This document is the technical reference for Signaturgruppens Authentication Plugin client library.

Size: px
Start display at page:

Download "This document is the technical reference for Signaturgruppens Authentication Plugin client library."

Transcription

1 1 Introduction This document is the technical reference for Signaturgruppens Authentication Plugin client library. The Authentication Plugin consist of a single.net 4.5 DLL (AuthenticationPlugin.dll), henceforth referred to as the client library. The API and configuration for the client library is described in this document. 2 Configuration All configuration for the client library is configured in the web.config file for your web application. This section describes the section you need to add and the possible settings that are available. 2.1 Configuration section The client library expects the following configuration section in the web.config file: <configuration> <configsections> <section name="authenticationplugin" type="signaturgruppen.authenticationplugin.configuration.authenticationpluginconfigurationsection, AuthenticationPlugin" />... <AuthenticationPlugin CertificateFile="~/App_Data/TestBlackBoxSelfSigned.p12" CertificateFilePassword="Test1234" BackendCertificateFile="~/App_Data/TestBlackBoxSelfSigned.p12.cer" BackendUrl=" web.config in latest demo]" Identifier="TestTu1" /> Introduction to CAPI If you store your certificates in the Windows Certificate Store, you can configure the client library to load certificates from there. This is done through the CryptoAPI (CAPI). In the following configuration parameters, names with a Capi suffix refers to certificates loaded through the CryptoAPI Configuration settings The AuthenticationPlugin section has the following possible parameters Page 1

2 Setting Identifier BackendUrl BackendCertificateFile BackendCertificateCapi BackendCertificateCapiFindType CertificateFile CertificateFilePassword CertificateCapi CertificateCapiFindType CapiStoreLocation Description Service Provider Identifier Url pointing to the backend Backend certificate Backend certificate CAPI identifier X509FindType for BackendCertificateCapi Certificate used to secure communication Password for CertificateFile CAPI identifier of Authentication Plugin certificate X509FindType for CertificateCapi StoreLocation for Capi certificates Page 2

3 Identifier Identifies the service (the client library) to the backend. This value can be choosen freely but has to match the configuration at the backend, as the backend uses this value to identify the specific configuration at the backend, including certificates used for the secure communication BackendUrl Url pointing to the root of the backend application BackendCertificateFile Directory path pointing to the filebased certificate (typically a cer file), used to encrypt and verify messages when communicating with the backend. Supports absolute or virtual path BackendCertificateCapi CAPI certificate identifier for the certificate used to encrypt messages when communication with the backend. The default behavior is to look for the Distinguished Name of the certificate BackendCertificateCapiFindType Lets you set the X509FindType when also using the BackendCertificateCapi parameter. All values of the X509FindType are usable, but the following values are usually preferred: X509FindType Description FindBySubjectDistinguishedName Full distinguished name from certificate (X509Certificate2 style) FindBySubjectName Find a substring in the certificate subject name FindByThumbprint Find by certificate Thumbprint (usually SHA1 hash) FindBySerialNumber Find by certificate serial number If more than one certificate is found using the selected search method, the first found is selected CertificateFile Directory path pointing to the filebased certificate (typically a p12 or ` pfx file), used to decrypt and sign messages when communicating with the backend. Supports absolute or virtual path CertificateFilePassword Password for the pfx/p12 file pointed to in the CertificateFile parameter CertificateCapi CAPI certificate identifier for the certificate used to encrypt messages when communicating with the backend. The default behavior is to look for the Distinguished Name of the certificate CertificateCapiFindType Lets you set the X509FindType when also using the CertificateCapi parameter. See BackendCertificateCapiFindType for possible values CapiStoreLocation StoreLocation enum: Page 3

4 public enum StoreLocation { CurrentUser = 1, LocalMachine = 2, } Default for this setting is StoreLocation.LocalMachine Configured certificates The client library and the backend communicates securely using the configured certificates. Only one of BackendCertificateFile and BackendCertificateCapi must be specified. Same applies for CertificateFile and CertificateCapi. 3 Logging No external logging framework is used in the client library but the client library supports and requires logging. This is done by requiring the registration of a logging method taking a message to be logged as a string parameter: //from Global.asax: protected void Application_Start(object sender, EventArgs e) { log4net.config.xmlconfigurator.configure(); var logger = LogManager.GetLogger("Signaturgruppen.AuthenticationPlugin"); AuthenticationPluginLogger.LoggerAction = logger.debug; } This is an example taken from our demo application where we demonstrate the registration of a Log4Net debug logger, which then receives all the log messages from the client library. If this is not configured the AuthenticationPluginLogger will throw an exception at runtime. The backend will log all required information regarding login, signing, validation, revocation checks etc. A full audit log are generated at the backend which supports the extended reporting requirements from DanID when using file or hardware based NemID flows The backend is also able to log the XMLDSig (XML-signatures) generated by the NemID flows. These are also avaiable through the API. The client logs are mainly for debugging purposes but we still require them. 4 HTML 5 Web Messaging and iframes The flow works by setting up an iframe and then communicating with the backend using the HTML 5 Web Messaging JavaScript API through an iframe. The client library generates the code needed to enable communication with the backend through an iframe. As an example, the following code snippet creates the signed parameters for the backend as well as the JavaScript needed for the communication var paramsgenerator = new NemIDOtpParamsGenerator(); Page 4

5 paramsgenerator.generatescriptandparametersfornemidframe("handleresult.aspx"); We refer to the demo for details on how this is used. The browser requirements for this setup are the same as for the NemID JavaScript client, thus if the users browser supports the NemID client, it supports Signaturgruppens Authentication Plugin. Page 5

6 5 Test setup Signaturgruppen has hosted a backend available when testing on The demo application available at is configured to this test backend when you start it the first time. It is possible to use the demo setup to get NemID up and running in your application(s) and test how NemID and our software works before any agreements with us or DanID has been made. 6 Client flows and services We support all NemID login and signing flows, which include the NemID JavaScript client using OTP cards (both Standard Mode and Limited Mode) and the OpenSign applet for key and hardware based login and signing flows. 6.1 CPR Services The client library supports the CPR services available through the NemID infrastructure. If you are a private service provider you are restricted to the CPR Match service, which lets you validate a given CPR paired with the Personal ID (PID) from a successfull NemID authentication flow CPR (non-private service providers) If you have a CPR agreement with DanID it is a simple configuration setting at the backend which enables the CPR service and sets the CPR in the response from the backend and makes it available through the NemIDValidationResult (see below). The CPR is encrypted and decrypted transparently using RSA-SHA CPR Match (private service providers) The CPR Match service is available at the backend as a RESTful service available transparently through the client library. A CPR Match agreement with DanID is required. There are two ways to call the CPR Match service using the client library. 1. The NemIDValidationResult.AuthenticationInfo object contains the method:pidcprmatch(string cpr), which returns true or false. (See below for more details on the result object). When a response is received from the backend, the PID from the user certificate is already part of the response, and thus only the CPR number is needed in order to verify if the PID matched the given CPR. 2. The CPR Match service is also avaible as a "pure" backend-to-backend service using the following var service = new PidCprMatchService(); var cprmatchespid = service.matchpidandcpr(string pid, string cpr); The MatchPidAndCpr(string pid, string cpr) method returns true or false. All communication is secured by https and signed and encrypted using RSA-SHA Sign _ Properties If you need to add additional sign properties to the resulting XMLDSig document, you can do so by adding the Page 6

7 Sign _ Properties property to the parametergenerator, as demonstrated here: var paramsgenerator = new NemIDOtpParamsGenerator(); paramsgenerator.setclientflowparameter("sign_properties", "testproperty1=testvalue1;testproperty2=testvalue2;"); 7 Backend response The response received from the backend through the iframe is validated using the client library, resulting in an object consisting of the validation result and all the information needed from the specific client flow. Following snippet of code creates a validator which parses and validates the response string received from the backend through the HTML5 WebMessaging API: var validator = new NemIDAuthenticationValidator(); NemIDValidationResult result = validator.validate(receivedresponse); The NemIDValidationResult object contains the validation result and all the data you need from the NemID authentication. An example is a NemID login flow, where the result object contains validation status and if successfull all the certificate info from the NemID user including: PID/RID and Common Name. See the demo for all relevant examples, including demonstration of how to use the CPR-MATCH service. 7.1 NemIDValidationResult In this section the API for the NemIDValidationResult class is described. We refer to an instance of NemIDValidationResult as "result" result.authenticationresult : BOOLEAN TRUE, if and only if, result.status equals Ok result.status : AuthenticationStatus public enum AuthenticationStatus { Ok, AuthenticationBackendError, ClientFlowCancel, ClientFlowError, AuthenticationPluginValidationError, } Ok In this case the communication and the flow requested was successfull. The user was authenticated successfully AuthenticationBackendError And error occured at the backend. In this case the returned message is not signed and a generic error message could be displayed to the user. This is most likely to be caused by configuration errors ClientFlowCancel In this scenario, the flow was cancelled, most often directly by the user. Page 7

8 ClientFlowError In this case, an error occured in the requested flow. Examples could be and error with the NemID client. In this case the errorcodes returned to the backend from the requested client flow is returned and should be logged. See examples of this in the demo application. As a minimum, you should log the message returned from the.getlogmessage() call on the validation result object AuthenticationPluginValidationError An error occured parsing or validating the response from the backend result.authenticationinfo Object containing the response from the NemID authentication. If AuthenticationStatus equals Ok, it contains all the certificate information such as PID/RID, common name, certificate distinguished name etc. If AuthenticationStatus equals ClientFlowError, the error code from the NemID flow is found in the ErrorCode property. The resulting XMLDSig is found in the SignedXml property, as a Base64 encoded string. 8 Flow overview To illustrate how the different parts work together, we provide a short overview of the overall flow here. All communication are done via https and are thus encrypted. 1. The client website opens an iframe to the backend and sends the generated and signed parameters to the backend through 2. The requested flow/client is started and generated parameters used. The user is interacting directly with the service inside the iframe using a secure connection. 3. As an example: The NemID client is started inside the iframe which transparently lets the user interact with the NemID client, as-if the client was hosted directly on the client website. 4. When the user has entered his credentials the response is validated and all required logs created at the backend. 5. A response is created and sent to the client website through the iframe using the HTML 5 web massaging API. 6. The response is validated using the client library, after which all required information is avaiable through the client library API. 7. All messages are signed and sensitive information is encrypted. Our library transparently validates and de-/encrypts the messages. All communication is done through and from the users browser. 9 Contact information Info Mail support@signaturgruppen.dk Phone Website Page 8

The SPS.Client consist of a single.net DLL (SPS.CLient.dll), henceforth referred to as the client library.

The SPS.Client consist of a single.net DLL (SPS.CLient.dll), henceforth referred to as the client library. 1 Introduction This document is the technical reference for Signaturgruppens SPS.Client library. The SPS.Client consist of a single.net DLL (SPS.CLient.dll), henceforth referred to as the client library.

More information

Guidelines on the use of LSS for NemID test tools

Guidelines on the use of LSS for NemID test tools Guidelines on the use of LSS for NemID test tools Signaturgruppen 2014 Side 1 af 11 Table of contents 1 The purpose and audience of the document... 4 2 Introduction... 5 3 OOAPI... 6 4 LSS backend reference

More information

NemID JS Developer Support site. Guidelines

NemID JS Developer Support site. Guidelines Nets-DanID A/S Lautrupbjerg 10 DK 2750 Ballerup T +45 87 42 45 00 F +45 70 20 66 29 info@danid.dk www.nets-danid.dk CVR no. 30808460 NemID JS Developer Support site Guidelines Nets-DanID A/S 30. March

More information

NemID JS Developer Support site. Guidelines

NemID JS Developer Support site. Guidelines Nets Denmark A/S Lautrupbjerg 10 P.O. 500 DK-2750 Ballerup T +45 44 68 44 68 F +45 44 86 09 30 www.nets.eu CVR-nr. 20016175 NemID JS Developer Support site Guidelines Nets-DanID A/S 24. October 2017 Page

More information

Recommended test procedures

Recommended test procedures Nets DanID A/S Lautrupbjerg 10 DK 2750 Ballerup T +45 87 42 45 00 F +45 70 20 66 29 info@danid.dk www.nets-danid.dk CVR no. 30808460 Recommended test procedures DanID A/S September 2014 Page 1-33 Table

More information

LSS Technical Specification

LSS Technical Specification LSS Technical Specification Table of contents 1 Introduction... 3 2 Rendering of signature flows... 4 3 Security guidelines... 5 3.1 LSS back-end only accessible via SSL... 5 3.2 Content Security Policy...

More information

Digitaliseringsstyrelsen

Digitaliseringsstyrelsen Signing Service Interface Version: 1.7 ID: 32309 2013-06-24 Table of Contents 1 PURPOSE... 3 2 OVERVIEW... 4 3 SIGNING REQUEST MESSAGE... 5 4 SIGNING RESPONSE MESSAGE... 7 5 BACK CHANNEL WEB SERVICE...

More information

ComponentSpace SAML v2.0 Configuration Guide

ComponentSpace SAML v2.0 Configuration Guide ComponentSpace SAML v2.0 Configuration Guide Copyright ComponentSpace Pty Ltd 2017-2018. All rights reserved. www.componentspace.com Contents Introduction... 1 SAML Configuration JSON... 1 Identity Provider

More information

pinremote Manual Version 4.0

pinremote Manual Version 4.0 pinremote Manual Version 4.0 Page 1 Table of content 1 Introduction... 4 2 Setup... 5 2.1 Requirements server... 5 2.2 Requirements client... 5 2.3 Setup process... 6 2.3.1 Single Server... 8 2.3.2 Cluster...

More information

SAML v1.1 for.net Developer Guide

SAML v1.1 for.net Developer Guide SAML v1.1 for.net Developer Guide Copyright ComponentSpace Pty Ltd 2004-2017. All rights reserved. www.componentspace.com Contents 1 Introduction... 1 1.1 Features... 1 1.2 Benefits... 1 1.3 Prerequisites...

More information

ENTRUST CONNECTOR Installation and Configuration Guide Version April 21, 2017

ENTRUST CONNECTOR Installation and Configuration Guide Version April 21, 2017 ENTRUST CONNECTOR Installation and Configuration Guide Version 0.5.1 April 21, 2017 2017 CygnaCom Solutions, Inc. All rights reserved. Contents What is Entrust Connector... 4 Installation... 5 Prerequisites...

More information

keyon / PKCS#11 to MS-CAPI Bridge User Guide V2.4

keyon / PKCS#11 to MS-CAPI Bridge User Guide V2.4 / PKCS#11 to MS-CAPI Bridge V2.4 April 2017 Table of Contents Copyright 2017 by AG All rights reserved. No part of the contents of this manual may be reproduced or transmitted in any form or by any means

More information

FedLine Web Certificate Retrieval Procedures

FedLine Web Certificate Retrieval Procedures Version 2.0 Contents Federal Reserve Bank Certificate Retrieval Overview and Preparation Procedures... 2 Certificate Creation Procedures... 3 Installing the Federal Reserve Banks Certificate Authority

More information

Certificate Retrieval Procedures

Certificate Retrieval Procedures `` Certificate Retrieval Procedures Version 2.2 2018 Federal Reserve Banks Contents Federal Reserve Bank Certificate Retrieval Overview and Preparation Procedures... 2 Certificate Creation Procedures...

More information

Digital Certificates Demystified

Digital Certificates Demystified Digital Certificates Demystified Ross Cooper, CISSP IBM Corporation RACF/PKI Development Poughkeepsie, NY Email: rdc@us.ibm.com August 9 th, 2012 Session 11622 Agenda Cryptography What are Digital Certificates

More information

Integration of the platform. Technical specifications

Integration of the platform. Technical specifications Introduction This document is meant as a reference and specification guide to carry out the integration between Gamelearn s platform and the different Learning Management System platforms of the client,

More information

Digital it Signatures. Message Authentication Codes. Message Hash. Security. COMP755 Advanced OS 1

Digital it Signatures. Message Authentication Codes. Message Hash. Security. COMP755 Advanced OS 1 Digital Signatures Digital it Signatures Offer similar protections as handwritten signatures in the real world. 1. Difficult to forge. 2. Easily verifiable. 3. Not deniable. 4. Easy to implement. 5. Differs

More information

ComponentSpace SAML v2.0 Configuration Guide

ComponentSpace SAML v2.0 Configuration Guide ComponentSpace SAML v2.0 Configuration Guide Copyright ComponentSpace Pty Ltd 2004-2019. All rights reserved. www.componentspace.com Contents Introduction... 1 SAML Configuration Options... 1 SAML Configuration

More information

Specification document for OCSP

Specification document for OCSP Nets DanID A/S Lautrupbjerg 10 DK 2750 Ballerup T +45 87 42 45 00 F +45 70 20 66 29 info@danid.dk www.nets-danid.dk CVR no. 30808460 Specification document for OCSP DanID A/S 4 June 2014 Page 1-11 Table

More information

DCCKI Interface Design Specification. and. DCCKI Repository Interface Design Specification

DCCKI Interface Design Specification. and. DCCKI Repository Interface Design Specification DCCKI Interface Design Specification and DCCKI Repository Interface Design Specification 1 INTRODUCTION Document Purpose 1.1 Pursuant to Section L13.13 of the Code (DCCKI Interface Design Specification),

More information

Secure IIS Web Server with SSL

Secure IIS Web Server with SSL Publication Date: May 24, 2017 Abstract The purpose of this document is to help users to Install and configure Secure Socket Layer (SSL) Secure the IIS Web server with SSL It is supported for all EventTracker

More information

BROWSER-BASED SUPPORT CONSOLE USER S GUIDE. 31 January 2017

BROWSER-BASED SUPPORT CONSOLE USER S GUIDE. 31 January 2017 BROWSER-BASED SUPPORT CONSOLE USER S GUIDE 31 January 2017 Contents 1 Introduction... 2 2 Netop Host Configuration... 2 2.1 Connecting through HTTPS using Certificates... 3 2.1.1 Self-signed certificate...

More information

Managing Certificates

Managing Certificates CHAPTER 12 The Cisco Identity Services Engine (Cisco ISE) relies on public key infrastructure (PKI) to provide secure communication for the following: Client and server authentication for Transport Layer

More information

Composer Help. Web Request Common Block

Composer Help. Web Request Common Block Composer Help Web Request Common Block 7/4/2018 Web Request Common Block Contents 1 Web Request Common Block 1.1 Name Property 1.2 Block Notes Property 1.3 Exceptions Property 1.4 Request Method Property

More information

Specification document for OCSP

Specification document for OCSP Nets DanID A/S Lautrupbjerg 10 DK 2750 Ballerup T +45 87 42 45 00 F +45 70 20 66 29 www.nets.dk CVR no. 30808460 Specification document for OCSP Nets DanID A/S 9 March 2015 Page 1-11 Table of Contents

More information

How to Set Up External CA VPN Certificates

How to Set Up External CA VPN Certificates To configure a client-to-site, or site-to-site VPN using s created by External CA, you must create the following VPN s for the VPN service to be able to authenticate Before you begin Use an external CA

More information

Configuring Anonymous Access to Analysis Files in TIBCO Spotfire 7.5

Configuring Anonymous Access to Analysis Files in TIBCO Spotfire 7.5 Configuring Anonymous Access to Analysis Files in TIBCO Spotfire 7.5 Introduction Use Cases for Anonymous Authentication Anonymous Authentication in TIBCO Spotfire 7.5 Enabling Anonymous Authentication

More information

How to Configure SSL Interception in the Firewall

How to Configure SSL Interception in the Firewall Most applications encrypt outgoing connections with SSL or TLS. SSL Interception decrypts SSL-encrypted traffic to allow Application Control features (such as the Virus Scanner, ATD, URL Filter, Safe Search,

More information

Entrust Connector (econnector) Venafi Trust Protection Platform

Entrust Connector (econnector) Venafi Trust Protection Platform Entrust Connector (econnector) For Venafi Trust Protection Platform Installation and Configuration Guide Version 1.0.5 DATE: 17 November 2017 VERSION: 1.0.5 Copyright 2017. All rights reserved Table of

More information

WebSign SDK (Java) Java(Client) - Java(Server) Developer s Guide

WebSign SDK (Java) Java(Client) - Java(Server) Developer s Guide WebSign SDK (Java) Java(Client) - Java(Server) Developer s Guide C O N T E N T S 1. Introduction... 1 2. Abstract... 1 3. Key Features... 1 4. System requirements... 1 5. Process... 1 6. Running WebSign

More information

Management Tools. Management Tools. About the Management GUI. About the CLI. This chapter contains the following sections:

Management Tools. Management Tools. About the Management GUI. About the CLI. This chapter contains the following sections: This chapter contains the following sections:, page 1 About the Management GUI, page 1 About the CLI, page 1 User Login Menu Options, page 2 Customizing the GUI and CLI Banners, page 3 REST API, page 3

More information

Registration and Renewal procedure for Belfius Certificate

Registration and Renewal procedure for Belfius Certificate Registration and Renewal procedure for Belfius Certificate GTU Environment Table of contents TABLE OF CONTENTS... 2 1. INTRODUCTION... 3 2. CONTACT... 3 3. REGISTRATION PROCEDURE... 4 3.1 PRE-REQUISITES...

More information

Mitel MiContact Center Enterprise WEB APPLICATIONS CONFIGURATION GUIDE. Release 9.2

Mitel MiContact Center Enterprise WEB APPLICATIONS CONFIGURATION GUIDE. Release 9.2 Mitel MiContact Center Enterprise WEB APPLICATIONS CONFIGURATION GUIDE Release 9.2 NOTICE The information contained in this document is believed to be accurate in all respects but is not warranted by Mitel

More information

PassBy[ME] API Documentation

PassBy[ME] API Documentation PassBy[ME] API Documentation Document id: PBM_01 Document Version: 1.1.12 Author: Microsec Ltd. Date: 2015.09.13. API Version 1 1 Table of contents 1 Introduction... 4 2 Terms... 5 3 PassBy[ME] message

More information

Client 2. Authentication 5

Client 2. Authentication 5 Pipeline Pilot Web Port Support Guide April 2011 Contents Requirements 2 Requirements 2 Server 2 Client 2 Web Port Access 3 Authentication 5 Introduction Pipeline Pilot Web Port is a web-based application

More information

How to Configure Mutual Authentication using X.509 Certificate in SMP SAP Mobile Platform (3.X)

How to Configure Mutual Authentication using X.509 Certificate in SMP SAP Mobile Platform (3.X) How to Configure Mutual Authentication using X.509 Certificate in SMP SAP Mobile Platform (3.X) Author: Ali Chalhoub Global Support Architect Engineer Date: July 2, 2015 Document History: Document Version

More information

TIBCO Spotfire Automation Services Installation and Configuration

TIBCO Spotfire Automation Services Installation and Configuration TIBCO Spotfire Automation Services Installation and Configuration Software Release 7.0.1 July 2015 Two-Second Advantage 2 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE.

More information

File submissions to VINN and KRITA

File submissions to VINN and KRITA Date Page 2017-10-25 1 (10) Recipient: Respondents to VINN and KRITA File submissions to VINN and KRITA Summary This document briefly describes the VINN/KRITA solution for file submissions in the form

More information

Integrating YuJa Active Learning with ADFS (SAML)

Integrating YuJa Active Learning with ADFS (SAML) Integrating YuJa Active Learning with ADFS (SAML) 1. Overview This document is intended to guide users on how to setup a secure connection between the YuJa Active Learning Platform referred to as the Service

More information

How to Configure SSL Interception in the Firewall

How to Configure SSL Interception in the Firewall Most applications encrypt outgoing connections with SSL or TLS. SSL Interception decrypts SSL-encrypted HTTPS and SMTPS traffic to allow Application Control features (such as the Virus Scanner, ATP, URL

More information

Deploying Haystack Applications

Deploying Haystack Applications Chapter 12 Deploying Haystack Applications In order to distribute an application that you build with the Haystack Code Generator for.net you need to create a Runtime License. This runtime license is distributed

More information

Certified Secure Web Application Secure Development Checklist

Certified Secure Web Application Secure Development Checklist www.certifiedsecure.com info@certifiedsecure.com Tel.: +31 (0)70 310 13 40 Loire 128-A 2491 AJ The Hague The Netherlands About Certified Secure Checklist Certified Secure exists to encourage and fulfill

More information

Prescription Monitoring Program Information Exchange. RxCheck State Routing Service. SRS Installation & Setup Guide

Prescription Monitoring Program Information Exchange. RxCheck State Routing Service. SRS Installation & Setup Guide Prescription Monitoring Program Information Exchange RxCheck State Routing Service SRS Installation & Setup Guide Delivery On: Version: July 2018 2.0 Prepared By: Sponsored By: IJIS Institute Tetrus Corp

More information

Chapter 6: Digital Certificates Introduction Authentication Methods PKI Digital Certificate Passing

Chapter 6: Digital Certificates Introduction Authentication Methods PKI Digital Certificate Passing Chapter 6: Digital Certificates Introduction Methods PKI Digital Certificate Passing Prof Bill Buchanan OBE http://asecuritysite.com/crypto06 http://asecuritysite.com/encryption Identity on the Internet

More information

Getting Started Guide

Getting Started Guide Interstage Application Server V1 powered by Windows Azure Getting Started Guide Windows B1FW-5952-01ENZ0(01) January 2012 Preface Purpose of This Document This document explains the main features of Interstage

More information

Public. Atos Trustcenter. Server Certificates + Codesigning Certificates. Version 1.2

Public. Atos Trustcenter. Server Certificates + Codesigning Certificates. Version 1.2 Atos Trustcenter Server Certificates + Codesigning Certificates Version 1.2 20.11.2015 Content 1 Introduction... 3 2 The Atos Trustcenter Portfolio... 3 3 TrustedRoot PKI... 4 3.1 TrustedRoot Hierarchy...

More information

Using Hypertext Transfer Protocol over Secure Sockets Layer (HTTPS)

Using Hypertext Transfer Protocol over Secure Sockets Layer (HTTPS) CHAPTER 2 Using Hypertext Transfer Protocol over Secure Sockets Layer (HTTPS) This chapter contains information on the following topics: HTTPS Overview, page 2-1 HTTPS for Cisco Unified IP Phone Services,

More information

ODYSSEY. cryptic by intent. Snorkel-TX. Feature Highlights & Technical Specifications. Odyssey Technologies Ltd.

ODYSSEY. cryptic by intent. Snorkel-TX. Feature Highlights & Technical Specifications. Odyssey Technologies Ltd. Snorkel-TX Feature Highlights & Technical Specifications Snorkel-TX is a powerful transaction security server that enables failsafe authentication, access control, non-repudiation and integrity for web

More information

XenApp 5 Security Standards and Deployment Scenarios

XenApp 5 Security Standards and Deployment Scenarios XenApp 5 Security Standards and Deployment Scenarios 2015-03-04 20:22:07 UTC 2015 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement Contents XenApp 5 Security Standards

More information

General Technical Specification for LSS for NemID

General Technical Specification for LSS for NemID General Technical Specification for LSS for NemID Table of contents 1 Introduction...4 2 Solution architecture...5 2.1 LSS Client integration...5 2.2 Third-party cookies...6 2.3 LSS Client URL...7 2.3.1

More information

With this new webpart you can create your own forms. You can set the content of the form, styles Just make sure you are following Corporate Design.

With this new webpart you can create your own forms. You can set the content of the form, styles Just make sure you are following Corporate Design. Custom forms With this new webpart you can create your own forms. You can set the content of the form, styles Just make sure you are following Corporate Design. The Custom form enables to send requests

More information

Developer Resources: PIN2

Developer Resources: PIN2 Administrative Technology Services Technology and Data Services Developer Resources: PIN2 Contents Introduction... 2 Registering an Application... 2 Information Required for Registration... 3 Information

More information

Access SharePoint using Basic Authentication and SSL (via Alternative Access URL) with SP 2016 (v 1.9)

Access SharePoint using Basic Authentication and SSL (via Alternative Access URL) with SP 2016 (v 1.9) Access SharePoint using Basic Authentication and SSL (via Alternative Access URL) with SP 2016 (v 9) This page is part of the installation guide for the Confluence SharePoint Connector. It tells you how

More information

Hypertext Transfer Protocol over Secure Sockets Layer (HTTPS)

Hypertext Transfer Protocol over Secure Sockets Layer (HTTPS) Hypertext Transfer Protocol over Secure Sockets Layer (HTTPS) This chapter provides information about Hypertext Transfer Protocol over Secure Sockets Layer. HTTPS, page 1 HTTPS for Cisco Unified IP Phone

More information

SAS Event Stream Processing 4.2: Security

SAS Event Stream Processing 4.2: Security SAS Event Stream Processing 4.2: Security Encryption on Sockets Overview to Enabling Encryption You can enable encryption on TCP/IP connections within an event stream processing engine. Specifically, you

More information

Integrating the YuJa Enterprise Video Platform with ADFS (SAML)

Integrating the YuJa Enterprise Video Platform with ADFS (SAML) Integrating the YuJa Enterprise Video Platform with ADFS (SAML) Overview This document is intended to guide users on how to setup a secure connection between the YuJa Enterprise Video Platform referred

More information

Access to RTE s Information System by software certificates under Microsoft Windows 7

Access to RTE s Information System by software certificates under Microsoft Windows 7 by software certificates under Microsoft Windows 7 PKI User guide Version 4, 01/01/2017 Programmes & SI (PSI) TOUR MARCHAND 41 RUE BERTHELOT - 92411 COURBEVOIE CEDEX TEL : 01.78.66.50.00 - FAX : 01.78.66.50.64

More information

Application of Cryptography in.net Framework

Application of Cryptography in.net Framework Application of Cryptography in.net Framework Paul Lo Software Engineer in Cyberwisdom.net M.Math(CS), MCSD..net Overview Basic Cryptography CryptoAPI enhancement in.net AES support in.net XML Signature

More information

Appendix: Items 1-3 of the NemID rules netbank and public digital signature 1. Introduction NemID is a security solution you can use in connection with your netbank, public and private websites. NemID

More information

Black Box DCX3000 / DCX1000 Using the API

Black Box DCX3000 / DCX1000 Using the API Black Box DCX3000 / DCX1000 Using the API updated 2/22/2017 This document will give you a brief overview of how to access the DCX3000 / DCX1000 API and how you can interact with it using an online tool.

More information

Signicat Connector for Java Version 2.6. Document version 3

Signicat Connector for Java Version 2.6. Document version 3 Signicat Connector for Java Version 2.6 Document version 3 About this document Purpose Target This document is a guideline for using Signicat Connector for Java. Signicat Connector for Java is a client

More information

Security Provider Integration SAML Single Sign-On

Security Provider Integration SAML Single Sign-On Security Provider Integration SAML Single Sign-On 2017 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the

More information

VMware Notification Service v2.0 Installation and Configuration Guide Configure ENS2 for cloud and on-premises deployments

VMware  Notification Service v2.0 Installation and Configuration Guide Configure ENS2 for cloud and on-premises deployments VMware Email Notification Service v2.0 Installation and Configuration Guide Configure ENS2 for cloud and on-premises deployments Workspace ONE UEM v9.5 Have documentation feedback? Submit a Documentation

More information

Assureon Installation Guide Client Certificates. for Version 6.4

Assureon Installation Guide Client Certificates. for Version 6.4 Client Certificates for Version 6.4 Publication info 2011 Nexsan Technologies Canada Inc. All rights reserved. Published by: Nexsan Technologies Canada Inc. 1405 Trans Canada Highway, Suite 300 Dorval,

More information

FUJITSU Cloud Service S5. Introduction Guide. Ver. 1.3 FUJITSU AMERICA, INC.

FUJITSU Cloud Service S5. Introduction Guide. Ver. 1.3 FUJITSU AMERICA, INC. FUJITSU Cloud Service S5 Introduction Guide Ver. 1.3 FUJITSU AMERICA, INC. 1 FUJITSU Cloud Service S5 Introduction Guide Ver. 1.3 Date of publish: September, 2011 All Rights Reserved, Copyright FUJITSU

More information

Specification document for LDAP API

Specification document for LDAP API Nets DanID A/S Lautrupbjerg 10 DK 2750 Ballerup T +45 87 42 45 00 F +45 70 20 66 29 info@danid.dk www.nets-danid.dk CVR no. 30808460 Specification document for LDAP API DanID A/S 1 March 2012 Page 1-15

More information

SAS Event Stream Processing 4.3: Security

SAS Event Stream Processing 4.3: Security SAS Event Stream Processing 4.3: Security Enabling Encryption on Sockets Overview to Enabling Encryption You can enable encryption on TCP/IP connections within an event stream processing engine. Specifically,

More information

Dohatec CA. Export/Import Procedure etoken Pro 72K FOR USERS OF ETOKENS [VERSION 1.0]

Dohatec CA. Export/Import Procedure etoken Pro 72K FOR USERS OF ETOKENS [VERSION 1.0] Dohatec CA Export/Import Procedure etoken Pro 72K FOR USERS OF ETOKENS [VERSION 1.0] 1 1 Digital Certificate Certificates issued by Dohatec CA are in X.509 v3 format. In Microsoft windows machines, these

More information

Security Provider Integration: SAML Single Sign-On

Security Provider Integration: SAML Single Sign-On Security Provider Integration: SAML Single Sign-On 2003-2018 BeyondTrust, Inc. All Rights Reserved. BEYONDTRUST, its logo, and JUMP are trademarks of BeyondTrust, Inc. Other trademarks are the property

More information

Hypertext Transfer Protocol Over Secure Sockets Layer (HTTPS)

Hypertext Transfer Protocol Over Secure Sockets Layer (HTTPS) Hypertext Transfer Protocol Over Secure Sockets Layer (HTTPS) This chapter provides information about Hypertext Transfer Protocol over Secure Sockets Layer. HTTPS, page 1 HTTPS for Cisco Unified IP Phone

More information

VMware Notification Service v2.0 Installation and Configuration Guide Configure ENS2 for cloud and on-premises deployments

VMware  Notification Service v2.0 Installation and Configuration Guide Configure ENS2 for cloud and on-premises deployments VMware Email Notification Service v2.0 Installation and Configuration Guide Configure ENS2 for cloud and on-premises deployments Workspace ONE UEM v9.7 Have documentation feedback? Submit a Documentation

More information

Workspace ONE UEM Notification Service 2. VMware Workspace ONE UEM 1811

Workspace ONE UEM  Notification Service 2. VMware Workspace ONE UEM 1811 Workspace ONE UEM Email Notification Service 2 VMware Workspace ONE UEM 1811 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments

More information

Using SSL to Secure Client/Server Connections

Using SSL to Secure Client/Server Connections Using SSL to Secure Client/Server Connections Using SSL to Secure Client/Server Connections, page 1 Using SSL to Secure Client/Server Connections Introduction This chapter contains information on creating

More information

User Directories. Overview, Pros and Cons

User Directories. Overview, Pros and Cons User Directories Overview, Pros and Cons Overview Secure ISMS can operate with one or more of the following user directories. Secure ISMS Users (ISMS) Internal users local to the Secure ISMS application

More information

UCS Manager Communication Services

UCS Manager Communication Services Communication Protocols, page 1 Communication Services, page 1 Non-Secure Communication Services, page 3 Secure Communication Services, page 5 Network-Related Communication Services, page 12 Communication

More information

VMware Notification Service v2.0 Installation and Configuration Guide Configure ENSv2 for cloud and on-premises deployments

VMware  Notification Service v2.0 Installation and Configuration Guide Configure ENSv2 for cloud and on-premises deployments VMware Email Notification Service v2.0 Installation and Configuration Guide Configure ENSv2 for cloud and on-premises deployments Workspace ONE UEM v9.4 Have documentation feedback? Submit a Documentation

More information

VMware Notification Service v2.0 Installation and Configuration Guide Configure ENS2 for cloud and on-premises deployments

VMware  Notification Service v2.0 Installation and Configuration Guide Configure ENS2 for cloud and on-premises deployments VMware Email Notification Service v2.0 Installation and Configuration Guide Configure ENS2 for cloud and on-premises deployments Workspace ONE UEM v1810 Have documentation feedback? Submit a Documentation

More information

S/MIME on Good for Enterprise MS Online Certificate Status Protocol. Installation and Configuration Notes. Updated: November 10, 2011

S/MIME on Good for Enterprise MS Online Certificate Status Protocol. Installation and Configuration Notes. Updated: November 10, 2011 S/MIME on Good for Enterprise MS Online Certificate Status Protocol Installation and Configuration Notes Updated: November 10, 2011 Installing the Online Responder service... 1 Preparing the environment...

More information

ReportPlus Embedded Web SDK Guide

ReportPlus Embedded Web SDK Guide ReportPlus Embedded Web SDK Guide ReportPlus Web Embedding Guide 1.4 Disclaimer THE INFORMATION CONTAINED IN THIS DOCUMENT IS PROVIDED AS IS WITHOUT ANY EXPRESS REPRESENTATIONS OF WARRANTIES. IN ADDITION,

More information

Open XML Gateway User Guide. CORISECIO GmbH - Uhlandstr Darmstadt - Germany -

Open XML Gateway User Guide. CORISECIO GmbH - Uhlandstr Darmstadt - Germany - Open XML Gateway User Guide Conventions Typographic representation: Screen text and KEYPAD Texts appearing on the screen, key pads like e.g. system messages, menu titles, - texts, or buttons are displayed

More information

Participant User Guide, Version 2.6

Participant User Guide, Version 2.6 Developers Integration Lab (DIL) Participant User Guide, Version 2.6 3/17/2013 REVISION HISTORY Author Date Description of Change 0.1 Laura Edens Mario Hyland 9/19/2011 Initial Release 1.0 Michael Brown

More information

USER MANUAL FOR SECURE E MAIL MICROSOFT OUTLOOK (2003)

USER MANUAL FOR SECURE E MAIL MICROSOFT OUTLOOK (2003) YATANARPON TELEPORT COMPANY LTD., YATANARPON CERTIFICATION AUTHORITY USER MANUAL FOR SECURE E MAIL MICROSOFT OUTLOOK (2003) Yatanarpon Teleport Company Ltd., Hlaing Universities Campus, Hlaing Township,

More information

IBM i Version 7.2. Security Digital Certificate Manager IBM

IBM i Version 7.2. Security Digital Certificate Manager IBM IBM i Version 7.2 Security Digital Certificate Manager IBM IBM i Version 7.2 Security Digital Certificate Manager IBM Note Before using this information and the product it supports, read the information

More information

Qualys Cloud Platform (VM, PC) v8.x Release Notes

Qualys Cloud Platform (VM, PC) v8.x Release Notes Qualys Cloud Platform (VM, PC) v8.x Release Notes Version 8.18.1 April 1, 2019 This new release of the Qualys Cloud Platform (VM, PC) includes improvements to Vulnerability Management and Policy Compliance.

More information

SECARDEO. certbox. Help-Manual. Secardeo GmbH Release:

SECARDEO. certbox. Help-Manual. Secardeo GmbH Release: certbox Help-Manual Secardeo GmbH Release: 02.12.2014 certbox Help Manual 02.12.2014 Table of Contents 1 Search and retrieve Public Key Certificates... 1 1.1 Search by an e-mail address... 1 1.2 Download

More information

Sophos UTM Web Application Firewall For: Microsoft Exchange Services

Sophos UTM Web Application Firewall For: Microsoft Exchange Services How to configure: Sophos UTM Web Application Firewall For: Microsoft Exchange Services This guide explains how to configure your Sophos UTM 9.3+ to allow access to the relevant Microsoft Exchange services

More information

Nimsoft Service Desk. Single Sign-On Configuration Guide. [assign the version number for your book]

Nimsoft Service Desk. Single Sign-On Configuration Guide. [assign the version number for your book] Nimsoft Service Desk Single Sign-On Configuration Guide [assign the version number for your book] Legal Notices Copyright 2012, CA. All rights reserved. Warranty The material contained in this document

More information

Cisco Encryption

Cisco  Encryption This chapter contains the following sections: Overview of, page 1 How to Encrypt Messages with a Local Key Server, page 2 Encrypting Messages using the Email Security Appliance, page 3 Determining Which

More information

Security Provider Integration SAML Single Sign-On

Security Provider Integration SAML Single Sign-On Security Provider Integration SAML Single Sign-On 2018 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the

More information

Table of Contents. Developer Manual...1

Table of Contents. Developer Manual...1 Table of Contents Developer Manual...1 API...2 API Overview...2 API Basics: URL, Methods, Return Formats, Authentication...3 API Errors...4 API Response Examples...6 Get Articles in a Category...6 Get

More information

API Gateway. Version 7.5.1

API Gateway. Version 7.5.1 O A U T H U S E R G U I D E API Gateway Version 7.5.1 15 September 2017 Copyright 2017 Axway All rights reserved. This documentation describes the following Axway software: Axway API Gateway 7.5.1 No part

More information

EXAM Web Development Fundamentals. Buy Full Product.

EXAM Web Development Fundamentals. Buy Full Product. Microsoft EXAM - 98-363 Web Development Fundamentals Buy Full Product http://www.examskey.com/98-363.html Examskey Microsoft 98-363 exam demo product is here for you to test the quality of the product.

More information

Registration and Renewal procedure for Belfius Certificate

Registration and Renewal procedure for Belfius Certificate Registration and Renewal procedure for Belfius Certificate Table of contents TABLE OF CONTENTS... 2 1. INTRODUCTION... 3 2. CONTACT... 3 3. CONFIGURATION... 3 4. REGISTRATION PROCEDURE... 4 4.1 PRE-REQUISITES...

More information

.Net SAML2 Service Provider Framework

.Net SAML2 Service Provider Framework .Net SAML2 Service Provider Framework 1 1 Introduction... 4 2 Release history... 4 3 Prerequisites... 6 3.1 General prerequisites... 6 3.2 Prerequisites for the binary distribution... 6 3.3 Prerequisites

More information

SmartLink configuration DME Server 3.5

SmartLink configuration DME Server 3.5 SmartLink configuration DME Server 3.5 Document version: 1.3 Date: 2010-03-22 Circulation/Restrictions: Internal/Excitor partners Applies to: DME Server 3.5 Table of contents SmartLink configuration...3

More information

Microsoft ADFS Configuration

Microsoft ADFS Configuration Microsoft ADFS Configuration Side 1 af 12 1 Information 1.1 ADFS KMD Secure ISMS supports ADFS for integration with Microsoft Active Directory by implementing WS-Federation and SAML 2. The integration

More information

Overview! Automated Certificate Management (ACME) Protocol! IP-NNI Task Force! Mary Barnes - iconectiv!

Overview! Automated Certificate Management (ACME) Protocol! IP-NNI Task Force! Mary Barnes - iconectiv! Overview! Automated Certificate Management (ACME) Protocol! IP-NNI Task Force! Mary Barnes - iconectiv! ACME Overview! ACME is a protocol being developed in IETF for Automated Certificate Management.!

More information

TIBCO Spotfire Automation Services

TIBCO Spotfire Automation Services TIBCO Spotfire Automation Services Software Release 7.9 May 2017 Two-Second Advantage 2 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED OR BUNDLED

More information

How to Use ADFS to Implement Single Sign-On for an ASP.NET MVC Application

How to Use ADFS to Implement Single Sign-On for an ASP.NET MVC Application How to Use ADFS to Implement Single Sign-On for an ASP.NET MVC Application With Azure s Access Control service retiring next month, I needed to find another way to use an on-premise Active Directory account

More information

Ciphermail Gateway PDF Encryption Setup Guide

Ciphermail Gateway PDF Encryption Setup Guide CIPHERMAIL EMAIL ENCRYPTION Ciphermail Gateway PDF Encryption Setup Guide April 4, 2016, Rev: 5454 Copyright c 2008-2016, ciphermail.com. CONTENTS CONTENTS Contents 1 Introduction 4 2 Portal 4 3 PDF encryption

More information