure to the entire payment system. Increasing this TTL would reduce this exposure, meaning you will utilise one IP for a prolonged period of time. Any issues that could occur (scheduled or otherwise) will then impact on your payment processing capabilities. It is imperative that you adhere to the TTL set by Secure Trading and refresh your DNS entries when the TTL expires and connect to the newly returned IP. Secure Trading has a number of DNS servers used to serve DNS records. It is important that your server includes all of these servers for DNS lookups. If you receive a DNS look up failure when communicating with a DNS server, the other DNS servers must then be used. Failure to utilise all DNS servers may cause DNS problems when trying to resolve payment system URLs. It is recommended to include DNS lookups to securetrading.net in your application to continuously obtain the current list of DNS servers available. From a debug perspective, you can execute the following command to obtain the current list of DNS servers available: Windows: nslookup -type=ns securetrading.net Linux: dig NS securetrading.net 4.4 Timeouts In the unlikely event that your system encounters problems when connecting to Secure Trading, it is recommended that you implement appropriate timeouts for your solution. Consider this example: maximum retry number 20 maximum retry timeout 40 seconds maximum connect attempt timeout 5 seconds send and receive timeout 60 seconds Retry until: The maximum retry number is exceeded; OR The maximum retry timeout would be exceeded by another connection attempt. (This means stop retrying the connection after seconds, as an attempt that takes the maximum connect attempt timeout of 5 seconds would cause the maximum retry timeout to be exceeded) Once the connection is established, allow 60 seconds (the send and receive timeout value) to send and receive the data before closing the connection. If for any reason the connection terminates after data has started to be transferred, we do not recommend retrying the request. The timeout implementation suggested above is an example solution. You will need to consider the requirements of your own application and implement timeouts that best suit your needs. Secure Trading Limited March 2018 Page 7 / 17

8 5 XML Code 5.1 Construct XML Request After configuring your Secure Trading account and your server, you can submit XML Requests to the Web Services interface by submitting an SSL POST request to: All Secure Trading Web Services Requests must be performed using HTTPS. See section 4.2. To demonstrate how Web Services can be implemented on your system, a Java code example can be downloaded, which submits an XML Request to Secure Trading and listens for and displays the XML Response. See section Headers The HTTPS Requests sent to Secure Trading need to begin with a series of headers as defined in this section of the document. These are used by Secure Trading to identify and manage incoming requests. A full example of a request including the XML and headers can be found in section The HTTPS headers must include the following: Content-Type: text/xml;charset=utf-8 Content-Length: <LENGTH OF POST> Accept: text/xml Accept-Encoding: gzip Authorization: <BASIC AUTH CREDENTIALS HERE> User-Agent: <YOUR SOFTWARE VERSION HERE> Host: webservices.securetrading.net Connection: close Content-Type Content-Type will always be set as text/xml. charset must be the charset of the post, for example utf Content-Length Content-Length must be the length of the XML bytes in the chosen charset. This must be calculated after any character encoding has been performed Accept Accept will always be set as text/xml. Secure Trading Limited March 2018 Page 8 / 17

9 Accept-Encoding Accept-Encoding should be set as gzip. This will compress the response, providing your client supports this functionality. Please note that most Web Services clients will support gzip encoding. The response will be encoded with gzip and your client will need to decode this. Please check with your client software provider for further information Authorization Basic access authentication is a method for a web browser client program to provide a username and password when making a request. You must include your username and password, separated by a colon and base64 encoded in the authorisation header when performing the request. For example: Username: webservices@example.com Password: pa55word Separated by a colon: webservices@example.com:pa55word Base64 encode: d2vic2vydmljzxnazxhhbxbszs5jb206cge1nxdvcmq= Base64 encode and decode example The following is an example in Python to encode webservices@example.com:pa55word in base64. Some languages support base64 natively, however you may need to use a third-party encoder. import base64 encoded = base64.b64encode('webservices@example.com:pa55word') print encoded #'d2vic2vydmljzxnazxhhbxbszs5jb206cge1nxdvcmq=' decoded = base64.b64decode('d2vic2vydmljzxnazxhhbxbszs5jb206cge1nxdvcmq=') print decoded #'webservices@example.com:pa55word' Once encoded, you would pass the encoded string in the HTTPS header, as follows: Authorization: Basic d2vic2vydmljzxnazxhhbxbszs5jb206cge1nxdvcmq= Secure Trading Limited March 2018 Page 9 / 17

10 User-Agent User-Agent will contain the name/version of your system s application software. E.g. A web browser s user agent will look similar to the following: Mozilla/5.0 (X11; U; Linux i686; en-us; rv: ) Gecko/ Ubuntu/7.10 (gutsy) Firefox/ Host Host will always be set as webservices.securetrading.net Connection Connection must be set to close. This ensures requests continue successfully during maintenance windows. The setting keep-alive is not supported by this service XML The headers are followed by XML that instructs STPP (Secure Trading Payment Platform) to perform certain actions (e.g. seek authorisation for a transaction). Full XML examples can be found in: The XML Specification document and other XML documentation on Secure Trading s website. The downloadable directory of XML examples, hosted by Secure Trading: Secure Trading Limited March 2018 Page 10 / 17

11 5.1.3 Example of HTTPS Request to Secure Trading The following is an example of a complete HTTPS request, including the headers described in section and XML outlined in section 5.1.2, using the site reference test_site12345, with the username webservices@securetrading.com and password password. Please note for the XML Requests processed using Web Services, the <alias> tag will be your Web Services username. POST /xml/ HTTP/1.0 Content-Type: text/xml;charset=utf-8 Content-Length: 839 Accept: text/xml Accept-Encoding: gzip Authorization: <BASIC AUTH CREDENTIALS HERE> User-Agent: <YOUR SOFTWARE VERSION HERE> Host: webservices.securetrading.net Connection: close <requestblock version="3.67"> <alias>webservices@securetrading.com</alias> <request type="auth"> <operation> <sitereference>test_site12345</sitereference> <accounttypedescription>ecom</accounttypedescription> </operation> <merchant> <orderreference>example AUTH</orderreference> <termurl> <name>test Merchant</name> </merchant> <customer> <ip> </ip> </customer> <billing> <amount currencycode="gbp">2115</amount> <town>bangor</town> <country>gb</country> <payment type="visa"> <expirydate>10/2031</expirydate> <pan> </pan> <securitycode>123</securitycode> </payment> </billing> <settlement/> </request> </requestblock> The structure of XML Requests to be sent to Secure Trading is described in the XML Specification document All Secure Trading documents can be found on our website. Secure Trading Limited March 2018 Page 11 / 17

12 5.2 Listen for XML Response from Secure Trading Secure Trading will respond to all valid requests it receives from merchants. The following is an example of an XML Response sent by Secure Trading (encoded in UTF-8 character encoding): <?xml version='1.0' encoding='utf-8'?> <responseblock version="3.67"> <requestreference>x </requestreference> <response type="auth"> <merchant> <merchantname>test Merchant</merchantname> <orderreference>example AUTH</orderreference> <tid> </tid> <merchantnumber> </merchantnumber> <merchantcountryiso2a>gb</merchantcountryiso2a> </merchant> <transactionreference> </transactionreference> <timestamp> :47:17</timestamp> <acquirerresponsecode>00</acquirerresponsecode> <operation> <accounttypedescription>ecom</accounttypedescription> </operation> <settlement> <settleduedate> </settleduedate> <settlestatus>0</settlestatus> </settlement> <billing> <amount currencycode="gbp">2115</amount> <payment type="visa"> <issuer>securetrading Test Issuer1</issuer> <pan>411111######1111</pan> <issuercountry>us</issuercountry> </payment> <dcc enabled="0"/> </billing> <authcode>test</authcode> <live>0</live> <error> <message>ok</message> <code>0</code> </error> <security> <postcode>0</postcode> <securitycode>2</securitycode> <address>0</address> </security> </response> </responseblock> You will need to analyze the different fields returned in the response to determine whether or not the request was successful (in particular the <error> <code> and <settlestatus> elements). Information on how best to check the XML Response can be found in the Best Practices section of the XML Specification document. Secure Trading Limited March 2018 Page 12 / 17

13 6 Testing 6.1 Test site reference You will be provided with a test site reference and a live site reference on sign up. All test site references are preceded with the word test_ (e.g. test_merchant12345 ). Secure Trading recommends you test your solution thoroughly before processing live transactions. Your test site references will always be available for you to process test transactions, even after going live. 6.2 Sending a request To perform a successful test transaction, you will need to submit a valid XML Request to Secure Trading, by following the instructions outlined previously in this document, ensuring you include the name of your test site reference. Full XML examples and definitions of all commonly used fields can be found in the XML Specification document. In particular, please refer to the testing section of this document for valid card numbers and address details that can be submitted to test for different responses. Secure Trading Limited March 2018 Page 13 / 17

14 7 Troubleshooting Authorization Required <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>401 Authorization Required</title> </head><body> <h1>authorization Required</h1> <p>this server could not verify that you are authorized to access the document requested. Either you supplied the wrong credentials (e.g., bad password), or your browser doesn't understand how to supply the credentials required.</p> </body></html> Invalid Username / Password Please ensure you have submitted your Web Services username and password correctly in the request to Secure Trading Restrictions based on IP Range Restrictions can be put in place to ensure that only Web Services Requests originating from your IP (or range of IPs) are accepted by Secure Trading. This error is returned when Secure Trading receives a request originating from an IP outside of this range, which is first defined when creating the Webservices user in MyST (described in section 3). It is possible to modify the range of IPs accepted by Secure Trading by modifying the Webservices user in MyST. For more information on modifying users, please refer to the MyST User Guide. 7.2 Malformed XML error ( ) <?xml version='1.0' encoding='utf-8'?> <responseblock version="3.67"> <requestreference>w1-234abcd</requestreference> <response type="error"> <timestamp> :29:23</timestamp> <error> <message>malformed XML</message> <code>10200</code> <data>expected '>', line 61, column 25</data> </error> </response> </responseblock> Check your XML is valid Ensure any opening tags have an associated closing tag. Ensure your XML doesn t include invalid special characters for your chosen encoding. Ensure all tags are lowercase. e.g. Always use <billing> and not <Billing> or <BILLING> Check your Content-Length This kind of error can occur when the Content-Length header is calculated before encoding the XML. The Content-Length header must contain the number of bytes in the actual payload of the request and therefore must be calculated after any character encoding is performed. Secure Trading Limited March 2018 Page 14 / 17

15 8 Going Live In the interest of security and redundancy, you MUST address all of the steps listed in section 1.1 before going live. 8.1 Notifications and Redirects for Live Site Reference When you are ready to switch your account live, you will need to consider any notifications that may have been configured on your test site reference, as these will need to be re-configured on your live site reference to ensure they update your system as expected. 8.2 Update your XML Requests You will need to ensure the XML Requests are using your live site reference in the <sitereference> field. 8.3 Contact Secure Trading Once you have tested your system and you are ready to go live, please send an to with your site reference and request to go live. You will receive a response when your live site is ready to begin processing payments. Secure Trading Limited March 2018 Page 15 / 17

16 9 Further Information and Support This section provides useful information with regards to documentation and support for your Secure Trading solution. 9.1 Secure Trading Support If you have any questions regarding integration or maintenance of the system, please contact our support team using one of the following methods. Method Details Telephone +44 (0) Fax +44 (0) Website Secure Trading Sales If you do not have an account with Secure Trading, please contact our Sales team and they will inform you of the benefits of a Secure Trading account. Method Details Telephone Telephone (Int l) +44 (0) Fax +44 (0) sales@securetrading.com Website Useful Documents Any document regarding STPP can be found on Secure Trading s website: Frequently Asked Questions Please visit the FAQ section on our website ( Secure Trading Limited March 2018 Page 16 / 17

17 10 Appendix 10.1 Downloadable Java Example To demonstrate how Web Services can be implemented on your system, an example of Java code can be downloaded, which submits an XML Request to Secure Trading and listens for and displays the XML Response: This code takes a file containing a valid XML Request, applies the headers as described in section and securely submits it to Secure Trading. The full XML Response is displayed in a terminal window. Before executing the code, you will need to amend the Java code as to include your Web Services credentials: Change the static String username to be the username of your Web Services user. Change the static String password to be the password of your Web Services user. Ensure the static String requestxml contains the path of the file containing the XML Request you wish to submit to Secure Trading. Please note that the example Java code provided by Secure Trading applies the headers to the XML Request before sending. The file specified in the requestxml String will only work if it contains the XML Request without the headers. After compiling the code, you can execute it in order to submit the XML Request to Secure Trading. The XML Response will be printed into a terminal window (see section 5.2). Please note that the example Java code provided by Secure Trading does not take load balancing into account. Please ensure your system follows the guidelines outlined in section 4.3. This example code is provided for demonstration purposes and it is expected that all merchants develop their own solution. Secure Trading Limited March 2018 Page 17 / 17

STAPI User Guide

STAPI User Guide Document which details the steps of installing and configuring the STAPI client. Included are instructions to follow during instillation, troubleshooting and an overview of how your personalized program

More information

XML Specification: Subscriptions

XML Specification: Subscriptions This document outlines the XML required to submit Subscription requests to the Secure Trading Subscription Engine. Published: 25 April 2018 3.1 (b) Table of Contents 1 Introduction.. 3 1.1 Before you start..

More information

Card Store Published: 5 June 2018

Card Store Published: 5 June 2018 Card Store Requests allow merchants to store a customer s card details in Secure Trading s systems without performing an initial authorisation payment. These details can then be used for future requests.

More information

Version: 2.2 (a) Published: 1 August 2017

Version: 2.2 (a) Published: 1 August 2017 Version: 2.2 (a) Published: 1 August 2017 Table of Contents 1 Introduction... 3 1.1 Process Overview... 3 2 TRANSACTIONQUERY XML Request... 4 2.1 Filters... 4 2.2 XML Request Example... 5 3 TRANSACTIONQUERY

More information

XML Specification: 3-D Secure

XML Specification: 3-D Secure This document outlines how to perform Verified by Visa or Mastercard SecureCode transactions (more commonly known as 3-D Secure) with Secure Trading. Published: 10 January 2018 2.15 Table of Contents 1

More information

XML Specification ideal

XML Specification ideal XML Specification ideal Published: 19 February 2018 1.3 Table of Contents 1 Introduction... 3 1.1 Features... 3 1.2 Configuration... 3 2 Process Overview... 4 2.1 What will the customer see?... 4 2.2 How

More information

XML Specification QIWI

XML Specification QIWI XML Specification QIWI Published: 19 February 2018 1.2 Table of Contents 1 Introduction... 3 1.1 Features... 3 1.2 Configuration... 3 2 Process Overview... 4 2.1 What will the customer see?... 4 2.2 How

More information

XML Specification (c)

XML Specification (c) This document is to be used as a reference when viewing any XML throughout Secure Trading s documentation. The conventions used to describe XML Requests and Responses are outlined. Published: 25 April

More information

Version: 1.11 Published: 22 October 2014

Version: 1.11 Published: 22 October 2014 This document outlines how to perform Fraud Score requests through the STPP system. The Fraud Score system allows the merchant to perform additional checks on a customer to those performed on authorization.

More information

Version: 1.14 (b) Published: 1 August 2017

Version: 1.14 (b) Published: 1 August 2017 The purpose of this document is to provide the reader with an understanding of Dynamic Currency Conversion, and how it can be processed via Secure Trading s systems. Version: 1.14 (b) Published: 1 August

More information

XML Specification Paysafecard

XML Specification Paysafecard XML Specification Paysafecard This is a supplemental document to the main XML Specification document. Published: 27 September 2018 1.7 Table of Contents 1 Introduction... 3 1.1 About paysafecard... 3 1.2

More information

CSV Download. 2.1 (a) Automatically downloading transactions as Comma Separated Values (CSV). Published: 1 August 2017

CSV Download. 2.1 (a) Automatically downloading transactions as Comma Separated Values (CSV). Published: 1 August 2017 Automatically downloading transactions as Comma Separated Values (CSV). Published: 1 August 2017 2.1 (a) Table of Contents 1 Introduction... 3 2 Process overview... 4 2.1 For transaction download... 4

More information

Subscriptions and Payment Pages Version 2

Subscriptions and Payment Pages Version 2 Version 2 Published: 26 April 2018 2.1.21 (c) Table of Contents 1 Introduction... 3 1.1 About Subscriptions... 3 1.2 Process Overview... 3 1.3 Pre-requisites... 3 2 Processing a Subscription through Payment

More information

Payment Pages Setup Guide Version 2

Payment Pages Setup Guide Version 2 Version 2 Published: 3 April 2018 Migrating from version 1? Please read our quick start guide on page 100. 2.4.25 (a) Table of Contents 1 The basics... 4 1.1 Workflows... 5 1.2 Session-locked page... 13

More information

Magento Extension User Guide: Web Services Version 3.6.1

Magento Extension User Guide: Web Services Version 3.6.1 Version 3.6.1 This document explains how to install the official Secure Trading extension on your Magento store. Published: 3 August 2017 Table of Contents 1 Introduction... 3 1.1 Features... 3 1.2 Requirements...

More information

Magento Extension User Guide. This document explains how to install the official Secure Trading extension on your Magento store.

Magento Extension User Guide. This document explains how to install the official Secure Trading extension on your Magento store. This document explains how to install the official Secure Trading extension on your Magento store. Module version: 3.2.1 Published: 13 June 2014 Table of Contents 1 Introduction... 3 1.1 Features... 3

More information

MyST User Guide 3.1. Published: 23 July 2018

MyST User Guide 3.1. Published: 23 July 2018 This document outlines how to use MyST, our transaction management tool. Here you will find a breakdown of the various functions available and instructions on how to use them. Published: 23 July 2018 3.1

More information

Magento Extension User Guide: Payment Pages. This document explains how to install the official Secure Trading extension on your Magento store.

Magento Extension User Guide: Payment Pages. This document explains how to install the official Secure Trading extension on your Magento store. This document explains how to install the official Secure Trading extension on your Magento store. Module version: 3.4 Published: 31 October 2014 Table of Contents 1 Introduction... 3 1.1 Features... 3

More information

MyST User Guide Published: 23 April 2018

MyST User Guide Published: 23 April 2018 This document outlines how to use MyST, our transaction management tool. Here you will find a breakdown of the various functions available and instructions on how to use them. Published: 23 April 2018

More information

Magento Extension Update Guide Version This document explains how to update an existing install of our Magento extension.

Magento Extension Update Guide Version This document explains how to update an existing install of our Magento extension. Version 3.6.1 This document explains how to update an existing install of our Magento extension. Published: 3 August 2017 Introduction This Magento Community Edition extension allows you to seamlessly

More information

HTTPS File Transfer. Specification

HTTPS File Transfer. Specification HTTPS File Transfer Specification Version 1.4 5-Apr-2017 Date Version Description 30-Aug-2010 1.0 Original Version 30-Jun-2011 1.1 Added FAQ 29-Jun-2015 1.2 ilink administration added 1-Sep-2015 1.3 Updated

More information

STPP Testing Published: 8 December 2017

STPP Testing Published: 8 December 2017 During integration with Secure Trading s systems, the Merchant can perform tests on the system using the details supplied within this document. Published: 8 December 2017 1.18 Table of Contents 1 Introduction...

More information

Payment Pages Customisation Version 2

Payment Pages Customisation Version 2 Version 2 Published: 19 February 2018 2.1.10 Table of Contents 1 Introduction... 3 1.1 Useful documents... 3 1.2 Process Overview... 3 2 Profiles... 4 2.1 Requirements... 4 3 Uploading the files... 5 3.1

More information

How to Configure Authentication and Access Control (AAA)

How to Configure Authentication and Access Control (AAA) How to Configure Authentication and Access Control (AAA) Overview The Barracuda Web Application Firewall provides features to implement user authentication and access control. You can create a virtual

More information

Deploy the ExtraHop Discover 3100, 6100, 8100, or 9100 Appliances

Deploy the ExtraHop Discover 3100, 6100, 8100, or 9100 Appliances Deploy the ExtraHop Discover 3100, 6100, 8100, or 9100 s Published: 2017-12-29 This guide explains how to install the rack-mounted EDA 3100, EDA 6100, EDA 8100, and EDA 9100 ExtraHop Discover appliances.

More information

Express Interface. Certification Details.

Express Interface. Certification Details. Express Interface Certification Details www.vantiv.com Instructions Please review and complete the Express Certification Details on the following pages and return to Vantiv Integrated Payments (Vantiv

More information

HTTP 1.1 Web Server and Client

HTTP 1.1 Web Server and Client The feature provides a consistent interface for users and applications by implementing support for HTTP 1.1 in Cisco IOS XE software-based devices. When combined with the HTTPS feature, the feature provides

More information

1 Virtual Terminal Quick Reference Guide. Virtual Terminal Quick Reference Guide. Getting Started

1 Virtual Terminal Quick Reference Guide. Virtual Terminal Quick Reference Guide. Getting Started 1 Virtual Terminal Quick Reference Guide Virtual Terminal Quick Reference Guide Getting Started 2 Virtual Terminal Quick Reference Guide What you need Internet enabled laptop or computer Virtual Terminal

More information

Oracle Payment Interface Token Proxy Service Security Guide Release 6.1 E November 2017

Oracle Payment Interface Token Proxy Service Security Guide Release 6.1 E November 2017 Oracle Payment Interface Token Proxy Service Security Guide Release 6.1 E87635-01 November 2017 Copyright 2017, Oracle and/or its affiliates. All rights reserved. This software and related documentation

More information

Microsoft OWA 2013 IIS Integration

Microsoft OWA 2013 IIS Integration Microsoft OWA 2013 IIS Integration Contents 1 Introduction 2 Compatibility 3 Prerequisites 4 File Downloads 5 Architecture 6 Installation 6.1 Software Installation 6.2 Configuration of the IIS Filter 6.2.1

More information

Authenticating Cisco VCS accounts using LDAP

Authenticating Cisco VCS accounts using LDAP Authenticating Cisco VCS accounts using LDAP Cisco TelePresence Deployment Guide Cisco VCS X6 D14526.04 February 2011 Contents Contents Document revision history... 3 Introduction... 4 Usage... 4 Cisco

More information

All requests must be authenticated using the login and password you use to access your account.

All requests must be authenticated using the login and password you use to access your account. The REST API expects all text to be encoded as UTF-8, it is best to test by sending a message with a pound sign ( ) to confirm it is working as expected. If you are having issues sending as plain text,

More information

Cisco TelePresence Authenticating Cisco VCS Accounts Using LDAP

Cisco TelePresence Authenticating Cisco VCS Accounts Using LDAP Cisco TelePresence Authenticating Cisco VCS Accounts Using LDAP Deployment Guide Cisco VCS X8.2 D14465.07 June 2014 Contents Introduction 3 Process summary 3 LDAP accessible authentication server configuration

More information

Cisco Expressway Authenticating Accounts Using LDAP

Cisco Expressway Authenticating Accounts Using LDAP Cisco Expressway Authenticating Accounts Using LDAP Deployment Guide Cisco Expressway X8.5 December 2014 Contents Introduction 3 Process summary 3 LDAP accessible authentication server configuration 4

More information

How to Set Up External CA VPN Certificates

How to Set Up External CA VPN Certificates To configure a client-to-site, or site-to-site VPN using s created by External CA, you must create the following VPN s for the VPN service to be able to authenticate Before you begin Use an external CA

More information

Sophos Mobile as a Service

Sophos Mobile as a Service startup guide Product Version: 8 Contents About this guide... 1 What are the key steps?... 2 Change your password... 3 Change your login name... 4 Activate Mobile Advanced licenses...5 Check your licenses...6

More information

Frequently Asked Questions About Performance Monitor

Frequently Asked Questions About Performance Monitor APPENDIXA Frequently Asked Questions About Performance Monitor The following topics answer common questions about Performance monitor and contain troubleshooting tips: Installation, page A-1 Importing,

More information

CONFIGURATION MANUAL. English version

CONFIGURATION MANUAL. English version CONFIGURATION MANUAL English version Frama F-Link Configuration Manual (EN) All rights reserved. Frama Group. The right to make changes in this Installation Guide is reserved. Frama Ltd also reserves the

More information

e-frr SYSTEM USER GUIDE

e-frr SYSTEM USER GUIDE e-frr SYSTEM USER GUIDE for Electronic Submission of Financial Return Version 1.5 Jun 2015 Table of Contents 1. Introduction... 4 2. Background... 4 3. System Purpose... 4 4. Baseline Specification of

More information

Oracle Eloqua Legacy Authenticated Microsites and Contact Users. Configuration Guide

Oracle Eloqua Legacy Authenticated Microsites and Contact Users. Configuration Guide Oracle Eloqua Legacy Authenticated Microsites and Contact Users Configuration Guide 2019 Oracle Corporation. All rights reserved 04-Jan-2019 Contents 1 Authenticated microsites 3 2 Creating authenticated

More information

Installing and Configuring VMware Identity Manager Connector (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3.

Installing and Configuring VMware Identity Manager Connector (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3. Installing and Configuring VMware Identity Manager Connector 2018.8.1.0 (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3.3 You can find the most up-to-date technical documentation on

More information

VMware Identity Manager Connector Installation and Configuration (Legacy Mode)

VMware Identity Manager Connector Installation and Configuration (Legacy Mode) VMware Identity Manager Connector Installation and Configuration (Legacy Mode) VMware Identity Manager This document supports the version of each product listed and supports all subsequent versions until

More information

Configuring Virtual Servers

Configuring Virtual Servers 3 CHAPTER This section provides an overview of server load balancing and procedures for configuring virtual servers for load balancing on an ACE appliance. Note When you use the ACE CLI to configure named

More information

Deploy the ExtraHop Explore 5100 Appliance

Deploy the ExtraHop Explore 5100 Appliance Deploy the ExtraHop Explore 5100 Appliance Published: 2018-09-25 In this guide, you will learn how to configure the rack-mounted EXA 5100 ExtraHop Explore appliance and to join multiple Explore appliances

More information

Web Services Management Agent Configuration Guide, Cisco IOS XE Release 3S

Web Services Management Agent Configuration Guide, Cisco IOS XE Release 3S Web Services Management Agent Configuration Guide, Cisco IOS XE Release 3S First Published: March 29, 2013 Last Modified: March 29, 2013 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive

More information

Secure Web Appliance. SSL Intercept

Secure Web Appliance. SSL Intercept Secure Web Appliance SSL Intercept Table of Contents 1. Introduction... 1 1.1. About CYAN Secure Web Appliance... 1 1.2. About SSL Intercept... 1 1.3. About this Manual... 1 1.3.1. Document Conventions...

More information

VMware Identity Manager Cloud Deployment. DEC 2017 VMware AirWatch 9.2 VMware Identity Manager

VMware Identity Manager Cloud Deployment. DEC 2017 VMware AirWatch 9.2 VMware Identity Manager VMware Identity Manager Cloud Deployment DEC 2017 VMware AirWatch 9.2 VMware Identity Manager You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

Novell Access Manager

Novell Access Manager Setup Guide AUTHORIZED DOCUMENTATION Novell Access Manager 3.1 SP3 February 02, 2011 www.novell.com Novell Access Manager 3.1 SP3 Setup Guide Legal Notices Novell, Inc., makes no representations or warranties

More information

Workspace ONE UEM Certificate Authentication for EAS with ADCS. VMware Workspace ONE UEM 1902

Workspace ONE UEM Certificate Authentication for EAS with ADCS. VMware Workspace ONE UEM 1902 Workspace ONE UEM Certificate Authentication for EAS with ADCS VMware Workspace ONE UEM 1902 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

Accella Toolbar. User Guide. Release 20.0

Accella Toolbar. User Guide. Release 20.0 Accella Toolbar User Guide Release 20.0 Table of Contents 2 Introduction... 9 2.1 About Accella Toolbar... 9 2.2 About This Guide... 9 2.3 Accessing Toolbar... 9 2.4 First Time Login... 10 2.5 Subsequent

More information

Your Guide to Merchant Online

Your Guide to Merchant Online Your Guide to Merchant Online Merchant Online User Guide Contents 1 Introduction... 2 2 Using the Merchant Online Portal... 2 2.1 Signing In for the First Time... 2 2.2 Updating Your Information... 4 2.2.1

More information

Realms and Identity Policies

Realms and Identity Policies The following topics describe realms and identity policies: Introduction:, page 1 Creating a Realm, page 5 Creating an Identity Policy, page 11 Creating an Identity Rule, page 15 Managing Realms, page

More information

iveri Lite BackOffice User Guide

iveri Lite BackOffice User Guide iveri Lite BackOffice User Guide Table of Contents 1New...4 2OVERVIEW...5 3INITIAL ADMINISTRATOR SET-UP AND CONFIGURATION...6 4NEW USER SET-UP AND CONFIGURATION...10 5INDIVIDUAL FUNCTIONS WITHIN IVERI

More information

Frequently Asked Questions

Frequently Asked Questions Q. What is GTSE v.2.1.3? Frequently Asked Questions A. GTSE stands for Global Transport Secure ecommerce. GTSE v.2.1.3 is the next generation of Global Payments complete solution for small to mid-sized

More information

Microsoft OWA 2010 IIS Integration

Microsoft OWA 2010 IIS Integration Microsoft OWA 2010 IIS Integration Contents 1 Introduction 2 Compatibility 3 Prerequisites 3.1 Additional Prerequisites for Version 2.9 4 File Downloads 4.1 OWA Filter Change History 5 Architecture 6 Installation

More information

Privileged Remote Access Failover Configuration

Privileged Remote Access Failover Configuration Privileged Remote Access Failover Configuration 2003-2018 BeyondTrust, Inc. All Rights Reserved. BEYONDTRUST, its logo, and JUMP are trademarks of BeyondTrust, Inc. Other trademarks are the property of

More information

Configuring SSL. SSL Overview CHAPTER

Configuring SSL. SSL Overview CHAPTER 7 CHAPTER This topic describes the steps required to configure your ACE appliance as a virtual Secure Sockets Layer (SSL) server for SSL initiation or termination. The topics included in this section are:

More information

Perceptive Matching Engine

Perceptive Matching Engine Perceptive Matching Engine Advanced Design and Setup Guide Version: 1.0.x Written by: Product Development, R&D Date: January 2018 2018 Hyland Software, Inc. and its affiliates. Table of Contents Overview...

More information

User Guide Netaxept Administration Module. Version 1.50

User Guide Netaxept Administration Module. Version 1.50 User Guide Netaxept Administration Module Version 1.50 This document describes the various functions of Netaxept Administration Module (Netaxept Admin). The latest version of the document is available

More information

UNIBOX. Hotspot Management Application. Quick Start Guide

UNIBOX. Hotspot Management Application. Quick Start Guide UNIBOX Hotspot Management Application Quick Start Guide 1. Unpacking Unibox and Verifying shipped components Receive hardware and verify hardware components such as Unibox, patch cable, unibox power adapter.

More information

Configuring Cisco Unity and Unity Connection Servers

Configuring Cisco Unity and Unity Connection Servers CHAPTER 6 Configuring Cisco Unity and Unity Connection Servers Cisco Unity Servers Cisco Unity receives calls, plays greetings, and records and encodes voicemail. When a voicemail is received, Cisco Unity

More information

This Readme describes the NetIQ Access Manager 3.1 SP5 release.

This Readme describes the NetIQ Access Manager 3.1 SP5 release. NetIQ Access Manager 3.1 SP5 Readme January 2013 This Readme describes the NetIQ Access Manager 3.1 SP5 release. Section 1, What s New, on page 1 Section 2, Upgrading or Migrating to Access Manager 3.1

More information

Sign in and Meeting Issues

Sign in and Meeting Issues Account Activation Fails, page 2 Automatic Login Problems Occur After Cookies are Imported from Microsoft Internet Explorer, page 2 Browser Compatibility Issues, page 2 Cannot Connect to WebEx Site or

More information

VMware Identity Manager Cloud Deployment. Modified on 01 OCT 2017 VMware Identity Manager

VMware Identity Manager Cloud Deployment. Modified on 01 OCT 2017 VMware Identity Manager VMware Identity Manager Cloud Deployment Modified on 01 OCT 2017 VMware Identity Manager You can find the most up-to-date technical documentation on the VMware Web site at: https://docs.vmware.com/ The

More information

User Identity Sources

User Identity Sources The following topics describe Firepower System user identity sources, which are sources for user awareness. These users can be controlled with identity and access control policies: About, on page 1 The

More information

Deploy the ExtraHop Discover Appliance 1100

Deploy the ExtraHop Discover Appliance 1100 Deploy the ExtraHop Discover Appliance 1100 Published: 2018-07-17 The following procedures explain how to deploy an ExtraHop Discover appliance 1100. System requirements Your environment must meet the

More information

Barracuda Networks SSL VPN

Barracuda Networks SSL VPN RSA SecurID Ready Implementation Guide Partner Information Last Modified: October 24, 2013 Product Information Partner Name Barracuda Networks Web Site https://www.barracuda.com/ Product Name Barracuda

More information

VII. Corente Services SSL Client

VII. Corente Services SSL Client VII. Corente Services SSL Client Corente Release 9.1 Manual 9.1.1 Copyright 2014, Oracle and/or its affiliates. All rights reserved. Table of Contents Preface... 5 I. Introduction... 6 Chapter 1. Requirements...

More information

HP Load Balancing Module

HP Load Balancing Module HP Load Balancing Module Load Balancing Configuration Guide Part number: 5998-4218 Software version: Feature 3221 Document version: 6PW100-20130326 Legal and notice information Copyright 2013 Hewlett-Packard

More information

Configuring Request Authentication and Authorization

Configuring Request Authentication and Authorization CHAPTER 15 Configuring Request Authentication and Authorization Request authentication and authorization is a means to manage employee use of the Internet and restrict access to online content. This chapter

More information

Administration Guide. 05 Apr TM and copyright Imagicle spa

Administration Guide. 05 Apr TM and copyright Imagicle spa Administration Guide 05 Apr 2019 TM and copyright 2010-2019 Imagicle spa Table of Contents Administration Guide...1/5 Jabber Gadgets Setup...1/5 Administration Guide Jabber Gadgets Setup The Imagicle Gadget

More information

Failover Configuration Bomgar Privileged Access

Failover Configuration Bomgar Privileged Access Failover Configuration Bomgar Privileged Access 2017 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property

More information

HTTP 1.1 Web Server and Client

HTTP 1.1 Web Server and Client HTTP 1.1 Web Server and Client Last Updated: October 12, 2011 The HTTP 1.1 Web Server and Client feature provides a consistent interface for users and applications by implementing support for HTTP 1.1

More information

Configuring Failover

Configuring Failover Configuring Failover 2017 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property of their respective

More information

Failover Dynamics and Options with BeyondTrust 3. Methods to Configure Failover Between BeyondTrust Appliances 4

Failover Dynamics and Options with BeyondTrust 3. Methods to Configure Failover Between BeyondTrust Appliances 4 Configure Failover 2003-2018 BeyondTrust, Inc. All Rights Reserved. BEYONDTRUST, its logo, and JUMP are trademarks of BeyondTrust, Inc. Other trademarks are the property of their respective owners. TC:1/4/2019

More information

Configuring Health Monitoring

Configuring Health Monitoring CHAPTER1 This chapter describes how to configure health monitoring on the ACE to track the state of a server by sending out probes. Also referred to as out-of-band health monitoring, the ACE verifies the

More information

HTTP 1.1 Web Server and Client

HTTP 1.1 Web Server and Client HTTP 1.1 Web Server and Client Finding Feature Information HTTP 1.1 Web Server and Client Last Updated: June 01, 2011 The HTTP 1.1 Web Server and Client feature provides a consistent interface for users

More information

BIG-IP Access Policy Manager : Portal Access. Version 12.1

BIG-IP Access Policy Manager : Portal Access. Version 12.1 BIG-IP Access Policy Manager : Portal Access Version 12.1 Table of Contents Table of Contents Overview of Portal Access...7 Overview: What is portal access?...7 About portal access configuration elements...7

More information

Managing Certificates

Managing Certificates CHAPTER 12 The Cisco Identity Services Engine (Cisco ISE) relies on public key infrastructure (PKI) to provide secure communication for the following: Client and server authentication for Transport Layer

More information

Cisco Threat Intelligence Director (TID)

Cisco Threat Intelligence Director (TID) The topics in this chapter describe how to configure and use TID in the Firepower System. Overview, page 1 Using TID Sources to Ingest Feed Data, page 6 Using Access Control to Publish TID Data and Generate

More information

HTTPS The New B2Bi Portal. Bank of America s secure web transmission interface user guide

HTTPS The New B2Bi Portal. Bank of America s secure web transmission interface user guide HTTPS The New B2Bi Portal Bank of America s secure web transmission interface user guide This manual contains proprietary and confidential information of Bank of America and was prepared by the staff of

More information

Lab 5: Web Attacks using Burp Suite

Lab 5: Web Attacks using Burp Suite Lab 5: Web Attacks using Burp Suite Aim The aim of this lab is to provide a foundation in performing security testing of web applications using Burp Suite and its various tools. Burp Suite and its tools

More information

Infoblox Authenticated DHCP

Infoblox Authenticated DHCP Infoblox Authenticated DHCP Unified Visitor Management amigopod Technical Note Revision 1.1 5 July 2010 United States of America +1 (888) 590-0882 Europe, Middle East & Asia +34 91 766 57 22 Australia

More information

Documentation. nfront Web Password Change. Version nfront Security. All Rights Reserved.

Documentation. nfront Web Password Change. Version nfront Security. All Rights Reserved. nfront Web Password Change Version 3.0.0 Documentation 2000 2013 nfront Security. All Rights Reserved. nfront Security, the nfront Security logo and nfront Password Filter are trademarks of Altus Network

More information

Oracle Hospitality ecommerce Integration Cloud Service Security Guide Release 4.2 E

Oracle Hospitality ecommerce Integration Cloud Service Security Guide Release 4.2 E Oracle Hospitality ecommerce Integration Cloud Service Security Guide Release 4.2 E96343-01 May 2018 Copyright 2010, 2018, Oracle and/or its affiliates. All rights reserved. This software and related documentation

More information

DoD Common Access Card Authentication. Feature Description

DoD Common Access Card Authentication. Feature Description DoD Common Access Card Authentication Feature Description UPDATED: 20 June 2018 Copyright Notices Copyright 2002-2018 KEMP Technologies, Inc. All rights reserved. KEMP Technologies and the KEMP Technologies

More information

IBM Security Access Manager Version January Federation Administration topics IBM

IBM Security Access Manager Version January Federation Administration topics IBM IBM Security Access Manager Version 9.0.2.1 January 2017 Federation Administration topics IBM IBM Security Access Manager Version 9.0.2.1 January 2017 Federation Administration topics IBM ii IBM Security

More information

UCS Manager Communication Services

UCS Manager Communication Services Communication Protocols, page 1 Communication Services, page 1 Non-Secure Communication Services, page 3 Secure Communication Services, page 5 Network-Related Communication Services, page 12 Communication

More information

How to Configure SSL VPN Portal for Forcepoint NGFW TECHNICAL DOCUMENT

How to Configure SSL VPN Portal for Forcepoint NGFW TECHNICAL DOCUMENT How to Configure SSL VPN Portal for Forcepoint NGFW TECHNICAL DOCUMENT Ta Table of Contents Table of Contents TA TABLE OF CONTENTS 1 TABLE OF CONTENTS 1 BACKGROUND 2 CONFIGURATION STEPS 2 Create a SSL

More information

Programming basics Integration Guide. Version 6.2.1

Programming basics Integration Guide. Version 6.2.1 Programming basics Integration Guide Version 6.2.1 As of: 04.10.2016 Table of Contents Programming... 4 Merchant Interface variants... 4 Security: Payment Card Industry Data Security Standard (PCI DSS)...

More information

Scan Report Executive Summary

Scan Report Executive Summary Scan Report Executive Summary Part 1. Scan Information Scan Customer Company: Date scan was completed: Vin65 ASV Company: Comodo CA Limited 11/20/2017 Scan expiration date: 02/18/2018 Part 2. Component

More information

VMware AirWatch Integration with RSA PKI Guide

VMware AirWatch Integration with RSA PKI Guide VMware AirWatch Integration with RSA PKI Guide For VMware AirWatch Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com. This product

More information

Forescout. Plugin. Configuration Guide. Version 2.2.4

Forescout. Plugin. Configuration Guide. Version 2.2.4 Forescout Core Extensions Module: External Classifier Plugin Version 2.2.4 Contact Information Forescout Technologies, Inc. 190 West Tasman Drive San Jose, CA 95134 USA https://www.forescout.com/support/

More information

DVS-200 Configuration Guide

DVS-200 Configuration Guide DVS-200 Configuration Guide Contents Web UI Overview... 2 Creating a live channel... 2 Inputs... 3 Outputs... 6 Access Control... 7 Recording... 7 Managing recordings... 9 General... 10 Transcoding and

More information

Configuring SSL. SSL Overview CHAPTER

Configuring SSL. SSL Overview CHAPTER CHAPTER 8 Date: 4/23/09 This topic describes the steps required to configure your ACE (both the ACE module and the ACE appliance) as a virtual Secure Sockets Layer (SSL) server for SSL initiation or termination.

More information

Configuring Content Authentication and Authorization on Standalone Content Engines

Configuring Content Authentication and Authorization on Standalone Content Engines CHAPTER 10 Configuring Content Authentication and Authorization on Standalone Content Engines This chapter describes how to configure content authentication and authorization on standalone Content Engines

More information

Telephony Toolbar Enterprise. User Guide

Telephony Toolbar Enterprise. User Guide Telephony Toolbar Enterprise User Guide Release 4.4 October 2009 Table of Contents 1 Summary of Changes... 7 1.1 Changes for this Release... 7 2 About This Guide... 8 2.1 Open Telephony Toolbar-Corporate...

More information

RSA SecurID Ready Implementation Guide. Last Modified: December 13, 2013

RSA SecurID Ready Implementation Guide. Last Modified: December 13, 2013 Ping Identity RSA SecurID Ready Implementation Guide Partner Information Last Modified: December 13, 2013 Product Information Partner Name Ping Identity Web Site www.pingidentity.com Product Name PingFederate

More information

7. How do I obtain a Temporary ID? You will need to visit HL Bank or mail us the econnect form to apply for a Temporary ID.

7. How do I obtain a Temporary ID? You will need to visit HL Bank or mail us the econnect form to apply for a Temporary ID. About HL Bank Connect 1. What is HL Bank Connect? HL Bank Connect provides you with the convenience of accessing your bank accounts and performing online banking transactions via the Internet. 2. What

More information

Agent Properties. Overview. Agent Properties. Overview, page 1 Agent Properties, page 1

Agent Properties. Overview. Agent Properties. Overview, page 1 Agent Properties, page 1 Overview, page 1, page 1 Overview The agent.properties file contains the configuration settings for Connector. Typically, properties containing lists do not support the uses of spaces between separators.

More information