Trading Partner Profile Request Form
|
|
- Shanna Merritt
- 5 years ago
- Views:
Transcription
1 TP Contact Information Company Company Name Physical Address TIN # (if applicable) Business Contact Name Phone # Fax # Technical Contact Name Phone # Fax # Connectivity Information Trading Partner s Server Receive Host/IP Originating Host/IP Username* Password* Inbound Dir. Path** Outbound Dir. Path** Farmers Originating and Receiving Host and IP tfig-farmers.com IP: fig-farmers.com IP: Preferred Transport Method (circle one***) SFTP FTP FTPS Connect:Direct/NDM Pg 2 Pg 3 Pg 4 Pg 5 * Note: Please contact Farmers EDI Department at (913) or (323) if you are not comfortable placing Username or Password in these fields electronically. ** Note: Inbound Directory Path is the remote directory in which the trading partner expects to see inbound data from their perspective. Outbound Directory Path is the remote directory in which the trading partner places data for Farmers to retrieve. ***Note: Proceed to the page number listed below the protocol to fill in detail information related to it.
2 Transfer Method (SFTP Inbound to Partner) Responsibility: Farmers sends Data to Partner Partner retrieves data from Farmers Port*: Preferred Authentication*: Password Public Key Preferred Cipher*: Preferred MAC*: provide that as well. For Preferred Authentication, place an X where appropriate. Also please provide your PGP Public Key. For information on how to retrieve data from Farmers refer to attached File naming convention: Date and/or Time Stamp (circle one)? Y N Transfer Method (SFTP Outbound from Partner) Responsibility: Farmers retrieves Data from Partner Partner sends data to Farmers Port*: Preferred Authentication*: Password Public Key Preferred Cipher*: Preferred MAC*: * These fields are only necessary if Farmers connects to the partner to retrieve data. Please provide your SSH Host Key to provide that as well. For Preferred Authentication, place an X where appropriate. Also please provide your PGP Public Key. For information on how to send data to Farmers refer to attached
3 Transfer Method (FTP Inbound to Partner) Responsibility: Farmers sends Data to Partner Partner retrieves data from Farmers Partner Connection Type*: Active Passive Control Port (if other than 21)*: Data Port (if other than 20 or a range): provide that as well. For Partner Connection Type place an X in the appropriate field. Please provide your PGP Public Key. For information on how to retrieve data from Farmers refer to attached File naming convention: Date and/or Time Stamp (circle one)? Y N Transfer Method (FTP Outbound from Partner) Responsibility: Farmers retrieves Data from Partner Partner sends data to Farmers Partner Connection Type*: Active Passive Control Port (if other than 21)*: Data Port (if other than 20 or a range): provide that as well. For Partner Connection Type place an X in the appropriate field. Please provide your PGP Public Key. For information on how to send data to Farmers refer to attached
4 Transfer Method (FTP with SSL Inbound to Partner) Responsibility: Farmers sends Data to Partner Partner retrieves data from Farmers Partner Connection Type*: Active Passive Port*: Control Port (if other than 21)*: Data Port (if other than 20 or a range): Use Clear Control Channel (circle one): Y N Use Implicit SSL (circle one): Y N Encryption Strength: Strong Weak All provide that as well. For Partner Connection Type and Encryption Strength place an X in the appropriate field. Please provide your PGP Public Key. For information on how to retrieve data from Farmers refer to attached File naming convention: Date and/or Time Stamp (circle one)? Y N Transfer Method (FTP with SSL Outbound from Partner) Responsibility: Farmers retrieves Data from Partner Partner sends data to Farmers Partner Connection Type*: Active Passive Port*: Control Port (if other than 21)*: Data Port (if other than 20 or a range): Use Clear Control Channel (circle one): Y N Use Implicit SSL (circle one): Y N Encryption Strength: Strong Weak All provide that as well. For Partner Connection Type and Encryption Strength place an X in the appropriate field. Please provide your PGP Public Key. For information on how to send data from Farmers refer to attached
5 Transfer Method (Connect:Direct/NDM Inbound to Partner) NODE Name: NODE Port: Secure+ (circle one)*: Y N Preferred Cipher Suite*: SSL or TLS (circle one)*: SSL TLS Require Client Authentication (circle one)*: Y N File naming convention: * If using Secure+ it will be necessary to receive your public version of the Secure+ SSL Certificate. Farmers will provide their SSL Public Key as well. Other fields highlighted will also need completion. Also please provide your PGP Public Key. For information on how to retrieve data from Farmers refer to attached Date and/or Time Stamp (circle one)? Y N Transfer Method (Connect:Direct/NDM Outbound from Partner) NODE Name: NODE Port: Secure+ (circle one)*: Y N Preferred Cipher Suite*: SSL or TLS (circle one)*: SSL TLS Require Client Authentication (circle one)*: Y N File naming convention: * If using Secure+ it will be necessary to receive your public version of the Secure+ SSL Certificate. Farmers will provide their SSL Public Key as well. Other fields highlighted will also need completion. Also please provide your PGP Public Key. For information on how to retrieve data from Farmers refer to attached Date and/or Time Stamp (circle one)? Y N Farmers NODE Information NODE Name: FIG_CD_EXT NODE Port: 1364 Secure+ (circle one): Yes Preferred Cipher Suite: RSA_WITH_DES_CBC_SHA SSL or TLS (circle one): TLS Require Client Authentication (circle one): Yes File naming convention: FARMERS_<yyyymmdd>.pgp Farmers/Zurich uses Secure+ to ensure secure data transmission as well as payload (PGP). Farmers will supply the public version of their SSL key for Secure+ as well as their public PGP key.
6 AUTO Transactions File Names Transactions Version FIG TP Production Test X Farm266Mon.pgp T_Farm266Mon.pgp X Farm824.pgp T_Farm824.pgp X Farm811Mon.pgp T_ Farm811Mon.pgp 266 Proprietary FarmPro266.pgp T_FarmPro266.pgp 824 Proprietary FarmPro824.pgp T_FarmPro824.pgp *Note: All transactions require FA 997 acknowledgement.
7 MORTGAGE Transactions File Names Transactions Version FIG TP Production Test Renewals X Farm811Mon.pgp T_Farm811Mon.pgp X Farm820.pgp T_ Farm820.pgp Daily s X Farm811Mon.pgp T_Farm811Mon.pgp X Farm820.pgp T_Farm820.pgp Change Notifications X Farm266.pgp T_Farm266.pgp X Farm824.pgp T_Farm824.pgp X Farm811.pgp T_Farm811.pgp FA 997 All transactions Farm997.txt T_Farm997.txt ISA / GS Information TRADING PARTNERS Production Test ISA Qualifier ISA - ISA06 / ISA08 GS GS02 / GS03 FARMERS ISA/GS Mortgage Auto Lienholder ISA - ISA06 / ISA08 FIG FIG4039 FIG FIG4041 GS GS02 / GS
8 Information and Comments IMPORTANT PLEASE READ Please send your PGP Public Key (PGP Command Line version 9.0.6), public CA key, and/or SSH User Key as appropriate to Farmers Group EDI Coordinator: (Farmers Group EDI will send you our PGP Public Key and other keys in return as appropriate.) Encryption Notes: o When encrypting remember to be sure to use TEXT format for PGP. Transaction Notes: o Transaction Set Testing is required prior to going 'Live'. Allow 7 to 14 days of Lead-Time(calendar days) for testing.. This is a requirement for implementation based on any migration structures old or new. (Reminder: Additional delays can and may occur if Farmers has several Trading Partners converting within the same time frame. To allow for proper handling, successful testing and seamless implementation all information must exchange in a timely manner and constant communication is paramount to be successful in all categories). If you have any questions or need further assistance please contact: Auto Business Contact: Kim Treccariche West 119 th Street Olathe,KS PH: (913) FAX: (913) kim.treccariche@farmersinsurance.com Mortgage Business Contact: Renee Juhn West 119 th Street Olathe, KS PH: (913) FAX: (913) renee.juhn@farmersinsurance.com Technical Contact: Jeff Claycamp West 119 th Street Olathe, KS PH: (913) FAX: (913) jeff.claycamp@farmersinsurance.com
Electronic Data Interchange
Electronic Data Interchange FTPS Document Version: 1.1 Document Date: 12/6/2012 1 Introduction Logico exchanges electronic data with our trading partners using FTP Secure (FTPS) also known as FTP-SSL or
More information2. GETTING STARTED A. Secure File Transfer Protocol Procedures
OVERVIEW: A. IEHP utilizes the Secure File Transfer Protocol (SFTP) server to conduct all electronic data file transactions. Some of the benefits of using the SFTP are: 1. SFTP Is A Standard Protocol For
More informationHIPAA X 12 Transaction Standards
HIPAA X 12 Transaction Standards Abbreviated Companion Guide 837 Professional Health Care Claim Version 004010X098A1 Trading Partner Companion Guide Information and Considerations 837P 1. General Transaction
More informationHIPAA X 12 Transaction Standards
HIPAA X 12 Transaction Standards Abbreviated Companion Guide 837 Institutional Health Care Claim Version 004010X096A1 Trading Partner Companion Guide Information and Considerations 837I 1. General Transaction
More information2. GETTING STARTED SECURE FILE TRANSFER PROTOCOL (SFTP) PROCEDURES A. Secure File Transfer Protocol (SFTP) Procedures
A. Secure File Transfer Protocol (SFTP) Procedures Overview A. IEHP utilizes the Secure File Transfer Protocol (SFTP) server to conduct all electronic data file transactions. Some of the benefits to using
More informationHIPAA Transaction Health Care Claim Acknowledgement Standard Companion Guide (277CA, X214)
(underwritten by Dean Health Plan) HIPAA Transaction Health Care Claim Acknowledgement Standard Companion Guide (277CA, 005010X214) Instructions related to Transactions based on ASC X12 Implementation
More informationQuick Reference Guide. Online Courier: File Transfer Protocol (FTP) Signing On. Using FTP Pickup
Quick Reference Guide Online Courier: File Transfer Protocol (FTP) With SunTrust Online Courier, you can have reports and files delivered to you using a File Transfer Protocol (FTP) connection. There are
More informationCopyright and Legal Disclaimers
1 Copyright and Legal Disclaimers User Manual for DiConnect Enterprise R11. Document Release Date: June 25, 2014. Copyright 2014 by DiCentral Corporation. All rights reserved. This document and all content
More informationConfiguring SSL. SSL Overview CHAPTER
CHAPTER 8 Date: 4/23/09 This topic describes the steps required to configure your ACE (both the ACE module and the ACE appliance) as a virtual Secure Sockets Layer (SSL) server for SSL initiation or termination.
More informationConfiguring SSL. SSL Overview CHAPTER
7 CHAPTER This topic describes the steps required to configure your ACE appliance as a virtual Secure Sockets Layer (SSL) server for SSL initiation or termination. The topics included in this section are:
More informationChapter 32 Security in the Internet: IPSec, SSL/TLS, PGP,
Chapter 32 Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls 32.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 32.2 Figure 32.1 Common structure
More information837 Companion Guide. October PR.P.WM.1 3/17
837 Companion Guide Refers to the Implementation Guides based on the HIPAA Transaction ASC X12N. Standards for Electronic Data Interchange X12N/005010x222 Health Care Claim: Professional (837P) and ASC
More information1. Enable FTP download: To configure this feature the setting needs to be set to Yes.
Configuration Settings Explained: 1. Enable FTP download: To configure this feature the setting needs to be set to Yes. 2. Hosted by: Client decides who hosts the data (See step 2 Gather Necessary Client
More informationConfiguring SSL CHAPTER
7 CHAPTER This chapter describes the steps required to configure your ACE appliance as a virtual Secure Sockets Layer (SSL) server for SSL initiation or termination. The topics included in this section
More informationKB How to upload large files to a JTAC Case
KB23337 - How to upload large files to a JTAC Case SUMMARY: This article explains how to attach/upload files larger than 10GB to a JTAC case. It also and describes what files can be attached/uploaded to
More informationIndiana Health Coverage Programs
Indiana Health Coverage Programs Standard Companion Guide Transaction Information Communications Guide Companion Guide Version Number: 3.2 Revision Date: April 2017 April 2017 005010 3.2 1 Preface The
More informationAPA Web Services Access Request
APA Web Services Access Request For Gas Transmission Customers Version: v0.6 Date: 21 st April 2015 All rights reserved. No part of this document may be reproduced, stored in a retrieval system or transmitted
More informationFlorida Blue Health Plan
FLORIDA BLUE HEALTH PLAN COMPANION GUIDE Florida Blue Health Plan ANSI 276/277- Health Care Claim Status Inquiry and Response Standard Companion Guide Refers to the Technical Report Type Three () of 005010X212A1
More informationGeneral Document Exchange via ShareFile
General Document Exchange via ShareFile For security reasons, Ringgold uses the ShareFile portal for all documents exchange. We provide a choice of two different ways to submit files to Ringgold via ShareFile:
More informationHow Managed File Transfer Addresses HIPAA Requirements for ephi
How Managed File Transfer Addresses HIPAA Requirements for ephi INTRODUCTION These new requirements have effectively made traditional File Transfer Protocol (FTP) file sharing ill-advised, if not obsolete.
More informationHow do I configure my LPL client to use SSL for incoming mail?
How do I configure my LPL email client to use SSL for incoming mail? When you begin using your modern graphical email client program (e.g., Thunderbird, Mac Mail, Outlook), it will present a series of
More informationCOSC 301 Network Management. Lecture 15: SSL/TLS and HTTPS
COSC 301 Network Management Lecture 15: SSL/TLS and HTTPS Zhiyi Huang Computer Science, University of Otago COSC301 Lecture 15: SSL/TLS and HTTPS 1 Today s Focus WWW WWW How to secure web applications?
More informationEnabling Microsoft Outlook Calendar Notifications for Meetings Scheduled from the Cisco Unified MeetingPlace End-User Web Interface
Enabling Microsoft Outlook Calendar Notifications for Meetings Scheduled from the Cisco Unified MeetingPlace End-User Web Interface Release 7.1 Revised: March 5, 2013 1:53 pm This document describes the
More informationEDI Implementation Guide. Dayco Products, LLC. North America Aftermarket Division
EDI Implementation Guide Dayco Products, LLC. North America Aftermarket Division Version: 1.0 Publication: 11/19/2013 Table of Contents Contents Change Control... 3 Overview... 4 Standard and Version...
More informationBusinessMail X.400 Web interface MessageGate V3.0
Web interface MessageGate V3.0 User information (1) In the past you had to use special forms or Excel sheets for the administration of your partners and trading relations. You had to send this information
More informationFlorida Blue Health Plan
FLORIDA BLUE HEALTH PLAN COMPANION GUIDE Florida Blue Health Plan ANSI 270/271- Health Care Eligibility and Benefit Inquiry and Response Standard Companion Guide Refers to the Technical Report Type Three
More informationWorkspace ONE UEM Certificate Authentication for Cisco IPSec VPN. VMware Workspace ONE UEM 1810
Workspace ONE UEM Certificate Authentication for Cisco IPSec VPN VMware Workspace ONE UEM 1810 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/
More informationAN IPSWITCH WHITEPAPER. The Definitive Guide to Secure FTP
AN IPSWITCH WHITEPAPER The Definitive Guide to Secure FTP The Importance of File Transfer Are you concerned with the security of file transfer processes in your company? According to a survey of IT pros
More informationConfigure Settings and Customize Notifications on FindIT Network Probe
Configure Email Settings and Customize Email Notifications on FindIT Network Probe Objective Cisco FindIT Network Probe equips a network administrator with indispensable tools that help securely monitor
More informationCONTENTS. vii. Chapter 1 TCP/IP Overview 1. Chapter 2 Symmetric-Key Cryptography 33. Acknowledgements
CONTENTS Preface Acknowledgements xiii xvii Chapter 1 TCP/IP Overview 1 1.1 Some History 2 1.2 TCP/IP Protocol Architecture 4 1.2.1 Data-link Layer 4 1.2.2 Network Layer 5 1.2.2.1 Internet Protocol 5 IPv4
More informationAPA Automatic Nomination System. FTPS Access Request. For Gas Transmission Customers
APA Automatic Nomination System FTPS Access Request For Gas Transmission Customers Version: v0.7 Date: 29 th November 2012 All rights reserved. No part of this document may be reproduced, stored in a retrieval
More informationSterling Money Market Data Collection: Technical instructions for the transmission
Sterling Money Market Data Collection: Technical instructions for the transmission of form SMMD Version 5.0 February 2017 Contents page 1. Introduction...3 2. Transfer Process...4 2.1. Sending files...4
More informationSAMPLE Test for C : IBM Sterling B2B Integrator V5.2.6, Solution Implementation
SAMPLE Test for C8060-217: IBM Sterling B2B Integrator V5.2.6, Solution Implementation This sample test is designed to give the candidate an idea of the content and format of the questions that will be
More informationContents. SSL-Based Services: HTTPS and FTPS 2. Generating A Certificate 2. Creating A Self-Signed Certificate 3. Obtaining A Signed Certificate 4
Contents SSL-Based Services: HTTPS and FTPS 2 Generating A Certificate 2 Creating A Self-Signed Certificate 3 Obtaining A Signed Certificate 4 Enabling Secure Services 5 SSL/TLS Security Level 5 A Note
More informationGS1Trade Sync Data Pool - FTPS Service
GS1Trade Sync Data Pool - FTPS Service Connectivity Guide Version 1.0, Draft/Approved, 2018.08.05 GS1 Hungary Document Summary Document Item Document Name Current Value (Connectivity Guide) Document Date
More informationOverview February 19, 2016
Overview February 19, 2016 Introduction The E-Business Message exchange (EBMX) is a Business to Business (B2B) gateway used by FCA to electronically communicate with its trading partners. The focus of
More informationSETUP FOR OUTLOOK (Updated October, 2018)
EMAIL SETUP FOR OUTLOOK (Updated October, 2018) This tutorial will show you how to set up your email in Outlook using IMAP or POP. It also explains how to configure Outlook for MAC. Click on your version
More informationRevised (10/17) Overview Transmission Toolkit
Revised (10/17) Overview Transmission Toolkit Copyright 2017 by KeyBank, N.A. Overview Transmission Toolkit All rights reserved. Reproduction of any part of this work beyond that permitted by Section 107
More informationVMware AirWatch Certificate Authentication for Cisco IPSec VPN
VMware AirWatch Certificate Authentication for Cisco IPSec VPN For VMware AirWatch Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com.
More information997 Functional Acknowledgement X12 Version 4010
997 Functional Acknowledgement X12 Version 4010 Version: 2.0 Author: Advance Auto Parts Company: Advance Auto Parts Publication: 12/03/2016 Publication Record Date Version Description Author N/A 1.0 Initial
More informationContents. SSL-Based Services: HTTPS and FTPS 2. Generating A Certificate 2. Creating A Self-Signed Certificate 3. Obtaining A Signed Certificate 4
Contents SSL-Based Services: HTTPS and FTPS 2 Generating A Certificate 2 Creating A Self-Signed Certificate 3 Obtaining A Signed Certificate 4 Enabling Secure Services 5 A Note About Ports 5 Connecting
More informationEDI File Transfer Users: Setting Up Your Mailbox
EDI File Transfer Users: Setting Up Your Mailbox Q: What is a mailbox? A: A mailbox is what ClaimShuttle uses to store your Submitter ID (also known as your Trading Partner ID, Submitter Number, or Sender
More informationBackup the System. Backup Overview. Backup Prerequisites
Backup Overview Backup Overview, on page 1 Backup Prerequisites, on page 1 Backup Task Flow, on page 2 Backup Interactions and Restrictions, on page 7 Cisco recommends performing regular backups. You can
More informationGS1 Finland Synkka Data Pool Connectivity guide - FTPS Service
Synkka Data Pool Connectivity guide - FTPS Service Connectivity Guide Version 1.0, Draft/Approved, 2017.06.16. Document Summary Document Item Document Name Current Value Synkka Data Pool - FTPS Connection
More informationASC X X220A1)
HIPAA Transaction Standard EDI Companion Guide Benefit Enrollment and Maintenance (834) (Refers to the Implementation Guides based on ASC X12 005010X220A1) 2 Disclosure Statement: This Companion Guide
More informationCisco Passguide Exam Questions & Answers
Cisco Passguide 642-648 Exam Questions & Answers Number: 642-648 Passing Score: 800 Time Limit: 120 min File Version: 61.8 http://www.gratisexam.com/ Cisco 642-648 Exam Questions & Answers Exam Name: Deploying
More informationEtasoft XT Server 1.x
Etasoft XT Server 1.x XT Server is a set of tools for automated data translation, validation and file processing. Setup Install software using setup program xtserver_setup.exe. Package contains both GUI
More informationReport HQ. Quick Start Guide. Report HQ Quick Start Guide - Version 1.2
Report HQ Quick Start Guide STEP 1 Requesting An Account 1) Request an account via the Report HQ Request Form 2) Nasdaq will verify your account 3) Once your account is verified and provisioned, you will
More informationNet LineDancer v13. Install Guide for Linux. Revision History
Net LineDancer v13 Install Guide for Linux Revision History Revision Subject Revisions First Edition (v13.08) Created as a First Edition (2013/09/03) LogicVein, Inc. www.logicvein.com Tel: +81-44-852-4200
More informationLexiCom Translator Integration Guide
LexiCom Translator Integration Guide For Emanio Trading Partner Document Version 2.3 February, 2005 Copyright 1998-2005 Cleo Communications LexiCom Translator Integration Guide This translator guide describes
More informationTechnologies for Securing the Networked Supply Chain. Alex Deacon Advanced Products and Research Group VeriSign, Inc.
Technologies for Securing the Networked Supply Chain Alex Deacon Advanced Products and Research Group VeriSign, Inc. Agenda Introduction Security challenges Security technologies in use today Applying
More informationECHONET Lite SPECIFICATION. ECHONET Lite System Design Guidelines 2011 (2012) ECHONET CONSORTIUM ALL RIGHTS RESERVED
Part V ECHONET Lite System Design Guidelines i 2011 (2012) ALL RIGHTS RESERVED The specifications published by the ECHONET Consortium are established without regard to industrial property rights (e.g.,
More informationTLS Setup. TLS Overview. TLS Prerequisites
Setup Overview, page 1 Prerequisites, page 1 Configuration Task Flow, page 2 Interactions and Restrictions, page 8 Overview Transport Layer Security () provides secure and reliable signaling and data transfer
More informationSearch for Mail Step 3 Click the Accounts button.
Manually Set Up E-mail with Microsoft Outlook Learn how to configure Microsoft Outlook 2003, 2007, 2010, 2013, or 2016 for use with your 1&1 Mail Basic account using the IMAP Protocol. Follow the instructions
More informationEDI On-Boarding Manual
Contents Contents... 1 Document Objectives... 2 Summary of Process... 3 EDI Setup... 4 Please Help Us Assess Your EDI Readiness... 5 Traditional EDI Supplier... 6 Catalogue Submission and Testing... 6
More informationCompanion Guide Institutional Billing 837I
Companion Guide Institutional Billing 837I Release 3 X12N 837 (Version 5010A2) Healthcare Claims Submission Implementation Guide Published December 2016 Revision History Date Release Appendix name/ loop
More informationPresented by. GoAnywhere.com
Presented by Bob Luebbe Chief Architect Steve Luebbe Software Development Mgr. About Linoma Software File Transfer Challenges What is Managed File Transfer (MFT)? 10 Ways to Make File Transfers easier
More informationOracle Cloud Using the FTP Adapter. Release 17.4
Oracle Cloud Using the FTP Adapter Release 17.4 E66632-20 October 2017 Oracle Cloud Using the FTP Adapter, Release 17.4 E66632-20 Copyright 2015, 2017, Oracle and/or its affiliates. All rights reserved.
More informationFeature Express Enterprise Arcus. SSL/TLS - secure FTP communications Included Included Included
Protocols SSL/TLS - secure FTP communications SSL key manager - manage, import, export, and create SSL certificates SSL Config - specify ciphers and versions allowed (SSL v2, v3, and TLS v1) Checkpoint
More informationConfiguring SSL Security
CHAPTER9 This chapter describes how to configure SSL on the Cisco 4700 Series Application Control Engine (ACE) appliance. This chapter contains the following sections: Overview Configuring SSL Termination
More informationRecommendations for Device Provisioning Security
Internet Telephony Services Providers Association Recommendations for Device Provisioning Security Version 2 May 2017 Contact: team@itspa.org.uk Contents Summary... 3 Introduction... 3 Risks... 4 Automatic
More informationBUSINESSMAIL X.400 WEB INTERFACE AS2 GATEWAY V2.9
GATEWAY V2.9 User information (1) In the past it was necessary to use special forms or Excel sheets for the administration of your partners and trading relations. You had to send this information to central
More informationAxway Activator Release Notes
Axway Activator 6.0.0 Release Notes Document version: April 2018 Product version requirements New features and enhancements Known issues and limitations Documentation Support services Product version requirements
More informationGold Coast Health Plan Healthcare Claim: 837 Companion Guide. Versions: X222A X223A2
Gold Coast Health Plan Healthcare Claim: 837 Companion Guide Versions: 005010X222A1 005010X223A2 Updated December 30, 2016 2016 Conduent Business Services, LLC. All rights reserved. Conduent and Conduent
More informationConfiguring SSH and Telnet
6 CHAPTER This chapter describes how to configure Secure Shell Protocol (SSH) and Telnet on Cisco NX-OS devices. This chapter includes the following sections: Information About SSH and Telnet, page 6-1
More informationOverview. SSL Cryptography Overview CHAPTER 1
CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet. SSL ensures the secure transmission of data between a client and a server through
More informationContents. Configuring SSH 1
Contents Configuring SSH 1 Overview 1 How SSH works 1 SSH authentication methods 2 SSH support for Suite B 3 FIPS compliance 3 Configuring the device as an SSH server 4 SSH server configuration task list
More informationComprehensive Setup Guide for TLS on ESA
Comprehensive Setup Guide for TLS on ESA Contents Introduction Prerequisites Requirements Components Used Background Information Functional Overview and Requirements Bring Your Own Certificate Update a
More informationDirectLine for Business AS2 USER GUIDE
DirectLine for Business AS2 USER GUIDE Contents BMO AS2 Service...1 Introduction... 1 Overview... 1 ICS AS2 Mailbox User... 2 AS2 Mailbox Service Setup...3 Before You Begin... 3 Connectivity Testing...
More informationCONNX SECURITY OVERVIEW
CONNX SECURITY OVERVIEW ConnX is a web-based application which can be installed in a variety of technical environments. This purpose of this document is to advise you on the security aspects that are provided
More informationContents. 7.0 Electronic Business Transactions Detroit Edison Website Communications Website Content 2
Contents 7.0 Electronic Business Transactions 2 7.1 Detroit Edison Website Communications 2 7.1.1 Website Content 2 7.2 EBT Communications 3 7.2.1 Establishing XML with Detroit Edison 3 7.2.2 XML Transactions
More information837 Superior Companion Guide
837 Superior Companion Guide Refers to the Implementation Guides based on the HIPAA Transaction ASC X12N. Standards for Electronic Data Interchange X12N/005010x222 Health Care Claim: Professional (837P)
More informationBlueCross BlueShield of South Carolina EDI Gateway Technical Communications User s Manual. Version 17.1
BlueCross BlueShield of South Carolina EDI Gateway Technical Communications User s Manual Version 17.1 October 2017 Disclaimer We publish this manual for informational use only. We periodically make changes
More informationDisaster Recovery System Administration Guide for Cisco Unified Communications Manager Release 8.0(2)
Disaster Recovery System Administration Guide for Cisco Unified Communications Manager Release 8.0(2) Published: April 2, 2010 This guide provides an overview of the Disaster Recovery System, describes
More informationExpress permission to use X12 copyrighted materials within this document has been granted.
837 Companion Guide Refers to the Implementation Guides based on the HIPAA Transaction ASC X12N. Standards for Electronic Data Interchange X12N/005010x222 Health Care Claim: Professional (837P) and ASC
More informationControl-M and Payment Card Industry Data Security Standard (PCI DSS)
Control-M and Payment Card Industry Data Security Standard (PCI DSS) White paper PAGE 1 OF 16 Copyright BMC Software, Inc. 2016 Contents Introduction...3 The Need...3 PCI DSS Related to Control-M...4 Control-M
More informationBusinessMail X.400 Web interface AS2 Gateway V3.0
Web interface AS2 Gateway V3.0 User information (1) In the past it was necessary to use special forms or Excel sheets for the administration of your partners and trading relations. You had to send this
More informationInformation Security Practices
3 Phillip Street, 13-03 Royal Group Building, Singapore 048693 www.trustsphere.com Information Security Practices TrustSphere Pte Ltd Co Reg No. 200614342Z Contents 1 Physical security... 4 2 Network security...
More informationHP Instant Support Enterprise Edition (ISEE) Security overview
HP Instant Support Enterprise Edition (ISEE) Security overview Advanced Configuration A.03.50 Mike Brandon Interex 03 / 30, 2004 2003 Hewlett-Packard Development Company, L.P. The information contained
More informationIV. ENCOUNTER DATA PROCESSING PROCEDURES A. General Information
A. General Information Reporting encounter data is a shared obligation of IEHP and Providers. CMS/DHCS has mandated encounter data report formats and reporting timelines with which IEHP is required to
More informationIBM Secure Proxy. Advanced edge security for your multienterprise. Secure your network at the edge. Highlights
IBM Secure Proxy Advanced edge security for your multienterprise data exchanges Highlights Enables trusted businessto-business transactions and data exchange Protects your brand reputation by reducing
More informationImplementing Secure Shell
Implementing Secure Shell Secure Shell (SSH) is an application and a protocol that provides a secure replacement to the Berkeley r-tools. The protocol secures sessions using standard cryptographic mechanisms,
More informationECC FILE TRANSFER SERVICE USER-GUIDE. Release 006 Date
ECC FILE TRANSFER SERVICE USER-GUIDE Release 006 Date 2017-01-13 1 Content 1 General... 3 2 File transfer service via FTP... 4 2.1 FTPS (FTPeS FTP with explicit SSL/TLS)... 4 2.1.1 Setting up the FTPS
More informationOverview. Express permission to use X12 copyrighted materials within this document has been granted.
837 Companion Guide Refers to the Implementation Guides based on the HIPAA Transaction ASC X12N. Standards for Electronic Data Interchange X12N/005010x222 Health Care Claim: Professional (837P) and ASC
More informationSAP Pharma Network Onboarding Guide
Onboarding Guide - Final Review SAP Pharma Network Document Version: 0.18 2016-08-10 Typographic Conventions Type Style Example Description Words or characters quoted from the screen. These include field
More informationClick All Programs Open Text Host explorer / Connection Central (Doing this brings up a Connection Central panel).
Secure Host Explorer FTP Setup Setup Instructions Host Explorer is the terminal emulation software that allows users to connect their PC to the mainframe in a secure environment. For example, this allows
More informationMedical Associates Health Plans and Health Choices
Medical Associates Health Plans and Health Choices 270/271 HIPAA Transaction Companion Guide HIPAA V5010X279A1 VERSION: 2.0 DATE: 06/21/2016 1 Disclosure Statement This material contains confidential,
More informationVMware Workspace ONE UEM Product Provisioning for Windows Rugged Documentation. VMware Workspace ONE UEM 1811
VMware Workspace ONE UEM Product Provisioning for Windows Rugged Documentation VMware Workspace ONE UEM 1811 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/
More informationBackground. Creating a Vendor login to the AultCare website
REVISED 07/15/2016 Background AultCare can currently accept files via web file submission as well as SFTP. Before you can use the AultCare website, you must register for an account. This document is designed
More informationEnhancements Added support for VLProxy thread dumps in support bundles. Requires VersaLex or later.
* RELEASE 2.9-2011/11/14 * - Added support for VLProxy thread dumps in support bundles. Requires VersaLex 4.3.42 or later. - VLProxy takes approximately 90 seconds to recognize that a VLTrader has abnormally
More informationVPN and IPsec. Network Administration Using Linux. Virtual Private Network and IPSec 04/2009
VPN and IPsec Network Administration Using Linux Virtual Private Network and IPSec 04/2009 What is VPN? VPN is an emulation of a private Wide Area Network (WAN) using shared or public IP facilities. A
More informationBEST PRACTICES FOR PERSONAL Security
BEST PRACTICES FOR PERSONAL Email Security Sometimes it feels that the world of email and internet communication is fraught with dangers: malware, viruses, cyber attacks and so on. There are some simple
More informationHTTPS The New B2Bi Portal. Bank of America s secure web transmission interface user guide
HTTPS The New B2Bi Portal Bank of America s secure web transmission interface user guide This manual contains proprietary and confidential information of Bank of America and was prepared by the staff of
More informationContent and Purpose of This Guide... 1 User Management... 2
Contents Introduction--1 Content and Purpose of This Guide........................... 1 User Management........................................ 2 Security--3 Security Features.........................................
More informationHIPAA Transaction 278 Request for Review and Response Standard Companion Guide
FLORIDA BLUE HEALTH PLAN COMPANION GUIDE HIPAA Transaction 278 Request for Review and Response Standard Companion Guide Refers to the Technical Reports Type 3 Based on ASC X12 version 005010X217 Companion
More informationConfiguration Guide. BlackBerry UEM Cloud
Configuration Guide BlackBerry UEM Cloud Published: 2018-04-18 SWD-20180411125526296 Contents About this guide... 7 Getting started... 8 Configuring BlackBerry UEM Cloud for the first time... 8 Administrator
More informationSONOTON storage server
The SONOTON storage server offers different protocols which all use SSL secured communications. All protocols will work with the login details given to you by SONOTON. Overview: Protocols supported: HTTPS
More informationVMware AirWatch Product Provisioning and Staging for QNX Guide Using Product Provisioning for managing QNX devices.
VMware AirWatch Product Provisioning and Staging for QNX Guide Using Product Provisioning for managing QNX devices. Have documentation feedback? Submit a Documentation Feedback support ticket using the
More informationCyber Security Hardening Guide
Cyber Security Hardening Guide HOW FEENICS PROTECTS THE DATA AND INTEGRITY OF TRANSACTIONS FEENICS, INC. 301-2310 St. Laurent Blvd., Ottawa, Ontario K1G 5H9 (855) 333-6427 www.feenics.com Contents The
More informationSECURE Gateway v4.7. TLS configuration guide
SECURE Email Gateway v4.7 TLS configuration guide November 2017 Copyright Published by Clearswift Ltd. 1995 2017 Clearswift Ltd. All rights reserved. The materials contained herein are the sole property
More information