Difference between revisions of "Transmission Module"

From E-fileWiki
Jump to navigation Jump to search
Line 9: Line 9:
__TOC__
__TOC__


= '''System requirements''' =  
== '''System requirements''' ==  


e-file is compatible with all '''Windows''' and '''Mac Os''' versions.
e-file is compatible with all '''Windows''' and '''Mac Os''' versions.
Line 15: Line 15:
Here see the prerequisites for the transmission module, and there those for the sending service : [[Sending_Service#Prerequisites]]
Here see the prerequisites for the transmission module, and there those for the sending service : [[Sending_Service#Prerequisites]]


== Reporting services using www.e-file.lu ==
=== Reporting services using www.e-file.lu ===


Using this version of the transmission module : [[File:IconTransmissionModule.png | border]], you need :
Using this version of the transmission module : [[File:IconTransmissionModule.png | border]], you need :
Line 38: Line 38:




== Luxtrust certificate ==
=== Luxtrust certificate ===
{|border="1" cellspacing="2" cellpadding="10" style="text-align:left; width=80%;"
{|border="1" cellspacing="2" cellpadding="10" style="text-align:left; width=80%;"


Line 53: Line 53:
  |}
  |}


= '''Manual file transmission''' =
== '''Manual file transmission''' ==


Our Transmission Module allows you to submit reports and documents to Luxembourg authorities.
Our Transmission Module allows you to submit reports and documents to Luxembourg authorities.
Line 97: Line 97:




= '''KeyTool''' =
== '''KeyTool''' ==


KeyTool is an independent Java software which can be '''downloaded''' by clicking the link below:
KeyTool is an independent Java software which can be '''downloaded''' by clicking the link below:

Revision as of 14:12, 3 September 2024

Page's last update : 03/09/2024

System requirements

e-file is compatible with all Windows and Mac Os versions.

Here see the prerequisites for the transmission module, and there those for the sending service : Sending_Service#Prerequisites

Reporting services using www.e-file.lu

Using this version of the transmission module : IconTransmissionModule.png, you need :


Prerequisites
Proxy, antivirus The ports 80 (HTTP) and 443 (HTTPS) must be enabled
as well as those technical URLs : www.e-file.lu/WSEfileFlex and www.e-file.lu/WSEfile
Cookies Cookies have to be enabled
How to enable Cookies
Web browsers e-file is compliant with most current browsers, in their default setup : Icon Chrome.png Edge Chromium.jpg Logo ff.jpg Logo safari.jpg
Please call us if you have a particular configuration.


Luxtrust certificate

Additional information
LuxTrust certificate order All reporting files transmitted to the CSSF through the external transmission channels must be encrypted according to the standards defined in the related document of Circular CSSF 23/833 “Methods of transmitting reports via external channels”. (See more about data protection)

For encryption purposes, a Luxtrust SSL certificate is mandatory to use our services.
To be able to order the certificate on Luxtrust’s webpage www.easyssl.lu you need to use a modern browser (Chrome, Edge, Firefox, Safari, ...)

=> How to order your Luxtrust certificate

Manual file transmission

Our Transmission Module allows you to submit reports and documents to Luxembourg authorities.

Transmission Module Technologie

Transmission Module technologi After(1).PNG

Transmission Section

Transmission Module Section After(1).PNG

Keystore Selection

Keystore selection After(1).PNG


Configuration of keystore

The activated keystore, containing your LUXTRUST certificate and your encryption keys must now be provided to the workstations of each e-file user.

Step 1:

Open the Transmission module

Icon1.png


Step 2:

1- Click the settings button

2- Click the Browse button and select your keystore

3- Tick the 'Save keystore settings' to keep your change

ImportKeystore.png

It's done


KeyTool

KeyTool is an independent Java software which can be downloaded by clicking the link below:

Download KeytoolIUI.zip

To open it, double click on keytooliui.jar

Keytool.jar.png ➡️ Keytool manage view.png


Why to merge two keystores

While renewing a Luxtrust certificate, the Transmission Module sometimes creates a new keystore file instead of amending the existing one. This happens when the existing keystore is not selected during the keys generation. The new keystore then allows all E-file functionnalities. However, documents encrypted with or for one of your old certificates cannot be opened.

This article explains how to merge two keystores.


How does a keystore work

SchemaKeystore.jpg

Keystore is a Java technology that keeps an history of your certificates like a stack. It is a small file which extension is ".ks" and contains a list of certificates.


Every certificate contains a public key but also a private key which is protected by a password (symbolized CleJaune1.jpg). The keystore access is protected by a password as well (symbolized CleNoire1.jpg). The private key password and the keystore password must always match, thus CleJaune1.jpg= CleNoire1.jpg. For this reason make sure to always use the same password while handling the keystore.
During encryption or decryption, the Transmission Module will browse the different keystore's certificates in order to find the associated private key. That's why it's better to have all your company's certificates inside the same keystore. On the previous sketch, the certificate D has been inserted in a new keystore (keystore 2). For convenience reasons, we prefer putting it in the other keystore (keystore 1) at the top of the pile.


How to merge two keystores

The merging of two keystores is done thanks to an independent Java software called KeyTool which can be downloaded at the following link : [[1]]. To open it, double click on keytooliui.jar.

Follow all the steps to import public and private key from a certificate to another.

1vue.png

  • Select "Import private key from other keystore" as shown on the above printscreen (step 1)
  • Click on the two icons in the "Source" section in order to select the keystore containing the certificate to import (step 2). The source keystore corresponds to Keystore 2 of the "How does a keystore work" section sketch.
  • Do the sane for the target section that selects the keystore on which import the certificate (step 3). The target keystore corresponds to the Keystore 1 of the of the "How does a keystore work" section sketch.
  • Click OK (step 4)

2vue.pngf

  • Select the certificate (that contains the private key) of the source keystore that you desire to import, input its password in the specific field at the bottom of the window.

Click OK

3vue.png

Input the name of the new private key that will be generated in the target keystore. The naming convention is :

cleprivalid_ + incremented number.

As an example, if the target keystore contains already 4 certificates, it has the following entries :

  • cleprivalid_1
  • cleprivalid_2
  • cleprivalid_3
  • cleprivalid_4

The new key name will be cleprivalid_5.

  • Input the password that will be associated to the new key. Warning : it must be the same as the other private key's password of the target keystore (the one of the keystore). Confirm password.
  • Click Ok

4vue.png

The following window appears to indicate the success of the import. When clicking Ok you will see the target keystore content that should contain the imported certificate.

FinalVue.png