Hi,

I try to answer below:

Been trying out the IDAlly tool chain, again, for on our own - and - the IBM JCP21. I've started with the given cases, for the ID21.

(a) are the transport code (required for personalization) different for each profile?


Nope, by default it is: Muscle00, if you load the applet manually. If you use ID Ally and it's Profile Manager to load the applet, it will change the default
transport code to: 00000000

(b) whats the transport code for the MUSCLEII applet, built for the JCOP21?


Same as above


(c) the screens provide an option to select "current admin pin", during Tools->Personalization. Is this the transport code, for persononalization purposes? Or, the current value of pin#0? which is stored from session to session, on the PC?


The current admin pin by default (if you use the Profile Manager to load the applet) is 00000000. If you load the applet manually, you might uncheck that and substitute: Muscle00


(d) does IDAlly (or any of its DLL providers) directly load windscard.dll from a particular path, or is normal Win32 logic applied (i.e. the winscard.dll in the app's directory is used, if present)?

No, Winscard.dll is used from SYSTEM32 path.



(e) is the password manager documented anywhere? e.g. is the object on the token encrypted? if so by who? and who stores/manages the file confidentiality keys?


Good question. Currently the passwords are protected by pin, but not encrypted. The code for encrypting them is already there, but we had not decided what key management mechanism we wanted to use. Perhaps it might be to use a symmetric key on-card. For now, it is protected by PIN to avoid unlawful read ....

Thanks,
Dave


Peter.


_______________________________________________
Muscle mailing list
[email protected]
http://lists.drizzle.com/mailman/listinfo/muscle



_______________________________________________
Muscle mailing list
[email protected]
http://lists.drizzle.com/mailman/listinfo/muscle

Reply via email to