SFTP Service (ORK-TR)

Size: px
Start display at page:

Download "SFTP Service (ORK-TR)"

Transcription

1 SFTP Service (ORK-TR) Version 1.3 BME

2 VERSION CONTROL TABLE Version Date Changes / Modifications Author /10/2017 N/A Ignacio Herrero /10/2017 Corrections Ignacio Herrero /10/2017 Addition Annex SFTP keys generation Fernando Parra /11/2017 Adding screen captures amendments about downloading and installing WinSCP version for allowing the connection with a SFTP server. Page 23 Annex II. Fernando Parra SFTP SERVICE (ORK TR) Page 2 of 37

3 Nondisclosure This document contains information that must be confidentially stored and handled. Any reproduction, distribution, communication, transformation in whole or in part, free or onerous, by any means or processes, without the prior written permission of BME, is strictly forbidden. This document is strictly confidential. If you decided not to accept this project with BME, all copies of this document, together with the written confirmation of not having retained any copies of the document or its contents should be returned at our request. Personal data protection Although there is no treatment of personal data expected, in the event that BME would carry out any management of the personal data acknowledged as a result of this document, it would be carried out in accordance with the requirements of the Organic Law 15/1999, of December 13, for the Protection of Personal Data. SFTP SERVICE (ORK TR) Page 3 of 37

4 Index 1. INTRODUCTION MEMBER S FOLDERS WRITING AND READING RULES WRITING READING NOMENCLATURE INPUT OUTPUT CNMV FILE S NOMENCLATURE IN SFTP (ONLY FOR TR) CNMV FILES MAINTENANCE FILE CRYPTING CRYPTED FILES FOR BME CRYPTED FILES FOR MEMBERS AND ENTITIES SFTP CONNECTION PARAMETERS TRAINING PRODUCTION CONNECTIVITY FORM ANNEX ANNEX I: BASIC GPG COMMANDS How to create public/private keys How to export a public key How to import a public key How to encrypt a file How to decrypt files SFTP SERVICE (ORK TR) Page 4 of 37

5 10.2. ANNEX II: CLIENT SFTP USE EXAMPLE Downloading and installing WinSCP Spftware Download software Installation Configuration of the SFTP connection Public / Private key generation Public key generation Private key generation Authentication settings for the SFTP connection SFTP server connection SFTP SERVICE (ORK TR) Page 5 of 37

6 1. INTRODUCTION The present document provides a detailed description of the performance of the SFTP for the service STR, which we provide in BME. This service allows and provides the exchange of files through SFTP for the ORK and the RT, as well as the specific information considering every step of the process. 2. MEMBER S FOLDERS Each member will have a structure of folders exactly like in the example: As it can be observed from the screen shot above, each member will see inside his own SFTP folder, two subfolders, filesin and filesout. Inside the filesin folder, the members will upload the desired files they wish to send to BME, ORK and RT, since these are distinguished by the nomenclature. Inside the filesout folder, the members will receive the ORK and RT files sent from BME, since these are distinguished by the nomenclature. SFTP SERVICE (ORK TR) Page 6 of 37

7 3. WRITING AND READING RULES 3.1. WRITING The files must be written with the prefix TMP_ followed by the file name. Once the file has been written completely in the SFTP server, the file must be renamed, removing the prefix TMP_. The final nomenclature of the file is described in section 4 of this document. Example: Filename: INB_LEI1_LEI2_TIPO_AAAAMMDD_SEQ.EXT During the process of upload the file should be named TMP_ INB_LEI1_LEI2_TIPO_AAAAMMDD_SEQ.EXT Once the file is uploaded, it will be renamed with its definitive name: INB_LEI1_LEI2_TIPO_AAAAMMDD_SEQ.EXT 3.2. READING Only files beginning with OUT or INB should be collected, but never those starting with the prefix "TMP_", since the presence of this prefix indicates that the file is being written at that precise moment, and therefore, the file is not complete. 4. NOMENCLATURE The right nomenclature depends on if we are talking about an input file or an output file. The nomenclature which must be followed by the files will be the next one: 4.1. INPUT INB_LEI1_LEI2_TIPO_AAAAMMDD_SEQ.EXT_MD5 INB(3) INBOUND. Indicates an input file LEI1(20) LEI code of the member who is sending the file. LEI2(20) LEI code of the member by whom the file is being send. It can be the same as LEI1 if it matches TIPO(1 a 4) File type AAAAMMDD(8) File s creation date. SEQ(3) 3 digits sequency. Example: 001 SFTP SERVICE (ORK TR) Page 7 of 37

8 EXT(3) File extension. MD5(33) The md5 hash of the file will be included after the extension so that it can be validated that the file is the same in origin and destination. This hash is used to verify that the file has not undergone any modification, once received the file and checked, the hash can be removed so that the file remains with its correct extension OUTPUT OUT_LEI1_LEI2_TIPO_AAAAMMDD_SEQ.EXT_MD5 OUT(3) OUTBOUND. Indicates an output file LEI1(20) LEI code of the member who receives the sending. LEI2(20) LEI code of the member in the name of who we are making the sending. It can be the same that the LEI1 if both of them are matching. TIPO(4) File type AAAAMMDD(8) File s creation date. SEQ(3) 3 digits sequency. Example: 001 EXT(3) File extension. MD5(33) The md5 hash of the file will be included after the extension so that it can be validated that the file is the same in origin and destination. This hash is used to verify that the file has not undergone any modification, once received the file and checked, the hash can be removed so that the file remains with its correct extension. SFTP SERVICE (ORK TR) Page 8 of 37

9 5. CNMV FILE S NOMENCLATURE IN SFTP (ONLY FOR TR) 5.1. CNMV FILES Original file: SubmEnt_ExecEnt_FileType_Sequence-Version_Year.XML SFTP OUTPUT File : OUT_Lei1_SubmEnt_ExecEnt_FileType_Sequence-Version_Year.XML Renamed file to Lei1 folder: OUT_Lei1_SubmEnt_ExecEnt_FileType_Sequence-Version_Year.XML SubmEnt_ExecEnt_FileType_Sequence-Version_Year.XML SubmEnt (20 characters): This is the valid LEI code for the Entity sending the file, according to the technical instructions for reporting defined by CNMV, in this case, the LEI code for BME Regulatory Services. ExecEnt (20 characters): This is the valid LEI code for the Entity who executes the operations, according to the technical instructions for reporting defined by CNMV. FileType (3 characters): File type, the possible values will be TRA o REQ. Sequence: It is the numerical sequence of 6 positions filled with zeros from the left hand and beginning with "000001", at the level of each sent file by the sending Entity (SubmEnt) and file processed in the CNMV. Version: It is the numerical sequence of 2 positions filled with zeros from the left hand and starting with "00", which will be increased for the same file (SubmEnt + Sequence) if the file is rejected by file-level error by the CNMV. Year: It corresponds with the last 2 digits of the year which the file was sent. LEI1(20) LEI code of the member who receives the sending OUT(3) OUTBOUND. Indicates it is an output file. SFTP SERVICE (ORK TR) Page 9 of 37

10 6. MAINTENANCE The folder will include a Maintenance rule, to assure that if after 15, the clients have not downloaded the files, these ones will be deleted for the SFTP cages. 7. FILE CRYPTING The encrypted files must keep their original name. It is mandatory to include the.gpg extension, in order to clarify the name of the file that must be decrypted. Example: File OUT_LEI1_LEI2_TIPO_AAAAMMDD_SEQ.EXT_MD5 Crypted file: OUT_LEI1_LEI2_TIPO_AAAAMMDD_SEQ.EXT_MD5.gpg Once it is encrypted, the file: OUT_LEI1_LEI2_TIPO_AAAAMMDD_SEQ.EXT_MD5 must be named OUT_LEI1_LEI2_TIPO_AAAAMMDD_SEQ.EXT_MD5.gpg 7.1. CRYPTED FILES FOR BME In order to submit encrypted files to BME, files must be encrypted with the GPG public keys of BME. BME hast two Public keys, one for each environment. Test: Training: form_encrypt.asc -----BEGIN PGP PUBLIC KEY BLOCK----- Version: GnuPG v1 mqenbfhiw+abcacbau4o80hsj3d1wdutrxueqh86w9bsdcvlxj8du8oayhemrn49 jd7t/jidiesuzwxhw2oaqgheyzihknrqas+qhfvg9advtcjvgjpp21blkfreqafw qxmohsj0qs65cmghby/5oylsyzklugejkgnbsw0cnwndfgz6iwza01rzv96sqbb3 8wkWzJ69u4tlatn6qi3wqZIFgMlXAoD6yLXVLQ853k8f8L2DtEwKqYLEQ6wRu9tl 4dxKaJ976W7pvnHb8oxZrLZuWnZX6cNlJJeDVq0jvprYqGMY20GxWRU+0RIn4/6P w3t6f9f7m4vaadxj+qhevsqaczzqgsqnomy5abebaag0oujnrsbgb3jtievuy3j5 chrpb24gs2v5ichgb3jtksa8zm9ybv9lbmnyexb0qgdydxbvym1llmvzpokboaqt AQIAIgUCWGJb4AIbAwYLCQgHAwIGFQgCCQoLBBYCAwECHgECF4AACgkQ9bJsuU99 qygzeaf+nr+zwocn1fe+jh9glksmotyujzwj+g/syzdbus5lk6hvnjgrtoolchzv m9cwnqcknljixjaidui14ypjfdb68u3p+klzixu4rqb2ucplxuxro1i9zsooeldq GSkArK0fFI3JOkGgZ8jEY1+KqlPUw+l3VmQxGjL4Xwb2SyJ9Y5/OSa+IiNYD+PAU EkVwYzADM3sLPe2kLL1/7mKpLVCouCmFLWJ2vX8j/W+U16EpA/Nl6vOKrx9hTnYy 8xsJiLhgB0kINhv3/F5qmZZhSWpSqEe9nbMsi4KhXna3WVcqKkH+rjbLuomfmPAS KQCfcVPEom58lJ0XKfsyLEanxn3V9LkBDQRYYlvgAQgA0pZg+uvCBXRBzDuZWyeG q6dy0jq9okpusvub4wagfvhmxmvjjai0/7au4sc0iftco6e0f8cykswxhfqq0vie SFTP SERVICE (ORK TR) Page 10 of 37

11 mqlghhdk9jdeiy6t0esw5wxm9o1g/j8ytnh6ukbq/sv8qb2wgfovowru/k/vwru/ SwdBsBXKD5L1NQFSzhrDoUn2pbu3B7tCydKR+dDc9mm8780EJiX/cM8kB381rVmq LyfwhiHNPtmwAh0TsKRAvpXGpUQIF5kWky64Sp3OtpmcqY8CSKhGQICB8wY2UEiI O06ufE78NWzN19W+5Wmbgphlz3clz8HOoZzdmEAjelPKzkRJnxyPDwDP0Rh74LR2 7QARAQABiQEfBBgBAgAJBQJYYlvgAhsMAAoJEPWybLlPfamIREoH/3c7BnyUpZLV mok8lxzrpuyhtn7frj4avzqzl9aj538+la9sjk7f+dsosqvdy76g2kw6ksg5m5yh Ruc7y9FGBoY1hOvOLNx7I5DG2SyGjSKZcq3lJs5qPZ3N7WOF4wLOEHO3qh83tGda RP610zZQcYdxvxUNswsAh/5VZojqcxb9gERXhFfNvm94yuZ3YsZX+M/u5OXHhGmV IROOrLC7jTI4B/GatP+bxuFWNBOs+falrxQVfawiUYKZ0Cp1sgJH4Og2XRU/iabo 4tUJMKw3xOd6aTXip7EpNZDJKrUidUK8eA9jPJbmn+XwYNHO4FpMeXzgwJUbzaR1 /wcxukhag68= =Z1Sd -----END PGP PUBLIC KEY BLOCK----- Production: prod_encrypt.asc -----BEGIN PGP PUBLIC KEY BLOCK----- Version: GnuPG v1 mqenbfhiw64bcadodngkv+kedwamhxtsfmjcqt28oen7wcyhuhmwvfvoo9b1vlqh ZmCyANC7e0TnPnDsOf/6sBckZNGz5O4SWG1UsRb3nxD4oArvc9jjwYF/9maejUA+ 6S5HEupT+R8cpjcB9INvp92zn3muMXwsyAPaMiAwrS4FXZ3PYxZrGCNmmBL/eOJ/ vekmirpdu2gtxjs5a0tdx0n0twcc2lqkb/qgfa7mshmzh1tcpy1g2ta01wcp1fih NNd7wTTntGYpUTVDgunTi54tU5DasRqfdjUeCiWNqC4BwjE7IRnVNcWMMA/3alCL XvwMguE6tqQ+oj8l0xwR1s7WS8mpuHNwKW59ABEBAAG0OUJNRSBFbmNyeXB0aW9u IEtleSAoUHJvZHVjdGlvbiBLZXkpIDxlbmNyeXB0QGdydXBvYm1lLmVzPokBOAQT AQIAIgUCWGJbrgIbAwYLCQgHAwIGFQgCCQoLBBYCAwECHgECF4AACgkQeAOy8oqz djhxcagag6p0os2bwkurolssgn/axovxecezuz8cwkluooybf0yxsfcdup0x7bsl QQwSheC/RflFe5SU2uJSPUIQqbzih8lm7OrMmXapsO1ETlV0uFw157cv09Tg0g96 kpssl+d9/e3x9lz0pefwkuupne7eboso+olafe/q0mujhr6golxv1pured9c/1im HGMS1TP2TQyknAGyWpdzRZ90eSj3RamQ/Hpo9j4nG7F3Kxw3hodzYe17i9+BUDB0 /4Gm+Yurwidl7QE71ASRe6V80jWQWlBcQo7+/GzgFzzou22fvbeWQkR0UraM3IX4 mmeaqubt2hslwtxcnwgxs/alyddk57kbdqryyluuaqga0lr2b+m6hsulwhpcewcd AkhpfzrtY+JBmYXZxv2e7uL4Uvn68U2OES20QbOEyUDYy9R68zYA/Q4QEkCTn0Ow jnetp4cjqtjezusyirafhz8lxv7nhz3x2ybomjta6bkrnrahc486jshhqbfqs3ps 6E6UIEI7KgOkEBBJjAoj/D4JzWAxoxrU1Zoxb/VxFUVCi/BMIA0YXxPD/VHlzGrt hss+lmefioyh/mw9xsbynahrfxqyuizzl4x185qlb5wy2j3equdqo6o8smo5j3uq c5hxfr8mezt3vsb1w0mlfamhd0hvdbrywmeysuehrvpilhvomkkddkb+uewnlk0k iwaraqabiqefbbgbagajbqjyyluuahsmaaojehgdsvkks3y4rqih/1e4tdimj+/i FPK6gW1bJHipjs7Dlf+fzJYfnAEYBKunb66/fupm9i0bHLlnyuTnJjijosJ/shRb j4gfkw+2ovimsaitfh3zpov4ukjcgjeov/wu47xiyz9xar/guhlrumzqehxy9+cb a7pjzc6dowlyznfityqghwurccz4mohikhdizrrl3+iiorc17f68tlh5/a+tffin 1sUWNa/GO7KmL9DXlh82ZhqQhKcYsvURzq+jHxck8/cWgOWCntWiPVMXFtTrk+ml chaj0ltjzswiowji56x1g0wvte36typev3bdfjcldfc4x6ez0q4nekanufmsuagh HI7fdcmn9+mZAQ0EWGJb4AEIAJtpTg7zSFKPd3VZ1S2vFR6qHzpb0GwMJWVePx1T w5ricqxe3j2n3u38kgoj6xrnbefby4bccerhmkgsetbpl6ocvub0b1w1ynuaomnb VsuQWsRBp9arEygdInRCzrlyaAdvL/k7ItLLMqW6B4mQY0GxbRw3Cd0WBnqLBlrT Wtm/3pKptvfzCRbMnr27i2Vq2fqqLfCpkgWAyVcCgPrItdUtDzneTx/wvYO0TAqp gsrdrbg722xh3epon3vpbum+cdvyjfmstm5adlfpw2ukl4nwrso+mtioyxjbqbfz FT7REifj/o/De3p/1/ubi9pp3En5Ad69KppxlmqCyo06ZjkAEQEAAbQ5Qk1FIEZv cm0grw5jcnlwdglvbiblzxkgkezvcm0pidxmb3jtx2vuy3j5chraz3j1cg9ibwuu ZXM+iQE4BBMBAgAiBQJYYlvgAhsDBgsJCAcDAgYVCAIJCgsEFgIDAQIeAQIXgAAK CRD1smy5T32piBl4B/42v7NY5yfUV76Mf2CWSwyi1hQllaP6D+xjMMG6zmWTodWc mctm46vwfo+b0jaeoiqcsmlekcio4jxjkmmv0hry7c/6qtmlftitbva5ymvdtfe7 WL3NKigSV2oZKQCsrR8Ujck6QaBnyMRjX4qqU9TD6XdWZDEaMvhfBvZLIn1jn85J r4ii1gp48bqsrxbjmamzews97aqsvx/uyqktuki4kyutyna9fyp9b5txoskd82xq 84qvH2FOdjLzGwmIuGAHSQg2G/f8XmqZlmFJalKoR72dsyyLgqFedrdZVyoqQf6u Nsu6iZ+Y8BIpAJ9xU8SibnyUnRcp+zIsRqfGfdX0uQENBFhiW+ABCADSlmD668IF dehmo5lbj4aronjqmr2gqlrjw5vhzqavuczexwmkajt/tq7ixzsiw0kjotqxwjgp SFTP SERVICE (ORK TR) Page 11 of 37

12 JbEcWpDRWJ6aouAeF0r0kN6LLpPQRJbnBcz2jWD+PzK00fpQoGr+y/yoHbCB+hWh ZG78r9XCu79LB0GwFcoPkvU1AVLOGsOhSfalu7cHu0LJ0pH50Nz2abzvzQQmJf9w zyqhfzwtwaovj/cgic0+2bachrowpec+lcalragxmratlrhknc62mzypjwjiqeza gihzbjzqsig7tq58tvw1bm3x1b7lazucmgxpdyxpwc6hnn2yqcn6u8roremfhi8p AM/RGHvgtHbtABEBAAGJAR8EGAECAAkFAlhiW+ACGwwACgkQ9bJsuU99qYhESgf/ dzsgfjslktwy4ryxfle9rgdm3t+snhpvlbkv1onnfz6ud1ikrsx52yiypv1jvoby pbopibmblifg5zvl0uyghjwe684s3hsjkmbzlianiplyreumzmo9nc3ty4xjas4q c7eqhze0z1pe/rxtnlbxh3g/fq2zcwch/lvmiopzfv2arfeev82+b3jk5ndixlf4 z+7k5ceeazuhe46sslunmjgh8zq0/5vg4vy0e6z59qwvfbv9rcjrgpnqknwyakfg 6DZdFT+Jpuji1QkwrDfE53ppNeKnsSk1kMkqtSJ1Qrx4D2M8luaf5fBg0c7gWkx5 fodalrvnphx/alfqqecdr5kbdqryylv+aqgarbu4t0nbyrm7urad6l7eexndbjan man0hjmcnr9ptvqjpgbyyw4ouzg787g1sdbwiffr3wpu6rx/+dlsmtym0mwnjn4u tjcr+yonqvab6kwfvgfol4ou1hprpvsfd9kyzc+ecxuwiioaui2yrsgm+zee21nw xssjlbw70bn3nwbg73mms5l1l8nqaf4rsmtrzpwsp0xwt4pei2z8nat3/zc6viuu ZF7AaMAauLRJg7jpYAoO/mlj/MvflGFqqFfu0gqiGkp8ufA4iuM8qK/TqqAoFULL 5X4Ve/WENqMGP//3zXAE4sDze1zejC+QPi6jajARVNPA4ALI54gUkMBaZwARAQAB tdlctuugvgvzdcbfbmnyexb0aw9uietlesaovgvzdckgphrlc3rfzw5jcnlwdebn cnvwb2jtzs5lcz6jatgeewecacifalhiw/4cgwmgcwkibwmcbhuiagkkcwqwagmb Ah4BAheAAAoJEMcEF1rRuWG/+dQH/2b1mo+2cTOcDFn2ApPhcLXX63bMYRlvDGUV YL8/NOG0RTeFl+7J0iyOk854XDArH5h7sd1osVWYVhciZu0x7XgEcApXjYJgjCtK QjahuJ1TXfHcTuZyEUtJo3e13ipnB9XGd/o3wgim2CBIkqJ1estEVyL4OXoVAttX 4Ool1aXoymcctYVleSiqH6iGtAPKfzkmIVfsrGTyFPas/PKzURi/yyfsM3vBoSIf 0aUOO0uu9AiXZQsKuU9uSMcOxvtT03CU7ijn0J8N7Sj13Xl210AKQxgGYhiqnCnz 77WAx6Vd1bngNDY4qWdxLgv8nq5+DhsU9Glrx20BODJHxXAO7vK5AQ0EWGJb/gEI ANCjFLwkYsTrK/yQnPmKHedzQOC3KGFV6NCKbx1wA5nd4GfDtoe8ciy+s/IZEsVn 7TRyJIIhUsjIEj7OR+3gQIXM9/+wuwipvjefZvidEIyGtli9qCILmVIz0/Udgywi OnBRbxxdHmpajrQVkc2dTU60j5XRTvW79vIjXZtEYypm9bjd8tokoXx/ixsBg0nb TQ+j/EVNKHLNUxTGiVxUriBovPat1NKmJfuyhWzUNp34sRFCE9tNexG+WJCLB3uK jrt8o3by6zbo0ul/xira6z665djfp17ln9fea5bjoocpcts4rtbdcerzuia/muit lammqvaims+pfjx+nbnwsimaeqeaaykbhwqyaqiacqucwgjb/gibdaakcrdhbbda 0blhv+BUB/9AFnDGTGPxkXkbYFofy1RM+lf+1EnyOSDuvNzt6ur3kRil3Lh51YB9 vmp3wpdznfbygl7y65qte5mdgkktri2ryazb9ujofmf2ffvseycfsgjsxchtkaet 1fqMieNb84hmgS8KVhw5qyLnhbTH266VAOBLF3Sv9l+odjNENFmALcWqebkQOlhi wkwxooj5cafl1wjzsduixhv6go7v8h3t8nydw4hwwlwymdg+vyllhyaguen2hwvv NQOlwRjAuwipceQPmjsd+GJPWcMHU6ocH3thR81pfFY3xLa7R3Yv6KMVjsQv0ru0 M4WCvj7uCGBL4wu+1Gk7r5H6FaynE3Y6 =sw/o -----END PGP PUBLIC KEY BLOCK CRYPTED FILES FOR MEMBERS AND ENTITIES Any member or entity that receives encrypted files from BME, must have or create a couple of GPG keys, one public key and one private key, for each service. Once the keys have being created, each member or entity must send BME the public keys in order to allow BME encrypt the files with this keys. Only the owner of the private key will be able to decrypt the files. All the files created by BME will also be encrypted with BMEs public key, as a result BME will be able to decrypt all the files in order to ensure a file is never unusable. SFTP SERVICE (ORK TR) Page 12 of 37

13 8. SFTP CONNECTION PARAMETERS There are two environnement for the STR SFTP service, training and production. For connecting with this services it is necessary a SFTP client software installed in your operating system. You can download some free clients in internet for the most common operating systems. Next you can read,below, the connection parameters for the SFTP services. The software client used to connect must be compatible with the connection parameters TRAINING IP: Port: Authentication Method: Using User and public key SSH-RSA 2048 BITS Key Exchange algorithm allowed (KexAlgorithms): diffie-hellman-group-exchange-sha256 Message Authentication Code algorithm allowed (MACs): hmac-sha2-512,hmac-sha2-256 Ciphers allowed (Ciphers): aes256-ctr,aes192-ctr,aes128-ctr 8.2. PRODUCTION IP: Port: Authentication Method: Using User and public key SSH-RSA 2048 BITS Key Exchange algorithm allowed (KexAlgorithms): diffie-hellman-group-exchange-sha256 Message Authentication Code algorithm allowed (MACs): hmac-sha2-512,hmac-sha2-256 Ciphers allowed (Ciphers): aes256-ctr,aes192-ctr,aes128-ctr SFTP SERVICE (ORK TR) Page 13 of 37

14 9. CONNECTIVITY FORM ORK-TR Connectivity form Training Environnement Once the fields in salmon color are filled you must send back the form in an editable format. BME will implement the configuration tasks, will fill all the form fields in BLUE and will take back the form for the connectivity tasks. Entity name Entity Data Contact person: Contact Phone: Contact emial address 0.- Request type. Production Environnemennt. For modifications, it is necessasry highlight the modifcations for its monitoring remarqued in YELLOW Add Delete Modification Date Comments SFTP SERVICE (ORK TR) Page 14 of 37

15 Complete the fields for configuring the connectivity ID of the submitting Entity LEI Code Description ID of the entity owner of the information LEI Code Description ID of the entity owner of the information LEI Code Description ID of the entity owner of the information LEI Code Description ID of the entity owner of the information LEI Code Description ID of the entity owner of the information LEI Code Description ID of the entity owner of the information LEI Code Description ID of the entity owner of the information LEI Code Description ID of the entity owner of the information LEI Code Description SFTP SERVICE (ORK TR) Page 15 of 37

16 1.- SFTP Connectivity Required: Connection to the BME net Open SSH 7.4 Client (Winscp, Filezilla, etc..) A couple of SSH-2 RSA private/public key must be created, with encodying of 2048 bts.the public key must be sended to BME in a text file format. If the connection is done through the shared net lines for another services, it will be configured a bandwidth no bigger than 0, 5 Mb. EOF format is windows mandatory. (CRLF) Client SFTP IP adddress (NAT address to be presented to BME) Filename with the SSH public key Filenames with the GPG encoding public keys (extension.asc) Entity Technical data Technical Data provided by BME Protocol SFTP SFTP server port in BME Internet SFTP server IP address User code (LEI code in lower case) Subfolder in the BME server where you can download the entity files Subfolder in BME server where you can upload your entity files. fstr_lei /filesout /filesin Comments: SFTP SERVICE (ORK TR) Page 16 of 37

17 ORK-TR Connectivity form Production Environnement Once the fields in salmon color are filled you must send back the form in an editable format. BME will implement the configuration tasks, will fill all the form fields in BLUE and will take back the form for the connectivity tasks. Entity Data Entity name Contact person: Contact Phone: Contact emial address 0.- Request type. Production Environnemennt. For modifications, it is necessasry highlight the modifcations for its monitoring remarqued in YELLOW Add Delete Modification Date Comments SFTP SERVICE (ORK TR) Page 17 of 37

18 Complete the fields for configuring tehe connectivity ID of the submitting entity LEI Code Description ID of the entity owner of the information LEI Code Description ID of the entity owner of the information LEI Code Description ID of the entity owner of the information LEI Code Description ID of the entity owner of the information LEI Code Description ID of the entity owner of the information LEI Code Description ID of the entity owner of the information LEI Code Description ID of the entity owner of the information LEI Code Description ID of the entity owner of the information Código LEI Description SFTP SERVICE (ORK TR) Page 18 of 37

19 1 SFTP Connectivity Required: Connection to the BME net Open SSH 7.4 Client (Winscp, Filezilla, etc.) A couple of SSH-2 RSA private/public key must be created, with encodying of 2048 bts.the public key must be sended to BME in a text file format. If the connection is done through the shared net lines for another services, it will be configured a bandwidth no bigger than 0, 5 Mb. EOF format is windows mandatory. (CRLF) Client SFTP IP adddress (NAT address to be presented to BME) Filename with the SSH public key Filenames with the GPG encoding public keys (extension.asc) Entity Technical data Technical Data provided by BME Protocol SFTP SFTP server port in BME Internet SFTP server IP address User code (LEI code in lower case) Subfolder in the BME server where you can download the entity files Subfolder in BME server where you can upload your entity files. pstr_lei /filesout /filesin Observaciones: SFTP SERVICE (ORK TR) Page 19 of 37

20 10. ANNEX ANNEX I: BASIC GPG COMMANDS How to create public/private keys. For the creation of the keys the following instruction must be executed: gpg --gen-key The system will ask for the kind of key. RSA and RSA option must be selected. Please select the type ok key desired: (1) RSA y RSA (default) (2) DSA y Elgamal (3) DSA (only firm) (4) RSA (only firm) Por favor seleccione tipo de clave deseado: (1) RSA y RSA (predeterminado) (2) DSA y Elgamal (3) DSA (sólo firmar) (4) RSA (sólo firmar) After that, you have to introduce the size of the key. The recommended size is 2048 bits. RSA keys size can be between 1024 and 4096 bits. Key size? (2048) Normally the key has an expiration date. If you do not want the key to expire, please select the option 0. Please, indicates the value time for the key. 0 = The key never expires SFTP SERVICE (ORK TR) Page 20 of 37

21 <n> = The key expires in n days <n>w = The key expires in n weeks <n>m = The key expires in n months <n>y = The key expires in n years key value(0)? 0 Por favor, especifique el período de validez de la clave. 0 = la clave nunca caduca <n> = la clave caduca en n días <n>w = la clave caduca en n semanas <n>m = la clave caduca en n meses <n>y = la clave caduca en n años Validez de la clave (0)? 0 Finally, it s necessary to introduce the id for the key use. It s important to remember this id for the export and decrypt files actions. The data required are: Name and surname, address (which will be used for the exportation) and comments How to export a public key For the exportation proccess you must use the id mentioned in the generation key process. You can use name as well, name, username or address. In the example below, we will use the address and the command will create a file with the name clave.asc : gpg --export --armor correo@dominio.com > clave.asc How to import a public key The process requires the execution of this command gpg --import clave.asc SFTP SERVICE (ORK TR) Page 21 of 37

22 How to encrypt a file The file encryption requires as well the id and the key with which we want to make the decrypt action. You can use as well the name, surname or address. gpg --output fichero.gpg --encrypt r correo@dominio.com fichero How to decrypt files Decrypting files command: gpg --output doc --decrypt doc.gpg SFTP SERVICE (ORK TR) Page 22 of 37

23 10.2. ANNEX II: CLIENT SFTP USE EXAMPLE Downloading and installing WinSCP Spftware This guide contains simplified description of downloading and installing WinSCP, for allowing the connection with a SFTP server Download software The software is available in the link below. Download will start automatically Installation Open the installation program by double clicking on its icon. The software will select automatically the OS language. On Welcome and License Agreement screens click Next. SFTP SERVICE (ORK TR) Page 23 of 37

24 You will be prompted to select a setup type. For basic setup, choose Typical Installation. Keep default values for NC or Commander interface and click Next SFTP SERVICE (ORK TR) Page 24 of 37

25 After you select the interface, the Ready to Install screen opens. On this screen, you can review the installation options you have selected. Click Install to start the installation A brief installation process will take place. You may have to restart your computer. If you choose not to restart, some WINSCP functions may not be available until you do so. SFTP SERVICE (ORK TR) Page 25 of 37

26 Configuration of the SFTP connection Start the WinSCP application. Before you connect, you need to know at least: Host Number : IP Address File Protocol : SFTP Port : 22 User name : Account username Select your File Protocol, enter your host name to Host name field and username to User name field After that some configurations ítems must be changed. To do that we select Preferences option like in the image below. SFTP SERVICE (ORK TR) Page 26 of 37

27 In order to generate the logs files, click the option marked in yellow in the image. To prevent the automatic upgrading of the software it is necessary to uncheck the option marked in yellow in the Update menú. SFTP SERVICE (ORK TR) Page 27 of 37

28 Public / Private key generation For connecting to the SFTP server using a public key authentication or SSH Keys instead you need to generate a key pair using the PuTTYgen application. You will find this application into the Tools Menu SFTP SERVICE (ORK TR) Page 28 of 37

29 Select the Run PuTTYgen option. At this moment, you have to generate a new public/private key pair Public key generation Press Generate button and follow the instructions. SFTP SERVICE (ORK TR) Page 29 of 37

30 Generate some randomness by moving the mouse over the blank area marked in red below Once you have generated the key, click Save public Key button SFTP SERVICE (ORK TR) Page 30 of 37

31 Click on the affirmative option Choose the location where you want to save the public key. SFTP SERVICE (ORK TR) Page 31 of 37

32 After that, we proceed in the same way with the Private Key. SFTP SERVICE (ORK TR) Page 32 of 37

33 Private key generation Click in the Save private key button. In the new Windows that appears, choose the affirmative option. Choose the location where you want to save the private key SFTP SERVICE (ORK TR) Page 33 of 37

34 At this point, we have finished with the creating keys application. SFTP SERVICE (ORK TR) Page 34 of 37

35 Authentication settings for the SFTP connection We continue, in the Login-WinSCP window, clicking in the Advanced button. In the new Windows we choose the SSH > Authentication option SFTP SERVICE (ORK TR) Page 35 of 37

36 Check the Allow agent forwarding option and select the private key file Click in OK button At this point, the creating public/private key process has finished. SFTP SERVICE (ORK TR) Page 36 of 37

37 SFTP server connection For establishing the connection, just select the connection created and click the Login button SFTP SERVICE (ORK TR) Page 37 of 37

Due: October 8, 2013: 7.30 PM

Due: October 8, 2013: 7.30 PM Jackson State University Department of Computer Science CSC 437-01/539-01 Computer Security Fall 2013 Instructor: Dr. Natarajan Meghanathan Lab Project # 1: Lab Project on using PGP GNU Privacy Guard (GPG)

More information

Sterling Money Market Data Collection: Technical instructions for the transmission

Sterling Money Market Data Collection: Technical instructions for the transmission Sterling Money Market Data Collection: Technical instructions for the transmission of form SMMD Version 5.0 February 2017 Contents page 1. Introduction...3 2. Transfer Process...4 2.1. Sending files...4

More information

Table of Contents 1 SSH Configuration 1-1

Table of Contents 1 SSH Configuration 1-1 Table of Contents 1 SSH Configuration 1-1 SSH Overview 1-1 Introduction to SSH 1-1 Algorithm and Key 1-1 Asymmetric Key Algorithm 1-2 SSH Operating Process 1-2 Configuring the SSH Server 1-4 SSH Server

More information

Contents. Configuring SSH 1

Contents. Configuring SSH 1 Contents Configuring SSH 1 Overview 1 How SSH works 1 SSH authentication methods 2 SSH support for Suite B 3 FIPS compliance 3 Configuring the device as an SSH server 4 SSH server configuration task list

More information

FWB / Eurex Client & Member Reference Data Upload How to connect via SFTP & upload Files

FWB / Eurex Client & Member Reference Data Upload How to connect via SFTP & upload Files FWB / Eurex Client & Member Reference Data Upload How to connect via SFTP & upload Files Version 1.33 November 2017 Table of Content 1. Introduction... 3 2. Technical Pre-Conditions... 3 2.1. Hardware

More information

File transfer clients manual File Delivery Services

File transfer clients manual File Delivery Services File transfer clients manual File Delivery Services Publisher Post CH Ltd Information Technology Webergutstrasse 12 CH-3030 Berne (Zollikofen) Contact Post CH Ltd Information Technology Webergutstrasse

More information

Regulatory Reporting Hub SFTP Connection How to connect via SFTP & upload Files

Regulatory Reporting Hub SFTP Connection How to connect via SFTP & upload Files SFTP Connection How to connect via SFTP & upload Files Version 1.3 November 2017 Table of Content 1. Introduction... 2 2. Technical Pre-Conditions... 2 2.1. Hardware requirements... 2 2.2. Software requirements...

More information

Getting Started Keybox Management

Getting Started Keybox Management Integration Console Getting Started Keybox Management version 0.6 Contents Welcome 3 Contact us 3 Getting Started 6 Create a Google Account 6 Requirements 6 Register your Google Account 6 Log into Integration

More information

Regulatory Reporting Hub SFTP Connection How to connect via SFTP & upload Files

Regulatory Reporting Hub SFTP Connection How to connect via SFTP & upload Files SFTP Connection How to connect via SFTP & upload Files Version 1.2 October 2017 Table of Content 1. Introduction... 2 2. Technical Pre-Conditions... 2 2.1. Hardware requirements... 2 2.2. Software requirements...

More information

Lab: Securing with PGP

Lab: Securing  with PGP Objectives Understand the concept of public keys, signing, and encrypting email with PGP. Background GNUPG (or GNU Privacy guard) is a free implementation of the OpenPGP standard (RFC 4880) as a tool for

More information

Setting up PuTTY. Version Updated for 2015 Fall (with corrections)

Setting up PuTTY. Version Updated for 2015 Fall (with corrections) Setting up PuTTY CTEC1330 Data and Telecommunications CTEC1767 Data Communications & Networking I CTEC1863 Operating Systems CTEC1906 Internet Computing Version 1.9.2 Updated for 2015 Fall (with corrections)

More information

Setting up PuTTY. Software* Downoad PuTTY. Download PuTTY Download the putty.zip file. It contains several programs for SSH, SFTP, and SCP.

Setting up PuTTY. Software* Downoad PuTTY. Download PuTTY Download the putty.zip file. It contains several programs for SSH, SFTP, and SCP. Software* Setting up PuTTY Microsoft Windows 7 PuTTY 0.65 PuTTYgen 0.65 WinSCP 5.7.5 CTEC1330 Data and Telecommunications CTEC1767 Data Communications & Networking I CTEC1863 Operating Systems CTEC1906

More information

You can use the WinSCP program to load or copy (FTP) files from your computer onto the Codd server.

You can use the WinSCP program to load or copy (FTP) files from your computer onto the Codd server. CODD SERVER ACCESS INSTRUCTIONS OVERVIEW Codd (codd.franklin.edu) is a server that is used for many Computer Science (COMP) courses. To access the Franklin University Linux Server called Codd, an SSH connection

More information

2. GETTING STARTED SECURE FILE TRANSFER PROTOCOL (SFTP) PROCEDURES A. Secure File Transfer Protocol (SFTP) Procedures

2. GETTING STARTED SECURE FILE TRANSFER PROTOCOL (SFTP) PROCEDURES A. Secure File Transfer Protocol (SFTP) Procedures A. Secure File Transfer Protocol (SFTP) Procedures Overview A. IEHP utilizes the Secure File Transfer Protocol (SFTP) server to conduct all electronic data file transactions. Some of the benefits to using

More information

SSH Algorithms for Common Criteria Certification

SSH Algorithms for Common Criteria Certification The feature provides the list and order of the algorithms that are allowed for Common Criteria Certification. This module describes how to configure the encryption, Message Authentication Code (MAC), and

More information

Support Backups and Secure Transfer Server Changes - i-cam

Support Backups and Secure Transfer Server Changes - i-cam Support Backups and Secure Transfer Server Changes - i-cam 3.1.24 Contents What is the Secure Transfer Server?... 2 Initial Setup in i-cam 3.1.24... 2 Getting your account credentials... 2 Setting your

More information

Setting up PuTTY. CTEC1767 Data Communications & Networking CTEC1863 Operating Systems CTEC1906 Internet Computing

Setting up PuTTY. CTEC1767 Data Communications & Networking CTEC1863 Operating Systems CTEC1906 Internet Computing Setting up PuTTY CTEC1767 Data Communications & Networking CTEC1863 Operating Systems CTEC1906 Internet Computing Version 2.0 Updated for 2017 Winter Software* Microsoft Windows 7 (64-bit) PuTTY 0.67 PuTTYgen

More information

Joint Venture Hospital Laboratories. Secure File Transfer Protocol (SFTP) Secure Socket Shell (SSH) User s Guide for plmweb.jvhl.

Joint Venture Hospital Laboratories. Secure File Transfer Protocol (SFTP) Secure Socket Shell (SSH) User s Guide for plmweb.jvhl. Joint Venture Hospital Laboratories Secure File Transfer Protocol (SFTP) Secure Socket Shell (SSH) User s Guide for plmweb.jvhl.org For Secure File Transfers via the Internet Introduction Version 2.2 April

More information

Quick Reference Guide. Online Courier: File Transfer Protocol (FTP) Signing On. Using FTP Pickup

Quick Reference Guide. Online Courier: File Transfer Protocol (FTP) Signing On. Using FTP Pickup Quick Reference Guide Online Courier: File Transfer Protocol (FTP) With SunTrust Online Courier, you can have reports and files delivered to you using a File Transfer Protocol (FTP) connection. There are

More information

KB How to upload large files to a JTAC Case

KB How to upload large files to a JTAC Case KB23337 - How to upload large files to a JTAC Case SUMMARY: This article explains how to attach/upload files larger than 10GB to a JTAC case. It also and describes what files can be attached/uploaded to

More information

SSH PK Authentication and Auto login configuration for Chassis Management Controller

SSH PK Authentication and Auto login configuration for Chassis Management Controller SSH PK Authentication and Auto login configuration for Chassis Management Controller Dell technical white paper Dell Engineering May 2016 Author: Elangovan G Revisions Date August 2013 May 2016 Description

More information

Bitnami Apache Solr for Huawei Enterprise Cloud

Bitnami Apache Solr for Huawei Enterprise Cloud Bitnami Apache Solr for Huawei Enterprise Cloud Description Apache Solr is an open source enterprise search platform from the Apache Lucene project. It includes powerful full-text search, highlighting,

More information

LAB :: PGP (Pretty Good Privacy)

LAB :: PGP (Pretty Good Privacy) LAB :: PGP (Pretty Good Privacy) GnuPG : GnuPG forms the heart of Gpg4win the actual encryption software. Kleopatra : The central certificate administration of Gpg4win, which ensures uniform user navigation

More information

DOWNLOADING AND DECRYPTING FILES GUIDE

DOWNLOADING AND DECRYPTING FILES GUIDE TRICARE Management Activity DOWNLOADING AND DECRYPTING FILES GUIDE FOR 703 PHARMACY REFUNDS Version 1.0 DATE OF RELEASE 29 June 2012 A STFP client is mandatory to download the utilization files. If the

More information

Upgrading from Call Center Reporting to

Upgrading from Call Center Reporting to Upgrading from Call Center Reporting to Reporting for Call Center Upgrade Document Reporting for Call Center Release 2.2.1xx Document Number: 200-0400-110 Document Status: Standard Document Version: 3.02

More information

Firewalls can prevent access to the Unix Servers. Please make sure any firewall software or hardware allows access through Port 22.

Firewalls can prevent access to the Unix Servers. Please make sure any firewall software or hardware allows access through Port 22. EINSTEIN OVERVIEW Einstein (Einstein.franklin.edu) and Codd (codd.franklin.edu) are two servers that are used for many Computer Science (COMP) courses. Students will be directed to use either Einstein

More information

2. GETTING STARTED A. Secure File Transfer Protocol Procedures

2. GETTING STARTED A. Secure File Transfer Protocol Procedures OVERVIEW: A. IEHP utilizes the Secure File Transfer Protocol (SFTP) server to conduct all electronic data file transactions. Some of the benefits of using the SFTP are: 1. SFTP Is A Standard Protocol For

More information

Cryptography Application : SSH. Cyber Security & Network Security March, 2017 Dhaka, Bangladesh

Cryptography Application : SSH. Cyber Security & Network Security March, 2017 Dhaka, Bangladesh Cryptography Application : SSH Cyber Security & Network Security 20-22 March, 2017 Dhaka, Bangladesh Issue Date: [31-12-2015] Revision: [v.1] What is Safely Authentication I am Assured of Which Host I

More information

Lecture 30. Cryptography. Symmetric Key Cryptography. Key Exchange. Advanced Encryption Standard (AES) DES. Security April 11, 2005

Lecture 30. Cryptography. Symmetric Key Cryptography. Key Exchange. Advanced Encryption Standard (AES) DES. Security April 11, 2005 Lecture 30 Security April 11, 2005 Cryptography K A ciphertext Figure 7.3 goes here K B symmetric-key crypto: sender, receiver keys identical public-key crypto: encrypt key public, decrypt key secret Symmetric

More information

TRICARE MANAGEMENT ACTIVITY UNIFORM FORMULARY VOLUNTARY RETAIL AGREEMENTS DOWNLOADING & DECRYPTING FILES GUIDE

TRICARE MANAGEMENT ACTIVITY UNIFORM FORMULARY VOLUNTARY RETAIL AGREEMENTS DOWNLOADING & DECRYPTING FILES GUIDE TRICARE MANAGEMENT ACTIVITY UNIFORM FORMULARY VOLUNTARY RETAIL AGREEMENTS DOWNLOADING & DECRYPTING FILES GUIDE A STFP client is mandatory to download the utilization files. If the manufacturer already

More information

MoveIT DMZ User Guide

MoveIT DMZ User Guide MoveIT DMZ User Guide December 10, 2014 1 Index MoveIT DMZ Introduction... 1 Initial Login and Password Change... 2 Navigation... 8 Installation Instructions for the Upload / Download Wizard... 12 Uploading

More information

WinSCP. Author A.Kishore/Sachin

WinSCP. Author A.Kishore/Sachin WinSCP WinSCP is a freeware windows client for the SCP (secure copy protocol), a way to transfer files across the network using the ssh (secure shell) encrypted protocol. It replaces other FTP programs

More information

SSH. What is Safely 6/19/ June 2018 PacNOG 22, Honiara, Solomon Islands Supported by:

SSH. What is Safely 6/19/ June 2018 PacNOG 22, Honiara, Solomon Islands Supported by: SSH 25-29 June 2018 PacNOG 22, Honiara, Solomon Islands Supported by: Issue Date: Revision: 1 What is Safely Authentication I am Assured of Which Host I am Talking With Authentication - The Host Knows

More information

ROC Site Instructions for using Medtronic CODE STAT software

ROC Site Instructions for using Medtronic CODE STAT software ROC Site Instructions for using Medtronic CODE STAT software All ECG files that are uploaded to ROC cases must have all patient identifiers removed. The following are instructions for configuring and using

More information

IP Security. Have a range of application specific security mechanisms

IP Security. Have a range of application specific security mechanisms IP Security IP Security Have a range of application specific security mechanisms eg. S/MIME, PGP, Kerberos, SSL/HTTPS However there are security concerns that cut across protocol layers Would like security

More information

Installing the WinSCP Secure FTP Client

Installing the WinSCP Secure FTP Client Draft 0.9 Page 1 of 6 Installing the WinSCP Secure FTP Client This document will instruct you to install the WinSCP application that will provide Secure FTP (SFTP) access to your website folder. So why

More information

Using keys with SSH Rob Judd

Using keys with SSH Rob Judd Using keys with SSH Rob Judd (rjudd@mlug.missouri.edu) Introduction SSH is a drop-in replacement for telnet that allows encrypted network connections. There are two main versions, 1.5 SSH-1 and 2.0 SSH-2

More information

Apptix Online Backup by Mozy User Guide

Apptix Online Backup by Mozy User Guide Apptix Online Backup by Mozy User Guide 1.10.1.2 Contents Chapter 1: Overview...5 Chapter 2: Installing Apptix Online Backup by Mozy...7 Downloading the Apptix Online Backup by Mozy Client...7 Installing

More information

Student Website Setup

Student Website Setup In this course, students upload assignments to their websites hosted on the coislinux.austincc.edu server in addition to submitting to Blackboard (Bb). Each student is supplied with a password protected

More information

Firewalls, Tunnels, and Network Intrusion Detection

Firewalls, Tunnels, and Network Intrusion Detection Firewalls, Tunnels, and Network Intrusion Detection 1 Firewalls A firewall is an integrated collection of security measures designed to prevent unauthorized electronic access to a networked computer system.

More information

TRIM Document Queue Instructions

TRIM Document Queue Instructions TRIM Document Queue Instructions Document Queues allow TRIM/Records Online users to process large numbers of documents, using templates with predefined, rule based values. To begin, create a folder to

More information

Zen Internet. Online Data Backup. Zen Vault Express for Mac. Issue:

Zen Internet. Online Data Backup. Zen Vault Express for Mac. Issue: Zen Internet Online Data Backup Zen Vault Express for Mac Issue: 2.0.08 Tel: 01706 90200 Fax: 01706 902005 E-mail: info@zen.co.uk Web: www.zen.co.uk Zen Internet 2015 Contents 1 Introduction... 3 1.1 System

More information

Read Naturally SE Update Windows Network Installation Instructions

Read Naturally SE Update Windows Network Installation Instructions Windows Network This document explains how to apply the Read Naturally Software Edition 2.0.3 update to existing installations of SE version 2.0, 2.0.1, or 2.0.2. First update the SE server software, and

More information

Cryptography Application : SSH. 7 Sept 2017, Taichung, Taiwan

Cryptography Application : SSH. 7 Sept 2017, Taichung, Taiwan Cryptography Application : SSH 7 Sept 2017, Taichung, Taiwan What is Safely Authentication I am Assured of Which Host I am Talking With Authentication - The Host Knows Who I Am The Traffic is Encrypted

More information

Displaying SSL Configuration Information and Statistics

Displaying SSL Configuration Information and Statistics CHAPTER 7 Displaying SSL Configuration Information and Statistics This chapter describes the show commands available for displaying CSS SSL configuration information and statistics and an explanation of

More information

CLIENT DATABASE SECURITY

CLIENT DATABASE SECURITY CLIENT DATABASE SECURITY 1502 RXR Plaza 15th Floor, West Tower Uniondale, NY 11556 Telephone: (516) 227-6600 Facsimile: (516) 227-1799 Website: http://www.openlink.com Revision History Document Name Date

More information

Implementing Secure Shell

Implementing Secure Shell Implementing Secure Shell Secure Shell (SSH) is an application and a protocol that provides a secure replacement to the Berkeley r-tools. The protocol secures sessions using standard cryptographic mechanisms,

More information

Volume. Enterprise Secure File Transfer (ESFT) User Guide

Volume. Enterprise Secure File Transfer (ESFT) User Guide Volume Enterprise Secure File Transfer (ESFT) User Guide Date: 04/08/2015 Copyright 2011, PG&E Fo r PG&E internal use o nly All rights reserved. Legal Notices Pacific Gas and Electric Co. (hereinafter

More information

Adobe Marketing Cloud Using FTP and sftp with the Adobe Marketing Cloud

Adobe Marketing Cloud Using FTP and sftp with the Adobe Marketing Cloud Adobe Marketing Using FTP and sftp with the Adobe Marketing Contents Using FTP and sftp with the Adobe Marketing...3 Setting Up FTP Accounts Hosted by Adobe...3 Classifications...3 Data Sources...4 Data

More information

AT&T Global Network Client for Mac User s Guide Version 2.0.0

AT&T Global Network Client for Mac User s Guide Version 2.0.0 Version 1.7.0 AT&T Global Network Client for Mac User s Guide Version 2.0.0 experience may vary. This document is not an offer, commitment, representation or warranty by AT&T and is subject to change..

More information

Student Website Setup

Student Website Setup In this course, students upload assignments to their websites hosted on the coislinux.austincc.edu server. Each student is supplied with a password protected account to access their individual websites.

More information

End User Manual. December 2014 V1.0

End User Manual. December 2014 V1.0 End User Manual December 2014 V1.0 Contents Getting Started... 4 How to Log into the Web Portal... 5 How to Manage Account Settings... 6 The Web Portal... 8 How to Upload Files in the Web Portal... 9 How

More information

Parental Webcam. User Guide

Parental Webcam. User Guide Parental Webcam User Guide 1 Table of Contents 1 Opening an Account 3 1.1 The Unique Nursery Code 3 1.2 Your Details 4 2 Logging In 5 2.1 Forgotten / Changing your Password 5 3 Viewing a Camera 8 3.1 The

More information

Classroom Practice Labs Administration Portal User Guide

Classroom Practice Labs Administration Portal User Guide gtslearning.com Classroom Practice Labs Administration Portal User Guide Contents User Guide... 1 Accessing the portal... 1 User Administration... 2 Creating Users accounts (Individually)... 3 Amend an

More information

Ricoh Managed File Transfer (MFT) User Guide

Ricoh Managed File Transfer (MFT) User Guide Ricoh Managed File Transfer (MFT) User Guide -- TABLE OF CONTENTS 1 ACCESSING THE SITE... 3 1.1. WHAT IS RICOH MFT... 3 1.2. SUPPORTED BROWSERS... 3 1.3. LOG IN... 3 1.4. NAVIGATION... 4 1.5. FORGOTTEN

More information

Secure IIS Web Server with SSL

Secure IIS Web Server with SSL Publication Date: May 24, 2017 Abstract The purpose of this document is to help users to Install and configure Secure Socket Layer (SSL) Secure the IIS Web server with SSL It is supported for all EventTracker

More information

Author A.Kishore/Sachin WinSCP

Author A.Kishore/Sachin   WinSCP WinSCP WinSCP is a freeware windows client for the SCP (secure copy protocol), a way to transfer files across the network using the ssh (secure shell) encrypted protocol. It replaces other FTP programs

More information

Management Access. Configure Management Remote Access. Configure ASA Access for ASDM, Telnet, or SSH

Management Access. Configure Management Remote Access. Configure ASA Access for ASDM, Telnet, or SSH This chapter describes how to access the Cisco ASA for system management through Telnet, SSH, and HTTPS (using ASDM), how to authenticate and authorize users, and how to create login banners. Configure

More information

Setting up PuTTY. Software* Download PuTTY 6/9/18. Microsoft Windows 7 (64-bit) PuTTY 0.70 (64-bit) PuTTYgen 0.70 (64-bit) WinSCP 5.13.

Setting up PuTTY. Software* Download PuTTY 6/9/18. Microsoft Windows 7 (64-bit) PuTTY 0.70 (64-bit) PuTTYgen 0.70 (64-bit) WinSCP 5.13. Software* Setting up PuTTY CTEC1767 Data Communications & Networking CTEC1863 Operating Systems CTEC1906 Internet Computing Microsoft Windows 7 (64-bit) PuTTY 0.70 (64-bit) PuTTYgen 0.70 (64-bit) WinSCP

More information

UNIVERSITY OF NORTH TEXAS DEPARTMENT OF LEARNING TECHNOLOGIES SPRING

UNIVERSITY OF NORTH TEXAS DEPARTMENT OF LEARNING TECHNOLOGIES SPRING How-To Set Up Your Classes Web Space Windows and Mac Go to https://classes.lt.unt.edu/ (1) In the menu bar Click Register (2) Use your regular EUID (abc1234 format) and password. (3) Choose your role and

More information

Printer Driver User Guide

Printer Driver User Guide PRINT COPY SCAN FAX ECOSYS M660idn ECOSYS M655idn ECOSYS M65idn ECOSYS M65dn Printer Driver User Guide PRINT COPY SCAN ECOSYS M5idn ECOSTS M5dn Legal Notes Unauthorized reproduction of all or part of this

More information

Transport Level Security

Transport Level Security 2 Transport Level Security : Security and Cryptography Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 28 October 2013 css322y13s2l12, Steve/Courses/2013/s2/css322/lectures/transport.tex,

More information

Secure Single Sign On with FingerTec OFIS

Secure Single Sign On with FingerTec OFIS Secure Single Sign On with FingerTec OFIS User Guide CONTENTS 3 1 INTRODUCTION Welcome to OFIS Gateway 4-11 2 INSTALLATION & SETUP Registering Your OFIS Gateway Installing & Setting Up Your OFIS Gateway

More information

SmartCash SmartNode SCRIPT Setup Guide v2.2. Windows 10. Date: 20/02/2018. By (Jazz) yoyomonkey

SmartCash SmartNode SCRIPT Setup Guide v2.2. Windows 10. Date: 20/02/2018. By (Jazz) yoyomonkey SmartCash SmartNode SCRIPT Setup Guide v2.2 Date: Introduction Welcome to this step by step guide that will take you through the process of creating your own SmartCash SmartNode. This guide is aimed at

More information

Configuring a site-to-site VPN with a VPN-1 Gateway using the VPN-1 Edge VPN Wizard

Configuring a site-to-site VPN with a VPN-1 Gateway using the VPN-1 Edge VPN Wizard Configuring a site-to-site VPN with a VPN-1 Gateway using the VPN-1 Edge VPN Wizard VPN-1/FireWall-1 NG with Application Intelligence R55 HFA 13 Windows 2000 Server VPN-1 Edge X Series Firmware 5.0.57x

More information

Contents. Introduction. Prerequisites. Requirements. Components Used

Contents. Introduction. Prerequisites. Requirements. Components Used Contents Introduction Prerequisites Requirements Components Used Background Information Configure Step 1. Use the Public CA or the Set Up CA on Windows Server 2003 Step 2. Verify Hostname and Settings

More information

Loan Closing Advisor SM. User Guide. December 2017

Loan Closing Advisor SM. User Guide. December 2017 Loan Closing Advisor SM User Guide December 2017 Notice This User Guide is Freddie Mac s CONFIDENTIAL INFORMATION as defined in and subject to the provisions of the Freddie Mac Single Family Seller/Servicer

More information

Cryptography - SSH. Network Security Workshop May 2017 Phnom Penh, Cambodia

Cryptography - SSH. Network Security Workshop May 2017 Phnom Penh, Cambodia Cryptography - SSH Network Security Workshop 29-31 May 2017 Phnom Penh, Cambodia What is Safely Authentication I know who I am talking with Our communication is Encrypted Telnet Servers Terminal Routers

More information

FRCC Secure Data Transfer. Users Guide V1.5

FRCC Secure Data Transfer. Users Guide V1.5 FRCC Secure Data Transfer Users Guide V1.5 Table of Contents I. Introduction... 2 II. Part 1 - Software Installation... 3 III. Part 2 - Creating Your PKI Certificate... 7 IV. Part 3 - Importing FRCC Public

More information

BlackBerry Enterprise Server for Microsoft Exchange 4.1

BlackBerry Enterprise Server for Microsoft Exchange 4.1 April 2006 PGP Support Package for BlackBerry PGP Universal 2.0 BlackBerry Enterprise Server for Microsoft Exchange 4.1 Administrator s Guide Version 1.3 2 Table of Contents INTRODUCTION...3 DESIGN & REQUIREMENTS...3

More information

Titan FTP Server SSH Host Key Authentication with SFTP

Titan FTP Server SSH Host Key Authentication with SFTP 2016 Titan FTP Server SSH Host Key Authentication with SFTP A guide for configuring and maintaining SSH Host Key Authentication for SFTP connections in Titan FTP Server. QuickStart Guide 2016 South River

More information

Upgrading from Call Center Reporting to Reporting for Call Center

Upgrading from Call Center Reporting to Reporting for Call Center Upgrading from Call Center Reporting to Reporting for Call Center www.nortelnetworks.com 2003 Nortel Networks i Table of Contents Table of Contents Change History...1 How to use this guide...2 Introduction...

More information

Cryptography - SSH. Network Security Workshop. 3-5 October 2017 Port Moresby, Papua New Guinea

Cryptography - SSH. Network Security Workshop. 3-5 October 2017 Port Moresby, Papua New Guinea Cryptography - SSH Network Security Workshop 3-5 October 2017 Port Moresby, Papua New Guinea 1 What is Secure Authentication I know who I am talking to Our communication is Encrypted Telnet Servers Terminal

More information

AT&T Global Network Client for Mac User s Guide Version 1.7.3

AT&T Global Network Client for Mac User s Guide Version 1.7.3 Version 1.7.0 AT&T Global Network Client for Mac User s Guide Version 1.7.3 experience may vary. This document is not an offer, commitment, representation or warranty by AT&T and is subject to change..

More information

SUREedge MIGRATOR INSTALLATION GUIDE FOR HYPERV

SUREedge MIGRATOR INSTALLATION GUIDE FOR HYPERV SUREedge MIGRATOR INSTALLATION GUIDE 5.0.1 FOR HYPERV 2025 Gateway Place, Suite #480, San Jose, CA, 95110 Important Notice This document is provided "as is" without any representations or warranties, express

More information

BACKUP APP V7 CLOUUD FILE BACKUP & RESTORE GUIDE FOR WINDOWS

BACKUP APP V7 CLOUUD FILE BACKUP & RESTORE GUIDE FOR WINDOWS V7 CLOUUD FILE BACKUP & RESTORE GUIDE FOR WINDOWS Table of Contents 1 Overview... 1 1.1 About This Document... 7 2 Preparing for Backup and Restore... 8 2.1 Hardware Requirement... 8 2.2 Software Requirement...

More information

Software Token. Installation and User Guide. 22 September 2017

Software Token. Installation and User Guide. 22 September 2017 Software Token Installation and User Guide 22 September 2017 Notices Following are policies pertaining to proprietary rights and trademarks. Proprietary Rights The information contained in this document

More information

Wireless Terminal Emulation Advanced Terminal Session Management (ATSM) Device Management Stay-Linked

Wireless Terminal Emulation Advanced Terminal Session Management (ATSM) Device Management Stay-Linked Wireless Terminal Emulation Advanced Terminal Session Management (ATSM) Device Management Stay-Linked Secure Communications Stay-Linked Secure Communications Guide Page 1 Rev. 10.0.0 Dated: 04/26/10 Table

More information

SUREedge MIGRATOR INSTALLATION GUIDE FOR NUTANIX ACROPOLIS

SUREedge MIGRATOR INSTALLATION GUIDE FOR NUTANIX ACROPOLIS SUREedge MIGRATOR INSTALLATION GUIDE 5.0.1 FOR NUTANIX ACROPOLIS 2025 Gateway Place, Suite #480, San Jose, CA, 95110 Important Notice This document is provided "as is" without any representations or warranties,

More information

CKHS VPN Connection Instructions

CKHS VPN Connection Instructions CKHS VPN Connection Instructions This document provides all authorized colleagues with instruction for accessing the CKHS network via a Virtual Private Network. Connection Prerequisites: 1. Operating System:

More information

Application Note. Configuring SSH on Vocality units. Software From V07_04_01. Revision v1.5

Application Note. Configuring SSH on Vocality units. Software From V07_04_01. Revision v1.5 Application Note Configuring SSH on Vocality units Software From V07_04_01 Revision v1.5 Publish Date November 2017 AN309 CONFIGURING SSH SSH requires the Security software (RTUSEC) and a Feature Key on

More information

Cipher Suite Configuration Mode Commands

Cipher Suite Configuration Mode Commands The Cipher Suite Configuration Mode is used to configure the building blocks for SSL cipher suites, including the encryption algorithm, hash function, and key exchange. Important The commands or keywords/variables

More information

Configuring SSH Public Key Authentication

Configuring SSH Public Key Authentication 6AOSCG0060-29A January 2014 Configuration Guide Configuring SSH Public Key Authentication This guide describes how to configure and use Secure Shell (SSH) public key authentication on products running

More information

Appendix REPOX User Manual

Appendix REPOX User Manual D5.3.1 Europeana OAI-PMH Infrastructure Documentation and final prototype co-funded by the European Union The project is co-funded by the European Union, through the econtentplus programme http://ec.europa.eu/econtentplus

More information

LiveNX Upgrade Guide from v5.1.2 to v Windows

LiveNX Upgrade Guide from v5.1.2 to v Windows LIVEACTION, INC. LiveNX Upgrade Guide from v5.1.2 to v5.1.3 - Windows UPGRADE LiveAction, Inc. 3500 Copyright WEST BAYSHORE 2016 LiveAction, ROAD Inc. All rights reserved. LiveAction, LiveNX, LiveUX, the

More information

AUTOMATED APPOINTMENT REMINDER AND ANNOUNCEMENT SYSTEM

AUTOMATED APPOINTMENT REMINDER AND ANNOUNCEMENT SYSTEM SARS Messages AUTOMATED APPOINTMENT REMINDER AND ANNOUNCEMENT SYSTEM USER MANUAL 2011-2015 by SARS Software Products, Inc. All rights reserved. COPYRIGHT Copyright 2011-2015 SARS Software Products, Inc.

More information

Oracle Utilities Opower Secure File Transfer Specification

Oracle Utilities Opower Secure File Transfer Specification Oracle Utilities Opower Secure File Transfer Specification E84784-01 Specification Version Number: v1-1-0 Last Update: September 14, 2018 Oracle Utilities Opower Secure File Transfer Specification E84784-01

More information

Disaster Recovery System

Disaster Recovery System Backup and Restore Overview, on page 1 Backup Prerequisites, on page 1 Backup Taskflow, on page 3 Backup and Restore Overview The (DRS) provides full data backup for all servers in a Cisco Unified Intelligence

More information

Secure File Transfer Protocol (SFTP) Data Submission Users Manual. July 2017, Version 1.6

Secure File Transfer Protocol (SFTP) Data Submission Users Manual. July 2017, Version 1.6 Secure File Transfer Protocol (SFTP) Data Submission Users Manual July 2017, Version 1.6 DOCUMENT CHANGE HISTORY Version Number Date Page(s) Affected 1.0 June 2012 Initial version 1.1 March 2013 Formatting

More information

Dell Client System Update Version 1.0. User s Guide

Dell Client System Update Version 1.0. User s Guide Dell Client System Update Version 1.0 User s Guide Notes and Cautions NOTE: A NOTE indicates important information that helps you make better use of your computer. CAUTION: A CAUTION indicates potential

More information

UDG Interface Specification

UDG Interface Specification Please respond to: LME IT Solutions Delivery THE LONDON METAL EXCHANGE 10 Finsbury Square, London EC2A 1AJ Tel +44 (0)20 7113 8888 Registered in England no 2128666. Registered LME.COM 1 INTRODUCTION...

More information

Contents. SSL-Based Services: HTTPS and FTPS 2. Generating A Certificate 2. Creating A Self-Signed Certificate 3. Obtaining A Signed Certificate 4

Contents. SSL-Based Services: HTTPS and FTPS 2. Generating A Certificate 2. Creating A Self-Signed Certificate 3. Obtaining A Signed Certificate 4 Contents SSL-Based Services: HTTPS and FTPS 2 Generating A Certificate 2 Creating A Self-Signed Certificate 3 Obtaining A Signed Certificate 4 Enabling Secure Services 5 SSL/TLS Security Level 5 A Note

More information

(2½ hours) Total Marks: 75

(2½ hours) Total Marks: 75 (2½ hours) Total Marks: 75 N. B.: (1) All questions are compulsory. (2) Makesuitable assumptions wherever necessary and state the assumptions made. (3) Answers to the same question must be written together.

More information

What is Secure. Authenticated I know who I am talking to. Our communication is Encrypted

What is Secure. Authenticated I know who I am talking to. Our communication is Encrypted Crypto App - SSH 1 What is Secure Authenticated I know who I am talking to Our communication is Encrypted Telnet clear text Servers Terminal clear text Routers SSH encrypted channel encrypted text Servers

More information

TIBCO Managed File Transfer Internet Server Transfer and File Share Clients User's Guide

TIBCO Managed File Transfer Internet Server Transfer and File Share Clients User's Guide TIBCO Managed File Transfer Internet Server Transfer and File Share Clients User's Guide Software Release 8.1 March 2018 Two-Second Advantage 2 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES

More information

Business Insights Dashboard

Business Insights Dashboard Business Insights Dashboard Sage 500 ERP 2000-2013 Sage Software, Inc. All rights reserved. Sage, the Sage logos, and the Sage product and service names mentioned herein are registered trademarks or trademarks

More information

File Cabinet Manager

File Cabinet Manager Tool Box File Cabinet Manager Java File Cabinet Manager Password Protection Website Statistics Image Tool Image Tool - Resize Image Tool - Crop Image Tool - Transparent Form Processor Manager Form Processor

More information

Bitnami MariaDB for Huawei Enterprise Cloud

Bitnami MariaDB for Huawei Enterprise Cloud Bitnami MariaDB for Huawei Enterprise Cloud First steps with the Bitnami MariaDB Stack Welcome to your new Bitnami application running on Huawei Enterprise Cloud! Here are a few questions (and answers!)

More information

DSS User Guide. End User Guide. - i -

DSS User Guide. End User Guide. - i - DSS User Guide End User Guide - i - DSS User Guide Table of Contents End User Guide... 1 Table of Contents... 2 Part 1: Getting Started... 1 How to Log in to the Web Portal... 1 How to Manage Account Settings...

More information

Bitnami Re:dash for Huawei Enterprise Cloud

Bitnami Re:dash for Huawei Enterprise Cloud Bitnami Re:dash for Huawei Enterprise Cloud Description Re:dash is an open source data visualization and collaboration tool. It was designed to allow fast and easy access to billions of records in all

More information