Aa 7 2 RL
Aa 7 2 RL
Release Letter
20 April 2018
Alliance Access 7.2 Table of Contents
Release Letter
Table of Contents
Practical Information.........................................................................................................................................5
1 Overview...................................................................................................................................................7
1.1 Why Release 7.2 and How Does It Impact Me?...................................................................................... 7
1.2 Enhancements and Features...................................................................................................................7
1.3 Resolved Problems................................................................................................................................19
1.4 Software Distribution..............................................................................................................................19
1.5 Support Duration................................................................................................................................... 19
1.6 System Requirements........................................................................................................................... 20
1.7 Documentation...................................................................................................................................... 23
1.8 Warnings and Known Issues................................................................................................................. 24
1.9 Obsolete Functionality........................................................................................................................... 27
3 Support...................................................................................................................................................30
20 April 2018 2
Alliance Access 7.2 Table of Contents
Release Letter
Legal Notices................................................................................................................................................... 49
20 April 2018 3
Alliance Access 7.2 Impact of Using FileAct with Release 7.2
Release Letter
20 April 2018 4
Alliance Access 7.2 Practical Information
Release Letter
Practical Information
Installation type Mandatory release
Install by November 2018
You must either install Release 7.2 from scratch, or install Release
7.2 using a prepared backup file. You cannot upgrade to Release 7.2
using your current environment.
Release 7.2 contains several enhanced security features including
additional detection capabilities of compromises as observed in the
modus operandi where attackers deploy malware to obtain operator
access (as described in SWIFT ISAC Bulletin 10060).
In some situations the detection mechanism of Alliance Access
7.2.00 reports false memory integrity errors. The behaviour is hard to
reproduce but has occurred at least once with most of the customers
that have not installed Alliance Access 7.2.10. When an integrity
alarm occurs SWIFT always ask you to provide data to investigate
the case.
Therefore, to avoid getting false alerts and having a support case
opened for investigation, install update 7.2.10 before proceeding with
any operations.
Please see Knowledge Base tip 5022433 for more information
regarding the reasons why 7.2.10 must be installed as soon as
possible.
20 April 2018 5
Alliance Access 7.2 Practical Information
Release Letter
Software support lifetime This base release of Alliance Access 7.2 will be supported until 16
November 2018, when the annual Standards update becomes
mandatory.
Significant changes since previous Updated information regarding the need to install Alliance Access
version: 7.2.10 (this section).
20 April 2018 6
Alliance Access 7.2 Overview
Release Letter
1 Overview
Alliance Access 7.2 includes all changes introduced since update 7.1.23. It also contains the
following enhancements with no new features or functionalities:
• Updates for Standards MT November 2017
This update resolves the issue mentioned below.
Significant fixes
CR number Description
1.2.1 Overview
This update contains the following enhancements and new features:
• Standards 2017 support
• Technology renewal
• Oracle Database is distributed in a different way
• Four-eyes security for configuration changes
• Security by default
• Enhanced local password policies
• Event distribution to monitoring systems in CEF format
• Improved information in events
• Support for process whitelisting tools
• Support for SWIFTNet FileAct enhancements
• CREST over SWIFTNet enhancements
• Message/Instance search enhancement
• Identification of messages touched by human
• Security Best Practice Check tool enhancement
20 April 2018 7
Alliance Access 7.2 Overview
Release Letter
SWIFT gpi: on the Standards Release 2017 cut-over date, all banks must be capable of receiving
gpi fields in Block3
The February 2017 updates of the Standards Release Guide on SWIFT gpi mentions:
MT 103, MT 103 STP, and MT 103 REMIT: Two additional fields may be present in header block 3
to indicate a service type identifier (field 111) or a Unique End-to-end Transaction Reference
(UETR, field 121). Use of these fields has previously been restricted to members of the SWIFT
Global Payment Innovation (SWIFT gpi) Initiative. This service allows banks in the SWIFT gpi
Closed User Group (CUG) to track payments based on the UETR. SWIFT gpi participants will be
allowed to include these header fields in all MTs 103, MTs 103 STP, and MTs 103 REMIT that they
send, including to banks that are not in the CUG, allowing the service to track a payment up to
the first bank outside of the SWIFT gpi CUG. Banks that are not in the CUG must be able to
receive these header fields but will not be allowed to send or forward messages containing fields
111 or 121.
Alliance Access is already capable of receiving the fields and forwards them to your back-office.
Make sure that your payment systems are able to receive messages with block 3 field 111 and 121.
Alliance interfaces will not remove the gpi fields on incoming MT103 when passing them on to
back-office systems. If needed, SWIFT Consulting Services can propose custom solutions.
The FIN tank file contains test messages with field 111 and field 121 in block 3 as part of the test
messages for future standard.
20 April 2018 8
Alliance Access 7.2 Overview
Release Letter
Restrictions:
• All customers who use third-party ADK components must request new versions of these
components from their providers.
• All customers using IPLA modules must validate with their provider if their module is compatible
with Release 7.2.
Note The base Release 7.2 is aligned with the August 2017 Alliance Security Update with
regards to the Oracle Java critical updates implemented. November 2017 will be the
first slot where a potential Security Update will be available for Release 7.2.
20 April 2018 9
Alliance Access 7.2 Overview
Release Letter
Thanks to this feature, a customer can assign a single profile to multiple employees and let Alliance
Access take care of the segregation of duties (for specific entities). Previously, the same customer
had to create multiple complex operator profiles to be assigned to each employee to ensure the
segregation of duties.
At the same time, Alliance Access tracks who created and who made the last modification to
Operators, Message Partners and Routing Schemas. The last modifier cannot enable the Message
Partner. If this is attempted, an error will be displayed. Additionally, keeping the last modifier tracked
allows changes to be better monitored.
For more information, see the section Four-Eyes Mechanism in the Alliance Access Configuration
Guide.
If there are Message Partners configured with the LTA option and the security parameter is updated
to 'No', the Message Partner will continue to run. However the script will not be executed and the
corresponding configuration fields will not be visible in the edit screens anymore.
When migrating from earlier versions, the default value for that parameter will be set to 'No'. If there
is at least one Message Partner configured with the LTA option then the security parameter will be
set to 'Yes', to make sure the configuration continues to work.
20 April 2018 10
Alliance Access 7.2 Overview
Release Letter
For more information, see the section Batch Output in the Alliance Access Configuration Guide.
20 April 2018 11
Alliance Access 7.2 Overview
Release Letter
Normal users
Password – User Min Pwd new Minimum length of the user password 8
Length TOTP when TOTP is configured as
authentication type.
Password - User Period updated Number of days after which the user 90
password has to be changed.
Allowed values: 3 or 4.
System - Disable Period updated The number of calendar days after 120
which a user is disabled if there was no
successful sign-on. The check is done
at server start-up and every hour.
Privileged users
20 April 2018 12
Alliance Access 7.2 Overview
Release Letter
Password - Admin Period new Number of days after which the 365
administrator password has to be
changed.
System - Admin Disable new The number of calendar days after 120
Period which an administrator is disabled if
there was no successful sign-on. The
check is done at server start-up and
every hour.
Note • Migrated end-users who have passwords that are shorter than the specified
minimum will be asked to select a new password at the first password change
following the installation of Release 7.2.
• When a normal user profile is changed (for example, new permissions are added)
and becomes a privileged user; the user will automatically inherit the new
password policy, applied as from the next login, if the length constraints change
and the used password is too short.
• The generated initial password complies with the password policy with respect to
the length, and may contain a mixture of uppercase/lowercase/numerics. The
password must however be changed at first use.
• The new character type used for Strong validation (Symbol), can be any character
out of (! # $ % & ' ( ) * + , - . / : ; < = > ? @ [ \ ] ^ _ ` { | } ~). Non-ASCII characters
are not supported in passwords.
• Some additional rules are enforced on the passwords:
- The password must not be the same as the user name.
- Successive passwords must not follow a sequence.
- The number of occurrences of the same character used in the password must
be less than or equal to (L-1)/2 (where L is the length of the password).
For more information, see the section Password in the Alliance Access Configuration Guide.
When an operator selects a new password, a check will be performed to make sure that none of
the blacklisted substrings are present in the password. If a blacklisted substring is detected, the
user will be informed about the substring that he cannot use and will be asked to select a different
password.
For more information, see the section Password Blacklist in the Alliance Access Security Guide,
and saa_blacklist in the Alliance Access Configuration Guide.
20 April 2018 13
Alliance Access 7.2 Overview
Release Letter
Where LSO and RSO were required, action by one operator with the Left Security Officer user type
and one with the Right Security Officer user type will be required.
At the same time, security officers (including LSO/RSO) passwords will now also get locked upon
too many failed log on attempts or if the last log on is too long in the past. To prevent situations
where no valid security officers are available, a “breaking glass” procedure has been implemented.
This procedure requires a registered security officer to call SWIFT Support.
The security Officer Reset password action is only available on LSO/RSO if the security parameter
Reset Peer Officer Pwd is set to value Yes. This feature did not change.
20 April 2018 14
Alliance Access 7.2 Overview
Release Letter
As a practical example, when writing a FIN batch file or a FileAct file to disk, an additional event
(10161 Message File Processed) will be logged at the end of the processing and provide:
• File name
• Full File path
• File creation date/time
• File last modification date/time
• File owner (if any)
• File size in bytes
• File Digest (using SHA256)
Additionally, when manually uploading a file for transmission by FileAct the event 30007 will also
log:
• File name
• File size in bytes
• Digest
Another example is event 3000, logging a succesful sign-on. Like all events that are the result of a
human operation, this event now also provides the hostname and the IP address of the system
where the browser is running used to perform the sign-on.
See Knowledge Base tip 5021833 for a detailed list of of added, updated, and removed events.
Important Make sure that you read related information provided in Impact of Using FileAct with
Release 7.2 on page 4.
20 April 2018 15
Alliance Access 7.2 Overview
Release Letter
As of Alliance Access 7.2, the minimum encryption key length is enforced to 128-bit for the
encryption algorithm used by NSL and CRPI versions prior to 7.2.
SWIFT recommends to upgrade to the NSL 7.2 and CRPI 7.2 versions during the interfaces 7.2
migration window and to use the enhanced encryption algorithm.
For more information, see Network Security Layer in the Customer Application Integration Guide
(UNIX and Linux, Windows).
20 April 2018 16
Alliance Access 7.2 Overview
Release Letter
The key used for previous LLE algorithm can be of various lengths and, when the connection is
established, the client and server negotiate which is the highest key length they both support. Each
end specifies a minimum and maximum key length for negotiation. A key length of 0 means no
encryption. As of Alliance Access 7.2, the default minimum key length is set to 128. This value is
supported by NSL version 3.2 or higher and CRPI 3.2 or higher. If you are still using older versions
of NSL or CRPI you might need to lower the minimum key length.
For more information on how to configure such a minimum key length in Alliance Access, please
see the section "Encrypting Messages" in the Customer Application Integration Guide (Windows,
AIX, Linux, Solaris))
20 April 2018 17
Alliance Access 7.2 Overview
Release Letter
With Release 7.2, all command line tools will in addition also require a valid Alliance Access
operator with its related password. The operator will need to be defined with the needed
entitlements through the Alliance Access configuration GUI packages.
With Release 7.2, the usage of the ipla_admin tool becomes mandatory to install any components
or user-libs inside the Integration Platform. The formerly allowed method which consisted to drop
files directly into the userlib folder or into the deploy folder is no longer allowed.
20 April 2018 18
Alliance Access 7.2 Overview
Release Letter
CREST components
The software for the CRNet Programming Interface (CRPI) and Network Security Layer (NSL) are
available on the Download Centre on www.swift.com as separate packages.
20 April 2018 19
Alliance Access 7.2 Overview
Release Letter
This base release of Alliance Access 7.2 will be supported until the next annual update becomes
mandatory. This will be the 2018 Message Standards update, planned to be mandatory by 16
November 2018.
AIX AIX v7.2 with TL01 and SP01. TL01 can be installed after the base AIX
v7.2 installation. SP01 must be installed after the TL01 installation.
IBM PowerHA SystemMirror Standard Edition 7.2.0 has been used for
qualifying Alliance Access 7.2 with licences containing 11:DUAL
HARDWARE, and requires RSCT 3.1.2.0 or higher.
Red Hat Enterprise Linux 6.7, 64-bit, is supported until February 2020 to
provide time for customers to deploy Red Hat Enterprise Linux 7.2.
SWIFT provides support for higher versions of these operating systems, as outlined in the
knowledge base tip, Can you install SWIFT products on Operating System or third-party software
versions that are different from those on which they have been qualified? (1212959).
20 April 2018 20
Alliance Access 7.2 Overview
Release Letter
Related information
OS Levels and Patches Baseline
Alliance Product Family Compatibility Matrixes
Browsers must be running on Windows operating system and must be configured with TLS 1.2
enabled.
Related information
For more information, see the section about Web Browser Settings in the Installation Guide:
Alliance Web Platform Server-Embedded Installation Guide - Linux
20 April 2018 21
Alliance Access 7.2 Overview
Release Letter
The following SWIFT provided IPLA components are compatible with Access 7.2:
• Connector for T2S version 1.2.10
• Connector for Sanctions version 1.2.40
• Connector for SWIFT gpi (all versions)
1.6.7.2 IBM MQ
If you want to use the IBM MQ Host Adapter integrated in Alliance Access 7.2, then the following
IBM MQ software version must be installed:
• IBM MQ 8.0.0.6
Note While SWIFT ran the full release 7.2 qualification cycle using IBM MQ 8.0.0.6, IBM
has not certified this for usage on Windows Server 2016. Soon after the availability
of release 7.2; IBM will release IBM MQ 8.0.0.8, certified on Windows Server 2016.
This version of the MQ Client is fully supported by SWIFT (see KB tip 1212959).
SWIFT recommends to only use in production IBM MQ 8.0.0.8 and higher on the
Windows platform to be in line with the SWIFT Customer Security Controls
Framework.
As of Alliance Access 7.2, Alliance Access can only be integrated with the IBM MQ Client. Direct
integration with IBM MQ Server is not supported anymore.
20 April 2018 22
Alliance Access 7.2 Overview
Release Letter
1.7 Documentation
The following documents have been updated to describe additional functionality and change
requests addressed in Alliance Access 7.2:
• Alliance Access Administration Guide - Linux
• Alliance Access Installation Guide - Linux
• Alliance Access Message Management Guide
20 April 2018 23
Alliance Access 7.2 Overview
Release Letter
1.8.1 Licensing
Alliance Access 7.2 does not require a license for Release 7.2.
Fresh installation
During the fresh installation of Alliance Access 7.2, the license of the current version can be used.
However, check that current Alliance Access licensing does not have the option 18:CAS TCP/IP
selected. If you have it, then you must retrieve the latest license sheet using Secure Channel, and
use the new license during the installation of Alliance Access 7.2.
Note If you change the platform to AIX, Oracle Solaris, or Windows, from any other
operating system then you must obtain the license for the platform you are migrating
to.
Migration to Linux
If you change the platform to Linux from AIX, Oracle Solaris, or Windows, and install Alliance
Access 7.2 on Linux with the option Install Alliance Access 7.2 from prepared backup file, then
the licensing option is not provided during installation. However, SWIFT recommends that you
obtain a new license sheet and perform the relicensing after the migration.
Check that current Alliance Access licensing does not have the option 18:CAS TCP/IP selected. If
you have it, then you must retrieve the latest license sheet using Secure Channel and relicense
Alliance Access 7.1.x before preparing the backup.
20 April 2018 24
Alliance Access 7.2 Overview
Release Letter
Compared to Alliance Access 7.1.23 and 7.1.30, the following permissions have been introduced to
support the new features described earlier:
Permission Description
Applic. Interface - Configure LTA Controls whether an operator is allowed to see and
edit the LTA configuration fields or not.
Security Definition - Pwd Blacklist Controls whether an operator is allowed to see and
edit the password blacklist, which contains pattern
occurences that cannot be part of an operator
password.
Calendar - Modiy Calender Year New permission that allows an operator profile to
modify a calendar year of a calendar assigned to an
operator .
Message File - Open\Save File Controls when an operator can view the details of a
FileAct message and to download the File itself out
from the message.
Permission Description
CRnet Interface - Dashboard Allows the operator to administer and monitor the
CREST traffic and applications.
CRnet Interface - CRFI Appplications Configure, Hold/Release, Manage LAU left part,
Manage LAU right part
20 April 2018 25
Alliance Access 7.2 Overview
Release Letter
Compared to Alliance Access 7.1.23 and 7.1.30, the following parameters have been introduced to
support the new features described earlier:
Parameters Description
LTA Enabling To disable the usage of the LTA feature for all
Message Partners.
System - Auth type available Defines the different accepted Authentication types
available for Human operators.
Accepted values are: Password, RADIUS one-
time password, LDAP, Password and TOTP.
System - Extra Sec Officer Determine whether both security officers (LSO/RSO)
have the right to create additional security officers.
System - 4 Eyes mechanism To force the 4 Eyes mechanism for the Operator,
Message Partner and Routing schema entities.
System - Syslog facility Describes the local syslog facility where the Alliance
Access events must be stored (UNIX only)
Security - Journalise Msg Text Determines whether the message related events
must also carry the messages payload.
IPLA max heap size The Integration Platform maximum heap size (in MB).
The Integration Platform component must be
restarted for changes to this parameter to take effect.
IPLA Extra System Properties Additional system properties for the Integration
Platform, to be entered as JVM options (one by row).
Example: -Dproperty1=value1. The Integration
Platform component must be restarted for changes to
this parameter to take effect.
System – Syslog Format Format of the messages that will be sent to the
syslog.
Accepted values are: Raw, CEF, Json, Json
formatted. Default value: CEF
20 April 2018 26
Alliance Access 7.2 Overview
Release Letter
Removed parameters
Parameter Description
Sec Officer - OTP Srv Group security parameter Was used to specify the authentication server group
assigned to Security Officers.
Sec Officer - Authentication Type security parameter Was used to specify the authentication type for
Security Officers.
GPII fields display Was used to allow the operator to hide or display the
GPII related fields from the message editor.
%ALLIANCE%\ADK\doc\index.html (Windows)
20 April 2018 27
Alliance Access 7.2 Overview
Release Letter
20 April 2018 28
Alliance Access 7.2 Installation and Migration
Release Letter
20 April 2018 29
Alliance Access 7.2 Support
Release Letter
3 Support
Support for SWIFT customers
By default, SWIFT Support is the single point of contact to report all problems and queries that
relate to SWIFT services and products. Support is available to all SWIFT customers.
Individuals within a customer organisation must register to use the Support service.
For more information about the different services that SWIFT offers as part of the support
packages and the procedure to order support, see Comparison of support packages on swift.com.
Related information
For more information about Support services, see the service description related to the applicable
support package:
Support documentation
20 April 2018 30
Alliance Access 7.2 Routing Keyword Extraction and Verifiable Fields
Release Letter
F32A,F32B, F19,F32A,F
102 Seq A.F20 Seq C.F32A Seq C.F32A Seq C.F32A F33B,F71F,F 32B,F33B,F F32A
71G 71F,F71G
F32A,F32B, F19,F32A,F
102.
Seq A.F20 Seq C.F32A Seq C.F32A Seq C.F32A F33B,F71F,F 32B,F33B,F F32A
STP
71G 71F,F71G
F32A,F33B, F32A,F33B,
103 F20 F32A F32A F32A F32A
F71F,F71G F71F,F71G
103.
F32A,F33B, F32A,F33B,
REMI F20 F32A F32A F32A F32A
F71F,F71G F71F,F71G
T
F19,F32B,F3
F32B,F33B,
104 Seq A.F20 Seq C.F32B Seq C.F19 F30 3B,F71F,F71 F30
F71F,F71G
G
105 F20
F19,F32B,F3
F32B,F33B,
107 Seq A.F20 Seq B.F32B Seq C.F19 F30 3B,F71F,F71 F30
F71F,F71G
G
20 April 2018 31
Alliance Access 7.2 Routing Keyword Extraction and Verifiable Fields
Release Letter
192 F20
195 F20
196 F20
198 F20
199 F20
202.
F20 F32A F32A F32A F32A,F33B F32A,F33B F32A
COV
204 Seq A.F20 Seq B.F32B Seq A.F19 Seq A.F30 F32B F19,F32B F30
205.
F20 F32A F32A F32A F32A,F33B F32A,F33B F32A
COV
292 F20
295 F20
296 F20
20 April 2018 32
Alliance Access 7.2 Routing Keyword Extraction and Verifiable Fields
Release Letter
298 F20
299 F20
F32B,F33B, F32B,F33B,
305 F20 F32B F32B F34P,F34R
F34P,F34R F34P,F34R
F32B,F33B, F32B,F33B,
Seq Seq
306 Seq A.F20 Seq B.F30X F33E,F34B, F33E,F34B, Seq B.F30X
B1.F34B B1.F34B
F71F,F32H F71F,F32H
F32B,F32H, F32B,F32H,
320 Seq A.F20 Seq B.F32B Seq B.F32B Seq B.F30V F33B,F33E, F33B,F33E, Seq B.F30V
F34E,F71F F34E,F71F
F32B,F32H, F32B,F32H,
Seq B.F32B, Seq B.F32B,
330 Seq A.F20 Seq B.F30V F33B,F33E, F33B,F33E, Seq B.F30V
Seq B.F32H Seq B.F32H
F34E F34E
Seq
F32B,F71F,F F32B,F71F,F
340 Seq A.F20 Seq B.F32B Seq B.F32B Seq B.F30F B.F30F,Seq
32H 32H
F.F30F
341 Seq A.F20 Seq B.F32B Seq B.F32B Seq B.F30F F32B,F34E F32B,F34E Seq B.F30F
F32B,F33B, F32B,F33B,
350 Seq A.F20 Seq B.F32B Seq B.F32B Seq B.F30V F33E,F34B, F33E,F34B, Seq B.F30V
F71F F71F
F32B,F32M, F32B,F32M,
360 Seq A.F20 Seq A.F32B Seq A.F32B Seq A.F30V Seq A.F30V
F32U,F71F F32U,F71F
F32B,F32M, F32B,F32M,
361 Seq A.F20 Seq A.F32B Seq A.F32B Seq A.F30V F32U,F33B, F32U,F33B, Seq A.F30V
F71F F71F
20 April 2018 33
Alliance Access 7.2 Routing Keyword Extraction and Verifiable Fields
Release Letter
F32H,F32M, F32H,F32M,
362 Seq A.F20 Seq B.F33F Seq B.F33F Seq A.F30V Seq A.F30V
F33E,F33F F33E,F33F
F32B,F32G, F32B,F32G,
364 Seq A.F20 Seq A.F32B Seq A.F32B Seq A.F30V Seq A.F30V
F32M F32M
F32B,F32G, F32B,F32G,
365 Seq A.F20 Seq A.F32B Seq A.F32B Seq A.F30V F32M,F33B, F32M,F33B, Seq A.F30V
F33E F33E
370 Seq A.F20C Seq B.F19A Seq B.F19A Seq B.F98A Seq B.F19A Seq B.F19A Seq B.F98A
Seq Seq
381 Seq A.F20C Seq B.F19B Seq B.F19B B.F98A:VAL B.F98A:VAL
U U
392 F20
395 F20
396 F20
398 F20
399 F20
20 April 2018 34
Alliance Access 7.2 Routing Keyword Extraction and Verifiable Fields
Release Letter
F32A,F32B, F32A,F32B,
456 F20 F32A,F32B F32A,F32B F32A F32A,F33D
F33D F33D
492 F20
495 F20
496 F20
498 F20
499 F20
Seq B.F98A,
500 Seq A.F20C
Seq B.F98C
Seq B.F98A,
501 Seq A.F20C
Seq B.F98C
Seq Seq
B.F19A:ORD B.F19A:ORD
502 Seq A.F20C R, Seq R, Seq
B.F19A:CAN B.F19A:CAN
C(1) C(1)
20 April 2018 35
Alliance Access 7.2 Routing Keyword Extraction and Verifiable Fields
Release Letter
Seq
505 A.F20C:SE
ME
Seq
506 A.F20C:SE
ME
Seq
507 A.F20C:SE
ME
Seq
508 A.F20C:SE
ME
Seq
B.F98A:RRE
510 Seq A.F20C G, Seq
B.F98C:RRE
G
Seq
C.F98A:TRA
Seq C.F19A, Seq C.F19A,
D, Seq
Seq Seq
513 Seq A.F20C C.F98C:TRA
D3.F19A:SE D3.F19A:SE
D, Seq
TT TT
C.F98E:TRA
D
Seq
Seq Seq B.F98A:TRA
B.F19A:SET B.F19A:SET D, Seq
514 Seq A.F20C T, Seq T, Seq B.F98C:TRA
C3.F19A:SE C3.F19A:SE D, Seq
TT TT B.F98E:TRA
D
Seq
Seq C.F19A, Seq C.F19A,
C.F98A:SET
Seq Seq
515 Seq A.F20C T, Seq
D3.F19A:SE D3.F19A:SE
C.F98C:SET
TT TT
T
20 April 2018 36
Alliance Access 7.2 Routing Keyword Extraction and Verifiable Fields
Release Letter
Seq
Seq B.F19A, Seq B.F19A,
B.F98A:SET
Seq Seq
518 Seq A.F20C T, Seq
C3.F19A:SE C3.F19A:SE
B.F98C:SET
TT TT
T
Seq B.F98A,
519 Seq A.F20C
Seq B.F98C
Seq B.F98A,
524 Seq A.F20C
Seq B.F98C
Seq
Seq Seq Seq A.F98A:EXR
527 A.F20C:SE B.F19A:TRA B.F19A:TRA Q, Seq
ME A A A.F98C:EXR
Q
Seq
B.F98A:SET
540 Seq A.F20C T, Seq
B.F98C:SET
T
Seq
Seq Seq B.F98A:SET Seq Seq
541 Seq A.F20C E3.F19A:SE E3.F19A:SE T, Seq E3.F19A:SE E3.F19A:SE
TT TT B.F98C:SET TT TT
T
Seq
B.F98A:SET
542 Seq A.F20C T, Seq
B.F98C:SET
T
20 April 2018 37
Alliance Access 7.2 Routing Keyword Extraction and Verifiable Fields
Release Letter
Seq
Seq Seq B.F98A:SET Seq Seq
543 Seq A.F20C E3.F19A:SE E3.F19A:SE T, Seq E3.F19A:SE E3.F19A:SE
TT TT B.F98C:SET TT TT
T
Seq
B.F98A:ESE
544 Seq A.F20C T, Seq
B.F98C:ESE
T
Seq
Seq Seq B.F98A:ESE
545 Seq A.F20C E3.F19A:ES E3.F19A:ES T, Seq
TT TT B.F98C:ESE
T
Seq
B.F98A:ESE
546 Seq A.F20C T, Seq
B.F98C:ESE
T
Seq
Seq Seq B.F98A:ESE
547 Seq A.F20C E3.F19A:ES E3.F19A:ES T, Seq
TT TT B.F98C:ESE
T
Seq
Seq Seq B.F98A:SET
548 Seq A.F20C B.F19A:SET B.F19A:SET T, Seq
T T B.F98C:SET
T
Seq
Seq Seq Seq A.F98A:EXR
558 A.F20C:SE B.F19A:TRA B.F19A:TRA Q, Seq
ME A A A.F98C:EXR
Q
F32G,F32M, F19,F32G,F
559 F20 F34A F19 F34A
F34A 32M,F34A
20 April 2018 38
Alliance Access 7.2 Routing Keyword Extraction and Verifiable Fields
Release Letter
Seq
564 A.F20C:SE
ME
Seq
Seq D.F98A,
565 A.F20C:SE
Seq D.F98C
ME
Seq
Seq Seq Seq D1.F98A:PO
566 A.F20C:SE D2.F19B:PS D2.F19B:PS ST, Seq
ME TA TA D1.F98C:PO
ST
Seq
567 A.F20C:SE
ME
Seq
568 A.F20C:SE
ME
Seq
Seq Seq B.F98A:SET Seq Seq
578 Seq A.F20C E3.F19A:SE E3.F19A:SE T, Seq E3.F19A:SE E3.F19A:SE
TT TT B.F98C:SET TT TT
T
592 F20
595 F20
596 F20
598 F20
20 April 2018 39
Alliance Access 7.2 Routing Keyword Extraction and Verifiable Fields
Release Letter
599 F20
F33G,F34P,
600 Seq A.F20 F33G F33G Seq B.F34P F34P,F34R F34P,F34R
F34R
F32B,F32H, F32B,F32H,
F34E, F34E,
620 F20 F32B F32B F30V F30V
F33B,F33E, F33B,F33E,
F71F F71F
692 F20
695 F20
696 F20
698 F20
699 F20
701 F20
20 April 2018 40
Alliance Access 7.2 Routing Keyword Extraction and Verifiable Fields
Release Letter
711 F20
721 F20
F32A,F33A, F32A,F33A,
734 F20 F32A F32A F32A F32A,F33A
F33B F33B
F32B,F33B, F32B,F33B,
742 F20 F32B F32B F34A
F34A,F34B F34A,F34B
F32B,F33B, F32B,F33B,
750 F20 F32B F32B
F34B F34B
F32A,F32B, F32A,F32B,
754 F20 F32A,F32B F32A,F32B F32A F33B,F34A, F33B,F34A, F32A,F34A
F34B F34B
760 F20
767 F20
F32B,F32D, F32B,F32D,
769 F20 F32D
F33B,F34B F33B,F34B
20 April 2018 41
Alliance Access 7.2 Routing Keyword Extraction and Verifiable Fields
Release Letter
792 F20
795 F20
796 F20
798 F20
799 F20
F32A,F33B, F32A,F33B,
800 F20 Seq B.F32A Seq B.F32A Seq B.F32A F32A
F34B F34B
892 F20
895 F20
896 F20
898 F20
899 F20
20 April 2018 42
Alliance Access 7.2 Routing Keyword Extraction and Verifiable Fields
Release Letter
F60F,F62F,F F60F,F62F,F
F60F,F62F,F
941 F20 F62F F62F F62F 64,F65,F90 64,F65,F90
64,F65
C,F90D C,F90D
F34F,F90C,F F34F,F90C,F
942 F20 F34F F34F
90D 90D
973 F20
985 F20
986 F20
992 F20
995 F20
996 F20
998 F20
999 F20
(1) The value with the CANC qualifier will be extracted only if the function of the message (F23G) is equal to CANC.
20 April 2018 43
Alliance Access 7.2 Switch-over Planning for Standards MT
Release Letter
20 April 2018 44
Alliance Access 7.2 Switch-over Planning for Standards MT
Release Letter
20 April 2018 45
Alliance Access 7.2 Standards Switch-over Planning for InterAct Services
Release Letter
20 April 2018 46
Alliance Access 7.2 Standards Switch-over Planning for InterAct Services
Release Letter
In order to allow manual processing (create, modify, verify, authorise), and printing in human
readable format, you need to download the appropriate message standards Deployment Package
from the download centre on www.swift.com or from mystandards.swift.com. If you are using
specific usage guidelines for the service, also download the usage guideline specific deployment
package from mystandards.swift.com.
From the Alliance Access Configuration GUI package, install the new deployment packages. If a
previous version of the deployment package was installed, the installation process will mark all
messages types for that service as obsolete, and merge the message types from the new
deployment package with this. As a result of this process, all message types already loaded, and
no longer occuring in the latest deployment package will still be there and marked as obsolete,
while all messages in the latest deployment package will be marked as not obsolete and will be
available to the users. If there were some messages that should not be used by your users, you
can mark these manually as obsolete to prevent message creation. The release letters of the
deployment packages provide the details of what message versions are included in the deployment
package.
If you have usage guidelines installed, you need to do the same for each usage guideline linked to
the same service. It is possible that a specific usage guideline does not yet support the new
message standards version, and will not have an updated deployment package. For more
information, contact the publisher of the usage guideline.
In case you have created manually defined verifiable fields for a message in this service that got a
new version, you will need to configure the new version of the message to also have the
appropriate verifiable fields.
Once the deployment package is installed, the new message standard can be used both for the
production and all pilot/test versions of the service. If one of your users would create a message
using the new version before it has been activated on the SWIFT network a NACK will be returned.
If you try to create a message using a template that is linked to an obsolete message version,
Alliance Access will automatically try to convert it to the latest version available.
When no manual processing or human readable printing is required, the deployment package
installation is not necessary.
20 April 2018 47
Alliance Access 7.2 Standards Switch-over Planning for InterAct Services
Release Letter
During this period, however, your back-office systems are expected to still be capable of processing
older message versions until they are removed from the service.
20 April 2018 48
Alliance Access 7.2 Legal Notices
Release Letter
Legal Notices
Copyright
SWIFT © 2018. All rights reserved.
Restricted Distribution
Do not distribute this publication outside your organisation unless your subscription or order
expressly grants you that right, in which case ensure you comply with any other applicable
conditions.
Disclaimer
The information in this publication may change from time to time. You must always refer to the
latest available version.
Translations
The English version of SWIFT documentation is the only official and binding version.
Trademarks
SWIFT is the trade name of S.W.I.F.T. SCRL. The following are registered trademarks of SWIFT:
the SWIFT logo, SWIFT, SWIFTNet, Accord, Sibos, 3SKey, Innotribe, the Standards Forum logo,
MyStandards, and SWIFT Institute. Other product, service, or company names in this publication
are trade names, trademarks, or registered trademarks of their respective owners.
20 April 2018 49