On Tue, Oct 4, 2011 at 9:06 PM, Greg Sweers <[email protected]> wrote: > I think they are wanting it verified by a CA
Well, then, you need to (1) confirm that and (2) determine what PKI/CA they're using or will accept. > I posted the requirements below to make it easier and eliminate > the barrier (me) from the actual need.. Said "requirements" actually appear to be a procedure on how to use a pre-existing crypto solution, which is never actually specified or even named. It's like saying "I need a word processor with spell check", and someone responds with "Click Tools, then Spell Check", just assuming you're already running MS Word 2003. > I just need to know which provider can do what is needed... Indeed you do, but you can't make that determination without more information from the requirement-giver. > I think I just need a smartcard with the software or utilize gnu > with the cert they provide.... Any pointers.... Stop shooting in the dark in the hope that you hit what they want, and get them to tell you what the target looks like. :) -- Ben ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to [email protected] with the body: unsubscribe ntsysadmin
