SFTP Service (ORK-TR)
|
|
- Isabel Hart
- 6 years ago
- Views:
Transcription
1 SFTP Service (ORK-TR) Version 1.3 BME
2 VERSION CONTROL TABLE Version Date Changes / Modifications Author /10/2017 N/A Ignacio Herrero /10/2017 Corrections Ignacio Herrero /10/2017 Addition Annex SFTP keys generation Fernando Parra /11/2017 Adding screen captures amendments about downloading and installing WinSCP version for allowing the connection with a SFTP server. Page 23 Annex II. Fernando Parra SFTP SERVICE (ORK TR) Page 2 of 37
3 Nondisclosure This document contains information that must be confidentially stored and handled. Any reproduction, distribution, communication, transformation in whole or in part, free or onerous, by any means or processes, without the prior written permission of BME, is strictly forbidden. This document is strictly confidential. If you decided not to accept this project with BME, all copies of this document, together with the written confirmation of not having retained any copies of the document or its contents should be returned at our request. Personal data protection Although there is no treatment of personal data expected, in the event that BME would carry out any management of the personal data acknowledged as a result of this document, it would be carried out in accordance with the requirements of the Organic Law 15/1999, of December 13, for the Protection of Personal Data. SFTP SERVICE (ORK TR) Page 3 of 37
4 Index 1. INTRODUCTION MEMBER S FOLDERS WRITING AND READING RULES WRITING READING NOMENCLATURE INPUT OUTPUT CNMV FILE S NOMENCLATURE IN SFTP (ONLY FOR TR) CNMV FILES MAINTENANCE FILE CRYPTING CRYPTED FILES FOR BME CRYPTED FILES FOR MEMBERS AND ENTITIES SFTP CONNECTION PARAMETERS TRAINING PRODUCTION CONNECTIVITY FORM ANNEX ANNEX I: BASIC GPG COMMANDS How to create public/private keys How to export a public key How to import a public key How to encrypt a file How to decrypt files SFTP SERVICE (ORK TR) Page 4 of 37
5 10.2. ANNEX II: CLIENT SFTP USE EXAMPLE Downloading and installing WinSCP Spftware Download software Installation Configuration of the SFTP connection Public / Private key generation Public key generation Private key generation Authentication settings for the SFTP connection SFTP server connection SFTP SERVICE (ORK TR) Page 5 of 37
6 1. INTRODUCTION The present document provides a detailed description of the performance of the SFTP for the service STR, which we provide in BME. This service allows and provides the exchange of files through SFTP for the ORK and the RT, as well as the specific information considering every step of the process. 2. MEMBER S FOLDERS Each member will have a structure of folders exactly like in the example: As it can be observed from the screen shot above, each member will see inside his own SFTP folder, two subfolders, filesin and filesout. Inside the filesin folder, the members will upload the desired files they wish to send to BME, ORK and RT, since these are distinguished by the nomenclature. Inside the filesout folder, the members will receive the ORK and RT files sent from BME, since these are distinguished by the nomenclature. SFTP SERVICE (ORK TR) Page 6 of 37
7 3. WRITING AND READING RULES 3.1. WRITING The files must be written with the prefix TMP_ followed by the file name. Once the file has been written completely in the SFTP server, the file must be renamed, removing the prefix TMP_. The final nomenclature of the file is described in section 4 of this document. Example: Filename: INB_LEI1_LEI2_TIPO_AAAAMMDD_SEQ.EXT During the process of upload the file should be named TMP_ INB_LEI1_LEI2_TIPO_AAAAMMDD_SEQ.EXT Once the file is uploaded, it will be renamed with its definitive name: INB_LEI1_LEI2_TIPO_AAAAMMDD_SEQ.EXT 3.2. READING Only files beginning with OUT or INB should be collected, but never those starting with the prefix "TMP_", since the presence of this prefix indicates that the file is being written at that precise moment, and therefore, the file is not complete. 4. NOMENCLATURE The right nomenclature depends on if we are talking about an input file or an output file. The nomenclature which must be followed by the files will be the next one: 4.1. INPUT INB_LEI1_LEI2_TIPO_AAAAMMDD_SEQ.EXT_MD5 INB(3) INBOUND. Indicates an input file LEI1(20) LEI code of the member who is sending the file. LEI2(20) LEI code of the member by whom the file is being send. It can be the same as LEI1 if it matches TIPO(1 a 4) File type AAAAMMDD(8) File s creation date. SEQ(3) 3 digits sequency. Example: 001 SFTP SERVICE (ORK TR) Page 7 of 37
8 EXT(3) File extension. MD5(33) The md5 hash of the file will be included after the extension so that it can be validated that the file is the same in origin and destination. This hash is used to verify that the file has not undergone any modification, once received the file and checked, the hash can be removed so that the file remains with its correct extension OUTPUT OUT_LEI1_LEI2_TIPO_AAAAMMDD_SEQ.EXT_MD5 OUT(3) OUTBOUND. Indicates an output file LEI1(20) LEI code of the member who receives the sending. LEI2(20) LEI code of the member in the name of who we are making the sending. It can be the same that the LEI1 if both of them are matching. TIPO(4) File type AAAAMMDD(8) File s creation date. SEQ(3) 3 digits sequency. Example: 001 EXT(3) File extension. MD5(33) The md5 hash of the file will be included after the extension so that it can be validated that the file is the same in origin and destination. This hash is used to verify that the file has not undergone any modification, once received the file and checked, the hash can be removed so that the file remains with its correct extension. SFTP SERVICE (ORK TR) Page 8 of 37
9 5. CNMV FILE S NOMENCLATURE IN SFTP (ONLY FOR TR) 5.1. CNMV FILES Original file: SubmEnt_ExecEnt_FileType_Sequence-Version_Year.XML SFTP OUTPUT File : OUT_Lei1_SubmEnt_ExecEnt_FileType_Sequence-Version_Year.XML Renamed file to Lei1 folder: OUT_Lei1_SubmEnt_ExecEnt_FileType_Sequence-Version_Year.XML SubmEnt_ExecEnt_FileType_Sequence-Version_Year.XML SubmEnt (20 characters): This is the valid LEI code for the Entity sending the file, according to the technical instructions for reporting defined by CNMV, in this case, the LEI code for BME Regulatory Services. ExecEnt (20 characters): This is the valid LEI code for the Entity who executes the operations, according to the technical instructions for reporting defined by CNMV. FileType (3 characters): File type, the possible values will be TRA o REQ. Sequence: It is the numerical sequence of 6 positions filled with zeros from the left hand and beginning with "000001", at the level of each sent file by the sending Entity (SubmEnt) and file processed in the CNMV. Version: It is the numerical sequence of 2 positions filled with zeros from the left hand and starting with "00", which will be increased for the same file (SubmEnt + Sequence) if the file is rejected by file-level error by the CNMV. Year: It corresponds with the last 2 digits of the year which the file was sent. LEI1(20) LEI code of the member who receives the sending OUT(3) OUTBOUND. Indicates it is an output file. SFTP SERVICE (ORK TR) Page 9 of 37
10 6. MAINTENANCE The folder will include a Maintenance rule, to assure that if after 15, the clients have not downloaded the files, these ones will be deleted for the SFTP cages. 7. FILE CRYPTING The encrypted files must keep their original name. It is mandatory to include the.gpg extension, in order to clarify the name of the file that must be decrypted. Example: File OUT_LEI1_LEI2_TIPO_AAAAMMDD_SEQ.EXT_MD5 Crypted file: OUT_LEI1_LEI2_TIPO_AAAAMMDD_SEQ.EXT_MD5.gpg Once it is encrypted, the file: OUT_LEI1_LEI2_TIPO_AAAAMMDD_SEQ.EXT_MD5 must be named OUT_LEI1_LEI2_TIPO_AAAAMMDD_SEQ.EXT_MD5.gpg 7.1. CRYPTED FILES FOR BME In order to submit encrypted files to BME, files must be encrypted with the GPG public keys of BME. BME hast two Public keys, one for each environment. Test: Training: form_encrypt.asc -----BEGIN PGP PUBLIC KEY BLOCK----- Version: GnuPG v1 mqenbfhiw+abcacbau4o80hsj3d1wdutrxueqh86w9bsdcvlxj8du8oayhemrn49 jd7t/jidiesuzwxhw2oaqgheyzihknrqas+qhfvg9advtcjvgjpp21blkfreqafw qxmohsj0qs65cmghby/5oylsyzklugejkgnbsw0cnwndfgz6iwza01rzv96sqbb3 8wkWzJ69u4tlatn6qi3wqZIFgMlXAoD6yLXVLQ853k8f8L2DtEwKqYLEQ6wRu9tl 4dxKaJ976W7pvnHb8oxZrLZuWnZX6cNlJJeDVq0jvprYqGMY20GxWRU+0RIn4/6P w3t6f9f7m4vaadxj+qhevsqaczzqgsqnomy5abebaag0oujnrsbgb3jtievuy3j5 chrpb24gs2v5ichgb3jtksa8zm9ybv9lbmnyexb0qgdydxbvym1llmvzpokboaqt AQIAIgUCWGJb4AIbAwYLCQgHAwIGFQgCCQoLBBYCAwECHgECF4AACgkQ9bJsuU99 qygzeaf+nr+zwocn1fe+jh9glksmotyujzwj+g/syzdbus5lk6hvnjgrtoolchzv m9cwnqcknljixjaidui14ypjfdb68u3p+klzixu4rqb2ucplxuxro1i9zsooeldq GSkArK0fFI3JOkGgZ8jEY1+KqlPUw+l3VmQxGjL4Xwb2SyJ9Y5/OSa+IiNYD+PAU EkVwYzADM3sLPe2kLL1/7mKpLVCouCmFLWJ2vX8j/W+U16EpA/Nl6vOKrx9hTnYy 8xsJiLhgB0kINhv3/F5qmZZhSWpSqEe9nbMsi4KhXna3WVcqKkH+rjbLuomfmPAS KQCfcVPEom58lJ0XKfsyLEanxn3V9LkBDQRYYlvgAQgA0pZg+uvCBXRBzDuZWyeG q6dy0jq9okpusvub4wagfvhmxmvjjai0/7au4sc0iftco6e0f8cykswxhfqq0vie SFTP SERVICE (ORK TR) Page 10 of 37
11 mqlghhdk9jdeiy6t0esw5wxm9o1g/j8ytnh6ukbq/sv8qb2wgfovowru/k/vwru/ SwdBsBXKD5L1NQFSzhrDoUn2pbu3B7tCydKR+dDc9mm8780EJiX/cM8kB381rVmq LyfwhiHNPtmwAh0TsKRAvpXGpUQIF5kWky64Sp3OtpmcqY8CSKhGQICB8wY2UEiI O06ufE78NWzN19W+5Wmbgphlz3clz8HOoZzdmEAjelPKzkRJnxyPDwDP0Rh74LR2 7QARAQABiQEfBBgBAgAJBQJYYlvgAhsMAAoJEPWybLlPfamIREoH/3c7BnyUpZLV mok8lxzrpuyhtn7frj4avzqzl9aj538+la9sjk7f+dsosqvdy76g2kw6ksg5m5yh Ruc7y9FGBoY1hOvOLNx7I5DG2SyGjSKZcq3lJs5qPZ3N7WOF4wLOEHO3qh83tGda RP610zZQcYdxvxUNswsAh/5VZojqcxb9gERXhFfNvm94yuZ3YsZX+M/u5OXHhGmV IROOrLC7jTI4B/GatP+bxuFWNBOs+falrxQVfawiUYKZ0Cp1sgJH4Og2XRU/iabo 4tUJMKw3xOd6aTXip7EpNZDJKrUidUK8eA9jPJbmn+XwYNHO4FpMeXzgwJUbzaR1 /wcxukhag68= =Z1Sd -----END PGP PUBLIC KEY BLOCK----- Production: prod_encrypt.asc -----BEGIN PGP PUBLIC KEY BLOCK----- Version: GnuPG v1 mqenbfhiw64bcadodngkv+kedwamhxtsfmjcqt28oen7wcyhuhmwvfvoo9b1vlqh ZmCyANC7e0TnPnDsOf/6sBckZNGz5O4SWG1UsRb3nxD4oArvc9jjwYF/9maejUA+ 6S5HEupT+R8cpjcB9INvp92zn3muMXwsyAPaMiAwrS4FXZ3PYxZrGCNmmBL/eOJ/ vekmirpdu2gtxjs5a0tdx0n0twcc2lqkb/qgfa7mshmzh1tcpy1g2ta01wcp1fih NNd7wTTntGYpUTVDgunTi54tU5DasRqfdjUeCiWNqC4BwjE7IRnVNcWMMA/3alCL XvwMguE6tqQ+oj8l0xwR1s7WS8mpuHNwKW59ABEBAAG0OUJNRSBFbmNyeXB0aW9u IEtleSAoUHJvZHVjdGlvbiBLZXkpIDxlbmNyeXB0QGdydXBvYm1lLmVzPokBOAQT AQIAIgUCWGJbrgIbAwYLCQgHAwIGFQgCCQoLBBYCAwECHgECF4AACgkQeAOy8oqz djhxcagag6p0os2bwkurolssgn/axovxecezuz8cwkluooybf0yxsfcdup0x7bsl QQwSheC/RflFe5SU2uJSPUIQqbzih8lm7OrMmXapsO1ETlV0uFw157cv09Tg0g96 kpssl+d9/e3x9lz0pefwkuupne7eboso+olafe/q0mujhr6golxv1pured9c/1im HGMS1TP2TQyknAGyWpdzRZ90eSj3RamQ/Hpo9j4nG7F3Kxw3hodzYe17i9+BUDB0 /4Gm+Yurwidl7QE71ASRe6V80jWQWlBcQo7+/GzgFzzou22fvbeWQkR0UraM3IX4 mmeaqubt2hslwtxcnwgxs/alyddk57kbdqryyluuaqga0lr2b+m6hsulwhpcewcd AkhpfzrtY+JBmYXZxv2e7uL4Uvn68U2OES20QbOEyUDYy9R68zYA/Q4QEkCTn0Ow jnetp4cjqtjezusyirafhz8lxv7nhz3x2ybomjta6bkrnrahc486jshhqbfqs3ps 6E6UIEI7KgOkEBBJjAoj/D4JzWAxoxrU1Zoxb/VxFUVCi/BMIA0YXxPD/VHlzGrt hss+lmefioyh/mw9xsbynahrfxqyuizzl4x185qlb5wy2j3equdqo6o8smo5j3uq c5hxfr8mezt3vsb1w0mlfamhd0hvdbrywmeysuehrvpilhvomkkddkb+uewnlk0k iwaraqabiqefbbgbagajbqjyyluuahsmaaojehgdsvkks3y4rqih/1e4tdimj+/i FPK6gW1bJHipjs7Dlf+fzJYfnAEYBKunb66/fupm9i0bHLlnyuTnJjijosJ/shRb j4gfkw+2ovimsaitfh3zpov4ukjcgjeov/wu47xiyz9xar/guhlrumzqehxy9+cb a7pjzc6dowlyznfityqghwurccz4mohikhdizrrl3+iiorc17f68tlh5/a+tffin 1sUWNa/GO7KmL9DXlh82ZhqQhKcYsvURzq+jHxck8/cWgOWCntWiPVMXFtTrk+ml chaj0ltjzswiowji56x1g0wvte36typev3bdfjcldfc4x6ez0q4nekanufmsuagh HI7fdcmn9+mZAQ0EWGJb4AEIAJtpTg7zSFKPd3VZ1S2vFR6qHzpb0GwMJWVePx1T w5ricqxe3j2n3u38kgoj6xrnbefby4bccerhmkgsetbpl6ocvub0b1w1ynuaomnb VsuQWsRBp9arEygdInRCzrlyaAdvL/k7ItLLMqW6B4mQY0GxbRw3Cd0WBnqLBlrT Wtm/3pKptvfzCRbMnr27i2Vq2fqqLfCpkgWAyVcCgPrItdUtDzneTx/wvYO0TAqp gsrdrbg722xh3epon3vpbum+cdvyjfmstm5adlfpw2ukl4nwrso+mtioyxjbqbfz FT7REifj/o/De3p/1/ubi9pp3En5Ad69KppxlmqCyo06ZjkAEQEAAbQ5Qk1FIEZv cm0grw5jcnlwdglvbiblzxkgkezvcm0pidxmb3jtx2vuy3j5chraz3j1cg9ibwuu ZXM+iQE4BBMBAgAiBQJYYlvgAhsDBgsJCAcDAgYVCAIJCgsEFgIDAQIeAQIXgAAK CRD1smy5T32piBl4B/42v7NY5yfUV76Mf2CWSwyi1hQllaP6D+xjMMG6zmWTodWc mctm46vwfo+b0jaeoiqcsmlekcio4jxjkmmv0hry7c/6qtmlftitbva5ymvdtfe7 WL3NKigSV2oZKQCsrR8Ujck6QaBnyMRjX4qqU9TD6XdWZDEaMvhfBvZLIn1jn85J r4ii1gp48bqsrxbjmamzews97aqsvx/uyqktuki4kyutyna9fyp9b5txoskd82xq 84qvH2FOdjLzGwmIuGAHSQg2G/f8XmqZlmFJalKoR72dsyyLgqFedrdZVyoqQf6u Nsu6iZ+Y8BIpAJ9xU8SibnyUnRcp+zIsRqfGfdX0uQENBFhiW+ABCADSlmD668IF dehmo5lbj4aronjqmr2gqlrjw5vhzqavuczexwmkajt/tq7ixzsiw0kjotqxwjgp SFTP SERVICE (ORK TR) Page 11 of 37
12 JbEcWpDRWJ6aouAeF0r0kN6LLpPQRJbnBcz2jWD+PzK00fpQoGr+y/yoHbCB+hWh ZG78r9XCu79LB0GwFcoPkvU1AVLOGsOhSfalu7cHu0LJ0pH50Nz2abzvzQQmJf9w zyqhfzwtwaovj/cgic0+2bachrowpec+lcalragxmratlrhknc62mzypjwjiqeza gihzbjzqsig7tq58tvw1bm3x1b7lazucmgxpdyxpwc6hnn2yqcn6u8roremfhi8p AM/RGHvgtHbtABEBAAGJAR8EGAECAAkFAlhiW+ACGwwACgkQ9bJsuU99qYhESgf/ dzsgfjslktwy4ryxfle9rgdm3t+snhpvlbkv1onnfz6ud1ikrsx52yiypv1jvoby pbopibmblifg5zvl0uyghjwe684s3hsjkmbzlianiplyreumzmo9nc3ty4xjas4q c7eqhze0z1pe/rxtnlbxh3g/fq2zcwch/lvmiopzfv2arfeev82+b3jk5ndixlf4 z+7k5ceeazuhe46sslunmjgh8zq0/5vg4vy0e6z59qwvfbv9rcjrgpnqknwyakfg 6DZdFT+Jpuji1QkwrDfE53ppNeKnsSk1kMkqtSJ1Qrx4D2M8luaf5fBg0c7gWkx5 fodalrvnphx/alfqqecdr5kbdqryylv+aqgarbu4t0nbyrm7urad6l7eexndbjan man0hjmcnr9ptvqjpgbyyw4ouzg787g1sdbwiffr3wpu6rx/+dlsmtym0mwnjn4u tjcr+yonqvab6kwfvgfol4ou1hprpvsfd9kyzc+ecxuwiioaui2yrsgm+zee21nw xssjlbw70bn3nwbg73mms5l1l8nqaf4rsmtrzpwsp0xwt4pei2z8nat3/zc6viuu ZF7AaMAauLRJg7jpYAoO/mlj/MvflGFqqFfu0gqiGkp8ufA4iuM8qK/TqqAoFULL 5X4Ve/WENqMGP//3zXAE4sDze1zejC+QPi6jajARVNPA4ALI54gUkMBaZwARAQAB tdlctuugvgvzdcbfbmnyexb0aw9uietlesaovgvzdckgphrlc3rfzw5jcnlwdebn cnvwb2jtzs5lcz6jatgeewecacifalhiw/4cgwmgcwkibwmcbhuiagkkcwqwagmb Ah4BAheAAAoJEMcEF1rRuWG/+dQH/2b1mo+2cTOcDFn2ApPhcLXX63bMYRlvDGUV YL8/NOG0RTeFl+7J0iyOk854XDArH5h7sd1osVWYVhciZu0x7XgEcApXjYJgjCtK QjahuJ1TXfHcTuZyEUtJo3e13ipnB9XGd/o3wgim2CBIkqJ1estEVyL4OXoVAttX 4Ool1aXoymcctYVleSiqH6iGtAPKfzkmIVfsrGTyFPas/PKzURi/yyfsM3vBoSIf 0aUOO0uu9AiXZQsKuU9uSMcOxvtT03CU7ijn0J8N7Sj13Xl210AKQxgGYhiqnCnz 77WAx6Vd1bngNDY4qWdxLgv8nq5+DhsU9Glrx20BODJHxXAO7vK5AQ0EWGJb/gEI ANCjFLwkYsTrK/yQnPmKHedzQOC3KGFV6NCKbx1wA5nd4GfDtoe8ciy+s/IZEsVn 7TRyJIIhUsjIEj7OR+3gQIXM9/+wuwipvjefZvidEIyGtli9qCILmVIz0/Udgywi OnBRbxxdHmpajrQVkc2dTU60j5XRTvW79vIjXZtEYypm9bjd8tokoXx/ixsBg0nb TQ+j/EVNKHLNUxTGiVxUriBovPat1NKmJfuyhWzUNp34sRFCE9tNexG+WJCLB3uK jrt8o3by6zbo0ul/xira6z665djfp17ln9fea5bjoocpcts4rtbdcerzuia/muit lammqvaims+pfjx+nbnwsimaeqeaaykbhwqyaqiacqucwgjb/gibdaakcrdhbbda 0blhv+BUB/9AFnDGTGPxkXkbYFofy1RM+lf+1EnyOSDuvNzt6ur3kRil3Lh51YB9 vmp3wpdznfbygl7y65qte5mdgkktri2ryazb9ujofmf2ffvseycfsgjsxchtkaet 1fqMieNb84hmgS8KVhw5qyLnhbTH266VAOBLF3Sv9l+odjNENFmALcWqebkQOlhi wkwxooj5cafl1wjzsduixhv6go7v8h3t8nydw4hwwlwymdg+vyllhyaguen2hwvv NQOlwRjAuwipceQPmjsd+GJPWcMHU6ocH3thR81pfFY3xLa7R3Yv6KMVjsQv0ru0 M4WCvj7uCGBL4wu+1Gk7r5H6FaynE3Y6 =sw/o -----END PGP PUBLIC KEY BLOCK CRYPTED FILES FOR MEMBERS AND ENTITIES Any member or entity that receives encrypted files from BME, must have or create a couple of GPG keys, one public key and one private key, for each service. Once the keys have being created, each member or entity must send BME the public keys in order to allow BME encrypt the files with this keys. Only the owner of the private key will be able to decrypt the files. All the files created by BME will also be encrypted with BMEs public key, as a result BME will be able to decrypt all the files in order to ensure a file is never unusable. SFTP SERVICE (ORK TR) Page 12 of 37
13 8. SFTP CONNECTION PARAMETERS There are two environnement for the STR SFTP service, training and production. For connecting with this services it is necessary a SFTP client software installed in your operating system. You can download some free clients in internet for the most common operating systems. Next you can read,below, the connection parameters for the SFTP services. The software client used to connect must be compatible with the connection parameters TRAINING IP: Port: Authentication Method: Using User and public key SSH-RSA 2048 BITS Key Exchange algorithm allowed (KexAlgorithms): diffie-hellman-group-exchange-sha256 Message Authentication Code algorithm allowed (MACs): hmac-sha2-512,hmac-sha2-256 Ciphers allowed (Ciphers): aes256-ctr,aes192-ctr,aes128-ctr 8.2. PRODUCTION IP: Port: Authentication Method: Using User and public key SSH-RSA 2048 BITS Key Exchange algorithm allowed (KexAlgorithms): diffie-hellman-group-exchange-sha256 Message Authentication Code algorithm allowed (MACs): hmac-sha2-512,hmac-sha2-256 Ciphers allowed (Ciphers): aes256-ctr,aes192-ctr,aes128-ctr SFTP SERVICE (ORK TR) Page 13 of 37
14 9. CONNECTIVITY FORM ORK-TR Connectivity form Training Environnement Once the fields in salmon color are filled you must send back the form in an editable format. BME will implement the configuration tasks, will fill all the form fields in BLUE and will take back the form for the connectivity tasks. Entity name Entity Data Contact person: Contact Phone: Contact emial address 0.- Request type. Production Environnemennt. For modifications, it is necessasry highlight the modifcations for its monitoring remarqued in YELLOW Add Delete Modification Date Comments SFTP SERVICE (ORK TR) Page 14 of 37
15 Complete the fields for configuring the connectivity ID of the submitting Entity LEI Code Description ID of the entity owner of the information LEI Code Description ID of the entity owner of the information LEI Code Description ID of the entity owner of the information LEI Code Description ID of the entity owner of the information LEI Code Description ID of the entity owner of the information LEI Code Description ID of the entity owner of the information LEI Code Description ID of the entity owner of the information LEI Code Description ID of the entity owner of the information LEI Code Description SFTP SERVICE (ORK TR) Page 15 of 37
16 1.- SFTP Connectivity Required: Connection to the BME net Open SSH 7.4 Client (Winscp, Filezilla, etc..) A couple of SSH-2 RSA private/public key must be created, with encodying of 2048 bts.the public key must be sended to BME in a text file format. If the connection is done through the shared net lines for another services, it will be configured a bandwidth no bigger than 0, 5 Mb. EOF format is windows mandatory. (CRLF) Client SFTP IP adddress (NAT address to be presented to BME) Filename with the SSH public key Filenames with the GPG encoding public keys (extension.asc) Entity Technical data Technical Data provided by BME Protocol SFTP SFTP server port in BME Internet SFTP server IP address User code (LEI code in lower case) Subfolder in the BME server where you can download the entity files Subfolder in BME server where you can upload your entity files. fstr_lei /filesout /filesin Comments: SFTP SERVICE (ORK TR) Page 16 of 37
17 ORK-TR Connectivity form Production Environnement Once the fields in salmon color are filled you must send back the form in an editable format. BME will implement the configuration tasks, will fill all the form fields in BLUE and will take back the form for the connectivity tasks. Entity Data Entity name Contact person: Contact Phone: Contact emial address 0.- Request type. Production Environnemennt. For modifications, it is necessasry highlight the modifcations for its monitoring remarqued in YELLOW Add Delete Modification Date Comments SFTP SERVICE (ORK TR) Page 17 of 37
18 Complete the fields for configuring tehe connectivity ID of the submitting entity LEI Code Description ID of the entity owner of the information LEI Code Description ID of the entity owner of the information LEI Code Description ID of the entity owner of the information LEI Code Description ID of the entity owner of the information LEI Code Description ID of the entity owner of the information LEI Code Description ID of the entity owner of the information LEI Code Description ID of the entity owner of the information LEI Code Description ID of the entity owner of the information Código LEI Description SFTP SERVICE (ORK TR) Page 18 of 37
19 1 SFTP Connectivity Required: Connection to the BME net Open SSH 7.4 Client (Winscp, Filezilla, etc.) A couple of SSH-2 RSA private/public key must be created, with encodying of 2048 bts.the public key must be sended to BME in a text file format. If the connection is done through the shared net lines for another services, it will be configured a bandwidth no bigger than 0, 5 Mb. EOF format is windows mandatory. (CRLF) Client SFTP IP adddress (NAT address to be presented to BME) Filename with the SSH public key Filenames with the GPG encoding public keys (extension.asc) Entity Technical data Technical Data provided by BME Protocol SFTP SFTP server port in BME Internet SFTP server IP address User code (LEI code in lower case) Subfolder in the BME server where you can download the entity files Subfolder in BME server where you can upload your entity files. pstr_lei /filesout /filesin Observaciones: SFTP SERVICE (ORK TR) Page 19 of 37
20 10. ANNEX ANNEX I: BASIC GPG COMMANDS How to create public/private keys. For the creation of the keys the following instruction must be executed: gpg --gen-key The system will ask for the kind of key. RSA and RSA option must be selected. Please select the type ok key desired: (1) RSA y RSA (default) (2) DSA y Elgamal (3) DSA (only firm) (4) RSA (only firm) Por favor seleccione tipo de clave deseado: (1) RSA y RSA (predeterminado) (2) DSA y Elgamal (3) DSA (sólo firmar) (4) RSA (sólo firmar) After that, you have to introduce the size of the key. The recommended size is 2048 bits. RSA keys size can be between 1024 and 4096 bits. Key size? (2048) Normally the key has an expiration date. If you do not want the key to expire, please select the option 0. Please, indicates the value time for the key. 0 = The key never expires SFTP SERVICE (ORK TR) Page 20 of 37
21 <n> = The key expires in n days <n>w = The key expires in n weeks <n>m = The key expires in n months <n>y = The key expires in n years key value(0)? 0 Por favor, especifique el período de validez de la clave. 0 = la clave nunca caduca <n> = la clave caduca en n días <n>w = la clave caduca en n semanas <n>m = la clave caduca en n meses <n>y = la clave caduca en n años Validez de la clave (0)? 0 Finally, it s necessary to introduce the id for the key use. It s important to remember this id for the export and decrypt files actions. The data required are: Name and surname, address (which will be used for the exportation) and comments How to export a public key For the exportation proccess you must use the id mentioned in the generation key process. You can use name as well, name, username or address. In the example below, we will use the address and the command will create a file with the name clave.asc : gpg --export --armor correo@dominio.com > clave.asc How to import a public key The process requires the execution of this command gpg --import clave.asc SFTP SERVICE (ORK TR) Page 21 of 37
22 How to encrypt a file The file encryption requires as well the id and the key with which we want to make the decrypt action. You can use as well the name, surname or address. gpg --output fichero.gpg --encrypt r correo@dominio.com fichero How to decrypt files Decrypting files command: gpg --output doc --decrypt doc.gpg SFTP SERVICE (ORK TR) Page 22 of 37
23 10.2. ANNEX II: CLIENT SFTP USE EXAMPLE Downloading and installing WinSCP Spftware This guide contains simplified description of downloading and installing WinSCP, for allowing the connection with a SFTP server Download software The software is available in the link below. Download will start automatically Installation Open the installation program by double clicking on its icon. The software will select automatically the OS language. On Welcome and License Agreement screens click Next. SFTP SERVICE (ORK TR) Page 23 of 37
24 You will be prompted to select a setup type. For basic setup, choose Typical Installation. Keep default values for NC or Commander interface and click Next SFTP SERVICE (ORK TR) Page 24 of 37
25 After you select the interface, the Ready to Install screen opens. On this screen, you can review the installation options you have selected. Click Install to start the installation A brief installation process will take place. You may have to restart your computer. If you choose not to restart, some WINSCP functions may not be available until you do so. SFTP SERVICE (ORK TR) Page 25 of 37
26 Configuration of the SFTP connection Start the WinSCP application. Before you connect, you need to know at least: Host Number : IP Address File Protocol : SFTP Port : 22 User name : Account username Select your File Protocol, enter your host name to Host name field and username to User name field After that some configurations ítems must be changed. To do that we select Preferences option like in the image below. SFTP SERVICE (ORK TR) Page 26 of 37
27 In order to generate the logs files, click the option marked in yellow in the image. To prevent the automatic upgrading of the software it is necessary to uncheck the option marked in yellow in the Update menú. SFTP SERVICE (ORK TR) Page 27 of 37
28 Public / Private key generation For connecting to the SFTP server using a public key authentication or SSH Keys instead you need to generate a key pair using the PuTTYgen application. You will find this application into the Tools Menu SFTP SERVICE (ORK TR) Page 28 of 37
29 Select the Run PuTTYgen option. At this moment, you have to generate a new public/private key pair Public key generation Press Generate button and follow the instructions. SFTP SERVICE (ORK TR) Page 29 of 37
30 Generate some randomness by moving the mouse over the blank area marked in red below Once you have generated the key, click Save public Key button SFTP SERVICE (ORK TR) Page 30 of 37
31 Click on the affirmative option Choose the location where you want to save the public key. SFTP SERVICE (ORK TR) Page 31 of 37
32 After that, we proceed in the same way with the Private Key. SFTP SERVICE (ORK TR) Page 32 of 37
33 Private key generation Click in the Save private key button. In the new Windows that appears, choose the affirmative option. Choose the location where you want to save the private key SFTP SERVICE (ORK TR) Page 33 of 37
34 At this point, we have finished with the creating keys application. SFTP SERVICE (ORK TR) Page 34 of 37
35 Authentication settings for the SFTP connection We continue, in the Login-WinSCP window, clicking in the Advanced button. In the new Windows we choose the SSH > Authentication option SFTP SERVICE (ORK TR) Page 35 of 37
36 Check the Allow agent forwarding option and select the private key file Click in OK button At this point, the creating public/private key process has finished. SFTP SERVICE (ORK TR) Page 36 of 37
37 SFTP server connection For establishing the connection, just select the connection created and click the Login button SFTP SERVICE (ORK TR) Page 37 of 37
Due: October 8, 2013: 7.30 PM
Jackson State University Department of Computer Science CSC 437-01/539-01 Computer Security Fall 2013 Instructor: Dr. Natarajan Meghanathan Lab Project # 1: Lab Project on using PGP GNU Privacy Guard (GPG)
More informationSterling Money Market Data Collection: Technical instructions for the transmission
Sterling Money Market Data Collection: Technical instructions for the transmission of form SMMD Version 5.0 February 2017 Contents page 1. Introduction...3 2. Transfer Process...4 2.1. Sending files...4
More informationTable of Contents 1 SSH Configuration 1-1
Table of Contents 1 SSH Configuration 1-1 SSH Overview 1-1 Introduction to SSH 1-1 Algorithm and Key 1-1 Asymmetric Key Algorithm 1-2 SSH Operating Process 1-2 Configuring the SSH Server 1-4 SSH Server
More informationContents. Configuring SSH 1
Contents Configuring SSH 1 Overview 1 How SSH works 1 SSH authentication methods 2 SSH support for Suite B 3 FIPS compliance 3 Configuring the device as an SSH server 4 SSH server configuration task list
More informationFWB / Eurex Client & Member Reference Data Upload How to connect via SFTP & upload Files
FWB / Eurex Client & Member Reference Data Upload How to connect via SFTP & upload Files Version 1.33 November 2017 Table of Content 1. Introduction... 3 2. Technical Pre-Conditions... 3 2.1. Hardware
More informationFile transfer clients manual File Delivery Services
File transfer clients manual File Delivery Services Publisher Post CH Ltd Information Technology Webergutstrasse 12 CH-3030 Berne (Zollikofen) Contact Post CH Ltd Information Technology Webergutstrasse
More informationRegulatory Reporting Hub SFTP Connection How to connect via SFTP & upload Files
SFTP Connection How to connect via SFTP & upload Files Version 1.3 November 2017 Table of Content 1. Introduction... 2 2. Technical Pre-Conditions... 2 2.1. Hardware requirements... 2 2.2. Software requirements...
More informationGetting Started Keybox Management
Integration Console Getting Started Keybox Management version 0.6 Contents Welcome 3 Contact us 3 Getting Started 6 Create a Google Account 6 Requirements 6 Register your Google Account 6 Log into Integration
More informationRegulatory Reporting Hub SFTP Connection How to connect via SFTP & upload Files
SFTP Connection How to connect via SFTP & upload Files Version 1.2 October 2017 Table of Content 1. Introduction... 2 2. Technical Pre-Conditions... 2 2.1. Hardware requirements... 2 2.2. Software requirements...
More informationLab: Securing with PGP
Objectives Understand the concept of public keys, signing, and encrypting email with PGP. Background GNUPG (or GNU Privacy guard) is a free implementation of the OpenPGP standard (RFC 4880) as a tool for
More informationSetting up PuTTY. Version Updated for 2015 Fall (with corrections)
Setting up PuTTY CTEC1330 Data and Telecommunications CTEC1767 Data Communications & Networking I CTEC1863 Operating Systems CTEC1906 Internet Computing Version 1.9.2 Updated for 2015 Fall (with corrections)
More informationSetting up PuTTY. Software* Downoad PuTTY. Download PuTTY Download the putty.zip file. It contains several programs for SSH, SFTP, and SCP.
Software* Setting up PuTTY Microsoft Windows 7 PuTTY 0.65 PuTTYgen 0.65 WinSCP 5.7.5 CTEC1330 Data and Telecommunications CTEC1767 Data Communications & Networking I CTEC1863 Operating Systems CTEC1906
More informationYou can use the WinSCP program to load or copy (FTP) files from your computer onto the Codd server.
CODD SERVER ACCESS INSTRUCTIONS OVERVIEW Codd (codd.franklin.edu) is a server that is used for many Computer Science (COMP) courses. To access the Franklin University Linux Server called Codd, an SSH connection
More information2. GETTING STARTED SECURE FILE TRANSFER PROTOCOL (SFTP) PROCEDURES A. Secure File Transfer Protocol (SFTP) Procedures
A. Secure File Transfer Protocol (SFTP) Procedures Overview A. IEHP utilizes the Secure File Transfer Protocol (SFTP) server to conduct all electronic data file transactions. Some of the benefits to using
More informationSSH Algorithms for Common Criteria Certification
The feature provides the list and order of the algorithms that are allowed for Common Criteria Certification. This module describes how to configure the encryption, Message Authentication Code (MAC), and
More informationSupport Backups and Secure Transfer Server Changes - i-cam
Support Backups and Secure Transfer Server Changes - i-cam 3.1.24 Contents What is the Secure Transfer Server?... 2 Initial Setup in i-cam 3.1.24... 2 Getting your account credentials... 2 Setting your
More informationSetting up PuTTY. CTEC1767 Data Communications & Networking CTEC1863 Operating Systems CTEC1906 Internet Computing
Setting up PuTTY CTEC1767 Data Communications & Networking CTEC1863 Operating Systems CTEC1906 Internet Computing Version 2.0 Updated for 2017 Winter Software* Microsoft Windows 7 (64-bit) PuTTY 0.67 PuTTYgen
More informationJoint Venture Hospital Laboratories. Secure File Transfer Protocol (SFTP) Secure Socket Shell (SSH) User s Guide for plmweb.jvhl.
Joint Venture Hospital Laboratories Secure File Transfer Protocol (SFTP) Secure Socket Shell (SSH) User s Guide for plmweb.jvhl.org For Secure File Transfers via the Internet Introduction Version 2.2 April
More informationQuick Reference Guide. Online Courier: File Transfer Protocol (FTP) Signing On. Using FTP Pickup
Quick Reference Guide Online Courier: File Transfer Protocol (FTP) With SunTrust Online Courier, you can have reports and files delivered to you using a File Transfer Protocol (FTP) connection. There are
More informationKB How to upload large files to a JTAC Case
KB23337 - How to upload large files to a JTAC Case SUMMARY: This article explains how to attach/upload files larger than 10GB to a JTAC case. It also and describes what files can be attached/uploaded to
More informationSSH PK Authentication and Auto login configuration for Chassis Management Controller
SSH PK Authentication and Auto login configuration for Chassis Management Controller Dell technical white paper Dell Engineering May 2016 Author: Elangovan G Revisions Date August 2013 May 2016 Description
More informationBitnami Apache Solr for Huawei Enterprise Cloud
Bitnami Apache Solr for Huawei Enterprise Cloud Description Apache Solr is an open source enterprise search platform from the Apache Lucene project. It includes powerful full-text search, highlighting,
More informationLAB :: PGP (Pretty Good Privacy)
LAB :: PGP (Pretty Good Privacy) GnuPG : GnuPG forms the heart of Gpg4win the actual encryption software. Kleopatra : The central certificate administration of Gpg4win, which ensures uniform user navigation
More informationDOWNLOADING AND DECRYPTING FILES GUIDE
TRICARE Management Activity DOWNLOADING AND DECRYPTING FILES GUIDE FOR 703 PHARMACY REFUNDS Version 1.0 DATE OF RELEASE 29 June 2012 A STFP client is mandatory to download the utilization files. If the
More informationUpgrading from Call Center Reporting to
Upgrading from Call Center Reporting to Reporting for Call Center Upgrade Document Reporting for Call Center Release 2.2.1xx Document Number: 200-0400-110 Document Status: Standard Document Version: 3.02
More informationFirewalls can prevent access to the Unix Servers. Please make sure any firewall software or hardware allows access through Port 22.
EINSTEIN OVERVIEW Einstein (Einstein.franklin.edu) and Codd (codd.franklin.edu) are two servers that are used for many Computer Science (COMP) courses. Students will be directed to use either Einstein
More information2. GETTING STARTED A. Secure File Transfer Protocol Procedures
OVERVIEW: A. IEHP utilizes the Secure File Transfer Protocol (SFTP) server to conduct all electronic data file transactions. Some of the benefits of using the SFTP are: 1. SFTP Is A Standard Protocol For
More informationCryptography Application : SSH. Cyber Security & Network Security March, 2017 Dhaka, Bangladesh
Cryptography Application : SSH Cyber Security & Network Security 20-22 March, 2017 Dhaka, Bangladesh Issue Date: [31-12-2015] Revision: [v.1] What is Safely Authentication I am Assured of Which Host I
More informationLecture 30. Cryptography. Symmetric Key Cryptography. Key Exchange. Advanced Encryption Standard (AES) DES. Security April 11, 2005
Lecture 30 Security April 11, 2005 Cryptography K A ciphertext Figure 7.3 goes here K B symmetric-key crypto: sender, receiver keys identical public-key crypto: encrypt key public, decrypt key secret Symmetric
More informationTRICARE MANAGEMENT ACTIVITY UNIFORM FORMULARY VOLUNTARY RETAIL AGREEMENTS DOWNLOADING & DECRYPTING FILES GUIDE
TRICARE MANAGEMENT ACTIVITY UNIFORM FORMULARY VOLUNTARY RETAIL AGREEMENTS DOWNLOADING & DECRYPTING FILES GUIDE A STFP client is mandatory to download the utilization files. If the manufacturer already
More informationMoveIT DMZ User Guide
MoveIT DMZ User Guide December 10, 2014 1 Index MoveIT DMZ Introduction... 1 Initial Login and Password Change... 2 Navigation... 8 Installation Instructions for the Upload / Download Wizard... 12 Uploading
More informationWinSCP. Author A.Kishore/Sachin
WinSCP WinSCP is a freeware windows client for the SCP (secure copy protocol), a way to transfer files across the network using the ssh (secure shell) encrypted protocol. It replaces other FTP programs
More informationSSH. What is Safely 6/19/ June 2018 PacNOG 22, Honiara, Solomon Islands Supported by:
SSH 25-29 June 2018 PacNOG 22, Honiara, Solomon Islands Supported by: Issue Date: Revision: 1 What is Safely Authentication I am Assured of Which Host I am Talking With Authentication - The Host Knows
More informationROC Site Instructions for using Medtronic CODE STAT software
ROC Site Instructions for using Medtronic CODE STAT software All ECG files that are uploaded to ROC cases must have all patient identifiers removed. The following are instructions for configuring and using
More informationIP Security. Have a range of application specific security mechanisms
IP Security IP Security Have a range of application specific security mechanisms eg. S/MIME, PGP, Kerberos, SSL/HTTPS However there are security concerns that cut across protocol layers Would like security
More informationInstalling the WinSCP Secure FTP Client
Draft 0.9 Page 1 of 6 Installing the WinSCP Secure FTP Client This document will instruct you to install the WinSCP application that will provide Secure FTP (SFTP) access to your website folder. So why
More informationUsing keys with SSH Rob Judd
Using keys with SSH Rob Judd (rjudd@mlug.missouri.edu) Introduction SSH is a drop-in replacement for telnet that allows encrypted network connections. There are two main versions, 1.5 SSH-1 and 2.0 SSH-2
More informationApptix Online Backup by Mozy User Guide
Apptix Online Backup by Mozy User Guide 1.10.1.2 Contents Chapter 1: Overview...5 Chapter 2: Installing Apptix Online Backup by Mozy...7 Downloading the Apptix Online Backup by Mozy Client...7 Installing
More informationStudent Website Setup
In this course, students upload assignments to their websites hosted on the coislinux.austincc.edu server in addition to submitting to Blackboard (Bb). Each student is supplied with a password protected
More informationFirewalls, Tunnels, and Network Intrusion Detection
Firewalls, Tunnels, and Network Intrusion Detection 1 Firewalls A firewall is an integrated collection of security measures designed to prevent unauthorized electronic access to a networked computer system.
More informationTRIM Document Queue Instructions
TRIM Document Queue Instructions Document Queues allow TRIM/Records Online users to process large numbers of documents, using templates with predefined, rule based values. To begin, create a folder to
More informationZen Internet. Online Data Backup. Zen Vault Express for Mac. Issue:
Zen Internet Online Data Backup Zen Vault Express for Mac Issue: 2.0.08 Tel: 01706 90200 Fax: 01706 902005 E-mail: info@zen.co.uk Web: www.zen.co.uk Zen Internet 2015 Contents 1 Introduction... 3 1.1 System
More informationRead Naturally SE Update Windows Network Installation Instructions
Windows Network This document explains how to apply the Read Naturally Software Edition 2.0.3 update to existing installations of SE version 2.0, 2.0.1, or 2.0.2. First update the SE server software, and
More informationCryptography Application : SSH. 7 Sept 2017, Taichung, Taiwan
Cryptography Application : SSH 7 Sept 2017, Taichung, Taiwan What is Safely Authentication I am Assured of Which Host I am Talking With Authentication - The Host Knows Who I Am The Traffic is Encrypted
More informationDisplaying SSL Configuration Information and Statistics
CHAPTER 7 Displaying SSL Configuration Information and Statistics This chapter describes the show commands available for displaying CSS SSL configuration information and statistics and an explanation of
More informationCLIENT DATABASE SECURITY
CLIENT DATABASE SECURITY 1502 RXR Plaza 15th Floor, West Tower Uniondale, NY 11556 Telephone: (516) 227-6600 Facsimile: (516) 227-1799 Website: http://www.openlink.com Revision History Document Name Date
More informationImplementing Secure Shell
Implementing Secure Shell Secure Shell (SSH) is an application and a protocol that provides a secure replacement to the Berkeley r-tools. The protocol secures sessions using standard cryptographic mechanisms,
More informationVolume. Enterprise Secure File Transfer (ESFT) User Guide
Volume Enterprise Secure File Transfer (ESFT) User Guide Date: 04/08/2015 Copyright 2011, PG&E Fo r PG&E internal use o nly All rights reserved. Legal Notices Pacific Gas and Electric Co. (hereinafter
More informationAdobe Marketing Cloud Using FTP and sftp with the Adobe Marketing Cloud
Adobe Marketing Using FTP and sftp with the Adobe Marketing Contents Using FTP and sftp with the Adobe Marketing...3 Setting Up FTP Accounts Hosted by Adobe...3 Classifications...3 Data Sources...4 Data
More informationAT&T Global Network Client for Mac User s Guide Version 2.0.0
Version 1.7.0 AT&T Global Network Client for Mac User s Guide Version 2.0.0 experience may vary. This document is not an offer, commitment, representation or warranty by AT&T and is subject to change..
More informationStudent Website Setup
In this course, students upload assignments to their websites hosted on the coislinux.austincc.edu server. Each student is supplied with a password protected account to access their individual websites.
More informationEnd User Manual. December 2014 V1.0
End User Manual December 2014 V1.0 Contents Getting Started... 4 How to Log into the Web Portal... 5 How to Manage Account Settings... 6 The Web Portal... 8 How to Upload Files in the Web Portal... 9 How
More informationParental Webcam. User Guide
Parental Webcam User Guide 1 Table of Contents 1 Opening an Account 3 1.1 The Unique Nursery Code 3 1.2 Your Details 4 2 Logging In 5 2.1 Forgotten / Changing your Password 5 3 Viewing a Camera 8 3.1 The
More informationClassroom Practice Labs Administration Portal User Guide
gtslearning.com Classroom Practice Labs Administration Portal User Guide Contents User Guide... 1 Accessing the portal... 1 User Administration... 2 Creating Users accounts (Individually)... 3 Amend an
More informationRicoh Managed File Transfer (MFT) User Guide
Ricoh Managed File Transfer (MFT) User Guide -- TABLE OF CONTENTS 1 ACCESSING THE SITE... 3 1.1. WHAT IS RICOH MFT... 3 1.2. SUPPORTED BROWSERS... 3 1.3. LOG IN... 3 1.4. NAVIGATION... 4 1.5. FORGOTTEN
More informationSecure IIS Web Server with SSL
Publication Date: May 24, 2017 Abstract The purpose of this document is to help users to Install and configure Secure Socket Layer (SSL) Secure the IIS Web server with SSL It is supported for all EventTracker
More informationAuthor A.Kishore/Sachin WinSCP
WinSCP WinSCP is a freeware windows client for the SCP (secure copy protocol), a way to transfer files across the network using the ssh (secure shell) encrypted protocol. It replaces other FTP programs
More informationManagement Access. Configure Management Remote Access. Configure ASA Access for ASDM, Telnet, or SSH
This chapter describes how to access the Cisco ASA for system management through Telnet, SSH, and HTTPS (using ASDM), how to authenticate and authorize users, and how to create login banners. Configure
More informationSetting up PuTTY. Software* Download PuTTY 6/9/18. Microsoft Windows 7 (64-bit) PuTTY 0.70 (64-bit) PuTTYgen 0.70 (64-bit) WinSCP 5.13.
Software* Setting up PuTTY CTEC1767 Data Communications & Networking CTEC1863 Operating Systems CTEC1906 Internet Computing Microsoft Windows 7 (64-bit) PuTTY 0.70 (64-bit) PuTTYgen 0.70 (64-bit) WinSCP
More informationUNIVERSITY OF NORTH TEXAS DEPARTMENT OF LEARNING TECHNOLOGIES SPRING
How-To Set Up Your Classes Web Space Windows and Mac Go to https://classes.lt.unt.edu/ (1) In the menu bar Click Register (2) Use your regular EUID (abc1234 format) and password. (3) Choose your role and
More informationPrinter Driver User Guide
PRINT COPY SCAN FAX ECOSYS M660idn ECOSYS M655idn ECOSYS M65idn ECOSYS M65dn Printer Driver User Guide PRINT COPY SCAN ECOSYS M5idn ECOSTS M5dn Legal Notes Unauthorized reproduction of all or part of this
More informationTransport Level Security
2 Transport Level Security : Security and Cryptography Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 28 October 2013 css322y13s2l12, Steve/Courses/2013/s2/css322/lectures/transport.tex,
More informationSecure Single Sign On with FingerTec OFIS
Secure Single Sign On with FingerTec OFIS User Guide CONTENTS 3 1 INTRODUCTION Welcome to OFIS Gateway 4-11 2 INSTALLATION & SETUP Registering Your OFIS Gateway Installing & Setting Up Your OFIS Gateway
More informationSmartCash SmartNode SCRIPT Setup Guide v2.2. Windows 10. Date: 20/02/2018. By (Jazz) yoyomonkey
SmartCash SmartNode SCRIPT Setup Guide v2.2 Date: Introduction Welcome to this step by step guide that will take you through the process of creating your own SmartCash SmartNode. This guide is aimed at
More informationConfiguring a site-to-site VPN with a VPN-1 Gateway using the VPN-1 Edge VPN Wizard
Configuring a site-to-site VPN with a VPN-1 Gateway using the VPN-1 Edge VPN Wizard VPN-1/FireWall-1 NG with Application Intelligence R55 HFA 13 Windows 2000 Server VPN-1 Edge X Series Firmware 5.0.57x
More informationContents. Introduction. Prerequisites. Requirements. Components Used
Contents Introduction Prerequisites Requirements Components Used Background Information Configure Step 1. Use the Public CA or the Set Up CA on Windows Server 2003 Step 2. Verify Hostname and Settings
More informationLoan Closing Advisor SM. User Guide. December 2017
Loan Closing Advisor SM User Guide December 2017 Notice This User Guide is Freddie Mac s CONFIDENTIAL INFORMATION as defined in and subject to the provisions of the Freddie Mac Single Family Seller/Servicer
More informationCryptography - SSH. Network Security Workshop May 2017 Phnom Penh, Cambodia
Cryptography - SSH Network Security Workshop 29-31 May 2017 Phnom Penh, Cambodia What is Safely Authentication I know who I am talking with Our communication is Encrypted Telnet Servers Terminal Routers
More informationFRCC Secure Data Transfer. Users Guide V1.5
FRCC Secure Data Transfer Users Guide V1.5 Table of Contents I. Introduction... 2 II. Part 1 - Software Installation... 3 III. Part 2 - Creating Your PKI Certificate... 7 IV. Part 3 - Importing FRCC Public
More informationBlackBerry Enterprise Server for Microsoft Exchange 4.1
April 2006 PGP Support Package for BlackBerry PGP Universal 2.0 BlackBerry Enterprise Server for Microsoft Exchange 4.1 Administrator s Guide Version 1.3 2 Table of Contents INTRODUCTION...3 DESIGN & REQUIREMENTS...3
More informationTitan FTP Server SSH Host Key Authentication with SFTP
2016 Titan FTP Server SSH Host Key Authentication with SFTP A guide for configuring and maintaining SSH Host Key Authentication for SFTP connections in Titan FTP Server. QuickStart Guide 2016 South River
More informationUpgrading from Call Center Reporting to Reporting for Call Center
Upgrading from Call Center Reporting to Reporting for Call Center www.nortelnetworks.com 2003 Nortel Networks i Table of Contents Table of Contents Change History...1 How to use this guide...2 Introduction...
More informationCryptography - SSH. Network Security Workshop. 3-5 October 2017 Port Moresby, Papua New Guinea
Cryptography - SSH Network Security Workshop 3-5 October 2017 Port Moresby, Papua New Guinea 1 What is Secure Authentication I know who I am talking to Our communication is Encrypted Telnet Servers Terminal
More informationAT&T Global Network Client for Mac User s Guide Version 1.7.3
Version 1.7.0 AT&T Global Network Client for Mac User s Guide Version 1.7.3 experience may vary. This document is not an offer, commitment, representation or warranty by AT&T and is subject to change..
More informationSUREedge MIGRATOR INSTALLATION GUIDE FOR HYPERV
SUREedge MIGRATOR INSTALLATION GUIDE 5.0.1 FOR HYPERV 2025 Gateway Place, Suite #480, San Jose, CA, 95110 Important Notice This document is provided "as is" without any representations or warranties, express
More informationBACKUP APP V7 CLOUUD FILE BACKUP & RESTORE GUIDE FOR WINDOWS
V7 CLOUUD FILE BACKUP & RESTORE GUIDE FOR WINDOWS Table of Contents 1 Overview... 1 1.1 About This Document... 7 2 Preparing for Backup and Restore... 8 2.1 Hardware Requirement... 8 2.2 Software Requirement...
More informationSoftware Token. Installation and User Guide. 22 September 2017
Software Token Installation and User Guide 22 September 2017 Notices Following are policies pertaining to proprietary rights and trademarks. Proprietary Rights The information contained in this document
More informationWireless Terminal Emulation Advanced Terminal Session Management (ATSM) Device Management Stay-Linked
Wireless Terminal Emulation Advanced Terminal Session Management (ATSM) Device Management Stay-Linked Secure Communications Stay-Linked Secure Communications Guide Page 1 Rev. 10.0.0 Dated: 04/26/10 Table
More informationSUREedge MIGRATOR INSTALLATION GUIDE FOR NUTANIX ACROPOLIS
SUREedge MIGRATOR INSTALLATION GUIDE 5.0.1 FOR NUTANIX ACROPOLIS 2025 Gateway Place, Suite #480, San Jose, CA, 95110 Important Notice This document is provided "as is" without any representations or warranties,
More informationCKHS VPN Connection Instructions
CKHS VPN Connection Instructions This document provides all authorized colleagues with instruction for accessing the CKHS network via a Virtual Private Network. Connection Prerequisites: 1. Operating System:
More informationApplication Note. Configuring SSH on Vocality units. Software From V07_04_01. Revision v1.5
Application Note Configuring SSH on Vocality units Software From V07_04_01 Revision v1.5 Publish Date November 2017 AN309 CONFIGURING SSH SSH requires the Security software (RTUSEC) and a Feature Key on
More informationCipher Suite Configuration Mode Commands
The Cipher Suite Configuration Mode is used to configure the building blocks for SSL cipher suites, including the encryption algorithm, hash function, and key exchange. Important The commands or keywords/variables
More informationConfiguring SSH Public Key Authentication
6AOSCG0060-29A January 2014 Configuration Guide Configuring SSH Public Key Authentication This guide describes how to configure and use Secure Shell (SSH) public key authentication on products running
More informationAppendix REPOX User Manual
D5.3.1 Europeana OAI-PMH Infrastructure Documentation and final prototype co-funded by the European Union The project is co-funded by the European Union, through the econtentplus programme http://ec.europa.eu/econtentplus
More informationLiveNX Upgrade Guide from v5.1.2 to v Windows
LIVEACTION, INC. LiveNX Upgrade Guide from v5.1.2 to v5.1.3 - Windows UPGRADE LiveAction, Inc. 3500 Copyright WEST BAYSHORE 2016 LiveAction, ROAD Inc. All rights reserved. LiveAction, LiveNX, LiveUX, the
More informationAUTOMATED APPOINTMENT REMINDER AND ANNOUNCEMENT SYSTEM
SARS Messages AUTOMATED APPOINTMENT REMINDER AND ANNOUNCEMENT SYSTEM USER MANUAL 2011-2015 by SARS Software Products, Inc. All rights reserved. COPYRIGHT Copyright 2011-2015 SARS Software Products, Inc.
More informationOracle Utilities Opower Secure File Transfer Specification
Oracle Utilities Opower Secure File Transfer Specification E84784-01 Specification Version Number: v1-1-0 Last Update: September 14, 2018 Oracle Utilities Opower Secure File Transfer Specification E84784-01
More informationDisaster Recovery System
Backup and Restore Overview, on page 1 Backup Prerequisites, on page 1 Backup Taskflow, on page 3 Backup and Restore Overview The (DRS) provides full data backup for all servers in a Cisco Unified Intelligence
More informationSecure File Transfer Protocol (SFTP) Data Submission Users Manual. July 2017, Version 1.6
Secure File Transfer Protocol (SFTP) Data Submission Users Manual July 2017, Version 1.6 DOCUMENT CHANGE HISTORY Version Number Date Page(s) Affected 1.0 June 2012 Initial version 1.1 March 2013 Formatting
More informationDell Client System Update Version 1.0. User s Guide
Dell Client System Update Version 1.0 User s Guide Notes and Cautions NOTE: A NOTE indicates important information that helps you make better use of your computer. CAUTION: A CAUTION indicates potential
More informationUDG Interface Specification
Please respond to: LME IT Solutions Delivery THE LONDON METAL EXCHANGE 10 Finsbury Square, London EC2A 1AJ Tel +44 (0)20 7113 8888 Registered in England no 2128666. Registered LME.COM 1 INTRODUCTION...
More informationContents. SSL-Based Services: HTTPS and FTPS 2. Generating A Certificate 2. Creating A Self-Signed Certificate 3. Obtaining A Signed Certificate 4
Contents SSL-Based Services: HTTPS and FTPS 2 Generating A Certificate 2 Creating A Self-Signed Certificate 3 Obtaining A Signed Certificate 4 Enabling Secure Services 5 SSL/TLS Security Level 5 A Note
More information(2½ hours) Total Marks: 75
(2½ hours) Total Marks: 75 N. B.: (1) All questions are compulsory. (2) Makesuitable assumptions wherever necessary and state the assumptions made. (3) Answers to the same question must be written together.
More informationWhat is Secure. Authenticated I know who I am talking to. Our communication is Encrypted
Crypto App - SSH 1 What is Secure Authenticated I know who I am talking to Our communication is Encrypted Telnet clear text Servers Terminal clear text Routers SSH encrypted channel encrypted text Servers
More informationTIBCO Managed File Transfer Internet Server Transfer and File Share Clients User's Guide
TIBCO Managed File Transfer Internet Server Transfer and File Share Clients User's Guide Software Release 8.1 March 2018 Two-Second Advantage 2 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES
More informationBusiness Insights Dashboard
Business Insights Dashboard Sage 500 ERP 2000-2013 Sage Software, Inc. All rights reserved. Sage, the Sage logos, and the Sage product and service names mentioned herein are registered trademarks or trademarks
More informationFile Cabinet Manager
Tool Box File Cabinet Manager Java File Cabinet Manager Password Protection Website Statistics Image Tool Image Tool - Resize Image Tool - Crop Image Tool - Transparent Form Processor Manager Form Processor
More informationBitnami MariaDB for Huawei Enterprise Cloud
Bitnami MariaDB for Huawei Enterprise Cloud First steps with the Bitnami MariaDB Stack Welcome to your new Bitnami application running on Huawei Enterprise Cloud! Here are a few questions (and answers!)
More informationDSS User Guide. End User Guide. - i -
DSS User Guide End User Guide - i - DSS User Guide Table of Contents End User Guide... 1 Table of Contents... 2 Part 1: Getting Started... 1 How to Log in to the Web Portal... 1 How to Manage Account Settings...
More informationBitnami Re:dash for Huawei Enterprise Cloud
Bitnami Re:dash for Huawei Enterprise Cloud Description Re:dash is an open source data visualization and collaboration tool. It was designed to allow fast and easy access to billions of records in all
More information