File submissions to VINN and KRITA

Size: px
Start display at page:

Download "File submissions to VINN and KRITA"

Transcription

1 Date Page (10) Recipient: Respondents to VINN and KRITA File submissions to VINN and KRITA Summary This document briefly describes the VINN/KRITA solution for file submissions in the form of texts or sequence diagrams. The document also contains a brief description of the technical solution from a security perspective Postal address Box 24300, SE STOCKHOLM SE ÖREBRO Corporate ID number: Visiting address Karlavägen 100 Klostergatan 23 scb@scb.se VAT no.: SE Telephone Fax

2 2 (10) Contents File submission... 3 Text description... 3 Delivery of certificates... 3 Delivering data M2M... 3 Manual submission of data... 4 File delivery status... 5 M2M client... 5 Sequence diagrams... 6 Delivery of certificates... 6 Delivering data M2M... 7 Manual submission of data... 8 General security initiatives for Vinn/Krita... 9 Penetration tests... 9 SSL LABS test... 9 Risk analysis... 9 Security related to authentication and transfers... 9 M2M solution... 9 Manual submissions Server certificates Protocols... 10

3 3 (10) File submission Text description Delivery of certificates 1. The data provider contacts Statistics Sweden by to or requesting a certificate for the machine-to-machine solution. 2. The order of a certificate is verified by an administrator at Statistics Sweden. 3. The administrator at Statistics Sweden registers the certificate user in the Vinn/Krita administrator interface. 4. A certificate is created by the authentication solution. 5. The password for the certificate s private key is displayed on the screen for the administrator 6. The administrator prints the password 7. The administrator sends the password for the certificate s private key by registered mail to the data provider who requested the certificate. 8. The data provider receives the message that the certificate is ready for downloading, together with the certificate password. 9. The data provider logs in according to the flow for manual reporting. 10. The data provider chooses which certificate to get. 11. The data provider chooses to download the certificate. Delivering data M2M 1. The respondent s M2M client transmits the file with a POST call to undersökning}/{filformat}/{version?} 2. Verification of certificate a. verification against the root certificate that the signature is correct and belongs to Statistics Sweden s internal CA b. verification of the certificate s validity date c. verification against the revocation list 3. The certificate s serial number is matched with a user identity. 4. Vinn/Krita receives the file and authenticated user

4 4 (10) 5. Verification of whether the user is allowed to submit the file for the a. organisation stated b. survey c. file format (XML Schema) 6. The format of the submitted file is validated 7. If the submission is correct a. The file is saved in a database b. The uploading ID is returned 8. Otherwise, an error code is returned (401 or 500) Manual submission of data 1. The data provider attempts to connect to the Vinn/Krita e- service and is requested to enter the user name and password they received from Statistics Sweden. 2. An OTP is sent as a text message together with instructions to the mobile phone number associated with the data provider. At the same time, the data provider is prompted in the login view to provide the OTP they received to their mobile phone. 3. When the correct OTP has been entered, the data provider can submit data in the e-service. 4. The data provider chooses Submit data in the main menu. 5. The data provider chooses the respondent to which the data refer. 6. The data provider chooses survey. 7. The data provider enters the file format (contract) for reporting. 8. The data provider enters the path to the relevant XML file and presses Upload to submit the file to Statistics Sweden. 9. When the file is uploaded, a row will be created in the list of total uploads, with the current status shown as Verification in progress. 10. If the upload was successful, the file will be given the status Uploaded, but if something went wrong, the status will be changed to Error message and require action by the data provider. Statuses: a. Verification in progress A file is currently being uploaded.

5 5 (10) b. Uploaded The file has been uploaded, passed the validation step without problems and been transferred to the VINN or KRITA system. c. Error message One or more errors were identified during the validation process and the file has been stopped. 11. If an error has occurred: The data provider corrects the file in their systems and resubmits it to Statistics Sweden. Please note that the complete file should be resubmitted, for new verification. 12. To log out actively, there is a Log out button on the upper right side. 13. If the user is inactive, the session will be terminated after 65 minutes. The longest time a user can remain logged in is 10 hours; thereafter, they are logged out automatically. File delivery status The indata portal includes a list with statuses for submissions made. A corresponding list can also be obtained via API using a GET call to the address The parameter ID refers to the uploading ID that was returned when uploading files using the machine-to-machine solution. The response is returned in json format and contains information on whether an uploaded file has been received and uploaded or if potential error messages has occured. If the call is made without an ID, a list of results will be returned for all file upload attempts made for the combination of corporate identification number and survey linked to the certificate. M2M client Each respondent is free to develop their own M2M client for file submission, but to facilitate matters, Statistics Sweden has developed client software with support for the machine-to-machine solution. The source code for the client software can be provided upon request. It is possible to carry out a test to verify that the connection to the machine-to-machine solution works properly and that the certificate is validated, through a GET call to If the call works properly, 200 (OK) is returned along with the time of the call.

6 6 (10) Sequence diagrams Delivery of certificates

7 Delivering data M2M Page 7 (10)

8 Manual submission of data Page 8 (10)

9 9 (10) General security initiatives for Vinn/Krita Penetration tests At the request of Statistics Sweden, an external security company carried out a security review of the Vinn/Krita solution for file submissions via the indata portal and machine-to-machine interface for the corresponding service, with good results. SSL LABS test Tests at SSL LABS for HTTPS give the rating A+, which is the highest possible rating. Risk analysis In the autumn of 2016, a number of workshops have been held to identify and analyse risks regarding the authentication and file delivery in Vinn/Krita. The participants in the workshops were members of the Vinn/Krita project and representatives of the security department, the operations department, the project for a general authentication solution and the architecture department. During the discussions, it was established that the prioritised risks involve the leaking of sensitive information. The risk of attacks against data integrity is considered low, as Statistics Sweden has functioning procedures in place for analysing data and identifying deviations. Security related to authentication and transfers M2M solution A client certificate is used to identify clients in the Vinn/Krita M2M solution. The client certificates are issued by an internal CA at Statistics Sweden. These certificates should be trusted by Statistics Sweden and are distributed to banks. The client certificates are not linked to an individual but to a company, and they are used by client software run on a server. The certificates are not linked to a specific machine but can be transferred if needed. It is up to the bank to keep the private key secure after it has been distributed by Statistics Sweden. The certificates have been signed using SHA-256 and both rootca and SubCA use RSA 4096 bit RSA keys. Certificates are valid for two years, after which they will be replaced.

10 10 (10) Manual submissions For manual submission via the indata portal, user names, passwords and OTP (One Time Passwords) by text message are used, and this solution is linked to an individual person. Server certificates For the secure verification of Statistics Sweden s identity and for client-server communication, a server certificate issued by an external CA is used. The certificates are signed using SHA-256 with a 2048 bit key. Protocols The current active protocols for the M2M and manual submission solutions are TLS 1.0, TLS 1.1 and TLS 1.2, to avoid imposing too severe limitations on the respondents client software.

Draft/Version (7) User manual reporting in the Indata portal

Draft/Version (7) User manual reporting in the Indata portal Draft/Version Page 2.1 1 (7) 2017-10-25 User manual reporting in the Indata portal 2 (7) Contents 1. Reporting to VINN or KRITA... 3 1.1 General... 3 1.2 Terminology... 3 2. Logging in... 4 3. The indata

More information

unsuccessful attempts.

unsuccessful attempts. Step by Step Procedure for Resetting Transaction Password by the User. when the user has been disabled after 3 unsuccessful attempts. The following module helps the Customers in Resetting Transaction password

More information

Here is a screenshot of the log in screen you will see at the above address:

Here is a screenshot of the log in screen you will see at the above address: BWM Client Portal Our portal address is: https://bwm.clientspace.co.uk Here is a screenshot of the log in screen you will see at the above address: Here is an example of how your portal will look on screen

More information

This help covers the ordering, download and installation procedure for Odette Digital Certificates.

This help covers the ordering, download and installation procedure for Odette Digital Certificates. This help covers the ordering, download and installation procedure for Odette Digital Certificates. Answers to Frequently Asked Questions are available online CONTENTS Preparation for Ordering an Odette

More information

How to Set Up External CA VPN Certificates

How to Set Up External CA VPN Certificates To configure a client-to-site, or site-to-site VPN using s created by External CA, you must create the following VPN s for the VPN service to be able to authenticate Before you begin Use an external CA

More information

Practical Issues with TLS Client Certificate Authentication

Practical Issues with TLS Client Certificate Authentication Practical Issues with TLS Client Certificate Authentication Arnis Parsovs February 26, 2014 1 / 10 Motivation 2 / 10 Motivation Problems with password authentication: 2 / 10 Motivation Problems with password

More information

Registration and Renewal procedure for Belfius Certificate

Registration and Renewal procedure for Belfius Certificate Registration and Renewal procedure for Belfius Certificate Table of contents TABLE OF CONTENTS... 2 1. INTRODUCTION... 3 2. CONTACT... 3 3. CONFIGURATION... 3 4. REGISTRATION PROCEDURE... 4 4.1 PRE-REQUISITES...

More information

X.509. CPSC 457/557 10/17/13 Jeffrey Zhu

X.509. CPSC 457/557 10/17/13 Jeffrey Zhu X.509 CPSC 457/557 10/17/13 Jeffrey Zhu 2 3 X.509 Outline X.509 Overview Certificate Lifecycle Alternative Certification Models 4 What is X.509? The most commonly used Public Key Infrastructure (PKI) on

More information

User Communication Citrix SecureAuth

User Communication Citrix SecureAuth Prerequisites 1 *Non-Newmont PC ONLY* If you are using any PC except your Newmont issued system, you must follow this step if you are using your Newmont issued system you can move to First Time Enrollment

More information

Odette CA Help File and User Manual

Odette CA Help File and User Manual How to Order and Install Odette Certificates For a German version of this file please follow this link. Odette CA Help File and User Manual 1 Release date 31.05.2016 Contents Preparation for Ordering an

More information

Certificate Retrieval Procedures

Certificate Retrieval Procedures `` Certificate Retrieval Procedures Version 2.2 2018 Federal Reserve Banks Contents Federal Reserve Bank Certificate Retrieval Overview and Preparation Procedures... 2 Certificate Creation Procedures...

More information

INTEGRATED SECURITY SYSTEM FOR E-GOVERNMENT BASED ON SAML STANDARD

INTEGRATED SECURITY SYSTEM FOR E-GOVERNMENT BASED ON SAML STANDARD INTEGRATED SECURITY SYSTEM FOR E-GOVERNMENT BASED ON SAML STANDARD Jeffy Mwakalinga, Prof Louise Yngström Department of Computer and System Sciences Royal Institute of Technology / Stockholm University

More information

UDRP Pilot Project. 1. Simplified way of sending signed hardcopies of Complaints and/or Responses to the Provider (Par. 3(b), Par. 5(b) of the Rules)

UDRP Pilot Project. 1. Simplified way of sending signed hardcopies of Complaints and/or Responses to the Provider (Par. 3(b), Par. 5(b) of the Rules) UDRP Pilot Project The Czech Arbitration Court (CAC) proposes that it runs two pilot projects (Pilot) related to its implementation of UDRP. During the Pilot, the following proposed new UDRP-related services

More information

Comodo APT Assessment Tool

Comodo APT Assessment Tool rat Comodo APT Assessment Tool Software Version 1.1 Administrator Guide Guide Version 1.1.102815 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1 Introduction to Comodo

More information

Web Portal and Connectivity Guide

Web Portal and Connectivity Guide Flood Re Web Portal and Connectivity Guide Version 4.0 Effective from: August 2017 THIRD RELEASE FOR THE PARTICIPANTS CONTENTS 1. Introduction... 3 1.1 Document Audience... 3 1.2 Document Purpose... 3

More information

e-authentication guidelines for esign- Online Electronic Signature Service

e-authentication guidelines for esign- Online Electronic Signature Service e-authentication guidelines for esign- Online Electronic Signature Service (Issued under Electronic Signature or Electronic Authentication Technique and Procedure Rules, 2015) Version 1.3 April 2017 Controller

More information

Workspace ONE UEM Integration with RSA PKI. VMware Workspace ONE UEM 1810

Workspace ONE UEM Integration with RSA PKI. VMware Workspace ONE UEM 1810 Workspace ONE UEM Integration with RSA PKI VMware Workspace ONE UEM 1810 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments

More information

WHITE PAPER. Authentication and Encryption Design

WHITE PAPER. Authentication and Encryption Design WHITE PAPER Authentication and Encryption Design Table of Contents Introduction Applications and Services Account Creation Two-step Verification Authentication Passphrase Management Email Message Encryption

More information

Taxpayer Enhancements:

Taxpayer Enhancements: Taxpayer Enhancements: 1. Authentication for Business Returns and K-1 Distribution: To enhance security for business returns and K-1 distribution, we have removed the need for the recipients to enter the

More information

Release 28 - Alpha Tracker Release Notes

Release 28 - Alpha Tracker Release Notes Release 28 - Alpha Tracker Release Notes New Features / Changes (from SVN2841 to SVN3056) 1. With the introduction of GDPR, there are some important new features now available in Alpha Tracker. There is

More information

Manage Certificates. Certificates Overview

Manage Certificates. Certificates Overview Certificates Overview, page 1 Show Certificates, page 3 Download Certificates, page 4 Install Intermediate Certificates, page 4 Delete a Trust Certificate, page 5 Regenerate a Certificate, page 6 Upload

More information

System Certification Guide For NEMS Systems Interfaces (Version 2.3)

System Certification Guide For NEMS Systems Interfaces (Version 2.3) System Certification Guide For NEMS Systems Interfaces (Version 2.3) Page 1 of 16 Table of Contents 1 INTRODUCTION... 3 1.1 PURPOSE AND SCOPE... 3 2 MARKET SYSTEMS CHECKLIST... 4 2.1 ACCESS TO PUBLIC WEBSITE

More information

e-survey System User Manual for AML/CFT COMPLIANCE REPORT

e-survey System User Manual for AML/CFT COMPLIANCE REPORT BANK NEGARA MALAYSIA CENTRAL BANK OF MALAYSIA e-survey System User Manual for AML/CFT COMPLIANCE REPORT VERSION 1.0 Table of Content BNM e-survey System User Manual for AML/CFT COMPLIANCE REPORT 1. Introduction...

More information

Overview. SSL Cryptography Overview CHAPTER 1

Overview. SSL Cryptography Overview CHAPTER 1 CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet. SSL ensures the secure transmission of data between a client and a server through

More information

Registration and Renewal procedure for Belfius Certificate

Registration and Renewal procedure for Belfius Certificate Registration and Renewal procedure for Belfius Certificate GTU Environment Table of contents TABLE OF CONTENTS... 2 1. INTRODUCTION... 3 2. CONTACT... 3 3. REGISTRATION PROCEDURE... 4 3.1 PRE-REQUISITES...

More information

VMware AirWatch Integration with RSA PKI Guide

VMware AirWatch Integration with RSA PKI Guide VMware AirWatch Integration with RSA PKI Guide For VMware AirWatch Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com. This product

More information

BROWSER-BASED SUPPORT CONSOLE USER S GUIDE. 31 January 2017

BROWSER-BASED SUPPORT CONSOLE USER S GUIDE. 31 January 2017 BROWSER-BASED SUPPORT CONSOLE USER S GUIDE 31 January 2017 Contents 1 Introduction... 2 2 Netop Host Configuration... 2 2.1 Connecting through HTTPS using Certificates... 3 2.1.1 Self-signed certificate...

More information

Configuring SSL Security

Configuring SSL Security CHAPTER9 This chapter describes how to configure SSL on the Cisco 4700 Series Application Control Engine (ACE) appliance. This chapter contains the following sections: Overview Configuring SSL Termination

More information

FIPS Management. FIPS Management Overview. Configuration Changes in FIPS Mode

FIPS Management. FIPS Management Overview. Configuration Changes in FIPS Mode This chapter contains the following sections: Overview, on page 1 Configuration Changes in FIPS Mode, on page 1 Switching the Appliance to FIPS Mode, on page 2 Encrypting Sensitive Data in FIPS Mode, on

More information

Ciphermail Gateway PDF Encryption Setup Guide

Ciphermail Gateway PDF Encryption Setup Guide CIPHERMAIL EMAIL ENCRYPTION Ciphermail Gateway PDF Encryption Setup Guide April 4, 2016, Rev: 5454 Copyright c 2008-2016, ciphermail.com. CONTENTS CONTENTS Contents 1 Introduction 4 2 Portal 4 3 PDF encryption

More information

Web Portal and Connectivity Guide

Web Portal and Connectivity Guide Flood Re Web Portal and Connectivity Guide Effective from date of issue February 2016 SECOND RELEASE TO PARTICIPANTS CONTENTS 1. Introduction... 3 1.1 Document Audience... 3 1.2 Document Purpose... 3 1.3

More information

SSL/TLS & 3D Secure. CS 470 Introduction to Applied Cryptography. Ali Aydın Selçuk. CS470, A.A.Selçuk SSL/TLS & 3DSec 1

SSL/TLS & 3D Secure. CS 470 Introduction to Applied Cryptography. Ali Aydın Selçuk. CS470, A.A.Selçuk SSL/TLS & 3DSec 1 SSL/TLS & 3D Secure CS 470 Introduction to Applied Cryptography Ali Aydın Selçuk CS470, A.A.Selçuk SSL/TLS & 3DSec 1 SSLv2 Brief History of SSL/TLS Released in 1995 with Netscape 1.1 Key generation algorithm

More information

Configuring SSL. SSL Overview CHAPTER

Configuring SSL. SSL Overview CHAPTER 7 CHAPTER This topic describes the steps required to configure your ACE appliance as a virtual Secure Sockets Layer (SSL) server for SSL initiation or termination. The topics included in this section are:

More information

Comprehensive Setup Guide for TLS on ESA

Comprehensive Setup Guide for TLS on ESA Comprehensive Setup Guide for TLS on ESA Contents Introduction Prerequisites Requirements Components Used Background Information Functional Overview and Requirements Bring Your Own Certificate Update a

More information

Distributed Systems. 25. Authentication Paul Krzyzanowski. Rutgers University. Fall 2018

Distributed Systems. 25. Authentication Paul Krzyzanowski. Rutgers University. Fall 2018 Distributed Systems 25. Authentication Paul Krzyzanowski Rutgers University Fall 2018 2018 Paul Krzyzanowski 1 Authentication For a user (or process): Establish & verify identity Then decide whether to

More information

Using SSL/TLS with Active Directory / LDAP

Using SSL/TLS with Active Directory / LDAP Purpose This document describes how to install the required certificate on the for use with LDAP or Active Directory (AD) Integration in. This process is required if your LDAP / AD server has a self signed

More information

e-verification of Returns User Manual

e-verification of Returns User Manual e-verification of Returns User Manual Page 1 Table of Contents 1 e-verification while uploading a return (Non - NetBanking)... 3 2 e-verification of an already uploaded return (Non - NetBanking)... 4 3

More information

Actual4Test. Actual4test - actual test exam dumps-pass for IT exams

Actual4Test.   Actual4test - actual test exam dumps-pass for IT exams Actual4Test http://www.actual4test.com Actual4test - actual test exam dumps-pass for IT exams Exam : 1z1-349 Title : Oracle Eloqua Marketing Cloud Service 2017 Implementation Essentials Vendor : Oracle

More information

FedLine Web Certificate Retrieval Procedures

FedLine Web Certificate Retrieval Procedures Version 2.0 Contents Federal Reserve Bank Certificate Retrieval Overview and Preparation Procedures... 2 Certificate Creation Procedures... 3 Installing the Federal Reserve Banks Certificate Authority

More information

Assure Self-Service Portal

Assure Self-Service Portal Assure Self-Service Portal Assure Self-Service Portal is a web-based portal, where Customers are able to: Record Cases to Assure Support 24/7 View existing and past Cases Find solutions to known issues

More information

New York State Department of Health Medicaid Perinatal Care Quality Improvement Project

New York State Department of Health Medicaid Perinatal Care Quality Improvement Project Page 1 of 9 New York State Department of Health Medicaid Perinatal Care Quality Improvement Project Instruction Module 2: Complete Excel Data Entry Forms and Send Data to Your Computer Desktop Submitting

More information

IBM i Version 7.2. Security Digital Certificate Manager IBM

IBM i Version 7.2. Security Digital Certificate Manager IBM IBM i Version 7.2 Security Digital Certificate Manager IBM IBM i Version 7.2 Security Digital Certificate Manager IBM Note Before using this information and the product it supports, read the information

More information

Online Enrollment. This portal enables you to:

Online Enrollment. This portal enables you to: Company name: Online enrollment opens: Online enrollment closes: Welcome to your Infinisource Benefits Accounts Consumer Portal, where you have 24/7 access to view information and manage your account.

More information

User Manual (e-tendering)

User Manual (e-tendering) User Manual (e-tendering) Guidelines to Vendors for Online Tender Submission On MIDC Portal TM Online Tender Management Module PWIMS e-tendering Vendor Guidelines Manual Page 1 Table of Contents 1) Introduction:

More information

Load Balancing VMware Workspace Portal/Identity Manager

Load Balancing VMware Workspace Portal/Identity Manager Load Balancing VMware Workspace Portal/Identity Manager Overview VMware Workspace Portal/Identity Manager combines applications and desktops in a single, aggregated workspace. Employees can then access

More information

Configuring SSL CHAPTER

Configuring SSL CHAPTER 7 CHAPTER This chapter describes the steps required to configure your ACE appliance as a virtual Secure Sockets Layer (SSL) server for SSL initiation or termination. The topics included in this section

More information

CTP SUBMISSION PLATFORM

CTP SUBMISSION PLATFORM CTP SUBMISSION PLATFORM INSTRUCTION DOCUMENT Version Control Two notes of clarification added regarding data cut off and completion requirements The Submission Dashboard, p 10 Using the Spreadsheet Download,

More information

AirWatch Mobile Device Management

AirWatch Mobile Device Management RSA Ready Implementation Guide for 3rd Party PKI Applications Last Modified: November 26 th, 2014 Partner Information Product Information Partner Name Web Site Product Name Version & Platform Product Description

More information

BMC FootPrints 12 Integration with Remote Support

BMC FootPrints 12 Integration with Remote Support BMC FootPrints 12 Integration with Remote Support 2003-2019 BeyondTrust Corporation. All Rights Reserved. BEYONDTRUST, its logo, and JUMP are trademarks of BeyondTrust Corporation. Other trademarks are

More information

This Security Policy describes how this module complies with the eleven sections of the Standard:

This Security Policy describes how this module complies with the eleven sections of the Standard: Vormetric, Inc Vormetric Data Security Server Module Firmware Version 4.4.1 Hardware Version 1.0 FIPS 140-2 Non-Proprietary Security Policy Level 2 Validation May 24 th, 2012 2011 Vormetric Inc. All rights

More information

CONV:01. Conversion. en-gb. User manual. Issue 5. Scania CV AB 2014, Sweden

CONV:01. Conversion. en-gb. User manual. Issue 5. Scania CV AB 2014, Sweden CONV:01 Issue 5 en-gb Conversion User manual 346 271 Scania CV AB 2014, Sweden General... 3 Advantages of Conversion... 3 Conditions... 4 Recommendations... 4 Order access to Conversion... 4 Finding Conversion...

More information

IBM Presentations: Implementing SSL Security in WebSphere Partner Gateway

IBM Presentations: Implementing SSL Security in WebSphere Partner Gateway IBM Software Group IBM Presentations: Implementing SSL Security in WebSphere Partner Gateway Presenter: Max Terpolilli WPG L2 Support WebSphere Support Technical Exchange Agenda IBM Software Group Digital

More information

Configuring SSL. SSL Overview CHAPTER

Configuring SSL. SSL Overview CHAPTER CHAPTER 8 Date: 4/23/09 This topic describes the steps required to configure your ACE (both the ACE module and the ACE appliance) as a virtual Secure Sockets Layer (SSL) server for SSL initiation or termination.

More information

Magyar Nemzeti Bank Electronic System for Receiving Authenticated Data ERA. Electronic Signature User Documentation

Magyar Nemzeti Bank Electronic System for Receiving Authenticated Data ERA. Electronic Signature User Documentation ERA Electronic Signature User Documentation Table of Contents 1. Introduction... 3 1.1. General information... 3 2. DesktopSign... 3 2.1. General information... 3 2.2. Installation... 3 3. MNBSubscriber...

More information

Exam : Title : Security Solutions for Systems Engineers(SSSE) Version : Demo

Exam : Title : Security Solutions for Systems Engineers(SSSE) Version : Demo Exam : 642-565 Title : Security Solutions for Systems Engineers(SSSE) Version : Demo 1. SomeCompany, Ltd. wants to implement the the PCI Data Security Standard to protect sensitive cardholder information.

More information

Cryptography (Overview)

Cryptography (Overview) Cryptography (Overview) Some history Caesar cipher, rot13 substitution ciphers, etc. Enigma (Turing) Modern secret key cryptography DES, AES Public key cryptography RSA, digital signatures Cryptography

More information

Recommendations for Device Provisioning Security

Recommendations for Device Provisioning Security Internet Telephony Services Providers Association Recommendations for Device Provisioning Security Version 2 May 2017 Contact: team@itspa.org.uk Contents Summary... 3 Introduction... 3 Risks... 4 Automatic

More information

I-Portal Training. December 2016

I-Portal Training. December 2016 I-Portal Training December 2016 Agenda I II III Introduction Training Documents User Training Documents Administration Status: December 2016 2 Introduction What is I-Portal? I-Portal is a web-based application

More information

Portal/Extranet User Guide for Clients

Portal/Extranet User Guide for Clients Portal/Extranet User Guide for Clients Welcome to the ichannel Portal/Extranet. This guide will walk you through logging into your personalized, secure portal/extranet site. It will also show you how to

More information

SFT User Manual C:D. Secure File Transfer with Connect:Direct. Document date: 15 November 2016 Classification: Open Version: 4.0

SFT User Manual C:D. Secure File Transfer with Connect:Direct. Document date: 15 November 2016 Classification: Open Version: 4.0 SFT User Manual C:D Secure File Transfer with Connect:Direct Document date: 15 November 2016 Classification: Open Version: 4.0 Copyright equensworldline SE and/or its subsidiaries. All rights reserved.

More information

CitiDirect BE Portal Security, technical requirements and configuration

CitiDirect BE Portal Security, technical requirements and configuration CitiDirect BE Portal Security, technical requirements and configuration CitiService CitiDirect BE Helpdesk tel. 801 343 978, +48 22 690 15 21 Monday to Friday; 8:00 17:00 helpdesk.ebs@citi.com www.citihandlowy.pl

More information

ODYSSEY. cryptic by intent. Snorkel-TX. Feature Highlights & Technical Specifications. Odyssey Technologies Ltd.

ODYSSEY. cryptic by intent. Snorkel-TX. Feature Highlights & Technical Specifications. Odyssey Technologies Ltd. Snorkel-TX Feature Highlights & Technical Specifications Snorkel-TX is a powerful transaction security server that enables failsafe authentication, access control, non-repudiation and integrity for web

More information

Secure Access Manager User Guide December 2017

Secure Access Manager User Guide December 2017 Secure Access Manager User Guide December 2017 Copyright 2017 Exostar, LLC All rights reserved. 1 INTRODUCTION... 3 SUMMARY... 3 BASIC FUNCTIONS... 3 LOGIN TO YOUR SAM ACCOUNT... 3 How to Activate your

More information

But where'd that extra "s" come from, and what does it mean?

But where'd that extra s come from, and what does it mean? SSL/TLS While browsing Internet, some URLs start with "http://" while others start with "https://"? Perhaps the extra "s" when browsing websites that require giving over sensitive information, like paying

More information

Using SSL to Secure Client/Server Connections

Using SSL to Secure Client/Server Connections Using SSL to Secure Client/Server Connections Using SSL to Secure Client/Server Connections, page 1 Using SSL to Secure Client/Server Connections Introduction This chapter contains information on creating

More information

THE CO-OPERATIVE BANK OF KENYA LIMITED

THE CO-OPERATIVE BANK OF KENYA LIMITED 1 IMPORTANT NOTES TO SUPPLIERS (a) The purpose of this document is to assist Co-operative Bank of Kenya in the identification and evaluation of potential suppliers who may subsequently be invited to tender

More information

LinQ2FA. Helping You. Network. Direct Communication. Stay Fraud Free!

LinQ2FA. Helping You. Network. Direct Communication. Stay Fraud Free! LinQ2FA Stay Fraud Free! Helping You Direct Communication Secure to your Your customers Network LINQ2FA Stay Fraud Free! Enhance your security against cyber fraud with Two Factor Authentication Suitable

More information

Salesforce Integration User Guide. Cvent, Inc 1765 Greensboro Station Place McLean, VA

Salesforce Integration User Guide. Cvent, Inc 1765 Greensboro Station Place McLean, VA Salesforce Integration User Guide 2017 Cvent, Inc 1765 Greensboro Station Place McLean, VA 22102 www.cvent.com Contents Salesforce Integration User Guide... 3 Setting Up Your Account... 4 Helpful Hints...

More information

How to Connect with SSL Network Extender using a Certificate

How to Connect with SSL Network Extender using a Certificate How to Connect with SSL Network Extender using a Certificate 29 August 2011 2011 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected by copyright

More information

SmartSolutions Portal User Guide

SmartSolutions Portal User Guide SmartSolutions Portal User Guide Managing group permissions Updated 28/04/17 v1 In this guide we will show you how to manage and edit the permissions of other users within your organisation. 1. First,

More information

CS November 2018

CS November 2018 Authentication Distributed Systems 25. Authentication For a user (or process): Establish & verify identity Then decide whether to allow access to resources (= authorization) Paul Krzyzanowski Rutgers University

More information

Mobile Login Extension User Manual

Mobile Login Extension User Manual Extension User Manual Magento provides secured and convenient login to Magento stores through mobile number along with OTP. Table of Content 1. Extension Installation Guide 2. API Configuration 3. General

More information

Using Lloyd s Direct Reporting. User Guide

Using Lloyd s Direct Reporting. User Guide Using Lloyd s Direct Reporting User Guide AUGUST 2013 2 Contents CONTENTS 2 LLOYD S DIRECT REPORTING 3 ABOUT THIS SERVICE 3 FURTHER HELP AND SUPPORT 3 USER GUIDE 4 ACCESSING LLOYD S DIRECT REPORTING 4

More information

Exploring the potential of Mobile Connect: From authentication to identity and attribute sharing. Janne Jutila, Head of Business Development, GSMA

Exploring the potential of Mobile Connect: From authentication to identity and attribute sharing. Janne Jutila, Head of Business Development, GSMA Exploring the potential of Mobile Connect: From authentication to identity and attribute sharing Janne Jutila, Head of Business Development, GSMA Fragility of passwords No matter what you tell them, users

More information

WORKSTATION SETUP GUIDE FOR ACCESSING THE MIBGAS PLATFORM. Date: 15/12/2016. Version: 4.1 MERCADO IBÉRICO DEL GAS

WORKSTATION SETUP GUIDE FOR ACCESSING THE MIBGAS PLATFORM. Date: 15/12/2016. Version: 4.1 MERCADO IBÉRICO DEL GAS WORKSTATION SETUP GUIDE FOR ACCESSING THE MIBGAS PLATFORM Date: 15/12/2016 Version: 4.1 Alfonso XI, 6. 28014 Madrid (España) www.mibgas.es T (+34) 91 268 26 01 CONTENTS 1 INTRODUCTION 2 2 PRIOR REQUISITES

More information

SC Common Reporting (ComRep) Portal User Manual

SC Common Reporting (ComRep) Portal User Manual SC Common Reporting (ComRep) Portal User Manual 1 Contents Page 1. Introduction 1.1 Overview of ComRep portal: brief overview and explanation on ComRep objectives, features and user roles. 3 2. Get Started

More information

Quick Guide to TIDE: Adding Users and Students

Quick Guide to TIDE: Adding Users and Students Quick Guide to TIDE: Adding Users and Students Test Coordinators use TIDE to add and manage user accounts and to add students participating in the South Carolina Alternate Assessment. This Quick Guide

More information

Guide to the Distributor Zone

Guide to the Distributor Zone Guide to the Distributor Zone Registering for a Distributor account Logging into the Distributor Zone Updating your profile Registering for a Challenge Registering a Participant Connecting a Participant

More information

Bugzilla ID: Bugzilla Summary:

Bugzilla ID: Bugzilla Summary: Bugzilla ID: Bugzilla Summary: CAs wishing to have their certificates included in Mozilla products must 1) Comply with the requirements of the Mozilla CA certificate policy (http://www.mozilla.org/projects/security/certs/policy/)

More information

JIRA Integration Guide

JIRA Integration Guide JIRA Integration Guide 2018 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property of their respective

More information

Frequently Asked Questions for the Chinabond Integrated Operation Platform (CIOP) Online. (For Overseas Clearing Members)

Frequently Asked Questions for the Chinabond Integrated Operation Platform (CIOP) Online. (For Overseas Clearing Members) Frequently Asked Questions for the Chinabond Integrated Operation Platform (CIOP) Online (For Overseas Clearing Members) This translation has been prepared solely for reference purposes, shall not have

More information

Exostar Identity Access Platform (SAM) User Guide September 2018

Exostar Identity Access Platform (SAM) User Guide September 2018 Exostar Identity Access Platform (SAM) User Guide September 2018 Copyright 2018 Exostar, LLC All rights reserved. 1 INTRODUCTION... 4 SUMMARY... 4 Exostar IAM Platform (SAM) Organization and User Types...

More information

Workspace ONE UEM Certificate Authentication for Cisco IPSec VPN. VMware Workspace ONE UEM 1810

Workspace ONE UEM Certificate Authentication for Cisco IPSec VPN. VMware Workspace ONE UEM 1810 Workspace ONE UEM Certificate Authentication for Cisco IPSec VPN VMware Workspace ONE UEM 1810 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

Viewing System Status, page 404. Backing Up and Restoring a Configuration, page 416. Managing Certificates for Authentication, page 418

Viewing System Status, page 404. Backing Up and Restoring a Configuration, page 416. Managing Certificates for Authentication, page 418 This chapter describes how to maintain the configuration and firmware, reboot or reset the security appliance, manage the security license and digital certificates, and configure other features to help

More information

On the Insert tab, the galleries include items that are designed to coordinate with the overall look of

On the Insert tab, the galleries include items that are designed to coordinate with the overall look of INVESTOR REGISTRATION PROCESS HEADING 1 On the Insert tab, the galleries include items that are designed to coordinate with the overall look of your document. You can use these galleries to insert tables,

More information

Composer Help. Web Request Common Block

Composer Help. Web Request Common Block Composer Help Web Request Common Block 7/4/2018 Web Request Common Block Contents 1 Web Request Common Block 1.1 Name Property 1.2 Block Notes Property 1.3 Exceptions Property 1.4 Request Method Property

More information

Aetna Contracting Process

Aetna Contracting Process Aetna Contracting Process Multi-Factor Authentication Login Process First time applicants and returning applicants both should login using the Aetna specific link using Internet Explorer: https://www.ainsight.com/nomoreforms/logon?type=client_nonins&clientcode=cnty

More information

Indiana State Department of Health (ISDH) Survey Report System Health Care Facility User s Manual

Indiana State Department of Health (ISDH) Survey Report System Health Care Facility User s Manual Indiana State Department of Health (ISDH) Survey Report System Health Care Facility User s Manual February 11, 2011 Table of Contents Topic Page 1.0 Getting Started 3 1.1 Purpose of Manual 3 1.2 Overview

More information

The Social Value Portal

The Social Value Portal The Social Value Portal User Guidance v4.0 Summary Register at http://socialvalueportal.com/supplier-registration/ You will receive a username, and be prompted to setup a password. Login at http://socialvalueportal.com/svp-login/

More information

Security Strategy for Mobile ID GSMA Mobile Connect Summit

Security Strategy for Mobile ID GSMA Mobile Connect Summit Security Strategy for Mobile ID GSMA Mobile Connect Summit Singapore, 22 nd November 2017 G+D Mobile Security G+D Mobile Security: Managing Billions of Connected Digital Identities Today 660 million contactless

More information

Elastic Load Balance. User Guide. Issue 01 Date HUAWEI TECHNOLOGIES CO., LTD.

Elastic Load Balance. User Guide. Issue 01 Date HUAWEI TECHNOLOGIES CO., LTD. Issue 01 Date 2018-04-30 HUAWEI TECHNOLOGIES CO., LTD. 2018. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of

More information

ISY994 Series Network Security Configuration Guide Requires firmware version Requires Java 1.8+

ISY994 Series Network Security Configuration Guide Requires firmware version Requires Java 1.8+ ISY994 Series Network Security Configuration Guide Requires firmware version 4.5.4+ Requires Java 1.8+ 1 Introduction Universal Devices, Inc. takes ISY security extremely seriously. As such, all ISY994

More information

DCARC Defense Cost & Resource Center

DCARC Defense Cost & Resource Center DCARC Defense Cost & Resource Center EVM Central Repository Submitter Guide 7/26/2014 1 Submitter Training The following document provides step-by-step screenshots to illustrate the major actions performed

More information

Welcome to State Bank of Herscher s Online Banking!

Welcome to State Bank of Herscher s Online Banking! Welcome to State Bank of Herscher s Online Banking! 1. To enroll in Online Banking, click on Enroll below the Online Banking Login on our website: www.sbherscher.com 2. You will be taken to the Enrollment

More information

Exostar Identity Access Platform (SAM) User Guide July 2018

Exostar Identity Access Platform (SAM) User Guide July 2018 Exostar Identity Access Platform (SAM) User Guide July 2018 Copyright 2018 Exostar, LLC All rights reserved. 1 Version Impacts Date Owner Identity and Access Management Email Verification (Email OTP) July

More information

CA Service Desk Integration with Remote Support

CA Service Desk Integration with Remote Support CA Service Desk Integration with Remote Support 2003-2019 BeyondTrust Corporation. All Rights Reserved. BEYONDTRUST, its logo, and JUMP are trademarks of BeyondTrust Corporation. Other trademarks are the

More information

How to take up my assessment?

How to take up my assessment? 2011, Cognizant How to take up my assessment? Step 1 : You have to take up the assessment only using the Virtual Desktop Interface (VDI environment) Please use the URL, https://learninglabs.cognizant.com

More information

NeoAccel NeoAccel Management Console: Gateway Gateway Administration version version 2.3

NeoAccel NeoAccel Management Console: Gateway Gateway Administration version version 2.3 SSL VPN-Plus TM NeoAccel NeoAccel Management Console: Console: Gateway Gateway Administration version version 2.3 2.0 Copyright 2005-2006. 2005-2009. NeoAccel Inc. NeoAccel Inc. NMC - Volume II -SSL VPN-Plus-v2.33

More information

Enterprise Certificate Console. Simplified Control for Digital Certificates from the Cloud

Enterprise Certificate Console. Simplified Control for Digital Certificates from the Cloud Enterprise Certificate Console Simplified Control for Digital Certificates from the Cloud HydrantID Enterprise Management Console HydrantID s HydrantSSL Enterprise service and HydrantCloud Managed PKI

More information

System Setup. Accessing the Administration Interface CHAPTER

System Setup. Accessing the Administration Interface CHAPTER CHAPTER 3 The system can be configured through the web interface to provide the networking configuration for the appliance and other system settings that are important such as time and SSL certificate.

More information