Epass2003 User Guide
Epass2003 User Guide
V1.0
Revision History:
Date June 2013 Revision V1.0 Description Release of the first version
not agree with the terms herein, please return the evaluation package to us, postage and insurance prepaid, within seven days of their receipt, and we will reimburse you the cost of the Product, less freight and reasonable handling charges. 1. Allowable Use You may merge and link the Software with other programs for the sole purpose of protecting those programs in accordance with the usage described in the Developers Guide. of the Software. 2. Prohibited Use The Software or hardware or any other part of the Product may not be copied, reengineered, disassembled, decompiled, revised, enhanced or otherwise modified, except as specifically allowed in item 1. You may not reverse engineer the Software or any part of the product or attempt to discover the Softwares source code. You may not use the magnetic or optical media included with the Product for the purposes of You may make archival copies
transferring or storing data that was not either an original part of the Product, or a Feitian provided enhancement or upgrade to the Product. 3. Warranty Feitian warrants that the hardware and Software storage media are substantially free from significant defects of workmanship or materials for a time period of twelve (12) months from the date of delivery of the Product to you. 4. Breach of Warranty In the event of breach of this warranty, Feitians sole obligation is to replace or repair, at the discretion of Feitian, any Product free of charge. Any replaced Product becomes the property of Feitian.
Warranty claims must be made in writing to Feitian during the warranty period and within fourteen (14) days after the observation of the defect. satisfactory by Feitian. All warranty claims must be accompanied by evidence of the defect that is deemed
Any Products that you return to Feitian, or a Feitian authorized distributor, must be sent with
freight and insurance prepaid. EXCEPT AS STATED ABOVE, THERE IS NO OTHER WARRANTY OR REPRESENTATION OF THE PRODUCT, EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. 5. Limitation of Feitians Liability Feitians entire liability to you or any other party for any cause whatsoever, whether in contract or in tort, including negligence, shall not exceed the price you paid for the unit of the Product that caused the damages or are the subject of, or indirectly related to the cause of action. In no event shall
Feitian be liable for any damages caused by your failure to meet your obligations, nor for any loss of data, profit or savings, or any other consequential and incidental damages, even if Feitian has been advised of the possibility of damages, or for any claim by you based on any third-party claim.
6. Termination This Agreement shall terminate if you fail to comply with the terms herein. shall survive any termination of this Agreement.
Items 2, 3, 4 and 5
Contents
Chapter 1 RunTime Installation ................................................................................................................ 4
1.1 Supported Platform ....................................................................................................................................... 4 1.2 Preparing for Installing ePass2003 ................................................................................................................. 4 1.3 Installing ePass2003 Runtime ........................................................................................................................ 4 1.4 Uninstalling ePass2003 Runtime .................................................................................................................... 8 Chapter 2 ePass2003 Token Manager .......................................................................................................11
2.5 Changing Token Name ................................................................................................................................. 19 2.6 Changing User PIN ....................................................................................................................................... 19 2.7 Initializing ..................................................................................................................................................... 22 Chapter 3 Windows PIN Management .....................................................................................................23
3.1 Overview ...................................................................................................................................................... 23 3.2 EnterSafe Minidriver PIN Management for Windows ................................................................................. 23
3.2.1 Changing a User PIN ..................................................................................................................................................... 23 3.2.2 Unblocking EnterSafe Minideriver ................................................................................................................................ 25
Chapter 1
1.1 Supported Platform
Windows Platform:
Windows 2000 Windows XP x86/x64 Windows 2003 x86/x64 Windows Vista x86/64 Windows 2008 x86/x64 Windows 7 x86/x64 Windows8 x86/x64
Runtime Installation
Linux Mac OS
1.
Before you can use the ePass2003, you must install the Runtime library. Execute ePass2003-Setup.exe.
2.
After select language, click OK, the following welcome interface appears:
3.
4.
Note: ePass2003 supports Private CSP and Microsoft CSP. For older windows systems such as Windows2000/XP, users must install patch KB909520 to enable the option Microsoft CSP. Private CSP is provided by FEITIAN, the CSP name is EnterSafe ePass2003 CSP v1.0. Microsoft CSP means Microsoft Base CSP (Microsoft Base Smart Card Crypto Provider), it supports Minidriver, and user can install the middleware through system update, no redundant installation package, no complicated installation process; we also have installation package for the user who doesnt have the Internet. But please pay attention, from Vista and above, Microsoft has integrated Minidriver into Windows system, for XP and below, Windows system doesnt install Base CSP (Microsoft CSP option disable), user can add Base CSP through system patch KB909520.
5.
After select CSP, click Install to continue, the following interface appears:
6.
7.
Open start menu select Control Panel, double click Add or Remove Programs, choose ePass2003 (Remove only) in the Currently installed programs list, then click Change/Remove.
Uninstall it from start menu
1.
Both of above two methods can launch the Uninstall Wizard of ePass2003, see following interface:
2.
3.
4.
Click Finish to close uninstall wizard, now ePass2003 has been already uninstalled from your computer.
10
2.2 Overview
2.2.1 Interface without USB Key Insertion
You can find the shortcut for the Manager by clicking Start -> All Programs -> Feitian -> ePass2003. Click the shortcut to start the Manager. The following interface appears:
11
Note: The total private memory space and the free private memory space refer to the PIN protected spaces. Since the private key is extremely sensitive and it is managed by the COS, it doesnt show the total private memory space and the free private memory space.
2.3 Login
Select a USB key from the list on the right to which you want to log in and click Login. The following interface appears:
12
Note: When the PIN input dialog is displayed, the Manager will start the safe desktop. In this status, only the box is highlighted. Except input in the box, most of other operations are disabled. Default password is 12345678. Optionally, you can use a soft keyboard by checking Soft keyboard option here to avoid monitoring of a potential Trojan program.
Note: The physical keyboard is disabled when you are using the soft keyboard. After you enter a proper PIN and click OK, the interface as shown in Figure 5 appears. A token list is displayed on the top. Below are the properties and their values. By clicking Hide Details or More Details button, you can hide the details or show them. After you have logged in, you can view not only the public data but the private data. In addition, the Login button changes to Log out button. To securely log out, click this button.
13
Figure 14 Logged In
If you type an incorrect password in the PIN input box, the following interface appears:
Note: There is a limit on the number of incorrect PIN inputs. If this number reaches 9, the token will be locked. You cannot perform any operations with it in this case.
14
1.
Click the + on the left side of a container (folder icon) in the token list or double-click the icon to
display its content. Click the + on the left side of a certificate icon to display the key-pair. When a certificate is selected, the Certificate View button is enabled.
2.
By clicking Certificate View button or double-clicking a certificate icon, the following dialog box appears:
15
2.4.2 Importing
Currently, ePass2003 supports to import the certificate from file or from Certificate Store. The following certificate types: P12, PFX and CER. The P12 and PFX types contain a key-pair (a public key and a private key), while the CER type does not. The PFX and CER types are used as examples below.
16
2.4.3 Exporting
You can export a certificate from ePass2003 token to a file. From the tree view in the main interface of the Manager, choose the certificate to be exported and click Export button. A dialog box appears. Specify a path to the certificate file and its name.
17
Click Save. If the operation has succeeded, the following message will appear:
2.4.4 Deletion
From the tree view of the main interface of the Manager, choose the certificate you want to delete and click Delete. The following interface appears:
18
1.
2.
You can also enter the PINs by a soft keyboard. To do so, check Soft keyboard.
19
You can check Check intensity option to get aware of the security strength of the PIN you have set. L surrounded by red means Low.
20
We recommend long PINs made up of lower and upper-case letters, numbers and special characters.
21
2.7 Initializing
Click Initialize button in the main interface. The following interface appears:
Click Yes to start initializing operation. If the operation is performed successfully, the following interface appears:
After finishing initializing, all the data (include Certificates) will be deleted. The PIN of token will be reset to be 12345678.
22
23
legacy versions of Windows. Users can change the PIN as described below.
1.
Select the Option Start/Run and type PinTool. The following dialog box appears.
2. 3.
Input the Old PIN, the New PIN and then confirm the New PIN. Click Change Pin button to finish changing the User PIN.
3.2.1.2 Changing a User PIN with Windows Vista, 2008 and Windows 7
In Windows Vista , 2008 and Windows 7, users can change their smart card user PIN using the secure desktop. The secure desktop is the most trusted context in the operating system. The most common use of the Secure Desktop is the User Log on to Windows. However, it is also used for other secure operations with user credentials,
24
such as password changes and now smart card PIN management. To change the PIN of the smart card in Windows Vista, perform operations as follows:
1. 2. 3. 4. 5.
image:
Press Ctrl+Alt+Delete to access the Secure Desktop screen. Select the Change a Password option. Attach EnterSafe Minidriver to a USB Port of the computer. Select the smart card user tile. Enter the old PIN, the new PIN and confirm the new PIN in the appropriate fields. As shown in following
25
Note: The EnterSafe Minidriver default maximum number of wrong PIN attempts is 10.
1. 2. 3. 4. 5. 6.
The user retrieves a Challenge from the card. The user communicates the Challenge to the IT Admin/Helpdesk. IT Admin/Helpdesk combine the Challenge (8 bytes) and the users Admin Key (24 bytes) using the Triple IT Admin/Helpdesk communicates the Response to the end user. The end user enters the Response value and defines a new value for the User PIN, which will be The smart card confirms that the Response provided is correct, by comparing the value entered by the
established once the Card Unblock has completed. user with one generated within the card using the Challenge generated by the card and the Admin Key stored in the card. If both values match, the card unblock is successful, the new user PIN is established and the PIN attempt counter is reset. It is important to note that, like the Verify PIN procedure, the Unblock Card procedure is protected by a maximum number of unsuccessful unblock attempts. Once the maximum number of unsuccessful unblock attempts is reached the card will be permanently blocked even to an administrator, and all data stored in the card becomes permanently inaccessible. For this reason it is important to perform the unblock procedure with great care. Like the Change PIN procedure, the process and tools used to unblock a Smart Card in Windows Vista/2008 and the legacy versions of Windows operating systems are different.
26
With the blocked Token attached to the USB port, when the user clicks on the Unblock button, the Smart Card will return the 16 digits of Challenge, and will enable the Response, New PIN and Confirm New PIN fields to allow the user to enter the corresponding values according to the process previously described. Once the user clicks the OK button, the Response and New PIN values will be transmitted to the card to complete the card unblock procedure.
3.2.2.3 Unblocking a Smart Card with Windows Vista, 2008 and Windows 7
Smart Card Unblock is integrated into the Windows Vista, 2008 and Windows 7 Secure Desktop. However, it is not configured by default and must be explicitly enabled with Group Policy. When this feature is enabled, the user is presented with the Smart Card Unblock screen when logon is attempted using a blocked smart card. Note: Smart card unblock requires that smart cards are assigned an administrator key before they are provided to users, and that the IT infrastructure includes a secure way to store and access these keys when a user needs assistance.
3.2.2.3.1 Enabling Unblock Card with Windows Vista, 2008 and Windows 7
The Unblock Card function in the secure desktop user interface is not enabled by default for Windows Vista ,2008 and Windows 7. To enable unblock in the secure desktop user interface, an administrator can use the Group Policy
27
1. 2. 3. 4.
Click Start button, type MMC in the Start Search field and then press Enter. When prompted to run Command Prompt as an administrator, click Allow. This will open the Microsoft In the Console 1 dialog, click on the File menu and select Add/Remove Snap-in. In the Add or Remove Snap-ins dialog box, select Group Policy Object Editor in the Available Snap-ins
pane on the left side, and then click Add, as shown in following image:
5.
You can either enable unblock for the local computer only, or for all computers in the domain. To enable unblock on the local machine (only), you must be an administrator on the local computer. Select Local Computer in the Group Policy Object control. Click Finish to close the Select Group Policy dialog.
1)
To enable unblock on all machines in the domain, you must be a Domain Administrator logged on to a Domain Controller and select Default Domain Policy in the Group Policy Object control. In the Select Group Policy Object dialog box, click Finish.
2)
6. 7.
Click OK in the Add or Remove Snap-ins dialog box to close it. Click on the Local Computer Policy node in the left side pane, then click on Computer
configuration>Administrative Templates>Windows Components> Smart Card. And then double-Click Allow Integrated Unblock screen to be displayed at time of logon in the Setting list, as shown in following image:
28
8.
Select the Enabled option button, and then click OK, as shown in following image:
29
At this point, the Smart Card Unblock screen can also be configured via Group Policy to display a custom string. This string can be used to provide a deployment-specific phone number for users to call to obtain the response to the smart card administrator challenge. You can set the custom string as follows:
9. 10.
Back in the Console 1 dialog, select the Local Computer Policy > Computer Configuration >
Administrative Templates > Windows Components > Smart Card, and double-click on Display string when smart card is blocked on the right side pane. Select the Enabled option button and type the string to display on the Unblock screen in the Display sting when smart card is blocked text box, and then press OK, as shown in following image:
30
3.2.2.3.2 Unblocking a Smart Card with Windows Vista, 2008 and Windows 7
Same as for the Change PIN function, the Smart Card Unblock is integrated into the Windows Vista, 2008 and Windows 7 Secure Desktop. However, it is not configured by default and must be explicitly enabled via Group Policy as 2.2.3.1 described. When this feature is enabled, the user is presented with the Smart Card Unblock screen when logon is attempted using a blocked smart card,, as shown in following image:
31
1. 2.
Know or somehow have access to, the administrative key values for all smart cards in use. Have access to a Triple DES tool to calculate the Response based on the Challenge and the
administrative key of a given users smart card. None of the Windows operating systems provide any means for administrators to handle the secure back-end storage of the users smart cards Administrative keys, nor do they provide a back-end tool to calculate the response to a challenge. These features will be commonly provided by any commercial Base CSP compliant Card Management System (CMS), including Microsofts Identity Lifecycle Manager (ILM).
32
Description
implemented by software. With this interface, it is easy to develop PKI applications for data encryption/decryption, authentication and signature on Windows platforms. Smart Card Minidriver Interface An interface used for cryptography operations, provided by Microsoft. It provides cryptographic
algorithm encapsulation of equipment irrelevant or
PKCS#11 Interface A programming interface introduced by RSA. It abstracts the cryptographic device into a universal logic view - Cryptographic Token, for use by upper-level applications, providing device independency and a manner of resource sharing.
33