Smart card access to RTE s IS under Microsoft Windows 7

Size: px
Start display at page:

Download "Smart card access to RTE s IS under Microsoft Windows 7"

Transcription

1 Smart card access to RTE s IS under Microsoft Windows 7 PKI User guide Version 3, June 17 th 2016 Programmes & SI (PSI) TOUR MARCHAND 41 RUE BERTHELOT COURBEVOIE CEDEX TEL : FAX : LONG

2 Page : 2/106 Access to RTE s Information System by software certificates under Microsoft Windows 10 PKI user guide TABLE OF CONTENTS A. FOREWORD 5 1 Introduction Document purpose Context Warning regarding security practices The actors The client Registration Authority (RA) Certification Authority (CA) 8 B. certificates management ProcEdures 9 2 Certificates management process Foreword Software certificate request Preliminary steps Smart card reception Certificates renewal Revocation of certificates Case of revocation Revocation request 12 C. Workstation configuration 13 3 Installation and configuration of the workstation Network configuration General configuration Specificity of the VPN access Software configuration Installation of smart card reader 16 4 Smart card acknowledgement Foreword Acknowledgement through your browser Acknowledgement through the RTE Hotline 24 D. Web access to the RTE Information System 25

3 Page : 3/106 Access to RTE s Information System by software certificates under Microsoft Windows 10 PKI user guide 5 Microsoft Internet Explorer Preliminary configuration Configuration of the security settings Adding trusted sites Installing RTE s CA root certificate Download and install Visualisation and verification of RTE s CA root certificate Display and verification of your certificate on smart card Using your certificate Authentication and encryption Example of access to a RTE web application Additional operations Acknowledgement through the browser Connecting to the SSL VPN Foreword Prerequisite First connection Using the SSL VPN 55 6 Mozilla Firefox Preliminary configuration Configuration of security settings Adding the smart card to the security devices of Firefox Installing RTE s CA root certificate Download and install Visualisation and verification of RTE s CA root certificate Visualisation and verification of your smart card certificates Using your certificate Authentication and encryption Example of access to an RTE web application Additional operations Acknowledgement through the browser Connecting to the SSL VPN Foreword Prerequisites First connection Using the SSL VPN 87 E. Appendices 90 7 Changing the smart card PIN code 91 8 Secure environment (PKI) 95

4 Page : 4/106 Access to RTE s Information System by software certificates under Microsoft Windows 10 PKI user guide 8.1 Concepts and objects managed by a PKI What is a secure process? The importance of dual-keys Certificates Documentation Glossary Incident management and Support Support Frequently Asked Questions (FAQ) Error codes returned by 106

5 Page : 5/106 Access to RTE s Information System by software certificates under Microsoft Windows 10 PKI user guide A. FOREWORD

6 Page : 6/106 Access to RTE s Information System by software certificates under Microsoft Windows 10 PKI user guide 1 Introduction 1.1 Document purpose This document is aimed at the end user who wishes to access RTE s IS with a smart card under Microsoft Windows Seven. The present document enables the holder to: Understand the context and the principles of a secure environment (authentication, confidentiality, integrity and non-repudiation), as well as the general functioning of a public key management infrastructure (PKI). Know how to install and use his/her certificates in the following environments: o o Microsoft Windows Seven. Browsers: Internet Explorer and Mozilla Firefox for secure access with the HTTPS protocol. NOTE For the whole of this document, the pronoun «you» represents the certificate user. 1.2 Context Under the law of February 10, 2000 ( ) and the implementing decree of 16 July 2001, the operator of the public transport network has an obligation to preserve the confidentiality of economic, commercial, industrial, financial or technical information of which the disclosure would be likely to undermine the rules of free and fair competition and nondiscrimination required by law.

7 Page : 7/106 Access to RTE s Information System by software certificates under Microsoft Windows 10 PKI user guide 1.3 Warning regarding security practices Each software certificate holder has its own private key, all (certificate and associated private key) is generated by RTE and made available for download by the wearer as a passwordprotected file (PKCS # 12 file, extension "p12"). Then, each software certificate holder shall take all necessary precautions to prevent: the violation of his private key, the loss of his private key, the divulgation of his private key, the alteration of his certificate, the misuse of his certificate. Each private key and its associated certificate are stored on a smartcard protected by a password known only by the smart card holder. The Certification Authority (CA) "RTE Certification Authority" takes no responsibility for disputes related to misuse of private keys. 1.4 The actors The life cycle management of a certificate is based on three entities: the client (i.e. your company), the Registration Authority (RA), the Certification Authority (CA). NOTE To understand this better, one can draw a parallel with the allocation of official credentials: the applicant citizen of a credential is the Client; the town is the Registration Authority and the prefecture is the Certification Authority The client The client issues certificates requests for holders. It may also issue requests for revocation of the certificates (see Section B: certificate management procedures) Registration Authority (RA) The Registration Authority (RTE s manager of customer relations and the Operator) collects the certificates requests, affixes a date of validity for certificates and verifies the identity of their holders.

8 Page : 8/106 Access to RTE s Information System by software certificates under Microsoft Windows 10 PKI user guide Certification Authority (CA) The Certification Authority (RTE) is responsible and guarantor of certificates signed in its name and of the PKI s operation. It sets policy for the management and use of certificates. RTE certification authority is called: CN = RTE Certification Authority, O = RESEAU DE TRANSPORT D'ELECTRICITE

9 B. CERTIFICATES MANAGEMENT PROCEDURES Programmes & SI (PSI) TOUR MARCHAND 41 RUE BERTHELOT COURBEVOIE CEDEX TEL : FAX : LONG

10 Page : 10/106 2 Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued to holders are: obtaining a certificate (obtaining one or more certificates), renewal of a certificate (replacement by a new certificate for a new validity period and a new key pair) revocation of a certificate (end of certificate validity). 2.2 Software certificate request Preliminary steps Beforehand, the following steps must be performed, The company representative issues an access request : The company representative must have completed and signed the request forms access to RTE IS services and applications" sent by his Customer Relations Manager, and then sent it back to him. In these forms, the company representative specifies in particular: o «Certificate », o «Chosen password». We register your request : Following receipt of the forms we create your account(s) to access the applications and we make a request for a personal smart card for each holder. The company representative receives a delivery package containing : o o The «PKI Access Kit» (containing this guide), A smart card reader (one per holder)

11 Page : 11/ Smart card reception After the smart card has been registered and validated by RTE, you will receive: An express mail package containing a smart card (on which are stored your certificates and associated private keys), A personal and confidential envelope containing the PIN code associated with the smart card. For security reasons, the smart card and the associated PIN code are sent to you separately. IMPORTANT NOTES It is strongly recommended to personalise the PIN code of your smart card (see 7). It is possible to do it as soon as your card reader is installed (see 3). 2.3 Certificates renewal Certificates have a lifespan limited to 2 years, in order to give them a high level of security. If the smart card has been correctly acknowledged (see 4), then forty days before the expiry of a certificate, an electronic message is sent to the holder to inform him/her of the forthcoming expiry of his/her certificate. In case, changes must be made concerning the holder s information, then the company representative contacts RTE s responsible for customer relations to inform him of the changes. Then the holder receives: An express mail package containing a new smart card (on which are stored the new certificates and associated private keys), A personal and confidential envelope containing the PIN code associated with the new smart card. To be able to use one s new smart card, the holder must complete his/her acknowledgement (see 4). It is strongly recommended to the holder to keep his/her former smart card.

12 Page : 12/ Revocation of certificates Case of revocation The company representative must issue a revocation request when any of the following occurs: Change of the holder, Loss, theft, compromise or suspected compromise (possible, probable or certain) of his private key or associated certificate Death or cessation of business of the certificate holder, Loss of the activation data, defective or lost support. IMPORTANT NOTES To revoke a certificate, it is necessary to revoke the smart card containing it. Consequently, all certificates contained on this smart card will be revoked. Thus we will talk of revocation of smart card to represent this Revocation request To revoke a certificate, the company representative should call the RTE Hotline. When the smart card is revoked, an is sent to the contact to notify the holder of the revocation of his/her smart card.

13 Page : 13/106 C. WORKSTATION CONFIGURATION

14 Page : 14/106 3 Installation and configuration of the workstation All operations of this chapter are to be performed only once by a computer specialist with Administrator privileges on your workstation, upon receipt of your "PKI Access Kit" and the smart card reader. Also note that only a few chapters of this manual concern you: the chapters corresponding to the software you use. Except the installation of the smart card drivers (see paragraph 3.3), all operations are done under the Windows Session of the certificate holder. 3.1 Network configuration General configuration The web browser access uses - in a way that is transparent to the user - a software certificate authentication system for access to the RTE portal and encryption of data exchanged via the Internet (HTTPS protocol). Mail exchanges between RTE and the user are routed over the Internet (SMTP protocol, S/MIME format). IMPORTANT NOTE Messaging and antivirus gateways, firewalls and content analysers should be configured not to alter or reject messages that are encrypted and signed S/MIME (application / x-pkcs7-mime,.p7s,.p7m) and not to prohibit the flow of HTTPS data (port 443). The network administrator may be requested to perform these operations.

15 Page : 15/ Specificity of the VPN access The VPN allows from your workstation to establish a secure connection (based on the authentication to a dedicated site) to RTE s IS via the Internet. Access to the SSL VPN requires that your workstation can resolve the address secure.iservices.rte-france.com. To see if this is the case, open your Start menu, type run in the search bar and click the icon "Run". In the window that appears, enter the command: cmd /k ping secure.iservices.rte-france.com Click the OK button.

16 Page : 16/106 A window appears containing the information: If the first line begins with "Sending a query 'ping' on secure.iservices.rte-france.com" the address secure.iservices.rte-france.com is resolved. Your workstation is configured properly. If the first line begins with "Ping request could not find the host secure.iservices.rtefrance.com." the address secure.iservices.rte-france.com is not resolved. Please contact your IT support so that they make the necessary changes. In addition to this test, you need to install on your workstation the module JIS (Juniper Installation Service) available on the RTE customer site. Refer to the section concerning the browser you use for more details: if you use Internet Explorer if you use Mozilla Firefox. 3.2 Software configuration The software configuration required for your workstation is as follows: Operating systems: Microsoft Windows Seven 32 bits without SP or with SP1 Microsoft Windows Seven 64 bits without SP or with SP1 Web browsers either: Microsoft Internet Explorer 11 Mozilla Firefox > 45 ESR 3.3 Installation of smart card reader A Gemalto smart card reader is given. Do not plug in the smart card reader before it is asked by the procedure. In a first step, it is necessary to install the driver relative to the smart card. To do this, execute the following program which you can find in the PKI Access Kit given by RTE (see 2). The driver exists in a 32 bits or 64 bits version:

17 Page : 17/106 <PACKAGE>\Smart Card Kit\Readers_Drivers\Gemalto\Classic_Client_32_Admin_setup.msi <PACKAGE>\Smart Card Kit\Readers_Drivers\Gemalto\Classic_Client_64_Admin_setup.msi If necessary, a window appears to ask you the authorisation to execute the installation folder of the smart card reader driver. In that case click Yes. You have the opportunity to choose the installation language from the window that appears: Click OK, then wait.

18 Page : 18/106 The following window appears: Click Next.

19 Page : 19/106 Select I accept the terms in the license agreement then click Next. Click Next. The next window enables you to choose the type of installation. Choose Complete.

20 Page : 20/106 Click Next. Click Install. If necessary, a window appears and asks you to authorise the installation program to selfexecute. Click Yes.

21 Page : 21/106 The smart card reader software installation launches. Please wait during installation. Once the installation is finished, click Finish.

22 Page : 22/106 Click Yes to restart the workstation. After restarting your workstation, the icon representing a smart card reader crossed by a red cross should appear in the taskbar (near the Windows clock): Now plug in the smart card reader on a USB port of your workstation. The detection and installation of the reader are automatic. After having plugged in the reader, an information bubble indicates the installation is ongoing. The icon representing a smart card reader should appear in the taskbar. This icon indicates the reader has been installed. Then an information bubble indicates the device USB Smart Card Reader is correctly installed. An icon in the taskbar indicates the state of the smart card reader. The list below shows the different states of the smart card reader and the associated icons.

23 Page : 23/106 The smart card reader is not connected. The smart card reader is connected but doesn t contain any smart card. The smart card reader is connected and a smart card has been inserted. No certificate is available. The smart card reader is connected and a smart card has been inserted. The smart card contains a certificate.

24 Page : 24/106 4 Smart card acknowledgement 4.1 Foreword After having installed your smart card reader, received your holder card and the associated PIN code, you will need to acknowledge you received the smart card, so that the IS access request is taken into account by RTE. IMPORTANT NOTE It is necessary to fulfiil your smart card upon receipt thereof and PIN code. Without this, RTE cannot guarantee the proper functioning of the service. Acknowledgement can be done through the browser that you use to connect to the applications portal or through telephoning the RTE Hotline. This step has to be done only once by the smart card holder. 4.2 Acknowledgement through your browser The acknowledgement process through the browser you use is described in the following paragraphs: 5.5 for Microsoft Internet Explorer 6.5 for Mozilla Firefox. 4.3 Acknowledgement through the RTE Hotline If you don t have web access (HTTP), you must then make your acknowledgement demand through the RTE Hotline. You must have with you your personal identifier (input in your form n o 3). NOTE You can now connect in HTTPS mode to the web services which you have subscribed.

25 Page : 25/106 D. WEB ACCESS TO THE RTE INFORMATION SYSTEM Please refer directly to the chapter associated with the browser you are using for your default Web exchanges with RTE: Chapter 5 if you are using Microsoft Internet Explorer as your web browser Chapter 6 if you are using Mozilla Firefox as your web browser

26 Page : 26/106 5 Microsoft Internet Explorer 5.1 Preliminary configuration Configuration of the security settings This section is about the configuration of the workstation to support the SSL standard, allowing access to sites with an encrypted connection (HTTPS protocol). In the browser, select the menu "Tools> Internet Options":

27 Page : 27/106 Select the tab Advanced : In the section Security, make sure that the boxes TLS 1.0, TLS 1.1 and TLS 1.2 are ticked, as shown above Adding trusted sites In order to log on web sites with you software certificate, it is imperative to add these sites to the list of trusted sites. The Trusted Sites zone allows the declaration of sites names you consider safe. In this section, you must be logged in to the workstation with the Windows account that will use the software certificate. To do this: open Internet Explorer and click the menu "Tools> Internet Options".

28 Page : 28/106 In the window that appears, click the "Security" tab. Select the "Trusted Sites" icon and click the "Sites" button.

29 Page : 29/106 The following window appears: In the field Add this website to the zone, enter the URL corresponding to the PKI: Then click Add. The site then appears in the Websites list as shown below.

30 Page : 30/106 Proceed in the same way to add the following websites: this is the internet portal this is the SSL VPN connection portal The 3 websites shall now appear in the list Websites. Click Close, then OK.

31 Page : 31/ Installing RTE s CA root certificate Download and install RTE s CA root certificate must now be installed in your browser so that RTE is recognized as a trusted Certificate Authority To do so, please go to the following address: IMPORTANT NOTE The site s address is case-sensitive, so it is imperative to follow exactly the URL address below (upper / lower case). The download window appears: Click the "Save" button and choose a location to save the file "Certification_Autority_RTE_2048.cer" containing the root certificate. Once the download is completed, the following window appears. Click "Open folder" to go to the directory where you saved the file. Right-click the "Certification_Autority_RTE_2048.cer" file you just downloaded and choose "Install Certificate".

32 Page : 32/106 The installation wizard of the certificate is displayed: Click Next. Select "Place all certificates in the following store" and click "Browse". In the window that appears, select "Trusted Root Certification Authorities" and click "OK".

33 Page : 33/106 Once you have chosen the certificate store, you get the following window: Click «Next».

34 Page : 34/106 Click "Finish", the next window will say the root certificates have been successfully imported. Click OK.

35 Page : 35/ Visualisation and verification of RTE s CA root certificate The root certificate that you just imported, is stored in the Trusted Root Certification Authorities store of Internet Explorer. To view them, click the menu "Tools> Internet Options".

36 Page : 36/106 A window appears. Go to the "Content" tab and click the "Certificates" button. In the window that appears, go to the tab "Trusted Root Certification Authorities": Select the certificate "RTE Certification Authority". Click the button "View" then click the "Details" tab to display detailed information about the certificate.

37 Page : 37/106 To ensure the authenticity of this certificate, carefully check that the thumbprint "SHA1" or "MD5" related to the certificate "RTE Certification Authority" is identical to those presented below. Digital hashes of the certificate «RTE Certification Authority» SHA1 39:83:D6:10:A2:C4:D5:60:45:A0:C1:D0:E3:FA:E1:42:45:8A:37:12 MD5 77:4C:12:7D:FD:1D:36:9E:8A:21:85:73:7C:2D:44:77 If this is not the case: delete the certificate and call the Hotline.

38 Page : 38/ Display and verification of your certificate on smart card You certificate on smart card is automatically detected by Internet Explorer and no extra configuration is necessary. To display the certificate of your smart card in Internet Explorer, start by inserting your smart card in the reader. You will need to access the web browser certificates store. To do it, open the certificate store via the menu "Tools> Internet Options":

39 Page : 39/106 Then select the "Content" tab, button "Certificates: Another window appears. Select your certificate then click View.

40 Page : 40/106 A window appears and displays the characteristics of the certificate. By default, the General tab is selected and displayed.

41 Page : 41/106 It is valid for 2 years from generation date of the smart card. The "Certification Path" tab allows checking the validity of your certificate. The "Certificate status" and the complete visualization of the certification path (2 levels) indicate that your certificate and the root certificate have been correctly installed and all use conditions of your certificate have been met. The tab "Details" allows you to view the full name of the holder and the address to which are attached the certificate.

42 Page : 42/106

43 Page : 43/ Using your certificate Authentication and encryption IMPORTANT NOTE To be able to use your smart card, it must absolutely have been acknowledged (see 4). WARNING To be able to authenticate yourself on a website with your smart card, the site URL must be part of the browser s list of trusted sites (see Erreur! Source du renvoi introuvable.). Steps to follow: Insert your smart card, Launch Internet Explorer, enter the URL to RTE s application or to RTE s customer service portal : during the authentication, the browser will ask you to select the certificate to use for authentication then (if it has been defined) the certificate store protection password, or the PIN code of your smart card, if multiple certificates are presented, you must choose the one supplied for the application you wish to access (use the button Display certificate to visualize its content). Once authentication is completed, all data you send or receive will be encrypted Example of access to a RTE web application Insert your smart card in the reader. Enter the URL of the application (starting with https ) in the Internet Explorer address bar then press Return. Then, Internet Explorer asks you to select a certificate enabling you to authenticate to the requested site.

44 Page : 44/106 The line click here to view certificate properties lets you view the content of the selected certificate. Click the OK button to access the application. The window below asks for the pin code of your smart card. Enter the code, then click the OK button. The home page is then securely displayed (appearance of the closed padlock to the right of the URL entry field):

45 Page : 45/ Additional operations Acknowledgement through the browser This paragraph describes the acknowledgement process (see chapter 4) via Microsoft Internet Explorer. Before starting, make sure you have done the preliminary Internet Explorer configuration (see 5.1) and have added the URL to trusted sites (see Erreur! Source du renvoi introuvable.). Connect to the following URL: IMPORTANTE NOTE The site s address is case sensitive (lower case / upper case), so it is imperative that you copy the URL below exactly. Click Acknowledgement. The following window appears: Enter the address linked to the certificate contained in the smart card to be acknowledged in the field Certificate and click Send.

46 Page : 46/106 Insert your smart card in the reader and click Continue. Select one of the certificates that are on your card. To choose it, you can display the different listed certificates and thus find the one to present. Then click OK. Then enter your card PIN code and click OK.

47 Page : 47/106 Verify the information displayed on the screen and click Send to acknowledge your smart card. The acknowledgement is finished.

48 Page : 48/ Connecting to the SSL VPN Foreword The connection via SSL VPN is a service for establishing a secure communications channel to RTE s FrontOffice via the Internet. This channel is established after authenticating with your certificate from a dedicated website (see section 4.4). Once the channel is established all communications with the requested RTE service will be encrypted. The use of SSL VPN requires the installation of a dedicated tool, installed during the first login to the site. The application is called Windows Secure Application Manager (WSAM). SSL VPN enables secure access to your mailboxes hosted on RTE s FrontOffice Prerequisite The website secure.iservices.rte-france.com must be declared as a trusted site (see 4.1.2) IMPORTANT NOTE Before your first connection, you must verify that your workstation can resolve the address secure.iservices.rte-france.com (see section 3.1) JIS (Juniper Installation Service) is a Windows service made available on the RTE customer site. This service allows, once installed, to update future WSAM versions without requiring the intervention of a person with administrator privileges on the machine. To do so, download the executable under the link:

49 Page : 49/106 And extract the compressed file: Once the file is executed, the following window appears, asking you the authorization to start the service. Click Run. The following window appears. Click «Yes». This will enable the service to start installing.

50 Page : 50/106 It will be automatically activated at every operating system launch. Click Close to close the window First connection This paragraph applies only to your first login to the SSL VPN with Internet Explorer. IMPORTANT The first connection must be made by a computer specialist with Administrator rights on your workstation in order to install the WSAM application. Before continuing, you need to disable ActiveX controls. To do so, press the "Alt" key on your keyboard. A menu bar at the top of the window. Click the Tools button, and make sure "ActiveX Filtering" is off. " Launch your browser and go to the following website:

51 Page : 51/106 The following window appears: Select your certificate then click OK. If necessary, the window below asks for the pin code of your smart card. Enter the code, then click the OK button.

52 Page : 52/106 If necessary, the browser then displays a link to download the WSAM if it has not yet been installed (see 5.6.2) : If no manual intervention has been done, the following installation pop-up appears:

53 Page : 53/106 If necessary, a window appears asking you the authorisation to execute the application. Click Yes. The Juniper client then gets installed and the WSAM application installation starts: Wait during the installation. If the following window appears, click Yes :

54 Page : 54/106 Once the installation is completed, the following page appears: If your Internet access requires authentication to a proxy, a window appears asking your login and password. Enter them and confirm. Then, the icon appears in your taskbar. Click the "Sign out" button (top right of the page) to end the session:

55 Page : 55/ Using the SSL VPN Establishing the connection Launch your browser and go to the following website: The following window appears: Select your certificate then click OK. If necessary, The window below asks for the pin code of your smart card. Enter the code, then click the OK button. If necessary, the window below appears. Click Yes.

56 Page : 56/106 The WSAM application launches automatically and the following page appears: If your Internet access requires authentication to a proxy, a window appears asking your login and password. Enter them and confirm. Then, the icon appears in your taskbar. Notes: The certificate is only used to establish the connection to the SSL VPN. To close the SSL VPN session, click the Sign out button (top right of the page).

57 Page : 57/ Use case to access hosted mailboxes The SSL VPN can be used to access mailboxes hosted on the FrontOffice with a standard client. Access to hosted mailboxes requires the SSL VPN connection to be established (see ). The account configuration in your mail client is then to be made with the following parameters: Mail server type : POP Server POP server address : pop.services.rte-france.com SMTP server address : smtp.services.rte-france.com When your access to RTE s FrontOffice is provided, you will receive your login name, your password and your address. NOTE Because the messages are transferred through a secure channel, sending and receiving messages do not require the use of a certificate to encrypt messages.

58 Page : 58/106 6 Mozilla Firefox 6.1 Preliminary configuration Configuration of security settings The SSL standard, allowing access to sites with an encrypted connection (protocol HTTPS) is disabled by default in recent versions of Firefox. The supported versions of Firefox are specified in 3.2. The standards supported by default are: TLS 1.0 to TLS 1.2. In case of problems, thank you to notify the issue to the support.

59 Page : 59/ Adding the smart card to the security devices of Firefox Mozilla Firefox does not automatically take into account the smart card reader. It is necessary to add manually in Firefox the smart card reader driver in the considered security devices. To do this, insert you smart card in the reader. Then go in the menu Tools at the top right of the Mozilla Firefox window, then click on the Options icon.

60 Page : 60/106 A window appears. Choose the Advanced tab, then the subcategory Certificates. It is necessary to add the smart card reader driver in order to have Firefox take into account the smart card. To do this, click Security Devices. The following window appears. Click Load. Another window appears as described below:

61 Page : 61/106 Give the module a name, for example Smart Card. Then click Browse. Browse your Gemalto software installation folder (for example C:\Program Files\Gemalto\Classic Client\BIN) to find the file named «gclib.dll». Select the «gclib.dll» file, then click Open. The following window appears. Click Ok. The smart card driver has been added to the list of Security Devices taken into account by Firefox. Click Ok.

62 Page : 62/ Installing RTE s CA root certificate Download and install RTE s CA root certificate must now be installed in your browser so that RTE is recognized as a trusted Certificate Authority To do so, please go to the following address: Select Save file then click OK. A location to save the file Certification_Autority_RTE_2048.cer might be requested.

63 Page : 63/106 Once the file is downloaded, click the menu Tools to right corner of the window then click the icon Options :

64 Page : 64/106 A window appears. Choose the Advanced tab then the subcategory Certificates. Click on the «View certificates» button. Select the Authorities tab and click Import :

65 Page : 65/106 Select the previously saved file. A dialog box is displayed, in which you must select the three check boxes "Trust this CA to identify [...]" to trust RTE's CA.

66 Page : 66/ Visualisation and verification of RTE s CA root certificate Click the "View" button to verify that the certificate that you are going to trust is the RTE root certificate: To ensure that you have downloaded the real RTE CA's root certificate, check carefully that the "SHA1" or "MD5" hashes displayed are identical to those shown below. Hashes of RTE s CA root certificate are recalled here: SHA1 39:83:D6:10:A2:C4:D5:60:45:A0:C1:D0:E3:FA:E1:42:45:8A:37:12 MD5 77:4C:12:7D:FD:1D:36:9E:8A:21:85:73:7C:2D:44:77 If this is not the case: click Close to go back to the precedent window and click Cancel then call RTE s Hotline.

67 Page : 67/106 If, after verification, the hash of the certificate that you imported matches the "SHA1" or "MD5" hash above, it is possible to consult the details of the certificate by clicking on the "Details" tab: By clicking on the "Close" button, you return to the initial window: "Downloading certificate" (see above). In this window, click the "OK" button: the RTE CA's root certificate is then installed in Mozilla Firefox. To view the certificate later in Mozilla Firefox, go to the "Tools" menu on the top right of the window then click the "Options" icon:

68 Page : 68/106 A window appears. Select the Advanced tab then the subcategory Certificates. Click the View certificates button.

69 Page : 69/106 In the Authorities tab you can verify that the root certificate RTE Certification Authority is well saved on your PC ( Software Security Device ) and view it by clicking on View.

70 Page : 70/ Visualisation and verification of your smart card certificates Once the smart card reader driver has been added to Firefox (in 6.1.2), it is possible to visualise the certificate contained in the smart card. To do this, insert your smart card in the card reader plug ged into your computer s USB port. Then get in the Tools menu at the top right of the window, and then click on the Options icon:

71 Page : 71/106 Choose the Advanced tab, then the Certificates subcategory. Click View Certificates. In the window that appears, input your card PIN code. Click OK.

72 Page : 72/106 Click on the Your Certificates tab. The certificates that are on your smart card are those where Gem appears in the column Security Devices. You can visualise your certificates by selecting them in the list then by clicking View. The 1 st tab General displays the message This certificate has been verified for the following uses.

73 Page : 73/106 The second tab Details displays the hierarchy of certificates with the RTE CA root certificate. This ensures that all certificates have been correctly installed, and that all correct usage conditions are brought together.

74 Page : 74/ Using your certificate Authentication and encryption Steps to follow: Insert your smart card, Launch Mozilla Firefox, enter the URL to RTE s application or to RTE s customer service portal : During the authentication, the browser will ask you to select the certificate to use for authentication then (if it has been defined) the certificate store protection password or the PIN code of your smart card, Multiple certificates are presented, you must choose the one supplied for the application you wish to access (use the button Display certificate to visualize its content). Once authentication is completed, all data you send or receive will be encrypted Example of access to an RTE web application When you access the https homepage, you will be asked to enter your smart card password: Then, you will be asked to choose your certificate. Select your certificate from the drop down list entitled Choose a certificate to present as identification then click OK.

75 Page : 75/106 The home page is then securely displayed, (appearance of the closed padlock to the left of the URL entry field):

76 Page : 76/ Additional operations Acknowledgement through the browser This paragraph describes the acknowledgement process (see chapter 4) via Mozilla Firefox. Before you start, make sure you have completed the Firefox preliminary configuration (see Erreur! Source du renvoi introuvable.). Make sure as well that the smart card reader driver has been correctly added and installed in Firefox. Connect to the following URL: REMARQUE IMPORTANTE The site s address is case sensitive, so it is imperative to copy the URL exactly (lower case/upper case). Click Acknowledgement.

77 Page : 77/106 The following page appears: Fill in the field Certificate with the address linked to the certificate contained in the smart card that is to be acknowledged, and click Send. Insert you smart card in the reader and click Continue. Input your card PIN code and click OK.

78 Page : 78/106 Select a valid certificate contained in your card. To choose it, you can display the different listed certificates and find the one to present. Then click OK. Verify the information presented on the screen and click Send to acknowledge you smart card.

79 Page : 79/106 The acknowledgement is finished.

80 Page : 80/ Connecting to the SSL VPN Foreword The connection via SSL VPN is a service for establishing a secure communications channel to RTE s FrontOffice via the Internet. This channel is established after authenticating with your certificate from a dedicated website (see section 6.4). Once the channel is established all communications with the requested RTE service will be encrypted. The use of SSL VPN requires the installation of a dedicated tool, installed during the first login to the site. The application is called Windows Secure Application Manager (WSAM). SSL VPN enables secure access to your mailboxes hosted on RTE s FrontOffice Prerequisites In order to connect to the SSL VPN with Firefox, Java SE Runtime Environment (JRE) or higher needs to be installed on your workstation. If this is not the case, you can download the latest version on Oracle s website: IMPORTANT NOTE Before your first connection, you must verify that your workstation can resolve the address secure.iservices.rte-france.com (see section 3.1). JIS (Juniper Installation Service) is a Windows service made available on the RTE customer site. This service allows, once installed, to update future WSAM versions without requiring the intervention of a person with administrator privileges on the machine. To do so, download the executable under the link :

81 Page : 81/106 And extract the compressed file: Once the file is executed, a window appears that asks the authorization to start the service. Click Run : The following window appears. Click Yes. This enables the service installation to start.

82 Page : 82/106 This service will be automatically activated at every operating system launch. Click Close to close the window.

83 Page : 83/ First connection This paragraph applies only to your first login to the SSL VPN with Mozilla Firefox. IMPORTANT The first connection must be made by a computer specialist with Administrator rights on your workstation in order to install the WSAM application. Launch your browser and go to the following website:: If necessary, you will be asked to input your smart card password: Click Ok. The following window appears: Select your certificate from the dropdown list entitled Choose a certificate to present as identification and click OK. If a window appears asking you permission to execute a script from Juniper Network, Inc. : click Yes.

84 Page : 84/106 If the red icon below appears, click it in the address bar. Then in the dropdown menu of the message, select "Allow and remember».

85 Page : 85/106 If necessary, the following window appears: If the window below appears: click Yes. The installation of the WSAM application starts: If your Internet access requires authentication to a proxy, a window appears asking your login and password. Enter them and confirm.

86 Page : 86/106 Then the window below appears: Then, the icon VPN. appears in your taskbar which means you are now connected to the SSL Click the "Sign out" button (top right of the page) to end the session:

87 Page : 87/ Using the SSL VPN Establishing the connection Run your browser and access the following website: If necessary, you will be asked to input your smart card password: Click Ok. The following window appears: Select your certificate from the dropdown list entitled Choose a certificate to present as identification and click OK

88 Page : 88/106 If a window appears asking you permission to execute a script from Juniper Network, Inc. : click Allow. If the window below appears: click Yes. If your Internet access requires authentication to a proxy, a window appears asking your login and password. Enter them and confirm. Then the window below appears: Then, the icon VPN. appears in your taskbar which means you are now connected to the SSL Notes: The certificate is only used to establish the connection to the SSL VPN. To close the SSL VPN session, click on the Sign out button (top right of the page).

89 Page : 89/ Use case: accessing hosted mailboxes The SSL VPN can be used to access mailboxes hosted on the FrontOffice with a standard client. Access to hosted mailboxes requires the SSL VPN connection to be established (see ). The account configuration in your mail client is then to be made with the following parameters: Mail server type : POP Server POP server address : pop.services.rte-france.com SMTP server address : smtp.services.rte-france.com When your access to RTE s FrontOffice is provided, you will receive your login name, your password and your address. NOTE Because the messages are transferred through a secure channel (all communications are automatically encrypted), sending and receiving messages do not require the use of a certificate to encrypt messages.

90 Page : 90/106 E. APPENDICES

91 Page : 91/106 7 Changing the smart card PIN code The smart card you have been given is protected by a PIN code (password) known only by the holder. This password is requested when you use your smart card and makes it possible to verify you are the genuine card holder (see 1.3). The initial PIN code is given to you in a personal and confidential envelope (see Erreur! Source du renvoi introuvable.). It is then strongly recommended to personalise your smart card PIN code. The constraints for your new PIN code are the following: o 6 to 16 digits, o different from the former PIN code, o repeat sequence of digits is forbidden. To change your card PIN code, please follow the process below: Insert your smart card in the reader. Click Start, then go in the All programs > Gemalto > Classic Client menu and click Classic Client Toolbox.

92 Page : 92/106 The following window appears. Click on the subcategory Administration Card.

93 Page : 93/106 Click on the PIN Management button, select your smart card reader in the list, check the Change PIN box then click Next. In the dropdown list, choose User. Input your current PIN code. Input your new PIN code.. Confirm your new PIN code. Your new PIN code must abide by the rules of the PIN Policy (box on the right side of the page), if it was defined. When you input the new PIN code, a green tick or a red cross will appear next to each rule depending on whether it was followed or not. You will be able to click Change PIN only if all the rules have green ticks like on the screenshot above.

94 Page : 94/106 Once it is possible, click Change PIN. Click OK. The PIN code of your smart card has been changed.

95 Page : 95/106 8 Secure environment (PKI) This appendix describes the secure environment in which the PKI is operated. Ii describes in particular: The concepts of secure environment and the corresponding data objects handled by the PKI, The role of the various entities involved in the operation process of a PKI. 8.1 Concepts and objects managed by a PKI This appendix presents the key concepts for understanding the role of objects managed by a PKI: presentation of the principles structuring a safe process, the role of dual-keys, certificates What is a secure process? Definition of a PKI With a PKI (Public Key Infrastructure), each holder has a pair of keys - a private key, known only by his owner, and a public key - linked by a complex mathematical relationship, making it virtually impossible to determine the private key from the only knowledge of the public key. This means that the probability of determining the private key from the public key in a reasonable time is very low. Data encrypted with a key (typically, the public key) can only be decrypted with the other (typically the private key). It is on the basis of this principle that is particularly assured the confidentiality of messages exchanged. This process is commonly called "asymmetric cryptography" as opposed to "symmetric cryptography" that uses a common key for both encryption and decryption.

96 Page : 96/ The four pillars of information exchange security This electronic identity card aims at establishing an environment of trust whose four pillars are: authentication identifies parties in a sure and reliable way, confidentiality prevents non-recipients to read the data, integrity ensures that data has not been altered, non-repudiation makes it impossible for a party to refute the transmitted information The cryptographic solution Because of the technology used (protocols, architectures, etc.), the information circulating on the Internet is not confidential. The technologies also do not allow to meet the other three security requirements set out above. To preserve the confidentiality of exchanges via the Internet, the data must be rendered incomprehensible to all except the recipients. Encryption is the right solution. Data encryption naturally accompanies system s users authentication. While some data are confidential, it is necessary for issuers and recipients of this information to authenticate safely and unequivocally, to conduct secure exchanges. Authentication is based on the possession of a certificate. This element is issued by a Certification Authority that stakeholders of a transaction trust (in our case, the Certification Authority is RTE). Thus, the carriers can have confidence in the information provided to them and RTE knows that only authorized holders access the information. NOTE In a similar process, in daily life, it is necessary to provide a piece of identification issued by an authority to access certain privileges reserved for citizens of the country (expensive purchases, voting right, etc.).

97 Page : 97/ The importance of dual-keys Each holder has a public key and an associated private key. The private key is a key that the holder must keep confidential. He is the only one to possess and with the ability to use it. He does not necessarily know it himself (for example: it may be in a smart card of which it cannot come out, but access to the card is protected by a PIN code known only to its owner) The public key, as its name suggests, is public and can be communicated to all. The public keys of holders are used only to encrypt messages intended for them. If an encrypted message was intercepted, it would be without consequence on its confidentiality as it cannot be decrypted (in a reasonable time) by a person not having the associated private key. The private key enables its owner to sign a message he sends and to decrypt an encrypted message he receives. In contrast, the public key of a person is used to encrypt a message sent to him and to verify the signature of a message he receives Encryption and decryption of a message Each message is encrypted by the recipient's public key that will decrypt it with his private key. When RTE sends a message to the client A: 1. RTE has the public key of client A (via the public part of the certificate). 2. RTE automatically encrypts the message using the public key of client A and sends it via RTE s system. 3. Client A receives the message and automatically decrypts it with his private key. Encryption and decryption with dual-keys.

98 Page : 98/ The use of keys to sign a message Each message is signed by the private key of the issuer. The origin (the signature) of a message can be controlled by the public key of the issuer, freely accessible via its certificate. To prove to client A that the received message is actually from RTE, RTE automatically signs the message with its (RTE s) private key before sending to the client A. Signing and signature verification with dual-keys. When the client A receives the message from RTE, it automatically verifies the signature of the received message with the public key of RTE.

99 Page : 99/ Certificates Objectives of digital certificates Since public keys are used to verify electronic signatures and encrypt messages, it is essential for any carrier to be certain of the identity of the owner of a public key: it is the role of the certificate Characteristics of a certificate A certificate is a digital ID: that guarantees the identity of the holder from a remote site, that includes data facilitating the identification, that is resistant to counterfeit and issued by a trusted third party: the Certification Authority. A Certification Authority is an entity that creates and manages certificates. It defines the rules for registration in the various holders PKI Structure of a certificate A digital certificate contains: the public key of its holder, the name of the holder and any other identification information ( address of the person if the certificate is used to sign s), the certificate s period of validity, the name of the certification authority that issued the certificate, a unique serial number, the signature of the certification authority.

100 Page : 100/ Examples of certificates A digital certificate on Internet Explorer

101 Page : 101/106 A digital certificate on Mozilla Firefox 8.2 Documentation Reference documents: Subscription contract to RTE s secure Information System. Websites: Law of 13th March 2000 on the adaptation of law of evidence to information technologies and on electronic signature: Directive 1999/93/CE of 13th December 1999 on a Community framework for electronic signatures : Draft decree on electronic signatures : OpenTrust (formerly Keynectis) :

Access to RTE s Information System by software certificates under Microsoft Windows Seven

Access to RTE s Information System by software certificates under Microsoft Windows Seven by software certificates under Microsoft Windows Seven PKI User guide Version 3, June 17 th 2016 Programmes & SI (PSI) TOUR MARCHAND 41 RUE BERTHELOT - 92411 COURBEVOIE CEDEX TEL : 01.78.66.50.00 - FAX

More information

Access to RTE s Information System by software certificates under Microsoft Windows 7

Access to RTE s Information System by software certificates under Microsoft Windows 7 by software certificates under Microsoft Windows 7 PKI User guide Version 4, 01/01/2017 Programmes & SI (PSI) TOUR MARCHAND 41 RUE BERTHELOT - 92411 COURBEVOIE CEDEX TEL : 01.78.66.50.00 - FAX : 01.78.66.50.64

More information

Accessing the IS by smart card with Microsoft Windows Vista

Accessing the IS by smart card with Microsoft Windows Vista Index 1.4, 16/07/2009 This document is the property of RTE. No part of it may be disclosed, reproduced or published without RTE's express written authorisation. Programmes & IS (PIS) TOUR MARCHAND 41 RUE

More information

PKI Contacts PKI for Fraunhofer Contacts

PKI Contacts PKI for Fraunhofer Contacts Fraunhofer Competence Center PKI PKI Contacts PKI for Fraunhofer Contacts User manual for communication partners of the Fraunhofer-Gesellschaft Author[s]: Uwe Bendisch, Maximilian Gottwald As at: 03.02.2017

More information

Guide Installation and User Guide - Windows

Guide Installation and User Guide - Windows Guide Installation and User Guide - Windows With Fujitsu mpollux DigiSign Client, you can use your smart card for secure access to electronic services or organization networks, as well as to digitally

More information

RTE Customer Services Portal

RTE Customer Services Portal Version 2.0 20/10/2010 This document is the property of RTE. Any distribution, reproduction and publication, even in part, is forbidden, except with the written authorisation of RTE. Programmes & SI (PSI)

More information

Guide Installation and User Guide - Mac

Guide Installation and User Guide - Mac Guide Installation and User Guide - Mac With Fujitsu mpollux DigiSign Client, you can use your smart card for secure access to electronic services or organization networks, as well as to digitally sign

More information

Overview. SSL Cryptography Overview CHAPTER 1

Overview. SSL Cryptography Overview CHAPTER 1 CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet. SSL ensures the secure transmission of data between a client and a server through

More information

Deltek Touch Expense for Ajera. Touch 1.0 Technical Installation Guide

Deltek Touch Expense for Ajera. Touch 1.0 Technical Installation Guide Deltek Touch Expense for Ajera Touch 1.0 Technical Installation Guide June 01, 2018 While Deltek has attempted to verify that the information in this document is accurate and complete, some typographical

More information

HP Instant Support Enterprise Edition (ISEE) Security overview

HP Instant Support Enterprise Edition (ISEE) Security overview HP Instant Support Enterprise Edition (ISEE) Security overview Advanced Configuration A.03.50 Mike Brandon Interex 03 / 30, 2004 2003 Hewlett-Packard Development Company, L.P. The information contained

More information

IBM. Security Digital Certificate Manager. IBM i 7.1

IBM. Security Digital Certificate Manager. IBM i 7.1 IBM IBM i Security Digital Certificate Manager 7.1 IBM IBM i Security Digital Certificate Manager 7.1 Note Before using this information and the product it supports, be sure to read the information in

More information

Digital Certificates Demystified

Digital Certificates Demystified Digital Certificates Demystified Ross Cooper, CISSP IBM Corporation RACF/PKI Development Poughkeepsie, NY Email: rdc@us.ibm.com August 9 th, 2012 Session 11622 Agenda Cryptography What are Digital Certificates

More information

Common Access Card for Xerox VersaLink Printers

Common Access Card for Xerox VersaLink Printers Common Access Card for Xerox VersaLink Printers System Configuration Guide Version 1.3 NOVEMBER 2017 2017 Xerox Corporation. All rights reserved. Unpublished rights reserved under the copyright laws of

More information

Security Digital Certificate Manager

Security Digital Certificate Manager System i Security Digital Certificate Manager Version 6 Release 1 System i Security Digital Certificate Manager Version 6 Release 1 Note Before using this information and the product it supports, be sure

More information

Odette CA Help File and User Manual

Odette CA Help File and User Manual How to Order and Install Odette Certificates For a German version of this file please follow this link. Odette CA Help File and User Manual 1 Release date 31.05.2016 Contents Preparation for Ordering an

More information

CERTIFICATE POLICY CIGNA PKI Certificates

CERTIFICATE POLICY CIGNA PKI Certificates CERTIFICATE POLICY CIGNA PKI Certificates Version: 1.1 Effective Date: August 7, 2001 a Copyright 2001 CIGNA 1. Introduction...3 1.1 Important Note for Relying Parties... 3 1.2 Policy Identification...

More information

Public Key Infrastructure PKI. National Digital Certification Center Information Technology Authority Sultanate of Oman

Public Key Infrastructure PKI. National Digital Certification Center Information Technology Authority Sultanate of Oman Public Key Infrastructure PKI National Digital Certification Center Information Technology Authority Sultanate of Oman Agenda Objectives PKI Features etrust Components Government eservices Oman National

More information

CERN Certification Authority

CERN Certification Authority CERN Certification Authority Emmanuel Ormancey (IT/IS) What are Certificates? What are Certificates? Digital certificates are electronic credentials that are used to certify the identities of individuals,

More information

Signe Certification Authority. Certification Policy Degree Certificates

Signe Certification Authority. Certification Policy Degree Certificates Signe Certification Authority Certification Policy Degree Certificates Versión 1.0 Fecha: 2/11/2010 Table of contents 1 FOREWORD 1.1 GENERAL DESCRIPTION 1.2 DOCUMENT NAME AND IDENTIFICATION 2 PARTICIPATING

More information

Cisco CTL Client setup

Cisco CTL Client setup Cisco CTL Client setup This chapter provides information about Cisco CTL client setup. About Cisco CTL Client setup, page 2 Remove etoken Run Time Environment 3.00 for CTL Client 5.0 plug-in, page 2 Cisco

More information

USER GUIDE WWPass Security for (Thunderbird)

USER GUIDE WWPass Security for  (Thunderbird) USER GUIDE WWPass Security for Email (Thunderbird) TABLE OF CONTENTS Chapter 1 Welcome... 3 Introducing WWPass Security for Email (Thunderbird)... 4 Connecting Your PassKey to Your Computer... 4 Need Assistance?...

More information

INFORMATION TECHNOLOGY COMMITTEE ESCB-PKI PROJECT

INFORMATION TECHNOLOGY COMMITTEE ESCB-PKI PROJECT INFORMATION TECHNOLOGY COMMITTEE ESCB-PKI PROJECT SUBSCRIBER S GUIDE VERSION 1.3 ECB-PUBLIC 15-April-2014 ESCB-PKI - Subscriber's Procedures v.1.3.docx Page 2 of 26 TABLE OF CONTENTS GLOSSARY AND ACRONYMS...

More information

SSL Certificates Certificate Policy (CP)

SSL Certificates Certificate Policy (CP) SSL Certificates Last Revision Date: February 26, 2015 Version 1.0 Revisions Version Date Description of changes Author s Name Draft 17 Jan 2011 Initial Release (Draft) Ivo Vitorino 1.0 26 Feb 2015 Full

More information

Public. Atos Trustcenter. Server Certificates + Codesigning Certificates. Version 1.2

Public. Atos Trustcenter. Server Certificates + Codesigning Certificates. Version 1.2 Atos Trustcenter Server Certificates + Codesigning Certificates Version 1.2 20.11.2015 Content 1 Introduction... 3 2 The Atos Trustcenter Portfolio... 3 3 TrustedRoot PKI... 4 3.1 TrustedRoot Hierarchy...

More information

This help covers the ordering, download and installation procedure for Odette Digital Certificates.

This help covers the ordering, download and installation procedure for Odette Digital Certificates. This help covers the ordering, download and installation procedure for Odette Digital Certificates. Answers to Frequently Asked Questions are available online CONTENTS Preparation for Ordering an Odette

More information

USER MANUAL FOR SECURE E MAIL MICROSOFT OUTLOOK (2003)

USER MANUAL FOR SECURE E MAIL MICROSOFT OUTLOOK (2003) YATANARPON TELEPORT COMPANY LTD., YATANARPON CERTIFICATION AUTHORITY USER MANUAL FOR SECURE E MAIL MICROSOFT OUTLOOK (2003) Yatanarpon Teleport Company Ltd., Hlaing Universities Campus, Hlaing Township,

More information

VII. Corente Services SSL Client

VII. Corente Services SSL Client VII. Corente Services SSL Client Corente Release 9.1 Manual 9.1.1 Copyright 2014, Oracle and/or its affiliates. All rights reserved. Table of Contents Preface... 5 I. Introduction... 6 Chapter 1. Requirements...

More information

WORKSTATION SETUP GUIDE FOR ACCESSING THE MIBGAS PLATFORM. Date: 15/12/2016. Version: 4.1 MERCADO IBÉRICO DEL GAS

WORKSTATION SETUP GUIDE FOR ACCESSING THE MIBGAS PLATFORM. Date: 15/12/2016. Version: 4.1 MERCADO IBÉRICO DEL GAS WORKSTATION SETUP GUIDE FOR ACCESSING THE MIBGAS PLATFORM Date: 15/12/2016 Version: 4.1 Alfonso XI, 6. 28014 Madrid (España) www.mibgas.es T (+34) 91 268 26 01 CONTENTS 1 INTRODUCTION 2 2 PRIOR REQUISITES

More information

Registration and Renewal procedure for Belfius Certificate

Registration and Renewal procedure for Belfius Certificate Registration and Renewal procedure for Belfius Certificate Table of contents TABLE OF CONTENTS... 2 1. INTRODUCTION... 3 2. CONTACT... 3 3. CONFIGURATION... 3 4. REGISTRATION PROCEDURE... 4 4.1 PRE-REQUISITES...

More information

VMware AirWatch Cloud Connector Guide ACC Installation and Integration

VMware AirWatch Cloud Connector Guide ACC Installation and Integration VMware AirWatch Cloud Connector Guide ACC Installation and Integration Workspace ONE UEM v1810 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com.

More information

Jetbrains License Server User Guide

Jetbrains License Server User Guide Jetbrains License Server User Guide Copyright 2008, JetBrains s.r.o. All rights reserved Introduction JetBrains License Server is a web application that can be used as a central point to distribute licenses

More information

CertDigital Certification Services Policy

CertDigital Certification Services Policy CertDigital Certification Services Policy Page: 2 ISSUED BY : DEPARTAMENT NAME DATE ELECTRONIC SERVICES COMPARTMENT COMPARTMENT CHIEF 19.03.2011 APPROVED BY : DEPARTMENT NAME DATE MANAGEMENT OF POLICIES

More information

But where'd that extra "s" come from, and what does it mean?

But where'd that extra s come from, and what does it mean? SSL/TLS While browsing Internet, some URLs start with "http://" while others start with "https://"? Perhaps the extra "s" when browsing websites that require giving over sensitive information, like paying

More information

Managing Certificates

Managing Certificates CHAPTER 12 The Cisco Identity Services Engine (Cisco ISE) relies on public key infrastructure (PKI) to provide secure communication for the following: Client and server authentication for Transport Layer

More information

Entrust Connector (econnector) Venafi Trust Protection Platform

Entrust Connector (econnector) Venafi Trust Protection Platform Entrust Connector (econnector) For Venafi Trust Protection Platform Installation and Configuration Guide Version 1.0.5 DATE: 17 November 2017 VERSION: 1.0.5 Copyright 2017. All rights reserved Table of

More information

QUICK SET-UP VERIFICATION...3

QUICK SET-UP VERIFICATION...3 TABLE OF CONTENTS 1 QUICK SET-UP VERIFICATION...3 2 INSTALLING CERTIFICATES...3 3 IF YOU USE MS INTERNET EXPLORER...3 3.1 INSTALLING THE CERTIFICATE...3 3.2 SSL3 ACTIVATION:...3 3.3 JAVASCRIPT ACTIVATION...3

More information

OCSP Client Tool V2.2 User Guide

OCSP Client Tool V2.2 User Guide Ascertia Limited 40 Occam Road Surrey Research Park Guildford Surrey GU2 7YG Tel: +44 1483 685500 Fax: +44 1483 573704 www.ascertia.com OCSP Client Tool V2.2 User Guide Document Version: 2.2.0.2 Document

More information

Managed Access Gateway. User Guide

Managed Access Gateway. User Guide Managed Access Gateway User Guide Version 2.2 Exostar, LLC November 3, 2011 Table of Contents Table of Contents... ii Purpose... 1 Log-in to your MAG Account... 2 Additional MAG Login Options... 2 First

More information

Schneider Electric License Manager

Schneider Electric License Manager Schneider Electric License Manager EIO0000001070 11/2012 Schneider Electric License Manager User Manual 12/2012 EIO0000001070.01 www.schneider-electric.com The information provided in this documentation

More information

IBM i Version 7.2. Security Digital Certificate Manager IBM

IBM i Version 7.2. Security Digital Certificate Manager IBM IBM i Version 7.2 Security Digital Certificate Manager IBM IBM i Version 7.2 Security Digital Certificate Manager IBM Note Before using this information and the product it supports, read the information

More information

Administration. STILOG IST, all rights reserved

Administration. STILOG IST, all rights reserved 2 Table of Contents I. Admin Center... 1 1. ACCESS... 1 Starting the Admin Center application... 1 2. General Settings... 2 Home page... 3 Client... 4 Application... 5 VPPortal... 6 3. Password Configuration...

More information

BROWSER-BASED SUPPORT CONSOLE USER S GUIDE. 31 January 2017

BROWSER-BASED SUPPORT CONSOLE USER S GUIDE. 31 January 2017 BROWSER-BASED SUPPORT CONSOLE USER S GUIDE 31 January 2017 Contents 1 Introduction... 2 2 Netop Host Configuration... 2 2.1 Connecting through HTTPS using Certificates... 3 2.1.1 Self-signed certificate...

More information

Troubleshooting. Participants List Displays Multiple Entries for the Same User

Troubleshooting. Participants List Displays Multiple Entries for the Same User Participants List Displays Multiple Entries for the Same User, page 1 Internet Explorer Browser Not Supported, page 2 404 Page Not Found Error Encountered, page 2 Cannot Start or Join Meeting, page 2 SSO

More information

CSE 565 Computer Security Fall 2018

CSE 565 Computer Security Fall 2018 CSE 565 Computer Security Fall 2018 Lecture 11: Public Key Infrastructure Department of Computer Science and Engineering University at Buffalo 1 Lecture Outline Public key infrastructure Certificates Trust

More information

Managed Access Gateway. User Guide

Managed Access Gateway. User Guide Managed Access Gateway User Guide Version 3.0 Exostar, LLC April 20, 2013 Table of Contents Table of Contents...ii Purpose... 1 Log-in to your MAG Account... 2 Additional MAG Login Options... 2 First Time

More information

Deposit Wizard TellerScan Installation Guide

Deposit Wizard TellerScan Installation Guide Guide Table of Contents System Requirements... 2 WebScan Overview... 2 Hardware Requirements... 2 Supported Browsers... 2 Driver Installation... 2 Step 1 - Determining Windows Edition & Bit Count... 3

More information

VMware Workspace ONE UEM VMware AirWatch Cloud Connector

VMware Workspace ONE UEM VMware AirWatch Cloud Connector VMware AirWatch Cloud Connector VMware Workspace ONE UEM 1811 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments about this

More information

e-frr SYSTEM USER GUIDE

e-frr SYSTEM USER GUIDE e-frr SYSTEM USER GUIDE for Electronic Submission of Financial Return Version 1.5 Jun 2015 Table of Contents 1. Introduction... 4 2. Background... 4 3. System Purpose... 4 4. Baseline Specification of

More information

TIBCO Managed File Transfer Internet Server Transfer and File Share Clients User's Guide

TIBCO Managed File Transfer Internet Server Transfer and File Share Clients User's Guide TIBCO Managed File Transfer Internet Server Transfer and File Share Clients User's Guide Software Release 8.1 March 2018 Two-Second Advantage 2 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES

More information

How to Configure SSL Interception in the Firewall

How to Configure SSL Interception in the Firewall Most applications encrypt outgoing connections with SSL or TLS. SSL Interception decrypts SSL-encrypted traffic to allow Application Control features (such as the Virus Scanner, ATD, URL Filter, Safe Search,

More information

NetExtender for SSL-VPN

NetExtender for SSL-VPN NetExtender for SSL-VPN Document Scope This document describes how to plan, design, implement, and manage the NetExtender feature in a SonicWALL SSL-VPN Environment. This document contains the following

More information

CLIQ Web Manager. User Manual. The global leader in door opening solutions V 6.1

CLIQ Web Manager. User Manual. The global leader in door opening solutions V 6.1 CLIQ Web Manager User Manual V 6.1 The global leader in door opening solutions Program version: 6.1 Document number: ST-003478 Date published: 2016-03-31 Language: en-gb Table of contents 1 Overview...9

More information

Configuring the Cisco APIC-EM Settings

Configuring the Cisco APIC-EM Settings Logging into the Cisco APIC-EM, page 1 Quick Tour of the APIC-EM Graphical User Interface (GUI), page 2 Configuring the Prime Infrastructure Settings, page 3 Discovery Credentials, page 4 Security, page

More information

Version Installation Guide. 1 Bocada Installation Guide

Version Installation Guide. 1 Bocada Installation Guide Version 19.4 Installation Guide 1 Bocada Installation Guide Copyright 2019 Bocada LLC. All Rights Reserved. Bocada and BackupReport are registered trademarks of Bocada LLC. Vision, Prism, vpconnect, and

More information

SMKI Code of Connection

SMKI Code of Connection SMKI Code of Connection DCC Public Page 1 of 12 Contents 1 Connection Mechanism... 4 1.1 Browser Policy... 4 2 SMKI Services interfaces... 5 2.1 SMKI Services interfaces via DCC Gateway Connection... 5

More information

WP doc5 - Test Programme

WP doc5 - Test Programme European Commission DG Enterprise IDA PKI European IDA Bridge and Gateway CA Pilot Certipost n.v./s.a. Muntcentrum 1 B-1000 Brussels Disclaimer Belgium p. 1 / 29 Disclaimer The views expressed in this

More information

SafeConsole On-Prem Install Guide

SafeConsole On-Prem Install Guide SafeConsole On-Prem Install Guide This guide applies to SafeConsole 5.0.5 Introduction This guide describes how to install a new SafeConsole server on Windows using the SafeConsole installer. As an option,

More information

esigntrust Qualified Certificate Installation

esigntrust Qualified Certificate Installation esigntrust Qualified Certificate Installation For Microsoft Windows System & Internet Explorer User Equipment Installation Guide Version. 2017-01 Copyright Correios e Telecomunicações de Macau, 2017 All

More information

RB Digital Signature Proxy Guide for Reporters

RB Digital Signature Proxy Guide for Reporters RB Digital Signature Proxy Guide for Reporters Table of Contents RB-DSP registration workflow.... 1 Obtaining your certificate.... 2 Using Firefox to obtain your certificate.... 2 Using Internet Explorer

More information

School Installation Guide ELLIS Academic 5.2.6

School Installation Guide ELLIS Academic 5.2.6 ELLIS Academic 5.2.6 This document was last updated on 2/16/11. or one or more of its direct or indirect affiliates. All rights reserved. ELLIS is a registered trademark, in the U.S. and/or other countries,

More information

Instructions For Configuring Your Browser Settings and Online Banking FAQ's

Instructions For Configuring Your Browser Settings and Online Banking FAQ's Instructions For Configuring Your Browser Settings and Online Banking FAQ's Instructions By Browser Type Google Chrome Firefox Internet Explorer 8 Internet Explorer 9 Safari Online Banking FAQ's Google

More information

CertAgent. Certificate Authority Guide

CertAgent. Certificate Authority Guide CertAgent Certificate Authority Guide Version 7.0 July 5, 2018 Information in this document is subject to change without notice and does not represent a commitment on the part of Information Security Corporation.

More information

Key Management and Distribution

Key Management and Distribution Key Management and Distribution Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-14/

More information

Cisco Unified Serviceability

Cisco Unified Serviceability Cisco Unified Serviceability Introduction, page 1 Installation, page 5 Introduction This document uses the following abbreviations to identify administration differences for these Cisco products: Unified

More information

Certification Policy of CERTUM s Certification Services Version 4.0 Effective date: 11 August 2017 Status: archive

Certification Policy of CERTUM s Certification Services Version 4.0 Effective date: 11 August 2017 Status: archive Certification Policy of CERTUM s Certification Services Version 4.0 Effective date: 11 August 2017 Status: archive Asseco Data Systems S.A. Podolska Street 21 81-321 Gdynia, Poland Certum - Powszechne

More information

Setting up IMAP Mail in Outlook

Setting up IMAP Mail in Outlook Setting up IMAP Mail in Outlook Setting up the Certificate in Internet Explorer 1. Open up Internet Explorer. Browse to https://intranet.yourschooldomain.school.nz. You will get a Certificate Error. Click

More information

FUJITSU Cloud Service S5. Introduction Guide. Ver. 1.3 FUJITSU AMERICA, INC.

FUJITSU Cloud Service S5. Introduction Guide. Ver. 1.3 FUJITSU AMERICA, INC. FUJITSU Cloud Service S5 Introduction Guide Ver. 1.3 FUJITSU AMERICA, INC. 1 FUJITSU Cloud Service S5 Introduction Guide Ver. 1.3 Date of publish: September, 2011 All Rights Reserved, Copyright FUJITSU

More information

SafeConsole On-Prem Install Guide. version DataLocker Inc. July, SafeConsole. Reference for SafeConsole OnPrem

SafeConsole On-Prem Install Guide. version DataLocker Inc. July, SafeConsole. Reference for SafeConsole OnPrem version 5.2.2 DataLocker Inc. July, 2017 SafeConsole Reference for SafeConsole OnPrem 1 Contents Introduction................................................ 2 How do the devices become managed by SafeConsole?....................

More information

CertAgent. Certificate Authority Guide

CertAgent. Certificate Authority Guide CertAgent Certificate Authority Guide Version 6.0.0 December 12, 2013 Information in this document is subject to change without notice and does not represent a commitment on the part of Information Security

More information

Workspace ONE UEM Notification Service 2. VMware Workspace ONE UEM 1811

Workspace ONE UEM  Notification Service 2. VMware Workspace ONE UEM 1811 Workspace ONE UEM Email Notification Service 2 VMware Workspace ONE UEM 1811 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments

More information

Schneider Electric Floating License Manager

Schneider Electric Floating License Manager Schneider Electric Floating License Manager EIO0000001078 11/2012 Schneider Electric Floating License Manager User Manual 12/2012 EIO0000001078.01 www.schneider-electric.com The information provided in

More information

Chapter 9. Protecting Attachments

Chapter 9. Protecting  Attachments PROTECTING EMAIL ATTACHMENTS Chapter 9. Protecting Email Attachments This chapter describes the Workshare Protect functionality with regard to identifying content risk in emails and their attachments.

More information

Disclosure text - PDS (PKI Disclosure Statement) for electronic signature and authentication certificates

Disclosure text - PDS (PKI Disclosure Statement) for electronic signature and authentication certificates Disclosure text - PDS (PKI Disclosure Statement) for electronic signature and authentication certificates Index INDEX... 2 1. DISCLOSURE TEXT APPLICABLE TO NATURAL PERSON CERTIFICATES ISSUED ON QSCD...

More information

Guide Installation and User Guide - Linux

Guide Installation and User Guide - Linux Guide Installation and User Guide - Linux With Fujitsu mpollux DigiSign Client, you can use your smart card for secure access to electronic services or organization networks, as well as to digitally sign

More information

The SafeNet Security System Version 3 Overview

The SafeNet Security System Version 3 Overview The SafeNet Security System Version 3 Overview Version 3 Overview Abstract This document provides a description of Information Resource Engineering s SafeNet version 3 products. SafeNet version 3 products

More information

Hypertext Transfer Protocol Over Secure Sockets Layer (HTTPS)

Hypertext Transfer Protocol Over Secure Sockets Layer (HTTPS) Hypertext Transfer Protocol Over Secure Sockets Layer (HTTPS) This chapter provides information about Hypertext Transfer Protocol over Secure Sockets Layer. HTTPS, page 1 HTTPS for Cisco Unified IP Phone

More information

Instructions for Configuring Your Browser Settings and Online Security FAQ s

Instructions for Configuring Your Browser Settings and Online Security FAQ s Instructions for Configuring Your Browser Settings and Online Security FAQ s General Settings The following browser settings and plug-ins are required to properly access Digital Insight s webbased solutions.

More information

NTP Software Defendex (formerly known as NTP Software File Auditor) for NetApp

NTP Software Defendex (formerly known as NTP Software File Auditor) for NetApp NTP Software Defendex (formerly known as NTP Software File Auditor) for NetApp Installation Guide This guide provides a short introduction to the installation and initial configuration of NTP Software

More information

Sophos Mobile Control SaaS startup guide. Product version: 7

Sophos Mobile Control SaaS startup guide. Product version: 7 Sophos Mobile Control SaaS startup guide Product version: 7 Contents 1 About this guide...4 2 About Sophos Mobile Control...5 3 What are the key steps?...7 4 Change your password...8 5 Change your login

More information

Introduction to SSL. Copyright 2005 by Sericon Technology Inc.

Introduction to SSL. Copyright 2005 by Sericon Technology Inc. Introduction to SSL The cornerstone of e-commerce is a Web site s ability to prevent eavesdropping on data transmitted to and from its site. Without this, consumers would justifiably be afraid to enter

More information

SEEM4540 Open Systems for E-Commerce Lecture 03 Internet Security

SEEM4540 Open Systems for E-Commerce Lecture 03 Internet Security SEEM4540 Open Systems for E-Commerce Lecture 03 Internet Security Consider 2. Based on DNS, identified the IP address of www.cuhk.edu.hk is 137.189.11.73. 1. Go to http://www.cuhk.edu.hk 3. Forward the

More information

Cisco CTL Client Setup

Cisco CTL Client Setup This chapter provides information about Cisco CTL client setup. About, page 2 Addition of Second SAST Role in the CTL File for Recovery, page 2 Cluster Encryption Configuration Through CLI, page 3 Remove

More information

Sophos Mobile as a Service

Sophos Mobile as a Service startup guide Product Version: 8 Contents About this guide... 1 What are the key steps?... 2 Change your password... 3 Change your login name... 4 Activate Mobile Advanced licenses...5 Check your licenses...6

More information

Quick Start Guide Installation Guide for FleetBoard Clients

Quick Start Guide Installation Guide for FleetBoard Clients Quick Start Guide Installation Guide for FleetBoard Clients Dear customer, this Quick Start Guide is meant to support you in the installation of the FleetBoard Clients. The following topics will be explained

More information

The Match On Card Technology

The Match On Card Technology Precise Biometrics White Paper The Match On Card Technology Magnus Pettersson Precise Biometrics AB, Dag Hammarskjölds väg 2, SE 224 67 Lund, Sweden 22nd August 2001 Abstract To make biometric verification

More information

EID/ERESIDENCE CARD MIDDLEWARE

EID/ERESIDENCE CARD MIDDLEWARE EID/ERESIDENCE CARD MIDDLEWARE Quick Installation Guide This quick installation guide aims to help out users to set up the eid/eresidene Card Middleware software and prepare the computer to use and read

More information

Indeed Card Management Smart card lifecycle management system

Indeed Card Management Smart card lifecycle management system Indeed Card Management Smart card lifecycle management system Introduction User digital signature, strong authentication and data encryption have become quite common for most of the modern companies. These

More information

Connect to Wireless, certificate install and setup Citrix Receiver

Connect to Wireless, certificate install and setup Citrix Receiver Connect to Wireless, certificate install and setup Citrix Receiver This document explains how to connect to the Wireless Network and access applications using Citrix Receiver on a Bring Your Own Device

More information

Contents. Limitations. Prerequisites. Configuration

Contents. Limitations. Prerequisites. Configuration Welcome to your Netmail Secure trial The trial version of Netmail Secure allows you to evaluate Netmail Secure from within your own corporate domain. Included is a sample mail feed that is automatically

More information

LifeSize Control Installation Guide

LifeSize Control Installation Guide LifeSize Control Installation Guide January 2009 Copyright Notice 2005-2009 LifeSize Communications Inc, and its licensors. All rights reserved. LifeSize Communications has made every effort to ensure

More information

ivest Client 4.0 Release User Guide

ivest Client 4.0 Release User Guide ivest Client 4.0 Release User Guide Windows Vista Documentation Version 4.0.0.1 ( 29-April-2008 ) MIMOS BERHAD TECHNOLOGY PARK MALAYSIA 57000 KUALA LUMPUR http://www.ivest.com.my http://www.mimos.my Copyright

More information

Installing and Configuring vcenter Multi-Hypervisor Manager

Installing and Configuring vcenter Multi-Hypervisor Manager Installing and Configuring vcenter Multi-Hypervisor Manager vcenter Server 5.1 vcenter Multi-Hypervisor Manager 1.1.2 This document supports the version of each product listed and supports all subsequent

More information

Automation Anywhere Enterprise 10 LTS

Automation Anywhere Enterprise 10 LTS Automation Anywhere Enterprise 10 LTS Document Version: 1.3 Installation Guide Date of Publication: 15 th November, 2016 Update(s) to this document edition: Table of Contents 1. Client Prerequisites Processor

More information

Cryptography (Overview)

Cryptography (Overview) Cryptography (Overview) Some history Caesar cipher, rot13 substitution ciphers, etc. Enigma (Turing) Modern secret key cryptography DES, AES Public key cryptography RSA, digital signatures Cryptography

More information

Troubleshooting. Cisco WebEx Meetings Server User Guide Release 3.0 1

Troubleshooting. Cisco WebEx Meetings Server User Guide Release 3.0 1 Participants List Displays Multiple Entries for the Same User, page 2 404 Page Not Found Error Encountered, page 2 Cannot Start or Join a Meeting, page 2 SSO Does Not Work with ios Devices, page 4 Meeting

More information

SafeNet Authentication Service

SafeNet Authentication Service SafeNet Authentication Service Integration Guide Using SafeNet Authentication Service as an Identity Provider for SonicWALL Secure Remote Access All information herein is either public information or is

More information

Communication. Identity

Communication. Identity Mailock User guide OUR MISSION STATEMENT To Secure your Communication Data Identity Contents Introducing Mailock... 5 Business Users... 5 What do you need to run Mailock?... 5 In a browser... 5 On a mobile

More information

Transport Gateway Installation / Registration / Configuration

Transport Gateway Installation / Registration / Configuration CHAPTER 4 Transport Gateway Installation / Registration / Configuration This chapter covers the following areas: Transport Gateway requirements. Security Considerations When Using a Transport Gateway.

More information

DIGITALSIGN - CERTIFICADORA DIGITAL, SA.

DIGITALSIGN - CERTIFICADORA DIGITAL, SA. DIGITALSIGN - CERTIFICADORA DIGITAL, SA. TIMESTAMP POLICY VERSION 1.1 21/12/2017 Page 1 / 18 VERSION HISTORY Date Edition n.º Content 10/04/2013 1.0 Initial drafting 21/12/2017 1.1 Revision AUTHORIZATIONS

More information

Managing the SSL Certificate for the ESRS HTTPS Listener Service Technical Notes P/N Rev 01 July, 2012

Managing the SSL Certificate for the ESRS HTTPS Listener Service Technical Notes P/N Rev 01 July, 2012 Managing the SSL Certificate for the ESRS HTTPS Listener Service Technical Notes P/N 300-013-818 Rev 01 July, 2012 This document contains information on these topics: Introduction... 2 Terminology... 2

More information