Exercise

advertisement
Course Overview
© Copyright IBM Corp. 2011
.
Introduction
Overview
• Welcome to Sterling Connect:Direct Secure Plus Option class. Let
us take a moment to introduce ourselves, starting with the
instructor. When you introduce yourself, please share the following
information:
Your motivation for taking this course
Your name and company information
© Copyright IBM Corp. 2011
2
Facilities
© Copyright IBM Corp. 2011
3
Course Agenda
Module A: Introduction to Security Processing
• Lesson 1: Security Essentials for Data Movement
• Lesson 2: Creating and Maintaining Certificates and Keys
Module B: Introduction to Sterling Connect:Direct Secure Plus
• Lesson 3: Sterling Connect:Direct Secure Plus Overview
Module C: Secure Plus Configuration for WINDOWS
• Lesson 4: Sterling Connect:Direct Secure Plus Configuration
Walkthrough for SSL
Module D: Execution and Troubleshooting
• Lesson 5: Secure Data Exchange, Modify Sterling Connect:Direct Secure
Plus Option and Troubleshooting
• Course Wrap Up
© Copyright IBM Corp. 2011
4
Questions
Please ask questions at any time!
The instructor will place questions that cannot be
answered immediately on the white board for further
investigation. The instructor will get the answer to these
questions as soon as possible.
© Copyright IBM Corp. 2011
5
Module A: Security Processing
© Copyright IBM Corp. 2011
.
Module A: Security Processing
This module includes the following lessons:
• Lesson 1: Security Essentials for Data Movement
• Lesson 2: Creating and Maintaining Certificates and Keys
© Copyright IBM Corp. 2011
7
Lesson 1: Security Essentials for
Data Movement
© Copyright IBM Corp. 2011
.
Lesson Objectives
This lesson has been designed to enable you to:
• Explain the aspects of security
• Identify key terminology used it data security
• Define cryptography
• Provide an overview of encryption
• Explain the various types of cryptography
• Explain digital certificates
• Provide an overview of public key infrastructure
© Copyright IBM Corp. 2011
9
The Pyramid of Trust
Proof of
Participation
Non-Repudiation
Data
Integrity
Message Alteration
Confidentiality
Snooping
Unauthorized Access
Access Control
Fraud
Authentication
© Copyright IBM Corp. 2011
10
Authentication
Authentication is the process of ensuring the identity of
participants exchanging information. Authentication
prevents impersonation and provides assurance that
participants are legitimate.
Examples:
• Friend recognizes friend’s voice on the phone.
• Present driver’s license when making credit card purchase.
• Computer network user must enter the correct password for
access.
© Copyright IBM Corp. 2011
11
Access Control
Access control grants the authenticated user access to
resources and function based on pre-assigned rights or
privileges.
Examples:
• Reading or writing files
• Executing programs
• Access physical devices network drives and printers
© Copyright IBM Corp. 2011
12
Confidentiality – Data Encryption
Confidentiality ensures that a document is viewable only by the
intended recipient.
Examples:
• A locked filing cabinet contains sensitive files. Only personnel permitted to
read the files have a key to the filing cabinet.
• An electronic example would be that data special program is required to
view the data.
Accomplished by using a key to mathematically scramble data in
order to make the data unusable by anyone other than the intended
recipient
•
•
•
•
DES
3DES
IDEA
AES
© Copyright IBM Corp. 2011
13
Data Integrity
Data integrity ensures that any alteration to data that occurs during
transmission is detected by the recipient. It helps prevent electronic
theft and vandalism.
Accomplished through Cryptographic Hashing
•
A mathematical summary of the entire message
The Cryptographic hash must have the following features
•
•
•
•
Any length input creates a fixed length output
Easy to compute
One way (hard to invert without the proper key)
Is not secure by itself because algorithms are public
Popular Hashing Algorithms are –
•
•
Message Digest (MD2 / MD5 – 16 byte hash)
Secure Hash Algorithm (SHA – 20 byte hash)
© Copyright IBM Corp. 2011
14
Non-Repudiation
Non-repudiation ensures that the sender of a message cannot later
deny having sent the message to the recipient. It provides a “proofof-participation” where the exchange of message forms a legally
binding transaction.
A method of ensuring (which cannot later be denied) that data was
sent by the intended individual or company
Accomplished by using –
•
Digital Signature (STS)
 Encrypts
•
the Message Digest using a Private Key
MAC (TLS / SSL)
 Encrypts
 160
the Message Digest using a “Shared Secret” Key of
bits for SHA and 128 bits for MD5
Can be legally binding
© Copyright IBM Corp. 2011
15
Cryptography
Cryptography is the art and science of keeping
information secure through mathematical processes. It
helps ensure only authorized individuals have access to
sensitive information. Cryptography helps ensure
information is not altered by unauthorized individuals.
•
The science of Data Encryption / Decryption
•
Conceals data from unauthorized observers
•
Relies on a mathematical key to transform the data
•
Can encrypt data only or be part of an Encryption System
© Copyright IBM Corp. 2011
16
Encryption
Encryption converts readable messages to an
unreadable form using a mathematical process.
Decryption converts encrypted messages back to their
readable form. Decryption relies on a secret key. The
secret is the key, not the algorithm.
There are three types of Data Encryption – Symmetric,
Asymmetric, Hybrid Encryption
© Copyright IBM Corp. 2011
17
Symmetric Key Encryption
Symmetric Key
Key
Plaintext
Key
Encryption
Decryption
Ciphertext
Bob receives
Alice sends
© Copyright IBM Corp. 2011
18
Plaintext
Asymmetric (Double Key)
Plaintext
Public Key
Private Key
Encryption
Decryption
Ciphertext
Bob receives
Alice sends
© Copyright IBM Corp. 2011
19
Plaintext
Hybrid Cryptosystem
Use symmetric and public/private keys
Symmetric keys
• Faster processing due to faster symmetric algorithm
• Use for “bulk” encryption processing
Public/private keys
• Less vulnerable to compromise because key functions are separated
between two keys
• Use for authentication and encrypting symmetric keys for key exchange
© Copyright IBM Corp. 2011
20
Encryption Key Lengths
Algorithm
Key Length
Symmetric
RC2
(Secret)
RC4
Asymmetric
40.64.128
DES
56
Triple DES
112
RSA
512, 1024, 2048
(Public/Private)
© Copyright IBM Corp. 2011
21
Message Digest
Unencrypted
Document
© Copyright IBM Corp. 2011
22
Creating a Digital Signature
1. Alice creates a
message for Bob
2. Alice signs document to
protect information
Dear Bob,
Why don’t
you send me
a message
sometime?
3. Alice
sends the
signed
message
to Bob
Behind the scenes:
A. MD5 creates
a hash (011010)
Dear Bob,
Why don’t
you send me
a message
sometime?
© Copyright IBM Corp. 2011
B. Alice encrypts
the hash with her
private key creating
a message
signature that is
attached to the file
23
Dear Bob,
Why don’t you
send me a message
sometime?
*&%#@
(011010)
Verifying a Digital Signature
1. Bob receives
message
2. Bob verifies
Alice’s signature
3. Bob reads
Alice’s message
Dear Bob,
Why don’t
you send me a
message
sometime?
Behind the scenes and transparent to user:
A. Bob then
decrypts the hash
code using Alice’s
PUBLIC-Key
B. Hash message
again with MD5 and
compare to original
hash
011010
Dear Bob,
Why don’t you
send me a message
sometime?
011010
© Copyright IBM Corp. 2011
24
Digital Certificates
Certificate Owner Identification
Certificate Authority (CA) Identification
Date range certificate is valid
• Start date
• End date
Public key of owner
Serial number
Possibly other information
X.509 most widely used format
© Copyright IBM Corp. 2011
25
Public Key Infrastructure Services
Crosscertification
Automatic
key update
Certification
authority
Key
registration
Application
software
Certificate
repository
© Copyright IBM Corp. 2011
Key backup
& recovery
Certificate
revocation
26
Vendor Certificate Authorities
Verisign
• Digital Id is their term for digital certificate
• Provide CA function of processing CSRs and issuing certificates
Thawte
• Now owned by Verisign
• Provides CA function to process CSRs and issue certificates as
well
© Copyright IBM Corp. 2011
27
Requesting a Certificate
1. Alice creates a
CSR.
2. Alice sends CSR
via E-mail to CA.
Please send
certificate.
Please send
certificate.
5. Alice receives
new certificate.
4. CA sends certificate
back to Alice.
Please send
certificate.
© Copyright IBM Corp. 2011
3. CA validates CSR
and creates certificate.
28
Validating a Certificate
1. Alice sends Bob
certificate to authenticate
her messages.
2. Bob verifies CA root
signature on certificate.
Alice’s
Certificate
Alice’s
Certificate
4. Bob verifies the message
with Alice’s public key from
her certificate.
3. Alice sends Bob a
message.
Hi, Bob!
Hi, Bob!
© Copyright IBM Corp. 2011
29
Lesson Summary
This lesson was designed to enable you to:
• Explain the aspects of security
• Identify key terminology used it data security
• Define cryptography
• Provide an overview of encryption
• Explain the various types of cryptography
• Explain digital certificates
• Provide an overview of public key infrastructure
© Copyright IBM Corp. 2011
30
Lesson 2: Creating and Maintaining
Certificates and Keys
© Copyright IBM Corp. 2011
.
Lesson Objectives
This lesson has been designed to enable you to:
•
Describe the purpose of the Certificate management tools
•
Navigate through the certificate wizard to create a self-signed
certificate
•
Generate a certificate signing request
•
Send signing request to Thawte
•
Receive certificate from Thawte into certificate database
© Copyright IBM Corp. 2011
32
Key Management Tools
SSL Connections use public/private key mechanisms for
authenticating each side of the SSL session and agreeing
on bulk encryption keys to be used for the SSL session.
To use public/private key mechanisms (termed PKI),
public/private key pairs must be generated. In addition,
X.509 certificates (which contain public keys) may need
to be created, or certificates must be requested, received,
and managed.
© Copyright IBM Corp. 2011
33
Exercise: Creating a Self-Signed Certificate
Use Certificate Wizard to generate certificate
© Copyright IBM Corp. 2011
34
© Copyright IBM Corp. 2011
35
© Copyright IBM Corp. 2011
36
© Copyright IBM Corp. 2011
37
© Copyright IBM Corp. 2011
38
© Copyright IBM Corp. 2011
39
© Copyright IBM Corp. 2011
40
© Copyright IBM Corp. 2011
41
© Copyright IBM Corp. 2011
42
© Copyright IBM Corp. 2011
43
© Copyright IBM Corp. 2011
44
© Copyright IBM Corp. 2011
45
© Copyright IBM Corp. 2011
46
© Copyright IBM Corp. 2011
47
Creating certificate signing requests
In the next few slides, let us look at a sample website to
understand more about CSR, how they can be
generated, and how to receive test certificate into key
database.
© Copyright IBM Corp. 2011
48
© Copyright IBM Corp. 2011
49
© Copyright IBM Corp. 2011
50
© Copyright IBM Corp. 2011
51
© Copyright IBM Corp. 2011
52
© Copyright IBM Corp. 2011
53
© Copyright IBM Corp. 2011
54
© Copyright IBM Corp. 2011
55
Certificate Files
There are three main certificate files:
• Trusted Root File (trusted.txt) - Contains the root certificates for
the CAs trusted for this Sterling Connect:Direct Secure Plus node
• Private Key File - Holds the encrypted private key corresponding
to the public key in the CSR
• Keycert File - Contains the encrypted certificate and private key
The format of these files is PEM BER Base64 Encoded.
PEM stands for Privacy Enhanced Mail. BER stands for
Basic Encoding Rules. Base64 is a method for encoding
binary data into ASCII format.
© Copyright IBM Corp. 2011
56
Lesson Summary
This lesson was designed to enable you to:
• Describe the purpose of the Certificate Wizards
• Generate a self signed certificate
• Generate a certificate signing request
• Send signing request to Thawte
• Receive certificate from Thawte
© Copyright IBM Corp. 2011
57
Module B: Introduction to Sterling
Connect:Direct Secure Plus
© Copyright IBM Corp. 2011
.
Module B: Introduction to Sterling
Connect:Direct Secure Plus
This module includes the following lesson:
• Lesson 3: Sterling Connect:Direct Secure Plus Overview
© Copyright IBM Corp. 2011
59
Lesson 3: Sterling Connect:Direct
Secure Plus Overview
© Copyright IBM Corp. 2011
.
Lesson Objectives
This lesson has been designed to enable you to
understand the:
• History of Sterling Connect:Direct Secure Plus Option
• Version 1
• Version 2
• Version 3
• Administration Tool - SPAdmin
© Copyright IBM Corp. 2011
61
Overview
Sterling Connect:Direct Secure Plus provides enhanced functions for
Sterling Connect:Direct to help ensure the secure transfer of
information among enterprises.
• Authentication - Version 1 (V1) of the product uses the STS protocol.
Version 2 (V2) uses the SSL handshake and Version 3 (V3) uses the TLS
handshake. In Sterling Connect:Direct both nodes are authenticated.
• Confidentiality - Sterling Connect:Direct uses encryption of control
messages and encryption of data.
• Message Integrity - Message digest of transmitted data.
Non-repudiation is not included because the digital signatures that
are generated do not stay with the data once it has been transmitted.
In a sense, however, non-repudiation is provided for the data on the
communications link itself.
© Copyright IBM Corp. 2011
62
History of Sterling Connect:Direct Secure Plus
The development of Sterling Connect:Direct Secure Plus
was driven by customer need. It uses a “no frills”
approach based on cryptography.
The development of Version was based on STS protocol
and not SSL for the following reasons:
• Customer needed timely solution
• Was still too soon for certificate-based security
• Cryptography vendor had no SSL implementation at the time
• RSA patent sill in effect. Royalties were a significant player in the
decision.
© Copyright IBM Corp. 2011
63
Security Functions
The general security of Sterling Connect:Direct uses the
following functions:
• Userid/password authorization
• Access control to Sterling Connect:Direct functions
• Interface with OS security
• Interface with other security mechanisms
• Netmap Check
• Secure Point of Entry
• Firewall navigation
© Copyright IBM Corp. 2011
64
The Sterling Connect:Direct
Pyramid of Trust
Digital
signatures for
data in transit
Non-Repudiation
Data
Integrity
Msg. digest / Dig. signatures
Encryption
Confidentiality
Userid/password;
C:D func. Auth.
Security exits; FW nav.
Access Control
TLS, SSL, STS
authentication;
Netmap check
Authentication
© Copyright IBM Corp. 2011
65
Version 1
Version 1 was developed for Sterling Connect:Direct OS390, UNIX
(AIX, HP-UX, Solaris), Windows NT, and OS/400. It utilizes the
security consultant to advise and review information:
•
•
•
•
•
Based on Elliptic Curve public/private key cryptography
Authentication through STS protocol
Data confidentiality via symmetric key encryption
Data integrity using digital signatures
Administration tool - SPAdmin
The encryption algorithms used are DES, TDES and IDEA. Key
management for large numbers of nodes became an issue.
Majority of customers are using SSL and TLS therefore Version 1 is
not used as often as the other versions.
© Copyright IBM Corp. 2011
66
Version 2
Version 2 was developed for Sterling Connect:Direct
OS390, UNIX (AIX, HP-UX, Solaris), Windows.
Implementation is reviewed by security consultants. It
uses a SSL-based security. The administration tool
SPAdmin was enhanced to support Version 2.
A certificate Wizard was added for the creation of
certificates.
© Copyright IBM Corp. 2011
67
Version 3
V3 implements the TLS1.0 protocol. It has little external
change to Sterling Connect:Direct Secure Plus. SSL and
TLS protocols are similar but not interoperable. The
Administration tool SPAdmin SSL Options include TLS.
V3 uses the same Cipher Suites as SSL protocol. TLS
has several improvements/enhancement that SSL:
• Part of FIPS-140 certification
• Better MAC algorithm
• More granular alerts
• Clearer definition of specifications “gray” areas
© Copyright IBM Corp. 2011
68
Version 3.1
V3.1 Supports Advanced Encryption Standard (AES) 128
and 256 ciphers to provide
broader platform security coverage and stronger data
encryption algorithm options.
These ciphers are only valid with the TLS protocol.
Supports secure API Connections using the Sterling
Connect:Direct Java Application Interface (API) Option.
© Copyright IBM Corp. 2011
69
Administration Tool - SPAdmin
The administration tool SA is responsible for:
• Initializing the Sterling Connect:Direct Secure Plus Parmfile
• Maintaining Local Node and Sterling Connect:Direct Secure Plus
defaults
• Maintaining (add/update/delete) Remote Sterling Connect:Direct
Secure Plus nodes
• Enabling/disabling Sterling Connect:Direct Secure Plus globally or
by node
© Copyright IBM Corp. 2011
70
SA Parmfile
A Parmfile contains an encrypted record for each Sterling
Connect:Direct node enabled for Sterling Connect:Direct
Secure Plus, containing parameters such as protocol and
cipher suites.
The Access File contains the key to encrypt and decrypt
Parmfile records. It is protected by using the OS security.
SA initializes Parmfile on startup if parmfile does not
exist. It prompts for passphrase used to create a key to
encrypt Parmfile.
• Specify trusted root file and key certificate file
• Optionally populate from Netmap
© Copyright IBM Corp. 2011
71
SA Local Node
SA enables STS, SSL or TLS protocols. It is also
responsible for enabling overrides. It sets SSL/TLS
specific parameters:
• Trusted root certificate file
• Key certificate file
• Client authentication
• Cipher suites
It also sets the STS parameters:
• Public/private keys
• Enable/disable encryption and message digests
© Copyright IBM Corp. 2011
72
SA Remote Nodes
The administration tool is also responsible for maintaining
remote nodes. It can add, update or delete a node.
© Copyright IBM Corp. 2011
73
Lesson Summary
This lesson was designed to enable you to:
• History of Sterling Connect:Direct Secure Plus Option
• Version 1
• Version 2
• Version 3
• Administration Tool - SA
© Copyright IBM Corp. 2011
74
Module C: Configuration For
Microsoft Windows using SSL
© Copyright IBM Corp. 2011
.
Module C: Sterling Connect:Direct Secure Plus
Configuration for Microsoft Windows
This module includes the following lessons:
• Lesson 4: Configuration Walkthrough for SSL
© Copyright IBM Corp. 2011
76
Lesson 4: Installation and
Configuration for Microsoft Windows
© Copyright IBM Corp. 2011
.
Lesson Objectives
By the end of this lesson, you should be able to:
• List the Sterling Connect:Direct Secure Plus for Windows
Configuration Components
• Configure Sterling Connect:Direct Secure Plus for Windows
© Copyright IBM Corp. 2011
78
Parameters File
Must contain a local node record
• Authentication public key value
• Digital signature public key value
• Certificate Label & Path name
Secure this data set*
• To control User access
Must contain remote node record for each node you want secure
Connection with
• Same name as Netmap adjacent node name
• Authentication public key value* and digital signature public key value*
• Certificate Label name*
• Many values can be specific or default to local node record values
© Copyright IBM Corp. 2011
79
How to Exchange Updated Keys
with Trading Partners
Automated update
• Enable feature in parameter file
Manual management*
• Generate public key
• Export to keyfile on Local node
• Send exported keyfile to Remote node
• Remote node imports keyfile
© Copyright IBM Corp. 2011
80
How Often to Exchange Keys
More frequent, the more secure
Maintain a copy of the previous keys until both partners
have updated parameter file
© Copyright IBM Corp. 2011
81
Quick Start
Pros
Cons
• One-stop method for building a
parameter file that contains all
know NETMAP records
• All nodes have the same
parameters
• Updates may be required
• Quick and easy
• May contain some nodes
you don’t want in the
parameter file
• Saves time
• No manual entry for existing
nodes
© Copyright IBM Corp. 2011
• Some may be assigned alias
name that are inappropriate
82
Exercise:
© Copyright IBM Corp. 2011
83
Exercise:
© Copyright IBM Corp. 2011
84
Exercise:
© Copyright IBM Corp. 2011
85
Exercise:
© Copyright IBM Corp. 2011
86
Exercise:
© Copyright IBM Corp. 2011
87
Exercise:
© Copyright IBM Corp. 2011
88
Exercise:
© Copyright IBM Corp. 2011
89
Exercise:
© Copyright IBM Corp. 2011
90
Exercise:
© Copyright IBM Corp. 2011
91
Exercise:
© Copyright IBM Corp. 2011
92
Exercise:
© Copyright IBM Corp. 2011
93
Exercise:
© Copyright IBM Corp. 2011
94
Exercise:
© Copyright IBM Corp. 2011
95
Exercise:
© Copyright IBM Corp. 2011
96
Exercise:
© Copyright IBM Corp. 2011
97
Exercise:
© Copyright IBM Corp. 2011
98
Exercise:
© Copyright IBM Corp. 2011
99
Exercise:
© Copyright IBM Corp. 2011
100
Exercise:
© Copyright IBM Corp. 2011
101
Exercise:
© Copyright IBM Corp. 2011
102
Exercise:
© Copyright IBM Corp. 2011
103
Exercise:
© Copyright IBM Corp. 2011
104
Exercise:
© Copyright IBM Corp. 2011
105
Exercise:
© Copyright IBM Corp. 2011
106
Exercise:
© Copyright IBM Corp. 2011
107
Lesson Summary
This lesson was designed to enable you to:
• Walk through the configuration for SSL/TLS for Sterling
Connect:Direct Secure Plus
© Copyright IBM Corp. 2011
108
Module D: Secure Data Exchange
and Troubleshooting
© Copyright IBM Corp. 2011
.
Module D: Secure Data Exchange and
Troubleshooting
This module includes the following lessons:
• Lesson 5: Secure Data Exchange and Trouble Shooting
© Copyright IBM Corp. 2011
110
Lesson 5: Secure Data Exchange
and Troubleshooting
© Copyright IBM Corp. 2011
.
Lesson Objectives
By the end of this lesson, you should be able to:
• How Authentication works for SSL
• Validate Sterling Connect:Direct Secure Plus configurations.
• Process Submission/View Statistics
• Modify Sterling Connect:Direct Secure Plus Options
• Identify common errors and solutions.
© Copyright IBM Corp. 2011
112
How Authentication Works for SSL
© Copyright IBM Corp. 2011
113
Sending and Receiving Data for SSL
Sending Customer Data
After communication is authenticated, the PNODE begins transmitting
data. Information for encrypting data is exchanged in the control
blocks. If data compression is enabled, the PNODE compresses the
data, based on settings defined in Sterling Connect:Direct. The
PNODE encrypts the data with a cipher suite recognized by both
communications nodes.
Receiving Customer Data
The SNODE receives the data. The SNODE decrypts the data using a
cipher suite available for both the PNODE and the SNODE. If the
data is compressed, the receiving node decompresses it. .
© Copyright IBM Corp. 2011
114
Validating Sterling Connect:Direct Secure Plus
Configuration
Every Sterling Connect:Direct Secure Plus node must be
defined in the Secure Plus Parmfile if:
• Secure Plus is enabled in the Local Node record
• Or overrides are enabled in the Local Node record
Sterling Connect:Direct Secure Plus may be enabled or
disabled by individual node. Both nodes. must be
configured with the same protocol or the Connection will
fail.
• There is no negotiation of Sterling Connect:Direct Secure Plus
protocols.
© Copyright IBM Corp. 2011
115
Process Submission
V1 Copy overrides
• overrides Parmfile encryption setting
• overrides Parmfile signature setting
V2 and V3 have no copy overrides
step1copy from (file=/usr1/data/readme.txt)
secure=(encrypt.data=y,signature=y)
to (file=/usr2/data/readme2.txt disp=(rpl))
© Copyright IBM Corp. 2011
116
View Statistics for SSL
© Copyright IBM Corp. 2011
117
Modifying Sterling Connect:Direct Secure Plus
Option
You can modify a Sterling Connect:Direct Secure Plus
Option configuration. The following actions are available
for modifying the Option information:
Disabling Sterling Connect:Direct Secure Plus Option
Creating a remote node record
Deleting a Sterling Connect:Direct Secure Plus Option
remote node record
Changing the cipher suites for an SSL configured node
Changing the encryption algorithm names
© Copyright IBM Corp. 2011
118
Common Errors and Solutions
Troubleshooting with Sterling Connect:Direct Secure Plus
most often entails configuration issues. Traces display
decrypted control blocks by not decrypted user data
Please see the Sterling Connect:Direct Secure Plus
Implementation Guide for a full list of common errors and
solutions.
© Copyright IBM Corp. 2011
119
Lesson Summary
This lesson was designed to enable you to:
• How Authentication works for SSL
• Validate Sterling Connect:Direct Secure Plus configurations.
• Process Submission
• Modify Sterling Connect:Direct Secure Plus Option
• Identify and correct common errors.
• Validate Sterling Connect:Direct Secure Plus configurations.
• Identify common errors and solutions.
© Copyright IBM Corp. 2011
120
Course Wrap Up
© Copyright IBM Corp. 2011
.
Congratulations!
You have completed the Sterling Connect:Direct Secure
Plus for Windows course
Are there any Questions?
© Copyright IBM Corp. 2011
122
Download