WWW.SA.I-PDF.INFO
FREE ELECTRONIC LIBRARY - Abstracts, books, theses
 
<< HOME
CONTACTS



Pages:     | 1 ||

«State of Indiana, Department of Revenue Electronic Taxpayer Service Center SFTP Bulk Upload Guide (Revised November 1, 2016) Indiana SFTP Bulk Upload ...»

-- [ Page 2 ] --

 Answers to prompted are shown in bold red type.

 Substitutions are shown in bold blue type A transcript for each of the commands below can be found in Appendix J.

Install gpg Download the software from https://www.gpg4win.org/ and follow the installation instructions.

Generate a key Generating keys is an interactive process.

**Note that you need to remember the passphrase for your key!

Execute the following command

–  –  –

The gen-key command will prompt you for the following values.

Kind of key - 1) RSA and RSA (default) Your selection? 1 Keysize – 2048 What keysize do you want? (2048) 2048 Key expiration – 0 = key does not expire Key is valid for? (0) 0

–  –  –

Export a key The IDOR will email your acknowledgement file by default. If you wish to have your acknowledgment file placed on our server for your retrieval it will be encrypted. If this is your choice, you must export the public part in order to provide it to IDOR so your acknowledgement file can be encrypted.

Key names are likely to have spaces and other special characters in the name. The double quotes ( " ) around the name of the key ensure that it is treated properly by gpg and by WIndows.

To export the public part of a key, execute the command below, substituting an output file name for Acme.asc and you key name for "Acme LLC (DOR files)".

C:\gpg --armor --output Acme.asc --export "Acme LLC (DOR files)" Import and sign key Since you will be encrypting data and sending it to us, you will need to import our public key to use for encryption.

If you are encrypting, you are using a public key which is what we provide. The example below assumes that the DOR public key is stored in a file called “Indiana Department of Revenue ERF.asc” and is in the directory where you are executing the gpg command. Note the use of double quotes ( " )around the key name below. Execute this command to import a key.

C:\gpg --import "Indiana Department of Revenue ERF.asc" Once the key is imported, you will want to sign the key. This is not a requirement but if you do not sign this key you will be prompted each time you encrypt a file to verify the key before encrypting. This step will prevent the prompt each time you encrypt a file. Remember to substitute your key name for "Acme LLC (DOR files)" in the example below.

C:\gpg -u "Acme LLC (DOR files)" --sign-key "Indiana Department of Revenue ERF RAtkison@dor.in.gov" Encrypt a file Below find the command to encrypt a file, remembering to substitute an appropriate output file name for "file_to_encrypt.txt.gpg" and the name of your file to be encrypted for "file_to_encrypt.txt". Use the public key provided by DOR that you imported earlier.

C:\gpg --recipient "Indiana Department of Revenue ERF RAtkison@dor.in.gov" --output "file_to_encrypt.txt.gpg" --encrypt "file_to_encrypt.txt" Decrypt a file To decrypt the file, use the private part of the key you generated earlier. Remember to substitute your key name for "Acme LLC (DOR files)" and the name of the output of the decryption for file_to_decrypt.txt and the name of the file to decrypt for file_to_decrypt.txt.gpg. Note that you will need the passphrase for this step.

-u "Acme LLC (DOR files)" --output file_to_decrypt.txt --decrypt file_to_decrypt.txt.gpg C:\gpg

–  –  –

Go to https://extranet.in.gov/sftp/base.

Click Secure File Transfer (SFTP).

Click GUI(Winscp376setup.exe).

After installing, run WinSCP by double-clicking the desktop icon.

Setting Up and Saving a Secure SFTP Session (OPTIONAL) Select SFTP for the File Protocol Populate Host Name with: SFTP.IN.GOV Populate Port number with 22 Populate User name with user name supplied by IDOR department Populate Password with password supplied by IDOR department NOTE: Due to the complexity of the password, it is easier to cut and paste the password into the password field.

Click the Save button, supply a site name and folder location (you may wish to save the password)

–  –  –

APPENDIX D – Using WinSCP to Send a File

Double-click the WinSCP icon on your desktop:

If you previously saved a stored session, click on the name you saved (Your User Name@SFTP.IN.GOV) and click Login.

Enter your password (if not saved) and click OK

–  –  –

This window will open, if you do not want to see this screen each time you login click the Never show this banner again check box.

If you did not provide a password on the login screen you will get this window where you will be prompted to enter your password.

NOTE: Due to the complexity of the password, it is easier to cut and paste the password into the password field.

–  –  –

The program window will display and split the local directory and the remote directory as two side-by-side panes.

Using the left pane, go to the location where you created your secure PGP/GPG Zip file. Click and drag that file from the left pane and drop it into the IN folder in the right pane. Repeat as desired. When you are done, click the X in the upper-right corner to close this screen.

–  –  –

Encrypted Acknowledgements After sending us your file, you have the choice to get your acknowledgement encrypted. If you want your acknowledgement to be encrypted, send an email to BulkFiler@dor.IN.us with an attachment that is your public key file. We will use this to encrypt your acknowledgement. You will need to use your private key to decrypt the acknowledgement upon receipt. You will also be able to pick up an encrypted copy of your acknowledgement in the Outbox using WinSCP.





APPENDIX F – Common Acronyms

–  –  –

APPENDIX I – Transcripts of PGP command execution Generate a key C:\pgp --gen-key "Acme LLC (DOR files)" --key-type "RSA" --encryption-bits 2048 --passphrase "your passphrase for this key" --signing-bits 2048 Acme LLC (DOR files):generate key (2078:non-standard user ID) Acquiring entropy from system state....done Generating key Acme LLC (DOR files) progress

0xD15FB61E:generate key (0:key successfully generated) Acquiring entropy from system state....done Generating subkey progress

0x14EF2D32:generate key (0:subkey successfully generated) C:\pgp --list-keys Alg Type Size/Type Flags Key ID User ID

----- ---- --------- ------- ---------- ------RSA4 pair 2048/2048 [VI---] 0xD15FB61E Acme LLC (DOR files) 1 key found

–  –  –

List keys C:\pgp --list-keys Alg Type Size/Type Flags Key ID User ID

----- ---- --------- ------- ---------- ------RSA4 pair 2048/2048 [VI---] 0xD15FB61E Acme LLC (DOR files) 1 key found

–  –  –

Export a key C:\Users\JBond\Documents\DOR\erf\samplespgp --export "Acme LLC (DOR files)" --output "Acme.asc" 0xD15FB61E:export key (0:key exported to Acme.asc) C:\Users\JBond\Documents\DOR\erf\samplesdir Acme.asc Volume in drive C is OSDisk Volume Serial Number is D0C7-13C7 Directory of C:\Users\JBond\Documents\DOR\erf\samples

–  –  –

C:\Users\JBond\Documents\DOR\erf\samples Import a key C:\Users\JBond\Documents\DOR\erf\samplespgp --list-keys Alg Type Size/Type Flags Key ID User ID

----- ---- --------- ------- ---------- ------RSA4 pair 2048/2048 [VI---] 0xD15FB61E Acme LLC (DOR files) 1 key found C:\Users\JBond\Documents\DOR\erf\samples C:\Users\JBond\Documents\DOR\erf\samplespgp --import "Indiana Department of Revenue ERF.asc" Indiana Department of Revenue ERF.asc:import key (0:key imported as 0xDC88DED2 Indiana Department of Revenue ERF RAtkison@dor.in.gov) C:\Users\JBond\Documents\DOR\erf\samples Encrypt a file C:\Users\JBond\Documents\DOR\erf\samplesdir file_to_encrypt.txt Volume in drive C is OSDisk Volume Serial Number is D0C7-13C7 Directory of C:\Users\JBond\Documents\DOR\erf\samples

–  –  –

C:\Users\JBond\Documents\DOR\erf\samples C:\Users\JBond\Documents\DOR\erf\samplespgp --recipient "Indiana Department of Revenue ERF RAtkison@dor.in.gov" --output "file_to_encrypt.txt.pgp" --encrypt "file_to_encrypt.txt" 0xDC88DED2:encrypt (3064:key invalid) file_to_encrypt.txt:encrypt (0:output file file_to_encrypt.txt.pgp) C:\Users\JBond\Documents\DOR\erf\samplesdir file_to_encrypt.* Volume in drive C is OSDisk Volume Serial Number is D0C7-13C7 Directory of C:\Users\JBond\Documents\DOR\erf\samples

–  –  –

C:\Users\JBond\Documents\DOR\erf\samples Decrypt a file C:\Users\JBond\Documents\DOR\erf\samplesdir file_to_decrypt.txt.pgp Volume in drive C is OSDisk Volume Serial Number is D0C7-13C7 Directory of C:\Users\JBond\Documents\DOR\erf\samples

–  –  –

C:\Users\JBond\Documents\DOR\erf\samplespgp -u "Acme LLC (DOR files)" –output file_to_decrypt.txt -decrypt file_to_decrypt.txt.pgp --passphrase "your passphrase for this key" file_to_decrypt.txt.pgp:decrypt (0:output file file_to_decrypt.txt) C:\Users\JBond\Documents\DOR\erf\samplesdir file_to_decrypt.txt* Volume in drive C is OSDisk Volume Serial Number is D0C7-13C7 Directory of C:\Users\JBond\Documents\DOR\erf\samples

–  –  –

GnuPG needs to construct a user ID to identify your key.

Real name: Acme LLC

Email address:

Comment: DOR files

You selected this USER-ID:

"Acme LLC (DOR files)" Change (N)ame, (C)omment, (E)mail or (O)kay/(Q)uit? O You need a Passphrase to protect your secret key.

We need to generate a lot of random bytes. It is a good idea to perform some other action (type on the keyboard, move the mouse, utilize the disks) during the prime generation; this gives the random number generator a better chance to gain enough entropy. We need to generate a lot of random bytes. It is a good idea to perform some other action (type on the keyboard, move the mouse, utilize the disks) during the prime generation; this gives the random number generator a better chance to gain enough entropy.

gpg: key 9508D9BE marked as ultimately trusted public and secret key created and signed.

–  –  –

C:\gpg --list-keys C:/Users/JBond/AppData/Roaming/gnupg/pubring.gpg

-----------------------------------------------pub 2048R/26F74212 2016-09-19 uid [ultimate] Acme LLC (DOR files) sub 2048R/D6E5BE8F 2016-09-19

–  –  –

List keys C:\gpg --list-keys C:/Users/JBond/AppData/Roaming/gnupg/pubring.gpg

-----------------------------------------------pub 2048R/26F74212 2016-09-19 uid [ultimate] Acme LLC (DOR files) sub 2048R/D6E5BE8F 2016-09-19

–  –  –

Export a key C:\gpg --armor --output Acme.asc --export "Acme LLC (DOR files)" C:\dir Acme.asc Volume in drive C is OSDisk Volume Serial Number is D0C7-13C7

–  –  –

Import a key C:\gpg --import "Indiana Department of Revenue ERF.asc" gpg: key DC88DED2: public key "Indiana Department of Revenue ERF RAtkison@dor.in.gov" imported gpg: Total number processed: 1 gpg: imported: 1 (RSA: 1) gpg: 3 marginal(s) needed, 1 complete(s) needed, PGP trust model gpg: depth: 0 valid: 9 signed: 1 trust: 0-, 0q, 0n, 0m, 0f, 9u gpg: depth: 1 valid: 1 signed: 0 trust: 1-, 0q, 0n, 0m, 0f, 0u C:\gpg --list-keys C:/Users/JBond/AppData/Roaming/gnupg/pubring.gpg

-----------------------------------------------pub 2048R/DC88DED2 2008-10-24 uid [ unknown] Indiana Department of Revenue ERF RAtkison@dor.in.gov sub 2048R/CE38E5A6 2008-10-24

–  –  –

Indiana Department of Revenue ERF RAtkison@dor.in.gov Are you sure that you want to sign this key with your key "Acme LLC (DOR files)" (26F74212) Really sign? (y/N) y You need a passphrase to unlock the secret key for user: "Acme LLC (DOR files)" 2048-bit RSA key, ID 26F74212, created 2016-09-19

–  –  –

C:\gpg --recipient "Indiana Department of Revenue ERF RAtkison@dor.in.gov" --output "file_to_encrypt.txt.pgp" --encrypt "file_to_encrypt.txt" gpg: checking the trustdb gpg: 3 marginal(s) needed, 1 complete(s) needed, PGP trust model gpg: depth: 0 valid: 9 signed: 2 trust: 0-, 0q, 0n, 0m, 0f, 9u gpg: depth: 1 valid: 2 signed: 0 trust: 2-, 0q, 0n, 0m, 0f, 0u C:\dir file_to_encrypt.* Volume in drive C is OSDisk Volume Serial Number is D0C7-13C7

–  –  –

C:\gpg -u "Acme LLC (DOR files)" --output file_to_decrypt.txt --decrypt file_to_decrypt.txt.gpg You need a passphrase to unlock the secret key for user: "Acme LLC (DOR files)" 2048-bit RSA key, ID D6E5BE8F, created 2016-09-19 (main key ID 26F74212) gpg: encrypted with 2048-bit RSA key, ID D6E5BE8F, created 2016-09-19 "Acme LLC (DOR files)" C:\dir file_to_decrypt.* Volume in drive C is OSDisk Volume Serial Number is D0C7-13C7

Pages:     | 1 ||


Similar works:

«EUROPEAN COMMISSION Brussels, 8.1.2015 SWD(2015) 1 final COMMISSION STAFF WORKING DOCUMENT Ex-ante evaluation statement on EU macro-financial assistance to the Republic of Ukraine Accompanying the document Proposal for a DECISION OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL providing macro-financial assistance to Ukraine {COM(2015) 5 final} EN EN Ex-ante evaluation statement on EU macro-financial assistance to the Republic of Ukraine TABLE OF CONTENTS 1. Problem analysis and needs assessment...»

«NOT FOR PUBLICATION UNTIL RELEASED BY THE HOUSE COMMITTEE ON APPROPRIATIONS STATEMENT OF ADMIRAL JOHN M. RICHARDSON U.S. NAVY CHIEF OF NAVAL OPERATIONS BEFORE THE HOUSE SUBCOMMITTEE ON DEFENSE COMMITTEE ON APPROPRIATIONS ON THE FISCAL YEAR 2017 NAVY BUDGET MARCH 1, 2016 NOT FOR PUBLICATION UNTIL RELEASED BY THE HOUSE COMMITTEE ON APPROPRIATIONS Chairman Frelinghuysen, Ranking Member Visclosky, and distinguished members of the Committee, it is an honor to appear before you today. This is my...»

«Who is the 3 000 000th Erasmus student? 26 years after the launch of Erasmus, the programme has reached its goal of offering 3 million students the chance to study abroad or to take up a traineeship with a foreign company. To mark the milestone, the Erasmus Student Network (ESN) invited students from the 2012-2013 intake to apply to represent the 3 millionth Erasmus student. 1 800 students applied and, from among them, ESN and the European Commission selected one per country, choosing those...»

«Year Two MORSE Module Guide Compiled by Iain Carson Modified by Daniel Wilson-Nunn Summer 2013 Version 3 Contents 0 Introduction ii 1 Core Modules 1 1.1 ST202 Stochastic Processes............................. 1 1.2 ST208 Mathematical Methods............................ 2 1.3 ST218 Mathematical Statistics A.......................... 3 1.4 ST219 Mathematical Statistics B.........................»

«SPEECH IN THE U.S. MILITARY: A SOCIOPHONETIC PERCEPTION APPROACH TO IDENTITY AND MEANING A THESIS SUBMITTED TO THE GRADUATE DIVISION OF THE UNIVERSITY OF HAWAI‘I AT MĀNOA IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF MASTER OF ARTS IN LINGUISTICS MAY 2011 By M. Joelle Kirtley Thesis Committee: Katie Drager, Chairperson Patricia Donegan Richard Schmidt Keywords: Sociophonetics, Variation, Perception, Military Acknowledgements Thank you so much to all of the people who helped me...»

«ARCHIVAL COPY (3/09/2010) GENERAL SEMANTICS VS. “THE ENTIRE WESTERN SYSTEM OF RATIONALIZATIONS” 1 C. A. HILGARTNER n 1988, at the International Conference on General Semantics held at Yale I University, Allen Walker Read (1906–2002) invited me to tell the other participants “What I Have Done to Language.” In this paper, I tell what I have done with, to, and for general semantics in particular, and to human symbolizing in general. Introduction Some while ago, I read an account that...»

«Getting a Job: Is There a Motherhood Penalty? Author(s): Shelley J. Correll, Stephen Benard, In Paik Source: American Journal of Sociology, Vol. 112, No. 5 (March 2007), pp. 1297-1339 Published by: The University of Chicago Press Stable URL: http://www.jstor.org/stable/10.1086/511799. Accessed: 24/08/2011 19:00 Your use of the JSTOR archive indicates your acceptance of the Terms & Conditions of Use, available at. http://www.jstor.org/page/info/about/policies/terms.jsp JSTOR is a...»

«Surface Book User Guide With Windows 10 Published: September 2016 Version 2.0 © 2016 Microsoft © 2016 Microsoft. All rights reserved. BlueTrack Technology, Microsoft, OneNote, Outlook, PowerPoint, OneDrive, Windows, Xbox, and Xbox Live are registered trademarks of Microsoft Corporation. Surface and Skype are trademarks of Microsoft Corporation. Bluetooth is a registered trademark of Bluetooth SIG, Inc. Dolby and the double-D symbol are registered trademarks of Dolby Laboratories. This...»

«WP/05/201 Debt Maturity, Risk, and Asymmetric Information Allen N. Berger, Marco A. Espinosa-Vega, W. Scott Frame, and Nathan H. Miller © 2005 International Monetary Fund WP/05/201 IMF Working Paper Monetary and Financial Systems Department Debt Maturity, Risk, and Asymmetric Information Prepared by Allen N. Berger, Marco A. Espinosa-Vega, W. Scott Frame, and Nathan H. Miller1 Authorized for distribution by Patricia Brenner October 2005 Abstract This Working Paper should not be reported as...»

«Sept. 30/16 The “VANGUARD TESLA® MODEL X GIVEAWAY*” (the “Contest”) OFFICIAL RULES (the “Official Rules”) The Contest is being presented and administered by Yonge Grandview Corp. (the “Sponsor”). In these Official Rules, the term “Sponsor” includes, where the context permits or requires, any representative or representatives of the Sponsor. The Contest opens at noon Eastern Daylight Time (“EDT”) on October 15, 2016 and closes at 6:00 p.m. EDT on November 3, 2016 (the...»

«SpeakerSense: Energy Efficient Unobtrusive Speaker Identification on Mobile Phones Hong Lu1, A.J. Bernheim Brush, Bodhi Priyantha, Amy K. Karlson and Jie Liu Microsoft Research, One Microsoft Way, Redmond, WA, 98052, USA hong@cs.dartmouth.edu,{ajbrush, bodhip, karlson, liuj}@microsoft.com Abstract. Automatically identifying the person you are talking with using continuous audio sensing has the potential to enable many pervasive computing applications from memory assistance to annotating life...»

«The Bible Unpacked 32. Justice Comprehensive Study Series The Bible’s teaching presented for Bible students Paul Mallison The Bible ™ Unpacked Comprehensive Study Series The Bible’s teaching presented for Bible students 32. Justice Paul Mallison The Bible Unpacked™ Copyright © 1994–2017 by Paul Ian Mallison. All rights reserved. This book may be freely reproduced for use for non-profit Christian purposes. Free electronic copies may be downloaded at: www.thebibleunpacked.net. In...»





 
<<  HOME   |    CONTACTS
2017 www.sa.i-pdf.info - Abstracts, books, theses

Materials of this site are available for review, all rights belong to their respective owners.
If you do not agree with the fact that your material is placed on this site, please, email us, we will within 1-2 business days delete him.