The T2S Dedicated Link solution. Connectivity Workshop 27 February S. Orsini, B. Giangregorio, D. Bernabucci Banca d Italia (4CB)

Size: px
Start display at page:

Download "The T2S Dedicated Link solution. Connectivity Workshop 27 February S. Orsini, B. Giangregorio, D. Bernabucci Banca d Italia (4CB)"

Transcription

1 The T2S Dedicated Link solution Connectivity Workshop 27 February 2012 S. Orsini, B. Giangregorio, D. Bernabucci Banca d Italia (4CB) 1

2 Disclaimer The following slides summarize the envisaged implementation of the T2S Dedicated Links Connectivity Services. Network connectivity is out of the scope of this presentation. Proof of Concepts with VANs providers (SWIFT and SIA-COLT) are in progress. Consequently some optimizations and fine tunings of Data Exchange Protocol (DEP) are expected; the final version of the protocol will be made available at the end of the PoCs. All pictures are just given as an example and are not intended to be exhaustive of all options. 2

3 AGENDA 1. OVERVIEW 2. CONNECTIVITY SERVICES 3. VALUE ADDED CONNECTIVITY SERVICES 3

4 1. OVERVIEW Connectivity options DiCoA 1 DiCoA 2 DiCoA 3 DiCoA 4 DiCoA 5 VA-NSP 1 VA-NSP 2 CORENET Region 1 SITE A SITE C Region 2 SITE B SITE D 4CB Network BdE SITE E SITE F Region 3 4

5 1. OVERVIEW Recovery management - principles No changes or update of configuration shall be requested to the DiCoAs in case of the following events: Periodical rotation between Region 1 and Region 2; Local recovery (swap of sites within a Region); Regional recovery (swap of Regions); and during the recovery/rotation tests. 5

6 1. OVERVIEW Recovery management - DNS T2S DiCoA DNS cache CPE Site A root DNS DNS cache DNS cache CPE CPE PE PE DNS CORENET DNS PE PE PE PE CPE CPE DNS cache Site B DNS cache root DNS Site C DNS cache CPE = IBM WebSphere Site D 6

7 1. OVERVIEW Capacity Planning DiCoAs shall provide theirs capacity planning breakdown data to T2S in order to size and configure the T2S interface for incoming and outgoing traffic. Any deviation (e.g. new workload figures, changes in the daily traffic profile) shall be communicated in due time to T2S to adjust the configuration. 7

8 AGENDA 1. OVERVIEW 2. CONNECTIVITY SERVICES Application to application (A2A) 3. VALUE ADDED CONNECTIVITY SERVICES A2A - Scenarios A2A - Data Exchange Protocol (DEP) A2A - W connection User to application (U2A) 8

9 2. CONNECTIVITY SERVICES A2A scenarios The communication T2S - DiCoA via VA-NSPs VAN Protocol W Data Exchange Protocol (DEP) The communication T2S - DiCoA via CORENET W Data Exchange Protocol (DEP) 9

10 2. CONNECTIVITY SERVICES A2A - Data Exchange Protocol (DEP) T2S VA-NSP 1 DiCoA1 W -DEP W M Q VAN protocol CORENET W -DEP DiCoA2 10

11 2. CONNECTIVITY SERVICES A2A scenarios VA-NSPs provide three level of services: Pure connectivity services (network level); DEP translation and handling; Value Added Connectivity Services (e.g. real time, store and forward, Closed Group of Users, PKI, timeout management, size management, nonrepudiation). CORENET provides : Pure connectivity services (network level). Value Added Connectivity Services are provided by T2S 11

12 2. CONNECTIVITY SERVICES A2A - Data Exchange Protocol (DEP) Sender and receiver information in the Technical Header are used to perform network addressing and are based on the distinguished name (DN) of the digital certificate The Business Header contains the signature of the business information made with the end-user certificate DEP TECHNICAL INFORMATION BUSINESS INFORMATION TECHNICAL HEADER Sender, Receiver, Service Name, Technical Signature,. BUSINESS HEADER.. Business Signature,. BUSINESS AREA Message or file payload MESSAGE/FILE 12

13 2. CONNECTIVITY SERVICES A2A - W connection DiCoA DiCoA DiCoA DiCoA DiCoA DiCoA GW VA NSP 1 GW VA NSP 2 z/os Middlew are Middleware Middlew are Middleware Middlew are Middleware Middlew are Middleware The policy used to connect to T2S follows the rules reported below: Each DiCoA connected via CORENET or VA-NSP provider has its own dedicated set of channels Each set of channels is composed by: - At least a couple of channels (incoming and outgoing from T2S) for each message/file flow - Channels dedicated to technical acknowledgement for each message flow Connectivity is protected by SSL with mutual authentication based on digital certificates provided by T2S AF Access Facade AF Access Facade AF Access Facade AF Access Facade APPL APPL APPL APPL 13

14 2. CONNECTIVITY SERVICES A2A - W connection T2S Server-Server DiCoA1 T2S Server-Client DiCoA1 DiCoA1.in.L01 DiCoA1.out.R 01(xmitq) RCVR SDR DiCoA1.MRT.IN.RCV. 01 DiCoA1.MRT.OUT.SEN.0 1 SDR DiCoA1.out.R01 (xmitq) RCVR DiCoA1.in.L01 DiCoA1.in.L01 DiCoA1.out.L0 1 SRVCONN SRVCONN DiCoA1.MRT.IN.SRV.0 1 DiCoA1.MRT.OUT.SRV.0 1 API DiCoA2 DiCoA2 DiCoA2.in.L01 DiCoA2.out.R 01(xmitq) RCVR SDR DiCoA2.MRT.IN.RCV. 01 DiCoA2.MRT.IN.SEN.0 1 SDR RCVR DiCoA2.out.R01 (xmitq) DiCoA2.in.L01 DiCoA2.in.L01 DiCoA2.out.L0 1 SRVCONN SRVCONN DiCoA2.MRT.IN.SRV.01 DiCoA2.MRT.OUT.SRV.0 1 API Both configuration are supported by T2S For availability and recovery reason T2S suggests to use W server-server communication mode Client-server communication is supported as well, but in this case is out of the responsibility of T2S the loss of messages due to connection failure or bad management of commit phase from client side 14

15 2. CONNECTIVITY SERVICES A2A - W naming convention Channels ccc.mmmm.ddd.ttt.nn ccc connector identifier(van/dicoa) mmmm messaging service identifier ddd direction ttt Type nn number example: DC1.MRT.IN.SRV.01 Queues cbbl.ddd.xxxxxxxxxx.ttnn cbb VAN name/dicoa l logical environment (optional) ddd direction xxxxxxxxxx name suggested by application supplier (eg. Messaging service) tt queue type nn progressive number (optional) example: DC1.IN.MSG_RT.SHnn 15

16 2. CONNECTIVITY SERVICES A2A - W security SSL connection W z/os DiCoA DN=DiCoA DiCoA.MRT.IN.SRV.01 DiCoA.MRT.OUT.SRV.01 incoming outgoing DiCoA.MRT.IN.RCV.01 Channel definition SSL certificate required. : Yes Userid: DiCoA DiCoA.IN.L01 SSL peer name : CN=DiCoA.net.eac,OU=Servizi di certificazione dei sistemi informatici - Collaudo,O=Banca d'italia Collaudo,C=it DiCoA.OUT.L01 PUTAUTH:OnlyMCA MCAUSER:DiCoA DN=T2S Channel initiator Queue Manager VAN1 DN=VAN VAN.MRT.IN.SRV.01 incoming VAN.MRT.IN.SRV.01 Channel definition SSL certificate required. : Yes SSL peer name : CN=van.net.eac,OU=Servizi di certificazione dei sistemi informatici - Userid:VAN Collaudo,O=Banca d'italia Collaudo,C=it PUTAUTH:OnlyMCA MCAUSER:VAN VAN.IN.L01 VAN.OUT.L02 VAN.MRT.OUT.SRV.01 outgoing DN=T2S 16

17 2. CONNECTIVITY SERVICES User to application (U2A) The T2S shall provide for U2A the following services: enabling web traffic between the T2S users workstations and the T2S platform; exchanging data using HTTPs protocol; identifying and authenticating the T2S users via digital certificates used to establish the HTTPs session with the T2S platform. 17

18 AGENDA 1. OVERVIEW 2. CONNECTIVITY SERVICES 3. VALUE ADDED CONNECTIVITY SERVICES Store and Forward Real Time Closed User Group Throttling PKI Non-repudiation 18

19 3. VALUE ADDED CONNECTIVITY SERVICES Store and Forward VA-NSP T2S Request Tech.Ack CORENET DiCoA1 Guaranteed delivery of messages the VAN provider stores the messages received by the sender and controls the delivery of message to the receiver. Controlled by the following parameters : Retry 10 times to send the message to the receiver in case of missing technical ack within 10 minutes Storing messages for 14 days in case of unavailability of the receiver dep:deliverynotification flag enables the reception of a DeliveryNotification messages with the status of the exchange (failed or successful) EnableSnfTraffic DisableSnfTraffic DEP primitives used to control the SnF service 19

20 3. VALUE ADDED CONNECTIVITY SERVICES Store and Forward For DL connection, the store-and-forward service can be implemented in two ways (excluding the retry in case of missing acks that must be implemented) depending on the W connection chosen by the DiCoA: 1. server-server W connection 2. client-server W connection SnF functions are implemented inheriting partially inheriting W basic W functionalities basic functionalities integrated Store by messages the sender in client the transmission application queues is similar to the function provided Store messages by the VAN in the that client stores application messages in provides case of a unavailability similar function of the to store receiver messages in case of unavailability of the receiver Confirm on Delivery report can be checked by the sender in case of needs and it can replace the usage of dep:deliverynotification flag Availability of channels (in running or stopped status) can replace the usage of EnableSnfTraffic DisableSnfTraffic DEP primitives used to control the SnF services 20

21 3. VALUE ADDED CONNECTIVITY SERVICES Real Time T2S CORENET Request Tech.Ack Response Tech.Ack DiCoA1 Real time messaging service is based on the following parameters : request-response chain must be completed in 60 seconds: in case that the response production is not finished within the 60 seconds, then the communication should be interrupted request-response chain is normally done on the same messaging services (e.g. request and response sent via MSGRT service). In case that the response size doesn t fit the request messaging service, then the response need to be sent via another messaging service to the receiver Based on this two limitation the timeout management and oversize management functions are developed by T2S 21

22 3. VALUE ADDED CONNECTIVITY SERVICES Real Time Timeout management In order to heal the timeout limit (60 seconds), T2S applies an effective protocol. T2S defines a timeout limit that anticipates the RT timeout limit. If the processing of a response takes longer than the T2S timeout limit the transfer mode of the response changes from real-time to store and forward. T2S process steps: 1. a RT response is sent to the DiCoA containing Inbound Processing Rejection ReceiptAcknowledgement and indicating that a T2S timeout occurred anyway the request is still in process; 2. when the data is available, the response is sent in store and forward mode to the the DiCoA (sender). 22

23 3. VALUE ADDED CONNECTIVITY SERVICES Real Time Oversize management if the response to a request on the message channel is over the size limit (32KB), the file Store and forward channel is used. T2S process steps: 1. a RT response is sent to the DiCoA containing an Inbound Processing Rejection ReceiptAcknowledgement in real-time mode indicating the change of the transfer mode; 2. the response is sent in store and forward mode. 23

24 3. VALUE ADDED CONNECTIVITY SERVICES Closed User Group Technical infrastructure for Closed User Group (CUG) to segregate traffic are implemented at different layers in T2S (transport network is out of the scope of VACS): Firewall; W ; DEP protocol; T2S middleware. 24

25 3. VALUE ADDED CONNECTIVITY SERVICES CUG-logical view DiCoA 1 T2S CPE CPE EAC MIG1 MIG2 UTEST DiCoA 2 EAC PE PE CPE MIG1 MIG2 CPE PE CORENET PE UTEST DiCoA 3 PE PE PE CPE PROD CPE CPE PROD 25

26 3. VALUE ADDED CONNECTIVITY SERVICES CUG - Firewalls A basic IP filtering is implemented on the T2S firewalls although any distinction between different environment (Production vs Test and Training). 26

27 3. VALUE ADDED CONNECTIVITY SERVICES CUG - W segregation Separation between Test and Training vs Production environments. Test and Training environments and Production run in different regions (i.e. different data center). A W instance is dedicated to each logical environment. Each W instance uses different TCP ports. Each DiCoA has its own dedicated set of W resources in T2S (channels and queues). The DiCoA authentication is based on digital certificates exchanged in a SSL session. The DiCoA authorization to access the relative dedicated set of queue is achieved checking the DN in the digital certificate (that contains the logical environment too). 27

28 3. VALUE ADDED CONNECTIVITY SERVICES CUG - DEP segregation dep:technicalserviceid <mandatory tag> Name of the service used to send messages and files, formed by the Network Service Provider name, the message pattern and the environment of reference. Specifying a message pattern, it s possible to manage a message or a file as a payload of the DEP message. Message pattern meaning is the following: MSGRT: Real Time Message; MSGSNF: Store & Forward Message; FILERT: Real Time File; FILESNF: Store & Forward File. Restriction is set on base type "string [60]", with expression in the format: [NSP_name].[msg_pattern].[environment] where msg_pattern= {MSGRT MSGSNF FILERT FILESNF} and environment= {EAC UTEST MIG1 MIG2 PROD }. <dep:technicalserviceid> nsp-name1.msgrt.prod </dep:technicalserviceid> 28

29 3.The Value Added Connectivity Services CUG T2S middleware implementation T2S checks the ExchangeHeader content during the reception process of messages through the following tags dep:technicalserviceid is checked to verify the correct addressing of message against the specific logical environment dep:sender is controlled to verify that the DiCoA is delivering messages with the proper technical sender identifier. 29

30 3. VALUE ADDED CONNECTIVITY SERVICES Throttling DiCoA Middleware Middleware Middleware DiCoA DiCoA Middleware AF APPL DiCoA DiCoA Throttling mechanism is used to avoid that single user can overload the system. Exclusion of single DiCoA can be performed by closing the dedicated channel 30

31 3.The Value Added Connectivity Services CUG U2A Identity and Access Management In U2A a IAM infrastructure will be provided for strong authentication of users based on smart card or USB token. DN of certificates registered in the Static Data are periodically imported in IAM directory. IAM will control the validity of the certificate and checks that the certificate DN is in the IAM directory. IAM directory are segregated per environment. 31

32 3. VALUE ADDED CONNECTIVITY SERVICES Public Key Infrastructure (PKI) T2S will deliver a PKI compliant to the ISO standard and to the EU Directive. It provides the following functions: Registration Authority; Key Generation; Certificate Management; Certificate validation. T2S will provide interface to the PKI services to T2S platform and T2S actors. Digital certificates will be stored in smart card/usb token (U2A) and in HSM (A2A). 32

33 3. VALUE ADDED CONNECTIVITY SERVICES PKI Digital Keys used in U2A scenario T2S platform HTTPS protocol CORENET T2S DiCoA Digital key used by T2S for server authentication Digital key used by DiCoAs for user authentication 33

34 3. VALUE ADDED CONNECTIVITY SERVICES Digital keys used in A2A scenario T2S platform DEP SSL protocol CORENET DiCoA Digital keys used to authenticate the channel Digital key used by DiCoA to sign DEP (technical header and technical ack) Digital key used by T2S to sign DEP (technical header and technical ack) and business information (business header) Digital key used by T2S DiCoA to sign business information 34

35 3. VALUE ADDED CONNECTIVITY SERVICES PKI Provisioning of certificates The identification of users will be managed by the T2S Registration Authority. With regard to certificates for individual users, private and public keys are generated in T2S premises during the process of producing the smartcard/usb token and the certificate. Regarding application certificates, private and public keys ( key pairs ) are generated on the HSM at the DiCoA site; the T2S PKI will be responsible of generating the related certificate. 35

36 3. VALUE ADDED CONNECTIVITY SERVICES PKI Certificate issuance process Roles: Security Officer at DiCoA initiates the process for requesting new certificates The T2S service desk ensures the identification of the user and deliver the smart cards and certificates to the users The T2S service desk acts as Registration authority and interacts with T2S CA administrators. T2S CA administrators produce the smart cards or USB tokens and generate the certificates. 36

37 3. VALUE ADDED CONNECTIVITY SERVICES PKI - Certificate issuance process for individual users T2S Certificate issuance process for individual users DiCoA T2S Service desk T2S PKI Admin. Define the users Fill in the forms Formal check yes Send the forms filled in to the NCB Receive the forms Approve the request Evaluate the forms and ensure the identification of the user Generate the certificates Forms ok yes Register the request in the RA web application Prepare the PKI kit (smart card, documentation, PIN, PUK, ) no Request the missing information 37

38 3. VALUE ADDED CONNECTIVITY SERVICES PKI - Certificate issuance process for apps and devices T2S Certificate issuance process for applications and devices DiCoA T2S Service Desk T2S PKI Admin. Define the user (Institution or device name) Receive the forms Fill in the forms Send the forms filled in to the NCB Evaluate the forms Forms ok no Request the missing information yes Forward the forms to the T2S PKI Admin. Formal check yes Send Reference Number to the T2S Service Desk Generate keys and Certificate Signing Request using the Reference Number Send a Certificate Signing Request to the T2S Service Desk Receive and install the certificate Forward the reference number to the DiCoA Forward the Certificate Signing Request to T2S PKI Admin Forward the certificate to the DiCoA Enroll the certificate 38

39 3. VALUE ADDED CONNECTIVITY SERVICES PKI CRL and non repudiation During verification of signature DiCoA shall verify certificates against the CRL of the T2S PKI CA T2S will provide CRL proxy to allow DiCoA to access the CRL via the CORENET. Non repudiation of emission and receipt is foreseen in case of messages with dep:non-repudiation flag in Exchange header 39

40 3. VALUE ADDED CONNECTIVITY SERVICES PKI - Non repudiation (1/2) Incoming messages (Store and Forward service) B-MSG [NRO] DEP: NRE T2S platform TECH-ACK DEP: NRR 2 CORENET 1 T2S DiCoA T2S NR log DEP T2S DiCoA NR log 1 DiCoAs send business message with signature for NRO to T2S using DEP-Protocol with NRE option (NR flag in technical header and signature of message with DiCoA key) 2 T2S sends TECH-ACK to DiCoA including receiving time and signature for NRR of T2S 40

41 3. VALUE ADDED CONNECTIVITY SERVICES PKI - Non repudiation (2/2) Outgoing messages (Store and Forward service) B-MSG [NRO] DEP: NRE 1 T2S platform CORENET 2 TECH-ACK DEP: NRR T2S DiCoA T2S NR log DEP T2S DiCoA NR log 1 2 T2S sends businsess message to DiCoA with T2S signature for NRO using DEP-Protocol with NRE option (NR flag in technical header and signature of message with T2S key) DiCoA sends TECH-ACK to T2S with a signature for NRR 41

42 Q & A 42

T2S Connectivity Guide

T2S Connectivity Guide T2S Connectivity Guide Page 1 of 23 T2S Connectivity Guide Author 4CB Version 1.0 Date 29/11/2013 Status Classification Classified until Final Public N/A T2S Connectivity Guide Page 2 of 23 TABLE OF CONTENTS

More information

Dedicated Links Connectivity Specifications

Dedicated Links Connectivity Specifications V0.1 Author 4CB Version V0.1 Date 28/10/2011 All rights reserved. Reproduction for educational and non-commercial purposes is permitted provided that the source is acknowledged. Introduction 1. INTRODUCTION

More information

T2/T2S CONSOLIDATION USER REQUIREMENTS DOCUMENT SHARED SERVICES (SHRD) FOR

T2/T2S CONSOLIDATION USER REQUIREMENTS DOCUMENT SHARED SERVICES (SHRD) FOR T2/T2S CONSOLIDATION USER REQUIREMENTS DOCUMENT FOR SHARED SERVICES (SHRD) Version: 1.0 Status: FINAL Date: 06/12/2017 Contents 1 EUROSYSTEM SINGLE MARKET INFRASTRUCTURE GATEWAY (ESMIG)... 6 1.1 Overview...

More information

Il presente documento è conforme all'originale contenuto negli archivi della Banca d'italia

Il presente documento è conforme all'originale contenuto negli archivi della Banca d'italia Il presente documento è conforme all'originale contenuto negli archivi della Banca d'italia Firmato digitalmente da Sede legale Via Nazionale, 91 - Casella Postale 2484-00100 Roma - Capitale versato Euro

More information

T2S Connectivity SIA-Colt value proposition

T2S Connectivity SIA-Colt value proposition T2S Connectivity SIA-Colt value proposition T2S Info Session Malta, 18 April 2012 2010 Colt Telecom Group Limited. All rights reserved. T2S fosters changes in the Financial Messaging Market The European

More information

T2S Dedicated Link Connectivity Solution

T2S Dedicated Link Connectivity Solution T2S Dedicated Link Connectivity Solution Presentation Meeting, 22 April 2013 T2S Programme Office European Central Bank 0 Dedicated Link Presentation Agenda Dedicated Link Origin Dedicated Link Overview

More information

/2011/ Item 8.2

/2011/ Item 8.2 09.04.01/2011/010381 Item 8.2 Change request form Page 1 of 15 REFERENCES L2 reference T2S 0300 URD created on 28/09/2011 (AG) Referenced documents CR_T2S_0300_URD_v0-0- 1.doc General Information (Origin

More information

Public. Atos Trustcenter. Server Certificates + Codesigning Certificates. Version 1.2

Public. Atos Trustcenter. Server Certificates + Codesigning Certificates. Version 1.2 Atos Trustcenter Server Certificates + Codesigning Certificates Version 1.2 20.11.2015 Content 1 Introduction... 3 2 The Atos Trustcenter Portfolio... 3 3 TrustedRoot PKI... 4 3.1 TrustedRoot Hierarchy...

More information

Proof of concept AS4. Version 1 Revision ITC-KG AS4 Proof of Concept 16 January 2014 Draft INT

Proof of concept AS4. Version 1 Revision ITC-KG AS4 Proof of Concept 16 January 2014 Draft INT ITC-KG AS4 Proof of Concept 16 January 2014 Draft Proof of concept AS4 Version 1 Revision 02 2014-01-08 ENTSOG AISBL; Av. de Cortenbergh 100, 1000-Brussels; Tel: +32 2 894 5100; Fax: +32 2 894 5101; info@entsog.eu,

More information

ASX ReferencePoint ISO Intra-Day Corporate Actions. SWIFT Readiness Guide

ASX ReferencePoint ISO Intra-Day Corporate Actions. SWIFT Readiness Guide ASX ReferencePoint ISO 20022 Intra-Day Corporate Actions SWIFT Readiness Guide Version 1.4 22 September 2014 1 Document purpose ASX has launched a new ISO 20022 feed for Corporate Actions, delivered over

More information

INFORMATION TECHNOLOGY COMMITTEE ESCB-PKI PROJECT

INFORMATION TECHNOLOGY COMMITTEE ESCB-PKI PROJECT INFORMATION TECHNOLOGY COMMITTEE ESCB-PKI PROJECT ESCB-PKI REGISTRATION AUTHORITY APPLICATION MOST COMMON ERRORS VERSION 1.2 ECB-PUBLIC 15-November-2012 ESCB-PKI - Common errors v.1.2.docx Page 2 of 20

More information

QuoVadis Trustlink Schweiz AG Teufenerstrasse 11, 9000 St. Gallen

QuoVadis Trustlink Schweiz AG Teufenerstrasse 11, 9000 St. Gallen QuoVadis The Swiss solution for digital certificates with worldwide distribution QuoVadis Trustlink Schweiz AG Teufenerstrasse 11, 9000 St. Gallen Overview!! Check list for Root signing or managed PKI!!

More information

Configuring SSL CHAPTER

Configuring SSL CHAPTER 7 CHAPTER This chapter describes the steps required to configure your ACE appliance as a virtual Secure Sockets Layer (SSL) server for SSL initiation or termination. The topics included in this section

More information

Configuring SSL. SSL Overview CHAPTER

Configuring SSL. SSL Overview CHAPTER 7 CHAPTER This topic describes the steps required to configure your ACE appliance as a virtual Secure Sockets Layer (SSL) server for SSL initiation or termination. The topics included in this section are:

More information

TARGET Instant Payment Settlement

TARGET Instant Payment Settlement MEPT - Message Exchange Processing for TIPS Attachment to the TIPS Connectivity - Technical Requirements 1.0 Author 4CB Version 1.0 Date 08/01/2018 All rights reserved. 1. SCOPE... 3 2. INTRODUCTION...

More information

Configuring SSL. SSL Overview CHAPTER

Configuring SSL. SSL Overview CHAPTER CHAPTER 8 Date: 4/23/09 This topic describes the steps required to configure your ACE (both the ACE module and the ACE appliance) as a virtual Secure Sockets Layer (SSL) server for SSL initiation or termination.

More information

INFORMATION TECHNOLOGY COMMITTEE ESCB-PKI PROJECT

INFORMATION TECHNOLOGY COMMITTEE ESCB-PKI PROJECT INFORMATION TECHNOLOGY COMMITTEE ESCB-PKI PROJECT SUBSCRIBER S GUIDE VERSION 1.3 ECB-PUBLIC 15-April-2014 ESCB-PKI - Subscriber's Procedures v.1.3.docx Page 2 of 26 TABLE OF CONTENTS GLOSSARY AND ACRONYMS...

More information

ETSI TS V7.1.0 ( )

ETSI TS V7.1.0 ( ) TS 102 266 V7.1.0 (2006-01) Technical Specification Smart Cards; USSM: UICC Security Service Module; Stage 1 2 TS 102 266 V7.1.0 (2006-01) Reference RTS/SCP-R0002r1 Keywords smart card, security 650 Route

More information

Certification Authority

Certification Authority Certification Authority Overview Identifying CA Hierarchy Design Requirements Common CA Hierarchy Designs Documenting Legal Requirements Analyzing Design Requirements Designing a Hierarchy Structure Identifying

More information

Using Trustwave SEG Cloud with Exchange Online

Using Trustwave SEG Cloud with Exchange Online .trust Using Trustwave SEG Cloud with Exchange Online Table of Contents About This Document 1 1 Trustwave SEG Cloud for Anti-Malware with Exchange Online 2 2 Networking and DNS Setup 2 3 Provisioning Trustwave

More information

SERIES X: DATA NETWORKS, OPEN SYSTEM COMMUNICATIONS AND SECURITY Secure applications and services Security protocols

SERIES X: DATA NETWORKS, OPEN SYSTEM COMMUNICATIONS AND SECURITY Secure applications and services Security protocols I n t e r n a t i o n a l T e l e c o m m u n i c a t i o n U n i o n ITU-T X.1159 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (11/2014) SERIES X: DATA NETWORKS, OPEN SYSTEM COMMUNICATIONS AND SECURITY

More information

Access rights in T2S. 07 May Rudi Verschaeren

Access rights in T2S. 07 May Rudi Verschaeren 07 May 2015 Rudi Verschaeren Basics T2S user function: all the possible actions a user can trigger in: A2a mode via XML messages U2a mode via the T2S GUI Privilege: the capability to trigger one or several

More information

Public Key Infrastructure PKI. National Digital Certification Center Information Technology Authority Sultanate of Oman

Public Key Infrastructure PKI. National Digital Certification Center Information Technology Authority Sultanate of Oman Public Key Infrastructure PKI National Digital Certification Center Information Technology Authority Sultanate of Oman Agenda Objectives PKI Features etrust Components Government eservices Oman National

More information

Il presente documento è conforme all'originale contenuto negli archivi della Banca d'italia

Il presente documento è conforme all'originale contenuto negli archivi della Banca d'italia Il presente documento è conforme all'originale contenuto negli archivi della Banca d'italia Firmato digitalmente da Sede legale Via Nazionale, 91 - Casella Postale 2484-00100 Roma - Capitale versato Euro

More information

T2/T2S CONSOLIDATION USER REQUIREMENTS DOCUMENT SHARED SERVICES (SHRD) FOR

T2/T2S CONSOLIDATION USER REQUIREMENTS DOCUMENT SHARED SERVICES (SHRD) FOR T2/T2S CONSOLIDATION USER REQUIREMENTS DOCUMENT FOR SHARED SERVICES (SHRD) Version: 1.1.1 Status: FINAL Date: 15/03/2018 Contents 1 EUROSYSTEM SINGLE MARKET INFRASTRUCTURE GATEWAY (ESMIG)... 6 1.1 Overview...

More information

SIP System Features. SIP Timer Values. Rules for Configuring the SIP Timers CHAPTER

SIP System Features. SIP Timer Values. Rules for Configuring the SIP Timers CHAPTER CHAPTER 4 Revised: October 30, 2012, This chapter describes features that apply to all SIP system operations. It includes the following topics: SIP Timer Values, page 4-1 Limitations on Number of URLs,

More information

Interface Certification for a FIN Interface

Interface Certification for a FIN Interface Title Page Interface Certification for a FIN Interface BALI400 Conformance Statement Table of Contents Title Page... 1 1 General Information... 3 1.1 Supplier... 3 1.2 Product Information... 3 1.3 Operational

More information

This PDF Document was generated for free by the Aloaha PDF Suite If you want to learn how to make your own PDF Documents visit:

This PDF Document was generated for free by the Aloaha PDF Suite If you want to learn how to make your own PDF Documents visit: INSTALLING AND CONFIGURING A WINDOWS SERVER 2003 ENTERPRISE CERTIFICATION AUTHORITY Certification Authorities can issue certificates to users and computers for a variety of purposes. In the context of

More information

CoreNet for T2S Dedicated Link

CoreNet for T2S Dedicated Link CoreNet for T2S Dedicated Link Connectivity workshop ECB Frankfurt am Main, 27 February 2012 Agenda Introduction CoreNet set-up for dedicated link Order of CoreNet connectivity CSD contribution for CoreNet

More information

Certificate Enrollment- and Signing Services for the Cloud. A behind-the-scenes presentation of a successful cooperation between

Certificate Enrollment- and Signing Services for the Cloud. A behind-the-scenes presentation of a successful cooperation between Certificate Enrollment- and Signing Services for the Cloud A behind-the-scenes presentation of a successful cooperation between Introduction Based on our experience and the request from the market we would

More information

NextGenPSD2 Conference 2017

NextGenPSD2 Conference 2017 THE Berlin GROUP A EUROPEAN STANDARDS INITIATIVE NextGenPSD2 Conference 2017 General Approach of the Berlin Group PSD2 API Detlef Hillen, SRC Content 1 Services supported by the XS2A interface Core services

More information

BEAAquaLogic. Service Bus. MQ Transport User Guide

BEAAquaLogic. Service Bus. MQ Transport User Guide BEAAquaLogic Service Bus MQ Transport User Guide Version: 3.0 Revised: February 2008 Contents Introduction to the MQ Transport Messaging Patterns......................................................

More information

Interface Certification for a FIN Interface

Interface Certification for a FIN Interface Title Page Interface Certification for a FIN Interface FASTWIRE Open Conformance Statement Table of Contents Title Page... 1 1 General Information... 3 1.1 Supplier... 3 1.2 Product Information... 3 1.3

More information

4. The transport layer

4. The transport layer 4.1 The port number One of the most important information contained in the header of a segment are the destination and the source port numbers. The port numbers are necessary to identify the application

More information

SSL Certificates Certificate Policy (CP)

SSL Certificates Certificate Policy (CP) SSL Certificates Last Revision Date: February 26, 2015 Version 1.0 Revisions Version Date Description of changes Author s Name Draft 17 Jan 2011 Initial Release (Draft) Ivo Vitorino 1.0 26 Feb 2015 Full

More information

SIP System Features. SIP Timer Values. Rules for Configuring the SIP Timers CHAPTER

SIP System Features. SIP Timer Values. Rules for Configuring the SIP Timers CHAPTER CHAPTER 4 Revised: March 24, 2011, This chapter describes features that apply to all SIP system operations. It includes the following topics: SIP Timer Values, page 4-1 SIP Session Timers, page 4-7 Limitations

More information

3GPP TSG SA WG3 Security SA3#35 S St. Paul s Bay, Malta, 5 8 October, 2004

3GPP TSG SA WG3 Security SA3#35 S St. Paul s Bay, Malta, 5 8 October, 2004 3GPP TSG SA WG3 Security SA3#35 S3-040779 St. Paul s Bay, Malta, 5 8 October, 2004 Source: Title: Document for: Agenda Item: Siemens Early-start IMS identification Discussion and decision IMS 1 Introduction

More information

WP doc5 - Test Programme

WP doc5 - Test Programme European Commission DG Enterprise IDA PKI European IDA Bridge and Gateway CA Pilot Certipost n.v./s.a. Muntcentrum 1 B-1000 Brussels Disclaimer Belgium p. 1 / 29 Disclaimer The views expressed in this

More information

Digital Certificates Demystified

Digital Certificates Demystified Digital Certificates Demystified Ross Cooper, CISSP IBM Corporation RACF/PKI Development Poughkeepsie, NY Email: rdc@us.ibm.com August 9 th, 2012 Session 11622 Agenda Cryptography What are Digital Certificates

More information

Secure Lightweight Activation and Lifecycle Management

Secure Lightweight Activation and Lifecycle Management Secure Lightweight Activation and Lifecycle Management Nick Stoner Senior Program Manager 05/07/2009 Agenda Problem Statement Secure Lightweight Activation and Lifecycle Management Conceptual Solution

More information

PKI is Alive and Well: The Symantec Managed PKI Service

PKI is Alive and Well: The Symantec Managed PKI Service PKI is Alive and Well: The Symantec Managed PKI Service Marty Jost Product Marketing, User Authentication Lance Handorf Technical Enablement, PKI Solutions 1 Agenda 1 2 3 PKI Background: Problems and Solutions

More information

Interface Certification for a Real-time FileAct Messaging Interface

Interface Certification for a Real-time FileAct Messaging Interface Title Page Interface Certification for a Real-time FileAct Messaging Interface IBM Sterling B2B Integrator SWIFTNet MEFG Server Conformance Statement Table of Contents Title Page... 1 1 General Information...

More information

Interface Certification for a Store-andforward InterAct Messaging Interface

Interface Certification for a Store-andforward InterAct Messaging Interface Title Page Interface Certification for a Store-andforward InterAct Messaging Interface Total Messaging / IGTplus Conformance Statement Table of Contents Title Page... 1 1 General Information... 3 1.1 Supplier...

More information

HP Instant Support Enterprise Edition (ISEE) Security overview

HP Instant Support Enterprise Edition (ISEE) Security overview HP Instant Support Enterprise Edition (ISEE) Security overview Advanced Configuration A.03.50 Mike Brandon Interex 03 / 30, 2004 2003 Hewlett-Packard Development Company, L.P. The information contained

More information

Interface Certification for a Real-time FileAct Messaging Interface

Interface Certification for a Real-time FileAct Messaging Interface Title Page Interface Certification for a Real-time FileAct Messaging Interface Connecteur RAHA FileAct Conformance Statement Table of Contents Title Page... 1 1 General Information... 3 1.1 Supplier...

More information

Interface Certification for a Real-time FileAct Messaging Interface

Interface Certification for a Real-time FileAct Messaging Interface Title Page Interface Certification for a Real-time FileAct Messaging Interface Axway Financial Exchange (Gateway) Conformance Statement Table of Contents Title Page... 1 1 General Information... 3 1.1

More information

Interface Certification for a Store-andforward FileAct Messaging Interface

Interface Certification for a Store-andforward FileAct Messaging Interface Title Page Interface Certification for a Store-andforward FileAct Messaging Interface BOX Messaging Hub (formerly known as BOX For SWIFTNet) Conformance Statement Table of Contents Title Page... 1 1 General

More information

PAN-OS Integration with SafeNet Luna SA HSM Tech Note PAN-OS 6.0

PAN-OS Integration with SafeNet Luna SA HSM Tech Note PAN-OS 6.0 PAN-OS Integration with SafeNet Luna SA HSM Tech Note PAN-OS 6.0 Revision 1 2014, Palo Alto Networks, Inc. www.paloaltonetworks.com Secure Keys with a SafeNet Luna Hardware Security Module A hardware security

More information

BEAAquaLogic. Service Bus. Native MQ Transport User Guide

BEAAquaLogic. Service Bus. Native MQ Transport User Guide BEAAquaLogic Service Bus Native MQ Transport User Guide Version: 2.6 RP1 Revised: November 2007 Contents Introduction to the Native MQ Transport Advantages of Using the Native MQ Transport................................

More information

Different Layers Lecture 21

Different Layers Lecture 21 Different Layers Lecture 21 10/17/2003 Jian Ren 1 The Transport Layer 10/17/2003 Jian Ren 2 Transport Services and Protocols Provide logical communication between app processes running on different hosts

More information

How to Set Up External CA VPN Certificates

How to Set Up External CA VPN Certificates To configure a client-to-site, or site-to-site VPN using s created by External CA, you must create the following VPN s for the VPN service to be able to authenticate Before you begin Use an external CA

More information

Indeed Card Management Smart card lifecycle management system

Indeed Card Management Smart card lifecycle management system Indeed Card Management Smart card lifecycle management system Introduction User digital signature, strong authentication and data encryption have become quite common for most of the modern companies. These

More information

Managing Certificates

Managing Certificates CHAPTER 12 The Cisco Identity Services Engine (Cisco ISE) relies on public key infrastructure (PKI) to provide secure communication for the following: Client and server authentication for Transport Layer

More information

Next Generation Physical Access Control Systems A Smart Card Alliance Educational Institute Workshop

Next Generation Physical Access Control Systems A Smart Card Alliance Educational Institute Workshop Next Generation Physical Access Control Systems A Smart Card Alliance Educational Institute Workshop PACS Integration into the Identity Infrastructure Salvatore D Agostino CEO, IDmachines LLC 8 th Annual

More information

Which compute option is designed for the above scenario? A. OpenWhisk B. Containers C. Virtual Servers D. Cloud Foundry

Which compute option is designed for the above scenario? A. OpenWhisk B. Containers C. Virtual Servers D. Cloud Foundry 1. A developer needs to create support for a workload that is stateless and short-living. The workload can be any one of the following: - API/microservice /web application implementation - Mobile backend

More information

Managing and Maintaining Windows 8

Managing and Maintaining Windows 8 Managing and Maintaining Windows 8 Number: 070-688 Passing Score: 700 Time Limit: 120 min File Version: 1.0 http://www.gratisexam.com/ All questions are taken from demo PDF files at: - Test4Actual - PassFine

More information

CIS Controls Measures and Metrics for Version 7

CIS Controls Measures and Metrics for Version 7 Level One Level Two Level Three Level Four Level Five Level Six 1.1 Utilize an Active Discovery Tool Utilize an active discovery tool to identify devices connected to the organization's network and update

More information

PKI Services. Text PKI Definition. PKI Definition #1. Public Key Infrastructure. What Does A PKI Do? Public Key Infrastructures

PKI Services. Text PKI Definition. PKI Definition #1. Public Key Infrastructure. What Does A PKI Do? Public Key Infrastructures Public Key Infrastructures Public Key Infrastructure Definition and Description Functions Components Certificates 1 2 PKI Services Security Between Strangers Encryption Integrity Non-repudiation Key establishment

More information

Implementing Security in Windows 2003 Network (70-299)

Implementing Security in Windows 2003 Network (70-299) Implementing Security in Windows 2003 Network (70-299) Level 1 Authorization & Authentication 2h 20m 20s 1.1 Group Strategy 1.2 Group Scopes 1.3 Built-in Groups 1.4 System or Special Groups 1.5 Administrating

More information

PKI Configuration Examples

PKI Configuration Examples PKI Configuration Examples Keywords: PKI, CA, RA, IKE, IPsec, SSL Abstract: The Public Key Infrastructure (PKI) is a general security infrastructure for providing information security through public key

More information

Cisco ISE Ports Reference

Cisco ISE Ports Reference Cisco ISE Infrastructure Cisco ISE Infrastructure, on page 1 Cisco ISE Administration Node Ports, on page 2 Cisco ISE Monitoring Node Ports, on page 4 Cisco ISE Policy Service Node Ports, on page 6 Cisco

More information

CIS Controls Measures and Metrics for Version 7

CIS Controls Measures and Metrics for Version 7 Level 1.1 Utilize an Active Discovery Tool 1.2 Use a Passive Asset Discovery Tool 1.3 Use DHCP Logging to Update Asset Inventory 1.4 Maintain Detailed Asset Inventory 1.5 Maintain Asset Inventory Information

More information

AeroMACS Public Key Infrastructure (PKI) Users Overview

AeroMACS Public Key Infrastructure (PKI) Users Overview AeroMACS Public Key Infrastructure (PKI) Users Overview WiMAX Forum Proprietary Copyright 2019 WiMAX Forum. All Rights Reserved. WiMAX, Mobile WiMAX, Fixed WiMAX, WiMAX Forum, WiMAX Certified, WiMAX Forum

More information

Copyright

Copyright This video will look at the different components that make up Active Directory Certificate Services and which services you should look at installing these components on. Which components to install where?

More information

SIP System Features. Differentiated Services Codepoint CHAPTER

SIP System Features. Differentiated Services Codepoint CHAPTER CHAPTER 6 Revised: December 30 2007, This chapter describes features that apply to all SIP system operations. It includes the following topics: Differentiated Services Codepoint section on page 6-1 Limitations

More information

Elastic Load Balancing. User Guide. Date

Elastic Load Balancing. User Guide. Date Date 2018-07-20 Contents Contents 1 Product Description... 4 1.1 What Is Elastic Load Balancing (ELB)?... 4 1.2 Load Balancer Type... 4 1.3 Basic Architecture... 5 1.3.1 Classic Load Balancer... 5 1.3.2

More information

IBM. Security Digital Certificate Manager. IBM i 7.1

IBM. Security Digital Certificate Manager. IBM i 7.1 IBM IBM i Security Digital Certificate Manager 7.1 IBM IBM i Security Digital Certificate Manager 7.1 Note Before using this information and the product it supports, be sure to read the information in

More information

Access to RTE s Information System by software certificates under Microsoft Windows 7

Access to RTE s Information System by software certificates under Microsoft Windows 7 by software certificates under Microsoft Windows 7 PKI User guide Version 4, 01/01/2017 Programmes & SI (PSI) TOUR MARCHAND 41 RUE BERTHELOT - 92411 COURBEVOIE CEDEX TEL : 01.78.66.50.00 - FAX : 01.78.66.50.64

More information

Interface Certification for a Store-andforward FileAct Messaging Interface

Interface Certification for a Store-andforward FileAct Messaging Interface Title Page Interface Certification for a Store-andforward FileAct Messaging Interface AvantGard Trax SWIFT Gateway Conformance Statement Table of Contents Title Page... 1 1 General Information... 3 1.1

More information

Sophos Mobile as a Service

Sophos Mobile as a Service startup guide Product Version: 8 Contents About this guide... 1 What are the key steps?... 2 Change your password... 3 Change your login name... 4 Activate Mobile Advanced licenses...5 Check your licenses...6

More information

Public Key Enabling Oracle Weblogic Server

Public Key Enabling Oracle Weblogic Server DoD Public Key Enablement (PKE) Reference Guide Public Key Enabling Oracle Weblogic Server Contact: dodpke@mail.mil URL: http://iase.disa.mil/pki-pke URL: http://iase.disa.smil.mil/pki-pke Public Key Enabling

More information

Corporates Cash Management

Corporates Cash Management SWIFT Certified Applications Corporates Cash Management Technical validation Guide 2017 Version 1.1 February 2017 Legal notices Copyright SWIFT 2017. All rights reserved. You may copy this publication

More information

Overview and Benefits of SEEBURGER AS2 Spokes. Trading Partner Integration Using SEEBURGER'S BIS:AS2 Spoke

Overview and Benefits of SEEBURGER AS2 Spokes. Trading Partner Integration Using SEEBURGER'S BIS:AS2 Spoke Overview and Benefits of SEEBURGER AS2 Spokes Trading Partner Integration Using SEEBURGER'S BIS:AS2 Spoke Technical Documentation Contents 1 CLASSIC EDI AND ITS COST PROBLEM 2 1.1 VAN (VALUE ADDED NETWORK)...

More information

Application Note. Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder )

Application Note. Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder ) Application Note Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder ) This document describes how to configure McAfee Firewall Enterprise to provide

More information

MMTP protocol overview and Business Application Messages

MMTP protocol overview and Business Application Messages MMTP protocol overview and Business Application Messages 15 October 2013 Table of Contents Abbreviations... 3 1 MMTP Protocol introduction... 4 1.1 MMTP Main Characteristics... 4 1.2 MMTP Session and Sequence

More information

Using Trustwave SEG Cloud with Cloud-Based Solutions

Using Trustwave SEG Cloud with Cloud-Based  Solutions .trust Using Trustwave SEG Cloud with Cloud-Based Email Solutions Table of Contents About This Document 1 1 Trustwave SEG Cloud for Anti-Malware with Cloud-Based Email Solutions 2 2 Networking and DNS

More information

FINGER VEIN SERVER FOR RETAIL BANKS

FINGER VEIN SERVER FOR RETAIL BANKS FINGER VEIN SERVER FOR RETAIL BANKS The Finger Vein Server (FVS) is the heart of Hitachi s VeinID biometric solution for retail banking. A modular Client-Server system designed to support high availability

More information

VMware Identity Manager Connector Installation and Configuration (Legacy Mode)

VMware Identity Manager Connector Installation and Configuration (Legacy Mode) VMware Identity Manager Connector Installation and Configuration (Legacy Mode) VMware Identity Manager This document supports the version of each product listed and supports all subsequent versions until

More information

ING Public Key Infrastructure Technical Certificate Policy

ING Public Key Infrastructure Technical Certificate Policy ING Public Key Infrastructure Technical Certificate Policy Version 5.4 - November 2015 Commissioned by ING PKI Policy Approval Authority (PAA) Additional copies Document version General Of this document

More information

CertDigital Certification Services Policy

CertDigital Certification Services Policy CertDigital Certification Services Policy Page: 2 ISSUED BY : DEPARTAMENT NAME DATE ELECTRONIC SERVICES COMPARTMENT COMPARTMENT CHIEF 19.03.2011 APPROVED BY : DEPARTMENT NAME DATE MANAGEMENT OF POLICIES

More information

BT Managed Secure Messaging. Non-Repudiation Policy

BT Managed Secure Messaging. Non-Repudiation Policy BT Managed Secure Messaging Non-Repudiation Policy Contents Page 1 Introduction 4 1.1 Scope 4 1.2 Terms and Definitions 4 2 Non-Repudiation Categories 5 2.1 Non-Repudiation of Origin 5 2.2 Non-Repudiation

More information

Venafi Platform. Architecture 1 Architecture Basic. Professional Services Venafi. All Rights Reserved.

Venafi Platform. Architecture 1 Architecture Basic. Professional Services Venafi. All Rights Reserved. Venafi Platform Architecture 1 Architecture Basic Professional Services 2018 Venafi. All Rights Reserved. Goals 1 2 3 4 5 Architecture Basics: An overview of Venafi Platform. Required Infrastructure: Services

More information

How to Configure Office 365 for Inbound and Outbound Mail

How to Configure Office 365 for Inbound and Outbound Mail How to Configure Office 365 for Inbound and Outbound Mail You can configure Microsoft Office 365 with the Barracuda Email Security Service as your inbound and/or outbound mail gateway. If you make setting

More information

How to configure the UTM Web Application Firewall for Microsoft Lync Web Services connectivity

How to configure the UTM Web Application Firewall for Microsoft Lync Web Services connectivity How to configure the UTM Web Application Firewall for Microsoft Lync Web Services connectivity This article explains how to configure your Sophos UTM to allow access Microsoft s Lync Web Services (the

More information

BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0. Feature and Technical Overview

BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0. Feature and Technical Overview BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Feature and Technical Overview SWDT305802-524791-0331031644-001 Contents 1 Overview: BlackBerry Enterprise Server... 5 New in this release...

More information

Interoperability Challenge of Certified Communication Systems via Internet

Interoperability Challenge of Certified Communication Systems via Internet Interoperability Challenge of Certified Communication Systems via Internet Marina Buzzi, IIT-CNR, marina.buzzi@iit.cnr.it Francesco Gennai, ISTI-CNR, francesco.gennai@isti.cnr.it Claudio Petrucci, Agid,

More information

Using Cloud VPN Service

Using Cloud VPN Service To begin, log in to the VMS Service Interface using your consumer credentials. In case of association with several tenants, choose a customer name from the drop-down in the left pane of the Welcome page.

More information

Version 3 X.509 Certificates

Version 3 X.509 Certificates Entrust Technologies White Paper Author: Ian Curry Date: July 1996 Version: 1.0 Entrust Technologies, 1997. All rights reserved. 1 1. Introduction This document provides a description of the version 3

More information

Strong Customer Authentication and common and secure communication under PSD2. PSD2 in a nutshell

Strong Customer Authentication and common and secure communication under PSD2. PSD2 in a nutshell Strong Customer Authentication and common and secure communication under PSD2 PSD2 in a nutshell Summary On August 12, the EBA has issued the long-awaited draft of the Regulatory Technical Standards (RTS)

More information

DIGITALSIGN - CERTIFICADORA DIGITAL, SA.

DIGITALSIGN - CERTIFICADORA DIGITAL, SA. DIGITALSIGN - CERTIFICADORA DIGITAL, SA. TIMESTAMP POLICY VERSION 1.1 21/12/2017 Page 1 / 18 VERSION HISTORY Date Edition n.º Content 10/04/2013 1.0 Initial drafting 21/12/2017 1.1 Revision AUTHORIZATIONS

More information

EXBO e-signing Automated for scanned invoices

EXBO e-signing Automated for scanned invoices EXBO e-signing Automated for scanned invoices Signature Policy Document OID: 0.3.2062.7.2.1.12.1.0 Approval Status: Approved Version: 1.0 Page #: 1 of 13 1. Introduction 1.1. Scope This document covers

More information

Regulating virtual organisation interactions

Regulating virtual organisation interactions Regulating virtual organisation interactions Nick Cook, Paul Robertson, Santosh Shrivastava School of Computing Science, University of Newcastle 1 Regulating interactions Problem: to systematically regulate

More information

SIP Proxy Deployment Guide. SIP Server 8.1.1

SIP Proxy Deployment Guide. SIP Server 8.1.1 SIP Proxy Deployment Guide SIP Server 8.1.1 5/4/2018 Table of Contents SIP Proxy 8.1 Deployment Guide 3 SIP Proxy Architecture and Deployment 4 Supported Features 7 Prerequisites 9 Deploying SIP Proxy

More information

(2½ hours) Total Marks: 75

(2½ hours) Total Marks: 75 (2½ hours) Total Marks: 75 N. B.: (1) All questions are compulsory. (2) Makesuitable assumptions wherever necessary and state the assumptions made. (3) Answers to the same question must be written together.

More information

Security Digital Certificate Manager

Security Digital Certificate Manager System i Security Digital Certificate Manager Version 6 Release 1 System i Security Digital Certificate Manager Version 6 Release 1 Note Before using this information and the product it supports, be sure

More information

Sophos Mobile in Central

Sophos Mobile in Central startup guide Product Version: 8.1 Contents About this guide... 1 What are the key steps?... 2 Activate Mobile Advanced licenses... 3 Configure settings... 4 Configure personal settings...4 Configure technical

More information

Operating Systems. 16. Networking. Paul Krzyzanowski. Rutgers University. Spring /6/ Paul Krzyzanowski

Operating Systems. 16. Networking. Paul Krzyzanowski. Rutgers University. Spring /6/ Paul Krzyzanowski Operating Systems 16. Networking Paul Krzyzanowski Rutgers University Spring 2015 1 Local Area Network (LAN) LAN = communications network Small area (building, set of buildings) Same, sometimes shared,

More information

Using Cloud VPN Service

Using Cloud VPN Service To begin, log in to the VMS Service Interface using your consumer credentials. In case of association with several tenants, choose a customer name from the drop-down on the left pane of the Welcome page.

More information

Cisco ISE Ports Reference

Cisco ISE Ports Reference Cisco ISE Infrastructure, page 1 Cisco ISE Administration Node Ports, page 2 Cisco ISE Monitoring Node Ports, page 4 Cisco ISE Policy Service Node Ports, page 5 Cisco ISE pxgrid Service Ports, page 10

More information

Scan Report Executive Summary. Part 2. Component Compliance Summary Component (IP Address, domain, etc.):ekk.worldtravelink.com

Scan Report Executive Summary. Part 2. Component Compliance Summary Component (IP Address, domain, etc.):ekk.worldtravelink.com Scan Report Executive Summary Part 1. Scan Information Scan Customer Company: Date scan was completed: Travolutionary ASV Company: Comodo CA Limited 10-03-2018 Scan expiration date: 01-01-2019 Part 2.

More information