European Commission. E-TrustEx Software Architecture Document

Size: px
Start display at page:

Download "European Commission. E-TrustEx Software Architecture Document"

Transcription

1 EUROPEAN COMMISSION DIRECTORATE-GENERAL INFORMATICS Information systems Directorate European Commission E-TrustEx Software Architecture Document Date: 28/03/2012 Version: 0.1 Authors: Olivier Derveau, George Vaicar Revised by: Approved by: Public: Reference Number: Commission européenne, B-1049 Bruxelles / Europese Commissie, B-1049 Brussel - Belgium. Telephone: (32-2) Commission européenne, L-2920 Luxembourg. Telephone: (352)

2 TABLE OF CONTENTS 1. INTRODUCTION Purpose Scope References Overview ARCHITECTURAL REPRESENTATION ARCHITECTURAL GOALS AND CONSTRAINTS SECURITY Security Overview Introduction Transport Layer Security Message Level Security Application Level Security Logging and Auditing Other Philosophy Mapping of Features to Requirements Mapping Database Security USE-CASE VIEW Selection Rationale Diagram LOGICAL VIEW Overview Architecturally Significant Design Packages Use-Case Realizations A sender system stores a document wrapper A sender system submits a document bundle A receiver system retrieves a document bundle A receiver system retrieves a document wrapper DEPLOYMENT VIEW IMPLEMENTATION VIEW Overview Layers Service Bus Layer Asynchronous Business Layer e-trustex Software Architecture Document Page i

3 Data Access Layer DATA VIEW Data Model State Machines Introduction Legend Generic State Machines Generic State Machine for an Incoming Object Generic State Machine for an Outgoing Object Specific State Machines for Bundle SIZE AND PERFORMANCE QUALITY Extensibility Reliability Portability e-trustex Software Architecture Document Page 2

4 Document History Version Date Comment Modified Pages /03/2012 First draft, extract the common parts of the existing SADs into a master document All e-trustex Software Architecture Document Page iii

5 1. INTRODUCTION 1.1. Purpose This document provides a comprehensive architectural overview of the system, using a number of different architectural views to depict its different aspects. It is intended to capture and convey the significant architectural decisions which have been made on the system Scope The architecture described in this document concerns the system e-trustex (Electronic Trusted Exchange) and the interfaces with back-offices, front-offices or external systems. It describes the generic services of the platform (toolbox services) and also the e-procurement services (referenced here as Open e-prior) built on top of the generic platform References 1.4. Overview After summarizing the architectural representation, goals and constraints, this document details the security architecture and exposes the system using several architectural views (use-case, logical, process, deployment, implementation and data). It then concludes with size, performance and quality considerations. 2. ARCHITECTURAL REPRESENTATION The next two sections will describe architectural goals and constraints and the system security because they have important consequences on the system architecture. Architecturally relevant use cases will be presented with a Use Case diagram completed, for each use case, with a short explanation and why it is architecturally important. A logical view will be provided to show: Main services the application must provide; Interactions with legacy systems; Interactions with system users. An implementation view will describe: The software layers decomposition; The main software components. A deployment view will provide a description of the hardware components and how they are linked together. This view gives a technical description of protocols and hardware nodes used. Finally, information about data persistency will be provided in a specific Data View that will describe persistent entities. UML diagrams will be used systematically to represent the different views of the system. The goal of these diagrams is to represent our ideas and to let people understand them easily and without misinterpretation. Master Software Architecture Document Page 4 / 29

6 Package diagrams will be used in the Logical View. They must be understood as a logical representation of the main concepts handled by the system and not as implementation packages. Moreover, to keep a high granularity degree, groups of related services will be modeled as "aggregate" packages. This will help the reader to easily view relations between groups of services, and it will keep diagrams simpler. Sequence diagrams will also be used to represent main interactions between the services provided and the actors. Deployment diagram will be used to describe the deployment view. Component diagram will be used in the implementation view. Finally a class diagram will be used in the Data View to model main system data. 3. ARCHITECTURAL GOALS AND CONSTRAINTS The following non-functional requirements that can impact the architectural solution have been identified: Non-functional requirement Support of large files Support of groups of files Interoperability Confidentiality Integrity Availability File storage Description The application shall allow the transfer of large files (up to 100 MB each) of any type The application shall allow the transfer of groups of linked files (up to 500 files) The application shall allow the connection of heterogeneous systems The system shall ensure that transferred documents are not viewed by anybody else than the sender and the final recipient The system shall guarantee integrity of the transferred files The system shall be also available outside standard office hours. Down time must be communicated in advance and organised in collaboration with the system owners A dedicated DB shall be used to store binaries 4. SECURITY 4.1. Security Overview Introduction From a legal perspective, the solution can be classified as an EDI system. The EDI requirements include processes for authentication, integrity and validity of documents both during transmission and storage. Besides those it is also important to include measures for authorization, confidentiality, auditing and non-repudiation. A short description of the security requirements indicates their need: Authentication ensures that the parties involved in communication are really who they say they are. Integrity guarantees that a message is not modified in transition. Validity certifies a stored message does not lose its legal attributes. Master Software Architecture Document Page 5 / 29

7 Authorization ensures that users only have access to the resources they are granted to. Confidentiality is needed to prevent third parties from eavesdropping on information that is being transmitted. Auditing controls enable relevant parties like authorized bodies to inspect transactions afterwards. Non-repudiation measures prevent users from denying actions they have undertaken. Besides technical security measures, there will also be a focus on other aspects that have a positive impact on security. These other aspects comprise procedures and logging. The use of adequate business procedures can guarantee a high level of security without having technical measures that are too strict to be workable in a day to day environment. An appropriate level of logging and audit trails will provide involved parties a timely indication of possible issues and a starting point for debugging or investigations. Finally, in addition to operational needs for security, care will also be taken to extend security measures from the system to the archiving of business documents. Legal constraints impose extra requirements to guarantee that archived documents remain unmodified and readable throughout their storage period which can last more than ten years. The first focus lies on technical security measures. In IT architecture there are various levels at which security measures can be applied. These layers include transport, message and the application layer Transport Layer Security Transport layer security provides point to point security between two communicating parties. This can be viewed as a protected tunnel that will be set up between two points. Information inserted into the tunnel is protected until it leaves the tunnel at the endpoint. This has the repercussion that the start point and endpoint need to be in a secure environment themselves. Master Software Architecture Document Page 6 / 29

8 Otherwise your data could be compromised when it leaves the tunnel. At the transport level we foresee to be using HTTPS. HTTPS is a secure version of the HTTP protocol and is being used to protect data transactions for commercial and financial purposes. It uses a Secure Socket Layer (SSL) and digital certificates to encrypt a data transfer session over an otherwise insecure HTTP connection. SSL transactions are negotiated by means of a key-based encryption algorithm between the client and the server. A digital certificate is being sent by the server to the client to prove its identity. To verify the certificate, the client must possess the root certificate for the key that was used to sign the server's certificate. This can be enabled by either exchanging and installing the root certificate in front or using a root authority that is trusted between both parties. Note that normally HTTPS only guarantees the identity of the server and that the client does not need to identify itself to setup a communication channel. To overcome this problem and to meet the requirement of non-repudiation, mutual authentication is needed by using either client certificates or a security token. We will discuss both client certificates and tokens and list the impacts of using either one of them. Firstly there are client certificates which, just like server certificates can verify the identity of the client and which can be used to set up a secure communication channel or to digitally sign messages. The drawback however is that the use of client certificates is rather complex and requires every supplier to obtain and manage its own certificates and the setup of a PKI (Public Key Infrastructure) to provide a repository of digital identities. Secondly there are security tokens which can be used to alleviate the complexity of client certificates. Security tokens can exist in many forms from one time passwords (OTP's) generated by a hardware device to normal passwords which we are used to enter on websites every day. Our assumption is that normal passwords are the best balance between security and simplicity. Given the fact that we are already applying HTTPS to set up the initial secure connection, using HTTP basic authentication with normal passwords over this secure connection gives us enough confidentiality that passwords are not stolen. Our assumption however does not hold if cautious care has to be taken to prevent password stealing by keylogging or phishing techniques. The transport level measures on itself will provide restricted access to the system, confidentiality and integrity of message exchange. Authenticity of origin and integrity of received and stored content can be assured in combination with auditing and logging features that will be described below Message Level Security The next level of security protects the message exchange and the data itself instead of the transportation channel. In fact, message level security could completely replace transport level security, but this is not really practical for the intended architecture and its inherent limitations. To cater for the need for non-repudiation, we will rely on a SOAP interceptor in combination with the secure transport channel discussed above. The SOAP interceptor has the ability to digest, monitor and log the messages that are exchanged between the users and the system. In more detail, this means that before entering the system and while still being in a secure channel the exchanged messages will be logged to a secure storage. As a result, the system is able to prove or disprove having previously sent or received data for a particular user Application Level Security The highest level in the protocol stack is the application level. Application level security manages access to the services the system provides. To achieve a controllable method of handling access, user profiles will be used. A user profile is a set of user attributes that can be combined with access rights to facilitate management of system resource utilisation. Dataownership is managed by only giving users access to the data they have created or to the data they have sufficient rights to. Master Software Architecture Document Page 7 / 29

9 Logging and Auditing Logging and auditing will be used as a complementary feature besides the technical security measures described above. It is foreseen that logging and auditing will occur at various levels in the system. Firstly, all exchanged information, incoming as well as outgoing messages, between the system and the users of the system will be intercepted and logged to a database. This will be done by a SOAP interceptor. Besides the exchanged information all logons, transactions, checks and other actions as well as all actions performed by system administrators will be logged by either the process manager or an add-on to the ESB. The level of logging will not only provide guarantees to the sending and reception of messages to support the feature of non-repudiation, but will also help technicians and architects resolve technical errors in case of system malfunction. Secondly, all actions that result in accessing the system or modifying the state or functionality of the system are logged. This not only includes authentication and authorization of users, but also the actions that administrators undertake to maintain or update the system. It should never be possible that one person, no matter what level of access he has, can modify parts of the system without leaving an audit trail. All gathered logs will be maintained in a database that has restricted access and will be backed up regularly. It is assumed that the logs cannot be tampered with in order to support their nonrepudiation characteristics Other It is assumed that the employed security measures guarantee a maximum and agreed level of security while incurring minimal effort for the users of the system. The solution should be well protected but workable. In order to provide a flexible and reliable solution that can be used across borders and without restrictions, the goal is to have a 24/7 uptime of the system. Only small and limited downtimes for updating the system are allowed and should be kept to a minimum. An important security related aspect of the system is legal data protection and privacy. The system must ensure that all data exchanged between the system and its users are protected from disclosure to any unauthorized party. Additionally, it is mandatory that all gathered information about the users of the system is treated in harmony with existing European privacy protection regulations Philosophy The overall philosophy of protection that will be used in the platform is to provide a manageable and working solution that will be used in a day to day environment while keeping an adequate level of security. This level of security will cover all legal and regulatory aspects imposed by various stakeholders and will be thorough enough to prevent abuse of the system. Care will be taken however that the solution will not turn into an unworkable system filled with extensive security measures just for the purpose of adding technical specifications. It is assumed that a good level of technical security, together with well-designed procedures, audit controls and logging provide the best balance between cost and benefits Mapping of Features to Requirements Mapping The following table lists the security requirements together with the features which implement them. Master Software Architecture Document Page 8 / 29

10 Requirement Access to the system Confidentiality of message exchange Exchanged data integrity Authenticity of origin and integrity of content Non-repudiation Access to services and user profiles Data ownership Archiving security Logging actions and messages Access to logs and logging modification Max level of transparency, minimum effort and agreed level of security Legal data protection and privacy Feature HTTPS with basic HTTP username and password authentication will be used. HTTPS provides a secure transport channel and prevents untrusted third parties from reading exchanged messages. HTTPS provides a secure transport channel and prevents untrusted third parties from tampering with exchanged data during transport. Authentication with username and password, together with a secure transport channel, logging of exchanged data and secure database storage provides security about the origin and integrity of the content. Non-repudiation is guaranteed by the SOAP interceptor which monitors and logs all exchanged traffic in cooperation with a secure transport channel where users are authenticated over HTTPS. User profiles will be used that can be combined with access rights to facilitate management of system resource utilisation. Data ownership is assured by only giving users access to the data they have created or have sufficient rights to read or modify. A secured database with restricted access and regular protected backups will provide archiving security. This requirement will be covered by a SOAP interceptor to intercept all exchanged messages in the system. Logs will be stored in a secure database with restricted access and regular protected backups. The architectural design covers a balance between usability and protection of the system without compromising any security aspects. All exchanged data between the system and its users are protected and personal data about users of the system is stored securely where unauthorized users or untrusted parties do not have access to. All database connections and disconnections are audited (real username, terminal, logon time, logoff time Database Security The databases that will contain business data, logging information and audit trails will be kept in a secure environment where only authorized users have access to. Audit trails are kept to ensure that the data is not tampered with. Additionally, it is assumed that regular backups of the databases are generated and securely archived. The exact database security measures depend on the specific infrastructure where the system is deployed. Master Software Architecture Document Page 9 / 29

11 The security features that should be considered are listed below: strong user authentication, data integrity, data encryption, auditing, data source protection (security policy on Application Server), backup and restore. 5. USE-CASE VIEW This section provides a representation of the architecturally significant use cases Selection Rationale The architecturally significant use cases have been selected based on the following criteria: Use cases affecting multiple components of the system, thereby providing a cross-cutting view of the system architecture; Use cases representing critical parts of the architecture, thereby addressing the technical risks of the project at an earlier stage. The following use cases have been selected. Use case addressing the submission of documents by external applications (UC Submit Document Bundle) Use case addressing the submission of ( potentially large) binary files (UC Store Document Wrapper) Use case addressing the retrieval of ( potentially large) binary files (UC Retrieve Document Wrapper Request) A use case addressing the retrieval of documents by external applications (UC Submit Retrieve Request) Master Software Architecture Document Page 10 / 29

12 Diagram The following Use Cases diagram displays the e-trustex use cases chosen as architecturally relevant and their links with external applications (here the Sender and Receiver Systems). For the eprocurement module, the Supplier in the below use case diagram can play the role of both Sender and Receiver depending on the use case. Master Software Architecture Document Page 11 / 29

13 Architecturally Significant Use Cases Included in all other Use Cases <<include>> UC8: Submit Invoice (from Billing) <<include>> UC23: Route Document (from Cross Functional) UC16: Logging (from Cross Functional) <<include>> UC18: User Access UC22.1: Register Service (from System) System Admnistrator (from Cross Functional) Supplier UC7: Submit Attachment (from Archive) UC1: Archive Document (from Archive) UC17: Monitoring (from Cross Functional) UC15: Request Status (from Information) Backend Application Master Software Architecture Document Page 12 / 29

14 6. LOGICAL VIEW Overview In this chapter we describe the main application packages, how they interact and how they implement system use cases. In the subsection we describe the main packages of the system and how they are called by the external applications. In the subsection we explain how these packages participate to the implementation of the architecturally relevant use cases. Sequence diagrams are provided to illustrate packages interactions Architecturally Significant Design Packages The following diagram provides a high level view of the main packages composing the system. This diagram also shows the external systems (represented as blue packages). It is important to understand that even if just two external systems are shown on the diagram there could be several external systems. The interfaces provided by e-trustex will remain identical and the fact that other systems use them have no impact on the software (low coupling is implemented) but only on the infrastructure capacity to support the load. Sender and Receiver systems access to e-trustex via a Service Bus that publishes the available services. It calls different generic packages responsible for SLA management, monitoring, user access and logging. The Binary File Service is a Web Service deployed outside the Service Bus because this one does not allow enforcing maximum file size limitation and various SLA rules. It uses the Binary File Management services. Moreover the services are implemented by the packages Inbox, Retrieve, Bundle Management, and Binary File Management. These services use lower level packages to route and validate messages, to store or search messages in the e-trustex database. Master Software Architecture Document Page 13 / 29

15 The following diagram depicts another view on the system in the context of the eprocurement module. Master Software Architecture Document Page 14 / 29

16 Use-Case Realizations The following use cases have been chosen to describe how software packages behave: A sender system stores a document wrapper (binary file) A sender system submits a document bundle A receiver system retrieves a document bundle A receiver system retrieves a document wrapper(binary file) Indeed these use cases use all the main packages of the architecture A sender system stores a document wrapper The following diagram shows the different interactions occurring during the Store Document Wrapper use case. The Sender System submits a binary file (and its descriptor as an XML file) via a web service published outside the Service Bus and named Binary File Service. This one logs the access, authenticates and authorizes the system user, verify SLA rules and update the monitoring information. The Binary File Service delegates the call to the BinaryFileManagement package that stores the binary file in the e-trustex database. HTTP chunking is used for the file transfer and the binary file is stored chunk by chunk. That avoids loading the full file in the Application Server memory. A check on the file size is also done by that package in order to close the HTTP connection whenever the maximum file size is reached. That prevents the system from Deny Of Services attacks where the sender would send huge files, blocking the HTTP threads for a very long period. The file size check also prevents such attacks that would fulfil the File System (table space) and so lead to a server crash. The BinaryFileManagement package processes synchronously the file descriptor. It validates and persists it in the e-trustex database (in the schema dedicated to the storage of large binary files). Master Software Architecture Document Page 15 / 29

17 Master Software Architecture Document Page 16 / 29

18 A sender system submits a document bundle The following diagram shows the different interactions occurring during the submit document bundle use case. The Sender System submits a bundle document via a web service published on the Service Bus. This one logs the access, authenticates and authorizes the system user, verify SLA rules and update the monitoring information. The Service Bus delegates the call to the BundleManagement package that validates the document, check the binary file references by calling the BinaryFileManagement package, persists the document and routes it via the DocumentManagement package. Master Software Architecture Document Page 17 / 29

19 Master Software Architecture Document Page 18 / 29

20 A receiver system retrieves a document bundle The following diagram shows the different interactions occurring during the retrieve document bundle use case. The Receiver System retrieves a document bundle via a web service published on the Service Bus. This one logs the access, authenticates and authorizes the system user, verify SLA rules and update the monitoring information. The Service Bus delegates the call to the Retrieve package that uses the DocumentManagement package that is responsible of the validation of the retrieve request and the retrieval of the document. The retrieve document service is generic and so can be used for different kinds of documents. The retrieval of a document bundle is possible by specifying its identifier and its type A receiver system retrieves a document wrapper The following diagram shows the different interactions occurring during the retrieve document wrapper use case. Master Software Architecture Document Page 19 / 29

21 The Receiver System retrieves a binary file (and its descriptor as an XML Document Wrapper) via a web service published outside the Service Bus. This one logs the access, authenticates and authorizes the system user, verify SLA rules and update the monitoring information. The Service Bus delegates the call to the BinaryFileManagement package that validates the request, retrieves the file descriptor and the binary file itself in the e-trustex database (in the schema dedicated to the storage of large binary files). That package also checks if the receiver has access to the file (meaning that it is linked to a bundle document that it has received). 7. DEPLOYMENT VIEW This paragraph provides a description of the hardware nodes running the execution environment for the system. The following diagram, a UML deployment diagram, provides a view of hardware components involved in this project. Master Software Architecture Document Page 20 / 29

22 Figure 1: System Hardware Components It is important to note that not all physical nodes are represented on this diagram. Indeed Database Servers and Application Servers could be duplicated for scalability and availability reasons. Moreover, security equipment like firewalls is not shown. The following are the identified hardware nodes. Front-end side: Supplier Client Application: Supplier client application of Open e-prior; Supplier Access point: the PEPPOL network access point used by the Supplier to submit documents. (for more information on PEPPOL please check the website: Business side: System Application Server: The whole e-prior System can run on a JBoss Application Server but clustering is possible. System Database Servers: the system's persistent data will be recorded in relational databases. The current version of Open e-prior uses HSQL DB embedded in JBoss. Back-Office side: Back-Office Servers: These are the Customer's Back Office Application Servers. 8. IMPLEMENTATION VIEW 8.1. Overview The following schema describes software layers of the system and their components. The next paragraphs will describe each element. The Sender and Receiver systems access the system via Web Services published on the Service Bus and BinaryFile Service components. They delegate the calls to Synchronous Services. If the requested service is submit document bundle, a limited validation is realized via the validation component and the Asynchronous Services component is called (asynchronously). This one does the validation (validation component), the routing (routing component) and persists the document in the application s database (DB Persistence component). The other services are synchronous and so are directly implemented by the Synchronous Services component that does some validation and performs the business logic. It also uses the DB Persistence component to access the database. Master Software Architecture Document Page 21 / 29

23 8.2. Layers Service Bus Layer This component represents the Web Services published on the Enterprise Service Bus. They interact with the Synchronous services for read services and asynchronous services for write services; BinaryFile Service component: this component represents the Web Service responsible for storing and retrieving Document Wrapper (binary files). It interacts with the Synchronous Services component. Synchronous services component: this component represents the business logic for the synchronous services. It uses Validation component to validate the different incoming requests and it uses the DB persistence component to access the database. It also performs limited validation and delegate the submit document bundle calls to the asynchronous services component; Validation component: this component is responsible for the incoming request validation. Master Software Architecture Document Page 22 / 29

24 Asynchronous Business Layer Asynchronous services component: this component represents the write services business logic. It uses the validation, routing and DB persistence components to validate, route and store the documents; Validation component: this component is responsible for the incoming document validation; Routing component: this component is responsible for the routing of messages to the right receiver. It also uses the DB persistence component to retrieve routing information Data Access Layer This layer is running on both Service Bus Layer and the Asynchronous Business Layer for the DB persistence component. It is in fact a logical layer deployed on two separated servers. DB Persistence component: this component is responsible for database information retrieval or storage. It is used to retrieve document bundle, store them, to find routing information, to store and retrieve document wrapper (binary files). That component uses two distinct schemas: one to store the business documents (please see the diagram in chapter 9.1) and the second is only used to store large binaries; 9. DATA VIEW 9.1. Data Model The following diagram shows a high level abstraction of the data classes which must be implemented by the system: The Supplier entity represents the companies which will send messages or on behalf of which messages will be sent. The User entity represents the users who will connect to the Master Software Architecture Document Page 23 / 29

25 system to send the messages. If a Supplier works directly with the system, a User entry will also be needed for it. If a Supplier uses a third-party to send documents (a factoring company for the invoices, for example), then it will be linked to the User entry which identifies the third-party. The third-party itself will not need a Supplier entry. The link between a Supplier and a User is implemented by the SupplierAgreement entity. A Supplier can be linked to more than one User, for example a factoring company for its invoices and its own User for other documents. The BackEnd entity represents an application implementing a Functionality for an Internal Department. Its username is the system user name which the back-end will use to call the services. The Functionality entity represents the possible functionalities of a BackEnd: invoicing, ordering, archiving, requesting An InternalDepartment should have one BackEnd per Functionality. A SupplierAgreement and an InternalDepartment sign an InterchangeAgreement, whereby they agree to exchange documents according to a given Profile. The Profile entity is inspired by the NES profiles (e.g.: Basic Invoice, Invoice with Dispute, Procurement Cycle). A Profile is linked to an InterchangeAgreement. The ObjectType entity represents all the types of objects supported by the system (Initial Request, Offer or Extension Request, Order, Invoice, Dispute, Credit Note, Attachment, Error, etc). The Object entity represents a specific object of a given type, which will be handled via the sending of Messages. Optionally, it can reference a message from another object (eg. an Initial Request object can reference another Initial Request object in the case of a cascade, an Invoice object can reference an Signed Order message from an Order object, a Credit Note object can reference an Invoice message from an Invoice object ) or even a specific message in another object (eg. an Attachment can reference any message of any object ). An ObjectType also relates to one and only one Functionality (for ex. the object types "Invoice", "Dispute" and "Credit Note" belong to the "invoicing" functionality, the object types "Initial Request" and "Extension Request" belong to the "request" functionality ). The Support entity indicates which ObjectTypes are supported by a given Profile. For example, the 'Invoice with Dispute' Profile supports the Invoice, Dispute, Credit Note and Attachment object types. The Message entity represents the messages which will transit through e-prior. The inoutfl indicates whether it is an inbound message (from a Supplier system) or an outbound message (from a back-end). If it is an inbound message, then the sender is identified by a SupplierAgreement id. For an outbound message, the destination is identified by the Supplier id. In other words, a message can be sent by a User on behalf of the Supplier, but a reply will always be sent to the Supplier. The Message entity makes up the storage of the messages which will be subject to registration, filing and archiving. It contains a rawcontents attribute which will receive the payload of the XML, and a canonicalcontents attribute which will receive, when applicable, the canonical version of the XML. It also contains a humanreadablecontents attribute, which will contain the result of the transfomartion of the XML to a format readable by a user. A Message can reference another Message (via the messageid), even a Message from another Object. Its phraseid will point to a phrase which will serve as title for the message. Its binaryid will point, if applicable, to binary which was removed from the message for size reason. Its documentid will be the id found inside the payload. Master Software Architecture Document Page 24 / 29

26 The Binary entity will receive the binary data which can be inside a message. To avoid size problems, the binary data is removed from the message and placed here. The message then just contains a pointer to the Binary element. A Message will have a type, implemented by the MessageType entity. Examples of message types are Invoice, Dispute, Credit Note, Signed Order, Offer A MessageType is linked to an ObjectType. For example, the Dispute and Credit Note message types belong to the Dispute object type; the Order, Order Confirmation and Signed Order message types belong to the Order object type. A MessageType will also have a state, which corresponds to the state in which the related object will be when such a message is sent for the object. The states are implemented by the State entity. For example, the state of the MessageType "Credit Note" will be "Credit Note Received". This means that when a Credit Note is received for a specific Dispute object, the Dispute object will receive the state "Credit Note Received". The State Machines below illustrate the different states of the different objects (as well as the links between objects and attachments). The Event entity records every event occurring in the system. When the event concerns a Message, it holds a pointer to the Message. It implements the log file. The Event Level provides a list of levels for the events: debug, info, warning, error. The developers will associate an event level to each action performed by the system. If the level is at least the current level of the system, then the action will be recorded as an event. The current level is determined by the LogLevel entity, which associates an event level to a specific context: a specific InterchangeAgreeement using a specific EndPoint. The Service entity implements the services of the system. An EndPoint is a specific version of a service. It corresponds to a WSDL. The Statement entity contains sentences, error messages or any string used for the communication between the system and a Supplier. The Phrase and Translation entities are linked to all entities containing an attribute whose value can be displayed on screen, and so contributes to the multilingual functionality, together with the Language entity State Machines Introduction Each object of the system (including the Bundles) will have its own state machine. A state machine is always initiated by a Sender. It starts with a specific message (e.g. "The Sender sends a Bundle"). Only a message will be capable of passing an object from a state to the next one. A state machine will never represent the workflow of the object in the receiver back-office. While the object is in the receiver application, the state of the object remains the same in e-trustex, until the back-office notifies (via an outbound message) that the workflow is complete. The following sections illustrate the state machines which have to be supported by e-trustex. Note: Once a state machine instance is started, each state transition is performed by the transmission of a message. Each message is subject to logging and monitoring. Master Software Architecture Document Page 25 / 29

27 Legend Entry point Outgoing Message Incoming Message Intermediary State Final State Generic State Machines Generic State Machine for an Incoming Object Most of the incoming objects (documents received by the back-office) will have the following state machine: Document Received Application Response Application Response Processed Rejected Generic State Machine for an Outgoing Object Most of the outgoing objects (documents sent by the back-office) will have the following state machine: Document Sent Master Software Architecture Document Page 26 / 29

28 Specific State Machines for Bundle 10. SIZE AND PERFORMANCE Size restrictions, not on the application or its components themselves, but on the data that is being processed by e-trustex have an impact on the architecture and configuration of the system. Particular decisions can be taken depending on the specific infrastructure chosen for deployment. An important architectural decision that influences the performance of e-trustex includes the decoupling of the solution into a synchronous and an asynchronous mode of communication. The synchronous mode of communication is used by services in which the business response is immediate and which requires limited processing. The asynchronous mode however is aimed at services whose processing involves a series of long-running business actions which often require workflow steps performed by the back-office. In this mode, an incoming message will be stored in a queue where it waits to be picked up for further processing. If required, the number of asynchronous processing threads can be modified both in the number of total threads running and in the number of threads for a specific service (e.g. Submit Bundle). 11. QUALITY For a list of non-functional requirements or constraints, please refer to 3 Architectural Goals and Constraints Extensibility As indicated in Architecturally Significant Design Packages and 8 Implementation View, e-trustex is designed in a layered fashion and consists of multiple interconnected modules. This modular design facilitates upgrades by replacing existing modules and extensions by adding additional modules Reliability The reliability of e-trustex is enhanced through the decoupling of each architectural layer by JMS queues. A store and forward mechanism and automatic retry policy ensures that parts of the system can continue functioning without losing data when an issue occurs in a specific component. Master Software Architecture Document Page 27 / 29

29 11.3. Portability As well as being extensible, e-trustex is carefully designed in such a way that it is independent of the specific external system that it is serving. The use of generic HTTP SOAP web services leaves the different layers unaffected when an additional external system needs to be supported by e-trustex. Master Software Architecture Document Page 28 / 29

European Commission. e-trustex Software Architecture Document

European Commission. e-trustex Software Architecture Document EUROPEAN COMMISSION DIRECTORATE-GENERAL INFORMATICS Information systems Directorate European Commission e-trustex Software Architecture Document Date: 03/11/2014 Version: 2.1 Authors: Sandro D'Orazio,

More information

European Commission. Open e-prior Software Architecture Document. Public: Reference Number:

European Commission. Open e-prior Software Architecture Document. Public: Reference Number: EUROPEAN COMMISSION DIRECTORATE-GENERAL INFORMATICS Information systems Directorate European Commission Open e-prior Software Architecture Document Date: 13/12/2010 Version: 2.01 Authors: Revised by: Approved

More information

European Commission Open e-prior PEPPOL Access Point Configuration and Testing

European Commission Open e-prior PEPPOL Access Point Configuration and Testing EUROPEAN COMMISSION DIRECTORATE-GENERAL INFORMATICS Information systems Directorate European Commission Open e-prior Date: 17/05/2011 Version: 1.0 Authors: Marco Fichera Revised by: Didier Thunus Approved

More information

WEB-202: Building End-to-end Security for XML Web Services Applied Techniques, Patterns and Best Practices

WEB-202: Building End-to-end Security for XML Web Services Applied Techniques, Patterns and Best Practices WEB-202: Building End-to-end Security for XML Web Services Applied Techniques, Patterns and Best Practices Chris Steel, Ramesh Nagappan, Ray Lai www.coresecuritypatterns.com February 16, 2005 15:25 16:35

More information

User Guide CIPA Administration Console Open e-trustex

User Guide CIPA Administration Console Open e-trustex EUROPEAN COMMISSION DIRECTORATE-GENERAL INFORMATICS User Guide CIPA Administration Console Open e-trustex Date: 17/03/2017 Version: 1.11 Authors: Revised by: Gianluca VENTRE Anamaria BATRINU Bruno POSSEMIERS

More information

Domibus 3 Software Architecture Document

Domibus 3 Software Architecture Document EUROPEAN COMMISSION DIGIT Connecting Europe Facility Domibus 3 Software Architecture Document Date: 10/10/2016 Document Approver(s): Approver Name Adrien FERIAL Role IT Project officer Document Reviewers:

More information

User guide User Guide CIPA Administration Console

User guide User Guide CIPA Administration Console EUROPEAN COMMISSION DIRECTORATE-GENERAL INFORMATICS User guide User Guide CIPA Administration Console Date: 19/06/2015 Version: 1.00 Authors: Gianluca VENTRE Revised by: Anamaria BATRINU, Maarten DANIELS

More information

Sparta Systems Stratas Solution

Sparta Systems Stratas Solution Systems Solution 21 CFR Part 11 and Annex 11 Assessment October 2017 Systems Solution Introduction The purpose of this document is to outline the roles and responsibilities for compliance with the FDA

More information

Sparta Systems TrackWise Digital Solution

Sparta Systems TrackWise Digital Solution Systems TrackWise Digital Solution 21 CFR Part 11 and Annex 11 Assessment February 2018 Systems TrackWise Digital Solution Introduction The purpose of this document is to outline the roles and responsibilities

More information

Enterprise SOA Experience Workshop. Module 8: Operating an enterprise SOA Landscape

Enterprise SOA Experience Workshop. Module 8: Operating an enterprise SOA Landscape Enterprise SOA Experience Workshop Module 8: Operating an enterprise SOA Landscape Agenda 1. Authentication and Authorization 2. Web Services and Security 3. Web Services and Change Management 4. Summary

More information

Sentinet for BizTalk Server SENTINET

Sentinet for BizTalk Server SENTINET Sentinet for BizTalk Server SENTINET Sentinet for BizTalk Server 1 Contents Introduction... 2 Sentinet Benefits... 3 SOA and API Repository... 4 Security... 4 Mediation and Virtualization... 5 Authentication

More information

Sparta Systems TrackWise Solution

Sparta Systems TrackWise Solution Systems Solution 21 CFR Part 11 and Annex 11 Assessment October 2017 Systems Solution Introduction The purpose of this document is to outline the roles and responsibilities for compliance with the FDA

More information

PCI DSS Compliance. White Paper Parallels Remote Application Server

PCI DSS Compliance. White Paper Parallels Remote Application Server PCI DSS Compliance White Paper Parallels Remote Application Server Table of Contents Introduction... 3 What Is PCI DSS?... 3 Why Businesses Need to Be PCI DSS Compliant... 3 What Is Parallels RAS?... 3

More information

Technical Overview. Version March 2018 Author: Vittorio Bertola

Technical Overview. Version March 2018 Author: Vittorio Bertola Technical Overview Version 1.2.3 26 March 2018 Author: Vittorio Bertola vittorio.bertola@open-xchange.com This document is copyrighted by its authors and is released under a CC-BY-ND-3.0 license, which

More information

SAP Pharma Network Onboarding Guide

SAP Pharma Network Onboarding Guide Onboarding Guide - Final Review SAP Pharma Network Document Version: 0.18 2016-08-10 Typographic Conventions Type Style Example Description Words or characters quoted from the screen. These include field

More information

Information Security Policy

Information Security Policy Information Security Policy Information Security is a top priority for Ardoq, and we also rely on the security policies and follow the best practices set forth by AWS. Procedures will continuously be updated

More information

AN IPSWITCH WHITEPAPER. The Definitive Guide to Secure FTP

AN IPSWITCH WHITEPAPER. The Definitive Guide to Secure FTP AN IPSWITCH WHITEPAPER The Definitive Guide to Secure FTP The Importance of File Transfer Are you concerned with the security of file transfer processes in your company? According to a survey of IT pros

More information

Sentinet for BizTalk Server VERSION 2.2

Sentinet for BizTalk Server VERSION 2.2 for BizTalk Server VERSION 2.2 for BizTalk Server 1 Contents Introduction... 2 SOA Repository... 2 Security... 3 Mediation and Virtualization... 3 Authentication and Authorization... 4 Monitoring, Recording

More information

Business Requirements Specification for the. Nomination and Matching Procedures. In Gas Transmission Systems (NOM BRS)

Business Requirements Specification for the. Nomination and Matching Procedures. In Gas Transmission Systems (NOM BRS) 27 May 2015 Rev14 1 2 3 4 for the In Gas Transmission Systems (NOM BRS) 5 6 Version 0 Revision 14 2015-05-27 7 8 ENTSOG AISBL; Av. de Cortenbergh 100, 1000-Brussels; Tel: +32 2 894 5100; Fax: +32 2 894

More information

W H I T E P A P E R : O P E N. V P N C L O U D. Implementing A Secure OpenVPN Cloud

W H I T E P A P E R : O P E N. V P N C L O U D. Implementing A Secure OpenVPN Cloud W H I T E P A P E R : O P E N. V P N C L O U D Implementing A Secure OpenVPN Cloud Platform White Paper: OpenVPN Cloud Platform Implementing OpenVPN Cloud Platform Content Introduction... 3 The Problems...

More information

Network Security and Cryptography. 2 September Marking Scheme

Network Security and Cryptography. 2 September Marking Scheme Network Security and Cryptography 2 September 2015 Marking Scheme This marking scheme has been prepared as a guide only to markers. This is not a set of model answers, or the exclusive answers to the questions,

More information

Sentinet for Microsoft Azure SENTINET

Sentinet for Microsoft Azure SENTINET Sentinet for Microsoft Azure SENTINET Sentinet for Microsoft Azure 1 Contents Introduction... 2 Customer Benefits... 2 Deployment Topologies... 3 Cloud Deployment Model... 3 Hybrid Deployment Model...

More information

Proof of concept AS4. Version 1 Revision ITC-KG AS4 Proof of Concept 16 January 2014 Draft INT

Proof of concept AS4. Version 1 Revision ITC-KG AS4 Proof of Concept 16 January 2014 Draft INT ITC-KG AS4 Proof of Concept 16 January 2014 Draft Proof of concept AS4 Version 1 Revision 02 2014-01-08 ENTSOG AISBL; Av. de Cortenbergh 100, 1000-Brussels; Tel: +32 2 894 5100; Fax: +32 2 894 5101; info@entsog.eu,

More information

Oracle Communications Services Gatekeeper

Oracle Communications Services Gatekeeper Oracle Communications Services Gatekeeper Security Guide Release 5.1 E36134-01 June 2013 Oracle Communications Services Gatekeeper Security Guide, Release 5.1 E36134-01 Copyright 2011, 2013, Oracle and/or

More information

Overview. SSL Cryptography Overview CHAPTER 1

Overview. SSL Cryptography Overview CHAPTER 1 CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet. SSL ensures the secure transmission of data between a client and a server through

More information

University of Sunderland Business Assurance PCI Security Policy

University of Sunderland Business Assurance PCI Security Policy University of Sunderland Business Assurance PCI Security Policy Document Classification: Public Policy Reference Central Register IG008 Policy Reference Faculty / Service IG 008 Policy Owner Interim Director

More information

Grid Security Policy

Grid Security Policy CERN-EDMS-428008 Version 5.7a Page 1 of 9 Joint Security Policy Group Grid Security Policy Date: 10 October 2007 Version: 5.7a Identifier: https://edms.cern.ch/document/428008 Status: Released Author:

More information

IDENTITY ASSURANCE PRINCIPLES

IDENTITY ASSURANCE PRINCIPLES IDENTITY ASSURANCE PRINCIPLES PRIVACY AND CONSUMER ADVISORY GROUP (PCAG) V3.1 17 th July 2014 CONTENTS 1. Introduction 3 2. The Context of the Principles 4 3. Definitions 6 4. The Nine Identity Assurance

More information

Direct, DirectTrust, and FHIR: A Value Proposition

Direct, DirectTrust, and FHIR: A Value Proposition Direct, DirectTrust, and FHIR: A Value Proposition August 10, 2017 Authors: Grahame Grieve, HL7 Product Director for FHIR; David Kibbe, Luis Maas, Greg Meyer, and Bruce Schreiber, members of the DirectTrust

More information

Best Practices in Securing Your Customer Data in Salesforce, Force.com & Chatter

Best Practices in Securing Your Customer Data in Salesforce, Force.com & Chatter White Paper Best Practices in Securing Your Customer Data in Salesforce, Force.com & Chatter Overcoming Security, Privacy & Compliance Concerns 333 W. San Carlos Street San Jose, CA 95110 Table of Contents

More information

OpenIAM Identity and Access Manager Technical Architecture Overview

OpenIAM Identity and Access Manager Technical Architecture Overview OpenIAM Identity and Access Manager Technical Architecture Overview Overview... 3 Architecture... 3 Common Use Case Description... 3 Identity and Access Middleware... 5 Enterprise Service Bus (ESB)...

More information

Network Security Policy

Network Security Policy Network Security Policy Date: January 2016 Policy Title Network Security Policy Policy Number: POL 030 Version 3.0 Policy Sponsor Policy Owner Committee Director of Business Support Head of ICU / ICT Business

More information

Adobe Sign and 21 CFR Part 11

Adobe Sign and 21 CFR Part 11 Adobe Sign and 21 CFR Part 11 Today, organizations of all sizes are transforming manual paper-based processes into end-to-end digital experiences speeding signature processes by 500% with legal, trusted

More information

Sentinet for Windows Azure VERSION 2.2

Sentinet for Windows Azure VERSION 2.2 Sentinet for Windows Azure VERSION 2.2 Sentinet for Windows Azure 1 Contents Introduction... 2 Customer Benefits... 2 Deployment Topologies... 3 Isolated Deployment Model... 3 Collocated Deployment Model...

More information

Oracle Payment Interface Token Proxy Service Security Guide Release 6.1 E November 2017

Oracle Payment Interface Token Proxy Service Security Guide Release 6.1 E November 2017 Oracle Payment Interface Token Proxy Service Security Guide Release 6.1 E87635-01 November 2017 Copyright 2017, Oracle and/or its affiliates. All rights reserved. This software and related documentation

More information

COMPLIANCE. associates VALIDATOR WHITE PAPER. Addressing 21 cfr Part 11

COMPLIANCE. associates VALIDATOR WHITE PAPER. Addressing 21 cfr Part 11 VALIDATOR WHITE PAPER Addressing 21 cfr Part 11 Compliance Associates 1 1 INTRODUCTION 21 CFR Part 11 has been become a very large concern in the pharmaceutical industry as of late due to pressure from

More information

Overview SENTINET 3.1

Overview SENTINET 3.1 Overview SENTINET 3.1 Overview 1 Contents Introduction... 2 Customer Benefits... 3 Development and Test... 3 Production and Operations... 4 Architecture... 5 Technology Stack... 7 Features Summary... 7

More information

Maryland Extensible Markup Language Test Plan and Certification for Competitive Gas Supply Version 1.0 July 2011

Maryland Extensible Markup Language Test Plan and Certification for Competitive Gas Supply Version 1.0 July 2011 Maryland Extensible Markup Language Test Plan and Certification for Competitive Gas Supply Version 1.0 July 2011 Page 1 of 26 Table of Contents 1. INTRODUCTION... 3 1.1 VERSION CONTROL... 3 1.2 PURPOSE

More information

Security and Architecture SUZANNE GRAHAM

Security and Architecture SUZANNE GRAHAM Security and Architecture SUZANNE GRAHAM Why What How When Why Information Security Information Assurance has been more involved with assessing the overall risk of an organisation's technology and working

More information

Inland Revenue. Build Pack. Identity and Access Services. Date: 04/09/2017 Version: 1.5 IN CONFIDENCE

Inland Revenue. Build Pack. Identity and Access Services. Date: 04/09/2017 Version: 1.5 IN CONFIDENCE Inland Revenue Build Pack Identity and Access Services Date: 04/09/2017 Version: 1.5 IN CONFIDENCE About this Document This document is intended to provide Service Providers with the technical detail required

More information

ISSUE N 1 MAJOR MODIFICATIONS. Version Changes Related Release No. PREVIOUS VERSIONS HISTORY. Version Date History Related Release No.

ISSUE N 1 MAJOR MODIFICATIONS. Version Changes Related Release No. PREVIOUS VERSIONS HISTORY. Version Date History Related Release No. ISSUE N 1 MAJOR MODIFICATIONS Version Changes Related Release No. 01 First issue. 2.8.0 PREVIOUS VERSIONS HISTORY Version Date History Related Release No. N/A N/A N/A N/A APPROVAL TABLE Signatures below

More information

T2S Connectivity Guide

T2S Connectivity Guide T2S Connectivity Guide Page 1 of 23 T2S Connectivity Guide Author 4CB Version 1.0 Date 29/11/2013 Status Classification Classified until Final Public N/A T2S Connectivity Guide Page 2 of 23 TABLE OF CONTENTS

More information

External Supplier Control Obligations. Cyber Security

External Supplier Control Obligations. Cyber Security External Supplier Control Obligations Cyber Security Control Title Control Description Why this is important 1. Cyber Security Governance The Supplier must have cyber risk governance processes in place

More information

21 CFR Part 11 Module Design

21 CFR Part 11 Module Design 21 CFR Part 11 Module Design email: info@totallab.com web: www.totallab.com TotalLab Ltd Keel House Garth Heads Newcastle upon Tyne NE1 2JE UK Trademarks The following are either registered trademarks

More information

The Honest Advantage

The Honest Advantage The Honest Advantage READY TO CHALLENGE THE STATUS QUO GSA Security Policy and PCI Guidelines The GreenStar Alliance 2017 2017 GreenStar Alliance All Rights Reserved Table of Contents Table of Contents

More information

SOA-20: The Role of Policy Enforcement in SOA Management

SOA-20: The Role of Policy Enforcement in SOA Management SOA-20: The Role of Policy Enforcement in SOA Management Phil Walston VP Product Management Layer 7 Technologies Overview Discuss policy in SOA, the role of Policy Enforcement Points and where this fits

More information

Security Digital Certificate Manager

Security Digital Certificate Manager System i Security Digital Certificate Manager Version 6 Release 1 System i Security Digital Certificate Manager Version 6 Release 1 Note Before using this information and the product it supports, be sure

More information

simply secure IncaMail Information security Version: V01.10 Date: 16. March 2018 Post CH Ltd 1 / 12

simply secure IncaMail Information security Version: V01.10 Date: 16. March 2018 Post CH Ltd 1 / 12 simply secure IncaMail Information security Version: V01.10 Date: 16. March 2018 Post CH Ltd 1 / 12 Contents 1 Introduction... 3 2 Basic principles... 3 3 Connection types... 4 3.1 Mail Gateway Integration

More information

AuthAnvil for Retail IT. Exploring how AuthAnvil helps to reach compliance objectives

AuthAnvil for Retail IT. Exploring how AuthAnvil helps to reach compliance objectives AuthAnvil for Retail IT Exploring how AuthAnvil helps to reach compliance objectives AuthAnvil for Retail IT Exploring how AuthAnvil helps to reach compliance objectives As companies extend their online

More information

T2/T2S CONSOLIDATION USER REQUIREMENTS DOCUMENT SHARED SERVICES (SHRD) FOR

T2/T2S CONSOLIDATION USER REQUIREMENTS DOCUMENT SHARED SERVICES (SHRD) FOR T2/T2S CONSOLIDATION USER REQUIREMENTS DOCUMENT FOR SHARED SERVICES (SHRD) Version: 1.0 Status: FINAL Date: 06/12/2017 Contents 1 EUROSYSTEM SINGLE MARKET INFRASTRUCTURE GATEWAY (ESMIG)... 6 1.1 Overview...

More information

OpenLAB ELN Supporting 21 CFR Part 11 Compliance

OpenLAB ELN Supporting 21 CFR Part 11 Compliance OpenLAB ELN Supporting 21 CFR Part 11 Compliance White Paper Overview Part 11 in Title 21 of the Code of Federal Regulations includes the US Federal guidelines for storing and protecting electronic records

More information

eidas Interoperability Architecture Version November 2015

eidas Interoperability Architecture Version November 2015 eidas Interoperability Architecture Version 1.00 6. November 2015 1 Introduction This document specifies the interoperability components of the eidas-network, i.e. the components necessary to achieve interoperability

More information

The Common Controls Framework BY ADOBE

The Common Controls Framework BY ADOBE The Controls Framework BY ADOBE The following table contains the baseline security subset of control activities (derived from the Controls Framework by Adobe) that apply to Adobe s enterprise offerings.

More information

INFORMATION ASSURANCE DIRECTORATE

INFORMATION ASSURANCE DIRECTORATE National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE CGS Signature Repository A Signature Repository provides a group of signatures for use by network security tools such

More information

Requirements for ARRL Logbook of the World Trusted Partners

Requirements for ARRL Logbook of the World Trusted Partners Requirements for ARRL Logbook of the World Trusted Partners The purpose of this document is to resolve some security issues concerning the interaction of third-party web sites with LoTW. Some sites have

More information

LOGGING AND AUDIT TRAILS

LOGGING AND AUDIT TRAILS LOGGING AND AUDIT TRAILS Policy LOGGING AND AUDIT TRAILS - POLICY TMP-POL-LAT V3.00-EN, 26/06/2009 TABLE OF CONTENTS 1 INTRODUCTION... 3 1.1 Document Purpose... 3 1.2 Target Audience...3 1.3 Business Context...4

More information

F5 BIG-IQ Centralized Management: Local Traffic & Network. Version 5.2

F5 BIG-IQ Centralized Management: Local Traffic & Network. Version 5.2 F5 BIG-IQ Centralized Management: Local Traffic & Network Version 5.2 Table of Contents Table of Contents BIG-IQ Local Traffic & Network: Overview... 5 What is Local Traffic & Network?... 5 Understanding

More information

Threat Modeling. Bart De Win Secure Application Development Course, Credits to

Threat Modeling. Bart De Win Secure Application Development Course, Credits to Threat Modeling Bart De Win bart.dewin@ascure.com Secure Application Development Course, 2009 Credits to Frank Piessens (KUL) for the slides 2 1 Overview Introduction Key Concepts Threats, Vulnerabilities,

More information

Two-Factor Authentication over Mobile: Simplifying Security and Authentication

Two-Factor Authentication over Mobile: Simplifying Security and Authentication SAP Thought Leadership Paper SAP Digital Interconnect Two-Factor Authentication over Mobile: Simplifying Security and Authentication Controlling Fraud and Validating End Users Easily and Cost-Effectively

More information

RSA Solution Brief. The RSA Solution for VMware. Key Manager RSA. RSA Solution Brief

RSA Solution Brief. The RSA Solution for VMware. Key Manager RSA. RSA Solution Brief RSA Solution Brief The RSA Solution for VMware View: Managing Securing the the Lifecycle Virtual of Desktop Encryption Environment Keys with RSA Key Manager RSA Solution Brief 1 According to the Open Security

More information

IBM Sterling B2B Services File Transfer Service

IBM Sterling B2B Services File Transfer Service Service Description IBM Sterling B2B Services File Transfer Service This Service Description describes the Cloud Service IBM provides to Client. Client means the company and its authorized users and recipients

More information

Canadian Access Federation: Trust Assertion Document (TAD)

Canadian Access Federation: Trust Assertion Document (TAD) Participant Name: CARLETON UNIVERSITY Canadian Access Federation: Trust Assertion Document (TAD) 1. Purpose A fundamental requirement of Participants in the Canadian Access Federation is that they assert

More information

Application Note. Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder )

Application Note. Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder ) Application Note Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder ) This document describes how to configure McAfee Firewall Enterprise to provide

More information

Technical Brief. A Checklist for Every API Call. Managing the Complete API Lifecycle

Technical Brief. A Checklist for Every API Call. Managing the Complete API Lifecycle Technical Brief A Checklist for Table of Contents Introduction: The API Lifecycle 2 3 Security professionals API developers Operations engineers API product or business owners Apigee Edge 7 A Checklist

More information

Oracle Fusion Middleware

Oracle Fusion Middleware Oracle Fusion Middleware Administering Web Services 12c (12.1.2) E28131-01 June 2013 Documentation for developers and administrators that describes how to administer Web services. Oracle Fusion Middleware

More information

Ellipse Web Services Overview

Ellipse Web Services Overview Ellipse Web Services Overview Ellipse Web Services Overview Contents Ellipse Web Services Overview 2 Commercial In Confidence 3 Introduction 4 Purpose 4 Scope 4 References 4 Definitions 4 Background 5

More information

Overview and Benefits of SEEBURGER AS2 Spokes. Trading Partner Integration Using SEEBURGER'S BIS:AS2 Spoke

Overview and Benefits of SEEBURGER AS2 Spokes. Trading Partner Integration Using SEEBURGER'S BIS:AS2 Spoke Overview and Benefits of SEEBURGER AS2 Spokes Trading Partner Integration Using SEEBURGER'S BIS:AS2 Spoke Technical Documentation Contents 1 CLASSIC EDI AND ITS COST PROBLEM 2 1.1 VAN (VALUE ADDED NETWORK)...

More information

SOFTWARE ARCHITECTURE & DESIGN INTRODUCTION

SOFTWARE ARCHITECTURE & DESIGN INTRODUCTION SOFTWARE ARCHITECTURE & DESIGN INTRODUCTION http://www.tutorialspoint.com/software_architecture_design/introduction.htm Copyright tutorialspoint.com The architecture of a system describes its major components,

More information

Datapower is both a security appliance & can provide a firewall mechanism to get into Systems of Record

Datapower is both a security appliance & can provide a firewall mechanism to get into Systems of Record 1 2 3 Datapower is both a security appliance & can provide a firewall mechanism to get into Systems of Record 5 White boxes show the access points for different kinds of security. That s what we will

More information

InterCall Virtual Environments and Webcasting

InterCall Virtual Environments and Webcasting InterCall Virtual Environments and Webcasting Security, High Availability and Scalability Overview 1. Security 1.1. Policy and Procedures The InterCall VE ( Virtual Environments ) and Webcast Event IT

More information

DreamFactory Security Guide

DreamFactory Security Guide DreamFactory Security Guide This white paper is designed to provide security information about DreamFactory. The sections below discuss the inherently secure characteristics of the platform and the explicit

More information

Technical Overview of DirectAccess in Windows 7 and Windows Server 2008 R2. Microsoft Windows Family of Operating Systems

Technical Overview of DirectAccess in Windows 7 and Windows Server 2008 R2. Microsoft Windows Family of Operating Systems Technical Overview of in Windows 7 and Windows Server 2008 R2 Microsoft Windows Family of Operating Systems Published: January 2009 This document supports a preliminary release of a software product that

More information

Solution Overview Vectored Event Grid Architecture for Real-Time Intelligent Event Management

Solution Overview Vectored Event Grid Architecture for Real-Time Intelligent Event Management Solution Overview Vectored Event Grid Architecture for Real-Time Intelligent Event Management Copyright Nuvon, Inc. 2007, All Rights Reserved. Introduction The need to improve the quality and accessibility

More information

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data Kenna Platform Security A technical overview of the comprehensive security measures Kenna uses to protect your data V3.0, MAY 2017 Multiple Layers of Protection Overview Password Salted-Hash Thank you

More information

Canadian Access Federation: Trust Assertion Document (TAD)

Canadian Access Federation: Trust Assertion Document (TAD) Purpose A fundamental requirement of Participants in the Canadian Access Federation is that they assert authoritative and accurate identity attributes to resources being accessed, and that Participants

More information

Introduction to SURE

Introduction to SURE Introduction to SURE Contents 1. Introduction... 3 2. What is SURE?... 4 3. Aim and objectives of SURE... 4 4. Overview of the facility... 4 5. SURE operations and design... 5 5.1 Logging on and authentication...

More information

STATE OF MINNESOTA DEPARTMENT OF PUBLIC SAFETY

STATE OF MINNESOTA DEPARTMENT OF PUBLIC SAFETY STATE OF MINNESOTA DEPARTMENT OF PUBLIC SAFETY BUREAU OF CRIMINAL APPREHENSION Query Minnesota Motor Registration Information Service (QMV) Published On: Feb 09, 2012 Service Release Version#: 1.0 Prepared

More information

AN IPSWITCH WHITEPAPER. 7 Steps to Compliance with GDPR. How the General Data Protection Regulation Applies to External File Transfers

AN IPSWITCH WHITEPAPER. 7 Steps to Compliance with GDPR. How the General Data Protection Regulation Applies to External File Transfers AN IPSWITCH WHITEPAPER 7 Steps to Compliance with GDPR How the General Data Protection Regulation Applies to External File Transfers Introduction Stolen personal data drives a thriving black market for

More information

Network Security Essentials

Network Security Essentials Network Security Essentials Fifth Edition by William Stallings Chapter 4 Key Distribution and User Authentication No Singhalese, whether man or woman, would venture out of the house without a bunch of

More information

90% 191 Security Best Practices. Blades. 52 Regulatory Requirements. Compliance Report PCI DSS 2.0. related to this regulation

90% 191 Security Best Practices. Blades. 52 Regulatory Requirements. Compliance Report PCI DSS 2.0. related to this regulation Compliance Report PCI DSS 2.0 Generated by Check Point Compliance Blade, on April 16, 2018 15:41 PM O verview 1 90% Compliance About PCI DSS 2.0 PCI-DSS is a legal obligation mandated not by government

More information

Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud

Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud Introduction The Criminal Justice Information Security (CJIS) Policy is a publically accessible document that contains

More information

ebxml Transport Routing and Packaging Overview and Requirements

ebxml Transport Routing and Packaging Overview and Requirements ebxml Transport Routing and Packaging Overview and Requirements This paper provides an overview of the Transport Routing and Packaging It describes: an overview and description of the scope of the group's

More information

Secure Messaging Mobile App Privacy Policy. Privacy Policy Highlights

Secure Messaging Mobile App Privacy Policy. Privacy Policy Highlights Secure Messaging Mobile App Privacy Policy Privacy Policy Highlights For ease of review, Everbridge provides these Privacy Policy highlights, which cover certain aspects of our Privacy Policy. Please review

More information

Hong Kong Access Federation (HKAF) Identity Management Practice Statement (IMPS)

Hong Kong Access Federation (HKAF) Identity Management Practice Statement (IMPS) Hong Kong Access Federation (HKAF) Identity Management Practice Statement (IMPS) This document (IMPS) facilitates an organization to provide relevant information to describe how it fulfils the normative

More information

SSL Certificates Certificate Policy (CP)

SSL Certificates Certificate Policy (CP) SSL Certificates Last Revision Date: February 26, 2015 Version 1.0 Revisions Version Date Description of changes Author s Name Draft 17 Jan 2011 Initial Release (Draft) Ivo Vitorino 1.0 26 Feb 2015 Full

More information

- Table of Contents -

- Table of Contents - - Table of Contents - 1 INTRODUCTION... 1 1.1 OBJECTIVES OF THIS GUIDE... 1 1.2 ORGANIZATION OF THIS GUIDE... 2 1.3 COMMON CRITERIA STANDARDS DOCUMENTS... 3 1.4 TERMS AND DEFINITIONS... 5 2 BASIC KNOWLEDGE

More information

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Target2-Securities Project Team TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Reference: T2S-07-0270 Date: 09 October 2007 Version: 0.1 Status: Draft Target2-Securities - User s TABLE OF CONTENTS

More information

GLOBUS TOOLKIT SECURITY

GLOBUS TOOLKIT SECURITY GLOBUS TOOLKIT SECURITY Plamen Alexandrov, ISI Masters Student Softwarepark Hagenberg, January 24, 2009 TABLE OF CONTENTS Introduction (3-5) Grid Security Infrastructure (6-15) Transport & Message-level

More information

BEAAquaLogic. Service Bus. Upgrade Guide

BEAAquaLogic. Service Bus. Upgrade Guide BEAAquaLogic Service Bus Upgrade Guide Version 2.5 Document Date: July 2006 Copyright Copyright 1995-2005 BEA Systems, Inc. All Rights Reserved. Restricted Rights Legend This software is protected by copyright,

More information

Credential Management in the Grid Security Infrastructure. GlobusWorld Security Workshop January 16, 2003

Credential Management in the Grid Security Infrastructure. GlobusWorld Security Workshop January 16, 2003 Credential Management in the Grid Security Infrastructure GlobusWorld Security Workshop January 16, 2003 Jim Basney jbasney@ncsa.uiuc.edu http://www.ncsa.uiuc.edu/~jbasney/ Credential Management Enrollment:

More information

Terms used, but not otherwise defined, in this Agreement shall have the same meaning as those terms in the HIPAA Privacy Rule.

Terms used, but not otherwise defined, in this Agreement shall have the same meaning as those terms in the HIPAA Privacy Rule. Medical Privacy Version 2018.03.26 Business Associate Agreement This Business Associate Agreement (the Agreement ) shall apply to the extent that the Lux Scientiae HIPAA Customer signee is a Covered Entity

More information

Exhibitor Software and 21 CFR Part 11

Exhibitor Software and 21 CFR Part 11 Exhibitor Software and 21 CFR Part 11 Subpart B Electronic Records 15 Columbia Drive Amherst, New Hampshire 03031-2334 No. 11.10 11.10(a) Controls for Closed Systems Validation of systems to ensure accuracy,

More information

Module Shared API and Core Services

Module Shared API and Core Services Secure Provisioning of Cloud Services based on SLA Management SPECS Project - Deliverable 1.4.1 Module Shared API and Core Services Version 1.1 15 February 2016 The activities reported in this deliverable

More information

BEAAquaLogic. Service Bus. MQ Transport User Guide

BEAAquaLogic. Service Bus. MQ Transport User Guide BEAAquaLogic Service Bus MQ Transport User Guide Version: 3.0 Revised: February 2008 Contents Introduction to the MQ Transport Messaging Patterns......................................................

More information

CPM. Quick Start Guide V2.4.0

CPM. Quick Start Guide V2.4.0 CPM Quick Start Guide V2.4.0 1 Content 1 Introduction... 3 Launching the instance... 3 CloudFormation... 3 CPM Server Instance Connectivity... 3 2 CPM Server Instance Configuration... 4 CPM Server Configuration...

More information

Registrar- web Version February Registrar- web. Release 3.1. Copyright 2015 DNS Belgium vzw

Registrar- web Version February Registrar- web. Release 3.1. Copyright 2015 DNS Belgium vzw Registrar- web Version 3.1 5 February 2016 Registrar- web Release 3.1 Copyright 2015 DNS Belgium vzw Table of contents 1 Registrar Web... 3 1.1 User Management... 3 1.1.1 Permissions... 3 1.1.2 Transactions...

More information

BEAAquaLogic. Service Bus. Native MQ Transport User Guide

BEAAquaLogic. Service Bus. Native MQ Transport User Guide BEAAquaLogic Service Bus Native MQ Transport User Guide Version: 2.6 RP1 Revised: November 2007 Contents Introduction to the Native MQ Transport Advantages of Using the Native MQ Transport................................

More information

Boundary control : Access Controls: An access control mechanism processes users request for resources in three steps: Identification:

Boundary control : Access Controls: An access control mechanism processes users request for resources in three steps: Identification: Application control : Boundary control : Access Controls: These controls restrict use of computer system resources to authorized users, limit the actions authorized users can taker with these resources,

More information

F O U N D A T I O N. OPC Unified Architecture. Specification. Part 1: Concepts. Version 1.00

F O U N D A T I O N. OPC Unified Architecture. Specification. Part 1: Concepts. Version 1.00 F O U N D A T I O N Unified Architecture Specification Part 1: Concepts Version 1.00 July 28, 2006 Unified Architecture, Part 1 iii Release 1.00 CONTENTS Page FOREWORD... vi AGREEMENT OF USE... vi 1 Scope...

More information

Approved 10/15/2015. IDEF Baseline Functional Requirements v1.0

Approved 10/15/2015. IDEF Baseline Functional Requirements v1.0 Approved 10/15/2015 IDEF Baseline Functional Requirements v1.0 IDESG.org IDENTITY ECOSYSTEM STEERING GROUP IDEF Baseline Functional Requirements v1.0 NOTES: (A) The Requirements language is presented in

More information