Safenet Authentication Client (Windows) : Version 10.6 (Ga) User Guide
Safenet Authentication Client (Windows) : Version 10.6 (Ga) User Guide
Client (Windows)
Version 10.6 (GA)
User Guide
All information herein is either public information or is the property of and owned solely by Gemalto and/or its
subsidiaries who shall have and keep the sole right to file patent applications or any other kind of intellectual
property protection in connection with such information.
Nothing herein shall be construed as implying or granting to you any rights, by license, grant or otherwise, under
any intellectual and/or industrial property rights of or concerning any of Gemalto's information.
This document can be used for informational, non-commercial, internal and personal use only provided that:
• The copyright notice below, the confidentiality and proprietary legend and this full warning notice
appear in all copies.
• This document shall not be posted on any publicly accessible network computer or broadcast in any
media and no modification of any part of this document shall be made.
Use for any other purpose is expressly prohibited and may result in severe civil and criminal liabilities.
The information contained in this document is provided "AS IS" without any warranty of any kind. Unless
otherwise expressly agreed in writing, Gemalto makes no warranty as to the value or accuracy of information
contained herein.
The document could include technical inaccuracies or typographical errors. Changes are periodically added to
the information herein. Furthermore, Gemalto reserves the right to make any change or improvement in the
specifications data, information, and the like described herein, at any time.
Gemalto hereby disclaims all warranties and conditions with regard to the information contained herein,
including all implied warranties of merchantability, fitness for a particular purpose, title and non-
infringement. In no event shall Gemalto be liable, whether in contract, tort or otherwise, for any indirect,
special or consequential damages or any damages whatsoever including but not limited to damages
resulting from loss of use, data, profits, revenues, or customers, arising out of or in connection with the
use or performance of information contained in this document.
Gemalto does not and shall not warrant that this product will be resistant to all possible attacks and shall
not incur, and disclaims, any liability in this respect. Even if each product is compliant with current
security standards in force on the date of their design, security mechanisms' resistance necessarily
evolves according to the state of the art in security and notably under the emergence of new attacks.
Under no circumstances, shall Gemalto be held liable for any third party actions and in particular in case
of any successful attack against systems or equipment incorporating Gemalto products. Gemalto
disclaims any liability with respect to security for direct, indirect, incidental or consequential damages
that result from any use of its products. It is further stressed that independent testing and verification by
the person using the product is particularly encouraged, especially in any application in which defective,
incorrect or insecure e functioning could result in damage to persons or property, denial of service or
loss of privacy.
© 20010-18 Gemalto. All rights reserved. Gemalto and the Gemalto logo are trademarks and service marks of
Gemalto and/or its subsidiaries and are registered in certain countries. All other trademarks and service marks,
whether registered or not in specific countries, are the property of their respective owners.
Additional Documentation
The following publications are available:
• 007-013560-005 SafeNet Authentication Client 10.6 (GA) Administrator Guide Rev B
• 007-013559-008 SafeNet Authentication Client 10.6 (GA) Release Notes Rev C
5 Token Management. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
Selecting the Active Token . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .29
6 Token Initialization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
Token Initialization Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .51
Initializing eToken Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .52
Setting the RSA Key Secondary Authentication Field. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .62
Initializing IDPrime Based Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .64
Initializing IDPrime Based Common Criteria Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .65
Initializing IDPrime Devices (Non Common Criteria) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .71
8 Common Criteria . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80
Working with Common Criteria Certified Tokens and Cards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .80
PKCS#11 Digital Signature PIN Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .80
Unlinked Mode (4 Passwords) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .81
Unlinked Mode Functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .81
10 Client Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
Setting Password Quality (eToken Devices only) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .91
Copying User Certificates to a Local Store . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .92
Copying CA Certificates to a Local Store . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .92
Enabling Single Logon . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .93
Allowing Password Quality Configuration on Token after Initialization (eToken Devices only) . . . . . . . . . .93
Allowing Only an Administrator to Configure Password Quality on Token . . . . . . . . . . . . . . . . . . . . . . . . . .94
Showing the SafeNet Authentication Client Tray Icon . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .94
Defining Automatic Logoff. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .95
Enabling Logging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .95
11 Token Settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96
Setting eToken Password Quality (Password Quality Tab) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .96
Setting Private Data Caching Mode (Advanced Tab) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .98
Setting RSA Key Secondary Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .99
Setting IDPrime PIN Quality (PIN Quality Tab). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .100
Setting IDPrime PIN Properties (Advanced Tab) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .102
12 Licensing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105
Viewing and Importing Licenses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .105
Introduction
SafeNet Authentication Client enables token operations and the implementation of token PKI-based solutions.
Overview
SafeNet Authentication Client is Public Key Infrastructure (PKI) middleware that provides a secure method for
exchanging information based on public key cryptography, enabling trusted third-party verification of user
identities. It utilizes a system of digital certificates, Certificate Authorities, and other registration authorities that
verify and authenticate the validity of each party involved in an Internet transaction.
SafeNet Authentication Client provides easy-to-use configuration tools for users and administrators..
NOTE:
The term Token is used throughout the document and is applicable to both Smart
Cards and Tokens.
NOTE:
• The user secret that is made up of 8-23 or 25-32 ASCII7 characters derives a 24 byte
long Admin Key. The user secret that is made up of 24 ASCII7 characters is used
without derivation.
The password sizes: 24 bytes and 48 hexadecimal digits are maintained for backward compatibility with SAC
10.0 and IDGo 800.
NOTE:
• If a customized version of SafeNet Authentication Client is installed, the graphics you see may
be different from those displayed in this guide.
• In some installations, the word Password is replaced by PIN or Passcode.
• The term Token is used throughout the document and is applicable to both Smart Cards and
Tokens.
CAUTION:
Do not disconnect a token from the USB port, or remove a smart card from the reader,
during an operation. This can corrupt the data on the token or smart card.
The SafeNet Authentication Client tray icon is displayed in the Windows taskbar as follows:
NOTE:
If SafeNet Authentication Client is open and the tray icon is not displayed in the Windows
taskbar, see Chapter 10: Showing the SafeNet Authentication Client Tray Icon, on page 94.
The following functions may be displayed, depending on the configuration of your system:
• SAM Agent (Windows): launches the SAM Desktop Agent application. For more information, see the
SafeNet Authentication Manager User Guide.
• Delete Token Content: removes the deletable data from the selected token.
• Generate OTP: generates an OTP on the selected SafeNet Virtual token. This function is available only
if the selected SafeNet Virtual token is configured to support this function.
• Synchronize Password (Windows): Synchronizes your token password with your domain password.
Use this feature only when requested by your administrator.
CAUTION:
Do not disconnect a token from the USB port, or remove a smart card from the reader,
during an operation. This can corrupt the data on the token or smart card.
Icon Action
About – displays product version information, license information, enables license import and the
validation of SAC binary signatures
The SafeNet Authentication Client Tools window opens in the Simple view.
NOTE:
If a customized version of SafeNet Authentication Client is installed, the graphics you see
may be different from those displayed in this guide.
When at least one token is connected, an icon representing each connected token is displayed in the left
pane. The selected token is marked by a shaded rectangle.
Token Icons
The icon displayed indicates the type of token that is connected.
• Gemalto IDPrime MD
Smart Card reader – card connected:d 3840/3840 B
• SafeNet eToken 5110 • Gemalto IDPrime MD 830-FIPS
• Gemalto IDPrime MD 840/840 B For a full list of supported tokens, see
• Gemalto IDPrime MD 940/3940 B the SafeNet Authentication Client
Release Notes.
Note: This icon is also displayed when
connecting an IDPrime MD 940/3940
device, which needs to be activated
• Token with corrupted data using an Activation PIN.
See Chapter 5: Activating a Token
(page 34)
• Unknown token
Function Description
Unblock Token Unblocks the token and resets the token password
Delete Token Content Removes deletable data from the token (enabled by default)
The left pane provides a tree view of the different objects to be managed. The tree expands to show objects
of the connected tokens.
Tokens Node
When you select the Tokens node in the left pane, the list of connected tokens is displayed in the right pane, and
icons are displayed above them.
Log On to Token
Log On to Token
See Chapter 5: Logging On to the Token as a User, on page 30.
Import Certificate
Import Certificate
See Chapter 5: Importing a Certificate to a Token, on page 38.
Change Password
Change Password
See Chapter 5: Changing the Token Password, on page 32.
Rename Token
Rename Token
See Chapter 5: Renaming a Token, on page 31.
Copy to Clipboard
(None)
See Chapter 5: Viewing and Copying Token Information, on page 29.
NOTE:
Depending on the token type, additional options may be displayed in the dropdown menu.
Some administrator functions are available only if an Administrator Password has been set for the token. The
administrator icons are located on the right side of the window, enclosed within a border:
NOTE:
Administrator functions are not supported by iKey devices. The option is available on iKey
devices that were initialized using BSec with the keys. After an iKey device is locked the
option becomes available.
A node for each certificate is displayed in the left pane under the Certificate Type node.
NOTE:
Standard Common Criteria devices support only ECC 256. For more information please
refer to the IDPrime MD Card Configuration manual.
ECC Certificates
ECC Certificates are supported by eTokens and Gemalto IDPrime MD cards.
The following devices support ECC Certificates:
• SafeNet eToken PRO Java 72K ECC
• SafeNet eToken 5110, 5110 HID
• Gemalto IDPrime MD 830-FIPS
• Gemalto IDPrime MD 830-ICP
• Gemalto IDPrime MD 830 B
• Gemalto IDPrime MD 3810
• Gemalto IDPrime MD 3810 MIFARE 1K
• Gemalto IDPrime MD 3811
Export Certificate
Export Certificate
See "Exporting a Certificate from a Token" on page 42.
Set as Default
(None) Set as Default.
See "Setting a Certificate as Default or Auxiliary" on page 44.
Copy to Clipboard
(None)
See "Viewing and Copying Token Information" on page 29.
Settings Node
Each connected device has a Settings node. Select it to see the settings in the right pane.
The following tabs exist for eToken devices:
• Password Quality
See Chapter 11: Setting eToken Password Quality (Password Quality Tab), on page 96.
• Advanced
See Chapter 11: Setting Private Data Caching Mode (Advanced Tab), on page 98
NOTE:
The Advanced tab is not used for iKey devices.
The following tabs exist for IDPrime and eToken 5110 CC devices:
• PIN Quality
See Chapter 11: Setting IDPrime PIN Quality (PIN Quality Tab), on page 100
• Advanced
See Chapter 11: Setting IDPrime PIN Properties (Advanced Tab), on page 102
The certificate data or the key data of the orphan object is displayed in the right pane.
If your installation has been configured for virtual keyboard use, use it for the following functions:
• Token Logon
• Change Password
NOTES:
• The virtual keyboard is supported on Windows Operating Systems only.
• The virtual keyboard supports English characters only.
• To type an upper-case character, press Shift on your physical keyboard.
Verified Binaries:
The verified binaries are located under c:\windows\System32 and c:\windows\SysWoW64
The following binaries are verified:
• etCAPI.dll
• etCoreInst.dll
• eTOKCSP.dll
• eToken.dll
• eTPKCS11.dll
• etsapi.dll
• SNSCKSP.dll
• dkck201.dll
• eTokenMD.dll
• axaltocm.dll
NOTE:
The binary files above will be present in the System32 and SysWoW64 depending
on the customized installation parameters defined.
The DLL and EXE binaries are also verified under the following installation folders:
IDGo 800 Proxy and minidriver folders:
• C:\Program Files (x86)\Gemalto\IDGo 800 PKCS#11\
• C:\Program Files (x86)\Gemalto\IDGo 800 Minidriver\
SAC installation folder (default)
• C:\Program Files\SafeNet\Authentication\SAC\
This chapter describes the capabilities and limitations of using PIN pad readers with IDPrime cards. A PIN pad
reader can be any device that has a keyboard for secure PIN entry, this could for example be a keyboard with an
embedded smart card reader. PIN pad readers are usually associated with smart cards that have the PIN type set
up as External PIN.
The following cards are supported with PIN Pad readers:
• Gemalto IDPrime MD 830
• Gemalto IDPrime MD 830 B (FIPS level 2)
• Gemalto IDPrime MD 840
• Gemalto IDPrime MD 840 B
• Gemalto IDPrime 3840
• Gemalto IDPrime 3840 B
• Gemalto IDPrime 3810
• Gemalto IDPrime 3811
NOTE:
PIN Pad Readers can be used for Role 3 (Digital Signature PIN) of IDPrime MD cards.
Note that the PIN entry will be requested for each signature performed with Role 3 as Role
3 protects Certificates with Non repudiation Key usage.
• Change PIN (See Chapter 5: Changing the Token Password (page 32))
• Unlock Token by the Challenge Response Method (See Chapter 5: Activating a Token (page 34))
• When performing a See What You Sign (SWYS) operation, information is displayed on a SWYS reader
and must be signed using the SWYS PIN Pad reader.
Token Management
SafeNet Authentication Client Tools and the SafeNet Authentication Client tray menu enable you to control the
use of your tokens.
When running a management task, ensure that the appropriate token remains connected until the process
completes!
NOTE:
If a customized version of SafeNet Authentication Client is installed, the graphics you see
may be different from those displayed in this guide.
To set a token as the active token from the SafeNet Authentication Tools window:
1. Open SafeNet Authentication Client Tools.
See Chapter 3: Opening the Simple View, on page 10 or Opening the Advanced View on page 14.
2. In the left pane, select the required token.
NOTE:
The Unblocking Codes retries remaining field for iKey devices is displayed only when the
token is locked.
To log on as a user:
1. Open SafeNet Authentication Client Tools Advanced view.
See "Opening the Advanced View" on page 14.
NOTE:
If the Log Off from Token icon or the Log Off option is displayed, you are already logged
on to the token.
Renaming a Token
The token name does not affect the token contents. It is used solely to identify the token.
TIP:
If you have more than one token, we recommend assigning each one a unique token name.
To rename a token:
1. To use the Simple view to rename a token, do the following:
a. Open SafeNet Authentication Client Tools Simple view.
See "Opening the Simple View" on page 10.
b. In the left pane, select the required token.
c. In the right pane, select Rename Token.
d. Continue with 3 below.
2. To use the Advanced view to rename a token, do the following:
a. Open SafeNet Authentication Client Tools Advanced view.
See "Opening the Advanced View" on page 14.
b. Do one of the following:
• In the left pane, select the node of the required token.
SafeNet eTokens are supplied with an initial default token password. In most organizations, the initial token
password is 1234567890.
Gemalto IDPrime cards are supplied with an initial default token password: 0000.
To ensure strong, two-factor security, it is important for the user to change the initial token password to a private
password as soon as the new token is received.
When a token password has been changed, the new password is used for all token applications involving the
token. It is the user’s responsibility to remember the token password. Without it, the token cannot be used. The
administrator can set a token’s Password Quality settings to certain password complexity and usage
requirements.
NOTE:
The token password is an important security measure in safeguarding your company’s
private information. The best passwords are at least eight characters long, and include
upper- and lower-case letters, special characters such as punctuation marks, and
numbers appearing in a random order. We recommend against using passwords that can
be easily discovered, such as names or birth dates of family members.
3. To use the tray menu to change the token password, do the following:
a. Right-click the SafeNet Authentication Client tray icon.
b. If more than one token is connected, hover over the appropriate token.
c. Select Change Token Password.
d. Continue with step 4.
4. The Change Password window opens.
5. Enter the current token password in the Current Token Password field.
NOTE:
If an incorrect password is entered more than a pre-defined number of times, the token
becomes locked.
6. Enter a new token password in the New Token Password and Confirm Password fields.
7. Click OK.
A message confirms that the token password was changed successfully.
8. Click OK.
Activating a Token
The IDPrime MD 940/3940 is protected by an activation PIN and therefore must be activated before first use.
Entering an Activation PIN is required only once.
NOTE:
The term Token is used throughout the document and is applicable to both Smart
Cards and Tokens.
The token activation function can also be accessed quickly by right-clicking the tray menu.
Connecting an unactivated IDPrime 940/3940 device displays the Token with corrupted data icon in SAC Tools
this does not mean that the device is in fact corrupted, it simply needs to be activated.
To Activate a Token:
1. Connect the token.
The Token Activation window opens.
2. Click OK to continue with the activation process or Cancel to close the window without activating the token.
3. Enter the 4 digit Activation PIN and click OK.
If an incorrect activation PIN is entered more than 5 times, the token becomes locked, leaving the token in an
unusable state. The Token Activation retries remaining field is displayed at the bottom of the Token Activation
window.
4. After activating your token, open SAC Tools to view token information. Your device is ready to be used.
NOTE:
• Token functions are enabled only after the correct activation PIN has been entered.
NOTE:
The unlock feature is supported by eToken and IDPrime devices.
For IDPrime MD CC devices (IDPrime MD CC 840/3840) and eToken 5110 CC:
• If the device is in linked mode, the new user password is used for both the token
password and Digital Signature PIN when unblocking a device.
• If the device is in linked mode, with the default administrator password, the feature is
disabled.
CAUTION:
The administrator can limit the number of times that a token can be unlocked. If this number
is exceeded, the token becomes unusable.
This feature is available only for:
• Software tokens (for example: eToken Virtual)
• Legacy iKey profiles - not managed by SAM and based on SO PIN derivation
It is not supported by eToken based devices (nor by IDPRime).
When the administrator has access to the user’s token, the administrator can unlock the token using the Set
Token Password feature.
See Chapter 5: Setting a Token Password by an Administrator, on page 48.
Another way to unlock the token and set a new token password is to use the Challenge – Response
authentication method. The user sends the administrator the Challenge Code supplied by SafeNet Authentication
Client Tools, and then enters the Response Code provided by the administrator. The token becomes unlocked,
and the new token password set by the user replaces the previous password.
This method requires a management system, such as SafeNet Authentication Manager, that can generate
Response Codes.
NOTE:
In SafeNet Authentication Client version 8.2 (standard mode) and later, the Challenge-
Response unlock method supports both SafeNet eTokens and SafeNet iKey devices.
NOTE:
Unlocking the User PIN via the Challenge-Response method is not supported on Common
Criteria cards when the User PIN is protected by the PUK.
5. Contact your administrator, and provide the administrator with the Challenge Code value displayed.
NOTE:
To copy the Challenge Code to the clipboard, click the Copy to Clipboard icon.
CAUTION
• After providing the Challenge Code to the administrator, do not undertake any activities that
use the token until you receive the Response Code and complete the unlocking procedure.
If any other token activity occurs during this process, it will affect the context of the Challenge –
Response process and invalidate the procedure.
• For Gemalto IDPrime devices only - During the unlock operation any applications that
attempt to connect to the device will be suspended until the unlock operation is completed or
canceled.
NOTE:
Response Code creation depends on the back-end application being used by the
organization. Administrators should refer to the relevant documentation for information on
how to generate the Response Code.
7. Enter a new token password in the New Token Password and Confirm Password fields.
8. If the new password is known to others and must be changed, select Token Password must be changed
on first logon.
9. Click OK.
A message confirms that the token was unlocked successfully.
10. Click OK.
2. Depending on the configuration of your system, you can use the tray menu:
a. Right-click the SafeNet Authentication Client tray icon.
b. If more than one token is connected, hover over the appropriate token.
c. Select Delete Token Content.
d. Continue with step 3.
3. The Token Logon window opens.
4. Enter the token password, and click OK.
The Delete Token Content window opens, prompting you to confirm the delete action.
5. To continue with the delete process, click OK.
The Delete Token Content window opens, confirming that the token content was deleted successfully.
6. Click OK to finish.
NOTE:
It is not possible to import a certificate to a SafeNet Rescue Token.
To import a certificate:
1. Open SafeNet Authentication Client Tools Advanced view.
See "Opening the Advanced View" on page 14.
2. Do one of the following:
• In the left pane, select the node of the required token.
6. If you select Import a certificate from my personal certificate store, a list of available certificates is
displayed.
Only certificates that can be imported on to the token are listed. These are:
• Certificates with a private key already on the token
• Certificates that can be imported from the computer together with their private key
7. If you select Import a certificate from a file, the Certificate Selection window opens.
Select the certificate to import, and click Open.
8. If the certificate requires a password, the Password window opens.
Enter the certificate password, and click OK.
9. If the certificate is a Common Criteria certificate, the Import PIN window opens.
Enter the token’s Import PIN defined during token initialization, and click OK.
The default value is 1234567890.
10. All requested certificates are imported, and a message confirms that the import was successful.
To export a certificate:
1. Open SafeNet Authentication Client Tools Advanced view.
See "Opening the Advanced View" on page 14.
2. In the left pane, expand the node of the required token.
3. Do one of the following:
• Select the required certificate, and click the Export Certificate icon:
• Right-click the required certificate, and select Export Certificate from the shortcut menu.
The Save As window opens.
4. Select the location to store the certificate, enter a file name, and click OK.
NOTE:
The certificate file must be DER-encoded or Base64, and not PKCS #7.
NOTE:
iKey does not support Auxiliary certificates. It treats an Auxiliary certificate as a Default
certificate.
Deleting a Certificate
To remove a certificate from a token, follow the procedures below:
NOTE:
If ‘Read Only’ mode is enabled, the certificate will not be deleted. For more information,
see the SafeNet Authentication Client Administrator Guide.
NOTE:
• IDPrime devices have a built-in administrator role.
• iKey devices do not support administrator functions.
An administrator has limited permissions on a token. No changes to any user information can be made by the
administrator, nor can the user’s security be affected. The administrator can change only specific data stored on
the token only by using the following functions:
• Changing the Administrator Password (not supported by iKey devices)
• Setting a Token Password by an Administrator
• Activating a Token (not supported by iKey devices)
• Setting eToken Password Quality (Password Quality Tab)
• Setting IDPrime PIN Properties (Advanced Tab)
• Setting RSA Key Secondary Authentication
NOTE:
If an incorrect Administrator Password is entered more than a pre-defined number of times,
the token becomes locked.
4. Enter the new password in the New Administrator Password and Confirm Password fields.
5. Click OK. A message confirms that the password was changed successfully.
6. Click OK.
NOTE:
• The Unlock Token feature is for eToken devices only, whereas the Set Token Password
features is for eToken and IDPrime devices.
• When setting the token password, updating the retry counter can be performed only on
IDPrime devices.
NOTE:
The new token password must meet Password Quality settings defined for the token.
5. Set the Logon retries before token is locked field to the required number.
6. Click OK.
A message confirms that the token password was changed successfully.
7. Click OK.
The token is unlocked, and the user can now log on with the new token password.
Synchronizing Passwords
SafeNet Authentication Client supports synchronization between token/card passwords and domain logon
passwords.
Password synchronization can be configured via the 'Synchronize with Domain Password' registry key setting
(See the Token-Domain Password Settings section in the SafeNet Authentication Client Administrator Guide),
or via the SAC Customization Tool.
The synchronization process ensures that a single password is used for logging on to both the token/card and the
Windows domain. The process enforces the password complexity requirements that were set for the token as
well as in Active Directory. You must have access to the domain when changing the password.
To synchronize passwords:
1. Right-click the SafeNet Authentication Client tray icon.
The SafeNet Authentication Client tray menu opens.
2. Select Synchronize Password.
The Synchronize Passwords window opens.
3. Enter the current token password and the current domain password.
4. Enter the new token password, and confirm it.
5. Click OK.
You now have a single password for logging on to your token and Windows domain.
Every time you change your token password using SafeNet Authentication Client, your domain logon
password is changed to the same value.
NOTE:
If a token/card is configured with the ‘Token Password must be changed on first logon’
parameter and SAC is configured with the ‘Synchronize with Domain Password’ property,
only the Synchronize Password window is displayed.
Reader Settings
A token is connected to a reader when one of the following occurs:
• A token is physically inserted into a USB port
• A SafeNet Virtual Token is connected
• A smart card is physically inserted into a reader
During the default installation of SafeNet Authentication Client, the following numbers of virtual readers are
installed on the computer:
• 2 SafeNet eToken readers
• 2 iKey readers
• 1 virtual reader for SafeNet Virtual Token smart card emulation
• 2 SafeNet Virtual Token slots
The number of readers defined on the computer determines the maximum number of these types of tokens that
can be recognized upon connection.
The number of virtual SafeNet eToken readers and SafeNet Virtual Token slots for a computer can be changed by
a user with local administrator rights on that computer.
NOTE:
If SAC is already installed, the number of iKey readers can be configured during installation
via the command line.
3. Set the required number of virtual hardware or software readers in the appropriate field.
The default numbers of available readers are:
• SafeNet eToken readers: 2
• SafeNet Virtual Token slots: 2
4. Click OK to close the window.
The number of available readers is changed.
5. Restart SafeNet Authentication Client Tools to make the changes effective.
Token Initialization
NOTE:
You cannot use SafeNet Authentication Client to initialize a SafeNet Virtual product.
The Initialization Options window opens, allowing you to select how to initialize the token.
NOTE:
Initializing a token deletes all objects that were created on the device, while it was in use.
Preserve the token Select to keep current token policies and settings.
settings and policies
Configure all initializa- Select this option to change all token policies and settings.
tion settings and
policies
Token Name Enter a name for the token. If no name is entered, a default name is used.
In many organizations, the default token name is "My Token".
The token name does not affect the token contents. It is used solely to
identify the token.
Logon retries before Enter the number of times a token password can be entered incorrectly
token is locked before the token is locked.
Note: The retry counter will count only passwords that have a valid length.
Token password must If required, select token password must be changed on first logon.
be changed on first
logon
Create Administrator Select Create Administrator Password and enter a New Administrator
Password Password. The minimum password length on an eToken device is 8 char-
acters.
Note:
• Setting an Administrator Password enables certain functions to be
performed on the token, such as setting a new token password to
unlock a token.
• iKey tokens do not support Administrator Passwords.
Logon retires before Enter a numeric value. This counter specifies the number of times the
token is locked administrator can attempt to log on to the token with an incorrect password
before the token is locked. The default setting for the maximum number of
incorrect logon attempts is 15
5. Click Next.
The Password Quality Settings window opens.
Field Description
Select this option if you want to define password quality settings when
Enforce password quality
initializing a token. When selected, all options in the window become
settings (recommended)
available.
Maximum usage period (days) The maximum period, in days, before which the password must be
changed.
Default: 0 (none)
For iKey devices, the periods are rounded up to periods of weeks. See
row above for more information.
Expiration warning period (days) Defines the number of days before the password expires that a warning
message is shown.
Default: 0 (none)
History size Defines how many previous passwords must not be repeated.
Default:
For eToken devices - 10
For iKey devices - 6
Maximum consecutive repeti- The maximum number of repeated characters that is permitted in the
tions password.
Default: 3
This feature is not supported by iKey devices.
Must meet complexity require- Determines the complexity requirements that are required in the token
ments password.
• At least 2 types: a minimum of 2 complexity rules (out of the 4
shown in the Manual Complexity fields) are enforced.
• At least 3 types: a minimum of 3 complexity rules (out of the 4
shown in the Manual Complexity fields) are enforced (Default).
• None: Complexity requirements are not enforced.
• Manual: Complexity requirements, as set manually in the Manual
Complexity settings, are enforced.
Manual Complexity Rules For each of the character types (Upper-case letters, Lower-case
letters, Numerals and Special characters) select one of the following
options:
• Permitted - Can be included in the password, but is not mandatory
(Default).
• Mandatory - Must be included in the password.
• Forbidden - Must not be included in the password.
Note: The Forbidden option is not supported by iKey devices.
7. Click Next.
If the device is FIPS or Common Criteria, the FIPS and Common Criteria Settings window opens.
If the device is not FIPS or Common Criteria, this window will not be displayed.
Use this window to configure certification and common criteria settings.
Field Description
Enforce Common Check this options to define Common Criteria settings. When selected, the
Criteria settings Certificate Import Password and maximum number of certificates for which
to reserve space on the token can be set.
Common Criteria: an international standard for computer security certifi-
cation.
Certificates with 1024-bit To reserve adequate space on the token, set the maximum number of
keys Common Criteria certificates with 1024-bit keys that will be imported to the
token.
Select a number within the range 0 -16.
Certificates with 2048-bit To reserve adequate space on the token, set the maximum number of
keys Common Criteria certificates with 2048-bit keys that will be imported to the
token.
Select a number within the range 1- 16.
9. Click Next.
The Optional Cryptography Settings window opens.
Use this window to configure Cryptography and RSA Authentication Settings.
Field Description
Field Description
Use default initialization Select this option if the Initialization Key was not changed from its default
key during the previous token initialization. The factory-set default is used as
the key for the current token initialization.
Use this initialization Enter the Initialization Key configured in the This Value field during the
key previous token initialization.
Change the key for the • Default: Revert to the factory-set default so that the user is not required
next initialization to: to enter an Initialization Key during subsequent token initializations.
• Random: If selected, it will never be possible to re-initialize the token.
• This Value: Select and confirm a unique key. During subsequent token
initializations, the user must enter this key in the Use this Initialization
Key field.
NOTE:
The initialization key minimum length is 4.
Use this window to partition your SafeNet eToken 7300 device’s flash storage area. The partitioning process
allows you to do the following:
• Divide the flash drive into a DVD partition and a user storage partition
• Configure the flash drive partitioning settings
The partitioning process can take several minutes. After entering your token’s Administrator Password to
begin the partitioning process, do not disconnect your token until a confirmation message is displayed.
NOTE:
To enable the use of the SafeNet eToken 7300 flash tray icon, ensure that the ISO file or
other content written to the DVD partition includes the contents of the SafeNet default ISO
file.
Either one of the following can be performed on the SafeNet eToken 7300:
• Partition without initialization: Replace the flash drive’s DVD partition and user storage partition.
• Initialize and partition: Before the partition process is run, the data is deleted from the smart card
and new data is written to it.
NOTE:
• The SafeNet eToken 7300 initialization process always initializes the smart card and
partitions the flash drive.
• If partitioning settings are not set before the initialization proceeds, the default
partitioning settings are used.
Field Description
Field Description
User Storage Select the password requirements for accessing the user storage.
NOTE:
For future partitioning without initialization to be password-protected, the token must be
initialized with an Administrator Password.
16. Under Size, the following fields are displayed, and may not be edited:
Field Description
Total flash Total size of the flash memory (DVD + user storage).
Field Description
From DVD partition Select to load contents from DVD partition when the SafeNet eToken 7300
device is connected.
From user storage Select to load contents from user storage partition when the SafeNet
partition eToken 7300 device is connected.
NOTE:
The partitioning process can take several minutes. Do not disconnect the token until a
confirmation message is displayed.
NOTE:
This feature is available on eToken device only.
Setting Description
Always Every time an RSA key is generated, the user is prompted to create a secondary password
for accessing the key.
If the user clicks OK, the RSA key is generated, and the If the user clicks Cancel, RSA
password entered becomes the new key's secondary key generation fails.
password.
When using the certificate, the user must authenticate
once using the token password. For each operation that
requires the RSA key, the user must authenticate using
the secondary password.
Always Every time an RSA key is generated, the user is prompted to create a secondary password
prompt for accessing the key.
user
If the user clicks OK, the RSA key is generated, and the If the user clicks Cancel, the
password entered becomes the new key's secondary RSA key is generated without a
password. secondary password.
When using the certificate, the user must authenticate When using the certificate, the
once using the token password. For each operation that user must authenticate once
requires the RSA key, the user must authenticate using using the token password. No
the secondary password. additional authentication is
required for operations that
require the RSA key.
Prompt When using an RSA key generation application that When using applications that do
user on requires secondary passwords for strong private key not require secondary
application protection (such as Crypto API with a user-protected passwords for strong private key
request flag, or the PKCS#11 CKA_ALWAYS_AUTHENTICATE protection, the RSA key is
attribute), the user is prompted to create a secondary generated without a secondary
password for accessing the RSA key. password.
When using the certificate, the
If the user clicks OK, the RSA key is If the user
user must authenticate once
generated, and the password entered clicks Cancel,
using the token password. No
becomes the new key's secondary RSA key gen-
additional authentication is
password. eration fails.
required for operations that
When using the certificate, the user require the RSA key.
must authenticate once using the
token password. For each operation
that requires the RSA key, the user
must authenticate using the
secondary password.
Setting Description
Never Secondary passwords are not created for new RSA keys.
When using the certificate, the user must authenticate once using the token password. No
additional authentication is required for operations that require the RSA key.
Token Secondary passwords are not created for new RSA keys.
authentica- When using the certificate, the user must authenticate once using the token password.
tion on
application When using an RSA key generated by an application When using an RSA key that
request that requires secondary passwords for strong private was not generated by an appli-
key protection (such as Crypto API with a user cation that requires secondary
protected flag, or the PKCS#11 CKA_ALWAYS_AU- passwords for strong private key
THENTICATE attribute), the user must authenticate protection, no additional authen-
using the token password for each operation that tication is required for operations
requires the RSA key. that require the RSA key.
NOTE:
• The screens displayed during the initialization process are available in English localization
only.
This section explains how to initialize IDPrime based Common Criteria and Non Common Criteria devices.
Preserve the token Select to keep current token policies and settings.
settings and policies
Configure all initializa- Select this option to change all token policies and settings. Selecting this
tion settings and policies option will allow you to:
• Create a token password
• Create an administrator password
• Enter the default token and administrator passwords
• Enter Common Criteria passwords (PIN and PUK)
4. Click Next.
The Administrator Logon window opens. This window requires you to enter an Administrator Password
and a Digital Signature PUK to begin the initialization process.
NOTE:
• Gemalto IDPrime MD cards that are Common Criteria certified, are in unlinked mode by
default.
• The procedures and screens described in this section are based on the fact that your IDPrime
MD token/card is being used for the first time.
The above window is displayed if your device is in unlinked mode as it's received from the factory.
Use factory default • Select this check-box if the current administrator password is 48 0's. If
administrator password selected, the Administrator Password field below is shaded showing
the default password.
• Deselect it if the current administrator password is different from the
factory default.
Administrator Password Enter the current administrator password, that's different from the factory
default.
Use factory default • Select this check-box if the current digital signature PUK is 6 zeros
digital signature PUK (000000). If selected, the Digital Signature PUK field below is shaded
showing the default password.
• Deselect it if the current Digital Signature PUK is different from the
factory default.
Digital Signature PUK Enter the current Digital Signature PUK, that's different from the factory
default.
6. Click Next.
The Password Settings window opens.
Token Name Enter a name for the token. If no name is entered, a default name is used.
In many organizations, the default token name is "My Token".
The token name does not affect the token contents. It is used solely to
identify the token.
New Token Password The default password: 1234567890 automatically appears in this field.
Note: If the device is initialized with the default token/card password, and
standard password quality requirements are in effect, the user must select
the Token Password must be changed on first logon option. Otherwise the
initialization will fail because the default password does not meet the
password quality requirements. If the token password must be changed on
first logon option is selected, the initialization will succeed and the user will
be prompted to create a new password when next logging on with the
token/card. The user will be required to set a token password that meets
the Password Quality requirements configured in the Settings window.
Confirm Password The default password: 1234567890 automatically appears in this field.
If the above field was changed, then re-enter the password entered in the
'New Token Password' field.
Logon retries before Enter the number of times a token password can be entered incorrectly
token is locked before the token is locked.
For Common Criteria devices that are in linked mode, the maximum value
displayed is 3. When in unlinked mode, the value displayed is 15. This
value cannot be changed for both linked and unlinked modes.
Token password must If required, select token password must be changed on first logon.
be changed on first Note: When initializing a device in Unlinked mode, and this option is
logon selected, both the Token (User) Password and Digital Signature PIN are
effected (ensure that both the Token Password and Digital Signature PIN
are changed).
Create Administrator If necessary, enter a new administrator password, that's different from the
Password current administrator password. Your current password may be the default
password or a different password. Only you know this password.
You can change the default Administrator Password to a password that is
between 8-32 alphanumeric characters (or to 48 hexadecimal digits). See
Chapter 2: Friendly Admin Password (page 4).
Keep the current admin- Select this if you want to keep the current administrator password.
istrator password Note: If this option is selected, the following warning message appears:
If the current password is the default password (48 0's), it is strongly rec-
ommended to update the administrator password to keep your token
secure.
8. Click Next.
The IDPrime Common Criteria Settings window opens.
The IDPrime Common Criteria Settings window allows you to define Common Criteria passwords, which are
made up of a Digital Signature PIN (User Password) and Digital Signature PUK (Administrator Password).
This IDPrime Common Criteria Settings window defines whether you are going to work in linked or unlinked
mode.
Use the same token and Select this option to perform digital signing operations using your current
administrator passwords Token and Administrator passwords.
for digital signature Note: Selecting this option does not require entering a Digital Signature
operation PIN and Digital Signature PUK. The fields below will be unavailable.
New Digital Signature Enter a New Digital Signature PIN. This option allows you to work in
PIN ‘unlinked’ mode.
New Digital Signature Enter a New Digital Signature PUK. This option allows you to work in
PUK ‘unlinked’ mode.
Preserve the token Select to keep current token policies and settings.
settings and policies
Configure all initializa- Select this option to change all token policies and settings. Selecting this
tion settings and policies option will allow you to:
• Create a token password
• Create an administrator password
• Enter the default token and administrator passwords
4. Click Next.
The Administrator Logon window opens. This window requires you to enter an Administrator Password.
5. Enter the current Administrator Password. The default Administrator Password is 48 zeros.
Enter the following:
Use factory default • Select this check-box if the current administrator password is 48 0's. If
administrator password selected, the Administrator Password field below is shaded showing
the default password.
• Deselect it if the current administrator password is different from the
factory default.
Administrator Password Enter the current administrator password, that's different from the
factory default.
6. Click Next.
The Password Settings window opens.
Token Name Enter a name for the token. If no name is entered, a default name is used.
In many organizations, the default token name is "My Token".
The token name does not affect the token contents. It is used solely to
identify the token.
New Token Password The default password on an eToken device is 1234567890 automatically
appears in this field.
The default password on an IDPrime MD card is 4 zeros (0000)
Note: If the device is initialized with the default token/card password, and
standard password quality requirements are in effect, the user must select
the Token Password must be changed on first logon option. Otherwise the
initialization will fail because the default password does not meet the
password quality requirements. If the token password must be changed on
first logon option is selected, the initialization will succeed and the user will
be prompted to create a new password when next logging on with the
token/card. The user will be required to set a token password that meets
the PIN Quality requirements configured in the Settings window.
Confirm Password The default password (1234567890) automatically appears in this field.
If the above field was changed, then re-enter the password entered in the
'New Token Password' field.
Logon retries before Enter the number of times a token password can be entered incorrectly
token is locked before the token is locked.
Token password must If required, select token password must be changed on first logon.
be changed on first Note: When initializing a device in Unlinked mode, and this option is
logon selected, both the Token (User) Password and Digital Signature PIN are
effected (ensure that both the Token Password and Digital Signature PIN
are changed).
Create Administrator If necessary, enter a new administrator password, that's different from the
Password current administrator password. Your current password may be the default
password or a different password. Only you know this password.
You can change the default Administrator Password to a password that is
between 8-32 alphanumeric characters. See Chapter 2: Friendly Admin
Password (page 4).
Logon retires before Enter the number of times an administrator password can be entered
token is locked incorrectly before the token is locked.
This field is read only.
Keep the current admin- Select this if you want to keep the current administrator password.
istrator password Note: If this option is selected, the following warning message appears:
If the current password is the default password (48 0's), it is strongly rec-
ommended to update the administrator password to keep your token
secure.
SafeNet Authentication Client supports the SafeNet Virtual Token line of products. This includes SafeNet Virtual
Token and SafeNet Rescue Token devices.
To obtain a SafeNet Virtual Token file, contact your administrator.
• In the left pane, right-click the Tokens node, and select Connect SafeNet VirtualToken from the
shortcut menu.
3. Navigate to the SafeNet Virtual Token file (*.etvp) or SafeNet Rescue Token file (*.etv), and double-click it.
The SafeNet Virtual product is connected.
• In the left pane, select the node of the required eToken Virtual or SafeNet Rescue Token.
In the right pane, click the Disconnect SafeNet Virtual Token icon:
• In the left pane, right-click the node of the required eToken Virtual or SafeNet Rescue Token, and
select Disconnect from the shortcut menu.
c. Continue with step .
The Disconnect SafeNet Virtual Token window opens.
3. Do one of the following:
• To keep the SafeNet Virtual Token or SafeNet Rescue Token file on the computer or device for later
use, click Disconnect.
Only the token connection to SafeNet Authentication Client is disconnected. It can be reconnected
later. See "Connecting a SafeNet Virtual Token" on page 75.
• To disconnect the token from SafeNet Authentication Client, and also remove the SafeNet Virtual
Token or SafeNet Rescue Token file from the computer, click Delete.
After a SafeNet Virtual Token or SafeNet Rescue Token is deleted, it cannot be reconnected later. A
new file must be installed before it can be connected.
NOTE:
The number of times that a SafeNet Virtual Token can be locked can be limited to a specific
amount. If this number is exceeded, the SafeNet Virtual Token becomes unusable. This
function is not available for a SafeNet Rescue Token.
To generate an OTP:
1. Right-click the SafeNet Authentication Client tray icon.
The SafeNet Authentication Client tray menu opens.
2. Select Generate OTP.
The Generate OTP window opens.
NOTE:
Depending on your SafeNet Authentication Client configuration, you may need to include
other secure information, such as your OTP PIN or Windows password.
Before removing the storage device, you must disconnect the eToken Virtual manually. See "Disconnecting or
Deleting a SafeNet Virtual Token" on page 76. Otherwise, the eToken Virtual will be displayed in SafeNet
Authentication Client as a token with corrupted data.
For more information about token icons, see Chapter 3: Token Icons, on page 12.
Common Criteria
SafeNet Authentication Client supports Gemalto IDPrime MD Common Criteria (CC) card range (See the
Supported Tokens and Smart Cards section in the SafeNet Authentication Client Release Notes for a detailed list
of cards), as well as eToken 5110 CC.
NOTE:
• If the device is in unlinked mode, the new user password is used for both the token password
and Digital Signature PIN when unblocking a device.
• When initializing a device in unlinked mode and the Token Password Must be changed at
first logon option is selected, both the Token (User) Password and Digital Signature PIN are
effected (ensure that both the Token Password and Digital Signature PIN are changed).
In the right pane, click the Change Digital Signature PIN icon:
b. In the left pane, right-click the node of the required token, and select Change Digital Signature PIN
from the shortcut menu.
The Change Digital Signature PIN window opens.
In the right pane, click the Change Digital Signature PUK icon:
b. In the left pane, right-click the node of the required token, and select Change Digital Signature PUK
from the shortcut menu.
The Change Digital Signature PUK window opens.
In the right pane, click the Change Digital Signature PIN icon:
b. In the left pane, right-click the node of the required token, and select Set Digital Signature PIN from the
shortcut menu.
The Digital Signature PUK Logon window opens.
NOTE:
• If the device is in linked mode, with the default administrator password, the feature is disabled.
• Linked Mode is not compatible with the Multi-Slots feature.
This column indicates the This column indicates which This column indicates which password is
type of operation performed. password is required to required to perform the specified operation on
perform the specified IDPrime 840/3840 and eToken 5110 CC
operation on an eToken 5100 devices.
CC device.
Generate sign only key Token Password Token Password + Digital Signature PIN
pair
Import sign only key pair Import Password Token Password + Digital Signature PIN
Delete sign only key pair Token Password Token Password + Digital Signature PIN
Sign with sign only key Token Password Digital Signature PIN
pair
SafeNet eToken 5300 is an ideal solution for enterprises looking to deploy the military-grade security of PKI, while
maintaining a convenient solution for employees. The eToken 5300 is a compact, tamper-evident USB with
presence detection, which creates a third factor of authentication. Something you have (physical token),
something you know (PIN), something you do (enabling touch sensor). The eToken 5300 offers multi-application
dynamic smart card functionality. It can be used with any USB connection for Identity and Access Management
applications such as network authentication, digital signatures, email encryption and other advanced services
based on Public Key Infrastructure (PKI). The eToken 5300 is certified FIPS 140-2 L3 at the full token boundary.
With the Presence Detection feature, enterprise IT can allow single sign on for employees by requiring a user PIN
only at logon. That way, employees can use the advance functionality of PKI, such as digitally signing documents
and encrypting email by simply touching the sensor on the token, which provides authentication without entering
a PIN multiple times. If enterprise IT want more control of specific certificates they can set rules to either always
require the user to enter a password or always require both user password and sensor activation when accessing
those particular certificates.
NOTE:
• The eToken 5300 configuration is defined at the factory and cannot be changed.
• When using the eToken 5300 configured with touch sense support for Signature keys,
signature operations with an Exchange certificate will not be touch sense protected.
NOTE:
Configuration information displayed in SAC Tools varies according to how the token was
received from the factory.
Client Settings
Client Settings are parameters that are saved to the computer and apply to all tokens that are initialized on the
computer after the settings have been configured. Use token settings to determine behavior that applies to a
specific token. See Chapter 11: “Token Settings” on page 96.
NOTE:
The token password is an important security measure in safeguarding your company’s
private information. The best passwords are at least eight characters long, and include
upper-case and lower-case letters, punctuation marks, and numerals appearing in a
random order.
TIP:
The Password Quality settings are configured the same way as the Token Password
quality settings.
See Chapter 11: Setting eToken Password Quality (Password Quality Tab), on page 96.
NOTE:
When entering a value in the Expiry warning period field, you must make sure that a value
is also entered in the Maximum usage period field. If no value is entered in the Maximum
usage period field, an error message appears.
NOTE:
Microsoft displays a security warning when it detects that CA certificates are be installed
to the local store. To permit the certificates to be installed from the token, the user must
click Yes.
NOTE:
When single logon is set using SafeNet Authentication Client Tools, Windows Logon is
not included in the single logon process. Only an administrator can configure Windows
Logon as single logon.
NOTE:
This feature is not supported by iKey tokens.
Enabling Logging
The logging function creates a log of SafeNet Authentication Client activities.
NOTE:
You must have administrator privileges to use the logging function.
NOTE:
You must restart your machine for the settings to take effect.
Token Settings
Configurations set in the selected token’s Settings tab determine behavior that applies to the specific token.
For configurations set in Client Settings, that apply the settings to all tokens that are initialized after the settings
have been configured, see Chapter 10: Client Settings, on page 91.
Maximum usage period (days) The maximum period, in days, before which the password
must be changed.
Default: 0 (none)
For iKey devices, the periods are rounded up to periods of
weeks (7 days), even though the period is displayed in days.
For example, if the period is displayed as less than a week,
say 6 days, iKey regards it as a week. If the period is more
than two weeks, say 15 days, iKey regards it as three weeks.
Minimum usage period (days) The minimum period before the password can be changed.
Default: 0 (none)
For iKey devices, the periods are rounded up to periods of
weeks. See row above for more information.
Expiration warning period (days) Defines the number of days before the password expires that
a warning message is shown.
Default: 0 (none)
History size Defines how many previous passwords must not be repeated.
Default:
For eToken devices - 10
For iKey devices - 6
Must meet complexity requirements Determines the complexity requirements that are required in
the token password.
• At least 2 types: a minimum of 2 complexity rules (out of
the 4 shown in the Manual Complexity fields) are enforced.
• At least 3 types: a minimum of 3 complexity rules (out of
the 4 shown in the Manual Complexity fields) are enforced
(Default).
• None: Complexity requirements are not enforced.
• Manual: Complexity requirements, as set manually in the
Manual Complexity settings, are enforced.
Manual complexity rules For each of the character types (Numerals, Upper-case
letters, Lower-case letters, and Special characters) select
one of the following options:
• Permitted - Can be included in the password, but is not
mandatory (Default).
• Mandatory - Must be included in the password.
• Forbidden - Must not be included in the password.
Note: The Forbidden option is not supported by iKey
devices.
In SafeNet Authentication Client, public information stored on the token is cached to enhance performance.
This setting defines when private information (excluding private keys on the eToken PRO / NG OTP / smart card)
can be cached outside the token.
4. In the Private data caching field, select one of the following options:
Option Description
Always (fastest) Always caches private information in the application memory. This
enables fast performance, as certain information is cached on the host
machine. However, this option is less secure than if no cache is allowed.
While user is logged on Caches private data outside the token as long as the user is logged on to
the token. Once the user logs off, all the private data in the cache is
erased.
NOTE:
This feature is not supported by iKey, IDPrime MD, .NET and eToken 5110 CC devices.
NOTE:
For an explanation of these options, see Chapter 6: Setting the RSA Key Secondary
Authentication Field, on page 62.
NOTE:
In the MD Manager, the unlimited value = FFh
In SAC Tools, the unlimited value = 00h
Maximum length (characters) The maximum value that can be set for the length of a
PIN’s value. This value must be in the range 04h - 40h
for a local PIN and 04h - 10h for the global PIN. This
value must be equal to or greater than the PIN Min.
length value.
Number of different characters The number of different characters that can be repeated
that can be repeated at least at least once. Range is 00h-FFh.
once 00h = No limitation
Maximum number of times a The maximum number of times a character can appear.
character can appear Range is 00h-FFh.
00h = No limitation
Manual complexity rules For each of the character types (Numeric, Alpha upper,
Alpha lower, Alpha, non alpha, Non ASCII)
• Numeric = 30h...39h
• Alpha upper = 41h...5Ah
• Alpha lower = 61h...7Ah
• Alpha = 41h...5Ah + 61h...7Ah
• Non alpha = 20h...2Fh + 3Ah...40h + 5Bh...60h +
7Bh...7Fh
• Non ASCII = 80h...FFh?
For IDPrime MD cards, the following PIN property parameters exist in the Advanced Tab:
PIN Purpose Defines the purpose of the PIN. This property is for
information only.
The following options are available:
• Authentication PIN
• Digital Signature PIN
• Encryption PIN
• Non Repudiation PIN
• Administrator PIN
• Primary Card PIN
• Unlock Only PIN
Validity period (days) The maximum period, in days, before the PIN must be
changed. When the PIN expires, the user is forced to
change the PIN value the next time that the PIN is pre-
sented.
Default: 0 (no validity period)
Note: The PIN validity settings (Validity period and Expi-
ration warning period) cannot be modified when using
IDPrime MD 830B.
Expiration warning period (days) Defines the number of days before the PIN expires that
a warning message is shown.
Default: 0 (no warning)
NOTE:
PIN Quality and PIN Property settings may also be accessed when Initializing a device.
See Chapter 6: Initializing IDPrime Based Devices (page 64).
Licensing
The About window opens, displaying your license information in the License Information box.