NetSign CAC Administrator Guide
Transcription
NetSign CAC Administrator Guide
NetSign CAC Administrator Guide Version 5.5 Limitation of Liability Litronic, its affiliates, and distribution channels are not responsible for any lost, corrupted, or misdirected data through the use of this product. Litronic warrants this product to be physically free of defects in manufacturing and workmanship. No other warranties may be implied nor are enforceable according to international law and authority. Litronic reserves the right to change specifications of this program at any time without public notice for purposes of product improvement. Disclaimer of Warranty Litronic makes no representation or warranties, either expressed or implied, by or with respect to anything in this handbook, and shall not be liable for any implied warranties of merchantability and fitness for a particular purpose or for any indirect, special, or consequential damages. Some states do not allow the exclusion of incidental or consequential damages, in which case this exclusion may not apply. Copyright Notice © 1998 - 2005 Litronic - All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of Litronic No patent liability is assumed with respect to the use of information contained herein. Further, this publication and the features described herein are subject to change without notice. Trademarks SSP Solutions, SSP-Litronic, the SSP logo, the SSP-Litronic Logo, NetSign, the NetSign Logo, SecureStart, JCryptOS, SSP, and Profile Manager are trademarks of Litronic in the United States and other countries. FORTEZZA is a registered trademark of the United States Government. All other trademarks are the property of their respective owners. p7390-41001-04 Fourth Edition March, 2005 Litronic a saflink company 17861 Cartwright Road Irvine, CA 92614 USA (949) 851-1085 http://www.litronic.com Contents Preface............................................................................................................................ vii Who should read this guide..................................................................................................................... vii What is in this guide ................................................................................................................................ vii Typeface Conventions............................................................................................................................. vii Service and Support................................................................................................................................viii Chapter 1 Public Key Cryptography Introduction............................................................. 1 Digital Signatures ...................................................................................................................................... 2 Password Based Encryption .....................................................................................................................3 Password Selection................................................................................................................................ 3 Password Location................................................................................................................................. 3 Password Interception............................................................................................................................ 3 Password Duplication............................................................................................................................. 3 Public Key Infrastructure ...........................................................................................................................4 Public Key Enabled ................................................................................................................................ 4 Obtaining a Public Key...........................................................................................................................5 Secure Sockets Layer ............................................................................................................................... 6 Chapter 2 Pre-Installation Configuration......................................................................... 7 Using the NetSign Configuration Wizard................................................................................................... 8 Installation Settings ................................................................................................................................ 9 Product Features Dialog Box ...............................................................................................................12 Policy Settings Dialog Box ...................................................................................................................13 Citrix Server Dialog Box .......................................................................................................................20 Chapter 3 NetSign Installation and Upgrade ................................................................ 21 Installation Requirements........................................................................................................................22 Hardware Requirements ......................................................................................................................22 Software Requirements........................................................................................................................22 Installation Considerations ......................................................................................................................24 Local Installation......................................................................................................................................25 Silent Installation Without User Interaction..............................................................................................29 Remote Installation Using Active Directory Push ....................................................................................30 Installation Requirements.....................................................................................................................30 Overview of the Steps to Push Install with Active Directory.................................................................31 Step 1: Create an Active Directory Organizational Unit .......................................................................32 Step 2: Add MSI Files as Active Directory Packages...........................................................................33 Remote Installation Using SMS Push .....................................................................................................36 Installation Requirements.....................................................................................................................36 Overview of the Steps to Install NetSign by SMS ................................................................................36 Step 1: Create a New Package............................................................................................................37 Step 2: Set the Package Distribution Points ........................................................................................39 Step 3: Create NetSign Package Programs.........................................................................................40 Step 4: Advertise the NetSign Installation Package.............................................................................44 Chapter 4 NetSign Policy Configuration ....................................................................... 51 iii Local Policy Configuration.......................................................................................................................51 Remote Policy Configuration...................................................................................................................52 Remote Policy Configuration Requirements ........................................................................................52 Setting Up Remote Policy Configuration..............................................................................................52 NetSign Configuration Options................................................................................................................56 Local and Remote Configuration Policy Mapping ................................................................................56 Recommended Policies...........................................................................................................................58 NetSign Policies ......................................................................................................................................59 Smart Card Events...............................................................................................................................59 Certificate Registration.........................................................................................................................60 Outlook Configuration ..........................................................................................................................61 Auto Update .........................................................................................................................................63 PIN Policy.............................................................................................................................................64 Web Links ............................................................................................................................................65 Chapter 5 SSL and Client Authentication ..................................................................... 67 Generating the Certificate Signing Request ............................................................................................68 Requesting the Certificate .......................................................................................................................70 Installing the Certificate........................................................................................................................70 Enforcing SSL Connections ....................................................................................................................71 To enable secure communications with the Web site .........................................................................71 To enforce SSL connections ...............................................................................................................71 Enabling Client Certificate Authentication ...............................................................................................72 Modifying the Registry to Restrict Trusted Certification Authorities .......................................................73 Useful links ..............................................................................................................................................74 Chapter 6 Using NetSign with Citrix.............................................................................. 75 Desktop View vs. Application View .........................................................................................................75 Citrix Products Supported by NetSign.....................................................................................................75 Initial Preparation ....................................................................................................................................76 Configure Windows Domain Controller for Smart Card Logon ............................................................76 Citrix Server Configuration Tasks ........................................................................................................77 Client Computer Configuration Tasks ..................................................................................................80 How NetSign for Citrix is Different...........................................................................................................81 Card Insertion - Windows 2000............................................................................................................81 Card Removal - Windows 2000 ...........................................................................................................81 Windows 2000 Netscape Profile Creation............................................................................................81 Certificate Registration in Netscape.....................................................................................................81 Certificate Registration - CardStart ......................................................................................................81 Launch Browser ...................................................................................................................................82 CardStart in Desktop View ...................................................................................................................82 Auto Unreg on Log off ..........................................................................................................................82 CardStart Required to Implement Policy Changes ..............................................................................82 Saving Diagnostic Information from System Info Tab (Application View Only)....................................82 Internet Browser Fails to Close when Card is Removed......................................................................82 Chapter 7 Using NetSign with Outlook Web Access .................................................... 83 Configuring Exchange Server 2003 for OWA..........................................................................................84 Configuring OWA on User Computers ....................................................................................................85 User Requirements ..............................................................................................................................85 Deploying the OWA S/MIME Control ...................................................................................................85 Setting Up IE Active X Security to Support the S/MIME Control..........................................................86 iv OWA Problems with Windows XP Service Pack 2..................................................................................87 Problem................................................................................................................................................87 Symptoms ............................................................................................................................................87 Cause...................................................................................................................................................87 Solution ................................................................................................................................................87 Appendix A Uninstall NetSign ........................................................................................ 89 Uninstallation Considerations..................................................................................................................90 Local Uninstall .........................................................................................................................................91 Silent Uninstall Without User Interaction .................................................................................................92 Push Uninstall with Active Directory........................................................................................................93 Push Uninstall with SMS .........................................................................................................................95 Step 1: Obtain the NetSign Program GUID..........................................................................................96 Step 2: Create an Uninstall Package ...................................................................................................97 Step 3: Set up Uninstallation Package Distribution Points...................................................................99 Step 4: Create Programs for the Uninstallation Package...................................................................100 Step 5: Advertise the Uninstallation Package ....................................................................................102 Appendix B NetSign Installation Changes............................................................... 105 Files Added to the Computer by a NetSign Installation.........................................................................105 Certificate Files Added for a NetSign CAC Installation ......................................................................106 Changes to Registry by a NetSign Installation ......................................................................................108 Card Start...........................................................................................................................................108 CRM ...................................................................................................................................................110 Smart Card Reader Interface .............................................................................................................110 NetSign Functions..............................................................................................................................110 Build Version ......................................................................................................................................110 Target Directory .................................................................................................................................111 E-Mail Application ..............................................................................................................................111 Smart Cards .......................................................................................................................................111 Unload DLL ........................................................................................................................................114 Exchange Client Extensions ..............................................................................................................114 GSC BSI.............................................................................................................................................114 GSC Cryptography PKCS#11 ............................................................................................................114 Installer...............................................................................................................................................115 Target Directory .................................................................................................................................115 Appendix C Certificate Installation ......................................................................... 117 Importing Certificates to Netscape ........................................................................................................117 Index ............................................................................................................................ 119 v vi Preface NetSign CAC is designed to work with the General Service Administration Common Access Card (CAC). This release of NetSign supports CAC smart cards issued by the Department of Defense (DoD) as specified by the DoD Access Card Office. Hereafter, NetSign CAC is simply referred to as NetSign. Who should read this guide This manual is intended for administrators responsible for installing, configuring and maintaining user software at their site. What is in this guide This manual describes typical administrative tasks to support NetSign in a production environment. Typical administrative tasks include the following: • Installing NetSign on user computers • Configure NetSign for both the domain and the user systems • Specify policy settings that determine how NetSign operates on user computers • Configure NetSign to work with supported third-party products Typeface Conventions The following list shows typographic and usage conventions of this manual: Bold Bold text represents commands, interface buttons, dialog names, and keywords except when they appear in screen examples or the contents of files. Blue text Blue text indicates a hypertext link to another topic within the manual or a web site. Italic text Italic text represents user-specified values. Monospace Monospace text indicates the contents of files, text entered on a screen, file names, directory paths or output shown on the screen. Monospace italic Monospace italic text represents user-specified values that are entered as the contents of files, keyboard input or the output shown on the screen. vii Service and Support Any modifications, repairs or customization to NetSign must be performed by qualified personnel. Report your NetSign issues to a Litronic customer support engineer at: Litronic Support Web Site: http://www.litronic.com/support/ Litronic Support E-mail: [email protected] If you do not have access to the internet, contact a customer support engineer at one of the following Litronic locations: West Coast East Coast Irvine, CA Reston, VA Phone: (949) 851-1085 Phone: (703) 905-9700 Fax: (949) 851-8588 Fax: (703) 905-9777 viii Chapter 1 Public Key Cryptography Introduction As more and more people use the Internet to conduct business, the issues of preventing fraud, protecting confidential information, and ensuring information legitimacy become critical. Digital signatures, password-based encryption, Public Key Security, Secure Sockets Layer (SSL), the leading security protocol on the Internet, and smart cards are secure and dependable means of addressing these issues. NetSign provides the most secure and flexible way of using these security methods. 1 Digital Signatures Digital signatures provide the same benefit for electronic documents that physical signatures provide for paper documents. The digital signature verifies that a document is official and identifies the originator of the document. Digital signatures also guard against document tampering. A digital signature is only useful if its creation is limited to its proper owner. In order to create a digital signature, the owner must possess a digital ID also known as a digital certificate, issued by a trusted organization. The trusted organization, also known as a Certificate Authority (CA), is given the responsibility of verifying the identity of the proper owner before a digital ID is issued. As long as the issuing organization is trusted, the authenticity of the digital signature can also be trusted. When an e-mail or document is sent, the sender may select the option of digitally signing the correspondence. The information from the sender’s digital ID, which may include the sender’s name, company, e-mail address, and the issuing certificate authority, is incorporated into the digital signature. This digital signature is then attached to the e-mail. The digital signature acts as a sealed envelope around the e-mail message. For someone to gain unauthorized access to the content of the message, they must first break the seal, which alters the digital signature, and open the envelope. An altered digital signature offers evidence of message tampering. 2 Password Based Encryption Passwords have traditionally been used to limit computer access and protect files and data. Passwords are the keys by which encryption programs are accessed to scramble the data and make them unreadable. The same password is often used as the key to the encryption program that unscrambles the data. Although quite functional, there are several contributing factors that may make password-based security insecure. Password Selection Passwords are often chosen that are personal and easy to remember. These passwords can be easily guessed or obtained. Password Location Passwords are often written down and stored near the computer. These passwords are very easily obtained. Password Interception When encrypted documents are shared, using a symmetric key (one key used to both encrypt and decrypt data), passwords must be given to both sender and receiver so the documents can be read. These passwords may be intercepted. Password Duplication When the same password is used for all documents, allowing access to one document allows access to all documents. These passwords are often misused. 3 Public Key Infrastructure Many programs supporting the Department of Defense (DOD) missions require security services, such as authentication, confidentiality, non-repudiation, and access control. To help address these security problems, the DOD developed a Public Key Infrastructure (PKI). The DOD PKI provides products and services that enhance the security of networked information systems and facilitate digital signatures. Public Key Enabled Applications must be enabled to take advantage of the services offered by a PKI. Without enabled applications, the infrastructure holds little value. It is essential that applications become enabled and use the infrastructure. However, enabling the applications is a complicated task. Applications must be tested to ensure they are enabled correctly, interoperable, and leave no security holes. Litronic integrates the following PKE applications with NetSign: • SecretAgent • Kyberpass • Evincible Ink SecretAgent SecretAgent is a multi-purpose file encryption and digital signature utility – the perfect solution for data encryption and authentication needs. SecretAgent can utilize smart card technology. SecretAgent includes macros for Microsoft Office applications and integrates into the most popular e-mail clients. Other features include support of X.509 certificates, automated file security, self-decrypting archives, and key recovery support. Kyberpass Enterprise TrustPlatform and the Kyberpass Corporation K2 Client Software create a secure telnet, FTP, MS networking, e-mail, and SSL-based VPN environment. Validation TrustPlatform is a scalable Online Certificate Status Protocol (OCSP) responder that can support both OCSP and Certificate Revocation List (CRL) Certificate Status Checking for a wide variety of Certificate Authorities and Directories. Web Access TrustPlatform includes the Kyberpass K2 Trust Agent Plug-in, which is a plug-in supported by standard web browsers that can be invoked to digitally sign HTML forms. The signing process is invoked by an HTTP tag or a downloadable Java applet that stands between web application servers and user web browsers. The user does not need a separate client, only an SSLv3 web browser. Evincible Ink Evincible Ink is a comprehensive signing solution for electronic forms, typically in HTML or Adobe format. The solution components include a Signing Application, a policy-based workflow, a management console, and a non-repudiation database. Users access and fill in forms using a standard web browser. The solution’s signing tool signs the forms, either electronically or digitally. The Evincible Ink server implements signature validation and certificate verification using OCSP or CRL. The solution’s management console allows administrators to define signature and workflow policies. The solution’s non-repudiation database is tamper-evident and provides an audit journal for all signed forms. 4 Public Key Security Public Key Security is an excellent addition to password-based systems. Public Key Security is made up of a public key and a private key. The public key is used to encrypt information and the private key is used to decrypt information. A Certificate Authority uses the public/private key pair as part of the digital ID or digital certificate. Once information is encrypted using a public key, only the private key of the unique key pair can decrypt that information. To send an encrypted document or e-mail message, the sender must have the recipient’s public key to encrypt the document.The recipient decrypts the document or e-mail message using the matching private key. Obtaining a Public Key There are several ways to obtain a user’s public key: • Public keys are incorporated into a digital signature • Public keys are maintained in directory listings Public keys are incorporated into a digital signature A person sends a digitally signed e-mail message. This sends their public key to your e-mail program. This is the easiest way to acquire someone’s public key. By clicking on the sender’s e-mail message, public key information is added to your address book. Public keys are maintained in directory listings Certificate Authorities frequently maintain directories on the Internet that contain the public keys of the users to whom they have issued digital certificates. In order to access public keys using this method, knowledge of the issuing Certificate Authority is required. 5 Secure Sockets Layer Secure Sockets Layer (SSL) is an open, non proprietary security protocol developed by Netscape. The design of SSL uses a public key to encrypt data that will be transmitted over the SSL connection. SSL is ideal for sending confidential information, such as credit card information, over the Internet. SSL can also be used to authenticate server identity, message integrity, and client TCP/IP connections. Netscape, Internet Explorer, and many websites support SSL. URLs requiring SSL connections will start with https:// rather than http://. Smart Cards Smart cards resemble magnetic stripe credit cards, but are considered “smart” because they contain a tiny silicon chip. The chip, which is built right into the card, allows the card to be used for many purposes beyond that of the magnetic stripe card. Smart cards are virtually impossible to replicate; data stored on the card is extremely secure and more protected than the information stored on a magnetic stripe card. Currently, NetSign smart cards can hold two or more digital IDs making them more convenient than any other card offered. NetSign provides an additional level of security over digital signatures and encryption by storing the digital IDs (including the private key) on a smart card rather than on the computer. This offers “two-factor authentication”, which means that in order to send a signed e-mail or read an encrypted document, you must supply: • Something you have – the smart card itself • Something you know – the PIN number required to access the smart card. This prevents unauthorized access to your computer, unauthorized sending of digitally signed e-mail, and unauthorized reading of confidential e-mail. 6 Chapter 2 Pre-Installation Configuration The NetSign product CD provides the NetSign Configuration Wizard. Administrators use the wizard to assign values to configuration options. The specified values determine how NetSign is installed and configured on the user’s computer. By applying the same configuration values during installation, an administrator can ensure a consistent NetSign implementation for all users. Typically, administrators copy an image of the NetSign product CD to disk. Administrators run the NetSign Configuration Wizard and save their configuration changes. Then, the product image is burned to another CD containing the custom configuration values, or simply placed in an accessible network location. The NetSign Configuration Wizard consists of four dialog boxes that include options to assign values that are saved in the NetSignConfig.ini file: • Install Settings Window on page 9 • Product Features Window on page 12 • Policy Settings Window on page 13 • Citrix Server Windows on page 20 The NetSign Configuration Wizard steps through each dialog box in sequence and then updates the NetSignConfig.ini file. A Save As dialog box appears to specify an alternative file name and directory location. By default, the NetSignConfig.ini file is saved in the admin directory of the Netsign CD image with its original name. For NetSign’s push or silent installation methods, the file must be manually moved to the CD image’s temp directory and overwrite the original NetSignConfig.ini file. Refer to the procedure on page 8 for instructions to run the NetSign Configuration Wizard to update the NetSignConfig.ini file for either local, silent or push installation methods. Important: Do not manually edit the NetSignConfig.ini file to change its values. All file settings should be made through the NetSign Configuration Wizard. 7 Using the NetSign Configuration Wizard The following procedure explains how to run the NetSign Configuration Wizard and update the NetSignConfig.ini file with your changes before installing NetSign. 1. Copy the NetSign CD image to disk. 2. Using Windows Explorer, change to the admin directory of the NetSign CD image. You should see the NsConfigWizard.exe file. 3. Double-click on NsConfigWizard.exe to start the wizard. The Install Settings dialog box appears, as shown on page 9. 4. Assign values to the fields shown in the dialog box. All fields of the Wizard’s dialog boxes are described in the following sections of this chapter. 5. Click Next to continue to the next dialog box after you finish entering your changes in the current dialog. 6. Click Finish from the final Citrix Server dialog box to end the wizard. The values you entered in the dialog boxes are written to the NetSignConfig.ini file. A Save As dialog box appears to specify an alternative name and directory location for the NetSignConfig.ini file. If the configuration wizard was run from a CD image on disk and you accept the default values, the NetSignConfig.ini file is saved in the NetSign_home\admin directory with its original name. If the NsConfigWizard.exe file is run from the original NetSign product CD, the NetSignConfig.ini file is saved in the local computer’s ...\Windows\temp directory. 7. Accept the default values, or assign an alternative file name and directory location. 8. Click Save from the Save As dialog box. 9. If necessary, move the updated NetSignConfig.ini file to the \temp subdirectory of the NetSign CD image and overwrite the original NetSignConfig.ini file. 8 Installation Type Directory to Place Updated NetSignConfig.ini File Local Not required. Choose the custom installation method to set configuration values during the installation procedure. Silent ..\NetSign_home\temp directory of the NetSign CD image Active Directory Push ..\NetSign_home\temp directory of the NetSign CD image SMS Push ..\NetSign_home\temp directory of the NetSign CD image Installation Settings The NetSign Configuration Wizard dialog box provides options that determine how NetSign will be installed on user computers. The example below shows the default installation values. Fields Description Target Path The Target path field specifies the directory location in which NetSign will be installed on the target computer(s). Default Value: C:\Program Files\Litronic\NetSign Note: The installation path must be valid for all computers that will have NetSign installed by either the SMS or Active Directory push methods. Use existing target path when upgrading If this check box is selected, NetSign is installed into the same directory of an earlier version during an upgrade to Version 5.5. If unchecked, NetSign is installed into the directory specified from the Target Path field described above. Default Value: Install the NetSign Version 5.5 upgrade into the same directory where an earlier version of NetSign is currently installed. Push install The Push install field specifies that NetSign will be installed by the Active Directory or SMS push methods. This option must be selected if you will be installing NetSign by either push method. Default Value: No push installation Note: See the example of the NetSign Configuration Wizard dialog box on page 11 that shows how all other installation options are set when the Push install option has been selected. 9 Fields Description Check Web Browser Version If these fields are selected, the NetSign installer verifies if Netscape or Internet Explorer (IE) web browsers installed on the target computer are within the permissible minimum/maximum version ranges. • Internet Explorer: Version 5.5 and above • Netscape minimum version: Version 4.76 • Netscape maximum version: Version 7.2 The NetSign installer issues a warning message if the version of the installed web browser is outside of the permissible version range for each browser. Default Values: • Internet Explorer checking for a minimum version of 5.5 and above • No Netscape version checking Note: Web browser version checking becomes inactive when the Push install option has been selected. Key Strength If the Check cipher strength field is selected, the installer checks the web browser’s encryption key length and compares it to the value set from the Minimum field drop-down list. The installation stops if the web browser’s minimum key strength is not met. Default Value: 128 bits Note: Web browser key strength checking becomes inactive when the Push install option has been selected. Install Root Certificates If these fields are selected, DoD root and intermediate certificates are installed during the NetSign CAC installation. Default Values: • Root certificates are installed for Internet Explorer and Netscape Note: The NetSign Configuration Wizard sets a flag when Netscape root certificates have been selected. The flag indicates to the NetSign installer to run nsreg.exe to register root certificates to a Netscape Version 4.76 web browser. The NetSign CAC installer ignores the request to install Netscape certificates when the option to install Netscape certificates is set to inactive. You can manually register root certificates to Netscape Version 4.76 after installation by running nsreg.exe, which is located in the home directory of the NetSign CAC CD image. 10 Fields Description Reader If the Check for Reader option is selected, the installer verifies if a card reader is currently attached to the computer where NetSign will be installed. The installer issues a warning message about the limited capabilities of NetSign if a card reader is not detected. Default Value: Check for a card reader during installation Note: Card reader checking becomes inactive when the Push install option has been selected. Release Notes If the Display Release Notes check box is selected, a dialog box appears and asks the installer if the Release Notes should be displayed after NetSign has been installed. The person installing NetSign has the choice of clicking Yes/No from the dialog box to display the Release Notes or not. Default Value: Display Release Notes Note: The silent and push installation methods ignore the Release Notes value and never display the Display Release Notes dialog box during an installation. Example of Install Settings Values for a Push Installation The following screen shot shows the values that are set from the NetSign Configuration Wizard dialog box to install NetSign by a push installation method. The Push install option should be selected and all other options that perform any sort of checking during the installation are set automatically to inactive. The option to upgrade NetSign Version 5.5 into the existing directory of an earlier version can be active or inactive depending upon site preferences. 11 Product Features Dialog Box The Product Features dialog box includes options to specify which NetSign functions will be installed on the computer and be accessible to users without administrator privileges. It also includes options to specify alternative addresses for NetSign’s technical support and product feedback web sites. Fields Description Application The Application field lists NetSign functions that will be available to the user from the product window. Default Values: Users have access to all functions available from the main NetSign window, as shown in the following screen shot. Note: Consider removing Policies if you do not want users to attempt to modify the configuration options installed with NetSign. Web Links These fields show the default URLs to the Litronic feedback and technical support web pages. If the Override web link check boxes are selected, alternative URLs can be specified. Default Values: • Technical Support: http://www.litronic.com/support/ Note: This URL is invoked by clicking Web Support from the NetSign System Info page. • Product Feedback: http://www.litronic.com/products/netsigncac/feature_request.php Note: This URL is invoked by clicking Feedback from the initial NetSign page. The figure above shows the Feedback option from NetSign’s initial page. 12 Policy Settings Dialog Box The Policy Settings dialog box includes options to specify how NetSign operates with smart cards, certificates, Outlook and the user’s PIN. Note: This section describes the different configuration options that will set when NetSign is installed. Refer to “Chapter 4 NetSign Policy Configuration” on page 51 that explains how to modify these same configuration values after NetSign has been installed. Action to perform when a smart card is inserted This option specifies the action taken by the computer after a smart card is inserted into the reader. The choices are: • Launch Application This option starts a specified application when a smart card is inserted. The application’s executable file name is entered in the Application or Web address field. Use the browse (...) button to navigate to the application’s executable file and select it. • Launch Browser This option starts the web browser. If you select this option, you must specify the URL of the target web site in the Application or Web address field. • Launch E-mail This option automatically launches the user’s default e-mail application. • No action performed No action is performed after a smart card is inserted. Default Value: No action performed 13 Action to Perform when a smart card is removed This option specifies the action taken by the computer after the user removes a smart card from the reader. The choices are: • Close launched application This option stops the application that was initially started when a smart card was inserted. • Launch Application This option starts a specified application when a smart card is removed. Use the browse (...) button to navigate to the application’s executable file and select it. • Log off from Windows This option logs off the current user and the computer displays the initial Windows log on screen. • Lock Workstation This option locks the computer when the smart card is removed from the card reader. The computer can be unlocked by inserting the smart card back into the reader. Note: Only computers running Windows 2000 or Windows XP can be locked. • No action performed No action is performed after a smart card is removed from the reader. Default Value: No action performed Allow user to override insertion/deletion events This option allows users without administrator privileges to override the policies that have been specified by the Action to perform when the smart card is inserted and Action to perform when the smart card is removed fields. Changing all other specified NetSign policies still requires administrator authority. Default Value: Non-administrators can override the policies set from the card insertion and removal fields. Certificate Registration This field contains policy options that determine how NetSign handles certificates on the user’s smart card. • Auto-register certificates for IE When this item is checked, certificates are automatically registered with the Microsoft Certificate store after the smart card is inserted. This policy must be enabled if you are going to enable Auto-register certificates with Outlook under Outlook AutoConfigure. The Microsoft Certificate Store is used to store certificates for CAPI-based applications. This includes Internet Explorer, Outlook, Outlook Express, Windows 2000 Logon, some VPNs, and other applications. The setting for the Action to perform when a smart card is inserted field does not affect this setting. Default Value: Auto-register certificates for IE Important: Windows XP and Windows 2003 Server automatically register smart card logon certificates with the Microsoft certificate store after a card is inserted in the reader. With either operating system certificates are registered automatically, regardless of the value set for this option. 14 • Auto UnReg on LogOff When this option is checked, CAC identity, signing, and encryption certificates are removed from the Microsoft Certificate Store under the user’s personal section at Windows log off. This policy option is useful for a computer that is shared by several users. Default Value: Do not Auto-unregister certificates at log off • Auto Unreg on Removal When this option is selected, CAC identity, signing, and encryption certificates are removed from the Microsoft Certificate Store under the user’s personal section when the card is removed from the reader. Default Value: Do not Auto-unregister certificates when the smart card is removed from the reader • Cache certificates Copies of certificates on the user’s smart card are stored locally on the computer to improve performance. Otherwise, certificates are read directly from the card inserted in the reader. Typically, you should cache certificates to improve performance. Default Value: Do not cache certificates Exceptions when certificates should not be cached include: • When used in conjunction with Auto UnReg to remove traces that a card was used on a system. • A card is registering the wrong certificate due to a problem with the cache. Outlook AutoConfigure This field contains a set of options to configure NetSign to work with the Outlook e-mail program. When this option is selected, certificates registered from the user’s smart card are automatically set for use with Outlook. When an AutoConfigure setting is selected, it overrides values set in the user’s Outlook profile each time certificates are registered with IE. This prevents users from modifying settings that should not be changed. Additionally, if your domain is configured to push registry settings to end-user computers, you can change all end users' configurations automatically. AutoConfigure allows you to force the following Outlook settings to either ON, OFF, No Override: • Sign Email This option automatically adds the user’s digital signature to outgoing messages. Default Value: No override • Clear Text Signing This option sends e-mail messages with digital signatures in clear text. Default Value: No override • Encrypt Email This option encrypts the contents and attachments of the user’s outgoing messages. Default Value: No override • Secure Receipt This option automatically requests a return receipt for all S/MIME signed outgoing e-mail messages. The receipt appears in the sender’s Outlook Inbox after the message was delivered and opened. The receipt confirms that a sent message was received unaltered and also provides information about who opened the message. This feature applies only to Outlook XP or Outlook 2003. Default Value: No override 15 • Publish to GAL If the Publish to GAL option is selected, the user's certificates are automatically published to the Outlook Global Address List (GAL) when registering certificates. This option requires both the Auto-register certificates with Outlook and Auto-register Certificates for IE options to be selected. Default Value: Do not publish to the GAL • Auto Decrypt If the Auto decrypt policy has been selected, Outlook automatically decrypts incoming e-mail messages. Auto Decrypt is not suitable for all users. If users require encrypted e-mail because messages must be protected no matter where they reside, Auto Decrypt is not appropriate. The Auto Decrypt feature only works with Outlook. It does not work with Outlook Express or Netscape. Default Value: Do not auto decrypt incoming e-mail messages • Auto Contact If Auto contact policy has been selected, the contact is automatically added to the user’s address book after receiving a signed message. This gives users the capability of sending an encrypted e-mail message to anyone who has previously sent them a signed message. Auto contact makes working with encrypted e-mail in Outlook easier for most users. Typically, Outlook users need somebody to send them a signed e-mail message before they can send an encrypted e-mail to the person who sent the original signed message. Then, they need to add the contact to their address book in order to get their certificate. This is difficult to understand for most users. Not only does it require training for the users, but it is also inconvenient. Auto Contact reduces administrative work. Auto Contact also provides an extra security measure. If an end user receives two different signing certificates from the same e-mail return address, Auto Contact warns the end user of a possible security violation and shows both certificates to the end user. At this time the user will be allowed to choose which one to trust. Take, for an example, three individuals A, B, and C. A and B communicate regularly with signed and encrypted e-mails. C is a corrupt individual who wants to impersonate A. C is capable of getting a certificate in A’s name through a trusted CA. C sends a signed e-mail to B. Normally B would open C’s e-mail (impersonating as A), notice it has a valid sign symbol on the e-mail, and trust the e-mail (even though this e-mail came from C). If Auto Contact was enabled, B would open C’s e-mail (impersonating as A) and a dialog would be displayed warning B of a possible danger. B would examine the certificates and notice that there is a difference. B would either automatically distrust C’s e-mail and notify his security officer or B would contact A via phone and ask him about the change in certificates. Auto Contact only works for Outlook. It does not work with Outlook Express or Netscape. Default Value: Do not automatically add contacts to the user’s Outlook address book 16 Auto Update If the Auto Update option is selected, NetSign searches for any updates and distributes them to web servers. Default Value: The Auto Update feature is inactive If you select Auto Update and then click Advanced, the Advanced Options dialog box appears to set values in the fields shown in the following example. • Auto Update Mode This field contains a drop-down list to specify how the update will be downloaded and installed on a client computer running NetSign. The choices from the drop-down list are: AUTO Updates are downloaded and installed without user intervention. Users see a pop-up message that indicates an update is being installed on their computers. MANUAL Auto Update runs only when the user requests a NetSign update by selecting the Update Now option from the Card Start menu. Default Value: Manual mode • Auto Update Interval The length (hours) of the interval in which the client computer polls the server to see if a new NetSign patch is available. The patch polling request occurs on the hour. For example, a value of 4 sets a polling request to the server every 4 hours on the hour. Default Value: 24 hours • Web Server The DNS name of the web server hosting the Auto Update Server where NetSign patches are located. Default Value: None • Virtual Directory The directory on the web server where Auto Update patches reside. The Browse button displays the Open dialog box to navigate to the directory where the NetSign update files are located. Default Value: None • Auto Update Certificate This is the certificate or root of the certificate used to sign the patches. The Browse button displays the Open dialog box to navigate to the directory where the certificate file is located. Default Value: None 17 PIN Policy This field contains a set of options that specify how often the user must enter a PIN when accessing applications. The field also contains options that determine how often users must change their PIN. • PIN Cache Mode The PIN Cache Mode drop-down list provides three PIN cache mode options: PIN Once A PIN must be entered once for each use of an application. PIN Always A PIN must be entered each time a secure operation (such as signing) is performed. PIN Timeout This option allows you to specify a time out period after which the user’s smart card will be logged out. Once the card is logged out, users must re-enter their PIN to continue secure operations. Default Value: PIN Time out at 15 minutes If you click the Advanced button, the Advanced PIN Policy dialog box provides options to set more granular time out periods. Instead of a single PIN time out for the card, you can set individual PIN time out periods for the ID, signing and encryption certificates. Also, you can set a PIN time out period for a specific application that requires a card. Setting a certificate’s cache time out period to 0 requires the user to enter the PIN each time a secure operation is performed. A time out period of 0 is equivalent to the PIN Always option. Setting the PIN time out period to a very large value is equivalent to the PIN Once option. If there is a difference between a specific certificate time out period and an application’s time out period, the shorter time out period takes precedence. For example, if the signing certificate’s time out period is 15 minutes and Outlook’s period is 30 minutes, NetSign enforces the shorter 15 minute time out period. • Enable PIN Change AutoRemind PIN Change AutoRemind prompts users to change their PIN on a periodic basis. If the user does not change their PIN within the specified period, a message appears and requests the PIN be changed. The PIN change dialog box will open. The message reappears whenever a card is inserted into the reader until the user changes the PIN. If the PIN Change AutoRemind period is set to 0 days, then users are never prompted to change their PINs. Forcing users to change their PIN when they insert their smart card becomes effective only when the PIN change period is set to a non-zero value. 18 Default Value: Do not enable PIN change AutoRemind If the user has never changed the PIN, and PIN Change AutoRemind is turned on, NetSign will not immediately request a PIN change. Rather, NetSign will reset the clock for PIN change. PIN Change AutoRemind does not monitor which card was last used for the PIN change. Even if multiple cards are used on the same system, only one PIN Change AutoRemind will be displayed for the configured AutoRemind time period. 19 Citrix Server Dialog Box The Citrix Server dialog box includes a field to register hosted applications that run on a Citrix server and are secured with a smart card. The screen shot below shows the default applications secured by a smart card that are registered to Citrix. Fields Description Register Applications This field lists the default application executable files that are registered to run in a Citrix environment. Default Values: CrdStart.exe: NetSign card start function IEXPLORE.EXE: Internet Explorer web browser netscape.exe: Netscape web browser NetSign.exe: NetSign smart card middleware OUTLOOK.EXE: Outlook e-mail application pinChange.exe: NetSign smart card PIN change dialog psm.exe: Netscape Personal Security Manager Applications can be added or removed from the Register Applications field: Removing an application 1. Click on the application’s executable file listed in the Register Applications field. 2. Click Remove. The selected application disappears from the list and is no longer registered to Citrix. Adding an Application 1. Click Add. The Open dialog box appears to navigate to the directory where the application’s executable file is located and select it. 2. Navigate to the directory where the application’s executable file is located. 3. Click on the executable file shown in the directory to select it. 4. Click Open. The file appears in the Citrix Server’s list of registered applications. 20 Chapter 3 NetSign Installation and Upgrade This chapter describes various methods to install and upgrade NetSign. The table below summarizes the installation methods and provides a reference to a section within the chapter that describes the installation procedure in detail. Also, these same procedures can be used to upgrade earlier versions of NetSign currently to Release 5.5. Installation Method Description Local Use the local method to install NetSign on a single computer. See “ Local Installation” on page 25. Installers have the choice of installing NetSign by a standard method using default values, or a custom method that presents a series of dialogs to set configuration and installation values. Silent The silent method installs NetSign on a single computer without requiring any user interaction. The installer program automatically assigns values to all installation and configuration options. See “ Silent Installation Without User Interaction” on page 29. Active Directory push The Active Directory push method installs NetSign on multiple computers that are members of an Active Directory Organizational Unit (OU). See “ Remote Installation Using Active Directory Push” on page 30. Note: Installing NetSign by the Active Directory push installation is restricted to computers running Windows 2000, Windows XP or Windows 2003 Server. NetSign cannot be installed on earlier versions of Windows by the Active Directory push method. Systems Management Use the SMS method to install NetSign on multiple computers running any version Server (SMS) push of the Windows operating system. Refer to “ Remote Installation Using SMS Push” on page 36. Refer to Appendix A on page 89 for instructions to uninstall NetSign by similar methods listed in the table above. “Appendix B NetSign Installation Changes” on page 105 lists the changes to a computer after NetSign has been installed. Refer to the appendix for a listing of all files that are added to the computer and new keys in the Windows registry by a NetSign Version 5.5 installation or upgrade. 21 Installation Requirements This section describes the minimum hardware and software requirements to support NetSign. Hardware Requirements • Personal computer The computer on which NetSign will be installed must meet the following minimum requirements: • Intel/AMD CPU with processing power equivalent to a Pentium 133 MHz or higher • 20 MB of free disk space • 32 MB of RAM minimum (256 MB or higher is recommended) • CD-ROM drive (only necessary for a local installation using the NetSign product CD) • 1 unused USB or serial port to attach the smart card reader • Smart card reader NetSign is designed to work with PC/SC compliant smart card readers that adhere to the DoD smart card reader specification. NetSign supports the following listed smart card reader models from their respective vendors: • Litronic: Litronic 215, 3015, 3015i, and 260 • SCM: SCR201 PCMCIA, SCR331 USB, SCR331-DI USB/DesFire, and SCR301 USB • Cherry: ST-1000UA • UPEK: TouchChip TCRS1C combination smart card and fingerprint reader • Smart card NetSign supports smart cards from the following vendors: • Oberthur GalactIC 2.1-5032 Mask 2.1R • Axalto Cyberflex Access 32K CAC (M256EPALP1_SI_9C_02 Softmask 7 Version 2) • Oberthur CosmopolIC V4 • ActivCard V2 Gemplus Gemxpresso 64K Software Requirements • Windows operating system NetSign can run on the following versions of the Windows operating system: • Microsoft Windows 2000 with Service Pack 4 applied • Microsoft Windows XP Professional Service Pack 1a and above • Microsoft Windows Server 2003 Enterprise Edition 22 • Web browsers NetSign supports the following web browsers: • Microsoft Internet Explorer Version 5.5 and above • Netscape Communications Corporation Netscape Versions 4.76, 7.0 and 7.2 • Smart card reader drivers NetSign supports software drivers for PC/SC and DoD compliant smart card readers • E-mail applications NetSign supports the following e-mail applications: • Microsoft Outlook 2000 with Service Pack 2 • Microsoft Outlook 2002 (XP) • Microsoft Outlook 2003 • Microsoft Outlook Express 6 (no auto-configure capability) • Microsoft Outlook Web Access Note: The following specific Outlook Web Access software requirements must be met for NetSign support: User computers are running on Windows 2000 and above User computers are running Internet Explorer Version 6 and above (No other browsers are supported) Microsoft Exchange Server 2003 to host Outlook Web Access 23 Installation Considerations This section describes general information that must be considered as part of your installation planning. • Entries are added to the Windows registry during a NetSign installation. You must log on to the computer with Windows administrator privileges to install NetSign by the local or silent methods. You must have appropriate Active Directory or SMS privileges to install NetSign by either push method. • You should have specified your installation and configuration options with the NetSign Configuration Wizard before attempting the installation procedures described in this chapter. Refer to “Chapter 2 Pre-Installation Configuration” on page 7, which explains how to use the NetSign Configuration Wizard. Otherwise, NetSign is installed with the current values specified in the NetSignConfig.ini file. • The two push installation methods require the Push install option to have been set to active in the NetSignConfig.ini file before installing NetSign. Refer to a description of the Push install option on page 11. The Push flag indicates to the installer to use the current keys entered in the registry instead of the keys within the NetSignConfig.ini script file of the local directory where the NetSign CD image has been placed. • If you are using AutoConfigure, Auto-register or any other auto feature of Outlook, make sure Outlook is specified as the default e-mail application and is already configured for users. • Although NetSign can be installed without PC/SC readers/drivers, the readers and drivers should be installed first to prevent errors that can occur with some versions of Windows during an installation. By default, the installer issues a warning message if it does not detect a card reader attached to the computer on which NetSign is being installed. The NetSign Configuration Wizard includes an option that can be set to prevent the installer from verifying if a reader is attached to the computer. • If you plan to use a version of Netscape with Personal Security Manager (PSM), you should install Netscape with PSM before installing NetSign. There is currently an issue with installing Netscape with PSM after the NetSign middleware is installed. • The NetSign installer runs the nsreg.exe file to register root certificates to the Netscape Version 4.76 web browser. Running nsreg.exe also adds the security module to Netscape. If Netscape root certificates were not chosen to be registered during installation, you can manually register certificates to Netscape Version 4.76 with the nsreg.exe file located in the home directory where NetSign is installed. Netscape certificates are located in the Certificates directory beneath the NetSign home directory. Certificates must be manually registered for Netscape Versions 7.0 and 7.2. Refer to “Appendix C Certificate Installation” on page 117 for instructions to import certificates for these Netscape releases. • If you install Netscape after NetSign, you must restart the computer to enable Netscape to work with NetSign. You must also register root certificates if Netscape was installed after NetSign. 24 Local Installation This procedure explains how to install or upgrade NetSign on a single computer. Refer to the push installation methods later in this chapter to install or upgrade NetSign simultaneously on multiple computers. NetSign can be installed by either a standard or custom method. A standard installation uses the current values saved in the NetSignConfig.ini file and automatically proceeds through the entire installation sequence. A custom installation launches the NetSign Configuration Wizard. The installation procedure includes a sequence of four dialog boxes to assign values to installation and configuration options. The following table lists the custom installation dialog boxes and a page reference to a section in Chapter 2 where the fields that appear on each configuration dialog box are described. Custom Installation Dialog Reference to Dialog Configuration Options NetSign Configuration Wizard “ Installation Settings” on page 9 Product Features “ Product Features Dialog Box” on page 12 Policy Settings “ Policy Settings Dialog Box” on page 13 Citrix Server “ Citrix Server Dialog Box” on page 20 The installer checks if NetSign is currently installed on the computer before installing Version 5.5. If the installer detects that NetSign is installed, it removes the earlier version before installing Version 5.5. 1. Log on to the computer with a Windows administrator user account. A NetSign installation writes additional entries to the Windows registry, which requires administrator authority. 2. Insert the NetSign installation CD in the computer’s CD drive, or navigate to the directory where the CD image has been placed. 3. Double-click on the setup.exe file in the home directory of the CD or the CD image. The installer program presents a splash screen followed immediately by the Welcome dialog box. 4. Click Next. The License Agreement dialog box appears on the screen. 5. Read the license agreement and click Yes to accept the terms of the agreement. 25 The Installation Type dialog box appears and presents two NetSign installation options. 6. Choose either Standard or Custom as the type of NetSign installation and click Next. The next step in the installation procedure varies based upon the type of installation you selected. Installation Type Continue at Standard Procedure step 13 on page 27 Custom Procedure step 7 on this page Custom Installation Procedure Steps The NetSign Configuration Wizard dialog box appears immediately after selecting Custom as the type of NetSign installation. 7. Set values for the installation options that appear on the NetSign Configuration Wizard dialog box. Refer to page 9 for descriptions of the fields that appear on the NetSign Configuration Wizard dialog box. 8. Click Next to proceed to the next custom installation dialog box. 9. Set values for the options that appear on the Product Features dialog box and click Next. Refer to page 12 for descriptions of the fields that appear on the Product Features dialog box. 26 10. Set values for the options that appear on the Policy Settings dialog box and click Next. Refer to page 13 for descriptions of the fields that appear on the Policy Settings dialog box. 11. Set values for the options that appear on the Citrix Server dialog box. Refer to page 20 for descriptions of the fields that appear on the Citrix Server dialog box. 12. Click Finish. The installer begins copying files to the computer immediately after clicking Finish. End of Custom Installation Procedure Steps 13. Notice the progress bar that indicates the status of the installation. The text caption immediately above the progress bar indicates the active process occurring during the installation procedure. If NetSign Version 5.5 is being installed on a computer with an earlier version of NetSign currently installed, you will see captions that indicate the earlier version of NetSign is being removed. When all files have been copied to the computer, a dialog box appears and asks if you want to display the Release Notes. Note: Administrators can set an installation option with the NetSign Configuration Wizard to prevent the Release Notes dialog box from appearing during the installation procedure. 14. Click Yes or No from the dialog box. if you click Yes, a NotePad window opens on the screen and displays the NetSign Release Notes. Close the NotePad window after you have finished reading the Release Notes. 27 The Wizard Complete window appears after the installation procedure has finished. 15. Click Finish. The NetSign CardStart icon should appear in the system tray of the computer. 16. Double-click on the CardStart icon to begin using NetSign. Refer to “ Local Uninstall” on page 91 for instructions to remove NetSign using the Windows Add or Remove facility. 28 Silent Installation Without User Interaction The silent method installs NetSign on a single computer without user interaction. No dialog boxes appear on the screen during the installation procedure, nor does the installer indicate when the installation procedure has finished. The installer program automatically assigns values to all installation and policy options specified from the NetSignConfig.ini file. You should have moved the updated NetSignConfig.ini file with your configuration changes to the temp subdirectory of the NetSign CD image. Otherwise, NetSign will be installed with a default configuration. Refer to “Chapter 2 Pre-Installation Configuration” on page 7 for a listing of the values specified in the NetSignConfig.ini file. The installer checks if NetSign is currently installed on the computer before installing Version 5.5. If the installer detects that NetSign is installed, it silently removes the earlier version during the Version 5.5 installation procedure. The silent method uses MsiExec.exe, which is the executable program of the Windows Installer to interpret installation packages. Refer to http://www.microsoft.com/resources/documentation/windows/xp/all/proddocs/en-us/msiexec.mspx for a complete listing of all msiexec.exe command parameters. The silent installation method is invoked from the Windows command line. You must enter three separate msiexec.exe commands. 1. Log on to the computer with a Windows administrator user account. A NetSign installation writes additional entries to the Windows registry, which requires administrator authority. 2. Open a command window. Start > Run > cmd 3. Enter the commands in the order listed below. C:\> msiexec /qn /i Z:\ISScript1050.msi C:\> msiexec /qn /i Z:\NetSignConfig.msi C:\> msiexec /qn /i Z:\NetSign.msi Notes: • In the examples above, Z: is the drive letter of the computer’s local CD drive where the NetSign product CD has been inserted. Or, specify the path to a mapped network disk where the NetSign installation package has been placed. • You must enclose the directory path within quotes (") if the path to the ISScript1050.msi, NetSign.msi and NetSignConfig.msi files contain a blank space. C:\> msiexec /qn /i "V:\App Server\NETSIGN\NetSign.msi" 4. Press Enter. It takes approximately 30-40 seconds to complete the installation. You should see the CardStart icon in the computer’s system tray that indicates NetSign has been installed. 5. Double-click on the icon to start using NetSign. Refer to “ Silent Uninstall Without User Interaction” on page 92 for instructions to remove NetSign by the silent method. 29 Remote Installation Using Active Directory Push Windows Active Directory provides a function to push installation packages to client computers. Active Directory can be used to install or upgrade NetSign on computers running on Windows 2000 and above. The Active Directory push installation method cannot be used to install or upgrade NetSign on computers running earlier versions than Windows 2000. The Active Directory push method uses three MSI packages containing installer scripts, registry entries and files to install NetSign. The target computers must be restarted to invoke the installation process. NetSign should be operational after users finish logging on to their computers. The Active Directory push method can be used to upgrade earlier versions of NetSign to Version 5.5. The earlier version is removed immediately before Version 5.5 is installed. Based upon a configuration value set with the NetSign Configuration Wizard, Version 5.5 is installed into the same directory as an earlier version, or to a separate directory as part of an upgrade. If Active Directory was used to push install NetSign, Active Directory should be used to remove the program. Errors can occur if NetSign is removed with the Windows Add/Remove Programs facility. Refer to “ Push Uninstall with Active Directory” on page 93 for instructions to remove NetSign by the Active Directory push installation method. Installation Requirements The following requirements must be met for an Active Directory push installation of NetSign to client computers. • The Domain Administrator must have domain privileges to administer the NetSign installation files (ISScript1050.msi, NetSignConfig.msi and NetSign.msi) throughout the domain. • All target computers that will have NetSign installed are running on Windows 2000, Windows XP or windows 2003 Server. • The domain controller must be running either Windows 2000 Advanced Server or Windows Server 2003. • Active Directory is implemented on the domain controller to be used to push the NetSign installation packages. • The NetSign Configuration Wizard has been run and the updated NetSignConfig.ini file has been placed in the \temp subdirectory of the NetSign CD image. • The NetSign CD image has been placed on a shared directory that is accessible to all computers that participate in an Active Directory push installation. • The Push install option must have been saved as a value of the NetSignConfig.ini file. Refer to page 11 for a description of the Push install option. 30 Overview of the Steps to Push Install with Active Directory There are various methods to deploy installation packages with Active Directory. Each site may have operational policies that dictate how installation packages are deployed to computers. This procedure consists of the major steps listed below. If this procedure is followed, the steps should be completed in the listed order. • Create an Active Directory Organizational Unit on page 32 • Add MSI Files as Active Directory packages on page 33 This procedure performs a complete installation of NetSign on computers that do not have NetSign installed. This procedure also updates computers to Version 5.5 that are currently running an earlier version of NetSign. An Active Directory push installation of NetSign requires the files shown in the following table: File Directory Location ISScript1050.msi NetSign_CD_home_Directory\ NetSignConfig.msi NetSign_CD_home_Directory\ NetSign.msi NetSign_CD_home_Directory\ 31 Step 1: Create an Active Directory Organizational Unit This step explains how to create an Active Directory Organizational Unit (OU) for a push installation of NetSign. All target computers that will have NetSign installed will be assigned as members of the OU. If all of your target computers are already part of the same OU, you can proceed to the next step. 1. Open the Active Directory Users and Computers facility. Start > Settings > Control Panel > Administrative Tools > Active Directory Users and Computers 2. Right-click on the name of the domain that the target computers belong and select New > Organizational Unit from the menu. 3. Assign a name to the OU and click OK. 4. Click Computers in the left pane to display a list of computers that belong to the domain. 5. Select the computers from the right pane that you want to be targets for the NetSign installation. 6. Right-click and select Move from the menu. 7. Select the OU in which the target computers should belong and click OK. 8. Open the OU folder and verify the computers you selected are within it. 32 Step 2: Add MSI Files as Active Directory Packages This step explains the procedure to create an OU policy and add the ISScript1050.msi, NetSignConfig.msi and NetSign.msi files as Active Directory packages. Important: You must select the MSI packages in the order listed below: a.ISScript1050.msi b.NetSignConfig.msi c.NetSign.msi 1. Right-click on the OU containing the target computers and select Properties from the menu. The properties dialog box for the OU appears on the screen. 2. Click the Group Policy tab. 3. Click New. 4. Assign a name to the policy. 5. Select the policy you created and Click Edit. 33 The Group Policy Object Editor window appears on the screen. 6. Click on the Computer Configuration > Software Settings folder to expand the list beneath it. You should see Software installation as an indented item beneath Software Settings. 7. Right-click on Software installation and then select New > Package from the menu. The Open dialog box appears on the screen to navigate to the NetSign installation packages. 8. Select My Network Places from the Open dialog box. Important: You must navigate to the location of the NetSign MSI files using the full network path. Otherwise, an error message appears indicating Active Directory cannot verify the network location. 9. Navigate to the ISScript1050.msi file. Select the ISScript1050.msi file located in the home directory of the NetSign CD image. 10. Select the file and click Open. 34 11. Accept all assigned default values from the Deploy Software dialog box and click OK. 12. Repeat steps 7-11 and select the NetSignConfig.msi file. The NetSignConfig.msi file is located in the home directory of the NetSign CD image. 13. Repeat steps 7-11 and select the Netsign.msi file. The NetSign.msi file is located in the home directory of the NetSign CD image. The MSI files should be listed in the right pane of the Group Policy Object Editor dialog box. NetSign will be installed as Windows restarts on each computer. After Windows has finished booting up, users should see the CardStart icon in their computer’s system tray that indicates NetSign is running. If the Active Directory push installation method was used to upgrade an existing version of NetSign to Version 5.5, the earlier version is removed on the target computers during the reboot operation. 35 Remote Installation Using SMS Push Microsoft’s Systems Management Server (SMS) gives administrators the capability to manage client systems and monitor hardware compatibility, license validity, and packages installed on client computers. Administrators can use SMS to distribute NetSign installation packages to selected target computers. SMS provides more functionality and flexibility than Active Directory to install software. Using SMS, administrators can distribute software to any number of computers on your network. SMS can push install NetSign to computers running any version of the Windows operating system. Installation Requirements • This procedure assumes SMS Version 2.0 or 2003 has been installed and is operational. • The person responsible for installing NetSign has the appropriate authority to use SMS. • SMS distribution points have been formally defined. • The NetSign Configuration Wizard has been run and the updated NetSignConfig.ini file has been placed in the \temp subdirectory of the NetSign CD image. • The Push install option must have been saved as a value of the NetSignConfig.ini file. Refer to page 11 for a description of the Push install option. Overview of the Steps to Install NetSign by SMS This procedure explains how to distribute the NetSign installation package using conventional SMS methods. There are various methods to push installation packages with SMS based upon each site’s standards for deploying software to their user community. This procedure consists of the major steps listed below. If this procedure is followed, the steps should be completed in the listed order. “Step 1: Create a New Package” on page 37 “Step 2: Set the Package Distribution Points” on page 39 “Step 3: Create NetSign Package Programs” on page 40 “Step 4: Advertise the NetSign Installation Package” on page 44 The NetSign installation package consists of three files: ISScript1050.msi Windows installer file containing the Install Shield script engine NetSignConfig.msi Windows installer file containing installation and configuration options NetSign.msi Windows installer file containing NetSign product files Set up your SMS package program dependencies to run these files in the order listed above. Also, set the programs in the NetSign installation package to run only when no user is logged on. 36 Step 1: Create a New Package 1. Log on to the computer that has the SMS administrator console installed with an account authorized to use SMS. 2. Select Start > Programs > Systems Management Server > SMS Administrator Console. The SMS Administrator Console appears on the screen. 3. Right-click the Packages folder and select New > Package. The Package Properties dialog box appears on the screen. 4. Complete the form, then click the Data Source tab. 5. Select This package contains source files option. 6. Click Set to locate and select the directory in which your data files are stored. The Set Source Directory dialog box appears on the screen. 37 7. Select Network path from the Source directory location field. 8. Click Browse and navigate to the directory where the NetSign installation CD has been placed. 9. Click OK to select the NetSign installation package. The Package Properties dialog box refreshes and displays the directory path to the NetSign installation CD. 10. Click OK. The NetSign installation package has been created. 38 Step 2: Set the Package Distribution Points This step describes how to set SMS distribution points to deploy the NetSign installation package. 1. Click on plus sign (+) of the NetSign installation package in the left pane of the SMS dialog box to expand options beneath it. 2. Right click on Distribution Points and select New > Distribution Points from the menu. The New Distribution Points Wizard dialog box appears on the screen. 3. Click Next. The Copy Package dialog box opens with a field to select the distribution points for the package. 4. Place a check mark next to names of the distribution points for the NetSign package you created earlier. 5. Click Finish. 39 Step 3: Create NetSign Package Programs This step explains how to prepare the three NetSign installation files for an SMS distribution package. The procedure describes how to add three files to the NetSign installation package and set the program dependencies to run them in the order listed below: a. ISScript1050.msi b. NetSignConfig.msi c. NetSign.msi 1. Right-click on the Programs folder and select New > Programs from the menu. The Program Properties dialog box appears on the screen. 2. Assign a name to the program to identify it as the ISScript1050.msi file. 3. Browse to the directory where the ISScript1050.Msi file is located and select it. 4. In the Command line field, enter msiexec /qn /i ISScript1050.msi 40 5. Click the Environment tab on the Program Properties dialog box. 6. Set the Program can run option to Only when no user is logged on. 7. Click Apply. 8. Click OK. You should see the ISScript program listed in the NetSign installation package you created. 9. Right-click on the Programs folder and select New > Programs from the menu. The Program Properties dialog box appears on the screen. 10. Assign a name to the program to identify it as the NetSignConfig.msi file. 11. Browse to the directory where the NetSignConfig.Msi file is located and select it. 12. In the Command line field, enter msiexec /qn /i NetSignConfig.Msi 41 13. Click the Environment tab on the Program Properties dialog box. 14. Set the environment option that the program should run Only when no user is logged on. 15. Click the Advanced tab. 16. Set the run-time dependency for the NetSignConfig.msi program to run after the Isscript1050.msi program in your NetSign installation package. 17. Click Apply. 18. Click OK. 19. Repeat steps 9-18 to add NetSign.msi to the package. a. The msiexec command string should be msiexec /qn /i NetSign.msi. b. Set the environment option that NetSign.msi should run Only when no user is logged on. c. Set the run-time dependency for the NetSign.msi program to run after NetSignConfig.msi. 42 20. Verify the three programs have been added to the NetSign installation package. 43 Step 4: Advertise the NetSign Installation Package 1. On the SMS Administrator Console, right-click Advertisements. 2. Select All Tasks > Distribute Software from the menu. The Distribute Software wizard begins to set up the package advertisement process. 3. Read the material on the first wizard screen and then click Next. The Distribute Software Wizard Package dialog box opens on the screen. 4. Select the Distribute an existing package option. 5. Select the NetSign package from the Packages section of the screen. 6. Click Next. The Distribution Points Software Wizard window opens. 7. Select the distribution point from which you want to distribute the NetSign package. In order to distribute the package, the system must bring all the source files from the source directory to a distribution point on the SMS server. The distribution point must be set up when you set up SMS. 44 8. Click Next. The Distribute Software Wizard - Advertise a Program dialog box opens. 9. Click Yes to advertise a program to a collection. 10. Select the name of the program associated with the NetSign.msi file. 11. Click Next. The Distribute Software Wizard - Advertisement Target dialog box opens on the screen. 12. Click the Advertise the program to an existing collection option. 45 13. Click Browse to select a collection from the Browse Collection dialog box. 14. Click OK after selecting the collections. The Browse Collection dialog box closes and returns you the Advertisement Target dialog box. 15. Click Next. 16. Select the Advertise the program to an existing collection option. 17. Use the Browse button to select the collection you want to distribute the NetSign and click OK. 18. Click Next. 46 The Distribute Software Wizard - Advertisement Name dialog box opens on the screen. 19. Specify a name for the NetSign advertisement in the Name field. 20. Enter any comments about the advertisement in the Comments box. 21. Click Next. The Distribute Software Wizard - Advertise to Subcollections dialog box opens on the screen. Within a collection there can be subcollections. 22. Click on the appropriate option button to select the advertise option for your specific environment. 23. Click Next. 47 The Distribute Software Wizard – Advertisement Schedule dialog box opens on the screen. The dialog box includes fields to set the date and time when this advertisement occurs and when it will expire. 24. Make the appropriate selection and set up the times and dates you want. 25. Click Next. The Distribute Software Wizard – Assign Program dialog box opens on the screen. By assigning the program, it becomes a mandatory component of the installation. 26. Select the Yes. Assign the program. option. 48 27. Click Next. The Distribute Software Wizard – Completing the Distribute Software Wizard opens. 28. Click Finish. The installation will be unnoticed by the user; the Litronic folder will be available from Start > Programs and users should see the Card Start icon in their system tray after logging on to their computers. 49 50 Chapter 4 NetSign Policy Configuration This chapter describes how to make configuration changes to NetSign after it has been installed. There are two methods to configure NetSign. The local method uses NetSign’s Policies page to make configuration changes on a single computer. The remote method configures NetSign for a group of computers that belong to an Active Directory Organizational Unit (OU). Much of the configuration information in this chapter was discussed previously in Chapter 2 about setting pre-installation configuration values with the NetSign Configuration Wizard. Local Policy Configuration NetSign policies can be configured locally on a single computer from the Policies page. You must have logged on to the computer with a Windows administrator user account to be able to access all configuration options that appear on the page. Administrators configure policies for an individual computer by assigning values to the options and then clicking Accept. The selected values are written to the computer’s registry and become immediately effective. The Policies page presents configuration options in five major groups: • Smart Card Events • Certificate Registration • Auto Update • PIN Policies • Outlook Configuration Refer to “ NetSign Policies” on page 59 for a description of the configuration options in each policy group. 51 Remote Policy Configuration NetSign provides the capability to remotely configure policies on a group of computers that belong to an Active Directory OU. Configuration policies are set through an Active Directory administration template defined in the NetSign.adm file. Remote policies set through NetSign’s template are saved in Registry.pol files. Separate Registry.pol files are used for HKEY_LOCAL_MACHINE and HKEY_CURRENT_USER. Remote Policy Configuration Requirements The following requirements must be met to remotely configure NetSign: • The domain administrator must have domain privileges to administer NetSign throughout the domain. • Active Directory is implemented on the domain controller to be used to configure NetSign. • The domain controller must be running either Windows 2000 Advanced Server or Windows Server 2003. • The NetSign CD image has been placed in a network location that is accessible to the domain controller. • All target computers that have NetSign installed are running on either Windows 2000 or Windows XP. Setting Up Remote Policy Configuration This section describes a procedure to add NetSign’s configuration policies contained in the NetSign.adm file as an Active Directory administrative template. These policies will be applied to the computers that belong to the OU previously used to install NetSign by the Active Directory push method. The values assigned to these NetSign policies become effective after the target computers have been restarted. 1. Log on to the computer with a domain administrator user account. 2. Open the Active Directory Users and Computers MMC console. Start > Settings > Control Panel > Administrative Tools > Active Directory Users and Computers 3. Select the same Active Directory OU that was used to install NetSign. Note: This procedure assumes the original OU that was used to install NetSign will be used for remote configuration because the target computers have already been identified by their OU membership. 4. Right-click on the OU name shown in the left pane of the Active Directory Users and Computers window. 5. Select Properties from the menu. 52 6. Click on the Group Policy tab of the OU’s Properties dialog box. 7. Select the policy of the OU and click Edit. 8. Right-click on the Administrative Templates folder in the left pane of the Group Policy Object Editor dialog box. 9. Select Add/Remove Templates from the menu. 10. Click Add from the Add/Remove Templates window. The Policy Templates window should open on the screen. 53 11. Navigate to the directory where the NetSign.adm file is located. The NetSign.adm file is located in the admin subdirectory of the NetSign CD image. 12. Select the NetSign.adm file and click Open. The NetSign policy template appears in the list displayed from the Add/Remove Templates window. 13. Click Close. A NetSign folder should appear beneath the Administrative Templates folder displayed in the left pane of the Group Policy Object Editor dialog box. 14. Double-click on the NetSign folder to expand the policy categories within the folder. The example above shows the NetSign template subfolders. Each subfolder contains a set of related policies. 15. Click on a subfolder to display the policies within it. The policies within the folder appear in the right pane of the Group Policy Object Editor window. 54 16. Double-click on a policy setting. A dialog box appears to change the state of a NetSign policy. Each dialog box contains a set of options to specify whether the policy will be used in configuring NetSign remotely or not. Not Configured The policy is not used and no values for it are saved in the registry. This is the initial value assigned to all NetSign policies through the NetSign.adm file. Enabled The policy is actively enforced and its value is saved in the registry. Disabled The policy is disabled and is not enforced unless overridden. The value associated with the policy is saved in the registry. 17. Set the state of the policy based upon whether you want to use the policy to configure NetSign or not. 18. Assign a value to the policy if it will be used to remotely configure NetSign. 19. Repeat steps 15-18 until all NetSign configuration policies have been assigned values. The NetSign policies become effective on each target computer after it has been restarted. 55 NetSign Configuration Options This section describes each NetSign policy that can be configured locally or remotely. Local and Remote Configuration Policy Mapping The following table shows NetSign configuration groups and the unique name for both local and remote configuration policies. Local policies are identified by their title shown on the Policies page. In the case of remote configuration, the policy name includes the Active Directory configuration group and setting name in the form configuration_group-setting_name. Configuration Policy Local Configuration Policy Remote Configuration Policy Page Smart Card Events NetSign response to a card Action to perform when a smart insertion event card is inserted Card Events-Card insertion action 59 NetSign response to a card Action to perform when a smart removal event card is removed Card Events-Card removal action 59 User override of card events Allow user to override insertion/removal events Card Events-Allow user to 59 override insertion/removal events Certificate Registration Register certificates for use Auto-register certificates for IE with IE Automatically register certificates 60 for use with Internet Explorer Remove certificates when the user logs off Automatically remove certificates 60 on Logoff Auto Unreg on Log Off Remove certificates when a Auto Unreg on Remove card is removed from reader Automatically remove certificates 60 on card removal Cache smart card certificates on the user’s computer Cache certificates Cache certificates 60 Outlook AutoConfiguration Register certificates for use Auto-register certificates with with Outlook Outlook AutoRegister 61 Publish user certificates to the Outlook GAL Outlook AutoConfigure-Publish certificates to the GAL 62 Publish to GAL Add user’s digital signature Sign Email to e-mail messages Outlook AutoConfigure-Add digital 61 signatures to outgoing messages Send e-mail digital signatures in clear text Clear Text Signing Outlook AutoConfigure-Send clear 61 text signed messages Encryption of the contents of outgoing e-mail messages Encrypt Email Outlook AutoConfigure-Encrypt contents and attachments of outgoing messages 61 Return receipt for outgoing Secure Receipt e-mail messages Outlook AutoConfigure-Request secure receipt for all S/MIME signed messages 61 Automatic decryption of Auto decrypt incoming e-mail messages Outlook AutoConfigure-AutoDecrypt 62 56 Configuration Policy Local Configuration Policy Remote Configuration Policy Page Outlook Configuration Auto Contact Automatic addition of contact information to the user’s address book after receiving a signed message Outlook user profile Profile Outlook AutoConfigure-AutoContact 62 None 62 Client Update-AutoUpdate 63 Auto Update NetSign Update Auto Update PIN Policy PIN caching PIN cache mode PIN cache timeout 64 Note: Remote policy configuration does not provide the PIN Always or PIN Once options PIN cache time out period Request ID PIN after when using the ID certificate ID certificate PIN timeout 64 PIN cache time out period when using the e-mail certificate Request signature PIN after Email signing certificate PIN timeout 64 PIN cache time out period when using the encryption certificate Request encryption PIN after Encryption certificate PIN timeout 64 PIN cache time out period when using an application Application Timeout Application specific timeout 64 PIN change AutoRemind 64 NetSign feedback web site None Feeback web page 65 NetSign technical support web site Technical Support web page 65 Reminder to user to change Enable PIN change auto remind PIN at a specific interval Web Links None 57 Recommended Policies If you expect users to sign all e-mail messages with Outlook, the following policy values are recommended for NetSign. These policies allow users to sign all their e-mail messages without requiring any client side configuration. • Auto-register certificate for IE Enabling this option places certificates from the smart card into the certificate store so they can be registered for Outlook. • Auto-register certificates with Outlook This will automatically configure Outlook to use the certificates on the user’s smart card. • Sign e-mail messages as default This will cause e-mail messages to be signed by default, which reduces the need for user training to send secured messages with NetSign. • Send signed messages in Clear Text When messages are sent in clear text the recipient can view them in the preview pane of Outlook (non Clear Text messages cannot be displayed in the preview pane) If e-mail is the primary application used by the smart card, then you may want to set Launch default e-mail as the value for the Action to perform when a smart card is inserted option. Also, set the Close launched application as the value for the Action to Perform when smart card is removed option. This simplifies smart card usage for the end user. If you expect users to use a smart card to access SSL sites such as an intranet, the following policy settings are recommended: • Auto-register certificate for IE This places certificates from the smart card into the certificate store, which allows Internet Explorer to use them for SSL sessions. If the smart card is primarily used to access an intranet site, then you may want to set the Launch default browser as the value for the Action to perform when a smart card is inserted option. Specify the URL of the intranet site as the value of the Web or Application option. Also, set Close launched application as the value for the Action to Perform when smart card is removed option. This makes it easier for the user to access the web site by simply inserting a smart card. It also eliminates the need for administrators to distribute the intranet URL to their user communities. 58 NetSign Policies This section describes NetSign policies that can be configured locally and remotely. Smart Card Events These policies determine what action NetSign takes after the user either inserts or removes a smart card from a card reader. NetSign Response to a Card Insertion Event Policy Option Description Launch Application NetSign launches the application specified in the Application or Web address field when the smart card is inserted into the reader. Note: For remote configuration, the complete directory location to the application’s executable file must be specified in the Launch application field. All target computers must have the application placed in the same directory location. Launch Browser NetSign starts the user’s default web browser when a smart card is inserted. The browser opens at the web site specified from the Application or Web address field. Launch Email NetSign launches the user’s default e-mail application when a smart card is inserted into the reader. No action performed NetSign does not take an action when a card is inserted. This is the default. NetSign Response to a Card Removal Event Policy Option Description Close launched application NetSign closes the application that was initially launched when a smart card was inserted. This action also applies to e-mail and browser actions that were started when the smart card was inserted into the reader. Launch Application NetSign starts a specified application when the smart card is removed. Lock Workstation NetSign locks the computer when the smart card is removed from the card reader. Log off from Windows NetSign logs off the user from the computer when the smart card is removed. No action performed NetSign does not take an action when the card is removed from the reader. This is the default. User Override of Card Events If this policy is enabled, card insertion and card removal policies can be overridden by end users without administrator authority. 59 Certificate Registration This group of policy options determines how NetSign handles certificates on the user’s smart card. Policy Option Description Register certificates for When this item is checked, certificates are automatically registered with the use with IE Microsoft Certificate store after the smart card is inserted. This policy must be enabled if you are going to enable Auto-register certificates with Outlook under Outlook AutoConfigure. The Microsoft Certificate Store is used to store certificates for CAPI-based applications. This includes Internet Explorer, Outlook, Outlook Express, Windows 2000 Logon, some VPNs, and other applications. The setting for Action to perform when a smart card is inserted does not affect this setting. Important: Windows XP and Windows 2003 Server automatically register certificates with the Microsoft certificate store after a smart card is inserted in the reader. The value you set for this policy will be ignored and certificates will be registered if NetSign is installed on a computer running Windows XP or Server 2003. Remove certificates When this option is checked, CAC identity, signing, and encryption certificates when the user logs off are removed from the Microsoft Certificate Store under the personal section for the user when the user logs off from the computer. All other non-CAC certificates remain in the user’s personal certificate store. This policy option is useful for a computer that is shared by several users. When this option is selected, CAC identity, signing, and encryption certificates Remove certificates when a card is removed are removed from the Microsoft Certificate Store under the user’s personal section when the card is removed from the reader. All other non-CAC certificates from the reader remain in the user’s personal certificate store. Cache smart card certificates on the user’s computer 60 Copies of certificates on the user’s smart card are stored locally on the computer to improve performance. Otherwise, certificates are read directly from the card inserted in the reader. Typically, certificates should be cached to improve performance. Outlook Configuration Outlook AutoConfigure allows you to force certain Outlook security settings on the user’s computer. These settings can be pre-configured as part of the install script. This allows you to perform an install of NetSign and have Outlook fully configured for use without having to open Outlook. If Outlook is not currently installed, the settings become effective after Outlook has been installed. AutoConfigure allows you to force the following Outlook settings to either ON, OFF or No Override: • Automatically sign outgoing messages • Attach digital signature in clear text • Automatically encrypt outgoing messages • S/MIME return receipt for outgoing e-mail messages that verifies the message was delivered unaltered and provides information about who opened the message. This feature only applies to Outlook XP and Outlook 2003. When AutoConfigure is active, it overrides the existing Outlook setting each time certificates are registered with IE. This prevents users from changing settings that should not be changed. Additionally, if your domain is configured to push registry settings to end user computers, then you can change all end users’ settings automatically. Auto-register Certificates with Outlook When the Auto-register policy has been specified, signing and encrypting e-mail messages are automatically configured for use with Outlook. This occurs immediately after certificates are registered with the Microsoft certificate store. The administrator does not need to configure Outlook for the user after certificates have been installed on the computer. Certificate registration occurs each time a card is inserted into the card reader. This process also helps reduce NetSign maintenance. When users receive new cards with new certificates on them, they only have to insert the card and the computer will be automatically configured to use Outlook. The Outlook auto-register policy has some limitations that make it inappropriate for all users. The limitations include the following: • Certificates are configured regardless whether e-mail addresses match. The last card inserted will be used to sign/encrypt mail. If the e-mail address does not match, sending message will fail with an error message. • Outlook Express is not supported. NetSign does not provide automatic configuration for Outlook Express. • Only one e-mail profile per user account is supported. If more than one Outlook profile exists for the user account, only the first profile will be updated. • The expiration date of a certificate is not checked before configuring. If the user inserts a card with an expired certificate, it will be configured. 61 Outlook Profile Note: Changing the default Outlook profile is available only from the Policies page. By default, NetSign permits users without administrator authority to select the Outlook profile associated with NetSign. Users can select another Outlook profile to configure with NetSign by clicking on the Profile button from the Policies page. Users select the profile they want to AutoConfigure and click OK. Thereafter, NetSign applies its configuration policies to the selected Outlook policy. NetSign automatically detects if there are multiple Outlook profiles configured on a computer. When multiple profiles are detected, a pop-up dialog appears on the user’s screen and requests the Outlook profile be selected to AutoConfigure with NetSign. Again, users select the profile from the drop-down list of the Select Profile dialog box and click OK. Publish to GAL If this policy is enabled, the user's certificates are automatically published to the Outlook Global Address List (GAL) when registering certificates. If the Publish to GAL option is selected, both the Auto-register certificates with Outlook and Auto-register Certificates for IE options must be selected. Auto Decrypt If the Auto decrypt policy has been selected, Outlook automatically decrypts incoming e-mail messages. Auto Decrypt may not be appropriate in all circumstances. If e-mail messages are encrypted to secure their contents no matter where they reside, Auto Decrypt is not appropriate. If you use encrypted e-mail because you do not trust the channel over which the e-mail is transmitted and you want to make sure that the recipient is required to open the message, Auto Decrypt may be appropriate. Auto Decrypt works only with Outlook. It does not support Outlook Express or Netscape. Auto Contact If Auto contact policy has been selected, the person who sent a signed e-mail message is automatically added to the user’s address book after reading the message. This gives users the capability of sending an encrypted e-mail message to anyone who has previously sent them a signed e-mail message. Auto Contact works only with Outlook. It does not support Outlook Express or Netscape. 62 Auto Update The Auto Update policy provides a secure method to distribute NetSign patches and updates. The client computer is configured with the location of the server, a polling interval to check for updates, and the trusted certificate that is used to sign the patches. The client is also configured whether the user should be asked/notified before a patch is installed. When a patch is available, the client computer downloads the patch from the server and validates the signature. Once downloaded, the patch will be installed and the client comptuer notifies the server so that a log can be kept of who has received patches. Two files are distributed for NetSign update patches; an executable containing the patch itself and a file named cac-ver.php. Before the patch is placed on the Auto Update Server, the patch must be signed using signcode.exe (from Microsoft). Sign the patch executable with your signing certificate, which is the same as the certificate configured for Auto Update Certificate on the client. For security reasons, it is suggested that a Hardware Security Model (HSM) or at least a smart card be used for signing the patches. After the patch has been signed, place the patch in the Auto Update Server repository, which is in the same location as cac-ver.php. Clients that are configured for Auto Update will automatically download and execute the patches from the Auto Update Server if the patch is newer than the version already installed on their computer. Auto Update policies on the client computer determine update polling.If Auto Update policy is checked on the Policies page, you must verify that the Auto Update Interval, Web Server, and Virtual Directory fields contain values. 63 If these values are not set, the Auto Update properties dialog will open to allow the user to set these values. If you do not wish to set these values, the Auto Update option on the Policies page should be unchecked. Mode Setting Description Auto Update Mode Drop-down list to specify how the update patch will be downloaded and installed on a client computer running NetSign. The choices from the drop-down list are: AUTO Downloads and executes the patch without user intervention. Users see a pop-up message indicating that a patch is being currently installed on their computers. MANUAL Auto Update runs only when the user requests a NetSign update by selecting the Update Now option from the Card Start menu. Auto Update Interval The length (hours) of the interval in which the client computer will poll the server to see if a new patch is available. By default, the patch polling request occurs on the hour. Web Server The DNS name of the web server hosting the Auto Update Server where NetSign patches are located. Virtual Directory The directory on the web server where Auto Update patches reside. The file cac-ver.php file is placed at the following location: http://AutoUpdateWebServerName/AutoUdpateDirectoryOnServer/cac-ver.php Auto Update Certificate This is the certificate or root of the certificate used to sign the patches. The Browse button displays the Open dialog box to navigate to the directory where the certificate file (.cer) is located. PIN Policy PIN policy determines how often users must enter their PIN when accessing applications and how often their PIN must be changed. PIN Cache Mode The local PIN Cache Mode field includes a drop-down list to set the cache mode and the length of a time out period. The drop-down list provides three PIN cache mode options: • PIN Once A PIN has to be entered once for each use of an application. • PIN Always A PIN must be entered each time a secure operation (such as signing) is performed. 64 • PIN Timeout This option allows you to specify a time out period after which the user’s smart card will be logged out. Once the card is logged out, users must re-enter their PIN to continue secure operations. The default time out period is 15 minutes. If you click the Advanced button, the Advanced PIN Policy dialog box provides options to set more granular time out periods. Instead of a single PIN time out for the card, you can set individual PIN time out periods for the ID, signing and encryption certificates. Also, you can set a PIN time out period for a specific application that requires a card. Setting a certificate’s cache time out period to 0 requires the user to enter the PIN each time a secure operation is performed. A time out period of 0 is equivalent to the Always PIN cache option. If there is a difference between a specific certificate time-out period and an application’s time-out period, the shorter time out period takes precedence. For example, if the signing certificate’s time out period is 15 minutes and Outlook’s period is 30 minutes, the user would have to enter the PIN for the shorter signing certificate 15 minute time out period. PIN Change AutoRemind PIN Change AutoRemind prompts users to change their PIN on a periodic basis. If the user does not change their PIN within the specified period, a message appears and requests the PIN be changed. The PIN change dialog box will open. The message reappears whenever a card is inserted into the reader until the user changes the PIN. If the user has never changed the PIN, and PIN Change AutoRemind is turned on, NetSign will not immediately request a PIN change. Rather, NetSign will reset the clock for PIN change. PIN Change AutoRemind does not keep track of which card was last used for the PIN change. Even if multiple cards are used on the same system, only one PIN Change AutoRemind will be displayed for the configured AutoRemind time period. Web Links If these policies are set, alternative URLs to the Litronic feedback and technical support web pages can be specified. Note: Web link policies cannot be set locally. They must be set remotely, or through the Configuration Wizard. 65 66 Chapter 5 SSL and Client Authentication Secure Sockets Layer (SSL) is a standard security technology to establish an encrypted communication link between a web server and a browser. This link ensures the security and integrity of all data sent between the web server and browser. SSL is an industry standard and is used by millions of web sites in the protection of their online transactions with their customers. In order to be able to generate an SSL link, a web server requires an SSL Certificate. When you choose to activate SSL on your web server you will be prompted to complete a number of questions about the identity of your web site (e.g. your web site's URL) and your company (e.g. your company's name and location). Your web server then creates two cryptographic keys - a Private Key and a Public Key. Your Private Key is so called for a reason - it must remain private and secure. The Public Key does not need to be secret and is placed into a Certificate Signing Request (CSR) - a data file also containing your details. You should then submit the CSR during the SSL Certificate application process, the Certification Authority, will validate your details and issue an SSL Certificate containing your details and allowing you to use SSL. Your web server will match your issued SSL Certificate to your Private Key. Your web server will then be able to establish an encrypted link between the web site and the user’s web browser. 67 Generating the Certificate Signing Request You must generate a Certificate Signing Request (CSR) to obtain a certificate. A CSR is basically a certificate that you generate on your server that validates the computer-specific information about your server when you request a certificate from a third-party certificate authority (CA). The CSR is simply a text message that is encrypted with a public/private key pair. Typically, the generated CSR contains the following information: • Common domain name Note: The common name is usually comprised of your host computer name and the domain to which it belongs, such as xyz.com. In this case, the computer is part of the .com domain, and is named XYZ. This may be the root server for your corporate domain, or simply a web site. • Organization • Organizational unit • City or locality • State or province • Country/region You generate a CSR through the IIS management console; IIS must be installed on the server. 1. Access the IIS Microsoft Management Console (MMC). a. Right-click My Computer and click Manage. This opens the Computer Management Console. b. Expand the Services and Application section. c. Locate Internet Information Services and expand the IIS console. 2. Select the specific web site on which you want to install a server certificate. Right-click the site and click Properties. 3. Click the Directory Security tab. In the Secure Communications section, click Server Certificate. This starts the Web Server Certificate Wizard. Click Next. 4. Select Create a New Certificate and click Next. 5. Select Prepare the request now, but send it later and click Next. 6. In the Name field, enter a name. The name defaults to the name of the web site for which you are generating the CSR. Note: When you generate the CSR, you need to specify the bit length of the encryption key. The bit length determines the strength of the encrypted certificate that you send to the third-party CA: the greater the bit length, the stronger the encryption. Most third-party CAs prefer a minimum encryption key length of 1024 bits. 68 7. In the Organization Information section, enter your organization and organizational unit information. This information must be accurate because you are presenting these credentials to a third-party CA and you must comply with their licensing of the certificate. 8. Click Next to access the Your Site's Common Name section. The Your Site's Common Name section is responsible for binding the certificate to your web site. 9. For SSL certificates, enter the host computer name with the domain name. For Intranet servers, you may use the NetBIOS name of the computer that is hosting the site. 10. Click Next to access geographical information. 11. Enter your country, state or province, and country or region information. Completely spell out the name of the state or province and country or region; do not use abbreviations. 12. Click Next. 13. Save the file as a .txt file. When you send the request to the CA, you must paste the contents of this file into the request. This file will be encrypted and contain a header and footer for the contents. You must include both the header and footer when you request the certificate. A CSR should resemble the following: -----BEGIN NEW CERTIFICATE REQUEST----MIIDATCCAmoCAQAwbDEOMAwGA1UEAxMFcGxhbjgxDDAKBgNVBAsTA1BTUzESMBAGA 1UEChMJTWljcm9zb2Z0MRIwEAYDVQQHEwlDaGFybG90dGUxFzAVBgNVBAgTDk5vcn RoIENhcm9saW5hMQswCQYDVQQGEwJVUzCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYk CgYEAtW1koGfdt+EoJbKdxUZ+5vE7TF1ZuT+xaK9jEWHESfw11zoRKrHzHN0fIASn wg3vZ0ACteQy5SiWmFaJeJ4k7YaKUb6chZXG3GqL4YiSKFaLpJX+YRiKMtmIJzFzi ct5GVVGHsa1lY0BDYDO2XOAlstGlHCtENHOKpzdYdANRg0CAwEAAaCCAVMwGgYKKw YBBAGCNw0CAzEMFgo1LjAuMjE5NS4yMDUGCisGAQQBgjcCAQ4xJzAlMA4GA1UdDwE B/wQEAwIE8DATBgNVHSUEDDAKBggrBgEFBQcDATCB/QYKKwYBBAGCNw0CAjGB7jCB 6wIBAR5aAE0AaQBjAHIAbwBzAG8AZgB0ACAAUgBTAEEAIABTAEMAaABhAG4AbgBlA GwAIABDAHIAeQBwAHQAbwBnAHIAYQBwAGgAaQBjACAAUAByAG8AdgBpAGQAZQByA4 GJAGKa0jzBn8fkxScrWsdnU2eUJOMUK5Ms87Q+fjP1/pWN3PJnH7x8MBc5isFCjww 6YnIjD8c3OfYfjkmWc048ZuGoH7ZoD6YNfv/SfAvQmr90eGmKOFFiTD+hl1hM08gu 2oxFU7mCvfTQ/2IbXP7KYFGEqaJ6wn0Z5yLOByPqblQZAAAAAAAAAAAwDQYJKoZIh vcNAQEFBQADgYEAhpzNy+aMNHAmGUXQT6PKxWpaxDSjf4nBmo7oMhfC7CIvR0McCQ +CBuLzD+UJxl+kjgb+qwcOUkGX2PCZ7tOWzcXWNmn/4YHQl0MGEXu0w67sVc2R9Dl sHDNzeXLIOmjUl935qy1uoIR4V5C48YNsF4ejlgjeCFsbCojJb9/2RM= -----END NEW CERTIFICATE REQUEST----- 14. Confirm your request details. Click Next to finish, and exit the Web Server Certificate Wizard. 69 Requesting the Certificate There are different methods of submitting a certificate request. Contact the certificate provider of your choice to request and receive your certificate and to determine the best certificate level for your needs. Installing the Certificate Once the third-party CA has completed your request for a server certificate, you will receive it by e-mail or download site. The certificate must be installed on the web site on which you want to provide secure communications. The key can be decrypted only with the private key that you generated earlier. 1. Copy the text of the certificate key (it should appear to be very similar to the key you generated earlier) and paste it into a .txt document. Be sure to include the header and footers of the certificate. 2. Save the file as Cert.txt. 3. Open the IIS MMC as described in the “Generating the CSR” section. 4. Access the Properties dialog box for the web site on which you are installing the certificate. 5. Click the Directory Security tab and click Server Certificate. This starts the Web Server Certificate Wizard. 6. Click Next. 7. Select Process the Pending Request and install the certificate and click Next. 8. Browse to the text file that you saved in step 1. 9. Click Next twice. 10. Click Finish. 70 Enforcing SSL Connections Now that the server certificate is installed, you can enforce SSL secure channel communications with clients of the web server. First, you need to enable port 443 for secure communications with the Web site. To enable secure communications with the Web site 1. From the Computer Management console, right-click the web site on which you want to enforce SSL and click Properties. 2. Click the Web Site tab. In the Web Site Identification area, verify the SSL Port option contains the value 443. 3. Click Advanced. The IP address and port of the web site should already be listed in the Multiple identities for this Web Site option. 4. Under the Multiple SSL Identities for this web site option, click Add if port 443 is not already listed. 5. Select the server's IP address and enter 443 in the SSL Port box. 6. Click OK. To enforce SSL connections 1. Click the Directory Security tab. In the Secure Communications section, note that Edit is now available. 2. Click Edit. 3. Select Require Secure Channel (SSL). Note: If you specify 128-bit encryption, clients who use 40-bit or 56-bit strength browser will not be able to communicate with your site unless they upgrade their encryption strength. 4. Open your browser and try to connect to your Web server by using the standard http:// protocol. If SSL is being enforced, the following error message will be displayed: The page must be viewed over a secure channel The page you are trying to view requires the use of "https" in the address. Please try the following: Try again by typing https:// at the beginning of the address you are attempting to reach. HTTP 403.4 - Forbidden: SSL required Internet Information Services Technical Information (for support personnel) Background: This error indicates that the page you are trying to access is secured with Secure Sockets Layer (SSL). You can now connect to your web site only by using the secure https:// protocol. 71 Enabling Client Certificate Authentication 1. Start Internet Information Services Manager. Start > Programs > Administrative tools > Internet Services Manager 2. Access your web site properties by right clicking on the web site you wish to configure. 3. Click on the Directory Security tab. 4. Click Edit within the Secure communications section. 5. Check the Require client certificates option within the Client certificates section. 6. Click OK. 72 Modifying the Registry to Restrict Trusted Certification Authorities If you use Registry Editor incorrectly, you may cause serious problems that may require you to reinstall your operating system. Use the Registry Editor carefully. All trusted CA certificates are handled by Schannel.dll file, which stores its data in the registry. In the registry, you see a series of registry keys under the Certification Authorities key. There is one key for each pre installed CA. Each CA key contains an Enabled entry. This entry is set to 0x1 if the CA is trusted, or is set to 0x0 if the CA is not trusted. Note: Do not delete these registry entries. If you do, Schannel automatically recreates them. 1. Start Registry Editor (Regedt32.exe). 2. Locate the following registry key: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\ SCHANNEL\CertificationAuthorities You should see a list of all of the trusted CAs on the computer. 3. Click the CA that you do not want to trust. 4. Select the Enabled sub key and set its value to 0 (zero). 5. Repeat these steps to make unavailable all CA certificates that you do not want to trust. 6. Restart the computer. 73 Useful links • Microsoft Knowledge Base Article – 298805 HOW TO: Enable SSL for All Customers Who Interact with Your Web Site in Internet Information Services http://support.microsoft.com/default.aspx?scid=kb;en-us;Q298805&sd=tech • Microsoft IIS Authentication http://msdn.microsoft.com/library/default.asp?url=/library/en-us/vsent7/html/vxconIISAuthentication.asp • Microsoft Knowledge Base Article – 21645 HOW TO: Limit the Number of Trusted Certification Authorities in IIS http://support.microsoft.com/default.aspx?scid=kb;en-us;Q216485 74 Chapter 6 Using NetSign with Citrix NetSign for Citrix works much the same as NetSign for Windows, with the capacity to work with up to 25 concurrent Citrix sessions and with users logged on to multiple concurrent Citrix sessions. NetSign for Citrix supports cryptographic logon to Citrix through the Citrix Secure Gateway. This chapter gives an overview of the tasks to prepare NetSign to work with Citrix. It does not discuss specific Citrix configuration procedures in detail. Refer to Citrix documentation for information about setting up its servers and clients. Desktop View vs. Application View The application view of Citrix is available through the Citrix Desktop or through the Web Client (Web Interface). Many of NetSign’s functions operate through the Card Start Application. In order for them to work, the CardStart application must be published by registering the application using the NetSign Configuration Wizard or the scconfig.exe command. The following NetSign functions operate through the CardStart Application: • Action to perform when a smart card is inserted • Action to perform when a smart card is removed • Certificate registration • Auto-register certificates for IE • Auto Unreg on logoff • Auto Unreg on remove • Outlook AutoConfigure • Auto-register Certificates with Outlook • Publish to GAL • Auto Update • PIN Change AutoRemind Citrix Products Supported by NetSign NetSign can operate under the Citrix MetaFrame® Access Suite to authenticate users to applications hosted in a Citrix environment. NetSign Version 5.5 can operate with the following Citrix products: • Citrix Metaframe XP Presentation Server FR3 • Citrix ICA Client 7.0 • Citrix ICA Client 8.0 75 Initial Preparation This section describes the initial environment that must be prepared for NetSign to provide smart card logon support for Citrix. It does not discuss Citrix-specific installation or configuration procedures in detail. Instead, it gives an overview of the tasks to enable NetSign to work in a Citrix environment. There are three main procedures to provide NetSign support for Citrix: • Set up a domain controller for smart card logon • Set up a Citrix server on a Windows 2000/2003 server with Terminal Services running • Set up the user’s computer with NetSign, the Citrix client and a card reader These instructions are provided for a Citrix system with Citrix installed on both the server and the client(s). Install NetSign on the server. From the Citrix server, prepare the client so NetSign appears as the only application when the connection to the server is made. NetSign 5.5 executes on the server. Like other applications, NetSign must be registered to Citrix. Configure Windows Domain Controller for Smart Card Logon 1. Prepare a server to run on Windows Server 2003 Enterprise Edition as a domain controller. 2. Install an issuance CA. 3. Verify the CA certificate is in the trust root. 4. Verify that the card certificate is valid by using the following command: certutil -scinfo 5. If the certificate revoke list is not obtainable, import the revoke list by clicking on the crl file that is exported from the CA and click Install from the certificate window. 6. Import a CA certificate to the certificate store using the command: certutil -dspublish -f filename NTAuthCA 7. Add users to the Active Directory. 8. Display the contents of the user certificate with the NetSign Card Browser function. 9. Verify the certificate is intended for Smart Card Logon. Using Card Browser Detail, identify the user login name by looking at the Subject Alternative Name-> Principal Name field. 10. From Programs->Administrator tools->Active Directory Users and Computers right click on user and select New. This brings up the Add user dialog box. 11. Enter the user name and login name in the appropriate fields. 12. Use adsiedit.msc (installed from the support tools) to edit the new Active Directory user. 13. Change userPrincipalName to match the value in the certificate's Principal Name field. 76 Citrix Server Configuration Tasks This section outlines the steps to prepare a Citrix server to support either a standard Citrix web-based client or the Citrix Desktop client. Citrix Server Configuration for the Web-based Citrix Client 1. Install Citrix XPe and accept installation defaults. 2. Select a name for the Citrix farm you intend to use for NetSign users. 3. Log on to the management console. 4. Set up Licenses by right-clicking on the Licenses and then selecting Add Licenses from the menu. 5. Publish applications. a. Right-click Applications. b. Select the Publish Application option. c. Assign the applications by name. 6. Select application and command line. 7. Add the Citrix server by completing the remainder of the Wizard dialog. 8. Select the appropriate permissions through the Active Directory for the domain. 9. Go to the web interface http://<servername>/Citrix/MetaFrameXP/WIAdmin/. 10. Select Authentication > Select smart card > Save. 11. Add the Citrix farm. a. Select Manage Farms. b. Enter the name of the farm hosting the web interface. c. Click Add and Save. 12. Select the link to the Citrix Metaframe server. a. Enter the name of the server hosting the web interface for the farm. b. Select HTTPS. c. Click Save. 13. Configure IIS to accept secure communications. a. Right click IIS server > Properties. b. Click Edit. c. Select Directory Security. d. Check the box to enable the Windows Directory Service Mapper. e. Click OK. 77 14. Create a certificate request. a. Right click default web site > Properties > directory security > Server Certificate. b. Click Next. c. Create a new certificate. d. Prepare the request, but do not submit it yet. e. Click Next and enter the certificate name. f. Assign a common name to the certificate and click Next. g. Complete geographical information and click Next. h. Enter the file name and click Next. i. Click Finish. 15. Issue a root certificate through a CA and install it. 16. Verify the certificate is listed in the Directory Security tab within the Secure Communications dialog box. 17. Install a card reader and software drivers on the Citrix server. 18. Install Netsign on the Citrix server. 78 Citrix Server Configuration for the Citrix Desktop Client This section outlines the steps to prepare a Citrix server to support the Citrix Desktop client. 1. Install Citrix XPe and accept installation defaults. 2. Select a name for the Citrix farm you intend to use for NetSign users. 3. Log on to the Citrix management console. 4. Set up licenses by right-clicking on Licenses and then selecting Add Licenses from the menu. 5. Publish applications by completing the sequence: a. Right click on Applications. b. Select Publish Application from the menu. c. Assign a name to the application. 6. Select application and command line. 7. Add the Citrix server by completing the remainder of the Wizard dialog. 8. Select appropriate permissions through the Active Directory of the domain. 9. Install a card reader and software drivers on the Citrix server. 10. Install NetSign on the Citrix server. 79 Client Computer Configuration Tasks 1. Verify the client computer is running on Windows 2000 or Windows XP Professional. 2. Install a smart card reader and its software driver on the client computer. 3. Install NetSign Version 5.5 on the client computer. 4. If necessary, join the client computer to a domain accessible by the Citrix Server. 5. Install the Citrix client and configure it for a smart card logon. 6. Install an issuance CA root certificate chain on the client computer. Note: In order for Netscape to function properly, root and intermediate certificates for the DoD must be registered. Crypto module for PKCS 11 library must be configured for Netscape. During a Windows installation, this is performed by the installation procedure. For Citrix, the registration must be performed manually on the client by running nsreg.exe at least once. The nsreg.exe file is located in the home directory of the NetSign product CD. 7. Verify the CA certificate chain. 8. Register all applications that interface with the smart card reader. This can be accomplished by two methods: • Applications can be added by the NetSign Configuration Wizard. Refer to “ Citrix Server Dialog Box” on page 20 to register hosted applications that run on a Citrix server and are secured with a smart card. By default, the following applications are registered to Citrix when NetSign is installed: CrdStart.exe: NetSign card start function IEXPLORE.EXE: Internet Explorer web browser netscape.exe: Netscape web browse NetSign.exe: NetSign smart card middleware OUTLOOK.EXE: Outlook e-mail application pinChange.exe: NetSign smart card PIN change dialog psm.exe: Netscape Personal Security Manager • The application can be added using the scconfig command. To use the scconfig command to register applications, enter the following text at the command line. Substitute the name of the application’s executable file that is to be registered. C:\scconfig /farm /enable_process:application_command.exe The majority of applications can be added using the NetSign Configuration Wizard and new applications can be added later using the scconfig command. 80 How NetSign for Citrix is Different Since Citrix enterprise access infrastructure software works differently from Windows, some NetSign components may function differently. Some of these functional differences are described below: Card Insertion - Windows 2000 When running Windows 2000 with the Citrix enterprise access infrastructure software, the option to launch the browser when the smart card is inserted into the smart card reader may not function as desired. The option to launch an application and the option to launch your e-mail program continue to work properly. Card Removal - Windows 2000 When running Windows 2000 with the Citrix enterprise access infrastructure software, the option to log off Windows when the smart card is removed from the smart card reader may not function as desired. The option to close an application and the option to lock workstation continue to work properly. Windows 2000 Netscape Profile Creation If a Citrix server is configured with Windows 2000 and the Netscape application is running, it is necessary to create a Netscape user profile before installing NetSign on the Citrix client. Failure to create the profile prior to installing NetSign may cause unknown problems with NsReg, modutil, and certutil. Certificate Registration in Netscape When running Netscape with Citrix, certificates are not automatically registered for the browser. To register certificates manually, Nsreg.exe must be executed on the client. Certificate Registration - CardStart If security policies for the Citrix server require an application be published standalone without the desktop view, NetSign’s tools for automatic configuration will not be executed. Certificate and Outlook configuration will not function. If you wish to use CSP based applications like Outlook or Internet Explorer from the Citrix server, certificates from the smart card must be registered first. If the desktop view is not available to register certificates, they can be published using the CardStart application. CrdStart.exe is located in the system32 directory. Although it is strongly suggested that you run applications that use a smart card through a desktop view, sometimes security policy for the Citrix server requires that application be published standalone without an available desktop view. When applications are run standalone, NetSign’s tools for automatic configuration are not run. Therefore, certificate registration and Outlook configuration will not work. In order to use CSP-based applications (such as Outlook or Internet Explorer) from the Citrix server, certificates from the smart card must be registered first. If desktop view is not an option to register certificates, you can publish the CardStart application (CrdStart.exe located in the system32 directory). 81 Launch Browser When launching a browser by inserting a card into the reader, a URL must be specified in the Policies. If no URL is specified, NetSign does not automatically launch a browser session. CardStart in Desktop View When a user is finished working on Citrix in the desktop view, it is critical to log off Citrix rather than disconnecting from Citrix. If a user disconnects from Citrix instead of properly logging off, the CardStart application will not function when they resume working with the desktop view. Properly logging on and logging off Citrix will ensure that CardStart continues to function correctly. If a user inadvertently disconnects from Citrix, an administrator can manually log off the end user by using the Management Console for the Citrix Server. The Management Console will show the client as disconnected; the administrator can then log off the user. The next time the user logs in, CardStart will function properly. Auto Unreg on Log off Selecting the Auto Unreg on Log off option from the Certificate registration box of the Policies Tab only works when CardStart is running. If CardStart is not running, logging off from the Main desktop will not remove certificates from the Microsoft Certificate Store. This is a function of the Citrix software, since Citrix does not really log off when the smart card is removed from the reader. CardStart Required to Implement Policy Changes When a change is made to the NetSign policies set on the Citrix Server, CardStart must be run in order for the changes to apply to any stand alone applications executed on the client. Changes to the policies will also be applied if CardStart is running in the background on the desktop view. Saving Diagnostic Information from System Info Tab (Application View Only) If you save the diagnostic information detected by the System Info tab, the file will be saved in the desired location, but NetSign will shut down. Restarting NetSign is required. Internet Browser Fails to Close when Card is Removed If the policy settings of the Citrix server are set to launch a URL when a smart card is inserted into the card reader and close the application when the smart card is removed, the policies are not properly transferred to the client. When the Citrix client is in the desktop view mode, the client’s Internet browser will launch when the card is inserted, but the applications will not close when the smart card is removed. 82 Chapter 7 Using NetSign with Outlook Web Access This chapter discusses how to configure NetSign to work with the Exchange Server 2003 version of Microsoft Outlook Web Access (OWA) to permit users to digitally sign and encrypt e-mail messages by using the new OWA Secure/Multipurpose Internet Mail Extension (S/MIME) control. The S/MIME control works in conjunction with certificates placed on the user’s smart card to enable signing and encryption of e-mail messages. This chapter does not discuss how to install Exchange Server 2003 or set up user accounts. These tasks should be completed before attempting the configuration procedures discussed in this chapter. If necessary, refer to Microsoft Exchange Server documentation to complete the preliminary tasks before attempting the procedures described in this chapter. This chapter describes only those specific requirements to configure Outlook Web Access for use with NetSign. Support for smart cards in Outlook Web Access with the S/MIME control is provided by the Windows operating system on which the client is running. Windows 2000 or XP integrate smart cards into their certificate handling capabilities so that Outlook Web Access does not need to handle or manage these certificates. Outlook Web Access with the S/MIME control monitors the smart card for any changes and instructs the operating system when to move additional digital certificates from the smart card into the Personal certificate store. Windows removes these certificates when the user logs off from Outlook Web Access. Smart cards make digital certificates available by copying the certificate into the Personal certificate store when a smart card is inserted and the digital certificate is unlocked with the user's private key. This places the digital certificate in the same location as when software-based certificates are used. Applications do not need to take any special actions to use smart card-based digital certificates, because the Windows operating system handles all operations specific to smart card-based certificates. 83 Configuring Exchange Server 2003 for OWA The users' Exchange servers must be configured to support Outlook Web Access with the S/MIME control. The configuration enables handling and validation of digital certificates. Specifically, the user's Exchange server must have appropriate root certificates present in the local computer account's Personal certificate store, and must be able to access and retrieve information that PKIs make available for certificate validation. The user's client system handles digital certificates related to the user's private key, and the user's Exchange server handles digital certificates related to other users' public keys as well as validates digital certificates related to both public keys. To access the information that PKIs make available for certificate validation, ensure that when users' Exchange servers are behind a firewall, these servers can connect through the firewall using the appropriate protocols (generally, HTTP or LDAP). Consult with the PKI administrator to determine what configuration is necessary to support certificate validation on the client system and consult with the firewall administrator to implement the appropriate changes. Note When using Windows Server 2003, you can use the Proxycfg.exe utility to configure the built-in HTTP proxy client instead of installing a proxy client. However, this proxy does not support LDAP. If you need to access certificate validation information through LDAP, you will need to install firewall clients that support LDAP. For more information about using and configuring the Windows Server 2003 proxy client, see the online Help with Proxycfg.exe. After you install the S/MIME control on the users' client systems and ensure that the client systems and the Exchange servers are configured to support the handling and validation of digital certificates, you can then work with the PKI administrator to integrate Outlook Web Access with the S/MIME control with the smart card. Setting Exchange Server to Use Only Smart Card Certificates When choosing a digital certificate to obtain the user's private key, Outlook Web Access with the S/MIME control looks in the Personal certificate store of the current logged on user. Outlook Web Access with the S/MIME control searches through the available certificates in the certificate store until it finds a valid digital certificate for the operation requested. Outlook Web Access with the S/MIME control always uses hardware-based digital certificates, including smart cards, if both a software-based certificate and a hardware-based certificate are located. If the SmartCardOnly value has been set on the user's Exchange server, only digital certificates propagated from smart cards will be examined. You can configure Outlook Web Access with the S/MIME control to require only smart card-based certificates, using the SmartCardOnly registry setting on the Exchange Server. By default, this setting is not enabled. When SmartCardOnly is set to true (1), this key restricts the S/MIME control to use only smart card-based certificates for signing and decrypting e-mail messages with OWA. Users cannot use certificates that are not on a smart card. 84 Configuring OWA on User Computers This section describes how to deploy the S/MIME control to user computers and set Active X security settings through Internet Explorer. User Requirements User computers must meet the following requirements to encrypt and sign e-mail messages distributed by Outlook Web Access. The appropriate certificates placed on the user’s smart card are used by the S/MIME control to sign and encrypt messages. • User computers are running on either Microsoft Windows 2000 or Windows XP. • User computers are running Microsoft Internet Explorer Version 6 or later. • User computers have an attached card reader. • Users computers have NetSign Version 5.5 installed. • Users have been issued a smart card with valid certificates to send or receive signed and encrypted e-mail messages. • Users have been assigned a user name and password to log on to Outlook Web Access. • Users know the web address of the server that is hosting Outlook Web Access. • The latest version of the Outlook Web Access S/MIME control has been installed on user computers. Deploying the OWA S/MIME Control To use Outlook Web Access with the S/MIME control, the user’s computer must have the Outlook Web Access S/MIME control installed. After the S/MIME control is installed on a computer, it is available to all users, including those who do not have administrator rights. There are three deployment options to download and then install the S/MIME control on user computers: • Users download and install the S/MIME control on their computers. Users must be logged on to their computers with Windows administrator privileges to install the S/MIME control. Errors occur if the user attempts to install the S/MIME control without administrator privileges. Refer to “ Installing the S/MIME Control on a Computer” on page 86 for the user procedure to install the S/MIME control on a computer. • Integrate the S/MIME control into a pre-configured desktop image. Integrating the S/MIME control into a standardized image is a solution for those organizations that are already using this strategy for managing desktop configurations. • Deploy the S/MIME control setup package using SMS or other enterprise software management systems. Organizations that do not use a desktop image but want to deploy the S/MIME control to users without administrator privileges should deploy S/MIME control setup using their organization's enterprise software management system. In Exchange Server 2003 SP1, the S/MIME control setup program is a Microsoft Installer (MSI) file contained in a self-extracting executable file. The MSI file allows customers to deploy the S/MIME control to the desktop with enterprise software management systems like SMS. The setup package is named Setupmcl.exe and is located in the following directory when Exchange 2003 SP1 is installed (where version is the build number for SP1): drive:\program files\exchsrvr\exchweb\version\cabs\setupmcl.exe 85 Installing the S/MIME Control on a Computer This procedure explains how users can download and then install the OWA S/MIME control if they have Windows administrator authority. You must use alternative methods to deploy the S/MIME control if your organization’s user community do not have Windows administrator privileges on their computers. 1. Log on to the computer with a Windows administrator user account. 2. Open Internet Explorer and enter the URL to Outlook Web Access. 3. Log on to Outlook Web Access. 4. Click Options in the OWA Navigation pane. If the Navigation Pane is collapsed, click the Go to options button. 5. Scroll down the Options page until you locate the E-Mail Security section of the page. 6. Click Download. If any security warnings appear, click Yes for the control to download and install. The S/MIME control is downloaded from the Exchange server to the local computer and then installed. Note: Many companies use URLScan on the front-end HTTP servers for Outlook Web Access. URLScan monitors URLs and allows customers to block specific file types, such as .exe and .vbs files, from being downloaded to the Outlook Web Access client. If you use URLScan or similar software to protect the Outlook Web Access client, and you want to make the S/MIME control available from outside your corporate firewall, you will need to allow executable (.exe) file types to pass through URLScan and the firewall. 7. Under E-mail Security, click to select the Encrypt contents and attachments for outgoing messages check box if you want encryption enabled by default when you compose a message. 8. Under E-mail Security, click to select the option that messages should be digitally signed by the sender. Setting Up IE Active X Security to Support the S/MIME Control For the S/MIME control to operate properly, the Internet Explorer zone to which the user is connecting for Outlook Web Access must have the following Active X security settings: • Set the Download signed ActiveX controls value to Prompt or Enable. • Set the Run ActiveX controls and plug-ins value to Enable (or Administrator approved with the S/MIME control as an approved control). • Set the Script ActiveX controls marked as safe for scripting value to Enabled. By default, these Internet Explorer settings are enabled in the Internet and intranet zones. 86 OWA Problems with Windows XP Service Pack 2 This section describes a specific problem that can occur when using NetSign with an OWA client. This problem occurs when NetSign and the OWA client are installed on a computer running Microsoft Windows XP Service Pack 2 (SP2). The cause of the problem lies with Microsoft Exchange Server 2003 and Windows XP Service Pack 2. NetSign is not involved. This section is included because the problem routinely occurs when preparing NetSign for use with OWA. Problem When you use Microsoft Exchange Server 2003 to host Microsoft Outlook Web Access, the Secure/Multipurpose Internet Mail Extension (S/MIME) control does not load after you download and install it on a client computer running Windows XP with Service Pack 2 applied. Symptoms The symptoms of the problem are: • If you click Options in the left pane, the E-mail Security area of the OWA Options page indicates that the S/MIME control is not installed. Only the Download button is available. You expect to see the Encrypt contents and attachments for outgoing messages check box and the Add a digital signature to outgoing messages check box. • When you compose a new e-mail message, you experience the following symptoms:• If you click Options, the E-mail Security section does not appear. You expect to see the Encrypt message contents and attachments and Add a digital signature to this message check boxes. • The Encrypt message contents and attachments and Add a digital signature to this message buttons do not appear on the toolbar of the page to compose e-mail messages. • You cannot drag attachments to a Compose Message form. Cause The Exchange Server 2003 OWA client uses a function call to determine whether the S/MIME control is installed on the client computer. As part of its base security, Windows XP SP2 restricts the components that are supported by this function call. Therefore, OWA cannot detect that the S/MIME component is installed. Solution Microsoft provides a solution for the problem. Refer to the following Microsoft Knowledge base article: http://support.microsoft.com/default.aspx?scid=kb;en-us;883543 The article includes a link to download a file. The file should be installed on the Microsoft Exchange Server 2003 that hosts OWA. 87 88 Appendix A Uninstall NetSign This appendix describes various methods to uninstall Version 5.5 of NetSign. The table below summarizes the uninstall methods and provides a reference to a section within the appendix that describes the procedure in detail. Uninstall Method Description Local Use the local method to uninstall NetSign on a single computer with the Windows Add/Remove facility. See “ Local Uninstall” on page 91. Silent Use the silent method to uninstall NetSign on a single computer without requiring user interaction. See “ Silent Uninstall Without User Interaction” on page 92. Active Directory push Use the Active Directory push method to uninstall NetSign on multiple computers running Windows 2000 or Windows XP. See “ Push Uninstall with Active Directory” on page 93. Note: You must have previously installed NetSign with the Active Directory push method to remove it from the same computers. Systems Management Use the SMS method to uninstall NetSign on multiple computers running any Server (SMS) push Windows operating system. See “ Push Uninstall with SMS” on page 95. Note: You must have previously installed NetSign with the SMS push method to remove it from the same computers. 89 Uninstallation Considerations This section describes general information that must be considered before removing NetSign from computers. • NetSign must be removed with the same user privileges that were originally used for the installation. If NetSign was installed by a domain administrator, it should be removed by a user logged in as a domain administrator. Attempting to remove NetSign with the Windows Add Remove facility will fail if you have logged in as a general user when NetSign was originally installed under domain administrator control. • Uninstalling NetSign removes most files and registry keys from the computer on which it was installed. Testing has shown the following files and registry keys may remain on a computer after NetSign has been removed: Files • ..\Program Files\Common Files\InstallShield\Driver\1050\Intel 32 This directory contains files left behind by the Install Shield script engine, which is a commercial software product used to create the NetSign installation package. _ISRES1033.dll ID IDriver2.exe IDriver.exe IDriverT.exe iGdiCnv.dll ISRT.dll IUserCnv.dll objpscnv.dll IScrCnv.dll • ..\Windows\system32\capicom.dll This is a shared file used by other applications, which has corresponding registry entries. Registry Keys • HKEY_CURRENT_USER\SOFTWARE\GSC\Policies\PIN\Authentication\(Default) • HKEY_CURRENT_USER\SOFTWARE\SSP Solutions\CAC\CACHE\ • HKEY_CURRENT_USER\SOFTWARE\SSP Solutions\CardStart\(Default) 90 Local Uninstall This procedure explains how to remove NetSign Version 5.5. from a single computer with the Windows Add/Remove facility. Refer to the push uninstall methods later in this appendix if you want to remove NetSign simultaneously from multiple computers. 1. Log on with an administrator user account to the computer in which you want to remove NetSign. 2. Open the Windows Add or Remove Programs facility. Start > Settings > Control Panel > Add or Remove Programs 3. Select NetSign from the list shown in the dialog box. 4. Click Remove. 5. Click Yes from the pop-up menu that verifies that you want to remove NetSign. The uninstaller program removes NetSign from the computer. After NetSign has been uninstalled, a pop-up menu requests that you restart the computer. 6. Click Yes to restart the computer. The CardStart icon should no longer appear in the computer’s system tray after the computer has been shut down and restarted. 91 Silent Uninstall Without User Interaction The silent method removes NetSign from a single computer without requiring user interaction. No dialog boxes appear on the screen that indicates that NetSign has been removed. Nor does the uninstaller program indicate when the uninstaller procedure has finished. The silent installation method is invoked from the Windows command line. It uses the same msiexec command syntax that was originally used to install NetSign by the silent method. The /X parameter in the command string uninstalls a product. The silent uninstallation method is invoked from the Windows command line. You must enter three separate msiexec.exe commands to uninstall NetSign. 1. Log on with an administrator user account to the computer in which you want to remove NetSign. 2. Place the NetSign product CD into the computer’s CD drive if it was originally used to install NetSign. Alternatively, you can use the NetSign CD image placed on an accessible network disk. 3. Open a command window on the computer. Start > Run > cmd 4. Enter the commands below in the order that they are listed. C:\> msiexec /qn /x Z:\NetSign.msi C:\> msiexec /qn /x Z:\NetSignConfig.msi C:\> msiexec /qn /x Z:\ISScript1050.msi Notes: • In the examples above, Z: is the drive letter of the computer’s CD drive where the NetSign product CD has been inserted. Or, specify the network path to the directory where the NetSign CD image has been placed. • You must enclose the directory string within quotes (“) if the path to the ISScript1050.msi, NetSign.msi and NetSignConfig.msi files contains a blank space. C:\> msiexec /qn /x "V:\App Server\NETSIGN\NetSign.msi" • Remove the /qn parameter from the command string if you prefer to uninstall NetSign with dialog prompts. 5. Press Enter. It takes approximately 30-40 seconds to remove NetSign. The CardStart icon should no longer appear in the computer’s system tray when the uninstall procedure has finished. 92 Push Uninstall with Active Directory The procedure to remove NetSign from computers by the Active Directory push method uses similar steps to the installation procedure. The uninstall procedure removes the three Active Directory packages that were used to originally install NetSign. This procedure explains the steps to remove the ISScript1050, NetSignConfig and NetSign packages from the Active Directory OU containing the computers in which NetSign has been installed. 1. Open Active Directory Users and Groups. Start > Settings > Control Panel > Administrative Tools > Active Directory Users and Groups 2. Right-click the OU that contains the computers in which NetSign has been installed. 3. Select Properties from the menu. The domain_name Properties dialog box opens on the screen. 4. Click on the Group Policy tab. 5. Select the policy and click Edit. 6. The Group Policy Object Editor dialog box appears on the screen. 7. Expand Software Settings and right-click on Software Installation. 8. Right click on NetSign.msi and choose All Tasks > Remove. 93 The Remove Software dialog box appears on the screen. 9. Accept the default software removal method to immediately uninstall NetSign and click OK. 10. Repeat steps 8-9 to remove the NetSignConfig.msi package. 11. Repeat steps 8-9 to remove the ISScript1050.msi package. 12. Click OK to accept the changes to the OU’s group policy. 13. Exit from Active Directory. 14. Reboot all computers that have NetSign installed. NetSign is removed from all computers that belong to the Active Directory OU after they have been restarted. NetSign’s CardStart icon should no longer appear in the computer’s system tray. 94 Push Uninstall with SMS By default, Windows Installer creates a registry key for automatically adding and removing applications. Unless you use the ARPNOREMOVE Windows Installer property, any application installed by Windows Installer will be registered in Add/Remove Programs in Control Panel. This allows the application to be automatically removed using the SMS program removal feature. To use the automatic program removal functionality with SMS, configure the following program settings in the Program Properties dialog box. To configure SMS 2.0 to perform a restart: 1. Open the Program Properties dialog box. 2. On the Advanced tab, select the Remove software when it is no longer advertised check box. 3. In the Uninstall registry key edit box, enter the package code. Note: These instructions require you to know the package code. The package code is stored as a property in the summary information of a Windows Installer package. You can determine the package code by using the MSIINFO.exe tool that is included with the Windows Installer SDK to display the properties in the summary information. Uninstalling software follows closely the same steps to install the original software on computers. Refer to Chapter 3 for the complete SMS procedure to install NetSign. Important: This procedure summarizes the major steps to remove NetSign from computers that were originally installed using SMS. Local site practices may vary. The following procedure describes the major steps. SMS administrators should be familiar with the process of removing software from their user environment. 95 Step 1: Obtain the NetSign Program GUID This step explains how to obtain the Global Unique Identifier (GUID) for NetSign that must be entered as a parameter in the programs for the SMS uninstallation package. 1. Log on to a computer that has NetSign installed. 2. Using regedit, navigate to: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall 3. Copy the GUID number listed for the NetSign installation package. A GUID is enclosed within parentheses and consists of a hex number string. {F1530A8A-A7FA-4750-A0E9-6E777EF17F16} 4. Save the GUID to a file so that you will be able to paste it later in “Step 4: Create Programs for the Uninstallation Package. 96 Step 2: Create an Uninstall Package 1. Log on to the computer that has the SMS administrator console installed with an account authorized to use SMS. 2. Select Start > Programs > System Management Server > SMS Administrator Console. The SMS Administrator Console appears on the screen. 3. Right-click the Packages folder and select New > Package. The Package Properties dialog box appears on the screen. 4. Complete the form, then click the Data Source tab. 5. Select This package contains source files option. 6. Click Set to locate and select the directory in which your data files are stored. The Set Source Directory dialog box appears on the screen. 97 7. Select Network path from the Source directory location field. 8. Click Browse and navigate to the directory where the NetSign installation package has been placed. 9. Click OK to select the NetSign installation package. The Package Properties dialog box refreshes and displays the directory path to the NetSign installation package. 10. Click OK. The NetSign uninstallation package has been created. 98 Step 3: Set up Uninstallation Package Distribution Points 1. Click on plus sign (+) of the NetSign uninstallation package in the left pane of the SMS dialog box to expand options beneath it. 2. Right click on Distribution Points and select New > Distribution Points from the menu. The New Distribution Points Wizard dialog box appears on the screen. 3. Click Next. The Copy Package dialog box opens with a field to select the distribution points for the package. 4. Place a check mark next to names of the distribution points for the NetSign uninstallation package you created earlier. 5. Click Finish. 99 Step 4: Create Programs for the Uninstallation Package This step explains how to prepare the three NetSign installation files for an SMS uninstallation package. You will add three files to the NetSign installation package and set up the program dependencies to run them in order: a.NetSign.msi b.NetSignConfig.msi c.ISScript1050.msi 1. Right-click on the Programs folder and select New > Programs from the menu. The Program Properties dialog box appears on the screen. 2. Assign a name to the program to identify it as the NetSign.msi file. 3. In the Command line field enter: msiexec /x {F1530A8A-A7FA-4750-A0E9-6E777EF17F16} where the number enclosed in parentheses is the GUID that you copied in the previous step. 4. Click the Advanced tab. 100 5. Select the Remove software when it is no longer advertised option and place the GUID in the Uninstall registry key field. 6. Click OK. 7. Verify the program has been added to the NetSign installation package. 8. Right-click on the Programs folder and select New > Programs from the menu. 9. The Program Properties dialog box appears on the screen. 10. Assign a name to the NetSignConfig.msi file. 11. In the Command line field, enter cmd.exe /c {F1530A8A-A7FA-4750-A0E9-6E777EF17F16} uninstall where the number enclosed in parentheses is the GUID that you copied in the previous step. 12. Click the Advanced tab. 13. Select the Run another program first and set up the NetSignConfig.msi file to run after the NetSign.msi program created earlier in this step. 14. Repeat steps 8-13 for the ISScript1050.msi file. Make sure that ISScript1050.msi is the last program to run in the uninstallation package. 15. Click OK. You should see the three uninstallation programs listed in the NetSign uninstallation package. 101 Step 5: Advertise the Uninstallation Package 1. Select Advertisements from the SMS console. 2. Locate the original NetSign installation package. 3. Delete the NetSign installation package. 4. Right-click Advertisements and select Distribute Software. The Distribute Software Wizard appears on your screen. 5. Select the Distribute an existing package option and select the NetSign uninstallation package. 102 6. Click Next. The Advertise a Program dialog box opens on the screen. 7. Select the program assigned to the NetSign.msi file. The other programs will run automatically because of their run order linkage to NetSign.msi in the package. 8. Click Next. 9. Distribute the uninstallation package according to your site’s standards. All NetSign files and registry keys should be removed from the computers after the uninstallation package runs to completion. 103 104 Appendix B NetSign Installation Changes This appendix describes the changes to a computer after NetSign has been installed. It includes separate sections that list the NetSign files that are added to the computer and changes to the Windows registry. Files Added to the Computer by a NetSign Installation Files Target Directory AdvCryptos.dll Install_dir\Windows\System32 CACCSP.dll Install_dir\Windows\System32 caccsp.sig Install_dir\Windows\System32 core32.dll Install_dir\Windows\System32 crm.dll Install_dir\Windows\System32 Nsicleaner.exe Install_dir\Windows\System32 Nsicmdrmdir.exe Install_dir\Windows\System32 Nsiremove.reg Install_dir\Windows\System32 Nsiremove.cmd Install_dir\Windows\System32 SSPBSI.dll Install_dir\Windows\System32 SSPCertReg.dll Install_dir\Windows\System32 SSPMapi.dll Install_dir\Windows\System32 capicom.dll Install_dir\Windows\System32 cac.ckm Install_dir\Program Files\Common Files\Litronic\CKR LitPCSC.ckr Install_dir\Program Files\Common Files\Litronic\CKR CrdStart.exe Install_dir\Litronic\NetSign certutil.exe Install_dir\Litronic\NetSign dm-cacv1.ini Install_dir\Litronic\NetSign dm-cacv2.ini Install_dir\Litronic\NetSign dm-twic.ini Install_dir\Litronic\NetSign libnspr4.dll Install_dir\Litronic\NetSign libplc4.dll Install_dir\Litronic\NetSign libplds4.dll Install_dir\Litronic\NetSign modutil.exe Install_dir\Litronic\NetSign netsign.exe Install_dir\Litronic\NetSign NetSign.chm Install_dir\Litronic\NetSign NsAbout.dll nstall_dir\Litronic\NetSign COM Registration regsvr32 /s caccsp.dll regsvr32 /s capicom.dll regsvr32 /s NsAbout.dll 105 Files Target Directory COM Registration NsAuSvc.exe Install_dir\Litronic\NetSign NsAuSvc /service NsCacBrowser.dll Install_dir\Litronic\NetSign regsvr32 /s NsCacBrowser.dll NsOlExt.dll Install_dir\Litronic\NetSign NsPolicy.dll Install_dir\Litronic\NetSign NsReg.exe Install_dir\Litronic\NetSign NsResource.dll Install_dir\Litronic\NetSign nss3.dll Install_dir\Litronic\NetSign NsSysInfo.dll Install_dir\Litronic\NetSign pinChange.exe Install_dir\Litronic\NetSign ReleaseNotes.txt Install_dir\Litronic\NetSign smime3.dll Install_dir\Litronic\NetSign softokn3.dll Install_dir\Litronic\NetSign tags-cac.ini Install_dir\Litronic\NetSign tags-gscis.ini Install_dir\Litronic\NetSign tags-twic.ini Install_dir\Litronic\NetSign regsvr32 /s NsPolicy.dll regsvr32 /s NsSysInfo.dll Certificate Files Added for a NetSign CAC Installation The following table lists the certificate files that are located in the Install_dir\Litronic\NetSign\Certificates directory when NetSign CAC is installed. Files Target Directory DOD CLASS 3 CA-3.crt509 Install_dir\Litronic\NetSign\Certificates DOD CLASS 3 CA-3.reg Install_dir\Litronic\NetSign\Certificates DOD CLASS 3 CA-4.crt509 Install_dir\Litronic\NetSign\Certificates DOD CLASS 3 CA-4.reg Install_dir\Litronic\NetSign\Certificates DOD CLASS 3 CA-5.crt509 Install_dir\Litronic\NetSign\Certificates DOD CLASS 3 CA-5.reg Install_dir\Litronic\NetSign\Certificates DOD CLASS 3 CA-6.crt509 Install_dir\Litronic\NetSign\Certificates DOD CLASS 3 CA-6.reg Install_dir\Litronic\NetSign\Certificates DOD CLASS 3 CA-7.crt509 Install_dir\Litronic\NetSign\Certificates DOD CLASS 3 CA-7.reg Install_dir\Litronic\NetSign\Certificates DOD CLASS 3 CA-8.crt509 Install_dir\Litronic\NetSign\Certificates DOD CLASS 3 CA-8.reg Install_dir\Litronic\NetSign\Certificates DOD CLASS 3 CA-9.crt509 Install_dir\Litronic\NetSign\Certificates DOD CLASS 3 CA-9.reg Install_dir\Litronic\NetSign\Certificates DOD CLASS 3 CA-10.crt509 Install_dir\Litronic\NetSign\Certificates DOD CLASS 3 CA-10.reg Install_dir\Litronic\NetSign\Certificates DOD CLASS 3 CAC CA.crt509 Install_dir\Litronic\NetSign\Certificates 106 Files Target Directory DOD CLASS 3 CAC CA.reg Install_dir\Litronic\NetSign\Certificates DOD CLASS 3 CAC EMAIL CA.crt509 Install_dir\Litronic\NetSign\Certificates DOD CLASS 3 CAC EMAIL CA.reg Install_dir\Litronic\NetSign\Certificates DOD CLASS 3 EMAIL CA-3.crt509 Install_dir\Litronic\NetSign\Certificates DOD CLASS 3 EMAIL CA-3.reg Install_dir\Litronic\NetSign\Certificates DOD CLASS 3 EMAIL CA-4.crt509 Install_dir\Litronic\NetSign\Certificates DOD CLASS 3 EMAIL CA-4.reg Install_dir\Litronic\NetSign\Certificates DOD CLASS 3 EMAIL CA-5.crt509 Install_dir\Litronic\NetSign\Certificates DOD CLASS 3 EMAIL CA-5.reg Install_dir\Litronic\NetSign\Certificates DOD CLASS 3 EMAIL CA-6.crt509 Install_dir\Litronic\NetSign\Certificates DOD CLASS 3 EMAIL CA-6.reg Install_dir\Litronic\NetSign\Certificates DOD CLASS 3 EMAIL CA-7.crt509 Install_dir\Litronic\NetSign\Certificates DOD CLASS 3 EMAIL CA-7.reg Install_dir\Litronic\NetSign\Certificates DOD CLASS 3 EMAIL CA-8.crt509 Install_dir\Litronic\NetSign\Certificates DOD CLASS 3 EMAIL CA-8.reg Install_dir\Litronic\NetSign\Certificates DOD CLASS 3 EMAIL CA-9.crt509 Install_dir\Litronic\NetSign\Certificates DOD CLASS 3 EMAIL CA-9.reg Install_dir\Litronic\NetSign\Certificates DOD CLASS 3 EMAIL CA-10.crt509 Install_dir\Litronic\NetSign\Certificates DOD CLASS 3 EMAIL CA-10.reg Install_dir\Litronic\NetSign\Certificates DOD CLASS 3 Root CA.crt509 Install_dir\Litronic\NetSign\Certificates DOD CLASS 3 Root CA.reg Install_dir\Litronic\NetSign\Certificates 107 Changes to Registry by a NetSign Installation This section lists all changes to the Windows registry after NetSign has been installed. The NetSignConfig.ini script is run early in the NetSign installation procedure to load the registry values listed in this section. Card Start Card Start [HKEY_CURRENT_USER\Software\SSP Solutions\CardStart] Key Values Type Default Setting AppPin REG_SZ Off AppPinTimeout REG_SZ 0 Auto Update REG_DWORD 0x00000000 (0) AutoRemind REG_DWORD 0x00000000 (0) AutoUpdate Certificate REG_SZ AutoUpdate Interval REG_SZ 24 AutoUpdate Mode REG_SZ Manual AutoUpdate WebServerName REG_SZ AutoUpdate WebSubAddr REG_SZ Certificate Cache REG_DWORD 0x00000000 (0) EncryptPin REG_SZ Off EncryptPinTimeout REG_SZ 0 IDPin REG_SZ Off IDPinTimeout REG_SZ 0 LOGFILE_AUTOUPDATE REG_SZ C:\Program Files\Litronic\NetSign\AutoUpdate.log Outlook AutoContact REG_DWORD 0x00000000 (0) Outlook AutoDecrypt REG_DWORD 0x00000000 (0) Outlook AutoReg REG_DWORD 0x00000001 (1) Outlook ClearText REG_DWORD 0x00000002 (2) Outlook Encrypt REG_DWORD 0x00000002 (2) Outlook Publish GAL REG_DWORD 0x00000000 (0) Outlook Sign REG_DWORD 0x00000002 (2) Outlook Signed Receipt REG_DWORD 0x00000002 (2) PinAlways REG_DWORD 0x00000000 (0) PINCHANGE AutoRemind REG_DWORD 0x00000000 (0) PinOnce REG_DWORD 0x00000000 (0) PinTimeoutAppName REG_SZ ProcessReadMessagesAlso REG_DWORD 0x00000001 (1) SCI_EmailProgram REG_DWORD 0x00000000 (0) SCI_None REG_DWORD 0x00000001 (1) 108 Key Values Type SCI_Program REG_SZ SCI_URL REG_SZ Default Setting SCI_WebBrowser REG_DWORD 0x00000000 (0) SCR_ClosedWindows REG_DWORD 0x00000000 (0) SCR_LockWorkstation REG_DWORD 0x00000000 (0) SCR_None REG_DWORD 0x00000001 (1) SCR_Program REG_SZ SCR_Windowslogoff REG_DWORD 0x00000000 (0) SignPin REG_SZ Off SignPinTimeout REG_SZ 0 TargetProfile REG_SZ MS Exchange Settings User OverRide REG_DWORD 0x00000001 (1) Web Support Page REG_SZ www.litronic.com/support 109 CRM CKR Path [HKEY_LOCAL_MACHINE\SOFTWARE\SSP Solutions\CRM] Key Value CKR PATH Type REG_SZ Default Setting C:\Program Files\Common Files\Litronic\Ckr Smart Card Reader Interface Litronic PCSC Reader Interface [HKEY_LOCAL_MACHINE\SOFTWARE\SSP Solutions\CRM\0001] Key Value Type Default Setting (Default) REG_SZ Litronic PCSC Reader Interface ACTIVE REG_DWORD 0x00000001 (1) CKR NAME REG_SZ LITPCSC.CKR PORT NUMBER REG_DWORD 0x00000000 (0) PRIORITY REG_DWORD 0x00000000 (0) READERGROUP REG_SZ All Readers NetSign Functions NetSign Functions [HKEY_LOCAL_MACHINE\SOFTWARE\SSP Solutions\NetSign\] Key Value Type Default Setting About REG_DWORD 0x00000001 (1) CACBrowser REG_DWORD 0x00000001 (1) Edition REG_DWORD 0x00000002 (2) - NetSign CAC FeedBack Page REG_DWORD 0x00000001 (1) HelpFiles REG_DWORD 0x00000001 (1) PIN Change REG_DWORD 0x00000001 (1) Policy REG_DWORD 0x00000001 (1) SysInfo REG_DWORD 0x00000001 (1) Build Version NetSign Version [HKEY_LOCAL_MACHINE\SOFTWARE\SSP Solutions\NetSign\Build Version] Key Value Build Type REG_SZ Default Setting 5.5.xx where xx represents the specific build number of the NetSign release. 110 Target Directory Installation Directory [HKEY_LOCAL_MACHINE\SOFTWARE\SSP Solutions\NetSign\Target Directory] Key Value Directory Type REG_SZ Default Setting C:\Program Files\Litronic\NetSign E-Mail Application E-mail Application [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Messaging Subsystem\MSMapiApps] Key Value sspmapi.dll Type REG_SZ Default Setting Microsoft Outlook Smart Cards NetSign Supported Smart Cards [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\Calais\SmartCards\Common Access Card - JForte] Key Value Type Default Setting ATR REG_BINARY 3b f8 11 00 ff 40 20 6a 46 6f 72 74 65 00 01 ATRMask REG_BINARY ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff CRYPTO PROVIDER REG_SZ CAC Cryptographic Service Provider TOKEN_MODULE REG_SZ CAC.CKM NetSign Supported Smart Cards [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\Calais\SmartCards\Common Access Card - Oberthur] Key Value Type Default Setting ATR REG_BINARY 3b 7d 11 00 00 00 31 80 71 8e 64 86 d6 01 00 81 90 00 ATRMask REG_BINARY ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff CRYPTO PROVIDER REG_SZ CAC Cryptographic Service Provider TOKEN_MODULE REG_SZ CAC.CKM 111 NetSign Supported Smart Cards [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\Calais\SmartCards\Common Access Card - Oberthur V4] Key Value Type Default Setting ATR REG_BINARY 3b 7f 11 00 00 00 31 c0 53 ca c4 01 64 52 d9 04 00 82 90 00 ATRMask REG_BINARY ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff CRYPTO PROVIDER REG_SZ CAC Cryptographic Service Provider TOKEN_MODULE REG_SZ CAC.CKM NetSign Supported Smart Cards [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\Calais\SmartCards\Common Access Card - Schlumberger] Key Value Type Default Setting ATR REG_BINARY 3b 65 00 00 9c 02 02 07 02 ATRMask REG_BINARY ff ff ff ff ff ff ff ff ff CRYPTO PROVIDER REG_SZ CAC Cryptographic Service Provider TOKEN_MODULE REG_SZ CAC.CKM NetSign Supported Smart Cards [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\Calais\SmartCards\GSC2.1 Gemplus Card 0] Key Value Type Default Setting ATR REG_BINARY 3b 7b 95 00 00 80 65 b0 83 01 04 74 83 00 90 00 ATRMask REG_BINARY ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff CRYPTO PROVIDER REG_SZ CAC Cryptographic Service Provider TOKEN_MODULE REG_SZ CAC.CKM NetSign Supported Smart Cards [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\Calais\SmartCards\GSC2.1 - Gemplus Card 1] Key Value ATR Type REG_BINARY Default Setting 3b 6d 00 00 80 31 80 65 b0 43 06 00 98 83 01 90 00 ATRMask REG_BINARY ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff CRYPTO PROVIDER REG_SZ CAC Cryptographic Service Provider TOKEN_MODULE REG_SZ CAC.CKM 112 NetSign Supported Smart Cards [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\Calais\SmartCards\GSC2.1 - Gemplus Card 2] Key Value Type Default Setting ATR REG_BINARY 3b f5 91 00 ff 91 81 71 fe 40 00 42 00 01 77 c1 b1 ATRMask REG_BINARY ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff CRYPTO PROVIDER REG_SZ CAC Cryptographic Service Provider TOKEN_MODULE REG_SZ CAC.CKM NetSign Supported Smart Cards [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\Calais\SmartCards\GSC2.1 - Gemplus Card 3] Key Value Type Default Setting ATR REG_BINARY 3b 6b 00 00 80 65 b0 83 01 03 74 83 00 90 00 ATRMask REG_BINARY ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff CRYPTO PROVIDER REG_SZ CAC Cryptographic Service Provider TOKEN_MODULE REG_SZ CAC.CKM NetSign Supported Smart Cards [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\Calais\SmartCards\ Schlumberger Access 64k] Key Value Type Default Setting ATR REG_BINARY 3b 75 12 00 00 29 05 01 04 01 ATRMask REG_BINARY ff ff ff ff ff ff ff ff ff ff CRYPTO PROVIDER REG_SZ CAC Cryptographic Service Provider TOKEN_MODULE REG_SZ CAC.CKM 113 Unload DLL Internet Explorer Unload DLL [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Always UnloadDLL] Key Value (Default) Type Default Setting REG_SZ 1 Exchange Client Extensions Client Extensions [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Exchange\Client\Extensions] Key Value NsOIExt Type Default Setting REG_SZ 4.0;[INSTALLDIR]\NsOlExt.dll;1;00000111111100 GSC BSI GSC BSI [HKEY_LOCAL_MACHINE\SOFTWARE\GSC\BSI\SSP] Key Value Type Default Setting Cryptodll REG_SZ C:\Windows\System32\SSPBSI.dll Storagedll REG_SZ C:\Windows\System32\SSPBSI.dll Utilitydll REG_SZ C:\Windows\System32\SSPBSI.dll Vendor REG_SZ SSP-Litronic GSC Cryptography PKCS#11 PKCS#11 [HKEY_LOCAL_MACHINE\SOFTWARE\GSC\Cryptography\PKCS#11\SSP] Key Value Type Default Setting PKCS#11DLL REG_SZ C:\Windows\System32\Core32.dll Vendor REG_SZ SSP-Litronic 114 Installer The installation values shown in the following table can be modified by the NetSign Configuration Wizard and saved in the NetSignConfig.ini file. The values shown in the table represent the default NetSign installation values without any user-specified configuration changes made by the administrator with the NetSign Configuration Wizard. NetSign Installation Configuration [HKEY_LOCAL_MACHINE\SOFTWARE\Litronic\Installer] Key Value Type Default Setting Application1 REG_SZ CrdStart.exe Application2 REG_SZ IEXPLORER.EXE Application3 REG_SZ netscape.exe Application4 REG_SZ NetSign.exe Application5 REG_SZ OUTLOOK.EXE Application6 REG_SZ pinChange.exe Application7 REG_SZ psm.exe CardStartLaunch REG_SZ No Check4Reader REG_SZ Yes CheckConfig REG_SZ Yes CheckVersion REG_SZ Yes CheckVersionNS REG_SZ No Display REG_SZ Yes InstallCert REG_SZ Yes MaxVerNS REG_SZ 7.2.0.0 MinStrength REG_SZ 128 MinVerIE REG_SZ 5.5.0.0 MinVerNS REG_SZ 4.76.0.0 NS_FLAG_ALL_CERT REG_SZ No NS_REBOOT_STATE REG_SZ NOT_REBOOTED Pushed REG_SZ No Target Directory NetSign Installation Configuration [HKEY_LOCAL_MACHINE\SOFTWARE\Litronic\Installer\Target Directory] Key Value TargetPath Type REG_SZ Default Setting c:\Program Files\Litronic\NetSign 115 116 Appendix C Certificate Installation This appendix describes how to import certificates to Netscape Versions 7.0 or 7.2 after NetSign has been installed. NetSign does not automatically import certificates to these Netscape releases during an installation. Administrators must manually import Netscape certificates. Importing Certificates to Netscape The Netscape Manage Certificates utility is used to import certificates into Version 7.0 or 7.2. 1. Add DER encoded binary X.509 certificate files to the Install_dir\Litronic\NetSign\Certificates directory. 2. Open Netscape on your desktop. 3. Select Preferences from the menu bar Edit option. 4. Click on Expand Privacy & Security from the left pane of the Preferences dialog box to display an expanded list. You should see Certificates listed beneath Privacy & Security. 5. Click Certificates. 6. Click Manage Certificates. The Certificate Manager dialog box appears on the screen. 7. Click the Authorities tab. 117 8. Click Import. The Select File containing CA certificate(s) to import dialog box appears on the screen. 9. Navigate to the Install_dir\Litronic\NetSign\Certificates directory. 10. Select All Files from the Files of type field drop-down list. 11. Select the certificate that you want to import into Netscape from the list of certificates that appear in the upper window of the dialog box. 12. Click Open. The Downloading Certificate dialog box appears on the screen. 13. Select the trust for the certificate and click OK. The certificate you imported should appear in the list beneath the Authorities tab of the Certificate Manager dialog box. 118 Index A Active Directory push installation defining Organizational Unit 32 description 30 overview 31 required files 31 requirements 30 specifying packages 33–35 Auto Contact 16, 62 Auto Decrypt 16, 62 Auto Update description 17, 63 directory on server 17, 64 interval 17, 64 modes 17, 64 web server name 17 Auto-register certificate for IE policy 58 Auto-register certificates with Outlook policy 58, 61 C capicom.dll file 90 card readers certificate registration 61 checking for during installation 11 registry entries 110 supported types 22 certificate authority 2, 5 certificates Auto Unreg on log off policy 15 Auto Unreg on smart card removal policy 15 auto-register for IE 58 auto-register for Outlook 58 cache policy 15, 60 caching for improved performance 60 importing to Netscape 117 installed with NetSign 106–107 publishing to GAL at registration 16 registering root certificates to Netscape with nsreg.exe 10, 24 registering under Windows XP or Windows 2003 server 14 registering with card insertion 61 registering with Internet Explorer 14 registration policies 60 to update NetSign 63 unregistering on card removal 15 Citrix Citrix Server dialog box 20 client computer configuration 80 configuration for Desktop client 79 configuration for web-based client 77 configure domain controller for smart card logon 76 registering applications 20 specify applications that must be registered 20 supported products 75 Citrix Server dialog box 20, 80 configuration action to perform when a card is inserted 13, 59 action to perform when a card is removed 14, 59 allow user to override insertion/deletion events 14, 59 Auto Contact 16, 62 Auto Decrypt 16, 62 Auto UnReg on Logoff 15 Auto Unreg on Removal 15 Auto Update 17, 63 Auto-register certificates for IE 14, 60, 61 cache certificates 15, 60 card reader checking 11 card reader checking during installation 11 from Policies page 51–65 installation directory 9 installation settings 9–11 local policy method 51 NetSign functions available to users 12 Outlook Autoconfigure 15, 61 Outlook profile 62 PIN change AutoRemind 18, 65 PIN policy 18, 64 publish to GAL 16, 62 push installation option 9 recommended policies 58 register applications to Citrix 20 Release Notes display 11 remote policy method 52–55 upgrade directory location 9 values for a push installation 11 web browser key strength checking 10 web browser version checking 10 web links 12, 65 with NetSign Configuration Wizard 7–20 CSR 68 D Department of Defense vii 119 digital certificate 2 digital signatures 2 Distribute Software wizard 44 E e-mail add contact to user’s address book 16, 62 adding public key 5 aout-decrypt messages option 62 auto-decrypt messages option 16 configuring Outlook AutoRegister 61 default signing 58 recommended Outlook policies 58 send in Clear text 58 sending encrypted message 5 sending encrypted messages 5 sending messages in clear text 58 supported applications 23 encryption key strength 10 Evincible Ink 4 F Feedback web page 12 files added to computer by NetSign installation 105–106 capicom.dll 90 ISScript1050.msi 31 left behind after NetSign uninstallation 90 NetSign.msi 31 NetSignConfig.msi 31 NSConfigWizard.exe 8 nsreg.exe 10, 24 Install wizard 25 installation Active Directory push procedure 30–35 Active Directory push system requirements 30 Auto Update configuration 17 certificates added 106–107 changes to registry 108–115 configuration registry entries 115 considerations 24 files added 105–106 license agreement 25 local procedure 25–28 methods 21 setting directory location 9 setting NetSign functions to install 12 setting option to display Release Notes 11 setting Push install field 9 silent procedure 29 SMS push procedure 36–49 Internet Explorer checking key strength 10 installing root certificates configuration 10 registering certificates policy 14, 60 registering to run in a Citrix environment 20, 80 setting Active X security 86 supported versions 23 unload DLL registry entry 114 verifying minimum version 10 intranet access recommended polices 58 K Kyberpass 4 L G GAL, See Global Address List Global Address List 16 Global Address List (GAL) 16, 62 Global Unique Identifier 96, 100 GUID, See Global Unique Identifer Litronic Product Feedback URL 12 service and support phone numbers viii Technical Support URL 12 local policy configuration 51 M H msiexec command 29, 92 hardware requirements 22 N I Install Settings dialog box 10–11 120 Netscape checking key strength 10 importing certificates 117 installation considerations with PSM 24 installing root certificates configuration option 10 registering certificates with nsreg.exe 10 registering PSM to run in a Citrix environment 20, 80 restriction with Auto Contact policy 16 supported versions 23 verifying version range 10 NetSign installation methods 89 installing by SMS push 36–49 installing locally 25–28 installing silently 29, 91, 92 license agreement 25 NetSign Configuration Wizard Citrix Server dialog box 20 default registry key values 115 description 7 Install Settings dialog box 9–11 Policy Settings dialog box 13–19 Product Features dialog box 12 using 8 using for local installations 8 using for push installations 8 NetSign.msi 31 NSConfigWizard file 8 nsreg.exe file 10, 24 O Organizational Unit 32 OU, see Organizational Unit Outlook Auto Contact 62 Auto Decrypt 62 AutoConfigure 15, 61 auto-register 61 Global Address List (GAL) 16 publishing certificates to GAL 16, 62 recommended configuration settings 58 registering to run in a Citrix environment 20, 80 selecting profile 62 selecting profile to AutoConfigure 62 Outlook Express restriction with Auto Contact policy 16, 62 restriction with Auto Decrypt policy 16, 62 restriction with Auto-register Certificates with Outlook policy 61 Outlook Web Access configuring Exchange Server 2003 84 installing S/MIME control 86 S/MIME deployment options 85 setting Active X security on user computers 86 user requirements 85 P password based encryption 3 password security 3 PIN 6 cache mode policies 18–19, 64–65 cache mode policy 65 PIN change AutoRemind 18, 65 registering pinChange.exe file to run in a Citrix environment 20, 80 time out period 18, 65 PKCS#11 registry entries 114 PKE applications 4 PKI, See Public Key Infrastructure polices certificate registration 60 policies auto-register certificates with Outlook 61 certificate registration 60 intranet access 58 local administration 51 Outlook AutoRegister 61 Outlook configuration 61–64 PIN 64–65 PIN cache mode 64 PIN change AutoRemind 18, 65 recommendations for intranet 58 recommended 58 recommended configuration 58 remote administration with Active Directory 52–55 remote and local configuration mapping 56–57 remote and local mapping 56 remote configuration 52–55 remote configuration requirements 52 smart card events 59 smart card insertion 59 smart card removal 59 web links 65 Policies page 51 Policy Settings dialog box 13–18 private key 5 Product Features dialog box 12 profile 62 public key 5, 6 public key enabled 4 Public Key Infrastructure 4 public key security 5 Publish to GAL policy 16, 62 121 R U recommended policies 58 registry adding entries requires administrator privileges 24 default values of keys specified by the NetSign Configuration Wizard 115 key to store NetSign installation configuration 7 keys added by NetSign installation 108–115 keys left behind after uninstalling NetSign 90 pushing configuration settings 15 Release Notes reading after installing NetSign 27 setting option to display after installation 11 uninstallation Active Directory push method 93 considerations 90 files and registry keys left behind 90 local method 91 methods 89 silent method 92 SMS push method 95 S S/MIME deployment options 85 installing on user computer 86 SecretAgent 4 Secure Sockets Layer 6 description 67 enabling SSL web server 67 enforcing SSL connections 71 recommended policies 58 silent installation procedure 29 smart cards description 6 insertion policies 13, 59 registry entries 111–113 removal options 14, 59 supported types 22 SmartCardOnly registry value 84 SMS push install advertising the package 44 creating a new package 37 Distribute Software wizard 44 installation requirements 36 overview of steps 36 set package distribution points 39 software requirements 22–23 SSL, see Secure Sockets Layer T Technical Support URL to Litronic web site 12 typeface conventions vii 122 W web browser key strength checking 10 version checking 10 Windows Add/Remove facility 90, 91 registry changes by a NetSign installation 108–115 supported versions 22