CODE SIGNING. Why Developers Need to Digitally Sign Code and Applications entrust.com
|
|
|
- Abigail Black
- 9 years ago
- Views:
Transcription
1 CODE SIGNING Why Developers Need to Digitally Sign Code and Applications entrust.com
2 Table of contents Why Code Sign? Page 3 What is Code Signing? Page 4 Verifying Code Authenticity Page 5 How to Digitally Sign Code Page 6 Code Installation Decisions Page 7 What is Time-Stamping? Page 9 Self-Signed Versus Publicly Trusted Code Signing Certificates Page 10 Extended Validation (EV) Code Signing Certificates Page 11 Application Reputation Page 11 Code Signing: Best Practices Page 12
3 Code signing is the process of digitally signing executables and scripts to confirm the identity of the software publisher and guarantee that the code has not been altered or corrupted since it was signed. Publicly trusted certification authorities (CAs) confirm signers identities and bind their public key to a code signing certificate. This paper discusses how code signing works and the best practices to perform code signing. Why Code Sign? Most mass-market computing devices sold today come with pre-loaded software, but the software that comes out of the box with the device is not all that will be needed for the full life of the device. Whether for a personal computer or a mobile device, users will frequently need to download additional software or applications. In other cases users are often advised by an application on their device, or the site they are visiting, that in order to experience or use the offered service they need to upgrade, patch or augment their current software. Users are asked to make a spot decision: Run or Don t Run, Install or Don t Install or Run or Cancel. In these situations, Run/Don t Run asks the user whether or not to run the downloaded code. How does a user decide? How does a user or user agent (usually a browser ) know whether or not to trust the software? The answer is code signing. To help users determine whether or not they can trust software before they install it, software publishers can digitally sign their code. A digital signature verifies who signed the code and that the code has not been subject to tampering. Digitally signed code, which is backed by a certificate issued by a CA acting as a trusted third party, is granted greater reliability than unsigned code. Generally, unsigned code should not be trusted, as it does not provide any evidence of origin or file integrity, which means the publisher cannot be held accountable for errors and the code is subject to tampering. Armed with the information provided by a digital signature, users can make a more informed Run/Don t Run decision. 3
4 What is Code Signing? Code signing is the process of digitally signing executables and scripts to confirm the identity of the software author and guarantee that the code has not been altered or corrupted since it was signed. In order to sign the code, a software publisher needs to generate a privatepublic key pair and submit the public key to a CA, along with a request to issue a code signing certificate. The CA verifies the identity of the publisher and authenticates the publisher s digitally-signed certificate request. If this vetting and key-verification process is successful, the CA bundles the identity of the publisher with the public key and signs the bundle, thus creating the code signing certificate. Armed with the code signing certificate, the publisher is ready to sign the code. When the code is signed, several pieces of information are added to the original file holding the executable code. This bundled information is used by the software publisher s users to authenticate the publisher and check for code-tampering. The entire sequence for bundling the digitally-signed code takes place as follows: A hash of the code is produced Public-key algorithms are inefficient for signing large objects, so the code is passed through a hashing algorithm, creating a fixed length digest of the file The hash is a cryptographically unique representation of the file The hash can be reproduced only by using the unaltered file and the hashing algorithm that was used to create the hash The hash is signed using the publisher s private key The hash is passed through a signing algorithm using the publisher s private key as an input Information about the publisher and the CA is drawn from the code signing certificate and incorporated into the signature The original code, signature and code signing certificate are bundled together The code signing certificate key is added to the bundle (as the public key is required to authenticate the code when it is verified) The code is now ready for distribution and is packaged in a form that will allow the user to verify for authenticity. CODE IS HASHED USING A HASHING ALGORITHM HASHING IS SIGNED WITH PRIVATE KEY HASH IS PACKAGED WITH THE DATA & CERTIFICATE Certificate Signed Hash Code Hash of Code Signed Hash Code 4
5 Verifying Code Authenticity When a user agent loads the code, it checks the authenticity of the software using the packaged signer s public key, signature and the hash of the file. If the signature is verified successfully, the user agent accepts the code as valid. If the signature is not successfully verified, the user agent will react by either warning the user or rejecting the code, according to the level of security being used. The signature is verified as follows: Hash is Verified The original code is passed through the hashing algorithm to create a hash The public key of the publisher is extracted from the bundle and applied to the signature information; applying the public key reveals the hash that was calculated when the file was signed The two hashes are compared; if equal, then the code has not changed and the signature is considered valid Code Signing Certificate is Verified The code signing certificate is checked to ensure it was signed by a trusted CA The expiry date of the code signing certificate is checked The code signing certificate is checked against the revocation lists to ensure it is valid If the hash and the certificate are valid, then the code is considered valid. As such, it is accepted by the user agent and presented for installation. If the file is not considered valid, the user agent displays a warning message. Signed Hash VERIFY HASH WITH PUBLIC KEY FROM CERTIFICATE Hash of Code Certificate Signed Hash =? is Compare hashes, if equal the signature valid Code Code CODE HASHED USING HASHING ALGORITHM Hash of Code 5
6 How to Digitally Sign Code Various application platforms support code signing and provide different tools to perform the signing. Here is a list of the more common code signing types and references to where guides can be found for each given application. Adobe Digitally signing an AIR file Java Java Code Signing User Guide (Entrust) How to Sign Applets Using RSA-Signed Certificates (Oracle) Signing Code and Granting it Permissions (Oracle) Microsoft Authenticode Entrust Signing Guide Authenticode Signing and Checking Code with Authenticode Windows Macro and Visual Basic Code Signing Entrust Signing Guide Windows Macro and Visual Basic Signing Signing a VBA Project Windows Kernel Mode Driver Signing Windows Kernel Mode Driver Signing Changes for Windows 10 Mozilla Signing a XPI 6
7 Code Installation Decisions The code has been signed, the user has started installation and verification has taken place. How does the user know whether or not to accept the code? Here is a typical code verification security message: The user must decide if they trust the software based on the messages above. The statement provides the following: 1. Program Name: Adobe Flash Player Installer 2. Publisher Name: Adobe Systems, Incorporated 3. Code Signing Certificate: The user would need to click on the Show Details drop down button, which will display a link to review the certificate.exe.exe.exe 7
8 CODE INSTALLATION DECISIONS There are five simple steps users should take to determine whether software can be trusted: Check to see if you were planning to install the software. Check the file name to see if it indicates the software you were planning to install. In this case, the user is installing Adobe Reader 10, which the name seems to indicate. Check the publisher name to see if it matches who you think wrote the software. This may be difficult as the software download site may be different than the publisher s site. Check the code signing certificate to see if the publisher s name is in the certificate. Check to see if the certificate was issued by a publicly trusted CA. Conversely, here is a dialogue for code that may be untrustworthy: The program name is Install.exe, which is not specific enough to determine what code is being installed. The publisher s name is Unknown, which means that a public CA did not verify the code signing certificate. The code may not be harmful, but it was likely signed with a self-issued code signing certificate. This means the user cannot trust who signed the code. 8
9 What is Time- Stamping? What happens to signed code when the code signing certificate expires? In many cases, an expired certificate means that the signature validation will fail and a trust warning will appear in the user agent. Time-stamping was designed to alleviate this problem. The idea is that if a user knows the time when the code was signed and the certificate was confirmed to be valid, then the user will also know the signature was valid at the time the software was published. Put another way, time-stamping is similar to a notarized handwritten signature which includes a third-party s confirmation of when the document was signed. The main benefit of time-stamping is that it extends code trust beyond the validity period of the code signing certificate. The code stays good as long as the user can run it. Also, the code signing certificate may be revoked or expire in the future, but the code can remain trusted. Please note that with some client software, the code verification may not be valid after the time-stamp certificate has expired. It is expected that time-stamping authorities (TSAs) will use a time-stamping certificate with a maximum validity of 135 months that will be renewed every 15 months. As such, expect time-stamp certificates to have a lifetime of at least 10 years. Time-stamping the signature is implemented as follows: The signature is sent to the TSA. The TSA adds a time-stamp to the bundled information and computes a new hash. The TSA signs the new hash with its private key creating a new bundle of information. The time-stamped bundle, the original bundle (that was sent to the TSA) and the time-stamp are re-bundled with the original code. Upon receipt of a time-stamped signature, the following steps are completed by the user agent for verification (in addition to verification of the signature on the code itself): The TSA certificate is checked to ensure it was issued from a trusted root certificate and that its status is valid. The TSA s public key is applied to the time-stamped signature block, revealing the hash calculated by the TSA. The validity of the TSA s public key is verified by checking its expiry date and consulting revocation lists to ensure that it has not been revoked. The two hashes are compared. If the hashes are equal, the time stamp is considered to be valid. In the event that the code signing certificate must be revoked due to a compromise, the revocation will be made dependent on a specific date. The idea is that code signatures issued before the revocation date will remain valid and the software should still work. 9
10 Self-Signed Versus Publicly Trusted Code Signing Certificates In most cases, software publishers have to sign their code in order to get it installed on an operating system. Publishers can sign their code using a self-signed certificate or using a certificate issued by a publicly trusted CA. Due to the costs of buying a code signing certificate from a publicly trusted CA, some publishers may decide to try a self signed certificate, but there are differences between the two types of certificates that should be considered. Self-Signed Certificate Issuer provides their own identity, which is not published as part of the code verification security message Issuer provides their own policy and quality Signatures will provide a warning indicating that the software was created by an Unknown Publisher Compromised certificates cannot be revoked and could harm software users Certificates Issued from Publicly Trusted CA CA performs identity verification, which is displayed in a code verification security message CA issues certificates in accordance with the industry policy and quality Signatures will clearly identify the publisher s name Compromised certificates can be revoked, and if time-stamping was used, code signed before revocation will remain trusted To ensure user trust and code longevity, it is recommended that software publishers use a certificate issued from a publicly trusted CA. 10
11 Extended Validation (EV) Code Signing Certificates EV code signing certificates have two distinct advantages over the common issuance and management of code signing certificates. First, the EV verification process of the identity and authorization of the publisher must be completed in accordance with the CA/Browser Forum EV Code Signing Guidelines. Second, the private keys to the certificates must be managed in hardware meeting the requirements of FIPS 140 Level 2 or equivalent. The upside of EV code signing certificates is users know who the publisher is and reasonable protection has been provided to the private key to mitigate unauthorized signing. Since EV code signing certificates are more trusted, this allows developers of verification products to raise the reputation level of the publisher or the signed code. Please note that with the release of Windows 10, Microsoft will require drivers submitted for kernel mode signing to have their submission signed with an EV code signing certificate. Application Reputation Social-engineering attacks are more common than attacks on security vulnerabilities. The traditional defense against malware is a URL-based filter to screen out known malware websites. Microsoft also introduced a new defense called Application Reputation that is available starting with Internet Explorer 9 (IE9) through the SmartScreen Filter. Application Reputation allows publishers and their applications to build a positive reputation over time through these principles: Well-known good applications have a better reputation than new applications Well-known good publishers have a better reputation than unknown publishers New applications signed by known good publishers can have a relatively high reputation from first release Reputation can be built for unsigned and signed applications. Signed applications can build reputation at twice the rate of those that are unsigned. Reputation based on signing relies on the identification of the publisher by a trusted certification authority and the issuance of a code signing certificate. Reputation is built by signing good applications, but can be easily lost if the certificate is used to sign malware. Traditionally, browsers have presented a User Account Control dialogue box for each application download. IE9 with SmartScreen Filter does not present a User Account Control dialogue if the application has built a good reputation. The benefit is that applications with good reputations will be installed without requiring the user to decide if they trust the software they simply choose Save or Run. This update prevents users from becoming de-sensitized to User Account Control dialog boxes, and encourages users to make better decisions when these dialog boxes appear from applications with unknown reputations. 11
12 Code Signing: Best Practices The biggest issue with code signing is the protection of the private signing key associated with the code signing certificate. If a key is compromised, the certificate loses trust and value, jeopardizing the software that you have already signed. Seven best practices for code signing include: 1 Minimize access to private keys Allow minimal connections to computers with keys Minimize the number of users who have key access Use physical security controls to reduce access to keys 2 Protect private keys with cryptographic hardware products Cryptographic hardware does not allow export of the private key to software where it could be attacked Use a FIPS 140 Level 2-certified product (or better) Use an EV code signing certificate which requires the private key to be generated and stored in hardware 3 4 Time-stamp code Time-stamping allows code to be verified after the certificate has expired or been revoked Understand the difference between test-signing and release-signing Test-signing private keys and certificates requires less security access controls than production code signing private keys and certificates Test-signing certificates can be self-signed or come from an internal test CA Test certificates must chain to a completely different root certificate than the root certificate that is used to sign publicly released products; this precaution helps ensure that test certificates are trusted only within the intended test environment Establish a separate test code signing infrastructure to test-sign pre-release builds of software 12
13 CODE SIGNING: BEST PRACTICES Authenticate code to be signed Any code that is submitted for signing should be strongly authenticated before it is signed and released Implement a code signing submission and approval process to prevent the signing of unapproved or malicious code Log all code signing activities for auditing and/or incident response purposes Virus scan code before signing Code signing does not confirm the safety or quality of the code; it confirms the publisher and whether or not the code has been changed Take care when incorporating code from other sources Implement virus-scanning to help improve the quality of the released code Do not over-use any one key (distribute risk with multiple certificates) If code is found with a security flaw, then publishers may want to prompt a User Account Control dialogue box to appear when the code is installed in the future; this can be done by revoking the code signing certificate so a revoked prompt will occur If the code with the security flaw was issued before more good code was issued, then revoking the certificate will impact the good code as well Changing keys and certificates often will help to avoid this conflict 13
14 Conclusion Code signing is required to install code on many platforms because it provides assurances of authenticity and origin. When signing code software publishers have to make decisions to protect their deployed products, the most important decision one can make is whether or not to use a trusted Certification Authority. The backing of a code signing certificate issued by a trusted Certification Authority is the best way to ensure end-user trust Self-signed certificates should only be used for testing, not for production releases. The second most important decision is whether or not to timestamp code. In the event of a compromised key, a time-stamp may ensure that code is protected even if a certificate needs to be revoked. The best practices section provides additional important tips for protecting the code signing private key and the quality of signed code. An Extended Validation Code Signing Certificate is the best tool available to establish trust in the security of the private key used to sign code, and provides a higher assurance of the identity of the software publisher. Because EV code signing provides better information about the source of software, some platforms with malware security filters give EV-signed software better treatment in user dialog boxes during installation. References CA/Browser Forum EV Code Signing Guidelines, Microsoft Developer Network Introduction to Code Signing, Microsoft Windows Code-Signing Best Practices, Microsoft Technet- Deploying Authenticode with Cryptographic Hardware for Secure Software Publishing, Microsoft Technet Kill Bits, archive/2008/02/06/the-kill_2d00_bit-faq_3a00_-part-1-of-3.aspx Microsoft SmartScreen and Extended Validation (EV) Code Signing Certificates, microsoft-smartscreen-amp-extended-validation-ev-code-signingcertificates.aspx 14
15 About Entrust Datacard Consumers, citizens and employees increasingly expect anywhereanytime experiences whether they are making purchases, crossing borders, accessing e-gov services or logging onto corporate networks. Entrust Datacard offers the trusted identity and secure transaction technologies that make those experiences reliable and secure. Solutions range from the physical world of financial cards, passports and ID cards to the digital realm of authentication, certificates and secure communications. With more than 2,000 Entrust Datacard colleagues around the world, and a network of strong global partners, the company serves customers in 150 countries worldwide. For more information about Entrust products and services, call , [email protected] or visit Company Facts Website: entrust.com Employees: 359 Customers: 5,000 Offices: 10 globally Headquarters Three Lincoln Centre 5430 LBJ Freeway, Suite 1250 Dallas, TX USA Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries. In Canada, Entrust is a registered trademark of Entrust Limited. All other Entrust product names and service names are trademarks or registered trademarks of Entrust, Inc. or Entrust Limited in certain countries. Entrust Datacard and the hexagon logo are trademarks of Entrust Datacard Corporation Entrust. All rights reserved
Publicly trusted certification authorities (CAs) confirm signers identities and bind their public key to a code signing certificate.
Code Signing Code signing is the process of digitally signing executables and scripts to confirm the identity of the software author and guarantee that the code has not been altered or corrupted since
An Introduction to CODE SIGNING
An Introduction to CODE SIGNING CONTENTS. 1 What is Code Signing. 03 2 Code Signing Certificates 101...05 3 Why & When to Digitally Sign Code.09 4 Self Signing vs. Publicly Trusted...12 5 Code Signing
Entrust Certificate Services. Java Code Signing. User Guide. Date of Issue: December 2014. Document issue: 2.0
Entrust Certificate Services Java Code Signing User Guide Date of Issue: December 2014 Document issue: 2.0 Copyright 2009-2014 Entrust. All rights reserved. Entrust is a trademark or a registered trademark
ENTRUST CLOUD. SSL Digital Certificates, Discovery & Management +1-888-690-2424. [email protected] entrust.com
ENTRUST CLOUD SSL Digital Certificates, Discovery & Management +1-888-690-2424 [email protected] entrust.com Entrust Cloud SSL Digital Certificates, Discovery & Management Digital certificates have emerged
VeriSign Code Signing Digital Certificates for Adobe AIR Technology
VeriSign Code Signing Digital Certificates for Adobe AIR Technology Realizing the Possibilities of Internet Software Distribution Contents + What is Code Signing and Why is it Important? 3 + Who Needs
Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0
Entrust Managed Services PKI Getting started with digital certificates and Entrust Managed Services PKI Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust
Microsoft Windows Macros and Visual Basic Signing User Guide
Entrust Certificate Services Microsoft Windows Macros and Visual Basic Signing User Guide Date of Issue: March 2016 Document issue: 1.0 Microsoft Windows Macros and Visual Basic Signing 11.8 User Guide
Using Entrust certificates with Adobe PDF files and forms
Entrust Managed Services PKI Using Entrust certificates with Adobe PDF files and forms Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust is a trademark or
Defending the Internet of Things
Defending the Internet of Things Identity at the Core of Security +1-888-690-2424 entrust.com Table of contents Introduction Page 3 Challenge: protecting & managing identity Page 4 Founders of identity
CERTIFICATION PRACTICE STATEMENT UPDATE
CERTIFICATION PRACTICE STATEMENT UPDATE Reference: IZENPE-CPS UPDATE Version no: v 5.03 Date: 10th March 2015 IZENPE 2015 This document is the property of Izenpe. It may only be reproduced in its entirety.
SIX STEPS TO SSL CERTIFICATE LIFECYCLE MANAGEMENT
SIX STEPS TO SSL CERTIFICATE LIFECYCLE MANAGEMENT Why you need an SSL certificate management solution and how to get started +1-888-690-2424 entrust.com Table of contents Introduction Page 3 Consequences
Certify your Software Integrity with thawte Code Signing Certificates
Certify your Software Integrity with thawte Code Signing Certificates Sign your code and active content for secure online distribution... 1. Overview 2. Why a thawte Code Signing Certificate? 3. Who needs
X.509 Certificate Generator User Manual
X.509 Certificate Generator User Manual Introduction X.509 Certificate Generator is a tool that allows you to generate digital certificates in PFX format, on Microsoft Certificate Store or directly on
Intertek esignature Customer Reference Document Author: Application Support. Page 1 of 17
Page 1 of 17 Document History Version Amendments Date Amended by 2.1 Corrected index numbering, revised Section 30-Jul-2014 Application Support 1.6 and references to 1.6; Corrected formatting 2.2 Added:
Instructions to operating forms created in MSWord and Excel
Instructions to operating forms created in MSWord and Excel Forms created in MSWord and Excel can contain macros. In order for the form to work correctly, your MSWord/Excel security level must be set at
Deriving a Trusted Mobile Identity from an Existing Credential
Deriving a Trusted Mobile Identity from an Existing Credential Exploring and applying real-world use cases for mobile derived credentials +1-888-690-2424 entrust.com Table of contents Approval of the mobile
Understanding Digital Certificates & Secure Sockets Layer A Fundamental Requirement for Internet Transactions
A Fundamental Requirement for Internet Transactions May 2007 Copyright 2007 Entrust. All rights reserved. Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries.
How to Time Stamp PDF and Microsoft Office 2010/2013 Documents with the Time Stamp Server
How to Time Stamp PDF and Microsoft Office 2010/2013 Documents with the Time Stamp Server Introduction Time stamping is an important mechanism for the long-term preservation of digital signatures, time
Digital Signatures on iqmis User Access Request Form
Digital Signatures on iqmis User Access Request Form When a user clicks in the User Signature block on the iqmis Access Form, the following window appears: Click Save a Copy and rename it with your name,
Adobe Acrobat 9 Digital Signatures, Changes and Improvements
Technical White Paper Updated for Adobe Acrobat and Adobe Reader 9.1 CONTENTS Introduction 1 Indication of overall validity state 3 Revision tracking in Signature panel 7 Change in status of forms that
This Month s Tips & Tricks Topic: PDF Digital Signatures - Part 1: The Basics
This Month s Tips & Tricks Topic: PDF Digital Signatures - Part 1: The Basics January, 2011 All PDF-XChange Products allow you to digitally sign your PDF as you create PDF files from any windows based
Understanding Digital Certificates & Secure Sockets Layer (SSL): A Fundamental Requirement for Internet Transactions
Understanding Digital Certificates & Secure Sockets Layer (SSL): A Fundamental Requirement for Internet Transactions February 2005 All rights reserved. Page i Entrust is a registered trademark of Entrust,
Entrust Managed Services PKI. Getting an end-user Entrust certificate using Entrust Authority Administration Services. Document issue: 2.
Entrust Managed Services PKI Getting an end-user Entrust certificate using Entrust Authority Administration Services Document issue: 2.0 Date of issue: June 2009 Revision information Table 1: Revisions
EV Multi-Domain Certificate Enrollment Guide
Entrust Cloud EV Multi-Domain Certificate Enrollment Guide Software release: 11.8 Date of Issue: December 2015 EV Multi-Domain Certificate 11.8 Enrollment Guide Copyright 2015 Entrust. All rights reserved.
SEZ SEZ Online Manual Digital Signature Certficate [DSC] V Version 1.2
SEZ SEZ Online Manual Digital Signature Certficate [DSC] V Version 1.2 Table of Contents 1 Introduction...2 2 Procurement of DSC...3 3 Installation of DSC...4 4 Procedure for entering the DSC details of
Access 2003 Macro Security Levels, Sandbox Mode, and Digitally Signed Files
Access 2003 Macro Security Levels, Sandbox Mode, and Digitally Signed Files Tim Gordon [email protected] Programming Plus (816) 333-7357 About dangerous code Dangerous code can consist of powerful
Adobe Digital Signatures in Adobe Acrobat X Pro
Adobe Digital Signatures in Adobe Acrobat X Pro Setting up a digital signature with Adobe Acrobat X Pro: 1. Open the PDF file you wish to sign digitally. 2. Click on the Tools menu in the upper right corner.
dobe Acrobat XI Pro Digital Signatures
dobe Acrobat XI Pro Digital Signatures Intermediate Adobe Acrobat XI Pro is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License. To view a copy of this
Microsoft Trusted Root Certificate: Program Requirements
Microsoft Trusted Root Certificate: Program Requirements 1. Introduction The Microsoft Root Certificate Program supports the distribution of root certificates, enabling customers to trust Windows products.
The name of the Contract Signer (as hereinafter defined) duly authorized by the Applicant to bind the Applicant to this Agreement is.
Trustwave Subscriber Agreement for Digital Certificates Ver. 11JUL14 PLEASE READ THIS AGREEMENT AND THE TRUSTWAVE CERTIFICATION PRACTICES STATEMENTS ( CPS ) CAREFULLY BEFORE USING THE CERTIFICATE ISSUED
Adobe PDF for electronic records
White Paper Adobe PDF for electronic records Digital signatures and PDF combine for definitive electronic records and transactions Contents 1 PDF and electronic records 2 Digital certification 3 Validating
PDF Signer User Manual
PDF Signer User Manual Introduction The main function of PDF Signer is to sign PDF documents using X.509 digital certificates. Using this product you can quickly sign multiple PDF files (bulk sign) by
INFORMATION TECHNOLOGY CERES DEPARTMENT
INFORMATION TECHNOLOGY CERES DEPARTMENT LRA APPLICATION MANUAL Name Date Written by: Technical support 18/10/2010 Revised by: Approved by: DOCUMENT TRACEABILITY Version Date Description Author 1.0 18/10/2010
secure2sign: Secure and Seamless Enterprise Signing for Word (including 2007).
secure2sign: Secure and Seamless Enterprise Signing for Word (including 2007). Ensure integrity Checks for certificate revocation Support for two-factor digital signing Support for smart cards and etokens
SSL BEST PRACTICES OVERVIEW
SSL BEST PRACTICES OVERVIEW THESE PROBLEMS ARE PERVASIVE 77.9% 5.2% 19.2% 42.3% 77.9% of sites are HTTP 5.2% have an incomplete chain 19.2% support weak/insecure cipher suites 42.3% support SSL 3.0 83.1%
GlobalSign Digital IDs for Adobe AIR Code Signing
GlobalSign Digital IDs for Adobe AIR Code Signing Expanding market reach by distributing trustworthy software over the Internet WHITE PAPER Lila Kee Director of Business Development, GlobalSign Inc TABLE
Strong Security in Multiple Server Environments
White Paper Strong Security in Multiple Server Environments VeriSign OnSite for Server IDs Contents 1. Introduction 1 2. Security Solutions: The Digital ID System 2 2.1. What Is a Digital ID? 2 2.2 How
Adobe Acrobat Version 8, 9, 10, and 11 Instructions
Adobe Acrobat Version 8, 9, 10, and 11 Instructions Forms to be digitally signed Exceptions Contact Information Design Exception/Design Waiver Form (Interactive PDF form predesigned) Deviation from Standards
Entrust Adobe CDS Individual Certificate
Entrust Certificate Services Entrust Adobe CDS Individual Certificate Enrollment Guide Software release: 10.5 Date of Issue: May 2012 Document issue: 1.0 Copyright 2012 Entrust. All rights reserved. Entrust
CA/Browser Forum. Guidelines For The Issuance And Management Of Extended Validation Code Signing Certificates
Version 1.3 CA/Browser Forum Guidelines For The Issuance And Management Of Extended Validation Code Signing Certificates Copyright 2007-2014, The CA / Browser Forum, all rights reserved. Verbatim copying
Certificate technology on Pulse Secure Access
Certificate technology on Pulse Secure Access How-to Guide Published Date July 2015 Contents Introduction: 3 Creating a Certificate signing request (CSR): 3 Import Intermediate CAs: 5 Using Trusted Client
Certificate technology on Junos Pulse Secure Access
Certificate technology on Junos Pulse Secure Access How-to Introduction:... 1 Creating a Certificate signing request (CSR):... 1 Import Intermediate CAs: 3 Using Trusted Client CA on Juno Pulse Secure
Den Gode Webservice - Security Analysis
Den Gode Webservice - Security Analysis Cryptomathic A/S September, 2006 Executive Summary This report analyses the security mechanisms provided in Den Gode Web Service (DGWS). DGWS provides a framework
Certification Practice Statement
Certification Practice Statement Version 2.0 Effective Date: October 1, 2006 Continovation Services Inc. (CSI) Certification Practice Statement 2006 Continovation Services Inc. All rights reserved. Trademark
Concept of Electronic Approvals
E-Lock Technologies Contact [email protected] Table of Contents 1 INTRODUCTION 3 2 WHAT ARE ELECTRONIC APPROVALS? 3 3 HOW DO INDIVIDUALS IDENTIFY THEMSELVES IN THE ELECTRONIC WORLD? 3 4 WHAT IS THE TECHNOLOGY
Certificate Management Service 9.7
Entrust Certificate Services Certificate Management Service 9.7 User Guide Document issue: 1.0 Date of issue: October 2010 Copyright 2008-2010 Entrust. All rights reserved. Entrust is a trademark or a
SEZ SEZ Online Manual- DSC Signing with Java Applet. V Version 1.0 ersion 1.0
SEZ SEZ Online Manual- V Version 1.0 ersion 1.0 Table of Contents 1 Introduction...2 2 DSC signing functionality with java applet...2 3 Troubleshooting...5 4 Annexure I: JAVA Console Setting... 13 5 Annexure
Code Signing Digital IDs GCC Certificate Installation Guide Rev 1.4
Code Signing Digital IDs GCC Certificate Installation Guide Rev 1.4 BEFORE YOU BEGIN: 1. Review System Requirements found at http://www.globalsign.com/code signing/buy codesigning.html 2. Adobe AIR subscribers
Minnesota State Colleges and Universities System Guideline Chapter 5 Administration
Minnesota State Colleges and Universities System Guideline Chapter 5 Administration Appropriate Use and Implementation of Electronic Part 1. Purpose. To establish requirements and responsibilities for
CoSign for 21CFR Part 11 Compliance
CoSign for 21CFR Part 11 Compliance 2 Electronic Signatures at Company XYZ Company XYZ operates in a regulated environment and is subject to compliance with numerous US government regulations governed
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University October 2015 1 List of Figures Contents 1 Introduction 1 2 History 2 3 Public Key Infrastructure (PKI) 3 3.1 Certificate
Future directions of the AusCERT Certificate Service
Future directions of the AusCERT Certificate Service QV Advanced Plus certificates Purpose Digital signatures non-repudiation, authenticity and integrity Encryption - confidentiality Client authentication
Entrust Certificate Services for Adobe CDS
Entrust Certificate Services Entrust Certificate Services for Adobe CDS Getting Started Guide Entrust SafeNet Authentication Client: 8.3 Date of issue: July 2015 Document issue: 3.0 Revisions Issue and
Document Management Getting Started Guide
Document Management Getting Started Guide Version: 6.6.x Written by: Product Documentation, R&D Date: February 2011 ImageNow and CaptureNow are registered trademarks of Perceptive Software, Inc. All other
Meeting the FDA s Requirements for Electronic Records and Electronic Signatures (21 CFR Part 11)
Meeting the FDA s Requirements for Electronic Records and Electronic Signatures (21 CFR Part 11) Executive Summary...3 Background...4 Internet Growth in the Pharmaceutical Industries...4 The Need for Security...4
Key Management and Distribution
Key Management and Distribution Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-11/
What Are Certificates?
The Essentials Series: Code-Signing Certificates What Are Certificates? sponsored by by Don Jones W hat Are Certificates?... 1 Digital Certificates and Asymmetric Encryption... 1 Certificates as a Form
Code Signing for Source Code
1 2 ISO/IEC JTC 1/SC 22/WG 23 N 0318 Meeting #17 markup of, Strawman draft, Code Signing for Source Code 3 Date 2011-03-23 Contributed by Secretary Original file name Notes Replaces N0317 4 5 6 Code Signing
Six Steps to SSL Certificate Lifecycle Management
Six Steps to SSL Certificate Lifecycle Management Why you need an SSL certificate management solution and how to get started +1-888-690-2424 entrust.com Table of contents Introduction Page 3 Consequences
Internet Banking Internal Control Questionnaire
Internet Banking Internal Control Questionnaire Completed by: Date Completed: 1. Has the institution developed and implemented a sound system of internal controls over Internet banking technology and systems?
Enabling Java and ActiveX Settings of Internet Explorer:
Enabling Java and ActiveX Settings of Internet Explorer: Enabling Java and Active X Settings varies for different versions of Internet Explorer. The setting can be done based on the browser you are using:
Technical Description. DigitalSign 3.1. State of the art legally valid electronic signature. The best, most secure and complete software for
Technical Description DigitalSign 3.1 State of the art legally valid electronic signature The best, most secure and complete software for Adding digital signatures to any document, in conformance with
Controller of Certification Authorities of Mauritius
Contents Pg. Introduction 2 Public key Infrastructure Basics 2 What is Public Key Infrastructure (PKI)? 2 What are Digital Signatures? 3 Salient features of the Electronic Transactions Act 2000 (as amended)
Extended SSL Certificates
Introduction Widespread usage of internet has led to the growth of awareness amongst users, who now associate green address bar with security. Though people are able to recognize the green bar, there is
Security Digital Certificate Manager
IBM i Security Digital Certificate Manager 7.1 IBM i Security Digital Certificate Manager 7.1 Note Before using this information and the product it supports, be sure to read the information in Notices,
Security Digital Certificate Manager
System i Security Digital Certificate Manager Version 5 Release 4 System i Security Digital Certificate Manager Version 5 Release 4 Note Before using this information and the product it supports, be sure
www.novell.com/documentation Administration Guide Certificate Server 3.3.8 May 2013
www.novell.com/documentation Administration Guide Certificate Server 3.3.8 May 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this documentation,
Procedure for How to Enroll for Digital Signature
Procedure for How to Enroll for Digital Signature In Online Processing System getting to implement Digital Signature and Electronic Token for security and Authentication Purpose. For that bidder must have
A Proper Foundation: Extended Validation SSL
A Proper Foundation: Extended Validation SSL A critical model for SSL digital certificates and browser trust Get this White Paper Entrust, Inc. All Rights Reserved. 1 1 Contents Context of Internet Security...
ESET SMART SECURITY 9
ESET SMART SECURITY 9 Microsoft Windows 10 / 8.1 / 8 / 7 / Vista / XP Quick Start Guide Click here to download the most recent version of this document ESET Smart Security is all-in-one Internet security
The Boeing Company. Boeing Commercial Airline PKI. Basic Assurance CERTIFICATE POLICY
The Boeing Company Boeing Commercial Airline PKI Basic Assurance CERTIFICATE POLICY Version 1.4 PA Board Approved: 7-19-2013 via e-mal PKI-233 BCA PKI Basic Assurance Certificate Policy Page 1 of 69 Signature
Frequently Asked Questions. Frequently Asked Questions: Securing the Future of Trust on the Internet
FREQUENTLY ASKED QUESTIONS: SECURING THE FUTURE OF TRUST ON THE INTERNET Frequently Asked Questions Frequently Asked Questions: Securing the Future of Trust on the Internet Securing the Future of Trust
The IVE also supports using the following additional features with CA certificates:
1 A CA certificate allows you to control access to realms, roles, and resource policies based on certificates or certificate attributes. For example, you may specify that users must present a valid client-side
THE IMPORTANCE OF CODE SIGNING TECHNICAL NOTE 02/2005
THE IMPORTANCE OF CODE SIGNING TECHNICAL NOTE 02/2005 13 DECEMBER 2005 This paper was previously published by the National Infrastructure Security Co-ordination Centre (NISCC) a predecessor organisation
Ciphire Mail. Abstract
Ciphire Mail Technical Introduction Abstract Ciphire Mail is cryptographic software providing email encryption and digital signatures. The Ciphire Mail client resides on the user's computer between the
SSL Configuration on Weblogic Oracle FLEXCUBE Universal Banking Release 12.0.87.01.0 [August] [2014]
SSL Configuration on Weblogic Oracle FLEXCUBE Universal Banking Release 12.0.87.01.0 [August] [2014] Table of Contents 1. CONFIGURING SSL ON ORACLE WEBLOGIC... 1-1 1.1 INTRODUCTION... 1-1 1.2 SETTING UP
Validating Digital Signatures in Adobe
Validating Digital Signatures in Adobe Table of Contents Validating Digital Signatures in Adobe...1 1. Validate the Signature using Windows Integration...3 2. Add the Root Certificate on Adobe Trusted
Neutralus Certification Practices Statement
Neutralus Certification Practices Statement Version 2.8 April, 2013 INDEX INDEX...1 1.0 INTRODUCTION...3 1.1 Overview...3 1.2 Policy Identification...3 1.3 Community & Applicability...3 1.4 Contact Details...3
IBM i Version 7.3. Security Digital Certificate Manager IBM
IBM i Version 7.3 Security Digital Certificate Manager IBM IBM i Version 7.3 Security Digital Certificate Manager IBM Note Before using this information and the product it supports, read the information
Managed Services PKI 60-day Trial Quick Start Guide
Entrust Managed Services PKI Managed Services PKI 60-day Trial Quick Start Guide Document issue: 3.0 Date of issue: Nov 2011 Copyright 2011 Entrust. All rights reserved. Entrust is a trademark or a registered
Federal PKI (FPKI) Community Transition to SHA-256 Frequently Asked Questions (FAQ)
Federal PKI (FPKI) Community Transition to SHA-256 Frequently Asked Questions (FAQ) Version 1.0 January 18, 2011 Table of Contents 1. INTRODUCTION... 3 1.1 BACKGROUND... 3 1.2 OBJECTIVE AND AUDIENCE...
Entrust SSL Certificate Enrollment Guide
The following Enrollment Guide is designed to assist customers in the certificate enrollment process by explaining the necessary steps that must be followed when applying for an Entrust SSL Certificate.
DigiCert: Trusted Business for the Enterprise and Its Customers
DigiCert: Trusted Business for the Enterprise and Its Customers A leading online trust provider, DigiCert offers multiple products to suit the security needs of enterprises within the finance, healthcare,
FOR MAC. Quick Start Guide. Click here to download the most recent version of this document
FOR MAC Quick Start Guide Click here to download the most recent version of this document ESET Cyber Security Pro provides state-of-the-art protection for your computer against malicious code. Based on
L@Wtrust Class 3 Registration Authority Charter
Class 3 Registration Authority Charter Version 1.0 applicable from 09 November 2010 Building A, Cambridge Park, 5 Bauhinia Street, Highveld Park, South Africa, 0046 Phone +27 (0)12 676 9240 Fax +27 (0)12
Standard and Advantage SSL Certificate
Entrust Certificate Services Standard and Advantage SSL Certificate Enrollment Guide Software release: 11.7 Date of Issue: July 2015 Document issue: 1.0 Copyright 2008-2015 Entrust. All rights Reserved.
ENTRUST CERTIFICATE SERVICES
ENTRUST CERTIFICATE SERVICES Certification Practice Statement Version: 2.13 February 12, 2016 2016 Entrust Limited. All rights reserved. Revision History Issue Date Changes in this Revision 1.0 May 26,
Personal Secure Email Certificate
Entrust Certificate Services Personal Secure Email Certificate Enrollment Guide Software version: 10.5 Date of Issue: May 2012 Document issue: 1.0 Copyright 2010-2012 Entrust. All rights reserved. Entrust
Creating Digital Signatures
About Security You can secure a PDF using any of the following security methods: Add passwords and set security options to restrict opening, editing, and printing PDFs. Encrypt a document so that only
ESET NOD32 ANTIVIRUS 9
ESET NOD32 ANTIVIRUS 9 Microsoft Windows 10 / 8.1 / 8 / 7 / Vista / XP Quick Start Guide Click here to download the most recent version of this document ESET NOD32 Antivirus provides state-of-the-art protection
apple WWDR Certification Practice Statement Version 1.8 June 11, 2012 Apple Inc.
Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations Version 1.8 Effective Date: June 11, 2012 Table of Contents 1. Introduction... 4 1.1. Trademarks... 4 1.2.
ESET SMART SECURITY 6
ESET SMART SECURITY 6 Microsoft Windows 8 / 7 / Vista / XP / Home Server Quick Start Guide Click here to download the most recent version of this document ESET Smart Security provides state-of-the-art
DATACARD Firmware Update Instructions. Contents. Firmware Update Application for Windows Operating Systems. What You Need
DATACARD Firmware Update Instructions Firmware Update Application for Windows Operating Systems Contents What You Need How to Update Using the Go Green Upgrade CD How to Update Using Files Downloaded from
Danske Bank Group Certificate Policy
Document history Version Date Remarks 1.0 19-05-2011 finalized 1.01 15-11-2012 URL updated after web page restructuring. 2 Table of Contents 1. Introduction... 4 2. Policy administration... 4 2.1 Overview...
ESET NOD32 ANTIVIRUS 8
ESET NOD32 ANTIVIRUS 8 Microsoft Windows 8.1 / 8 / 7 / Vista / XP / Home Server 2003 / Home Server 2011 Quick Start Guide Click here to download the most recent version of this document ESET NOD32 Antivirus
