IronKey Personal User Guide Models S200, S100 D200 IRONKEY USER GUIDE PAGE 1
Thank you for your interest in IronKey. IronKey is committed to creating and developing the best security technologies and making them simple-to-use, affordable, and available to everyone. Years of research and millions of dollars of development have gone into bringing this technology to you in the IronKey. For a quick product overview, you can also view our online demos at https://www.ironkey.com/demo.
Contents What is it? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Meet the IronKey . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Core Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Device Diagrams . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
What is it? Meet the IronKey The IronKey Personal Secure Flash Drive, designed to be the world’s most secure USB flash drive, protects your data, passwords, and Internet privacy with some of today’s most advanced security technologies. Even if your IronKey is lost or stolen, your data remains protected and can even be restored to a new IronKey from an encrypted backup. While the underlying security technologies are complex, the IronKey is simple to use and you only need to remember a password to unlock it.
Portable Cross-Platform Data Access The IronKey Unlocker allows you to access your encrypted files on Windows 2000, XP, Vista, Mac OS X and numerous distributions of Linux. Simple Device Management Your IronKey includes the IronKey Control Panel, a central launchpad for launching your applications, editing your preferences, and safely locking your IronKey. Secure Data Recovery Securely back up the data on your IronKey using IronKey’s Secure Backup software.
Device Diagrams The IronKey has been designed from the ground up with security in mind. A combination of advanced security technologies are used to ensure maximum protection of your data. Additionally, the IronKey has been designed to be physically secure, to prevent hardware-level attacks and tampering, as well as to make the device rugged and long-lasting. You can rest assured that your data is secured when you carry an IronKey.
Technical and Security Notes We are endeavoring to be very open about the security architecture and technology that we use in designing and building the IronKey devices and online services. There is no hocus-pocus or handwaving here. We use established cryptographic algorithms, we develop threat models, and we perform security analyses (internal and third party) of our systems all the way through design, development and deployment.
Identity Manager Protection The IronKey Identity Manager and my.ironkey.com work together, giving you the ability to back up your online passwords to your Online Security Vault at my.ironkey.com. First, you must unlock your IronKey device, which requires two-factor authentication.
Secure Sessions: Making Tor Faster and More Secure IronKey maintains a secure, private Tor network with its own, highperformance servers (separate from the public Tor network). This improves the overall security in at least two ways: Since IronKey controls the “exit-node” in your encrypted Tor circuit, we can ensure that no one is injecting unwanted or malicious content into your online communications, such as advertisements or spyware.
How does it work? Product Walkthrough Your IronKey Personal Secure Flash Drive consists of the following components: » IronKey Unlocker (Windows, Mac and Linux) » IronKey Control Panel (Windows and Mac) » IronKey Virtual Keyboard (Windows only) » Mozilla Firefox and IronKey’s Secure Sessions Service (Windows only) » IronKey Identity Manager (Windows only) » IronKey Secure Backup (Windows only) » my.ironkey.com (Windows and Mac) Standard Usage Requires: » Windows 2000 (SP4), XP (SP2+), Vista, Mac OS X (10.
3 Create a device password and a nickname for your IronKey. Because you can have multiple IronKeys associated with one IronKey account, the nickname helps you distinguish between different IronKey devices. Your password is case-sensitive and must be at least 4 characters in length. The threat of brute-force password attacks is removed by the IronKey’s selfdestruct feature. 4 Back up your password to your online IronKey account 5 Agree to the License Agreement 6 The IronKey initializes.
Using the IronKey Unlocker on Windows The IronKey Unlocker allows you to securely access your files on multiple operating systems. It prompts you for your password, securely validates it, and then mounts your secure volume where all of your files are stored on the IronKey. Here is how to unlock your IronKey on Windows 2000 (SP4), XP (SP2+), and Vista: 1 Step Plug in your IronKey and unlock it with your password. Description When you plug your IronKey in, the “Unlock Your IronKey” window appears.
Initializing and Activating Your IronKey on a Mac If you prefer to use a Mac, you can choose to initialize your IronKey on a Mac OS X computer: Step 1 Plug the IronKey into your computer’s USB port. Description Your IronKey will run on Mac OS X (10.4+, Intel) computers. It can also be set up and used on Windows and Linux. To use the full speed of the IronKey, plug it into a USB 2.0 port. The IronKey autoruns as a virtual CD-ROM.
6 Activate your my.ironkey.com account. my.ironkey.com is a secure site where you can manage your IronKey account and devices. Accessing my.ironkey.com requires two-factor authentication (your IronKey and your password). 7 Follow the onscreen directions to You will create a unique username and password, setup your my.ironkey.com account. confirm your email address for out-of-band authentication, and answer Secret Questions for supplemental authentication.
Initializing Your IronKey on Linux If you prefer to use a Linux computer, you can choose to initialize your IronKey on Linux: Step 1 Plug it into your computer’s USB port. Description Your IronKey can be initialized on Linux 2.6+ (x86 systems only). It can also be setup and used on Windows and a Mac. To use the full speed of the IronKey, plug it into a USB 2.0 port. 2 Run the ironkey program from The IronKey has a virtual CD-ROM. the IronKey’s linux folder.
NOTE: ironkey only unlocks the secure volume; it must then be mounted. Many modern Linux distributions will do this automatically; if not, run the mount program from the command line, using the device name printed by ironkey.
3. Permissions You must have permissions to mount external/usb/flash devices » You must have permissions to run executables off the IronKey CD-ROM in order to launch the IronKey Unlocker » You might need root user permissions 4. Supported distributions Not all distributions of Linux are supported. Please visit https://support.ironkey.com/linux for the latest list of supported distributions. 5.The IronKey Unlocker for Linux only supports x86 systems at this time. See https://support.ironkey.
2 3 Updating device firmware/software The IronKey can securely update its software and firmware through signed updates that are verified in hardware. This allows users to keep their devices upto-date and protect themselves from future malware and online threats. Configuring your preferences To check for available updates, click the “Check for Updates” button (Windows) or “Check Now” button (Mac).
5 Creating a Lost and Found Message This feature allows you to create a message that will appear on the IronKey Unlocker window. In the event that you lose your IronKey, someone can return it to you if you provide your contact information. 6 Changing your device password 7 8 You can change your device password and optionally back it up online to your Online Security Vault at my.ironkey.com. Changing your password on a regular basis is a good security practice.
Using the IronKey Virtual Keyboard (Windows Only) If you are using your IronKey on an unfamiliar computer and are concerned about keylogging and screenlogging spyware, use the IronKey Virtual Keyboard, which helps protects your passwords by letting you click out letters and numbers. The underlying techniques in the IronKey Virtual Keyboard will bypass many trojans, keyloggers, and screenloggers.
Using the Onboard FIREFOX and Secure Sessions Service (Windows) Since your IronKey comes with a Firefox web browser already onboard, none of your cookies, history files, bookmarks, add-ons or online passwords are stored on the local computer. Now you can carry your personalized web experience with you to other computers without worry.
Using the IronKey Identity Manager (Windows Only) The IronKey Identity Manager securely stores and uses many of your most important identity credentials, including login information and one-time passwords to applications and online accounts. With a click of a button, it automatically launches a specified application, fills in your username and password, and then logs you in. It can even generate strong passwords for you, so that you can really lock down your important accounts.
2 Automatically logging into an account 3 Editing/deleting logins and accounts The next time you return to a website or application for which you have stored a password, your login automatically fills in for you. If you have the auto-login option enabled for that account, the Identity Manager also submits the login. You can also automatically log in by: • Using the IronKey Launcher (Ctrl + Alt + R). • Using the Titlebar Menu in the top right of the application window. • Using the IronKey System Tray Menu.
Using the Secure Backup Software (Windows Only) If your IronKey is lost or stolen, you have peace of mind knowing that your confidential information cannot be seen by anyone but you. And getting your data back is simple with IronKey’s Secure Backup software, which, if enabled, securely restores your data to a new IronKey. Back up your data on a regular basis.
Importing a Digital Certificate into the IronKey (Windows Only) The IronKey Cryptochip includes a limited amount of extremely secure hardware storage space, which can be used for storing the private key associated with a digital certificate. This provides you with additional strong authentication capabilities. For example, you could store a self-signed certificate used for internal systems that will allow you to automatically log in when using the IronKey’s onboard Firefox web browser.
4 Note that IronKey’s certificate is available here. Now you can add your own. Click the “Import” button. 5 Browse to the PKCS#12format certificate file and open it. 6 A window will appear asking you to confirm where to store the certificate. You will be prompted for the location of the PKCS#12format certificate file (file extension will be .p12 in UNIX/ Linux, .pfx in Windows). Choose “IronKey PKCS#11” 7 Enter the password that was used to protect the certificate.
Using my.ironkey.com (Windows and Mac) Your IronKey supports advanced cryptographic authentication using strong PKI key pairs generated in the IronKey Cryptochip. When you log into my.ironkey.com from your device, it uses these unique keys as your digital identity credentials. This locks down your account so that you must have both your IronKey and your password in order to gain access. In other words, only you can access your online IronKey account, even if someone stole your IronKey or your password.
4 Monitoring account activities 5 Enabling Account Alerts for real-time account monitoring 6 Changing account credentials The Account Dashboard shows you the recent activities on your account, such as logins, failed password attempts, and when your device password has been recovered. You can enable a number of Account Alerts for additional insight into what activities are occurring on your my.ironkey.com account.
Using Your IronKey in Read-Only Mode (Windows, Mac, Linux) You can unlock your IronKey in a read-only state such that files on your IronKey cannot be edited. An example of when this is useful is when you want to access a file on your IronKey while using an untrusted or unknown computer. If you unlock your IronKey in Read-Only Mode, you need not fear that malware on that machine will infect your IronKey or modify your files.
Product Specifications For details about your device, see “About IronKey” in IronKey Control Panel Settings. CAPACITY* Up to 32GB, depending on the model DIMENSIONS 75mm X 19mm X 9mm WEIGHT 0.8 oz WATERPROOF MIL-STD-810F OPERATING TEMPERATURE 0C, 70C OPERATING SHOCK 16G rms ENCRYPTION Hardware: 256-bit AES (Models S200, D200), 128-bit AES (Model S100) Hashing: 256-bit SHA PKI: 2048-bit RSA FIPS CERTIFICATIONS See www.ironkey.com for details. HARDWARE USB 2.0 (High-Speed) port recommended, USB 1.
What’s next? In many ways, that’s up to you. We are focused on building not only the world’s most secure flash drive, but also enabling technologies that are simple and enjoyable to use. Your feedback really matters to us, and we carefully review all feature requests and customer feedback for prioritization of our next great features and products. Have a cool idea or suggestion? Please let us know. You can open a thread on the IronKey Forum (forum.ironkey.com) or submit feedback to feedback@ironkey.com.
Contact Information Product Feedback feedback@ironkey.com Feature Requests featurerequest@ironkey.com IronKey Online https://my.ironkey.com https://learn.ironkey.com https://support.ironkey.com https://forum.ironkey.com https://store.ironkey.com IronKey Support https://support.ironkey.com support@ironkey.