User's Manual
CryptoIdentity User Guide – Index
Page- 4
-
INDEX
1 INTRODUCTION TO CRYPTOIDENTITY AND CRYPTOKIT..........................................6
1. 1 WHAT IS CRYPTOIDENTITY...............................................................................................6
1. 1. 2 CRYPTOIDENTITY MODELS.......................................................................................7
1. 1. 3 CRYPTOIDENTITY DEFAULT PINs............................................................................9
1. 1. 4 CRYPTOIDENTITY DEFAULT CONFIGURATION.................................................10
1. 1. 5 CRYPTOIDENTITY REQUIREMENTS ......................................................................12
1. 2 WHAT IS CRYPTOKIT.........................................................................................................12
1. 2. 1 CRYPTOKIT REQUIREMENTS ..................................................................................12
2. GETTING STARTED WITH CRYPTOIDENTITY...........................................................13
2. 1 INSTALLING AND MAINTAINING CRYPTOKIT ...........................................................13
2. 1. 1 INSTALLING CRYPTOKIT .........................................................................................13
2. 1. 2 MAINTAINING AND REPAIRING CRYPTOKIT......................................................20
2. 1. 3 UNINSTALLING CRYPTOKIT....................................................................................22
3 WORKING WITH CRYPTOIDENTITY UTILITIES..........................................................24
3. 1 ARGENIE...............................................................................................................................24
3. 2 PASSWORD CHANGE UTILITY ........................................................................................26
3. 3 INIT TOKEN..........................................................................................................................27
3. 4 IMPORTPKCS12....................................................................................................................33
3. 5 TOKEN SERIAL NUMBER..................................................................................................35
4. MANAGING DIGITAL CERTIFICATES WITH CRYPTOIDENTITY ..............................36
4. 1 STORING CERTIFICATES INTO CRYPTOIDENTITY.....................................................36
4. 1. 1 CERTIFICATES ISSUED BY CAs ...............................................................................36
4. 1. 1. 1 VERISIGN..............................................................................................................36
4. 1. 1. 2 THAWTE................................................................................................................40
4. 1. 2 CERTIFICATES IMPORTED FROM FILE..................................................................42
4. 1. 2. 1 IMPORTING THROUGH NETSCAPE.................................................................42
4. 1. 2. 2 IMPORTING THROUGH IMPORTPKCS12........................................................46
4. 2 VIEWING DIGITAL CERTIFICATES.................................................................................46
4. 2. 1 VIEWING CERTIFICATES THROUGH MICROSOFT CERTIFICATES STORE ...46
4. 2. 2 VIEWING CERTIFICATES THROUGH ARGENIE UTILITY ..................................49
4. 3 SUGGESTED POLICY FOR BACKUP OF DIGITAL CREDENTIALS ............................50
4. 3. 1 HOW TO BACKUP DIGITAL CREDENTIALS..........................................................50
5. WORKING WITH CRYPTOIDENTITY AND APPLICATIONS ......................................56
5. 1 MAIL CLIENTS.....................................................................................................................56
5. 1. 1 OUTLOOK EXPRESS 5.x / 6........................................................................................56
5. 1. 1. 1 OUTLOOK EXPRESS CONFIGURATIONS.......................................................56
5. 1. 1. 2 SECURE EMAIL-S WITH OUTLOOK EXPRESS..............................................59
5. 1. 2 MICROSOFT OUTLOOK 2000 ....................................................................................67
5. 1. 2. 1 OUTLOOK EXPRESS CONFIGURATIONS.......................................................67
5. 1. 2. 2 SECURE EMAIL-S WITH MICROSOFT OUTLOOK 2000 ...............................71
5. 1. 3 NETSCAPE MESSENGER 4. 7.....................................................................................77
5. 1. 3. 1 NETSCAPE MESSENGER 4. 7 CONFIGURATIONS ........................................77