EDITRAN/XAdES. Installation Manual. XAdES Signing and verification. z/os

Size: px
Start display at page:

Download "EDITRAN/XAdES. Installation Manual. XAdES Signing and verification. z/os"

Transcription

1 EDITRAN/XAdES XAdES Signing and verification z/os Installation Manual INDRA April 2018

2 EDITRAN/XAdES z/os. Installation Manual CONTENTS 1. INTRODUCTION INSTALLATION AND REQUIREMENTS Installation Requirements Install in USS INSTALLATION OF CERTIFICATES Truststore File Keystore File Configuration of the certificate revocation status query Authentication of the LDAP Server ANNEX A Result codes of the server INDRA. All rights reserved. EDITRAN

3 1 INTRODUCTION 1. INTRODUCTION The purpose of this document is to explain the functionality developed by EDITRAN that allows signing and verifying files signed in XAdES format, up to the EPES: EDITRAN/XAdES protection level. EDITRAN/XAdES is a Java server that admits requests made from EDITRAN/FF for the signing and verification of the files with the XAdES-EPES signature. For the signature, valid certificates will be all those installed in the USS system in any usergenerated keystore. The verification process includes the extraction of the signed data that will then be processed by the client's applications. This document describes the actions needed to: Install EDITRAN/ XAdES (in the USS part of the z/os). Information on the management of certificates (keystores) Operating mode. INDRA. All rights reserved. EDITRAN Page 1-1

4 2 INSTALLATION AND REQUIREMENTS 2. INSTALLATION AND REQUIREMENTS The signing and verification provided by EDITRAN are developed as a Java server that will be installed in the z/os Unix services Installation Requirements. At least, IBM 31-bit SDK for z/os, Java Technology Edition, V6 must be installed and have access to JZOS for access to MVS files. The files for this are in $JAVA_HOME/lib/ext. In order to overcome the limitations on the size of the cryptographic keys used in signatures, the restricted policy files US_export_policy.jar and local_policy.jar from the $JAVA_HOME/lib/security directory, with which IBM delivers the SDK, must be replaced for others of unrestricted version that are in $JAVA_HOME/demo/jce/policy-files/unrestricted. A TCP java server, which must have an address and a port to listen to the requests made from the EDITRAN in MVS. Access to ZOS UNIX services. EDItran V5R1F02 minimum version Install in USS. 1. It is recommended to create a directory in the Unix partition of z/os (USS) to install the signature verification software, for example: /u/edixd. 2. To send the XAdES-zos.Vn.n-YYYY-MM-DD.tar package to the USS in binary mode. Any file transfer utility can be used, such as ftp. 3. To connect to the USS and unzip the file into the created directory (u/edixd>tar -xof XAdES-zos.Vn.n-YYYY-MM-DD.tar). A structure will be displayed as in the example below: /u/edixd: >ls -l total rw-r KI10139 KISNCE Apr 28 15:44 XAdES-zos.V tar drwxr-xr-x 2 KI1056E KISNCE 8192 Feb 11 10:13 bin drwxr-xr-x 2 KI1056E KISNCE 8192 Apr 29 11:16 conf drwxr-xr-x 2 KI1056E KISNCE 8192 Apr 28 15:37 crl drwxr-xr-x 3 KI1056E KISNCE 8192 Apr 29 11:16 lib drwxr-xr-x 2 KI1056E KISNCE 8192 Apr 28 15:37 logs drwxr-xr-x 2 KI1056E KISNCE 8192 Apr 29 11:16 plantillas drwxr-xr-x 2 KI1056E KISNCE 8192 Apr 29 11:16 politicas drwxr-xr-x 4 KI1056E KISNCE 8192 Feb 13 09:49 rsc The product configuration scripts are in the bin directory and we must ensure that they have write and run permission. These scripts must be modified with the JAVA_HOME directory of the installation. It is also recommended the log folder to have write permission, at least for the user group. 4. Executing /u/edixd/bin/configuracionxades.sh the product configuration will be adapted to the installation itself. The command returns us: INDRA. All rights reserved. EDITRAN Page 2-1

5 2 INSTALLATION AND REQUIREMENTS Los valores con contrasena (passproxy y passtruststore) se guardan codificados y los demas en claro. Si se quisiera se pueden editar los valores en claro con un editor de texto plano, pero no los valores codificados. Valor del archivo conf/xades.properties #Parametros de EDITRAN/XAdES (Obligatorio) ipeditranxades= puertoeditranxades=7760 #TrustStore de las CAs (Obligatorio) pathtruststore=rsc/truststore/truststore.pfx passtruststore=******** #KeyStore por defecto (Opcional) pathkeystore=rsc/keystore/keystore.pfx #Conexion con EDITRAN/OCSP remoto (Opcional, se rellena si se usa EDITRAN/OCSP remoto) ipeditranocsp= puertoeditranocsp= #Conexion con proxy para la conexion a Internet. Es necesario en el caso de querer usar OCSP o CRL para verificar la revocacion #de certificados o para el caso de querer firmar con TimeStamp para lo que se necesita la conexion con un servidor ipproxy= puertoproxy= userproxy= passproxy= #Sistema Operativo donde se instala EDITRAN/XAdES. En el caso de Sistemas Operativos Windows, Unix o AS400, su valor debe ser N(No). #En el caso de Sistemas Operativos z/os, su valor debe ser S(Si) zos=s Modificar las propiedades del fichero conf/xades.properties? (S/N)S By entering S, the parameter values will be requested; only those that need to be modified will have to be entered. It is recommended to use port 7760 for the EDITRAN/XAdES server and to change the TrustStore password (see section 3). If the certificates used in the applications require OCSP validation and this is performed remotely, the EDITRAN/OCSP server is required, and the address and port on which it is installed must be configured. In order to verify the OCSP/CRL of the certificates and also for the signature with TimeStamp to connect to the server that seals the signature time, normally a proxy will be needed to exit the Host. In that case the proxy port and address, as well as a user and password, must be implemented to access the Internet through it. Below is the example dialog where the default truststore and keystore files have been left and no OCSP/CRL validation has been configured: INDRA. All rights reserved. EDITRAN Page 2-2

6 IP EDITRAN/XAdES: nnn.nnn.nnn.nnn Puerto EDITRAN/XAdES: 7760 Path TrustStore: Password TrustStore: Path KeyStore: IP EDITRAN/OCSP: Puerto EDITRAN/OCSP: IP Proxy: Puerto Proxy: Usuario Proxy: Password Proxy: Sistema Operativo z/os (S/N):S 2 INSTALLATION AND REQUIREMENTS This configuration will be saved in the xades.properties file of the conf directory (in the example: /u/edixd/conf/xades.properties). We describe below all these properties: Mandatory properties: o EDITRAN/XAdES IP: IP where the EDITRAN/XAdES Java Server is started. o EDITRAN/XAdES Port: Port where the EDITRAN/XAdES Java Server is started. o Path of the truststore: It is the path of the certificate store where the TGSS (CA) certificate and all the CAs we must trust are stored. In addition to this store, CAs that are in the installed Windows store are trusted. o Password: Password of the truststore. Optional properties: o Remote EDITRAN/OCSP: Only necessary if we want to use EDITRAN/OCSP remotely. By default it is used locally if we want to verify the certificates: EDITRAN/OCSP IP: IP address of the machine where the Remote EDITRAN/OCSP server is installed and executed. EDITRAN/OCSP Port: Port of the EDITRAN/OCSP server to connect to it. o Proxy: Use of proxy for EDITRAN/XAdES Internet connection. It is necessary in case of verification of certificates both by CRL or OCSP, and also for signing with TimeStamp to connect to the server that seals the signature time: Proxy IP: Proxy port EDITRAN/XAdES needs to connect to. Proxy Port: Proxy port for Internet connection. Proxy User: If necessary, proxy user for Internet connection. Proxy Password: Password of the proxy user. z/os system: Indicates whether the system where the Java program is running is a z/os machine or not. 5. To start and stop the process, use:./start_xades.sh and./stop.sh INDRA. All rights reserved. EDITRAN Page 2-3

7 3 INSTALLATION OF CERTIFICATES 3. INSTALLATION OF CERTIFICATES The certificates used in EDITRAN/XAdES are stored, depending on their use, in two files: TrustStore, for the certificates of the CAs we must trust, and keystore, for the signatories' certificates Truststore File In the installation of EDITRAN/XAdES a TrustStore file, truststore.pfx is provided in the /rsc/truststore/ folder (in the example /u/edixd/rsc/rsc/truststore/truststore.pfx), with several CAs already built in. The CA incorporated are those of the DNI, EDITRAN, FNMT and TGSS. This store is of type PKCS12, but it does not contain keys, only certificates that are public. To change the password of this file ("password" by default), it will be transmitted in binary to Windows, it will be managed with a suitable tool - for example Portecle - and it will be resent to USS. In addition to the truststore, the certificates for some of the CAs included in the truststore are attached. With these certificates we can create our own truststore file using the utilities provided by the IBM Java installation (keytool, ikeyman) with the limitations for PKCS12 type keystores in password management. It is advisable to use the above-mentioned tool to incorporate or delete CA Keystore File The keystore file is a file containing one or more certificates that will be used for signing. The certificates are obtained by the user of the application and should be stored in a USS folder or incorporated into one or more keystores whose path must be configured in each EDITRAN/FF user (see manual EFF51USUI.doc IMS - and EFF51USUC.doc CICS-) or, if there is only one, in the default path (running ConfiguracionXades.sh, located in the bin directory). To configure this type of stores, the processing file by FicheroKeyStores.sh batches, located in the bin directory must be executed. This configuration is saved in the file FicheroKeyStores.sh in the conf directory (/u/edixd/conf/feykeystores.txt file). When running the program, if the file already exists, it shows the values that we already have saved. Otherwise, they will be blank: The options we have are to save a new key (G), delete an existing key (B) or do nothing (N). The data to be saved for each signatory are: Keystore Path: Keystore path where the signatory's key pair is stored. Keystore Password: Password of the keystore. Alias: Alias of the key pair we want to use to sign. Key password: Password of the key. It can be the same as that of the keystore. In this case is left blank. To be able to test the product without our own certificates, the keystore.pfx file in the rsc/keystore directory is also attached with a test certificate (in the example: /u/edixd/rsc/keystore/keystore/keystore.pfx); the alias of the saved certificate is "XAdES test certificate" (password: "password"). INDRA. All rights reserved. EDITRAN Page 3-1

8 3 INSTALLATION OF CERTIFICATES This store is already configured in the FicheroKeyStores.txt file and is the default keystore file in the initial configuration Configuration of the certificate revocation status query The use of the revocados.properties file, located in the conf folder, allows enlarging the places where the revocation status of the certificates can be queried with respect to the information that the certificate contains. This facility has been implemented in order to make use of those certificates that do not provide this information in a self-sufficient way; for example, when they include the name of the crl list, but not the address where to query it. The contents of the file can have as many blocks as needed, as follows: nombre.ca.0=nombre CA ldap.0= ocsp.0= crl.0.0= crl.0.1= crl.0.2= A keyword must be entered in the "name.ca.n=" record that identifies all certificates issued by the same CA. They can be found both in the DN of the issuer of the signatory certificate and in all the DNs of the certificates of the certificate path, e.g. "FMNT", "DNIE", "SWIFT", etc. In the "ocsp.0=" record, enter the URL to connect to the OCSP server, for example In the "ldap.0=" record, enter the LDAP address to connect to the server. Where such information is already included in the certificate, it need not be indicated. In the "crl.0.n=" records, as many as are necessary for each CA will be referred to, addresses will be indicated where the CRL list and even simply the names of the CRLs will be queried. In this case, the list must be downloaded in the crl subfolder. The query is first made where the certificate indicates. If the information is not selfsufficient and the search cannot be performed, then the downloaded list is searched in the crl folder. If it is not there either, continue to search in the places indicated in the revocados.properties file, in the same order in which the entries of the corresponding CA appear (according to the example, search first in ocsp.0, then in crl.0.0, crl.0.1, etc.) Authentication of the LDAP Server If the LDAP Server requests authentication, the LDAP authentication script can be run in the bin folder. This will allow LDAP addresses that are already registered in the revocados.properties file to add a username and password if necessary. This program only INDRA. All rights reserved. EDITRAN Page 3-2

9 3 INSTALLATION OF CERTIFICATES edits the LDAP addresses in that file, so we must first fill in the LDAP address before running it. INDRA. All rights reserved. EDITRAN Page 3-3

10 EDITRAN/XAdES z/os. Installation Manual 4 ANNEX A 4. ANNEX A 4.1. Result codes of the server Correct results 00- Correct certificate 01- Warning. It was not found or it was not possible to connect to the OCSP or CRL Url in the certificate. This warning occurs with a certificate that has been asked for OCSP verification and it has not been able to do it whether it is revoked or not. It is up to the customer to treat this code as an error or not. By default it is valid even if a warning is triggered. 02- Warning. The signature has been made with Warnings. This may occur when signing a document in a format other than the one originally requested because the requested format cannot be used. Signature verification errors 10- Signature policy included. The policy has not been implemented. 11- There is no trust in one of the signatory certificates, invalid CA 12- OCSP server returns incorrect certificate(s) 13- OCSP server or CRL list returns revoked certificate(s) 14- Expired certificate(s) 15- Modified document 16- Unauthorized signatory(ies) in the account (This is a further validation of the signature against the EDITRAN/XAdES profiles). Reading the data of the connection with the EDITRAN/XAdES Java Server 17- Request not built correctly 18- Error when reading the length of the frame from the reading buffer 19- Unrecognized petitioner function 20- Unrecognized type of signature 21- Unrecognized source machine language 22- Unrecognized CRLS validation value 23- Unrecognized zip value 24- Unrecognized encryption value 25- Unrecognized conversion value to base Unrecognized input file identifier 27- Unrecognized external detached file identifier 28- Unrecognized output file identifier 29- The path of the input file must be greater than The path of the external detached file must be greater than The output file path must be greater than The path of the DN output file must be greater than The keystore path must be greater than or equal to The alias or DN of the certificate must be greater than No signatory certificate has been reported 36- Unrecognized template identifier 37- The name of the template must be greater than The geographical place must be greater than or equal to The signatory's role must be greater than The signatory's action must be greater than Failure to read the xades.properties configuration file INDRA. All rights reserved. EDITRAN Page 4-1

11 EDITRAN/XAdES z/os. Installation Manual 4 ANNEX A Reading the signed file 48- Error when reading the source file 49- Error when parsing the xml of the source file 50- The Signature element is not found in the document 51- Error when parsing the Signature element 52- Error in the signature validation process 53- Error obtaining invalid signature information 54- The certificate signed inside the document has not been found. 55- Error reading the truststore Output file writing 64- Error when writing the destination file 65- Error when writing the dn file OCSP and CRL validation 80- Error when encoding the certificate 81- EDITRAN/OCSP connection error 82- EDITRAN/OCSP error when reading the Connection Message 83- The versions do not correspond to each other 84- EDITRAN/OCSP Error when writing Connection Answer 85- EDITRAN/XAdES Error when reading Connection Answer 86- EDITRAN/OCSP Error when reading the Request Message 87- EDITRAN/OCSP cannot connect OCSP Server 88- Error when trying to find the CRL list of the certificate File signature 96- Error reading the keystore 97- The keystore key could not be extracted 98- The template is incorrect 99- The Signed Info element could not be created 100- The KeyInfo element could not be created 101- The QualifyingProperties element could not be created 102- Incorrect URL for the signature TimeStamp 103- The signatory for the counter-signature has not been found 104- Error when signing Memory error 112- OutOfMemoryError (When this error occurs, the memory allocation parameters that are in the start_xades.bat file of the bin folder must be increased). Unexpected error 113- Unexpected error in the Java EDITRAN/XAdES server. Undefined error 114- Value not defined. It should not be attainable (This value should never occur, it is the value assigned to the program input. INDRA. All rights reserved. EDITRAN Page 4-2

12 EDITRAN/XAdES z/os. Installation Manual 4 ANNEX A ecommerce Competence Centers Avda. de Bruselas Alcobendas. Madrid, Spain T T INDRA. Todos los derechos reservadoseditran Pág. 4-1

EDITRAN/PX. Windows/Unix. Installation and user manual

EDITRAN/PX. Windows/Unix. Installation and user manual EDITRAN/PX Windows/Unix Installation and user manual INDRA 17/03/2017 EDITRAN/PX Windows/Unix Installation and user manual INDEX 1. INTRODUCTION... 1-1 1.1. Main features... 1-1 1.2. Architecture and requirements...

More information

Entrust Connector (econnector) Venafi Trust Protection Platform

Entrust Connector (econnector) Venafi Trust Protection Platform Entrust Connector (econnector) For Venafi Trust Protection Platform Installation and Configuration Guide Version 1.0.5 DATE: 17 November 2017 VERSION: 1.0.5 Copyright 2017. All rights reserved Table of

More information

ENTRUST CONNECTOR Installation and Configuration Guide Version April 21, 2017

ENTRUST CONNECTOR Installation and Configuration Guide Version April 21, 2017 ENTRUST CONNECTOR Installation and Configuration Guide Version 0.5.1 April 21, 2017 2017 CygnaCom Solutions, Inc. All rights reserved. Contents What is Entrust Connector... 4 Installation... 5 Prerequisites...

More information

How to Set Up External CA VPN Certificates

How to Set Up External CA VPN Certificates To configure a client-to-site, or site-to-site VPN using s created by External CA, you must create the following VPN s for the VPN service to be able to authenticate Before you begin Use an external CA

More information

EDITRAN/G 5.2. Application Program Interfaces. Application Generic Interface. z/os CICS IMS

EDITRAN/G 5.2. Application Program Interfaces. Application Generic Interface. z/os CICS IMS EDITRAN/G 5.2 Application Generic Interface z/os CICS IMS Application Program Interfaces INDRA April 2018 EDITRAN/G 5.2 z/os CICS IMS Interfaces de Programas de Aplicación CONTENTS 1. INTRODUCTION... 1-1

More information

EDITRAN/XML SEPA 5.X. User Manual. Converter of modern format flat files into XML and vice versa CICS-IMS

EDITRAN/XML SEPA 5.X. User Manual. Converter of modern format flat files into XML and vice versa CICS-IMS EDITRAN/XML SEPA 5.X Converter of modern format flat files into XML and vice versa CICS-IMS User Manual INDRA May 2018 CONTENTS 1. INTRODUCTION... 1-1 2. REQUIREMENTS AND INSTALLATION.... 2-1 2.1. Requirements....

More information

Electronic Seal Administrator Guide Published:December 27, 2017

Electronic Seal Administrator Guide Published:December 27, 2017 Electronic Seal Administrator Guide Published:December 27, 2017 Copyright Version 4.25.2.3 Copyright 2003-2018 DocuSign, Inc. All rights reserved. For information about DocuSign trademarks, copyrights

More information

PKI Trustpool Management

PKI Trustpool Management PKI Trustpool Management Last Updated: October 9, 2012 The PKI Trustpool Management feature is used to authenticate sessions, such as HTTPS, that occur between devices by using commonly recognized trusted

More information

OCSP Client Tool V2.2 User Guide

OCSP Client Tool V2.2 User Guide Ascertia Limited 40 Occam Road Surrey Research Park Guildford Surrey GU2 7YG Tel: +44 1483 685500 Fax: +44 1483 573704 www.ascertia.com OCSP Client Tool V2.2 User Guide Document Version: 2.2.0.2 Document

More information

IBM Education Assistance for z/os V2R2

IBM Education Assistance for z/os V2R2 IBM Education Assistance for z/os V2R2 Items: OCSP (Online Certificate Status Protocol) PKCS#12 Certificate Keystore Element/Component: System SSL Material current as of May 2015 Agenda Trademarks Presentation

More information

Odette CA Help File and User Manual

Odette CA Help File and User Manual How to Order and Install Odette Certificates For a German version of this file please follow this link. Odette CA Help File and User Manual 1 Release date 31.05.2016 Contents Preparation for Ordering an

More information

IBM Systems and Technology Group

IBM Systems and Technology Group IBM Systems and Technology Group Encryption Facility for z/os Update Steven R. Hart srhart@us.ibm.com 2013 IBM Corporation Topics Encryption Facility for z/os EF OpenPGP Support X.509 vs. OpenPGP Certificates

More information

Genesys Security Deployment Guide. What You Need

Genesys Security Deployment Guide. What You Need Genesys Security Deployment Guide What You Need 12/27/2017 Contents 1 What You Need 1.1 TLS Certificates 1.2 Generating Certificates using OpenSSL and Genesys Security Pack 1.3 Generating Certificates

More information

IBM Presentations: Implementing SSL Security in WebSphere Partner Gateway

IBM Presentations: Implementing SSL Security in WebSphere Partner Gateway IBM Software Group IBM Presentations: Implementing SSL Security in WebSphere Partner Gateway Presenter: Max Terpolilli WPG L2 Support WebSphere Support Technical Exchange Agenda IBM Software Group Digital

More information

Configuring SSL. SSL Overview CHAPTER

Configuring SSL. SSL Overview CHAPTER 7 CHAPTER This topic describes the steps required to configure your ACE appliance as a virtual Secure Sockets Layer (SSL) server for SSL initiation or termination. The topics included in this section are:

More information

Security configuration of the mail server IBM

Security configuration of the mail server IBM Security configuration of the mail server IBM ii Security configuration of the mail server Contents Security configuration of the mail server 1 Configuration of the SSL client to trust the SMTP server

More information

Xolido Sign Desktop. Xolido Sign Desktop. V2.2.1.X User manual XOLIDO. electronic signature, notifications and secure delivery of documents

Xolido Sign Desktop. Xolido Sign Desktop. V2.2.1.X User manual XOLIDO. electronic signature, notifications and secure delivery of documents Xolido Sign Desktop Xolido Sign Desktop V2.2.1.X XOLIDO electronic signature, notifications and secure delivery of documents Xolido Systems, S.A. C/ Pío del Río Hortega, 8 2ª Planta, Oficina 7 47014 Valladolid

More information

EDITRAN/GT 2.1. User manual. EDITRAN transmissions manager. Windows/Unix INDRA 17/03/17

EDITRAN/GT 2.1. User manual. EDITRAN transmissions manager. Windows/Unix INDRA 17/03/17 EDITRAN/GT 2.1 EDITRAN transmissions manager Windows/Unix User manual INDRA 17/03/17 INDEX 1. INTRODUCTION... 1-1 2. CHANGES BETWEEN VERSIONS... 2-1 2.1. Changes in version 2.0 over version 1.0... 2-1

More information

Configuring Certificate Authorities and Digital Certificates

Configuring Certificate Authorities and Digital Certificates CHAPTER 43 Configuring Certificate Authorities and Digital Certificates Public Key Infrastructure (PKI) support provides the means for the Cisco MDS 9000 Family switches to obtain and use digital certificates

More information

The server performs full signature validation including path building and revocation checking, supporting both CRL and OCSP revocation checking

The server performs full signature validation including path building and revocation checking, supporting both CRL and OCSP revocation checking Krestfield EzSign Installation and Configuration Guide version 2.1 Copyright Krestfield 2017 Introduction The Krestfield EzSign suite enables applications to quickly generate and verify digital signatures

More information

User guide NotifySCM Installer

User guide NotifySCM Installer User guide NotifySCM Installer TABLE OF CONTENTS 1 Overview... 3 2 Office 365 Users synchronization... 3 3 Installation... 5 4 Starting the server... 17 2 P a g e 1 OVERVIEW This user guide provides instruction

More information

Send documentation comments to

Send documentation comments to CHAPTER 6 Configuring Certificate Authorities and Digital Certificates This chapter includes the following topics: Information About Certificate Authorities and Digital Certificates, page 6-1 Default Settings,

More information

Managing AON Security

Managing AON Security CHAPTER 4 This chapter describes AON functions relating to security, authentication, and authorization. It includes the following topics. Managing Keystores, page 4-1 Configuring Security Properties, page

More information

Configuring SSL CHAPTER

Configuring SSL CHAPTER 7 CHAPTER This chapter describes the steps required to configure your ACE appliance as a virtual Secure Sockets Layer (SSL) server for SSL initiation or termination. The topics included in this section

More information

X-road MISP2 installation and configuration guide. Version 1.20

X-road MISP2 installation and configuration guide. Version 1.20 X-road MISP2 installation and configuration guide Version 1.20 Contents 1. Introduction... 3 2. Environment requirements... 3 3.MISP2 Installation... 3 3.1. Java... 3 3.2. PostgreSQL... 3 3.3. Apache Tomcat

More information

Axway Validation Authority Suite

Axway Validation Authority Suite Axway Validation Authority Suite PKI safeguards for secure applications Around the world, banks, healthcare organizations, governments, and defense agencies rely on public key infrastructures (PKIs) to

More information

Configuring SSL. SSL Overview CHAPTER

Configuring SSL. SSL Overview CHAPTER CHAPTER 8 Date: 4/23/09 This topic describes the steps required to configure your ACE (both the ACE module and the ACE appliance) as a virtual Secure Sockets Layer (SSL) server for SSL initiation or termination.

More information

CORPME TRUST SERVICE PROVIDER

CORPME TRUST SERVICE PROVIDER CORPME TRUST SERVICE PROVIDER QUALIFIED CERTIFICATE OF ADMINISTRATIVE POSITION USE LICENSE In..,.. 20... Mr/Mrs/Ms/Miss.........., with DNI/NIF/National Passport nº., e-mail........., phone number....,

More information

Signe Certification Authority. Certification Policy Degree Certificates

Signe Certification Authority. Certification Policy Degree Certificates Signe Certification Authority Certification Policy Degree Certificates Versión 1.0 Fecha: 2/11/2010 Table of contents 1 FOREWORD 1.1 GENERAL DESCRIPTION 1.2 DOCUMENT NAME AND IDENTIFICATION 2 PARTICIPATING

More information

UNICORE UFTP server UNICORE UFTP SERVER. UNICORE Team

UNICORE UFTP server UNICORE UFTP SERVER. UNICORE Team UNICORE UFTP server UNICORE UFTP SERVER UNICORE Team Document Version: 1.0.0 Component Version: 2.0.0 Date: 10 12 2013 UNICORE UFTP server Contents 1 UNICORE UFTP 1 2 Installation and use 2 2.1 Prerequisites....................................

More information

Oracle Oracle Identity Manager 11g

Oracle Oracle Identity Manager 11g RSA SecurID Ready Implementation Guide Partner Information Last Modified: August 24, 2014 Product Information Partner Name Web Site Product Name Version & Platform Product Description Oracle www.oracle.com

More information

Lab Overview In this lab, you will learn how to perform the following tasks with Encryption Facility for z/os:

Lab Overview In this lab, you will learn how to perform the following tasks with Encryption Facility for z/os: Lab Overview In this lab, you will learn how to perform the following tasks with Encryption Facility for z/os: Creating an OpenPGP Keyring Creating new RSA key pairs Creating OpenPGP certificates Exporting

More information

Authenticating SMTP Sessions Using Client Certificates

Authenticating SMTP Sessions Using Client Certificates Authenticating SMTP Sessions Using Client Certificates This chapter contains the following sections: Overview of Certificates and SMTP Authentication, on page 1 Checking the Validity of a Client Certificate,

More information

International Technical Support Organization. IBM System Storage Tape Encryption Solutions. May 2009 SG

International Technical Support Organization. IBM System Storage Tape Encryption Solutions. May 2009 SG International Technical Support Organization IBM System Storage Tape Encryption Solutions May 2009 SG24-7320-02 Contents Notices Trademarks xiii xiv Preface xv The team that wrote this book xv Become a

More information

MS_ Implementing an Advanced Server Infrastructure.

MS_ Implementing an Advanced Server Infrastructure. Implementing an Advanced Server Infrastructure www.ked.com.mx Av. Revolución No. 374 Col. San Pedro de los Pinos, C.P. 03800, México, CDMX. Tel/Fax: 52785560 Por favor no imprimas este documento si no

More information

Create Decryption Policies to Control HTTPS Traffic

Create Decryption Policies to Control HTTPS Traffic Create Decryption Policies to Control HTTPS Traffic This chapter contains the following sections: Overview of Create Decryption Policies to Control HTTPS Traffic, page 1 Managing HTTPS Traffic through

More information

Public Key Enabling Oracle Weblogic Server

Public Key Enabling Oracle Weblogic Server DoD Public Key Enablement (PKE) Reference Guide Public Key Enabling Oracle Weblogic Server Contact: dodpke@mail.mil URL: http://iase.disa.mil/pki-pke URL: http://iase.disa.smil.mil/pki-pke Public Key Enabling

More information

StreamServe Persuasion SP4 StreamStudio

StreamServe Persuasion SP4 StreamStudio StreamServe Persuasion SP4 StreamStudio Administrator s guide Rev A StreamServe Persuasion SP4 StreamStudio Administrator s guide Rev A 2001-2009 STREAMSERVE, INC. ALL RIGHTS RESERVED United States patent

More information

Objectives of this Lab

Objectives of this Lab Objectives of this Lab In this Lab you will learn how to perform the following tasks with Encryption Facility for z/os: Creating a Java Keystore Creating an OpenPGP Keyring Creating new RSA key pairs Creating

More information

DEVELOPER S GUIDE. Managed PKI v7.2. Certificate Validation Module

DEVELOPER S GUIDE. Managed PKI v7.2. Certificate Validation Module DEVELOPER S GUIDE Managed PKI v7.2 Certificate Validation Module VeriSign, Inc. March 10, 2008 Managed PKI Certificate Validation Module 2004-2008 VeriSign, Inc. All rights reserved. The information in

More information

Configure the IM and Presence Service to Integrate with the Microsoft Exchange Server

Configure the IM and Presence Service to Integrate with the Microsoft Exchange Server Configure the IM and Presence Service to Integrate with the Microsoft Exchange Server Configure a Presence Gateway for Microsoft Exchange Integration, page 1 SAN and Wildcard Certificate Support, page

More information

RSA Identity Governance and Lifecycle Collector Data Sheet for Zendesk

RSA Identity Governance and Lifecycle Collector Data Sheet for Zendesk RSA Identity Governance and Lifecycle Collector Data Sheet for Zendesk Version 1.1 December 2017 Contents Purpose... 4 Supported Software... 4 Prerequisites... 4 Account Data Collector... 4 Configuration...

More information

Certificate Revocation Checking using OCSP and CRL in View 4.5 T E C H N I C A L W H I T E P A P E R

Certificate Revocation Checking using OCSP and CRL in View 4.5 T E C H N I C A L W H I T E P A P E R Certificate Revocation Checking using OCSP and CRL in View 4.5 T E C H N I C A L W H I T E P A P E R Certificate Revocation Checking using OCSP/CRL in View4.5 Table of Contents Introduction... 2 About

More information

PKI Cert Creation via Good Control: Reference Implementation

PKI Cert Creation via Good Control: Reference Implementation PKI Cert Creation via Good Control: Reference Implementation Legal Notice Copyright 2016 BlackBerry Limited. All rights reserved. All use is subject to license terms posted at http://us.blackberry.com/legal/legal.html.

More information

Updating OCSP. David Cooper

Updating OCSP. David Cooper Updating OCSP David Cooper Background Concerns raised about text in RFC 2560 being misinterpreted, particularly Section 4.2.2.2 on Authorized Responders Working group agreed to develop an update to RFC

More information

Perceptive SOAPBridge Connector

Perceptive SOAPBridge Connector Perceptive SOAPBridge Connector Installation and Setup Guide Version: 1.0.x Written by: Product Knowledge, R&D Date: June 2017 2016 Lexmark. All rights reserved. Lexmark is a trademark of Lexmark International,

More information

Contents Overview... 5 Downloading Primavera Gateway... 5 Primavera Gateway On-Premises Installation Prerequisites... 6

Contents Overview... 5 Downloading Primavera Gateway... 5 Primavera Gateway On-Premises Installation Prerequisites... 6 Gateway Installation and Configuration Guide for On-Premises Version 17 September 2017 Contents Overview... 5 Downloading Primavera Gateway... 5 Primavera Gateway On-Premises Installation Prerequisites...

More information

Configuring SAML-based Single Sign-on for Informatica Web Applications

Configuring SAML-based Single Sign-on for Informatica Web Applications Configuring SAML-based Single Sign-on for Informatica Web Applications Copyright Informatica LLC 2017. Informatica LLC. Informatica, the Informatica logo, Informatica Big Data Management, and Informatica

More information

Digital Certificates Demystified

Digital Certificates Demystified Digital Certificates Demystified Ross Cooper, CISSP IBM Corporation RACF/PKI Development Poughkeepsie, NY Email: rdc@us.ibm.com August 9 th, 2012 Session 11622 Agenda Cryptography What are Digital Certificates

More information

WINDOWS SERVER - SERVICIOS AVANZADOS

WINDOWS SERVER - SERVICIOS AVANZADOS IMECAF México, S.C. Instituto Mexicano de Contabilidad, Administración y Finanzas Nombre del Curso WINDOWS SERVER - SERVICIOS AVANZADOS Objetivo El curso de Windows Server Pro: Advanced Services es el

More information

Enabling Secure Sockets Layer for a Microsoft SQL Server JDBC Connection

Enabling Secure Sockets Layer for a Microsoft SQL Server JDBC Connection Enabling Secure Sockets Layer for a Microsoft SQL Server JDBC Connection Secure Sockets Layer (SSL) is the standard security technology for establishing an encrypted link between a web server and a browser.

More information

Managed PKI. Certificate Validation and Parsing Guide CUSTOMER MANUAL. Customer Support: +44(0)

Managed PKI. Certificate Validation and Parsing Guide CUSTOMER MANUAL. Customer Support: +44(0) Managed PKI Certificate Validation and Parsing Guide CUSTOMER MANUAL Customer Support: +44(0) 870 608 7878 support@trustwise.com BT38-MPKI6-CVM-V1.0 Managed PKI Certificate Validation and Parsing Guide

More information

Cisco Expressway Authenticating Accounts Using LDAP

Cisco Expressway Authenticating Accounts Using LDAP Cisco Expressway Authenticating Accounts Using LDAP Deployment Guide Cisco Expressway X8.5 December 2014 Contents Introduction 3 Process summary 3 LDAP accessible authentication server configuration 4

More information

MSE System and Appliance Hardening Guidelines

MSE System and Appliance Hardening Guidelines MSE System and Appliance Hardening Guidelines This appendix describes the hardening of MSE, which requires some services and processes to be exposed to function properly. This is referred to as MSE Appliance

More information

Developers Integration Lab (DIL) Certificate Installation Instructions. Version 1.6

Developers Integration Lab (DIL) Certificate Installation Instructions. Version 1.6 Developers Integration Lab (DIL) Certificate Installation Instructions Version 1.6 May 28, 2014 REVISION HISTORY REVISION DATE DESCRIPTION 0.1 17 September 2011 First Draft Release DIL Certificate Installation

More information

VII. Corente Services SSL Client

VII. Corente Services SSL Client VII. Corente Services SSL Client Corente Release 9.1 Manual 9.1.1 Copyright 2014, Oracle and/or its affiliates. All rights reserved. Table of Contents Preface... 5 I. Introduction... 6 Chapter 1. Requirements...

More information

Access SharePoint using Basic Authentication and SSL (via Alternative Access URL) with SP 2016 (v 1.9)

Access SharePoint using Basic Authentication and SSL (via Alternative Access URL) with SP 2016 (v 1.9) Access SharePoint using Basic Authentication and SSL (via Alternative Access URL) with SP 2016 (v 9) This page is part of the installation guide for the Confluence SharePoint Connector. It tells you how

More information

IBM. User's Guide. IBM Explorer for z/os. Version 3 Release 0 SC

IBM. User's Guide. IBM Explorer for z/os. Version 3 Release 0 SC IBM Explorer for z/os IBM User's Guide Version 3 Release 0 SC27-8431-01 IBM Explorer for z/os IBM User's Guide Version 3 Release 0 SC27-8431-01 Note Before using this information, be sure to read the

More information

PKI Services. Text PKI Definition. PKI Definition #1. Public Key Infrastructure. What Does A PKI Do? Public Key Infrastructures

PKI Services. Text PKI Definition. PKI Definition #1. Public Key Infrastructure. What Does A PKI Do? Public Key Infrastructures Public Key Infrastructures Public Key Infrastructure Definition and Description Functions Components Certificates 1 2 PKI Services Security Between Strangers Encryption Integrity Non-repudiation Key establishment

More information

Coding & Information Theory Lab.

Coding & Information Theory Lab. 통합인증시스템설계및구현 연세대학교전기 전자공학과정연식, 송홍엽 Coding & Information Theory Lab. Introduction Previous Works Contents Design and Implementation of Public-Key Infrastructure Design and Implementation of Single Sign-On

More information

This PDF Document was generated for free by the Aloaha PDF Suite If you want to learn how to make your own PDF Documents visit:

This PDF Document was generated for free by the Aloaha PDF Suite If you want to learn how to make your own PDF Documents visit: INSTALLING AND CONFIGURING A WINDOWS SERVER 2003 ENTERPRISE CERTIFICATION AUTHORITY Certification Authorities can issue certificates to users and computers for a variety of purposes. In the context of

More information

Blue Coat ProxySG First Steps Solution for Controlling HTTPS SGOS 6.7

Blue Coat ProxySG First Steps Solution for Controlling HTTPS SGOS 6.7 Blue Coat ProxySG First Steps Solution for Controlling HTTPS SGOS 6.7 Legal Notice Copyright 2018 Symantec Corp. All rights reserved. Symantec, the Symantec Logo, the Checkmark Logo, Blue Coat, and the

More information

IBM. Bulk Load Utilities Guide. IBM Emptoris Contract Management SaaS

IBM. Bulk Load Utilities Guide. IBM Emptoris Contract Management SaaS IBM Emptoris Contract Management IBM Bulk Load Utilities Guide 10.1.2 SaaS IBM Emptoris Contract Management IBM Bulk Load Utilities Guide 10.1.2 SaaS ii IBM Emptoris Contract Management: Bulk Load Utilities

More information

How to Set Up VPN Certificates

How to Set Up VPN Certificates For the VPN service, you can use either self-signed certificates or certificates that are generated by an external CA. In this article: Before You Begin Before you set up VPN certificates, verify that

More information

MISP2 installation and configuration guide. Version 2.12

MISP2 installation and configuration guide. Version 2.12 MISP2 installation and configuration guide Version 2.12 Contents Contents... 2 1. Introduction... 3 2. Environment requirements... 3 3. MISP2 Installation... 3 3.1. Updating the MISP2 package list... 3

More information

Jetbrains License Server User Guide

Jetbrains License Server User Guide Jetbrains License Server User Guide Copyright 2008, JetBrains s.r.o. All rights reserved Introduction JetBrains License Server is a web application that can be used as a central point to distribute licenses

More information

Certificate implementation The good, the bad, and the ugly

Certificate implementation The good, the bad, and the ugly Certificate implementation The good, the bad, and the ugly DOE Security Training Workshop James A. Rome Oak Ridge National Laboratory April 29, 1998 A wealth of riches? I decided to use certificates for

More information

TIM TAM Integration. Planning to install the Tivoli Access Manager Combo Adapter

TIM TAM Integration. Planning to install the Tivoli Access Manager Combo Adapter TIM TAM Integration For TIM TAM Integration, TAM Combo Adapter is required. The installation and configuration details of TAM Combo Adapter is described below. Planning to install the Tivoli Access Manager

More information

Cisco TelePresence Authenticating Cisco VCS Accounts Using LDAP

Cisco TelePresence Authenticating Cisco VCS Accounts Using LDAP Cisco TelePresence Authenticating Cisco VCS Accounts Using LDAP Deployment Guide Cisco VCS X8.2 D14465.07 June 2014 Contents Introduction 3 Process summary 3 LDAP accessible authentication server configuration

More information

Redpaper. OpenPGP Key Exchange and Migration. Introduction. Exchanging OpenPGP certificates. Saheem Granados

Redpaper. OpenPGP Key Exchange and Migration. Introduction. Exchanging OpenPGP certificates. Saheem Granados Redpaper Saheem Granados OpenPGP Key Exchange and Migration Introduction Business exchange processes must define the mechanism for establishing trust among partners. Using cryptography as the foundation

More information

BusinessObjects Enterprise XI Release 1 and Release 2

BusinessObjects Enterprise XI Release 1 and Release 2 BusinessObjects Enterprise XI Release 1 and Release 2 Overview Contents This document provides information and instructions for setting up Lightweight Directory Access Protocol (LDAP) authentication in

More information

Advanced Integration TLS Certificate on the NotifySCM Server

Advanced Integration TLS Certificate on the NotifySCM Server Advanced Integration TLS Certificate on the NotifySCM Server TABLE OF CONTENTS 1 Enable a TLS Connection Between NotifySCM and a Reverse Proxy... 3 1.1 Generate a self-signed certificate... 3 1.2 Install

More information

crypto ca authenticate through customization Commands

crypto ca authenticate through customization Commands CHAPTER 8 crypto ca authenticate through customization Commands 8-1 crypto ca authenticate Chapter 8 crypto ca authenticate To install and authenticate the CA certificates associated with a trustpoint,

More information

ECOPETROL BARRANCABERJEJA. INTERFACES AL SERVIDOR PI:

ECOPETROL BARRANCABERJEJA. INTERFACES AL SERVIDOR PI: ECOPETROL BARRANCABERJEJA. INTERFACES AL SERVIDOR PI: Este documento fue creado para apoyar la instalación de la(s) estación(es) que contiene(n) la(s) interface(s) al sistema PI de ECOPETROL-Barrancabermeja.

More information

Certificate Properties File Realm

Certificate Properties File Realm Certificate Properties File Realm {scrollbar} This realm type allows you to configure Web applications to authenticate users against it. To get to that point, you will need to first configure Geronimo

More information

DBsign for HTML Applications Version 4.0 Release Notes

DBsign for HTML Applications Version 4.0 Release Notes DBsign for HTML Applications Version 4.0 Release Notes Copyright 2010 Version 4.0 Copyright Notice: The Release Notes has a copyright of 2000-2010 by Gradkell Computers, Inc. This work contains proprietary

More information

CA Identity Manager. Connector Xpress Guide

CA Identity Manager. Connector Xpress Guide CA Identity Manager Connector Xpress Guide 12.6.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is for

More information

MICROSOFT Course 20411: Administering Windows Server 2012

MICROSOFT Course 20411: Administering Windows Server 2012 MICROSOFT Course 20411: Administering Windows Server 2012 1 INTRODUCCIÓN El curso 20411 se basa en la versión final de Windows Server 2012. La formación aporta al alumno conocimientos sobre las tareas

More information

Blue Coat Security First Steps Solution for Controlling HTTPS

Blue Coat Security First Steps Solution for Controlling HTTPS Solution for Controlling HTTPS SGOS 6.5 Legal Notice Copyright 2017 Symantec Corp. All rights reserved. Symantec, the Symantec Logo, the Checkmark Logo, Blue Coat, and the Blue Coat logo are trademarks

More information

70-742: Identity in Windows Server Course Overview

70-742: Identity in Windows Server Course Overview 70-742: Identity in Windows Server 2016 Course Overview This course provides students with the knowledge and skills to install and configure domain controllers, manage Active Directory objects, secure

More information

Installing the Product Software

Installing the Product Software CHAPTER 1 The Cisco Configuration Engine is a network management software that acts as a configuration service for automating the deployment, management, and upgrading of network devices and services.

More information

Sharing Secrets using Encryption Facility - Handson

Sharing Secrets using Encryption Facility - Handson Sharing Secrets using Encryption Facility - Handson Lab Steven R. Hart IBM March 12, 2014 Session Number 14963 Encryption Facility for z/os Encryption Facility for z/os is a host based software solution

More information

X-road MISP2 installation and configuration guide. Version 2.6

X-road MISP2 installation and configuration guide. Version 2.6 X-road MISP2 installation and configuration guide Version 2.6 Contents 1. Introduction... 3 2. Environment requirements... 3 3.MISP2 Installation... 3 3.1 Repositories... 3 3.2 MISP2 keyring... 4 3.3 PostgreSQL

More information

Owner of the content within this article is Written by Marc Grote

Owner of the content within this article is  Written by Marc Grote Owner of the content within this article is www.isaserver.org Written by Marc Grote www.it-training-grote.de Secure CDP publishing with Forefront TMG and the HTTP-filter Abstract In this article we will

More information

CertAgent. Certificate Authority Guide

CertAgent. Certificate Authority Guide CertAgent Certificate Authority Guide Version 7.0 July 5, 2018 Information in this document is subject to change without notice and does not represent a commitment on the part of Information Security Corporation.

More information

VSP16. Venafi Security Professional 16 Course 04 April 2016

VSP16. Venafi Security Professional 16 Course 04 April 2016 VSP16 Venafi Security Professional 16 Course 04 April 2016 VSP16 Prerequisites Course intended for: IT Professionals who interact with Digital Certificates Also appropriate for: Enterprise Security Officers

More information

This help covers the ordering, download and installation procedure for Odette Digital Certificates.

This help covers the ordering, download and installation procedure for Odette Digital Certificates. This help covers the ordering, download and installation procedure for Odette Digital Certificates. Answers to Frequently Asked Questions are available online CONTENTS Preparation for Ordering an Odette

More information

Quick Installation Guide TV-DVR104K / TV-DVR208K(V1)

Quick Installation Guide TV-DVR104K / TV-DVR208K(V1) Quick Installation Guide TV-DVR104K / TV-DVR208K(V1) Table of Content 1 English 1. Initial Setup 2. Setup 1. Initial Setup ENGLISH 1. When you turn on your DVR you will be promoted to active the DVR. Please

More information

Manage Certificates. Certificates Overview

Manage Certificates. Certificates Overview Certificates Overview, page 1 Show Certificates, page 3 Download Certificates, page 4 Install Intermediate Certificates, page 4 Delete a Trust Certificate, page 5 Regenerate a Certificate, page 6 Upload

More information

SSO Authentication with ADFS SAML 2.0. Ephesoft Transact Documentation

SSO Authentication with ADFS SAML 2.0. Ephesoft Transact Documentation SSO Authentication with ADFS SAML 2.0 Ephesoft Transact Documentation Table of Contents Configure Ephesoft Transact... 1 Configure ADFS Server... 3 Export Certificate from ADFS Server... 7 Configure Ephesoft

More information

Apache NiFi System Administration

Apache NiFi System Administration Apache NiFi System Administration Security Configuration NiFi allows for the system to run securely over HTTPS To run over HTTPS, several properties need to be set Required Security Properties Property

More information

Let's Encrypt - Free SSL certificates for the masses. Pete Helgren Bible Study Fellowship International San Antonio, TX

Let's Encrypt - Free SSL certificates for the masses. Pete Helgren Bible Study Fellowship International San Antonio, TX Let's Encrypt - Free SSL certificates for the masses Pete Helgren Bible Study Fellowship International San Antonio, TX Agenda Overview of data security Encoding and Encryption SSL and TLS Certficate options

More information

ETSI TS V1.2.1 ( ) Technical Specification

ETSI TS V1.2.1 ( ) Technical Specification TS 102 778-3 V1.2.1 (2010-07) Technical Specification Electronic Signatures and Infrastructures (ESI); PDF Advanced Electronic Signature Profiles; Part 3: PAdES Enhanced - PAdES-BES and PAdES-EPES Profiles

More information

FUSION REGISTRY COMMUNITY EDITION SETUP GUIDE VERSION 9. Setup Guide. This guide explains how to install and configure the Fusion Registry.

FUSION REGISTRY COMMUNITY EDITION SETUP GUIDE VERSION 9. Setup Guide. This guide explains how to install and configure the Fusion Registry. FUSION REGISTRY COMMUNITY EDITION VERSION 9 Setup Guide This guide explains how to install and configure the Fusion Registry. FUSION REGISTRY COMMUNITY EDITION SETUP GUIDE Fusion Registry: 9.2.x Document

More information

Host Access Management and Security Server Administrative Console Users Guide. December 2016

Host Access Management and Security Server Administrative Console Users Guide. December 2016 Host Access Management and Security Server Administrative Console Users Guide December 2016 2016 Attachmate Corporation, a Micro Focus company. All rights reserved. No part of the documentation materials

More information

ADFS Setup (SAML Authentication)

ADFS Setup (SAML Authentication) ADFS Setup (SAML Authentication) Version 1.6 Corresponding Software Version Celonis 4.3 This document is copyright of the Celonis SE. Distribution or reproduction are only permitted by written approval

More information

CA CloudMinder. Identity Management Connector Xpress Guide 1.5

CA CloudMinder. Identity Management Connector Xpress Guide 1.5 CA CloudMinder Identity Management Connector Xpress Guide 1.5 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation

More information

Configure IBM Rational Synergy with 3 rd Party LDAP Server. Release

Configure IBM Rational Synergy with 3 rd Party LDAP Server. Release Configure IBM Rational Synergy with 3 rd Party LDAP Server. Release 7.2.1.7 Author: Rooble Babu Madeckal March 29, 2018 This edition applies to IBM Rational Synergy version 7.2.1.7, and to all subsequent

More information

CloudLink Key Management for VMware vcenter Server Configuration Guide

CloudLink Key Management for VMware vcenter Server Configuration Guide CloudLink Key Management for VMware vcenter Server Dell EMC CloudLink SecureVM Version 6.0, 6.5, and 6.6 H15988.3 January 2018 This contains procedures to create a trusted connection between CloudLink

More information

Authentication Unit AU-211P User s Guide

Authentication Unit AU-211P User s Guide Authentication Unit AU-11P User s Guide Ver..0 Contents Contents Contents... 1 1 Introduction... 4 1.1 Safety Information... 5 Getting Started... 8.1 Product Overview... 8. Part names and their functions...

More information