Charismathics Smart Security Interface for Mac OS X Version 5.0. User Manual
|
|
|
- Meagan Ball
- 10 years ago
- Views:
Transcription
1 Charismathics Smart Security Interface for Mac OS X Version 5.0 User Manual October 30, 2012
2 Table of Contents 1 Introduction Supported Hardware and Software Applications Supported Applications Supported Smart Cards Supported Smart Card Readers Administration Tool: Token Configurator User Interface Token Configurator Menu File Menu Edit Menu Token Menu Window Menu User Tool: Charismathics Smart Security Interface Utility Change PIN Unlock PIN Change Token SO PIN Configuration of Applications supporting Charismathics PKCS#11 Library Configuring Firefox Configuring Thunderbird Configuration of Applications supporting Charismathics tokend Configuring Mail Configuring Entourage
3 1 Introduction Thank you for purchasing the Charismathics Smart Security Interface (CSSI) for Mac. CSSI for Mac provides modules that are needed in order to integrate different smart cards and USB tokens into your applications. The functionality ranges from administration of the card to modules supporting the operating system to use token. The following file structures (profiles) are supported: Charismathics corporate profile PKCS#15 profile AET profile PIV profile IAS ECC profile CNS profile FineId profile CSSI for Mac User Edition is comprised of the following modules: ScardUtility.app Information on how to use this tool is described in Chapter 4 Smart Security Interface Utility. Installed in the following location: /Applications/Charismathics/ libcmp11.dylib Information on how to use this library and configuring its supported applications is explained in Chapter 5 Configuration of Applications supported by libcmp11.dylib. Installed in the following location: /Applications/Charismathics/ CSSI.tokend Information on how to use this module and configuring its supported applications is explained in Chapter 6 Configuration of Applications supported by CSSI.tokend. Installed in the following location: /Library/Security/tokend/ CSTC - Charismathics Security token configurator for Mac is not included in CSSI User edition tool and has to be purchased separately. It is comprised of the following modules: Token Configurator.app Information on how to use this tool is described in Chapter 3 Administration Tool: Token Configurator. Installed in the following location: /Applications/Charismathics/ 3
4 CSSI for Mac enables you to use additional applications and services that use this standard interface. In particular the following applications can be augmented by CSSI: Smart card login to Mac SSL- Authentication by smart card (Mozilla Firefox, Safari, Google Chrome) security with cards using Thunderbird Security with Office mac 2011 Centrify Smart card login to Active Directory Domain Adobe Acrobat security with cards using Mail.app and Entourage VPN 2 Supported Hardware/Software Applications 2.1 Supported Applications CSSI for Mac supports the following applications: Client OS Component Applications/Usage Mac OS X CSSI.tokend Smart card login into Mac and higher security with Mail.app Safari, Google Chrome security with Entourage Keychain (viewing of certificate and keys) VPN Adobe Acrobat Digital Signing Centrify Mac Smart card login to AD. libcmp11.dylib security with Thunderbird SSL-Authentication with smart card in Firefox 2.2 Supported Smart Cards CSSI for Mac is tested with the following smart cards: ACOS A-Trust Card ACOS EMV A03 ACOS A04 ACOS A05 4
5 ACOS SMARTMX ActivIdentity Card Axalto Cyberflex Access V2c CardLogix Java Feitian FIPCS COS Feitian FTJCOS Siemens CardOS M4.01(a) Siemens CardOS V4.20 Siemens CardOS V4.2B Siemens CardOS V4.2c Siemens CardOS 4.2C DI Siemens CardOS V4.30 Siemens CardOS V4.3B Siemens CardOS V4.4 Gemalto EMV PKI Gemalto TOP IM GX4 Gemalto IAS ECC GemXpresso Pro R3.2 JCOP 20 JCOP 21 JCOP 30 JCOP 31 JCOP 41 JCOP J2 JCOP J3 JCOP J4 jtop JCX32/36 KONA 10 KONA 132 KONA 25 KONA 26 Keepod Micardo EC 2.x Morpho Orga YPS-ID2 Morpho YPS-ID3 IAS ECC NetKey E4/2000 Oberthur Cosmopo RSA V5.x Oberthur CosmopolIC 64K V5.2 Oberthur Cosmo ID-One V5.2 PIV Oberthur ID-One Cosmo V7.0 Oberthur ID-One Cosmo V7.0 DI Oberthur ID-One Cosmo V7.0 n Oberthur ID-One Cosmo V7.0 - a Oberthur ID-One v7 IAS ECC PAV Card ABACOS Privaris PlusID 60,75,90 Setec SetCard Sm@rtCafe Expert 2.0 Sm@rtCafe Expert 2.1 Sm@rtCafe Expert 3.0 Sm@rtCafe Expert 3.1 Sm@rtCafe Expert 3.2 Sm@rtCafe Expert 64k Sm@rtCafe Expert 5.0 StarCOS 3.0 StarCOS SPK 2.3 StarCOS SPK 2.4 StarCOS SPK 3.0 TCOS 2.x Wibu Code Meter Dongle 5
6 Watchdata TimeCOSPK NetKey PKS/2000/E4 CSSI PIV for Mac is tested with the following PIV / CAC cards: Cyberflex Access 64K V1 SM 4.1 CosmopolIC 64K V5.2 Fast ATR (2) Cyberflex Access 64K V2c Gemalto TOP DL - protiva PIV applet V1.55 Gemalto TPC DM 72K PIV Gemalto TOP DL V2 - protiva PIV applet V1.55 Gemalto TOP DL GX4 144K FIPS GEMALTO GCX4 72K DI Gemalto TOP DM GX4 72K (FIPS) GemXpresso PRO 64K R3 FIPS V2 #2 Gemalto TOP DL GX4 PIV GoldKey PIV Token Oberthur ID one Cosmo V5 - PIV applet V1.08 Oberthur Oberthur ID One Cosmo 64 V5.2 - AI PIV End Point Applet Oberthur ID One PIV (Type A) Large - ID One PIV applet Suite2.3.2 Oberthur ID-One Cosmo V5.2 - AI PIV End pont applet Oberthur ID-One Cosmo V7.0 n PIV Oberthur ID-One Cosmo V7.0 -n type A Standard D - ID one PIV applet suite Oberthur ID-One Cosmo V7.0 type B Large D - ID one PIV applet suite Oberthur ID-One Cosmo 128K v5.5 #2 Oberthur ID One V5.2a Dual Oberthur CosmopolIC 64K V5.2 Fast ATR (1) SIPRNet token 6
7 2.3 Supported Smart Card Readers Please make sure your PC/SC smart card reader has been installed according to the producer s specifications and is fully operational. The following smart card readers have been tested for CSSI Mac: Omnikey Cardman 3621 USB Omnikey Cardman 3821 USB SCM SCR 3311 USB SCM SCR 3310 USB SCM SCR 532 serial/usb Additionally a great number of smart card readers not explicitly mentioned above, but built upon compatible hardware, are supported. Note: PC/SC-drivers are supported. If RSA 2048 bit key shall be used, then the smart card reader must support the extended APDU. 7
8 3 Administration Tool: Token Configurator Token Configurator offers functions to manage smart card content: initialize smart cards, manage PINs, generate and manage keys and certificates. Note: After changing the contents of the smart card, you need to remove and reinsert the smart card to see the changes in other applications. This also applies when you perform Create Profile, Generate Key and Imports functions. 3.1 User Interface After opening Token Configurator you will see the following interface: Token Configurator with no card reader or token inserted Token Configurator with smart card, smart card reader or token inserted 8
9 The top tabs display the smart card readers that are connected to the system. Smart card readers and virtual USB token readers are displayed in the same window. Once a token has been inserted, an additional tab will be displayed. Selecting the tab will display the information of the token. The left panel contains the Label, Certificates, Container, Symmetric Keys and Data icons. Selecting the icon displays the parameters and its associated values on the left panel. 9
10 3.1.1 Token Configurator Menu About Token Configurator Preferences Shows a window that contains further information about the Token Configurator application. This gives you the option to view and add smart cards with new ATR value. Viewing supported cards: To view the list of supported cards just go to Token Configurator - Preferences Supported Cards. Adding supported cards: Token Configurator can be used to associate smart card operating systems with new ATRs. 10
11 Follow these steps to make a new ATR/Card OS association: 1. Go to SmartCard Admin - Preferences - Supported Cards Tab. 2. Click on the "+" sign found in the lower left corner. 3. Enter the Historical Bytes. 4. Select the Type of the smart card operating system on the drop-down list. 5. Click on Add. The newly added card can now be viewed on the Supported Cards list. Quit Token Configurator Quits the Token Configurator application. 11
12 3.1.2 File Menu Import Export Allows you to import RSA keys and certificates from an.cer,.pfx or.p12 file. You may also drag the file from the finder to the left content list of the token. Allows you to export certificates in to your computer. 12
13 3.1.3 Edit Menu Delete Allows you to delete a certificate or key. To do this, just highlight the certificate or key and go to Edit - Delete Token Menu 13
14 Login PIN means "Personal Identification Number". It is a unique personal code or password which is often used to authenticate the user and gain access to various systems such as credit and debit cards, bank, and computer accounts. One common example are Automatic Teller Machines (ATMs). When the user entered the correct PIN, the user is granted access to the system. Prior to operations on the token, the user is required to log in with his User PIN or SO-PIN. Once logged in, additional information becomes available, both within the left and the right panel. Failing to enter the correct User PIN three times in a row locks the card. See Reset PIN on how to clear the lock. The hardware configuration and user settings determine the initial PIN entry method. To change the entry method, click on the drop down button and choose an entry method. Supported entry methods are: ASCII Every character is valid. However, the card may not support unusual characters. Numeric Each character of the PIN needs to be a number ( 0 9 ). This can be used to ensure PINPAD compatibility. Hex The PIN has to be entered in a hexadecimal format. Two digits will be converted to one character of the PIN, e.g 61 to a, 62 to b, 63 to c For each digit the valid values are characters 0-9 and a - f. PINPAD This option is only available when a reader with a pinpad is connected and authentication to the inserted token is possible via secure PIN entry. When this option is selected, the edit text for the PIN will be disabled and the user must input the PIN from the corresponding Secure PIN Entry (SPE) reader. Logout This item works analogous to the Login option. Change User PIN and Change SO PIN 14
15 These functions work very similar to each other. These functions are always available, and all require an authorization PIN to make a change. The changed value has to be entered twice to avoid mistyping. All values are masked with bullets to provide privacy. The PIN entry method can be changed the same way as in the login dialog. Usually there are 3 PINs on a token: the User PIN, the SO PIN (PIN of the system operator, i.e. system administrator) and the Card PIN. The term Card PIN is used for USB Tokens as well. Please note that not all cards and tokens support changing all PINs. The CSSI for Mac supports alphanumeric PINs and is not restricted to numeric digits in general. The User PIN must be entered to write on the card (e.g. key generation, storing a certificate), delete objects or to use cryptographic functions (e.g. signing or decryption). Refer to the table below regarding the default User PIN and User PIN length. IMPORTANT: After three consecutive wrong inputs the User PIN will be locked. A locked User PIN can be unlocked or reset by the SO PIN, which is also known as the PUK. Refer to the table below regarding default SO PIN and SO PIN length. The SO PIN is required for unlocking the User PIN. 15
16 IMPORTANT: After ten consecutive wrong inputs the SO PIN will be locked. Constraints for PIN lengths: PIN (default) Charismathics Profile PKCS#15 Profile CNS Profile User PIN ( ) SO PIN ( ) Reset PIN As a security measure a token will be locked if a user enters a wrong PIN three times in a row. This provides security since an unauthorized person could otherwise check all possible PINs by trial and error if you lost your smart card or USB token, or it has been stolen. But it might happen that you have entered the wrong PIN three times even as a legitimate owner of the smart card. In this case, the smart card will be locked as well. Therefore, you can unlock the smart card with the Reset PIN option, if you know the SO PIN. Generate Key To use the smart card for digital signatures or encryption, you need a key pair, which is composed of a private and a public key. The private key must be securely stored and the public key must be accessible to communication partners by a certificate. These keys and certificates can be generated and managed by Token Configurator. 16
17 In principle there are two possibilities: 1. You can generate keys (key pairs comprising private and public keys and secret keys) with the ad-ministration tool of Charismathics Smart Security Interface. 2. You already own a key and/or key pair. Then, you can import the key pair if necessary together with certificate as a PFX-file. Please refer to Chapter File Menu - Import on how to Import keys. Use of these functions requires that you are logged into the smart card: go to Token - Login and enter your User PIN. The generation of a key pair (private and public key) is accessed from the Token - Generate Key. Once the generation process is finished, you can view these keys in the left panel under Container or Symmetric Keys. Create Certificate Request and Create Selfsigned Certificate In order to use the smart card for digital signatures or encryption you need a key pair, i.e private key and corresponding public key. The public key is made accessible to communication partners via a certificate. Certificates can be generated and managed by the Token Configurator. These options help you to manage certificates: Create Selfsigned Certificate - The certificate is signed with your private key. This means it is not issued from a well-known Certificate Authority (CA) and each user of this certificate has to manually specify it is trusted. Create Certificate Request (Generate CSR) - Well-known CAs are usually already preset as "trusted" certificate issuers on most operating systems, that means the certificate will be trusted without any further interaction. In order to generate the certificate request you enter the data into the corresponding fields. In case of a certificate request, you create a file to send it to the authority that should sign the certificate (e.g. trust center). Therefore, you store the request as a p10 file in a directory and follow the instructions of the corresponding authority intended to sign the certificate. Once the certificate has been returned by the issuer, you have to import the certificate by going to File - Import. Please refer to Chapter File Menu - Import on how to Import certificates. 17
18 Rebuild Profile It is possible to delete an existing profile on a card and set up a new profile with the Card PIN. The Card PIN will be determined during the initialization and can only be changed afterwards by creating a new profile. The length of the Card PIN is exactly ten characters. Smart card with profile: If there is already a profile on the card and you want to create a new one, the existing profile will be deleted as a first step. To erase the profile, you need to enter the Card PIN used to initialize the card. The default Card PIN is " ". Empty Smart Card: During initialization, the Card PIN, the SO PIN, the User PIN and a Serial Number are required. Additionally a Label for the token can be assigned. IMPORTANT: After ten consecutive wrong inputs the PIN is locked and the card cannot be deleted anymore, i.e. if the Card PIN, the SO PIN and the User PIN are locked, the token is useless. 18
19 3.1.5 Window Menu Minimize Minimizes the Token Configurator window. Zoom Maximizes the Token Configurator window. 19
20 4 User Tool: Charismathics CSSI This tool exposes all relevant functions if you acquired Charismathics Smart Security Interface in the user edition. Insert your smart card in the reader and open Charismathics Smart Security Interface Utility by following the path: /Applications/Charismathics/ScardUtility.app 4.1 Change PIN To change your PIN, insert the old PIN followed by the new PIN which must be entered a second time as confirmation. The minimum length of the User PIN is four characters and the maximal length is ten characters. Click on the button "Change PIN", and you receive a window with the confirmation. IMPORTANT: After three consecutive wrong inputs the User PIN will be locked. Please choose a PIN, which you can remember well, but which cannot be easily guessed. Avoid birthdays or simple sequences of numbers like 1234 or
21 4.2 Unlock PIN To unlock your PIN, enter the SO PIN followed by the new PIN, which must be entered a second time as confirmation. The minimal length of the User PIN is four characters and the maximal length is ten characters. Click on the button "Unlock PIN" and a confirmation window opens. 4.3 Change Token SO PIN To change the Token SO PIN, enter the SO PIN followed by the new SO PIN, which must be entered a second time as confirmation. The minimum and maximum length of the SO PIN is dependent on the card OS. Click on the button "Change SO PIN" and a confirmation window opens. 21
22 5 Configuring Application with PKCS# Configuring Firefox Note: a) Make sure to have a card reader connected before configuring FireFox and Thunderbird. b) Some version of the Firefox Browse button is not working correctly and gives a garbled path. It requires you to type manually the full path in the "path" field. To prevent mistyping, it is recommended to follow the instructions below. 1. Open Mozilla Firefox. 2. Go to Firefox (toolbar) Preferences. 3. Go to Advanced tab Encryption tab. 4. Click Security Device. The Device Manager window will open. 5. Click on Load. 6. Leave the Module Name s default value which is New PKCS#11 Module. 7. Browse the path of libcmp11.dylib to the Module filename. The file path should be /Application/Charismathics/libcmP11.dylib 8. Click OK. 9. A Confirm dialog will prompt. Just click OK. 10. An Alert window will prompt A new security module has been installed. This means that you have successfully loaded the libcmp11.dylib module. Just press OK and you are done. 22
23 6.2 Configuring Thunderbird Configuring libcmp11.dylib in Thunderbird is just the same as Firefox. Please refer to 4.1 Configuring Firefox. 23
24 7 Configuring Applications with tokend 7.1 Configuring Mail Prerequisites: When Mail.app is launched, a token needs to be inserted that has a valid certificate for one of the accounts and its corresponding private key. After launching Mail.app, it will not search again for certificates. 1. Open Mail. 2. Click New Message. 3. Click on the Sign and Encrypt button for signing and encrypting s. 7.2 Configuring Entourage 1. Open Entourage. 2. Go to Entourage Account Settings. 3. Double click on your account. 4. In the Edit Account dialog, select Mail Security tab. 5. In the Digital Signing area, click the Select button. 6. Select your Digital Signing certificate from the list. 24
25 7. Click Choose. 8. Select your Encryption certificate from the list. 9. Click Choose. 10. Once you have selected your certificates, set the following options: Select Digitally sign all outgoing messages by default Select Send digitally signed messages as clear text This ensures that recipients can read your signed messages. It is important if your recipient is using a web-based or mobile mail client. Select Include my signing and encryption certificates in signed messages This option includes your public encryption key so that someone else can use it to send you encrypted messages. 25
26 26
Charismathics Smart Security Interface. User Manual V 5.0
Charismathics Smart Security Interface User Manual V 5.0 1 Contents 1 Preface... 5 2 About this Manual... 6 3 Installation... 7 3.1 Installation Requirements... 7 3.2 Supported Smart Cards... 8 3.3 10
VeriSign PKI Client Government Edition v 1.5. VeriSign PKI Client Government. VeriSign PKI Client VeriSign, Inc. Government.
END USER S GUIDE VeriSign PKI Client Government Edition v 1.5 End User s Guide VeriSign PKI Client Government Version 1.5 Administrator s Guide VeriSign PKI Client VeriSign, Inc. Government Copyright 2010
6. Is it mandatory to have the digital certificate issued from NICCA?...3. 7. Is it mandatory for the sender and receiver to have a NIC email id?...
FAQ FOR S/MIME 1. What is S/MIME?...2 2. What is digital certificate?...2 3. What is an encrypted email?...2 4. Is it mandatory to use this service?...2 5. What I need to do to start using S/MIME service?...2
DIGIPASS CertiID. Getting Started 3.1.0
DIGIPASS CertiID Getting Started 3.1.0 Disclaimer Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis, without any other warranties, or conditions, express
USER GUIDE WWPass Security for Email (Outlook) For WWPass Security Pack 2.4
USER GUIDE WWPass Security for Email (Outlook) For WWPass Security Pack 2.4 March 2014 TABLE OF CONTENTS Chapter 1 Welcome... 4 Introducing WWPass Security for Email (Outlook)... 5 Supported Outlook Products...
Digital Signatures on iqmis User Access Request Form
Digital Signatures on iqmis User Access Request Form When a user clicks in the User Signature block on the iqmis Access Form, the following window appears: Click Save a Copy and rename it with your name,
SafeNet Authentication Client (Mac)
SafeNet Authentication Client (Mac) Version 8.2 SP2 Revision A Administrator s Guide 1 Copyright 2014 SafeNet, Inc. All rights reserved. All attempts have been made to make the information in this document
GoldKey Software. User s Manual. Revision 7.12. WideBand Corporation www.goldkey.com. Copyright 2007-2014 WideBand Corporation. All Rights Reserved.
GoldKey Software User s Manual Revision 7.12 WideBand Corporation www.goldkey.com 1 Table of Contents GoldKey Installation and Quick Start... 5 Initial Personalization... 5 Creating a Primary Secure Drive...
Use of Common Access Cards (CACs) from Home on Windows 7 without Middleware
Use of Common Access Cards (CACs) from Home on Windows 7 without Middleware Problem: Microsoft Windows 7 includes a native capability to read and use the newest CACbased PKI certificates without installing
I. Configuring Digital signature certificate in Microsoft Outlook 2003:
I. Configuring Digital signature certificate in Microsoft Outlook 2003: In order to configure Outlook 2003 to use the new message security settings please follow these steps: 1. Open Outlook. 2. Go to
PROXKey Tool User Manual
PROXKey Tool User Manual 1 Table of Contents 1 Introduction...4 2 PROXKey Product... 5 2.1 PROXKey Tool... 5 2.2 PROXKey function modules...6 2.3 PROXKey using environment...6 3 PROXKey Tool Installation...7
TrustKey Tool User Manual
TrustKey Tool User Manual 1 Table of Contents 1 Introduction... 5 2 TrustKey Product...6 2.1 TrustKey Tool... 6 2.2 TrustKey function modules...7 2.3 TrustKey using environment...7 3 TrustKey Tool Installation...
Outlook Web Access 2003 Remote User Guide
UNITED STATES COAST GUARD Outlook Web Access 2003 Remote User Guide Using Common Access Card Access TISCOM TIS-42 07/29/2008 Version 1.0 CAC Enabled Outlook Web Access CAC Enabled OWA is a way to view
Shakambaree Technologies Pvt. Ltd.
Welcome to Support Express by Shakambaree Technologies Pvt. Ltd. Introduction: This document is our sincere effort to put in some regular issues faced by a Digital Signature and USB Token user doing on
Token User Guide. Version 1.0/ July 2013
Token User Guide Version 1.0/ July 2013 Index Overview... 3 Usage requirements... 4 KIT contents... 5 Smart Card installation... 6 Reader driver installation... 7 In the case of Windows XP... 7 In the
CHARTER BUSINESS custom hosting faqs 2010 INTERNET. Q. How do I access my email? Q. How do I change or reset a password for an email account?
Contents Page Q. How do I access my email? Q. How do I change or reset a password for an email account? Q. How do I forward or redirect my messages to a different email address? Q. How do I set up an auto-reply
USER GUIDE WWPass Security for Windows Logon
USER GUIDE WWPass Security for Windows Logon December 2015 TABLE OF CONTENTS Chapter 1 Welcome... 3 Introducing WWPass Security for Windows Logon... 4 Related Documentation... 4 Presenting Your PassKey
Product Release Bulletin
Product Release Bulletin Product: Nexus Personal Version: 4.10 Availability date: 1st February 2009 General information This is a standard, generally available Nexus Personal release. It is available for
E-CERT C ONTROL M ANAGER
E-CERT C ONTROL M ANAGER for e-cert on Smart ID Card I NSTALLATION G UIDE Version v1.7 Copyright 2003 Hongkong Post CONTENTS Introduction About e-cert Control Manager... 3 Features... 3 System requirements...
Website Administration Security Guide
Website Administration Security Guide September 2012 TABLE OF CONTENTS Introduction... 1 General Overview... 1 System Requirements... 1 Important Administrator Terms... 2 Security Services Administration...
Enhancing TAM E-SSO with smart phones, smart cards and other tokens. IBM Tivoli Talk
Enhancing TAM E-SSO with smart phones, smart cards and other tokens Sven Gossel IBM Tivoli Talk October 7 th, 2011 Charismathics Milestones 2005 2007 2010 Re-inventing PKI middleware Re-inventing Trusted
User Guide Remote Access to VDI/Workplace Using PIV
User Guide Remote Access to VDI/Workplace Using PIV Innovation & Engineering Office (IM-64) May 2015 Table of Contents 1 Overview... 3 1.1 Web Browsers... 3 1.2 Operating Systems... 3 2 Types of Smart
Entrust Managed Services PKI Administrator Guide
Entrust Managed Services PKI Entrust Managed Services PKI Administrator Guide Document issue: 3.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust is a trademark or a registered
Guide for Securing E-mail With WISeKey CertifyID Personal Digital Certificate (Personal eid)
The World Internet Security Company Solutions for Security Guide for Securing E-mail With WISeKey CertifyID Personal Digital Certificate (Personal eid) Wherever Security relies on Identity, WISeKey has
User Guide. Time Warner Cable Business Class Cloud Solutions Control Panel. Hosted Microsoft Exchange 2007 Hosted Microsoft SharePoint 2007
Chapter Title Time Warner Cable Business Class Cloud Solutions Control Panel User Guide Hosted Microsoft Exchange 2007 Hosted Microsoft SharePoint 2007 Version 1.1 Table of Contents Table of Contents...
Creating a New Digital ID or Signature for Adobe Acrobat
Creating a New Digital ID or Signature for Adobe Acrobat If you are not using a third-party digital ID, you can create your own in Adobe Acrobat Professional or in Adobe Reader 9, 10 or X. Follow these
VPN Web Portal Usage Guide
VPN Web Portal Usage Guide Table of Contents WHAT IS VPN WEB CLIENT 4 SUPPORTED WEB BROWSERS 4 LOGGING INTO VPN WEB CLIENT 5 ESTABLISHING A VPN CONNECTION 6 KNOWN ISSUES WITH MAC COMPUTERS 6 ACCESS INTRANET
Yubico PIV Management Tools
Yubico PIV Management Tools Active Directory Smart Card Logon using the YubiKey NEO or NEO-n Document Version 1.0 April 15, 2015 Yubico PIV Management Tools 2015 Yubico. All rights reserved. Page 1 of
APNS Certificate generating and installation
APNS Certificate generating and installation Quick Guide for generating and installing an Apple APNS Certificate Version: x.x MobiDM Quick Guide for APNS Certificate Page 1 Index 1. APPLE APNS CERTIFICATE...
User Guide Remote PIV to VDI Using a PIV Card
User Guide Remote PIV to VDI Using a PIV Card Energy IT Services (IM-64) March 2015 Authors Prepared By Matthew Cummings Senior Systems Engineer IM-64 Version Control Date Version Document Revision Description
X.509 Certificate Generator User Manual
X.509 Certificate Generator User Manual Introduction X.509 Certificate Generator is a tool that allows you to generate digital certificates in PFX format, on Microsoft Certificate Store or directly on
Windows and MAC User Handbook Remote and Secure Connection Version 1.01 09/19/2013. User Handbook
Windows and MAC User Handbook How to Connect Your PC or MAC Remotely and Securely to Your U.S. Department of Commerce Account Developed for You by the Office of IT Services (OITS)/IT Service Desk *** For
Guide to Obtaining Your Free WISeKey CertifyID Personal Digital Certificate on Aladdin etoken (Personal eid)
The World Internet Security Company Solutions for Security Guide to Obtaining Your Free WISeKey CertifyID Personal Digital Certificate on Aladdin etoken (Personal eid) Wherever Security relies on Identity,
Table of Contents. Welcome... 2. Login... 3. Password Assistance... 4. Self Registration... 5. Secure Mail... 7. Compose... 8. Drafts...
Table of Contents Welcome... 2 Login... 3 Password Assistance... 4 Self Registration... 5 Secure Mail... 7 Compose... 8 Drafts... 10 Outbox... 11 Sent Items... 12 View Package Details... 12 File Manager...
Using etoken for Securing E-mails Using Outlook and Outlook Express
Using etoken for Securing E-mails Using Outlook and Outlook Express Lesson 15 April 2004 etoken Certification Course Securing Email Using Certificates Unprotected emails can be easily read and/or altered
Connecting to Delta College Exchange services off-campus
Connecting to Delta College Exchange services off-campus The following instructions are provided to document the client configuration used to connect to Microsoft Exchange services at Delta College from
Adobe Reader Settings
Adobe Reader Settings Table of Contents Adobe 9 and X (10) Reader Settings...2 For Adobe Reader X (10)... 5 Adobe Reader XI (11)...7 Internet Explorer 8 and 9... 8 Google Chrome... 9 Mozilla Firefox...
DIGIPASS KEY series and smart card series for Juniper SSL VPN Authentication
DIGIPASS KEY series and smart card series for Juniper SSL VPN Authentication Certificate Based 2010 Integration VASCO Data Security. Guideline All rights reserved. Page 1 of 31 Disclaimer Disclaimer of
VMware Horizon FLEX User Guide
Horizon FLEX 1.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this
Getting Started. Getting Started with Time Warner Cable Business Class. Voice Manager. A Guide for Administrators and Users
Getting Started Getting Started with Time Warner Cable Business Class Voice Manager A Guide for Administrators and Users Table of Contents Table of Contents... 2 How to Use This Guide... 3 Administrators...
SafeNet Authentication Client (Windows)
SafeNet Authentication Client (Windows) Version 8.1 SP1 Revision A User s Guide Copyright 2011 SafeNet, Inc. All rights reserved. All attempts have been made to make the information in this document complete
Document Digital Signature
Supplier handbook Software Configuration for Digital Signature and Timestamp to certificate-based signature Document objectives and structure The document aims to support suppliers during the following
Guide to Obtaining Your Free WISeKey CertifyID Personal Digital Certificate (Personal eid) WISeKey 2010 / Alinghi 2010 Smartcards
The World Internet Security Company Solutions for Security Guide to Obtaining Your Free WISeKey CertifyID Personal Digital Certificate (Personal eid) WISeKey 2010 / Alinghi 2010 Smartcards Wherever Security
KOBIL Smart Key V3.0 User s Guide. August 15th, 2006 English Version
KOBIL Smart Key V3.0 User s Guide August 15th, 2006 English Version Contents 1 What is KOBIL Smart Key? 3 1.1 About KOBIL Smart Key............................................... 3 1.2 Advantages in your
Reading an email sent with Voltage SecureMail. Using the Voltage SecureMail Zero Download Messenger (ZDM)
Reading an email sent with Voltage SecureMail Using the Voltage SecureMail Zero Download Messenger (ZDM) SecureMail is an email protection service developed by Voltage Security, Inc. that provides email
Product Description. SafeSign Identity Client Standard. Version 3.0 for Linux
SafeSign Identity Client Standard Version 3.0 for Linux This document contains information of a proprietary nature. No part of this document may be reproduced or transmitted in any form or by any means
PKI Contacts PKI for Fraunhofer Contacts
Fraunhofer Competence Center PKI PKI Contacts PKI for Fraunhofer Contacts User manual for communication partners of the Fraunhofer-Gesellschaft Author[s]: Uwe Bendisch, Maximilian Gottwald As at: 15.10.2013
SecureStore I.CA. User manual. Version 2.16 and higher
User manual Version 2.16 and higher Contents SecureStore I.CA 1. INTRODUCTION...3 2. ACCESS DATA FOR THE CARD...3 2.1 Card initialisation...3 3. MAIN SCREEN...4 4. DISPLAYING INFORMATION ABOUT THE PAIR
Enhancing IBM SAM E-SSO s Strong Authentication capabilities with smart phones, smart cards and other tokens
Enhancing IBM SAM E-SSO s Strong Authentication capabilities with smart phones, smart cards and other tokens Sven Gossel IBM Security Talk May 24 th, 2012 Desktop and Application virtualization are creating
epass2003 User Guide V1.0 Feitian Technologies Co., Ltd. Website: www.ftsafe.com
epass2003 User Guide V1.0 Feitian Technologies Co., Ltd. Revision History: Date Revision Description June 2013 V1.0 Release of the first version i Software Developer s Agreement All Products of Feitian
ADFS Integration Guidelines
ADFS Integration Guidelines Version 1.6 updated March 13 th 2014 Table of contents About This Guide 3 Requirements 3 Part 1 Configure Marcombox in the ADFS Environment 4 Part 2 Add Relying Party in ADFS
How To Sync Google Drive On A Mac Computer With A Gmail Account On A Gcd (For A Student) On A Pc Or Mac Or Mac (For An Older Person) On An Ipad Or Ipad (For Older People) On
Installation and Setup of Google Drive for Students on Mac OS X Purpose: This guide will lead you through the Google Drive Installation and Configuration. Pre-requisites: 1) ODU Student Gmail account 2)
dobe Acrobat XI Pro Digital Signatures
dobe Acrobat XI Pro Digital Signatures Intermediate Adobe Acrobat XI Pro is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License. To view a copy of this
DoD CAC Middleware Requirements Release 4.0
DoD CAC Middleware Requirements Release 4.0 Version 1.01 26 November 2012 Prepared by: DoD Identity Protection and Senior Coordinating Group s (IPMSCG) Test and Evaluation Work Group (TEWG) UNCLASSIFIED
Overview ActivClient for Windows 6.2
Overview ActivClient for Windows 6.2 ActivClient for Windows Overview P 2 Table of Contents Chapter 1: Introduction.....................................................................6 About ActivClient.......................................................................
Instructions for Configuring Your Browser Settings and Online Security FAQ s. ios8 Settings for iphone and ipad app
Instructions for Configuring Your Browser Settings and Online Security FAQ s ios8 Settings for iphone and ipad app General Settings The following browser settings and plug-ins are required to properly
Creating Digital Signatures
About Security You can secure a PDF using any of the following security methods: Add passwords and set security options to restrict opening, editing, and printing PDFs. Encrypt a document so that only
How To Configure An Activcard Smart Card With An Hp Powerbook On A Pc Or Ipa (Powerbook) On A Powerbook 2 (Powercard) On An Hpla 2 (Ahemos) Or Powerbook (Power Card
Implementing ActivIdentity Smart Cards for Use with HP Compaq t5720 Thin Clients and HP Blade PCs Introduction............................................................ 2 Prerequisites............................................................
MHC CareMail User Guide
MHC CareMail User Guide Get Started with MHC CareMail Secure Communications Version 1.7 Table of Contents About MHC CareMail Communications... 4 Getting Started with... 5 Your MHC CareMail Account... 5
Employee Express - PIV Card Registration Instructions
Employee Express - PIV Card Registration Instructions Steps for Registering your GSA Access/PIV Card 1. Navigate to https://www.employeeexpress.gov/defaultlogin.aspx. 2. Insert your GSA Access Card* into
System Administration Training Guide. S100 Installation and Site Management
System Administration Training Guide S100 Installation and Site Management Table of contents System Requirements for Acumatica ERP 4.2... 5 Learning Objects:... 5 Web Browser... 5 Server Software... 5
Vantage RADIUS 50. Quick Start Guide Version 1.0 3/2005
Vantage RADIUS 50 Quick Start Guide Version 1.0 3/2005 1 Introducing Vantage RADIUS 50 The Vantage RADIUS (Remote Authentication Dial-In User Service) 50 (referred to in this guide as Vantage RADIUS)
New Online Banking Guide for FIRST time Login
New Online Banking Guide for FIRST time Login Step 1: Login Enter your existing Online Banking User ID and Password. Click Log-In. Step 2: Accepting terms and Conditions to Proceed Click on See the terms
Smart Card Installation and Configuration Guide
Version 3.0 October 2014 Smart Card Installation and Configuration Guide (CAC/PIV/.Net/Access Client & Rijkspas) Xerox WorkCentre 3655 Multifunction Printer Xerox WorkCentre 5845/5855/5865/5875/5890 Multifunction
1. Open the preferences screen by opening the Mail menu and selecting Preferences...
Using TLS encryption with OS X Mail This guide assumes that you have already created an account in Mail. If you have not, you can use the new account wizard. The new account wizard is in the Accounts window
Adobe Digital Signatures in Adobe Acrobat X Pro
Adobe Digital Signatures in Adobe Acrobat X Pro Setting up a digital signature with Adobe Acrobat X Pro: 1. Open the PDF file you wish to sign digitally. 2. Click on the Tools menu in the upper right corner.
Managed Services PKI 60-day Trial Quick Start Guide
Entrust Managed Services PKI Managed Services PKI 60-day Trial Quick Start Guide Document issue: 3.0 Date of issue: Nov 2011 Copyright 2011 Entrust. All rights reserved. Entrust is a trademark or a registered
Learning Management System (LMS) Quick Tips. Contents LMS REFERENCE GUIDE
Learning Management System (LMS) Quick Tips Contents Process Overview... 2 Sign into the LMS... 3 Troubleshooting... 5 Required Software... 5 Mobile devices are not supported... 5 Using the Check System
Entrust Managed Services PKI. Configuring secure LDAP with Domain Controller digital certificates
Entrust Managed Services Entrust Managed Services PKI Configuring secure LDAP with Domain Controller digital certificates Document issue: 1.0 Date of issue: October 2009 Copyright 2009 Entrust. All rights
Access Control and Audit Trail Software
Varian, Inc. 2700 Mitchell Drive Walnut Creek, CA 94598-1675/USA Access Control and Audit Trail Software Operation Manual Varian, Inc. 2002 03-914941-00:3 Table of Contents Introduction... 1 Access Control
SECURE EMAIL USER GUIDE OUTLOOK 2000
WELLS FARGO AUTHENTICATION SERVICES DATED: MAY 2003 TABLE OF CONTENTS GENERAL INFORMATION... 1 INSTALLING THE WELLS FARGO ROOT CERTIFICATE CHAIN.. 2 INSTALLING THE CERTIFICATES INTO IE... 3 SETTING UP
Importing your personal certificate(s) to Microsoft Internet Explorer from a Back-up (or export) file
Importing your personal certificate(s) to Microsoft Internet Explorer from a Back-up (or export) file You may use your Medium Assurance Certificate(s) on any computer that you wish to by importing them
RAPIDS Self Service User Guide
Page 1 RAPIDS Self Service User Guide https://www.dmdc.osd.mil/self_service Page 2 Introduction The RAPIDS Self Service (RSS) application provides sponsors with the capability to generate a DD Form 1172-2
OS X 10.6 SNOW LEOPARD: KEYCHAIN ACCESS MANAGING & UNDERSTANDING KEYCHAIN
OS X 10.6 SNOW LEOPARD: KEYCHAIN ACCESS MANAGING & UNDERSTANDING KEYCHAIN MANAGING KEYCHAINS Mac OS X features a sophisticated system that automatically protects all your authentication assets in encrypted
How to Publish Your Smart Card Certificates Using Outlook 2010
How to Publish Your Smart Card Certificates Using Outlook 2010 To send or receive (and read) digitally signed or encrypted email messages with colleagues at NIH, you must first publish your PIV certificate
Managing Identities and Admin Access
CHAPTER 4 This chapter describes how Cisco Identity Services Engine (ISE) manages its network identities and access to its resources using role-based access control policies, permissions, and settings.
Lotus Notes Client Version 8.5 Reference Guide
Lotus Notes Client Version 8.5 Reference Guide rev. 11/19/2009 1 Lotus Notes Client Version 8.5 Reference Guide Accessing the Lotus Notes Client From your desktop, double click the Lotus Notes icon. Logging
Smart Card Certificate Authentication with VMware View 4.5 and Above WHITE PAPER
Smart Card Certificate Authentication with VMware View 4.5 and Above WHITE PAPER Table of Contents.... About This Paper.... 3 Introduction... 3 Smart Card Overview.... 3 Getting Started... 4 Authenticating
Quick Start Guide to Logging in to Online Banking
Quick Start Guide to Logging in to Online Banking Log In to Internet Banking: Note: The first time you log in you are required to use your Customer ID. Your Customer ID is the primary account holder s
Jumble for Microsoft Outlook
Jumble for Microsoft Outlook Jumble is a zero knowledge, end- to- end email encryption solution that integrates with existing email platforms. Jumble integrates at the email client level and removes the
IBM Client Security Solutions. Client Security User's Guide
IBM Client Security Solutions Client Security User's Guide December 1999 1 Before using this information and the product it supports, be sure to read Appendix B - Notices and Trademarks, on page 22. First
Using Entrust certificates with Microsoft Office and Windows
Entrust Managed Services PKI Using Entrust certificates with Microsoft Office and Windows Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust is a trademark
Contents. Getting Started...1. Managing Your Drives...14. Backing Up & Restoring Folders...28. Synchronizing Folders...48. Managing Security...
Contents Getting Started.....................................................1 Using the Formatting Tool........................................1 Preparing the Software Manually..................................4
Table of Contents. zipform 6 User Guide
Table of Contents Welcome 4 Creating and Using Transactions.. 4 How to Create a Transaction...... 4 Creating a Transaction Using a Template....... 5 Adding and Removing Forms from a Transaction.......
Using Rackspace Webmail
Using Rackspace Webmail Contents 1. Logging into Rackspace Webmail... 1 2. Add/Change your Signature... 2 3. Configure audible notifications... 5 4. Manage Auto-Reply ( Out of Office /Vacation responder)...
EURECOM VPN SSL for students User s guide
EURECOM VPN SSL for students User s guide Table of Contents Introduction... 2 Login process... 2 Portail main page... 2 Prerequisite... 2 RSA SecurId software token... 3 First usage of RSA SecurID token...
Yale Software Library
Yale Software Library http://www.yale.edu/its/software/ For assistance contact the ITS Help Desk 203-432-9000, [email protected] Two-factor authentication: Installation and configuration instructions for
User Guide. Digital Signature
User Guide Digital Signature ENTRUST ESP 9..2 Document version: 2.2 Publication date: January 2014 This guide is the exclusive property of Notarius Inc. All reproduction, printing or distribution of this
Initial Setup of Mozilla Thunderbird with IMAP for Windows 7
Initial Setup of Mozilla Thunderbird Concept This document describes the procedures for setting up the Mozilla Thunderbird email client to download messages from Google Mail using Internet Message Access
PUBLIC Secure Login for SAP Single Sign-On Implementation Guide
SAP Single Sign-On 2.0 SP04 Document Version: 1.0-2014-10-28 PUBLIC Secure Login for SAP Single Sign-On Implementation Guide Table of Contents 1 What Is Secure Login?....8 1.1 System Overview.... 8 1.1.1
Sophos Mobile Control SaaS startup guide. Product version: 6
Sophos Mobile Control SaaS startup guide Product version: 6 Document date: January 2016 Contents 1 About this guide...4 2 About Sophos Mobile Control...5 3 What are the key steps?...7 4 Change your password...8
Administration Guide ActivClient for Windows 6.2
Administration Guide ActivClient for Windows 6.2 ActivClient for Windows Administration Guide P 2 Table of Contents Chapter 1: Introduction....................................................................12
Entrust Managed Services PKI
Entrust Managed Services PKI Entrust Managed Services PKI Windows Smart Card Logon Configuration Guide Using Web-based applications Document issue: 1.0 Date of Issue: June 2009 Copyright 2009 Entrust.
Digital Signature User Guide for Acrobat 9.0 and Adobe Reader 9.0
bc PDF Creation Date: November 17, 2008 Digital Signature User Guide for Acrobat 9.0 and Adobe Reader 9.0 Acrobat and Adobe Reader Version 9.0 2008 Adobe Systems Incorporated. All rights reserved. Digital
Prerequisite. Getting Started. Email Signing and Encryption using Microsoft outlook 2007
Email Signing and Encryption using Microsoft outlook 2007 Prerequisite a. The user s email account has been added and correctly configured into Microsoft outlook. b. The user has an authentication certificate.
Remote Access Instructions
document rev. 8 updated 6/28/2012 Remote Access Instructions Table of Contents... Page 1 Finding the AFS Remote Access links and the AFS home page... 2 First time login with RSA fob (AFS option 1 SSL VPN
CONNECT-TO-CHOP USER GUIDE
CONNECT-TO-CHOP USER GUIDE VERSION V8 Table of Contents 1 Overview... 3 2 Requirements... 3 2.1 Security... 3 2.2 Computer... 3 2.3 Application... 3 2.3.1 Web Browser... 3 2.3.2 Prerequisites... 3 3 Logon...
How to Setup your E-mail Account -Apple Mail for Mac OS X 1- Open Mail
How to Setup your E-mail Account -Apple Mail for Mac OS X 1- Open Mail 2- The welcome screen will appear as follow: Fill in the above information as follow Full Name: type your display name E-Mail address:
Using Mac OS X 10.7 Filevault with Centrify DirectControl
Using Mac OS X 10.7 Filevault with Centrify DirectControl August 2011, Revision 2 OS X 10.7's Filevault has the ability to encrypt the entire disk. Full Disk Encryption is compatible with Centrify Active
DOD INTERIM CREDENTIAL IMPLEMENTATION INSTRUCTIONS BlackBerry Devices
DOD INTERIM CREDENTIAL IMPLEMENTATION INSTRUCTIONS BlackBerry Devices A. INTRODUCTION 1. The objective of this document is to provide an outline of the technical and administrative process necessary to
