FRCC Secure Data Transfer. Users Guide V1.5

Size: px
Start display at page:

Download "FRCC Secure Data Transfer. Users Guide V1.5"

Transcription

1 FRCC Secure Data Transfer Users Guide V1.5

2 Table of Contents I. Introduction... 2 II. Part 1 - Software Installation... 3 III. Part 2 - Creating Your PKI Certificate... 7 IV. Part 3 - Importing FRCC Public Key Certificate V. Part 4 - Validate & Certify FRCC Key Certificate VI. Part 5 - Evidence Upload File Naming Convention VII. Part 6 Packaging the Evidence VIII. Part 7 - Transferring the Evidence to FRCC IX. Revision History... 30

3 Introduction FRCC entity secure transfer site uses high level of encryption using a Public Key Infrastructure (PKI) RSA-2048 public token provided by FRCC. The data in storage is encrypted using BitLocker 256 Advance Encryption Standard (AES) encryption. FRCC transfer site (https: securetransfer.frcc.com) once authenticated, offers entities two distinct folders labeled Secure Working (SW) and Secure Vault (SV) to deposit their evidence. Evidence deposited in SW (90%) is used for all sensitive evidence and SV (10%) is used by those entities that consider their CIP data most sensitive, such as firewall configurations and un-redacted network diagrams. Because both SW and SV servers are both identical using a high level of encryption (e.g. PKI and AES), entities are encouraged to deposit their evidence in the SW folder. Once an entity deposits the encrypted evidence package, the system transfers the package to the set of back-end servers (i.e. SW and SV). The package is automatically hashed by the entity encryption process for non-repudiation. The main difference with SV is that evidence can only be viewed internally by FRCC via Microsoft s Remote Desktop Protocol (RDP), using the product s base 128bit encryption only from the FRCC Compliance trusted local area network (no external/remote access or local copies can be removed from SV per company policy). The process in this document is meant to guide an entity in installing the Microsoft Windows software Gpg4win, then show the process for creating your very own public and private key. The next step is to import the public key from FRCC that will be used for encrypting the evidence package and upload to the secure transfer site ( The entity at this point must validate and certify the FRCC key before it is used to transfer the evidence package. The procedure ends by explaining the proper naming convention that must be used to upload a file successfully. The file name allows for automation of FRCC data/evidence handling. If the file name does not follow the proper naming convention, the Secure File Transfer process will not accept the file/evidence and it must be resubmitted. A tool called the FRCC Evidence File Name Calculator has been developed and provided by FRCC Compliance to facilitate the entities with how to properly name their file(s). In addition, this tool can be used internally to track multiple file uploads. The final step in the process is for the entity to logon to the Secure Transfer site and select the appropriate transfer folder, SW or SV Please be aware that the software requires Administrative rights to install this software on your workstation/server. You may need to consult with your IT department for additional assistance. If you have any questions about this process, please send an to: compliancemanager@frcc.com. Remember that your one-stop-shop website for all secure file transfer information is located on the FRCC website at: Thank You! FRCC SECURE DATA TRANSFER AUGUST

4 Part 1 - Software Installation GPG4win Background Gpg4win is not a program in itself; rather, it's a suite of five utilities bundled along with a comprehensive manual and a powerful encryption engine. The utilities included are: Kleopatra (a certificate manager), GPA (an alternative certificate manager), GpgOL (a plugin for Outlook 2003 and 2007), GpgEX (an add-on for Windows Explorer, 32-bit only), Claws Mail (an application), and a manual entitled Gpg4win Compendium. At the core of Gpg4win lies the engine, GnuPG, also known as the GNU Privacy Guard. This is an open-source implementation of OpenPGP, a powerful and open encryption standard. GnuPG uses an encryption system called public-key cryptography: Each user has a private (secret) key, as well as a public one that they can freely distribute. To encrypt a file or an to send to another user, you need their public key. Only that user can decrypt your message, since only they have the right private key (and the passphrase that goes along with it). About: Gpg4win enables users to securely transport files with the help of encryption and digital signatures. Encryption protects the contents against an unwanted party reading it. The following components are used by FRCC for the secure transfer process: GnuPG This is the actual encryption tool. Kleopatra A certificate manager for OpenPGP and X.509 (S/MIME) and common crypto dialogs. GpgEX A plugin for Microsoft File Explorer (file encryption). Gpg4win Compendium The documentation (for beginner and advanced users), available in English and German. Gpg4win requires at least Windows versions 7 or newer (up to Windows 10) operating system to be installed). Both 32 and 64bit systems are supported. FRCC SECURE DATA TRANSFER AUGUST

5 1. Close Windows Programs: First ensure that any Window programs (open windows) executing on your computer are shutdown 2. Download the Software: Download the latest version (e.g. V3.1.1 as of this version of the document) of GPG4WIN via this link a. Click the big green button (download Gpg4win) on the left to get started 3. Select Language: The installation assistant will start and ask for the language to be used. Select English and click [OK] button 4. Welcome and License Agreement: A welcome dialog box will appear next Welcome to the installation of Gpg4win click on [Next>] button. The next dialog displays the licensing agreement. Read the license if you wish, otherwise click on [Next >] button FRCC SECURE DATA TRANSFER AUGUST

6 5. Select Components to Install: The next diagram, lists the components needed for installation. The only components necessary to sign and encrypt the data are: GnuPG, Kleopatra, GpgEX and Ggp4win Compendium (documentation), Select GnuPG, Kleopatra and GpgEX, then click the [Next >] button Remember this installation only needs the following elements : GnuPG: Is the GNU Privacy Guard main program Kleopatra: Is the Key manager for OpenPGP and x.509 certificates GpgEX: Is the GnuPG shell extension Gpg4win Compendium: Is the Gpg4win documentation The other selections remain unchecked. FRCC SECURE DATA TRANSFER AUGUST

7 6. Installation Location and Options: The next step will pre-populate a destination folder for the installation such as; C:\Program Files (x86)\gpg4win. The next step will display Installation Options 7. Installation Process: During the installation process you will see a progress bar (refer to illustration) and information on which file is currently being installed. You can press [Show details] button at any time to show the installation log process FRCC SECURE DATA TRANSFER AUGUST

8 Once the installation has completed, click the [Finish] button. This will be a good time to read the README file which contains up-to-date information on the Gpg4win version that has just been installed. After these steps, you are ready to work with the program. Proceed to Part 2, Creating Your PKI Certificate. Part 2 - Creating Your PKI Certificate 1. Creating the Key Pair: Create your key pair certificate in Kleopatra by clicking: [File] then click on New Key Pair from the dropdown menu 2. Choose Format: Select the Create a personal OpenPGP key pair option and click the [Next] button FRCC SECURE DATA TRANSFER AUGUST

9 3. Enter Details: Enter the information as shown below including Company or personal Name, address. Click the [Next] button Take a moment to review the information entered in the previous steps. If you need to make a change, click the [Cancel] button. If, correct, click [Create] FRCC SECURE DATA TRANSFER AUGUST

10 4. Enter Passphrase to protect your new key 5. Please keep in mind when entering your passphrase (or password) ensure that it is strong, such as 14 characters which include caps, lower case, numbers and special characters. Most important, safeguard and protect the key. If your key is ever compromised, you should generate a new one by following the steps in Part Key Pair Successfully Created: When the key pair creation is successful, you will see the following dialog box, click [Finish] button. FRCC SECURE DATA TRANSFER AUGUST

11 Now that you have successfully created your certificate. We recommend you consider performing a backup of your public/private keys. FRCC SECURE DATA TRANSFER AUGUST

12 Part 3 - Importing FRCC Public Key Certificate 1. You must import FRCC public key used to encrypt your evidence by following this link: Click on FRCC Compliance Public key o (2) windows will open Click on drop-down arrow Click on Send To and then on Download a Copy Click [Save] the file in a location you can import on the next step using Kleopatra. Access the Key Repository and download the key, you will find two files in the folder. The key is labeled FRCC Compliance Public Live. Click [Save] the file in a location you can import on the next step using Kleopatra. For example: the default location is the Downloads folder in Windows. FRCC SECURE DATA TRANSFER AUGUST

13 2. To import the FRCC public key you just downloaded, open the Kleopatra application, click: [File], then click Import dropdown menu: 3. Locate the folder where the key was downloaded and Download folder or the folder where you saved the Public Key from the last step. Highlight the Public Key and click [Open] 4. After the key has been imported, you will receive a confirmation: Click [OK] and the window will close. FRCC SECURE DATA TRANSFER AUGUST

14 Part 4 - Validate & Certify FRCC Key Certificate 1. To validate, trust and certify FRCC Public Key, access the Kleopatra application and click on the All Certificates tab: 2. Certification Process. Highlight Change Owner Trust and the Certify Certificate then click the certificate to complete this step. FRCC SECURE DATA TRANSFER AUGUST

15 3. Check the box next to Compliance Manager and also next to I have verified the fingerprint then click the [Next] button 4. Click Certify only for myself and click the [Certify] button FRCC SECURE DATA TRANSFER AUGUST

16 5. Certification will show successful. Click the [Finish] button We recommend you consider performing a backup of your public/private keys. Remember to limit access to the private key by saving it in a secure location. FRCC SECURE DATA TRANSFER AUGUST

17 Part 5 - Evidence Upload File Naming Convention 1. File names allow for automation of FRCC data/evidence handling. If the file name does not follow the proper naming convention, the upload software will not accept the evidence and therefore, reject the file upload and the file must be resubmitted. See the illustration below for the format of the File Naming Convention: (1) The first 3 to 5 characters of the file name identify the Entity Acronym, also known as the short Entity name (e.g. LAK is Lakeland Electric etc.). (2) Evidence Type (e.g. ONP or CIP etc.): See the table below for all FRCC Evidence Types. (3) Date-For the illustrated example above the date of ONP or CIP you would use the official audit date or the request date for the evidence type being uploaded to FRCC. (4) The encrypted package number in sequential order of upload. This number can be.001 to.999. For example, during an audit you may upload 50 evidence files for data requests, this number would start with.001 to.050. (5) You DO NOT need to add the.gpg suffix prior to encrypting the package. This file extension is automatically added by the encryption process Questions? Contact FRCC via compliancemanager@frcc.com FRCC SECURE DATA TRANSFER AUGUST

18 The FRCC naming convention starts with a three (3) to five (5) character length acronym, which identifies the Entity. It is followed by the evidence type (see list below), then by the date the activity is officially taking place (for example: for an audit, enter the audit onsite start date) and ends with a sequential number for each upload (such as.001 for a first file upload and then is sequentially increased as required). Hint: For multiple file uploads we recommend the use of the Evidence File Calculator. Evidence Types: CIP DET DTR CRD EAD ENF ERA ICE IRA MIT ONP PDS RAM SCD SEL SET TFE To be used for all CIP Audit Evidence Information or Data. To be used for all Determination Information or Data To be used for all Data Request Response or Data To be used for all Certification Registration Data To be used for all Event Analysis Information or Data To be used for all Enforcement Information or Data To be used for all Entity Risk Assessment or Data To be used for all Internal Control Evaluation Information or Data To be used for all Inherent Risk Assessment Information or Data To be used for all Mitigation Plan Information or Data To be used for all O&P Audit Evidence Information or Data To be used for all Periodic Data Submittal Information or Data To be used for all Risk Mitigation Information or Data To be used for all Spot Check Information or Data To be used for all Self Certification Information or Data To be used for all Settlement Information or Data To be used for all Technical Feasibility Exception Information or Data Date of Activity for Evidence Types: For Audit/Spot-check ONP or CIP, use the start date of the audit/spot-check. The same date is to be used for all of the data requests pertaining to the audit/spot-check. For DET & SET uploads, the date will be determined by the FRCC Enforcement point of contact and it is to be used for the duration of the enforcement related activity. For ICE, Risk Assessment & Mitigation uploads, use the date established by the FRCC RAM point of contact and it is to be used for the duration of the RAM related activity. For TFE uploads, use the date the TFE was submitted via the CTS portal or contact FRCC via compliancemanager@frcc.com. For RAM uploads, use the date established by the FRCC RAM point of contact and it is to be used for the duration of the RAM related activity. For ICE, Risk Assessment & Mitigation uploads, use the date established by the FRCC RAM point of contact and it is to be used for the duration of the RAM related activity. FRCC SECURE DATA TRANSFER AUGUST

19 2. The FRCC Evidence File Name Calculator tool has been created to assist entities internally track multiple file uploads, with the file naming convention and a checklist to facilitate and track evidence file uploads. Typically, during an audit (CIP or OP) multiple files are uploaded. It is critical for entities to use the naming convention to prevent any rejection of data submittals. Below is an example of the tool: FRCC SECURE DATA TRANSFER AUGUST

20 3. Where can I find the calculator tool? FRCC Evidence File Transfer Calculator Tool (ctrl + click to follow link), or by following the steps listed below (see illustration) FRCC SECURE DATA TRANSFER AUGUST

21 Part 6 Packaging the Evidence In a previous section, you learned about the file naming convention which is used to automate the transfer of the encrypted package. Remember to use the correct file naming convention. The FRCC portal transfer process will NOT accept the file upload if the file name does not adhere to the naming convention and, therefore; entities will be required to re-submit. This section shows you how to encrypt the evidence package for submittal to FRCC Compliance. 1. First, create the folder that will be used to hold the evidence/data and copy all the evidence/data needed into the desired folder that is to be uploaded to FRCC. In the example below, we have created a folder and placed (4) evidence files: File A, File B, File C and File D plus two subdirectories. Hint: The Evidence Folder May Contain Files, Sub-Folders etc. etc. 2. Using the naming convention learned in Part 4, rename the folder Evidence for FRCC to the correct naming convention prior to uploading. For example, let s say that entity XYZ needed to upload CIP evidence for an upcoming audit commencing on June 30, After using the evidence name calculator, the correct file name would: XYZ.CIP NOTE: When the program encrypts the folder XYZ.CIP , it will tag the file with the suffix. gpg automatically. Remember that file extensions in Windows are either hidden or shown by the file explorer based on the Windows system file options. For more information, ask your local IT. If the files contain a lot of data and/or a large collection of sub-folders, the usage of a compression program such as 7 zip should be used before folder/file encryption. FRCC SECURE DATA TRANSFER AUGUST

22 Rename Folder to the required file naming convention: 3. After renaming the folder to for this example; (XYZ.CIP ), First, right click the folder with the evidence and click on More GpgEX options and then select Create checksums 4. In this example, (3) three checksums will be created, one for the (4) four files and one for each subdirectory. The sha1sum.txt file will be created in each directory identifying all of the files with a unique hash number. When the previous Step (4) completes successfully, you will receive a similar dialogue box with the message at the bottom left, that indicates There were no errors. FRCC SECURE DATA TRANSFER AUGUST

23 5. In this step, the package is created. First, right click the folder with the evidence and click More GpgEX options and Sign and encrypt. FRCC SECURE DATA TRANSFER AUGUST

24 6. In this step perform the following: a. In the Encrypt for Others box, Click on the? and select the FRCC Compliance (Live Key) key, then click Ok. b. In the Output text box, modify the file name, changing the /tar.gpg text at the end to the desired submission name determined in step 1 (e.g., ABC.XYZ ) so that it reads /ABC.XYZ gpg c. Click the Sign/Encrypt button; Enter your passphrase if needed and click Ok. d. It will then sign and encrypt the file. You should see the file appear within the folder and the dialog box should have the message. Signing and encryption succeeded ; click the Finish button 7. Highlight both FRCC Public Key and your Private Key for signing and click [Add] and then click [Next] and click [Next] again. Note: the FRCC Public Key and Private Key used to sign the package have moved to the bottom window. On the next screen, select Sign with OpenPGP, then click [Sign & Encrypt]. A pinentry message box will pop up. Enter your passphrase/password and then click [OK] FRCC SECURE DATA TRANSFER AUGUST

25 9. Upon successful completion of the sign and encrypt process, the dialogue box will show a message Signing and encryption succeeded, click [Finish] FRCC SECURE DATA TRANSFER AUGUST

26 This is what your Encrypted Package Ready for Upload will look like: Note: If the file is not named correctly during the packaging process, the file can be renamed prior to sending. Renaming the file does not affect the signature or validity of the file FRCC SECURE DATA TRANSFER AUGUST

27 10. At this point you should find the original evidence folder and the newly encrypted file using the correct naming convention (example: XYZ.CIP ). The encrypted and signed file is ready for upload via the FRCC Secure File Transfer. NOTE: When the program encrypts the folder, it will tag the file extension with the suffix.gpg automatically. If in doubt, perform a right click on the encrypted file properties and verify. Example below shows both the file and type of file in the General tab and the full file name in the Details TAB. 11. If the file is named incorrectly and is already encrypted, simply rename the encrypted file to the correct name. You are ready to upload the evidence. FRCC SECURE DATA TRANSFER AUGUST

28 Part 7 - Transferring the Evidence to FRCC 1. Go to the FRCC Secure Transfer Site via 2. Login using the FRCC website login credentials: UserID and Password provided to you. Otherwise, request a UserID and Password by ing compliancemanager@frcc.com The Secure Transfer Site is filled with lots of help. Before you call, first make sure the password has not expired and needs to be reset. Reference the documentation or file upload name calculator via the Assistance and Documentation for Secure Transfer links at the bottom of the page. If you forgot the password or not able to logon or getting an error message when you try to authenticate with USERID and PASSWORD, chances are you need to RESET via this LINK: FRCC SECURE DATA TRANSFER AUGUST

29 3. After a successful logon, you will receive this Welcome Message: You may receive a Java security warning message. If so, select the box that says Do not show this again for this app and web site and click [Allow] button FRCC SECURE DATA TRANSFER AUGUST

30 4. Now you will see (3) folders: XYZ File Area, where XYZ is the acronym of your entity identifier, SecureVault and SecureWorking : The folder(s) in the File Area is for FRCC to share or provide information or documents to entities. Files in this area are deleted after 10 working days. DO NOT UPLOAD FILES TO THIS FOLDER!!! If a file or files are uploaded to this folder, FRCC will reject the upload and request that the entity resubmit using the required process. For evidence upload, FRCC offers entities two distinct folders to deposit their evidence: SecureWorking (SW) and SecureVault (SV). Evidence deposited in SW is used for all sensitive evidence and SV is used by those entities that consider some of their CIP data as most sensitive (firewall configurations and un-redacted network diagrams). NOTE: Because both SW and SV servers are both using a high level of encryption (e.g. PKI and AES), entities are encouraged to deposit evidence in the SW folder. FRCC SECURE DATA TRANSFER AUGUST

31 If you have any questions about this process, please Revision History Version Date Editor Description V1.0 5/2/2016 C. Valiente Creation of this guide V1.1 7/16/2016 C. Valiente Clarifications on steps were added. V1.2 7/28/2016 C. Valiente Updated New Evidence Type Table V1.3 8/10/2016 C. Valiente and M. Alba Updated with corrections and clarifications. V1.4 9/2/2016 C. Valiente, J Guentner, Wordsmithing to enhance clarification for M. Alba and R. Ramai V1.5 4/28/2018 C. Valiente and R. Ramai users. Update User Instructions and Data Classification FRCC SECURE DATA TRANSFER AUGUST

FRCC Secure Transfer & Storage Infrastructure. Training for new data transfer process

FRCC Secure Transfer & Storage Infrastructure. Training for new data transfer process FRCC Secure Transfer & Storage Infrastructure Training for new data transfer process Training Objects Understand the changes in regards to the data transfer process using PKI Installation Key management

More information

Submitting Evidence to the Vault. FRCC CIP Spring Compliance Workshop May 13-16, 2013

Submitting Evidence to the Vault. FRCC CIP Spring Compliance Workshop May 13-16, 2013 Submitting Evidence to the Vault FRCC CIP Spring Compliance Workshop May 13-16, 2013 Objectives Explain the step-by-step process for submitting evidence to FRCC Vault Share what happens to the evidence

More information

LAB :: PGP (Pretty Good Privacy)

LAB :: PGP (Pretty Good Privacy) LAB :: PGP (Pretty Good Privacy) GnuPG : GnuPG forms the heart of Gpg4win the actual encryption software. Kleopatra : The central certificate administration of Gpg4win, which ensures uniform user navigation

More information

ECE646 Fall Lab 1: Pretty Good Privacy. Instruction

ECE646 Fall Lab 1: Pretty Good Privacy. Instruction ECE646 Fall 2012 Lab 1: Pretty Good Privacy Instruction PLEASE READ THE FOLLOWING INSTRUCTIONS CAREFULLY: 1. You are expected to address all questions listed in this document in your final report. 2. All

More information

ECE 646 Fall Lab 1: Pretty Good Privacy Setup

ECE 646 Fall Lab 1: Pretty Good Privacy Setup ECE 646 Fall 2017 Lab 1: Pretty Good Privacy Setup This setup should be completed before the lecture on Tuesday, October 3. Please read the general information about GNU Privacy Guard from Wikipedia available

More information

ECE646 Fall Lab 1: Pretty Good Privacy. Instruction

ECE646 Fall Lab 1: Pretty Good Privacy. Instruction ECE646 Fall 2015 Lab 1: Pretty Good Privacy Instruction PLEASE READ THE FOLLOWING INSTRUCTIONS CAREFULLY: 1. You are expected to address all questions listed in this document in your final report. 2. All

More information

How to Submit Settlement Inquiry Remedy Tickets

How to Submit Settlement Inquiry Remedy Tickets How to Submit Settlement Inquiry Remedy Tickets Defense Finance and Accounting Service Integrity - Service - Innovation BMC REMEDY AR SYSTEM First log into Web Remedy: https://dcii-cat- web.dfas.mil/arsys/forms/fin-ss72z2/home-

More information

Cryptography: Practice JMU Cyber Defense Boot Camp

Cryptography: Practice JMU Cyber Defense Boot Camp Cryptography: Practice 2013 JMU Cyber Defense Boot Camp Prerequisites This unit assumes that you have already known Symmetric-key encryption Public-key encryption Digital signature Digital certificates

More information

Certificate Retrieval Procedures

Certificate Retrieval Procedures `` Certificate Retrieval Procedures Version 2.2 2018 Federal Reserve Banks Contents Federal Reserve Bank Certificate Retrieval Overview and Preparation Procedures... 2 Certificate Creation Procedures...

More information

Using BlueStep Backup

Using BlueStep Backup Using BlueStep Backup BlueStep Backup Your data is an invaluable resource. To protect and store critical digital documents and files, BlueStep Technologies offers the ideal technological solution - BlueStep

More information

Content and Purpose of This Guide... 1 User Management... 2

Content and Purpose of This Guide... 1 User Management... 2 Contents Introduction--1 Content and Purpose of This Guide........................... 1 User Management........................................ 2 Security--3 Security Features.........................................

More information

ishipdocs User Guide

ishipdocs User Guide ishipdocs User Guide 11/8/2016 Disclaimer This guide has been validated and reviewed for accuracy. The instructions and descriptions it contains are accurate for ishipdocs. However, succeeding versions

More information

TIBCO Managed File Transfer Internet Server Transfer and File Share Clients User's Guide

TIBCO Managed File Transfer Internet Server Transfer and File Share Clients User's Guide TIBCO Managed File Transfer Internet Server Transfer and File Share Clients User's Guide Software Release 8.1 March 2018 Two-Second Advantage 2 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES

More information

SAP GUI 7.30 for Windows Computer

SAP GUI 7.30 for Windows Computer SAP GUI 7.30 for Windows Computer Student and Faculty Installation Instructions Table of Contents Caution:... 2 System Requirements:... 2 System Memory (RAM) requirements:... 2 Disk Space requirements:...

More information

Managing Certificates

Managing Certificates CHAPTER 12 The Cisco Identity Services Engine (Cisco ISE) relies on public key infrastructure (PKI) to provide secure communication for the following: Client and server authentication for Transport Layer

More information

FedLine Web Certificate Retrieval Procedures

FedLine Web Certificate Retrieval Procedures Version 2.0 Contents Federal Reserve Bank Certificate Retrieval Overview and Preparation Procedures... 2 Certificate Creation Procedures... 3 Installing the Federal Reserve Banks Certificate Authority

More information

DSS User Guide. End User Guide. - i -

DSS User Guide. End User Guide. - i - DSS User Guide End User Guide - i - DSS User Guide Table of Contents End User Guide... 1 Table of Contents... 2 Part 1: Getting Started... 1 How to Log in to the Web Portal... 1 How to Manage Account Settings...

More information

PKI Contacts PKI for Fraunhofer Contacts

PKI Contacts PKI for Fraunhofer Contacts Fraunhofer Competence Center PKI PKI Contacts PKI for Fraunhofer Contacts User manual for communication partners of the Fraunhofer-Gesellschaft Author[s]: Uwe Bendisch, Maximilian Gottwald As at: 03.02.2017

More information

Online Permitting Directions

Online Permitting Directions 1 Online Permitting Directions Please be sure to read the Electronic Plan Submittal Instructions before beginning your online submittal. A paper permit application is NOT required for upload, a permit

More information

Secure Single Sign On with FingerTec OFIS

Secure Single Sign On with FingerTec OFIS Secure Single Sign On with FingerTec OFIS User Guide CONTENTS 3 1 INTRODUCTION Welcome to OFIS Gateway 4-11 2 INSTALLATION & SETUP Registering Your OFIS Gateway Installing & Setting Up Your OFIS Gateway

More information

Select the Akeni Pro Server installation file that matches your operating system and double-click on the file.

Select the Akeni Pro Server installation file that matches your operating system and double-click on the file. Akeni Pro Server Administration Guide (Version 2) Contents Chapter 1 Chapter 2 Chapter 3 Getting Started.: 1 Pro Server Installation.: 2 Launching Akeni Pro Server.: 3 Pro Client Installation.: 4 Launching

More information

IBM Client Security Solutions. Client Security Software Version 1.0 Administrator's Guide

IBM Client Security Solutions. Client Security Software Version 1.0 Administrator's Guide IBM Client Security Solutions Client Security Software Version 1.0 Administrator's Guide December 1999 1 Before using this information and the product it supports, be sure to read Appendix A - U.S. export

More information

SmartSource Desktop - Quick Start Guide For Bidders

SmartSource Desktop - Quick Start Guide For Bidders SmartSource Desktop - Quick Start Guide For Bidders Iasta.com, Inc, 2006 Page left blank intentionally! Page 2 of 30 Table of Contents Table of Contents...3 Downloading/Installing SmartSource Desktop...4

More information

End User Manual. December 2014 V1.0

End User Manual. December 2014 V1.0 End User Manual December 2014 V1.0 Contents Getting Started... 4 How to Log into the Web Portal... 5 How to Manage Account Settings... 6 The Web Portal... 8 How to Upload Files in the Web Portal... 9 How

More information

Automated Court Reporter Application. Digital Signatures

Automated Court Reporter Application. Digital Signatures Automated Court Reporter Application Digital Signatures Doc Version 1.5 December 1, 2010 Administrative Office of the U.S. Courts Revision History Date Version Description of Revision 2/10/2009 1.0 Initial

More information

PKI Credentialing Handbook

PKI Credentialing Handbook PKI Credentialing Handbook Contents Introduction...3 Dissecting PKI...4 Components of PKI...6 Digital certificates... 6 Public and private keys... 7 Smart cards... 8 Certificate Authority (CA)... 10 Key

More information

Document Signing Certificate Getting Started Guide

Document Signing Certificate Getting Started Guide Certificate Services Document Signing Certificate Getting Started Guide Using the SafeNet Authentication Client: 8.3 Document issue: 1.0 Date of issue: March 2017 For software release 12.1 Document Signing

More information

TIBCO Slingshot User Guide. Software Release August 2015

TIBCO Slingshot User Guide. Software Release August 2015 TIBCO Slingshot User Guide Software Release 1.9.4 August 2015 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED OR BUNDLED TIBCO SOFTWARE IS SOLELY

More information

Apptix Online Backup by Mozy User Guide

Apptix Online Backup by Mozy User Guide Apptix Online Backup by Mozy User Guide 1.10.1.2 Contents Chapter 1: Overview...5 Chapter 2: Installing Apptix Online Backup by Mozy...7 Downloading the Apptix Online Backup by Mozy Client...7 Installing

More information

Multi-Sponsor Environment. SAS Clinical Trial Data Transparency User Guide

Multi-Sponsor Environment. SAS Clinical Trial Data Transparency User Guide Multi-Sponsor Environment SAS Clinical Trial Data Transparency User Guide Version 6.0 01 December 2017 Contents Contents 1 Overview...1 2 Setting up Your Account...3 2.1 Completing the Initial Email and

More information

Access to RTE s Information System by software certificates under Microsoft Windows 7

Access to RTE s Information System by software certificates under Microsoft Windows 7 by software certificates under Microsoft Windows 7 PKI User guide Version 4, 01/01/2017 Programmes & SI (PSI) TOUR MARCHAND 41 RUE BERTHELOT - 92411 COURBEVOIE CEDEX TEL : 01.78.66.50.00 - FAX : 01.78.66.50.64

More information

Integritest 4N Integrity Test Instrument Central Instrument Management Tool Installation and Operators Manual

Integritest 4N Integrity Test Instrument Central Instrument Management Tool Installation and Operators Manual Integritest 4N Integrity Test Instrument Central Instrument Management Tool Installation and Operators Manual 2 Preface... 5 About this Manual...5 Chapter 1 Software Installation... 7 Domain Mode Network

More information

Perceptive TransForm E-Forms Manager

Perceptive TransForm E-Forms Manager Perceptive TransForm E-Forms Manager Installation and Setup Guide Version: 8.x Date: February 2017 2016-2017 Lexmark. All rights reserved. Lexmark is a trademark of Lexmark International Inc., registered

More information

STRS OHIO F5 Access Client Setup for ChromeBook Systems User Guide

STRS OHIO F5 Access Client Setup for ChromeBook Systems User Guide STRS OHIO F5 Access Client Setup for ChromeBook Systems User Guide For assistance, please contact the ITS Service Desk at x4357 or 227-8633. Table of Contents First Time Use of Remote Access... 1 F5 Access

More information

SafeNet Authentication Manager

SafeNet Authentication Manager SafeNet Authentication Manager Version 8.0 Rev A User s Guide Copyright 2010 SafeNet, Inc. All rights reserved. All attempts have been made to make the information in this document complete and accurate.

More information

MyFloridaNet-2 (MFN-2) Customer Portal/ Password Management/ VPN Reference Guide

MyFloridaNet-2 (MFN-2) Customer Portal/ Password Management/ VPN Reference Guide MyFloridaNet-2 (MFN-2) Customer Portal/ Password Management/ VPN Reference Guide i VISION RECORDS REVISION DATE DESCRIPTION 0 27 September 2017 Initial Submittal. 1 Second Submittal. ii TABLE OF CONTENTS

More information

Joint Venture Hospital Laboratories. User s Guide to PLMWeb.JVHL.org. For Secure File Transfers via the Internet

Joint Venture Hospital Laboratories. User s Guide to PLMWeb.JVHL.org. For Secure File Transfers via the Internet Joint Venture Hospital Laboratories User s Guide to PLMWeb.JVHL.org For Secure File Transfers via the Internet Version 2.2 May 2017 Joint Venture Hospital Laboratories PLMWeb.JVHL.org User s Guide TABLE

More information

Home Health Assessment Validation and Entry System (jhaven) User Guide

Home Health Assessment Validation and Entry System (jhaven) User Guide Home Health Assessment Validation and Entry System (jhaven) User Guide In Support of Software Version 1.0 January 01, 2015 Last updated: 12/12/2014 Table of Contents NAVIGATION TIP: To navigate directly

More information

Security+ SY0-501 Study Guide Table of Contents

Security+ SY0-501 Study Guide Table of Contents Security+ SY0-501 Study Guide Table of Contents Course Introduction Table of Contents About This Course About CompTIA Certifications Module 1 / Threats, Attacks, and Vulnerabilities Module 1 / Unit 1 Indicators

More information

Online CDC service. HowTo guide for applicants

Online CDC service. HowTo guide for applicants Online CDC service HowTo guide for applicants Disclaimer While every reasonable effort has been made to ensure that this document is correct at the time of printing, the State of NSW, its agents and employees,

More information

MyFloridaNet-2 (MFN-2) Customer Portal/Password Management Reference Guide

MyFloridaNet-2 (MFN-2) Customer Portal/Password Management Reference Guide MyFloridaNet-2 (MFN-2) Customer Portal/Password Management Reference Guide REVISION RECORDS REVISION DATE DESCRIPTION 0 27 September 2017 Initial Submittal. 1 06 October 2017 Second Submittal. - 17 October

More information

Colligo Console. Administrator Guide

Colligo Console. Administrator Guide Colligo Console Administrator Guide Contents About this guide... 6 Audience... 6 Requirements... 6 Colligo Technical Support... 6 Introduction... 7 Colligo Console Overview... 8 Colligo Console Home Page...

More information

Microsoft Office Groove Server Groove Manager. Domain Administrator s Guide

Microsoft Office Groove Server Groove Manager. Domain Administrator s Guide Microsoft Office Groove Server 2007 Groove Manager Domain Administrator s Guide Copyright Information in this document, including URL and other Internet Web site references, is subject to change without

More information

VII. Corente Services SSL Client

VII. Corente Services SSL Client VII. Corente Services SSL Client Corente Release 9.1 Manual 9.1.1 Copyright 2014, Oracle and/or its affiliates. All rights reserved. Table of Contents Preface... 5 I. Introduction... 6 Chapter 1. Requirements...

More information

Out-of-State Tobacco Products Wholesale Dealer s Report

Out-of-State Tobacco Products Wholesale Dealer s Report Out-of-State Tobacco Products Wholesale Dealer s Report Logging Into EDS Log in with the user id and password provided through the EDS registration process and click on the Login button. If you have not

More information

Oracle Hospitality RES 3700 Security Guide Release 5.5 E May 2016

Oracle Hospitality RES 3700 Security Guide Release 5.5 E May 2016 Oracle Hospitality RES 3700 Security Guide Release 5.5 E76231-01 May 2016 Copyright 1998, 2016, Oracle and/or its affiliates. All rights reserved. This software and related documentation are provided under

More information

AT&T Global Network Client for Mac User s Guide Version 2.0.0

AT&T Global Network Client for Mac User s Guide Version 2.0.0 Version 1.7.0 AT&T Global Network Client for Mac User s Guide Version 2.0.0 experience may vary. This document is not an offer, commitment, representation or warranty by AT&T and is subject to change..

More information

WAM!NET Submission Icons. Help Guide. March 2015

WAM!NET Submission Icons. Help Guide. March 2015 WAM!NET Submission Icons Help Guide March 2015 Document Contents 1 Introduction...2 1.1 Submission Option Resource...2 1.2 Submission Icon Type...3 1.2.1 Authenticated Submission Icons...3 1.2.2 Anonymous

More information

Provider Portal User Guide. Version 2.4

Provider Portal User Guide. Version 2.4 Provider Portal User Guide Version 2.4 0 August 18, 2017 Table of Contents Document Overview... 3 Purpose of this Document... 3 Intended Audience... 3 Assistance... 3 Accessing the Provider Portal... 4

More information

Welcome to ncrypted Cloud!... 4 Getting Started Register for ncrypted Cloud Getting Started Download ncrypted Cloud...

Welcome to ncrypted Cloud!... 4 Getting Started Register for ncrypted Cloud Getting Started Download ncrypted Cloud... Windows User Manual Welcome to ncrypted Cloud!... 4 Getting Started 1.1... 5 Register for ncrypted Cloud... 5 Getting Started 1.2... 7 Download ncrypted Cloud... 7 Getting Started 1.3... 9 Access ncrypted

More information

ncrypted Cloud works on desktops and laptop computers, mobile devices, and the web.

ncrypted Cloud works on desktops and laptop computers, mobile devices, and the web. OS X User Manual Welcome to ncrypted Cloud! ncrypted Cloud is a Security Collaboration application that uses Industry Standard Encryption Technology (AES-256 bit encryption) to secure files stored in the

More information

SECURE DATA EXCHANGE

SECURE DATA EXCHANGE POLICY-DRIVEN SOLUTIONS FOR SECURE DATA EXCHANGE Sending and receiving data is a fundamental part of daily business for nearly every organization. Companies need to share financial transaction details,

More information

AvePoint Online Services 2

AvePoint Online Services 2 2 User Guide Service Pack 7 Issued August 2017 Table of Contents What s New in this Guide...6 About...7 Versions: Commercial and U.S. Government Public Sector...7 Submitting Documentation Feedback to AvePoint...8

More information

Odette CA Help File and User Manual

Odette CA Help File and User Manual How to Order and Install Odette Certificates For a German version of this file please follow this link. Odette CA Help File and User Manual 1 Release date 31.05.2016 Contents Preparation for Ordering an

More information

MyFloridaNet-2 (MFN-2) Remote Access VPN Reference Guide

MyFloridaNet-2 (MFN-2) Remote Access VPN Reference Guide MyFloridaNet-2 (MFN-2) Remote Access VPN Reference Guide Document Control Number: 7055011 Contract Number: DMS-13/14-024 Prepared for: Florida Department of Management Services Division of Departmental

More information

Bidder s Guide for submission of online application for allotment of Coal Mines

Bidder s Guide for submission of online application for allotment of Coal Mines Bidder s Guide for submission of online application for allotment of Coal Mines (The following section is meant only to provide guidance to bidders about the bidding process on the website of MSTC. These

More information

FWB / Eurex Client & Member Reference Data Upload How to connect via SFTP & upload Files

FWB / Eurex Client & Member Reference Data Upload How to connect via SFTP & upload Files FWB / Eurex Client & Member Reference Data Upload How to connect via SFTP & upload Files Version 1.33 November 2017 Table of Content 1. Introduction... 3 2. Technical Pre-Conditions... 3 2.1. Hardware

More information

Managing Deployment. Understanding Deployment CHAPTER

Managing Deployment. Understanding Deployment CHAPTER CHAPTER 8 The settings and policies you define in Security Manager must be deployed to your devices so that you can implement them in your network. The steps you take to deploy configurations to devices

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release

More information

SafeGuard Easy Demo guide. Product version: 6 Document date: February 2012

SafeGuard Easy Demo guide. Product version: 6 Document date: February 2012 SafeGuard Easy Demo guide Product version: 6 Document date: February 2012 Contents 1 Introduction...3 2 Requirements...4 3 The demo configuration package...5 4 Install the demo software...6 5 What to expect

More information

SafeGuard Easy Demo guide. Product version: 6.1

SafeGuard Easy Demo guide. Product version: 6.1 SafeGuard Easy Demo guide Product version: 6.1 Document date: February 2014 Contents 1 About this guide...3 2 Requirements...4 3 The demo configuration package...5 4 Install the demo software...6 5 What

More information

INFORMATION TECHNOLOGY COMMITTEE ESCB-PKI PROJECT

INFORMATION TECHNOLOGY COMMITTEE ESCB-PKI PROJECT INFORMATION TECHNOLOGY COMMITTEE ESCB-PKI PROJECT SUBSCRIBER S GUIDE VERSION 1.3 ECB-PUBLIC 15-April-2014 ESCB-PKI - Subscriber's Procedures v.1.3.docx Page 2 of 26 TABLE OF CONTENTS GLOSSARY AND ACRONYMS...

More information

VMware AirWatch: Directory and Certificate Authority

VMware AirWatch: Directory and Certificate Authority Table of Contents Lab Overview - HOL-1857-06-UEM - VMware AirWatch: Directory and Certificate Authority Integration... 2 Lab Guidance... 3 Module 1 - Advanced AirWatch Configuration, AD Integration/Certificates

More information

Configuring Certificate Authorities and Digital Certificates

Configuring Certificate Authorities and Digital Certificates CHAPTER 43 Configuring Certificate Authorities and Digital Certificates Public Key Infrastructure (PKI) support provides the means for the Cisco MDS 9000 Family switches to obtain and use digital certificates

More information

Access to RTE s Information System by software certificates under Microsoft Windows Seven

Access to RTE s Information System by software certificates under Microsoft Windows Seven by software certificates under Microsoft Windows Seven PKI User guide Version 3, June 17 th 2016 Programmes & SI (PSI) TOUR MARCHAND 41 RUE BERTHELOT - 92411 COURBEVOIE CEDEX TEL : 01.78.66.50.00 - FAX

More information

Sophos Mobile SaaS startup guide. Product version: 7.1

Sophos Mobile SaaS startup guide. Product version: 7.1 Sophos Mobile SaaS startup guide Product version: 7.1 Contents 1 About this guide...4 2 What are the key steps?...5 3 Change your password...6 4 Change your login name...7 5 Activate SMC Advanced licenses...8

More information

Identity Manager 4 Package Manager Lab

Identity Manager 4 Package Manager Lab Identity Manager 4 Package Manager Lab NIQ16 Novell Training Services ATT LIVE 2012 LAS VEGAS www.novell.com Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents

More information

Kernel Migrator. for SharePoint. Configuration Guide

Kernel Migrator. for SharePoint. Configuration Guide Kernel Migrator for SharePoint Table of Contents 1. System Requirements... 4 1.1 Minimum System Requirements... 4 1.2 Required Operating Systems... 4 1.3 Supported Virtual Environment... 4 1.4 Supported

More information

Software Token. Installation and User Guide. 22 September 2017

Software Token. Installation and User Guide. 22 September 2017 Software Token Installation and User Guide 22 September 2017 Notices Following are policies pertaining to proprietary rights and trademarks. Proprietary Rights The information contained in this document

More information

Security Cooperation Information Portal

Security Cooperation Information Portal June 2017 https://www.scportal.us/ Contents Website... 3 Home... 3 Registration Info... 3 User Agreement... 4 SCIP Logon... 4 Digital Certificate with Name CAC or PKI users... 4 Token Users... 5 Warning

More information

Public Key Cryptography, OpenPGP, and Enigmail. 31/5/ Geek Girls Carrffots GVA

Public Key Cryptography, OpenPGP, and Enigmail. 31/5/ Geek Girls Carrffots GVA Public Key Cryptography, OpenPGP, and Enigmail Cryptography is the art and science of transforming (encrypting) a message so only the intended recipient can read it Symmetric Cryptography shared secret

More information

Configuring Remote Access using the RDS Gateway

Configuring Remote Access using the RDS Gateway Configuring Remote Access using the RDS Gateway Author: AC, SNE Contents Introduction... 3 Pre-requisites... 3 Supported Operating Systems... 3 Installing the I.T. Services Certificate Authority Root Certificate...

More information

Send documentation comments to

Send documentation comments to CHAPTER 6 Configuring Certificate Authorities and Digital Certificates This chapter includes the following topics: Information About Certificate Authorities and Digital Certificates, page 6-1 Default Settings,

More information

TABLE OF CONTENTS. ICANN Pre- Delegation Testing System. A User s Guide. Release version May- 03

TABLE OF CONTENTS. ICANN Pre- Delegation Testing System. A User s Guide. Release version May- 03 ICANN Pre- Delegation Testing System A User s Guide Release version 1.5 2013- May- 03 TABLE OF CONTENTS 1 Introduction... 2 2 Activate your account and log in... 3 3 Application overview and status...

More information

Sophos Mobile Control SaaS startup guide. Product version: 6.1

Sophos Mobile Control SaaS startup guide. Product version: 6.1 Sophos Mobile Control SaaS startup guide Product version: 6.1 Document date: September 2016 Contents 1 About this guide...4 2 About Sophos Mobile Control...5 3 What are the key steps?...7 4 Change your

More information

RB Digital Signature Proxy Guide for Reporters

RB Digital Signature Proxy Guide for Reporters RB Digital Signature Proxy Guide for Reporters Table of Contents RB-DSP registration workflow.... 1 Obtaining your certificate.... 2 Using Firefox to obtain your certificate.... 2 Using Internet Explorer

More information

Enabling Smart Card Logon for Mac OS X Using Centrify Suite

Enabling Smart Card Logon for Mac OS X Using Centrify Suite DoD Public Key Enablement (PKE) Reference Guide Enabling Smart Card Logon for Mac OS X Using Centrify Suite 2012.4 Contact: dodpke@mail.mil URL: http://iase.disa.mil/pki-pke/ URL: http://iase.disa.smil.mil/pki-pke/

More information

Student Guide INTRODUCTION TO ONLINE RESOURCES

Student Guide INTRODUCTION TO ONLINE RESOURCES Student Guide INTRODUCTION TO ONLINE RESOURCES Date: 12. March. 2018 By: Technical Support Team Table of Contents 1) Introduction 3 2) Student Panel (SIS) 3 2.1) Student Panel (SIS) Login 3 2.1.1) Definitions

More information

Evaluation Guide Host Access Management and Security Server 12.4

Evaluation Guide Host Access Management and Security Server 12.4 Evaluation Guide Host Access Management and Security Server 12.4 Copyrights and Notices Copyright 2017 Attachmate Corporation, a Micro Focus company. All rights reserved. No part of the documentation materials

More information

Enabling Smart Card Logon for Linux Using Centrify Suite

Enabling Smart Card Logon for Linux Using Centrify Suite DoD Public Key Enablement (PKE) Reference Guide Enabling Smart Card Logon for Linux Using Centrify Suite 2012.4 Contact: dodpke@mail.mil URL: http://iase.disa.mil/pki-pke/ URL: http://iase.disa.smil.mil/pki-pke/

More information

Request Policy Number from AgentNet

Request Policy Number from AgentNet Request Policy Number from AgentNet The purpose of this document is to provide information on how to get an AgentNet policy number from within FAST. Table of Contents Verify Products... 1 Request Policy

More information

Business Insights Dashboard

Business Insights Dashboard Business Insights Dashboard Sage 500 ERP 2000-2013 Sage Software, Inc. All rights reserved. Sage, the Sage logos, and the Sage product and service names mentioned herein are registered trademarks or trademarks

More information

Lecture 30. Cryptography. Symmetric Key Cryptography. Key Exchange. Advanced Encryption Standard (AES) DES. Security April 11, 2005

Lecture 30. Cryptography. Symmetric Key Cryptography. Key Exchange. Advanced Encryption Standard (AES) DES. Security April 11, 2005 Lecture 30 Security April 11, 2005 Cryptography K A ciphertext Figure 7.3 goes here K B symmetric-key crypto: sender, receiver keys identical public-key crypto: encrypt key public, decrypt key secret Symmetric

More information

IT Access Portal User Guide (Employees)

IT Access Portal User Guide (Employees) IT Access Portal User Guide (Employees) Introduction The University of Salford IT Access Portal provides University employees with secure, off-campus access to core IT applications and resources; for example:

More information

Using FileZilla to Connect to Your SFTP Account

Using FileZilla to Connect to Your SFTP Account Using FileZilla to Connect to Your SFTP Account 2016 17 Academic Year Changes Previously, Wyoming Transcript Center users connected to the National Student Clearinghouse (Clearinghouse) servers using the

More information

CLIQ Web Manager. User Manual. The global leader in door opening solutions V 6.1

CLIQ Web Manager. User Manual. The global leader in door opening solutions V 6.1 CLIQ Web Manager User Manual V 6.1 The global leader in door opening solutions Program version: 6.1 Document number: ST-003478 Date published: 2016-03-31 Language: en-gb Table of contents 1 Overview...9

More information

DTrade Frequently Asked Questions (FAQs)

DTrade Frequently Asked Questions (FAQs) DTrade Frequently Asked Questions (FAQs) BASIC USE Q: I m new to DTrade. Where can I find information on how to start using DTrade? A: The DTrade Information Center web page is accessible via the DDTC

More information

FINANCIAL INFORMATION FORUM 5 Hanover Square New York, New York 10004

FINANCIAL INFORMATION FORUM 5 Hanover Square New York, New York 10004 FINANCIAL INFORMATION FORUM 5 Hanover Square New York, New York 10004 212-422-8568 Via Electronic Delivery August 3, 2018 Mr. Vas Rajan Chief Information Security Officer ThesysCAT, LLC 1740 Broadway New

More information

Regulatory Reporting Hub SFTP Connection How to connect via SFTP & upload Files

Regulatory Reporting Hub SFTP Connection How to connect via SFTP & upload Files SFTP Connection How to connect via SFTP & upload Files Version 1.3 November 2017 Table of Content 1. Introduction... 2 2. Technical Pre-Conditions... 2 2.1. Hardware requirements... 2 2.2. Software requirements...

More information

Getting Started. Logon to Portal

Getting Started. Logon to Portal NC4 MISSION CENTER FS-ISAC QUICK REFERENCE GUIDE Getting Started Logon to Portal To login to the FSISAC portal, go to the url: https://portal.fsisac.com. The login requires the same username, password,

More information

Sophos Mobile Control SaaS startup guide. Product version: 7

Sophos Mobile Control SaaS startup guide. Product version: 7 Sophos Mobile Control SaaS startup guide Product version: 7 Contents 1 About this guide...4 2 About Sophos Mobile Control...5 3 What are the key steps?...7 4 Change your password...8 5 Change your login

More information

DefendX Software Control-Audit for Hitachi Installation Guide

DefendX Software Control-Audit for Hitachi Installation Guide DefendX Software Control-Audit for Hitachi Installation Guide Version 4.1 This guide details the method for the installation and initial configuration of DefendX Software Control-Audit for NAS, Hitachi

More information

Digital Certificate Service (DCS) - User Guide

Digital Certificate Service (DCS) - User Guide Digital Certificate Service (DCS) - User Guide Information Security Branch Contents Using this Guide... 3 User Requirements... 3 Secure E-mail Messaging... 4 Send a Secure E-mail Message... 4 Receive a

More information

TABLE OF CONTENTS. ICANN Pre- Delegation Testing System. A User s Guide. Version

TABLE OF CONTENTS. ICANN Pre- Delegation Testing System. A User s Guide. Version ICANN Pre- Delegation Testing System A User s Guide Version 2.2 2014-01- 17 TABLE OF CONTENTS 1 Introduction... 2 2 Activate your account and log in... 3 3 Application overview and status... 5 3.1 Applications

More information

Compliance Document Manager User Guide

Compliance Document Manager User Guide Compliance Document Manager User Guide Contents OVERVIEW... 3 SYSTEM REQUIREMENTS... 3 VENDORMATE PASSWORD REQUIREMENTS... 3 LOGIN... 4 THE HOME SCREEN... 5 BA Screening... 5 BA Oversight... 5 My Screening

More information

MarkLogic Server. Information Studio Developer s Guide. MarkLogic 8 February, Copyright 2015 MarkLogic Corporation. All rights reserved.

MarkLogic Server. Information Studio Developer s Guide. MarkLogic 8 February, Copyright 2015 MarkLogic Corporation. All rights reserved. Information Studio Developer s Guide 1 MarkLogic 8 February, 2015 Last Revised: 8.0-1, February, 2015 Copyright 2015 MarkLogic Corporation. All rights reserved. Table of Contents Table of Contents Information

More information

Lotus Domino Security NSL, Web SSO, Notes ID vault. Collin Murray Program Director, Lotus Domino Product Management

Lotus Domino Security NSL, Web SSO, Notes ID vault. Collin Murray Program Director, Lotus Domino Product Management Lotus Domino Security NSL, Web SSO, Notes ID vault Collin Murray Program Director, Lotus Domino Product Management Challenge: Reduce Cost of Ownership IBM Lotus Notes and Domino have been providing a secure

More information

Arrow Contract Management System. Electronic Tendering Guide

Arrow Contract Management System. Electronic Tendering Guide Arrow Contract Management System Electronic Tendering Guide CONTENTS 1. RECEIVING & VIEWING A TENDER INVITATION... 3 2. LOGGING INTO PROCON... 4 3. OBTAINING TENDER DOCUMENTS... 5 4. HOW TO RESPOND ELECTRONICALLY

More information

Provider Portal User Guide. Version 2.5.1

Provider Portal User Guide. Version 2.5.1 Provider Portal User Guide Version 2.5.1 0 February 22, 2018 Table of Contents Document Overview... 3 Purpose of this Document... 3 Intended Audience... 3 What s New in this User Guide?... 3 Assistance...

More information

Deltek Touch Expense for Ajera. Touch 1.0 Technical Installation Guide

Deltek Touch Expense for Ajera. Touch 1.0 Technical Installation Guide Deltek Touch Expense for Ajera Touch 1.0 Technical Installation Guide June 01, 2018 While Deltek has attempted to verify that the information in this document is accurate and complete, some typographical

More information