Ten Critical Success Factors for Successful Smart Card Projects
|
|
|
- Shana Bridges
- 10 years ago
- Views:
Transcription
1 Ten Critical Success Factors for Successful Smart Card Projects 2009 Version 1.0
2 Index 1. Introduction Smart Card Profile Smart Card Integration Smart Card Middleware Smart Card Readers Smart Card Lifecycle Management User Enrollment and Card Issuance PIN Management Smart Card Management Systems Card Procurement Card Manufacturers Pricing and Delivery Terms End User Support Conclusion
3 1. Introduction 2. Smart Card Integration Many large organizations are planning projects to introduce PKI capable smart cards and USB tokens for end user authentication. Typically such projects plan to use such devices to securely store certificates and keys that enable the user to access web based applications. This white paper is intended for business and technical personnel involved with the planning and executing large-scale smart card projects. It presents the critical success factors such organizations should consider including like integration, lifecycle management, PIN management, enrollment and issuance, card management systems and procurement. The paper also addresses the significance of the card profile and smart card middleware in relation to these issues. Most of the smart cards currently used in the world are not used with PC or web based systems. Instead they are used with GSM phones, and payment systems. In order to integrate a smart card with a PC or a web based application it needs a card profile, middleware and a smart card reader. The diagram below shows the smart card components and how they fit into the PC architecture. Management Application Crypto API Middleware PKCS11 API Security Application Pre Boot API This white paper is based on the experience charismathics and its partners have had in a large variety of projects, by a large variety of organizations. Examples of projects charismathics and its partners have been associated with include: CCID Driver USB / PCI / Serial / Bluetooth Reader Driver PCSC PC Government ID: a Central American country issuing ID cards to first responders and citizens Corporate ID: an oil and gas company issuing 120,000 cards to employees, contractors and visitors that replace all passwords. Remote Access: a worldwide food company issuing smart cards to its employees for VPN and WLAN security. USB / PCI / Serial / Bluetooth Smart Card Reader Smart Card Interface / ISO 7816) Smart Card Profile Certificates Keys Data Healthcare: a European country issuing smart cards to identify qualified healthcare professionals Education: a US State university issuing student badges to 40,000 students and faculty Crypto Engine 2.1. Smart Card Profile Smart Card Figure 1: Smart Card Components The smart card profile is the means by which the card user data is represented on the card. Typically the profile is defined as a set of files as well as a set of security rules to be enforced by the card, such as card and file access conditions. How the profile is implemented is dependent on the smart card technology involved. Some cards may require the loading of a small application, called an applet, onto the card to enable the profile. Other cards do not. Typically the profile is proprietary either to the vendor, or the customer. The choice of profile determines the capabilities of the card, as well as the security properties associated with the card. It is therefore a crucial choice. The industry has worked to define an open standard for a profile standard called PKCS#15. This standard allows a customer to define a profile that is then, in principle, interoperable with smart card applications. However, the specific configuration of the PKCS#15 profile, is still proprietary. In addition, the PKCS#15 specification, as defined, 4 5
4 leads to severally diminished performance. As a result, most vendors have optimized their PKCS#15 implementations to ensure better performance. Most large smart card vendors (such as Gemalto, Oberthur, G&D, Sagem and HID Global) have their own smart card profiles. By providing their own profile, they can optimize the performance and capabilities of their hardware. However, the proprietary nature of their profile means that the customer is locked into the vendor s specific hardware. This means that there is a very high cost to the customer to switch from one vendor to another. Sometimes this leads to customers paying very high prices for outdated smart card products without any alternatives. Critical Success Factor 1: Select a card profile that meets the project requirements, independent of the hardware vendor. Don t get locked into a single hardware vendor. charismathics is hardware vendor neutral. Though charismathics provides its own highly optimized profiles, these profiles support a wide range of smart cards from different hardware vendors. Customers can choose between hardware vendors, handle procurement directly, and switch at a later stage without incurring additional costs. Going further, for those customers that have a requirement to fully control their profile, who need to configure the data structures or security rules, or need certification of the profile, charismathics can help define and support custom profiles, and in fact, currently supports a wide variety of smart card profiles Smart Card Middleware The smart card middleware is the software that sits on the end users PC, and interfaces to the smart card on the one hand, and the application on the other. Typically the smart card middleware provides multiple Application Programming Interfaces (APIs), including the Microsoft CryptoAPI CSP, and PKCS11, which is common on non Windows platforms, as well as a low level interface for such applications as pre-boot authentication. In the past most hardware vendors provided their own smart card middleware often just a simple PKCS11 stack or CSP. However, as PC security technology has developed, the smart card middleware has become more complex. Different smart cards implement functions in different ways even basic cryptographic primitives, such as 3DES, RSA and ECC vary. This means that applications that work with one smart card, may not work with another. Middleware needs to support not just standard smart card readers, but also class 2 and 3 secure smart card readers (with integrated PIN pads) as well as biometric readers, Match on Card biometric smart cards. The PKCS11 and CSP specifications are subject to interpretation. Many applications including ones from major vendors are non compliant. Middleware vendors must constantly test applications, and often have to build in workarounds to enable support. In projects that involve consumers or citizens, the smart card middleware needs to be installed by the end user. The middleware needs utilities and functions that simplify the installation, usage and support of the middleware by the end user, and needs to be dependable and stable on a large variety of systems. Many security applications require support for custom or specialized functionality in the middleware. This is true for example with pre-boot, disk encryption and most Single Sign-On applications. Middleware vendors have to implement this support trough custom functionality avoiding multiple tokens to be bought. More and more platforms are being enabled for use with smart cards. Where before there was just Windows, now there is Mac, Solaris, many different flavors of Linux, and a variety of mobile platforms. Middleware needs to support the platforms required by the customer. Many tokens now use smart card commands (APDUs), although they may not use traditional smart card ICs. Such tokens include biometric, special purpose, flash memory and other non-usb devices. Middleware needs to support such tokens in the same PKI projects that include standard smart cards. The cost and complexity of supporting middleware has become prohibitive for even some of the largest smart card vendors. For example, until very recently, Schlumberger (one of the largest providers of smart cards to the oil and gas industry) did not support any Linux flavors, and even now does not support Mac. As a result customers have become limited in their ability to deploy new applications or platforms and many projects fail simply because of lack of user acceptance. Critical Success Factor 2: Ensure that the middleware meets your current and future requirements. Standards compliance does not ensure interoperability. Figure 1: Middleware Utility 6 7
5 Unlike the major smart card vendors, charismathics core business is developing and maintaining smart card middleware. The middleware product has been developed and tested over more than 5 years and implemented with numerous large and small scale projects. charismathics supports a wide variety of smart cards, tokens and alternative authentication devices, and has certified numerous security applications and platforms. charismathics also supports class 2 and class 3 readers, as well as biometric smart card readers and Match on Card smart cards. charismathics also supports a variety of alternative devices including biometric tokens, combination smart card/flash tokens and contactless devices Smart Card Readers Smart card readers are often an afterthought in the smart card project. For consumer and citizen projects, smart card readers can be a significant percentage of the overall project cost. As a result, customers often try to save money by specifying inexpensive readers. In the past, the quality of smart card readers have been the largest single cause for end user problems especially with consumer and citizen projects which require user installation of hardware. Several things have changed to improve the situation: smart card reader driver quality has improved. The PCSC specification has been clarified and stabilized. The introduction of the standard Microsoft CCID driver, and CCID compliant drivers have improved. And the introduction of the Microsoft smart card reader certification program promises to ensure compliance. However at the same time many new smart card reader vendors are introducing new products. Remember that the smart card reader provides the power, communications and clock for the smart card to function. Many of the less expensive products were originally designed for a specific applications (such as payment or loyalty cards, or GSM SIM applications), and are not well tested for PKI smart cards. One common problem is with computers that don t provide enough power over USB. Smart card readers and drivers that don t compensate for this may crash or fail to read or write a card. Or they may simply provide an error message that makes it seem as if the card or software are not functioning correctly. Such problems are extremely hard to trouble shoot and resolve. With the growing adoption of RSA 2048 bit keys, support for PCSC 2.0 and extended APDU command sets is essential. Performance is also an issue. Smart card readers can be made less expensive by executing commands in the PC driver. This slows things down considerably. Some inexpensive readers don t even provide enough power to the card even when the USB functions correctly. This is especially a problem for cards when they are generating keys (as they do when a certificate is created). Some high performance smart cards draw a lot of power especially when executing cryptographic functions. Other readers don t provide support for alternative platforms such as Mac or Linux, or even older versions of Windows. As an example the PCSC compliant smart card reader in certain Dell Latitude notebook computers is well-known for its inconsistent behavior. Specifically high end crypto cards have failed with these readers during generating keys, but the behavior has been inconsistent, with some version testing fine, while others fail making problem reproduction difficult. Finally, with the vulnerability of the PC platform, many projects are requiring class 2 and class 3 readers. These readers integrate a secure PIN pad that handles the PIN entry within the secure device. This eliminates the PIN capture on the PC, and the associated vulnerability to malicious software intercepting the PIN. For even higher security, some customers are adopting biometric readers that complement or replace a PIN with a fingerprint. Typically the fingerprint is stored on the card, and with some vendors, the biometric is validated on the card itself using Match on card technology. These additional security functions requires support in the smart card middleware. Figure 3: PIN Pad Reader All card manufacturers provide PCSC compliant drivers. But not all are equal. It is therefore strongly recommended to test the proposed smart card readers with the card to be used, in a real world situation with real world PCs, and real world applications. Critical Success Factor 3: Ensure that smart card readers meet the real world usage requirements not just the nominal PCSC rating. charismathics has extensive experience with all types of smart card readers. For PKI projects it recommends Omnikey and SCM readers. charismathics supports PIN pad readers from Omnikey, SCM and others, as well as biometric smart card readers from Precise Biometrics and the Precise Match on Card functionality on a variety of smart cards. charismathics also recognizes that not all projects have control over what reader is used. Through extensive testing it has architected its smart card profile and middleware solution so that it is resilient, and can recover from PCSC failures. 8 9
6 3. Smart Card Lifecycle Management smart card lifecycle management deals with the different stages that a card passes through during the use of the card, as well as the processes for moving a card from one stage to another. For most PKI cards the smart card lifecycle includes the following stages: One advantage of a detailed smart card lifecycle plan is the ability to use it to model the performance and load requirements in each step. Critical Success Factor 4: Develop a detailed plan for each step in the smart card lifecycle, from ordering to revocation. card issuance PIN change PIN unblock card usage (for each application) card revocation charismathics consultants and consulting partners have extensive experience in analyzing and developing smart card lifecycle plans, and in helping you define the requirements that a particular plan generates for the smart card, software and systems. Typically though, more stages are required, and other steps and functions in the smart card lifecycle may include: card ordering card transport card storage card initialization card type management card version management card applet management card key management user/card enrollment (data capture) PIN Set card activation post issuance credential loading credential renewal card suspension (lost/stolen) credential revocation card replacement card retirement card re-use card personalization Other steps in the lifecycle are dependent on the specifics of the project. The overall smart card lifecycle process can be complex or fairly straight forward. A successful smart card lifecycle plan is essential to a successful project. Such a plan should outline the details of what happens in each step (including the information that is captured and processed), who is responsible for the step, and how the step is executed. Often, the lack of a clear card lifecycle plan (and more specifically a clear card issuance process) is a warning sign. Other warning signs include: Disagreement over who is responsible for a particular step in the process. Lack of clear requirements for data capture and processing A card issuance or management process that is very different from existing processes (especially if the smart card replaces or complements an existing document). Lack of detail in the (manual) processes required by end users and operators 10 11
7 4. User Enrollment and Card Issuance For many large-scale smart card projects the card lifecycle steps that are the most complex are enrollment and issuance. Enrollment involves the steps required to gather and capture the user data needed to produce a card. Issuance involves the steps required to produce a card and get that card in the hands of the end user. The actual issuance process may vary greatly depending on the security and business requirements of a specific project. In general, however, the enrollment and issuance process can be described as being centralized or decentralized, with the following matrix as a result: Decentralized processes work especially well if existing processes are already in place that can be extended or duplicated to handle smart card issuance. For example, school or enterprise may already issue ID cards. By extending the process to include PIN management, the same general resources can be used to issue the smart card. At the same time, decentralized enrollment and issuance processes are often difficult to implement if entirely new resources need to be developed and implemented. Critical Success Factor 5: The process of enrolling users and issuing them cards needs to be defined and clarified as soon and in as much detail as possible. Enrollment Centralized Centralized Decentralized Decentralized Issuance Centralized Decentralized Centralized Decentralized charismathics and its partners have extensive experience with analyzing and defining enrollment and issuance processes, and in helping develop and integrate the card profile and middleware. An example of centralized enrollment is a bank card that is generated using existing user account information, or a citizen card may be created using information from the civil registry. An example of decentralized enrollment is a national ID card that requires the user to go to a government station to present ID, be photographed and provide a signature and/or a fingerprint. An example of centralized issuance is a driver s license program that mails the card to the address of the user (often the address printed on the card). An example of decentralized issuance is a company ID card that requires the end user to show up at the HR office and sign paperwork. Whether issuance and enrollment is centralized or decentralized determines much of the work flow requirements as well as the technology and products required. Centralized issuance processes can often be fully outsourced to specialized card vendors, where the card can be personalized in a secure production facility and sent by mail to the end user. The card can then be activated through an online or phone process. Decentralized issuance processes may still benefit from centralized card production, however cards are then shipped to the issuance location, and customized issuance processes then need to be implemented to get the card into the end users hands
8 5. PIN Management One crucial aspect of the card lifecycle that is often overlooked by IT managers is PIN management. PIN management entails three functions: setting the PIN, changing the PIN and unblocking the PIN. The smart card provides strong 2 factor authentication. The card itself is the first factor. The second factor is typically a PIN which needs to be remembered by the end user. Without the PIN, the smart card cannot be used. (Biometrics is generally not used for online smart card applications because of the high cost of the biometric/smart card reader). Critical Success Factor 6: An effective and efficient process of PIN management needs to be defined. charismathics support the PKCS11 PIN management calls the industry standard process for managing PIN changes and PIN resets on the smart card. Depending on the scenario, the customer may choose to implement a custom solution that interfaces to the card, or use the standard charismathics CSSI Security Device Configurator that is part of the smart card middleware package. CSSI also warns the end user once a PIN is entered wrongly, to ensure that they have an opportunity to recover. Setting the PIN can be done interactively by the end customer, online as the card is activated or in person during enrollment. It can also be done by sending out a PIN mailer (a process that is common in Europe, but less so in North America). Changing the PIN can be done by the end user locally, using a utility such as the charismathics CSSI Security Device Configurator. In this scenario a certain number of security rules can be enforced such as the minimum length of the PIN. Alternatively, some projects call for enforcement of more comprehensive PIN rules, including PIN history and enforcement of types of characters (for example a requirement to use both number, lower case and upper case letters). This often requires an online PIN change system, such as provided by most smart card management systems. Unblocking the PIN is by far the most complex aspect of card management. Smart cards are enabled for offline PIN authentication. That means that the PIN is presented to the card, and the card then verifies the PIN. The smart card enforces a limited number of tries. If the incorrect PIN is presented too many times, the card is blocked. It then requires a PIN unblock process to reset the PIN for the end user. The PIN unblock process needs to tie into an out of band authentication process. In an enterprise, the PIN unblock process often ties into the same system that handles password resets. It might be an automated process that requires the end user to answer questions, or it might require the end user to phone a call center, or even to show up in person. When the user is authenticated, the system can unblock the card by interfacing to the card using the smart card middleware. The security rules and processes for PIN unblock processes vary so much, that no single system provides a complete solution, and typically custom integration of systems is required. Finally, PIN management requires a great deal of end-user education and support. It is necessary to manage end users expectations to avoid confusion and frustration, and it is also necessary to provide appropriate end user support when things go wrong
9 6. Smart Card Management Systems Because the smart card lifecycle can be complex, some vendors strongly advocate for the implementation of a smart card management system (SCM systems) to manage the process. Many general and specialized vendors have such systems. There are certain situations where SCM systems are strongly advised. However, in many projects SCM systems add additional cost and overhead without adding much value. That is because in many large-scale smart card projects the work flow processes are often quite particular to the project. In addition, the existing technical infrastructure is often predetermined, requiring specialized integration. One area in which SCM systems are very useful is projects that require extensive certificate management, as well as customized work flows. For example, a bank may use digital certificates to enable the employee to access different sets of assets and applications. Such a bank may have to implement different work flows for different certificates. A user in Austin, for example, may need a certificate to access the local network infrastructure. Such a certificate has to be authorized by the local manager. The same user, though, may have to get access to the wealth management application in Germany, authorized by a manager there, as well as a trading application in New York, with its own manager. In such a project, it is necessary to be able to handle a diverse user base, and many different certificate usage profiles, as well as to be able to extend the certificates and processes in the future. Typically SCM systems are well suited for this. area standard Card Management Systems (CMS) are a viable option. These are systems designed for ID badges or plastic card processing, and though they may have some smart card functionality are not designed for post issuance management, credential management or full lifecycle management. Typically, CMS systems are well suited for user enrollment and data capture, because they integrate well with cameras, signature and fingerprint capture equipment, areas where SCM systems typically lack in functionality. Smart card management systems are sometimes selected because the customer has not yet determined the card and credential lifecycle, where there is lack of consensus on the processes, where the customer wants to keep his options open, or expects that addition of credentials or card lifecycle steps post issuance. In such a situation, the choice of a smart card management system is not going to help. Understanding the card lifecycle requirements and selecting an appropriate solution is critical. Critical Success Factor 7: Smart card management systems are no panacea. Choosing the right card management system or no system at all is crucial. charismathics and its partners have a great deal of experience with many different kinds of smart card management systems including those from Microsoft (ILM), Intercede and partners (MyID), BellID (ANDiS) and others, as well as badge and card management systems from ScreenCheck (BadgeMaker/CivilID), Fargo (Asure ID), DataCard (ID Works) and others. The charismathics CSSI middleware is well suited to custom integration and development, providing an excellent platform component for customers that need to implement their own workflow processes. However many large smart card projects have fairly straight forward processes and only a single credential on the card. The complexity of such systems is in implementing the large-scale personalization systems and logistics systems with specialized equipment and processes. Even when a project has more complex processes, this is often because of operational or political complexities and a SCM system may not be a solution. Although SCM systems may have highly flexible workflow engines, the particular workflow of a project may be more cost effectively implemented using custom software. Smart card management systems can be very expensive. Quite often they require significant customization to handle the specific requirements of a project. In such situations, a dedicated custom system, often in combination with outsourced issuance services, can be a better solution. Quite often, the complexity lies in the issuance processes and logistics where SCM systems frequently don t have comprehensive solutions. Often it is these physical processes that are overlooked or underestimated by IT oriented managers. In this 16 17
10 7. Card Procurement 7.1. Card Manufacturers PKI smart cards are not generally provided as standard off the shelf products. Instead they need to be custom ordered and custom manufactured. Specifically, during card production, the card needs to be configured so that it is ready to interoperate with the smart card middleware. This entails setting the appropriate configuration for the card, setting security keys, and possibly also setting security policies and loading card applets. The large smart card manufacturers (Gemalto, Oberthur, Giesecke & Devrient, Sagem and others) generally focus on large production runs for GSM SIM cards and banking cards. These typically are multi million card orders that run for weeks and even months. As a result they are not well suited for smaller runs, especially when this requires a lot of configuration and setup. Any run less than 10,000 units, and often less than 25,000 units is considered a small run. This should be kept in mind, because typically, even a large smart card project (100K and above) starts with a smaller trial or slower roll out. Often the larger smart card vendor look for the customer to lock into large committed orders to get adequate pricing and delivery terms before the cards or processes have even been tested. Smaller card vendors can be more flexible. In the past, the large card manufacturers had a unique position in the smart card business, because only they had the specialized equipment and knowhow to create smart card chips, smart card operating systems and modules, and embed them into plastic card bodies. In the last 5 years however, the industry has changed. Chip manufacturers such NXP and others now offer complete card modules with smart card operating systems. At the same time many card machinery manufacturers have developed highly sophisticated equipment that have enabled other plastic card vendors to provide smart card products. Many plastic card vendors already have experience with security sensitive operations (especially if they produce bank or credit cards). In addition, many such vendors have experience in card personalization and mailing, which is relevant for customers that need to ship directly to end customers. As a result national and international plastic card vendors may be an excellent alternative to the large card manufacturers in providing card manufacturing, printing and issuance solutions. The large card manufacturers also prefer to sell their own hardware and card operating systems which, though often of excellent quality, means customer get locked into a particular platform, and find it difficult to switch to alternative vendors. Finally, production expertise varies greatly between manufacturers depending on the type of module and card body that is required. For combination contact/contactless cards for example, where the card body includes an antenna that must be bonded to the smart card chip, certain manufacturers have a great deal more experience then others. Critical Success Factor 8: The large smart card vendors are not the only alternative: find a reliable smart card vendor in the right geographic location who provides the needed volume and services specific to the program. Though charismathics is not a card manufacturer, it does have excellent relationships with both smart card chip and card manufacturers. Through these relationships charismathics can provide pre-certified card modules that can be embedded by local plastic card vendors, or by specialized card manufacturer partners in Europe, Asia or the USA. charismathics can also provide independent advice on the pros and cons of specific technologies and services, and on the quality and reliability of products and vendors Pricing and Delivery Terms Although smart cards are pretty much a commodity product at this time, there can be a large fluctuation in pricing and delivery terms between vendors. There are various reasons for this. It may be because card manufacturers are often restricted to using particular production lines for particular cards (such as PKI capable cards) and such production lines may be tied up for long periods with SIM or bank card production. At the same time, there is a high cost to keeping production lines idle, and so manufacturers with gaps in their production planning may often be willing to provide capacity at very low prices. In addition, large card manufacturers are dependent on chips from the chip vendors, and at any time there may be bottleneck and supply issues in that channel. For example, when a particular chip vendor switched to new manufacturing technique, or new chip design, there may be a large lag in production volume that affects smart card production. For specialized card bodies (for example ones that include contactless technologies, or high security technologies), card manufacturers may be dependent on third party suppliers that have their own priorities and supply issues. Finally, manufacturers vary greatly in their production reliability. Typically card manufacturers will require the customer to accept some over or under production. This may be as high as 5% over or under the target volume required. This covers cards lost 18 19
11 due to manufacturing problems (typically production start-up loss). When the card body contains additional technologies (like contactless or holograms) this card loss may be expensive, therefore the quoted per unit price needs to be adjusted with the requirement to accept overage production. As part of the ordering process, it is essential that the customer gets approval of sample cards, and that the customer establishes a good process with the middleware vendor and the card profile vendor to ensure that the sample cards are approved and functional. This process may take anywhere from a week to 6 weeks depending on the responsiveness and technical capabilities of the smart card manufacturer. This will prevent the situation that some customers have found themselves in: with a large inventory of cards that did not meet spec, and were essentially useless for the project they were intended for. Depending on the manufacturer and the state of the market, delivery times will range from 3 months from order to as long as 9 months. Critical Success Factor 9: Procurement should be prioritized. Identify what is needed as soon as possible, and start the procurement process. Through its relationships with chip and card manufacturers, charismathics can provide unparalleled insight into the state of the market, and can provide bidding advice as well as quotes on cards and modules. 8. End User Support In the end the success of a large-scale smart card project depends on the end user. Projects that make for unhappy end users have a large chance of failing. Even in projects where end users can be forced to make use of a smart card for a particular application, lack of end user support can lead to delays and excessive costs. For this reason, effective end user support is crucial. The end user experience is especially important when the end user is responsible for installing and configuring the smart card reader and middleware. In such a situation, it is strongly advised to pay attention to the packaging, documentation and the quality and effectiveness of the installation package. For application use, it is crucial that the application user interface integrates the smart card usage steps, and provides useful hints and documentation. For example, a log in screen should include information on inserting the smart card and PIN. Farther throughout the lifecycle, the integration of the application and management functions is also useful. For example, if a digital certificate needs to be requested or renewed, it is useful that the appropriate functions are prompted during the application use, rather than requiring the end user to read a separate and start up a separate smart card application. It is useful to be reminded that different users prefer different support processes. This means that multiple ways of figuring out a problem should be provided. For example, information on changing a PIN could be provided through a quick start doc, a detailed manual, a help screen, online faq as well as by interactive chat and telephone call. Finally, effective user support starts by minimizing user problems in the first place. This includes choosing reliable hardware and software components that don t crash and provide effective user feedback when problems occur. Critical Success Factor 10: The success of a project is defined by the end user ensure that the appropriate end user support processes are in place. charismathics CSSI software has been in the market for more than 5 years, and has been used by millions of users in all types of situations. The result is a highly dependable end user application that minimizes problems with the installation and use, and provides information on the state of the card and the problem to enable the end user and program support staff to resolve any problems that occur
12 9. Conclusion Planning and implementing large-scale smart card projects is inherently complex. Identifying and analyzing the particular aspects of a project that are potential pitfalls or bottlenecks as soon as possible is essential. The objective of this white paper has been to identify the critical success factors that most projects must deal with, and provide an initial overview of the issues involved. No single document can effectively cover all the essential issues, however. charismathics and its partners have many years experience in providing the software, hardware and services required to make your project a success. We strongly encourage you to contact us, and help us work with you on the particulars of your project. 22
13 CSSI The charismathics smart security interface is a PKI middleware supporting all major standard industry interfaces like CSP, PKCS#11, tokend, minidriver as well as a wide range of operating systems including Windows, Mac OS, Linux, Solaris and several smart card platforms (i.e. JCOP, CardOS, StarCOS, GemXpresso, CosmoID). CSSI improves your ROI by allowing the user to rely on multiple hardware authentication solutions simultaneously. Together with ienigma, CSSI supports smart phones in replacement of USB tokens and smart cards. ienigma The charismathics ienigma is an application for mobile phones which makes them act as a hardware security device. It runs in dual mode operation, either in replacement of a smart card and its reader to perform two-factor authentication actions like digital signature and encryption on your laptop; or to support stand-alone applications for the smart phone to carry out cryptographic operations. ienigma also strongly enhances the user convenience by upgrading the mobile environment. plug n crypt The charismathics plug n crypt is a driverless USB token embedding a smart card chip, a flash memory component and a RFID tag into one unique robust housing. Perfectly integrated with CSSI, it s a commodity for daily use in operations like digital signature, file and encryption, VPN and PC logon even at pre-boot level, password management. Together with smart security interface, you have your digital credentials always with you and can run applications safely without leaving footprints behind. charismathics is a global leader in identity management software. Since 2004, charismathics has pioneered the field of Public Key Infrastructure opening the way to a more flexible offering for the customers. Enabling complex IT architectures and PKI software solutions, charismathics puts forward a wide range of products and services for a variety of industries including banking and finance, healthcare, telecommunications, security, government and PC manufacturing. charismathics offers the only true middleware solution worldwide. 47 Sendlinger St Munich, Germany [email protected] phone +49 (89) Gateway Place Suite 500 San Jose, CA 95110, USA [email protected] phone +1 (408) All trademarks, trade names, service marks, and logos referenced herein belong to their respective organizations and companies.
CRESCENDO SERIES Smart Cards. Smart Card Solutions
CRESCENDO SERIES Smart Cards Smart Card Solutions Crescendo offers the lowest total cost of ownership (TCO) for a combined logical and physical access control solution. Crescendo smart cards allow me to
Enhancing TAM E-SSO with smart phones, smart cards and other tokens. IBM Tivoli Talk
Enhancing TAM E-SSO with smart phones, smart cards and other tokens Sven Gossel IBM Tivoli Talk October 7 th, 2011 Charismathics Milestones 2005 2007 2010 Re-inventing PKI middleware Re-inventing Trusted
Enhancing IBM SAM E-SSO s Strong Authentication capabilities with smart phones, smart cards and other tokens
Enhancing IBM SAM E-SSO s Strong Authentication capabilities with smart phones, smart cards and other tokens Sven Gossel IBM Security Talk May 24 th, 2012 Desktop and Application virtualization are creating
Introducing etoken. What is etoken?
Introducing etoken Nirit Bear September 2002 What is etoken? Small & portable reader-less Smartcard Standard USB connectivity Logical and physical protection Tamper evident (vs. tamper proof) Water resistant
Converged Smart Card for Identity Assurance Solutions. Crescendo Series Smart Cards
Converged Smart Card for Identity Assurance Solutions Crescendo Series Smart Cards Crescendo is the proven smart card solution for a combined logical and physical access control solution. Crescendo smart
Frequently Asked Questions (FAQs) SIPRNet Hardware Token
Air Force Public Key Infrastructure System Program Office (ESC/HNCDP) Phone: 210-925-2562 / DSN: 945-2562 Web: https://afpki.lackland.af.mil Frequently Asked Questions (FAQs) SIPRNet Hardware Token Updated:
Application Note Gemalto.NET 2.0 Smart Card Certificate Enrollment using Microsoft Certificate Services on Windows 2008
7 Application Note Gemalto.NET 2.0 Smart Card Certificate Enrollment using Microsoft Certificate Services on Windows 2008 All information herein is either public information or is the property of and owned
Multi-Factor Authentication Protecting Applications and Critical Data against Unauthorized Access
Multi-Factor Authentication Protecting Applications and Critical Data against Unauthorized Access CONTENTS What is Authentication? Implementing Multi-Factor Authentication Token and Smart Card Technologies
Microsoft Identity Lifecycle Manager & Gemalto.NET Solutions. Jan 23 rd, 2007
Microsoft Identity Lifecycle Manager & Gemalto.NET Solutions Jan 23 rd, 2007 Microsoft ILM is a comprehensive, integrated, identity and access solution within the Microsoft system architecture. It includes
Smart Card Deployment in the Data Center: Best Practices for Integrating Smart Card Authentication in a Secure KVM Environment
Smart Card Deployment in the Data Center: Best Practices for Integrating Smart Card Authentication in a Secure KVM Environment 2009, Raritan Inc. Executive Summary While many organizations have employed
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Purpose This paper is intended to describe the benefits of smart card implementation and it combination with Public
Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates. September 2006
Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates September 2006 Copyright 2006 Entrust. All rights reserved. www.entrust.com Entrust is a registered trademark
Deploying Smart Cards in Your Enterprise
www.css-security.com 425.216.0720 WHITE PAPER The merging of physical access technology with public key-enabled smart card technology has been an emerging trend that has occurred in the security industry
Standardizing PKI in Higher Education Apple PKI and Universal Hi-Ed Spec proposal
Standardizing PKI in Higher Education Apple PKI and Universal Hi-Ed Spec proposal Shawn Geddis Security Consulting Engineer, Apple Enterprise [email protected] 703-264-5103 1 Agenda A View of Apples PKI
HSPD-12 Implementation Architecture Working Group Concept Overview. Version 1.0 March 17, 2006
HSPD-12 Implementation Architecture Working Group Concept Overview Version 1.0 March 17, 2006 Table of Contents 1 PIV Lifecycle... 3 2 High Level Component Interaction Diagram... 4 3 PIV Infrastructure
The Convergence of IT Security and Physical Access Control
The Convergence of IT Security and Physical Access Control Using a Single Credential to Secure Access to IT and Physical Resources Executive Summary Organizations are increasingly adopting a model in which
Contactless Solutions
Contactless Solutions Extends Windows Authentication ACCESS secure. Contactless Solutions Add contactless logical access control to your physical access control system w Three-component solution (Prox
Smart Card Setup Guide
Smart Card Setup Guide K Apple Computer, Inc. 2006 Apple Computer, Inc. All rights reserved. Under the copyright laws, this manual may not be copied, in whole or in part, without the written consent of
Global network of innovation. Svein Arne Lindøe Arnfinn Strand Security Competence Center Scandic Siemens Business Services (Norway)
Svein Arne Lindøe Arnfinn Strand Security Competence Center Scandic Siemens Business Services (Norway) Agenda Security Portfolio intro Why SmartCard? SmartCard Applications SmartCard Solution Components
CHOOSING THE RIGHT PORTABLE SECURITY DEVICE. A guideline to help your organization chose the Best Secure USB device
CHOOSING THE RIGHT PORTABLE SECURITY DEVICE A guideline to help your organization chose the Best Secure USB device Introduction USB devices are widely used and convenient because of their small size, huge
Check Point FDE integration with Digipass Key devices
INTEGRATION GUIDE Check Point FDE integration with Digipass Key devices 1 VASCO Data Security Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document
Microsoft Windows Server 2003 Integration Guide
15370 Barranca Parkway Irvine, CA 92618 USA Microsoft Windows Server 2003 Integration Guide 2008 HID Global Corporation. All rights reserved. 47A3-905, A.1 C200 and C700 December 1, 2008 Crescendo Integration
DriveLock and Windows 7
Why alone is not enough CenterTools Software GmbH 2011 Copyright Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise
EXPLORING SMARTCARDS: AN INDEPENDENT LOOK TO TECHNOLOGIES AND MARKET
EXPLORING SMARTCARDS: AN INDEPENDENT LOOK TO TECHNOLOGIES AND MARKET Giuseppe Gippa Paternò [email protected] June 2008 WHO AM I Experienced architect Linux, Networking and Security Focused on Telcos
etoken Single Sign-On 3.0
etoken Single Sign-On 3.0 Frequently Asked Questions Table of Contents 1. Why aren t passwords good enough?...2 2. What are the benefits of single sign-on (SSO) solutions?...2 3. Why is it important to
www.rohos.com Two-factor authentication Free portable encryption for USB drive Hardware disk encryption Face recognition logon
Two-factor authentication Free portable encryption for USB drive Hardware disk encryption Face recognition logon Secure Windows and Mac login by USB key www.rohos.com Rohos Logon Key Secure two-factor
The Convergence of IT Security and Physical Access Control
The Convergence of IT Security and Physical Access Control Using a Single Credential to Secure Access to IT and Physical Resources Executive Summary Organizations are increasingly adopting a model in which
Two factor strong authentication. Complex solution for two factor strong authentication
Two factor strong authentication Complex solution for two factor strong authentication Company brief BMS Consulting is established as IT system integrator since 1997 Leading positons in Eastern Europe
Firmware security features in HP Compaq business notebooks
HP ProtectTools Firmware security features in HP Compaq business notebooks Embedded security overview... 2 Basics of protection... 2 Protecting against unauthorized access user authentication... 3 Pre-boot
Innovative Secure Boot System (SBS) with a smartcard.
Managed Security Services Desktop Security Services Secure Notebook Desktop Security Services. Secure Notebook. Today s business environment demands mobility, and the notebook computer has become an indispensable
ACER ProShield. Table of Contents
ACER ProShield Table of Contents Revision History... 3 Legal Notices... 4 Executive Summary... 5 Introduction... 5 Protection against unauthorized access... 6 Why ACER ProShield... 7 ACER ProShield...
epass2003 User Guide V1.0 Feitian Technologies Co., Ltd. Website: www.ftsafe.com
epass2003 User Guide V1.0 Feitian Technologies Co., Ltd. Revision History: Date Revision Description June 2013 V1.0 Release of the first version i Software Developer s Agreement All Products of Feitian
Gemalto SafeNet Minidriver 9.0
SafeNet Authentication Client Gemalto SafeNet Minidriver 9.0 Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document
Charismathics Smart Security Interface for Mac OS X Version 5.0. User Manual
Charismathics Smart Security Interface for Mac OS X Version 5.0 User Manual October 30, 2012 Table of Contents 1 Introduction... 3 2 Supported Hardware and Software Applications... 4 2.1 Supported Applications...
TrustKey Tool User Manual
TrustKey Tool User Manual 1 Table of Contents 1 Introduction... 5 2 TrustKey Product...6 2.1 TrustKey Tool... 6 2.2 TrustKey function modules...7 2.3 TrustKey using environment...7 3 TrustKey Tool Installation...
SafeNet Authentication Client (Windows)
SafeNet Authentication Client (Windows) Version 8.1 SP1 Revision A User s Guide Copyright 2011 SafeNet, Inc. All rights reserved. All attempts have been made to make the information in this document complete
DoD CAC Middleware Requirements Release 4.0
DoD CAC Middleware Requirements Release 4.0 Version 1.01 26 November 2012 Prepared by: DoD Identity Protection and Senior Coordinating Group s (IPMSCG) Test and Evaluation Work Group (TEWG) UNCLASSIFIED
Moving to Multi-factor Authentication. Kevin Unthank
Moving to Multi-factor Authentication Kevin Unthank What is Authentication 3 steps of Access Control Identification: The entity makes claim to a particular Identity Authentication: The entity proves that
Executive Summary P 1. ActivIdentity
WHITE PAPER WP Converging Access of IT and Building Resources P 1 Executive Summary To get business done, users must have quick, simple access to the resources they need, when they need them, whether they
DriveLock and Windows 8
Why alone is not enough CenterTools Software GmbH 2013 Copyright Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise
Strong Authentication: Enabling Efficiency and Maximizing Security in Your Microsoft Environment
Strong Authentication: Enabling Efficiency and Maximizing Security in Your Microsoft Environment IIIIII Best Practices www.gemalto.com IIIIII Table of Contents Strong Authentication and Cybercrime... 1
Draft Middleware Specification. Version X.X MM/DD/YYYY
Draft Middleware Specification Version X.X MM/DD/YYYY Contents Contents... ii 1. Introduction... 1 1.2. Purpose... 1 1.3. Audience... 1 1.4. Document Scope... 1 1.5. Document Objectives... 1 1.6. Assumptions
Deriving a Trusted Mobile Identity from an Existing Credential
Deriving a Trusted Mobile Identity from an Existing Credential Exploring and applying real-world use cases for mobile derived credentials +1-888-690-2424 entrust.com Table of contents Approval of the mobile
Smart Card Certificate Authentication with VMware View 4.5 and Above WHITE PAPER
Smart Card Certificate Authentication with VMware View 4.5 and Above WHITE PAPER Table of Contents.... About This Paper.... 3 Introduction... 3 Smart Card Overview.... 3 Getting Started... 4 Authenticating
The Encryption Anywhere Data Protection Platform
The Encryption Anywhere Data Protection Platform A Technical White Paper 5 December 2005 475 Brannan Street, Suite 400, San Francisco CA 94107-5421 800-440-0419 415-683-2200 Fax 415-683-2349 For more information,
VeriSign PKI Client Government Edition v 1.5. VeriSign PKI Client Government. VeriSign PKI Client VeriSign, Inc. Government.
END USER S GUIDE VeriSign PKI Client Government Edition v 1.5 End User s Guide VeriSign PKI Client Government Version 1.5 Administrator s Guide VeriSign PKI Client VeriSign, Inc. Government Copyright 2010
Global eid Developments. Detlef Eckert Chief Security Advisor Microsoft Europe, Middle East, and Africa
Global eid Developments Detlef Eckert Chief Security Advisor Microsoft Europe, Middle East, and Africa Agenda Country View on eid initiatives Trustworthy Identity Scenarios Microsoft eid update Summary
How To Get Smart Cards From Atos
secure authentication and trusted identity delivering assurance and efficiency to every sector with CardOS Smart Card Solutions Your business technologists. Powering progress Delivering certainty through
Security and Security Certificates for OpenADR systems. Background. Content:
Security and Security Certificates for OpenADR systems Content: Background... 1 Setup for OpenADR... 2 Test-, Evaluation-, and Production Certificates... 3 Responsibilities... 3 Certificate Requesting
NASA PIV smartcards at Headquarters Frequently Asked Questions (FAQ s)
Frequently Asked Questions (FAQ s) November, 2013 This list of FAQs is a subset of a larger list derived by the Agency. This list is tailored to meet the needs of users at Headquarters. If you do not find
PROXKey Tool User Manual
PROXKey Tool User Manual 1 Table of Contents 1 Introduction...4 2 PROXKey Product... 5 2.1 PROXKey Tool... 5 2.2 PROXKey function modules...6 2.3 PROXKey using environment...6 3 PROXKey Tool Installation...7
Enhancing Organizational Security Through the Use of Virtual Smart Cards
Enhancing Organizational Security Through the Use of Virtual Smart Cards Today s organizations, both large and small, are faced with the challenging task of securing a seemingly borderless domain of company
Smart Card APDU Analysis
Smart Card APDU Analysis Black Hat Briefings 2008 Las Vegas Ivan "e1" Buetler [email protected] Compass Security AG - Switzerland Compass Security AG Glärnischstrasse 7 Postfach 1628 CH-8640 Rapperswil
RSA SecurID Two-factor Authentication
RSA SecurID Two-factor Authentication Today, we live in an era where data is the lifeblood of a company. Now, security risks are more pressing as attackers have broadened their targets beyond financial
MyKey is the digital signature software governed by Malaysia s Digital Signature Act 1997 & is accepted by the courts of law in Malaysia.
About Digital Signature using MyKey Purpose MyKey is the digital signature software governed by Malaysia s Digital Signature Act 1997 & is accepted by the courts of law in Malaysia. A document digitally
Strong Authentication for Secure VPN Access
Strong Authentication for Secure VPN Access Solving the Challenge of Simple and Secure Remote Access W H I T E P A P E R EXECUTIVE SUMMARY In today s competitive and efficiency-driven climate, organizations
Enhancing Web Application Security
Enhancing Web Application Security Using Another Authentication Factor Karen Lu and Asad Ali Gemalto, Inc. Technology & Innovations Austin, TX, USA Overview Introduction Current Statet Smart Cards Two-Factor
Dell Client BIOS: Signed Firmware Update
Dell Client BIOS: Signed Firmware Update An Implementation and Deployment Guide to NIST SP800-147 BIOS Protections for Dell Client BIOS Rick Martinez Dell Client BIOS This white paper is for informational
IBM Client Security Solutions. Client Security User's Guide
IBM Client Security Solutions Client Security User's Guide December 1999 1 Before using this information and the product it supports, be sure to read Appendix B - Notices and Trademarks, on page 22. First
DigitalPersona Pro Enterprise
DigitalPersona Pro Enterprise Version 5.3 Frequently Asked Questions 2012 DigitalPersona, Inc. All Rights Reserved. All intellectual property rights in the DigitalPersona software, firmware, hardware and
PRIME IDENTITY MANAGEMENT CORE
PRIME IDENTITY MANAGEMENT CORE For secure enrollment applications processing and workflow management. PRIME Identity Management Core provides the foundation for any biometric identification platform. It
Crescendo offers the lowest total cost of ownership (TCO) for a combined logical and physical access control solution.
ACCESS secure. Crescendo smart cards allow me to cost-effectively and easily deploy a wide range of logical access solutions. Crescendo offers the lowest total cost of ownership (TCO) for a combined logical
GoldKey Software. User s Manual. Revision 7.12. WideBand Corporation www.goldkey.com. Copyright 2007-2014 WideBand Corporation. All Rights Reserved.
GoldKey Software User s Manual Revision 7.12 WideBand Corporation www.goldkey.com 1 Table of Contents GoldKey Installation and Quick Start... 5 Initial Personalization... 5 Creating a Primary Secure Drive...
DIGIPASS CertiID. Getting Started 3.1.0
DIGIPASS CertiID Getting Started 3.1.0 Disclaimer Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis, without any other warranties, or conditions, express
PUBLIC Secure Login for SAP Single Sign-On Implementation Guide
SAP Single Sign-On 2.0 SP04 Document Version: 1.0-2014-10-28 PUBLIC Secure Login for SAP Single Sign-On Implementation Guide Table of Contents 1 What Is Secure Login?....8 1.1 System Overview.... 8 1.1.1
Smart Card Two Factor Authentication
January 2013 Page 1 Smart Card Two Factor Authentication The combination of a smart card and PIN provides Two-Factor Authentication, where two items are needed: something physical the user has (a smart
IBM Security Access Manager for Enterprise Single Sign-On Version 8.2.1. User Guide IBM SC23-9950-05
IBM Security Access Manager for Enterprise Single Sign-On Version 8.2.1 User Guide IBM SC23-9950-05 IBM Security Access Manager for Enterprise Single Sign-On Version 8.2.1 User Guide IBM SC23-9950-05
Schlumberger PKI /Corporate Badge Deployment. Neville Pattinson Director of Business Development & Technology IT & Public Sector
Schlumberger PKI /Corporate Badge Deployment Neville Pattinson Director of Business Development & Technology IT & Public Sector 1 Overview Background Overview of the PKI and Corporate Badge components
Dell ControlPoint Security Manager
Dell ControlPoint Security Manager www.dell.com support.dell.com Notes NOTE: A NOTE indicates important information that helps you make better use of your computer. Information in this document is subject
Simplifying Security with Datakey Axis Single Sign-On. White Paper
Simplifying Security with Datakey Axis Single Sign-On White Paper Copyright and trademark notice 2003 Datakey Inc. All rights reserved. Version 1.0 No part of this document may be reproduced or retransmitted
Symantec Managed PKI Service Deployment Options
WHITE PAPER: SYMANTEC MANAGED PKI SERVICE DEPLOYMENT............. OPTIONS........................... Symantec Managed PKI Service Deployment Options Who should read this paper This whitepaper explains
Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008
Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008 Contents Authentication and Identity Assurance The Identity Assurance continuum Plain Password Authentication
Strong Authentication for Healthcare
Strong Authentication for Healthcare Entrust Solutions for Centers for Medicare & Medicaid Services Authentication Compliance Entrust Inc. All All Rights Reserved. 1 1 Entrust is a registered trademark
Assessing the Security of Hardware-Based vs. Software-Based Encryption on USB Flash Drives
Assessing the Security of Hardware-Based vs. Software-Based Encryption on USB Flash Drives Main Line / Date / Etc. June May 2008 2nd Line 80-11-01583 xx-xx-xxxx Revision 1.0 Tagline Here Table of Contents
Managed Portable Security Devices
Managed Portable Security Devices www.mxisecurity.com MXI Security leads the way in providing superior managed portable security solutions designed to meet the highest security and privacy standards of
IDaaS: Managed Credentials for Local & State Emergency Responders
IDaaS: Managed Credentials for Local & State Emergency Responders NextgenID ID*TRUST Platform NextgenID - Headquarters USA 10226 San Pedro, Suite 100 San Antonio, TX 78216 +1 (210) 530-9991 www.nextgenid.com
Case Study: Leveraging TPM for Authentication and Key Security
Case Study: Leveraging TPM for Authentication and Key Security 09/20/2011 Gautam Muralidharan Manager, Advisory Services PwC Speaker Introduction Gautam is a manager in the Advisory Technology practice
Securing Corporate Data and Making Life Easier for the IT Admin Benefits of Pre Boot Network Authentication Technology
20140115 Securing Corporate Data and Making Life Easier for the IT Admin Benefits of Pre Boot Network Authentication Technology TABLE OF CONTENTS What s at risk for your organization? 2 Is your business
White Paper: Managing Security on Mobile Phones
White Paper: Managing Security on Mobile Phones April 2006 Managing Security on Mobile Phones April 2006 Table of Contents Abstract...2 Executive Summary...2 The Importance Of Managing Security On Mobile
TPM Key Backup and Recovery. For Trusted Platforms
TPM Key Backup and Recovery For Trusted Platforms White paper for understanding and support proper use of backup and recovery procedures for Trusted Computing Platforms. 2006-09-21 V0.95 Page 1 / 17 Contents
IDENTITY & ACCESS. Privileged Identity Management. controlling access without compromising convenience
IDENTITY & ACCESS Privileged Identity Management controlling access without compromising convenience Introduction According to a recent Ponemon Institute study, mistakes made by people Privilege abuse
Two-Factor Authentication
Chen Arbel Vice President, Strategic Development Authentication Unit & Software DRM Aladdin Knowledge Systems Two-Factor Authentication The key to compliance for secure online banking Legal Notice Copyright
Supporting Smart Cards in UEFI
presented by Supporting Smart Cards in UEFI UEFI PlugFest March 18-22, 2013 Presented by Jean Lusetti (Gemalto) Updated 2011-06-01 UEFI Spring PlugFest March 2013 www.uefi.org 1 Agenda Who is Gemalto?
Imation LOCK User Manual
Page: - 0 - Imation LOCK User Manual Security Application Program V2.0 - D Page: - 1 - Table of Contents A. Introduction... 2 B. General Description... 2 C. Features... 2 D. Before Using the Security Application
EESTEL. Association of European Experts in E-Transactions Systems. Apple iphone 6, Apple Pay, What else? EESTEL White Paper.
EESTEL White Paper October 29, 2014 Apple iphone 6, Apple Pay, What else? On 2014, September 9 th, Apple has launched three major products: iphone 6, Apple Watch and Apple Pay. On October 17 th, Apple
RSA Authentication Agent 7.2 for Microsoft Windows Installation and Administration Guide
RSA Authentication Agent 7.2 for Microsoft Windows Installation and Administration Guide Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com
Management of Hardware Passwords in Think PCs.
Lenovo Corporation March 2009 security white paper Management of Hardware Passwords in Think PCs. Ideas from Lenovo Notebooks and Desktops Workstations and Servers Service and Support Accessories Introduction
etoken TMS (Token Management System) Frequently Asked Questions
etoken TMS (Token Management System) Frequently Asked Questions Make your strong authentication solution a reality with etoken TMS (Token Management System). etoken TMS provides you with full solution
Endpoint Security Client for Mac
Endpoint Security Client for Mac E80.60 User Guide 23 December 2014 Classification: [Protected] 2014 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are
esign FAQ 1. What is the online esign Electronic Signature Service? 2. Where the esign Online Electronic Signature Service can be used?
esign FAQ 1. What is the online esign Electronic Signature Service? esign Electronic Signature Service is an innovative initiative for allowing easy, efficient, and secure signing of electronic documents
Windows Embedded Security and Surveillance Solutions
Windows Embedded Security and Surveillance Solutions Windows Embedded 2010 Page 1 Copyright The information contained in this document represents the current view of Microsoft Corporation on the issues
RSA Digital Certificate Solution
RSA Digital Certificate Solution Create and strengthen layered security Trust is a vital component of modern computing, whether it is between users, devices or applications in today s organizations, strong
Audio: This overview module contains an introduction, five lessons, and a conclusion.
Homeland Security Presidential Directive 12 (HSPD 12) Overview Audio: Welcome to the Homeland Security Presidential Directive 12 (HSPD 12) overview module, the first in a series of informational modules
Yubico PIV Management Tools
Yubico PIV Management Tools Active Directory Smart Card Logon using the YubiKey NEO or NEO-n Document Version 1.0 April 15, 2015 Yubico PIV Management Tools 2015 Yubico. All rights reserved. Page 1 of
How much do you pay for your PKI solution?
Information Paper Understand the total cost of your PKI How much do you pay for your PKI? A closer look into the real costs associated with building and running your own Public Key Infrastructure and 3SKey.
