Home
KOBIL mIDentity V1.5.2 User Manual
Contents
1. JT Define ADK Additional Decryption Key Back Next 7 Cancel A Figure 3 8 Assign certificates miDentity initialisation assistant Step 3 of 4 Please select the certificate which should be imported available certificates lt My Certificate beuser bze poolrechner2 Certificate information Subject ae CN beuser C DE L Worms OU Development O Kobil Systems GmbH Figure 3 9 Select a certificate As a final step of the initialization the Wizard will display the current KOBIL mIDentity setup status 16 miDentity initialisation assistant xj Step 4 of 4 Summary PUK and PIN were successfuly created The certificate was imported successfully Cettificate s name lt My Certificate gt The certificate lt My Certificate gt will be used to encrypt your SSO accounts and Secure Data Storage Figure 3 10 Finish screen 3 3 2 Specifics of an T TeleSec E4 NetKey Card from T Systems Some of KOBIL mIDentity supported SmartCard s has a different behavior in delivery status The E4 NetKey Card is shipped in a transport or null PIN state This means after you reciept the card the PIN is already set A transport or null PIN is a six digit long PIN with all digits set to zero When using this card for the first time you have to change the PIN to an individual PIN which can be choosen by yourself A further specific is a so called ePUK ePUK means a PUK which is calculated automaticl
2. Installshield Figure 2 5 Installation Path selection 8 In the last dialog box click Finish to complete the installation InstallShield Wizard InstallShield Wizard Complete KOBIL mlDentity Setup is almost complete Choose the options you want below 7 would like to view the README file If you copied or started the KOBIL mlDentity Setup from the memory of KOBIL mlDentity then disconnect and reconnect KOBIL mlDentity before further use Click Finish to complete KOBIL mlDentity Setup lt Back Cancel Figure 2 6 Complete the Installation Note Before using the KOBIL mIDentity Software for the first time please take a look into the installed user manual as well as the release notes to get the latest product information After successful installation please double click the KOBIL mIDentity icon on your computers desktop to start the KOBIL mIDentity Software The software runs in the Windows Tray Bar at the right bottom next to the system clock You can right click on this icon to open the fast access menu or perform a double click to open the main window 2 3 Entering the License Key As long as no KOBIL mIDentity device is plugged in all functionality except the user manual is disabled Depending on the KOBIL mIDentity package you have purchased not all functions of the software are enabled after inserting the device If you are using KOBIL mIDentity Light or KOBIL mIDentity Basic u
3. D Contents tak Figure 4 7 Learning the user name You can fill out more text areas by repeating that step as often as required 4 KOBIL mIDentity recognizes automatically password fields and opens the password dialog You can select either a static password enter twice or a one time password OTP generated by the KOBIL SecOVID system which requires a KOBIL SecOVID generator on your KOBIL mIDentity SmartCard Connect to yellow m Connecting to Yellow vm G test User name Password D Learning the input windows left mouse button choose input window right mouse button next ESC cancel learning procedure Figure 4 8 Learning the password 40 Choose password type x Please choose the type of the password to be used static password or one time password OTP Description a m Password type Passwor Static password m Validation C One time password OTP LS OK 7 Cancel Figure 4 9 Learning the password Note that one time passwords OTP require additionally the KOBIL SecOVID Server Please refer to your local KOBIL dealer or direclty to http www kobil com SecOVID if you have questions about KOBIL SecOVID 5 Right click in order to finish learning the password dialog Now you can finally select the OK button with a left mouse click which finishes the learning process 41 Connect to Source_sale j 1 7 x Connecting to Source_safe
4. Scrambled digest is called as signature Internet Digital MIEN Envelope Depart Chek Ty Public Key Of sender Decryption a session key LA 7T Recipient Private Key Recipient Private Key Figure A 11 Recipient Process in S MIME 109 Appendix B Glossary Algorithm A mathematical formula used to perform computations that can be used for security purposes Authenticate To determine the identity of the entity that signed a message entity authentication or to verify that a message was not altered data authentication Certificate Authority CA An entity with the authority and methods to certify the identity of one or more parties in an exchange an essential function in public key crypto systems Cryptography The art and science of transforming confidential information to make it unreadable to unauthorised parties Data Encryption Standard DES A block cipher that encrypts data in 64 bit blocks DES is a symmetric algorithm that uses the same algorithm and key for encryption and decryption Developed in the early 1970s DES is also known as the DEA Data Encryption Algorithm by ANSI and the DEA 1 by ISO Decryption The process in which ciphertext is converted to plaintext Digital Certificate A digital certificate provides identification for secure transactions It consists of a public key and other data about the user all of which is digitally signed by a Certificate Authority It is a conditi
5. e Supported Software Microsoft Internet Explorer 5 5 Microsoft Outlook from version 2000 SR 1 or Microsoft Office from version 2000 e Hardware 256 MB RAM 20 MB free Hard Disk space A free USB 1 1 or USB 2 0 port please find special Server Setup on CD Chapter 2 Getting started with KOBIL mIDentity 2 1 Insert your KOBIL mIDentity SmartCard Together with your KOBIL mIDentity you receive a SIM sized SmartCard which is either shipped together with KOBIL mlIDentity or seperately handed out from your system administrator You have to break out the SmartCard similar to mobile phones and insert it into KOBIL mIDentity 422000035335 aa4us0 Figure 2 1 Insert the KOBIL mIDentity SmartCard Note Please remove the KOBIL mIDentity SmartCard only when KOBIL mIDentity is NOT plugged into the computer s USB port Use the lit cover in order to simplify SmartCard remove Figure 2 2 Remove the SmartCard from KOBIL mIDentity 2 2 KOBIL mIDentity Software Installation The KOBIL mIDentity software can be used for all mIDentity models and either is shipped together with the KOBIL mIDen tity package on a CD ROM or you can download the most recent version in the internet under http www kobil com mIDentity Take a look here from time to time to see if new updates are available 1 Start your PC Note Please make sure that your KOBIL mIDentity is not plugged in while the software setup is running 2 M
6. not available SSO and Secure Data Storage not assigned certificate assignment Click Next to continue Back Next y Cancel y Figure 3 4 KOBIL mIDentity initialisation assistant empty card 1 Set up PIN and PUK PIN Personal Identification Number is used to access the KOBIL mIDentity storage You can choose your own PIN as a combination of 6 16 alphanumeric characters PUK PIN Unblocking Code is used to unlock a locked PIN You can define your own PUK or ask the system to generate a PUK for you The PUK must be a combination of 6 16 alphanumeric characters It is recommended to choose the system generated PUK option since human created character sequences tend to be highly predictable e g birthday Make sure you print the generated PUK and save it in a secure place see figureB 5 13 miDentity initialisation assistant Step 1 of 3 Enter PIN and PUK 6 16 chars long Pa PIN No exxexx confirm PIN Shama The PUK is required to unlock a locked PIN PUK oN confirm PUK N IV System generated PUK Print PUK xi Your PUK is iyOmevdf3y Note The PUK is needed to unlock your PIN OK d Y F Print 7 Figure 3 5 Set up PIN and PUK show and print the PUK 2 Create a certificate for encryption To encrypt data you require a certificate You can create your own certificate in PKCS 7 format or import a certificate in PKCS 12 format from your PC This certific
7. 75 nres tol File Edit view Favorites Tools Help Q px 2 gt Search Folders E Size Type 25KB K55fFile Open KOBIL mIDentity gt 5i e Open With ee Send To 3 Secure Erase Cut Copy E Create Shortcut Figure 5 17 Context menu for file directory signature verification 2 Choose KOBIL mIDentity gt Verify Signature 3 The status dialogue as shown in figure appears In the choice box you can see the verification status for each file Click on a file name to see the corresponding signature certificate below 76 File Directory Signature Yerification Status File List COZAR Secret doc k C Documents and Settings skobil My Documents My Files SIGNING TIME Tuesday 11 January 2005 10 36 35 Signer Signature Status Signature Certificate Detail 8949017200002174742 Subject CN 9949017200002174743 uer CN 894901 7200002174743 Serial Number 263BABEC8D 20C9424FAADEOBS74 Figure 5 18 Signature Verification Status 4 All verified files are stored without the ending kss in a new file If the signature file with the ending kss is deleted or not depends on the configuration as described in section 6 3 9 Signature verification for directories works exactly as for single files Just select a directory you want to verify with the right mouse All signed kss files in that directory will be extracted original files without signature and at
8. CLIENT 1 Create a random data D1 SERVER 1 Create a random Server Cert signature of D1 data D2 D2 2 Sign D1 2 Verify Server Cert 3 Verify the sig of D1 4 Sign D2 5 Create a random Data D3 3 6 Encrypt D3 with Client Cert signature of D2 Server Cert Encrypted D3 3 Verify Client Cert 4 Verify the sig of D2 5 Decrypt D3 SSL Web Session is established Internet 7 Calculate Session N ANS 6 Calculate Session Key with D1 D2 j INK Key with D1 D2 and D3 and D3 Figure A 9 Secure Socket Layer A 3 8 Secure Multipurpose Internet Mail Exchange S MIME Secure Multipurpose Internet Mail Extensions S MIME is an open protocol standard developed by the RSA Laboratories that provides encryption and digital signature functionality to Internet e mail S MIME uses public key cryptography standards to define e mail security services S MIME includes offline processes The sender s process is illustrated in figure A I0 the recipient s process is illustrated in figure A II 107 Scrambled digest is called as signature private Key epee T Signing senus epee T rneecper Digital Envelope Append Nb H Ag Encrtpt with ORIGINAL Session Key DATA Wrap with Random ini Encryption i gt Recipient session key Public Key Recipient Public Ke Sender does not have the recipient Private Key Figure A 10 Sender Process in S MIME 108
9. Code the PIN can be unlocked similar to mobile phones You get your PIN either together with the KOBIL mIDentity SmartCard from your system administrator or if the SmartCard is still empty you can set the initial PIN and PUK at the first usage of KOBIL mIDentity Please remember PIN and PUK very well since without them you cannot use KOBIL mIDentity 12 3 3 1 Initialization of the SmartCard Once the KOBIL mIDentity setup software have been installed on your PC see section P you can use the device Start the KOBIL mIDentity Control Centre application and plug KOBIL mIDentity into the docking station or directly to an USB port on your PC If your KOBIL mIDentity SmartCard has already been initialized i e PIN PUK and an encryption certificate were defined then you can proceed with entering the PIN number to access the card storage If your SmartCard is empty which means PIN PUK and an encryption certificate are not defined the KOBIL mIDentity Installation Wizard will guide you through KOBIL mIDentity installation procedure The Wizard will appear on your PC screen The very first screen of the Installation Wizard shows SmartCards current status see figureB 4 Follow the instructions on screens to complete installation miDentity initialisation assistant xj The mlDentity Initialization Wizard will guide you through the mlDentity setup iial Current Smart Card status PIN not defined PUK not defined Certificate
10. NT KOBIL mIDentity also decrypts files that were not encrypted using KOBIL mIDentity if they are in PKCS 7 format and you have the corresponding private key of course ioj xi File Edit view Favorites Tools Help w E Back o 7 i q Search Sar Folders ia Address jo C Documents and Settings kobil My Documer gt Go Name Size Type Date Modified Date Pictur Tt ie 10 26 Open KOBIL mIDentity gt Decrypt z Add Remove Recipients _DRROIE ne List Send To gt A e BO CUL Os thee Cut Copy 4 Create Shortcut Figure 5 13 Context menu for file directory decryption Directory decryption happens exactly the same way as file decryption just select the directory you want to decrypt with the right mouse instead of a single file All kse files in that directory will be decrypted in one pass but you have to enter your KOBIL mIDentity SmartCard s PIN only once If not all files in that directory could be processed either could not be decrypted or not all files are kse files you will get a corresponding warning 72 5 3 4 File and Directory Signature Important this section only covers simple or enhances signatures according to the European Signature Act If you KOBIL mIDentity version supports qualified signatures please refer to the section Qualified Signatures If you want to digitally sign a file proceed as follows 1 Right click on the file you want to sign The conte
11. R3 support please contact your certified KOBIL partner 96 Appendix A Cryptographic Basics and Standards A 1 Security Objectives Confidentiality Protection from disclosure to unauthorised persons who may try to listen to communication or to steal some information Integrity Maintaining data consistency Nobody except the originator can change the information while it is stored somewhere or transfered in an insecure media like the Internet Authentication Non repudiation Access control Assurance of identity of a person or an originator of data The originator of some data cant deny it later Unauthorized persons are kept out A 2 Terms and Basics Cryptography is the science of keeping information secure Cryptographic systems usually consist of two implemented processes encryption and decryption Encryption is the process of transforming a message the plaintext into another message the ciphertext such that it is computationally infeasible to derive the plaintext data by reversing the process without knowledge of secret parameters Many cryptographic algorithms mathematically combine input plaintext data and an encryption key to generate ciphertext data Decryption is the reverse process of encryption and transforms the ciphertext data back into the original plaintext data by using a complex function and a decryption key One of the goals of cryptography is to raise the cost of guessing the decryption key beyond what is practi
12. activating in the menu Extras gt Accounts gt Directory Service gt Properties tge option Check recipient addresses with this directory service Once you have successfully imported another user s certificate you can take a look at it in the Windows certificate manager under Other People sce section B 4 3 Es Find People 1 entries found i 2 xi Look in Veris ign Internet Directory Service x Web Site People Advanced Eind Now Name test user kobil Stop E mail Clear All Close Delete Add to Address Book E Mail Address kobil_1 kobil com tr test user kobil Figure 3 17 Find People Dialog 3 4 6 Import an existing certificate onto the KOBIL mIDentity SmartCard If you already possess a software certificate P you can import it into KOBIL mIDentity including the private keys these certificates are stored in PKCS 12 or PF X files instead of a SmartCard 26 You can import any software certificate stored in the Windows Certificate Manager that is marked as exportable Open the Control Centre Software and choose the option Properties gt Identity and click on the drawer Card the button Import If you have the software certificate only as a PKCS 12 or PFX file you should import it first into the Windows Certifi cate Manager by double clicking it Follow the import wizard s instructions and take care to mark the certificate as exportable F
13. inside so called Secure Data Storages also called Container A Secure Data Storage is a virtual hard disk with an own drive letter that is stored physically in one huge encrypted file ldoes not apply to KOBIL mIDentity Light 2does not apply to KOBIL mIDentity Light 59 inside your regular file system The Secure Data Storage is encrypted using the KOBIL mIDentity SmartCard so the Secure Data Storages content is always strongly encrypted Without the KOBIL mIDentity SmartCard and its PIN nobody can access the Secure Data Storage All KOBIL mIDentity models support encrypted Secure Data Storages on your local hard disk For real mobility you can have a Secure Data Storage on the KOBIL mIDentityf itself With them you can carry your senstive data around anywhere you go KOBIL mlDentity Secure Data Storages work different than Windows 2000 XP Encrypting File System EFS Unlike EFS the decryption keys are not bound to the user s Windows account but to the KOBIL mIDentity SmartCard By using SmartCard technology strong two factor authentication is achieved possession of SmartCard AND knowledge of PIN instead of only knowledge of the Windows user password Data recovery can be done seperately from the Administrator role see section f 4 5 2 1 Creating a Secure Data Storage on your local hard disk Important please read carefully section before starting to work with Secure Data Storage in order to keep your data accessible a
14. is possible to use predefined logon templates Those templates are then filled out with personal data by the end For more details regarding this solution please contact your KOBIL Partner e Transfer This feature does not apply for browser applications For all other applications you can define a method of interspersing personal data into the appropriate application field As a standard this happens via Windows messages but because some applications have problems with this methodology we introduced the possibility of using event based technology The event based technology simulates manual key entry which helps to solve the problem but is much slower than the message solution 49 4 1 6 Backup Logon Accounts Simple Sign On Simple Sign On simplifies access to services and applications on your computer You will only need to know the PIN of your SmartCard application access will be handled for you in the background It is therefore very important to double protect your logon data by taking regular backups We recommend you take a backup of your logon dialogs each time a new application access dialog has been added to your list or when the logon data has changed Logon Accounts Es New Logon Account Edit Password Transfer Delete Backup Figure 4 19 edit and view login data To take a backup of your access data choose the option Logon Accounts from the main menu Next select the Backupoption from the User Accounts screen a
15. on the local hard disk 3 Using the slide bar you can determine the size of the new Secure Data Storage Important We strongly recom mend NOT to use the whole free space on your hard disk for a Secure Data Storage since this may result in problems with the Windows operating system You should always keep 50 100 MB free space on your hard disk 4 Under Storage Name you can define a label that will be used to display the Secure Data Storage in the Windows Explorer 5 You can select a particular Drive Letter or ANY if the Secure Data Storage shall always be mounted to the next available drive letter A specific drive letter may be useful if you work with scripts 61 6 Click Create in order to start Secure Data Storage creation This process may take some time In order to encrypt your Secure Data Storage a random encryption key wil be generated by the smart card while creation 7 At the end you have to enter the KOBIL mIDentity SmartCard s PIN to mount and format the Secure Data Storage which completes the process At the end the new Secure Data Storage icon appears on the desktop for quick access 7 mIDentity Datasafe LW I Figure 5 3 Desktop Shortcut for new Secure Data Storage 5 2 2 Creating a Secure Data Storage on your network drive Important please read carefully section before starting to work with Secure Data Storages in order to keep your data accessible also in emergency situations All KOBIL mIDentity ve
16. signature process see section 5 3 4 e If the checkbox Encrypted files after decryption is active each encrypted file is deleted automatically after de cryption Note that this option cannot be changed per decryption process e If the checkbox Signed files after signature verification is active each signed file is deleted automatically after signature verification Note that this option cannot be changed per signature verification process 82 Show Report after Process If you enable this option you will see a report about how many files have been processed in case you selected multiple files or even complete folders to encrypt decrypt sign verify or secure erase Default Signature Certificate Check Default Signature Certifikate and click on Select You can select the default signature certificate from the list of all valid signature certificates see section 5 3 4 The button Remove disables the default signature certificate Important this setting does NOT have any impact on qualified signatues Default Encryption Certificate Check Default Encryption Certifikate and click on Select You can select the default encryption certificate from the list of all valid encryption certificates see section 5 3 1 The button Remove disables the default encryption certificate Additional Decryption Key Check Additional Decryption Key and click on Select You can select the Additional Decryption Key from the list of all valid encryptio
17. 00 xp 2003 with KOBIL mIDentity We assume that both your internet access and e mail account are properly configured If you are not sure about this contact your internet provider Email security functions can be combined with Outlook Synchronization see section Before starting to sign and encrypt emails you need a personal certificate that contains your email address Self signed certificates cannot be used for secure email communication since they dont contain an email address See section how to get a personal certificate 6 1 1 Configure your Certificate To send signed messages and receive encrypted messages you have to configure your e mail certificate If you don t select a default certificate and try to send a signed message Outlook Express prompts you with a list of certificates to choose from The big Outlook versions dont allow to send secured email unless you have configured your certificate manually The necessary steps differ a bit between Outlook Express and Outlook 98 2000 xp 2003 Outlook Express In Outlook Express your certificates are bound to your e mail account so you can select a default certificate for a each account 1 Start Outlook Express and select Tools gt Accounts 86 Internet Accounts mail default Any Available Figure 6 1 Internet Accounts Dialog 2 Choose your e mail account as shown in figure and click Properties gt Security The dialogue shown in figu
18. 1 Figure A J illustrates the data digestion process Digest function unique digest Figure A 1 Data Digest scheme A 3 2 Symmetric Encryption Algorithms With these type of algorithms the same key the so called session key is used to encrypt and the decrypt the message They are also known as session key algorithms Figure illustrates the symmetric encryption process The main advantage of symmetric algorithms is their speed of data encryption and decryption The main weakness is the key management Both sender and receiver must have the same secret session key which must be transferred securely It is convenient and secure to transfer session keys by using public key algorithms The most common session key algorithms currently are triple DES RC2 and RC4 98 symmetric symmetric encryption decryption algorithm algorithm SCRAMBLED f DATA Internet Encryption Decryption key is a N key is the session key same as the This key encryption should be key kept secret Everybody can use the internet and malicious people can easily listen any communication and modify any data in this unsecure public media Figure A 2 Symmetric Algorithm A 3 3 Public Key Algorithms Properties With these algorithms encryption and decryption keys are different Each user has at least one key pair consisting of two keys One is kept secret so it is called a private key and the other one is open w
19. ALT F10 if the logon window is activated by a mouse click you get the list of the learned password dialogs and you can select the desired password entry e ALT F12 In some cases KOBIL mIDentity does not recognize learned password dialogs Besides the possibility to press ALT F10 see above you invite KOBIL mIDentity by pressing ALT F12 to check again all open windows whether they contain a password dialog KOBIL mIDentity had already learned Advanced features of Simple Sign On The Simple Sign On solution is very tight related to the hardware and software environment on which it operates To avoid possible configuration problems and also to give you additional setup options we offer advanced features To reach the advanced features select the option Setup from the main menu and then choose the KOBIL mlIdentity Setup menu item From the KOBIL mldentity Setup screen select the Advanced Features option on the Logon Accounts screen 34 Figure 4 1 Simple Sign On Settings 35 Advanced Feartures x Learning parameter IV Recognize Internet Explorer logon element IV User defined label Dynamic setting V Detect known logon accounts IV Detect anew logon account IV Detect failed attempts to logon 3 attempts per o0 Min IV Show icon session restart required Std Settings i Shortcuts A OK if Cancel Figure 4 2 Simple Sign On advanced features e Learning parameters 1 Recognize Internet
20. COM Figure 5 7 Logon Logoff Secure Data Storages 5 2 5 Delete Secure Data Storages When you don t need a Secure Data Storage anymore you can delete it no matter if it s a local Secure Data Storage on your hard disk or a mobile Secure Data Storage on your KOBIL mIDentity Deleting a Secure Data Storage discards all information and files stored in that Secure Data Storage they cannot be recovered Be very careful deleting a Secure Data Storage In order to delete a Secure Data Storage open the Control Centre Software and click on Secure Data Storage gt Delete 65 and select the Secure Data Storage you want to delete You will be asked to confirm deletion to make sure that you selected the right Secure Data Storage to be deleted mIDentity Control Center oo MY IDENTITY KOBIL i J Logon Accounts A O02 MYOOrR FICE Mobile Office 7 003 MYDATASAFE Secure Data Storage mobile storage Drive H Log off Create Import RATION Manual J Close J WWW KOBI COM Figure 5 8 Delete Secure Data Storage 5 2 6 Delete a link to a Secure Data Storage If you have created a Secure Data Storage on a network drive which is currently not available you can delete the link to this Secure Data Storage If you do so the data inside this Secure Data Storage will not be affected The Secure Data Storage then will only not be recognized from the management software If the network d
21. Explorer logon element The Recognize Internet Explorer logon element option will save you one step in the application logon dialog learning process by automatically recognizing the login element 2 User defined label The User defined label option gives you an option to name your logon account rather than having the system do it for you e Dynamic settings 1 Detect known logon dialogs The SSO will logon automatically to a known account 2 Detect a new logon dialog The SSO will start a learning process as soon as an unknown window with a password field appears on screen 3 Detect failed attempts to logon The Simple Sign On feature can be configured to automatically detect a new application window and proceed with the logon dialog To avoid an infinite loop in case of a failure the max number of allowed failed logon attempts must be specified 36 4 Show icon The Advanced Features can be invoked as a separate mini application directly from the tray bar It offers addi tional functionality which can be reached via a menu triggered by clicking the right mouse button on the Advanced Features icon Settings Learn Learn Selection Detect selected Figure 4 3 additional icon for SSO e Buttons 1 Cancel Settings will be closed without saving the changes 2 OK Save settings and finish 3 Hotkeys Alter the hotkeys 37 Shortcuts x Shortcut Learn new account F11 ud Detect new account F
22. K certificate see section 5 4 1 If you want to use any other encryption certificate click on Add You can also Search for other people s certificates in directory services e Erase original file s This checkbox decides if the original files should be erased after encryption signature The default setting of this checkbox can be configured see section Attention If this checkbox is active and you are about to encrypt to a foreign certificate you will not be able to recover those files If all options are correctly set click on proceed to start the encryption signing process 78 File Directory Encryption and Signature Certificate List Recepient List 894901 7200002174742 f gt gt gt gt gt l Click here to search further certificates on a directory service LDAP server once SIGNATURE CERTIFICATE Subject CN 894901 7200002174743 Serial Number 263BABEC8D 20C9424F44DE0B3744DF19 vr gt Signature Certificat 9949017200002174743 Erase original file s after signing and encryption Proceed d Cancel d Figure 5 20 File directory encryption and signature options 4 Enter your KOBIL mIDentity SmartCard s PIN 5 The file e g all files inside the chosen directory are now encrypted and signed and stored with the ending ksk as shown in figure 6 21 79 a my ies OOOO icix File Edit view Favorites Tools Help Q Back v bi a Search ar Folders ies Address lo C Docum
23. KOBIL mIDentity V1 5 2 User Manual 16 07 2007 English Version Contents 2 ing started Dentity Se the KOB a What ie a Dita 9 4 W here ai our mlD a ntering 3 4 e a rust mpor me another User s ertificate digital certincate trom cate Manage sentre CA Certi EE ertinca D KOP bIL mlDentity Personalizatio Your mobile 4 1 Passwords and 6 ottware Update dentity imple a SSO oftware Installatio icense Key m Da Tam ard earning Password Working wit onsole App Rcationd Vianaging Logon Accoun Bac up Restore Windows mar ogon Accounts Simpe SEO ogon ACCOUN ogo N N N saww 10 10 11 11 12 16 17 17 18 19 19 21 23 24 25 27 30 31 31 32 32 32 33 37 43 46 49 51 53 56 58 5 2 g D g KOBIL m anada maa madda aa naa OZ 6 Delete a ink to a Secure Data Storagg 2 ee ee ee ee 65 j ile and Directory Encryption aa a coea aaa aaa aa a a ee a aa a ee OT ile and Directory Decryptio Ser Ae E A A E E e aca aie a a a GU a are AAU 4 ile and Directory Signatur 72 T auk os 74 6 ile and Directory Signature Veriiicatio Ak be ee Bla od de Eke ee ae ee ERA eae ae e FA ignature and Encryption of Files and Directoried 0 0000 eee eee ee es G 79 i ettings for File Security aoa a a ee ee ee ee ee BO 5 4 mercency Recovery s erens ana 4 2 a Ye OG a aaa a eee EE RRS a aaa aaa RA A Additional Dec
24. SA This standard defines the Secure Hash Algorithm SHA 1 for use with the Digital Signature Standard DSS Secure Sockets Layer SSL Security protocol used between servers and browsers for secure Web sessions SSL Handshake The SSL handshake which takes place each time you start a secure Web session identifies the server This is automatically performed by your browser Secure Multipurpose Internet Mail Extensions S MIME Standard offline message format for use in secure e mail applications Uniform Resource Locator URL Web address 111
25. T Folders ies Address jo C Documents and Settings kobil My Documents gt Go Name Size Type Date Modified Secret doc 24KB Microsoft Word Document 11 01 2005 10 32 25KB K55 File 11 01 2005 10 36 Type KSS File Date Modified 11 01 2005 10 36 Size 24 3 KB Figure 5 16 A signed file Signed files are stored in PKCS 7 format which enabled interoperability between different applications Directory signatures work exaclty the same way as file signatures just select the directory you want to sign with the right mouse instead of a single file All files in that directory will be signed in PKCS 7 format in one pass but you have to enter your KOBIL mIDentity SmartCard s PIN only once 5 3 5 Multiple Signatures In order to add further signatures to an already signed file just right click the kss file and select KOBIL mIDentity gt Add Signature As for the first signature you can select the signature certificate and you will be asked to enter the KOBIL mIDentity SmartCard s PIN 5 3 6 File and Directory Signature Verification Important this section only covers simple or enhances signatures according to the European Signature Act If your KOBIL mIDentity version supports qualified signatures please refer to the section Qualified Signatures To verify a file s digital signature proceed as follows 1 Right click on the file with the ending kss you want to verify The context menu shown in figure appears
26. TA Private Key This key D Public Key must be This key must be Everybody can use the internet hts s le and malicious people can easily ho Coat listen any communication and to cand ae modify any data in this unsecure encrypted public media dats Figure A 3 Asymmetric Algorithm 100 kept secret Wrap Session Key Bulk data is encrypted with a session key to supply fast speed The encryption session key must be sent to the recipient for decryption For a secure transfer the session key is encrypted with the public key of the recipient No one except the recipient can recover the session key because the private key of the recipient is needed to decrypt the scrambled session key Encrypted bulk data and the scrambled session key are merged to form a digital envelope Someone who wants to recover the original data must recover the session key first see figure A4 symmetric encryption algorithm Digital Envelope Internet A SCRAMBLED i DATA Asymmetric encryption algorithm Scrambled Encryption key i5 a session ees session key This key should be kept secret Recipient Public key Sender does not have the recipient Private Key Figure A 4 Wrap Session Key Unwrap Session Key The recipient of the digital envelope detaches the scrambled session key from the encrypted bulk data First the scrambled session key is decrypted with the private key of the recipient Second bu
27. User name Password If test C Remember my password Cancel E Learning the OK button left mouse button choose butkon right mouse button next ESC cancel learning procedure Figure 4 10 Learning the OK Button If the same password dialog appears the next time KOBIL mIDentity automatically recognizes it and asks if it should fill in the user name and password There are differences between Windows applications and and WEB applications 42 Connect to Source sale Connecting to Source_safe User name mlDentity has detected an input window Password Do you want to logon automatically Description Connect to Source_safe Window Connect to Source_safe Contents test Password see I Don t show this dialog anymore Logon 7 Cancel f Figure 4 11 automatic Windows application logon with KOBIL mIDentity In case of a WEB application you can choose between Fill in and Login furthermore Choose Fill in to fill in the learned elements but do not send the login information So you can enter additional elements by yourself because they change every time you visit the site for example 43 GMX LOGIN Passwort Passwort vergessen Fill out 4 Jetzt kostenlos Login 6 bine a 3x Sere itglied werden Figure 4 12 automatic WEB application logon with KOBIL mIDentity NOTE While logon to java applications there is a technical need to execute mouse movements and mouse clicks For tha
28. ake sure that you are logged in as Administrator only needed for installation 3 Finish all running programs 4 Insert the KOBIL mIDentity Software CD ROM into your CD ROM DVD ROM drive the setup will start automati cally If this is not the case please start it manually using the Windows Explorer and select the menu item KOBIL mIDentity Software Installation If you dont have any KOBIL mIDentity Software CD ROM at hand you can download the most recent version in the internet under http www kobil com mIDentity and start it by a double click 5 Choose the installation language and click on OK Wahlen Sie eine Setup Sprache aus x Wahlen Sie die Sprache dieser Installation aus der unten aufgef hrten Auswahl aus eutsch Englisch Figure 2 3 Choose the installation language 6 Please read carefully the licence agreement If you agree with it click Yes in order to continue the installation process If you dont agree please click No to cancel the software installation InstallShield Wizard License Agreement Please read the following license agreement carefully InstallShield Figure 2 4 Accept the Licence Agreement 7 Now you will be asked to define the installation folder for the KOBIL mIDentity Software Usually you can use the default values and just click on Continue to start the installation InstallShield Wizard Choose Destination Location Select folder where Setup will install files
29. ate for signature and encryption if your security policy allows this The dialogue is shown in figure 6 3 5 You can select the session key algorithm which will be used for bulk encryption and decryption as well as the hashing algorithm for digital signatures For strongest security 3DES or RC2 128 bit is recommended as encryption algorithm and SHA1 as hashing algorithm 90 Change Security Settings Figure 6 5 Outlook 98 2000 xp 2003 certificate selection 91 6 1 2 Setting up Outlook Security Buttons In order to comfortably sign and encrypt your emails you can set up the appropriate Outlook buttons Outlook Express In Outlook Express the buttons are already present but they are that much outside the window they are hidden To make them visible proceed as follows 1 Open a new email File gt New gt EMail Message A new email window is opened 2 Choose the menu View gt Menu Bar gt edit 3 The buttons Sign and Encrypt can be found under current buttons Mark them and move them towards the beginning of the menu using the arrow up button until they become visible Outlook 98 2000 xp 2003 By default the big Outlook versions hide the buttons To activate them proceed as follows 1 Open a new email message using the menu File gt New gt EMail message A new email window is opened 2 Choose the menu View gt Menu Bar gt edit 3 Choose the drawer Commands and select
30. ate will be used to encrypt data in your Safe Data Storages and also to encrypt all your application access logon dialogs containing your user ids and passwords You can also define an Additional Decryption Key ADK for even better data protection ADK see section f 4 14 miDentity initialisation assistant Step 2 of 4 Assign certificates for Single Sign On and Secure Data storage C Create a new certificate E Include personal data Import PKCS 12 certificate JT Define ADK Additional Decryption Key Figure 3 6 create a selfsigned certificate If you choose to create a certificate and use it for email signature you will be asked to fill out some personal information lisation assistant Step 3 of 4 Provide personal information to include in the certificate User name Test User e mail address test kobilcom Company KOBIL Systems GmbH Department Development City Worms State RP Country Germany J S Nett Coane sy Figure 3 7 create an own certificate 3 Assign a certificate for secure data storages and logon accounts Simple Sign On If you choose not to create your own certificate but to import one you will be given a list of certificates present on your PC to select the one you want to use 15 miDentity initialisation assistant Step 2 of 4 Assign certificates for Single Sign On and Secure Data storage C Create a new certificate FE Include personal data
31. aximize Logon Accounts Mobile Office 550 Emergency Assistant Secure Data Storage mIDenriry FAST CONTROL Manual Setup gt Remove mIDentity Close Control Center Figure 3 2 Tray Bar Menu 3 2 Remove KOBIL mIDentity securely Important If you want to unplug KOBIL mIDentity you have to use the secure remove function first to avoid data loss This is also necessary on Windows XP and 2003 to close any open datasafe Right click on the tray bar menu see figure and select remove mIDentity Alternatively you can click on the button remove mIDentity in the main window Maximize Logon Accounts Mobile Office 550 Emergency Assistant Secure Data Storage Manual mIDenriry FAST CONTROL Setup gt Remove mIDentity Close Control Center Figure 3 3 remove KOBIL mIDentity securely 3 3 The KOBIL mIDentity SmartCard The KOBIL mIDentity SmartCard is KOBIL mIDentity s secure core since it stores your personal information and keys securely Without the SmartCard no access to secured data is possible All KOBIL mIDentity functions are protected by the KOBIL mIDentity SmartCard s PIN personal identification number As only you know the PIN nobody else can use the functions or access secured data The PIN is protected by a failure counter that locks the SmartCard after three subsequent wrong PIN entries Only by entering the PUK PIN Unblocking
32. because you have entered a wrong PIN too many times you can unlock it using the PUK PIN Unblocking Code as you may know it from your mobile phone Click on Unlock PIN and enter the PUK followed by the new PIN 3 4 Digital Certificates Your KOBIL mIDentity SmartCard can do much more than store only passwords and Simple Sign On parameters It is a full fledged cryptographic SmartCard that can also operate with digital certificates and public key infrastructures PKI technology In this section you learn what a digital certificate is how you can obtain it and what you can do with it 19 3 4 1 What is a Digital Certificate Digital Certificates are electronic D cards you can use them as a digital identity This makes much sense in networks and in the internet because you cannot see your communications partners face to face Exactly as in your real D card a digital certificate contains your name and maybe some other informations about you and about usage constraints e g network logon encryption signatures For more details about digital certificates see section LZA There is also a special kind of certificates the so called Selbf Signed Certificates These certificates are not issued by a trust centre Everybody can create them they work completely without any PKI infrastructure This is why they are very easy to use but of course they offer a lower level of identification compared with real trust centre certificates Sel
33. cal The algorithm type and the key length are the most important measures against predictability of the key Cryptography has nothing to do with obscurity Cryptographic algorithms and protocols should be conform with standards to support interoperability Using non published algorithms is contraproductive to compatibility Moreover cryptography is not about hiding algorithms but it is about designing strong algorithms and secure mechanisms Security and interoperability must both be achieved in years by building and testing very well known algorithms mechanisms and protocols Security should be obtained only by storing the keys in a secure way and by making algorithms so strong that they are impractical to break 97 A 3 Standards A 3 1 Data Digestion Algorithms Data Digestion Algorithms are not used for encryption or decryption The main purpose of these algorithms is to produce a unique fingerprint typically 16 or 20 bytes in length of the original data Digestion algorithms are also called one way hash functions because it is computationally infeasible to recover the original data from its digest or even to find some other data which will produce the same digest Ideally each digest is unique and every bit is influenced by every bit of its input data These algorithms are used together with other types of algorithms to supply digital signature processes see below The most common digestion algorithms are MD5 RipeMD and SHA
34. ccess to your secret data 3 3 3 What happens if I enter the wrong PIN If you have entered the wrong PIN three times subsequently the KOBIL mIDentity SmartCard is locked in order to protect access to KOBIL mIDentity for unauthorized persons If you entered a wrong PIN please take care to enter the correct PIN the next time Once the PIN is locked it can be unlocked by entering the PUK similar to mobile phones see section B 3 4 If a wrong PUK is entered three times the SmartCard is irreversibly locked In this case you should replace it by a new SmartCard which can be ordered at your local KOBIL dealer If you have encrypted data on your hard disk files or datasafe s please read section 4 to learn how to recover them 3 3 4 Change Unlock the KOBIL mIDentity SmartCard PIN You can can change and unlock the SmartCard PIN using the preferences in the Control Centre software Please choose the option 18 Properties gt Identity and select the drawer Card and click on Change PIN You will be asked to enter the old PIN followed by the new PIN which has to be entered twice to avoid mistyping mIDentity Setup ax Logon Account Smart Card Certificate PIN functions Change PIN y Unblock PIN _ Card number Import o Erase card 7 www kobil com mlD entity OK 7 Cancel A Figure 3 12 KOBIL mIDentity SmartCard preferences change unlock PIN If KOBIL mIDentity SmartCard s PIN is locked
35. centre s URL for example TeleSec trust centre Germany www telesec de TC trust centre Germany www trustcenter de Verisign USA www verisign com 3 Most trust centres offer free test certificates also called Digital ID s Please note that those test certificates do not offer a high security level since users are not identified very deeply 20 4 Now you have to enter some data which will occur later in your certificate parameters vary between trust centres In most cases these are some personal data as well as your email address It is extremly important that you enter your exact email address case sensitive if you want to use that certificate for secure email 5 When asked for the CSP to generate the keys please select Kobil Smart CSP v1 0 6 Submit the certificate request to the trust centre Certificate Enrollment xi Status Available Slots Cert Exist mlDentity Certificate 1 Cert Exist mlDentity Certificate 2 Cert Exist mlDentity Certificate 3 Cert Exist Windows 2000 Logon Cettificate Certificate Slot Detail Subject CN 894901 72000021 74743 Issuer CN 894901 7200002174743 Serial Number of IV Do not unregister old certificate after renewal Please select a slot to enroll a new certificate Renew A Cancel y Figure 3 13 Selecting the certificate slot Figure shows the certificate slot selection on the KOBIL mIDentity SmartCard Here you can de
36. cide if the new certificate is stored on an empty certificate store or if you want to renew an existing ceritficate Important Never overwrite the self signed certificate in the first certificate slot since it is needed to decrypt the datasafe 7 The trust centre will send you an email with informations about how to obtain the final certificate In some cases you can immediately download it to the KOBIL mIDentity SmartCard Follow the instructions from the trust centre 8 Take a look at your new certificate in the Windows Certificate Manager as described in section If the new certificate is not valied because of missing information you have to manually import the trust centres root certificate as described in section BZA 21 Contents of Your Digital ID Fill in all felda Use only the English alphabet with no accented characters This information ia included in your Digital ID and is available to the public Choose 4 Full service Class 1 Digital ID or a 60 day Trial Class 1 Digital ID COptional Select The Cryptographic Service you have a domestic version of this browser you are offered an Enhanced Cryptographic option which provides 1024 bil key encryption The MS Base Cryptographic provider offers 512 bi key encryption which is adequate for most applications today but you may select the Enhanced option fs your browser offers this choice and you require the higher encryption strength f you use a specialized mechanism such as a
37. cure Data Storage icon appears on the desktop for quick access 5 2 4 Working with Secure Data Storages Open the Control Centre Software and click on Secure Data Storage in the main window Select the Secure Data Storage you want to open logon or close logoff Depending on the selected Secure Data Storage s state you can either logon if it is currently logged off or logoff if it is currently logged on Local Secure Data Storages stored on your hard disk are marked with a hard disk symbol Each time you want to open a Secure Data Storage you have to enter the KOBIL mIDentity SmartCard PIN no matter if the Secure Data Storage is stored locally on your hard disk or if it s a mobile Secure Data Storage on your KOBIL mIDentity After closing the Secure Data Storage all information is securely encrypted and visible to nobody Important please close all open Secure Data Storages before unplugging KOBIL mIDentity by clicking on remove mIDentity If you unplug KOBIL mIDentity without closing Secure Data Storages data might get lost mIDentity Control Center ool MY IDENTITY KOBIL Ij I Logon Accounts 7 MY OFFICE f f 002 Mobile Office d Ne SS oo3 MY DATASAFE gt Secure Data Storage rive H Log off E disc storage 1 Drive Log on 8 disc storage 2 Drive J Log off amp Bdisc storage 3 Drive Log on RATION Manual Open all Close Close all Delete WWW KOBIL
38. dely accepted standard for digital certificates is defined by International Telecommunications Union s ITU T X 509 standard A X 509v3 certificate includes the following data fields e Version Certificate s serial number Signature algorithm ID e Issuer name Expiration date e User name User public key information 104 e Issuer unique identifier optional e User unique identifier optional Extensions optional contain certificate usage instructions e Issuer s signature over the fields above A 3 5 Certificate Authorities A certificate authority CA also called trust centre is a trusted organisation that issues public key certificates A CA acts as a guarantor of the binding between the subject s public key and the subject s identity information that is contained in the certificates it issues The typical process of getting and using a certificate goes something like this the user is called Alied in this example 1 Alice creates a cryptographic key pair consisting of a private and a public key 2 Alice creates a certificate request that contains her name her public key and perhaps some additional information Alice signs her certificate request with her new corresponding private key Alice sends the signed request to a CA The CA creates a data set from Alice s request The CA signs the data set with its private key The CA forms a certificate with the data set and its signature o N
39. ds consisting of standard ASCII characters One time passwords OTP consist of 8 digits and can be used without any problem 4 1 5 Managing Logon Accounts To manage your logon accounts on mIDentity click on the push button My Logon Accounts on Control Center or in the Traybar Menii You will be requested to enter the PIN of the smartcard from your mIDentity to authenticate yourself for access to your personal data Only you can read and change your logon information Logon Accounts 4 x New Logon Account Edit Password Transfer_ Delete A Backup J FREENET GMX or pee Close f R i Figure 4 16 Edit Password Informations Editing Logon Data When you need to change your logon data e g your password has expired you have two options to do that Select the account you want to change and click on the push button Edit or simply double click on the account you want to edit You can change individual attributes in the dialog that follows 47 Dynamic entry xi Please edit your data Description GMX Module Title Type Description Content Class 1D Input id test id 255 Password p p 258 Action Button Login 260 Tl Do not ask for recognized window Enter data directly T Ignore this window IV Extended view OK fo Cancel A Figure 4 17 Editing Dynamic Accounts The following logon accounts attributes can be changed e Account Name Specify the account name e Entry Double cl
40. e Data Storage Import 00 CONFIGURATION Manual ee Close Z Remove miDentity A WWW KOBIL COM Figure 5 5 Creating a new Secure Data Storage 2 Activate the Checkbox Secure Data Storage on KOBIL mIDentity Please note that only one Secure Data Storage can be stored on KOBIL mIDentity Create Secure Data Storage N x You can create secure data storage on miDentity or on your PC ge lt fo size 1 27 GB of 1 42 GB 8 0 9 9 0 0 0 0 5 6 0 6 9 0 6 0 6 8 ih M nPE A define path Name Create Name A disc st J isc storage Close PA Drive any hd Figure 5 6 Creating a new Secure Data Storage on KOBIL mIDentity 3 Using the slide bar you can determine the size of the new Secure Data Storage It can vary between 3 MB and maximum free space on KOBIL mIDentity depending on the model 4 Under Storage Name you can define a label that will be used to display the Secure Data Storage in the Windows Explorer 5 You can select a particular Drive Letter or ANY if the Secure Data Storage shall always be mounted to the next available drive letter A specific drive letter may be useful if you work with scripts 6 Click Create in order to start Secure Data Storage creation This process may take some time 64 7 At the end you have to enter the KOBIL mIDentity SmartCard s PIN to mount and format the Secure Data Storage which completes the process At the end the new Se
41. ection B 4 5 As server name please enter the domain controller s full DNS name The search base must be written in the so called DC notation Example if your domain is called myDomain myCompany de the DC notation will be de myDomain dc myCompany dc de 84 5 4 Emergency Recovery 5 4 1 Additional Decryption Keys The cryptograhpic mechanisms used in KOBIL mIDentity are so strong that nobody can recover the encrypted text with out knowledge of the corresponding private key Your private key is well protected on your KOBIL mIDentity SmartCard But it can of course happen that you lose your KOBIL mIDentity or it is stolen As the KOBIL mIDentity SmartCard is PIN protected nobody can gain unauthorized access to your data To make those data accessible for yourself in such a case KOBIL mIDentity supports so called Additional Decryption Keys ADK Using Additional Decryption Keys every Secure Data Storage file and directory you encrypt with your certificate is also encrypted with another configurable certificate that we call Additional Decryption Certifikate Each Additional Decryption Certificate of course also has a corresponding private key This private key needs not to be located on a SmartCard Depending on your security policy the Additional Decryption private key is kept in a secure place like a bank tresor It is not needed during normal operation In case where a file cannot be decrypted anymore because the corres
42. ed user databases As your passwords are stored inside the KOBIL mIDentity SmartCard you only have to memorize its PIN code it protects all those informations KOBIL mIDentity automatically recognizes password entry dialog boxes and fills in your user name and password Both HTML forms and Windows dialog boxes e g network logon are supported Besides static passwords you can also use dynamic one time passwords OTP with KOBIL mIDentity One time passwords require additionally the KOBIL SecOVID server as a central authentication server AAA server which allows real Simple Sign On also for Administrators much cheaper than common SSO systems ldoes not apply to KOBIL mIDentity Light 33 4 1 2 Using Simple Sign On Survey The following short cuts help you to use KOBIL mIDentity in a comfortable way when you want to logon to securely to your applications e ALT F11 If your KOBIL mIDentity device should learn a password dialog you can initiate the learning procedure if the logon window is activated by a mouse click by pressing ALT F11 For details we refer to section 1 3 e ALT F10 Usually KOBIL mIDentity recognizes learned password dialogs and indicates this and you only have to confirm your intention to be logged on by clicking the Logon button Nevertheless in some cases e g when working with terminal consoles see section 1 4 KOBIL mIDentity does not know which of the learned password dialogs is to use By pressing
43. el Figure 3 19 Current KOBIL mIDentity certificates From the KOBIL mIDentity Setup screen select the Certificates option and then highlight on the given list of certificates currently residing on your KOBIL mIDentity the certificate you want to replace Select option Delete Note If the Delete option has been disabled contact your system administrator 2 The Initialization Wizard will appear to guide you through the next steps 28 mIDentity initialisation assistant xj The existing certificate for SSO and Secure Data Storage will be removed from mlDentity The Wizard will guide you through the steps to create a new certificate Current Smart Card status Certificate available SSO and Secure Data Storage not defined certificate assignment Click Next to continue Figure 3 20 Current KOBIL mIDentity setup 3 On the following screen you will be given options to create a new certificate use one of the certificates existing on your card or import a new certificate for your data encryption mIDentity initialisation assistant Step 2 of 4 Assign certificates for Single Sign On and Secure Data storage Create a new certificate E Include personal data I Define ADK Additional Decryption Key Back Next A Cancel Figure 3 21 Define new certificate 4 Once you selected the certificate you want to use the system will encrypt the data on your KOBIL mIDentity with the new certificate and
44. ency Assistant In case you need to access a backup but do not have KOBIL mIDentity to access the Control Centre we offer the SSO Emergency Assistant This service allows you to access a backup and displays logon data in plain text You will then use the data to individually sign into your applications The SSO Emergency Assistant can be started from the Traybar only if there is no KOBIL mlDentity device plugged into the PC 54 f a hy k tA T E mT Maximize Logon Accounts Mobile OFFice b O Emergency Assistant Secure Data storage Manual Setup Remove mibentity Figure 4 28 view login data KOBIL mIDentity SSO Emergency Assistant xi The SO emergency assistant will display your logon accounts in plaintext Choose the path to your encrypted accounts PKCS7 File Choose the path to your emergency certificate PKCS12 Filei Enter password Figure 4 29 view login data 55 To retrieve the data the SSO Emergency Assistant will ask you to select the backup file and your emergency password For security reasons your logon accounts will only be displayed for 5 minutes Logon Accounts x 291 pas New Logon Account y E ante Edit Password Transter Delete Le Beckup j GMX ee a rrr ee Close J Figure 4 30 view login data The SSO Emergency Assistant gives you also an option to print the list of your accounts Important Note Be cautious while using
45. entity KOBIL mIDentity is you electronic identity that you can carry with you anywhere you are your personal digital ID card Depending on the application several different technologies exist that can be used to authenticate yourself static passwords one time passwords OTP Simple Sign On SSO and certificates In this section you learn how to use those functions and how to realize your personal mobile identity 4 1 Passwords and Simple Sign On SSO Today passwords are omnipresent in your daily life Web Mail accounts network access VPN connections and many applications authenticate users using static passwords This requires the users to memorize a lot of different passwords or some users might use the same passwords for all applications which leads to severe security leaks Some users also note their passwords on little stick it papers at the monitor Using KOBIL mIDentity you can forget all your passwords because KOBIL mIDentity stores them high securely protected trough SmartCard technology on it s own mobile memory Instead of a lot of different passwords you only have to remember the KOBIL mIDentity SmartCard s PIN which is the key to all your passwords 4 1 1 What is Simple Sign On SSO Simple Sign On SSO is a techique that simplifies authentication procedures for both end users and administrators Users need to authenticate themselves only once for all applications while administrators can work on centraliz
46. ents and Settings kobil My Documents gt Go Name Size Type Date Modified Secret doc 24KB Microsoft Word Document 11 01 2005 10 41 Secret doc ksk 26KB KSK File 11 01 2005 10 4 Type KSK File Date Modified 11 01 2005 10 44 Size 25 0 KB Figure 5 21 A signed and encrypted file Encrypted and signed files are stored in PKCS 7 format which enabled interoperability between different applications Attention Never encrypt files necessary for your operating system to start You may destroy your system configuration 5 3 8 Signature Verification and Decryption of Files and Directories Signed and encrypted files have always attached the ending ksk in their name If you want to decrypt and verify the signature of a file or a directory in one step proceed as follows 1 Right click on the file or directory you want to decrypt and verify The context menu shown in figure appears 2 Choose KOBIL mIDentity gt Decrypt amp Veriy 80 a my Files File Edit view Favorites Tools Help Q x n X Search Folders EJ Address fe C Documents and Settings kobil My Documents Go r 4 Secret doc ksk 11 01 2005 10 4 b Decrypt amp Verify Add Remove Recipients Deeded OE gt eel Secure Erase Cut Copy JE Create Shortcut Figure 5 22 Context mennu for file directory signature verification and decryption 3 Enter your KOBIL mIDentity SmartCard s PIN 4 The file e g all file
47. eral Details Certification Path Certificate Information This certificate is intended to Guarantee your identity to a remote computer Ensure e mail came from sender Protect e mail from tampering Ensure the content of e mail cannot be viewed by others Refer to the certificate issuer s statement for details Issued to test user kobil Issued by VeriSign Class 1 CA Individual Subscriber Persona Not Validated Valid from 9 28 00 to 11 28 00 P You have a private key that corresponds to this certificate Figure 3 16 Certificate details The Windows Certificate Manager also allows to export certificates and to delete them If you delete a certificate in Windows Certificate Manager the certificate is only unregistered it is not deleted physically on the SmartCard If will automatically be registered again as soon as you plug in your KOBIL mIDentity the next time by the Control Centre software If you really want to delete a certificate from the card please refer to section 8 4 8 3 4 4 Importing a Trust Centre CA Certificate If you want to securely communicate with users of a foreign certification authority you have to import its CA certificate also called root certificate first If the CA certificate of a known certification authority expires you also have to import the new CA certificate 1 Download the root certificate from the CA s Web site 2 The certificate will be displayed with the hint tha
48. ertificate was saved in C Documents and Settings kobil mlDentity kobil RestoreCredential p12 file Figure 4 23 Backup your login data 4 1 7 Restore Logon Accounts To restore applications access accounts from a backup select the option Logon Accounts from the main menu then the Backupoption on the User Accounts screen and the Restore option on the following screen You will be presented with a screen allowing you to select the backup file In a situation where no certificate can be found on your KOBIL mIDentity you will be asked to provide your emergency certificate and your emergency password to restore the backup Logon Accounts x New Logon Account f Edit Password Transfer Delete y Backup Yo FREENET GMX Close He Figure 4 24 edit and view login data 52 miIDentity backup assistant xi Step 1 of 3 Backup Restore Logon Accounts Backup Restore Figure 4 25 restore login data mIDentity backup assistant xi Step 2 of 3 Restore logon accounts Select the file from which you want to restore your X eltings kobil miD entity kobil B ackupD ata p Browse ee Cancel Figure 4 26 restore login data 53 mIDentity backup assistant x Step 3 of 3 Your logon accounts have been restored They can be found in C Documents and Settings kobil mlDentity kobil BackupD ata p ee Finish Figure 4 27 restore login data 4 1 8 KOBIL mIDentity SSO Emerg
49. f signed certificates are used by KOBIL mIDentity to encrypt datasafes where they are no security risk since they are not used for communication with other people but only for access to local and mobile datasafes see section 6 2 Furthermore they can be used for a simple file encryption 3 4 2 Where do I get my digital certificate from There are many ways to obtain your personal certificate on KOBIL mIDentity which are suitable for different applications scenarios Here you find an overview of them Self signed Certificates The fastest way to your self signed certificate is about datasafes since a self signed certificate is automatically created as soon as you create your first datasafe You recognize it by its serial number in the Windows Certificate Manager for example 89491720000000026481 You can watch it in the KOBIL mIDentity preferences on the certificates drawer Running your own trust centre If you want to create your own public key infrastructure PKI you have to run a trust centre The corresponding software comes for example with Windows 2000 or 2003 Server see also section E2 You can also buy specialized PKI server solutions for example the KOBIL mIDentity Manager that can be configured to specific environments and requirements External trust centres You can store also certificates from third party trust centres on KOBIL mIDentity Proceed as follows 1 Start Internet Explorer 2 Surf to your preferred trust
50. g secure E mail If you receive a signed email it is marked with a red rope symbol see figure 6 8 Click on that symbol to verify the signature and watch the signer certificate When receiving an encrypted email you will be asked to enter your KOBIL mIDentity SmartCard s PIN in order to decrypt the email s content Encrypted emails are marked with a blue lock symbol as shown in figure 6 9 Click on that symbol to see the encryption strength and encryption certificate i Inbox Outlook Express Fie Edt View Took Message Heb BD amp 2 New Mal Repel konsid Ferh Inbox z Outlook Expeess GB Local Folders amp Inbox 1 B Dubos Sent Itema From Alice To Kob Test User Subject 1 got you cettifcate Security Help Digitally Signed amp Encrypted Message 9 This message has been digitally signed and encrypted by the sender Signed e mail from others allows you to verify the authenticity of a message thatthe message is fromthe supposed sender and that 1 message s 1 ureead BE Working Onine Figure 6 8 Receiving a signed email with Outlook Express 95 10 x Type a question for help Sasch Sascha Mizera 4 Contacts Deleted Items 8 Outbox Q Sent Items Figure 6 9 Receiving an encrypted email with Outlook Express 6 2 KOBIL eSecure fiir SAP R3 If you are interested in the optional KOBIL eSecure for SAP
51. hich is called public key Private keys are unique for each user and they are never transferred to other people If someone needs to send a data to you he needs your public key He encrypts data with your public key and no one except you can decrypt the scrambled data using your private key The transfer or distribution of your public key is secured by the help of trusted authorities Such a trusted authority will provide you a certificate for your public key This means that they provide a packet of data containing both your public key and the trusted authority s assurance that this is really your public key Figure A 3 illustrates the usage of public key process for a secure data transfer The main advantage of the public key algorithms is the secure key distribution Their main disadvantage is the slow processing speed for encryption and decryption of large data Because of this slowness public key algorithms are used with together with symmetric session key algorithms to supply the necessary speed To support confidentiality public key algorithms are used to wrap and unwrap the session keys for a secure session key transfer To support both integrity and authentication public key algorithms are used to sign and verify the output of data digestion algorithms The most common public key algorithm is RSA 99 Asymmetric Asymmetric encryption decryption algorithm algorithm NS S ORIGINAL DATA ORIGINAL DA
52. ick on this attribute to change the field value usually user name e Password Double click on this attribute to change the password field value optionally also a generator number of an OTP account Additionally you can define the following properties of an account e You can have your learnt account fields filled out automatically when the logon window is detected or you can have the system ask you each time for a confirmation e You can set an option to ignore the detected logon window e you can specify if you wanted en extended view of the account properties This view can help in error analysis in case a logon window is not properly handled Advanced Features Click on the push button on the right side of the title to get to the advanced features In this dialog you can change the properties which usually remain unchanged The advanced features give you an option to change some specific behaviour 48 or to use specific technology of the SSO solution in order to go around some known problems Please note Changes done to those advanced properties can dramatically influence the account functionality Please do not make any changes if you are not completely sure of an impact it may have on your system Extended Options i x T Titel contains elements like date time session ids GMX Microsoft Internet Explorer Wildcard Replace f ex lt Company XYZ Version 5 Aug 2004 14 02 h Browser gt with lt Com
53. ith gt foods KE a See b Pa es Secure Erase Figure 5 10 Context menu for file directory encryption 3 The dialogue shown in figure 5 11 appears In Recipients you see the default encryption certificate if it is set see section and the Additional Decryption Key ADK see section 6 4 1 With the Add and Remove buttons you can change those settings Your own certificates are marked with a key symbol other people s certificates are marked with a certificate symbol Note depending on the security settings the administrator can forbid users to remove the ADK certificate from the recipient list in order to enforce ADK usage 69 File Directory Encryption x Certificate List Recepient List z 894901 72000021 74742 kex lt lt lt gt Click here to search further certificates on a Find Certificat directory service LDAP server EPOE Subject CN 894901 72000021 74743 2004 12 21 09 12 27 I Erase original file s after encryption Proceed d Cancel 4 Figure 5 11 File directory encryption options The option Erase original file s determines if the original files will be deleted after encryption You can define the default setting for that option in the file security preferences see section 5 3 9 Warning If this option is set and you encrypt only to other s people s certificates you will not be able to read the files anymore When all settings are correct click on OK to start the encry
54. iz x Select from list Fo Edit account fiocked zj Delete account flocked Show Settings flocked v Show Cancel Esc h IV ALT Shift T Control Std Settings A ra OK P Cancel Figure 4 4 Alter hotkeys 4 Standard Reset settings 4 1 3 Learning Passwords If you want to personalize passwords centrally for many users please refer to section B 5 But KOBIL mIDentity can also learn password information very easily by end users This is done by a wizard that guides you step by step through the learning process After completing the process your passwords are stored securely inside KOBIL mIDentity 1 Open the logon dialog box for which you want KOBIL mIDentity to learn the password This can be any Web based application HTML or a windows dialog box e g network logon 38 Connect to yellow m Figure 4 5 Network Logon dialog 2 Press ALT F11 The KOBIL mIDentity password assistant is being started Connect to yellow m Figure 4 6 The KOBIL mIDentity Password Assistant 3 Click with the left mouse button onto a text area that you want to be filled out by KOBIL mIDentity for example the user name in this example the the text area connect as from the Windows network logon dialog box Then enter the value that shall be filled in by KOBIL mIDentity 39 Enter content xj Please complete the input window After mlDentity will complete the input window automatically Description
55. le Outlook 98 2000 xp 2003 In Outlook click on Find People in the menu Extras gt Address Book Figure B 17 shows the dialogue for all Outlook versions You can search for the recipient s name or e mail address Setting up a new directory service If you want to use any other than the pre installed directory services open the menu Extras gt Accounts gt Directory Service and click on the button Add gt Directory Service An assistant will be started that will guide you throught the process You will have to enter the following informations e Directory Server This is the address of the new directory server e Authorization Required If this checkbox is active you will have to enter a username and a password for user authentication Usually this option is not used e Check Addresses with this Directory Service If this checkbox is active the directory service will be used to resolve e mail addresses from user names and to search automatically for recipient s certificates 25 Once the directory service is configured it may be necessary to enter the directory service s Search Base To do that select the newly installed directory service once more and click on Properties In the drawer Extended you can enter the Search Base Ask your system administrator for the parameters suitable for your directory service You can also configure a directory service for automatic Search for certificates of e mail recipients by
56. lk data is decrypted with the recovered session decryption key as shown in figure A 5 101 symmetric decryption algorithm TA a Digital Envelope Internet Scrambled session 5 Decryption key Recipient Public Key Asymmetric decryption algorith Recipient Private Key Figure A 5 Unwrap Session Key Digital Signatures Digital signatures are needed for the authentication of identities A digital signature binds an individual to unique data That s why there are two inputs of the signing process first the data itself and second the private key of the signing individual Digestion algorithms are used to reduce the size of the bulk data because of the slowness of the public key algorithms First the message is digested and then the unique digest is encrypted with the originator s private key Output is the signature Anybody can decrypt this signature because anybody can get the corresponding public key of the sender The result of decryption is the unique digest and it is practically infeasible to find another message with the same digest 102 Digest Asymmetric function signature algorithm Scrambled digestis called as signature p p unique digest Private Key Figure A 6 Signature Creation Verification of Digital Signatures To verify a digital signature someone needs both the signature and the input data A recipient of the signature decrypts it with the sender s public key t
57. lso in emergency situations All KOBIL mIDentity versions can work with up to four Secure Data Storages on your local hard disk or on mounted network drives Each Secure Data Storage can be up to 4 GB in size if your hard disk is NTFS formatted there is no upper limit Additional you can also have a mobile Secure Data Storage onboardf to carry your sensitive data anywhere you go see section EZA In order to create a Secure Data Storage on your local hard disk please proceed as follows 1 Click in the Control Centre main window on Secure Data Storage gt create The Secure Data Storage creation dialog window will appear 3does not apply to KOBIL mIDentity Light 4does not apply to KOBIL mIDentity Light 60 Eg mibentity Control Center oF MY IDENTITY KOBIL Ij I 2 Logon Accounts 7 E Ne 003 MY DATA SARE Secure Data Storage Import CONFIGURATION 002 MY OFFICE Mobile Office 7 Manual Z ee Close 7 Remove miDentity A WWW KOBIL COM Figure 5 1 Creating a new Secure Data Storage 2 Activate the Checkbox Secure Data Storage on Hard Disk You can select the path where the Secure Data Storage files will be stored Create Secure Data Storage a xj You can create secure data storage on miDentity or on your PC I onmlDentity M onPC N defne path Name Create Name Adi tail 7 disc container 4 Close PA Drive any hd Figure 5 2 Creating a new Secure Data Storage
58. mIDentity gt Add Remove Recipients Now the same dialog as for file directory encryption appears You can add or remove encryption recipients After finishing you will be asked to enter you KOBIL mIDentity s SmartCard PIN because the file needs to be decrypted before being encrypted to the new recipient list Note that you can change the recipient list only if you can decrypt the file e g if your certificate is in the file s current recipient list This option is also available for files that are both signed and encrypted see section 6 3 7 5 3 3 File and Directory Decryption You can recognize encrypted files by the ending kse 71 1 Right click on the file you want to decrypt The context menu shown in figure is shown 2 Choose KOBIL mIDentity gt Decrypt 3 If that file is encrypted with more than one certificate and you have several decryption certificates or have the ADK registered as an own certificate you will be asked which certificate shall be used 4 Enter your KOBIL mIDentity SmartCard s PIN 5 The file is now decrypted and stored without the ending kse 6 If the encrypted file is deleted after decryption depends on the preferences see section 3 9 Alternatively you can also double click kse files In that case the file will be decrypted it will be opened using the appropiate application and after closing the application the file will be automatically encrypted again not available for Windows
59. n certificates The button Remove disables the Additional Decryption Key Important Please read section carefully before changing Additional Decryption Key configuration Important An ADK certificate has only impact on file and directory encryption NOT on e mail encryption Search Certificates Using this button you open a search dialogue that allows you to look up other people s certificates stored in so called directory services and store them in your local Windows certificate store This is a very useful function if you often encrypt files to other people Directory services are managed by Outlook and Outlook Express If you don t want to use one of the pre configured directory services you should configure your individual directory service first as described in section B 4 5 83 Search Users from LDAP Server x Available Accounts Name sascha mizera Email Search Result Saschi Figure 5 24 Search Certificates The dialogue shown in figure p 24 shows all directory services configured in Outlook and Outlook Express You can search for the person s name or email address If one or more results have been found you can show them and import them into the Windows certificate manager where they will be displayed in Other People as described in section Note If you want to search for user certificates in Active Directory please configure a new directory service account for Active Directory first as described in s
60. nd continue with the Backup option on the following screen You can choose a place where you want the backup to be stored miDentity backup assistant xi Step 1 of 3 Backup Restore Logon Accounts iiis Backup Restore Figure 4 20 Backup your login data 50 mIDentity backup assistant x Step 2 of 4 Backup Save as and Settings kobil mlDentity kobil BackupD ata p Browse J Z Create an emergency password Figure 4 21 Backup your login data The KOBIL mIDentity software gives you an option to create an emergency certificate This certificate will be crucial in case you lost the encrypted data or the KOBIL mlIDentity device In such case you will be able to restore the backup and decrypt the data with your emergency certificate miIDentity backup assistant x Step 3 of 4 Create an emergency password Emergency password N ee OO Confirm password N An emergency certificate will be created and stored in the file below A C Documents and Settings kobil mlDentity kobil Browse y Tu Back Next A Cancel Figure 4 22 Backup your login data Your successful backup will be confirmed to you by the system 51 mIDentity backup assistant E x Step 4 of 4 The backup of your logon accounts has been saved in C Documents and Settings kobil mlDentity kobil BackupD ata p file To restore your data in case of emergency you will require the emergency certificate The c
61. ngs to sign and encrypt all outgoing messages Click Tools gt Options gt Security and place checkmarks If you do not define a default behaviour for signing and encryption you can use Sign and Encrypt buttons of the new mail window Inbox Microsoft Outlook SS ioj x File Edit View Favorites Tools Actions Help Type a question for help amp inew amp RB X GeReply MpReply to all Y Forward Z Send Receive Bo Find Yq Type a contact to find A E Inf iy signed message Message Microsoft Word i 5 xj e lt File Edt view Insert Format Tools Table Window Help Type a question for help X oO ae Heakene R gt Ara A E Send 0 8 t 4 options Hm To test test de Subject signed message Hi 192 168 88 185 i 1 Inbox a gy Se this message is signed to send you my certificate KOBIL mIDentit xj Regards test Please enter your PIN RAA AADA N ARAARAARRAAAAR Contact Tasks v Cancel 7 My Shortcuts i tae REC TRK EXT OVR Engishtus As Figure 6 6 Digital Signature using Outlook Express 93 t Inbd amp Now we can send and receive secure messages Regards test ioj x Type a question for help A A Type a contact to find a a ie O x Type a question for help KOBIL mIDentity Figure 6 7 Encrypted and signed Email using Outlook Express 94 6 1 4 Receivin
62. o recover the data digest The recipient also digests the input data to get the original data digest If the recovered data digest is the same as the original digest the signature is correct Otherwise the sender is not the person who he claims to be or the original data was modified on its way Digital signatures support both authentication and integrity For confidentiality digital signing process is combined with the encryption process of session keys and the wrap operation of public keys 103 Digest function unique digest Asymmetric sty D decryption m a algorithm Scrambled digest is called as signature _ unique digest Sender s Public Key Recipient does not have the sender s Private Key Figure A 7 Signature Verification A 3 4 Digital Certificates A certificate is a set of data that includes a public key and other owner specific information to identify an entity The certificate owner has the corresponding private key Certificates are issued by certification authorities CA which are trusted organisations Each certificate is protected by a signature that is created by a CA Certification authorities and certificates make public key distribution secure Secure storage and usage of a certificate and its corresponding private key is the problem of its owner KOBIL Smart Key helps certificate owners with this problem by presenting a hardware based security system that uses SmartCards The most wi
63. on of access to secure e mail or to secure Web sites Digital Signature A data string produced using a public key crypto system to prove the identity of the sender and the integrity of the message Encryption A cryptographic procedure whereby a legible message is encrypted and made illegible to all but the holder of the appropriate cryptographic key Internet Explorer IE Microsoft Internet browser Inter operability The ability of products manufactured by different companies to operate correctly with one another 110 Key A value that is used with a cryptographic algorithm to encrypt decrypt or sign data Secret key symmetric crypto sys tems use only one secret key Public key asymmetric crypto systems rely on a matched key pair to encrypt and decrypt data Key Length The number of bits forming a key The longer the key the more secure the encryption MD5 A hashing algorithm that creates a 128 bit hash value which is twice the size of the block 64 bits Personal Computer Smart Card PC SC Standards that define the interface between smart cards and smart card readers Public Key Cryptography Standards PKCS A cryptographic system that uses two different keys public and private for encrypting data The most well known public key algorithm is RSA Rivest Shamir Adleman RSA Developers of the RSA public key crypto system and founders of RSA Data Security Inc Secure Hash Standard SHA A standard designed by NIST and N
64. or security reasons the software certificate will be deleted from the Windows Certificate Manager after importing it into KOBIL mIDentity Afterwards it will only be usable with KOBIL mIDentity Depending on your configuration this option may be disabled since it depends on the used SmartCard type miDentity Setup x Logon Account Smart Card Certificate PIN functions Change PIN Unblock PIN Card number Impot Erase card 7 waw Kobil com mlDentity OK Cancel Figure 3 18 SmartCard preferences 27 3 4 7 Replace current SSO and Secure Data Storage certificate If your certificate expires you move to another department or you change your e mail address you will probably need to re place your current KOBIL mIDentity certificate This can be accomplished by removing the existing certificate and creating a new one 1 To replace a certificate select the option Setup from the main menu and choose the KOBIL mIDentity Setup menu item mIDentity Setup xj Logon Account Smart Card Certificate m Configuratior Details A Register Unregister Delete Search certificates f Certificate information formlDentity Certificate 2 Subject CN 894901 7200002657523 mlDentity Certificate 2 Issuer miDentity Certificate 1 mlDentity Certificate 3 Windows 2000 Logon Cettificate Serial Number D63664E0084B86797442BDD1250115F65 www kobil com mlD entity OK 7 Canc
65. orage for all certificates It can be started in three ways 1 From Control Panel using Internet Optionen gt Content gt Certificates 22 2 From Internet Explorer using the pull down menu Extras gt Internet Options gt Content gt Certificates 3 From Outlook Express _ usign the pull down menu Extras gt Options gt Security gt Digital ID s Certificate Manager 21x Intended purpose lt All gt v Personal Other People Intermediate Certification Authorities Trusted Root Certification Ax 4 gt Kobi CSP Test 9 26 01 lt None gt Kobi CSP Test 10 5 01 lt None gt est user kobil VeriSign Class 1 CA In 11 28 00 lt None gt Import Export Remove Advanced Certificate Intended Purposes lt All gt Figure 3 15 The Windows Certificate Manager The windows certificate manager stores all your certificates your own certificates as well as other people s certificates and trust centre certificates You can see the details and the trust path of a certificate from the Certificate dialog Trust path includes the root and intermediate CA certificates that sign and approve this certificate in an hierarchical order If any of the certificates in the path is not trusted its signature is not valid or the root CA is unknown that certificate and all other certificates below will be marked with a red cross showing that those certificates can not be used 23 Certificate xi Gen
66. our sensitive data and carry it with you anywhere you gof Business documents private information everything is encrypted by KOBIL mIDentity using highly secure SmartCard technology 5 1 Strong Encryption for sensitive Data KOBIL mlDentity offers a lot of advantages compared with common encryption products since it is mobile independent efficient and highly secure You have the following possibilities to protect your sensitive data using KOBIL mIDentity e Mobile Secure Data Storage on KOBIL mIDentityf carry your sensitive data always with you in your pocket e Secure Data Storages on your Hard Disk local Secure Data Storages on your notebook or your home PC or business PC offer you enough space for sensitive data and are protected efficiently by the KOBIL mIDentity SmartCard during your absence e Secure Data Storages on network drives Secure Data Storages on network drives offer an additional advantage to Secure Data Storages on local hard disks With Secure Data Storages on network drives it is possible to reach your sensitive data from different workstations e File Encryption Encrypt even single files and directories with the same highly secure SmartCard technology You can exchange encrypted files with your friends and colleagues Further information about this can be found in section e Email Encryption see section B I 5 2 Secure Data Storages with KOBIL mIDentity KOBIL mIDentity allows secure storage for sensitive data
67. pany XYZ 4 Browser Put titles as f ex lt Company XYZ login Browser und lt Company XYZ buy Browser gt together to lt Company XYZ Browser gt IV Information from URL E yuww gms net de extended initialisation I Transfer NOT IE zi Default Event Message Figure 4 18 Advanced Configuration e Title contains data During the learning process of an application window some specific properties of that window are saved and used later to detect the site One of that features is the window title There are windows which contain dynamic parts which change each time the window is opened It is therefore hard to use title as an identifying feature With help of wildcards those dynamic parts can be ignored If a window title contains current time this part of the title must be taken out of the defined identifying feature Example The window title is Your Application 10 10 You must build a mask to define the time part as dynamic Your Application This way the time part of the title will not be considered in the window detection algorithm e Extract Information from URL This parameter is usually activated for browser applications because this window is generally detected by the URL and not the title To force detecting a browser application by its title deactivate this parameter e Advanced Initialization This feature is meant to be used by administrator In standardised environments it
68. pgrade further functionality may be enabled by entering a license key A message box with the neccessary information will appear when you plug in your KOBIL mIDentity device for the first time This license key is either shipped together with your KOBIL mIDentity package if you have purchased the full software features or you can purchase it later as an upgrade at your certified KOBIL partner Following packages can be purchased e KOBIL mIDentity Light Key request while using the software for the first time can be ignored cancel request e KOBIL mIDentity Light Enter the license key which was shipped together with your KOBIL mIDentity package when using the software for the first time How to enter this key later see beneath this section e KOBIL mlDentity Basic Key request while using the software for the first time can be ignored cancel request To enable the full functionality enter the key which is shipped together with your upgrade as described beneath this section e KOBIL mIDentity Classic Full functionality without any request To enter your license key please select Settings Other Info and enter the license key into the appropriate text fields Miscellaneous x Info PIN caching File security At the moment you use the following hardware KOBIL Systems KAAN SIM III 1 4 894901 7200002717723 and the following software KOBIL mlDentity V1 5 MSDI Build 2005091 4 1 Click www kobil com mlDentity to search fo
69. ponding private key is temporarily or forever unaccessi ble it can still be decrypted using the Additional Decryption private key To do so the file must be present on a machine where KOBIL mIDentity installed and where the Additional Decryption is registered either on another KOBIL mIDentity or as a software certificate In case of a software certificate you have to import it on your KOBIL mIDentity before using it Please refer to section BZA Should it be necessary to use the Additional Decryption Key on another SmartCard in your KOBIL mIDentity proceed as follows After inserting the KOBIL mIDentity with new SmartCard which contains the new Additional Decryption Key you will be called upon to enter the card PIN for the Simple Sign On solution Since only your secure data storages are encrypted with the ADK certificate and not the passwords please cancel the PIN entry otherwise an error message will occur After confirming the error message you can access the decrypted data except of passwords anyway Attention Additional Decryption Keys are not used for e mail encryption Please refer to section how to configure the ADK certificates 85 Chapter 6 Your mobile Office In this section you learn how to use KOBIL mIDentity to secure your daily digital communication 6 1 Secure Email Communication using Outlook amp Outlook Express In this section you ll learn how to secure your e mails using Microsoft Outlook Express 98 and 20
70. ption and signature are being combined e Secure Erase Files and directories are securely erased deleted by multiple overwriting You can immediately start using file security using the self signed certificates from Secure Data Storage management 1 This is the easiest way to obtain a certificate since there is no certificate request at a trust centre needed But for more comfort you should apply for a personal certificate at a trust centre which allows you to select certificates by user names In section B 4 3 you learn how to obtain such a personal certificate The following examples show how to work with personal certificates but the same functionality is available with self signed KOBIL mIDentity certificates that can be recognized by ther serial number for example 8949017230000024681 5 3 1 File and Directory Encryption Important please read carefully section before starting to encrypt files or directories in order to keep your data accessible also in emergency situations If you want to encrypt a file proceed as follows 1 Right click on the file you want to encrypt The context menu shown in figure p 10 appears 2 Choose KOBIL mIDentity gt Encrypt your self signed certificate will be generated as soon as you create the first Secure Data Storage 68 Co tox File Edit View Favorites Q 9 3 Address C Documents ar SE ie New Print KOBIL mIDentity gt Encrypt amp Sign Encrypt Open W
71. ption process An encrypted file will be stored with the file name extension kse as shown in figur Note If you want to encrypt files to persons whose certificates are not present locally they dont appear in the selection list you can click on Search to find the certificate in a directory service as explained in section 70 iolx File Edit View Favorites Tools Help E Back gt 7 9 Search io Folders fz Address D C Documents and Settings kobil iMy Documents gt Go Name Size Type Date Modified Secret doc 24KB Microsoft Word Document 11 01 2005 10 25 25K6 KSE File 11 01 2005 10 26 Type KSE File Date Modified 11 01 2005 10 26 Size 24 2 KB Figure 5 12 An encrypted file Encrypted files are stored in PKCS 7 format which enabled interoperability between different applications Folder Directory encryption works exactly as file encryption Just right click on the directory you want to encrypt If you encrypt a directory all files in that directory will be encrypted in PKCS 7 format even sub folders You can also add or remove encryption recipients on already encrypted files or directories see section 5 3 2 Attention Never encrypt files necessary for your operating system to start You may destroy your system configuration 5 3 2 Add Remove encryption Recipients If you want to change the list of encryption recipients of an already encrypted file right click that file and select KOBIL
72. r newer versions m KOBIL miDentity Software License Depending on your KOBIL mlDentity package you have to enter a valid license key in order to use the full KOBIL mlDentity functionality This key is either shipped together with the package or you can purchase it from your certified KOBIL partner Klick on Enter License Key to enter the license key now Enter License Key y www kobil com mlDentit Close Figure 2 7 Entering the License Key KOBIL mIDentity License Key Koil i Please enter your license key e e Figure 2 8 Entering the License Key 10 Chapter 3 First Steps 3 1 Your personal KOBIL mIDentity The KOBIL mIDentity Control Centre Software consists of a main window see figure and a traybar menu which resides in the Windows Tray Bar at the right bottom near the system clock see figure B 2 Ei midentity Control Center oor MI DENTITY KOBIL i Logon Accounts 002 MY OFFICE Mobile Oce Moved TANS ARE 0o03 N Secure Data Storage CONFIGURATION 00 Manual sae SOUP cece Close Remove miDentity J Www KOBIL COM Figure 3 1 KOBIL mIDentity Control Centre main window By double clicking the tray bar icon the main window is opened All functions can be used by both the main window and the tray bar menu The main window is better for untrained users while the tray bar menu allows fast work for power users 11 M
73. rds and Readers SmartCards are credit card sized devices with integrated circuit chips ICC on them They have their own security mech anisms to lock themselves against physical electrical and chemical attacks When private keys are loaded they never leave the SmartCard and a PIN code protects the key usage SmartCards are easy to use They can fit in a wallet and can be easily carried Terminals often called readers although they are usually able to write as well are the devices which enable communication between a SmartCard and a computer Smartcard terminals can be connected to computers via serial or USB ports An important advantage of some more expensive terminals is the secure PIN entry option which is possible if a reader has its own keypad display and special software on it Figure A 8 SmartCard Terminals A 3 7 Secure Socket Layer SSL Secure Sockets Layer SSL developed by Netscape Communications is a standard security protocol that provides security and privacy on the web The protocol allows client server applications to communicate securely This is achieved by an online interactive process which handles secure and authentic exchanges of some random data which is finally used to generate the session key on both sides SSL uses both public key and session key algorithms Work flow of the SSL is illustrated in figure A 9 In many cases client authentication is optional since clients may not have certificates 106
74. re b will appear 87 Kobil Test User Properties Figure 6 2 Internet Accounts properties Dialog 3 Click Select and choose a certificate from the list that shows all the certificates which can be associated with the account you selected above If there are other certificates which don t have the same e mail account information they will not be displayed in this list You can select the same certificate for signature and encryption if your security policy allows this The dialogue is shown in figure 88 Select Default Account Digital ID ntuser 4 Kobil CSP T Encrypting F None ntuser 4 Kobil CSP T Encrypting F None st user k None Figure 6 3 Select Digital ID Dialog 4 You can select the session key algorithm which will be used for bulk encryption and decryption For strongest security 3DES or RC2 128 bit is recommended Outlook 98 2000 xp 2003 1 Start Outlook and choose the menu Extras gt Options 2 Choose the drawer Security as shown in figure 6 4 89 Figure 6 4 Security Options dialogue in Outlook 98 2000 xp 2003 3 Click on the button Change Settings The dialogue shown in figure 6 5 will appear 4 You can now select two independent certificates for signature and encryption using the Choose buttons Be careful to select a certificate which contains the e mail address suitable for your e mail account You can select the same certific
75. rive is reachable again you can import the Secure Data Storage and proceed as normal In order to delete a link to a Secure Data Storage open the Control Centre Software and click on Secure Data Storage gt Delete data safe link and choose the one for which the link should be deleted Then you will be asked to confirm the deletion 66 mlDentity Control Center oI MY IDENTITY Logon Accounts A 02 MY OFFICE Mobile Office wy a 00a MY DATA SAF Secure Data Storage wADatensafe Drive H Log off E network storage Drive I Log off Create Import Manual A Close L Delete Delete data safe link WWW KOBIL COM Figure 5 9 Delete Secure Data Storage link 67 5 3 File Security KOBIL mlIDentity allows you not only to encrypt whole Secure Data Storages but also single files and directories using digital certificates The following options are available e Encryption Your files are encrypted with a certificate so that it can only be decrypted using the corresponding private key on your KOBIL mIDentity SmartCard Only the person owning both the right KOBIL mIDentity can access the file contents You can encrypt both files and directories e Digital Signature By means of a digital signature your data can be protected against unauthorized modification Furthermore the data can be assigned to the author You can sign files and directories e Encryption and Signature The advantages of encry
76. rsions can work with up to four Secure Data Storages on your local hard disk or on mounted network drives Each Secure Data Storage can be up to 4 GB in size if your hard disk is NTFS formatted there is no upper limit Additional you can also have a mobile Secure Data Storage onboardf to carry your sensitive data anywhere you go see section EZA In order to create a Secure Data Storage on your network drive please proceed as already explained for Secure Data Storages on your local hard disk If a network drive is mounted on your system you can choose it for destination when creating a new Secure Data Storage If you work with Secure Data Storages on network drives it could be that you change to a workstation on wich your network Secure Data Storage is not known To make the Secure Data Storage appear on this workstation please proceed as follows 1 Click in the Control Centre main window on Secure Data Storage gt import The import Secure Data Storage dialog window will appear 5does not apply to KOBIL mIDentity Light 62 Import from network Please select the network data storage you want to import automatic search manual search projekte on server Y eB network storage Import Cancel j ww a Figure 5 4 Importing a network Secure Data Storage 2 Choose the network Secure Data Storage you want to import and click Import Afterwards the Secure Data Storage adminis
77. ryption Keys 2 eee eee A OION OION ot Oy LS l lt AA O Le TR V D Oy 6 Your mobile Officd 85 0 ecure Email Communication using Outlook amp Outlook Express 2 02 2 2 85 onfigure your Certificatd oaoa ee ee ee ee BH 6 1 ending secure Email 2 aaas L Receiving secure E mail 2 ee ee ee ee A iA ryptographic Basics and andard 96 3 Data Digestion Algorithms 2 eee ee ee 9T A 3 2 Symmetric Encryption Algorithmd 0 ee ee ee ee eee 97 104 A 3 ecur Socket Layer SOL a 44 444 000 R44 ie an ar Ar ee ede Pee eda de wee eae 105 A 3 8 Secure Multipurpose Internet Mail Exchange 5 MIME 20 0 106 109 Chapter 1 What is KOBIL mIDentity KOBIL mIDentity is a completely new product which will help you to simplify your life No matter if you are in the office on the road or at home KOBIL mIDentity makes your world mobile since it is your mobile Identity your mobile Datasafe and your mobile Office 1 1 Content e KOBIL mIDentity Light Basic Classic e Key Ring e optional Docking Station with 1 8m USB 2 0 cable e optional SIM sized Smart Card e optional CD ROM e optional License Key only KOBIL mIDentity Light 1 2 System Requirements Operating Systems Microsoft Windows 2000 min Service Pack 3 or Microsoft Windows XP min Service Pack 1 or Microsoft Windows 2000 2003 Serverf
78. s inside the chosen directory are now decrypted and verified and stored without the ending ksk The signature verification result is shown as in figure p 19 If not all files in that directory could be processed either could not be decrypted or not all files are ksk files you will get a corresponding warning 5 3 9 Default Settings for File Security Open the Control Centre Software and select Setup gt Secure Data Storage and choose the drawer File Security 81 miDentity Setup x Datasafe File security Delete automatically I Source file after encryption T Source file after signature I Source file after decryption J Signed file after checking signature Summary for multiple encryption Select A Erase A C Default encryption certificate Search y Additional decryption key No certificate is selected www kobil com mlDentity OK j Cancel Figure 5 23 File Security Settings For getting more detailed information please visit http www kobil com and download the KOBIL mIDentity whitepaper wich will answer your questions Erase Options e If the checkbox Original files after encryption is active each original file is deleted automatically after encryption You can change this behaviour also per encryption process see sections and 5 3 7 e If the checkbox Original files after signing is active each original file is deleted automatically after signature You can change this behaviour also per
79. smartcard please select the appropriate provider as directed by the manufacturer Digital ID Subscriber Agreement You must read this subscriber agreement before applying for accepting or using Digital ID certificate If you do not agree to the terms of this subscriber agreement do not apply for accept or use the Digital ID certificate THIS SUNSCRISER AGREKMNENT will become effective on the date you aubmic the certificate application to the desigqneted Tasuing Authority TA By submitting thas Subscriber Agreement tand certificate application you are requesting that the IA asoue a Digital ID certiticate to you anc are expressing your eqgreement to the terms of this Subscriber Agreement Verisign s Public Certification Services are governed by Verisign s Certification Practice Statement the CPS as amended Crom time to time which is incorporated by reference imto this Subseraber Agreement The CPS 12 published on the Internet in Verisign s ReagCrs Download CPs If you aqree to the terms of the Subscriber Agreement please click ACCEPT to continuc Accept Dedine Figure 3 14 Certificate Request at VeriSign CA Import existing certificates into the KOBIL mIDentity SmartCard If you already have an existing software certificate you can import it onto you KOBIL mIDentity SmartCard Please refer to section B46 3 4 3 The Windows Certificate Manager The Windows Certificate Manager is Windows central st
80. t it is not trusted because it is not stored in the Trusted Root Certification Authorities store 3 Click on Install Certificate 4 The following dialogues can be skipped using the button nezt 5 The last dialogue box asks you to confirm the CA certificate s fingerprint You should obtain this fingerprint on a independent way for example on the CA s letter paper or on its web pages Tnote that the SmartCard s private key can never be exported 24 Note that you automatically get an implicit trust relationship to all users of the new certification authority when you import its CA certificate You should inform yourself about the certification policy of the new certification authority before importing its CA certificate After successful import you find the new CA certificate in the Windows Certificate Manager either in Intermediate Certification Authorities or in Trusted Root Certification Authorities see section B 4 3 3 4 5 Importing another User s Certificate Before you can send e mail to a user you must get the user s digital certificate and add it to your address book You can obtain the certificate by two ways e Receive a signed e mail from the user Signed e mail contain the user s digital certificate e Obtain the user s certificate from a public directory service e Save the user s certificate to your certificate store Outlook Express In Outlook Express choose the menu Edit gt Find gt Peop
81. t reason you should not do any input while KOBIL mIDentity automatic login to a application 4 1 4 Working with Console Applications As not all applications are based on Windows dialog boxes or HTML KOBIL mIDentity can also work with console windows DOS Box PuTTY See a FTP console as an example Please open your command prompt and press Alt F11 Enter user name and password in the input dialog You can use static passwords or one time passwords OTP with the additional KOBIL SecOVID system 44 i XP Version 5 1 26061 lt C Copyright 1985 2001 Microsoft Corp C Documents and Settings kobil gt Account data for the command line prompt Please enter the necessary data You can also enter a complete command line Description Commancine Usermame miDentity M Retur Static Password Eeee I Retum password validation ee o y C One Time Password OTP T Command line ACCI22CANLZ2PWD122CANL I Do not ask for recognized window Enter data directly OK Cancel Figure 4 13 Manual entry of passwords for console applications You can also enter complete command lines if you have choosen the option Command line Therefor you can use following aliases YACC1 User name 2 PWD1 Password 3 CRNL Carriage Return New Line Windows 4 WNL New Line Unix e g PuTTY 45 Microsoft lindows XP Version 5 1 26061 lt C gt Copyright 1985 2001 Microsoft Corp C Documents and Set
82. the SSO Emergency Assistant By having your user ids and passwords displayed on the screen and printed you are giving away very valuable information Make sure nobody has access to your secret data 56 Password Figure 4 31 view several accounts 4 2 Windows SmartCard Logon Windows 2000 and XP make it possible to deploy strong authentication using SmartCards by leveraging operating system features such as Kerberos Active Directory and the variety of administrative tools used to manage a public key infrastructure Instead of logging on with username and password you simply plug your KOBIL mIDentity in and enter your KOBIL mIDentity SmartCard s PIN If you want to log on to your computer using KOBIL mIDentity a SmartCard logon certificate must be stored on your KOBIL mIDentity SmartCard The computer needs to be member of a Windows 2000 or 2003 domain with Active Directory to allow SmartCard logon The SmartCard logon certificate will be issued from the Windows certificate services with are part of Windows 2000 and 2003 servers More information about setting up Windows SmartCard logon can be found in the KOBIL mIDentity White Paper that you can get from your local KOBIL dealer or directly in the internet at http www kobil com mIDentity 57 Figure 4 32 Windows SmartCard Logon PIN entry 58 Chapter 5 Your mobile Secure Data Storage KOBIL mIDentity s Secure Data Storage gives you the possibility to securely store y
83. the category Standard on the left side 4 In the selection field Commands you find them at the end sign message content and attachments and encrypt message contents Drag and drop them with the left mouse button to the menu bar 6 1 3 Sending secure Email To send a secure email proceed as follows 1 Write your email as usual If you add attachments to the email they will also be signed and or encrypted 2 If you want to digitally sign the email activate the button Sign Message as shown in figure 6 6 Outlook Express If the button is not visible please refer to section to configure it 92 3 If you want to encrypt the email activate the button encrypt message contents as shown in figure Outlook Express If the button is not visible please refer to section to configure it 4 You can combine encryption and signature 5 Send your email as usual using the Send button 6 If the email is to be signed you will be asked to enter the KOBIL mIDentity SmartCard s PIN to enable the private key for signing If the email will only be encrypted not signed step 6 PIN entry is omitted since the private key is not needed for encryption It may be that Outlook complains about a missing recipient certificate which is necessary to encrypt the email In this case you can look it up using a directory service Please refer to section B 4 5 to learn how to configure and use a directory service You can configure your default setti
84. the end of the process the verification status for all files will be displayed If not all files in that directory could be processed e g not all files are kss files you will get a corresponding warning 5 3 7 Signature and Encryption of Files and Directories Important please read carefully section before starting to encrypt files or directories in order to keep your data accessible also in emergency situations If you want to encrypt and sign a file or a directory in one step proceed as follows 1 Right click on the file or directory you want to encrypt and sign The context menu shown in figure appears 77 2 Choose KOBIL mlIDentity gt Encrypt amp Sign ioii Fie Edit view Favorites Tools Help E Back Y wi a Search o Folders ies Address E C Documents and SettingsikobihMy Documents gt Go Size Type Date Modified 24KB Microsoft Word Document 11 01 2005 10 41 Open gt Encrypt amp Sign Encrypt Open With gt Sign Send To E 4 Cut Pami Secure Erase Figure 5 19 Context mennu for file directory signature and encryption 3 The dialogue shown in figure p 20 appears The following options are possible e Signature Certificate This is the default signature certificate see section f 3 9 If you want to use any other signature certificate click on Choose e Recipients This is the default encryption certificate see section 6 3 9 and if set also the AD
85. the old certificate will be permanently deleted ATTENTION Encrypted data which is not reachable at this time couldn t be reencrypt and will not be usable any longer 29 mIDentity initialisation assistant Step 4 of 4 Summary PUK and PIN were successfuly created The certificate was imported successfully Certificate s name lt My Certificate gt The certificate lt My Cettificate gt will be used to encrypt your SSO accounts and Secure Data Storage Figure 3 22 Final KOBIL mIDentity status 30 3 4 8 Delete certificates from your KOBIL mIDentity SmartCard miDentity Setup x Logon Account Smart Card Certificate Configuration miDentity Certificate 1 mlDentity Certificate 3 Windows 2000 Logon Cettificate Sub Issuer Serial Number Not before Certificate information formlDentity Certificate 2 ubject CN 894901 7200002657523 mlDentity Certificate 2 Details Register Unregister Delete Search certificates CN 894901 7200002657523 mlDentity Certificate 2 D63664E 008486797442BDD1250115F65 BA www kobil com mlDentity OK y Cancel Figure 3 23 Certificate preferences Important Be very careful deleting a certificate since it is needed to decrypt datasafes emails files and folders that are encrypted with it If you delete a certificate any data encrypted with it may note be accessible anymore Especially the first cer
86. tificate slot contains the self signed KOBIL mIDentity certificate used for datasafe encryption Open the Control Centre Software and choose the option Properties gt Identity and choose the drawer certificates Select the certificate to delete from the list and click on delete Depending on your configuration this option may be disabled for security reasons If you need to enable this option please ask your system administrator 31 3 5 KOBIL mIDentity Personalization KOBIL mIDentity is immediately ready to use and can be personalized by the end user in the field by learning passwords see section and requesting certificates see section B 4 This way KOBIL mIDentity is immediately usable where no infrastructure is available as well as for individual users In bigger organisations with existing infrastructure this is not really useful For these situations KOBIL offers administrative tools and server software for KOBIL mIDentity Further information about this can be found at your local KOBIL dealer or in the internet at http www kobil com mIDentity 3 6 Software Updates The KOBIL mIDentity Control Centre Software is being continuously developed and extended with new functionality If you want to stay always up to date visit hitp www kobil com mIDentity from time to time Here you can download software updates and you find useful tipps and hints about your KOBIL mIDentity 32 Chapter 4 Your mobile Id
87. tings kobil gt ftp 192 168 1 4 Connected to 192 168 1 4 226 ultrai FIP server SunOS 5 7 ready User 192 168 1 4 lt none gt gt Account data for the comman prompt Please enter the necessary data You can also enter a complete command line Description Command Prompt ftp 192 168 1 4 Username miDentity Retum Static Password ronan I Retum password validation pee C One Time Password OTP M Command line ftp 192 168 1 4 CRNLACC14 CRNL PWD1 CRNL I Do not ask for recognized window Enter data directly Figure 4 14 Manual entry of command lines for console applications To paste a password or a command line from KOBIL mIDentity into a console application start your command prompt and press Alt F10 Choose your account and press OK Your account data will be filled in automatically as if you would have entered it using the computer s keyboard M dows XP Version 5 1 2600 lt C Copyright 1985 2001 Micr t Corp C Documents and Settings kobil gt ftp 192 168 1 4 ruer SunOS 5 7 ready nidentity rd required for midentity Beschreibung Lycos Meet you there DSL Chat Email SMS Homepage u v m Micr GMX Homepage Microsoft Intemet Explorer Command Prompt Abbrechen Figure 4 15 Manual Password Transfer Please note that this function can have problems with different character encodings This is why you should use only 46 passwor
88. tration include a further point to mount or unmount this network Secure Data Storage Please note as local Secure Data Storages are stored on your computer s hard disk they cannot be carried around with KOBIL mIDentity For those mobile Secure Data Storages please refer to the next section 5 2 3 Creating a mobile Secure Data Storage on KOBIL mIDentity Important please read carefully section before starting to work with Secure Data Storages in order to keep your data accessible also in emergency situations In addition to local Secure Data Storages stored on your local hard disk KOBIL mIDentity can also work with mobile Secure Data Storages that can be carried around directly on KOBIL mIDentityf Even if your notebook is stolen sensitive data are not only protected by hard disk encryption but they are also still available since you carry your backup in your pocket Mobile Secure Data Storages are more restriced in size depending on the KOBIL mIDentity model Apart from that creating a mobile Secure Data Storage is quite similar to creating a local Secure Data Storage see previous section 1 Click in the Control Centre main window on Secure Data Storage gt create The Secure Data Storage creation dialog window will appear Sdoes not apply to KOBIL mIDentity Light 63 mIDentity Control Center oo1 MY IDENTITY KOBIL if Z Logon Accounts 7 002 MY OFFICE Mobile Office A MY DATASARE Secur
89. x agn p g The CA returns the certificate to Alice who is now the owner of the certificate To give a real meaning to this process the CA would of course need to make sure that Alice really is Alice and not e g Bob claiming to be Alice This however causes additional costs and actions in real life so this is something which a pure Internet service cannot provide However there are companies offering that type of service Today s most popular browsers and e mail programs know the certificates of very well known and more or less trusted CAs So people can easily verify the signatures of many CAs This helps people to decide whether a certificate and its content is trustworthy or not If a certificate is signed and issued by an unknown CA and your browser does not have the public key of that CA then your browser gives a warning and asks whether to proceed or not The typical certificate distribution and verification between users 1 Alice sends her certificate to Bob to give him access to her public key This is typically achieved by sending a signed but not encrypted message to Bob 2 Bob verifies the signature of Alice s certificate by using the CA s public key If the signature proves to be valid he accepts the public key in the certificate as Alice s public key Today s browsers and e mail programs handle verification automatically lIn cryptographic protocols the users are often called Alice and Bob 105 A 3 6 SmartCa
90. xt menu shown in figure is shown my ries TST File Edit view Favorites Tools Help E Back Y gt a Search io Folders B Address E C Documents and Settings kobil My Docume gt Go Size Type Date Modified Date Pictur EY 11 01 2005 10 32 Open New Print KOBIL mIDentity gt Encrypt amp Sign Encrypt Open With b cgees ss a oo SAT Secure Erase Cut a Copy ropy Figure 5 14 Context menu for file signature 2 Choose KOBIL mIDentity gt Sign 3 The dialogue shown in figure B 15 appears The following options are available e Signature Certificate This is the default signature certificate configured see section 3 9 If you want to use any other signature certificate click on Choose e Erase original file s This checkbox decides if the original files should be erased after signature The default setting of this checkbox can be configured see section 73 File Directory Signing Signature Certificate Select Subject CN 894901 72000021 74743 I Erase original file s after signed Proceed PA Cancel Figure 5 15 File directory signature options If all options are correct click on proceed to start the signature process 4 Enter your KOBIL mIDentity SmartCard s PIN 5 The file is now signed and stored with the ending kss as shown in figure 5 16 74 CI iolx File Edit view Favorites Tools Help Q Back wi Search
91. y while manufacturing and stored direct on the card To obtain the ePUK you have to enter your PIN and then you can read out the ePUK Initialization of an E4 NetKey Card If you insert KOBIL mIDentity within an E4 NetKey Card for the first time the KOBIL mIDentity Control Centre software will automaticly detect whether this card is in a transport or null PIN state or not If the card is in such a state you will be asked to enter your new PIN twice Additionaly you can read out or print out your ePUK If you don t remember your ePUK after this initialization process you can read out the ePUK later as well Just click under Preferences gt Identity gt mIDentity Smart Card the button read ePUK You will be asked for your PIN to read out the ePUK Additionaly you can print out your ePUK Both buttons are only active if the inserted smart card is an E4 NetKey Card The knowledge about your ePUK is specially important if you need to unblock the PIN please refer to B 3 4 17 Passw rter 550 Datensafe Zertifikat mlDentity Smart Card m Des gt PIN Funktionen PIN ndem PIN freischalten M PUK Funktioner ePUK auslesen ePUK drucken Karte l schen Kartennummer Zert importieren Ihre ePUK lautet 71769752 www kobil com mlDentity Beenden Figure 3 11 KOBIL mIDentity SmartCard preferences ePUK reading printing IMPORTANT If you print out your ePUK please take care that nobody has a
Download Pdf Manuals
Related Search
Related Contents
Manual de instrucciones Exmark 920 Lawn Mower User Manual Manual - Tradeinn bio controller adi 1030 Ingersoll-Rand PE15X-XXX-XXX User's Manual Lo scanner Xerox DocuMate 262i I-Lock™ Coupler Install Manual Haz clic aquí para ver el panfleto de instrucciones, las se repérer 2 Copyright © All rights reserved.
Failed to retrieve file