+ All Categories
Home > Documents > CONTACT NG...with the RSA algorithm (key length is 2048) or algorithm GOST R 34.10-2001, which is...

CONTACT NG...with the RSA algorithm (key length is 2048) or algorithm GOST R 34.10-2001, which is...

Date post: 24-Jun-2020
Category:
Upload: others
View: 1 times
Download: 0 times
Share this document with a friend
43
MOSCOW February 2016 CONTACT NG ADMINISTRATOR’S GUIDE
Transcript
Page 1: CONTACT NG...with the RSA algorithm (key length is 2048) or algorithm GOST R 34.10-2001, which is certified to the FSB CIPF «MesagePRO 3.2» of CJSC "Signal-COM". Working with signatures

MOSCOW February 2016

CONTACT NG

ADMINISTRATOR’S GUIDE

Page 2: CONTACT NG...with the RSA algorithm (key length is 2048) or algorithm GOST R 34.10-2001, which is certified to the FSB CIPF «MesagePRO 3.2» of CJSC "Signal-COM". Working with signatures

CONTACT NG Administrator’s Guide

1

INDEX

1. Introduction ............................................................................................................... 3

1.1. Requirements for computer hardware, operating systems, network connections and Human Administrator. ....................................................................................................... 3

1.2. Cryptographic protection of information. ........................................................................ 3

1.2.1. Protection from unauthorized viewing of traffic information. 3

1.2.2. Information protection against unauthorized changes. 3

1.3. Conditions use ................................................................................................................... 4

2. Selection of the circuit construction of the system of the participant ................. 5

3. Installation of the system ......................................................................................... 6

3.1. The distribution ................................................................................................................. 6

3.2. Installation of application server ...................................................................................... 6

3.2.1. Configuring Application Server. 6

3.3. Installing the client on a single computer ...................................................................... 11

3.3.1. Configuring client 12

3.3.2. Installing the client to other computers. 14

3.3.3. Installing the client on a terminal server. 14

4. Setting up and testing of installed system ............................................................ 15

4.1. Testing of the application server .................................................................................... 15

4.2. Testing the client ............................................................................................................. 15

5. Procedure for the move to the operating mode .................................................... 16

5.1. User registration .............................................................................................................. 16

6. System Settings ...................................................................................................... 17

6.1. User roles ......................................................................................................................... 17

6.1.1. General provisions 17

6.1.2. The general procedure for creating roles 17

6.1.3. Creating a new role 18

6.1.4. Editing a role 21

6.1.5. Remove a role 21

6.1.6. Creating a role that gives the right to administer within multidivisional bank 22

6.2. Creating and updating user data .................................................................................... 22

6.2.1. Entering a new user account 23

6.2.2. Change user account 25

6.2.3. Setting the user to prevent the system from working. 25

6.3. Configuring System Settings .......................................................................................... 25

6.4. Setting restrictions when making transactions ............................................................. 25

6.4.1. Enter the new limit 26

6.4.2. Change restrictions 27

6.4.3. Removing restrictions 27

6.5. Setting limits (limit the size of liabilities) by the Participant ........................................ 27

6.5.1. Enter the new limit 27

6.5.2. Changing the limit 29

6.5.3. Removing the limit 29

7. Integration with the applications of participants .................................................. 30

Page 3: CONTACT NG...with the RSA algorithm (key length is 2048) or algorithm GOST R 34.10-2001, which is certified to the FSB CIPF «MesagePRO 3.2» of CJSC "Signal-COM". Working with signatures

CONTACT NG Administrator’s Guide

2

7.1. Setting file upload options .............................................................................................. 30

7.2. Setting the integration of transmitted packets of information ..................................... 32

7.2.1. Setup and features of DCOM integration 33

7.2.2. Setup and features of integration of HTTP and SOAP server 34

8. Description of the interface and work rules .......................................................... 35

8.1. Entering numerical information ...................................................................................... 35

8.2. Entering and updating dates .......................................................................................... 35

8.3. Mandatory and optional fields ........................................................................................ 36

8.4. Working with Tables ........................................................................................................ 36

8.5. Working with fields filled from directories ..................................................................... 37

8.6. Working with multiple windows...................................................................................... 37

9. Appendix №1. List Contact NG landing fields. ..................................................... 38

Page 4: CONTACT NG...with the RSA algorithm (key length is 2048) or algorithm GOST R 34.10-2001, which is certified to the FSB CIPF «MesagePRO 3.2» of CJSC "Signal-COM". Working with signatures

CONTACT NG Administrator’s Guide

3

1. Introduction

This guide is intended for staff members of the International system of remittances and payments CONTACT, responsible for the installation and configuration of software «CONTACT NG» - system administrators.

In the area of responsibility of the administrator of the system include:

Installation of the software.

Configuration software.

Software Testing.

Entering and updating user accounts system.

The developers have taken all the necessary steps to documentation fully consistent with the implementation of the program was clear and easy to use.

Comments and suggestions for documentation please send an e-mail to [email protected].

1.1. Requirements for computer hardware, operating systems, network connections and Human Administrator.

Computer Pentium III and above, with a RAM of 512 MB, with the presence of 100 megabytes of free disk space.

Operating system: Windows 2000 Workstation, Windows2000 Server, Windows XP, Windows 2003 server, Windows 7.

The computer must be installed MS Windows installer version 2.0 and higher.

Install the system must be a member of the local group «Administrators» (administrator) of the target computer.

You must have permission to read and write to the directory in which the server part of the system is installed (c: \ Program Files \ Contact NG Server) - the Administrator account and members of the local group System. Write permissions to the directory where you installed the client part, must have a user starts the client application.

A network connection to the server Operating CONTACT Center for testing to address https://enter.contact-sys.com should be available through the port in 2221, and to work on the address https://enter.contact-sys.com port 443 must be provided skipping SSL-traffic.

The capacity of the Internet channel between the participant and the Operating CONTACT Center should be at least 256 kbit / s, for comfortable work at least 512 kbit / s.

The network must operate DNS-server.

Ability to work through a proxy-server

Minimum screen resolution of 800x600 workstation.

1.2. Cryptographic protection of information.

1.2.1. Protection from unauthorized viewing of traffic information.

The connection between the server application and operating center is carried over SSL. The transmitted information is encrypted and protected against unauthorized reading person.

The connection between the application server and the client workstation is possible both on the open channel without traffic protection, and over SSL.

1.2.2. Information protection against unauthorized changes.

Information about financial transactions shall be signed by a digital signature, made in accordance with the RSA algorithm (key length is 2048) or algorithm GOST R 34.10-2001, which is certified to the FSB CIPF «MesagePRO 3.2» of CJSC "Signal-COM".

Working with signatures executed on the server application. Cryptographic keys are located on the application server.

Page 5: CONTACT NG...with the RSA algorithm (key length is 2048) or algorithm GOST R 34.10-2001, which is certified to the FSB CIPF «MesagePRO 3.2» of CJSC "Signal-COM". Working with signatures

CONTACT NG Administrator’s Guide

4

1.3. Conditions use

Prior to using the program administrator CONTACT NG should do the following:

ensure that the technical and overall software workstation allows the use of a program in this mode;

install, configure and test the functionality of the workplace;

registered users of the workstation, assign them names, passwords, and the necessary rights (roles);

announce his specific user credentials ("Point Code", "username", "password");

instruct the user on the list of the available operations and inaccessible to him, as well as for emergency measures;

for convenience to create a desktop shortcut to the start screen of the program file, and instruct you on the procedure for launching the workplace.

User is obliged to:

have the skills to work with a computer running MS Windows operating system;

be able to perform common operations on the launch and management programs, as well as data entry and editing using a keyboard and mouse;

know their credentials ("Point Code", "username", "password");

know the duties and rights;

reading this user manual in full.

Page 6: CONTACT NG...with the RSA algorithm (key length is 2048) or algorithm GOST R 34.10-2001, which is certified to the FSB CIPF «MesagePRO 3.2» of CJSC "Signal-COM". Working with signatures

CONTACT NG Administrator’s Guide

5

2. Selection of the circuit construction of the system of the participant

Each participant of the system can independently determine under what scheme it effectively deploy and organize the interaction with the operating center of the CONTACT.

The system can be installed on one computer, and organized the work of users with multiple computers on the internal network within the party system.

The Figure 1 shows the options for the deployment of the system and interact with the operating center of the CONTACT. User can organize the work of various departments like one of the proposed schemes, and in any combination thereof.

Application server

Application server

User workstation

User workstation

and

Application server

Operations Center

CONTACT

Administrator workstation

Administrator workstation

User workstation

Remote workstation user

Fig. 1. The scheme of the system participants

Page 7: CONTACT NG...with the RSA algorithm (key length is 2048) or algorithm GOST R 34.10-2001, which is certified to the FSB CIPF «MesagePRO 3.2» of CJSC "Signal-COM". Working with signatures

CONTACT NG Administrator’s Guide

6

3. Installation of the system

3.1. The distribution

The Contact NG distribution includes:

NG Server.exe. - Installer application server. The distribution server includes a test encryption keys, the server is engaged in sending messages in the operating center and receiving messages from the operating center, and a program for managing encryption keys and configuration server.

NG Client.exe - the installer of the Client - a program that provides a user interface.

ATTENTION!

For Windows 7 it is recommended to turn off UAC (User Access Control), as well as the client and server to establish Contact NG Administrator.

3.2. Installation of application server

To install the application server:

Copy to any folder in your computer where you will install the application server file NGServer.exe

Start NGServer.exe.

This will start the installer application server. During installation, a dialog box select the language information to install software and an invitation to the installation. The user can change the language in which the dialog is displayed during installation of the system (English or Russian). No other user settings at the time of installation is not performed.

It installs in the directory defined by the administrator during the installation process. (By default, "\Program Files\Contact NG Server\".)

After successful installation of the application server in the list of system services appears service “Contact NG Server”.

3.2.1. Configuring Application Server.

To interact with the server CONTACT system uses the HTTP protocol and port 2221 - to test and 443 to work.

To configure the application server, you must run the server administrator of the "Start" menu - "Programs» - «Contact NG» - «Contact NG Server Config».

Attention. To work correctly, run the «Contact NG Server Config» should be an administrator.

3.2.1.1. Setting "Trasport" tab

In the "Trasport" tab:

Choose the language to be used in the application server (for example, logging queries Operations Center). By default - "Russian".

Choose the configuration ("Select configuration"). By default - "Test configurate". Changing this setting will automatically change the link to access Operations Center.

If necessary, enter the address and port for the proxy server.

Page 8: CONTACT NG...with the RSA algorithm (key length is 2048) or algorithm GOST R 34.10-2001, which is certified to the FSB CIPF «MesagePRO 3.2» of CJSC "Signal-COM". Working with signatures

CONTACT NG Administrator’s Guide

7

Fig. 1. Settings "Transport” tab

If the connection is via Proxy-server, you need to configure:

Proxy-Server - address Proxy-server.

Proxy Port - the port on which should refer to the Proxy-server

If Proxy-server requires authentication you must have a user name: User- user name (Login), on whose behalf the application server will access the Proxy-server; Password - the password to access.

URL - the address to connect to the system for operations Contact

To “Test configurate” and “Work configurate” URL is automatically set. For custom configurations are given the opportunity to enter the address manually.

3.2.1.1. Setup "Crypto” tab

On the "Crypto" configured encryption settings (if you are working in test mode, this tab is not required to make changes):

Fig. 2. Settings of the "Crypto" tab

CA Path - the path to the CA certificates.

Cert Path - the path to the public key file.

Page 9: CONTACT NG...with the RSA algorithm (key length is 2048) or algorithm GOST R 34.10-2001, which is certified to the FSB CIPF «MesagePRO 3.2» of CJSC "Signal-COM". Working with signatures

CONTACT NG Administrator’s Guide

8

Crl Path - the path to the Certificate Revocation.

Device of Private Key storing - the choice between a directory on the drive and the device eToken PRO

Private Key - the full path and file name of your private key.

Service Path - the path to the file rand.opq - for the random number generator. In the case of storing the private key on the device eToken PRO is enough to specify the path to the key medium. For RSA keys refers to the directory with key information.

ATTENTION!

In the case of storing the private key on the device eToken PRO, you must install a set of drivers and additional tools that can work with electronic keys eToken (http://www.aladdin-

rd.ru/support/download/463/)

Abonent - file name of your public key in the directory “Cert Path".

Corresponders - the name of the public key file Operations Centre in the catalog “Cert Path".

Pack - for the most efficient operation of the application server, the default compression requests. If necessary, the package can be disabled by setting the value of "Pack" in "Without Pack".

3.2.1.2. Settings "Service“tab

On the "Service" parameters can be configured application server:

Login, Password - Account settings, under which the service is running. If these parameters are not filled, the service will run under the system account.

Path Log - the path to the connection protocol and query client.

The port on which the service.

Time Out - timeout disconnection of the client to the server application (the "Timeout"). This value is in milliseconds.

If you want to conduct a more detailed protocol connections and query client must check the box "Extended Log".

Secure Server (SSL). This flag is set in the case of SSL-connection between client and server. It is possible the use of session keys (for setting the checkbox) and existing key client and server (used to adjust the field "Setting SSL», located on the tab below)

Enabling SSL (Secure Sockets Layer) connection ensures secure transmission (data in encrypted form).

Using the session key only provides secure transfer of data, but does not allow to implement client authentication on a server using SSL client certificates.

Using SSL Certificates allows for authentication of clients on a server using SSL client certificates.

To implement the authorization process for an SSL certificate is required:

Create your own trusted certificate (Certificate Authority) in the format of PEM, to using it to sign and validate client certificates.

Create a server certificate in the format of PEM, signed by a trusted certificate for installation on a server.

Create client certificates in the format of PEM, signed by a trusted certificate, for onward transmission to their customers.

Implies that the employee performing the setting of the program, at least superficially familiar with concepts such as a certificate, the private key, certificate signing, etc.

Below is an example of the implementation of the project on the basis of the use openssl (http://www.openssl.org).

Creating your own self-signed trusted certificate.

Page 10: CONTACT NG...with the RSA algorithm (key length is 2048) or algorithm GOST R 34.10-2001, which is certified to the FSB CIPF «MesagePRO 3.2» of CJSC "Signal-COM". Working with signatures

CONTACT NG Administrator’s Guide

9

Own trusted certificate (Certificate Authority - hereinafter CA) needs to sign server and client certificates and to verify them with the authorization of the client server. Use the following command creates a private key and self-signed certificate.

openssl req -new -newkey rsa:1024 -nodes -keyout ca.key -x509 -days 732 -subj /C=RU/ST=Msk/L=Msk/O=My\ Inc/OU=Sale/CN=bla/[email protected] -out ca.crt

Arguments description:

req Request to create a new certificate.

-new Create a certificate request (Certificate Signing Request further CSR).

-newkey rsa:1023 Automatically creates a new closed-RSA key length of 1024 bits. The key length can be customized as you see fit.

-nodes Do not decrypt the private key (See. Note above).

-keyout ca.key The private key is stored in the file ca.key.

-x509 Instead of creating a CSR (see. Option -new) to create a self-signed certificate.

-days 732 The certificate 732 days. Size period can set up on your own. Do not enter a low value, since this certificate for signing client certificates.

-subj /C=RU/ST=Msk/L=Msk/O=My\ Inc/OU=Sale/CN=bla/[email protected]

Certificate data, parameter = value pairs are listed by '/'. Characters in the parameter value may be "be cut off" with a backslash "\", for example, «O = My \ Inc». You can also take the value of the argument in quotation marks, for example, -subj «/ xx / xx / xx».

Parameters description:

С A two-character ISO-country code (Country). The optional.

ST Region / State / Territory / republic / ... (State Name). Optional.

L The name of the city / village / ... (Locality Name). The optional.

O Organization name (Organization Name). Optional.

OU Department name (Organization Unit). Optional.

CN The name of the certificate to create server certificates used by the domain name of the site for the client certificates can be used anything (Common Name). Required. The maximum length of 64 characters.

-out ca.crt Certificate saved to file ca.crt.

emailAddress Postal address (E-mail address). Optional. The maximum length of 40 characters.

Optional parameters can be omitted. For example:

/C=RU/CN=blabla/[email protected].

As a result, the command will be two file ca.key and ca.crt. View details private key and certificate, you can use the command:

openssl rsa -noout -text -in ca.key (for a key)

openssl x509 -noout -text -in ca.crt (for a certificate)

Creating a server / client certificate

1) Preparing the configuration file and to sign certificates.

Create the configuration (edit an existing) a file named ca.config as follows:

[ ca ]

default_ca = CA_CLIENT # When you sign the certificates used section CA_CLIENT

[ CA_CLIENT ]

dir = ./db # Directory for official files

certs = $dir/certs # Directory for Certificates

new_certs_dir = $dir/newcerts # Directory for new certificates

database = $dir/index.txt # File Database signed certificates

serial = $dir/serial # The file containing the certificate serial number (in hexadecimal format)

certificate = ./ca.crt # CA Certificate File

Page 11: CONTACT NG...with the RSA algorithm (key length is 2048) or algorithm GOST R 34.10-2001, which is certified to the FSB CIPF «MesagePRO 3.2» of CJSC "Signal-COM". Working with signatures

CONTACT NG Administrator’s Guide

10

private_key = ./ca.key # CA private key file

default_days = 365 # The validity of the signing certificate

default_crl_days = 7 # Validity CRL

default_md = md5 # signature Algorithm

policy = policy_anything # The name of the section describing the data policy certificate

[ policy_anything ]

countryName = optional # optional - a sign that the parameter (country code) is not required

stateOrProvinceName = optional # - is optional parameter (Region)

localityName = optional # - is optional parameter (City (town))

organizationName = optional # - is optional parameter (name of organization)

organizationalUnitName = optional # - parameter is optional (division in the organization)

commonName = supplied # supplied - a sign that the parameter (certificate name) is required

emailAddress = optional # - not required

Create a directory structure and files corresponding to that described in the configuration file.

For example:

md db

md db\certs

md db\newcerts

copy nul db\index.txt

echo 01 > db\serial

2) Creating a server private key and certificate request (CSR).

To create a signed server certificate you must first create a certificate request to its subsequent signature. Command arguments are completely analogous to the arguments used to create the self-signed trusted certificate, but there is no option -x509.

openssl req -new -newkey rsa:1024 -nodes -keyout server.key -subj /C=RU/ST=Msk/L=Msk/O=Inc/OU=Web/CN=usr/[email protected] -out server.csr

As a result, the command will be two file server.key and server.csr. View details private key and certificate request (CSR) you can use the command:

openssl rsa -noout -text -in server.key (for a key)

openssl req -noout -text -in server.csr (for a certificate)

3) The signature of the certificate request (CSR) using a trusted certificate (CA).

When you sign the request using the parameters specified in the file ca.config (see. 2.1.)

openssl ca -config ca.config -in server.csr -out server.crt -batch

Arguments description:

Ca Signature request using the CA.

-config ca.config Use the configuration file ca.config.

-in server.csr CSR is in server.csr file

-out server.crt Save the certificate file server.crt

-batch Do not ask for confirmation of the signature.

As a result, the command appears the file server certificate server.crt. View the certificate data, you can use the command:

openssl x509 -noout -text -in server.crt

4) Creating a client private key and certificate request (CSR).

To create a signed client certificate you must first create a certificate request to its subsequent signature. Command arguments are completely analogous to the arguments used to create the self-signed trusted certificate, but there is no option -x509.

openssl req -new -newkey rsa:1024 -nodes -keyout client01.key -subj /C=RU/ST=Msk/L=Msk/O=Inc/OU=Web/CN=usr/[email protected] -out client01.csr

Page 12: CONTACT NG...with the RSA algorithm (key length is 2048) or algorithm GOST R 34.10-2001, which is certified to the FSB CIPF «MesagePRO 3.2» of CJSC "Signal-COM". Working with signatures

CONTACT NG Administrator’s Guide

11

As a result, the command will be two file client01.key and client01.csr. View details private key and certificate request (CSR) you can use the command:

openssl rsa -noout -text -in client01.key (for a key)

openssl req -noout -text -in client01.csr (for a certificate)

5) The signature of the certificate request (CSR) using a trusted certificate (CA).

When you sign the request using the parameters specified in the file ca.config (see. 2.1.)

openssl ca -config ca.config -in client01.csr -out client01.crt -batch

Arguments description:

ca. Signature request using the CA

-config ca.config Use the configuration file ca.config

-in client01.csr CSR is in client01.csr file

-out client01.crt Save the certificate file client01.crt

-batch Do not ask for confirmation of the signature

As a result of the command client01.crt, the client certificate file appears. You can view the certificate data with the help of the command:

openssl x509 -noout -text -in client01.crt

WWW-Authenticate. On the application server, it is possible to authenticate the client to the HTTP protocol level.

If the parameters WWW-Authenticate field "Login" and "Password" are filled, similar values should be installed on each client workstation.

To set the username and password on the client workstation must run ClientConfig.exe; then fill in the fields "Username" and "Password".

Fig. 3. Settings tab "Service”

To save the settings, click «OK», while service «Contact NG Server» will be restarted automatically.

3.3. Installing the client on a single computer

To install the client part of the system:

Copy to any folder in the computer file Client.exe

Start NGClient.exe

This will start the installer client. During installation, a dialog box select the language information to install software and an invitation to the installation. The user can change the language in which the dialog is displayed during installation of the system (Russian or English).

Page 13: CONTACT NG...with the RSA algorithm (key length is 2048) or algorithm GOST R 34.10-2001, which is certified to the FSB CIPF «MesagePRO 3.2» of CJSC "Signal-COM". Working with signatures

CONTACT NG Administrator’s Guide

12

It installs in the directory defined by the administrator during the installation process. Default "\ Program Files \ Contact NG Client \".

Once installed on the desktop icon appears «Contact NG Client» to start the client application.

3.3.1. Configuring client

To configure the client side, you must run ClientConfig.exe (from the catalog, which was set Client):

3.3.1.1. Configuring client - Tab "General"

Fig. 4. The form of the client settings (Base)

To change the interface language of the client change the "Language".

If the application server running on another machine or on a different port, change the values for "Host" and "Port".

Fill in the "Username" and "Password" if they are required to access the host.

To test the connection with the client's operational center of Contact, press "Check of communication with CONTACT»

3.3.1.2. Configuring client - Tab "Secure (SSL)"

CONTACT NG allows you to organize SSL protected link between a client workstation and server applications.

To organize encrypted channel you need to go to the tab "Secure (SSL)"

Fig. 5. The form of the client settings (Secure (SSL))

and turn on the flag "Secure Server (SSL)"

It will be available to sign “Use session keys” enabled by default.

Page 14: CONTACT NG...with the RSA algorithm (key length is 2048) or algorithm GOST R 34.10-2001, which is certified to the FSB CIPF «MesagePRO 3.2» of CJSC "Signal-COM". Working with signatures

CONTACT NG Administrator’s Guide

13

If you plan to use existing keys, turn off the flag "Use session keys".

You will have a field setting keys.

Fig. 6. The form of the client settings (Secure (SSL))

Fill setting keys.

ATTENTION! In the case of SSL-connection between the application server and the client workstation to

configure SSL server and client side must be absolutely identical.

3.3.1.3. Configuring client - tab "Upload file"

Fig. 7. The form of the client settings (Upload file)

If you must carry a file unload or incoming outgoing transfers to the client workstation, install a sign "Unload data transfers in the file" on the "Upload transfers to file" and configure the directories for upload. The format of the uploaded file is described in Sec. 7.1 of this manual.

3.3.1.4. Configuring client - tab "Add device"

To configure additional hardware tab "Add device".

Page 15: CONTACT NG...with the RSA algorithm (key length is 2048) or algorithm GOST R 34.10-2001, which is certified to the FSB CIPF «MesagePRO 3.2» of CJSC "Signal-COM". Working with signatures

CONTACT NG Administrator’s Guide

14

Fig. 8. The form of the client settings (Add device)

To select the current device Scanner or Camera, select the scanner or camera in the "Scan and foto" from the list, in the case of several identical cells must also specify the number of the device.

To use cash machines (CCM) when making outgoing transfers CONTACT section "cash machines" check the box "Use cash machine".

If you use your computer more CMC and the need to resort to a machine other than the default in the driver properties, select it in the list. Otherwise, it is recommended to leave the option "current device".

ATTENTION! To use the CMC in the product ContactNG need to download and install on their own "ATOL:

Driver CMC" from the manufacturer. Free use of the driver is only a part of the produced equipment by ATOL, for use in other equipment from the list of supported, you must purchase

a license. For information on using the driver can be found on the manufacturer's website: http://www.atol.ru/software/special/driver/kkm/

3.3.2. Installing the client to other computers.

The developers of a simplified procedure for the installation of the client to other computers. To do this, the entire directory containing the previously configured client workstation is copied on the computer with the full path and name of the directory.

3.3.3. Installing the client on a terminal server.

If all users will be working with the terminal server, for each workstation installation of client part is made in a separate directory.

Page 16: CONTACT NG...with the RSA algorithm (key length is 2048) or algorithm GOST R 34.10-2001, which is certified to the FSB CIPF «MesagePRO 3.2» of CJSC "Signal-COM". Working with signatures

CONTACT NG Administrator’s Guide

15

4. Setting up and testing of installed system

4.1. Testing of the application server

Configuring the application server includes a cryptographic system setup and configuration of the server itself.

Cryptographic system after installation is already configured to GOST test keys.

Configuring the application server may be required if you are connecting to the operating center via Proxy-server.

To test the correctness of the application server configuration and deployment of key information necessary:

Start Server Administrator from the menu "Start" - "Programs" - "Contact NG" - "Contact NG Server Config".

On the tab "Transport" click "Test Transport ". The system reports the test result.

On the tab "Crypto" click "Test Crypto ". The system reports the test result.

4.2. Testing the client

To test the client you need:

Start ClientConfig.exe (from the directory, which was set Client).

Press the "Check communication with CONTACT». The system reports the test result.

Page 17: CONTACT NG...with the RSA algorithm (key length is 2048) or algorithm GOST R 34.10-2001, which is certified to the FSB CIPF «MesagePRO 3.2» of CJSC "Signal-COM". Working with signatures

CONTACT NG Administrator’s Guide

16

5. Procedure for the move to the operating mode

Before moving into operation you need:

Make a key.

Put in place the key.

Contact NG system to be deployed in the network

Testing of the system is completed.

Staff is trained to work in the system.

ATTENTION! Switch-on time in the operating mode must be agreed with the technical support of CONTACT

system

To transfer the system into operation is necessary:

Stop users work in the system.

Start program «Contact NG Server config».

On the "Transport" tab in the "Select configuration" field select "Work configurate”.

On the tab "Crypto" to adjust the ways to work cryptographic keys. To check the encryption click "Test Cripto".

On the tab "Service" push buttons sequentially: "Stop Service", and "Start Service".

Click «OK».

5.1. User registration

At the beginning of every user must go through the authorization process. For this:

Start program CONTACT NG. On the screen you will be prompted for user authentication;

Fig. 9. Форма авторизация пользователя

Enter in the appropriate fields personal credentials - "Point Code", "User’s Name", "Password";

Click “Login” or press «Enter».

If user authorization is successful, the program will remember the "Point Code". In subsequent runs the "Point Code" will be filled, and the user need only enter the "User’s Name" and "Password".

Page 18: CONTACT NG...with the RSA algorithm (key length is 2048) or algorithm GOST R 34.10-2001, which is certified to the FSB CIPF «MesagePRO 3.2» of CJSC "Signal-COM". Working with signatures

CONTACT NG Administrator’s Guide

17

6. System Settings

6.1. User roles

6.1.1. General provisions

In CONTACT NG there is the possibility of organizing access rights of users in the system areas of data visibility based on Participant's administrative structure and functionality available to users.

Administrative structure of the party specified in the operations center on the basis of the data member. The structure has 3 levels: Participant (Bank), branch, division (service point). This system provided that the participant is simultaneously a branch and service point. A branch is also the point of service.

Such description of the administrative structure allows the flexibility to configure user rights.

The availability of menu items and actions determined by the user roles mechanism.

When using the system each user role.

3 types of roles descriptions provided in the System:

Template (base role). It predefined in the operations center role, which determines the maximum potential users. It designed to create custom roles. It includes templates administrator, accountant, cashier and customer support (operator).

System role. It created in the operations center based on the role of the template. For these roles, the visibility is defined as part of separation. An exception is the role of the "customer support", which has access to the incoming transfers as defined by the participant (bank).

The user role. Roles by participants based on templates, system roles or other user roles.

Set rights for a role that is based on the system role may be restricted if necessary. If the role is created based on a template, a set of rights that can be extended for her.

The system provides the following roles:

Administrator - available management roles, user accounts and change organization details.

Operator – (customer support) available functions for registration and transfer of operations to the cashier for payment or payment.

Cashier - only available cash transactions.

Accountant - only reports available.

Chief Accountant - available for viewing all of the operation, reports, and account statement.

ATTENTION! System roles are limited by data access framework offices!

Only a user with its assigned role “Administrator” can create their own role, to introduce the accounts of employees and assign employees to roles.

ATTENTION! To determine the authority for the entire organization role should be based on an appropriate

template.

An administrator with the authority for the entire organization can create a role of the Administrator of the branch, which enable administrators to customize their own for their own branch of the role, which will be distributed to the branch and department.

ATTENTION! A user with the Administrator role can perform the branch setup user rights only to its branch

offices and subordinate to him!!

6.1.2. The general procedure for creating roles

To create a role in the initial setup of the system, we recommend the following procedure:

Enter the system as supplied username admin.

Create a bank administrator, specifying field of vision - "within the bank/company".

Page 19: CONTACT NG...with the RSA algorithm (key length is 2048) or algorithm GOST R 34.10-2001, which is certified to the FSB CIPF «MesagePRO 3.2» of CJSC "Signal-COM". Working with signatures

CONTACT NG Administrator’s Guide

18

If you want to create the role of the chief accountant of the bank, the bank's accountant, bank teller, bank teller, specifying field of vision – « within the bank/company ».

Create the role of administrators of branches and offices, if necessary.

Create a user account with the role of administrator of the bank.

Complete the program work.

Log in to the program as an administrator of the bank under his login.

Create the accounts of branches and offices of administrators? if necessary.

Continue setting.

When you configure administrative roles, pay attention to the roles available to him - that is, the roles for which administrators will be able to enter user accounts.

6.1.3. Creating a new role

To create a new role, you need to select "Service" -> "User Roles" in main menu.

A form of user roles management opens.

Fig. 10. Form «User Roles»

Select a role, on the basis of which you will create a new role. This may be a pattern, a system role or a custom role.

Press the "Create role".

A form to create a new role opens.

Print a role name.

ATTENTION! To avoid confusion in determining the roles we recommended in the name of the role include

information that fully reflects its differences from existing similar roles.

The form contains several tabs.

In the "User Menu" available to the user are determined by main menu items.

Page 20: CONTACT NG...with the RSA algorithm (key length is 2048) or algorithm GOST R 34.10-2001, which is certified to the FSB CIPF «MesagePRO 3.2» of CJSC "Signal-COM". Working with signatures

CONTACT NG Administrator’s Guide

19

Available menu items should be marked.

Tab "Available roles" opens only when configuring Administrator role.

Note the roles that will be available to the administrator when creating new roles and establishment of user accounts.

In the tab "Access to Outgoing" and "i Access to Incoming” is defined records on transactions, which can be used by users for whom this role is assigned.

Page 21: CONTACT NG...with the RSA algorithm (key length is 2048) or algorithm GOST R 34.10-2001, which is certified to the FSB CIPF «MesagePRO 3.2» of CJSC "Signal-COM". Working with signatures

CONTACT NG Administrator’s Guide

20

Determine for each type of document that will be available to the user

no access - data not available.

entered by the user - only documents of this user are available.

within the office – department documents where the user works are available.

within the branch – branch documents where the user is working are available.

within the bank/company – all documents are available.

ATTENTION! When editing data visibility can only reduce the range of visibility!

Tab "Other rights" opens only when configuring Administrator role.

Page 22: CONTACT NG...with the RSA algorithm (key length is 2048) or algorithm GOST R 34.10-2001, which is certified to the FSB CIPF «MesagePRO 3.2» of CJSC "Signal-COM". Working with signatures

CONTACT NG Administrator’s Guide

21

The tab is defined, with accounts which users can work administrator.

Possible values:

no access - Work with user accounts is not available.

within the office - is allowed to work with accounts of all user of office.

within the branch – - is allowed to work with accounts of all user of branch.

within the bank/company – is allowed to work with accounts of all user of bank/company.

Click "OK” after installing all the roles settings. The form will close, and the new role appears in the list.

6.1.4. Editing a role

Editing of the roles is available in the form of in the form of "User Roles". This requires:

Select the desired role.

Press "Change".

Make the necessary settings in the opened form.

Press “ОК”.

Attention! Bold roles can not be edited.

6.1.5. Remove a role

Removal of the role is available in the form of "User Roles". This requires:

Select the desired role.

Press "Delete".

Press “ОК”.

Attention! Bold roles can not be edited.

Page 23: CONTACT NG...with the RSA algorithm (key length is 2048) or algorithm GOST R 34.10-2001, which is certified to the FSB CIPF «MesagePRO 3.2» of CJSC "Signal-COM". Working with signatures

CONTACT NG Administrator’s Guide

22

6.1.6. Creating a role that gives the right to administer within multidivisional bank

Creation is available in the form of "User Roles". This requires:

Choose the role of "Template of administrator »

Press the "Create role»

Ensure that the opened form under "Base role" written " Template of administrato”»

Print title role in the field "Role name" (in this case "Administrator of bank”).

Note the available menu items in the "User Menu" tab.

Note the roles in the tab "Available roles" that will be available to the administrator when creating new roles and creating of user accounts.

Select in field “User List” in the tab "Other rights"- "within the bank/company"

Press “ОК”.

6.2. Creating and updating user data

Each user must be logged in. For him as a user account must exist in the system.

User records are maintained for each service point. If the user is in different points of service, it must have an account for each point.

Page 24: CONTACT NG...with the RSA algorithm (key length is 2048) or algorithm GOST R 34.10-2001, which is certified to the FSB CIPF «MesagePRO 3.2» of CJSC "Signal-COM". Working with signatures

CONTACT NG Administrator’s Guide

23

Each user has a role in working with the system. Depending on the role, the system determines the user's authority, i.e. what actions and what documents are available to the user.

The user can perform more than one role at the same time.

Apply 2 Customer Service scheme:

“Two windows" - when one employee performs the primary customer service, registration of transactions (Operator), and receiving money serves another employee (Cashier)

"One window" - when the same employee performs the primary customer service, execution of operations and receive money (Operator, Cashier).

For users who simultaneously perform the role - Operator and Cashier, the system provided for actions aimed at facilitating their work.

If the employee will need to receive the report, then it should be the role of "Accountant".

To work with the user accounts click "Service" in the system main menu, и and select the "Users".

The "Customers" form appears. It lists all the registered system user accounts.

Fig. 11. The "Customers" form

In the left part of the form the organizational structure is reflected. By selecting a specific unit can be selected only those accounting records of employees who are assigned to the data division and its subordinate units.

If you select the top level of the organizational structure, will be displayed in all the bank accounts.

6.2.1. Entering a new user account

Attention! Ability to enter new users is available only to the Administrator.

Click "Add" to enter a new account.

Open entry form with the user's account card.

Page 25: CONTACT NG...with the RSA algorithm (key length is 2048) or algorithm GOST R 34.10-2001, which is certified to the FSB CIPF «MesagePRO 3.2» of CJSC "Signal-COM". Working with signatures

CONTACT NG Administrator’s Guide

24

Fig. 12. The user account card

Determine which unit will be assigned to a user input. To do this, click the down arrow. Open the organizational structure.

Fig. 13. The organizational structure

Where:

AFWS Head Office

|--AFWS — Branch «А»

| |--AFWS —department of the branch «A»

|--AFWT — Branch «B»

| |--AFWT —department #1 of the branch «B»

| |--AFWU — department #2 of the branch «B»

|--AFWV — Branch «C»

| |--AFWV —department of the branch «C»

Select the desired unit.

Enter the name of the employee, his login in the system password.

Determine its powers, noting what role or what combination of roles he will perform. For clarity, let it be endowed with the role, which was established on the basis of the role of the "Operator Template".

Page 26: CONTACT NG...with the RSA algorithm (key length is 2048) or algorithm GOST R 34.10-2001, which is certified to the FSB CIPF «MesagePRO 3.2» of CJSC "Signal-COM". Working with signatures

CONTACT NG Administrator’s Guide

25

If the role was defined area of visibility (access to incoming / outgoing) as "within the office", the reporting officer would have access to only translations of their department (For example AFWS).

If the role was defined area of visibility (access to incoming / outgoing) as "within the office", the reporting employee will have access to the translations branch (i.e. for AFWT branch will see AFWT and AFWU transfers).

If the role was defined area of visibility (access to incoming / outgoing) as "within the bank/company" the employee will have access to all bank transfers (i.e. for AFWS bank will see AFWS, AFWT, AFWU, AFWV transfers).

If the user needs to be forced to change your password when you first log into the system, turn on the feature "User must change password at next logon".

Press “ОК”.

Card form is closed and a new account will appear in the table.

6.2.2. Change user account

Select the account you want, and then click "Change".

Form appears of the user account card.

Make the necessary changes.

Press “ОК”.

6.2.3. Setting the user to prevent the system from working.

If you want to temporarily or permanently ban the user to operate the system, the possibility to block the user account.

Select the account you want, and then click "Change".

Form appears of the user account card.

Turn sign "blocked".

Press “ОК”.

Turn off the feature to "Block" for the lifting of the ban is necessary in the card account.

6.3. Configuring System Settings

The system provides configuration parameters that define the rules of the system in some modes or describing the values of some parameters for the subsequent output of the reports. These capabilities are only used by participants in the Russian Federation.

6.4. Setting restrictions when making transactions

The system provides the ability to impose restrictions on the amount of the transfer in the implementation of sending depending on the direction.

To configure the settings in the main menu of the system, click "Service" and select "Parameters of destinations".

The screen will display a form:

Page 27: CONTACT NG...with the RSA algorithm (key length is 2048) or algorithm GOST R 34.10-2001, which is certified to the FSB CIPF «MesagePRO 3.2» of CJSC "Signal-COM". Working with signatures

CONTACT NG Administrator’s Guide

26

Fig. 14. Form of reference restrictions on the amounts of transactions

6.4.1. Enter the new limit

Press the "Add" button. Form of the areas of limitation will appear.

Fig. 15. Form to create restrictions on directions

In the "Type of Sending Point" is defined for what set a limit: for the entire bank as a whole, to a branch or a specific department.

In the "Send Point" is defined branch or department for which the limits are set.

In the "Type of Pickup Point" determine the operation against any counterparties will act restriction.

Possible to set limits for the following types of recipients::

All participants of CONTACT - restrictions placed on all operations.

The CIS countries - will be limited to the operation of all the countries that were part of the Soviet Union, except the Baltic republics.

Country - The limit is set for operations in a specific country. By selecting this type of party, will be available to identify the specific field of the country.

All legal bodies - limits are set for all payments to legal entities.

Page 28: CONTACT NG...with the RSA algorithm (key length is 2048) or algorithm GOST R 34.10-2001, which is certified to the FSB CIPF «MesagePRO 3.2» of CJSC "Signal-COM". Working with signatures

CONTACT NG Administrator’s Guide

27

All collectors of credits - limits are set on all operations for the collection of loans and replenishment of accounts.

Set limits on the minimum and maximum possible amount of the transaction in the context of each currency. If the restrictions are not set or are not filled one of the fields, it is considered that there is no limit.

Press “ОК”.

6.4.2. Change restrictions

Choose the direction in which you need to make a change

Press the "Change" button. Form of adjustments restrictions on directions appears.

Make the necessary changes.

Press “ОК”.

6.4.3. Removing restrictions

If for some direction to lift restrictions completely:

Choose the direction in which restrictions should be removed

Press the "Delete" button.

Confirm the deletion.

6.5. Setting limits (limit the size of liabilities) by the Participant

The system provides the ability to input constraints (setting limits) on the size of the obligations on the part of the Participant.

Click "SERVICE" and select "Limits in the main menu of the system to configure the settings".

Participant limits setting form will appear on the screen:

Fig. 16. Participant limits settings form

6.5.1. Enter the new limit

Press the "Add" button. Entry restrictions on the directions form opens.

Page 29: CONTACT NG...with the RSA algorithm (key length is 2048) or algorithm GOST R 34.10-2001, which is certified to the FSB CIPF «MesagePRO 3.2» of CJSC "Signal-COM". Working with signatures

CONTACT NG Administrator’s Guide

28

Fig. 17. Setting limits on Participant divisions Form

In the "Department" is defined, for a set limit, for the entire bank as a whole, to a branch or to a specific department. This action can also be performed in the previous step, select in the left side of the form corresponding to the subdivision.

In the "Limit", specify how the installation limit (possible values - "day", "per unit operation").

In the "Limit currency", determine the currency in which the limit is set. In that case, if the participant can make transactions in multiple currencies, it is possible to install a separate limit for each currency.

In the "Limit amount" enter the size limit set by.

In "Service" field (only available when setting the limit for a single operation), select the type of service for which the set limit.

Press “ОК”.

Configured limits form will be displayed.

Fig. 18. Form with a list of configured limits

It is possible to set limits for the following types of units:

According to the bank - the limit set for all of the bank's outlets.

In the branch - limit set for each point of the branch.

Page 30: CONTACT NG...with the RSA algorithm (key length is 2048) or algorithm GOST R 34.10-2001, which is certified to the FSB CIPF «MesagePRO 3.2» of CJSC "Signal-COM". Working with signatures

CONTACT NG Administrator’s Guide

29

At the point - the limit set individually for point. In the event that set limits on the level of several different units to act will be the most severe limitation for a particular point.

6.5.2. Changing the limit

Choose a limit to which you want to make a change.

Press the "Change" button. Form of limits adjustments appears.

Make the necessary changes.

Press “ОК”.

6.5.3. Removing the limit

If any limit you want to remove, proceed as follows:

Select planned to remove the limit

Press the "Delete".

Confirm the deletion.

Page 31: CONTACT NG...with the RSA algorithm (key length is 2048) or algorithm GOST R 34.10-2001, which is certified to the FSB CIPF «MesagePRO 3.2» of CJSC "Signal-COM". Working with signatures

CONTACT NG Administrator’s Guide

30

7. Integration with the applications of participants

CONTACT NG System enables organizations to integrate with accounting systems of participants.

ATTENTION! By default, the integration of disabled.

It is available 2 different integration mechanisms:

Uploading files by application server at the time of operation.

Transfer of information packets from the server applications to integration application.

The mechanism of integration and its parameters are configured in the application server CONTACT NG.

To configure the application server, you must run the administrator “Contact NG server config” and go to the tab 'Integration'.

Transfers may have one of the following statuses in the course of their life cycle:

State code Description Comment

-1 Deleted The transfer deleted before sending to Operation Center

0 Paid by sender New transfer, payed by sender

1 Processing The transfer is processing by Operation Center

2 Suspended The Transfer has been suspended by Operation Center

3 Sent to Recipients Bank The transfer was sent to the Recipients Bank

4 Ready for payout The transfer is ready for payout to recipient

5 Waiting for payout The transfer is in process of payment to Recipient

6 Paid out to the Recipient Transfer has been paid out to recipient

7 Requested for cancellation Request for cancellation was sent to the recipient’s bank

8 Ready for returning CAncellation confirmation from the recipiemt’s bank was

received. Transaction is ready for cancellation

9 Ready for returning , awating cashout Ready for return transfer is is in process of refunding to -

sender

10 Returned Returned transfer was paid to sender

100 New money order New transfer, awaiting for printing documents

101 Awaiting payment New transfer, awaiting for payment by sender

7.1. Setting file upload options

Unloading takes place in text files encoded WIN-1251.

The file name has the following structure:

<Code point of sending> _ <Translation date> _ <Translation number> _ <Status> .txt

and to transfer canceled

<Code point of sending> _ <Translation date> _ <Translation number> _ <Status> _CANCEL.txt

Where:

<Point code> - the four-character code point sending operation;

<Translation date> - the date of the transaction in the format YYYYMMDD;

<Number> - transaction number.

To set file upload:

Select in the field "Transport type" to "Internal (Save File)"

A form will appear for configuration of files upload of he information about the transactions.

Page 32: CONTACT NG...with the RSA algorithm (key length is 2048) or algorithm GOST R 34.10-2001, which is certified to the FSB CIPF «MesagePRO 3.2» of CJSC "Signal-COM". Working with signatures

CONTACT NG Administrator’s Guide

31

Fig. 19. The setup form to upload files

Set the "Path Incoming Pays" the directory where will be placed files on paid transfers.

When the sign "Create file on Client" appears the possibility to upload information on file at the client work place.

For unloading to a file on client workstations is necessary in the setting of the client (ClientConfig.exe) to set the “Upload transfers to file” in tab “Upload file” and configure the directories for unloading.

Specify in the "Path Outgoing Pays" directory where files will be placed on sending money transfers, as well as the return and transfers paid by the sender.

Set in the "File Type" file format. Currently it has the following possible values: "Text File” (with delimiter)" and “XML File”.

When the selected file type "Text File" set in the "Divider" separator character fields. Default - # 9 (tab character).

Set in the ”Fields for upload” dild a list of fields to be unloaded.

The window lists the translation fields for unloading. He may not be relevant. Press the "Refresh" for a complete list of fields.

Marked fields will fall into the downloadable file. You can check or uncheck each frame individually. Use the "Select All" you can mark all the fields to be unloaded. Click "Clear" untagged from all fields.

You can specify the order of the fields in the download files. To do this, select the field you want to change the location, and using the buttons "Up" and "Down", move it to the desired position.

Set events, after which will be unloaded to files.

In the "Create file on event" tab mark events for which the transfer data will be uploaded to the file.

Page 33: CONTACT NG...with the RSA algorithm (key length is 2048) or algorithm GOST R 34.10-2001, which is certified to the FSB CIPF «MesagePRO 3.2» of CJSC "Signal-COM". Working with signatures

CONTACT NG Administrator’s Guide

32

Fig. 20. Event configuration tab

Events for which the discharge is carried out by default:

For outgoing transfers:

o when you save as a draft translation

o when a transfer goes into the status "Awaiting payment" (101)

o when payment the transfer

For outgoing transfers returned:

o when switching the transfer to " Ready for returning" (8)

o when the transfer payment to the sender

For incoming transfers:

o when switching the transfer to " Waiting for payout " (5)

o when the transfer is paid

Press "OK" button to save the settings.

7.2. Setting the integration of transmitted packets of information

Application integration is carried out by calling and transmission of information packets by server applications «CONTACT NG» to integration product that can be the DCOM object, HTTP or SOAP server.

The application server interacts with the integration application to the next stages of the passage of the document:

Before signature (“BeforeSign”) - is transmitted content is sent to the Operations Centre the operation with all its attributes (business level packet sent).

After the signature (“AfterSign”) - passed the entire package, including the signature, to be sent to the Operations Centre (transport layer send the packet).

Before chek (“Before Check”) - passed the entire package, including the signature, received from the Operation Center package (the transport layer of the received packet).

After checking ("AfterChesk") - the content of the operation is transferred with all its attributes derived from the Operations Centre (business level of the received packet)

The content and structure of the packages described in the technical documentation provided to the Operations Center on request.

To integration product can correctly identify at what stage in the moment there is a call, "REQUEST_STEP" attribute is added to the root element of the package. It can take the following values:

Page 34: CONTACT NG...with the RSA algorithm (key length is 2048) or algorithm GOST R 34.10-2001, which is certified to the FSB CIPF «MesagePRO 3.2» of CJSC "Signal-COM". Working with signatures

CONTACT NG Administrator’s Guide

33

REQUEST_STEP = 0 - Before signature (‘BeforeSign”);

REQUEST_STEP = 1 - After the signature (“AfterSign”);

REQUEST_STEP = 2 - Before check (“BeforeCheck”);

REQUEST_STEP = 3 - After checking (“AfterCheck”).

It is also to identify the package itself into the root element is added to the attribute "REQUEST_ID" - GUID string. With this attribute integration product can correctly identify the package with the challenges at different stages of integration.

An example particular packet:

<REQUEST OBJECT_CLASS="TResourceObject" ACTION="GetDynamicBPLS" ExpectSigned="No" LANG="RU"

REQUEST_ID =”{F4409EE5-75BC-40CA-A2FC-8FF559008174}” REQUEST_STEP=”0”/>

On «BeforeSign» and «AfterSign» stages can affect the process of the application. If you want to stop the process of sending a packet to the web-server of Operations Centre integrator application must form a business-level package with an error. To enable continued transaction is necessary to generate business-level package with acknowledgment of receipt.

An example of an error response:

<RESPONSE RE="-1" ERR_TEXT=" Demo Integration Server Error "/>

In any case, the integration product must respond to the application server standard business level package, empty documents (not xml) are not allowed.

In the case of the error integrator, the packet will be sent directly to the client application to display the operational structure and analysis. If a successful response - will continue to work on preparing and sending the client application package to the Operations Centre web-server.

In Before Check and AfterCheck steps answer of integration product is not analyzed, and to accelerate the processing it is recommended not to delay the call.

Despite the fact that at the moment these responses are not analyzed in the future they can be analyzed, therefore, integration product and in this case must answer the application server standard business level package. Empty documents (not xml) are not allowed.

A simple example of an HTTP server for integrators contained in IntServer in ServerNG distribution folder. Example generates random error.

7.2.1. Setup and features of DCOM integration

In "Transport type" field, select "DCOM Server"

Fig. 21. The DCOM server settings

In the form, set the following parameters:

In the "Integration" check at what stage messages will be received and processed.

Page 35: CONTACT NG...with the RSA algorithm (key length is 2048) or algorithm GOST R 34.10-2001, which is certified to the FSB CIPF «MesagePRO 3.2» of CJSC "Signal-COM". Working with signatures

CONTACT NG Administrator’s Guide

34

In the " DCOM Host", enter your server location.

In the "DCOM Server GUID", enter the GUID of the object.

In the "DCOM Server Name" enter the name of your server.

Press the "Test Integration" to check the settings and communication with the integration solution.

Press the "OK" button to save the settings.

Server «CONTACT NG» application establishes a connection with the specified settings in the DCOM server and calls the method "ProcessRemoteRequest" with two incoming and outgoing parameters (xml type widestring).

As a incoming xml, the DCOM server receives an integration package, as the outgoing xml integrator must give an answer.

7.2.2. Setup and features of integration of HTTP and SOAP server

In "Transport type" field, select "HTTP Server" or "SOAP Server".

Fig. 22. Settings for HTTP Server

In the form, set the following parameters:

In the "Integration" check at what stage messages will be received and processed.

In the "URL" enter the URL of your server.

If the interaction will go through a proxy server, you must specify its address in the "Proxy Server" field and the port in the "Proxy Port".

Press the "Test Integration" to check the settings and communication with the integration solution.

Press the "OK" button to save the settings.

Page 36: CONTACT NG...with the RSA algorithm (key length is 2048) or algorithm GOST R 34.10-2001, which is certified to the FSB CIPF «MesagePRO 3.2» of CJSC "Signal-COM". Working with signatures

CONTACT NG Administrator’s Guide

35

8. Description of the interface and work rules

After a successful login displays the main application window

Fig. 23. The main application window

At the top of the screen is the main menu of the program as a series of buttons, clicking on which activated basic operation of the system:

Entering and sending a new transfer or payment.

Working with outgoing transfers.

Search and payment of incoming transfers.

Reports.

Service functions and settings.

Shutting down the program.

Visibility and accessibility of buttons depends on the user role.

В нижней части экрана выводится информация:

the current calendar date;

the current date of the operating day;

User name;

Point Code.

In operation the user have to perform a number of standard operations.

8.1. Entering numerical information

When entering numerical information separator integer and fractional part of the number is the point..

8.2. Entering and updating dates

Another common operation – inputing or changing date.

The date can be entered from the keyboard or from a calendar.

If you press the right button then the date field calendar appears.

The and buttons designed to change the value of year.

Page 37: CONTACT NG...with the RSA algorithm (key length is 2048) or algorithm GOST R 34.10-2001, which is certified to the FSB CIPF «MesagePRO 3.2» of CJSC "Signal-COM". Working with signatures

CONTACT NG Administrator’s Guide

36

The buttons are designed to change the month.

Clicking on the value of the day chooses the date and display it on the line.

8.3. Mandatory and optional fields

In any window of the program, some of the information is important and required.

The list of such information may change for various reasons, including when an operation is executed.

The system will always tell you what information is required to be filled.

Fields are mandatory if the field names are in bold.

8.4. Working with Tables

Most of the screens, which are displayed in the list of information, contain tables. Each column of the table has a header.

The width of the columns was originally defined by the system.

The user can change the width of any column by using the mouse.

Place the cursor over the right border of the column header.

Then clicking and holding the left mouse button, set the desired size of the column.

The system will remember the size of the columns, and each time you open this table will be displayed to the user specified size of columns.

The order of columns is initially given by the system.

The user can use the mouse to change it yourself.

Place your cursor on the column header.

Press and hold the left mouse button, drag the column to the desired position..

The system will remember the position of the speakers, and each time you open the table will display the user set their order.

For the convenience of browsing and searching, you can sort the information in each column.

To do this, click on a column heading.

Appeared in the column header indicates the triangle, on a column to sort the information, and in what order - ascending or descending order.

Click mouse again to reverse the sort order.

To quickly find in the table the first row, starting with a certain value. Уou need to move the cursor to the desired column in any row of the table, and enter the first character. The system finds the desired value and automatically positions the desired line.

The table has its own menu, located on the left table. It can be different. But in most cases there are present buttons:

- upload a table in MS Excel.

- find the table row with specified conditions. After clicking on this button, there is a search form containing:

o The search string - enter the search value field;

o Search column - lists the columns to choose where you want to search;

o Search Type - is as:

"Fast" - the search is on the first character, and positioning occurs as you type

"Context" - roizvoditsya search for occurrences of the search argument, and positioning occurs after you click "Find." The next post can be found by clicking "Find Next."

"Filter" - produced records selection containing occurrence of the search argument..

Page 38: CONTACT NG...with the RSA algorithm (key length is 2048) or algorithm GOST R 34.10-2001, which is certified to the FSB CIPF «MesagePRO 3.2» of CJSC "Signal-COM". Working with signatures

CONTACT NG Administrator’s Guide

37

Fig. 24. Search form in tables

- update the table.

Need to update occurs in cases when the table is displayed on the screen for a long time, and you need to make sure that during this time did not receive new data.

Other uses table updates - Special search features, which are described in the section on specific tables.

- change the record. Typically used for viewing and adjusting the current line of the table information.

The same action as the context menu can be called while in the table by clicking the right mouse button.

8.5. Working with fields filled from directories

In the system there are different directories created for the convenience of users, and reduce errors. For example, the directory of countries, cities, etc.

If the screen form you must enter the information that should be taken from the directory in such a field is not allowed keyboard input.

button is always present on the right part of the field on which the pressing call the required directory.

There is always the button, by pressing which the field is cleared.

8.6. Working with multiple windows

The user may need to open multiple windows belonging to different operations, not close them. Thus windows overlap each other, making it difficult to work. At the opening of each window at the bottom of the main window there are buttons with the names due to action. By pressing these buttons you can move from one window to another.

Fig. 25. An example of working with multiple windows

Page 39: CONTACT NG...with the RSA algorithm (key length is 2048) or algorithm GOST R 34.10-2001, which is certified to the FSB CIPF «MesagePRO 3.2» of CJSC "Signal-COM". Working with signatures

CONTACT NG Administrator’s Guide

38

9. Appendix №1. List Contact NG landing fields.

Field name* Field text name Field type** Max field lenght Description

trnDate Date of a transfer DATE 8 Date set in the service point when sending the translation in format “YYYMMDD”

trnReference Number of a transfer STRING 16 Transaction number, according to the client

trnCurrency Currency а STRING 3 3-letter ISO currency code (RUR, USD, EUR)

trnAmount Amount MONEY2 10.2 The amount of translation in the translation currency

trnSendPoint Sending point STRING 4 4-character sendpoint code

trnPickupPoint Pickup point STRING 4 4-character pickup point code

sName Remitter's Surname STRING 32 Remitter's Surname

sLastName Remitter's Name STRING 32 Remitter's Name

sSurName Remitter's Patronymic STRING 32 Remitter's Patronymic

sBirthday Sender birthday DATE 8 Sender birthday

sCountry Sender country STRING 2 2-letter code (the ISO) country of residence (registration) of the sender

sZipCode Sender’s ZIP Code STRING 12 Sender’s ZIP Code

sRegion Sender’s region (state) STRING 50 Sender’s region (state)

sCity Sender’s city STRING 50 Sender’s city

sAddress Sender’s address (street, house, apartment)

STRING 100 Sender’s address (street, house, apartment)

sPhone Sender's phone STRING 50 Sender's phone

sIDtype Sender’s document type STRING 100 Sender’s document type

sIDnumber Sender’s series and number of the document

STRING 50 Sender’s series and number of the document

sIDdate Sender document date DATE 0 Sender document date

sIDwhom Whom was issued document STRING 100 Whom was issued document

sIDexpireDate Date of expiration of the sender document DATE 8 Date of expiration of the sender document

bName Recipient's surname STRING 32 Recipient's surname

bLastName Recipient's name STRING 32 Recipient's name

bSurName Recipient's patronymic STRING 32 Recipient's patronymic

bBirthday Recipient birthday DATE 8 Recipient birthday

bCountry Recipient country STRING 2 2-letter code (the ISO) country of residence (registration) of the recipient

bZipCode Recipient ZIP Code STRING 12 Recipient ZIP Code

bRegion Recipient's region (state) STRING 50 Recipient's region (state)

Page 40: CONTACT NG...with the RSA algorithm (key length is 2048) or algorithm GOST R 34.10-2001, which is certified to the FSB CIPF «MesagePRO 3.2» of CJSC "Signal-COM". Working with signatures

CONTACT NG Administrator’s Guide

39

Field name* Field text name Field type** Max field lenght Description

bCity Recipient's city STRING 50 Recipient's city

bAddress Recipient's address (street, house, apartment)

STRING 100 Recipient's address (street, house, apartment)

bPhone Recipient's phone STRING 50 Recipient's phone

bIDtype Recipient's document type STRING 100 Recipient's document type

bIDnumber Recipient's series and number of the document

STRING 50 Recipient's series and number of the document

bIDdate Recipient's document date DATE 0 Whom was issued document

bIDwhom Whom was issued recipient's document STRING 100 Whom was issued recipient's document

bIDexpireDate Date of expiration of the recipient's document

DATE 8 Date of expiration of the recipient's document

trnAdditionalInfo Additional Information STRING 100 Details of payment received from the values of other fields (phone number, account number, contract number, etc.)

bAccount Account of the recipient STRING 100 Account of the recipient in the third bank

bAccountType Recipient's account type STRING 100 Recipient's account type in the third bank

bBank Bank to be credited to the account STRING 100 The name of the third bank to be credited to the account

bBranch Bank branch to be credited to the account STRING 100 The name of the branch of the third bank to be credited to the account

bBankAddress Bank address to be credited to the account STRING 100 Address of the third bank to be credited to the account

trnService Code of services INT 10 Numeric operation code of services

trnRate Exchange rate of operations MONEY4 10.4

The exchange rate at which the amount of commission from the client in the target currency converted into the amount in the national currency of the commission (for outgoing transfers)

trnFeesClientLocal The Commission in the national currency taken from the client

MONEY2 10.2 The Commission in the national currency taken from the client

trnFeesClient Commission in the transfer currency taken from the client

MONEY2 10.2 Commission in the transfer currency taken from the client

sResident Resident (Sender) INT 10 The sign resident client-sender. 0 - non-resident 1 - resident 2 - undefined

bResident Resident (Recipient) INT 10 The sign resident client of the recipient. 0 - non-resident 1 - resident 2 - undefined

tSenderAgentCode code of the agent of sender participant STRING 50 code of the agent of sender participant

trnFeesClientCurr Commission currency is taken from the customer

STRING 3 3-character currency code, which was deducted commission from customer's

trnClCurrency Payment currency STRING 3 3-character code of the currency in which the transfer amount has been entered

Page 41: CONTACT NG...with the RSA algorithm (key length is 2048) or algorithm GOST R 34.10-2001, which is certified to the FSB CIPF «MesagePRO 3.2» of CJSC "Signal-COM". Working with signatures

CONTACT NG Administrator’s Guide

40

Field name* Field text name Field type** Max field lenght Description

trnClAmount Amount deposited MONEY2 10.2 The amount of the transfer in the currency entering

sCountryC The country of nationality of the sender STRING 2 2-character country code of the sender's nationality

bCountryC The country of nationality of the recipient STRING 2 2-character country code of the recipient's nationality

bINN Recipient’s INN STRING 12 Recipient’s INN (for payments under the free details)

bKPP Recipient’s KPP STRING 12 Recipient’s KPP (for payments under the free details)

FEES_OUT Commission to send MONEY2 10.2 The amount of commission in the currency of the transfer, which writes off operations center for outgoing transfer

FEES_IN Receivable commission MONEY2 10.2 The amount of the commission in the currency of the transfer that Operations Center will enroll for the translation

CS_IN Cash symbol (credit order) STRING 10 Cash symbol is used in the printing of cash credit orders

CS_PAY Cash symbol (debit slip) STRING 10 Cash symbol is used in the printing of cash debit slip

trnSendPointCountry Countryof the participant sending point STRING 2 2-character country code of the point of sending participant

trnPickupPointCountry Countryof the participant recipient point STRING 2 2-character country code of the point of recipient participant

CASHIER_LOGIN Login of cashier STRING 40 User who sent the transfer to the Operations Center (the transfer payments made)

STATE Translation status INT 10 The numeric codeof the transfer status in the Operations Center of CONTACT system (see. "Status of operations")

OPER_LOGIN Login of operator STRING 40 User, who designed the translation

send_AmountDebitAcc Debit Account for the amount you when sending

STRING 26 Debit Account for the amount you when sending

send_AmountCreditAcc A credit account for the amount you when sending

STRING 26 A credit account for the amount you when sending

send_FeesDebitAcc Debit account for the Commission when sending

STRING 26 Debit Account for the Commission when sending

send_FeesCreditAcc Credit account for the Commission when sending

STRING 26 Credit account for the Commission when sending

send_FeesContactCreditAcc Credit account for the Commission when sending to OC

STRING 26 Credit account for the Commission when sending to OC

ret_AmountDebitAcc Debit account for the amount when returning the transfer

STRING 26 Debit account for the amount when you returning the transfer

ret_AmountCreditAcc Credit account for the amount when returning the transfer

STRING 26 Credit account for the amount when returning the transfer

pay_AmountDebitAcc Debit account for the amount in the payment the transfer

STRING 26 Debit account for the amount in the payment the transfer

pay_AmountCreditAcc Credit account for the amount in the payment the transfer

STRING 26 Credit account for the amount in the payment the transfer

pay_AmountDebitAccOdd Debit account for multiple sum in paying STRING 26 Debit account for multiple sum in paying

Page 42: CONTACT NG...with the RSA algorithm (key length is 2048) or algorithm GOST R 34.10-2001, which is certified to the FSB CIPF «MesagePRO 3.2» of CJSC "Signal-COM". Working with signatures

CONTACT NG Administrator’s Guide

41

Field name* Field text name Field type** Max field lenght Description

pay_AmountCreditAccOdd Credit account for multiple sum in paying STRING 26 Credit account for multiple sum in paying

send_AnalyticAcc Analytical account created when sending the transfer

STRING 26 Analytical account created when sending the transfer

ret_AnalyticAcc Analytical account created when the return the transfer

STRING 26 Analytical account created when the return the transfer

pay_AnalyticAcc Analytical accounts created in the payment the transfer

STRING 26 Analytical accounts created in the payment the transfer

ID Identifier the transfer in system INT 10 A unique integer identifier for the operation in the Contact System

RsbFeesLocal The Commission sent to the operations center in the national currency

MONEY2 10.2 The Commission sent to the operations center in the national currency

trnReason Name of the service STRING 100 Name of the service (Transcript of the field values transService)

POINT_PAY_CODE Payout point code STRING 4 The unique 4-character code of a point, which paid translation

TRN_TYPE Type of transaction INT 10

Type of transaction

For outgoing:

1 - translation physical to physical

2 - transfers for the purpose of repayment of the loan / deposit

3 - payments to companies

For incoming:

1 - translation physical to physical

2 - payments from bank accounts

3 - payout of companies

trnPickupPointName Name of the recipient participant STRING 150 Name of the recipient participant

POINT_PAY_NAME Name of payout point STRING 150 Name of payout point

trnReturnFees sign of return commission INT 1 0 - for a canceled transfer commission will not be returned;

1 - for the canceled transfer commission returned

trnReturnFeesClient Commission to return to the client in transfer currency

MONEY2 10.2 Commission to return to the client in transfer currency

trnReturnFeesClientLocal Commission to return to the client in national currency

MONEY2 10.2 Commission to return to the client in national currency

trnReturnRsbFees Commission receivable from the operations center for the the transfer a return

MONEY2 10.2 Commission receivable from the operations center for the the transfer a return

ret_FeeDebitAcc Debit account for return commission STRING 26 Debit account for return commission

ret_FeeCreditAcc Credit account for return commission STRING 26 Credit account for return commission

Page 43: CONTACT NG...with the RSA algorithm (key length is 2048) or algorithm GOST R 34.10-2001, which is certified to the FSB CIPF «MesagePRO 3.2» of CJSC "Signal-COM". Working with signatures

CONTACT NG Administrator’s Guide

42

Field name* Field text name Field type** Max field lenght Description

bIDwhomCode Code of the recipient unit STRING 32 Code of the recipient unit

sIDwhomCode Code of the sender unit STRING 32 Code of the sender unit

bResidentC Country of residence of the recipient STRING 2 2-letter country code (ISO) of residence of the recipient

sResidentC Country of residence of the sender STRING 2 2-letter country code (ISO) of residence of the sender

sBirthPlace The place where the sender was born STRING 100 The place where the sender was born

bBirthPlace The place where the recipient was born STRING 100 The place where the recipient was born

tCashOutOrderNumber Number of expendable cash order STRING 32 Number of expendable cash order

tCashInOrderNumber Number of credit cash order STRING 32 Number of credit cash order

* - It is used in the tag name when unloading in a xml-format

** - The types of fields:

DATE - Date in the format YYYYMMDD,

INT – integer,

MONEY2 - fraction (2 decimal places, a separator "."),

MONEY4 - fraction (4 decimal places, a separator "."),

STRING - string


Recommended