GTR ASIC: Connectivity Forms and Documentation

You must establish connectivity between your systems and DTCC's Repository and Derivative Services to enable data submissions.

  • GTR sFTP Connectivity Client Pack: This pack will provide new or existing clients with the required documentation to create a new sFTP connection into DTCC or to amend existing setups. This pack contains:
    • a factsheet with an overview of the service offering.
    • a checklist that outlines the activities expected by both client and DTCC to complete the setup.
    • a connectivity form that clients will need to complete to provide information relating to a request.
    • sFTP connectivity support guide that provides more details into DTCC's sFTP connectivity service.
    • sFTP Web User ID guide that provides details of how to create and configure a User ID which is required for sFTP connections to DTCC.
    • a form that must be completed if you are a new user and wish to make a new request, or any change to an existing connectivity flow.
    • DTCCs Distributed UAT and Production sFTP Known Host Key.
    • DTCC Distributed sFTP Servers Public Key.
  • GTR Connectivity Client Pack: This pack provides new or existing clients with the required documentation to create a new MQ connection into DTCC or amend existing setups. This pack contains:
    • a factsheet that provides a quick overview of the service offering.
    • a checklist that outline the activities expected by both client and DTCC to complete the setup.
    • a Connectivity form for the client to provide information relating to the setup.
    • a support guide that will provide more details into DTCC's MQ service.
    • DTCC TLS Certificates for MQ connections.
    • a form that must be completed if you are a new user and wish to make a new request or any change to an existing connectivity flow.
  • DTCC Connectivity: DTCC External Approved Certificate Authorities Spring 2024 (237 KB): This document provides the list of DTCC approved external (PKI) certificate authorities. Information includes vendor’s name, along with their respective approved external root and associated issuing certificate authorities.