File submissions to VINN and KRITA
|
|
- Solomon Hampton
- 6 years ago
- Views:
Transcription
1 Date Page (10) Recipient: Respondents to VINN and KRITA File submissions to VINN and KRITA Summary This document briefly describes the VINN/KRITA solution for file submissions in the form of texts or sequence diagrams. The document also contains a brief description of the technical solution from a security perspective Postal address Box 24300, SE STOCKHOLM SE ÖREBRO Corporate ID number: Visiting address Karlavägen 100 Klostergatan 23 scb@scb.se VAT no.: SE Telephone Fax
2 2 (10) Contents File submission... 3 Text description... 3 Delivery of certificates... 3 Delivering data M2M... 3 Manual submission of data... 4 File delivery status... 5 M2M client... 5 Sequence diagrams... 6 Delivery of certificates... 6 Delivering data M2M... 7 Manual submission of data... 8 General security initiatives for Vinn/Krita... 9 Penetration tests... 9 SSL LABS test... 9 Risk analysis... 9 Security related to authentication and transfers... 9 M2M solution... 9 Manual submissions Server certificates Protocols... 10
3 3 (10) File submission Text description Delivery of certificates 1. The data provider contacts Statistics Sweden by to or requesting a certificate for the machine-to-machine solution. 2. The order of a certificate is verified by an administrator at Statistics Sweden. 3. The administrator at Statistics Sweden registers the certificate user in the Vinn/Krita administrator interface. 4. A certificate is created by the authentication solution. 5. The password for the certificate s private key is displayed on the screen for the administrator 6. The administrator prints the password 7. The administrator sends the password for the certificate s private key by registered mail to the data provider who requested the certificate. 8. The data provider receives the message that the certificate is ready for downloading, together with the certificate password. 9. The data provider logs in according to the flow for manual reporting. 10. The data provider chooses which certificate to get. 11. The data provider chooses to download the certificate. Delivering data M2M 1. The respondent s M2M client transmits the file with a POST call to undersökning}/{filformat}/{version?} 2. Verification of certificate a. verification against the root certificate that the signature is correct and belongs to Statistics Sweden s internal CA b. verification of the certificate s validity date c. verification against the revocation list 3. The certificate s serial number is matched with a user identity. 4. Vinn/Krita receives the file and authenticated user
4 4 (10) 5. Verification of whether the user is allowed to submit the file for the a. organisation stated b. survey c. file format (XML Schema) 6. The format of the submitted file is validated 7. If the submission is correct a. The file is saved in a database b. The uploading ID is returned 8. Otherwise, an error code is returned (401 or 500) Manual submission of data 1. The data provider attempts to connect to the Vinn/Krita e- service and is requested to enter the user name and password they received from Statistics Sweden. 2. An OTP is sent as a text message together with instructions to the mobile phone number associated with the data provider. At the same time, the data provider is prompted in the login view to provide the OTP they received to their mobile phone. 3. When the correct OTP has been entered, the data provider can submit data in the e-service. 4. The data provider chooses Submit data in the main menu. 5. The data provider chooses the respondent to which the data refer. 6. The data provider chooses survey. 7. The data provider enters the file format (contract) for reporting. 8. The data provider enters the path to the relevant XML file and presses Upload to submit the file to Statistics Sweden. 9. When the file is uploaded, a row will be created in the list of total uploads, with the current status shown as Verification in progress. 10. If the upload was successful, the file will be given the status Uploaded, but if something went wrong, the status will be changed to Error message and require action by the data provider. Statuses: a. Verification in progress A file is currently being uploaded.
5 5 (10) b. Uploaded The file has been uploaded, passed the validation step without problems and been transferred to the VINN or KRITA system. c. Error message One or more errors were identified during the validation process and the file has been stopped. 11. If an error has occurred: The data provider corrects the file in their systems and resubmits it to Statistics Sweden. Please note that the complete file should be resubmitted, for new verification. 12. To log out actively, there is a Log out button on the upper right side. 13. If the user is inactive, the session will be terminated after 65 minutes. The longest time a user can remain logged in is 10 hours; thereafter, they are logged out automatically. File delivery status The indata portal includes a list with statuses for submissions made. A corresponding list can also be obtained via API using a GET call to the address The parameter ID refers to the uploading ID that was returned when uploading files using the machine-to-machine solution. The response is returned in json format and contains information on whether an uploaded file has been received and uploaded or if potential error messages has occured. If the call is made without an ID, a list of results will be returned for all file upload attempts made for the combination of corporate identification number and survey linked to the certificate. M2M client Each respondent is free to develop their own M2M client for file submission, but to facilitate matters, Statistics Sweden has developed client software with support for the machine-to-machine solution. The source code for the client software can be provided upon request. It is possible to carry out a test to verify that the connection to the machine-to-machine solution works properly and that the certificate is validated, through a GET call to If the call works properly, 200 (OK) is returned along with the time of the call.
6 6 (10) Sequence diagrams Delivery of certificates
7 Delivering data M2M Page 7 (10)
8 Manual submission of data Page 8 (10)
9 9 (10) General security initiatives for Vinn/Krita Penetration tests At the request of Statistics Sweden, an external security company carried out a security review of the Vinn/Krita solution for file submissions via the indata portal and machine-to-machine interface for the corresponding service, with good results. SSL LABS test Tests at SSL LABS for HTTPS give the rating A+, which is the highest possible rating. Risk analysis In the autumn of 2016, a number of workshops have been held to identify and analyse risks regarding the authentication and file delivery in Vinn/Krita. The participants in the workshops were members of the Vinn/Krita project and representatives of the security department, the operations department, the project for a general authentication solution and the architecture department. During the discussions, it was established that the prioritised risks involve the leaking of sensitive information. The risk of attacks against data integrity is considered low, as Statistics Sweden has functioning procedures in place for analysing data and identifying deviations. Security related to authentication and transfers M2M solution A client certificate is used to identify clients in the Vinn/Krita M2M solution. The client certificates are issued by an internal CA at Statistics Sweden. These certificates should be trusted by Statistics Sweden and are distributed to banks. The client certificates are not linked to an individual but to a company, and they are used by client software run on a server. The certificates are not linked to a specific machine but can be transferred if needed. It is up to the bank to keep the private key secure after it has been distributed by Statistics Sweden. The certificates have been signed using SHA-256 and both rootca and SubCA use RSA 4096 bit RSA keys. Certificates are valid for two years, after which they will be replaced.
10 10 (10) Manual submissions For manual submission via the indata portal, user names, passwords and OTP (One Time Passwords) by text message are used, and this solution is linked to an individual person. Server certificates For the secure verification of Statistics Sweden s identity and for client-server communication, a server certificate issued by an external CA is used. The certificates are signed using SHA-256 with a 2048 bit key. Protocols The current active protocols for the M2M and manual submission solutions are TLS 1.0, TLS 1.1 and TLS 1.2, to avoid imposing too severe limitations on the respondents client software.
Draft/Version (7) User manual reporting in the Indata portal
Draft/Version Page 2.1 1 (7) 2017-10-25 User manual reporting in the Indata portal 2 (7) Contents 1. Reporting to VINN or KRITA... 3 1.1 General... 3 1.2 Terminology... 3 2. Logging in... 4 3. The indata
More informationunsuccessful attempts.
Step by Step Procedure for Resetting Transaction Password by the User. when the user has been disabled after 3 unsuccessful attempts. The following module helps the Customers in Resetting Transaction password
More informationHere is a screenshot of the log in screen you will see at the above address:
BWM Client Portal Our portal address is: https://bwm.clientspace.co.uk Here is a screenshot of the log in screen you will see at the above address: Here is an example of how your portal will look on screen
More informationThis help covers the ordering, download and installation procedure for Odette Digital Certificates.
This help covers the ordering, download and installation procedure for Odette Digital Certificates. Answers to Frequently Asked Questions are available online CONTENTS Preparation for Ordering an Odette
More informationHow to Set Up External CA VPN Certificates
To configure a client-to-site, or site-to-site VPN using s created by External CA, you must create the following VPN s for the VPN service to be able to authenticate Before you begin Use an external CA
More informationPractical Issues with TLS Client Certificate Authentication
Practical Issues with TLS Client Certificate Authentication Arnis Parsovs February 26, 2014 1 / 10 Motivation 2 / 10 Motivation Problems with password authentication: 2 / 10 Motivation Problems with password
More informationRegistration and Renewal procedure for Belfius Certificate
Registration and Renewal procedure for Belfius Certificate Table of contents TABLE OF CONTENTS... 2 1. INTRODUCTION... 3 2. CONTACT... 3 3. CONFIGURATION... 3 4. REGISTRATION PROCEDURE... 4 4.1 PRE-REQUISITES...
More informationX.509. CPSC 457/557 10/17/13 Jeffrey Zhu
X.509 CPSC 457/557 10/17/13 Jeffrey Zhu 2 3 X.509 Outline X.509 Overview Certificate Lifecycle Alternative Certification Models 4 What is X.509? The most commonly used Public Key Infrastructure (PKI) on
More informationUser Communication Citrix SecureAuth
Prerequisites 1 *Non-Newmont PC ONLY* If you are using any PC except your Newmont issued system, you must follow this step if you are using your Newmont issued system you can move to First Time Enrollment
More informationOdette CA Help File and User Manual
How to Order and Install Odette Certificates For a German version of this file please follow this link. Odette CA Help File and User Manual 1 Release date 31.05.2016 Contents Preparation for Ordering an
More informationCertificate Retrieval Procedures
`` Certificate Retrieval Procedures Version 2.2 2018 Federal Reserve Banks Contents Federal Reserve Bank Certificate Retrieval Overview and Preparation Procedures... 2 Certificate Creation Procedures...
More informationINTEGRATED SECURITY SYSTEM FOR E-GOVERNMENT BASED ON SAML STANDARD
INTEGRATED SECURITY SYSTEM FOR E-GOVERNMENT BASED ON SAML STANDARD Jeffy Mwakalinga, Prof Louise Yngström Department of Computer and System Sciences Royal Institute of Technology / Stockholm University
More informationUDRP Pilot Project. 1. Simplified way of sending signed hardcopies of Complaints and/or Responses to the Provider (Par. 3(b), Par. 5(b) of the Rules)
UDRP Pilot Project The Czech Arbitration Court (CAC) proposes that it runs two pilot projects (Pilot) related to its implementation of UDRP. During the Pilot, the following proposed new UDRP-related services
More informationComodo APT Assessment Tool
rat Comodo APT Assessment Tool Software Version 1.1 Administrator Guide Guide Version 1.1.102815 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1 Introduction to Comodo
More informationWeb Portal and Connectivity Guide
Flood Re Web Portal and Connectivity Guide Version 4.0 Effective from: August 2017 THIRD RELEASE FOR THE PARTICIPANTS CONTENTS 1. Introduction... 3 1.1 Document Audience... 3 1.2 Document Purpose... 3
More informatione-authentication guidelines for esign- Online Electronic Signature Service
e-authentication guidelines for esign- Online Electronic Signature Service (Issued under Electronic Signature or Electronic Authentication Technique and Procedure Rules, 2015) Version 1.3 April 2017 Controller
More informationWorkspace ONE UEM Integration with RSA PKI. VMware Workspace ONE UEM 1810
Workspace ONE UEM Integration with RSA PKI VMware Workspace ONE UEM 1810 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments
More informationWHITE PAPER. Authentication and Encryption Design
WHITE PAPER Authentication and Encryption Design Table of Contents Introduction Applications and Services Account Creation Two-step Verification Authentication Passphrase Management Email Message Encryption
More informationTaxpayer Enhancements:
Taxpayer Enhancements: 1. Authentication for Business Returns and K-1 Distribution: To enhance security for business returns and K-1 distribution, we have removed the need for the recipients to enter the
More informationRelease 28 - Alpha Tracker Release Notes
Release 28 - Alpha Tracker Release Notes New Features / Changes (from SVN2841 to SVN3056) 1. With the introduction of GDPR, there are some important new features now available in Alpha Tracker. There is
More informationManage Certificates. Certificates Overview
Certificates Overview, page 1 Show Certificates, page 3 Download Certificates, page 4 Install Intermediate Certificates, page 4 Delete a Trust Certificate, page 5 Regenerate a Certificate, page 6 Upload
More informationSystem Certification Guide For NEMS Systems Interfaces (Version 2.3)
System Certification Guide For NEMS Systems Interfaces (Version 2.3) Page 1 of 16 Table of Contents 1 INTRODUCTION... 3 1.1 PURPOSE AND SCOPE... 3 2 MARKET SYSTEMS CHECKLIST... 4 2.1 ACCESS TO PUBLIC WEBSITE
More informatione-survey System User Manual for AML/CFT COMPLIANCE REPORT
BANK NEGARA MALAYSIA CENTRAL BANK OF MALAYSIA e-survey System User Manual for AML/CFT COMPLIANCE REPORT VERSION 1.0 Table of Content BNM e-survey System User Manual for AML/CFT COMPLIANCE REPORT 1. Introduction...
More informationOverview. SSL Cryptography Overview CHAPTER 1
CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet. SSL ensures the secure transmission of data between a client and a server through
More informationRegistration and Renewal procedure for Belfius Certificate
Registration and Renewal procedure for Belfius Certificate GTU Environment Table of contents TABLE OF CONTENTS... 2 1. INTRODUCTION... 3 2. CONTACT... 3 3. REGISTRATION PROCEDURE... 4 3.1 PRE-REQUISITES...
More informationVMware AirWatch Integration with RSA PKI Guide
VMware AirWatch Integration with RSA PKI Guide For VMware AirWatch Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com. This product
More informationBROWSER-BASED SUPPORT CONSOLE USER S GUIDE. 31 January 2017
BROWSER-BASED SUPPORT CONSOLE USER S GUIDE 31 January 2017 Contents 1 Introduction... 2 2 Netop Host Configuration... 2 2.1 Connecting through HTTPS using Certificates... 3 2.1.1 Self-signed certificate...
More informationConfiguring SSL Security
CHAPTER9 This chapter describes how to configure SSL on the Cisco 4700 Series Application Control Engine (ACE) appliance. This chapter contains the following sections: Overview Configuring SSL Termination
More informationFIPS Management. FIPS Management Overview. Configuration Changes in FIPS Mode
This chapter contains the following sections: Overview, on page 1 Configuration Changes in FIPS Mode, on page 1 Switching the Appliance to FIPS Mode, on page 2 Encrypting Sensitive Data in FIPS Mode, on
More informationCiphermail Gateway PDF Encryption Setup Guide
CIPHERMAIL EMAIL ENCRYPTION Ciphermail Gateway PDF Encryption Setup Guide April 4, 2016, Rev: 5454 Copyright c 2008-2016, ciphermail.com. CONTENTS CONTENTS Contents 1 Introduction 4 2 Portal 4 3 PDF encryption
More informationWeb Portal and Connectivity Guide
Flood Re Web Portal and Connectivity Guide Effective from date of issue February 2016 SECOND RELEASE TO PARTICIPANTS CONTENTS 1. Introduction... 3 1.1 Document Audience... 3 1.2 Document Purpose... 3 1.3
More informationSSL/TLS & 3D Secure. CS 470 Introduction to Applied Cryptography. Ali Aydın Selçuk. CS470, A.A.Selçuk SSL/TLS & 3DSec 1
SSL/TLS & 3D Secure CS 470 Introduction to Applied Cryptography Ali Aydın Selçuk CS470, A.A.Selçuk SSL/TLS & 3DSec 1 SSLv2 Brief History of SSL/TLS Released in 1995 with Netscape 1.1 Key generation algorithm
More informationConfiguring SSL. SSL Overview CHAPTER
7 CHAPTER This topic describes the steps required to configure your ACE appliance as a virtual Secure Sockets Layer (SSL) server for SSL initiation or termination. The topics included in this section are:
More informationComprehensive Setup Guide for TLS on ESA
Comprehensive Setup Guide for TLS on ESA Contents Introduction Prerequisites Requirements Components Used Background Information Functional Overview and Requirements Bring Your Own Certificate Update a
More informationDistributed Systems. 25. Authentication Paul Krzyzanowski. Rutgers University. Fall 2018
Distributed Systems 25. Authentication Paul Krzyzanowski Rutgers University Fall 2018 2018 Paul Krzyzanowski 1 Authentication For a user (or process): Establish & verify identity Then decide whether to
More informationUsing SSL/TLS with Active Directory / LDAP
Purpose This document describes how to install the required certificate on the for use with LDAP or Active Directory (AD) Integration in. This process is required if your LDAP / AD server has a self signed
More informatione-verification of Returns User Manual
e-verification of Returns User Manual Page 1 Table of Contents 1 e-verification while uploading a return (Non - NetBanking)... 3 2 e-verification of an already uploaded return (Non - NetBanking)... 4 3
More informationActual4Test. Actual4test - actual test exam dumps-pass for IT exams
Actual4Test http://www.actual4test.com Actual4test - actual test exam dumps-pass for IT exams Exam : 1z1-349 Title : Oracle Eloqua Marketing Cloud Service 2017 Implementation Essentials Vendor : Oracle
More informationFedLine Web Certificate Retrieval Procedures
Version 2.0 Contents Federal Reserve Bank Certificate Retrieval Overview and Preparation Procedures... 2 Certificate Creation Procedures... 3 Installing the Federal Reserve Banks Certificate Authority
More informationAssure Self-Service Portal
Assure Self-Service Portal Assure Self-Service Portal is a web-based portal, where Customers are able to: Record Cases to Assure Support 24/7 View existing and past Cases Find solutions to known issues
More informationNew York State Department of Health Medicaid Perinatal Care Quality Improvement Project
Page 1 of 9 New York State Department of Health Medicaid Perinatal Care Quality Improvement Project Instruction Module 2: Complete Excel Data Entry Forms and Send Data to Your Computer Desktop Submitting
More informationIBM i Version 7.2. Security Digital Certificate Manager IBM
IBM i Version 7.2 Security Digital Certificate Manager IBM IBM i Version 7.2 Security Digital Certificate Manager IBM Note Before using this information and the product it supports, read the information
More informationOnline Enrollment. This portal enables you to:
Company name: Online enrollment opens: Online enrollment closes: Welcome to your Infinisource Benefits Accounts Consumer Portal, where you have 24/7 access to view information and manage your account.
More informationUser Manual (e-tendering)
User Manual (e-tendering) Guidelines to Vendors for Online Tender Submission On MIDC Portal TM Online Tender Management Module PWIMS e-tendering Vendor Guidelines Manual Page 1 Table of Contents 1) Introduction:
More informationLoad Balancing VMware Workspace Portal/Identity Manager
Load Balancing VMware Workspace Portal/Identity Manager Overview VMware Workspace Portal/Identity Manager combines applications and desktops in a single, aggregated workspace. Employees can then access
More informationConfiguring SSL CHAPTER
7 CHAPTER This chapter describes the steps required to configure your ACE appliance as a virtual Secure Sockets Layer (SSL) server for SSL initiation or termination. The topics included in this section
More informationCTP SUBMISSION PLATFORM
CTP SUBMISSION PLATFORM INSTRUCTION DOCUMENT Version Control Two notes of clarification added regarding data cut off and completion requirements The Submission Dashboard, p 10 Using the Spreadsheet Download,
More informationAirWatch Mobile Device Management
RSA Ready Implementation Guide for 3rd Party PKI Applications Last Modified: November 26 th, 2014 Partner Information Product Information Partner Name Web Site Product Name Version & Platform Product Description
More informationBMC FootPrints 12 Integration with Remote Support
BMC FootPrints 12 Integration with Remote Support 2003-2019 BeyondTrust Corporation. All Rights Reserved. BEYONDTRUST, its logo, and JUMP are trademarks of BeyondTrust Corporation. Other trademarks are
More informationThis Security Policy describes how this module complies with the eleven sections of the Standard:
Vormetric, Inc Vormetric Data Security Server Module Firmware Version 4.4.1 Hardware Version 1.0 FIPS 140-2 Non-Proprietary Security Policy Level 2 Validation May 24 th, 2012 2011 Vormetric Inc. All rights
More informationCONV:01. Conversion. en-gb. User manual. Issue 5. Scania CV AB 2014, Sweden
CONV:01 Issue 5 en-gb Conversion User manual 346 271 Scania CV AB 2014, Sweden General... 3 Advantages of Conversion... 3 Conditions... 4 Recommendations... 4 Order access to Conversion... 4 Finding Conversion...
More informationIBM Presentations: Implementing SSL Security in WebSphere Partner Gateway
IBM Software Group IBM Presentations: Implementing SSL Security in WebSphere Partner Gateway Presenter: Max Terpolilli WPG L2 Support WebSphere Support Technical Exchange Agenda IBM Software Group Digital
More informationConfiguring SSL. SSL Overview CHAPTER
CHAPTER 8 Date: 4/23/09 This topic describes the steps required to configure your ACE (both the ACE module and the ACE appliance) as a virtual Secure Sockets Layer (SSL) server for SSL initiation or termination.
More informationMagyar Nemzeti Bank Electronic System for Receiving Authenticated Data ERA. Electronic Signature User Documentation
ERA Electronic Signature User Documentation Table of Contents 1. Introduction... 3 1.1. General information... 3 2. DesktopSign... 3 2.1. General information... 3 2.2. Installation... 3 3. MNBSubscriber...
More informationExam : Title : Security Solutions for Systems Engineers(SSSE) Version : Demo
Exam : 642-565 Title : Security Solutions for Systems Engineers(SSSE) Version : Demo 1. SomeCompany, Ltd. wants to implement the the PCI Data Security Standard to protect sensitive cardholder information.
More informationCryptography (Overview)
Cryptography (Overview) Some history Caesar cipher, rot13 substitution ciphers, etc. Enigma (Turing) Modern secret key cryptography DES, AES Public key cryptography RSA, digital signatures Cryptography
More informationRecommendations for Device Provisioning Security
Internet Telephony Services Providers Association Recommendations for Device Provisioning Security Version 2 May 2017 Contact: team@itspa.org.uk Contents Summary... 3 Introduction... 3 Risks... 4 Automatic
More informationI-Portal Training. December 2016
I-Portal Training December 2016 Agenda I II III Introduction Training Documents User Training Documents Administration Status: December 2016 2 Introduction What is I-Portal? I-Portal is a web-based application
More informationPortal/Extranet User Guide for Clients
Portal/Extranet User Guide for Clients Welcome to the ichannel Portal/Extranet. This guide will walk you through logging into your personalized, secure portal/extranet site. It will also show you how to
More informationSFT User Manual C:D. Secure File Transfer with Connect:Direct. Document date: 15 November 2016 Classification: Open Version: 4.0
SFT User Manual C:D Secure File Transfer with Connect:Direct Document date: 15 November 2016 Classification: Open Version: 4.0 Copyright equensworldline SE and/or its subsidiaries. All rights reserved.
More informationCitiDirect BE Portal Security, technical requirements and configuration
CitiDirect BE Portal Security, technical requirements and configuration CitiService CitiDirect BE Helpdesk tel. 801 343 978, +48 22 690 15 21 Monday to Friday; 8:00 17:00 helpdesk.ebs@citi.com www.citihandlowy.pl
More informationODYSSEY. cryptic by intent. Snorkel-TX. Feature Highlights & Technical Specifications. Odyssey Technologies Ltd.
Snorkel-TX Feature Highlights & Technical Specifications Snorkel-TX is a powerful transaction security server that enables failsafe authentication, access control, non-repudiation and integrity for web
More informationSecure Access Manager User Guide December 2017
Secure Access Manager User Guide December 2017 Copyright 2017 Exostar, LLC All rights reserved. 1 INTRODUCTION... 3 SUMMARY... 3 BASIC FUNCTIONS... 3 LOGIN TO YOUR SAM ACCOUNT... 3 How to Activate your
More informationBut where'd that extra "s" come from, and what does it mean?
SSL/TLS While browsing Internet, some URLs start with "http://" while others start with "https://"? Perhaps the extra "s" when browsing websites that require giving over sensitive information, like paying
More informationUsing SSL to Secure Client/Server Connections
Using SSL to Secure Client/Server Connections Using SSL to Secure Client/Server Connections, page 1 Using SSL to Secure Client/Server Connections Introduction This chapter contains information on creating
More informationTHE CO-OPERATIVE BANK OF KENYA LIMITED
1 IMPORTANT NOTES TO SUPPLIERS (a) The purpose of this document is to assist Co-operative Bank of Kenya in the identification and evaluation of potential suppliers who may subsequently be invited to tender
More informationLinQ2FA. Helping You. Network. Direct Communication. Stay Fraud Free!
LinQ2FA Stay Fraud Free! Helping You Direct Communication Secure to your Your customers Network LINQ2FA Stay Fraud Free! Enhance your security against cyber fraud with Two Factor Authentication Suitable
More informationSalesforce Integration User Guide. Cvent, Inc 1765 Greensboro Station Place McLean, VA
Salesforce Integration User Guide 2017 Cvent, Inc 1765 Greensboro Station Place McLean, VA 22102 www.cvent.com Contents Salesforce Integration User Guide... 3 Setting Up Your Account... 4 Helpful Hints...
More informationHow to Connect with SSL Network Extender using a Certificate
How to Connect with SSL Network Extender using a Certificate 29 August 2011 2011 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected by copyright
More informationSmartSolutions Portal User Guide
SmartSolutions Portal User Guide Managing group permissions Updated 28/04/17 v1 In this guide we will show you how to manage and edit the permissions of other users within your organisation. 1. First,
More informationCS November 2018
Authentication Distributed Systems 25. Authentication For a user (or process): Establish & verify identity Then decide whether to allow access to resources (= authorization) Paul Krzyzanowski Rutgers University
More informationMobile Login Extension User Manual
Extension User Manual Magento provides secured and convenient login to Magento stores through mobile number along with OTP. Table of Content 1. Extension Installation Guide 2. API Configuration 3. General
More informationUsing Lloyd s Direct Reporting. User Guide
Using Lloyd s Direct Reporting User Guide AUGUST 2013 2 Contents CONTENTS 2 LLOYD S DIRECT REPORTING 3 ABOUT THIS SERVICE 3 FURTHER HELP AND SUPPORT 3 USER GUIDE 4 ACCESSING LLOYD S DIRECT REPORTING 4
More informationExploring the potential of Mobile Connect: From authentication to identity and attribute sharing. Janne Jutila, Head of Business Development, GSMA
Exploring the potential of Mobile Connect: From authentication to identity and attribute sharing Janne Jutila, Head of Business Development, GSMA Fragility of passwords No matter what you tell them, users
More informationWORKSTATION SETUP GUIDE FOR ACCESSING THE MIBGAS PLATFORM. Date: 15/12/2016. Version: 4.1 MERCADO IBÉRICO DEL GAS
WORKSTATION SETUP GUIDE FOR ACCESSING THE MIBGAS PLATFORM Date: 15/12/2016 Version: 4.1 Alfonso XI, 6. 28014 Madrid (España) www.mibgas.es T (+34) 91 268 26 01 CONTENTS 1 INTRODUCTION 2 2 PRIOR REQUISITES
More informationSC Common Reporting (ComRep) Portal User Manual
SC Common Reporting (ComRep) Portal User Manual 1 Contents Page 1. Introduction 1.1 Overview of ComRep portal: brief overview and explanation on ComRep objectives, features and user roles. 3 2. Get Started
More informationQuick Guide to TIDE: Adding Users and Students
Quick Guide to TIDE: Adding Users and Students Test Coordinators use TIDE to add and manage user accounts and to add students participating in the South Carolina Alternate Assessment. This Quick Guide
More informationGuide to the Distributor Zone
Guide to the Distributor Zone Registering for a Distributor account Logging into the Distributor Zone Updating your profile Registering for a Challenge Registering a Participant Connecting a Participant
More informationBugzilla ID: Bugzilla Summary:
Bugzilla ID: Bugzilla Summary: CAs wishing to have their certificates included in Mozilla products must 1) Comply with the requirements of the Mozilla CA certificate policy (http://www.mozilla.org/projects/security/certs/policy/)
More informationJIRA Integration Guide
JIRA Integration Guide 2018 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property of their respective
More informationFrequently Asked Questions for the Chinabond Integrated Operation Platform (CIOP) Online. (For Overseas Clearing Members)
Frequently Asked Questions for the Chinabond Integrated Operation Platform (CIOP) Online (For Overseas Clearing Members) This translation has been prepared solely for reference purposes, shall not have
More informationExostar Identity Access Platform (SAM) User Guide September 2018
Exostar Identity Access Platform (SAM) User Guide September 2018 Copyright 2018 Exostar, LLC All rights reserved. 1 INTRODUCTION... 4 SUMMARY... 4 Exostar IAM Platform (SAM) Organization and User Types...
More informationWorkspace ONE UEM Certificate Authentication for Cisco IPSec VPN. VMware Workspace ONE UEM 1810
Workspace ONE UEM Certificate Authentication for Cisco IPSec VPN VMware Workspace ONE UEM 1810 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/
More informationViewing System Status, page 404. Backing Up and Restoring a Configuration, page 416. Managing Certificates for Authentication, page 418
This chapter describes how to maintain the configuration and firmware, reboot or reset the security appliance, manage the security license and digital certificates, and configure other features to help
More informationOn the Insert tab, the galleries include items that are designed to coordinate with the overall look of
INVESTOR REGISTRATION PROCESS HEADING 1 On the Insert tab, the galleries include items that are designed to coordinate with the overall look of your document. You can use these galleries to insert tables,
More informationComposer Help. Web Request Common Block
Composer Help Web Request Common Block 7/4/2018 Web Request Common Block Contents 1 Web Request Common Block 1.1 Name Property 1.2 Block Notes Property 1.3 Exceptions Property 1.4 Request Method Property
More informationAetna Contracting Process
Aetna Contracting Process Multi-Factor Authentication Login Process First time applicants and returning applicants both should login using the Aetna specific link using Internet Explorer: https://www.ainsight.com/nomoreforms/logon?type=client_nonins&clientcode=cnty
More informationIndiana State Department of Health (ISDH) Survey Report System Health Care Facility User s Manual
Indiana State Department of Health (ISDH) Survey Report System Health Care Facility User s Manual February 11, 2011 Table of Contents Topic Page 1.0 Getting Started 3 1.1 Purpose of Manual 3 1.2 Overview
More informationThe Social Value Portal
The Social Value Portal User Guidance v4.0 Summary Register at http://socialvalueportal.com/supplier-registration/ You will receive a username, and be prompted to setup a password. Login at http://socialvalueportal.com/svp-login/
More informationSecurity Strategy for Mobile ID GSMA Mobile Connect Summit
Security Strategy for Mobile ID GSMA Mobile Connect Summit Singapore, 22 nd November 2017 G+D Mobile Security G+D Mobile Security: Managing Billions of Connected Digital Identities Today 660 million contactless
More informationElastic Load Balance. User Guide. Issue 01 Date HUAWEI TECHNOLOGIES CO., LTD.
Issue 01 Date 2018-04-30 HUAWEI TECHNOLOGIES CO., LTD. 2018. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of
More informationISY994 Series Network Security Configuration Guide Requires firmware version Requires Java 1.8+
ISY994 Series Network Security Configuration Guide Requires firmware version 4.5.4+ Requires Java 1.8+ 1 Introduction Universal Devices, Inc. takes ISY security extremely seriously. As such, all ISY994
More informationDCARC Defense Cost & Resource Center
DCARC Defense Cost & Resource Center EVM Central Repository Submitter Guide 7/26/2014 1 Submitter Training The following document provides step-by-step screenshots to illustrate the major actions performed
More informationWelcome to State Bank of Herscher s Online Banking!
Welcome to State Bank of Herscher s Online Banking! 1. To enroll in Online Banking, click on Enroll below the Online Banking Login on our website: www.sbherscher.com 2. You will be taken to the Enrollment
More informationExostar Identity Access Platform (SAM) User Guide July 2018
Exostar Identity Access Platform (SAM) User Guide July 2018 Copyright 2018 Exostar, LLC All rights reserved. 1 Version Impacts Date Owner Identity and Access Management Email Verification (Email OTP) July
More informationCA Service Desk Integration with Remote Support
CA Service Desk Integration with Remote Support 2003-2019 BeyondTrust Corporation. All Rights Reserved. BEYONDTRUST, its logo, and JUMP are trademarks of BeyondTrust Corporation. Other trademarks are the
More informationHow to take up my assessment?
2011, Cognizant How to take up my assessment? Step 1 : You have to take up the assessment only using the Virtual Desktop Interface (VDI environment) Please use the URL, https://learninglabs.cognizant.com
More informationNeoAccel NeoAccel Management Console: Gateway Gateway Administration version version 2.3
SSL VPN-Plus TM NeoAccel NeoAccel Management Console: Console: Gateway Gateway Administration version version 2.3 2.0 Copyright 2005-2006. 2005-2009. NeoAccel Inc. NeoAccel Inc. NMC - Volume II -SSL VPN-Plus-v2.33
More informationEnterprise Certificate Console. Simplified Control for Digital Certificates from the Cloud
Enterprise Certificate Console Simplified Control for Digital Certificates from the Cloud HydrantID Enterprise Management Console HydrantID s HydrantSSL Enterprise service and HydrantCloud Managed PKI
More informationSystem Setup. Accessing the Administration Interface CHAPTER
CHAPTER 3 The system can be configured through the web interface to provide the networking configuration for the appliance and other system settings that are important such as time and SSL certificate.
More information