Draft Middleware Specification. Version X.X MM/DD/YYYY
|
|
|
- Jared Gardner
- 9 years ago
- Views:
Transcription
1 Draft Middleware Specification Version X.X MM/DD/YYYY
2 Contents Contents... ii 1. Introduction Purpose Audience Document Scope Document Objectives Assumptions and Constraints Abbreviations Middleware Background Middleware Definitions... 3 Cryptographic Services... 3 Smart Card Data... 3 Smart Card Management Middleware Specifications Requirements Structure Core Agency Optional Agency Core Agendy Requirements PKI Requirements CSP P BSI Requirements Agency Smart Card Minimum Supported Smart Card Types: New Smart Card Types Card Applets Certificates Middleware Operating Environment Operating System Requirements Card Readers Application Support Cryptographic Logon Client Authentication GUI Middleware Resource Parameters Middleware Installation Middleware Configuration PIN Management PIN Services PIN Change PIN Validation Compliance with Smart Card Connection and State Guidance Documentation End User Documentation Administrator Documentation BSI Documentation for Application Developers ii
3 4.13. Process Descriptions Middleware Functions Use of Scratch Pad Space Support Tech Support Middleware Updates Optional Requirements General Middleware Operating Environment Middleware Configuration PIN Services Documentation Support Tech Support Vendor Support Agency Appendix A Appendix B- CSP Functions Appendix C- P11 Functions Appendix D- BSI Functions Appendix E- BSI Header Files iii
4 1. Introduction 1.1. Background Relevant Agency smart card program background information Purpose The Middleware Requirements Specification is intended to define the standard set of services, interfaces and configuration options that must be implemented by all middleware operating in the Agency and to define the environments that must be supported. Additionally, this specification identifies recommended and optional capabilities that middleware providers should consider implementing to differentiate their products and provide added value Audience This specification is intended for middleware providers, acquirers, testers and application developers Document Scope This specification applies to middleware that operates on personal computer desktops. This document is related to one other related Agency document. Agency Connection Guidance -Provides technical details and Agency best practices for managing smart card connections and card state Document Objectives The objective of this document is to provide unambiguous, clear, and testable requirements for middleware vendors Assumptions and Constraints Each Agency will execute middleware acquisitions using processes and procedures available to that organization. It is expected that this document will serve as the centerpiece of the acquisition and it is expected additional requirements (such as technical support or unique capabilities) will be specified by each Agency in Section Abbreviations BSI Basic Services Interface CSP Cryptographic Service Provider P11 Public Key Cryptography Standard #11
5 Draft Middleware Specification Page 2 of 25 DRAFT Page 2 of 25
6 Draft Middleware Specification Page 3 of Middleware Background 2.1. Middleware Definitions Middleware is defined as the software application that serves as the interface between host applications (such as ) and the smart card. Functionally, middleware provides access to cryptographic services, smart card data, and smart card management features. Cryptographic Services Cryptographic services are the set of functions necessary for cryptographic operations, such as signing and encrypting an . Middleware provides cryptographic services through three standards-based interfaces, MSCAPI, P11, and BSI. Smart Card Data Smart Card Data is defined as data which resides on the smart card, but is not related to cryptographic functionality. Personnel identification number or blood type may be examples of smart card data. Smart card data is accessed through the BSI, or by middleware directly. Smart Card Management Smart Card management is the set of functions necessary to manage the card and the middleware environment, such as PIN changes and PIN timeout. DRAFT Page 3 of 25
7 Draft Middleware Specification Page 4 of Middleware Specifications 3.1. Requirements Structure Core Agency Requirements listed in this section of the document are mandatory, and middleware vendors must have 100% compliance in order to be considered for Agency certification. Core requirements pertain to interoperability, core middleware functionality, and middleware architecture. Core Agency requirements are listed in section Optional Optional requirements are those in which a Agency mandate isn t an appropriate approach. The majority of these requirements will be based on each individual purchaser s preference and or unique circumstances. A good example of an optional requirement is an installation package Service A may require an MSI file, while Command B will require a Tivoli package. Optional requirements are listed in this document because a) they are value added and differentiators among middleware vendors, and b) it is likely that some flavor of these requirements will appear in individual acquisition documentation. It is possible requirements listed in the optional section will appear as required in individual Agency acquisitions. Optional requirements are listed in section Agency Service specific requirements will be identified in section 6. DRAFT Page 4 of 25
8 Draft Middleware Specification Page 5 of Core Agendy Requirements 4.1. PKI Requirements CSP Middleware shall provide a CSP compliant interface as specified in the Microsoft Cryptography API Service Provider documentation Middleware shall provide a smart card compliant CSP, as documented in Smart Card CSP Notes, available from the 2KMe/EN-US/cspdk.exe website Microsoft shall sign the middleware CSP for Microsoft operating environments CSP shall be compliant with the CSP requirements listed in Appendix B, CSP Functions P Middleware shall support PKCS#11 functions listed in Appendix C, P11 Functions Vendor shall provide a list of all unsupported P11 functions BSI Requirements Middleware shall provide a BSI implementation consistent with the specifications and requirements listed in Appendix D BSI shall be implemented and comply in accordance with NIST Government Smart Card Interoperability Specification v2.1, 16 July Agency Smart Card Minimum Supported Smart Card Types: Oberthur GalactIC Mask 2.1R Schlumberger Cyberflex Access 32K smart card (M256EPALP1_SI_9C_02 Softmask 7 Version 2) Oberthur CosmopolIC V4 DRAFT Page 5 of 25
9 Draft Middleware Specification Page 6 of New Smart Card Types Middleware vendor shall provide support for the ability to utilize future card types as issued for the smart card program Middleware vendor shall provide documentation describing the middleware s software architecture for supporting card types. Areas of interest to the Agency are modularity and methodology Middleware vendor shall provide documentation describing the process by which new card types shall be added to the middleware desktop configuration Card Applets Middleware shall support all Agency Smart Card applets. (e.g. ID applet, Generic Container Applets, PKI Applets, PIN Management Applets, Access Control Applets, and all other future and present Agency applets) Certificates Middleware shall support all X.509 issued certificates Middleware shall support Agency PKI policy and certificates Middleware shall process and use certificates for PK services in accordance with key usage and key extension policies Middleware Operating Environment Operating System Requirements Middleware shall operate with the following operating systems: Operating Systems Supported by Middleware Windows NT Windows 2000 Windows XP Professional 4.4. Card Readers Middleware shall operate and comply with PC/SC and the Agency Smart Card Reader Specification Application Support DRAFT Page 6 of 25
10 Draft Middleware Specification Page 7 of The middleware shall provide cryptographic services to the e- mail application and operating system combinations as listed in Appendix A, Figure 5, Primary and OS Combinations to: Sign, decrypt, and encrypt messages and Sign, decrypt, and encrypt messages with attachments Cryptographic Logon The middleware shall have the ability to use any appropriate Agency certificate to perform a cryptographic authentication for the following operating systems: Windows 2000, Windows XP, Windows XP Pro The middleware shall have the capability to enumerate through all certificates on the smart card to determine the correct certificate and key pair for certificate based access control Middleware shall not require the use of persistent storage (either on smart card or on disk) of login configuration information in order for cryptographic logon capability to function Client Authentication 4.6. GUI The middleware shall provide the ability to initiate an SSL V3 client-side authentication for the operating system and browser combinations listed in on the web server applications listed in Appendix A, Figure 4, Web Servers There shall be a single middleware graphical interface or utility to manipulate the middleware s features and configuration Middleware shall place an icon in the system tray for indicating middleware activity and launching the middleware graphical interface Middleware shall only display features that are configurable for the middleware environment Middleware Resource Parameters The maximum disk space required for smart card middleware installation on a client workstation shall not exceed 30 Mbytes and, for a server, shall not exceed 100 Mbytes The smart card middleware shall function properly on a client workstation configuration equivalent to a 133 MHz minimum Pentium-compatible CPU with a minimum of 32 MB RAM When installed on a system equivalent to a 133 MHz Pentium-compatible CPU with 32 Mbytes of RAM, the processing time consumed by the smart card middleware shall not exceed 10% (ten percent) of the system s total resources at rest. DRAFT Page 7 of 25
11 Draft Middleware Specification Page 8 of Middleware Installation Middleware shall not install card reader drivers Middleware shall install regardless if a reader driver is previously installed on the workstation Middleware shall indicate to the end user of the limited functionality imposed by installation of middleware without a reader attached Middleware shall have the ability to uninstall completely in each supported operating system. Uninstall should include the removal of any registry entries added during installation as well as changing any registry settings that were modified at the time of install back to those settings prior to installation. This includes, but is not limited to, the required registry entries used for discovery purposes as specified in this document as well as any vendor specific registry entries that may be added during installation Middleware shall not remove any registry settings or files that are shared by other applications or not wholly linked to vendor-specific functionality. For example, if a middleware package upgrades the browser s crypto strength to 128 bit, they would not remove it because it is shared by other non-middleware applications Middleware Configuration Middleware shall have the ability to enable or disable all configurable settings for the end user at time of installation Middleware configuration settings shall be set and configured in accordance with Appendix A, Figures 1,2, Middleware shall provide an option to automatically register (or make available for use) all user certificates stored on the smart card in both Netscape and Explorer environments Middleware shall provide an option to remove smart card certificates from workstation on card removal events Middleware shall register Agency certificate chain during installation for both Netscape and Explorer environments PIN Management PIN Services Middleware shall provide a single PIN service which will have the ability to handle PIN management for both MS-CAPI and P11 interfaces. For example, if a user enters a PIN for use with MS-CAPI, and then uses the P11 interface within the specified PIN timeout DRAFT Page 8 of 25
12 Draft Middleware Specification Page 9 of 25 period, the user should not have to re-enter the PIN since the same PIN service would handle the PIN requirements for both P11 and MS-CAPI modules Middleware shall have the ability to set the amount of inactivity time which should elapse before the card requires a PIN entry. Inactivity time shall be defined as the amount of time elapsed since the last time a PIN protected area on the smart card was accessed Middleware shall have the ability to disable all PIN timeout features PIN Timeout configurations shall be configured and maintained in accordance with Appendix A, Figure PIN Change Middleware shall have the ability to change PINs after the end user has entered the correct PIN Middleware shall not allow PIN change without a valid PIN entry Middleware shall require the end user to verify the new PIN before submitting the PIN change request to the smart card PIN Validation Middleware shall require all new PINS to no less than 6 and no greater than 8 numerics in length As specified in GSC-IS 2.1, for PINs less than 8 characters, middleware shall pad the PIN with 0xFF to the least significant bytes In the event an invalid PIN is entered, the Middleware shall notify the user of the violation Compliance with Smart Card Connection and State Guidance To the extent possible, Middleware shall follow the best practices and guidance provided in the Smart Card Connection Guidance document Documentation End User Documentation Online documentation shall be provided to the end user describing the features and functionality of the middleware application. DRAFT Page 9 of 25
13 Draft Middleware Specification Page 10 of Access to the online help documentation shall be accessible from all error or stop work notifications to the end user Middleware shall provide context sensitive help for any utilities or configuration applications that are included with the middleware to aid the user in understanding the meaning of the various options or settings Help documentation shall be searchable Help documentation shall have a table of contents Help documentation shall be indexed Middleware shall provide a Read Me document that describes any known bugs or compatibility issues Help topics shall not include features or functionality not included in the middleware Administrator Documentation Vendor shall provide online documentation as to the setup, installation and configuration of the middleware Middleware vendors shall provide online documentation as to the location, name, and values of all registry keys used in option configuration settings Middleware vendors shall provide a complete and detailed list of all changes, additions, updates, or deletions made to an end user workstation after installation Middleware vendors shall provide a complete list of any artifacts or upgrades left after an uninstall Vendor shall provide documentation for any application or utilities included in the middleware For supported third party installation products, middleware shall provide administrator documentation for using such products BSI Documentation for Application Developers Vendor shall provide documentation that would aid application developers in the use of their BSI library Vendor shall provide a sample application, with source code, which demonstrates the use of their BSI library The sample application shall include the use of at least one function from each of the three sections of the BSI (utility, storage, and cryptographic) Java, Visual Basic and C language versions of the sample application shall be provided. DRAFT Page 10 of 25
14 Draft Middleware Specification Page 11 of Process Descriptions Middleware Functions The middleware vendor shall provide, in detail, a flow chart or other descriptive material describing their cryptographic logon implementation. This material shall describe, at a minimum, how the appropriate certificate is identified and used during the cryptographic login process The middleware vendor shall provide, in detail, a flow chart or other descriptive material describing their card authentication (PIN) time-out implementation For any feature or functionality not required by this document, the vendor shall provide a detailed list of those features, how they are used, and their benefit to the Agency Use of Scratch Pad Space Middleware shall fulfill all core Agency middleware requirements without using the smart card for middleware-specific data storage Middleware shall not write or modify any middleware-specific data in any GCA container on the smart card to meet core middleware requirements Middleware shall not depend on CCF data to function Support Tech Support Middleware shall readily display workstation and middleware configuration information in a manner readily available to the end user. At a minimum, including browser version, operating system, patch level, crypto strength, and P11/CSP library versions and.dll name when available Middleware Updates Middleware shall have an automated mechanism to update the middleware. Vendor must provide, in detail, the mechanism(s) used to update the middleware for supporting new card types, bug fixes, and service releases. Attention should be paid to reducing Agency s cost exposure, technology requirements, ease of use, and security concerns. DRAFT Page 11 of 25
15 Draft Middleware Specification Page 12 of Optional Requirements 5.1. General Middleware vendor may provide a listing of other applications that can utilize the smart card PKI services. Areas of interest to the Agency are, but not limited to VPN, PKE (e.g. DTS), and thin client environments Middleware may provide a utility or other method for building custom installation images for the middleware for both initial installation and maintenance Middleware may provide advanced installation features that support COTS enterprise management products Middleware shall operate at a minimum with all other smart card types supported and/or manufactured by that vendor. Middleware may optionally support card types from other vendors Middleware may optionally provide a visual indication of smart card activity Middleware Operating Environment Middleware may optionally provide support for the following operating systems: Linux, Solaris, Apple OS The middleware may provide cryptographic services to the application and operating system combinations as listed in Appendix A, Figure 6, Secondary and OS Combinations to sign, decrypt, and encrypt messages and sign, decrypt, and encrypt messages with attachments For the applications listed in Appendix A, Figure 5, Primary and OS Combinations, and Appendix A, Figure 6, Secondary and OS Combinations, middleware may optionally configure the client for use of PKI services. DRAFT Page 12 of 25
16 Draft Middleware Specification Page 13 of Middleware may optionally provide cryptographic authentication to other Network Operating Systems Middleware Configuration The middleware may provide a means to manipulate the configuration values from a single middleware user interface PIN Services The middleware may implement a CAM which can differentiate between PKI operations (sign and decrypt) from non-pk operations (such as access to a PIN protected applet). In this example, the middleware may allow CAM to apply for all PIN protected smart card operations except for those relating to signature operations Middleware may provide the ability for applications to opt out of the CAM mechanism 5.5. Documentation Middleware vendor may provide a detailed listing of 3rd party or industry certifications Middleware vendor may provide detailed listing of partnerships with other technology companies which would provide a benefit to the Agency Support Tech Support Middleware may optionally display, installed card reader and reader driver version number Middleware vendor may provide a diagnostic utility to facilitate technical support Middleware may provide a hyperlink to a vendor middleware product support website Vendor Support Vendor may provide 24 hour written response to level 1 level 2 bugs, as categorized in Appendix A Figure 7, Bug Classifications Vendor may provide a fix for level 1 and level 2 bugs within 5 business days of notification or submit a formal request for waiver with justification during this time period Vendor may cooperate with the Agency on the timing and functionality of service releases. DRAFT Page 13 of 25
17 Draft Middleware Specification Page 14 of Vendor may provide 180 day middleware EOL notice Vendor may provide support for 1 year after product End of Life Support for new card types may be considered routine middleware maintenance New card type support may be provided no later than 90 days from the date the vendor receives a request from the Agency Support for new smart card applets may be considered routine maintenance Support for applet changes may be provided no later than 90 days after the vendor receives a request from the Agency Vendor may optionally provide a shared bug tracking environment with the Agency Vendor may release from time to time service releases to improve performance, increase functionality, or fix level 3 and below bugs Future Enhancements Middleware vendors are encouraged to provide additional enhancements to include support for biometrics Middleware vendors are encouraged to provide additional enhancements to include support for certificate validation clients. DRAFT Page 14 of 25
18 Draft Middleware Specification Page 15 of Agency {THIS SECTION WILL BE COMPLETED AT EACH INDIVIDUAL ACQUISITION] DRAFT Page 15 of 25
19 Draft Middleware Specification Page 16 of 25 Appendix A Middleware Configurable Options Summary Option Default Privilege Level Default Settings Certificate Auto Registration Admin On Certificate Removal on Logoff Admin Off Certificate Removal on Card Admin Off Removal CAM Allow Admin On CAM Time Out Setting Admin 15 CAM Decrypt (optional) Admin On CAM Sign (optional) Admin Off CAM Other (optional) Admin On Figure 1 Configurable Options Certificate Registration Key [HKEY_LOCAL_MACHINE\SOFTWARE\GSC\Cryptography\Certificate Registration] Key Values Type Setting Default Setting AutoReg REG_DWORD 0x (Feature is off) -OR- 0x (Feature is on) AutoUnRegOnLogoff REG_DWORD 0x (do not un-register on logoff) -OR- 0x (un-register on logoff) AutoUnRegOnRemove REG_DWORD 0x ( do not un-register on card removal) -OR- 0x (un-register on card removal) AutoReg AutoUnRegOnLogoff AutoUnRegOnRemove Setting Description 0x x x If turned off, middleware will not register the smart card certificates. If on, the middleware will register the certificates Middleware will/ will not unregister certificates on the logoff event Middleware will / will not unregister certificates on card removal event Example [HKEY_LOCAL_MACHINE\SOFTWARE\GSC\Cryptography\Certificate Registration] "AutoReg"=dword: "AutoUnRegOnLogoff"=dword: "AutoUnRegOnRemove"=dword: Figure 2 DRAFT Page 16 of 25
20 Draft Middleware Specification Page 17 of 25 PIN Configuration Key [HKEY_LOCAL_MACHINE\SOFTWARE\GSC\Policies\PIN\Authentication] Key Values Type Setting Default Setting Allow REG_DWORD 0x (Feature is off) -OR- 0x (Feature is on) Minutes REG_DWORD < 0x = number of minutes to allow automatic authentication 0x x F 0x = no timeout value for automatic authentication during a session > 0x = reserved values Setting Description Allow Minutes If turned off, middleware will not provide any CAM services Number of minutes (hex) the CAM will keep PIN presentations from occurring Example [HKEY_LOCAL_MACHINE\SOFTWARE\GSC\Policies\PIN\Authentication] Allow =dword: Minutes =dword: Figure 3 Web Servers and Browsers OS MS IIS Netscape iplanet Apache 95b , , , 4.76 NT 5.5, , , 4.76 W2K 5.5, , , 4.76 XP 6.0, , , = MS Internet Explorer 6.0, 5.5=MS Internet Explorer 5.5, 4.76=Netscape Navigator 4.76 w/psm 1.4* Figure 4 * Note: Support for the Netscape Navigator is optional, but may be required for certain acquisitions which involve RA/LRA support or where other requirements necessitate the use of Netscape Navigator. DRAFT Page 17 of 25
21 Draft Middleware Specification Page 18 of 25 Primary OS Combinations Operating Clients System Outlook 98 Outlook 2K SP2 Outlook 2002 Outlook XP Windows NT X Windows 2000 X X X Windows XP X X X Primary and OS Combinations Figure 5 Secondary OS Combinations Operating Clients System Outlook 98 Outlook 2K SP2 Outlook 2002 Outlook XP 95b X 98 X Secondary and OS Combinations Figure 6 Middleware Bug Classifications The Agency Shall be the sole determinant of middleware bug classifications. Category Definition 1- Critical The failure causes a system crash or unrecoverable data loss or jeopardizes personnel. 2- High The failure causes impairment of critical system functions and no work around solution exists. 3- Medium The failure causes impairment of critical system functions, though a work around solution does exist. 4- Low Required The failure causes inconvenience or annoyance. 5- Low Desired None of the above, or the anomaly concerns an enhancement rather than a failure. Bug Classifications Figure 7 DRAFT Page 18 of 25
22 Draft Middleware Specification Page 19 of 25 Appendix B- CSP Functions DRAFT Page 19 of 25
23 Draft Middleware Specification Page 20 of 25 Appendix C- P11 Functions DRAFT Page 20 of 25
24 Draft Middleware Specification Page 21 of 25 Appendix D- BSI Functions DRAFT Page 21 of 25
25 Draft Middleware Specification Page 22 of 25 Appendix E- BSI Header Files DRAFT Page 22 of 25
DoD CAC Middleware Requirements Release 4.0
DoD CAC Middleware Requirements Release 4.0 Version 1.01 26 November 2012 Prepared by: DoD Identity Protection and Senior Coordinating Group s (IPMSCG) Test and Evaluation Work Group (TEWG) UNCLASSIFIED
TrustKey Tool User Manual
TrustKey Tool User Manual 1 Table of Contents 1 Introduction... 5 2 TrustKey Product...6 2.1 TrustKey Tool... 6 2.2 TrustKey function modules...7 2.3 TrustKey using environment...7 3 TrustKey Tool Installation...
Introducing etoken. What is etoken?
Introducing etoken Nirit Bear September 2002 What is etoken? Small & portable reader-less Smartcard Standard USB connectivity Logical and physical protection Tamper evident (vs. tamper proof) Water resistant
Embarcadero Performance Center 2.7 Installation Guide
Embarcadero Performance Center 2.7 Installation Guide Copyright 1994-2009 Embarcadero Technologies, Inc. Embarcadero Technologies, Inc. 100 California Street, 12th Floor San Francisco, CA 94111 U.S.A.
Administration Guide ActivClient for Windows 6.2
Administration Guide ActivClient for Windows 6.2 ActivClient for Windows Administration Guide P 2 Table of Contents Chapter 1: Introduction....................................................................12
PROXKey Tool User Manual
PROXKey Tool User Manual 1 Table of Contents 1 Introduction...4 2 PROXKey Product... 5 2.1 PROXKey Tool... 5 2.2 PROXKey function modules...6 2.3 PROXKey using environment...6 3 PROXKey Tool Installation...7
VeriSign PKI Client Government Edition v 1.5. VeriSign PKI Client Government. VeriSign PKI Client VeriSign, Inc. Government.
END USER S GUIDE VeriSign PKI Client Government Edition v 1.5 End User s Guide VeriSign PKI Client Government Version 1.5 Administrator s Guide VeriSign PKI Client VeriSign, Inc. Government Copyright 2010
ZENworks 11 Support Pack 4 Full Disk Encryption Agent Reference. May 2016
ZENworks 11 Support Pack 4 Full Disk Encryption Agent Reference May 2016 Legal Notice For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions, U.S. Government
SecureDoc Disk Encryption Cryptographic Engine
SecureDoc Disk Encryption Cryptographic Engine FIPS 140-2 Non-Proprietary Security Policy Abstract: This document specifies Security Policy enforced by SecureDoc Cryptographic Engine compliant with the
CRESCENDO SERIES Smart Cards. Smart Card Solutions
CRESCENDO SERIES Smart Cards Smart Card Solutions Crescendo offers the lowest total cost of ownership (TCO) for a combined logical and physical access control solution. Crescendo smart cards allow me to
CRYPTOLogon Agent. for Windows Domain Logon Authentication. Deployment Guide. Copyright 2002-2003, CRYPTOCard Corporation, All Rights Reserved.
CRYPTOLogon Agent for Windows Domain Logon Authentication Deployment Guide Table of Contents 1. OVERVIEW... 1 1.1 SINGLE AUTHENTICATION MODE (MS-GINA REPLACEMENT)... 1 1.2 DUAL AUTHENTICATION MODE (MS-GINA
CardOS API V3.2. Standard cryptographic interface for using applications with CardOS smart cards
API V3.2 API is an integration software for the use of smart cards and security tokens in a variety of applications and heterogeneous operating system environments. API is compatible with international
Guide to Obtaining Your Free WISeKey CertifyID Personal Digital Certificate (Personal eid) WISeKey 2010 / Alinghi 2010 Smartcards
The World Internet Security Company Solutions for Security Guide to Obtaining Your Free WISeKey CertifyID Personal Digital Certificate (Personal eid) WISeKey 2010 / Alinghi 2010 Smartcards Wherever Security
DIGIPASS CertiID. Getting Started 3.1.0
DIGIPASS CertiID Getting Started 3.1.0 Disclaimer Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis, without any other warranties, or conditions, express
Using etoken for Securing E-mails Using Outlook and Outlook Express
Using etoken for Securing E-mails Using Outlook and Outlook Express Lesson 15 April 2004 etoken Certification Course Securing Email Using Certificates Unprotected emails can be easily read and/or altered
Shakambaree Technologies Pvt. Ltd.
Welcome to Support Express by Shakambaree Technologies Pvt. Ltd. Introduction: This document is our sincere effort to put in some regular issues faced by a Digital Signature and USB Token user doing on
Yale Software Library
Yale Software Library http://www.yale.edu/its/software/ For assistance contact the ITS Help Desk 203-432-9000, [email protected] Two-factor authentication: Installation and configuration instructions for
IBM Client Security Solutions. Client Security User's Guide
IBM Client Security Solutions Client Security User's Guide December 1999 1 Before using this information and the product it supports, be sure to read Appendix B - Notices and Trademarks, on page 22. First
Overview ActivClient for Windows 6.2
Overview ActivClient for Windows 6.2 ActivClient for Windows Overview P 2 Table of Contents Chapter 1: Introduction.....................................................................6 About ActivClient.......................................................................
Mechanics Bank Mobile Banking Mobile Finance Manager (MFM) Application Windows Mobile Phone Installation
Mechanics Bank Mobile Banking Mobile Finance Manager (MFM) Application Windows Mobile Phone Installation Thank you for your interest in Mechanics Bank Mobile Banking. This guide will help you get started
Amadeus Selling Platform 3.1 P120
Amadeus Selling Platform 3.1 P120 Installation Guide Terminal Server and Citrix Index 1 Introduction... 3 1.1 About this guide... 3 1.2 Intended audience... 3 2 Limitations and requirements... 3 3 Technical
Check Point FDE integration with Digipass Key devices
INTEGRATION GUIDE Check Point FDE integration with Digipass Key devices 1 VASCO Data Security Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document
Intel Identity Protection Technology with PKI (Intel IPT with PKI)
Intel Identity Protection Technology with PKI (Intel IPT with PKI) Technology Overview White Paper by Paul Carbin Rev 1.0, May 22 2012 Technology Overview Page 1 of 26 Legal Notices and Disclaimers INFORMATION
Installation Guide: Delta Module Manager Launcher
Installation Guide: Delta Module Manager Launcher Overview... 2 Delta Module Manager Launcher... 2 Pre-Installation Considerations... 3 Hardware Requirements... 3 Software Requirements... 3 Virtualisation...
Full Disk Encryption Agent Reference
www.novell.com/documentation Full Disk Encryption Agent Reference ZENworks 11 Support Pack 3 May 2014 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or
PUBLIC Secure Login for SAP Single Sign-On Implementation Guide
SAP Single Sign-On 2.0 SP04 Document Version: 1.0-2014-10-28 PUBLIC Secure Login for SAP Single Sign-On Implementation Guide Table of Contents 1 What Is Secure Login?....8 1.1 System Overview.... 8 1.1.1
Using PIV Smart Cards on Linux for Authentication to Windows Active Directory
Using PIV Smart Cards on Linux for Authentication to Windows Active Directory Douglas E. Engert Computing and Information Systems April 26, 2006 DOE Cyber Security Group Training Conference Dayton, Ohio
Standardizing PKI in Higher Education Apple PKI and Universal Hi-Ed Spec proposal
Standardizing PKI in Higher Education Apple PKI and Universal Hi-Ed Spec proposal Shawn Geddis Security Consulting Engineer, Apple Enterprise [email protected] 703-264-5103 1 Agenda A View of Apples PKI
V-RMTC PKI ENCRYPTED EMAIL
V-RMTC PKI ENCRYPTED EMAIL USER GUIDE v. 2.1 September 2009 RECORD OF CHANGES Id of Change Reg No/Date Date Entered By Whom Entered (Signature; Rank, Grade or Rate; Name of Command) Reason for the Release
MyKey is the digital signature software governed by Malaysia s Digital Signature Act 1997 & is accepted by the courts of law in Malaysia.
About Digital Signature using MyKey Purpose MyKey is the digital signature software governed by Malaysia s Digital Signature Act 1997 & is accepted by the courts of law in Malaysia. A document digitally
I. Configuring Digital signature certificate in Microsoft Outlook 2003:
I. Configuring Digital signature certificate in Microsoft Outlook 2003: In order to configure Outlook 2003 to use the new message security settings please follow these steps: 1. Open Outlook. 2. Go to
OnCommand Performance Manager 1.1
OnCommand Performance Manager 1.1 Installation and Setup Guide For Red Hat Enterprise Linux NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501
How To Run A Password Manager On A 32 Bit Computer (For 64 Bit) On A 64 Bit Computer With A Password Logger (For 32 Bit) (For Linux) ( For 64 Bit (Foramd64) (Amd64 (For Pc
SafeNet Authentication Client (Linux) Administrator s Guide Version 8.1 Revision A Copyright 2011, SafeNet, Inc. All rights reserved. All attempts have been made to make the information in this document
etoken PKI Client Version 4.5 Reference Guide
etoken PKI Client Version 4.5 Reference Guide June 2007 Contact Information Support If you have any questions regarding this package, its documentation and content or how to obtain a valid software license
etoken PKI Client (Windows) Administrator s Guide Version 5.1 SP1 Rev A
etoken PKI Client (Windows) Administrator s Guide Version 5.1 SP1 Rev A All attempts have been made to make the information in this document complete and accurate. Aladdin is not responsible for any direct
Installation Guide for FTMS 1.6.0 and Node Manager 1.6.0
Installation Guide for FTMS 1.6.0 and Node Manager 1.6.0 Table of Contents Overview... 2 FTMS Server Hardware Requirements... 2 Tested Operating Systems... 2 Node Manager... 2 User Interfaces... 3 License
RAPIDS Self Service User Guide
Page 1 RAPIDS Self Service User Guide https://www.dmdc.osd.mil/self_service Page 2 Introduction The RAPIDS Self Service (RSS) application provides sponsors with the capability to generate a DD Form 1172-2
epass2003 User Guide V1.0 Feitian Technologies Co., Ltd. Website: www.ftsafe.com
epass2003 User Guide V1.0 Feitian Technologies Co., Ltd. Revision History: Date Revision Description June 2013 V1.0 Release of the first version i Software Developer s Agreement All Products of Feitian
Sage ERP MAS 90 Sage ERP MAS 200 Sage ERP MAS 200 SQL. Installation and System Administrator's Guide 4MASIN450-08
Sage ERP MAS 90 Sage ERP MAS 200 Sage ERP MAS 200 SQL Installation and System Administrator's Guide 4MASIN450-08 2011 Sage Software, Inc. All rights reserved. Sage, the Sage logos and the Sage product
Guidelines for Developing Cryptographic Service Providers (CSPs) for Acrobat on Windows
Technical Note Providers (CSPs) for Acrobat C ONTENTS Requirements for Minimal Functionality 1 Recommendations for Maximum Functionality 2 For a Better User Experience Using CSPs in Acrobat 3 Other Recommendations
TPM. (Trusted Platform Module) Installation Guide V2.1
TPM (Trusted Platform Module) Installation Guide V2.1 Table of contents 1 Introduction 1.1 Convention... 4 1.2 TPM - An Overview... 5 2 Using TPM for the first time 2.1 Enabling TPM... 6 2.2 Installing
Mechanics Bank Mobile Banking Mobile Finance Manager (MFM) Application Palm Treo Installation
Mechanics Bank Mobile Banking Mobile Finance Manager (MFM) Application Palm Treo Installation Thank you for your interest in Mechanics Bank Mobile Banking. This guide will help you get started with Mechanics
Checklist for Web Application Testing
Checklist for Web Application Testing July 27, 2004 Submitted By Infosys Technologies Limited Author Setumadhav Kulkarni ([email protected]) Web Testing Checklist.doc Page 1 of 9 COPYRIGHT
EXPLORING SMARTCARDS: AN INDEPENDENT LOOK TO TECHNOLOGIES AND MARKET
EXPLORING SMARTCARDS: AN INDEPENDENT LOOK TO TECHNOLOGIES AND MARKET Giuseppe Gippa Paternò [email protected] June 2008 WHO AM I Experienced architect Linux, Networking and Security Focused on Telcos
Getting Started Guide for Symantec On-Demand Protection for Outlook Web Access 3.0
Getting Started Guide for Symantec On-Demand Protection for Outlook Web Access 3.0 PN: 12199694 Getting Started Guide for Symantec On-Demand Protection for Outlook Web Access 3.0 The software described
Installing GFI Network Server Monitor
Installing GFI Network Server Monitor System requirements Computers running GFI Network Server Monitor require: Windows 2000 (SP4 or higher), 2003 or XP Pro operating systems. Windows scripting host 5.5
Installation Notes for Outpost Network Security (ONS) version 3.2
Outpost Network Security Installation Notes version 3.2 Page 1 Installation Notes for Outpost Network Security (ONS) version 3.2 Contents Installation Notes for Outpost Network Security (ONS) version 3.2...
Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates. September 2006
Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates September 2006 Copyright 2006 Entrust. All rights reserved. www.entrust.com Entrust is a registered trademark
Technical notes for HIGHSEC eid App Middleware
Technical notes for HIGHSEC eid App Middleware Version 2.1 February 2014. 1 Contents 1 Technical Notes... 3 1.1 All Operating Systems... 3 1.1.1 Slowing down of the cards while pairing... 3 1.1.2 Load
Outlook Web Access 2003 Remote User Guide
UNITED STATES COAST GUARD Outlook Web Access 2003 Remote User Guide Using Common Access Card Access TISCOM TIS-42 07/29/2008 Version 1.0 CAC Enabled Outlook Web Access CAC Enabled OWA is a way to view
Department of Defense SHA-256 Migration Overview
Department of Defense SHA-256 Migration Overview 18 March 2011 Tim Fong DoD-CIO/ IIA [email protected] General Observations This is Important INFOSEC: Algorithms can be compromised over time. Crypto
E-CERT C ONTROL M ANAGER
E-CERT C ONTROL M ANAGER for e-cert on Smart ID Card I NSTALLATION G UIDE Version v1.7 Copyright 2003 Hongkong Post CONTENTS Introduction About e-cert Control Manager... 3 Features... 3 System requirements...
Application Note Gemalto.NET 2.0 Smart Card Certificate Enrollment using Microsoft Certificate Services on Windows 2008
7 Application Note Gemalto.NET 2.0 Smart Card Certificate Enrollment using Microsoft Certificate Services on Windows 2008 All information herein is either public information or is the property of and owned
About Network Data Collector
CHAPTER 2 About Network Data Collector The Network Data Collector is a telnet and SNMP-based data collector for Cisco devices which is used by customers to collect data for Net Audits. It provides a robust
SafeNet Authentication Client (Windows)
SafeNet Authentication Client (Windows) Version 8.1 SP1 Revision A User s Guide Copyright 2011 SafeNet, Inc. All rights reserved. All attempts have been made to make the information in this document complete
System Requirements Table of contents
Table of contents 1 Introduction... 2 2 Knoa Agent... 2 2.1 System Requirements...2 2.2 Environment Requirements...4 3 Knoa Server Architecture...4 3.1 Knoa Server Components... 4 3.2 Server Hardware Setup...5
eid Security Frank Cornelis Architect eid fedict 2008. All rights reserved
eid Security Frank Cornelis Architect eid The eid Project > Provides Belgian Citizens with an electronic identity card. > Gives Belgian Citizens a device to claim their identity in the new digital age.
Hosted Microsoft Exchange Client Setup & Guide Book
Hosted Microsoft Exchange Client Setup & Guide Book Section 1 Microsoft Outlook Web Access (OWA) access directions Section 2 Windows 10 Mail App setup & configuration Section 3 Windows Mobile Phone ActiveSync
HELP DOCUMENTATION E-SSOM INSTALLATION GUIDE
HELP DOCUMENTATION E-SSOM INSTALLATION GUIDE Copyright 1998-2013 Tools4ever B.V. All rights reserved. No part of the contents of this user guide may be reproduced or transmitted in any form or by any means
FileMaker 12. ODBC and JDBC Guide
FileMaker 12 ODBC and JDBC Guide 2004 2012 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker and Bento are trademarks of FileMaker, Inc.
PREPARED BY: AUDIT PROGRAM Author: Lance M. Turcato. APPROVED BY: Logical Security Operating Systems - Generic. Audit Date:
A SYSTEMS UNDERSTANDING A 1.0 Organization Objective: To ensure that the audit team has a clear understanding of the delineation of responsibilities for system administration and maintenance. A 1.1 Determine
TATA CONSULTANCY SERVICES LIMITED [ESECURITY - PKI PRODUCTS & SERVICES] ADVANCED TECHNOLOGY CENTRE, DECCANPARK, 1 - SOFTWARE UNITS LAYOUT
DIGITAL CERTIFICATE & IKEY USB TOKEN INSTALLATION - A USER GUIDE CONTACT BRKR BHAVAN, B-BLOCK TANKBUND ROAD HYDERABAD- 500063 WWW.APTS.GOV.IN TATA CONSULTANCY SERVICES LIMITED [ESECURITY - PKI PRODUCTS
GLOBAL PAYMENTS AND CASH MANAGEMENT. HSBCnet Application Guide August 2006
GLOBAL PAYMENTS AND CASH MANAGEMENT HSBCnet Application Guide August 2006 HSBCnet Application Guide TABLE OF CONTENT Page Overview 1 Step 1 Verifying the Minimum System Requirements 2 1.1 Operating System
Pre-Installation Checks Installation Creating Users and Quick Setup Usage Examples and Settings Appendix
Standard Setup Guide 1 2 3 4 5 Pre-Installation Checks Installation Creating Users and Quick Setup Usage Examples and Settings Appendix Read this manual carefully before you use this product and keep it
OUTLOOK WEB ACCESS (OWA) AND SSL VPN HOME USERS MANUAL
United States Army Special Operations Command (USASOC) Special Operations Forces Information Technology Enterprise Contracts (SITEC) OUTLOOK WEB ACCESS (OWA) AND SSL VPN HOME USERS MANUAL Prepared by:
SafeNet Authentication Client (Mac)
SafeNet Authentication Client (Mac) Version 8.2 SP2 Revision A Administrator s Guide 1 Copyright 2014 SafeNet, Inc. All rights reserved. All attempts have been made to make the information in this document
Enabling SSL and Client Certificates on the SAP J2EE Engine
Enabling SSL and Client Certificates on the SAP J2EE Engine Angel Dichev RIG, SAP Labs SAP AG 1 Learning Objectives As a result of this session, you will be able to: Understand the different SAP J2EE Engine
Novell ZENworks 10 Configuration Management SP3
AUTHORIZED DOCUMENTATION Software Distribution Reference Novell ZENworks 10 Configuration Management SP3 10.3 November 17, 2011 www.novell.com Legal Notices Novell, Inc., makes no representations or warranties
Customised version for ČSOB a.s. - English
CryptoPlus Card Manager v. 1.1.31 USER GUIDE Customised version for ČSOB a.s. - English August 2003 MONET+, a.s. Zlín Contents Contents...2 1. Foreword...3 2. CryptoPlus How to Start...4 2.1 HW and SW
Lepide Active Directory Self Service. Configuration Guide. Follow the simple steps given in this document to start working with
Lepide Active Directory Self Service Configuration Guide 2014 Follow the simple steps given in this document to start working with Lepide Active Directory Self Service Table of Contents 1. Introduction...3
Windows 7. Qing Liu [email protected] Michael Stevens [email protected]
Windows 7 Qing Liu [email protected] Michael Stevens [email protected] 1 Overview 1. Financial Institution s Preliminary Steps 2. User Interface 3. Data Protection 4. User and Group Changes
The SSL device also supports the 64-bit Internet Explorer with new ActiveX loaders for Assessment, Abolishment, and the Access Client.
WatchGuard SSL v3.2 Release Notes Supported Devices SSL 100 and 560 WatchGuard SSL OS Build 355419 Revision Date January 28, 2013 Introduction WatchGuard is pleased to announce the release of WatchGuard
System Administration Training Guide. S100 Installation and Site Management
System Administration Training Guide S100 Installation and Site Management Table of contents System Requirements for Acumatica ERP 4.2... 5 Learning Objects:... 5 Web Browser... 5 Server Software... 5
Exploiting the Web with Tivoli Storage Manager
Exploiting the Web with Tivoli Storage Manager Oxford University ADSM Symposium 29th Sept. - 1st Oct. 1999 Roland Leins, IBM ITSO Center - San Jose [email protected] Agenda The Web Client Concept Tivoli
Ipswitch WS_FTP Server
Ipswitch WS_FTP Server User s Guide Software Version 5.0 Ipswitch, Inc Ipswitch Inc. Web: http://www.ipswitch.com 10 Maguire Road Phone: 781.676.5700 Lexington, MA Fax: 781.676.5710 02421 Copyrights The
The Security Framework 4.1 Programming and Design
Tel: (301) 587-3000 Fax: (301) 587-7877 E-mail: [email protected] Web: www.setecs.com Security Architecture for Development and Run Time Support of Secure Network Applications Sead Muftic, President/CEO
A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 3 Installing Windows
: Managing, Maintaining, and Troubleshooting, 5e Chapter 3 Installing Windows Objectives How to plan a Windows installation How to install Windows Vista How to install Windows XP How to install Windows
Test Plan for Department of Defense (DoD) Public Key Infrastructure (PKI) Interagency/Partner Interoperability. Version 1.0.3
Test Plan for Department of Defense (DoD) Public Key Infrastructure (PKI) Interagency/Partner Interoperability Version 1.0.3 Prepared for: Department of Defense (DoD) PKI August 27, 2008 Page 1 Table of
ANZ transactive 05.2012
ANZ transactive TECHNICAL SPECIFICATIONS GUIDE 05.2012 contents 1. Summary 3 2. Systems overview 4 3. Client technical specification 5 3.1 Usage Considerations 5 3.2 Summary Specification 5 > > 3.2.1 Summary
This Deployment Guide is intended for administrators in charge of planning, implementing and
YOUR AUTOMATED EMPLOYEE Foxtrot Deployment Guide Enterprise Edition Introduction This Deployment Guide is intended for administrators in charge of planning, implementing and maintaining the deployment
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
Thales ncipher modules. Version: 1.2. Date: 22 December 2009. Copyright 2009 ncipher Corporation Ltd. All rights reserved.
ncipher modules Integration Guide for IBM Tivoli Access Manager for e-business 6.1 Windows Server 2003 32-bit and 64-bit Windows Server 2008 32-bit and 64-bit Version: 1.2 Date: 22 December 2009 Copyright
MAS 90. Installation and System Administrator's Guide 4WIN1010-02/04
MAS 90 Installation and System Administrator's Guide 4WIN1010-02/04 Copyright 1998-2004 Best Software, Inc. All rights reserved. Rev 02 Contents Chapter 1 Introduction 1 How to Use This Manual 1 Graphic
RSA Digital Certificate Solution
RSA Digital Certificate Solution Create and strengthen layered security Trust is a vital component of modern computing, whether it is between users, devices or applications in today s organizations, strong
Kaspersky Endpoint Security 10 for Windows. Deployment guide
Kaspersky Endpoint Security 10 for Windows Deployment guide Introduction Typical Corporate Network Network servers Internet Gateway Workstations Mail servers Portable media Malware Intrusion Routes Viruses
NETWRIX ACCOUNT LOCKOUT EXAMINER
NETWRIX ACCOUNT LOCKOUT EXAMINER ADMINISTRATOR S GUIDE Product Version: 4.1 July 2014. Legal Notice The information in this publication is furnished for information use only, and does not constitute a
FEATURE COMPARISON BETWEEN WINDOWS SERVER UPDATE SERVICES AND SHAVLIK HFNETCHKPRO
FEATURE COMPARISON BETWEEN WINDOWS SERVER UPDATE SERVICES AND SHAVLIK HFNETCHKPRO Copyright 2005 Shavlik Technologies. All rights reserved. No part of this document may be reproduced or retransmitted in
GUARD1 PLUS SE Administrator's Manual
GUARD1 PLUS SE Administrator's Manual Version 4.4 30700 Bainbridge Road Solon, Ohio 44139 Phone 216-595-0890 Fax 216-595-0991 [email protected] www.guard1.com i 2010 TimeKeeping Systems, Inc. GUARD1 PLUS
Network Licensing. White Paper 0-15Apr014ks(WP02_Network) Network Licensing with the CRYPTO-BOX. White Paper
WP2 Subject: with the CRYPTO-BOX Version: Smarx OS PPK 5.90 and higher 0-15Apr014ks(WP02_Network).odt Last Update: 28 April 2014 Target Operating Systems: Windows 8/7/Vista (32 & 64 bit), XP, Linux, OS
Citrix MetaFrame XP Security Standards and Deployment Scenarios
Citrix MetaFrame XP Security Standards and Deployment Scenarios Including Common Criteria Information MetaFrame XP Server for Windows with Feature Release 3 Citrix Systems, Inc. Information in this document
enicq 5 System Administrator s Guide
Vermont Oxford Network enicq 5 Documentation enicq 5 System Administrator s Guide Release 2.0 Published November 2014 2014 Vermont Oxford Network. All Rights Reserved. enicq 5 System Administrator s Guide
e-config Data Migration Guidelines Version 1.1 Author: e-config Team Owner: e-config Team
Data Migration was a one-time optional activity to migrate the underlying portfolio database in e- config and was only needed during the e-config Upgrade that was rolled out on January 21, 2013. This document
Non-Employee VPN Quick Start Guide
1. Computer Requirements Pentium-based personal computer Windows XP SP3: 128 MB RAM Windows Vista Windows 7 Home/Pro 10 MB hard disk space Microsoft Internet Explorer 6.0 or later or Mozilla Firefox 1.0
RSA Authentication Agent 7.1 for Microsoft Windows Installation and Administration Guide
RSA Authentication Agent 7.1 for Microsoft Windows Installation and Administration Guide Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com
FileMaker Server 7. Administrator s Guide. For Windows and Mac OS
FileMaker Server 7 Administrator s Guide For Windows and Mac OS 1994-2004, FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker is a trademark
Installing and Administering VMware vsphere Update Manager
Installing and Administering VMware vsphere Update Manager Update 1 vsphere Update Manager 5.1 This document supports the version of each product listed and supports all subsequent versions until the document
