IoTivity Provisioning Manager Design Specification v0.1d
|
|
- Georgina Lang
- 6 years ago
- Views:
Transcription
1 IoTivity Provisioning Manager Design Specification v0.1d Contributing Authors (alphabetical order): Ashwini Kumar Chul Lee Randeep Singh Sandeep Sharma WooChul Shim 1
2 Table of Contents Background... 3 Terminology... 3 Provisioning Manager (PM) Overview... 4 Ownership Transfer Manager (OTM)... 6 Secure Resource Provider (SRP)... 9 Provision ACL... 9 Provision Credential Revoke ACL Revoke Credential Provisioning Database Manager (PDM) Public Provisioning Manager API C++/Android API Support
3 Revision History Version Date Author(s) Summary 0.1 6/12/2015 Randeep, Initial draft WooChul 0.1a 6/29/2015 Randeep Added Implementation details in Revoke Credentials. 0.1a 7/3/2015 WooChul Added PDM Added abstracted Credential Revocation flows. 0.1b 7/22/2015 Chul Lee Added OTM callback and sequence flow. Added public OC API. 0.1c 9/30/2015 Ashwini, Sandeep Added C++/Android API information 0.1d 10/13/2015 WooChul Added brief for the role of Provisioning Manager Background The reader is assumed to be familiar with the IoTivity Security. Terminology Term Provisioning Credential Access Control List Device ID Ownership Transfer 3
4 Provisioning Manager (PM) Overview Why do we need Provisioning Manager? Figure 1. The Role of Provisioning Manager Provisioning Manager could be act as a security administrator of IoT devices in its IP subnet. When new device is introduced in the IP subnet, Provisioning Manager takes the ownership of the new device and provisions security information such as credential and access control policy to manage new device securely. If PM doesn t take ownership and provide proper security policy to the newly introduced device in its IP subnet, the new device might be under control of unwanted subjects and perform undesirable operations such as turning on the light during midnight and ignoring user s command. Figure 2. Simple illustration of provisioned device and not provisioned device 4
5 Figure 3. Provisioning Manager Module Block Diagram The Provisioning Manager has two major roles: Ownership Transferring, and Security management of owned devices (Credentials, Access Control List of the owned devices). Transferring Ownership When performing this role, PM discovers un-owned devices from the network and tries to transfer ownership of the discovered device to the admin (=provisioning manager application). Ownership Transfer Manager sub-module is in charge of this role. Current version supports following methods of ownership transfer Just-works ownership transfer method Random PIN based ownership transfer method Security management of owned devices 5
6 When performing this role, PM provisions credentials and ACL to the owned devices. Also, PM has a capability to revoke credentials from every owned device in the network and remove ACL on the provisioned device. To support revocation, PM has to keep tracks of provisioned credentials and ACLs. The provisioning database manager keeps provisioned credential history to manage OIC network. Provisioning Database Manager and Secure Resource Provider sub-modules are in charge of this role. Ownership Transfer Manager (OTM) When provisioning manager (PM) application receives supported Ownership transfer methods from the resource server during the ownership transfer process, PM selects the most secure ownership transfer method and continues the remained ownership transfer process. Since provisioning manager has to accept various ownership transfer methods (OxM), OTM should provide proper callbacks to each OxM. The provided callbacks should be implemented by each OxM developer. In order to add new OxM, OxM developer should implement four callbacks below. 1. Function to load secret value used to derive temporal key to establish a DTLS session and save this generated temporal key to /oic/sec/cred. - Callback Name: loadsecretcb - Prototypes: typedef OCStackResult (*OTMLoadSecret)(OTMContext_t* otmctx); 2. Function to establish a temporary DTLS session. In this callback, ciphersuite will not be specified. All enable ciphersuites will be sent. The temporal key generated during step 1 will be used to create secure session. - Callback Name : createsecuresessioncb - Prototypes : typedef OCStackResult (*OTMCreateSecureSession)(OTMContext_t* otmctx); 3. Function generating payload for selecting ownership transfer method. This payload will be sent to the un-owned resource server. - Callback Name : createselectoxmpayloadcb - Prototypes : typedef char* (*OTMCreatePayloadCallback)(OTMContext_t* otmctx); 4. Function generating payload for finalizing ownership transfer method. This payload generally includes status change information such as owned=true. This payload will be sent to un-owned resource server. - Callback Name : createownertransferpayloadcb - Prototypes : typedef char* (*OTMCreatePayloadCallback)(OTMContext_t* otmctx); 6
7 After ownership transfer method callbacks are implemented, provisioning application developer should register these callback functions by invoking OCSetOwnerTransferCallbackData API. OTM will use these callback functions internally to continue ownership transfer according to the selected OxM. Figure2 is a diagram representing the function call sequence of ownership transfer in the provisioning manager application. Figure 4. Ownership transfer sequence diagram OTM supports Just works OxM and PIN based OxM by default. But OCSetOwnerTransferCallbackData should be invoked in the provisioning application side as follows: 7
8 OTMCallbackData_t justworkscbdata = {}; justworkscbdata.createsecuresessioncb = CreateSecureSessionJustWorksCallback; justworkscbdata.createselectoxmpayloadcb = CreateJustWorksSelectOxmPayload; justworkscbdata.createownertransferpayloadcb = CreateJustWorksOwnerTransferPayload; OTMSetOwnershipTransferCallbackData(OIC_JUST_WORKS, &justworkscbdata); OTMCallbackData_t pinbasedcbdata = {}; pinbasedcbdata.loadsecretcb = InputPinCodeCallback; pinbasedcbdata.createsecuresessioncb = CreateSecureSessionRandomPinCallbak; pinbasedcbdata.createselectoxmpayloadcb = CreatePinBasedSelectOxmPayload; pinbasedcbdata.createownertransferpayloadcb = CreatePinBasedOwnerTransferPayload; OTMSetOwnershipTransferCallbackData(OIC_RANDOM_DEVICE_PIN, &pinbasedcbdata); Code 1. Sample code to register the OxM callback In case of Just works OxM, loadsecretcb doesn t have a role to do during the Just works ownership transfer because Just works OxM will use anonymous ciphersuite to establish a temporary DTLS session (TLS_ECDH_anon_WITH_AES_128_CBC_SHA256). Thus, secret value isn t required to establish a DTLS session. In case of PIN based OxM, loadsecretcb ask user to poke the PIN value. This PIN number is used to derive temporal key to establish temporary DTLS session. After the temporary DTLS session is established, remaining proceed of ownership transfer is the same. Figure 3 and figure 4 decribe detailed process of each OxM. Figure 5. Just-works OxM flow 8
9 Figure 6. "Random PIN based" OxM flow Secure Resource Provider (SRP) Secure resource provider (SRP) APIs of provisioning manager are responsible for provisioning secure resources to resource server(s). Secure resources provisioning include ACL provisioning and credentials provisioning. Following are the SRP capabilities - Provisioning of ACL to a specific device. (/oic/sec/acl) - Generating credential resource currently only supports symmetric credential provisioning; Current supported length of key is 128 and 256 bits and provisioning generated credentials. (/oic/sec/cred) - Providing pair-wise credential and ACL between two devices, Single API is capable of provisioning credentials and provisioning ACL, so that two devices can communicate over secure channel. Provision ACL ACL provisioning API of provisioning manager can provisioning ACL resource to resource server. 9
10 User can define ACL according to the need and this API can be used to send generated ACL to resource server over secure channel. In order to provision ACL to proper target resource server, we need to discover devices using owned discovery; owned discovery is provided with provisioning manager as a utility module. Owned discovery returns list of already owned devices. Provision Credential Figure 7. ACL Provisioning sequence diagram Credential provisioning API of provisioning manager is responsible for provisioning credential resource to resource server. Current version supports generation of symmetric key of size 128 bits and 256 bits and generated key will be provisioned to devices. Provision credential APIs always work with a pair of devices which need credential so that communicate over secure channel because current provisioning manager support only symmetric key type credential. In order to use this API we need to use owned discovery to get list of devices and from that list we can choose devices that needs credential provisioning. 10
11 Figure 8. Credential Provisioning sequence diagram Revoke ACL (Future Work) PM should be able to remove inappropriate or invalid ACL resource on the target resource server. Thus, PM should have capability of GET current ACL resources on the target resource server for review of the ACL resources. The OicSecAcl_t in securevirtualresourcetypes.h is used to contain the received ACL resources. After reviewing by an administrator, the admin may remove or update the ACL resource. If the admin wants to remove all ACL, PM can send a DELETE request on /oic/sec/acl of the resource server. If the admin wants update, User can create new ACL by reviewing ACL and then can send DELETE request on /oic/sec/acl to delete the old ACL and then POST new ACL. Example Query for ACL revocation DELETE oic/sec/acl & PUT oic/sec/acl: Query would reset ACL to default state. This is supported now. Partial update with GET and PUT request is not allowed now. Whole update with DELETE and POST is allowed. 11
12 DELETE oic/sec/acl?subjectid=xxx&&rsrc=yyyy. ACE consist of subject, resource, permission and owners to successful search a ACE among the list of ACEs we need to provide pair of subject and resource. Then particular entry of that resource from list can be removed. This query is not supported right now but might be supported later Revoke Credential PM should have capability to remove already provisioned credentials of selected device on every owned device in the network in order to keep valid trust relationships among owned devices. Revocation of the provisioned credential from every provisioned device should be performed whenever one of the provisioned devices is removed from the network for some reason (lost, stolen, resale and etc). To identify which devices are related to the removed device, PM should keep track of credential provisioning history and manage the history by using database. After identifying which devices have the credential which should be revoked, DELETE request to the /oic/sec/cred is sent by PM. Credential revocation flow can be varied according to the credential types. (Symmetric key and certificate will be covered) As credential revocation is multiple request response process, in which Provisioning tool will send request to all the devices which share credential with a device for which credentials are to be deleted. In case during this process some devices are turned off. Then we can t remove credentials from them and their DB would contain stale credential entries. To overcome this problem we can create call to check and update network according to provisioning DB. Every time we send credential revocation request we have to wait for specific time to wait for response. If we didn t get the response back then we can assume that that particular device is stale and currently is unable to respond to request and we have to perform credential revocation again on this device in future. 12
13 Figure 9. Abstracted device revocation sequence diagram Above diagram shows device revocation sequence. Resource server 1, Resource server 2 and Resource server 3 (further referred as RS1, RS2 and RS3) are already provisioned and admin wants to delete RS3 from network so user calls an API to delete the device (RS3). PM first search the Provisioning Database module (PDM) to get information about all the devices which shares pairwise credential with the RS3. DELETE request to delete the credential is sent to devices listed in previous step. 13
14 Figure 10. Abstracted a pairwise credential revocation sequence diagram In case we have two devices which are provisioned with pairwise credential and admin want to revoke those credentials so that those two devices cannot communicate over secure channel. Suppose RS3 and RS2 are provisioned with pairwise credentials and admin wants to revoke it. PM will send delete request to RS3 to delete credential corresponding to RS2 and send delete request to RS2 to delete credential corresponding to RS3. Provisioning Database Manager (PDM) The initial version of PDM will provide APIs for managing credential provisioning history. (We will consider ACL later). Since persistent storage is platform (OS and H/W) specific, the application should provide required functions to the PDM and the PDM provides them to the PM. Open: If we fix the data structure for managing credential provisioning history, there could be a no chance to utilize exist database solution such as SQLite. Otherwise, if we don t fix the data structure, the complexity of application developer is increased dramatically. We should have to think about what level of abstraction is proper for application developer and the management complexity is high enough to use database management system. 14
15 What kinds of data are saved into this Provisioning Database? - Credential provisioning history to maintain network properly, ACL provisioning information to provide useful security information to administrator. In case of certificate based credential management, Certificate Authority s subject name, public/private key, issued history and certificate which is only used to issue device certificate can be stored into the provisioning database. * We can use file or database, the implementation could be varied according to the storage type. Current explanation assumes that we are going to use SQLite DB. Following are the explanation of interfaces exposed by PDM to PM OCStackResult PDMInit(); This function performs the initialization operations like opening DB connection OCStackResult PDMAddDevice(OicUuid_t* UUID); It adds the device UUID information to persistent storage. It will be called after every successful ownership transfer. OCStackResult PDMLinkDevices(OicUuid_t *UUID1, OicUuid_t *UUID2); It saves the link information of two devices in persistent storage, Every time after successful credential provisioning between two devices. This API is called to save the link information. OCStackResult PDMUnlinkDevices(OicUuid_t *UUID1, OicUuid_t *UUID2); It removes the link information from persistent storage. Every time after successful credential revocation between two devices this API is called to remove the link information. OCStackResult PDMDeleteDevice(OicUuid_t *UUID); It removes complete information of device including all the link information and device s owned information from persistent storage. This API is called along device revocation API. OCStackResult PDMGetOwnedDevices(OCUuidList_t** uuidlist, size_t* numofdevices); This API fetches owned device list from persistent storage and provide list to its caller. OCStackResult PDMGetLinkedDevices(OicUuid_t* UUID, OCUuidList_t** UUIDLIST, size_t* numofdevices); This API fetches the information of credential pair links from the persistent storage 15
16 and provides a list of all the devices which are linked to specified device Id. OCStackResult PDMGetToBeUnlinkedDevices(OCPairList** staledevlist, size_t* numofdevices); This API lists all the devices of which credential were supposed to be removed but these devices didn t respond to the revocation call due to some uncontrollable external factors (like power off). OCStackResult PDMIsLinksExists(const OicUuid_t* uuidofdevice1, const OicUuid_t* uuidofdevice2, bool* result); This API is used by provisioning manager to check does the link exists between Two devices or not. OCStackResult PDMSetLinkStale(const OicUuid_t* uuidofdevice1, const OicUuid_t* uuidofdevice2); This method is used by provisioning manager to update linked status as stale. OCStackResult PDMClose(); API to perform tasks like closing of DB connection. Public Provisioning Manager API OCStackResult OCInitPM(const char* dbpath) The function is responsible for initialization of the provisioning manager. It will load provisioning database which have owned device's list and their linked status. (Future work: If there is a device(s) which has not up-to-date credentials, this function will automatically try to update the device(s).) OCStackResult OCDiscoverUnownedDevices(unsigned short waittime, OCProvisionDev_t **pplist) The function is responsible for discovery of device is current subnet. It will list all the device in subnet which are not yet owned. OCStackResult OCDiscoverOwnedDevices(unsigned short timeout, OCProvisionDev_t **pplist) The function is responsible for discovery of owned device is current subnet. It will list all the device in subnet which are owned by calling provisioning client. 16
17 OCStackResult OCDoOwnershipTransfer(void *ctx, OCProvisionDev_t *targetdevice, OCProvisionResultCB resultcallback) API to performing ownership transfer for unowned devices. The device list obtained from OCDiscoverUnownedDevices can be used as first parameter. The Second parameter passed to the result callback function that will be called when ownership transfer is finished. The result callback is invoked only once all the ownership transfer is finished. OCStackResult OCSetOwnerTransferCallbackData(OicSecOxm_t oxm, OTMCallbackData_t *callbackdata) API to register for particuar OxM(ownership transfer method)'s callback function. Implementation of callback function will be provided in resource/csdk/security/provisioning/include/oxm*.h. OCStackResult OCProvisionPairwiseDevices(void *ctx, OicSecCredType_t type, size_t keysize, const OCProvisionDev_t *pdev1, OicSecAcl_t *pdev1acl, const OCProvisionDev_t *pdev2, OicSecAcl_t *pdev2acl, OCProvisionResultCB resultcallback) API to provision credentials between two devices and ACLs for the devices who act as a server. OCStackResult OCProvisionACL(void *ctx, const OCProvisionDev_t *selecteddeviceinfo, OicSecAcl_t *acl, OCProvisionResultCB resultcallback) API to send ACL information to resource. OCStackResult OCProvisionCredentials(void *ctx,oicseccredtype_t type, size_t keysize, const OCProvisionDev_t *pdev1, const OCProvisionDev_t *pdev2, OCProvisionResultCB resultcallback) API to provision credential to devices. void OCDeleteDiscoveredDevices(OCProvisionDev_t *plist) API to delete memory allocated to linked list created by OCDiscover_XXX_Devices API. OCStackResult OCUnlinkDevice(void *ctx, const OCProvisionDev_t* ptargetdev1, const OCProvisionDev_t* ptargetdev2, OCProvisionResultCB resultcallback) This function will remove the credential & relationship between the two devices. 17
18 OCStackResult OCRemoveDevice(void* ctx, unsigned short waittimeforowneddevicediscovery, const OCProvisionDev_t* ptargetdev, OCProvisionResultCB resultcallback) This function will remove credential of target device from all devices in subnet. OCStackResult OCGetDevInfoFromNetwork(unsigned short waittime, OCProvisionDev_t** powneddevlist, OCProvisionDev_t** UnownedDevList) API to get status of all the devices in current subnet. The status includes endpoint information and doxm information which can be extracted during owned and unowned discovery. Along with this information. The API will provide information about devices' status Device can have following states - ON/OFF: Device is switched on or off. OCStackResult OCGetLinkedStatus(const OicUuid_t* uuidofdevice, OCUuidList_t** uuidlist, size_t* numofdevices) This method is used to get linked devices' IDs. void OCDeleteUuidList (OCUuidList_t* plist) API to delete memory allocated to OicUuid_t list. void OCDeleteACLList (OicSecAcl_t* pacl) API to delete memory allocated to ACL data. OCStackResult OCProvisionCRL(void* ctx, const OCProvisionDev_t *selecteddeviceinfo, OicSecCrl_t *crl, OCProvisionResultCB resultcallback) This function sends CRL information to resource. 18
19 C++/Android API Support All public PM APIs support C++ and Android APIs. These are the list of the APIs. C++ APIs: resource/include Android APIs: Android/android_api/base/jni C++ APIs Class : Credential : this is a data type for managing credentials used by the secure virtual resource. OicSecCredType_t getcredentialtype(); API to get the Credential Type used. The types can be 0: no security mode 1: symmetric pair-wise key 2: symmetric group key 4: asymmetric key 8: signed asymmetric key (aka certificate) 16: PIN /password size_t getcredentialkeysize(); API to get the Credential Key size. void setcredentialtype(oicseccredtype_t type); API to set the Credential Type used. The types can be 0: no security mode 1: symmetric pair-wise key 2: symmetric group key 4: asymmetric key 8: signed asymmetric key (aka certificate) 16: PIN /password void setcredentialkeysize(size_t keysize) API to set the Credential s key size. Class : OcSecure : This class is a collection of common functions, which do not operate resource specific static OCStackResult provisioninit(const std::string &dbpath); API to Initialize provisioning Manager by providing the provisioning database file path dbpath. 19
20 static OCStackResult discoverunowneddevices(unsigned short timeout, DeviceList_t &list); API to discover List of all devices in the subnet which are not yet Owned by the user. static OCStackResult discoverowneddevices(unsigned short timeout, DeviceList_t &list); API to discover List of all devices in the subnet which are Owned by the user. static OCStackResult setownertransfercallbackdata(oicsecoxm_t oxm, OTMCallbackData_t* callbackdata, InputPinCallback inputpin); API to set callback methods for ownership transfer for a particular OxmType (Ownership Transfer Method) and Pin Callback method to Input PIN. static OCStackResult getdevinfofromnetwork(unsigned short timeout, DeviceList_t &owneddevlist, DeviceList_t &unowneddevlist); API to get status of all the devices in current subnet. Device status will include information about - ON/OFF: Device is switched on or off. static OCStackResult setdisplaypincb(generatepincallback displaypin); Server API to register a callback to display the PIN for RANDOM_DEVICE_PIN authentication Class : OcSecureResource : This class represents a secure virtual resource and its state. OCStackResult doownershiptransfer(resultcallback resultcallback); API to start Ownership transfer of un-owned OcSecureResource Object, which was obtained by calling discoverunowneddevices. resultcallback will be called asynchronously with result after ownership transfer is complete. OCStackResult provisionpairwisedevices(const Credential &cred, const OicSecAcl_t* acl1, const OCSecureResource &device2, const OicSecAcl_t* acl2, ResultCallBack resultcallback); API to provision credentials and ACLs between two devices who act as a server. First device is the object for which this API is called. OCStackResult provisioncredentials(const Credential &cred, const OCSecureResource &device2, ResultCallBack resultcallback); API to provision credentials to the device. resultcallback will be called asynchronously with result of credential provisioning. OCStackResult provisionacl(const OicSecAcl_t* acl, ResultCallBack resultcallback); API to send ACL to the device. resultcallback will be called asynchronously with result of ACL provisioning. OCStackResult unlinkdevices(const OCSecureResource &device2, ResultCallBack resultcallback); 20
21 API to remove credentials and relationship between two devices. First device is the object for which this API is called. OCStackResult removedevice(unsigned short waittimeforowneddevicediscovery, ResultCallBack resultcallback); API to unlink the device links to each device it is linked with. OCStackResult getlinkeddevices(uuidlist_t &uuidlist); API to get List of all devices it is linked with. std::string getdevaddr(); API to get IP address of the device as a String. std::string getdeviceid(); API to get device ID (UUID) of the device as B64 encoded string. int getdevicestatus(); API to get status of the device. ON or OFF or INVALID bool getownedstatus(); API to get Owned/Unowned status of the device. OWNED or UNOWNED or INVALID Android APIs Class : OcProvisioning : This class is a collection of common functions, which do not operate resource specific public static native void provisioninit(string dbpath) throws OcException; API to Initialize provisioning Manager by providing the provisioning database file path dbpath. public static List<OcSecureResource> discoverunowneddevices(int timeout) throws OcException API to discover List of all devices which are not owned/registered yet in the current subnet. public static List<OcSecureResource> discoverowneddevices(int timeout) throws OcException API to discover List of all devices which are owned/registered by provisioning Client. public static void SetownershipTransferCBdata(OxmType type, PinCallbackListener pincallbacklistener) throws OcException API to set particular OxmType (Ownership Transfer Method) and Pin Callback Listener Interface. Interface will be Implemented by the App developer. public static native void setdisplaypinlistener(displaypinlistener displaypinlistener) throws OcException; 21
22 Server specific API for registering Listener for generated PIN on the server side for displaying on the server screen. public static List<OcSecureResource> getdevicestatuslist(int timeout) throws OcException API to get List of all devices, Owned/registered OR un-owned/un-registered, in the current subnet. Class : OcSecureResource : This class represents a secure virtual resource and its state. public native void doownershiptransfer(doownershiptransferlistener doownershiptransferlistener) throws OcException; API to start Ownership transfer of un-owned/un-registered OcSecureResource Object, which was obtained by calling discoverunowneddevices. doownershiptransferlistener will be Notified un-synchronously with result after ownership transfer. public void provisionpairwisedevices(enumset<credtype> credtypeset, KeySize keysize, Object acl1,object device2, Object acl2, ProvisionPairwiseDevicesListener provisionpairwisedeviceslistener) throws OcException API to provision credentials and ACLs between two devices who act as a server. provisionpairwisedeviceslistener will be notified un-synchronously with results of credential and ACL provisioning between two devices. public void provisioncredentials(enumset<credtype> credtypeset, KeySize keysize, Object device2, ProvisionCredentialsListener provisioncredentialslistener) throws OcException API to provision credentials to the device. provisioncredentialslistener will be notified un-synchronously with result of credential provisioning. public native void provisionacl(object acl, ProvisionAclListener provisionacllistener) throws OcException API to send ACL to the device. provisionacllistener will be notified unsynchronously with result of ACL provisioning. public native void unlinkdevices(object device2, UnlinkDevicesListener unlinkdeviceslistener) throws OcException API to remove credentials and relationship between two devices. unlinkdeviceslistener will be notified un-synchronously with result. public native void removedevice(int timeout, RemoveDeviceListener removedevicelistener) throws OcException; API to unlink the devices to each device it is linked with. removedevicelistener will be notified un-synchronously with result. public native List<String> getlinkeddevices(); API to get List of all devices it is linked with. 22
23 public native String getipaddr(); API to get Stringified IP address. public native String getdeviceid(); API to get device ID of the device. public DeviceStatus getdevicestatus() throws OcException API to get status of the device. ON or OFF or INVALID public OwnedStatus getownedstatus() throws OcException API to get Owned/Unowned status of the device. OWNED or UNOWNED or INVALID 23
Tizen/Artik IoT Lecture Chapter 16. IoTivity Provisioning Manager
1 Tizen/Artik IoT Lecture Chapter. IoTivity Provisioning Manager Sungkyunkwan University Contents Provisioning Manager Roles Architecture Ownership Transfer Method Just Work Discovery and Set Ownership
More informationIoTivity Big Picture. MyeongGi Jeong Software R&D Center
IoTivity Big Picture MyeongGi Jeong 2016.11.17 Software R&D Center Contents Overview Features Messaging Security Service Q&A Copyright c 2016 SAMSUNG ELECTRONICS. ALL RIGHTS RESERVED Overview IoTivity?
More informationIOTIVITY INTRODUCTION
IOTIVITY INTRODUCTION Martin Hsu Intel Open Source Technology Center 1 Content may contain references, logos, trade or service marks that are the property of their respective owners. Agenda Overview Architecture
More informationOCF for resource-constrained environments
October 11 13, 2016 Berlin, Germany OCF for resource-constrained environments Kishen Maloor, Intel 1 Outline Introduction Brief background in OCF Core Constrained environment charactertics IoTivity-Constrained
More informationOIC SECURITY SPECIFICATION V1.1.1
1 2 OIC SECURITY SPECIFICATION V1.1.1 Open Connectivity Foundation (OCF) admin@openconnectivity.org Copyright Open Connectivity Foundation, Inc. 2017. All rights Reserved 0 3 4 5 6 7 8 9 10 11 12 13 14
More informationOCF Security Specification
OCF Security Specification VERSION 1.3.0 November 2017 CONTACT admin@openconnectivity.org Copyright Open Connectivity Foundation, Inc. 2016-2017. All Rights Reserved. 1 LEGAL DISCLAIMER 2 3 4 5 6 7 8 9
More informationSalesforce1 Mobile Security White Paper. Revised: April 2014
Salesforce1 Mobile Security White Paper Revised: April 2014 Table of Contents Introduction Salesforce1 Architecture Overview Authorization and Permissions Communication Security Authentication OAuth Pairing
More informationProvisioning IoT with Web NFC. Zoltan Kis Intel
Provisioning IoT with Web NFC Zoltan Kis (@zolkis), Intel Background JavaScript APIs for IoTivity, Soletta W3C Web NFC editor Web access to hardware Earlier: Network management (DSL) Mesh radio networks
More informationOCF 2.0 Clarify 10 parts on Section 7 SecWG CR2473. Legal Disclaimer
Template version: 1.0 page 1 OCF 2.0 Clarify 10 parts on Section 7 SecWG CR2473 Legal Disclaimer THIS IS A DRAFT SPECIFICATION DOCUMENT ONLY AND HAS NOT BEEN ADOPTED BY THE OPEN CONNECTIVITY FOUNDATION.
More informationOAuth securing the insecure
Black Hat US 2011 khash kiani khash@thinksec.com OAuth securing the insecure roadmap OAuth flow malicious sample applications mobile OAuth google app web-based OAuth facebook app insecure implementation
More informationLinux Founda+on Collabora+on Summit: OIC Security. Ned Smith Intel
Linux Founda+on Collabora+on Summit: OIC Security Ned Smith Intel 1 IoT A Metaphor for Pelagic Compu+ng What do I mean by pelagic compu;ng? Other Controller Larval slipper lobster riding on salp chain*
More informationRemote Procedure Call (RPC) and Transparency
Remote Procedure Call (RPC) and Transparency Brad Karp UCL Computer Science CS GZ03 / M030 10 th October 2014 Transparency in Distributed Systems Programmers accustomed to writing code for a single box
More informationDeveloper manual. (Onvif Client Library) Happytimesoft Technology Co.,LTD
Developer manual (Onvif Client Library) Happytimesoft Technology Co.,LTD Declaration All rights reserved. No part of this publication may be excerpted, reproduced, translated, annotated or edited, in any
More informationBatches and Commands. Overview CHAPTER
CHAPTER 4 This chapter provides an overview of batches and the commands contained in the batch. This chapter has the following sections: Overview, page 4-1 Batch Rules, page 4-2 Identifying a Batch, page
More informationLibelium Cloud Hive. Technical Guide
Libelium Cloud Hive Technical Guide Index Document version: v7.0-12/2018 Libelium Comunicaciones Distribuidas S.L. INDEX 1. General and information... 4 1.1. Introduction...4 1.1.1. Overview...4 1.2. Data
More informationBasic DOF Security. Programmer s Guide. Version 7.0
Basic DOF Security Programmer s Guide Version 7.0 Table of Contents Chapter 1: Introduction 1 How to Read This Guide 1 Security Concepts Overview 1 Roles 2 Chapter 2: Authentication Server Access 3 Installing
More informationSalesforce Mobile App Security Guide
Salesforce Mobile App Security Guide Version 2, 2 @salesforcedocs Last updated: November 2, 2017 Copyright 2000 2017 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of salesforce.com,
More informationSingle Sign On for Local Devices. Application Programmer Interface (API) Guide
Single Sign On for Local Devices Application Programmer Interface (API) Guide Issue 1 June 2013 ABSTRACT This document provides the API for the SSO-LD (Single Sign-On for Local Devices) capability, to
More informationTechnical Overview. Version March 2018 Author: Vittorio Bertola
Technical Overview Version 1.2.3 26 March 2018 Author: Vittorio Bertola vittorio.bertola@open-xchange.com This document is copyrighted by its authors and is released under a CC-BY-ND-3.0 license, which
More informationEUROPEAN MIDDLEWARE INITIATIVE
EUROPEAN MIDDLEWARE INITIATIVE COMMON AUTHENTICATION LIBRARY DEVELOPER S GUIDE Document version: 2.1.1 EMI Component Version: 2.x 1/14 This work is co-funded by the European Commission as part of the EMI
More informationGetting Started Guide. Version
Getting Started Guide Version 1.15.0.0 2 Introduction Oculus Platform Copyrights and Trademarks 2017 Oculus VR, LLC. All Rights Reserved. OCULUS VR, OCULUS, and RIFT are trademarks of Oculus VR, LLC. (C)
More informationPulseway Security White Paper
Pulseway Security White Paper Table of Contents 1. Introduction 2. Encryption 2.1 Transport Encryption 2.2 Message Encryption 3. Brute-Force Protection 4. DigiCert Code Signing Certificate 5. Datacenter
More informationOpaali Portal Quick guide
Opaali Portal Quick guide Company information Telia Finland Oyj Teollisuuskatu 15, 00510 HELSINKI, FI Registered office: Helsinki Business ID 1475607-9, VAT No. FI14756079 1 (40) Page 2 (40) Copyright
More informationTutorial: Building the Services Ecosystem
Tutorial: Building the Services Ecosystem GlobusWorld 2018 Steve Tuecke tuecke@globus.org What is a services ecosystem? Anybody can build services with secure REST APIs App Globus Transfer Your Service
More informationIntegration Service. Admin Console User Guide. On-Premises
Kony MobileFabric TM Integration Service Admin Console User Guide On-Premises Release 7.3 Document Relevance and Accuracy This document is considered relevant to the Release stated on this title page and
More informationMicrosoft Recertification for MCSE: Server Infrastructure. Download Full Version :
Microsoft Recertification for MCSE: Server Infrastructure Download Full Version : https://killexams.com/pass4sure/exam-detail/ Answer: C QUESTION: 99 Your company has an office in New York. Many users
More informationGoogle Sync Integration Guide. VMware Workspace ONE UEM 1902
Google Sync Integration Guide VMware Workspace ONE UEM 1902 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments about this documentation,
More informationVSP16. Venafi Security Professional 16 Course 04 April 2016
VSP16 Venafi Security Professional 16 Course 04 April 2016 VSP16 Prerequisites Course intended for: IT Professionals who interact with Digital Certificates Also appropriate for: Enterprise Security Officers
More informationZymkey App Utils: C++
Zymkey App Utils: C++ Generated by Doxygen 1.8.8 Tue Apr 3 2018 07:21:52 Contents 1 Intro 1 2 Hierarchical Index 5 2.1 Class Hierarchy............................................ 5 3 Class Index 7 3.1
More informationUSER MANUAL. SalesPort Salesforce Customer Portal for WordPress (Lightning Mode) TABLE OF CONTENTS. Version: 3.1.0
USER MANUAL TABLE OF CONTENTS Introduction...1 Benefits of Customer Portal...1 Prerequisites...1 Installation...2 Salesforce App Installation... 2 Salesforce Lightning... 2 WordPress Manual Plug-in installation...
More informationACCP-V6.2Q&As. Aruba Certified Clearpass Professional v6.2. Pass Aruba ACCP-V6.2 Exam with 100% Guarantee
ACCP-V6.2Q&As Aruba Certified Clearpass Professional v6.2 Pass Aruba ACCP-V6.2 Exam with 100% Guarantee Free Download Real Questions & Answers PDF and VCE file from: 100% Passing Guarantee 100% Money Back
More informationUSER MANUAL ID PROOFING AND TWO-FACTOR AUTHENTICATION THROUGH FALCON PHYSICIAN TABLE OF CONTENTS
FALCON PHYSICIAN in partnership with SYMANTEC and SURESCRIPTS USER MANUAL ID PROOFING AND TWO-FACTOR AUTHENTICATION THROUGH FALCON PHYSICIAN TABLE OF CONTENTS Quick Overview PG. ii What You ll Need PG.
More informationAdministrator Guide. Find out how to set up and use MyKerio to centralize and unify your Kerio software administration.
Administrator Guide Find out how to set up and use MyKerio to centralize and unify your Kerio software administration. The information and content in this document is provided for informational purposes
More informationVMware AirWatch Google Sync Integration Guide Securing Your Infrastructure
VMware AirWatch Google Sync Integration Guide Securing Your Email Infrastructure Workspace ONE UEM v9.5 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard
More informationProgramming Guide. WISE-PaaS/RMM 3.2. Wireless IoT Sensing Embedded Agent WISE-Agent Programming Guide
Programming Guide WISE-PaaS/RMM 3.2 Wireless IoT Sensing Embedded Agent WISE-Agent Programming Guide Change Log: Date Version / Major change 2015/02/21 V0.1 Scott Chang, create draft document 2015/03/08
More informationZumero for SQL Server: Client API
Copyright 2013-2017 Zumero LLC Table of Contents 1. About... 1 2. Basics of zumero_sync()... 1 3. Manipulating Data in SQLite... 3 4. Details for Advanced Users... 4 4.1. Additional Functions in the API...
More informationDolby Conference Phone. Configuration guide for BT MeetMe with Dolby Voice
Dolby Conference Phone Configuration guide for BT MeetMe with Dolby Voice Version 3.2 17 May 2017 Copyright 2017 Dolby Laboratories. All rights reserved. Dolby Laboratories, Inc. 1275 Market Street San
More informationInstructions 1 Elevation of Privilege Instructions
Instructions 1 Elevation of Privilege Instructions Draw a diagram of the system you want to threat model before you deal the cards. Deal the deck to 3-6 players. Play starts with the 3 of Tampering. Play
More informationTroubleshooting Guide
. All right reserved. For more information about Specops Reset and other Specops products, visit www.specopssoft.com Copyright and Trademarks Specops Password Reset is a trademark owned by Specops Software.
More informationManaged Access Gateway. User Guide
Managed Access Gateway User Guide Version 2.2 Exostar, LLC November 3, 2011 Table of Contents Table of Contents... ii Purpose... 1 Log-in to your MAG Account... 2 Additional MAG Login Options... 2 First
More informationOctober J. Polycom Cloud Services Portal
October 2018 3725-42461-001J Polycom Cloud Services Portal Copyright 2018, Polycom, Inc. All rights reserved. No part of this document may be reproduced, translated into another language or format, or
More informationINSTALLATION GUIDE Spring 2017
INSTALLATION GUIDE Spring 2017 Copyright and Disclaimer This document, as well as the software described in it, is furnished under license of the Instant Technologies Software Evaluation Agreement and
More informationManaged Access Gateway. User Guide
Managed Access Gateway User Guide Version 3.0 Exostar, LLC April 20, 2013 Table of Contents Table of Contents...ii Purpose... 1 Log-in to your MAG Account... 2 Additional MAG Login Options... 2 First Time
More informationAWS IAM User Guide for Cohesive Networks Support. Creating an Amazon Identity and Access Management User with "read only" policy
AWS IAM User Guide for Cohesive Networks Support Creating an Amazon Identity and Access Management User with "read only" policy 2016 Table of Contents Access the AWS IAM Service via AWS Portal 3 Create
More informationAuthenticating SMTP Sessions Using Client Certificates
Authenticating SMTP Sessions Using Client Certificates This chapter contains the following sections: Overview of Certificates and SMTP Authentication, on page 1 Checking the Validity of a Client Certificate,
More informationRegions OnePass USER GUIDE. It s time to expect more. Regions Bank Member FDIC Revised
Regions OnePass USER GUIDE It s time to expect more. Regions Bank Member FDIC Revised 051616 User Guide Table of Contents Section I. Regions OnePass Basics 3 What Is Regions OnePass? 3 Minimum Browser
More informationDigital Certificates Demystified
Digital Certificates Demystified Ross Cooper, CISSP IBM Corporation RACF/PKI Development Poughkeepsie, NY Email: rdc@us.ibm.com August 9 th, 2012 Session 11622 Agenda Cryptography What are Digital Certificates
More informationAbout 1. Chapter 1: Getting started with odata 2. Remarks 2. Examples 2. Installation or Setup 2. Odata- The Best way to Rest 2
odata #odata Table of Contents About 1 Chapter 1: Getting started with odata 2 Remarks 2 Examples 2 Installation or Setup 2 Odata- The Best way to Rest 2 Chapter 2: Azure AD authentication for Node.js
More informationAdvanced ASP.NET Identity. Brock Allen
Advanced ASP.NET Identity Brock Allen brockallen@gmail.com http://brockallen.com @BrockLAllen Advanced The complicated bits of ASP.NET Identity Brock Allen brockallen@gmail.com http://brockallen.com @BrockLAllen
More informationCredential Management for Internet of Things Devices
Credential Management for Internet of Things Devices Internet Protocol for Smart Objects (IPSO) Alliance Editors: Hannes Tschofenig, ARM Limited Ned Smith, Intel Contributors: Mark Baugher, Consultant
More informationThis Document describes the API provided by the DVB-Multicast-Client library
DVB-Multicast-Client API-Specification Date: 17.07.2009 Version: 2.00 Author: Deti Fliegl This Document describes the API provided by the DVB-Multicast-Client library Receiver API Module
More informationLenovo ThinkAgile XClarity Integrator for Nutanix Installation and User's Guide
Lenovo ThinkAgile XClarity Integrator for Nutanix Installation and User's Guide Version 1.0 Note Before using this information and the product it supports, read the information in Appendix A Notices on
More informationInstructions 1. Elevation of Privilege Instructions. Draw a diagram of the system you want to threat model before you deal the cards.
Instructions 1 Elevation of Privilege Instructions Draw a diagram of the system you want to threat model before you deal the cards. Deal the deck to 3 6 players. Play starts with the 3 of Tampering. Play
More informationflask-jwt-simple Documentation
flask-jwt-simple Documentation Release 0.0.3 vimalloc rlam3 Nov 17, 2018 Contents 1 Installation 3 2 Basic Usage 5 3 Changing JWT Claims 7 4 Changing Default Behaviors 9 5 Configuration Options 11 6 API
More informationSoftware Release Notes for XSS AD/SQL version 5.1.3
Software Release Notes for XSS AD/SQL version 5.1.3 Support Information: Ensure Technologies Technical Support is available to provide any needed assistance. Please contact us at (734) 668-8800 or at support@ensuretech.com.
More informationBuilding the Modern Research Data Portal using the Globus Platform. Rachana Ananthakrishnan GlobusWorld 2017
Building the Modern Research Data Portal using the Globus Platform Rachana Ananthakrishnan rachana@globus.org GlobusWorld 2017 Platform Questions How do you leverage Globus services in your own applications?
More informationinnovi Edge Installation & Configuration Guide
innovi Edge 200 - Installation & Configuration Guide Version 1.5, January 2018 Table of Contents 1. Overview... 3 2. Prerequisites and Design Considerations... 4 2.1. Required Equipment... 4 2.2. Networking...
More informationSupport Device Access
Personal Devices on a Corporate Network (BYOD), on page 1 Personal Device Portals, on page 2 Support Device Registration Using Native Supplicants, on page 7 Device Portals Configuration Tasks, on page
More informationFortiAuthenticator - Two-Factor Authentication for Web Applications Solution Guide VERSION 1.0
FortiAuthenticator - Two-Factor Authentication for Web Applications Solution Guide VERSION 1.0 FORTINET DOCUMENT LIBRARY http://docs.fortinet.com FORTINET VIDEO GUIDE http://video.fortinet.com FORTINET
More informationGetting Into Mobile Without Getting Into Trouble
Getting Into Mobile Without Getting Into Trouble Greg Kliewer Senior Solutions Strategist October, 2014 The good old days Network separation No programmatic access from the Public Internet Safety through
More informationWHITE PAPER Cloud FastPath: A Highly Secure Data Transfer Solution
WHITE PAPER Cloud FastPath: A Highly Secure Data Transfer Solution Tervela helps companies move large volumes of sensitive data safely and securely over network distances great and small. We have been
More informationThe Mobile Terminal Security Access System Based on IPSec VPN Di Zhao1,a, Xin He2,b and Yunjun Li1,c*
3rd International Conference on Machinery, Materials and Information Technology Applications (ICMMITA 2015) The Mobile Terminal Security Access System Based on IPSec VPN Di Zhao1,a, Xin He2,b and Yunjun
More informationSecurity Digital Certificate Manager
System i Security Digital Certificate Manager Version 6 Release 1 System i Security Digital Certificate Manager Version 6 Release 1 Note Before using this information and the product it supports, be sure
More informationLustre Client GSS with Linux Keyrings
Lustre Client GSS with Linux Keyrings Eric Mei 2008.07.22 1 Introduction This document describes how Lustre use keyring to populate and manage the client gss context, to replace current
More informationNetwork Address Translators (NATs) and NAT Traversal
Network Address Translators (NATs) and NAT Traversal Ari Keränen ari.keranen@ericsson.com Ericsson Research Finland, NomadicLab Outline Introduction to NATs NAT Behavior UDP TCP NAT Traversal STUN TURN
More informationIntegration Service. Admin Console User Guide. On-Premises
Kony Fabric Integration Service Admin Console User Guide On-Premises Release V8 SP1 Document Relevance and Accuracy This document is considered relevant to the Release stated on this title page and the
More informationINFORMATION TECHNOLOGY COMMITTEE ESCB-PKI PROJECT
INFORMATION TECHNOLOGY COMMITTEE ESCB-PKI PROJECT ESCB-PKI REGISTRATION AUTHORITY APPLICATION MOST COMMON ERRORS VERSION 1.2 ECB-PUBLIC 15-November-2012 ESCB-PKI - Common errors v.1.2.docx Page 2 of 20
More informationIBM. Security Digital Certificate Manager. IBM i 7.1
IBM IBM i Security Digital Certificate Manager 7.1 IBM IBM i Security Digital Certificate Manager 7.1 Note Before using this information and the product it supports, be sure to read the information in
More informationSoftware Release Notes for XSS AD/SQL version 5.1.0
Software Release Notes for XSS AD/SQL version 5.1.0 Support Information: Ensure Technologies Technical Support is available to provide any needed assistance. Please contact us at (734) 668-8800 or at support@ensuretech.com.
More informationMobile Payment Application Security. Security steps to take while developing Mobile Application s. SISA Webinar.
Mobile Payment Application Security Security steps to take while developing Mobile Application s About SISA Payment Security Specialists PCI Certification Body (PCI Qualified Security Assessor) Payment
More informationNew in Release: Secomea Release 8.0. This document shows the changes from release 7.4 to release 8.0. Version: 1.5, 2018
New in Release: Secomea Release 8.0 This document shows the changes from release 7.4 to release 8.0. Version: 1.5, 2018 Table of Contents Change log 4 1. Release 8.0 4 Highlights 4 2. General 6 2.1. New
More informationBlackBerry Developer Summit. A02: Rapid Development Leveraging BEMS Services and the AppKinetics Framework
BlackBerry Developer Summit A02: Rapid Development Leveraging BEMS Services and the AppKinetics Framework Page 2 of 21 Table of Contents 1. Workbook Scope... 4 2. Compatibility... 4 3. Source code download
More informationCONNECTLED CUSTOMER ADMIN GUIDE
CONNECTLED CUSTOMER ADMIN GUIDE For Customer Admin JUNE 28, 2018 EVLUMA 3600 Lind Ave SW Suite#140 Renton WA 98057, 100432-001 REV A05 Table of Contents 1. Definitions... 3 2. General ConnectLED Account
More informationVMware Horizon Workspace Security Features WHITE PAPER
VMware Horizon Workspace WHITE PAPER Table of Contents... Introduction.... 4 Horizon Workspace vapp Security.... 5 Virtual Machine Security Hardening.... 5 Authentication.... 6 Activation.... 6 Horizon
More informationRegions OnePassSM USER GUIDE. It s time to expect more. Regions Bank Member FDIC Revised
Regions OnePassSM USER GUIDE Regions Bank Member FDIC Revised 110614 It s time to expect more. Regions OnePass User Guide Table of Contents Section I. OnePass Basics 3 What Is OnePass? 3 Minimum Browser
More informationWhat Is Wireless Setup
What Is Wireless Setup Wireless Setup provides an easy way to set up wireless flows for 802.1x, guest, and BYOD. It also provides workflows to configure and customize each portal for guest and BYOD, where
More informationWHITE PAPER AIRWATCH SUPPORT FOR OFFICE 365
WHITE PAPER AIRWATCH SUPPORT FOR OFFICE 365 Airwatch Support for Office 365 One of the most common questions being asked by many customers recently is How does AirWatch support Office 365? Customers often
More informationPulse Secure Mobile Android Release 6.3.0
Pulse Secure Mobile Android Release 6.3.0 Pulse Secure Mobile 6.3R1 for Android (build # 6.3.0. r235864.19) Pulse Secure Client Release 6.3R1 Document Revision 1.0 Published: 2017-07-10 2017 by Pulse Secure,
More informationNetDrive2 SDK Reference
NetDrive2 SDK Reference Bdrive Inc, Copyright Bdrive inc, All Rights Reserved version date e-mail 0.1 2014-4-10 jyyoon@bdrive.com 0.2 2014-5-9 jyyoon@bdrive.com 0.3 2014-6-14 jyyoon@bdrive.com 0.4 2014-7-14
More informationThe Multi Domain Administrator account can operate with Domain Administrator privileges on all associated Domain Administrator users.
User Management Libra Esva users can manage and access the system. With Libra Esva you can enable per-user quarantine and the system will create user accounts to enable access to quarantine settings and
More informationSecurity Philosophy. Humans have difficulty understanding risk
Android Security Security Philosophy Humans have difficulty understanding risk Safer to assume that Most developers do not understand security Most users do not understand security Security philosophy
More informationCryptographic Protocols 1
Cryptographic Protocols 1 Luke Anderson luke@lukeanderson.com.au 5 th May 2017 University Of Sydney Overview 1. Crypto-Bulletin 2. Problem with Diffie-Hellman 2.1 Session Hijacking 2.2 Encrypted Key Exchange
More informationCisco ISE Ports Reference
Cisco ISE Infrastructure Cisco ISE Infrastructure, on page 1 Cisco ISE Administration Node Ports, on page 2 Cisco ISE Monitoring Node Ports, on page 4 Cisco ISE Policy Service Node Ports, on page 6 Cisco
More informationOutline. Interprocess Communication. Interprocess Communication. Communication Models: Message Passing and shared Memory.
Eike Ritter 1 Modified: October 29, 2012 Lecture 14: Operating Systems with C/C++ School of Computer Science, University of Birmingham, UK Outline 1 2 3 Shared Memory in POSIX systems 1 Based on material
More informationNetwork Security Essentials
Network Security Essentials Fifth Edition by William Stallings Chapter 4 Key Distribution and User Authentication No Singhalese, whether man or woman, would venture out of the house without a bunch of
More informationTizen/Artik IoT Lecture Chapter 14. IoTivity Easy Setup Manager
1 Tizen/Artik IoT Lecture Chapter 14. IoTivity Easy Setup Manager Sungkyunkwan University Contents Easy Setup Use Cases Device Roles Easy Setup Resource Model Provisioning Resource WiFi Resource DevConf
More informationWhich compute option is designed for the above scenario? A. OpenWhisk B. Containers C. Virtual Servers D. Cloud Foundry
1. A developer needs to create support for a workload that is stateless and short-living. The workload can be any one of the following: - API/microservice /web application implementation - Mobile backend
More informationSponsored by the Alliance for Telecommunications Industry Solutions. CORBA Implementation Profile for Electronic Communications
Sponsored by the Alliance for Telecommunications Industry Solutions CORBA Implementation Profile for Electronic Communications TCIF-98-014 Issue 1 09/16/1999 Copyright Page TCIF Guideline CORBA Implementation
More informationTableau Server Security in Depth
Welcome # T C 1 8 Tableau Server Security in Depth Kacper Reiter Sr. Software Engineer Server and Cloud Platform Dinç Çiftçi Software Engineer Server and Cloud Platform Agenda General security model
More informationint fnvgetconfig(handle h, UINT32 id, const void *cfg, size_t sz);... 4
RP-VL-UTIL-V1 Developer s Guide [ Contents ] 1. Introduction... 1 2. Building Environment... 1 3. Operating Environment... 1 4. Function Explanation... 2 4.1. Common API for Transmitting and Receiving...
More informationMobilePASS. Security Features SOFTWARE AUTHENTICATION SOLUTIONS. Contents
MobilePASS SOFTWARE AUTHENTICATION SOLUTIONS Security Features Contents Introduction... 2 Technical Features... 2 Security Features... 3 PIN Protection... 3 Seed Protection... 3 Security Mechanisms per
More informationINTRODUCTION FEATURES OVERVIEW. a) Applicant Registration
INTRODUCTION The main objective of Grant Management System is to help Spices Board to distribute subsidy payments to about 300000 farmers distributed all over India through its network of offices. The
More informationDolby Conference Phone 3.1 configuration guide for West
Dolby Conference Phone 3.1 configuration guide for West 17 January 2017 Copyright 2017 Dolby Laboratories. All rights reserved. For information, contact: Dolby Laboratories, Inc. 1275 Market Street San
More informationWorkspace ONE UEM Certificate Authentication for Cisco IPSec VPN. VMware Workspace ONE UEM 1810
Workspace ONE UEM Certificate Authentication for Cisco IPSec VPN VMware Workspace ONE UEM 1810 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/
More informationNasuni Data API Nasuni Corporation Boston, MA
Nasuni Corporation Boston, MA Introduction The Nasuni API has been available in the Nasuni Filer since September 2012 (version 4.0.1) and is in use by hundreds of mobile clients worldwide. Previously,
More informationWeb Self Service Administrator Guide. Version 1.1.2
Version 1.1.2 Web Self Service Administrator Guide Version 1.1.2 Copyright and Trademark Notice Use of the product documented in this guide is subject to your prior acceptance of the End User License Agreement.
More informationSupport Device Access
Personal Devices on a Corporate Network (BYOD), on page 1 Personal Device Portals, on page 2 Support Device Registration Using Native Supplicants, on page 8 Device Portals Configuration Tasks, on page
More informationChapter 9: Key Management
Chapter 9: Key Management Session and Interchange Keys Key Exchange Cryptographic Key Infrastructure Storing and Revoking Keys Digital Signatures Slide #9-1 Overview Key exchange Session vs. interchange
More informationAndroid Mobile Single Sign-On to VMware Workspace ONE. SEP 2018 VMware Workspace ONE VMware Identity Manager VMware Identity Manager 3.
Android Mobile Single Sign-On to VMware Workspace ONE SEP 2018 VMware Workspace ONE VMware Identity Manager VMware Identity Manager 3.3 You can find the most up-to-date technical documentation on the VMware
More informationNotifySCM Workspace Security Server Guide
NotifySCM Workspace Security Server Guide Version 3.16.0 - October 2017 NotifySCM Workspace: Security Server Guide Table of Contents 1 Overview... 4 Roles... 4 Login... 4 2 Technical Configuration... 6
More information