Accessing the IS by smart card with Microsoft Windows Vista

Size: px
Start display at page:

Download "Accessing the IS by smart card with Microsoft Windows Vista"

Transcription

1 Index 1.4, 16/07/2009 This document is the property of RTE. No part of it may be disclosed, reproduced or published without RTE's express written authorisation. Programmes & IS (PIS) TOUR MARCHAND 41 RUE BERTHELOT COURBEVOIE CEDEX TEL: +33 (0) FAX: +33 (0) LONG

2 Page: 2/70 CONTENTS A. Avant-propos 5 1. Introduction Objet du document Contexte Avertissement relatif aux pratiques de écurié Les acteurs Le client L Autorié d Enregistrement (AE) Autorié de Certification (AC) 8 B. Proédures de gestion des certificats 9 2. Processus de gestion des certificats Avant-propos Demande d une carteà puce Étapes péalables éception de la carteà puce Renouvellement des certificats évocation des certificats Cas de évocation Demande de évocation 12 C. Configuration du poste Installation et configuration du poste Configuration éseau Configuration éérale Sécificié de l acès VPN Configuration logicielle Installation du lecteur de cartesà puce Acquittement de la carteà puce Acquittement sur le Web avec Internet Explorer Acquittement via la Hotline RTE 21 D. Navigateurs Web Internet Explorer Configuration péalable 23

3 Page: 3/ Ajouts des sites de confiance Installation du certificat racine de l AC RTE ééchargement et installation Visualisation et érification du certificat de l AC RTE Visualisation et érification de vos certificats sur carteà puce Utilisation de votre certificat Authentification et chiffrement Exemple d acèsà une application RTE Connexion au VPN SSL Avant-propos Pé-requis Premère connexion Utilisation du VPN SSL Mozilla Firefox Configuration péalable Installation du certificat racine de l AC RTE ééchargement et installation érification de l empreinte du certificat racine Visualisation et érification de vos certificats sur carteà puce Utilisation de votre certificat Authentification et chiffrement Exemple d acèsà une application RTE Connexion au VPN SSL Avant-propos Pé-requis Premère connexion Utilisation du VPN SSL 54 E. Annexes Changement du code PIN Environnement écurié (PKI) Concepts et objets éés par une PKI Qu est-ce qu un processus écurié? Le ôle du bi-cé Les certificats Documentation Glossaire Traitement d incident et support Support Foire aux questions (FAQ) 69

4 Page: 4/70

5 Page: 5/70 A. FOREWORD

6 Page: 6/70 1. Introduction 1.1 Object of the document This document is intended for end users who wish to access the RTE Information System by means of a smart card. It will enable the user to: understand the context and principles of a secure environment, and how a public key infrastructure (PKI) works in general, install and use software certificates in the following environments: o Microsoft Windows Vista, o Browsers: Internet Explorer and Mozilla Firefox for secure access via the HTTPS protocol and an SSL VPN. NOTE Throughout this document, the word "you" refers to the user of the certificate. 1.2 Context Under the French Law of 10 February 2000 ( ) and the applicatory decree n of 16 July 2001, the operator of the public transmission system is required to protect the confidential nature of economic, commercial, industrial, financial or technical information, the disclosure of which would adversely affect the legally imposed principles of free and fair competition and non-discrimination. 1.3 Warning on security practices Each smart card holder has his own private key generated securely using a cryptographic module. The smart card holder is then responsible for taking all necessary precautions to ensure that his: private key is not used without permission, his private key is not lost, his private key is not disclosed, his certificate is not amended, his certificate is not used without permission.

7 Page: 7/70 Each smart card holder accepts full responsibility for protecting his private key(s). Private keys and their associated certificates are stored on a Gemalto smart card protected by a PIN code (password), which is known only by the holder. The certificate authority (CA) "RTE France" cannot be held liable for any disputes arising from improper use of private keys. Refer to: Chapter 2 of the RTE France Certification Policy: <PACKAGE>\RTE Installation\fr\Politique de Certification RTE.pdf the Smart Card User's Charter: <PACKAGE>\Sécurité - Charte d'utilisation des supports matériels.pdf These documents can be found in the package supplied to the company manager. They are also available on RTE's corporate website at Parties involved Management of the lifecycle of a certificate revolves around three parties: the client (i.e. your company), the Registration Authority (RA), the Certificate Authority (CA). NOTE A good way of understanding this arrangement is to liken it to the process of obtaining a passport: the citizen applying for the passport is the equivalent of the client party, the passport office is the registration authority and the interior ministry is the certification authority The client The client requests certificates for its holders. It may also issue requests to revoke these certificates The Registration Authority (RA) The Registration Authority (customer relations manager at RTE and the Operator team) receives the certificate request and checks the identity of the holders for whom the certificates are intended.

8 Page: 8/ The Certificate Authority (CA) The Certificate Authority (RTE) is responsible for and acts as guarantor of the certificates signed on its behalf, as well as operation of the PKI. It defines the policy governing the management and use of certificates. The certificate authority, RTE, is referred to as follows: CN = RTE Certificate Authority, O = RESEAU DE TRANSPORT D ELECTRICITE

9 Page: 9/70 B. CERTIFICATE MANAGEMENT PROCEDURES

10 Page: 10/70 2. Certificate management processes 2.1 Foreword The main processes used for managing the digital certificates issued to holders are as follows: obtaining a certificate (one or more certificates), renewing a certificate (replacing an existing certificate with a new one for a new validity period and for a new dual key), revoking a certificate. RTE s certification policy can be found on its corporate website: Requesting a smart card Preliminary steps The following steps must be completed beforehand: The company's representative must request access: o the company's representative must have filled in and signed "request forms for access to the RTE IS and Applications", then returned them to the RTE customer relations manager. We have received the request: o once the forms have been received, we have created your account(s) for accessing applications, o we have ordered a personalized smart card for each holder. The company's representative has received a package containing: o o the "PKI Access Kit" (including this manual), a smart card reader (one per card holder).

11 Page: 11/ Receiving the smart card Once RTE has received and confirmed the smart card request, you will receive: an express letter containing a smart card (on which will be stored your certificates and their associated private key), a separate letter marked "personal and confidential", containing the PIN code for the smart card. IMPORTANT You are strongly advised to personalize the PIN code for your smart card (see 7). You can do this once your card reader is installed (see 3). 2.3 Renewing certificates To ensure a high level of security, certificates have a lifespan limited to two years. If the smart card has been properly activated (see Chapter 0), a notification is sent to the holder 40 days before the certificate is due to expire. If changes need to be made to the holder's details, then the company's representative must contact the RTE customer relations manager to provide the new information. The holder will then receive: an express letter containing a new smart card (on which will be stored the new certificates and their associated private key), a separate letter marked "personal and confidential", containing the PIN code for the new smart card. To be able to use the new smart card, the holder must activate it (see Chapter 0). The holder is strongly advised to keep the old smart card.

12 Page: 12/ Revoking certificates Grounds for revocation The client must request revocation in the cases listed below: if the identity of the holder changes, if the private key associated with the holder's certificate is lost, stolen, compromised or if there is a suspicion that the key has possibly, likely or definitely been compromised, if the certificate holder dies or ceases activity, if activation data are lost, or the card is lost or found to be defective. IMPORTANT To revoke a certificate, the smart card containing it must be revoked. Consequently, all certificates contained on that smart card will be revoked. So for the sake of simplicity, we will say that the smart card has been "revoked" Revocation request If he has web access (HTTP), the holder can revoke his smart card online. Otherwise, the holder can also request revocation of the card by phoning the RTE Hotline. In all cases, if the revocation request is deemed acceptable, RTE will revoke the card within 24 working hours following authentication of the request. Otherwise, it will contact the company's representative. In order to revoke a smart card online, the workstation must be configured correctly (see Chapter 3) and your web browser must be configured for using a smart card (see Chapters 5 or 5.6 depending on the browser used). To revoke your smart card, log onto the following URL:

13 Page: 13/70 Click on "Revoke smart card", and the following window opens. Enter your full name, consisting of your first name (no accents) and last name, your personal username (called "PKI Username" on the web portal) and the contained in your certificate, then click the "Search" button. Your valid certificates will appear, and you can revoke them by following the onscreen instructions.

14 Page: 14/70 C. CONFIGURING YOUR WORKSTATION

15 Page: 15/70 3. Installing and configuring your workstation All the steps described in this chapter must be performed only once by an IT Administrator on your workstation, when you receive your "PKI Access Kit" and the smart card reader. Also, please note that only a few chapters of this manual apply to you: those corresponding to the software you are using. 3.1 Network configuration General configuration Access via web browsers uses - transparently for the holder - a smart cardbased system of authentication for accessing the RTE portal and encrypting the data sent over the Internet (HTTPs protocol). IMPORTANT Anti-virus gateways, firewalls and content guards must be configured in such a way that they do not interfere with the HTTPS data flow (port 443). The network administrator may be asked to perform these steps VPN access Access to the SSL VPN requires the workstation to be able to resolve the address secure.iservices.rte-france.com. To check that this is the case, open the Start menu and click Run. In the window that appears, enter the following command: cmd /k ping secure.iservices.rte-france.com Click the OK button. A window pops up, containing the following information: If the first line begins with "Pinging secure.iservices.rte-france.com", then the address secure.iservices.rte-france.com is resolved and the workstation is correctly configured.

16 Page: 16/70 If the first line begins with "Ping request could not find host secure.iservices.rte-france.com", the address secure.iservices.rtefrance.com is not resolved. Please contact your IT support and ask them to make the necessary changes. 3.2 Software configuration The software configuration required for your computer workstation is as follows: Operating systems: Microsoft Windows Vista without service pack or SP1. One of the following Web browsers: Internet Explorer 7 or 8, Mozilla Firefox Installing the smart card reader A Gemalto smart card reader is also supplied. Do not plug in the card reader until prompted to do so. Run the following programme, which can be found in the "PKI Access Kit" supplied by RTE: <PACKAGE>\Smart Card Kit\Readers_Drivers\Gemalto\Setup_FR.msi

17 Page: 17/70 The following window opens: Click on "Next" Select "I accept the licence agreement" and click on "Next" Click on "Next" Click on "Install". If the account you have used to connect does not have local administrator rights for your workstation, Windows will display the "User Account Control" window. In this case, to continue with the installation process, a user with local administrator rights for your workstation will have to enter his or her username and password. Please wait while the installation process completes Click on "Finish"

18 Page: 18/70 After the system has rebooted, the icon " " depicting a smart card reader with a red cross through it should appear in the taskbar (beside the Windows clock): Click on "Yes" to restart your workstation Now plug the smart card reader into one of the workstation's USB ports. The reader is automatically detected and installed. After plugging in the reader, an information bubble will appear indicating that the installation is in progress. It will then indicate that the device "USB Smart Card Reader" has been successfully installed. The " " icon, depicting a smart card reader, should appear in the taskbar. This icon means that the reader is correctly connected. An icon in the taskbar indicates the status of the card reader. The list below shows the different possible status readings for the smart card reader and the relevant icons. The smart card reader is not connected. The smart card reader is connected but no smart card is inserted. The smart card reader is connected and a smart card is inserted. No certificate is available. The smart card reader is connected and a smart card is inserted. The smart card contains a certificate.

19 Page: 19/70 4. Activating the smart card After installing your smart card reader, receiving your card and the associated PIN code, you will have to activate the smart card in order for your request to access the IS to be acknowledged by RTE. IMPORTANT You must activate your smart card as soon as you receive it and the associated PIN code. If you do not, RTE will be unable to guarantee that the service provided will function correctly. The card must be activated in Internet Explorer, even if you use a different browser to connect to the application portals, or by phone. This step only needs to be performed once by the smart card holder. 4.1 Activation via the web with Internet Explorer If you can Internet access (HTTP), you can activate your smart card online. Before starting, ensure you have pre-configured Internet Explorer (see 5.1) and have added the URL to the list of trusted websites (see 5.2). Log onto the following URL: Insert your smart card in the reader, then click on "Activate card".

20 Page: 20/70 Next, enter the relevant PIN code for your card and click on OK. Select on of the certificates on your card. To choose it, you can display the various certificates listed and find the one to be selected. Then click on OK. Click on "Activate".

21 Page: 21/70 The activation process is now complete. 4.2 Activation via the RTE Hotline If you do not have Internet access (HTTP), you can activate your smart card by calling the RTE Hotline. Ensure you have your username and password to hand (the ones entered on form n 3). NOTE You can now connect to the web services for which you have signed up via HTTPS. The day after you have activated your card, you will be able to communicate by with the SMTP services you signed up for.

22 Page: 22/70 D. WEB BROWSERS

23 Page: 23/70 5. Internet Explorer 5.1 Prior configuration In the browser, go into the menu "Tools > Internet Options": Select the "Advanced" tab:

24 Page: 24/70 In the "Security" section, make sure the boxes SSL 2.0, SSL 3.0 and TLS 1.0 are checked, as shown above. 5.2 Adding trusted sites In order to sign into websites using your smart card, you must add them to your list of trusted sites. For this section, you must be connected to the workstation with the Windows account that will be using the smart card. To do this, open Internet Explorer and go into the menu "Tools > Internet Options". In the window that opens, click on the "Security" tab. Select the icon "Trusted sites", then click on the "Sites" button

25 Page: 25/70 The following window opens. In the "Add this website to the zone" field, enter the following URL: Then click on the "Add" button. The site then appears in the "Websites" list as shown below. Add the following websites in the same way: All four addresses should now be visible in the "Websites" list.

26 Page: 26/70 Click on "Close", and then on "OK". 5.3 Installing the root certificate of the RTE CA Downloading and installing You must now install the RTE root certificate in your browser, so that RTE is recognized as a trusted Certificate Authority. To do this, go to the RTE holders' portal at the following address: The following page will be displayed. Click on the link "Install RTE root certificate"

27 Page: 27/70 The RTE root certificate will then be installed in the store of Windows certificates, as per the process described below. Click on the "Open" button. Double-click on "RTE Certificate Authority".

28 Page: 28/70 Click on "Next". Click on the "Install certificate" button. Check the box "Place all certificates in the following store" and click on "Browse...". Click on "Finish", and the following window appears, showing the content of the root certificate to be imported. In the window that opens, select "Trusted root certificate authorities" and click on "OK". Click on "Next".

29 Page: 29/70 Click on "OK". Click on "Yes" (the RTE CA certificate will be verified in the next chapter) Viewing and verifying the RTE CA certificate The root certificate you have just downloaded has been placed in Internet Explorer's store of main trusted authorities. To view it, go into the menu "Tools > Internet Options..." Click on the "Content" tab and then the "Certificates..." button. In the "Certificates" window that opens, click on the "Trusted Root Certification Authorities" tab:

30 Page: 30/70 Click on the "Display" button, then the "Details" tab. To ensure you have downloaded a genuine root certificate from the RTE CA, check carefully that the digital thumbprint "SHA1" or "MD5" displayed is identical to those shown below. The thumbprints for the RTE CA root certificate are shown here: SHA1 A2:9A:4F:A1:77:14:2C:87:FA:30:2D:B0:8F:2C:02:37:37:C7:AE:37 MD5 53:42:6A:2E:A5:10:AB:2A:21:09:EE:88:13:67:A0:31 If this is not the case, delete the certificate and call our Hotline.

31 Page: 31/ Viewing and verifying certificates on the smart card Your smart card certificate is automatically detected by Internet Explorer and no further configuration is necessary. We are now going to view your smart card's certificates in Internet Explorer. Begin by inserting your smart card into the reader. In the browser, go into the menu "Tools > Internet Options": Click on the "Content" tab and then the "Certificates..." button: Select your certificate, then click on "View".

32 Page: 32/70 It is valid for 2 years from the date the card was created. This tab lets you see your certificate. The "valid" status shown for our certificate, together with the complete view of the certification path (2 levels) indicate that your certificate has been successfully installed along with the root certificate, and that all the requirements for using your certificate correctly have been met.

33 Page: 33/ Using your certificate Authentication and encryption IMPORTANT In order to use your smart card, it must first be activated (see 4). PLEASE NOTE To be able to sign into a website using your smart card, the site's URL must appear in the list of trusted sites in Internet Explorer (see 8.2) Steps to follow: insert your smart card into the reader, open Internet Explorer, enter the URL of the RTE application or the "RTE Client Service Portal" (this URL begins with " when you sign in, the browser will invite you to select the certificate you want to use to identify yourself, then the PIN code for your smart card, if you are presented with more than one certificate, you will have to choose the one provided for the application you are attempting to access (use the "Display certificate" button to view their content), all the data you receive or send will be encrypted Example of access to an RTE application Insert your smart card into the reader. Enter the URL of the application (beginning with "https") in the address bar of Internet Explorer, then confirm. Internet Explorer then invites you to choose a certificate.

34 Page: 34/70 The "Display certificate..." button lets you see the content of your chosen certificate. Next, click on "OK". If you have selected a certificate on the smart card, you will be asked for the PIN code. The application's homepage is then displayed securely. 5.6 Connecting to a SSL VPN Foreword Connection via SSL VPN is a service where a secure communication channel can be established to the RTE FrontOffice over the Internet. This channel is established after authentication with your certificate on a dedicated site. Anyone wanting to use the SSL VPN must first install a special utility when first connecting to the site. This utility is called Windows Secure Application Manager (WSAM). The SSL VPN allows access to your mailboxes hosted on the RTE FrontOffice.

35 Page: 35/ Requirements The website secure.iservices.rte-france.com must be named as a trusted site (see 5.2). IMPORTANT Before connecting for the first time, you must check that your workstation is able to resolve the following address: secure.iservices.rte-france.com (see 3.1.2) First connection This paragraph only concerns your first connection to the SSL VPN with Internet Explorer. IMPORTANT The first connection must be made by an IT administrator on your workstation, so the WSAM utility can be installed. Open your browser and enter the following URL: The following window opens: Select your smart card certificate, then click on the OK button.

36 Page: 36/70 Enter your smart card's PIN code, then click on the OK button. The browser will then display an information bar at the top of the screen, inviting you to install Activex Juniper: Click on the information bar, and then on "Install ActiveX control". The following window opens: Click on "Install". The WSAM utility then begins installing: Wait until it has finished.

37 Page: 37/70 Once the installation process is complete, the following page is displayed: If your Internet connection requires authentication with a proxy, a window will appear asking you for your username and password. Enter them and confirm. Next, the icon appears in your taskbar. Click on the Disconnect button (top-right) to end the session: Using the SSL VPN Establishing the connection Open your browser and enter the following URL: The following window opens:

38 Page: 38/70 Select your certificate, then click on the OK button. Enter your smart card's PIN code, then click on the OK button. The WSAM utility is launched automatically and the following page is displayed: If your Internet connection requires authentication with a proxy, a window will appear asking you for your username and password. Enter them and confirm. Next, the icon appears in your taskbar. Note: The certificate is only used to establish the connection to the SSL VPN. To close the SSL VPN session, click the Disconnect button (top-right) Accessing hosted mailboxes The SSL VPN can be used to access mailboxes hosted on the FrontOffice by means of a standard client. In order to access hosted mailboxes, the SSN VPN connection must be established (see ). The account in your client should then be configured in the normal way, with the following settings: server type: POP server POP server address: pop.services.rte-france.com

39 Page: 39/70 SMTP server address: smtp.services.rte-france.com When you are provided with access to the RTE FrontOffice, you will receive your connection username, password and address. NOTE Messages are transferred via a secure channel, so sending and receiving does not require the use of a certificate to encrypt messages.

40 Page: 40/70 6. Mozilla Firefox 6.1 Prior configuration Go into the menu "Tools > Options ", select the "Advanced" section and then the "Encryption" tab. In this window, check the two boxes "Use SSL 3.0" and "Use TLS 1.0". Then click on the "Security Devices" button. In the Device Manager window, click on the "Load" button.

41 Page: 41/70 In the Module Name field, enter "Gemplus PKCS11", and in the Module filename field, enter: Click on "OK". C:\Program Files\Gemplus\GemSafe Libraries\BIN\gclib.dll Click on OK. Click on OK. "Gemplus PKCS11" should now appear in the list of "Security Modules and Devices", as pictured below. Click on "OK" to close the window, then again on "OK" to close the options window. 6.2 Installing the root certificate of the RTE CA Downloading and installing You must now install the RTE root certificate in your browser, so that RTE is recognized as a trusted Certificate Authority. To do this, go to the RTE client site at the following address:

42 Page: 42/70 Click on the link "Install RTE root certificate". A dialogue box is displayed, in which you must select the three check boxes "Confirm this CA to identify [...]" to trust the RTE CA: Verifying the root certificate thumbprint Click on "View" to check that the certificate you are going to trust is indeed the RTE root certificate:

43 Page: 43/70 To ensure you download the genuine RTE CA certificate, carefully check that the digital thumbprint "SHA1" or "MD5" of the text displayed in the dialogue box is identical to that seen in the screenshot opposite. The thumbprints for the RTE CA root certificate are shown here : SHA1 A2:9A:4F:A1:77:14:2C:87:FA:30:2D:B0:8F:2C:02:37:37:C7:AE:37 MD5 53:42:6A:2E:A5:10:AB:2A:21:09:EE:88:13:67:A0:31 if this is not the case, click on "Close" to return to the previous window, where you should click on "Cancel" and call our technical support.

44 Page: 44/70 If the thumbprint is correct, continue with the process to finish importing the certificate. "Details" tab: Click on "Close" to return to the initial window (see above), and then click on "OK": the RTE CA root certificate is then installed in Mozilla Firefox. To view this certificate later, in Mozilla Firefox, go into the menu "Tools > Options ", select the "Advanced" section and click on the "Encryption" tab.

45 Page: 45/70 Click on the "View Certificates" button. In the "Authorities" tab, you can check that the root certificate "RTE Certificate Authority" is saved to your PC's hard drive ("Personal Security"), and view it by selecting it and clicking "View".

46 Page: 46/ Viewing and verifying certificates on the smart card For Mozilla Firefox, click on the "Advanced" section, and select the "Encryption" tab: Click on the "View Certificates" button. In the window that opens, enter the PIN code of your card. Click on "OK".

47 Page: 47/70 Click on the "Your Certificates" tab. The certificates on your smart card are those where "GemSAFE" appears in the "Security Device" column. You can view your certificates by selecting them from the list, then clicking on the "View" button.

48 Page: 48/70 The first tab shows the message "This certificate has been verified for the following uses".

49 Page: 49/70 The second tab shows the certification hierarchy with the RTE CA root certificate. This ensures that all the certificates have been correctly installed, and that the necessary conditions for using them properly are met.

50 Page: 50/ Using your certificate Authentication and encryption IMPORTANT In order to use your smart card, it must first be activated (see 4). Steps to follow: insert your smart card into the reader, open Mozilla Firefox, enter the URL of the RTE application or the "RTE Client Service Portal" (this URL begins with " when you sign in, the browser will invite you to select the certificate you want to use to identify yourself, then the PIN code for your smart card, if you are presented with more than one certificate, you will have to choose the one provided for the application you are attempting to access (the content of the certificate selected from the dropdown list is displayed beneath the list), all the data you receive or send will be encrypted Example of access to an RTE application Insert your smart card into the reader. Enter the URL of the application (beginning with "https") in the address bar of Firefox, then confirm. Firefox then invites you to choose a certificate. Select your certificate from the dropdown list entitled "Choose a certificate to present as identification" and click on "OK".

51 Page: 51/70 Enter your smart card's PIN code, then click on the OK button. The application's homepage is then displayed securely: 6.5 Connecting to a SSL VPN Foreword Connection via SSL VPN is a service where a secure communication channel can be established to the RTE FrontOffice over the Internet. This channel is established after authentication with your certificate on a dedicated site. Anyone wanting to use the SSL VPN must first install a special utility when first connecting to the site. This utility is called Windows Secure Application Manager (WSAM). The SSL VPN allows access to your mailboxes hosted on the RTE FrontOffice Requirements To connect to the SSL VPN with Firefox, Java SE Runtime Environment (JRE) or higher must be installed on your workstation. If this is not the case, you can download the latest version from the Sun Microsystems website: IMPORTANT Before connecting for the first time, you must check that your workstation is able to resolve the following address: secure.iservices.rte-france.com (see 3.1.2).

52 Page: 52/ First connection This paragraph only concerns your first connection to the SSL VPN with Mozilla Firefox. IMPORTANT The first connection must be made by an IT administrator on your workstation, so the WSAM utility can be installed Open your browser and enter the following URL: The following window opens: Select your certificate from the dropdown list entitled "Choose a certificate to present as identification" and click on OK. Enter your smart card's PIN code, then click on the OK button. If the following window appears, click on the "Authorise" button. If the window below appears, click on "Run".

53 Page: 53/70 The Windows Secure Application Manager installation process begins: The page below then appears: If your Internet connection requires authentication with a proxy, a window will appear asking you for your username and password. Enter them and confirm. Next, the icon the SSL VPN. appears in your taskbar, indicating that you are connected to Click on the Disconnect button (top-right) to end the session:

54 Page: 54/ Using the SSL VPN Establishing the connection Open your browser and enter the following URL: The following window opens: Select your certificate from the dropdown list entitled "Choose a certificate to present as identification" and click on OK. Enter your smart card's PIN code, then click on the OK button.

55 Page: 55/70 If the following window appears, click on the "Authorise" button. If the window below appears, click on "Run". The page below then appears: If your Internet connection requires authentication with a proxy, a window will appear asking you for your username and password. Enter them and confirm. Next, the icon appears in your taskbar, indicating that you are connected to the SSL VPN.

56 Page: 56/70 Note: The certificate is only used to establish the connection to the SSL VPN. To close the SSL VPN session, click the Disconnect button (top-right) Accessing hosted mailboxes The SSL VPN can be used to access mailboxes hosted on the FrontOffice by means of a standard client. In order to access hosted mailboxes, the SSN VPN connection must be established (see ). The account in your client should then be configured in the normal way, with the following settings: server type: POP server POP server address: pop.services.rte-france.com SMTP server address: smtp.services.rte-france.com When you are provided with access to the RTE FrontOffice, you will receive your connection username, password and address. NOTE Messages are transferred via a secure channel, so sending and receiving does not require the use of a certificate to encrypt messages.

57 Page: 57/70 E. APPENDICES:

58 Page: 58/70 7. Changing the PIN code The smart card provided to you is protected by a PIN code (password) which is known only to the holder. You will be asked to give the code when using your smart card, to verify that you are indeed the card holder (see 1.3). The initial PIN code is given to you in a letter marked "personal and confidential" (see 2.2.2). You are strongly advised to personalize the PIN code for your smart card. The requirements for your new PIN code are as follows: must be between 6 and 16 digits long, must be different from the old PIN code, must not contain any repeated sequences of digits. To change your card's PIN code, please follow the procedure below. Insert your smart card into the reader. Click on the "Start" button, then go into the menu "All Programs > Gemalto" and click on "GemSafe Toolbox". The following window opens. Click on the section "Card Administration".

59 Page: 59/70 Click on the "PIN Management" button, select your card reader from the list, check "Change PIN" and then click on "Next". From the dropdown list, choose "User". Enter your current PIN code. Enter your new PIN code. Confirm your new PIN code. Your new PIN code must comply with the rules of the "PIN Strategy" (right-hand section). When you enter the new PIN code, a green tick or a red cross will be displayed to the right of each rule, to indicate whether the rules has been followed. You will only be able to click on the "Change PIN" button if all the rules have green ticks next to them, as shown on the screenshot above. Once you have all green ticks, click on "Change PIN".

60 Page: 60/70 Click on OK. Your smart card's PIN code has now been changed.

61 Page: 61/70 8. Secure environment (PKI) This appendix describes the secure environment in which the PKI is operated. It focuses on: the concepts of the secure environment and the corresponding computer objects managed by the PKI, the roles of the various parties involves in the operation of a PKI. 8.1 Concepts and objects managed by a PKI This appendix describes the main concepts for understanding the role of the objects managed by a PKI: presentation of the principles governing a secure process, the role of the dual key, certificates What is a secure process? Definition of a PKI With a PKI (Public Key Infrastructure), each holder has a pair of keys - one private key, known only to its owner, and one public key. They are linked by a complex mathematical relationship, which makes it virtually impossible to determine the private key using just the public key. This means the likelihood of being able to determine the private key from the public key within a reasonable amount of time is extremely low. Data encrypted with one key (usually the public key) can only be decrypted using the other (generally the private key). This is the principle on which the confidentiality of messages sent between two key holders is guaranteed.

62 Page: 62/ The four pillars of trust in secure communications This electronic identity card is intended to establish a trusted environment, based on the following four pillars: authentication identifies the parties securely and positively, confidentiality prevents anyone but the intended recipient from reading the data, integrity ensures that the data are not altered, non-repudiation makes it impossible for a party to disown the data it has sent Cryptographic solutions Owing to the technologies used (i.e. protocols, architectures, etc.), information circulating over the Internet is not confidential. Nor do these technologies satisfy the other three security requirements listed above. In order to protect the confidentiality of data sent over the Internet, they must be made incomprehensible to anyone except the intended recipients. Encryption is the best way to do this. Data encryption is naturally used alongside mechanisms to authenticate users. Whilst some data are confidential, the senders and recipients need to be able to identify one another securely and unambiguously, in order to exchange data safely. Authentication is based on a system of certificates. These are issued by a Certificate Authority, who is trusted by the parties to a transaction (in our case, the Certificate Authority is RTE). The holders can therefore trust the information they receive and RTE knows that only the authorized holders can access that information. NOTE This arrangement is similar to showing identity papers issued by the government authorities of a country in order to access certain services or exercise certain rights granted to citizens of that country (e.g. purchasing high-value goods, voting, etc.).

63 Page: 63/ The role of the dual key Each holder has a public key and an associated private key: The private key must be kept confidential by the holder. He is its sole owner and the only one able to use it. He does not necessarily know it himself (for example, it may be contained on a smart card from which it cannot be removed, but access to the card is protected by a PIN code known only to its owner). The public key, as its name would suggest, is public and can be freely disclosed to anyone. The holders' public keys are only used to encrypt messages sent to them. If an encrypted message were to be intercepted, it would not affect the confidentiality as it could not be decrypted (within a reasonable amount of time) by anyone who did not have the private key. The private key enables its owner to sign the messages he sends and decrypt those that he receives.

64 Page: 64/ Certificates Purpose of the digital certificate Since public keys are used to verify electronic signatures and encrypt messages, it is vital for any holder to be absolutely certain of the identity of a public key owner: this is the purpose of the certificate Characteristics of a certificate The certificate is essentially an electronic ID card, which: guarantees its holder is who he says he is, carries data to facilitate identification, is resistant to forgery and is issued by a trusted third party: the Certificate Authority. A Certificate Authority is an entity that creates and manages certificates. It defines the rules for registering different holders in the PKI Structure of a certificate A digital certificate contains: the owner's public key, the name of the owner and any other identification details (the person's address in the case of a certificate used to sign s), the certificate's validity period, the name of the certificate authority which generated the certificate, a unique serial number, the certificate authority's signature.

65 Page: 65/ Examples of certificates A digital certificate in Internet Explorer A digital certificate in Mozilla Firefox

66 Page: 66/ Documentation Reference documents: RTE Certification Policy, Subscription agreement to the secure RTE IS. Websites: Law of 13 March 2000 adapting the evidentiary provisions for information technologies and concerning electronic signatures: Directive 1999/93/EC of 13 December 1999 on a Community framework for electronic signatures: Bill on electronic signatures: Keynectis:

67 Page: 67/70 9. Glossary When the holder takes his first steps into his new secure environment, he will be confronted with a specific terminology. Some of the main terms encountered are explained in this section. Authentication Check to establish that the declared identity of a holder, system or other entity in an information or communication system is valid and accurate. Certificate (or Certification) Authority An entity that issues digital certificates - electronic equivalents of identity papers - to a population. By distributing digital certificates, the Certificate Authority or Trusted Authority acts as a guarantor, by vouching for the identity of a person through the certificate it issues. Depending on the Certificate Authority's credit, the certificate will have a lesser or greater scope of applications: limited to internal communications within a company (like a company badge) or used in contacts with other organizations and administrations (like a national ID card or passport). Certificate A digital certificate acts as an electronic identity card (e-passport). It guarantees the identity of its owner in electronic transactions and contains all of the information needed to establish the person's identity (name, first name, company where applicable, address, etc). A digital certificate consists of a public key and personal information on the holder, all signed by a Certificate Authority. Confidentiality Property of data or information that is not made available or disclosed to unauthorized persons. Cryptography Discipline including the principles, means and methods of transforming data for the purpose of concealing their semantic content, establishing their authenticity, preventing them from being modified or disowned and preventing their unauthorized use. Private key Secret numeric value attached to a person, enabling him to decrypt messages received which have been encrypted with the corresponding public key, or to place a signature on the bottom of messages sent. Public key Numeric value attached to a person, who may then distribute it to others, enabling them to send him encrypted data or check his signature.

68 Page: 68/70 Encryption / Decryption Transformation of data by means of cryptography, to make them unintelligible and thereby ensure their confidentiality / Or the reverse process. Integrity Assurance that data or information have not been modified or altered without authorization. Non-repudiation Property obtained using cryptographic methods to prevent a person from denying having performed a particular action on the data (e.g. disowning an they have sent; proof of obligation, intention or commitment; establishing ownership). Revocation Revocation is the operation whereby the guarantee provided by the Certificate Authority on a certificate is removed. It is performed at the request of the subscriber or any other authorized person. The request may be the result of various types of events, such as a private key being compromised or destroyed, a change to the information contained in the certificate, or breach of the rules governing the certificate's use. Electronic signature Signing a document electronically involves signing a digital summary of the document with one's private key. The document can then no longer be altered without any changes being visible. Like a handwritten signature, it is binding upon the signatory. Virtual Private Network (VPN) A virtual private network, also known by the abbreviation VPN, is a means of interconnecting local networks via a "tunnel". The tunnel is a secure communication channel over the Internet, along which data can move back and forth in encrypted form.

69 Page: 69/ Troubleshooting and support If you encounter a problem, please contact the RTE Hotline, which will diagnose the problem and pass it on to the appropriate technician. The Hotline will send you the solution and if necessary guide you through the steps you need to take to access the RTE Information System once more Support For information, please contact the RTE Hotline on: or from France: Frequently Asked Questions Is it really necessary to activate my smart card? Yes. It's necessary for you to be able to enjoy all the functions offered by RTE's infrastructures. If you renew your smart card, you will also have to activate the new one. How can I tell if my smart card reader is installed correctly? If the reader icon is visible next to the Windows clock, then your reader is correctly installed and connected. If the icon has a red cross through it, the reader has not been detected. In this case, ensure your smart card reader is correctly connected. Try plugging the card reader into another of your PC's USB ports. Remember to restart your PC after installing drivers (see 3.3). If the problem persists, contact the RTE hotline. If neither of these two icons is visible next to the Windows clock, ensure you have followed the driver installation process correctly (see 3.3).

70 Page: 70/70 When does the certificate on my smart card expire? To ensure a high level of security, certificates have a lifespan limited to two years. A certificate's precise expiry date is displayed when you view the certificate (see 5.4 with Internet Explorer or 6.3 with Firefox). My certificate is set to expire soon. What should I do? If the smart card has been properly activated (see Chapter 4), the holder will receive an warning 40 days before the certificate on his smartcard is due to expire. If changes need to be made to the holder's details, then the company's representative must contact the RTE customer relations manager to provide the new information. Otherwise, a new smart card will be sent to the holder (see Chapter 2.3). How is a certificate on a smart card renewed? Refer to the procedure for renewing a smart card certificate in Chapter 2.3. What should I do if I lose my PIN code? Contact the RTE hotline. When is my card blocked? Your card will be blocked if you enter the wrong PIN code three times in a row, whichever software you are using. Closing and re-opening the browser will not reset the process. What should I do if my card is blocked? Contact the RTE hotline. With my Internet browser, certificate authentication fails even though I have selected the certificate on my smart card and entered the correct PIN. If you are using Internet Explorer, check that the website address has been added to your trusted sites (see 5.2). If not, add it. If the problem persists, the card's PIN code may be blocked. Contact the hotline. END OF DOCUMENT

Smart card access to RTE s IS under Microsoft Windows 7

Smart card access to RTE s IS under Microsoft Windows 7 Smart card access to RTE s IS under Microsoft Windows 7 PKI User guide Version 3, June 17 th 2016 Programmes & SI (PSI) TOUR MARCHAND 41 RUE BERTHELOT - 92411 COURBEVOIE CEDEX TEL : 01.78.66.50.00 - FAX

More information

Access to RTE s Information System by software certificates under Microsoft Windows Seven

Access to RTE s Information System by software certificates under Microsoft Windows Seven by software certificates under Microsoft Windows Seven PKI User guide Version 3, June 17 th 2016 Programmes & SI (PSI) TOUR MARCHAND 41 RUE BERTHELOT - 92411 COURBEVOIE CEDEX TEL : 01.78.66.50.00 - FAX

More information

Access to RTE s Information System by software certificates under Microsoft Windows 7

Access to RTE s Information System by software certificates under Microsoft Windows 7 by software certificates under Microsoft Windows 7 PKI User guide Version 4, 01/01/2017 Programmes & SI (PSI) TOUR MARCHAND 41 RUE BERTHELOT - 92411 COURBEVOIE CEDEX TEL : 01.78.66.50.00 - FAX : 01.78.66.50.64

More information

INFORMATION TECHNOLOGY COMMITTEE ESCB-PKI PROJECT

INFORMATION TECHNOLOGY COMMITTEE ESCB-PKI PROJECT INFORMATION TECHNOLOGY COMMITTEE ESCB-PKI PROJECT SUBSCRIBER S GUIDE VERSION 1.3 ECB-PUBLIC 15-April-2014 ESCB-PKI - Subscriber's Procedures v.1.3.docx Page 2 of 26 TABLE OF CONTENTS GLOSSARY AND ACRONYMS...

More information

Security Digital Certificate Manager

Security Digital Certificate Manager System i Security Digital Certificate Manager Version 6 Release 1 System i Security Digital Certificate Manager Version 6 Release 1 Note Before using this information and the product it supports, be sure

More information

IBM. Security Digital Certificate Manager. IBM i 7.1

IBM. Security Digital Certificate Manager. IBM i 7.1 IBM IBM i Security Digital Certificate Manager 7.1 IBM IBM i Security Digital Certificate Manager 7.1 Note Before using this information and the product it supports, be sure to read the information in

More information

Guide Installation and User Guide - Mac

Guide Installation and User Guide - Mac Guide Installation and User Guide - Mac With Fujitsu mpollux DigiSign Client, you can use your smart card for secure access to electronic services or organization networks, as well as to digitally sign

More information

Guide Installation and User Guide - Windows

Guide Installation and User Guide - Windows Guide Installation and User Guide - Windows With Fujitsu mpollux DigiSign Client, you can use your smart card for secure access to electronic services or organization networks, as well as to digitally

More information

PKI Contacts PKI for Fraunhofer Contacts

PKI Contacts PKI for Fraunhofer Contacts Fraunhofer Competence Center PKI PKI Contacts PKI for Fraunhofer Contacts User manual for communication partners of the Fraunhofer-Gesellschaft Author[s]: Uwe Bendisch, Maximilian Gottwald As at: 03.02.2017

More information

Managed Access Gateway. User Guide

Managed Access Gateway. User Guide Managed Access Gateway User Guide Version 2.2 Exostar, LLC November 3, 2011 Table of Contents Table of Contents... ii Purpose... 1 Log-in to your MAG Account... 2 Additional MAG Login Options... 2 First

More information

DELTACRYPT TECHNOLOGIES INC. USER MANUAL. DUSK-File Encryption (Automatic Pro) DUSK-USB Corporate DUSK-USB Home

DELTACRYPT TECHNOLOGIES INC. USER MANUAL. DUSK-File Encryption (Automatic Pro) DUSK-USB Corporate DUSK-USB Home DELTACRYPT TECHNOLOGIES INC. USER MANUAL DUSK-File Encryption (Automatic Pro) DUSK-USB Corporate DUSK-USB Home Introduction... 7 What s New... 7 Operating Systems... 7 O/S change... 7 DUSK-File Encryption

More information

Registration & Payments User Guide

Registration & Payments User Guide Registration & Payments User Guide Contingency Payment Access Contents Contingency Payment Access 4 Introduction 4 1. Self-Registration 4 1.1. Password 4 1.2 Client Identification Number and Client Details

More information

Managed Access Gateway. User Guide

Managed Access Gateway. User Guide Managed Access Gateway User Guide Version 3.0 Exostar, LLC April 20, 2013 Table of Contents Table of Contents...ii Purpose... 1 Log-in to your MAG Account... 2 Additional MAG Login Options... 2 First Time

More information

CERTIFICATE POLICY CIGNA PKI Certificates

CERTIFICATE POLICY CIGNA PKI Certificates CERTIFICATE POLICY CIGNA PKI Certificates Version: 1.1 Effective Date: August 7, 2001 a Copyright 2001 CIGNA 1. Introduction...3 1.1 Important Note for Relying Parties... 3 1.2 Policy Identification...

More information

Terms and Conditions for Remote Data Transmission

Terms and Conditions for Remote Data Transmission Terms and Conditions for Remote Data Transmission (As amended on 15 November 2013) 1. Scope of services (1) The Bank is available to its Customer (account holder) for remote transmission of data by electronic

More information

IBM i Version 7.2. Security Digital Certificate Manager IBM

IBM i Version 7.2. Security Digital Certificate Manager IBM IBM i Version 7.2 Security Digital Certificate Manager IBM IBM i Version 7.2 Security Digital Certificate Manager IBM Note Before using this information and the product it supports, read the information

More information

Public. Atos Trustcenter. Server Certificates + Codesigning Certificates. Version 1.2

Public. Atos Trustcenter. Server Certificates + Codesigning Certificates. Version 1.2 Atos Trustcenter Server Certificates + Codesigning Certificates Version 1.2 20.11.2015 Content 1 Introduction... 3 2 The Atos Trustcenter Portfolio... 3 3 TrustedRoot PKI... 4 3.1 TrustedRoot Hierarchy...

More information

Apple Inc. Certification Authority Certification Practice Statement

Apple Inc. Certification Authority Certification Practice Statement Apple Inc. Certification Authority Certification Practice Statement Apple Application Integration Sub-CA Apple Application Integration 2 Sub-CA Apple Application Integration - G3 Sub-CA Version 6.2 Effective

More information

Canada Education Savings Program

Canada Education Savings Program Version Number: 5.0 Version Date: August 6, 2007 Version History Version Release Date Description R 1.0 September 30, 1998 Initial version for HRSDC internal reviews. D 2.0 March 15, 1999 Ongoing updates.

More information

Apple Inc. Certification Authority Certification Practice Statement

Apple Inc. Certification Authority Certification Practice Statement Apple Inc. Certification Authority Certification Practice Statement Apple Application Integration Sub-CA Apple Application Integration 2 Sub-CA Apple Application Integration - G3 Sub-CA Version 6.3 Effective

More information

(1) Jisc (Company Registration Number ) whose registered office is at One Castlepark, Tower Hill, Bristol, BS2 0JA ( JISC ); and

(1) Jisc (Company Registration Number ) whose registered office is at One Castlepark, Tower Hill, Bristol, BS2 0JA ( JISC ); and SUB-LRA AGREEMENT BETWEEN: (1) Jisc (Company Registration Number 05747339) whose registered office is at One Castlepark, Tower Hill, Bristol, BS2 0JA ( JISC ); and (2) You, the Organisation using the Jisc

More information

Schneider Electric License Manager

Schneider Electric License Manager Schneider Electric License Manager EIO0000001070 11/2012 Schneider Electric License Manager User Manual 12/2012 EIO0000001070.01 www.schneider-electric.com The information provided in this documentation

More information

ivest Client 4.0 Release User Guide

ivest Client 4.0 Release User Guide ivest Client 4.0 Release User Guide Windows Vista Documentation Version 4.0.0.1 ( 29-April-2008 ) MIMOS BERHAD TECHNOLOGY PARK MALAYSIA 57000 KUALA LUMPUR http://www.ivest.com.my http://www.mimos.my Copyright

More information

Public Key Infrastructure PKI. National Digital Certification Center Information Technology Authority Sultanate of Oman

Public Key Infrastructure PKI. National Digital Certification Center Information Technology Authority Sultanate of Oman Public Key Infrastructure PKI National Digital Certification Center Information Technology Authority Sultanate of Oman Agenda Objectives PKI Features etrust Components Government eservices Oman National

More information

RTE Customer Services Portal

RTE Customer Services Portal Version 2.0 20/10/2010 This document is the property of RTE. Any distribution, reproduction and publication, even in part, is forbidden, except with the written authorisation of RTE. Programmes & SI (PSI)

More information

Common Access Card for Xerox VersaLink Printers

Common Access Card for Xerox VersaLink Printers Common Access Card for Xerox VersaLink Printers System Configuration Guide Version 1.3 NOVEMBER 2017 2017 Xerox Corporation. All rights reserved. Unpublished rights reserved under the copyright laws of

More information

InsideBusiness Payments. Comprehensive installation manual for the blue ING I-Dentity Reader

InsideBusiness Payments. Comprehensive installation manual for the blue ING I-Dentity Reader InsideBusiness Payments Comprehensive installation manual for the blue ING I-Dentity Reader Table of contents 1. Introduction 3 2. Configuration requirements 4 2.1 Software requirements 4 2.2 Hardware

More information

ECHA Accounts Manual for Industry Users

ECHA Accounts Manual for Industry Users 1 ECHA Accounts Manual ECHA Accounts Manual for Industry Users 2 ECHA Accounts Manual Changes to this document Version Changes Date 1.0 First release September 2014 2.0 Update December 2014 3.0 Update

More information

Terms and Conditions for External accounts Service

Terms and Conditions for External accounts Service Terms and Conditions for External accounts Service You must read these Terms and Conditions before using External accounts service. IMPORTANT INFORMATION External accounts service is an account aggregation

More information

Schneider Electric Floating License Manager

Schneider Electric Floating License Manager Schneider Electric Floating License Manager EIO0000001078 11/2012 Schneider Electric Floating License Manager User Manual 12/2012 EIO0000001078.01 www.schneider-electric.com The information provided in

More information

Digital Certificates Demystified

Digital Certificates Demystified Digital Certificates Demystified Ross Cooper, CISSP IBM Corporation RACF/PKI Development Poughkeepsie, NY Email: rdc@us.ibm.com August 9 th, 2012 Session 11622 Agenda Cryptography What are Digital Certificates

More information

Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations

Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations Version 1.18 Effective Date: August 16, 2017 Table of Contents 1. Introduction... 5 1.1. Trademarks...

More information

Certification Practice Statement of the Federal Reserve Banks Services Public Key Infrastructure

Certification Practice Statement of the Federal Reserve Banks Services Public Key Infrastructure Certification Practice Statement of the Federal Reserve Banks Services Public Key Infrastructure 1.0 INTRODUCTION 1.1 Overview The Federal Reserve Banks operate a public key infrastructure (PKI) that manages

More information

e-frr SYSTEM USER GUIDE

e-frr SYSTEM USER GUIDE e-frr SYSTEM USER GUIDE for Electronic Submission of Financial Return Version 1.5 Jun 2015 Table of Contents 1. Introduction... 4 2. Background... 4 3. System Purpose... 4 4. Baseline Specification of

More information

Cisco CTL Client setup

Cisco CTL Client setup Cisco CTL Client setup This chapter provides information about Cisco CTL client setup. About Cisco CTL Client setup, page 2 Remove etoken Run Time Environment 3.00 for CTL Client 5.0 plug-in, page 2 Cisco

More information

Australia Online Forms for Research Software User Manual

Australia Online Forms for Research Software User Manual Australia Online Forms for Research Software User Manual Version 1.3 Released 21 August 2010 2 P a g e A u s t r a l i a O n l i n e F o r m s f o r R e s e a r c h Contents 1. Introduction 5 2. Getting

More information

USER GUIDE WWPass Security for (Thunderbird)

USER GUIDE WWPass Security for  (Thunderbird) USER GUIDE WWPass Security for Email (Thunderbird) TABLE OF CONTENTS Chapter 1 Welcome... 3 Introducing WWPass Security for Email (Thunderbird)... 4 Connecting Your PassKey to Your Computer... 4 Need Assistance?...

More information

BT Managed Secure Messaging. Non-Repudiation Policy

BT Managed Secure Messaging. Non-Repudiation Policy BT Managed Secure Messaging Non-Repudiation Policy Contents Page 1 Introduction 4 1.1 Scope 4 1.2 Terms and Definitions 4 2 Non-Repudiation Categories 5 2.1 Non-Repudiation of Origin 5 2.2 Non-Repudiation

More information

VII. Corente Services SSL Client

VII. Corente Services SSL Client VII. Corente Services SSL Client Corente Release 9.1 Manual 9.1.1 Copyright 2014, Oracle and/or its affiliates. All rights reserved. Table of Contents Preface... 5 I. Introduction... 6 Chapter 1. Requirements...

More information

IBM Client Security Solutions. Client Security Software Version 1.0 Administrator's Guide

IBM Client Security Solutions. Client Security Software Version 1.0 Administrator's Guide IBM Client Security Solutions Client Security Software Version 1.0 Administrator's Guide December 1999 1 Before using this information and the product it supports, be sure to read Appendix A - U.S. export

More information

ING Public Key Infrastructure Technical Certificate Policy

ING Public Key Infrastructure Technical Certificate Policy ING Public Key Infrastructure Technical Certificate Policy Version 5.4 - November 2015 Commissioned by ING PKI Policy Approval Authority (PAA) Additional copies Document version General Of this document

More information

CERN Certification Authority

CERN Certification Authority CERN Certification Authority Emmanuel Ormancey (IT/IS) What are Certificates? What are Certificates? Digital certificates are electronic credentials that are used to certify the identities of individuals,

More information

The SafeNet Security System Version 3 Overview

The SafeNet Security System Version 3 Overview The SafeNet Security System Version 3 Overview Version 3 Overview Abstract This document provides a description of Information Resource Engineering s SafeNet version 3 products. SafeNet version 3 products

More information

Odette CA Help File and User Manual

Odette CA Help File and User Manual How to Order and Install Odette Certificates For a German version of this file please follow this link. Odette CA Help File and User Manual 1 Release date 31.05.2016 Contents Preparation for Ordering an

More information

SAFE-BioPharma RAS Privacy Policy

SAFE-BioPharma RAS Privacy Policy SAFE-BioPharma RAS Privacy Policy This statement discloses the privacy practices for the SAFE-BioPharma Association ( SAFE- BioPharma ) Registration Authority System ( RAS ) web site and describes: what

More information

Disclosure text - PDS (PKI Disclosure Statement) for electronic signature and authentication certificates

Disclosure text - PDS (PKI Disclosure Statement) for electronic signature and authentication certificates Disclosure text - PDS (PKI Disclosure Statement) for electronic signature and authentication certificates Index INDEX... 2 1. DISCLOSURE TEXT APPLICABLE TO NATURAL PERSON CERTIFICATES ISSUED ON QSCD...

More information

VSP16. Venafi Security Professional 16 Course 04 April 2016

VSP16. Venafi Security Professional 16 Course 04 April 2016 VSP16 Venafi Security Professional 16 Course 04 April 2016 VSP16 Prerequisites Course intended for: IT Professionals who interact with Digital Certificates Also appropriate for: Enterprise Security Officers

More information

Annex 2 to the Agreement on Cooperation in the Area of Trade Finance & Cash Management Terms and Conditions for Remote Data Transmission

Annex 2 to the Agreement on Cooperation in the Area of Trade Finance & Cash Management Terms and Conditions for Remote Data Transmission Annex 2 to the Agreement on Cooperation in the Area of Trade Finance & Cash Management Terms and Conditions for Remote Data Transmission 1. Scope of services (1) The Bank is available to its Customer (account

More information

Overview. SSL Cryptography Overview CHAPTER 1

Overview. SSL Cryptography Overview CHAPTER 1 CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet. SSL ensures the secure transmission of data between a client and a server through

More information

SafeNet Authentication Manager

SafeNet Authentication Manager SafeNet Authentication Manager Version 8.0 Rev A User s Guide Copyright 2010 SafeNet, Inc. All rights reserved. All attempts have been made to make the information in this document complete and accurate.

More information

FIRST TIME USER GUIDE- 2016

FIRST TIME USER GUIDE- 2016 FIRST TIME USER GUIDE- 2016 COMMODITY TRACKING SYSTEM (CTS) Table of Contents Introduction... 2 Contacts... 2 Steps required Prior To Re-Registering Online With The National Energy Board (NEB):... 3 Become

More information

Thank you for purchasing itwin. itwin provides simple and secure file sharing between two online computers.

Thank you for purchasing itwin. itwin provides simple and secure file sharing between two online computers. Starting Notes Thank you for purchasing itwin. itwin provides simple and secure file sharing between two online computers. 1. This guide is for v1.0.0.145 of the itwin software for Microsoft Windows Platform.

More information

Canada Education Savings Program (CESP) Data Interface Operations and Connectivity

Canada Education Savings Program (CESP) Data Interface Operations and Connectivity (CESP) Version Number: 7.0 Version Date: November 24, 2016 Version History Version Release Date Description R 1.0 September 30, 1998 Initial version for HRSDC internal reviews. D 2.0 March 15, 1999 Ongoing

More information

WORKSTATION SETUP GUIDE FOR ACCESSING THE MIBGAS PLATFORM. Date: 15/12/2016. Version: 4.1 MERCADO IBÉRICO DEL GAS

WORKSTATION SETUP GUIDE FOR ACCESSING THE MIBGAS PLATFORM. Date: 15/12/2016. Version: 4.1 MERCADO IBÉRICO DEL GAS WORKSTATION SETUP GUIDE FOR ACCESSING THE MIBGAS PLATFORM Date: 15/12/2016 Version: 4.1 Alfonso XI, 6. 28014 Madrid (España) www.mibgas.es T (+34) 91 268 26 01 CONTENTS 1 INTRODUCTION 2 2 PRIOR REQUISITES

More information

LET S ENCRYPT SUBSCRIBER AGREEMENT

LET S ENCRYPT SUBSCRIBER AGREEMENT Page 1 of 7 LET S ENCRYPT SUBSCRIBER AGREEMENT This Subscriber Agreement ( Agreement ) is a legally binding contract between you and, if applicable, the company, organization or other entity on behalf

More information

End-Entity Online Help

End-Entity Online Help End-Entity Online Help Sun ONE Certificate Server Version 4.7 September 2002 816-5545-10 Second Edition Copyright 2002 Sun Microsystems, Inc. All rights reserved. Sun, Sun Microsystems, and the Sun logo

More information

SSL Certificates Certificate Policy (CP)

SSL Certificates Certificate Policy (CP) SSL Certificates Last Revision Date: February 26, 2015 Version 1.0 Revisions Version Date Description of changes Author s Name Draft 17 Jan 2011 Initial Release (Draft) Ivo Vitorino 1.0 26 Feb 2015 Full

More information

Registration and Renewal procedure for Belfius Certificate

Registration and Renewal procedure for Belfius Certificate Registration and Renewal procedure for Belfius Certificate Table of contents TABLE OF CONTENTS... 2 1. INTRODUCTION... 3 2. CONTACT... 3 3. CONFIGURATION... 3 4. REGISTRATION PROCEDURE... 4 4.1 PRE-REQUISITES...

More information

One Identity Starling Identity Analytics & Risk Intelligence. User Guide

One Identity Starling Identity Analytics & Risk Intelligence. User Guide One Identity Starling Identity Analytics & Risk Intelligence User Guide Copyright 2019 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software

More information

SafeNet Authentication Client

SafeNet Authentication Client SafeNet Authentication Client Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto and/or its subsidiaries who shall have and keep the

More information

Guide Installation and User Guide - Linux

Guide Installation and User Guide - Linux Guide Installation and User Guide - Linux With Fujitsu mpollux DigiSign Client, you can use your smart card for secure access to electronic services or organization networks, as well as to digitally sign

More information

GB-OS. Certificate Management. Tel: Fax Web:

GB-OS. Certificate Management. Tel: Fax Web: GB-OS Certificate Management GBOSCM201411-01 Global Technology Associates 3505 Lake Lynda Drive Suite 115 Orlando, FL 32817 Tel: +1.407.380.0220 Fax. +1.407.380.6080 Email: info@gta.com Web: www.gta.com

More information

Chapter 6: Digital Certificates Introduction Authentication Methods PKI Digital Certificate Passing

Chapter 6: Digital Certificates Introduction Authentication Methods PKI Digital Certificate Passing Chapter 6: Digital Certificates Introduction Methods PKI Digital Certificate Passing Prof Bill Buchanan OBE http://asecuritysite.com/crypto06 http://asecuritysite.com/encryption Identity on the Internet

More information

Corporate Online. Introducing Corporate Online

Corporate Online. Introducing Corporate Online Corporate Online. Introducing Corporate Online Effective as at April 2015 About this Guide About Corporate Online Westpac Corporate Online is an internet-based electronic platform, providing a single point

More information

OCSP Client Tool V2.2 User Guide

OCSP Client Tool V2.2 User Guide Ascertia Limited 40 Occam Road Surrey Research Park Guildford Surrey GU2 7YG Tel: +44 1483 685500 Fax: +44 1483 573704 www.ascertia.com OCSP Client Tool V2.2 User Guide Document Version: 2.2.0.2 Document

More information

Terms and Conditions for Remote Data Transmission

Terms and Conditions for Remote Data Transmission Terms and Conditions for Remote Data Transmission The following translation is provided for your convenience only. The original German text Bedingungen für Datenfernübertragung is binding in all respects.

More information

UDRP Pilot Project. 1. Simplified way of sending signed hardcopies of Complaints and/or Responses to the Provider (Par. 3(b), Par. 5(b) of the Rules)

UDRP Pilot Project. 1. Simplified way of sending signed hardcopies of Complaints and/or Responses to the Provider (Par. 3(b), Par. 5(b) of the Rules) UDRP Pilot Project The Czech Arbitration Court (CAC) proposes that it runs two pilot projects (Pilot) related to its implementation of UDRP. During the Pilot, the following proposed new UDRP-related services

More information

Cloud Link Configuration Guide. March 2014

Cloud Link Configuration Guide. March 2014 Cloud Link Configuration Guide March 2014 Copyright 2014 SOTI Inc. All rights reserved. This documentation and the software described in this document are furnished under and are subject to the terms of

More information

Installation and configuration guide

Installation and configuration guide Winfrasoft HAS Installation and Configuration Guide Installation and configuration guide Winfrasoft HAS for Microsoft Forefront UAG 2010 Published: October 2011 Applies to: Winfrasoft HAS (Build 2.0.2300.4)

More information

Dubai Financial Services Authority DFSA eportal User Guide v1.docx Page 1 of 21

Dubai Financial Services Authority DFSA eportal User Guide v1.docx Page 1 of 21 Page 1 of 21 Table of Contents 1 Introduction... 3 1.1 Objective of the User Guide... 3 1.2 About Online Forms... 3 1.3 Security... 3 1.4 Overview of Online Forms Submission Process... 4 1.4.1 Data Entry...

More information

Administration. STILOG IST, all rights reserved

Administration. STILOG IST, all rights reserved 2 Table of Contents I. Admin Center... 1 1. ACCESS... 1 Starting the Admin Center application... 1 2. General Settings... 2 Home page... 3 Client... 4 Application... 5 VPPortal... 6 3. Password Configuration...

More information

CertDigital Certification Services Policy

CertDigital Certification Services Policy CertDigital Certification Services Policy Page: 2 ISSUED BY : DEPARTAMENT NAME DATE ELECTRONIC SERVICES COMPARTMENT COMPARTMENT CHIEF 19.03.2011 APPROVED BY : DEPARTMENT NAME DATE MANAGEMENT OF POLICIES

More information

Access to hosted Systems at ERPsourcing AG using SSL-VPN

Access to hosted Systems at ERPsourcing AG using SSL-VPN Access to hosted Systems at ERPsourcing AG using SSL-VPN 14th October 2016 ERPsourcing AG Businesspark Husacherstrasse 3 CH -8304 Wallisellen Tel. +41 43 233 34 34 Fax +41 43 233 34 35 www.erpsourcing.ch

More information

Cisco Unified Serviceability

Cisco Unified Serviceability Cisco Unified Serviceability Introduction, page 1 Installation, page 5 Introduction This document uses the following abbreviations to identify administration differences for these Cisco products: Unified

More information

ONE ID Identity and Access Management System

ONE ID Identity and Access Management System ONE ID Identity and Access Management System Local Registration Authority User Guide Document Identifier: 2274 Version: 1.8 Page 1 Copyright Notice Copyright 2011, ehealth Ontario All rights reserved No

More information

Accessing the Ministry Secure File Delivery Service (SFDS)

Accessing the Ministry Secure File Delivery Service (SFDS) Ministry of Health Services Accessing the Ministry Secure File Delivery Service (SFDS) A Guide for New Users To SFDS And Digital Certificate Installation May 2004 Preface Purpose Audience Structure This

More information

SafeNet MobilePKI for BlackBerry V1.2. Administration Guide

SafeNet MobilePKI for BlackBerry V1.2. Administration Guide SafeNet MobilePKI for BlackBerry V1.2 Administration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV and/or its subsidiaries who shall have

More information

Apple Corporate Certificates Certificate Policy and Certification Practice Statement. Apple Inc.

Apple Corporate  Certificates Certificate Policy and Certification Practice Statement. Apple Inc. Apple Inc. Certificate Policy and Certification Practice Statement Version 1.0 Effective Date: March 12, 2015 Table of Contents 1. Introduction... 4 1.1. Trademarks... 4 1.2. Table of acronyms... 4 1.3.

More information

Configuring Remote Access using the RDS Gateway

Configuring Remote Access using the RDS Gateway Configuring Remote Access using the RDS Gateway Author: AC, SNE Contents Introduction... 3 Pre-requisites... 3 Supported Operating Systems... 3 Installing the I.T. Services Certificate Authority Root Certificate...

More information

ETSY.COM - PRIVACY POLICY

ETSY.COM - PRIVACY POLICY At Etsy, we value our community. You trust us with your information, and we re serious about that responsibility. We believe in transparency, and we re committed to being upfront about our privacy practices,

More information

Dubai Financial Services Authority DFSA eportal User Guide v1.docx Page 1 of 26

Dubai Financial Services Authority DFSA eportal User Guide v1.docx Page 1 of 26 Page 1 of 26 Table of Contents 1 Introduction... 3 1.1 Objective of the User Guide... 3 1.2 About Online Forms... 3 1.3 Security... 3 1.3.1 Security... 3 1.4 Overview of Online Forms Submission Process...

More information

VSP18 Venafi Security Professional

VSP18 Venafi Security Professional VSP18 Venafi Security Professional 13 April 2018 2018 Venafi. All Rights Reserved. 1 VSP18 Prerequisites Course intended for: IT Professionals who interact with Digital Certificates Also appropriate for:

More information

egov & PKI By: Alaa Eldin Mahmoud Aly YOUR LOGO

egov & PKI By: Alaa Eldin Mahmoud Aly YOUR LOGO egov & PKI By: Alaa Eldin Mahmoud Aly YOUR LOGO e-government Survey 2014 United Nations Page 2 EGDI: E-Government Development Index National ID & Digital Signature Estonian Prime Minister Andrus Ansip

More information

Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations Version 1.10 Effective Date: June 10, 2013

Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations Version 1.10 Effective Date: June 10, 2013 Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations Version 1.10 Effective Date: June 10, 2013 Table of Contents 1. Introduction... 5 1.1. Trademarks... 5

More information

NeoAccel NeoAccel Management Console: Gateway Gateway Administration version version 2.3

NeoAccel NeoAccel Management Console: Gateway Gateway Administration version version 2.3 SSL VPN-Plus TM NeoAccel NeoAccel Management Console: Console: Gateway Gateway Administration version version 2.3 2.0 Copyright 2005-2006. 2005-2009. NeoAccel Inc. NeoAccel Inc. NMC - Volume II -SSL VPN-Plus-v2.33

More information

FUJITSU Cloud Service S5. Introduction Guide. Ver. 1.3 FUJITSU AMERICA, INC.

FUJITSU Cloud Service S5. Introduction Guide. Ver. 1.3 FUJITSU AMERICA, INC. FUJITSU Cloud Service S5 Introduction Guide Ver. 1.3 FUJITSU AMERICA, INC. 1 FUJITSU Cloud Service S5 Introduction Guide Ver. 1.3 Date of publish: September, 2011 All Rights Reserved, Copyright FUJITSU

More information

Viewing System Status, page 404. Backing Up and Restoring a Configuration, page 416. Managing Certificates for Authentication, page 418

Viewing System Status, page 404. Backing Up and Restoring a Configuration, page 416. Managing Certificates for Authentication, page 418 This chapter describes how to maintain the configuration and firmware, reboot or reset the security appliance, manage the security license and digital certificates, and configure other features to help

More information

ADMINISTRATORS GUIDE

ADMINISTRATORS GUIDE ADMINISTRATORS GUIDE Corporate Online Give your business the edge Contents Introduction 1 Overview 1 Preparatory steps to login 2 Logging in 4 Signing 5 Logging out 5 Navigating around the system 5 Section

More information

ING Corporate PKI G3 Internal Certificate Policy

ING Corporate PKI G3 Internal Certificate Policy ING Corporate PKI G3 Internal Certificate Policy Version 1.0 March 2018 ING Corporate PKI Service Centre Final Version 1.0 Document information Commissioned by Additional copies of this document ING Corporate

More information

The Match On Card Technology

The Match On Card Technology Precise Biometrics White Paper The Match On Card Technology Magnus Pettersson Precise Biometrics AB, Dag Hammarskjölds väg 2, SE 224 67 Lund, Sweden 22nd August 2001 Abstract To make biometric verification

More information

Cambium Wireless Manager

Cambium Wireless Manager Cambium Wireless Manager Client Setup Guide System Release 4.2 and Later Issue 1 November 2014 2014 Cambium Networks. All Rights Reserved. Accuracy While reasonable efforts have been made to assure the

More information

ECA Trusted Agent Handbook

ECA Trusted Agent Handbook Revision 8.0 September 4, 2015 Introduction This Trusted Agent Handbook provides instructions for individuals authorized to perform personal presence identity verification of subscribers enrolling for

More information

Indeed Card Management Smart card lifecycle management system

Indeed Card Management Smart card lifecycle management system Indeed Card Management Smart card lifecycle management system Introduction User digital signature, strong authentication and data encryption have become quite common for most of the modern companies. These

More information

Sage Installation and System Administrator s Guide. March 2019

Sage Installation and System Administrator s Guide. March 2019 Sage 100 2019 Installation and System Administrator s Guide March 2019 2019 The Sage Group plc or its licensors. All rights reserved. Sage, Sage logos, and Sage product and service names mentioned herein

More information

PKI Credentialing Handbook

PKI Credentialing Handbook PKI Credentialing Handbook Contents Introduction...3 Dissecting PKI...4 Components of PKI...6 Digital certificates... 6 Public and private keys... 7 Smart cards... 8 Certificate Authority (CA)... 10 Key

More information

Electronic Seal Administrator Guide Published:December 27, 2017

Electronic Seal Administrator Guide Published:December 27, 2017 Electronic Seal Administrator Guide Published:December 27, 2017 Copyright Version 4.25.2.3 Copyright 2003-2018 DocuSign, Inc. All rights reserved. For information about DocuSign trademarks, copyrights

More information

ClientNet. Portal Admin Guide

ClientNet. Portal Admin Guide ClientNet Portal Admin Guide Document Revision Date: June 5, 2013 ClientNet Portal Admin Guide i Contents Introduction to the Portal... 1 About the Portal... 1 Logging On and Off the Portal... 1 Language

More information

FACTS WHAT DOES FARMERS STATE BANK DO WITH YOUR PERSONAL INFORMATION? WHY? WHAT? HOW? L QUESTIONS?

FACTS WHAT DOES FARMERS STATE BANK DO WITH YOUR PERSONAL INFORMATION? WHY? WHAT? HOW? L QUESTIONS? FACTS WHAT DOES FARMERS STATE BANK DO WITH YOUR PERSONAL INFORMATION? WHY? WHAT? HOW? Financial companies choose how they share your personal information. Federal law gives consumers the right to limit

More information

OPC UA Configuration Manager Help 2010 Kepware Technologies

OPC UA Configuration Manager Help 2010 Kepware Technologies OPC UA Configuration Manager Help 2010 Kepware Technologies 1 OPC UA Configuration Manager Help Table of Contents 1 Getting Started... 2 Help Contents... 2 Overview... 2 Server Settings... 2 2 OPC UA Configuration...

More information

QUICK SET-UP VERIFICATION...3

QUICK SET-UP VERIFICATION...3 TABLE OF CONTENTS 1 QUICK SET-UP VERIFICATION...3 2 INSTALLING CERTIFICATES...3 3 IF YOU USE MS INTERNET EXPLORER...3 3.1 INSTALLING THE CERTIFICATE...3 3.2 SSL3 ACTIVATION:...3 3.3 JAVASCRIPT ACTIVATION...3

More information