On Tue, Oct 4, 2011 at 9:06 PM, Greg Sweers <[email protected]> wrote:
> I think they are wanting it verified by a CA

  Well, then, you need to (1) confirm that and (2) determine what
PKI/CA they're using or will accept.

> I posted the requirements below to make it easier and eliminate
> the barrier (me) from the actual need..

  Said "requirements" actually appear to be a procedure on how to use
a pre-existing crypto solution, which is never actually specified or
even named.

  It's like saying "I need a word processor with spell check", and
someone responds with "Click Tools, then Spell Check", just assuming
you're already running MS Word 2003.

> I just need to know which provider can do what is needed...

  Indeed you do, but you can't make that determination without more
information from the requirement-giver.

> I think  I just need a smartcard with the software or utilize gnu
> with the cert they provide....  Any pointers....

  Stop shooting in the dark in the hope that you hit what they want,
and get them to tell you what the target looks like.  :)

-- Ben

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to [email protected]
with the body: unsubscribe ntsysadmin

Reply via email to