ok. I finally got the musclecardII on an JCOP 21 to do an SSL client authentication exchange, presenting a domain-recognised id as credentials to an IIS website.

If I now issue a cert to template Smartcard Login, can I use the same process now for GINA-mediated login to the domain controller, on a 2003 box (with reader)?

Any gotchas?


From: "Peter Williams" <[EMAIL PROTECTED]>
Reply-To: MUSCLE  <[email protected]>
To: [email protected]
Subject: Re: [Muscle] ID ally update
Date: Mon, 07 Nov 2005 19:24:52 -0800

some missing advice, from the userguide - on creating the MS cert server, for login smartcard enrollment:

(a) first assign server role : domain controller (to install active directory, for one)
(b) then add the IIS/ASP role
(c) then add certificate server component, creating an enterprise Root (only)

These steps are required, in that order, so that the certificate templates to exist in the management console for the created CA website - per the current instructions.


From: Corcoran David <[EMAIL PROTECTED]>
Reply-To: MUSCLE  <[email protected]>
To: MUSCLE <[email protected]>
Subject: Re: [Muscle] ID ally update
Date: Tue, 1 Nov 2005 12:24:12 -0500

Hi Peter,

Personalize might be failing as it is calling into an added apdu which allows one to change the unblock pin. I can send the details of this APDU if you would like.

If you import the P12 using ID Ally, it should register the certificate only with the CSP. The private key stays on the card and would be used with any CAPI application.

For win logon, you will need to get a certificate from your Microsoft 2003 CA using the Xenroll (http://xxxxxxxxxxx/certsrv) This should be in the User guide on the IDA website.

So you wish for the pin dialog to have the application name in the title ? This should be easy to do as the pin dialog is in a separate resource dll.

Thanks,
Dave

On Oct 31, 2005, at 8:14 PM, Peter Williams wrote:


So I tried again, and finally got outlook to sign an email using ID ally! Deleting some obviously non-Rom'ed packages on the javacard allowed the keygen to work, and thus self-signed certs to get created.

Three questions now:

(a) when I create a backup .p12 file (store on my bio-flash drive), and use said .p12 to configure outlook, would I be configuring outlook to use the javacard (via CPS/PKCS#12), or is it importing the persisted credentials and keys into the MS cyrpto rpovider, for CPU/software CSP usage?

(b) whats the simplest demo now of windows login - using the card?

(c) can we explain the personalise option (again). I cant get things to work, if I change the default 0000oooo pin.

One issue: my bio-token selects the credentials to send to a pin- entry form based on the dialog frame title. Can we improve the title text in the id ally pin entry dialog, so it identies the application it belongs too - rather than invite the user to perform an operation?


_______________________________________________
Muscle mailing list
[email protected]
http://lists.drizzle.com/mailman/listinfo/muscle



------------------------------------------------------------------------ ------------
David Corcoran        [EMAIL PROTECTED]
  Identity Alliance        http://www.identityalliance.com
  phone: 260-488-3099   fax: 260-488-2455

  Smart Cards, Biometrics, Training, Identity Management
------------------------------------------------------------------------ -------------


_______________________________________________
Muscle mailing list
[email protected]
http://lists.drizzle.com/mailman/listinfo/muscle


_______________________________________________
Muscle mailing list
[email protected]
http://lists.drizzle.com/mailman/listinfo/muscle


_______________________________________________
Muscle mailing list
[email protected]
http://lists.drizzle.com/mailman/listinfo/muscle

Reply via email to