Identity Federation Requirements
|
|
- Drusilla Spencer
- 5 years ago
- Views:
Transcription
1 Identity Federation Requirements By: Technical Editing Author: Stephen Skordinski Version: Published: September 26, 2012
2 Document Change History for Technical Documents Template Version Number Version Date Information Affected Author (s) Authorized by /13/2012 First Draft Stephen Skordinski IdF v2 Working Group Document Contributors Contributor Name Richard Skedd Christopher Olsen Mark King Pierre Pavlenyi Tony Bass Dave Smith Luis Dannenfels Stephen Skordinski Contributing Company BAE Systems The Boeing Company EADS EADS Lockheed Martin Lockheed Martin Raytheon TSCP IdF v.2 Requirements i
3 Copyright 2012 Transglobal Secure Collaboration Participation Inc. All rights reserved. Terms and Conditions Transglobal Secure Collaboration Participation, Inc. (TSCP) is a consortium comprising a number of commercial and government members (as further specified at (each a TSCP Member ). This specification was developed and is being released under this open source license by TSCP. Use of this specification is subject to the disclaimers and limitations described below. By using this specification, you (the user) agree to and accept the following terms and conditions: 1. This specification may not be modified in any way. In particular, no rights are granted to alter, transform, create derivative works from or otherwise modify this specification. Redistribution and use of this specification, without modification, is permitted provided that the following conditions are met: Redistributions of this specification must retain the above copyright notice, this list of conditions, and all terms and conditions contained herein. Redistributions in conjunction with any product or service must reproduce the above copyright notice, this list of conditions, and all terms and conditions contained herein in the documentation and/or other materials provided with the distribution of the product or service. TSCP s name may not be used to endorse or promote products or services derived from this specification without specific prior written permission. 2. The use of technology described in or implemented in accordance with this specification may be subject to regulatory controls under the laws and regulations of various jurisdictions. The user bears sole responsibility for the compliance of its products and/or services with any such laws and regulations and for obtaining any and all required authorizations, permits, or licenses for its products and/or services as a result of such laws or regulations. 3. THIS SPECIFICATION IS PROVIDED AS IS AND WITHOUT WARRANTY OF ANY KIND. TSCP AND EACH TSCP MEMBER DISCLAIMS ALL EXPRESS, IMPLIED AND STATUTORY WARRANTIES, INCLUDING, WITHOUT LIMITATION, ANY IMPLIED WARRANTIES OF TITLE, NONINFRINGEMENT, MERCHANTABILITY, QUIET ENJOYMENT, ACCURACY, AND FITNESS FOR A PARTICULAR PURPOSE. NEITHER TSCP NOR ANY TSCP MEMBER WARRANTS (A) THAT THIS SPECIFICATION IS COMPLETE OR WITHOUT ERRORS, (B) THE SUITABILITY FOR USE IN ANY JURISDICTION OF ANY PRODUCT OR SERVICE WHOSE DESIGN IS BASED IN WHOLE OR IN PART ON THIS SPECIFICATION, OR (C) THE SUITABILITY OF ANY PRODUCT OR A SERVICE FOR CERTIFICATION UNDER ANY CERTIFICATION PROGRAM OF TSCP OR ANY THIRD PARTY. 4. IN NO EVENT SHALL TSCP OR ANY TSCP MEMBER BE LIABLE TO YOU OR ANY THIRD PARTY FOR ANY CLAIM ARISING FROM OR RELATING TO THE USE OF THIS SPECIFICATION, INCLUDING, WITHOUT LIMITATION, A CLAIM THAT SUCH USE INFRINGES A THIRD PARTY S INTELLECTUAL PROPERTY RIGHTS OR THAT IT FAILS TO COMPLY WITH APPLICABLE LAWS OR REGULATIONS. BY USE OF THIS SPECIFICATION, THE USER WAIVES ANY SUCH CLAIM AGAINST TSCP OR ANY TSCP MEMBER RELATING TO THE USE OF THIS SPECIFICATION. IN NO EVENT SHALL TSCP OR ANY TSCP MEMBER BE LIABLE FOR ANY DIRECT OR INDIRECT DAMAGES OF ANY KIND, INCLUDING CONSEQUENTIAL, INCIDENTAL, SPECIAL, PUNITIVE, OR OTHER DAMAGES WHATSOEVER ARISING OUT OF OR RELATED TO ANY USER OF THIS SPECIFICATION, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. 5. TSCP reserves the right to modify or amend this specification at any time, with or without notice to the user, and in its sole discretion. The user is solely responsible for determining whether this specification has been superseded by a later version or a different specification. 6. These terms and conditions will be interpreted and governed by the laws of the State of Delaware without regard to its conflict of laws and rules. Any party asserting any claims related to this specification irrevocably consents to the personal jurisdiction of the U.S. District Court for the District of Delaware and to any state court located in such district of the State of Delaware and waives any objections to the venue of such court. IdF v.2 Requirements ii
4 Contents 1 Introduction Purpose Target Audience Document Notation Overview Identity Federation Process Flow Identity Federation Entities Requirements Establishing the Trust Authenticating the User Home Realm Discovery Level 4 Holder of Key Assertions Authorizing the User Information Provisioning between Identity Providers and Relying Parties Step Up Authentication TSCP Assertion Profile Extension Session Termination Audit and Verification... 6 Figures Figure 1. Identity Federation Business Activities... 2 Figure 2. Federation Entities Interaction and Roles... 3 Tables Table 1. Federation Business Activity Definitions... 2 IdF v.2 Requirements iii
5 1 Introduction 1.1 Purpose The purpose of this document is to identify the requirements for the TSCP IdF v.2 project. The document only captures the requirements for the project and is not intended to describe how the solution design will meet these requirements. IdF v.2 is intended as a solution which builds on the existing TSCP IdF v.1 infrastructure and documentation. As such, this document does not duplicate the contents of the IdF v.1 project, and captures only requirements which are not addressed in IdF v.1. In addition, the IdF v.2 requirements are aligned with the TCSP Architecture Board s Roadmap for Identity Federation and the IdF v.2 stakeholder group. 1.2 Target Audience The intended audience for the document is the TSCP SE v.2 Project Team, TSCP Gold and Silver members with solutions related to the requirements, and the TSCP Architecture Board. 1.3 Document Notation The key words "MUST," "MUST NOT," "REQUIRED," "SHALL," "SHALL NOT," "SHOULD," "SHOULD NOT," "RECOMMENDED," "MAY," and "OPTIONAL" in this document are to be interpreted as described in [RFC2119]. IdF v.2 Requirements Page 1 of 6
6 2 Overview 2.1 Identity Federation Process Flow Defining a Common Taxonomy: Identity Federation is a vast subject matter. In order to define requirements and areas where TSCP can develop specifications and services to improve secure collaboration and reduce costs, we must first agree to a taxonomy and classification of the business activities that make up Identity Federation. Figure 1 below shows the flow of activities that occur. Establishing Trust Authenticating the User Authorizing the User Session Termination Audit and Verification Figure 1. Identity federation business activities. Table 1 below provides additional details around the definitions for each of the business activities. Table 1. Federation business activity definitions. Business Activity Establishing Trust Authenticating the Sender Authorizing the Sender Session Termination Audit and Verification Definition Establishing trust combines both technical and policy aspects of trust between parties. This activity covers how an organization connects to federation partners, from everything from contracts, SLAs, permitted credential types, and legal agreements, through system configuration of Identity Provider (IdP) and Relying Party (RP) endpoints. Authenticating the sender encompasses the process by which the user attempts to access an application, initiated at either the IdP or RP. For the purposes of this document, this activity includes credential issuance, credential management, home realm discovery, and the IdP authentication process. Authorizing the sender addresses the process used by the RP to grant access to a resource. The Identity federation activities covered under this activity include attribute exchange mechanisms between the IdP, attribute providers, and the RP; provisioning of account and organization; and step up and step down authentication by the RP. Upon completing a transaction, a user may wish to securely disconnect from the RP application they accessed, and/or the IdP session they opened to authenticate to the RP. Users may want all sessions closed with all providers (global logout), or they may choose to end sessions with a specific subset of RP applications with which they were doing business. Verification that federation participants are operating securely and according to agreements. Examples of these activities include IdP monitoring and reporting, third party assessments, and incident forensics. IdF v.2 Requirements Page 2 of 6
7 2.2 Identity Federation Entities The purpose of this section is to provide a high level overview of the key entities that play a role in identity federation, and specifically to identify terms that will be referenced throughout the remainder of this document. Figure 2 below describes federation entities interaction and roles. Figure 2. Federation entities interaction and functional roles. An identity federation infrastructure involves the following entities: Attribute Provider An entity which stores authoritative data related to the Security Principal. The attribute provider may provide attributes to the IdP that are included in the assertion issued by the IdP. Auditor An entity which audits the implementation of the COR by the IdP and Credential Provider(s). Audits 1) compare the mapping of the COR to the IdP s practice statement and 2) examine the IdPs systems and operations for compliance with the practice statement. Credential Provider An entity that issues digital identities to Security Principals, and which performs any identity proofing or vetting that may be required to ensure a valid binding of a Credential to the Security Principal. Relying Party (RP) An entity that accepts an assertion as a method of authentication of a Security Principal. Examples of relying parties include systems that will use the attributes associated with the identity to make access control decisions. IdF v.2 Requirements Page 3 of 6
8 Security Principal This role is an entity, usually a person, who requests access to resources maintained by the Relying Party. The Security Principal can be positively identified and verified via an authentication process by the IdP using the Credential provided by the Credential Provider. Identity Provider (IdP) An entity which validates that the Security Principal has possession and control of a Credential that is issued by the Credential Provider. The IdP may or may not be the same entity as the Credential Provider. The IdP consumes one or more Credentials presented by the Security Principal, supplements that Credential with attributes obtained from one or more Attribute Authorities, and creates a new assertion incorporating the obtained attributes, for transmission to Relying Parties. Trust Framework Provider (TFP) - A TFP is an entity that defines or adopts an on-line identity trust model and then, certifies identity providers that are in compliance with that mode. The TFP is responsible for establishing and maintaining the COR. IdF v.2 Requirements Page 4 of 6
9 3 Requirements This section identifies the requirements to be addressed in IdF v.2 capability. 3.1 Establishing the Trust No Requirements 3.2 Authenticating the User Home Realm Discovery The IdF v.2 capability MUST support IdP initiated application sign on. The IdF v.2 capability SHOULD support RP initiated application sign on. The IdF v.2 capability MUST support internal domain hub initiated application sign on. IdF v.2 capability MUST reduce the burden on the user to select their Identity Provider, when authenticating to a federated application. (This is commonly referred to as IdP pick list bloat; as the number if IdPs for an applications grows, so does the complexity for the end user.) The IdF v.2 capability MUST use existing COTS tools to improve Home Realm Discovery issues. The IdF v.2 capability MUST use existing standards to improve Home Realm Discovery issues. The IdF v.2 capability SHOULD address the EU policy requirements for cookie usage Level 4 Holder of Key Assertions The IdF v.2 capability MUST meet the requirements identified in the TSCP Common Operating Rules for the technical implementation of level 4 assertions. The IdF v.2 capability SHOULD leverage COTS solutions and existing standards for the implementations of level 4 claims. The IdF v.2 capability MUST support level 4 claims for SAML 2.0. The IdF v.2 capability MUST support level 4 claims for WS-Federation. The IdF v.2 capability SHOULD reference the implementation approach documented in the TSCP Architecture Committee Level 4 Bearer Claims. 3.3 Authorizing the User Information Provisioning between Identity Providers and Relying Parties IdF v.2 capability MUST address the provisioning of user data. IdF v.2 capability MUST address the provisioning of organizational data. IdF v.2 capability SHOULD address the provisioning of the TSCP BAF Protection Profile. The IdF v.2 capability MUST identify a repeatable means to provision shadow accounts from IdPs to RPs. The IdF v.2 capability MUST consider pre-provisioning use cases. The IdF v.2 capability SHOULD consider the Just in Time provisioning use cases. The IdF v.2 capability SHOULD leverage COTS solutions for the implementations of provisioning solutions. The IdF v.2 capability SHOULD leverage existing standards for the implementations of provisioning solutions. IdF v.2 Requirements Page 5 of 6
10 3.3.2 Step Up Authentication IdF v.2 MUST enable a means for RPs to request a stronger credential assertion from the IdP when the user transitions from a lower LoA application to a higher LoA application. IdF v.2 MUST enable a means for RPs to request a stronger credential assertion from the IdP when the user transitions from a lower LoA action to a higher LoA action within the same application. The IdP MUST be able to support secondary requests from the RP for stronger assertions. The RP MUST be able to hint back to the IdP the authentication (LoA, credential type, etc.) required by the RP (this is to avoid a looping scenario, e.g., a user authenticates with LoA 2, takes action that requires LoA 3, and is redirected back to RP who enters a LoA 2 credential.) The IdF v.2 capability MUST support step up authentication using SAML 2.0. The IdF v.2 capability MUST support step up authentication using WS-Federation TSCP Assertion Profile Extension The IdF v.2 assertion profile MUST build on the assertion profile developed by the DSIF v.1 program. The IdF v.2 assertion profile MUST address the extended attribute requirements identified by the TSCP ILH team. The IdF v.2 assertion profile SHOULD be extended to address non-human entities, such as devices. The IdF v.2 assertion profile MUST be extended to address the Holder of Key requirements. The IdF v.2 assertion profile MUST continue to support WS-Federation. The IdF v.2 assertion profile MUST continue to support SAML 2.0. Where necessary, the corresponding sections of the TSCP Common Operating Rules MUST be updated to reflect the changes necessary for definitions of attributes defined in the assertion profile. 3.4 Session Termination No Requirements 3.5 Audit and Verification No Requirements IdF v.2 Requirements Page 6 of 6
Winnebago Industries, Inc. Privacy Policy
Winnebago Industries, Inc. Privacy Policy At Winnebago Industries, we are very sensitive to the privacy concerns of visitors to our websites. Though we do not obtain any personal information that individually
More informationIETF TRUST. Legal Provisions Relating to IETF Documents. February 12, Effective Date: February 15, 2009
IETF TRUST Legal Provisions Relating to IETF Documents February 12, 2009 Effective Date: February 15, 2009 1. Background The IETF Trust was formed on December 15, 2005, for, among other things, the purpose
More informationIETF TRUST. Legal Provisions Relating to IETF Documents. Approved November 6, Effective Date: November 10, 2008
IETF TRUST Legal Provisions Relating to IETF Documents Approved November 6, 2008 Effective Date: November 10, 2008 1. Background The IETF Trust was formed on December 15, 2005, for, among other things,
More informationLOGO LICENSE AGREEMENT(S) CERTIPORT AND IC³
LOGO LICENSE AGREEMENT(S) CERTIPORT AND IC³ EXHIBIT B-2 LICENSEE: Address: Attention: Phone: Fax: Email: Account #: CERTIPORT LOGO LICENSE AGREEMENT Authorized Testing Centers This Logo License Agreement
More informationFunding University Inc. Terms of Service
Funding University Inc. Terms of Service None of the information contained in Funding University's website constitutes a recommendation, solicitation or offer by Funding University or its affiliates to
More informationCALSTRS ONLINE AGREEMENT TERMS AND CONDITIONS
CALSTRS ONLINE AGREEMENT TERMS AND CONDITIONS INTRODUCTION: Before the California State Teachers Retirement System (hereinafter "CalSTRS," "We," or "Us") will provide services found at mycalstrs.com (the
More informationINCLUDING MEDICAL ADVICE DISCLAIMER
Jordan s Guardian Angels Terms and Conditions of Use INCLUDING MEDICAL ADVICE DISCLAIMER Your use of this website and its content constitutes your agreement to be bound by these terms and conditions of
More informationTerms of Use. Changes. General Use.
Terms of Use THESE TERMS AND CONDITIONS (THE TERMS ) ARE A LEGAL CONTRACT BETWEEN YOU AND SPIN TRANSFER TECHNOLOGIES ( SPIN TRANSFER TECHNOLOGIES, STT, WE OR US ). THE TERMS EXPLAIN HOW YOU ARE PERMITTED
More informationMile Terms of Use. Effective Date: February, Version 1.1 Feb 2018 [ Mile ] Mileico.com
Mile Terms of Use Effective Date: February, 2018 Version 1.1 Feb 2018 [ Mile ] Overview The following are the terms of an agreement between you and MILE. By accessing, or using this Web site, you acknowledge
More informationMyCreditChain Terms of Use
MyCreditChain Terms of Use Date: February 1, 2018 Overview The following are the terms of an agreement between you and MYCREDITCHAIN. By accessing, or using this Web site, you acknowledge that you have
More informationECLIPSE FOUNDATION, INC. INDIVIDUAL COMMITTER AGREEMENT
ECLIPSE FOUNDATION, INC. INDIVIDUAL COMMITTER AGREEMENT THIS INDIVIDUAL COMMITTER AGREEMENT (THE AGREEMENT ) is entered into as of the day of, 20 (the Effective Date ) by and between Eclipse Foundation,
More informationSDLC INTELLECTUAL PROPERTY POLICY
SDLC INTELLECTUAL PROPERTY POLICY Last Revised: 11/14/17 1. Introduction. This Intellectual Property Policy ( Policy ) governs intellectual property rights of the SDL Consortium ( SDLC ) and its Members
More informationSchedule Identity Services
This document (this Schedule") is the Schedule for Services related to the identity management ( Identity Services ) made pursuant to the ehealth Ontario Services Agreement (the Agreement ) between ehealth
More informationTerms Of Use AGREEMENT BETWEEN USER AND DRAKE MODIFICATION OF THESE TERMS OF USE LINKS TO THIRD PARTY WEB SITES USE OF COOKIES
Terms Of Use AGREEMENT BETWEEN USER AND DRAKE This website and other related websites and mobile applications (collectively referred to as "Sites") comprise various web pages and services operated by Drake
More informationSite Impact Policies for Website Use
Site Impact Policies for Website Use Thank you for visiting the Site Impact website (the Website ). We have set up some ground rules to ensure protection of our rights and yours. Site Impact reserves the
More informationOracle Binary Code License Agreement for Java Secure Sockets Extension for Connected Device Configuration 1.0.2
Oracle Binary Code License Agreement for Java Secure Sockets Extension 1.0.3 for Connected Device Configuration 1.0.2 ORACLE AMERICA, INC. ("ORACLE"), FOR AND ON BEHALF OF ITSELF AND ITS SUBSIDIARIES AND
More informationCopyrights and Privacy Statement
Copyrights and Privacy Statement Jesse James Hardscaping Authorization of Use Jesse James Hardscaping hereby authorizes any person to access this Website for informational purposes only. Jesse James Hardscaping
More informationTERMS & CONDITIONS. Complied with GDPR rules and regulation CONDITIONS OF USE PROPRIETARY RIGHTS AND ACCEPTABLE USE OF CONTENT
TERMS & CONDITIONS www.karnevalkings.com (the "Site") is a website and online service owned and operated by the ViisTek Media group of companies (collectively known as "Karnevalkings.com", "we," "group",
More informationNOOTRY TERMS OF SERVICE
NOOTRY TERMS OF SERVICE Nootry LLC ( Nootry ), a Delaware limited liabilities company, provides access to and use of the services, including our website, APIs, email notifications, and application (the
More informationEcma International Policy on Submission, Inclusion and Licensing of Software
Ecma International Policy on Submission, Inclusion and Licensing of Software Experimental TC39 Policy This Ecma International Policy on Submission, Inclusion and Licensing of Software ( Policy ) is being
More informationEcma International Policy on Submission, Inclusion and Licensing of Software
Ecma International Policy on Submission, Inclusion and Licensing of Software Experimental TC39 Policy This Ecma International Policy on Submission, Inclusion and Licensing of Software ( Policy ) is being
More informationEnd User License Agreement
End User License Agreement Kyocera International, Inc. ( Kyocera ) End User License Agreement. CAREFULLY READ THE FOLLOWING TERMS AND CONDITIONS ( AGREEMENT ) BEFORE USING OR OTHERWISE ACCESSING THE SOFTWARE
More informationTransglobal Secure Collaboration Program Secure v.1 Technical Specification. Prepared by: TSCP Secure v.
Transglobal Secure Collaboration Program Secure E-mail v.1 Technical Specification Prepared by: TSCP Secure E-mail v.1 Project Team Version: 3.0.2 Date: 07/16/2012 TSCP Secure E-Mail v.1 Technical Specification
More informationWiMAX End-to-End Network Systems Architecture
WiMAX End-to-End Network Systems Architecture (Stage : Architecture Tenets, Reference Model and Reference Points) [GPP WiMAX Interworking] Authorized Distribution: Public Access subject to stated terms.
More informationOracle Technology Network Developer License Terms for Java Card Classic Edition and Java Card Connected Edition Specifications
Oracle Technology Network Developer License Terms for Java Card Classic Edition and Java Card Connected Edition Specifications Export Controls Export laws and regulations of the United States and any other
More informationOCTOSHAPE SDK AND CLIENT LICENSE AGREEMENT (SCLA)
OCTOSHAPE SDK AND CLIENT LICENSE AGREEMENT (SCLA) This is a License Agreement (the "Agreement") for certain code (the Software ) owned by Akamai Technologies, Inc. ( Akamai ) that is useful in connection
More informationOracle Binary Code License Agreement for the Java SE Platform Products and JavaFX
Oracle Binary Code License Agreement for the Java SE Platform Products and JavaFX ORACLE AMERICA, INC. ("ORACLE"), FOR AND ON BEHALF OF ITSELF AND ITS SUBSIDIARIES AND AFFILIATES UNDER COMMON CONTROL,
More informationMERIDIANSOUNDINGBOARD.COM TERMS AND CONDITIONS
MERIDIANSOUNDINGBOARD.COM TERMS AND CONDITIONS Introduction This document sets forth the terms and conditions ("Terms and Conditions") governing your use of the MeridianHealth.com Web site ("Web Site")
More informationInstalling the Shrew Soft VPN Client
Windows Install Installing the Shrew Soft VPN Client ShrewVPNWindows201211-01 Global Technology Associates 3505 Lake Lynda Drive Suite 109 Orlando, FL 32817 Tel: +1.407.380.0220 Fax. +1.407.380.6080 Email:
More informationWiMAX Forum Requirements for WiMAX BS/WFAP Local Routing of the Bearer Traffic
0 0 Requirements for WiMAX BS/WFAP Local Routing of the Bearer Traffic WMF Approved 0-0- WMF-T-0-v0 0 Proprietary Copyright 0. All Rights Reserved. WiMAX FORUM PROPRIETARY WMF-T-0-v0 0 0 0 0 0 Copyright
More informationThe Travel Tree Terms and Conditions
The Travel Tree Terms and Conditions Please read the following Terms & Conditions carefully before using this site. Use of this site indicates acceptance of these Terms and Conditions. The following terms
More informationBar Code Discovery. Administrator's Guide
Bar Code Discovery Administrator's Guide November 2012 www.lexmark.com Contents 2 Contents Overview...3 Configuring the application...4 Configuring the application...4 Configuring Bar Code Discovery...4
More informationEnhanced Serial Peripheral Interface (espi) ECN
Enhanced Serial Peripheral Interface (espi) ECN Engineering Change Notice TITLE Clarify OOB packet payload DATE 10 January 2014 AFFECTED DOCUMENT espi Base Specification Rev 0.75 DISCLOSURE RESTRICTIONS
More informationDell One Identity Cloud Access Manager 8.0. Overview
Dell One Identity Cloud Access Manager 8.0 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under
More informationTCG. TCG Certification Program. TNC Certification Program Suite. Document Version 1.1 Revision 1 26 September 2011
TCG Certification Program TNC Certification Program Suite Document Version 1.1 Revision 1 26 September 2011 Contact: admin@trustedcomputinggroup.org TCG TCG PUBLISHED Copyright TCG 2009-2011 Copyright
More informationNimsoft Service Desk. Single Sign-On Configuration Guide. [assign the version number for your book]
Nimsoft Service Desk Single Sign-On Configuration Guide [assign the version number for your book] Legal Notices Copyright 2012, CA. All rights reserved. Warranty The material contained in this document
More informationBeta Testing Licence Agreement
Beta Testing Licence Agreement This Beta Testing Licence Agreement is a legal agreement (hereinafter Agreement ) between BullGuard UK Limited ( BullGuard ) and you, either an individual or a single entity,
More informationOracle Technology Network Developer License Terms for Java Card Classic Edition and Java Card Connected Edition Software Development Kits
Oracle Technology Network Developer License Terms for Java Card Classic Edition and Java Card Connected Edition Software Development Kits Export Controls Export laws and regulations of the United States
More informationEntrust SSL Web Server Certificate Subscription Agreement
Entrust SSL Web Server Certificate Subscription Agreement ATTENTION - READ CAREFULLY: THIS SUBSCRIPTION AGREEMENT (THIS "AGREEMENT") IS A LEGAL CONTRACT BETWEEN THE PERSON, ENTITY, OR ORGANIZATION NAMED
More informationNetwork-MIDI Driver Installation Guide
Network-MIDI Driver Installation Guide ATTENTION SOFTWARE LICENSE AGREEMENT PLEASE READ THIS SOFTWARE LICENSE AGREEMENT ( AGREEMENT ) CAREFULLY BEFORE USING THIS SOFTWARE. YOU ARE ONLY PERMITTED TO USE
More informationWORKSHARE SECURITY OVERVIEW
WORKSHARE SECURITY OVERVIEW April 2016 COMPANY INFORMATION Workshare Security Overview Workshare Ltd. (UK) 20 Fashion Street London E1 6PX UK Workshare Website: www.workshare.com Workshare Inc. (USA) 625
More informationNTLM NTLM. Feature Description
Feature Description VERSION: 6.0 UPDATED: JULY 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP Technologies logo are registered
More informationCongratulations Silver Boeing Performance Excellence Award recipient!
Congratulations Silver Boeing Performance Excellence Award recipient! This BPEA congratulations package explains the actions required and guidelines to follow to ensure your company realizes the full benefits
More informationDME-N Network Driver Installation Guide for M7CL
DME-N Network Driver Installation Guide for M7CL ATTENTION SOFTWARE LICENSE AGREEMENT PLEASE READ THIS SOFTWARE LICENSE AGREEMENT ( AGREEMENT ) CAREFULLY BEFORE USING THIS SOFTWARE. YOU ARE ONLY PERMITTED
More informationTOOLBOX SUBSCRIPTION AGREEMENT FOR OPEN SOURCE PROJECTS
This is a new version of the agreement for open source projects that will be effective October 1, 2017. Please review and contact us at sales@jetbrains.com if you have any questions. TOOLBOX SUBSCRIPTION
More informationQUARTZ LEGAL TERMS AND CONDITIONS
QUARTZ LEGAL TERMS AND CONDITIONS 1. USE OF THIS WEBSITE: The Quartz vodka website is owned and operated by Ungava Spirits Co. Ltd. (collectively hereafter "Site Owner"). Your use of this website is subject
More informationPayment Card Industry (PCI) Data Security Standard Validation Requirements
Payment Card Industry (PCI) Data Security Standard Validation Requirements For Internal Security Assessors (ISA) Version 1.0 April 2010 Table of Contents 1 Introduction... 2 1.1 Qualification Process Overview...
More information1. License Grant; Related Provisions.
IMPORTANT: READ THIS AGREEMENT CAREFULLY. THIS IS A LEGAL AGREEMENT BETWEEN AVG TECHNOLOGIES CY, Ltd. ( AVG TECHNOLOGIES ) AND YOU (ACTING AS AN INDIVIDUAL OR, IF APPLICABLE, ON BEHALF OF THE INDIVIDUAL
More informationScientific Working Group on Digital Evidence
SWGDE Requirements for Report Writing in Digital and Multimedia Forensics Disclaimer: As a condition to the use of this document and the information contained therein, the SWGDE requests notification by
More informationApple Inc. itunes 10 and QuickTime 7 Bundling Agreement (University CD Distribution) Licensee (Institution Name): Individual to Contact:
Apple Inc. itunes 10 and QuickTime 7 Bundling Agreement (University CD Distribution) Please complete, sign and mail this agreement to: APPLE INC. Software Licensing Department 12545 Riata Vista Circle
More informationTERMS OF SERVICE AGREEMENT
TERMS OF SERVICE AGREEMENT LAST REVISION: [Date-Month-Year] PLEASE READ THIS TERMS OF SERVICE AGREEMENT CAREFULLY. BY USING THIS WEBSITE OR ORDERING PRODUCTS FROM THIS WEBSITE YOU AGREE TO BE BOUND BY
More informationApproved 10/15/2015. IDEF Baseline Functional Requirements v1.0
Approved 10/15/2015 IDEF Baseline Functional Requirements v1.0 IDESG.org IDENTITY ECOSYSTEM STEERING GROUP IDEF Baseline Functional Requirements v1.0 NOTES: (A) The Requirements language is presented in
More informationTERMS OF SERVICE. Maui Lash Extensions All Rights Reserved.
TERMS OF SERVICE Electronic Communication: When you visit our website or send e-mails to us, you are communicating with us electronically. You consent to receive communications from us electronically.
More informationIntegration Guide. BlackBerry Workspaces. Version 1.0
Integration Guide BlackBerry Workspaces Version 1.0 Published: 2017-12-27 SWD-20171227025930338 Contents Overview... 4 Okta... 5 Add BlackBerry Workspaces to your Okta account...5 Configure BlackBerry
More informationCloud Access Manager Overview
Cloud Access Manager 8.1.3 Overview Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished
More informationTERMS OF USE Effective Date: January 1, 2015 To review material modifications and their effective dates scroll to the bottom of the page. 1.Parties.
TERMS OF USE Effective Date: January 1, 2015 To review material modifications and their effective dates scroll to the bottom of the page. 1.Parties. The parties to these Terms of Use are you, and the owner
More informationLET S ENCRYPT SUBSCRIBER AGREEMENT
Page 1 of 7 LET S ENCRYPT SUBSCRIBER AGREEMENT This Subscriber Agreement ( Agreement ) is a legally binding contract between you and, if applicable, the company, organization or other entity on behalf
More informationTOOLS for n Version2 Update Guide
TOOLS for n Version2 Update Guide SOFTWARE LICENSE AGREEMENT PLEASE READ THIS SOFTWARE LICENSE AGREEMENT ( AGREEMENT ) CAREFULLY BEFORE USING THIS SOFTWARE. YOU ARE ONLY PERMITTED TO USE THIS SOFTWARE
More informationHealthfirst Website Privacy Policy
Healthfirst Website Privacy Policy We value your relationship with us and have detailed our privacy objectives for our website below. Please be sure to read this notice as it covers the terms and conditions
More informationDomain Hosting Terms and Conditions
Domain Hosting Terms and Conditions Preamble This document may be augmented or replaced by relevant sections of other parts of our Agreement, and should be read in conjunction with other supporting documents,
More informationBCDC 2E, 2012 (On-line Bidding Document for Stipulated Price Bidding)
BCDC 2E, 2012 (On-line Bidding Document for Stipulated Price Bidding) CLAUSE 13 ON-LINE BIDDING 13.1 ON-LINE BIDDING.1 Definitions: Owner means the party and/or their agent designated to receive on-line
More informationAdobe Connect. Adobe Connect. Deployment Guide
Deployment Guide VERSION: 1.0 UPDATED: MARCH 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP Technologies logo are registered trademarks
More informationLoadMaster VMware Horizon (with View) 6. Deployment Guide
LoadMaster VMware Horizon (with View) 6 Deployment Guide VERSION: 6.0 UPDATED: MARCH 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the
More informationPacket Trace Guide. Packet Trace Guide. Technical Note
Packet Trace Guide Technical Note VERSION: 2.0 UPDATED: JANUARY 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP Technologies logo
More informationCA SiteMinder. Federation in Your Enterprise 12.51
CA SiteMinder Federation in Your Enterprise 12.51 This Documentation, which includes embedded help systems and electronically distributed materials (hereinafter referred to as the Documentation ), is for
More informationClass Composer General Terms of Use
Class Composer General Terms of Use Effective Date: July 24, 2017 Welcome to Class Composer! Please continue reading to learn about the terms by which you may use our Service. If you have any questions
More informationCERTIFIED MAIL LABELS TERMS OF USE and PRIVACY POLICY Agreement
CERTIFIED MAIL LABELS TERMS OF USE and PRIVACY POLICY Agreement Welcome to Certified Mail Envelopes and Certified Mail Labels web sites (the Site ) a website, trademark and business name owned and operated
More informationCleanHands. A joint collaboration between Infection Control, Changi General Hospital and Singapore University of Technology and Design
CleanHands an interactive mobile application for use on Android devices which could be used to record hand hygiene observations at the point of care on mobile computing devices or smartphones, and transmit
More informationFLUENDO GENERIC EULA
FLUENDO GENERIC EULA FLUENDO S.A. Avenida Diagonal 579, 8th floor 08014 Barcelona Spain 1 END USER LICENSE AGREEMENT (EULA) FLUENDO LICENSE AGREEMENT BY FLUENDO, S.A. ( FLUENDO ) IMPORTANT - READ CAREFULLY
More informationParticipation Agreement for the ehealth Exchange
Participation Agreement for the ehealth Exchange This Participation Agreement for the ehealth Exchange ("Agreement") is entered into as of the last date written below ( Effective Date ) by and between
More informationSplunk. Splunk. Deployment Guide
Deployment Guide VERSION: 1.0 UPDATED: JULY 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP Technologies logo are registered trademarks
More informationSIMS TERMS AND CONDITIONS OF USE AGREEMENT
SIMS TERMS AND CONDITIONS OF USE AGREEMENT 1. These Terms and Conditions ("the Terms and Conditions") govern your ("the User") use of the Website and Web application and the information thereon, known
More informationCommon Statistical Analysis Plan (SAP) Frequently Asked Questions
Last Updated 4-Nov-2018 Topics 1 Stakeholder Input to Common SAP Template Development... 2 2 Template Content... 2 3 Implementation of the Common SAP template by the Sponsor... 55 4 Updates to the Common
More informationEnd User Licence. PUBLIC 31 January 2017 Version: T +44 (0) E ukdataservice.ac.uk
End User Licence PUBLIC 31 January 2017 Version: 07.00 T +44 (0)1206 872572 E susan@essex.ac.uk ukdataservice.ac.uk Contents 1. End User Licence (EUL) Text... 2 2. End User Licence (EUL) Summary text...
More informationROYAL MAIL GROUP ADDRESS MANAGEMENT UNIT PAF DATA END USER TERMS ( End User Terms )
ROYAL MAIL GROUP ADDRESS MANAGEMENT UNIT PAF DATA END USER TERMS ( End User Terms ) Introduction These End User Terms permit the use of PAF Data in Solutions by End Users. These terms are not applicable
More informationMobile Banking and Mobile Deposit Terms & Conditions
Mobile Banking and Mobile Deposit Terms & Conditions PLEASE CAREFULLY REVIEW THESE TERMS AND CONDITIONS BEFORE PROCEEDING: This Mobile Banking and Mobile Deposit Addendum ( Addendum ) to the Old National
More informationEntrust WAP Server Certificate Relying Party Agreement
Entrust WAP Server Certificate Relying Party Agreement The WAP/WTLS specification v1.1 does not provide a means for certificate revocation checking. The following Relying Party Agreement" provides further
More informationPolicies & Medical Disclaimer
Policies & Medical Disclaimer Money Back Guarantee Heather Woodruff Nutrition proudly stands behind its programs. To help you feel comfortable we offer a Money-Back Guarantee* If you are not absolutely
More informationTerms of Use for companies accessing MyStay Product Database via MyStay API
MyStay Product Database and My Stay Application Programming Interface (API) MyStay Product Database is a part of Visit Finland s website www.visitfinland.com. The purpose of the database is to enable the
More informationISO/IEC INTERNATIONAL STANDARD. Information technology Security techniques Entity authentication assurance framework
INTERNATIONAL STANDARD ISO/IEC 29115 First edition 2013-04-01 Information technology Security techniques Entity authentication assurance framework Technologies de l'information Techniques de sécurité Cadre
More informationAdditional License Authorizations for HPE OneView for Microsoft Azure Log Analytics
Additional License Authorizations for HPE OneView for Microsoft Azure Log Analytics Product Use Authorizations This document provides Additional License Authorizations for HPE OneView for Microsoft Azure
More informationYou may use the Service to either access, establish or change the following:
Online Access Agreement June 18, 2015 (Revision date) I. Introduction This Online Access Agreement (this "Agreement") contains the terms that govern your use of the Participants' Private Area of the www.afmsagaftrafund.org
More informationPLAINSCAPITAL BANK SAMSUNG PAY TERMS AND CONDITIONS - PERSONAL
PLAINSCAPITAL BANK SAMSUNG PAY TERMS AND CONDITIONS - PERSONAL Last Modified: 3/12/2018 These terms and conditions ( Terms and Conditions ) are a legal agreement between you and PlainsCapital Bank that
More informationIntel Stress Bitstreams and Encoder (Intel SBE) 2017 AVS2 Release Notes (Version 2.3)
Intel Stress Bitstreams and Encoder (Intel SBE) 2017 AVS2 Release Notes (Version 2.3) Overview Changes History Installation Package Contents Known Limitations Attributions Legal Information Overview The
More informationTLK10081 EVM Quick Start Guide Texas Instruments Communications Interface Products
TLK10081 EVM Quick Start Guide Texas Instruments Communications Interface Products 1 Board Overview +5 V Adapter Input Connector for voltage monitor board Connector for SMA break-out or FPGA board. Allows
More informationTRUST IDENTITY. Trusted Relationships for Access Management: AND. The InCommon Model
TRUST. assured reliance on the character, ability, strength, or truth of someone or something - Merriam-Webster TRUST AND IDENTITY July 2017 Trusted Relationships for Access Management: The InCommon Model
More informationInformation Bulletin
Application of Primary and Secondary Reference Documents Version 1.1 Approved for release July 2014 Table of Contents 1.0 Purpose statement... 3 2.0 Audience... 3 3.0 BCA requirements and referenced documents...
More informationVSC-PCTS2003 TEST SUITE TIME-LIMITED LICENSE AGREEMENT
VSC-PCTS2003 TEST SUITE TIME-LIMITED LICENSE AGREEMENT Notes These notes are intended to help prospective licensees complete the attached Test Suite Time-Limited License Agreement. If you wish to execute
More informationPage 1 of Matthews Mint Hill Road, Suite C; Matthews, NC Phone Fax
1. PURPOSE The Loss Prevention Foundation, ( the foundation, LPF, the examiner ) makes high-stakes retail loss prevention certification Exams publicly available for the purpose of earning certification
More informationRequirements for WiMAX Peer-to-Peer (P2P) Services
Requirements for WiMAX Peer-to-Peer (PP) Services WMF Approved -0- WMF-T--v0 WiMAX Forum Proprietary Copyright WiMAX Forum. All Rights Reserved. WiMAX FORUM PROPRIETARY WMF-T--v0 0 0 0 Copyright Notice,
More informationDomain Names & Hosting
Domain Names & Hosting 1 The following terms and conditions apply to the domain registration Service: 1.1 You acknowledge and recognize that the domain name system and the practice of registering and administering
More informationSSC-WG4 Certification Process
SSC-WG4 Certification Process Document WINNF-15-P-0060-V1.0.0 19 October 2015 1 Terms and Conditions This document has been prepared by the SSC WG4 to assist The Software Defined Radio Forum Inc. (or its
More informationEpic. Epic Systems. Deployment Guide
Epic Systems Deployment Guide VERSION: 1.0 UPDATED: AUGUST 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP Technologies logo are
More informationJoint Initiative on a PSD2 Compliant XS2A Interface NextGenPSD2 XS2A Framework Operational Rules
Joint Initiative on a PSD2 Compliant XS2A Interface NextGenPSD2 XS2A Framework Operational Rules 02.10.2017 Notice This Specification has been prepared by the Participants of the Joint Initiative pan-european
More informationApril Understanding Federated Single Sign-On (SSO) Process
April 2013 Understanding Federated Single Sign-On (SSO) Process Understanding Federated Single Sign-On Process (SSO) Disclaimer The following is intended to outline our general product direction. It is
More informationERRATA FOR. TCG Platform Attribute Credential Profile. Errata Version Published. Specification Version 1.0 Revision January 2018
ERRATA Errata Version 1.0 2018-02-05 Published FOR TCG Platform Attribute Credential Profile Specification Version 1.0 Revision 16 16 January 2018 Contact: admin@trustedcomputinggroup.org Copyright TCG
More informationThe photograph below shows the PMP9730 Rev E prototype assembly. This circuit was built on a PMP9730 Rev D PCB.
1 Photos The photograph below shows the PMP9730 Rev E prototype assembly. This circuit was built on a PMP9730 Rev D PCB. 2 Standby Power No Load Pin AC (W) 120VAC/60Hz 0.187 230VAC/50Hz 0.238 Page 1 of
More informationOpen Source Used In Cisco Configuration Professional for Catalyst 1.0
Open Source Used In Cisco Configuration Professional for Catalyst 1.0 Cisco Systems, Inc. www.cisco.com Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on
More informationUS Government Users Restricted Rights - Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp.
Service Data Objects (SDO) DFED Sample Application README Copyright IBM Corporation, 2012, 2013 US Government Users Restricted Rights - Use, duplication or disclosure restricted by GSA ADP Schedule Contract
More informationWebfont License End User License Agreement (EULA)
Hurme Design Webfont End User License Agreement 2018 Page 1 5 Webfont License End User License Agreement (EULA) Hurme Design 2018 This License Agreement ( Agreement or License ) is a legal contract between
More information