User's Manual

CryptoIdentity User Guide – Index
INDEX
1 INTRODUCTION TO CRYPTOIDENTITY AND CRYPTOKIT..........................................5
1. 1 WHAT IS CRYPTOIDENTITY...............................................................................................5
1. 1. 2 CRYPTOIDENTITY MODELS.......................................................................................6
1. 1. 3 CRYPTOIDENTITY DEFAULT PINs............................................................................7
1. 1. 4 CRYPTOIDENTITY DEFAULT CONFIGURATION...................................................8
1. 1. 5 CRYPTOIDENTITY REQUIREMENTS ......................................................................10
1. 2 WHAT IS CRYPTOKIT.........................................................................................................10
1. 2. 1 CRYPTOKIT REQUIREMENTS ..................................................................................10
2. GETTING STARTED WITH CRYPTOIDENTITY...........................................................11
2. 1 INSTALLING AND MAINTAINING CRYPTOKIT ...........................................................11
2. 1. 1 INSTALLING CRYPTOKIT .........................................................................................11
2. 1. 2 MAINTAINING AND REPAIRING CRYPTOKIT......................................................16
2. 1. 3 UNINSTALLING CRYPTOKIT....................................................................................18
3 WORKING WITH CRYPTOIDENTITY UTILITIES..........................................................19
3. 1 ARGENIE...............................................................................................................................19
3. 2 PASSWORD CHANGE UTILITY ........................................................................................21
3. 3 INIT TOKEN..........................................................................................................................22
3. 4 IMPORTPKCS12....................................................................................................................26
3. 5 TOKEN SERIAL NUMBER..................................................................................................28
4. MANAGING DIGITAL CERTIFICATES WITH CRYPTOIDENTITY ..............................29
4. 1 STORING CERTIFICATES INTO CRYPTOIDENTITY ....................................................29
4. 1. 1 CERTIFICATES ISSUED BY CAs ...............................................................................29
4. 1. 1. 1 VERISIGN..............................................................................................................29
4. 1. 1. 2 THAWTE................................................................................................................33
4. 1. 2 CERTIFICATES IMPORTED FROM FILE..................................................................34
4. 1. 2. 1 IMPORTING THROUGH NETSCAPE.................................................................35
4. 1. 2. 2 IMPORTING THROUGH IMPORTPKCS12........................................................38
4. 2 VIEWING DIGITAL CERTIFICATES.................................................................................38
4. 2. 1 VIEWING CERTIFICATES THROUGH MICROSOFT CERTIFICATES STORE ...38
4. 2. 2 VIEWING CERTIFICATES THROUGH ARGENIE UTILITY ..................................41
4. 3 SUGGESTED POLICY FOR BACKUP OF DIGITAL CREDENTIALS ............................42
4. 3. 1 HOW TO BACKUP DIGITAL CREDENTIALS..........................................................42
5. WORKING WITH CRYPTOIDENTITY AND APPLICATIONS ......................................48
5. 1 MAIL CLIENTS.....................................................................................................................48
5. 1. 1 OUTLOOK EXPRESS 5.x / 6........................................................................................48
5. 1. 1. 1 OUTLOOK EXPRESS CONFIGURATIONS.......................................................48
5. 1. 1. 2 SECURE EMAIL-S WITH OUTLOOK EXPRESS..............................................51
5. 1. 2 MICROSOFT OUTLOOK 2000 ....................................................................................59
5. 1. 2. 1 OUTLOOK EXPRESS CONFIGURATIONS.......................................................59
5. 1. 2. 2 SECURE EMAIL-S WITH MICROSOFT OUTLOOK 2000 ...............................63
5. 1. 3 NETSCAPE MESSENGER 4. 7.....................................................................................69
5. 1. 3. 1 NETSCAPE MESSENGER 4. 7 CONFIGURATIONS ........................................69