INTERNET EDI SERVER Bruce Marton Sr. Systems Analyst The University of Texas at Austin.

Slides:



Advertisements
Similar presentations
EDI – an overview Linda SatherCheryl Kolbe Oregon State UniversityConsultant Office of the Registrar.
Advertisements

Cryptography Chapter 7 Part 4 Pages 833 to 874. PKI Public Key Infrastructure Framework for Public Key Cryptography and for Secret key exchange.
CUMREC 2005 Creating A Suite of Convenience Services for Clients and Developers Deb Nelson – Systems Analyst Larry Newhouse – Information Systems Leader.
PGP Overview 2004/11/30 Information-Center meeting peterkim.
Lesson 7: Business, , & Personal Information Management
1 Pertemuan 12 Security Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Information Networking Security and Assurance Lab National Chung Cheng University Guidelines on Electronic Mail Security
Chapter 15 – Part 2 Networks The Internal Operating System The Architecture of Computer Hardware and Systems Software: An Information Technology Approach.
Henric Johnson1 Electronic mail security Henric Johnson Blekinge Institute of Technology, Sweden
Security Jonathan Calazan December 12, 2005.
1 The Functional to Technical Overview of Implementing Electronic Data Exchange Date: Tuesday July 16, :15 am - 10:30 pm Salon 1 Session ID: 1556.
Make your messaging reliable use it Messaging. A single and global solution Send, receive and process any type of message through the appropriate channel.
Proprietary and Confidential Preferred by Students ►24/7 online access ►Easy ordering and tracking ► delivery confirmation Online Ordering and Delivery.
Proprietary and Confidential 1. College Registration 2. College as Receiver 3. College as Sender Postsecondary Demonstrations.
Lecture 9: Security via PGP CS 436/636/736 Spring 2012 Nitesh Saxena.
SMUCSE 5349/49 Security. SMUCSE 5349/7349 Threats Threats to the security of itself –Loss of confidentiality s are sent in clear over.
Electronic Data Interchange Computer readable forms for business documents such as invoices, purchase orders, delivery notes needed in B2B e- commerce.
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 12 Electronic Mail.
Networking Basics TCP/IP TRANSPORT and APPLICATION LAYER Version 3.0 Cisco Regional Networking Academy.
 TCP/IP is the communication protocol for the Internet  TCP/IP defines how electronic devices should be connected to the Internet, and how data should.
Copyright 2003 CCNA 1 Chapter 9 TCP/IP Transport and Application Layers By Your Name.
© McLean HIGHER COMPUTER NETWORKING Lesson 1 – Protocols and OSI What is a network protocol Description of the OSI model.
5/9/2000 EDI Messaging on ANX ® Presented by: Gary M. Morin BCE Emergis & Co-Chair Message Routing WG.
FERPA Concerns for Sending and Honoring Electronic Requests for Student Transcripts SACRAO 2012 Tuesday, February 14 Covington, Kentucky SPEEDE – A Professional.
Chapter 6 Electronic Mail Security MSc. NGUYEN CAO DAT Dr. TRAN VAN HOAI 1.
Postfix Mail Server Postfix is used frequently and handle thousands of messages. compatible with sendmail at command level. high performance program easier-
John O’Connell SVP, Business Development Company Overview & Service Offerings.
Using secure methods for sending and receiving files SPEEDE Server SPEEDE Users’ Group May 4, 2007 David Stallcup.
1 Chapter 5 Electronic mail security. 2 Outline Pretty good privacy S/MIME Recommended web sites.
Internet Security. 2 PGP is a security technology which allows us to send that is authenticated and/or encrypted. Authentication confirms the identity.
Proprietary and Confidential 1. College Registration 2. College as Receiver 3. College as Sender.
XML in Higher Education Bruce Marton, The University of Texas at Austin Student Information Systems.
1 Security Protocols in the Internet Source: Chapter 31 Data Communications & Networking Forouzan Third Edition.
Chapter 15 – Part 2 Networks The Internal Operating System The Architecture of Computer Hardware and Systems Software: An Information Technology Approach.
Facilities for Secure Communication The Internet is insecure The Internet is a shared collection of networks. Unfortunately, that makes it insecure An.
AUSTIN INTERNET SERVER Bruce Marton Sr. Systems Analyst The University of Texas at Austin.
Application Security: (April 10, 2013) © Abdou Illia – Spring 2013.
SARVAJANIK COLLEGE OF ENGINEERING & TECHNOLOGY. Secure Sockets Layer (SSL) Protocol Presented By Shivangi Modi Presented By Shivangi ModiCo-M(Shift-1)En.No
CertifiedMail …when privacy matters ™. What CertifiedMail empowers you to achieve Secure …simplified. End-to-end secure messaging From any sender.
Security Using PGP - Prajakta Bahekar. Importance of Security is one of the most widely used network service on Computer Currently .
7.6 Secure Network Security / G.Steffen1. In This Section Threats to Protection List Overview of Encrypted Processing Example.
2/19/2016clicktechsolution.com Security. 2/19/2016clicktechsolution.com Threats Threats to the security of itself –Loss of confidentiality.
Security By Meenal Mandalia. What is ? stands for Electronic Mail. much the same as a letter, only that it is exchanged in a different.
VIRTUAL SERVERS Chapter 7. 2 OVERVIEW Exchange Server 2003 virtual servers Virtual servers in a clustering environment Creating additional virtual servers.
CIW LESSON 7 PART A. INTRODUCTION TO BUSINESS ELECTRONIC MAIL The use of has given rise to the term ______________________, which is a slang term.
NAME OF STUDENT: Akshay Lal Ranjan REGD NO: DATE : 21/09/12 SLID NO: 01 UNDER THE GUIDENCE OF E R. GAURI SHANKAR PATNAIK LECR IN E & TC DEPT.
Texas Education Agency ApplyTexas/SPEEDE Conference June 2016.
Chapter 5a - Pretty Good Privacy (PGP)
Electronic mail security
StudentTranscripts Service Overview
Date: Tuesday, July 11, :00 – 9:00 am Bayside A Session ID: 6630
CIW Lesson 7 Part A Name: _______________________________________
Academic Achievement Record
StudentTranscripts Service Overview
StudentTranscripts Service Overview
StudentTranscripts Service Overview
EDI – an overview Linda Sather Cheryl Kolbe
StudentTranscripts Service Overview
Chapter 15 – Part 2 Networks The Internal Operating System
StudentTranscripts Service Overview
SAU OPT STEM Extension Mailing Instructions
Immediate Past Chair, SPEEDE Committee
StudentTranscripts Service Overview
Data Transport Standard (DTS)
Protocol Application TCP/IP Layer Model
Unit 8 Network Security.
Module 4 System and Application Security
EDI Systems What They Are and Why They Matter
Presentation transcript:

INTERNET EDI SERVER Bruce Marton Sr. Systems Analyst The University of Texas at Austin

OUTLINE I.WHY the EDI Server was created II.SPEEDE/ExPRESS Overview III.WHO can use it IV.HOW to Register V.Security on the EDI Server VI.Update on recent activity VII. Q&A

Why build the EDI Server Simple yet secure way to send SPEEDE/ ExPRESS transcripts via the Internet How to transport –FTP – with attachments –Value Added Network

SPEEDE/ExPRESS Student Academic Record (Transcript) –PostSecondary –High School Were using the TXETN Launched the EDI Server in 1995

Technologies to Support FTP SMTP with MIME Encryption (PGP) or ‘in the clear’

Constiuencies Low Tech –Paper-based systems –Access to a Web Browser –DOS based translator - Quick ‘N Easy High(er) Tech –Integrated Admin systems –Unix, FTP support

Daily EDI Activities FTP to Northwest U. before 9 a.m. FTP to Mountain School District. Encrypt first with their PGP public key. Send transcripts as MIME attachments to Virginia College. FTP to Loyola U. Records must be terminated with carriage return & line feed.

Benefits of a central server Many to Many Sending –One packet – many destinations Receiving –One packet - many senders 3 rd Party trust model –Maintain PGP key ring

SPEEDE TRANSCRIPT ISA! !22!003658! !22!003615! !T\ ST!130!0001\ REF!SY! \ DMG!D8! !M\ SES!199901!1!!!SPRING SESSION 1999\ CRS!!4!A!!!!!!!!!SPN!406!SPANISH I\ CRS!!3!B!!!!!!!!!HIS!302!TX HISTORY\

How to Register School name & code Contact name, address & phone # Delivery time Attach PGP public key (optional) Select FTP or MIME Specify line termination preference

SECURITY EDI Server on Dedicated Machine FTP is WRITE-ONLY access Logs are kept & reviewed notification sent upon receipt/transmission of files messages sent to system administrators if errors SPEEDE acknowledgement procedures

PGP - Pretty Good Privacy De-facto Internet standard Free to educational institutions Data Integrity (against changes) Authenticity (digital signatures) Privacy (no unauthorized viewing)

PGP-ENCRYPTED FILE ----BEGIN PGP MESSAGE---- Version: jkllhlwD/mVywpouwW87/3Jxoux/2onN Qjlj/Xux/23xo4qfvowc/xP4erBp/QWxkjlkj/ Ekj/lkjlkjmxTourxrwer/werVEmlou4lQV3/ EzuZ4pxwAcy8e/pwK2wervpouer+Oq4vw U/ouwR3j9T5Z/i8MdP3/ouQ4ouXnV/48Uc BYpo9+siVe/Pa7jdXlNwk4o/Wjh4xq73F/ M7q ----END PGP MESSAGE----

What EDI server does not do Translate Interpret Enforce Snoop

Why does Texas do this Cost Savings –Cheaper to transmit –Cheaper to receive Economies of Scale Collaboration through Standards

National Initiatives AACRO support of the server International Interest XML support

Texas Initiatives Texas Common Application –TS 189 Quick ‘N Easy Windows Visual Basic

REGISTRATION SUMMARY 700 Registered Schools in 32 States Some Counts by State: –Texas –Iowa –South Carolina - 36 –North Carolina - 22 –California - 27 –Oklahoma - 22

ACTIVITY 04/ / ,000 transcripts delivered (9% increase) 200,000 apps. for admission (48% increase) 1,000,000 total transactions (36% increase)

Registrant Totals 700 registrants – 600 actively trading with partners 40 new registrants since April new registrants in British Columbia; 3 in New Jersy; 3 in Nebraska; 2 in Indiana; 2 in Oregon; 1 in Wyoming

EDI Server Registrant List Arizona State University AZ Carole Andres University of Phoenix AZ David Goldberg

REGISTRATION & REPORTS