Establishing ELSTER encryption in ECC 6.0

Hello!
I would like to set up the ELSTER encryption functionality in ECC 6.0.
Has some one experience, helpful information, technical steps (Tcodes), SAP notes for the following operations:
<b>- establish ELSTER encryption
- establish Business Connector
- establish RFC-Verbindung
- establish  electronic agency comunication
- to store settings for electronic agency comunication
- authorization</b>
Thank you very much indeed!
Regards
Thom

Hi Thom,
<b>Regarding establish RFC-Verbindung</b>
http://help.sap.com/printdocu/core/Print46c/de/data/pdf/BCMIDAPIINTRO/CABFAAPIINTRO.pdf
<b>establish Business Connector</b>
http://www.thespot4sap.com/articles/SAP_XML_BC_Integration_Benefits.asp
<b>For Tcodes</b>
http://www.saptransactioncodes.com/l.html
Regards,
Kumar.

Similar Messages

  • Establish ELSTER in SAP ECC

    Hello!
    I would like to establish ELSTER encryption in my SAP ECC.
    What are the technical steps/procedure/relevant Tcodes to do this?
    Thank you very much!
    regards!
    Thom

    Hi Jacob,
    For AS400 environment as well 20% limit exists.
    Refer SAP help for more details
    http://help.sap.com/saphelp_40b/helpdata/EN/02/962824538111d1891b0000e8322f96/content.htm
    Number of active work processes: 10
    (AS/400 jobs in status RUN)
    Number of page faults per active work process: 20 per second
    Allows: 200 page faults per second
    Paging overhead per work process: 200 ms per second
    (accepted average response time of hard disk is 10 ms)
    That corresponds to a paging overhead of 20%. The 20% limit should not be exceeded.
    Hope this helps.
    Regards,
    Deepak Kori

  • Establishing ELSTER for ERP2005 systems

    Hello!
    I have 2 systems landscape (SAP ERP2005) and would like to establish ELSTER.
    I do not have XI.
    My questions are:
    - which technical settings should be done for the establishment ELSTER?
    - should Business Connector be installed, do I need installation key for this. Who can request them?
    - should the whole settings be executed on the productive system and productive client?
    - which settings can be done by SAP Basis and which by FI?
    Thank you  very much!
    regards

    My German colleague tells me ELSTER is the electronic tax filing/ tax declaration interface and DATEV is the interface to export tax information / financial data. Both are specific to the German market.
    I don't believe this is the correct forum to address this question. Maybe you could check with some of the middleware or interface teams for more inputs on how to set these up.
    Sorry mate, can't help.
    Cheers.

  • Establishing ELSTER/DATEV for ERP2005 systems

    Hi!
    I have 2 systems (ERP 2005) landscape and have to set up the ELSTER/DATEV approach for these systems.
    The system landscape is:
    DEV-system (Clients: 100 and 200)
    PRD-system (Clients: 100)
    We do not have SAP XI, so we need to use SAP Business Connector
    Questions:
    What is the difference between ELSTER and DATEV, should I set up both of them?
    Do I need to set up the whole approach on each system (DEV, PRD) and each client (100, 200)?
    What are the steps are necessary therefor?
    Thank you ver much indeed!
    regards
    Thom

    My German colleague tells me ELSTER is the electronic tax filing/ tax declaration interface and DATEV is the interface to export tax information / financial data. Both are specific to the German market.
    I don't believe this is the correct forum to address this question. Maybe you could check with some of the middleware or interface teams for more inputs on how to set these up.
    Sorry mate, can't help.
    Cheers.

  • ECC Assymetric encryption

    Hi friends.
    I want to perform assymetic encryption using ECC.
    does any one have any link for any ECC Provider
    or any ecc java implementation ?

    Thanks euxx.
    But there is only ECIES which is a symmetric one.
    Can you help me out how can i perform asymetric encryption using it ?
    Please..

  • Proxy Activation - ECC 6.0 to SAP PI system

    Hi All,
    Our envirnonment -
    1) SAP ECC 6.0 ( R/3 system)
    2) SAP PI ( R/3 system)
    To  establish communicate between SAP ECC 6.0 to SAP PI ( R/3 system using proxies )-
    we have setup following steps on ECC 6.0 system-
    1) Created a HTTP connection in the business system of type H.
        Please let me know what is the path prefix we need to set.
    2) Configuration Business system as local Integration Engine.
    3) Connection between Business System and System Landscape Directory
       Create RFC destination (TCP/IP) LCRSAPRFC and SAPSLDAPI for the SLD connection.
    I have developed a sample interface to send data from SAP ECC --->PI --> File system ( Proxy to file interface)
    When i run the report to call the proxy it is pushing the data on the integration engine of the ECC system.
    How can i debug what is the problem is ? why the data is not getting pushed on PI system using proxy ?
    How can i debug this ? Please let me know if i am missing any thing in proxy activation between ECC to PI system.
    Regards,
    Kishore

    Hi ,
    I have cross checked the activation steps.
    I am able to create a interface proxy to File
    SAP ECC R/3 system --- > SAP PI ---> File system
    I have created a proxy on ECC R/3 system using SPROXY. when i trigger the proxy using a abap report the data is not getting pushed on to SAP PI system .
    When i do a SXMB_MONI on ECC system it should call the integration server as out bound ... It is throwing a error message as mentioned below.
    <?xml version="1.0" encoding="UTF-8" standalone="yes" ?>
    - <!--  Call Integration Server
      -->
    - <SAP:Error xmlns:SAP="http://sap.com/xi/XI/Message/30" xmlns:SOAP="http://schemas.xmlsoap.org/soap/envelope/" SOAP:mustUnderstand="">
      <SAP:Category>XIProtocol</SAP:Category>
      <SAP:Code area="PARSER">ITEM_MISSING</SAP:Code>
      <SAP:P1>Envelope</SAP:P1>
      <SAP:P2 />
      <SAP:P3 />
      <SAP:P4 />
      <SAP:AdditionalText />
      <SAP:ApplicationFaultMessage namespace="" />
      <SAP:Stack>XML element Envelope missing in SOAP message header (SAP XI Extension)</SAP:Stack>
      <SAP:Retry>M</SAP:Retry>
      </SAP:Error>
    Please let me know how to proceed .
    Cheers,
    Nanda

  • Communication between ECC and CRM

    Hello,
    I am in phase of showing communication between SAP CRM 5.0 and ECC 6.0.
    I am struggling with finding some simple transactions which are common in both, with which I can show correct connectivity between ECC and CRM.
       I need to save some data from CRM and access the same via transaction within ECC, save some data via ECC and access it via CRM. I already established RFC link between ECC and CRM.
    Probably communication between SD module of ECC with CRM.
    Can you please help me out with this, a clue/correct direction will be of very helpful. Basically I want to know, what transaction I can use for same.
    Any help is really appreciated.
    Thanks
    -Vishal

    Hi Glenn,
          I followed all steps in document mentioned above. In the end during execution of transaction I selected appropriate source and destination, when I click start transfer objects, it gets stuck in waiting phase.
    Among those steps I was not able to perform step#10. Creating Subscriptions for OLTP. My ERP is not displaying this option under subscription wizard. Should it be reason for not starting transfer ? I also do not see ERP logon screen when I select transfer.
    My another question is when transfer will complete, where I'll be able to see transferred objects within ERP database ?
    Thanks
    -Vishal

  • Messages are reaching PI wthout any configuration in PI from ECC

    Hi,
              I am using PI 7.11. Its a fresh system so as of now there is no interfaces. Just a two days back only we have established the RFC connections ECC to PI and PI to ECC.  After these configuration we have transported one interface File to Proxy scenario. Strangly some of the messages are comming from ECC to PI and its failed because of no receiver found. Other than File to Proxy we dont have any scenario in PI.  Please find the below message details.
    Service : BS_SAP_XXX_200
    Interface Namespace :  http://sap.com/xi/APPL">QueryCodeList<>
    Payload :
      <?xml version="1.0" encoding="utf-8" ?>
    - <n0:QueryCodeListRequest xmlns:n0="http://sap.com/xi/BASIS" xmlns:prx="urn:sap.com:proxy:ECC:/1SAI/TASC66A5D70F4DF6172EFE5:701:2009/02/10">
    - <CodeDataType>
      <Name>BusinessTransactionDocumentTypeCode</Name>
      <NamespaceURI>http://sap.com/xi/SRM/SE/Global</NamespaceURI>
      </CodeDataType>
      <LanguageCode>en</LanguageCode>
      </n0:QueryCodeListRequest
    This is a syschronous scenario that to this interface is running at specified at on everyday.
    Can you pls let me know what might be the problem?
    Thanks & Regards,
    Puru

    Hi,
    I assume this scenario is not the one you transported for File to proxy.
    This is Generic Value help Service which is triggered because of some event configuration on ECC or some report calling outbound proxy with default runtime (PI runtime is default). Of course this will fail in PI because you haven't configured it in PI.
    Check following: SWF_BAM for events on ECC.
    Check if any report is creating SalesOrder, PurchaseOrder etc at that particular time.
    Issue is on ECC side not on PI side.
    Regards,
    Gourav

  • IChat works unless encrypted.

    I am able to video and audio iChat without encryption, but if encryption is enabled on both machines I get the message:
    "Security could not be verified for (person I am contacting).
    iChat was unable to establish an encrypted connection between you and the person claiming to be (person I am contacting).
    Encrypted conferencing with them will be disabled until the next time they log in."
    However, when I click on a buddy name (ie for text messaging) it works normally and shows the message is encrypted.
    If encrytion is removed from either machine I can connect.I have trashed plists, revoked and reestablished the security certificate, confirmed that the .mac accounts are valid, rebooted etc. There is an airport on one machine but as mentioned I get through fine without encryption.
    Any ideas?
      Mac OS X (10.4.4)  

    Hi,
    I have looked in the iChat Help item.
    I chose New Feature> Encryption > Trouble Shooting
    Make sure you have a paid .Mac account and that it has not expired.
    Make sure you and your buddies are using Mac OS X v10.4.3 or later.
    Make sure the .Mac Secure iChat certificate is in your keychain and has not expired. To check, open Keychain Access, located in Applications > Utilities, and double-click the .Mac Secure iChat certificate to display the expiration date.
    Make sure the date and time are correct on your computer.
    If your Secure iChat certificate is not in your keychain, and you have used secure iChat on a different computer, sign into your .Mac account to install a copy of your Secure iChat certificate on your computer.
    If you are unable to retrieve a copy of your Secure iChat certificate from the .Mac website, you may need to copy your certificate from the other computer and install it in your keychain on the computer you are using. To do this, locate the certificate in your keychain on the computer you have used to secure iChat. Choose Export from the File menu. Copy the exported certificate to your other computer, and double-click the file to open it in Keychain Access. Choose login from the Keychain pop-up menu and enter your administrator password if necessary.
    Make sure you are chatting with buddies in your Buddy List, not your Bonjour or Jabber list.
    Also this might help http://docs.info.apple.com/article.html?path=Mac/10.4/en/mh2141.html
    Ralph

  • Rejected client certificate by the server

    Hello everyone.
    I writting you because a I have a big problem using ssl and client authenticate.
    I created a connector for the client connetions:
    <Connector port="9443"
         maxThreads="150" minSpareThreads="25" maxSpareThreads="75"
         keystoreFile="C:/WINDOWS/security/server.ks"
         keystorePass="*********"
    enableLookups="false" disableUploadTimeout="true"
    acceptCount="100" debug="0" scheme="https" secure="true"
    clientAuth="true" sslProtocol="SSL" />
    As it is for educational propurses, I created my own self-signed CA using openssl and generate a certificate request for the
    web server and then I signed with the self-signed CA.
    Then I created a client certificate and I signed with the self-signed CA, I import the self-signed CA in firefox as a
    certificate authority and the client certificate as a client certificate, but when I try to establish a connection I got this
    error message: "Could not establish an encrypted connection because your certificate was rejected by agatha. Error Code -12271"
    (agatha is the apache server).
    I got a openssl manual and I saw I followed the right steps to create the CA and the client certificate, I also read that the
    common name of the client must match an entry in tomcat-users.xml, I created an entry with this common name and
    the error message still apears.
    When I use Internet Explorer I get a error page with this title: The page cannot be displayed
    I opened the stdout.log file and there is a exception repeted 5 times:
    NotifyUtil::java.net.ConnectException: Connection refused: connect
         at java.net.PlainSocketImpl.socketConnect(Native Method)
         at java.net.PlainSocketImpl.doConnect(Unknown Source)
         at java.net.PlainSocketImpl.connectToAddress(Unknown Source)
         at java.net.PlainSocketImpl.connect(Unknown Source)
         at java.net.Socket.connect(Unknown Source)
         at java.net.Socket.connect(Unknown Source)
         at sun.net.NetworkClient.doConnect(Unknown Source)
         at sun.net.www.http.HttpClient.openServer(Unknown Source)
         at sun.net.www.http.HttpClient.openServer(Unknown Source)
         at sun.net.www.http.HttpClient.<init>(Unknown Source)
         at sun.net.www.http.HttpClient.<init>(Unknown Source)
         at sun.net.www.http.HttpClient.New(Unknown Source)
         at sun.net.www.http.HttpClient.New(Unknown Source)
         at sun.net.www.http.HttpClient.New(Unknown Source)
         at sun.net.www.protocol.http.HttpURLConnection.plainConnect(Unknown Source)
         at sun.net.www.protocol.http.HttpURLConnection.connect(Unknown Source)
         at sun.net.www.protocol.http.HttpURLConnection.getOutputStream(Unknown Source)
         at org.netbeans.modules.web.monitor.server.NotifyUtil$RecordSender.run(NotifyUtil.java:237)
    What is happening??? is there something wrong??

    That didn't work for me - as well as a host of other things that did not work for me. I can honestly say that Netbeans is the worst piece of junk software I've ever used in the entirety of my life and my previous one thousand lives.
    The best way to rid yourself of this problem is to uninstall Netcrap and run over to Eclipse. But beyond that, edit your [$TOMCAT_HOME]/conf/web.xml file and rip out the following section from the top - where Netcrap snuck it in, and didn't remove - even causing config errors after I turned it off.
    =========================================
    <filter>
    <filter-name>HTTPMonitorFilter</filter-name>
    <filter-class>org.netbeans.modules.web.monitor.server.MonitorFilter</filter-class>
    <init-param>
    <param-name>netbeans.monitor.ide</param-name>
    <param-value>127.0.0.1:8082</param-value>
    </init-param>
    </filter>
    <filter-mapping>
    <filter-name>HTTPMonitorFilter</filter-name>
    <url-pattern>/*</url-pattern>
    <dispatcher>REQUEST</dispatcher>
    <dispatcher>FORWARD</dispatcher>
    <dispatcher>INCLUDE</dispatcher>
    <dispatcher>ERROR</dispatcher>
    </filter-mapping>
    =========================================
    I'm using 4.0 on Linux. Thing has got a couple of cool features, but nothing beats dependability, and a darn config interface that actually makes sense. I mean, turn off some features and you can't even open your past projects?! WTF?! But no indication! But first the icon looks good! And then you click on it and it disappears! Un-effing-believable! And it took me hours to figure out how to set up a dang server! I just assumed it didn't have the ability to do it at all! The source-code control config is whack. Man. Total lack of useful documentation, no decent news/web boards. Totally outrageous.
    Worst. Software. Ever.

  • How to improve client handover and roaming between AP's

    Improving client Handover and roaming between APs
    There are a few standards and methodologies available to use to improve handover of clients between APs. Most are focused on VOIP technologies, but it must always be remembered that we cannot control the client Handover (especially with legacy clients) we can only encourage them. Some Standards and methods work well for some environments and some do not - test the recommendations extensively before implementing in a live Production environment. It must also be noted that all settings take effect immediately once applied, however from a client perspective it might need to re-associate for the changes to take effect client side.
    As with everything else in IT, if a perfect method/solution existed there would only be one - try them all and keep the best.
    The Standards and Definitions
    802.11k
    IEEE 802.11k allows a device to quickly identify nearby APs that are available for roaming. When the signal strength of the current AP weakens and the device needs to roam to a new AP, it will already know the best candidate AP with which to connect to.
    802.11r
    IEEE 802.11r specifies fast Basic Service Set (BSS) transitions between access points by redefining the security key negotiation protocol, allowing both the negotiation and requests for wireless resources to occur in parallel.
    When a device roams from one AP to another on the same network, 802.11r streamlines the authentication process. BSS allows a devices to associate with APs more quickly. Coupled with 802.11k's ability to quickly identify the target AP, BSS's faster association method may enhance application performance.
    Handoff Assist
    The AP monitors the RSSI for every associated client. If the RSSI for a specific client falls below "low-rssi-threshold" and continues to fall for the "rssi-falloff-wait-time", then the AP will send a de-auth to the client. 
    The de-auth is meant to kick the client away from the current AP and get it to re-authenticate to a nearby AP. This will have the effect of helping a client handover between 2 APs.
    BUT (Big But), if the client gets de-authed and takes a while to re-authenticate (if it even does re-authenticate automatically after a de-auth), then this will have the effect of destroying communication instead of helping it -- mostly found with legacy clients. 
    Remove Lower Transmit Rates
    Removing lower transmit rates is a way to promote better roaming, BUT not all clients respond well, or even respond to it. 
    The practice is that the basic rates are a subset of the transmit rates. If you only want to allow speeds 9 and up, you would select only the transmit rates of 9 and up, and the basic rates of 9 and 11. If a legacy client expects the rates of 1 and 2 it will not connect.
    Local Probe Threshold
    Local probe Threshold prevents a client from connecting to an AP with a too low a signal - helps more with initial connection than roaming.
    The local probe threshold parameter is not supposed to force clients to roam as soon as they pass near an access point with a good signal, but rather to NOT hold on to an access point with a weak signal (avoiding sticky clients).
    PMK Caching
    Defined by 802.11i and is a technique available for authentication between a single AP and a station. If a station has authenticated to an AP, roams away from that AP, and comes back, it does not need to perform a full authentication exchange. Only the 802.11i 4-way handshake is performed to establish transient encryption keys.
    Opportunistic Key Caching (OKC)
    Is a similar technique to PMK, but not defined by 802.11i, for authentication between multiple APs in a network where those APs are under common administrative control. An Aruba deployment with multiple APs under the control of a single controller is one such example. Using OKC, a station roaming to any AP in the network will not have to complete a full authentication exchange, but will instead just perform the 4-way handshake to establish transient encryption keys
    Implementation and Configuration
    802.11k
    802.11k is configured in your VAP profile. Tick the option to “Advertise 802.11k”. There after set the Handover Trigger Feature Settings.
    Tick the “Enable Handover Trigger feature” and then set RSSI threshold by specifying the -dBm level at what the hand over trigger should be sent to the client
    802.11r
    802.11r is configured under SSID of your VAP profile. Tick the option to “Advertise 802.11r”
    HandofF Assist
    Station Handoff Assist is enabled in RF Optimization under the RF Management section of AP configuration.
    Tick the “Station Handoff Assist” option to enable it, next set the Low RSSI Threshold – the threshold determines above what level no deauth gets sent
    Lower Transmit Rates
    Transmit rates can be adjusted in the Advanced tab of SSID under your VAP profile.
    Remember that the basic rates are a subset of the transmit rates. If you only want to allow speeds 9 and up, you would select only the transmit rates of 9 and up, and the basic rates of 9 and 11
    Local Probe threshold
    Local Probe threshold can be adjusted in the advanced tab of SSID under your VAP profile.
    Depending on the density of your APs consider values between 20 and 40 -- 40 being aggressive in an AP dense area.
    Deny Broadcast Probes
    Denying Broadcast Probes can cause problems with Roaming especially if the SSID is hidden – leave option disabled.

    Hi, thank you for the helpful guidance.  I have a basic question, if the device roam from one AP to another AP with the same SSID.  Is there a need of re-authentication given a) the network uses EAP based authentication; b) the network uses MAC address authentication.   If there is no need of EAP re-authentication, how the 802.11 keys are moved to the new AP.  Thank you very much if you could help me clarify my thought. 

  • ITunes see AE but won't switch to the AE speakers

    I have configured my new AE to connect to my existing Buffalo WZR2-G300N wireless network.
    When I open iTunes, I see the icon in the bottom right corner giving me the choice of my Computer speakers (running win7x64) OR my AE-connected speakers.
    I choose the AE-connected speakers and an AirPlay status box pops up that says iTunes is connecting with the AE-connected speakes.
    After 30 seconds, the box just disappears, BUT ITUNES IS STILL CONNECTED TO MY COMPUTER SPEAKERS AND NOT THE AE-CONNECTED SPEAKERS.
    I have reset the AE, configured it automatically, and then resent it again and configured it manually to ensure iTunes was selected in the music tab.
    In iTunes, I have gone to the Preferences:Device tab and ensured that 'Look for remote speakers' is checked.
    ANY GUESSES AS TO MY PROBLEM?

    Strange indeed. Fortunately (or unfortunately), your findings with the iPad, confirms that AirTunes & the AirPort Express are working properly ... but for some reason iTunes on the PC is not able to properly communicate as well.
    As reference, AirTunes does its "magic" in several stages: 1) It first attempts to locate an AirPort Express Base Station (AX) or Apple TV, 2) It then establishes an encrypted connection between the iTunes host and the AX/ATV, 3) It then creates a pair of "tunnels:" one for control and the other for streaming purposes. In order to do all of these, a number of software firewall ports must be opened to allow the communications.
    The fact that, even with the Win7 firewall disabled, you can "see" the AX, but not stream to it, means that something else is "blocking" the stream.
    On Macs, it was found (outside of any firewall issue) that disabling IPv6 resolved the streaming issue in a few cases. This was required on both the Mac itself and the router.

  • ABAP API's - URGENT- Tracking of changes in MDM.

    Hello Experts,
    I want to track all the changes made in MDM In ECC. I know that i can do it using ABAP API's tracking feature.
    I have already established  the connection between ECC and MDM.
    I would want to know all the exact steps to enable tracking and monitoring through ABAP API's.
    Helpful answers will be highly appreciated.
    Thanks and Regards
    Nitin jain
    Edited by: Nitin Jain on Jan 29, 2008 4:45 AM

    Hi Nitin,
    As you have already connected to MDM through R/3.
    For Changing Tracking, you have to call the function  'MDM_ADMIN_RETR_CHANGE_TRACKING' for that you have to use structure MDM_AUDIT_INFORMATION.
    I am not quite sure will it work. Please try.
    Hope it helps you,
    Regarding CCMS montoring in MDM ABAP APIs, refer the link: 
    How TO Guides available on Service Market Place.
    https://websmp210.sap-ag.de/~sapidb/011000358700004121872006E --> operations
    Here apart from How to guides you will also get
    HowTo_CCMS_Trace.pdf : It will guide you if there any errors come in connection b/w R/3 and MDM. it does the following:
    . Collect and evaluate application log data
    - Collect and evaluate kernel trace data
    - Problem solution showcasecomes
    if your HowTo_07.pdf on Tracing report is working fine then you can identify whether is there any error coming or not.
    Lets take an example : if you Shut down the MDM Server.
    Then in R/3 On running HowTO_07 program:you will get ERROR DURING CONNECT: 3 , ERROR DURING DISCONNECT: 3
    The Reason for this is the unavailable server. but here you will not get more details. For this
    After implementing HowTo_CCMS_Trace guide:  under transaction RZ20 : In Application Trace you will see error Partner not reached (hostXXX, Service 20005) and
    In Kernel WorkProcess Trace: You will get error: MDE Kernel Error, NiRaw2ConnectError: the attempt to establish a socket connect caused an error.
    So in this way you evaluate the error in more details.
    Note: For this you should have authroize to use the transaction RZ20 in R/3 System.
    Hope it helps you,
    Mandeep Saini.

  • Dual SSID's

    I am looking into purchasing 2 1131AG's. What I want to do is have 1 access point on each floor of my buidling, 2 floors total. Now I want to make sure that when an employee gets on with a wireless laptop, he can access the wireless network with full permissions. When a guest comes, I want him to access only the internet and no internal network.
    This brings me to create 2 seperate SSID's. One for Internal Network and one for Guests.
    Is it possible to setup 2 different SSID's on both Access points in this way so that a guest or employee walks between floors and has uninteruppted connectivity?
    These access points will be connected to Cisco 3750 Layer 3 switches in a Windows server 2003 environment.
    Users will have mixed vendor Wireless A G and B wireless network cards.
    Can this be possible ?

    Assuming you have the coverage you need with one AP per floor, yes, it's certainly possible.
    Set up two VLANs, assign an SSID to each. Set up your L3 switch for trunking the two VLANs. Forward the traffic from your guest VLAN to your Internet Gateway device, Send the traffic for the internal network to your network gateway device (putting that VLAN in a DMZ would be a good thing.
    Put in some ACLs for good measure, establish whatever encryption you feel appropriate, and you're good-to-go.
    The MS IAS can only handle PEAP, EAP-TLS, EAP-TTLS, and (probably) MD5. Using MS-CHAPv2 for internal auth is recommended. Microsoft has some pretty good white papers on setting all of this up on their site.
    Good Luck
    Scott

  • Problem with secure video chat

    Hi there,
    I am having problems creating a secure video chat connection between my wife and my accounts. We both have .Mac accounts and are able to run encrypted text and audio chats, but when either of us try and establish a video connection with the other we both get back a message saying:
    Security could not be verified for <Name>
    iChat was unable to establish an encrypted connection between
    you and the person claining to be <.Mac address>
    Encrypted conferencing with them will be disabled until the next
    time they log in.
    Any one any ideas why this is happening and how to resolve it?

    Hi S Harvey,
    Are these both fully paid up @mac accounts ?
    Can you do un-encrypted Chats ?
    Have you tried ccnfirming your Certificate ?
    Has your wife ?
    4:05 PM Saturday; April 29, 2006

Maybe you are looking for

  • Problem on Installation of oracle on Linux............

    I am trying to install oracle on Redhat Linux 9.0 With the kernal version of 2.4 but installation is Abounded at 0% and not carrying forward at all, I think some Of the parameter should be set on “.bash_profile” Please tell me all the parameters shou

  • QUERY PERFORMANCE AND DATA LOADING PERFORMANCE ISSUES

    WHAT ARE  QUERY PERFORMANCE ISSUES WE NEED TO TAKE CARE PLEASE EXPLAIN AND LET ME KNOW T CODES...PLZ URGENT WHAT ARE DATALOADING PERFORMANCE ISSUES  WE NEED TO TAKE CARE PLEASE EXPLAIN AND LET ME KNOW T CODES PLZ URGENT WILL REWARD FULL POINT S REGAR

  • DW CS5 - PHP in HTML file - no display in DW live view

    Have DW CS5, Local IIS 7 (Win 7 64x) testing server (Server Model: PHP MySQL) set up and working. External browsers render .html files with PHP fine (URL=http://localhost/testphp.html), DW Live View will not parse/display the PHP with ".html" extensi

  • Cannot install ZfD65 SP2

    Scenario: NW 6.5 SP5 ZfD 6.5 SP2 Issue: I have a server running ZfD imaging and wks import/removal. This server runs ZfD 6.5 SP2. Now I also need to install Inventory services from my product CD. But installing ZfD Inventory services from the product

  • Infosource invisible in Productive system (APO BW)

    Hello I've created a new setup where i'm uploading from a flat file to an infocube. It works fine in the T and Q system. However after transport to the P system i can only see the infocube in RSA1, i cannot see the infosource so i can't create an inf