Access to RTE s Information System by software certificates under Microsoft Windows Seven

Similar documents
Access to RTE s Information System by software certificates under Microsoft Windows 7

Smart card access to RTE s IS under Microsoft Windows 7

Accessing the IS by smart card with Microsoft Windows Vista

PKI Contacts PKI for Fraunhofer Contacts

Registration and Renewal procedure for Belfius Certificate

Odette CA Help File and User Manual

VII. Corente Services SSL Client

This help covers the ordering, download and installation procedure for Odette Digital Certificates.

Managing Certificates

RB Digital Signature Proxy Guide for Reporters

How to Configure SSL Interception in the Firewall

Exostar LDAP Proxy/Secure Setup Guide September 2017

IceWarp SSL Certificate Process

VMware AirWatch Cloud Connector Guide ACC Installation and Integration

CertAgent. Certificate Authority Guide

HP Instant Support Enterprise Edition (ISEE) Security overview

USER MANUAL FOR SECURE E MAIL MICROSOFT OUTLOOK (2003)

SSL Certificates Certificate Policy (CP)

FedLine Web Certificate Retrieval Procedures

VMware Workspace ONE UEM VMware AirWatch Cloud Connector

Workspace ONE UEM Integration with OpenTrust CMS Mobile 2. VMware Workspace ONE UEM 1811

QUICK SET-UP VERIFICATION...3

KeyA3 Certificate Manager

VMware AirWatch Integration with RSA PKI Guide

VMware AirWatch Integration with OpenTrust CMS Mobile 2.0

CertAgent. Certificate Authority Guide

PKI Configuration Examples

Entrust Connector (econnector) Venafi Trust Protection Platform

Administration. STILOG IST, all rights reserved

Sophos Mobile Control SaaS startup guide. Product version: 7

Deposit Wizard TellerScan Installation Guide

Public Key Infrastructure PKI. National Digital Certification Center Information Technology Authority Sultanate of Oman

FUJITSU Cloud Service S5. Introduction Guide. Ver. 1.3 FUJITSU AMERICA, INC.

IBM. Security Digital Certificate Manager. IBM i 7.1

Certificate Retrieval Procedures

Chapter 9. Protecting Attachments

Dell License Manager Version 1.2 User s Guide

Public. Atos Trustcenter. Server Certificates + Codesigning Certificates. Version 1.2

SafeConsole On-Prem Install Guide

CLIQ Web Manager. User Manual. The global leader in door opening solutions V 6.1

Cisco CTL Client setup

Sophos Mobile Control SaaS startup guide. Product version: 6.1

SafeConsole On-Prem Install Guide. version DataLocker Inc. July, SafeConsole. Reference for SafeConsole OnPrem

Registration and Renewal procedure for Belfius Certificate

User guide NotifySCM Installer

NetExtender for SSL-VPN

Workspace ONE UEM Notification Service 2. VMware Workspace ONE UEM 1811

SECARDEO. certbox. Help-Manual. Secardeo GmbH Release:

Implementing Messaging Security for Exchange Server Clients

WAM!NET Submission Icons. Help Guide. March 2015

Instructions For Configuring Your Browser Settings and Online Banking FAQ's

Schneider Electric Floating License Manager

WP doc5 - Test Programme

Schneider Electric License Manager

e-frr SYSTEM USER GUIDE

User Guide for Accessing Cisco Unity Connection Voice Messages in an Application

AirWatch Mobile Device Management

Welch Allyn RetinaVue Network

Guide Installation and User Guide - Mac

RTE Customer Services Portal

Configuring Certificate Authorities and Digital Certificates

How to Set Up External CA VPN Certificates

Secure Web Gateway. SWG User Guide. Release Manual Version v

Dohatec CA. Export/Import Procedure etoken Pro 72K FOR USERS OF ETOKENS [VERSION 1.0]

Setting up IMAP Mail in Outlook

VMware AirWatch Certificate Authentication for EAS with ADCS

BROWSER-BASED SUPPORT CONSOLE USER S GUIDE. 31 January 2017

Common Access Card for Xerox VersaLink Printers

Key Management and Distribution

Genesys Security Deployment Guide. What You Need

VMware AirWatch Certificate Authentication for Cisco IPSec VPN

Send documentation comments to

Security Digital Certificate Manager

Jetbrains License Server User Guide

3.1 Getting Software and Certificates

for Unclassified Systems

Configuring the Cisco APIC-EM Settings

Hypertext Transfer Protocol Over Secure Sockets Layer (HTTPS)

Transport Gateway Installation / Registration / Configuration

Version Installation Guide. 1 Bocada Installation Guide

TIBCO Managed File Transfer Internet Server Transfer and File Share Clients User's Guide

Using VMware View Client for Mac

Policy Settings for Windows Server 2003 (including SP1) and Windows XP (including SP2)

Management Console User Guide

راهنماي استفاده از توکن امنيتي کيا 3 در نرمافزارهاي مبتني بر PKI توکن امنيتي سخت افزاري

IBM Client Security Solutions. Client Security Software Version 1.0 Administrator's Guide

Transport Gateway Installation / Registration / Configuration

KYOCERA Net Admin User Guide

Connect to Wireless, certificate install and setup Citrix Receiver

How to Configure S/MIME for WorxMail

Guide Installation and User Guide - Windows

Managed Access Gateway. User Guide

How to Configure Mutual Authentication using X.509 Certificate in SMP SAP Mobile Platform (3.X)

WORKSTATION SETUP GUIDE FOR ACCESSING THE MIBGAS PLATFORM. Date: 15/12/2016. Version: 4.1 MERCADO IBÉRICO DEL GAS

MTR CORPORATION E-Tendering User Guide for Suppliers

Sophos Mobile Control Installation guide

vfire 9.5 Prerequisites Guide Version 1.1

Enabling Microsoft Outlook Calendar Notifications for Meetings Scheduled from the Cisco Unified MeetingPlace End-User Web Interface

Workspace ONE UEM Certificate Authentication for Cisco IPSec VPN. VMware Workspace ONE UEM 1810

Instructions for Configuring Your Browser Settings and Online Security FAQ s

Transcription:

by software certificates under Microsoft Windows Seven PKI User guide Version 3, June 17 th 2016 Programmes & SI (PSI) TOUR MARCHAND 41 RUE BERTHELOT - 92411 COURBEVOIE CEDEX TEL : 01.78.66.50.00 - FAX : 01.78.66.50.64 www.rte-france.com/en/ 05-09-00-LONG

Page : 2/160 SUMMARY A. Foreword 6 1. Introduction 7 1.1 Purpose of the document 7 1.2 Context 7 1.3 Warning regarding security practices 7 1.4 The actors 8 The client 8 Registration Authority (RA) 8 Certification Authority (CA) 8 B. Certificates management procedures 9 2. Certificates management process 10 2.1 Foreword 10 2.2 Software certificate request 10 Preliminary steps 10 General diagram 11 2.3 Certificates renewal 11 2.4 Revocation of certificates 12 Case of revocation 12 Revocation request 12 C. Workstation configuration 13 3. Installation and configuration of the workstation 14 3.1 Network configuration 14 General configuration 14 Specificity of the VPN access 14 3.2 Software configuration 16 D. Web access to the RTE Information System 17 4. Microsoft Internet Explorer 18 4.1 Preliminary configuration 18 Configuration of the security settings 18 Adding trusted sites 19 4.2 Installing RTE s CA root certificate 22 Download and install 22 Visualization and verification of RTE s CA root certificate 26 4.3 Installing your personal certificate 29

Page : 3/160 Authentication on the retrieval interface 29 Downloading of your certificate 31 Installation of your personal certificate 32 Visualization and verification of your software certificate 38 4.4 Using your certificate 41 Authentication and encryption 41 Example of access to an RTE web application 41 4.5 Additional operations 43 Export of your personal certificate 43 Deleting your personal certificate 48 4.6 Connecting to the SSL VPN 51 Foreword 51 Prerequisite 51 First connection 54 Using the SSL VPN 58 5. Mozilla Firefox 61 5.1 Preliminary configuration 61 5.2 Installing RTE s CA root certificate 61 Download and install 61 Visualization and verification of RTE s CA root certificate 65 5.3 Installing your personal certificate 68 Authentication on the retrieval interface 68 Downloading of your certificate 70 Installation of your personal certificate 72 Visualization and verification of your software certificate 74 5.4 Using your certificate 77 Authentication and encryption 77 Example of access to an RTE web application 78 5.5 Additional operations 79 Defining the master password for personal security 79 Export of your personal certificate 82 Deleting your personal certificate 85 5.6 Connecting to the SSL VPN 87 Foreword 87 Prerequisite 88 First connection 91 Using the SSL VPN 95 E. Email exchanges with RTE s Information System 98 6. Using your certificate to exchange emails 99 6.1 Certificate usage principle 99 6.2 Decryption and signature verification of a received message 99

Page : 4/160 6.3 Encryption and signing of a sent message 99 6.4 Steps to configure your email client 100 7. Microsoft Outlook 2013 101 7.1 Installing RTE s CA root certificate 101 7.2 Installing your personal certificate 101 7.3 Email account configuration 101 7.4 Installing RTE s application certificate 104 7.5 Using the certificate: sending a signed-encrypted email 107 8. Mozilla Thunderbird 108 8.1 Installing RTE s CA root certificate 108 Downloading RTE s CA root certificates 108 Installing RTE s current CA certificate 109 Visualization of RTE s CA root certificate 112 8.2 Installing your personal certificate 114 8.3 Email account configuration 119 8.4 Installing RTE s application certificate 121 8.5 Using the certificate: sending a signed-encrypted email 124 9. Lotus Notes 8.5 125 9.1 Installing RTE s CA root certificate 125 9.2 Installing your personal certificate 125 Creation of a PKCS#12 file readable by Notes 125 Installing the PKCS#12 file in Notes 126 Visualization of the certificate 133 9.3 Email account configuration 134 9.4 Installing RTE s application certificate 135 9.5 Using the certificate: sending a signed-encrypted email 137 10. Lotus Notes 9 138 10.1 Installing RTE s CA root certificate 138 10.2 Installing your personal certificate 138 Creation of a PKCS#12 file readable by Notes 138 Installing the PKCS#12 file in Notes 139 Visualization of the certificate 145 10.3 Email account configuration 146 10.4 Installing RTE s application certificate 147 10.5 Using the certificate: sending a signed-encrypted email 149 F. Appendixes 150 11. Secure environment (PKI) 151 11.1 Concepts and objects managed by a PKI 151 What is a secure process? 151 The importance of dual-keys 152 Certificates 154

Page : 5/160 11.2 Documentation 156 12. Glossary 157 13. Incidents management and support 159 13.1 Support 159 13.2 Frequently Asked Questions (FAQ) 159 13.3 Error codes returned by email 160

Page : 6/160 A. FOREWORD

Page : 7/160 1. Introduction 1.1 Purpose of the document This document is intended for the end user who wants to access RTE s Information System by using software certificates under Microsoft Windows Seven. This document allows the holder to: Understand the context and principles of a secure environment (authentication, confidentiality, integrity and non-repudiation) and the general operation of a Public Key management Infrastructure (PKI). Learn to install and use his software certificates in the following environments: o o o Microsoft Windows Seven. Browsers: Internet Explorer and Mozilla Firefox for secure accesses via the HTTPS protocol. Email Clients: Microsoft Outlook, IBM Lotus Notes, and Mozilla Thunderbird for secure exchanges in S/MIME format (a standard for cryptography and digital signatures concerning emails encapsulated in MIME format). NOTE Throughout this document, the word "you" is the user of the certificate. 1.2 Context Under the law of February 10, 2000 (2000-108) and the implementing decree 2001-630 of 16 July 2001, the operator of the public transport network has an obligation to preserve the confidentiality of economic, commercial, industrial, financial or technical information of which the disclosure would be likely to undermine the rules of free and fair competition and nondiscrimination required by law. 1.3 Warning regarding security practices Each software certificate holder has its own private key, all (certificate and associated private key) is generated by RTE and made available for download by the wearer as a passwordprotected file (PKCS # 12 file, extension "p12"). Then, each software certificate holder shall take all necessary precautions to prevent: the violation of his private key, the loss of his private key, the divulgation of his private key, the alteration of his certificate, the misuse of his certificate. Each software private key and its associated certificate have to be stored on hard disk and protected by a password known only by the certificate holder.

Page : 8/160 The Certification Authority (CA) "RTE Certification Authority" takes no responsibility for disputes related to misuse of private keys. 1.4 The actors The life cycle management of a certificate is based on three entities: the client (i.e. your company), the Registration Authority (RA), the Certification Authority (CA). NOTE To understand, one can draw a parallel with the allocation of official credentials: the applicant citizen of a credential is the Client; the town is the Registration Authority and the prefecture is the Certification Authority. The client The client issues certificates requests for holders. It may also issue requests for revocation of the certificates (see Section B: certificate management procedures). Registration Authority (RA) The Registration Authority (RTE s manager of customer relations and the Operator) collects the certificates requests, affixes a date of validity for certificates and verifies the identity of their holders. Certification Authority (CA) The Certification Authority (RTE) is responsible and liable for certificates signed in its name and of the PKI s operation. It sets policy for the management and use of certificates. RTE certification authority is called: CN = RTE Certification Authority, O = RESEAU DE TRANSPORT D'ELECTRICITE

B. CERTIFICATES MANAGEMENT PROCEDURES Programmes & SI (PSI) TOUR MARCHAND 41 RUE BERTHELOT - 92411 COURBEVOIE CEDEX TEL : 01.78.66.50.00 - FAX : 01.78.66.50.64 www.rte-france.com/en/ 05-09-00-LONG

Page : 10/160 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued to holders are: obtaining a certificate (obtaining one or more certificates), renewal of a certificate (replacement by a new certificate for a new validity period and a new key pair) revocation of a certificate (end of certificate validity). 2.2 Software certificate request Preliminary steps Beforehand, the following steps must be performed, The company representative issues an access request : The company representative must have completed and signed the request forms access to RTE IS services and applications" sent by his Customer Relations Manager, and then sent it back to him. In these forms, the company representative specifies in particular: o a Contact email who will receive all information necessary to retrieve the certificate (see Erreur! Source du renvoi introuvable.), o a Certificate email, o a Chosen password, necessary to the retrieval of the certificate by the holder We have registered your request : Following receipt of the forms we have created your account(s) to access the applications.

Page : 11/160 General diagram After the certificate request has been saved and validated by us (within 5 working days), a notification email is sent to the address "Contact Email" entered in the access request form (see 2.2.1). This mall is entitled "Access to RTE s IS services" and contains: a summary of the certificate of removal procedure, the "Certificate email" and "Retrieval Code" requested by the website to retrieve your certificate, the Password" protecting the PKCS # 12 file (a ".p12" extension) that you downloaded when you retrieved your certificate. Please remember that this password is different from the password to retrieve the certificate. In case of loss or non-receipt of this message, contact the RTE Hotline. Exchange scenarios The holder has to connect from his workstation on the certificate retrieval website and download his private key and the associated certificate to his workstation in the form of the PKCS#12 file (extension "p12"). 2.3 Certificates renewal The lifespan of the certificates is limited to 3 years, to ensure a high level of security. Forty days before the expiration date of a certificate, an electronic message is sent to the contact email to inform the holder of the forthcoming expiry of his software certificate. In case, changes must be made concerning the holder s information, then the company representative contacts RTE s responsible for customer relations to inform him of the changes. Otherwise, an email is sent to the contact email with the information necessary for the retrieval of his new certificate.

Page : 12/160 2.4 Revocation of certificates Case of revocation The company representative must issue a revocation request when any of the following occurs: Change of the holder, Loss, theft, compromise or suspected compromise (possible, probable or certain) of his private key or associated certificate, Death or cessation of business of the certificate holder, Loss of the activation data, defective or lost support. Revocation request To revoke a certificate, the company representative should call the RTE Hotline. When the certificate is revoked, an email is sent to the contact email to notify the holder of the revocation of his certificate.

Page : 13/160 C. WORKSTATION CONFIGURATION

Page : 14/160 3. Installation and configuration of the workstation All operations of this chapter are to be performed only once by a computer specialist with Administrator privileges on your workstation, upon receipt of your "PKI Access Kit". Also note that only a few chapters of this manual concern you: the chapters corresponding to the software you use. All operations are done under the Windows Session of the certificate holder. 3.1 Network configuration General configuration The web browser access uses - in a way that is transparent to the user - a software certificate authentication system for access to the RTE portal and encryption of data exchanged via the Internet (HTTPS protocol). Mail exchanges between RTE and the user are routed over the Internet (SMTP protocol, S/MIME format). Specificity of the VPN access IMPORTANT NOTE Messaging and antivirus gateways, firewalls and content analyzers should be configured not to alter or reject messages that are encrypted and signed S/MIME (application / x-pkcs7-mime,.p7s,.p7m) and not to prohibit the flow of HTTPS data (port 443). The network administrator may be requested to perform these operations. The VPN allows from your workstation to establish a secure connection (based on the authentication to a dedicated site) to RTE s IS via the Internet. Access to the SSL VPN requires that your workstation can resolve the address secure.iservices.rte-france.com. To see if this is the case, open your Start menu, type run in the search bar and click the icon "Run."

Page : 15/160 In the window that appears, enter the command: cmd /k ping secure.iservices.rte-france.com Click the OK button. A window appears containing the information: If the first line begins with "Sending a query 'ping' on secure.iservices.rtefrance.com" the address secure.iservices.rte-france.com is resolved. Your workstation is configured properly. If the first line begins with "Ping request could not find the host secure.iservices.rte-france.com." the address secure.iservices.rte-france.com is not resolved. Please contact your IT support so that they make the necessary changes.

Page : 16/160 In addition to this test, you need to install on your workstation the module JIS (Juniper Installation Service) available on the RTE customer site. Refer to the section concerning the browser you are using for more details: 4.6.2 if you are using Internet Explorer. 5.6.2 if you are using Mozilla Firefox. 3.2 Software configuration The software configuration required for your workstation is as follows: Operating Systems: Microsoft Windows Seven 32 bits without SP or with SP1 Microsoft Windows Seven 64 bits without SP or with SP1 Web browser either: Microsoft Internet Explorer 11 Mozilla Firefox > 45 ESR Email client either: Microsoft Outlook 2013 Mozilla Thunderbird > 45 ESR IBM Lotus Notes 8.5 or 9 NOTE In general, consulting messages on a webmail like interface does not allow to sign your messages.

Page : 17/160 D. WEB ACCESS TO THE RTE INFORMATION SYSTEM Please refer directly to the chapter associated with the browser you are using for your default Web exchanges with RTE: Chapter 4 if you are using Microsoft Internet Explorer as web browser Chapter 5 if you are using Mozilla Firefox as web browser

Page : 18/160 4. Microsoft Internet Explorer 4.1 Preliminary configuration Configuration of the security settings This section is about the configuration of the workstation to support the SSL standard, allowing access to sites with an encrypted connection (HTTPS protocol). In the browser, select the menu "Tools> Internet Options":

Page : 19/160 Select the tab Advanced : In the section Security, make sure that the boxes TLS 1.0, TLS 1.1 and TLS 1.2 are ticked, as shown above. Adding trusted sites In order to log on to the web sites with your software certificate, it is imperative to add these sites to the list of trusted sites. The Trusted Sites zone allows the declaration of sites names you consider safe. In this section, you must be logged into the workstation with the Windows account that will use the software certificate. To do this: open Internet Explorer and click the menu "Tools> Internet Options".

Page : 20/160 In the window that appears, click the "Security" tab. select the "Trusted Sites" icon and click the "Sites" button.

Page : 21/160 The following window appears: In the field Add this website to the zone, enter the URL corresponding to the PKI: https://kregistration-user.certificat2.com Update this URL when the PKI will be replaced by a new one. Then click Add. The site then appears in the list Websites as shown below. Proceed in the same way to add the following websites: https://portail.iservices.rte-france.com: this is the internet portal https://secure.iservices.rte-france.com: this is the SSL VPN connection portal

Page : 22/160 The 3 websites shall now appear in the list Websites. Click Close, then OK. 4.2 Installing RTE s CA root certificate Download and install RTE s CA root certificate must now be installed in your browser so that RTE is recognized as a trusted Certificate Authority To do so, please go to the following address: IMPORTANT NOTE It is imperative to respect the case (upper / lower case) of the site s address. The download window appears: https://kregistration-user.certificat2.com/kregresources/css/rte/rte/certification_autority_rte_2048.cer Click the "Save" button and choose a location to save the file "Certification_Autority_RTE_2048.cer" containing the root certificate. Once the download is completed, the following window appears: Click "Open folder" to go to the directory where you saved the file.

Page : 23/160 Right-click the "Certification_Autority_RTE_2048.cer" file you just downloaded and choose "Install Certificate". The installation wizard of the certificate is displayed: Click Next. Select "Place all certificates in the following store" and click "Browse".

Page : 24/160 In the window that appears, select "Trusted Root Certification Authorities" and click "OK". Once you have chosen the certificate store, you get the following window:

Page : 25/160 Click «Next». Click "Finish", the next window will display the imported root certificates.

Page : 26/160 Click OK. Visualization and verification of RTE s CA root certificate The root certificate that you just imported, is stored in the Trusted Root Certification Authorities store of Internet Explorer. To view them, click the menu "Tools > Internet Options". A window appears. Go to the "Content" tab and click the "Certificates" button.

Page : 27/160

Page : 28/160 In the window that appears, go to the tab "Trusted Root Certification Authorities". Select the certificate "RTE Certification Authority". Click the button "View" then click the "Details" tab.

Page : 29/160 To ensure the authenticity of this certificate, carefully check that the thumbprint "SHA1" or "MD5" related to the certificate "RTE Certification Authority" is identical to those presented below. Digital hashes of the certificate «RTE Certification Authority» SHA1 39:83:D6:10:A2:C4:D5:60:45:A0:C1:D0:E3:FA:E1:42:45:8A:37:12 MD5 77:4C:12:7D:FD:1D:36:9E:8A:21:85:73:7C:2D:44:77 If this is not the case: delete the certificate and call the Hotline. 4.3 Installing your personal certificate Authentication on the retrieval interface The software certificate request must have been completed in accordance with the procedure of chapter Erreur! Source du renvoi introuvable.. To proceed to the retrieval you need the following information (see Erreur! Source du renvoi introuvable.): The chosen password you or your administrator have chosen and supplied to RTE in the form to request access to RTE s IS (see Erreur! Source du renvoi introuvable.). Certificate email, Retrieval code and Password for the PKCS#12 file included in the email Access to RTE s IS services. For your convenience you can copy and paste different values being careful not to copy any space at the beginning or end. To create your certificate and the associated private key, log on the certificate retrieval website: IMPORTANT NOTE It is imperative to respect the case (upper / lower case) of the site s address. https://kregistration-user.certificat2.com/rte/rte/logiciel3:i

Page : 30/160 Click the button Retrieval of your personal certificate. Fill the field «Certificate email» with the value indicated in the email Access to RTE s IS services. Click Send.

Page : 31/160 Fill the fields: Retrieval code as indicated in the email Access to RTE s IS services. Chosen password which is the password you or your company representative chose and provided to RTE in the form to request access to RTE s IS (see 2.2.1). Finally click Send. Downloading of your certificate The following page appears. Click Download. In the window that appears, click Save. Choose a directory to save your certificate, then click "Save." A window shows the progress of the download. Once the download is completed, click "Open Folder".

Page : 32/160 The folder containing your personal certificate appears. Installation of your personal certificate Go to the download folder of the file. IMPORTANT NOTE Once downloaded, the PKCS#12 file (extension ".P12") containing your certificate and its associated private key must be stored on a removable media (USB stick or an external hard drive), that you have to put into a safe in order to protect access to it. Also keep the mail "Access to RTE's IS services" that contains the password. Double-Click the "name_certificate.p12" file containing your certificate. If the double-click does not launch the Certificate Installation wizard, right-click the "name_certificate.p12" file and choose "Install PFX".

Page : 33/160 Click Next. The name of the file containing your certificate is automatically filled, click Next.

Page : 34/160 The window below appears: In the field Password, enter the Password present in the email Access to RTE s IS services. The case Enable strong private key protection. [ ] is optional. Tick it if you wish to define a password that will be asked before every use of your private key in Internet Explorer. The case Mark this key as exportable. [ ] is optional. Tick it if you wish to be able to export you private key later (see chapter 4.5.1 to export). Tick the case Include all extended properties. Click Next.

Page : 35/160 Select "Automatically select the certificate store based on the type of certificate" and click "Next". Finally, click Finish.

Page : 36/160 If you previously ticked the case Enable strong private key protection, then the following window appears: Click the button Set security level. Select the case High then click Next.

Page : 37/160 Enter a name for the private key to protect and a password then click the "Finish" button. Warning: this password is required upon each use of the certificate. Click OK. Finally, the following window appears: Click OK. Your certificate, your private key and RTE s CA root certificate have been successfully imported in Internet Explorer.

Page : 38/160 Visualization and verification of your software certificate Regardless of the browser used, the content of the downloaded certificate is obviously the same, only the presentation of information on the screen differs. In the case of downloading with Internet Explorer, open the certificate store via the menu "Tools> Internet Options", "Content" tab, button "Certificates..." Select your certificate then click View.

Page : 39/160 It is valid for 3 years from the date of withdrawal.

Page : 40/160 The "Certification Path" tab allows checking the validity of your certificate. The "Certificate status" and the complete visualization of the certification path (2 levels) indicate that your certificate has been correctly installed. As well as the root certificate, which confirms that everything has been configured correctly. The tab "Details" allows you to view the full name of the holder and the email address to which are attached the certificate.

Page : 41/160 4.4 Using your certificate Authentication and encryption Steps to follow run Internet Explorer, enter the URL to RTE s application or to RTE s customer service portal : https://portail.iservices.rte-france.com, during the authentication, the browser will ask you to select the certificate to use for authentication then (if it has been defined) the certificate store protection password, if multiple certificates are presented, you must choose the one supplied for the application you wish to access (use the button Display certificate to visualize its content). Once authentication is completed, all data you send or receive will be encrypted. Example of access to an RTE web application Enter the URL of the application (starting with https ) in the Internet Explorer address bar then press Return. Then, Internet Explorer asks you to select a certificate enabling you to authenticate to the requested site.

Page : 42/160 The line click here to view certificate properties lets you view the content of the selected certificate. Click the OK button to access the application. The window below asks for the password that protects the private key associated with your certificate if it has been set. The home page is then securely displayed (appearance of the closed padlock to the right of the URL entry field):

Page : 43/160 4.5 Additional operations Export of your personal certificate This section explains how to save the certificate with its private key and the root certificate. The procedure is to generate a file in PKCS#12 format (".pfx" extension), protected by a password. You can only export your certificate and private key if you checked "Mark this key as exportable" when Installing your personal certificate (see 4.3.3). In Internet Explorer, click the menu "Tools> Internet Options..." Then, click the "Content" tab and then the "Certificates" button.

Page : 44/160

Page : 45/160 Another window appears. Select your certificate, then click "Export...". Click Next.

Page : 46/160 Select "Yes, export the private key" and then click "Next". Select the check box "Include all certificates in the certification path if possible" and then click "Next".

Page : 47/160 Enter a password of your choice to protect the PKCS#12 file, and then click "Next". Select the location of the PKCS#12 file, and then click "Next".

Page : 48/160 Finally, click the "Finish" button. Click "OK". You have exported to a file in PKCS#12 format, protected by a password, your certificate's private key and the root of the CA. These elements have therefore been exported, but remain present in the Internet Explorer s store. Deleting your personal certificate This section details the procedure to remove a certificate and its private key from Internet Explorer s Certificate store. IMPORTANT NOTE Before deleting your personal certificate, make sure to have a copy. If this is not the case, refer to 4.5.1 to export your certificate and private key as a PKCS#12 file.

Page : 49/160 In Internet Explorer, go to "Tools> Internet Options". A window appears. Click the Content tab, then the Certificates button:

Page : 50/160 Select the certificate to delete and click Remove. Click Yes.

Page : 51/160 The certificate is removed from the certificates list. 4.6 Connecting to the SSL VPN Foreword The connection via SSL VPN is a service for establishing a secure communications channel to RTE s FrontOffice via the Internet. This channel is established after authenticating with your certificate from a dedicated website (see section 4.4). Once the channel is established all communications with the requested RTE service will be encrypted. The use of SSL VPN requires the installation of a dedicated tool, installed during the first login to the site. The application is called Windows Secure Application Manager (WSAM). SSL VPN enables secure access to your mailboxes hosted on RTE s FrontOffice. Prerequisite The website secure.iservices.rte-france.com must be declared as a trusted site (see 4.1.2). IMPORTANT NOTE Before your first connection, you must verify that your workstation can resolve the address secure.iservices.rte-france.com (see section 3.1).

Page : 52/160 JIS (Juniper Installation Service) is a Windows service made available on the RTE customer site. This service allows, once installed, to update future WSAM versions without requiring the intervention of a person with administrator privileges on the machine. To do so, download the executable under the link: http://clients.rte-france.com/lang/fr/visiteurs/accueil/portail.jsp And decompress the compressed file: Once the file is executed, the following window appears, asking you the authorization to start the service. Click Run.

Page : 53/160 Once the file is executed, the following window appears. Click «Yes». This will enable the service to start installing. It will be automatically activated at every operating system launch. Click Close to close the window.

Page : 54/160 First connection This paragraph applies only to your first login to the SSL VPN with Internet Explorer. IMPORTANT The first connection must be made by a computer specialist with Administrator rights on your workstation in order to install the WSAM application. Before continuing, you need to disable ActiveX controls. To do so, press the "Alt" key on your keyboard. A menu bar at the top of the window. Then click the Tools button, and make sure "ActiveX Filtering" is off. " Launch your browser and go to the following website: https://secure.iservices.rte-france.com/ The following window appears: Select your certificate then click OK.

Page : 55/160 If necessary, this window will ask for the password that protects the private key associated to your certificate. The browser displays a link to install WSAM:

Page : 56/160 If no manual intervention is performed, the following installation pop-up appears: If necessary, the following window appears: Click Yes. The Juniper client then installs and the installation of the WSAM application starts:

Page : 57/160 Wait during the installation. If the following window appears, click Yes : Once the installation is completed, the following page appears: If your Internet access requires authentication to a proxy, a window appears asking your login and password. Enter them and confirm. Then, the icon appears in your taskbar.

Page : 58/160 Click the "Sign out" button (top right of the page) to end the session: Using the SSL VPN 4.6.4.1 Establishing the connection Launch your browser and go to the following website: https://secure.iservices.rte-france.com/ The following window appears: Select your certificate then click OK.

Page : 59/160 If necessary, a window will ask you the password that protects the private key associated with your certificate. If necessary, the window below appears. Click Yes. The WSAM application launches automatically and the following page appears: If your Internet access requires authentication to a proxy, a window appears asking your login and password. Enter them and confirm. Then, the icon appears in your taskbar. Notes: The certificate is only used to establish the connection to the SSL VPN. To close the SSL VPN session, click the Sign out button (top right of the page).

Page : 60/160 4.6.4.2 Use case to access hosted mailboxes The SSL VPN can be used to access mailboxes hosted on the FrontOffice with a standard email client. Access to hosted mailboxes requires the SSL VPN connection to be established (see 4.6.4.1). The Email account configuration in your mail client is then to be made with the following parameters: Mail server type : POP Server POP server address : pop.services.rte-france.com SMTP server address : smtp.services.rte-france.com When your access to RTE s FrontOffice is provided, you will receive your login name, your password and your email address. NOTE Because the messages are transferred through a secure channel, sending and receiving messages do not require the use of a certificate to encrypt messages.

Page : 61/160 5. Mozilla Firefox 5.1 Preliminary configuration The SSL standard, allowing access to sites with an encrypted connection (protocol HTTPS) is disabled by default in recent versions of Firefox. The supported versions of Firefox are specified in Erreur! Source du renvoi introuvable.. The standards supported by default are: TLS 1.0 to TLS 1.2. In case of problems, thank you to notify the issue to the support. 5.2 Installing RTE s CA root certificate Download and install RTE s CA root certificate must now be installed in your browser so that RTE is recognized as a trusted Certificate Authority To do so, please go to the following address: https://kregistration-user.certificat2.com/kregresources/css/rte/rte/certification_autority_rte_2048.cer Select Save file then click OK. A location to save the file Certification_Autority_RTE_2048.cer will eventually be requested.

Page : 62/160 Once the file is downloaded, click the menu Tools to right corner of the window then click the icon Options :

Page : 63/160 A window appears. Choose the Advanced tab then the subcategory Certificates. Click the «View certificates» button. Select the Authorities tab and click Import.

Page : 64/160 Select the previously saved file. A dialog box is displayed, in which you must select the three check boxes "Trust this CA to identify [...]" to trust RTE's CA.

Page : 65/160 Visualization and verification of RTE s CA root certificate Click the "View" button to verify that the certificate that you are going to trust is the RTE root certificate: To ensure that you have downloaded the real RTE CA's root certificate, check carefully that the "SHA1" or "MD5" hashes displayed is identical to the one shown below. Hashes of RTE s CA root certificate are recalled here: SHA1 39:83:D6:10:A2:C4:D5:60:45:A0:C1:D0:E3:FA:E1:42:45:8A:37:12 MD5 77:4C:12:7D:FD:1D:36:9E:8A:21:85:73:7C:2D:44:77 If this is not the case: click Close to go back to the precedent window and click Cancel then call RTE s Hotline.

Page : 66/160 If, after verification, the hash of the certificate that you imported matches the "SHA1" or "MD5" hash above, it is possible to consult the details of the certificate by clicking on the "Details" tab: By clicking on the "Close" button, you return to the initial window: "Downloading certificate" (see above). In this window, click the "OK" button: the RTE CA's root certificate is then installed in Mozilla Firefox. To view the certificate later in Mozilla Firefox, go to the "Tools" menu on the top right of the window then click the "Options" icon:

Page : 67/160 A window appears. Select the Advanced tab then the subcategory Certificates. Click the View certificates button.

Page : 68/160 In the Authorities tab you can verify that the root certificate RTE Certification Authority is well saved on your PC ( Software Security Device ) and view it by clicking on View. 5.3 Installing your personal certificate Authentication on the retrieval interface The software certificate request must have been completed in accordance with the procedure of chapter Erreur! Source du renvoi introuvable.. To proceed to the retrieval you need the following information (see Erreur! Source du renvoi introuvable.): The chosen password you or your administrator have chosen and supplied to RTE in the form to request access to RTE s IS (see Erreur! Source du renvoi introuvable.). Certificate email, Retrieval code and Password for the PKCS#12 file included in the email Access to RTE s IS services. For your convenience you can copy and paste different values being careful not to copy any space at the beginning or end. To create your certificate and the associated private key, log on the certificate retrieval website: IMPORTANT NOTE It is imperative to respect the case (upper / lower case) of the site s address. https://kregistration-user.certificat2.com/rte/rte/logiciel3:i

Page : 69/160 Click the button Retrieval of your personal certificate. Fill the field «Certificate email» with the value indicated in the email Access to RTE s IS services. Click Submit.

Page : 70/160 Fill the fields: Retrieval code as indicated in the email Access to RTE s IS services. Chosen password which is the password you or your company representative chose and provided to RTE in the form to request access to RTE s IS (see 2.2.1). Finally, click Submit. Downloading of your certificate The following page appears. Click Download. In the window that appears, click Save then OK.

Page : 71/160 Choose a directory to save your certificate, then click "Save". IMPORTANT NOTE Once downloaded, the PKCS#12 file (extension ".P12") containing your certificate and its associated private key must be stored on a removable media (USB stick, an external hard drive), that you have to put into a safe in order to protect access to it. Also keep the mall "Access to RTE's IS services" that contains the password.

Page : 72/160 Installation of your personal certificate In Firefox, go to the menu "Tools" on the top right of the window and click the "Options" icon: A window appears. Choose the tab Advanced then the subcategory Certificates. Click View Certificates.

Page : 73/160 Click Import. Go to the folder you saved your certificate in, select your certificate name_certificate.p12 and click Open.

Page : 74/160 If necessary, the window below will ask you the access password to the Mozilla Firefox certificate store: Enter it and click OK. The window below appears. Enter the Password present in the email Access to RTE s IS services then click OK. Your certificate and its associated private key have been successfully imported in Mozilla Firefox s certificate store. Visualization and verification of your software certificate Regardless of the browser used, the content of the downloaded certificate is obviously the same, only the presentation of information on the screen differs.

Page : 75/160 In the case of Mozilla Firefox, go to the Tools menu (top-right corner of the window) then click the Options icon: A window appears. Choose the Advanced tab then the Certificates subcategory. Then click the View Certificates button.

Page : 76/160 Select the tab Your Certificates. The certificate is a software certificate: indeed, the "Software Security Dev " indication appears at the right of its name. You can view it by selecting it and clicking "View. The first tab «General» displays the following message This certificate has been verified for the following uses. It is valid for 3 years from the date of withdrawal.

Page : 77/160 The second tab «Details» displays the certification hierarchy with RTE's root CA certificate. This ensures that all certificates have been installed correctly, and that all the correct conditions of your certificate are met. 5.4 Using your certificate Authentication and encryption Steps to follow run Mozilla Firefox, enter the URL to RTE s application or to RTE s customer service portal : https://portail.iservices.rte-france.com, during the authentication, the browser will ask you to select the certificate to use for authentication then (if it has been defined) the certificate store protection password, if multiple certificates are presented, you must choose the one supplied for the application you wish to access (use the button Display certificate to visualize its content). Once authentication is completed, all data you send or receive will be encrypted.

Page : 78/160 Example of access to an RTE web application When you access the https homepage, you will be asked to choose your certificate. Select your certificate from the drop down list entitled Choose a certificate to present as identification then click OK. The following window will ask you the access password to the Mozilla Firefox certificate store if it was defined

Page : 79/160 The home page is then securely displayed, (appearance of the closed padlock to the left of the URL entry field): 5.5 Additional operations Defining the master password for personal security To protect the private key associated with your certificate it is strongly recommended to set a personal security password.

Page : 80/160 To do this, click the Tools menu on the top right of the window and click on the Options icon: A window appears. Choose the Security tab. If Use a master password is already checked, it means you already have a personal security password, and you have nothing to do.

Page : 81/160 Otherwise, check the Use a master password case. The following window appears: Enter your new master password in both fields and click OK. Your personal security password is now defined. You can change your personal security password at any time by going to the menu Tools on the top right of the window and clicking the Options icon.

Page : 82/160 A window appears. Choose the Security tab and click Change Master Password. Export of your personal certificate This section explains how to save the certificate with its private key and the root certificate. The procedure is to generate a file in PKCS#12 format (".pfx" extension), protected by a password. Go the Tools menu at the top-right corner of the window then click the Options icon:

Page : 83/160 A window appears. Choose the Advanced tab then the Certificates subcategory. Then click View Certificates. Select your certificate and click Backup : Choose a folder and a name for the output file in PKCS#12 format (extension «.p12»):

Page : 84/160 Click Save. If necessary, the following window will ask you the access password to the Mozilla Firefox certificate store: Then the following window appears: Enter a password of your choice to protect access to the PKCS#12 file and click OK.

Page : 85/160 Your certificate, your private key and the CA s root certificate are exported in the PKCS#12 generated file (extension.p12 ). Deleting your personal certificate This section details the procedure to remove a certificate and its private key from Mozilla Firefox s Certificate store. IMPORTANT NOTE Before deleting your personal certificate, make sure to have a copy. If this is not the case, refer to Erreur! Source du renvoi introuvable. to export your certificate and private key as a PKCS#12 file. Go to the Tools menu at the top-right corner of the window then click the Options icon:

Page : 86/160 A window appears. Choose the Advanced tab then the Certificates subcategory. Then click View Certificates.... Select your certificate and click Delete.

Page : 87/160 Validate by clicking OK. The certificate is then removed from the list of certificates. 5.6 Connecting to the SSL VPN Foreword The connection via SSL VPN is a service for establishing a secure communications channel to RTE s FrontOffice via the Internet. This channel is established after authenticating with your certificate from a dedicated website (see section 5.4). Once the channel is established all communications with the requested RTE service will be encrypted. The use of SSL VPN requires the installation of a dedicated tool, installed during the first login to the site. The application is called Windows Secure Application Manager (WSAM). SSL VPN enables secure access to your mailboxes hosted on RTE s FrontOffice.

Page : 88/160 Prerequisite In order to connect to the SSL VPN with Firefox, Java SE Runtime Environment (JRE) 1.5.07 or higher needs to be installed on your workstation. If this is not the case, you can download the latest version on Oracle s website: http://java.com/fr/download/index.jsp IMPORTANT NOTE Before your first connection, you must verify that your workstation can resolve the address secure.iservices.rte-france.com (see section 3.1).

Page : 89/160 JIS (Juniper Installation Service) is a Windows service made available on the RTE customer site. This service allows, once installed, to update future WSAM versions without requiring the intervention of a person with administrator privileges on the machine. To do so, download the executable under the link: http://clients.rte-france.com/lang/fr/visiteurs/accueil/portail.jsp And decompress the compressed file: Once the file is executed, a window appears that asks the authorization to start the service. Click Execute :

Page : 90/160 The following window appears. Click Yes. This enables the service installation to start. This service will be automatically activated at every operating system launch. Click Close to close the window.

Page : 91/160 First connection This paragraph applies only to your first login to the SSL VPN with Mozilla Firefox. IMPORTANT The first connection must be made by a computer specialist with Administrator rights on your workstation in order to install the WSAM application. Launch your browser and go to the following website: The following window appears: https://secure.iservices.rte-france.com/ Select your certificate from the dropdown list entitled Choose a certificate to present as identification and click OK. If necessary, the following window will ask you the access password to the Mozilla Firefox certificate store.

Page : 92/160 If a window asking you permission to execute a script from Juniper Network, Inc. appears, click Yes. If the next red icon appears, click it in the address bar. Then in the dropdown menu of the message, select "Allow and remember». If necessary, the following window appears:

Page : 93/160 If the window below appears: click Yes. The installation of the WSAM application starts: If your Internet access requires authentication to a proxy, a window appears asking your login and password. Enter them and confirm. Then the window below appears: Then, the icon appears in your taskbar which means you are now connected to the SSL VPN.

Page : 94/160 Click the "Sign out" button (top right of the page) to end the session:

Page : 95/160 Using the SSL VPN 5.6.5.1 Establishing the connection Run your browser and access the following website: https://secure.iservices.rte-france.com/ The following window appears: Select your certificate from the dropdown list entitled Choose a certificate to present as identification and click OK. If necessary, the following window will ask you the access password to the Mozilla Firefox certificate store. If a window appears asking you permission to execute a script from Juniper Network, Inc. : click Allow. If the window below appears: click Yes.

Page : 96/160 If your Internet access requires authentication to a proxy, a window appears asking your login and password. Enter them and confirm. Then the window below appears: Then, the icon appears in your taskbar which means you are now connected to the SSL VPN. Notes: The certificate is only used to establish the connection to the SSL VPN. To close the SSL VPN session, click on the Sign out button (top right of the page).

Page : 97/160 5.6.5.2 Use to access hosted mailboxes The SSL VPN can be used to access mailboxes hosted on the FrontOffice with a standard email client. Access to hosted mailboxes requires the SSL VPN connection to be established (see Erreur! Source du renvoi introuvable.). The Email account configuration in your mail client is then to be made with the following parameters: Mail server type : POP Server POP server address : pop.services.rte-france.com SMTP server address : smtp.services.rte-france.com When your access to RTE s FrontOffice is provided, you will receive your login name, your password and your email address. NOTE Because the messages are transferred through a secure channel, sending and receiving messages do not require the use of a certificate to encrypt messages.

Page : 98/160 E. EMAIL EXCHANGES WITH RTE S INFORMATION SYSTEM This section only applies if you need to exchange signed-encrypted email with RTE applications. After reading the chapter 6 (overview), directly refer to the chapter associated with the email client that you use for your mail exchanges with RTE: Chapter 7 if you use Microsoft Outlook 201 as email client. Chapter 8 if you use Mozilla Thunderbird as email client. Chapter 9 if you use Lotus Notes 8.5 as email client. Chapter 10 if you use Lotus Notes 9 as email client.

Page : 99/160 6. Using your certificate to exchange emails 6.1 Certificate usage principle Using your personal certificate, its associated private key, RTE s CA certificate and RTE s application certificate, you can: decrypt and verify the signature of emails you receive from RTE applications, encrypt and sign emails you send to RTE applications. 6.2 Decryption and signature verification of a received message Decryption and verification of the signature of a message are disjoint processes. When you receive an encrypted-signed message: you decrypt the message with the private key associated to your personal certificate, you verify the message signature with the certificate of the sender (that of the RTE application) contained in the message, and with the certificate you own of the issuing CA that you trust. These two processes are done automatically when you open a signed-encrypted email with a properly configured email client that supports the secure email format S/MIME. IMPORTANT NOTE To verify the signature of a message you need to own the right certificate and trust the CA that issued the certificate of the sender. 6.3 Encryption and signing of a sent message Encrypting and signing message are two disjoint processes. When you send an encryptedsigned message: you sign the message with the private key associated to your personal certificate, you encrypt the message with the recipient s certificate (RTE s application certificate). The certificate of the recipient can be obtained in several ways. RTE applications transmit to you their certificate by sending a signed message: that is the way you will get their certificate. In doing so, when you receive a signed message, use "Add sender to contacts" to save at the same time its certificate, which you can use to send encrypted messages to him. IMPORTANT NOTE Encrypting a message requires to possess a valid certificate corresponding to the recipient's email address.

Page : 100/160 6.4 Steps to configure your email client In order to be able to exchange signed-encrypted emails with RTE, the steps are as follows: Install RTE s CA certificate, so that your mail client trusts RTE s applications certificates and is able to verify the signature of signed-encrypted emails you receive from them. Install your personal certificate, so your mail client can decrypt the messages from RTE and sign messages to RTE. Configure the email account you will use to exchange with RTE so that your email client always encrypts and signs messages to the RTE applications using the standard S/MIME. Install RTE s application certificate, so that your email client can encrypt emails you send to RTE applications. To perform these steps, please refer directly to one of the following chapters: the one concerning the email client that you use for your mail exchanges with RTE.

Page : 101/160 7. Microsoft Outlook 2013 7.1 Installing RTE s CA root certificate Outlook 2013 uses the same certificate store as Internet Explorer. Install RTE s CA root certificate in Internet Explorer by following the procedure described in chapter 4.2 if not already done. 7.2 Installing your personal certificate Outlook 2013 uses the same certificate store as Internet Explorer. Install your personal certificate in Internet Explorer by following the procedure described in chapter 4.3.3 if not already done. 7.3 Email account configuration Start Outlook 2013 and click the menu File > Options > Trust Center then click Trust Center Settings. In the left column, click E-mail security, then click the Settings button.

Page : 102/160 Click the two Choose buttons in order to select your personal certificate for signing and encryption. A list of selectable certificates is presented to you (you can also display a certificate from the list to view its contents and make sure you choose the right one).

Page : 103/160 Make sure the settings are similar to the ones above (S/MIME, check boxes, certificates, algorithms); if the field Security Settings Name is empty, enter a label such as RTE Certification. Finally click OK. Check the boxes Encrypt contents and attachments for outgoing messages and Add digital signature to outgoing messages, then click OK.

Page : 104/160 All your emails sent to RTE applications using the default account will now be encrypted and signed. 7.4 Installing RTE s application certificate After receiving the first encrypted and signed message from an application, you must install the certificate of the issuing application. For this, you need to add the email address of the application to your address book by clicking the sender of the email received with the right mouse button and then Add to Outlook contacts :

Page : 105/160 Click General : Click Certificates :

Page : 106/160 Click Save & Close to save. All your encrypted emails sent to this application will be encrypted automatically with the application s certificate.

Page : 107/160 7.5 Using the certificate: sending a signed-encrypted email To encrypt and sign a message: first create a new message by clicking New. To sign and encrypt your message, verify that both icons below are activated or click on them to activate.

Page : 108/160 8. Mozilla Thunderbird 8.1 Installing RTE s CA root certificate RTE s CA root certificate must first be installed for Thunderbird to be able to verify the signature of emails sent by RTE. IMPORTANT NOTE It is imperative to respect the case (upper / lower case) of the following websites addresses. Downloading RTE s CA root certificates With your web browser go to the address below to download the file Certification_Autority_RTE_2048.cer containing RTE s current CA certificate: With Internet Explorer: https://kregistration-user.certificat2.com/kregresources/css/rte/rte/certification_autority_rte_2048.cer Click the "Save" button and choose a location to save the file "Certification_Autority_RTE_2048.cer" With Mozilla Firefox: Select Save file then click OK. A location to save the file Certification_Autority_RTE_2048.cer will eventually be requested.

Page : 109/160 Installing RTE s current CA certificate The first certificate you just downloaded must be installed in Thunderbird certificate store. In the menu "Tools" on the top right of the window click Options : A window appears. Choose the Advanced tab then the Certificates subcategory. Click the button View Certificates.

Page : 110/160 Select the Authorities tab and click Import. Select the previously saved file Certification_Autority_RTE_2048.cer and click Open.

Page : 111/160 A dialog box is displayed, in which you must select the three check boxes "Trust this CA to identify [...]" to trust RTE's CA. Click the "View" button to verify that the certificate that you are going to trust is the RTE root certificate: To ensure that you have downloaded the real RTE CA's root certificate, check carefully that the "SHA1" or "MD5" hashes displayed is identical to the one shown below.

Page : 112/160 Digital hashes of the certificate «RTE Certification Authority» SHA1 39:83:D6:10:A2:C4:D5:60:45:A0:C1:D0:E3:FA:E1:42:45:8A:37:12 MD5 77:4C:12:7D:FD:1D:36:9E:8A:21:85:73:7C:2D:44:77 If this is not the case: click Close to go back to the precedent window and click Cancel then call RTE s Hotline. If this is the case, click Close to return to the initial window: "Downloading certificate" (see above). In this window click the "OK" button: RTE CA's root certificate is then installed. Visualization of RTE s CA root certificate To view the certificate later in Mozilla Thunderbird, go to the "Tools" menu on the top right of the window then click the "Options" icon: A window appears. Select the Advanced tab then the subcategory Certificates.

Page : 113/160 Click the View Certificates button. In the Authorities tab you can verify that the root certificate RTE Certification Authority is well saved on your PC ( Software Security Device ) and view it by clicking on View.

Page : 114/160 8.2 Installing your personal certificate To be able to import your certificate in Mozilla Thunderbird, you must have the file name_certificate.p12 downloaded with your browser when retrieving your certificate (see Erreur! Source du renvoi introuvable. for Internet Explorer, Erreur! Source du renvoi introuvable. for Mozilla Firefox). Start Mozilla Thunderbird, go to the menu "Tools" on the top right of the window and click the "Options" icon: A window appears. Choose the Advanced tab then the Certificates subcategory. Click View Certificates.

Page : 115/160 In the Your certificates tab, click Import. In the drop-down menu File type select PKCS$12 Files (*.p12;*.pfx) : Go to the folder you saved your certificate in, select your certificate name_certificate.p12 and click Open.

Page : 116/160 If necessary, the window below will ask you the access password to the Mozilla Thunderbird certificate store: Click OK. N.B.: if there is no master password, Thunderbird will ask you to define one. Enter the password protecting the PKCS#12 file and click OK. Your certificate and its associated private key have been successfully imported in Mozilla Thunderbird s certificate store.

Page : 117/160 Verify this is the right certificate by clicking on View.

Page : 118/160

Page : 119/160 8.3 Email account configuration To sign and encrypt with your certificate, it must be associated with the email account corresponding to the email address specified in the Certificate subject. For this, start Mozilla Thunderbird, press the Alt key on your keyboard, a menu bar appears at the top of the window. Click Tools then Account Settings.

Page : 120/160 A window appears. Select the Security item of the email account you use to exchange with RTE: Click Select to open the following window: Select your certificate in the drop-down list and click OK. The following message appears:

Page : 121/160 Click Yes to automatically define the same certificate to decrypt received emails. NOTE Although for encryption, the text indicates that your certificate will be used to encrypt and decrypt messages sent, it will not actually be used to decrypt messages received. All your emails sent to RTE applications using this account will now be encrypted and signed. 8.4 Installing RTE s application certificate After receiving the first encrypted and signed message from an application, the application certificate installs automatically. However you can add the application s email address to your address book by right-clicking the sender of the received email and then clicking Add to Address Book : The contact has been added to the address book.

Page : 122/160 To verify that the application certificate is correctly installed, go to the menu Tools (top-right corner of the window) and click Options : A window appears. Choose the Advanced tab then the Certificates subcategory. Then click View Certificates. A window appears. Click the People tab.

Page : 123/160 Every time an encrypted email is sent to this application, the application s certificate will be used automatically to encrypt it.

Page : 124/160 8.5 Using the certificate: sending a signed-encrypted email To encrypt and sign a message, first create a new message by clicking Write. Click the Security tab to verify the options: Encrypt this message and Digitally sign this message. These options should be checked by default, if not: check them.

Page : 125/160 9. Lotus Notes 8.5 9.1 Installing RTE s CA root certificate RTE s root certificate will be installed by «crossed certification» when you received your first signed-encrypted email from the application (see Erreur! Source du renvoi introuvable.). Note: The «Crossed certificate» is a process which makes a user able to install the certificate of another entity while he receives message form that entity. Messages sent to that specific entity will be encrypted with that «Crossed certificate». 9.2 Installing your personal certificate Creation of a PKCS#12 file readable by Notes Lotus Notes can install a certificate and its associated private key only from a PKC #12 file that contains RTE's CA. This is not the case for the file name_certificate.p12 you downloaded when you retrieved your certificate. To generate a file accepted by Lotus Notes, install RTE's CA and your certificates in a browser and then export your personal certificate as a PKCS#12 file. Depending on the browser you are using, perform one of the procedures below. With Microsoft Internet Explorer : o Install RTE s CA root certificate, see 4.2. o o Install your personal certificate making sure to check the case Mark this key as exportable., see 4.3.3. Export your certificate in a PKCS#12 file making sure to check the case Include all certificates in the certification path if possible, see 4.5.1. With Mozilla Firefox : o Install RTE s CA root certificate, see 5.2. o Install your personal certificate, see 5.3. o Export your certificate to a PKCS#12 file, see 5.5.2 (RTE s CA will automatically be included).

Page : 126/160 Installing the PKCS#12 file in Notes Start Lotus Notes and access to File > Security > User Security : If requested, enter your Notes password:

Page : 127/160 The following window appears: Click Your Identity then Your Certificates : Select Your Internet Certificates in the drop-down list to display the Internet certificates already imported.

Page : 128/160 In general, the list will be empty. Click the Get Certificates button and select Import Internet Certificates : A window appears asking you to select a PKCS#12 file (extension.pfx or.p12 ) Select the file you generated at 9.2.1 containing your personal certificate, its private key and RTE s CA root certificate:

Page : 129/160 Click Open and in the window below choose the format: PKCS 12: Click Continue. The PKCS12 file s password is requested: Click OK and the window below is displayed:

Page : 130/160 Your certificate, you want to import, and the root certificate, are listed. If you click Advanced Details the content of the selected certificate (yours) appears in the window: Click Cancel to go back to the previous window.

Page : 131/160 To see the content of the root certificate, you must select it: And click Advanced Details :

Page : 132/160 Click Close to go back to the main screen: Click Accept All. Enter your Notes password and click OK. Click OK, the window below appears:

Page : 133/160 The certificate, now visible here, has successfully been imported. Click OK to end the import. Visualization of the certificate To view your certificate, in Lotus Notes access the menu File > Security > User Security, then click the item Your Identity and Your Certificates. Select Your Internet Certificates in the drop-down list. Select your personal certificate and click the Advanced Details button. The certificate s details are then presented in the window below:

Page : 134/160 9.3 Email account configuration If you have multiple certificates used to sign your sent messages, you have to set by default the one that will serve for exchanges with RTE. In Lotus Notes, open the menu File > Security > User Security, then click Your Identity and Your Certificates : Select Your Internet Certificates in the drop-down list to display your Internet certificates that are already imported. Select your certificate and click the Advanced Details button.

Page : 135/160 If you only have one certificate, the case Use this certificate as your default signing certificate will be grey and checked. If not, check it, as above, and click OK. 9.4 Installing RTE s application certificate When you select, for the first time, a signed and encrypted message you received a dialog box similar to the one below appears, allowing you to give your trust to the issuer: For this, you must click on the Cross certify button. Then, when you display this signed received message, you will need to choose the Add Sender to Contacts in the menu by right-clicking on the email, which will add the issuer and its certificate to your book Address.

Page : 136/160 The following window appears: Only verify that the case Include X.509 certificates when encountered is checked and click OK. Whenever an encrypted email will be sent to this application, its installed certificate will now automatically be selected to perform the encryption.

Page : 137/160 9.5 Using the certificate: sending a signed-encrypted email When composing a message, you can sign and encrypt it if you own your signature certificate (see the import procedure for your certificate above) and that of your correspondent. For that, when you write a new message, you must click the Delivery Options button. Check the Sign and Encrypt cases as shown below: Click OK. The rest of the mailing process has no more particularity, Notes then automatically signs and encrypts your message transparently.

Page : 138/160 10. Lotus Notes 9 10.1 Installing RTE s CA root certificate RTE s root certificate will be installed by crossed certification when you received your first signed-encrypted email from the application (see Erreur! Source du renvoi introuvable.). Note: The «Crossed certificate» is a process which makes a user able to install the certificate of another entity while he receives message form that entity. Messages sent to that specific entity will be encrypted with that «Crossed certificate». 10.2 Installing your personal certificate Creation of a PKCS#12 file readable by Notes Lotus Notes can install a certificate and its associated private key only from a PKC #12 file that contains RTE's CA. This is not the case for the file name_certificate.p12 you downloaded when you retrieved your certificate. To generate a file accepted by Lotus Notes, install RTE's CA and your certificates in a browser and then export your personal certificate as a PKCS#12 file. Depending on the browser you are using, perform one of the procedures below. With Microsoft Internet Explorer : o Install RTE s CA root certificate, see 4.2. o o Install your personal certificate making sure to check the case Mark this key as exportable. see 4.3.3. Export your certificate in a PKCS#12 file making sure to check the case «Include all certificates in the certification path if possible» see 4.5.1. With Mozilla Firefox : o Install RTE s CA root certificate, see 5.2. o Install your personal certificate, see 5.3. o Export your certificate to a PKCS#12 file, see 5.5.2 (RTE s CA will automatically be included).

Page : 139/160 Installing the PKCS#12 file in Notes Start Lotus Notes and access to File > Security > User Security : If requested, enter your Notes password.

Page : 140/160 The following window appears: Click Your Identity then Your Certificates : Select Your Internet Certificates in the drop-down list to display the Internet certificates already imported. In general, the list will be empty.

Page : 141/160 Click the Get Certificates button and select Import Internet Certificates : A window appears asking you to select a PKCS#12 file (extension.pfx or.p12 ). Select the file you generated at 9.2.1 containing your personal certificate, its private key and RTE s CA root certificate:

Page : 142/160 Click Open and in the window below chose the format PKCS 12: Click Continue. The PKCS12 file s password is requested: Click OK and the window below is displayed: Your certificate, you want to import, and the root certificate, are listed. If you click Advanced Details the content of the selected certificate (yours) appears in the window:

Page : 143/160 Click Close to go back to the previous window. To see the content of the root certificate, you must select it: And click Advanced Details :

Page : 144/160 Click Close to go back to the main screen: Click Accept All. If necessary, enter your Notes password and click OK. Click OK, the window below appears:

Page : 145/160 The certificate, now visible here, has successfully been imported. Click OK to end the import. Visualization of the certificate To view your certificate, in Lotus Notes access the menu File > Security > User Security, then click the item Your Identity and Your Certificates. Select Your Internet Certificates in the drop-down list. Select your personal certificate and click the Advanced Details button. The certificate s details are then presented in the window below:

Page : 146/160 10.3 Email account configuration If you have multiple certificates used to sign your sent messages, you have to set by default the one that will serve for exchanges with RTE. In Lotus Notes, open the menu File > Security > User Security, then click Your Identity and Your Certificates : Select Your Internet Certificates in the drop-down list to display your Internet certificates that are already imported. Select your certificate and click the Advanced Details button.

Page : 147/160 If you only have one certificate, the case Use this certificate as your default signing certificate will be grey and checked. If not, check it, as above, and click OK. 10.4 Installing RTE s application certificate When you select, for the first time, a signed and encrypted message you received a dialog box similar to the one below appears, allowing you to give your trust to the issuer: For this, you must click on the Cross certify button. Then, when you display this signed received message, you will need to choose the Add Sender to Contacts feature, which will add the issuer and its certificate to your book Address.

Page : 148/160 The following window appears: Click OK.