TrustKey Tool User Manual

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "TrustKey Tool User Manual"

Transcription

1 TrustKey Tool User Manual 1

2 Table of Contents 1 Introduction TrustKey Product TrustKey Tool TrustKey function modules TrustKey using environment TrustKey Tool Installation TrustKey Tool Installation TrustKey Tool Launching TrustKey Tool TrustKey Tool Overview Device Operations PIN Operations Certificate Operations Admin Options Exit TrustKey tool Device Operations Set User PIN Device Selection Change Label PIN Operations Verify PIN Modify PIN Certificate Operations View Certificate Register Certificate Unregister Certificate Delete Certificate

3 4.6.5 Import Certificate Publish Certificate Admin Reset PIN Format Token Options Support...29 List of Figures Figure 1 Installation... 8 Figure 2 Installation Successful...9 Figure 3 Trust Key Tool Main Menu...10 Figure 4 Running Label of TrustKey Tool Figure 5 Trust Key Tool Exit...14 Figure 6 Setting up User PIN...15 Figure 7 Set PIN Successful and Warning Figure 8 Device Selection...16 Figure 9 Label Change Dialogue box...16 Figure 10 PIN Verification Figure 11 Wrong PIN entered warning...17 Figure 12 PIN Locked...18 Figure 13 PIN Modification Figure 14 PIN Modified Successfully...19 Figure 15 View Certificate...20 Figure 16 Certificate Registered Figure 17 Certificate Unregistered Successfully Figure 18 Delete certificate Figure 19 Importing Certificate

4 Figure 20 Importing certificate by entering PIN Figure 21 Imported Certificate in the token...24 Figure 22 Certificate Published Successfully...24 Figure 23 Reset PIN prompting Admin PIN...25 Figure 24 Format Token prompting Admin PIN...26 Figure 25 Warning before Formatting Token Figure 26 Token Formatted Successfully Figure 27 Initialization Window...27 Figure 28 Device Information Figure 29 Trust Key Support Figure 30 TrustKey Website

5 1 Introduction With the development of Internet and fast development of network technology a vast majority of people communicate with each other online, instead of traditional methods of face to face meeting. Due to this security authentication becomes vital for the network security, also the bank transactions and fund transfer becoming online it is very important to protect data. The USB tokens provide a secure way to store the Digital Signature Certificate. The TrustKey USB Token is a hardware cryptographic module with a USB form factor for twofactor authentication which has been validated against the FIPS at security level 2. The public and private user s key is generated and is stored on the chip embedded inside the token; the key pairs are stored in EEPROM. Private Key is secured and cannot be exported. 5

6 2 TrustKey Product In internet applications, like e-business, e-government, network communication and e- transaction, it is very important to ensure the information security. TrustKey Product is developed as a solution of this security problem. It provides a convenient and reliable secure environment for customers. 2.1 TrustKey Tool High in security 1. Supporting 2048 bits RSA asymmetric cryptographic algorithms and SHA2. 2. Supporting password and hardware authentication. 3. Hardware device provide secure memory space which can be used to store password, private key and other secret data. The secret data is not exportable; the hardware device is not replicable. 4. Secure and reliable. All encryptions and decryptions are operated inside the TrustKey device. Uniformity specification 1. Following the worldwide universal standards: PKCS#11 v2.1 specification and Microsoft CSP 2.0 specification. 2. Completely realized the security communication functions supported by SSL and S/MIME. The specification covers application and storage of digital certificate, digital signature and verification, encryption/decryption, etc. 3. Using standard interface to connect with browsers, the communications is strictly abiding browser s secure communication operating regulations. 4. Supporting certificate s interoperability between CSP and PKCS# Supporting certificate application and secure exchange in the environment of IE/Outlook, Foxmail, NetScape, Mozilla and Firefox/Thunderbird. 6. Supporting X. 509 v3 certificate storage. Excellent compatibility 1. No need to install special TrustKey driver, the driver integrated inside the Windows Operating System is used there by eliminating the driver installation. 2. The hardware is a kind of USB device which is following USB1.1/USB 2.0 specification. It can be used conveniently in every USB supported facilities. 6

7 4. Uniform interfaces is used for UDK devices. One suite can supports both HID and UDK devices. 5. The UI is supported in Windows/ME/2000/2003/XP/Vista/Windows7/Windows 8 and Windows 8.1/ Linux Operating Systems are all supporting. Flexible design 1. Using modularized design to meet customer s dedicated requirements. 2. A convenient platform for user s certificates management is provided. 3. UI (User Interface) is designed up to customer s requirements. 4. Secondary development interface is provided. 2.2 TrustKey function modules TrustKey network security suite includes the following 5 modules: CSP module: 1. It is a basic interface module based on Microsoft CSP2.0 specification. 2. It is configured at registry. 3. It can be used in IE browser, Outlook and Foxmail for certificate application, security website visitation and security service, etc. PKCS#11 Module: 1. Supporting PKCS#11 v2.1 interface. 2. It is applicable in NetScape/Mozilla browser and ThunderBird server. Administrator s tool: It provides functions of key initialization, certificate operation and PIN operation, etc. User s tool: It provides not only PIN operations of verification and modification, but also certificate operations of checking and installation/uninstall. Background: At the time of TrustKey plug in and out, certificate registration/revocation will be automatically done, and application programs will automatically start and end. 2.3 TrustKey using environment The supporting operating systems are shown as below: WIN XP SP2 and above WIN 2000/2003/2008 Server WINDOWS 7, 8, 8.1 The supporting software includes: IE/Mozilla/Netscape/ browsers. Outlook/Foxmail/ThunderBird clients. 7

8 3 TrustKey Tool Installation The TrustKey comes with the Autorun supported ND (No Driver) feature. User can install the TrustKey tool just by plugging the token into the USB slot, the installation and details of the TrustKey tool is explained in detail below. 3.1 TrustKey Tool Installation To begin with the installation just plug in the token into the USB slot of the Laptop or PC, the Autorun supported product will automatically install TrustKey tool on the system 1. Once the token is plugged into the USB slot the Autorun features asks for the installation of the token management tool as shown in the Figure 1, just click the install button to proceed with the installation of the software. Figure 1 Installation 8

9 2. The token management software installs as shown in the Figure 2 just click the finish button Figure 2 Installation Successful 9

10 4 TrustKey Tool 4.1 Launching TrustKey Tool The TrustKey tool can be launched using the short cut icon created on the desktop during installation, or can be found by clicking Start menu on windows and then finding the Trust Key Tool can selecting it, the Trust Key Token tool has a easy user Interface as shown in Figure 3. Figure 3 Trust Key Tool Main Menu 10

11 During TrustKey administrator s tool running, the label of the tool will display in the right bottom corner as Figure 4. Figure 4 Running Label of TrustKey Tool 4.2 TrustKey Tool Overview As shown in Figure 3 there are 5 operation available in the main menu for the TrustKey tool which include the 1. Device Operation 2. Pin Operation 3. Certificate Operations 4. Admin 5. Options Device Operations :It enables device selection when several Trustkeys are available. :This function is used by administrator for change label. 11

12 : This function exits the administration tool PIN Operations :PIN verification can identify the TrustKey holder for embezzle resistance. :It is used to modify the PIN Certificate Operations :It is used to view the certificates in the TrustKey. :It can be used to install the selected certificate in IE. :It is useful for uninstall the selected certificate from IE. :It is used to delete the selected certificate from the TrustKey. :It provides the function of import a certificate. : This Publishes the CA and the Root Certificate 12

13 4.2.4 Admin : It is used to reset the PIN : It is used to format the token completely Options : This function enables administrators to view the device information like label, ATR information, CSP name, token version and free space. 13

14 4.3 Exit TrustKey tool Click the close button at upper right corner to exit TrustKey Administrator Interface. Can go to Device operations and can exit or Go to File and exit One can find the File and Help Icons on the top left had corner of the tool, the file Icon can be used to close the TrustKey Tool, upon clicking the File icon an Exit icon can be seen as shown in Figure 5 Figure 5 Trust Key Tool Exit 14

15 4.4 Device Operations Set User PIN The token has to be entered a user defined PIN, once the TrustKey tool is installed. The length of the PIN should be between 6-32 (Alpha Numeric). The token prompts Set Pin once the installation is completed; where in the user need to define his/her PIN (this will be one time and may be needed if the token is formatted). Figure 6 shows the Set User PIN prompt and Figure 7(a) shows the successful PIN set. Figure 6 Setting up User PIN If the PIN is entered exceed the range of 6 to 32 characters, a warning window like Figure 7(b) will out to tell you PIN for the token requirements. (a) 15

16 (b) Figure 7 Set PIN Successful and Warning Device Selection When more than one TrustKey tokens are plugged in, you can select a device as needed. It is illustrated in Figure 8 that there are two available TrustKey tokens: Trust_USB_token(1) and Trust_USB_token(2). Figure 8 Device Selection Change Label Change Label provides administrators with the interface of change the label of user s device. It is shown in Figure 9. Figure 9 Label Change Dialogue box 16

17 4.5 PIN Operations Verify PIN PIN verification is designed for confirm TrustKey holder s identity and avoid embezzlement (theft). The PIN verification interface can be seen in Figure 10. Figure 10 PIN Verification Maximum User PIN error counter is set by default to 10 so the user can try to verify the password a maximum 10 times in case if the user is not fully aware or forgotten his PIN and wants to guess his PIN. As shown in Figure 11 user gets 10 attempts by default in case of forgotten PIN. However if the user still not able to verify the set PIN after 10 guess attempts the token gets locked as shown in Figure 12. The user needs to contact the Trust Key customer care in case he/she has forgotten the PIN. Figure 11 Wrong PIN entered warning 17

18 Figure 12 PIN Locked Modify PIN The function of PIN modify is provided by the interface like Figure 13. Figure 13 PIN Modification 18

19 The user can modify his User PIN by entering his currently used User PIN and then typing his/her new user PIN and then confirming the user PIN, in case the token is formatted the default user PIN would be set to Once the PIN is modified the window as shown in Figure 14 will appear. Figure 14 PIN Modified Successfully 19

20 4.6 Certificate Operations Certificate operation contains 6 functions which are view certificate, install certificate, uninstall certificate, delete certificate, import certificate and publish certificate View Certificate After entered the certificate operation interface, all available certificates are listed in text area at upper-right side of TrustKey tool. Choose a certificate as you want, click View button at tool bar or click View certificate at the menu bar, a certificate window like Figure 15 will display and provides all the information about this certificate. Figure 15 View Certificate 20

21 4.6.2 Register Certificate Select a certificate you want to install and then click Register on the registration a dialogue as Shown in Figure 16 Figure 16 Certificate Registered Unregister Certificate All the available certificates are listed inside the certificate text area please choose a certificate and press unregister for unregistering once it is successfully done a window appears as shown in Figure 17.. Figure 17 Certificate Unregistered Successfully 21

22 4.6.4 Delete Certificate This function enable administrators delete the selected certificate from the token. For safe, a confirmation is required as shown in Figure 18 and then the certificate is deleted. Figure 18 Delete certificate Import Certificate Click on import certificate and choose the certificate as shown in Figure 19 Figure 19 Importing Certificate 22

23 Once the certificate is chosen then user needs to enter the password as shown in Figure 20 (a) Certificate Password (b) Token Password, the certificate gets imported into the token as shown in the Figure 21. (a) (b) Figure 20 Importing certificate by entering PIN 23

24 Figure 21 Imported Certificate in the token Publish Certificate This publishes the CA and the root certificate chain once published a window as shown in Figure 22 appears. Figure 22 Certificate Published Successfully 24

25 4.7 Admin For any operation in the Admin sub menu the user need to obtain the Admin PIN and he should contact the customer care for any operations in Admin sub menu Reset PIN User needs to obtain the Admin PIN the user will need to contact customer care for this. User needs to enter the Admin PIN in the field as shown in Figure 23 (a) and then the tool asks the users confirmation for resetting the current user PIN as shown in Figure 23 (b) (a) (b) Figure 23 Reset PIN prompting Admin PIN Format Token If the user wants to delete the user PIN and also all the certificates downloaded in the token then the user needs to format the token with the obtained admin key from the Trust Key customer care. The format token option asking for admin PIN is as shown in Figure

26 Figure 24 Format Token prompting Admin PIN Once the Admin PIN is obtained and entered a Dialogue box as shown in Figure 25 will appear and upon the user s confirmation the token will be formatted and once the token is formatted and a dialogue box as shown in Figure 26 appears. Figure 25 Warning before Formatting Token Figure 26 Token Formatted Successfully Once the formatting of the token is done the Initialization settings are applied and then the user again needs to set the User PIN details, by default after formatting the PIN is set to as shown in Figure

27 Figure 27 Initialization Window More details about these initialization options are described as below: 1. Initialize user pin: is used to set initial administrator PIN. Usually, it is defaulted as User PIN Error Counter: provides a maximum of retry the user s PIN in an error. If users retry the PIN more than this number, the PIN will be locked. The Pin Error attempt set to 10 attempts default. 3. Label: can be used to set and change the name of user s device. 27

28 4.8 Options Device information can be read by click Options -> Device Information. Then, as illustrated in Figure 28, you can see the device information of label, ATR, CSP name, token version and free space. Figure 28 Device Information 28

PROXKey Tool User Manual

PROXKey Tool User Manual PROXKey Tool User Manual 1 Table of Contents 1 Introduction...4 2 PROXKey Product... 5 2.1 PROXKey Tool... 5 2.2 PROXKey function modules...6 2.3 PROXKey using environment...6 3 PROXKey Tool Installation...7

More information

Token User Guide. Version 1.0/ July 2013

Token User Guide. Version 1.0/ July 2013 Token User Guide Version 1.0/ July 2013 Index Overview... 3 Usage requirements... 4 KIT contents... 5 Smart Card installation... 6 Reader driver installation... 7 In the case of Windows XP... 7 In the

More information

Yale Software Library

Yale Software Library Yale Software Library http://www.yale.edu/its/software/ For assistance contact the ITS Help Desk 203-432-9000, helpdesk@yale.edu Two-factor authentication: Installation and configuration instructions for

More information

SafeNet Authentication Client (Mac)

SafeNet Authentication Client (Mac) SafeNet Authentication Client (Mac) Version 8.2 SP2 Revision A Administrator s Guide 1 Copyright 2014 SafeNet, Inc. All rights reserved. All attempts have been made to make the information in this document

More information

Technical notes for HIGHSEC eid App Middleware

Technical notes for HIGHSEC eid App Middleware Technical notes for HIGHSEC eid App Middleware Version 2.1 February 2014. 1 Contents 1 Technical Notes... 3 1.1 All Operating Systems... 3 1.1.1 Slowing down of the cards while pairing... 3 1.1.2 Load

More information

Guide to Obtaining Your Free WISeKey CertifyID Personal Digital Certificate (Personal eid) WISeKey 2010 / Alinghi 2010 Smartcards

Guide to Obtaining Your Free WISeKey CertifyID Personal Digital Certificate (Personal eid) WISeKey 2010 / Alinghi 2010 Smartcards The World Internet Security Company Solutions for Security Guide to Obtaining Your Free WISeKey CertifyID Personal Digital Certificate (Personal eid) WISeKey 2010 / Alinghi 2010 Smartcards Wherever Security

More information

SecureStore I.CA. User manual. Version 2.16 and higher

SecureStore I.CA. User manual. Version 2.16 and higher User manual Version 2.16 and higher Contents SecureStore I.CA 1. INTRODUCTION...3 2. ACCESS DATA FOR THE CARD...3 2.1 Card initialisation...3 3. MAIN SCREEN...4 4. DISPLAYING INFORMATION ABOUT THE PAIR

More information

DIGIPASS CertiID. Getting Started 3.1.0

DIGIPASS CertiID. Getting Started 3.1.0 DIGIPASS CertiID Getting Started 3.1.0 Disclaimer Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis, without any other warranties, or conditions, express

More information

Customised version for ČSOB a.s. - English

Customised version for ČSOB a.s. - English CryptoPlus Card Manager v. 1.1.31 USER GUIDE Customised version for ČSOB a.s. - English August 2003 MONET+, a.s. Zlín Contents Contents...2 1. Foreword...3 2. CryptoPlus How to Start...4 2.1 HW and SW

More information

Guide to Obtaining Your Free WISeKey CertifyID Personal Digital Certificate on Aladdin etoken (Personal eid)

Guide to Obtaining Your Free WISeKey CertifyID Personal Digital Certificate on Aladdin etoken (Personal eid) The World Internet Security Company Solutions for Security Guide to Obtaining Your Free WISeKey CertifyID Personal Digital Certificate on Aladdin etoken (Personal eid) Wherever Security relies on Identity,

More information

CSOS Certificate Support Guide. Version: 1.1 Published: October 1, 2006 Publisher: CSOS Certification Authority

CSOS Certificate Support Guide. Version: 1.1 Published: October 1, 2006 Publisher: CSOS Certification Authority Version: 1.1 Published: October 1, 2006 Publisher: CSOS Certification Authority Document Revision History Version # Revision Sections Summary of Changes Initials Date Affected 1.0 4/27/2006 All Version

More information

PKI Contacts PKI for Fraunhofer Contacts

PKI Contacts PKI for Fraunhofer Contacts Fraunhofer Competence Center PKI PKI Contacts PKI for Fraunhofer Contacts User manual for communication partners of the Fraunhofer-Gesellschaft Author[s]: Uwe Bendisch, Maximilian Gottwald As at: 15.10.2013

More information

Shakambaree Technologies Pvt. Ltd.

Shakambaree Technologies Pvt. Ltd. Welcome to Support Express by Shakambaree Technologies Pvt. Ltd. Introduction: This document is our sincere effort to put in some regular issues faced by a Digital Signature and USB Token user doing on

More information

TPM. (Trusted Platform Module) Installation Guide V2.1

TPM. (Trusted Platform Module) Installation Guide V2.1 TPM (Trusted Platform Module) Installation Guide V2.1 Table of contents 1 Introduction 1.1 Convention... 4 1.2 TPM - An Overview... 5 2 Using TPM for the first time 2.1 Enabling TPM... 6 2.2 Installing

More information

Introducing etoken. What is etoken?

Introducing etoken. What is etoken? Introducing etoken Nirit Bear September 2002 What is etoken? Small & portable reader-less Smartcard Standard USB connectivity Logical and physical protection Tamper evident (vs. tamper proof) Water resistant

More information

E-CERT C ONTROL M ANAGER

E-CERT C ONTROL M ANAGER E-CERT C ONTROL M ANAGER for e-cert on Smart ID Card I NSTALLATION G UIDE Version v1.7 Copyright 2003 Hongkong Post CONTENTS Introduction About e-cert Control Manager... 3 Features... 3 System requirements...

More information

I. Configuring Digital signature certificate in Microsoft Outlook 2003:

I. Configuring Digital signature certificate in Microsoft Outlook 2003: I. Configuring Digital signature certificate in Microsoft Outlook 2003: In order to configure Outlook 2003 to use the new message security settings please follow these steps: 1. Open Outlook. 2. Go to

More information

Personal Secure Email Certificate

Personal Secure Email Certificate Entrust Certificate Services Personal Secure Email Certificate Enrollment Guide Date of Issue: October 2010 Copyright 2010 Entrust. All rights reserved. Entrust is a trademark or a registered trademark

More information

GoldKey Software. User s Manual. Revision 7.12. WideBand Corporation www.goldkey.com. Copyright 2007-2014 WideBand Corporation. All Rights Reserved.

GoldKey Software. User s Manual. Revision 7.12. WideBand Corporation www.goldkey.com. Copyright 2007-2014 WideBand Corporation. All Rights Reserved. GoldKey Software User s Manual Revision 7.12 WideBand Corporation www.goldkey.com 1 Table of Contents GoldKey Installation and Quick Start... 5 Initial Personalization... 5 Creating a Primary Secure Drive...

More information

Using etoken for Securing E-mails Using Outlook and Outlook Express

Using etoken for Securing E-mails Using Outlook and Outlook Express Using etoken for Securing E-mails Using Outlook and Outlook Express Lesson 15 April 2004 etoken Certification Course Securing Email Using Certificates Unprotected emails can be easily read and/or altered

More information

IBM Client Security Solutions. Client Security User's Guide

IBM Client Security Solutions. Client Security User's Guide IBM Client Security Solutions Client Security User's Guide December 1999 1 Before using this information and the product it supports, be sure to read Appendix B - Notices and Trademarks, on page 22. First

More information

Jumble for Microsoft Outlook

Jumble for Microsoft Outlook Jumble for Microsoft Outlook Jumble is a zero knowledge, end- to- end email encryption solution that integrates with existing email platforms. Jumble integrates at the email client level and removes the

More information

Entrust Certificate Services for Adobe CDS

Entrust Certificate Services for Adobe CDS Entrust Certificate Services Entrust Certificate Services for Adobe CDS Getting Started Guide Entrust SafeNet Authentication Client: 8.3 Date of issue: July 2015 Document issue: 3.0 Revisions Issue and

More information

Digital Signatures on iqmis User Access Request Form

Digital Signatures on iqmis User Access Request Form Digital Signatures on iqmis User Access Request Form When a user clicks in the User Signature block on the iqmis Access Form, the following window appears: Click Save a Copy and rename it with your name,

More information

SafeNet Authentication Client (Linux) Administrator s Guide Version 8.1 Revision A

SafeNet Authentication Client (Linux) Administrator s Guide Version 8.1 Revision A SafeNet Authentication Client (Linux) Administrator s Guide Version 8.1 Revision A Copyright 2011, SafeNet, Inc. All rights reserved. All attempts have been made to make the information in this document

More information

epass2003 User Guide V1.0 Feitian Technologies Co., Ltd. Website: www.ftsafe.com

epass2003 User Guide V1.0 Feitian Technologies Co., Ltd. Website: www.ftsafe.com epass2003 User Guide V1.0 Feitian Technologies Co., Ltd. Revision History: Date Revision Description June 2013 V1.0 Release of the first version i Software Developer s Agreement All Products of Feitian

More information

Dial-up Installation for CWOPA Users (Windows Operating System)

Dial-up Installation for CWOPA Users (Windows Operating System) Dial-up Installation for CWOPA Users (Windows Operating System) 1 Table of Contents Download and Install Digital Certificates... 3 Internet Explorer 8/9 Certificate Installation.3 Windows XP Instructions

More information

Windows and MAC User Handbook Remote and Secure Connection Version 1.01 09/19/2013. User Handbook

Windows and MAC User Handbook Remote and Secure Connection Version 1.01 09/19/2013. User Handbook Windows and MAC User Handbook How to Connect Your PC or MAC Remotely and Securely to Your U.S. Department of Commerce Account Developed for You by the Office of IT Services (OITS)/IT Service Desk *** For

More information

TCS-CA. Outlook Express Configuration [VERSION 1.0] U S E R G U I D E

TCS-CA. Outlook Express Configuration [VERSION 1.0] U S E R G U I D E U S E R G U I D E TCS-CA Outlook Express Configuration [VERSION 1.0] C O N T E N T S 1 DESCRIPTION... 3 2 OUTLOOK EXPRESS AND CERTIFICATES... 4 3 ENABLING SECURITY SETTINGS FOR MAIL ACCOUNT... 5 3.1 Settings

More information

CWOPA Broadband Users. Windows Operating System

CWOPA Broadband Users. Windows Operating System CWOPA Broadband Users Windows Operating System October 2012 Background These instructions are to be used for VPN users who have been assigned a CWOPA username and password. If your machine has Internet

More information

HP ProtectTools Embedded Security Guide

HP ProtectTools Embedded Security Guide HP ProtectTools Embedded Security Guide Document Part Number: 364876-001 May 2004 This guide provides instructions for using the software that allows you to configure settings for the HP ProtectTools Embedded

More information

6. Is it mandatory to have the digital certificate issued from NICCA?...3. 7. Is it mandatory for the sender and receiver to have a NIC email id?...

6. Is it mandatory to have the digital certificate issued from NICCA?...3. 7. Is it mandatory for the sender and receiver to have a NIC email id?... FAQ FOR S/MIME 1. What is S/MIME?...2 2. What is digital certificate?...2 3. What is an encrypted email?...2 4. Is it mandatory to use this service?...2 5. What I need to do to start using S/MIME service?...2

More information

TPM. (Trusted Platform Module) Installation Guide V3.3.0. for Windows Vista

TPM. (Trusted Platform Module) Installation Guide V3.3.0. for Windows Vista TPM (Trusted Platform Module) Installation Guide V3.3.0 for Windows Vista Table of contents 1 Introduction 1.1 Convention... 4 1.2 TPM - An Overview... 5 2 Using TPM for the first time 2.1 Enabling TPM...

More information

SP Widget. Users Manual

SP Widget. Users Manual SP Widget Users Manual 1 Contents 1. Disclaimer notice... 4 2. Product intro...5 3. System requirements... 5 4. Introduction... 6 4.1 Activating SP Widget... 6 Illustration 4.1... 6 4.2 Browser interface...

More information

ZENworks 11 Support Pack 4 Full Disk Encryption Agent Reference. May 2016

ZENworks 11 Support Pack 4 Full Disk Encryption Agent Reference. May 2016 ZENworks 11 Support Pack 4 Full Disk Encryption Agent Reference May 2016 Legal Notice For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions, U.S. Government

More information

etoken PKI Client (Windows) User s Guide Version 5.1 Revision B

etoken PKI Client (Windows) User s Guide Version 5.1 Revision B etoken PKI Client (Windows) User s Guide Version 5.1 Revision B All attempts have been made to make the information in this document complete and accurate. Aladdin is not responsible for any direct or

More information

Smart TPM. User's Manual. Rev. 1001 12MD-STPM-1001R

Smart TPM. User's Manual. Rev. 1001 12MD-STPM-1001R Smart TPM User's Manual Rev. 1001 12MD-STPM-1001R We recommend that you download the latest version of the Smart TPM utility from GIGABYTE's website. If you have installed Ultra TPM earlier, you can install

More information

SafeNet Authentication Client (Windows)

SafeNet Authentication Client (Windows) SafeNet Authentication Client (Windows) Version 8.1 SP1 Revision A User s Guide Copyright 2011 SafeNet, Inc. All rights reserved. All attempts have been made to make the information in this document complete

More information

USER GUIDE WWPass Security for Email (Outlook) For WWPass Security Pack 2.4

USER GUIDE WWPass Security for Email (Outlook) For WWPass Security Pack 2.4 USER GUIDE WWPass Security for Email (Outlook) For WWPass Security Pack 2.4 March 2014 TABLE OF CONTENTS Chapter 1 Welcome... 4 Introducing WWPass Security for Email (Outlook)... 5 Supported Outlook Products...

More information

User Guide May 2013. Using Certificates in Outlook Express

User Guide May 2013. Using Certificates in Outlook Express User Guide May 2013 Using Certificates in Outlook Express FIGU RES... FIGURES.... T I TL E..............................................................................................................................

More information

VeriSign PKI Client Government Edition v 1.5. VeriSign PKI Client Government. VeriSign PKI Client VeriSign, Inc. Government.

VeriSign PKI Client Government Edition v 1.5. VeriSign PKI Client Government. VeriSign PKI Client VeriSign, Inc. Government. END USER S GUIDE VeriSign PKI Client Government Edition v 1.5 End User s Guide VeriSign PKI Client Government Version 1.5 Administrator s Guide VeriSign PKI Client VeriSign, Inc. Government Copyright 2010

More information

ScanShell.Net Install Guide

ScanShell.Net Install Guide ScanShell.Net Install Guide Please install the software first - DO NOT PLUG IN THE SCANNER The scanner has been carefully packaged to avoid damage during transportation. Before operating the scanner, please

More information

How to install USB driver (MICRO/I)

How to install USB driver (MICRO/I) How to install USB driver (MICRO/I) HG2G-5S 1. The HG2G-5S USB driver installation wizard will start when Automation Organizer installation is complete. Click the Next button. 2. Read the license agreement

More information

Table of Contents. TPM Configuration Procedure... 2. 1. Configuring the System BIOS... 2

Table of Contents. TPM Configuration Procedure... 2. 1. Configuring the System BIOS... 2 Table of Contents TPM Configuration Procedure... 2 1. Configuring the System BIOS... 2 2. Installing the Infineon TPM Driver and the GIGABYTE Ultra TPM Utility... 3 3. Initializing the TPM Chip... 4 3.1.

More information

Digital Signature Certificate Online Enrollment Guide using etoken

Digital Signature Certificate Online Enrollment Guide using etoken Digital Signature Certificate Online Enrollment Guide using etoken C O N T A C T U S helpdesk@tcs-ca.tcs.com http://www.tcs-ca.tcs.com 1. A B O U T T H E D O C U M E N T This document describes the procedure

More information

Two Factor Authentication in SonicOS

Two Factor Authentication in SonicOS Two Factor Authentication in SonicOS 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION indicates potential damage

More information

X.509 Certificate Generator User Manual

X.509 Certificate Generator User Manual X.509 Certificate Generator User Manual Introduction X.509 Certificate Generator is a tool that allows you to generate digital certificates in PFX format, on Microsoft Certificate Store or directly on

More information

Internet E-Mail Encryption S/Mime Standard

Internet E-Mail Encryption S/Mime Standard Internet E-Mail Encryption S/Mime Standard Disclaimer: Successfully setting up encryption functions in most e-mail clients is usually not a problematic task. However, it should be noted that, when configuring

More information

DIAGNOSTICLINK 8.02 ORDERING SYSTEM

DIAGNOSTICLINK 8.02 ORDERING SYSTEM DIAGNOSTICLINK 8.02 ORDERING SYSTEM Version 1.4 4/27/2015 TABLE OF CONTENTS 1 INTRODUCTION...4 1.1 Purpose of Ordering System Guide...4 2 SYSTEM REQUIREMENTS...4 2.1 Minimum Requirements...4 3 ORDER SYSTEM...4

More information

INFORMATION TECHNOLOGY CERES DEPARTMENT

INFORMATION TECHNOLOGY CERES DEPARTMENT INFORMATION TECHNOLOGY CERES DEPARTMENT LRA APPLICATION MANUAL Name Date Written by: Technical support 18/10/2010 Revised by: Approved by: DOCUMENT TRACEABILITY Version Date Description Author 1.0 18/10/2010

More information

BCTextEncoder Help File

BCTextEncoder Help File BCTextEncoder Help File Introduction Introduction Main Features BCTextEncoder Requirements BCTextEncoder Specifications 2 Introduction BCTextEncoder is a line in BestCrypt family of encryption software

More information

Procedure for How to Enroll for Digital Signature

Procedure for How to Enroll for Digital Signature Procedure for How to Enroll for Digital Signature In Online Processing System getting to implement Digital Signature and Electronic Token for security and Authentication Purpose. For that bidder must have

More information

How to use SURA in three simple steps:

How to use SURA in three simple steps: How to use SURA in three simple steps: Most of SURA s functionality can be accessed through these three steps. 1) Download SURA to your computer Go to the SU Downloads page to obtain the SURA utility.

More information

Manual for configuring NIC VPN in Windows OS

Manual for configuring NIC VPN in Windows OS Manual for configuring NIC VPN in Windows OS NIC is introducing a new web based VPN interface to allow s to connect to NICNET through VPN. Apart from existing Client based VPN service, this new interface

More information

Wakefield Council Secure email and file transfer User guide for customers, partners and agencies

Wakefield Council Secure email and file transfer User guide for customers, partners and agencies Wakefield Council Secure email and file transfer User guide for customers, partners and agencies The nature of the work the council carries out means that we often deal with information that is sensitive

More information

Yubico PIV Management Tools

Yubico PIV Management Tools Yubico PIV Management Tools Active Directory Smart Card Logon using the YubiKey NEO or NEO-n Document Version 1.0 April 15, 2015 Yubico PIV Management Tools 2015 Yubico. All rights reserved. Page 1 of

More information

Draft Middleware Specification. Version X.X MM/DD/YYYY

Draft Middleware Specification. Version X.X MM/DD/YYYY Draft Middleware Specification Version X.X MM/DD/YYYY Contents Contents... ii 1. Introduction... 1 1.2. Purpose... 1 1.3. Audience... 1 1.4. Document Scope... 1 1.5. Document Objectives... 1 1.6. Assumptions

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

Defender 5.7 - Token Deployment System Quick Start Guide

Defender 5.7 - Token Deployment System Quick Start Guide Defender 5.7 - Token Deployment System Quick Start Guide This guide describes how to install, configure and use the Defender Token Deployment System, based on default settings and how to self register

More information

SECURE EMAIL USER GUIDE OUTLOOK 2000

SECURE EMAIL USER GUIDE OUTLOOK 2000 WELLS FARGO AUTHENTICATION SERVICES DATED: MAY 2003 TABLE OF CONTENTS GENERAL INFORMATION... 1 INSTALLING THE WELLS FARGO ROOT CERTIFICATE CHAIN.. 2 INSTALLING THE CERTIFICATES INTO IE... 3 SETTING UP

More information

USER GUIDE WWPass Security for Windows Logon

USER GUIDE WWPass Security for Windows Logon USER GUIDE WWPass Security for Windows Logon December 2015 TABLE OF CONTENTS Chapter 1 Welcome... 3 Introducing WWPass Security for Windows Logon... 4 Related Documentation... 4 Presenting Your PassKey

More information

User guide. Business Email

User guide. Business Email User guide Business Email June 2013 Contents Introduction 3 Logging on to the UC Management Centre User Interface 3 Exchange User Summary 4 Downloading Outlook 5 Outlook Configuration 6 Configuring Outlook

More information

Installing the Citrix Receiver for Windows desktop or laptop

Installing the Citrix Receiver for Windows desktop or laptop Installing the Citrix Receiver for Windows desktop or laptop Application Based (Citrix.com) RemoteAccess is the University's new service allowing you to access your University IT systems from anywhere

More information

Initial Setup of Mozilla Thunderbird with IMAP for Windows 7

Initial Setup of Mozilla Thunderbird with IMAP for Windows 7 Initial Setup of Mozilla Thunderbird Concept This document describes the procedures for setting up the Mozilla Thunderbird email client to download messages from Google Mail using Internet Message Access

More information

Remote Access Enhancements

Remote Access Enhancements Remote Access Enhancements Citrix/Epic Set-up Instructions Provided By: Akron Children s IT Department Date: 7/11/2012 Version: v6 2012 Children s Hospital Medical Center of Akron Table of Contents 1.

More information

Adobe Digital Signatures in Adobe Acrobat X Pro

Adobe Digital Signatures in Adobe Acrobat X Pro Adobe Digital Signatures in Adobe Acrobat X Pro Setting up a digital signature with Adobe Acrobat X Pro: 1. Open the PDF file you wish to sign digitally. 2. Click on the Tools menu in the upper right corner.

More information

Installing your Digital Certificate & Using on MS Out Look 2007.

Installing your Digital Certificate & Using on MS Out Look 2007. Installing your Digital Certificate & Using on MS Out Look 2007. Note: This technical paper is only to guide you the steps to follow on how to configure and use digital signatures. Therefore Certificate

More information

Gold Lock Desktop. User Manual. Follow these simple steps to install, configure, and use Gold Lock Desktop.

Gold Lock Desktop. User Manual. Follow these simple steps to install, configure, and use Gold Lock Desktop. User Manual Follow these simple steps to install, configure, and use. Content 1 Installation...02 2 Configuration...03-06 3 Use...07 4 Verification & Security...08 5 Backup & Restore...09 6 File Encryption...10

More information

Using etoken for SSL Web Authentication. SSL V3.0 Overview

Using etoken for SSL Web Authentication. SSL V3.0 Overview Using etoken for SSL Web Authentication Lesson 12 April 2004 etoken Certification Course SSL V3.0 Overview Secure Sockets Layer protocol, version 3.0 Provides communication privacy over the internet. Prevents

More information

Citrix Introduction and FAQs

Citrix Introduction and FAQs Citrix Introduction and FAQs Introduction to Citrix... 2 Why should I use this?... 2 What about Support?... 2 What browser should I use?... 2 Known Issues... 2 System Requirements for Windows-based computers...

More information

This manual will help you connect your Microsoft Windows XP, Vista, or 7, or Apple OS X computer to the University of Maryland campus data network.

This manual will help you connect your Microsoft Windows XP, Vista, or 7, or Apple OS X computer to the University of Maryland campus data network. This manual will help you connect your Microsoft Windows XP, Vista, or 7, or Apple OS X computer to the University of Maryland campus data network. Prerequisites for Network Registration: 1. In order to

More information

MCBDirect Corporate Logging on using a Soft Token

MCBDirect Corporate Logging on using a Soft Token MCBDirect Corporate Logging on using a Soft Token Document issue: 2.1 Date of issue: September 2014 Contents About Soft Token authentication... 3 Logging onto MCBDirect Corporate online banking... 4 Soft

More information

HDDtoGO. User Guide. User Manual Version 3.4 2004-2010 CoSoSys SRL 2010 A-DATA Technology Co., Ltd. HDDtoGO User Manual

HDDtoGO. User Guide. User Manual Version 3.4 2004-2010 CoSoSys SRL 2010 A-DATA Technology Co., Ltd. HDDtoGO User Manual HDDtoGO User Guide User Manual Version 3.4 2004-2010 CoSoSys SRL 2010 A-DATA Technology Co., Ltd. HDDtoGO User Manual Table of Contents Table of Contents...1 1. Introduction...2 2. System Requirements...3

More information

Installation, Setup, & Uninstall Guide Virtual TimeClock 15 Pro Edition for Windows

Installation, Setup, & Uninstall Guide Virtual TimeClock 15 Pro Edition for Windows Virtual TimeClock Installation, Setup, & Uninstall Guide Virtual TimeClock 15 Pro Edition for Windows Overview This guide will help you quickly install, configure, and if needed, uninstall Virtual TimeClock

More information

Entrust Managed Services PKI. Getting an end-user Entrust certificate using Entrust Authority Administration Services. Document issue: 2.

Entrust Managed Services PKI. Getting an end-user Entrust certificate using Entrust Authority Administration Services. Document issue: 2. Entrust Managed Services PKI Getting an end-user Entrust certificate using Entrust Authority Administration Services Document issue: 2.0 Date of issue: June 2009 Revision information Table 1: Revisions

More information

Windows Server 2008 R2 Boot Manager Security Policy For FIPS 140-2 Validation

Windows Server 2008 R2 Boot Manager Security Policy For FIPS 140-2 Validation Boot Manager Security Policy Windows Server 2008 R2 Boot Manager Security Policy For FIPS 140-2 Validation v 1.3 6/8/11 1 INTRODUCTION... 1 1.1 Cryptographic Boundary for BOOTMGR... 1 2 SECURITY POLICY...

More information

Guide to Installing BBL Crystal MIND on Windows 7

Guide to Installing BBL Crystal MIND on Windows 7 Guide to Installing BBL Crystal MIND on Windows 7 Introduction The BBL Crystal MIND software can not be directly installed on the Microsoft Windows 7 platform, however it can be installed and run via XP

More information

Set Up E-mail Setup with Microsoft Outlook 2007 using POP3

Set Up E-mail Setup with Microsoft Outlook 2007 using POP3 Page 1 of 14 Help Center Set Up E-mail Setup with Microsoft Outlook 2007 using POP3 Learn how to configure Outlook 2007 for use with your 1&1 e-mail account using POP3. Before you begin, you will need

More information

Telstra Wholesale Digital Certificates

Telstra Wholesale Digital Certificates Telstra Wholesale Digital Certificates LinxOnline User Guide Issue Number 2, 31 July 2007 Version 2, 31 July 2007 TW Digital Certificate Management User Guide Copyright 2007, Telstra Corporation Limited.

More information

Instructions for installing and using the qualified digital certificate issued by DigiSign

Instructions for installing and using the qualified digital certificate issued by DigiSign Instructions for installing and using the qualified digital certificate issued by DigiSign Version 1.3 In order to use the digital certificate properly, please follow the instructions presented in this

More information

The SSL device also supports the 64-bit Internet Explorer with new ActiveX loaders for Assessment, Abolishment, and the Access Client.

The SSL device also supports the 64-bit Internet Explorer with new ActiveX loaders for Assessment, Abolishment, and the Access Client. WatchGuard SSL v3.2 Release Notes Supported Devices SSL 100 and 560 WatchGuard SSL OS Build 355419 Revision Date January 28, 2013 Introduction WatchGuard is pleased to announce the release of WatchGuard

More information

Sentinel Protection Installer Version 7.1.1 (Windows) ReadMe

Sentinel Protection Installer Version 7.1.1 (Windows) ReadMe Sentinel Protection Installer Version 7.1.1 (Windows) ReadMe This readme provides an overview of the Sentinel TM Protection Installer, its installation and a few tips on using the related components (such

More information

Setting up secure e-mail communication with Ericsson. Guideline for Ericsson partners

Setting up secure e-mail communication with Ericsson. Guideline for Ericsson partners Setting up secure e-mail communication with Ericsson Guideline for Ericsson partners In this presentation Introduction Technical prerequisites Getting started Exchanging Public Keys Sending a signed e-mail

More information

Verbatim Secure Data USB Drive. User Guide. User Guide Version 2.0 All rights reserved

Verbatim Secure Data USB Drive. User Guide. User Guide Version 2.0 All rights reserved Verbatim Secure Data USB Drive User Guide User Guide Version 2.0 All rights reserved Table of Contents Table of Contents... 2 1. Introduction to Verbatim Secure Data USB Drive... 3 2. System Requirements...

More information

Category Run Environment... 3 2 Using Certificate in IE... 3 3 Using Certificate in Mozilla Firefox... 5 4 Using Certificate in Outlook 2003...

Category Run Environment... 3 2 Using Certificate in IE... 3 3 Using Certificate in Mozilla Firefox... 5 4 Using Certificate in Outlook 2003... SDGCA Certificate Usage User Manual Version 3.0/3.1 Computer Network Information Center, Chinese Academy of Science October 22, 2006 Category 1 Run Environment...3 2 Using Certificate in IE...3 2.1 Examine

More information

Remote Access Instructions

Remote Access Instructions document rev. 8 updated 6/28/2012 Remote Access Instructions Table of Contents... Page 1 Finding the AFS Remote Access links and the AFS home page... 2 First time login with RSA fob (AFS option 1 SSL VPN

More information

etoken Enterprise For: SSL SSL with etoken

etoken Enterprise For: SSL SSL with etoken etoken Enterprise For: SSL SSL with etoken System Requirements Windows 2000 Internet Explorer 5.0 and above Netscape 4.6 and above etoken R2 or Pro key Install etoken RTE Certificates from: (click on the

More information

SensiGuard User Manual

SensiGuard User Manual SensiGuard User Manual Version 3.5 Table of Contents About SensiGuard... 2 Installing SensiGuard... 2 Configuring SensiGuard... 2 Viewing Files and Folders... 4 Locking and Unlocking Files... 5 Lock and

More information

VPN Web Portal Usage Guide

VPN Web Portal Usage Guide VPN Web Portal Usage Guide Table of Contents WHAT IS VPN WEB CLIENT 4 SUPPORTED WEB BROWSERS 4 LOGGING INTO VPN WEB CLIENT 5 ESTABLISHING A VPN CONNECTION 6 KNOWN ISSUES WITH MAC COMPUTERS 6 ACCESS INTRANET

More information

www.novell.com/documentation Administration Guide Certificate Server 3.3.8 May 2013

www.novell.com/documentation Administration Guide Certificate Server 3.3.8 May 2013 www.novell.com/documentation Administration Guide Certificate Server 3.3.8 May 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this documentation,

More information

Guide to Using DoD PKI Certificates in Outlook

Guide to Using DoD PKI Certificates in Outlook Report Number: I33-002R-2005 Guide to Using DoD PKI Certificates in Outlook Security Evaluation Group Authors: Margaret Salter Mike Boyle Updated: June 9, 2005 Version 4.0 National Security Agency 9800

More information

Florida Atlantic University VPN Client Installation Guide

Florida Atlantic University VPN Client Installation Guide Florida Atlantic University VPN Client Installation Guide VPN Client Installation Guide Page 1 Cisco VPN Client Installation Guide Please read the instructions below to assist with the process of downloading,

More information

BounceBack User Guide

BounceBack User Guide Table Of Contents 1. Table of Contents... 2 2. 1-0 Introduction... 3 2.1 1-0: Introduction... 4 2.2 1-1: BounceBack Software Overview... 6 3. 2-0 Navigating the BounceBack Control Center... 9 3.1 2-0:

More information

Unipass Securemail Client. User Guide v1.2

Unipass Securemail Client. User Guide v1.2 Unipass Securemail Client User Guide v1.2 This document provides a step by step illustrated user guide for the Unipass Securemail desktop software client / plug-in. UIdP Project Team 28/06/2015 Contents

More information

SSL VPN Service. To get started using the NASA IV&V/WVU SSL VPN service, you must verify that you meet all required criteria specified here:

SSL VPN Service. To get started using the NASA IV&V/WVU SSL VPN service, you must verify that you meet all required criteria specified here: SSL VPN Service Note: This guide was written using Windows 7 with Internet Explorer 8. The same principles and techniques are applicable to new versions of Internet Explorer as well as Firefox. Any significant

More information

General tips for increasing the security of using First Investment Bank's internet banking

General tips for increasing the security of using First Investment Bank's internet banking General tips for increasing the security of using First Investment Bank's internet banking Dear Clients, First Investment Bank (Fibank, the Bank) provides you with high level of protection and security

More information

Alberni Valley IT Services http://www.avits.ca admin@avits.ca. Virtual domain E-mail information.

Alberni Valley IT Services http://www.avits.ca admin@avits.ca. Virtual domain E-mail information. Alberni Valley IT Services http://www.avits.ca admin@avits.ca Virtual domain E-mail information. Welcome! This document outlines information necessary for you to send and receive E-mail for your virtual

More information

MessageGuard 3.0 User Guide

MessageGuard 3.0 User Guide MessageGuard 3.0 User Guide Table of Contents Introduction... 3 Installing the MessageGuard Desktop Client... 3 Sending Secure E-mail Messages with the Desktop Client... 11 Reading Secure E-mail Messages

More information

PROS CS (Client-Server) Installation and Basic-configuration Guide

PROS CS (Client-Server) Installation and Basic-configuration Guide PROS CS (Client-Server) Installation and Basic-configuration Guide Contents PROS CS (Client-Server)... 1 Installation and Basic-configuration Guide... 1 1. Overview... 2 2. Intro... 3 3. UPGRADING from

More information

Simple Guide to Digital Signatures

Simple Guide to Digital Signatures Simple Guide to Digital Signatures Rohas Nagpal Asian School of Cyber Laws About the author Rohas Nagpal is the founder President of Asian School of Cyber Laws. He advises Governments and corporates around

More information