User's Manual

6
C
OMMAND EXECUTION CONTROL
..................................................................................................................................37
C
MD
R
ESULT
....................................................................................................................................................................37
I
T ENABLES CONTROLLING AND EXTRACTING THE STATUS AND THE RETURN VALUES OF THE REMOTE COMMAND
.......37
S
ERVER
.........................................................................................................................................................................37
6
INTEGRATION .....................................................................................................................................................38
6.1
M
ANAGEMENT OF USER
-
TOKEN ASSOCIATION
...................................................................................................38
6.2
T
OKEN INITIALIZATION
......................................................................................................................................38
6.2.1
Example –token initialization....................................................................................................................39
6.3
S
ESSION OPERATION
..........................................................................................................................................40
6.4
SSL
OPERATION
.................................................................................................................................................41
7
EXAMPLES............................................................................................................................................................43
7.1
A
UTHENTICATION
.............................................................................................................................................. 43
7.2
C
RYPTOGRAPHY
................................................................................................................................................48
8
APPENDIXES.........................................................................................................................................................53
8.1
S
YMMETRIC CRYPTOGRAPHY
............................................................................................................................53
8.2
AES...................................................................................................................................................................53
8.3
DES...................................................................................................................................................................54
8.4
T
RIPLE
DES.......................................................................................................................................................54
8.5
H
ASHING ALGORITHMS
......................................................................................................................................54
8.6
G
LOSSARY
.........................................................................................................................................................55
8.7
B
IBLIOGRAFY
.................................................................................. E
RRORE
.
I
L SEGNALIBRO NON È DEFINITO
.