Participants can access the CCASS/3 system through two channels, including:
1. CCASS/3 Terminal (C3T)
- C3T uses market standard Internet technology. Any PC equipped with supported versions of Microsoft Windows and browser can access C3T online functions
- All participant functions will be provided with an HTML (windows) based presentation
- The standard graphical user interface will provide a user-friendly interface, which is easy to use with reference to respective User Guides
Log on to Client Connect to access the CCASS/3 installation procedures and User Guides.
2. Participant Gateway (PG)
PG is a technical device to provide an access point through which a Participant Supplied System (PSS) can access CCASS/3.
In order to reduce the development efforts of participants, Java-based application programming interfaces are provided to participants’ PSS to communicate with CCASS/3 through the PG. The application program is a custom-built Java library that will assist the connection and handle all the subsequent message interactions between participants’ back office system and CCASS/3 Host.
Hypertext Transfer Protocol Secure (HTTPS) is used for communication between PG and CCASS/3 middle tier. Socket is the communication method between PG and PSS. The message format follows the industrial standards ISO 15022.
Network Communication Layer
The SDNet will ensure the reliable transmission of input between the user device and the host. The network will control the transmission of all information within the CCASS/3 system and will help to achieve the shortest possible response time even at the highest data through-put rates, ensuring fast and efficient clearing and settlement services at all times.
Security Measures
Security is a primary concern in the system design of CCASS/3. The following security measures are employed in CCASS/3 to ensure confidentiality and security:
Security measures
|
Details
|
Pre-defined User Group Authority
|
All participant functions are grouped into a member of user groups. The availability of user groups for participants is pre-defined by the system. CCASS/3 allows the delegation of administrative privileges to organisational administrators, allowing them to manage user privileges and benefits within their organisations.
|
CCASS/3 Terminal Level
|
Access to the CCASS is authenticated by 2-Factor Authentication (2FA) with regular password and One-Time Password (OTP) generated from the ForgeRock Authenticator App or email.
|
Message Level
|
Encryption is implemented through standard browser functions, using Secure Sockets Layer (SSL) key to prevent transactions from being exposed to eavesdropping, tampering or message forgery risks.
|
Participant Gateway Level
|
For message level of security, access to PG is authenticated by smartcard and all data exchange between the PG and CCASS/3 Host are encrypted using SSL keys.
|
Network Level
|
Firewalls, routers and intrusion detection devices are used to protect the CCASS/3 network from unauthorised access through the public internet.
|
Log on to Client Connect to learn more about the PG acquisition documents, end-to-end test package, messaging specifications and charges involved.