RMNet function calls. Parameters: Usage: Micro Focus. RM/COBOL Development System - RMNET

Size: px
Start display at page:

Download "RMNet function calls. Parameters: Usage: Micro Focus. RM/COBOL Development System - RMNET"

Transcription

1 RMNet function calls All the calls except NetGetError, NetCleanup, and NetFree return a which, when nonzero, the string Free the errorpointer with NetFree. HttpPost This function initiates an HTTP POST request and waits for a response. The HTTP POST method is used to submit data to be processed by the identified resource. The data is included in the body of the request. call "HttpPost" using destination-url content-type request-pointer response-pointer [extra-headers] destination-url content-type request-pointer response-pointer extra-headers An alphanumeric item specifying the target URL for the POST. An alphanumeric item specifying the value of the ContentType HTTP header variable. A pointer to an alphanumeric item whose value comprises the content of the POST. A pointer to an alphanumeric item specifying the value of the HTTP response. After use, use NetFree to return memory used to store response. An optional alphanumeric item specifying extra headers to be added to the HTTP header. This argument consists of name/value pairs separated by hex x 00, and ended with two x 00 s. HttpGet This function initiates an HTTP GET request and waits for a response. The HTTP GET method is used to request a representation of the specified resource. call "HttpGet" using 1

2 destination-url response-pointer [extra-headers] destination-url response-pointer extra-headers An alphanumeric item specifying the target URL for the GET. A pointer to an alphanumeric item specifying the value of the HTTP response. After use, use NetFree to return memory used to store response. An optional alphanumeric item specifying extra headers to be added to the HTTP header. This argument consists of name/value pairs separated by hex x 00, and ended with two x 00 s. HttpGetReturnCode This function is used to return the three-digit HTTP status code from the last HTTP request. call "HttpGetReturnCode" using http-return-code http-return-code A three-digit RFC2616 compliant http status code. A status code that if nonzero the request encountered an error. HttpSetCookieFile This function will enable cookies in the current RMNet session and, optionally, can specify the location of a file used to store and retrieve cookies in Mozilla or Netscape cookie format. call "HttpSetCookieFile" [using cookie-file] 2

3 cookie-file An optional alphanumeric item specifying the location of a file used to store and retrieve cookies in Mozilla or Netscape cookie format. You may repeat the call for multiple cookie files. If given a blank or bad cookie-file then the call will merely enable Cookies for the current RMNet session. HttpSetEncoding This function sets the contents of the Accept-Encoding header sent in an HTTP request, and enables decoding of a response when a Content-Encoding header is received. This is a request, not an order; the server may or may not do it. call "HttpSetEncoding" [using encode-type] encode-type An optional alphanumeric item specifying the supported HTTP content encoding type. Three encodings are supported: "identity", which does nothing, "deflate" which requests the server to compress its response using the zlib algorithm, and "gzip" which requests the gzip algorithm. If the encode-type argument is not supplied, then an Accept-Encoding header containing all supported encodings is sent. HttpSetResponseHeader This function will enable or disable the inclusion of HTTP response headers in the XML response document. call "HttpSetResponseHeader using http-header-flag 3

4 http-header-flag A numeric item. If this item is set to "1" the HTTP response headers will be included in the XML output. This function must be called again with httpheader-flag set to "0" to disable the inclusion of HTTP response headers. NetInit This function initializes the RMNet session and must be called before any other RMNet calls; otherwise, an error code will be returned in call "NetInit" A status code that if nonzero the request encountered an error. NetCleanup This function frees up all of the resources owned by an RMNet session. If you call this, and wish to create another RMNet session, you must call NetInit again. Any response and error pointers retrieved by NetGetError and the Get/Post functions must be freed by the caller. call "NetCleanup". NetSetProxyServer This function will set the HTTP proxy to use. Error codes will be returned in call "NetSetProxyServer" using 4

5 proxy-server proxy-server An alphanumeric item specifying the host name or dotted IP address of proxy server. To specify the port number, append :[port] to the end of the host name. NetSetSSLCA This function is used to specify a file containing one, or more, certificates of public Certificate Authorities. The certificates must be in PEM format. call "NetSetSSLCA" using public-ca-file public-ca-file An alphanumeric item specifying the location of a file containing accepted public certificate authorities. (Default: ca-bundle.crt supplied in the zip file.) NetSetSSLCert This function is used to specify the location of a file containing a client-side Secure Sockets Layer (SSL) certificate. call "NetSetSSLCert" using public-cert-file 5

6 public-cert-file An alphanumeric item specifying the location of a file containing a PEM formatted certificate. NetSetSSLKey This function is used to specify the location of a file containing a Sockets Layer (SSL) private key file. The private key file must be in PEM format. call "NetSetSSLKey" using private-key-file private-key-file An alphanumeric item specifying the location of a file containing the file name of a PEM formatted private key. NetSetKeyPassword This function is used to specify the password required to load your SSL private key file. call "NetSetKeyPassword" using private-key-password private-key-password An alphanumeric item containing the password required for your SSL private key. 6

7 NetSSLVerifyPeer Micro Focus This function will enable or disable the SSL peer verification. This will determine whether RMNet verifies the authenticity of the peer s certificate, i.e. that you can trust that the server is who the certificate says it is. This trust is based on a chain of digital signatures, rooted in certification authorities located in your certificate authorities bundle. call "NetSSLVerifyPeer using SSL-verifypeer-flag SSL-verifypeer-flag A numeric item. If this item is set to "1" RMnet will verify the authenticity of the peer s certificate (default), if set to 0, peer certificate authenticity will not be verified. NetGetError This function is used to return the text of an error from the last RMNet operation. call "NetGetError" error-pointer. error-pointer A pointer to an alphanumeric item describing the error that occurred during the transaction, if any. After use, use NetFree to return memory used to store response. NetFree This function is used to free the memory of a pointer given by RMNet. 7

8 call "NetFree" using pointer-to-free. pointer-to-free A pointer given by RMNet that caller wishes to free. Use this function only for pointers that have been given to caller by RMNet. 8

Create Decryption Policies to Control HTTPS Traffic

Create Decryption Policies to Control HTTPS Traffic Create Decryption Policies to Control HTTPS Traffic This chapter contains the following sections: Overview of Create Decryption Policies to Control HTTPS Traffic, page 1 Managing HTTPS Traffic through

More information

How to Set Up External CA VPN Certificates

How to Set Up External CA VPN Certificates To configure a client-to-site, or site-to-site VPN using s created by External CA, you must create the following VPN s for the VPN service to be able to authenticate Before you begin Use an external CA

More information

Lecture 7b: HTTP. Feb. 24, Internet and Intranet Protocols and Applications

Lecture 7b: HTTP. Feb. 24, Internet and Intranet Protocols and Applications Internet and Intranet Protocols and Applications Lecture 7b: HTTP Feb. 24, 2004 Arthur Goldberg Computer Science Department New York University artg@cs.nyu.edu WWW - HTTP/1.1 Web s application layer protocol

More information

Configuring SSL CHAPTER

Configuring SSL CHAPTER 7 CHAPTER This chapter describes the steps required to configure your ACE appliance as a virtual Secure Sockets Layer (SSL) server for SSL initiation or termination. The topics included in this section

More information

Configuring SSL. SSL Overview CHAPTER

Configuring SSL. SSL Overview CHAPTER 7 CHAPTER This topic describes the steps required to configure your ACE appliance as a virtual Secure Sockets Layer (SSL) server for SSL initiation or termination. The topics included in this section are:

More information

Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco website at

Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco website at Document Date: May 16, 2017 THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL

More information

Configuring SSL. SSL Overview CHAPTER

Configuring SSL. SSL Overview CHAPTER CHAPTER 8 Date: 4/23/09 This topic describes the steps required to configure your ACE (both the ACE module and the ACE appliance) as a virtual Secure Sockets Layer (SSL) server for SSL initiation or termination.

More information

Configuring Traffic Policies

Configuring Traffic Policies CHAPTER 11 Date: 4/23/09 Cisco Application Networking Manager helps you configure class maps and policy maps to provide a global level of classification for filtering traffic received by or passing through

More information

ISY994 Series Network Security Configuration Guide Requires firmware version Requires Java 1.8+

ISY994 Series Network Security Configuration Guide Requires firmware version Requires Java 1.8+ ISY994 Series Network Security Configuration Guide Requires firmware version 4.5.4+ Requires Java 1.8+ 1 Introduction Universal Devices, Inc. takes ISY security extremely seriously. As such, all ISY994

More information

Creating and Installing SSL Certificates (for Stealthwatch System v6.10)

Creating and Installing SSL Certificates (for Stealthwatch System v6.10) Creating and Installing SSL Certificates (for Stealthwatch System v6.10) Copyrights and Trademarks 2017 Cisco Systems, Inc. All rights reserved. NOTICE THE SPECIFICATIONS AND INFORMATION REGARDING THE

More information

Managing Certificates

Managing Certificates CHAPTER 12 The Cisco Identity Services Engine (Cisco ISE) relies on public key infrastructure (PKI) to provide secure communication for the following: Client and server authentication for Transport Layer

More information

Princess Nora Bint Abdulrahman University College of computer and information sciences Networks department Networks Security (NET 536)

Princess Nora Bint Abdulrahman University College of computer and information sciences Networks department Networks Security (NET 536) Princess Nora Bint Abdulrahman University College of computer and information sciences Networks department Networks Security (NET 536) Prepared by Dr. Samia Chelloug E-mail: samia_chelloug@yahoo.fr Content

More information

But where'd that extra "s" come from, and what does it mean?

But where'd that extra s come from, and what does it mean? SSL/TLS While browsing Internet, some URLs start with "http://" while others start with "https://"? Perhaps the extra "s" when browsing websites that require giving over sensitive information, like paying

More information

Assignment pts

Assignment pts CSE 127: Computer Security - Fall 2014 Assignment 4 120 pts Due November 4 10:00 P.M. PDT This is a three part assignment. For the first part of the assignment, you will create an AppArmor profile for

More information

Software Description Application Software OTT Hydras 3 net

Software Description Application Software OTT Hydras 3 net English Software Description Application Software OTT Hydras 3 net We reserve the right to make technical changes and improvements without notice! Table of contents 1 Overview of OTT Hydras 3 net 5 2 Data

More information

Contents. SSL-Based Services: HTTPS and FTPS 2. Generating A Certificate 2. Creating A Self-Signed Certificate 3. Obtaining A Signed Certificate 4

Contents. SSL-Based Services: HTTPS and FTPS 2. Generating A Certificate 2. Creating A Self-Signed Certificate 3. Obtaining A Signed Certificate 4 Contents SSL-Based Services: HTTPS and FTPS 2 Generating A Certificate 2 Creating A Self-Signed Certificate 3 Obtaining A Signed Certificate 4 Enabling Secure Services 5 A Note About Ports 5 Connecting

More information

Configuring Virtual Servers

Configuring Virtual Servers 3 CHAPTER This section provides an overview of server load balancing and procedures for configuring virtual servers for load balancing on an ACE appliance. Note When you use the ACE CLI to configure named

More information

Manage Certificates. Certificates Overview

Manage Certificates. Certificates Overview Certificates Overview, page 1 Show Certificates, page 3 Download Certificates, page 4 Install Intermediate Certificates, page 4 Delete a Trust Certificate, page 5 Regenerate a Certificate, page 6 Upload

More information

How to Configure SSL Interception in the Firewall

How to Configure SSL Interception in the Firewall Most applications encrypt outgoing connections with SSL or TLS. SSL Interception decrypts SSL-encrypted traffic to allow Application Control features (such as the Virus Scanner, ATD, URL Filter, Safe Search,

More information

How to Set Up VPN Certificates

How to Set Up VPN Certificates For the VPN service, you can use either self-signed certificates or certificates that are generated by an external CA. In this article: Before You Begin Before you set up VPN certificates, verify that

More information

CKO2 - XML Protocols. CKO2 outputs - A2A general description. NBB - IT Department. IT Applications - PRSM. Date: 12/05/2011. Document version: V0.

CKO2 - XML Protocols. CKO2 outputs - A2A general description. NBB - IT Department. IT Applications - PRSM. Date: 12/05/2011. Document version: V0. CKO2 outputs - A2A general description Author: Service: NBB - IT Department IT Applications - PRSM Date: 12/05/2011 Document version: V0.4 Table of Contents 1. Introduction 3 1.1 Document history 3 1.2

More information

On-demand target, up and running

On-demand target, up and running On-demand target, up and running ii On-demand target, up and running Contents Chapter 1. Assumptions........ 1 Chapter 2. Overview......... 3 Chapter 3. Component purpose.... 5 Chapter 5. Starting a session

More information

httplib2 Release 0.4

httplib2 Release 0.4 httplib2 Release 0.4 June 23, 2017 Contents 1 httplib2 A comprehensive HTTP client library. 3 1.1 Http Objects............................................... 5 1.2 Cache Objects..............................................

More information

SSL Accelerated Service Configuration Mode Commands

SSL Accelerated Service Configuration Mode Commands SSL Accelerated Service Configuration Mode Commands SSL accelerated services lets you enable and configure SSL acceleration on your WAAS system, and define services to be accelerated on the SSL path. To

More information

Configuring the VPN Client 3.x to Get a Digital Certificate

Configuring the VPN Client 3.x to Get a Digital Certificate Configuring the VPN Client 3.x to Get a Digital Certificate Document ID: 4302 Contents Introduction Prerequisites Requirements Components Used Conventions Configure the VPN Client Verify Troubleshoot Related

More information

UCS Manager Communication Services

UCS Manager Communication Services Communication Protocols, page 1 Communication Services, page 1 Non-Secure Communication Services, page 3 Secure Communication Services, page 5 Network-Related Communication Services, page 12 Communication

More information

Nasuni Data API Nasuni Corporation Boston, MA

Nasuni Data API Nasuni Corporation Boston, MA Nasuni Corporation Boston, MA Introduction The Nasuni API has been available in the Nasuni Filer since September 2012 (version 4.0.1) and is in use by hundreds of mobile clients worldwide. Previously,

More information

Cryptography SSL/TLS. Network Security Workshop. 3-5 October 2017 Port Moresby, Papua New Guinea

Cryptography SSL/TLS. Network Security Workshop. 3-5 October 2017 Port Moresby, Papua New Guinea Cryptography SSL/TLS Network Security Workshop 3-5 October 2017 Port Moresby, Papua New Guinea 1 History Secure Sockets Layer was developed by Netscape in 1994 as a protocol which permitted persistent

More information

Displaying SSL Configuration Information and Statistics

Displaying SSL Configuration Information and Statistics CHAPTER 7 Displaying SSL Configuration Information and Statistics This chapter describes the show commands available for displaying CSS SSL configuration information and statistics and an explanation of

More information

SAP API Management Cloud Connector PUBLIC

SAP API Management Cloud Connector PUBLIC SAP API Management Cloud Connector PUBLIC Objectives After completing this unit, you will be able to: - Understand Cloud connector and its value proposition - Call an API accessible through Cloud Connector

More information

FortiNAC. Analytics SSL Certificates. Version: 5.x Date: 8/28/2018. Rev: D

FortiNAC. Analytics SSL Certificates. Version: 5.x Date: 8/28/2018. Rev: D FortiNAC Analytics SSL Certificates Version: 5.x Date: 8/28/2018 Rev: D 1 FORTINET DOCUMENT LIBRARY http://docs.fortinet.com FORTINET VIDEO GUIDE http://video.fortinet.com FORTINET KNOWLEDGE BASE http://kb.fortinet.com

More information

Scan Report Executive Summary

Scan Report Executive Summary Scan Report Executive Summary Part 1. Scan Information Scan Customer Company: Date scan was completed: Vin65 ASV Company: Comodo CA Limited 08/28/2017 Scan expiration date: 11/26/2017 Part 2. Component

More information

Load Balancing VMware Workspace Portal/Identity Manager

Load Balancing VMware Workspace Portal/Identity Manager Load Balancing VMware Workspace Portal/Identity Manager Overview VMware Workspace Portal/Identity Manager combines applications and desktops in a single, aggregated workspace. Employees can then access

More information

Nasuni Data API Nasuni Corporation Boston, MA

Nasuni Data API Nasuni Corporation Boston, MA Nasuni Corporation Boston, MA Introduction The Nasuni API has been available in the Nasuni Filer since September 2012 (version 4.0.1) and is in use by hundreds of mobile clients worldwide. Previously,

More information

App Orchestration 2.6

App Orchestration 2.6 Configuring NetScaler 10.5 Load Balancing with StoreFront 3.0 and NetScaler Gateway for Last Updated: June 04, 2015 Contents Introduction... 3 Configure the NetScaler load balancer certificates... 3 To

More information

Certificate Renewal on Cisco Identity Services Engine Configuration Guide

Certificate Renewal on Cisco Identity Services Engine Configuration Guide Certificate Renewal on Cisco Identity Services Engine Configuration Guide Document ID: 116977 Contributed by Roger Nobel, Cisco TAC Engineer. Jun 26, 2015 Contents Introduction Prerequisites Requirements

More information

Step-by-step installation guide for monitoring untrusted servers using Operations Manager

Step-by-step installation guide for monitoring untrusted servers using Operations Manager Step-by-step installation guide for monitoring untrusted servers using Operations Manager Most of the time through Operations Manager, you may require to monitor servers and clients that are located outside

More information

Configuring SSL Security

Configuring SSL Security CHAPTER9 This chapter describes how to configure SSL on the Cisco 4700 Series Application Control Engine (ACE) appliance. This chapter contains the following sections: Overview Configuring SSL Termination

More information

Using the Cisco ACE Application Control Engine Application Switches with the Cisco ACE XML Gateway

Using the Cisco ACE Application Control Engine Application Switches with the Cisco ACE XML Gateway Using the Cisco ACE Application Control Engine Application Switches with the Cisco ACE XML Gateway Applying Application Delivery Technology to Web Services Overview The Cisco ACE XML Gateway is the newest

More information

Composer Help. Web Request Common Block

Composer Help. Web Request Common Block Composer Help Web Request Common Block 7/4/2018 Web Request Common Block Contents 1 Web Request Common Block 1.1 Name Property 1.2 Block Notes Property 1.3 Exceptions Property 1.4 Request Method Property

More information

BIG-IP System: SSL Administration. Version

BIG-IP System: SSL Administration. Version BIG-IP System: SSL Administration Version 13.1.0 Table of Contents Table of Contents About SSL Administration on the BIG-IP System...7 About SSL administration on the BIG-IP system... 7 Device Certificate

More information

Attestation Service for Intel Software Guard Extensions (Intel SGX): API Documentation. Revision: 3.0

Attestation Service for Intel Software Guard Extensions (Intel SGX): API Documentation. Revision: 3.0 Attestation Service for Intel Software Guard Extensions (Intel SGX): API Documentation Revision: 3.0 1 1 Abbreviations... 4 2 Attestation Service for Intel SGX... 5 Supported environments... 5 Authentication...

More information

PKI Trustpool Management

PKI Trustpool Management PKI Trustpool Management Last Updated: October 9, 2012 The PKI Trustpool Management feature is used to authenticate sessions, such as HTTPS, that occur between devices by using commonly recognized trusted

More information

Scan Report Executive Summary

Scan Report Executive Summary Scan Report Executive Summary Part 1. Scan Information Scan Customer Company: Date scan was completed: Vin65 ASV Company: Comodo CA Limited 11/20/2017 Scan expiration date: 02/18/2018 Part 2. Component

More information

Transport Level Security

Transport Level Security 2 Transport Level Security : Security and Cryptography Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 28 October 2013 css322y13s2l12, Steve/Courses/2013/s2/css322/lectures/transport.tex,

More information

CNIT 129S: Securing Web Applications. Ch 3: Web Application Technologies

CNIT 129S: Securing Web Applications. Ch 3: Web Application Technologies CNIT 129S: Securing Web Applications Ch 3: Web Application Technologies HTTP Hypertext Transfer Protocol (HTTP) Connectionless protocol Client sends an HTTP request to a Web server Gets an HTTP response

More information

6 Public Key Infrastructure 6.1 Certificates Structure of an X.509 certificate X.500 Distinguished Name and X.509v3 subjectalternativename

6 Public Key Infrastructure 6.1 Certificates Structure of an X.509 certificate X.500 Distinguished Name and X.509v3 subjectalternativename 6 Public Key Infrastructure 6.1 Certificates Structure of an X.509 certificate X.500 Distinguished Name and X.509v3 subjectalternativename Certificate formats (DER, PEM, PKCS #12) 6.2 Certificate Authorities

More information

VMware Identity Manager Connector Installation and Configuration (Legacy Mode)

VMware Identity Manager Connector Installation and Configuration (Legacy Mode) VMware Identity Manager Connector Installation and Configuration (Legacy Mode) VMware Identity Manager This document supports the version of each product listed and supports all subsequent versions until

More information

Installing and Configuring vcloud Connector

Installing and Configuring vcloud Connector Installing and Configuring vcloud Connector vcloud Connector 2.6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

Computer Networks. Wenzhong Li. Nanjing University

Computer Networks. Wenzhong Li. Nanjing University Computer Networks Wenzhong Li Nanjing University 1 Chapter 8. Internet Applications Internet Applications Overview Domain Name Service (DNS) Electronic Mail File Transfer Protocol (FTP) WWW and HTTP Content

More information

Technical Guideline TR eid-client Part 2: Conformance Test Specification. Version 1.3

Technical Guideline TR eid-client Part 2: Conformance Test Specification. Version 1.3 Technical Guideline TR-03124-2 e-client Part 2: Conformance Test Specification Version 1.3 12. June 2017 Federal Office for Information Security Post Box 20 03 63 D-53133 Bonn Phone: +49 22899 9582-0 E-Mail:

More information

File submissions to VINN and KRITA

File submissions to VINN and KRITA Date Page 2017-10-25 1 (10) Recipient: Respondents to VINN and KRITA File submissions to VINN and KRITA Summary This document briefly describes the VINN/KRITA solution for file submissions in the form

More information

Transport Layer Security

Transport Layer Security CEN585 Computer and Network Security Transport Layer Security Dr. Mostafa Dahshan Department of Computer Engineering College of Computer and Information Sciences King Saud University mdahshan@ksu.edu.sa

More information

TABLE OF CONTENTS INTRODUCTION

TABLE OF CONTENTS INTRODUCTION KeyTalk - API Author MR vd Sman Creation date 14-March-2017 Last updated 7-January-2019 Document version 2.4.0 Minimal KeyTalk 5.5.0 server version Document status Qualified Product KeyTalk certificate

More information

CSCE 715: Network Systems Security

CSCE 715: Network Systems Security CSCE 715: Network Systems Security Chin-Tser Huang huangct@cse.sc.edu University of South Carolina Web Security Web is now widely used by business, government, and individuals But Internet and Web are

More information

OCSP Client Tool V2.2 User Guide

OCSP Client Tool V2.2 User Guide Ascertia Limited 40 Occam Road Surrey Research Park Guildford Surrey GU2 7YG Tel: +44 1483 685500 Fax: +44 1483 573704 www.ascertia.com OCSP Client Tool V2.2 User Guide Document Version: 2.2.0.2 Document

More information

Please select your version

Please select your version Installation Guide Please select your version Installation Instructions for SonicWALL Offloaders Installation Instructions for SonicWall SSL VPN Appliance Installation Instructions for SonicWALL Offloaders

More information

Web Services User Guide

Web Services User Guide This document covers how to process XML Requests and Responses using the Secure Trading Web Services interface. Published: 28 March 2018 3.8 (a) Table of Contents 1 Introduction... 3 1.1 Required steps...

More information

Using the Terminal Services Gateway Lesson 10

Using the Terminal Services Gateway Lesson 10 Using the Terminal Services Gateway Lesson 10 Skills Matrix Technology Skill Objective Domain Objective # Deploying a TS Gateway Server Configure Terminal Services Gateway 2.2 Terminal Services (TS) Web

More information

Venafi Server Agent Agent Overview

Venafi Server Agent Agent Overview Venafi Server Agent Agent Overview Venafi Server Agent Agent Intro Agent Architecture Agent Grouping Agent Prerequisites Agent Registration Process What is Venafi Agent? The Venafi Agent is a client/server

More information

VMware AirWatch Content Gateway for Windows. VMware Workspace ONE UEM 1811 Unified Access Gateway

VMware AirWatch Content Gateway for Windows. VMware Workspace ONE UEM 1811 Unified Access Gateway VMware AirWatch Content Gateway for Windows VMware Workspace ONE UEM 1811 Unified Access Gateway You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

The World Wide Web is widely used by businesses, government agencies, and many individuals. But the Internet and the Web are extremely vulnerable to

The World Wide Web is widely used by businesses, government agencies, and many individuals. But the Internet and the Web are extremely vulnerable to 1 The World Wide Web is widely used by businesses, government agencies, and many individuals. But the Internet and the Web are extremely vulnerable to compromises of various sorts, with a range of threats

More information

Android Mobile Single Sign-On to VMware Workspace ONE. SEP 2018 VMware Workspace ONE VMware Identity Manager VMware Identity Manager 3.

Android Mobile Single Sign-On to VMware Workspace ONE. SEP 2018 VMware Workspace ONE VMware Identity Manager VMware Identity Manager 3. Android Mobile Single Sign-On to VMware Workspace ONE SEP 2018 VMware Workspace ONE VMware Identity Manager VMware Identity Manager 3.3 You can find the most up-to-date technical documentation on the VMware

More information

Configuring Certificate Authorities and Digital Certificates

Configuring Certificate Authorities and Digital Certificates CHAPTER 43 Configuring Certificate Authorities and Digital Certificates Public Key Infrastructure (PKI) support provides the means for the Cisco MDS 9000 Family switches to obtain and use digital certificates

More information

X.509 Certificate Integration Kit 1.2

X.509 Certificate Integration Kit 1.2 X.509 Certificate Integration Kit 1.2 Contents 2 Contents PingFederate X.509 Certificate Integration Kit 1.2... 3 Intended audience... 3 System requirements...3 SSO processing... 3 Installation and setup...4

More information

Implementing Secure Socket Layer

Implementing Secure Socket Layer This module describes how to implement SSL. The Secure Socket Layer (SSL) protocol and Transport Layer Security (TLS) are application-level protocols that provide for secure communication between a client

More information

How to configure the UTM Web Application Firewall for Microsoft Lync Web Services connectivity

How to configure the UTM Web Application Firewall for Microsoft Lync Web Services connectivity How to configure the UTM Web Application Firewall for Microsoft Lync Web Services connectivity This article explains how to configure your Sophos UTM to allow access Microsoft s Lync Web Services (the

More information

This document describes the configuration of Secure Sockets Layer (SSL) decryption on the FirePOWER Module using ASDM (On-Box Management).

This document describes the configuration of Secure Sockets Layer (SSL) decryption on the FirePOWER Module using ASDM (On-Box Management). Contents Introduction Prerequisites Requirements Components Used Background Information Outbound SSL Decryption Inbound SSL Decryption Configuration for SSL Decryption Outbound SSL decryption (Decrypt

More information

Internet Architecture. Web Programming - 2 (Ref: Chapter 2) IP Software. IP Addressing. TCP/IP Basics. Client Server Basics. URL and MIME Types HTTP

Internet Architecture. Web Programming - 2 (Ref: Chapter 2) IP Software. IP Addressing. TCP/IP Basics. Client Server Basics. URL and MIME Types HTTP Web Programming - 2 (Ref: Chapter 2) TCP/IP Basics Internet Architecture Client Server Basics URL and MIME Types HTTP Routers interconnect the network TCP/IP software provides illusion of a single network

More information

Action List Modify Configuration Mode Commands

Action List Modify Configuration Mode Commands Action List Modify Configuration Mode Commands Chapter 2 CLI Commands Action List Modify Configuration Mode Commands Action list modify configuration mode commands allow you to configure ACE action lists.

More information

MSE System and Appliance Hardening Guidelines

MSE System and Appliance Hardening Guidelines MSE System and Appliance Hardening Guidelines This appendix describes the hardening of MSE, which requires some services and processes to be exposed to function properly. This is referred to as MSE Appliance

More information

DPI-SSL. DPI-SSL Overview

DPI-SSL. DPI-SSL Overview DPI-SSL Document Scope This document describes the DPI-SSL feature available in SonicOS 5.6. This document contains the following sections: DPI-SSL Overview section on page 1 Using DPI-SSL section on page

More information

Configuring Traffic Policies for Server Load Balancing

Configuring Traffic Policies for Server Load Balancing CHAPTER3 Configuring Traffic Policies for Server Load Balancing This chapter describes how to configure the ACE appliance to use classification (class) maps and policy maps to filter and match interesting

More information

Send documentation comments to

Send documentation comments to CHAPTER 6 Configuring Certificate Authorities and Digital Certificates This chapter includes the following topics: Information About Certificate Authorities and Digital Certificates, page 6-1 Default Settings,

More information

United States Postal Service Web Tool Kit User s Guide

United States Postal Service Web Tool Kit User s Guide United States Postal Service Web Tool Kit User s Guide A Technical Guide to HTTP Connection DLL (Revised 2/22/00) To HTTP Connection DLL Customers This release of the Web Tool Kit User s Guide for HTTP

More information

WHITE PAPER. Authentication and Encryption Design

WHITE PAPER. Authentication and Encryption Design WHITE PAPER Authentication and Encryption Design Table of Contents Introduction Applications and Services Account Creation Two-step Verification Authentication Passphrase Management Email Message Encryption

More information

vcloud Director API for NSX Programming Guide

vcloud Director API for NSX Programming Guide vcloud Director API for NSX Programming Guide API Version 27.0 vcloud Director 8.20 This document supports the version of each product listed and supports all subsequent versions until the document is

More information

Avro Specification

Avro Specification Table of contents 1 Introduction...2 2 Schema Declaration... 2 2.1 Primitive Types... 2 2.2 Complex Types...2 2.3 Names... 5 3 Data Serialization...6 3.1 Encodings... 6 3.2 Binary Encoding...6 3.3 JSON

More information

Acano solution. Third Party Call Control Guide. 07 June G

Acano solution. Third Party Call Control Guide. 07 June G Acano solution Third Party Call Control Guide 07 June 2016 76-1055-01-G Contents 1 Introduction 3 1.1 How to Use this Guide 3 1.1.1 Commands 5 2 Example of Configuring a SIP Trunk to CUCM 6 2.1 Prerequisites

More information

SSH Communications Tectia SSH

SSH Communications Tectia SSH Secured by RSA Implementation Guide for 3rd Party PKI Applications Last Modified: December 8, 2014 Partner Information Product Information Partner Name Web Site Product Name Version & Platform Product

More information

VMware Horizon Client for Windows 10 UWP User Guide. Modified on 21 SEP 2017 VMware Horizon Client for Windows 10 UWP 4.6

VMware Horizon Client for Windows 10 UWP User Guide. Modified on 21 SEP 2017 VMware Horizon Client for Windows 10 UWP 4.6 VMware Horizon Client for Windows 10 UWP User Guide Modified on 21 SEP 2017 VMware Horizon Client for Windows 10 UWP 4.6 You can find the most up-to-date technical documentation on the VMware website at:

More information

SHAKEN - Secure Handling of Asserted information using tokens. August 2015

SHAKEN - Secure Handling of Asserted information using tokens. August 2015 SHAKEN - Secure Handling of Asserted information using tokens August 2015 1 Current Status The current STIR IETF working group is focused on 4474bis which defines a signing mechanism for validating a calling

More information

Acano solution. Third Party Call Control Guide. December F

Acano solution. Third Party Call Control Guide. December F Acano solution Third Party Call Control Guide December 2015 76-1055-01-F Contents Contents 1 Introduction... 3 1.1 How to Use this Guide... 3 1.1.1 Commands... 4 2 Example of Configuring a SIP Trunk to

More information

ProxyCap Help. Table of contents. Configuring ProxyCap Proxy Labs

ProxyCap Help. Table of contents. Configuring ProxyCap Proxy Labs ProxyCap Help 2016 Proxy Labs Table of contents Configuring ProxyCap The Ruleset panel Loading and saving rulesets Delegating ruleset management The Proxies panel The proxy list view Adding, removing and

More information

FIPS Management. FIPS Management Overview. Configuration Changes in FIPS Mode

FIPS Management. FIPS Management Overview. Configuration Changes in FIPS Mode This chapter contains the following sections: Overview, on page 1 Configuration Changes in FIPS Mode, on page 1 Switching the Appliance to FIPS Mode, on page 2 Encrypting Sensitive Data in FIPS Mode, on

More information

CoreBlox Integration Kit. Version 2.2. User Guide

CoreBlox Integration Kit. Version 2.2. User Guide CoreBlox Integration Kit Version 2.2 User Guide 2015 Ping Identity Corporation. All rights reserved. PingFederate CoreBlox Integration Kit User Guide Version 2.2 November, 2015 Ping Identity Corporation

More information

TABLE OF CONTENTS. INSIDE Secure All rights reserved

TABLE OF CONTENTS. INSIDE Secure All rights reserved MatrixSSL 3.9 APIs Electronic versions are uncontrolled unless directly accessed from the QA Document Control system. Printed version are uncontrolled except when stamped with VALID COPY in red. External

More information

Hypertext Transfer Protocol Over Secure Sockets Layer (HTTPS)

Hypertext Transfer Protocol Over Secure Sockets Layer (HTTPS) Hypertext Transfer Protocol Over Secure Sockets Layer (HTTPS) This chapter provides information about Hypertext Transfer Protocol over Secure Sockets Layer. HTTPS, page 1 HTTPS for Cisco Unified IP Phone

More information

L2TP Over IPsec Between Windows 2000 and VPN 3000 Concentrator Using Digital Certificates Configuration Example

L2TP Over IPsec Between Windows 2000 and VPN 3000 Concentrator Using Digital Certificates Configuration Example L2TP Over IPsec Between Windows 2000 and VPN 3000 Concentrator Using Digital Certificates Configuration Example Document ID: 14117 Contents Introduction Prerequisites Requirements Components Used Objectives

More information

Bugzilla ID: Bugzilla Summary:

Bugzilla ID: Bugzilla Summary: Bugzilla ID: Bugzilla Summary: CAs wishing to have their certificates included in Mozilla products must 1) Comply with the requirements of the Mozilla CA certificate policy (http://www.mozilla.org/projects/security/certs/policy/)

More information

Coding & Information Theory Lab.

Coding & Information Theory Lab. 통합인증시스템설계및구현 연세대학교전기 전자공학과정연식, 송홍엽 Coding & Information Theory Lab. Introduction Previous Works Contents Design and Implementation of Public-Key Infrastructure Design and Implementation of Single Sign-On

More information

Telemetry Data Sharing Using S/MIME

Telemetry Data Sharing Using S/MIME Telemetry Data Sharing Using S/MIME Item Type text; Proceedings Authors Kalibjian, Jeffrey R. Publisher International Foundation for Telemetering Journal International Telemetering Conference Proceedings

More information

Configuring End-to-End SSL

Configuring End-to-End SSL CHAPTER5 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features in this chapter apply to IPv4 and IPv6 unless otherwise noted. This

More information

How to Enable Client Certificate Authentication on Avi

How to Enable Client Certificate Authentication on Avi Page 1 of 11 How to Enable Client Certificate Authentication on Avi Vantage view online Overview This article explains how to enable client certificate authentication on an Avi Vantage. When client certificate

More information

ConnectUPS-X / -BD /-E How to use and install SSL, SSH

ConnectUPS-X / -BD /-E How to use and install SSL, SSH ConnectUPS-X /-BD /-E product family Root CA Certificate installation Rev. B Page 1/16 Index 1. How to use and install SSL (Secure Socket Layer)...3 1.1. General Certificate warning message if not installed...3

More information

VMware AirWatch Content Gateway for Linux. VMware Workspace ONE UEM 1811 Unified Access Gateway

VMware AirWatch Content Gateway for Linux. VMware Workspace ONE UEM 1811 Unified Access Gateway VMware AirWatch Content Gateway for Linux VMware Workspace ONE UEM 1811 Unified Access Gateway You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

Auditing TPM Commands

Auditing TPM Commands Chapter 16 Auditing TPM Commands As used in the TPM, audit is the process of logging TPM command and response parameters that pass between the host and the TPM. The host is responsible for maintaining

More information

CGI Architecture Diagram. Web browser takes response from web server and displays either the received file or error message.

CGI Architecture Diagram. Web browser takes response from web server and displays either the received file or error message. What is CGI? The Common Gateway Interface (CGI) is a set of standards that define how information is exchanged between the web server and a custom script. is a standard for external gateway programs to

More information

Mavenir Systems Inc. SSX-3000 Security Gateway

Mavenir Systems Inc. SSX-3000 Security Gateway Secured by RSA Implementation Guide for 3rd Party PKI Applications Partner Information Last Modified: June 16, 2015 Product Information Partner Name Web Site Product Name Version & Platform Product Description

More information

Package PKI. September 16, 2017

Package PKI. September 16, 2017 Version 0.1-5.1 Package PKI September 16, 2017 Title Public Key Infrastucture for R Based on the X.509 Standard Author Maintainer Depends R (>=

More information