Axway Activator Release Notes

Size: px
Start display at page:

Download "Axway Activator Release Notes"

Transcription

1 Axway Activator Release Notes Document version: April 2018 Product version requirements New features and enhancements Known issues and limitations Documentation Support services Product version requirements Implementations with other Axway products require the following versions for compatibility with Activator 6.0.0: Axway product Version B2Bi Transfer CFT To obtain the latest service pack for the Axway product versions, refer to support.axway.com. New features and enhancements This section provides high-level details. See the Activator documentation available at if you need additional information. Interoperability and Compliance HTTP synchronous response Activator now supports the delivery of synchronous responses to inbound HTTP and HTTPS messages. This feature can be configured on "HTTP no packaging" type community pickup exchanges. Configuration can be implemented either in the Activator UI or through the REST API. Axway Activator Release Notes 1

2 This configuration can be saved as part of an entire system backup, and can also be propagated to network peers. New IBM MQ supported version Activator has been tested now for the support of IBM MQ 8.0. REST APIs As part of the Axway AMPLIFY platform integration, REST APIs are available in this Activator release. These APIs provide an easy mechanism for configuration promotion and can be used for integration with Axway and non-axway solutions. Swagger 2.0 for Activator REST APIs Activator now embeds the Swagger 2.0 interface for using REST APIs. Activator REST APIs are fully compatible with the AxwayAPI Gateway product. Single Sign On Activator now supports Single Sign On in networks with SAML 2.0 based identity provider servers. It also supports SAML Single Logout, SSO metadata configuration information through a dedicated Activator URL, and SHA256 signing of SAML requests and responses. Updated platform support Activator now supports 64-bits platforms for Windows and Linux. For a full list of platforms supported by Activator, refer to the Activator Installation Guide, available at Java 8 support The Activator runs on machines with JRE 1.8 installed. User experience Message Tracker enhancements Activator Message Tracker now provides improved exchange point name searches. Axway Activator Release Notes 2

3 Pickup groups You can now organize application pickups and trading pickups into groups in which they can be activated, deactivated, exported, and imported together. Customizable retries It is now possible to set the delay between message sending retries for each application and trading delivery. Installation/Upgrade Activator uses now the Install4j framework and provides an In-Place mechanism for upgrades from and 5.12 Activator existing installations. This mechanism allows less planning than side-by-side upgrades and does not require the usage of new hardware. Security Compliance TLS 1.2 support Activator supports by default TLSv1.2 for the user interface connection and for the following protocols: HTTP, FTP, IBM MQ and (SMTPS, POP3S). More protocols will be covered in the following releases. SHA2-MAC cipher support Activator now supports SHA2 with MAC ciphers (hmac-sha2-256, hmac-sha2-512) for SFTP exchanges. As with other ciphers, it is possible to control/override SSH ciphers for encryption for outgoing transfers and Activator accepts SHA2 MAC ciphers for incoming exchanges. Elliptic Curve Cryptography support Security has become one of the most important concerns on the market and the new tendency is to move to forward secrecy instead of key exchange via RSA. Forward secrecy is a protocol feature that enables secure conversations that are not dependent on the server's private key. With cipher suites that do not support Forward Secrecy, someone who can recover a server's private key can decrypt all earlier encrypted conversations if they have them recorded. It is now possible to use the cipher suites offering forward secrecy (Elliptic Curve Cryptography) to secure transmissions. From onwards, Activator supports and prefers to negotiate cipher suites offering forward secrecy. Axway Activator Release Notes 3

4 Prevent storage of clear-text data (SFTP) Activator now supports the ability to prevent the storage of (non-encrypted) backups of messages processed through the system for SFTP based exchanges. This is an optional behavior which can be activated per SFTP exchange point definition. Additional protocols will be added in future updates. Override default PGP signing certificates Activator users can now specify an alternative PGP signing key for a partner or category in the Collaboration Settings. Upgrades Activator Upgrade Customers running Activator or higher can upgrade directly to the Activator release. Known issues and limitations TLSv2 cipher Unable to use TLSv2 cipher SSL_RSA_WITH_RC4_128_SHA in MQ8Issue When setting the cipher suite value to SSL_RSA_WITH_RC4_128_SHA in Activator, Activator fails to make calls to MQ. The supported TLSv2 cipher does not work after the upgrade to Activator 6.0.0, which uses Java 8, update 66. To use a workaround: 1. Go to <Activator_install_directory>\conf and open jvmarguments.xml in an editor. 2. Add the line: <Option>Djava.security.properties=../conf/mysecurity.conf</Opt ion> 3. Create a new file in the../conf directory called mysecurity.conf. In this newly created file, add the line: jdk.tls.disabledalgorithms=sslv3, MD5withRSA, DH keysize < 7683 This line enables the RC4 encryption algorithm, which allows the cipher SSL_RSA_WITH_RC4_ 128_SH. 4. Restart Activator. Axway Activator Release Notes 4

5 Discontinued features Platforms In line with developments in the market, Activator has been updated to run in 64-bit mode and the 32-bit editions have been discontinued, starting with the Activator version In addition to that, Activator is no longer supported on AIX and Solaris. Full support is provided for the 64- bit editions of Windows and Linux (Suse / Redhat). Customers running on older Windows versions should upgrade to Windows 10/ Server 2016 to be able to run Activator Customer currently running on AIX or Solaris have to move to a different platform first. More details around the upgrade procedures can be found in our Activator Installation Guide, available at Protocols Starting with the Activator release, the support is discontinued for the following protocols: EDIINT AS1/AS3, AS4, OFTP V1/V2, cxml, MLLP, RNIF, ebxml intermediary, WebServices, WebDAV, SecureFile, Generic . For customers in need of these protocols, we recommend Axway B2Bi. Existing Activator customers that are using these discontinued protocols will be evaluated on an individual basis. Standards Support for CSOS, NIST, and FIPS has been discontinued in Activator Connectivity Sentinel and PassPort are no longer supported in Activator. Documentation This section describes documentation enhancements and related documentation. Documentation enhancements The following documents have been updated to take into account new product features and enhancements for Activator 6.0.0: Activator Installation Guide Activator Administrator Guide Activator online help Axway Activator Release Notes 5

6 Related documentation To find all available documents for this product version: 1. Go to 2. In the left pane Filters list, select your product or product version. Note Customers with active support contracts need to log in to access restricted content. Support services The Axway Global Support team provides worldwide 24 x 7 support for customers with active support agreements. support@axway.com or visit Axway Support at Copyright 2018 All rights reserved Axway Activator Release Notes 6

CLEO VLTrader Made Simple Guide

CLEO VLTrader Made Simple Guide CLEO VLTrader Made Simple Guide Table of Contents Quick Reference... 3 Miscellaneous Technical Notes... 3 CLEO VLTrader at a Glance... 3 Introduction... 5 Application Page Layout... 5 Preconfigured Hosts...

More information

Axway Activator. Version 5.12

Axway Activator. Version 5.12 I N S T A L L A T I O N G U I D E Axway Activator Version 5.12 22 September 2017 Copyright 2017 Axway All rights reserved. This documentation describes the following Axway software: Axway Activator 5.12

More information

Electronic Signature Version March Administrator Guide

Electronic Signature Version March Administrator Guide Electronic Signature Version 2.10.0 5 March 2018 Administrator Guide Copyright 2018 Axway All rights reserved. This documentation describes the following Axway software: Axway Electronic Signature 2.10.0

More information

Axway Interchange. Version 5.12

Axway Interchange. Version 5.12 I N S T A L L A T I O N G U I D E Axway Interchange Version 5.12 22 September 2017 Copyright 2017 Axway All rights reserved. This documentation describes the following Axway software: Axway Interchange

More information

Presented by. GoAnywhere.com

Presented by. GoAnywhere.com Presented by Bob Luebbe Chief Architect Steve Luebbe Software Development Mgr. About Linoma Software File Transfer Challenges What is Managed File Transfer (MFT)? 10 Ways to Make File Transfers easier

More information

Axway Transfer CFT Release Notes

Axway Transfer CFT Release Notes Axway Transfer CFT 3.2.4 Release Notes New features and enhancements Platform features Limitations Prerequisites Upgrade procedure Discontinued support Documentation Support services New features and enhancements

More information

Manual Ftp Windows 7 Server 2008 R2 Java

Manual Ftp Windows 7 Server 2008 R2 Java Manual Ftp Windows 7 Server 2008 R2 Java Configuration Guide Windows Server 2008, Server 2008 R2*, Server 2012, Server 2012 R2, 7, and 8 (x86-64) This means that it will recognize a FTP server running

More information

Axway API Portal Release Notes DRAFT

Axway API Portal Release Notes DRAFT Axway API Portal 7.5.4 Release Notes DRAFT Document version: 13 October 2017 New features and enhancements on page 1 Fixed issues on page 3 Known issues on page 3 Documentation on page 4 Support services

More information

Contents. Configuring SSH 1

Contents. Configuring SSH 1 Contents Configuring SSH 1 Overview 1 How SSH works 1 SSH authentication methods 2 SSH support for Suite B 3 FIPS compliance 3 Configuring the device as an SSH server 4 SSH server configuration task list

More information

IBM i Version 7.2. Security Digital Certificate Manager IBM

IBM i Version 7.2. Security Digital Certificate Manager IBM IBM i Version 7.2 Security Digital Certificate Manager IBM IBM i Version 7.2 Security Digital Certificate Manager IBM Note Before using this information and the product it supports, read the information

More information

Secure and Streamline your File Transfers with the new GoAnywhere 5.4 Release

Secure and Streamline your File Transfers with the new GoAnywhere 5.4 Release Secure and Streamline your File Transfers with the new GoAnywhere 5.4 Release Presented by Linoma Software Introductions Bob Luebbe, CISSP Chief Architect Steve Luebbe Director of Engineering Agenda File

More information

Axway 5 Suite. Managed File Transfer

Axway 5 Suite. Managed File Transfer C O N C E P T S G U I D E Axway 5 Suite Managed File Transfer 6 February 2016 Copyright 2016 Axway All rights reserved. This documentation describes the following Axway software: Axway 5 Suite No part

More information

CONTENTS. vii. Chapter 1 TCP/IP Overview 1. Chapter 2 Symmetric-Key Cryptography 33. Acknowledgements

CONTENTS. vii. Chapter 1 TCP/IP Overview 1. Chapter 2 Symmetric-Key Cryptography 33. Acknowledgements CONTENTS Preface Acknowledgements xiii xvii Chapter 1 TCP/IP Overview 1 1.1 Some History 2 1.2 TCP/IP Protocol Architecture 4 1.2.1 Data-link Layer 4 1.2.2 Network Layer 5 1.2.2.1 Internet Protocol 5 IPv4

More information

This patch update resolves specific previous issues. This document outlines why you should install this patch update.

This patch update resolves specific previous issues. This document outlines why you should install this patch update. CloudAccess 3.0 SP2 P1 Release Notes April 2017 This patch update resolves specific previous issues. This document outlines why you should install this patch update. Many of these improvements were made

More information

Symantec Security Information Manager FIPS Operational Mode Guide

Symantec Security Information Manager FIPS Operational Mode Guide Symantec Security Information Manager 4.7.3 FIPS 140-2 Operational Mode Guide Symantec Security Information Manager 4.7.3 FIPS 140-2 Operational Mode Guide The software described in this book is furnished

More information

Enhancements Added support for VLProxy thread dumps in support bundles. Requires VersaLex or later.

Enhancements Added support for VLProxy thread dumps in support bundles. Requires VersaLex or later. * RELEASE 2.9-2011/11/14 * - Added support for VLProxy thread dumps in support bundles. Requires VersaLex 4.3.42 or later. - VLProxy takes approximately 90 seconds to recognize that a VLTrader has abnormally

More information

FIPS Management. FIPS Management Overview. Configuration Changes in FIPS Mode

FIPS Management. FIPS Management Overview. Configuration Changes in FIPS Mode This chapter contains the following sections: Overview, on page 1 Configuration Changes in FIPS Mode, on page 1 Switching the Appliance to FIPS Mode, on page 2 Encrypting Sensitive Data in FIPS Mode, on

More information

What s New in GoAnywhere MFT 5.6?

What s New in GoAnywhere MFT 5.6? What s New in GoAnywhere MFT 5.6? Introductions Bob Luebbe, CISSP Chief Architect Steve Luebbe Director of Engineering Agenda Introduction to GoAnywhere MFT 5.6 Overview of new features Live demo How to

More information

XenApp 5 Security Standards and Deployment Scenarios

XenApp 5 Security Standards and Deployment Scenarios XenApp 5 Security Standards and Deployment Scenarios 2015-03-04 20:22:07 UTC 2015 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement Contents XenApp 5 Security Standards

More information

Oracle Fusion Middleware Oracle WebCenter Collaboration

Oracle Fusion Middleware Oracle WebCenter Collaboration Oracle Fusion Middleware Oracle WebCenter Collaboration Release Notes 10g Release 4 (10.3.3.0.0) E22881-03 May 2013 This document describes the supported software and known issues for Oracle WebCenter

More information

IBM Lotus Domino Product Roadmap

IBM Lotus Domino Product Roadmap IBM Lotus Domino Product Roadmap Your Name Your Title Today s agenda Domino Strategy What s coming in Domino 8? What s planned beyond Domino 8? Lotus Domino Strategy The integrated messaging & collaboration

More information

Axway API Gateway Release Notes

Axway API Gateway Release Notes Axway API Gateway 7.5.2 Release Notes Document version: 15 September 2017 Summary on page 1 New features and enhancements on page 1 Deprecated features on page 4 Removed features on page 4 Fixed issues

More information

IBM Secure Proxy. Advanced edge security for your multienterprise. Secure your network at the edge. Highlights

IBM Secure Proxy. Advanced edge security for your multienterprise. Secure your network at the edge. Highlights IBM Secure Proxy Advanced edge security for your multienterprise data exchanges Highlights Enables trusted businessto-business transactions and data exchange Protects your brand reputation by reducing

More information

vcloud Usage Meter 3.6 User's Guide vcloud Usage Meter 3.6

vcloud Usage Meter 3.6 User's Guide vcloud Usage Meter 3.6 vcloud Usage Meter 3.6 You can find the most up-to-date technical documentation on the VMware Web site at: https://docs.vmware.com/ The VMware Web site also provides the latest product updates. If you

More information

Oracle API Gateway Release Notes

Oracle API Gateway Release Notes Oracle API Gateway 11.1.2.4.0 Release Notes Document version: 29 October 2015 New features and enhancements Fixed problems Known issues ALERT: See the Known Issues section for important post-install steps

More information

Electronic Signature Version February Administrator Guide

Electronic Signature Version February Administrator Guide Electronic Signature Version 2.9.1 28 February 2018 Administrator Guide Copyright 2018 Axway All rights reserved. This documentation describes the following Axway software: Axway Electronic Signature 2.9.1

More information

Connectivity Implementation Guide

Connectivity Implementation Guide Version 3.0, October 2017 Document History Version Date Update Origin Written by Verified by 1.00 3/25/2011 Initial Draft Mike DeAlto Sue Merk 1.08 11/03/11 Final for customer use Sue Merk Sue Merk 2.0

More information

Satisfying CC Cryptography Requirements through CAVP/CMVP Certifications. International Crypto Module Conference May 19, 2017

Satisfying CC Cryptography Requirements through CAVP/CMVP Certifications. International Crypto Module Conference May 19, 2017 Satisfying CC Cryptography Requirements through CAVP/CMVP Certifications International Crypto Module Conference May 19, 2017 Synopsis Background NIAP policy relating to cryptographic requirements NIAP

More information

Presented by. GoAnywhere.com

Presented by. GoAnywhere.com Presented by Bob Luebbe, CISSP Chief Architect Steve Luebbe Software Development Manager About Linoma Software File Transfer Challenges What is Managed File Transfer (MFT) and its benefits Introduction

More information

IBM Security Access Manager for Web Version Application Development Kit Installation Topics

IBM Security Access Manager for Web Version Application Development Kit Installation Topics IBM Security Access Manager for Web Version 8.0.0.5 Application Development Kit Installation Topics IBM Security Access Manager for Web Version 8.0.0.5 Application Development Kit Installation Topics

More information

ADFS Setup (SAML Authentication)

ADFS Setup (SAML Authentication) ADFS Setup (SAML Authentication) Version 1.6 Corresponding Software Version Celonis 4.3 This document is copyright of the Celonis SE. Distribution or reproduction are only permitted by written approval

More information

Revised (10/17) Overview Transmission Toolkit

Revised (10/17) Overview Transmission Toolkit Revised (10/17) Overview Transmission Toolkit Copyright 2017 by KeyBank, N.A. Overview Transmission Toolkit All rights reserved. Reproduction of any part of this work beyond that permitted by Section 107

More information

Axway Products. 24 January Supported Platforms

Axway Products. 24 January Supported Platforms Axway Products 4 January 08 Supported Platforms Copyright 08 Axway All rights reserved. This documentation describes the following Axway software: Axway Products No part of this publication may be reproduced,

More information

Alliance Key Manager A Solution Brief for Technical Implementers

Alliance Key Manager A Solution Brief for Technical Implementers KEY MANAGEMENT Alliance Key Manager A Solution Brief for Technical Implementers Abstract This paper is designed to help technical managers, product managers, and developers understand how Alliance Key

More information

WAP Security. Helsinki University of Technology S Security of Communication Protocols

WAP Security. Helsinki University of Technology S Security of Communication Protocols WAP Security Helsinki University of Technology S-38.153 Security of Communication Protocols Mikko.Kerava@iki.fi 15.4.2003 Contents 1. Introduction to WAP 2. Wireless Transport Layer Security 3. Other WAP

More information

Compatibility Matrix for Cisco Unified Communications Manager and the IM and Presence Service, Release 11.5(1)SU5

Compatibility Matrix for Cisco Unified Communications Manager and the IM and Presence Service, Release 11.5(1)SU5 Compatibility Matrix for Cisco Unified Communications Manager and the IM and Presence Service, Release 11.5(1)SU5 Compatibility Matrix for Cisco Unified Communications Manager and the IM and Presence Service

More information

HP Instant Support Enterprise Edition (ISEE) Security overview

HP Instant Support Enterprise Edition (ISEE) Security overview HP Instant Support Enterprise Edition (ISEE) Security overview Advanced Configuration A.03.50 Mike Brandon Interex 03 / 30, 2004 2003 Hewlett-Packard Development Company, L.P. The information contained

More information

Security in Bomgar Remote Support

Security in Bomgar Remote Support Security in Bomgar Remote Support 2018 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property of their

More information

About FIPS, NGE, and AnyConnect

About FIPS, NGE, and AnyConnect About FIPS, NGE, and AnyConnect, on page 1 Configure FIPS for the AnyConnect Core VPN Client, on page 4 Configure FIPS for the Network Access Manager, on page 5 About FIPS, NGE, and AnyConnect AnyConnect

More information

Alliance Key Manager A Solution Brief for Partners & Integrators

Alliance Key Manager A Solution Brief for Partners & Integrators Alliance Key Manager A Solution Brief for Partners & Integrators Key Management Enterprise Encryption Key Management This paper is designed to help technical managers, product managers, and developers

More information

Data Security and Privacy. Topic 14: Authentication and Key Establishment

Data Security and Privacy. Topic 14: Authentication and Key Establishment Data Security and Privacy Topic 14: Authentication and Key Establishment 1 Announcements Mid-term Exam Tuesday March 6, during class 2 Need for Key Establishment Encrypt K (M) C = Encrypt K (M) M = Decrypt

More information

Axway SecureTransport

Axway SecureTransport Axway SecureTransport Enhanced Managed File Transfer Gateway For many organizations, years of adding one-off file-transfer connections to meet specific needs has created a complex environment that lacks

More information

Version 2.0. FIPS Non-Proprietary Security Policy. Certicom Corp. September 27, 2005

Version 2.0. FIPS Non-Proprietary Security Policy. Certicom Corp. September 27, 2005 Security Builder R FIPS Java Module Version 2.0 FIPS 140-2 Non-Proprietary Security Policy Certicom Corp. September 27, 2005 c Copyright 2005 Certicom Corp. This document may be freely reproduced and distributed

More information

FIPS Security Policy

FIPS Security Policy FIPS 140-2 Security Policy BlackBerry Cryptographic Library Version 2.0.0.10 Document Version 1.2 BlackBerry Certifications, Research In Motion This document may be freely copied and distributed provided

More information

Encrypted Phone Configuration File Setup

Encrypted Phone Configuration File Setup This chapter provides information about encrypted phone configuration files setup. After you configure security-related settings, the phone configuration file contains sensitive information, such as digest

More information

Table of Contents 1 SSH Configuration 1-1

Table of Contents 1 SSH Configuration 1-1 Table of Contents 1 SSH Configuration 1-1 SSH Overview 1-1 Introduction to SSH 1-1 Algorithm and Key 1-1 Asymmetric Key Algorithm 1-2 SSH Operating Process 1-2 Configuring the SSH Server 1-4 SSH Server

More information

Lecture 9a: Secure Sockets Layer (SSL) March, 2004

Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Internet and Intranet Protocols and Applications Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Arthur Goldberg Computer Science Department New York University artg@cs.nyu.edu Security Achieved by

More information

Setting Up the Server

Setting Up the Server Managing Licenses, page 1 Cross-launch from Prime Collaboration Provisioning, page 5 Integrating Prime Collaboration Servers, page 6 Single Sign-On for Prime Collaboration, page 7 Changing the SSL Port,

More information

TECHNICAL NOTE Vidyo Server Security Update 18 for VidyoPortal, VidyoRouter, and VidyoGateway VIDYO

TECHNICAL NOTE Vidyo Server Security Update 18 for VidyoPortal, VidyoRouter, and VidyoGateway VIDYO TECHNICAL NOTE Vidyo Server Security Update 18 for VidyoPortal, VidyoRouter, and VidyoGateway www.vidyo.com 1.866.99.VIDYO 2018 Vidyo, Inc. all rights reserved. Vidyo s technology is covered by one or

More information

Perform Backup and Restore

Perform Backup and Restore This section explains the following:, page 1 You can schedule periodic backups using the Cisco Prime Collaboration Assurance user interface. Cisco Prime Collaboration Analytics data is backed up on a remote

More information

PGP Command Line Version 10.0 Release Notes

PGP Command Line Version 10.0 Release Notes PGP Command Line Version 10.0 Release Notes Thank you for using this PGP Corporation product. These Release Notes contain important information regarding this release of PGP Command Line Software Development

More information

SAML with ADFS Setup Guide

SAML with ADFS Setup Guide SAML with ADFS Setup Guide Version 1.0 Corresponding Software Version: 4.2 This document is copyright of the Celonis SE. Distribution or reproduction are only permitted by written approval of the Celonis

More information

SonicWALL Addendum. A Supplement to the SonicWALL Internet Security Appliance User's Guide

SonicWALL Addendum. A Supplement to the SonicWALL Internet Security Appliance User's Guide SonicWALL 6.2.0.0 Addendum A Supplement to the SonicWALL Internet Security Appliance User's Guide Contents SonicWALL Addendum 6.2.0.0... 3 New Network Features... 3 NAT with L2TP Client... 3 New Tools

More information

HPE Network Automation Software Software Version: for the Windows and Linux operating systems. Hardening Guide

HPE Network Automation Software Software Version: for the Windows and Linux operating systems. Hardening Guide HPE Network Automation Software Software Version: 10.21 for the Windows and Linux operating systems Hardening Guide Document Release Date: March 2017 Software Release Date: November 2016 Legal Notices

More information

ArrayOS AG Release Note

ArrayOS AG Release Note Introduction Release Date: September 30, 2018 This release note summarizes the general enhancements, resolved issues and known limitations for ArrayOS AG 9.4.0.233 release. Contacting Customer Support

More information

NGFW Security Management Center

NGFW Security Management Center NGFW Security Management Center Release Notes 6.3.3 Revision A Contents About this release on page 2 System requirements on page 2 Build version on page 3 Compatibility on page 5 New features on page 5

More information

Oracle B2B 11g Technical Note. Technical Note: 11g_006 Security. Table of Contents

Oracle B2B 11g Technical Note. Technical Note: 11g_006 Security. Table of Contents Oracle B2B 11g Technical Note Technical Note: 11g_006 Security This technical note lists the security options available in Oracle B2B Table of Contents Users... 2 Roles... 2 Step 1: Create the user in

More information

Avaya Diagnostic Server 3.0 Service Pack 3 Release Notes

Avaya Diagnostic Server 3.0 Service Pack 3 Release Notes Avaya Diagnostic Server 3.0 Service Pack 3 Release Notes Introduction This document provides support information about the Avaya Diagnostic Server 3.0 Service Pack 3 release and supplements other Avaya

More information

NGFW Security Management Center

NGFW Security Management Center NGFW Security Management Center Release Notes 6.3.0 Revision A Contents About this release on page 2 System requirements on page 2 Build version on page 3 Compatibility on page 5 New features on page 5

More information

Information Security CS 526

Information Security CS 526 Information Security CS 526 Topic 14: Key Distribution & Agreement, Secure Communication Topic 14: Secure Communication 1 Readings for This Lecture On Wikipedia Needham-Schroeder protocol (only the symmetric

More information

StorageTek Crypto Key Management System Version 2.x

StorageTek Crypto Key Management System Version 2.x StorageTek Crypto Key Management System Version 2.x Security and Authentication White Paper Part Number: 316198602 April 2010 Revision B Crypto Key Management System, Security and Authentication White

More information

Genesys Security Pack on UNIX. Release Notes 8.5.x

Genesys Security Pack on UNIX. Release Notes 8.5.x Genesys Security Pack on UNIX Release Notes 8.5.x 12/22/2017 Table of Contents Genesys Security Pack on UNIX 8.5.x Release Note 3 Known Issues and Recommendations 6 Release 8.5.1 7 8.5.100.14 8 8.5.100.13

More information

SAML-Based SSO Configuration

SAML-Based SSO Configuration Prerequisites, page 1 SAML SSO Configuration Task Flow, page 5 Reconfigure OpenAM SSO to SAML SSO Following an Upgrade, page 9 SAML SSO Deployment Interactions and Restrictions, page 9 Prerequisites NTP

More information

SAMPLE Test for C : IBM Sterling B2B Integrator V5.2.6, Solution Implementation

SAMPLE Test for C : IBM Sterling B2B Integrator V5.2.6, Solution Implementation SAMPLE Test for C8060-217: IBM Sterling B2B Integrator V5.2.6, Solution Implementation This sample test is designed to give the candidate an idea of the content and format of the questions that will be

More information

Sentry Power Manager (SPM) Software Security

Sentry Power Manager (SPM) Software Security Sentry Power Manager (SPM) Software Security Purpose This technical note is a detailed review of the security areas of the SPM enterprise software product, version 6.0 and greater, and provides a brief

More information

TIBCO ActiveMatrix Policy Director Administration

TIBCO ActiveMatrix Policy Director Administration TIBCO ActiveMatrix Policy Director Administration Software Release 2.0.0 November 2014 Document Updated: January 2015 Two-Second Advantage 2 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES

More information

About Symantec Encryption Management Server

About Symantec Encryption Management Server Symantec Encryption Management Server Version 3.3.0 Maintenance Pack Release Notes Thank you for using this Symantec Corporation product. These Release Notes contain important information regarding this

More information

NetIQ Privileged Account Manager 3.5 includes new features, improves usability and resolves several previous issues.

NetIQ Privileged Account Manager 3.5 includes new features, improves usability and resolves several previous issues. Privileged Account Manager 3.5 Release Notes July 2018 NetIQ Privileged Account Manager 3.5 includes new features, improves usability and resolves several previous issues. Many of these improvements were

More information

2018 GLOBALSCAPE TRAINING OVERVIEW

2018 GLOBALSCAPE TRAINING OVERVIEW 2018 GLOBALSCAPE TRAINING OVERVIEW TABLE OF CONTENTS COURSE... 3 EFT ESSENTIALS COURSE...4 EFT ADMINISTRATOR COURSE... 5 EFT ADMINISTRATOR COURSE (CONT.)... 6 EFT AUTOMATION COURSE... 7 EFT SECURITY COURSE...8

More information

HPE Security Fortify WebInspect Enterprise Software Version: Windows operating systems. Installation and Implementation Guide

HPE Security Fortify WebInspect Enterprise Software Version: Windows operating systems. Installation and Implementation Guide HPE Security Fortify WebInspect Enterprise Software Version: 17.10 Windows operating systems Installation and Implementation Guide Document Release Date: May 2017 Software Release Date: April 2017 Legal

More information

Security Management System Release Notes

Security Management System Release Notes Security Management System Release Notes Version 5.0.0 Release date: October 2017 This document contains release-specific information for the TippingPoint Security Management System (). The release notes

More information

TLS Setup. TLS Overview. TLS Prerequisites

TLS Setup. TLS Overview. TLS Prerequisites Setup Overview, page 1 Prerequisites, page 1 Configuration Task Flow, page 2 Interactions and Restrictions, page 8 Overview Transport Layer Security () provides secure and reliable signaling and data transfer

More information

Access COTY PROSPER database Computer Setup Instructions

Access COTY PROSPER database Computer Setup Instructions PROSPER: COTY Specification Database Introduction Access COTY PROSPER database s These instructions are for all users who must access PROSPER. Both Coty internal employees, and external users working as

More information

VMWARE HORIZON CLOUD WITH VMWARE IDENTITY MANAGER QUICK START GUIDE WHITE PAPER MARCH 2018

VMWARE HORIZON CLOUD WITH VMWARE IDENTITY MANAGER QUICK START GUIDE WHITE PAPER MARCH 2018 VMWARE HORIZON CLOUD WITH VMWARE IDENTITY MANAGER QUICK START GUIDE WHITE PAPER MARCH 2018 Table of Contents Introduction to Horizon Cloud with Manager.... 3 Benefits of Integration.... 3 Single Sign-On....3

More information

CommandCenter Secure Gateway Release 4.2.0

CommandCenter Secure Gateway Release 4.2.0 CommandCenter Secure Gateway Release 4.2.0 This is to announce the General Availability of CommandCenter Secure Gateway Firmware Release 4.2.0 July 15, 2009 Contents Introduction... 2 Applicability...

More information

Stunnel Guide for CN!Express 3 April 2017

Stunnel Guide for CN!Express 3 April 2017 Stunnel Guide for CN!Express 3 April 2017 When communicating with the CN!Express payment application from a remote server, the communications between the two servers must be secured. Auric requires CN!Express

More information

SAML 2.0 SSO. Set up SAML 2.0 SSO. SAML 2.0 Terminology. Prerequisites

SAML 2.0 SSO. Set up SAML 2.0 SSO. SAML 2.0 Terminology. Prerequisites SAML 2.0 SSO Agiloft integrates with a variety of SAML authentication providers, or Identity Providers (IdPs). SAML-based SSO is a leading method for providing federated access to multiple applications

More information

Configuring Secure Socket Layer HTTP

Configuring Secure Socket Layer HTTP This feature provides Secure Socket Layer (SSL) version 3.0 support for the HTTP 1.1 server and HTTP 1.1 client within Cisco IOS software. SSL provides server authentication, encryption, and message integrity

More information

Tivoli Directory Server Version 6.3, Fix Pack 17. Support for NIST SP A

Tivoli Directory Server Version 6.3, Fix Pack 17. Support for NIST SP A Tivoli Directory Server Version 6.3, Fix Pack 17 Support for NIST SP 800-131A Tivoli Directory Server Version 6.3, Fix Pack 17 Support for NIST SP 800-131A Note Before using this information and the product

More information

FUJITSU Software BS2000 internet Services. Version 3.4A May Readme

FUJITSU Software BS2000 internet Services. Version 3.4A May Readme FUJITSU Software BS2000 internet Services Version 3.4A May 2016 Readme All rights reserved, including intellectual property rights. Technical data subject to modifications and delivery subject to availability.

More information

Configuring VPN from Proventia M Series Appliance to Proventia M Series Appliance

Configuring VPN from Proventia M Series Appliance to Proventia M Series Appliance Configuring VPN from Proventia M Series Appliance to Proventia M Series Appliance January 13, 2004 Overview Introduction This document describes how to configure a VPN tunnel from one Proventia M series

More information

Designing Network Encryption for the Future Emily McAdams Security Engagement Manager, Security & Trust Organization BRKSEC-2015

Designing Network Encryption for the Future Emily McAdams Security Engagement Manager, Security & Trust Organization BRKSEC-2015 Designing Network Encryption for the Future Emily McAdams Security Engagement Manager, Security & Trust Organization BRKSEC-2015 What Could It Cost You? Average of $0.58 a record According to the Verizon

More information

Protecting SugarCRM with SafeNet Authentication Manager

Protecting SugarCRM with SafeNet Authentication Manager Protecting SugarCRM with SafeNet Authentication Manager Version 8.2 Integration Guide Copyright 2013 SafeNet, Inc. All rights reserved. All attempts have been made to make the information in this document

More information

BlackBerry Enterprise Server for IBM Lotus Domino Version: 5.0. Administration Guide

BlackBerry Enterprise Server for IBM Lotus Domino Version: 5.0. Administration Guide BlackBerry Enterprise Server for IBM Lotus Domino Version: 5.0 Administration Guide SWDT487521-636611-0528041049-001 Contents 1 Overview: BlackBerry Enterprise Server... 21 Getting started in your BlackBerry

More information

Upgrading the Server Software

Upgrading the Server Software APPENDIXB This appendix describes how to upgrade or reinstall the Cisco PAM server software, desktop client software, and Gateway module firmware. Contents Upgrade Notes for Release 1.5.0, page B-2 Obtaining

More information

NGFW Security Management Center

NGFW Security Management Center NGFW Security Management Center Release Notes 6.3.5 Revision A Contents About this release on page 2 System requirements on page 2 Build version on page 3 Compatibility on page 5 New features on page 5

More information

NGFW Security Management Center

NGFW Security Management Center NGFW Security Management Center Release Notes 6.3.7 Revision A Contents About this release on page 2 System requirements on page 2 Build version on page 3 Compatibility on page 5 New features on page 5

More information

NGFW Security Management Center

NGFW Security Management Center NGFW Security Management Center Release Notes 6.3.2 Revision A Contents About this release on page 2 System requirements on page 2 Build version on page 3 Compatibility on page 5 New features on page 5

More information

RSA BSAFE Crypto-J JSAFE and JCE Software Module 5.0 Security Policy Level 1 Roles, Authentication and Services

RSA BSAFE Crypto-J JSAFE and JCE Software Module 5.0 Security Policy Level 1 Roles, Authentication and Services Security Policy 01.02.11 RSA BSAFE Crypto-J JSAFE and JCE Software Module 5.0 Security Policy Level 1 Roles, Authentication and Services This document is a non-proprietary security policy for RSA BSAFE

More information

RSA BSAFE Crypto-J JSAFE and JCE Software Module 5.0 Security Policy Level 2 Roles, Authentication and Services

RSA BSAFE Crypto-J JSAFE and JCE Software Module 5.0 Security Policy Level 2 Roles, Authentication and Services Security Policy 01.02.11 RSA BSAFE Crypto-J JSAFE and JCE Software Module 5.0 Security Policy Level 2 Roles, Authentication and Services This document is a non-proprietary security policy for RSA BSAFE

More information

PGP(TM) Universal Server Version 3.2 Maintenance Pack Release Notes

PGP(TM) Universal Server Version 3.2 Maintenance Pack Release Notes PGP(TM) Universal Server Version 3.2 Maintenance Pack Release Notes Thank you for using this Symantec Corporation product. These Release Notes contain important information regarding this release of PGP

More information

Citrix XenApp and XenDesktop 7.15 LTSR FIPS Sample Deployments

Citrix XenApp and XenDesktop 7.15 LTSR FIPS Sample Deployments Citrix XenApp and XenDesktop 7.15 LTSR FIPS 140-2 Sample Deployments Contents Introduction... 2 Audience... 2 Security features introduced in XenApp and XenDesktop 7.15 LTSR... 2 FIPS 140-2 with XenApp

More information

SNMP Master Agent. Release Notes 8.5.x

SNMP Master Agent. Release Notes 8.5.x SNMP Master Agent Release Notes 8.5.x 12/17/2017 Table of Contents SNMP Master Agent 8.5.x Release Note 3 Known Issues and Recommendations 5 Release 8.5.1 7 8.5.100.08 8 8.5.100.07 9 8.5.100.03 10 8.5.100.02

More information

Enabling Single Sign-On Using Microsoft Azure Active Directory in Axon Data Governance 5.2

Enabling Single Sign-On Using Microsoft Azure Active Directory in Axon Data Governance 5.2 Enabling Single Sign-On Using Microsoft Azure Active Directory in Axon Data Governance 5.2 Copyright Informatica LLC 2018. Informatica and the Informatica logo are trademarks or registered trademarks of

More information

CCNA Exploration Network Fundamentals. Chapter 3 Application Layer Functionality and Protocols

CCNA Exploration Network Fundamentals. Chapter 3 Application Layer Functionality and Protocols CCNA Exploration Network Fundamentals Chapter 3 Application Layer Functionality and Protocols Application Layer Functionality and Protocols Applications: The Interface Between the Networks Horny/Coufal

More information

Secure Data Exchange Protocols

Secure Data Exchange Protocols COMPARISON GUIDE Secure Data Exchange Protocols Comparing transport protocols to securely exchange business data within and beyond the enterprise Table of Contents Introduction and Synopsis 3 Elements

More information

Device Registration Service

Device Registration Service Document Imaging Solutions Device Registration Service Installation Guide Version 7.12 Contents Introduction... 3 Product features... 3 Device Registration Service Pre-Requisites... 3 Component prerequisites...

More information

Definitions English Version Axway Global. English Version. Definitions. Version 1.0 of Thursday, February 09, 2017 Status: final

Definitions English Version Axway Global. English Version. Definitions. Version 1.0 of Thursday, February 09, 2017 Status: final Definitions Version 1.0 of Thursday, February 09, 2017 Status: final Axway, 2017 / Version February 2017 Analytics Event Appcelerator Dashboard Application Arrow Admin seat Arrow Developper seat Arrow

More information

Configuring VPN from Proventia M Series Appliance to NetScreen Systems

Configuring VPN from Proventia M Series Appliance to NetScreen Systems Configuring VPN from Proventia M Series Appliance to NetScreen Systems January 13, 2004 Overview This document describes how to configure a VPN tunnel from a Proventia M series appliance to NetScreen 208

More information

SSL/TLS Security Assessment of e-vo.ru

SSL/TLS Security Assessment of e-vo.ru SSL/TLS Security Assessment of e-vo.ru Test SSL/TLS implementation of any service on any port for compliance with industry best-practices, NIST guidelines and PCI DSS requirements. The server configuration

More information