-
Aladdin Etoken Pro Usb Token Software S카테고리 없음 2020. 3. 18. 19:00
At the time of writing, DigiCert provides EV Code Signing Certificates in the form of an Aladdin eToken PRO 72k (Java) USB hardware token. The token contains the certificate and the corresponding private key.The token is almost (but not quite) supported by the various open source hardware token drivers available for Linux. As an interim measure, you can download and install the proprietary. The Safenet Authentication Client includes many features which you don't need or want (such as GUI tools and RPM post-installation scripts which cause Firefox to automatically attempt to use your certificate to identify you to every website that you visit): you probably want to disable or delete most of these after installation.The only required portion of the Safenet Authentication Client software is the library /usr/lib64/libeToken.so.
This library provides a standardised PKCS#11 API which allows tools such as and to use the hardware token.The easiest way to test that your hardware token is working is to install and run the commandpkcs11-tool -module libeToken.so -list-objects Changing the password. To extract the certificate from your hardware token, first runpkcs11-tool -module libeToken.so -list-objectsand note the ID associated with your certificate. For example:Certificate Object, type = X.509 certlabel: Fen Systems Ltd.ID: 3342cb0ff9b8e672bdcecbff80ebf89f9c785ce5The certificate can then be extracted using the commandpkcs11-tool -module libeToken.so -read-object -type cert -id 3342cb0ff9b8e672bdcecbff80ebf89f9c785ce5 openssl x509 -inform DER -out codesigning.crt(replacing “ 3342cb0ff9b8e672bdcecbff80ebf89f9c785ce5” with the ID of your certificate). This will give you a file codesigning.crt containing your code signing certificate (but not the private key, which remains on the token). You can examine the contents of codesigning.crt usingopenssl x509 -in codesigning.crt -noout -text Toolchain.
To create a UEFI signing submission, you must create a.cab file containing your (unsigned).efi files. For example, you can create a submission.cab file containing and usinggcab -n -c submission.cab ipxe.efi snponly.efiYou can sign the submission.cab file usingosslsigncode -pkcs11engine /usr/lib64/openssl/engines/pkcs11.so -pkcs11module /usr/lib64/libeToken.so -certs codesigning.crt -h sha256 -askpass -t -key 3342cb0ff9b8e672bdcecbff80ebf89f9c785ce5 -in submission.cab -out submission-signed.cab(replacing “ 3342cb0ff9b8e672bdcecbff80ebf89f9c785ce5” with the ID of your certificate as before).Submitting to Microsoft. You may have to wait up to six months to get a response from Microsoft, during which time you may receive the occasional e-mail asking irrelevant questions. When the response finally arrives, it is likely to be an automated message statingThank you for your submission.
Aladdin Etoken Linux Driver
We were unable to sign your EFI binaries. Common reasons for failure are:Including any files that are not EFI binaries (e.g. README)Invalid directory structure - packages should include only EFI files at the root-level of the packageEFI Bytecode (EBC) drivers must pass the /ALIGN:32 flag to the Intel EBC linkerObservant readers will notice that this message does not give any information about why the signing process failed.
If you attempt to follow up with Microsoft, you will discover that no-one at Microsoft knows how the signing process actually works.Good luck!
USB e-Token is looks like a USB drive but these are secured by Federal Information Processing Standard (FIPS). Digital Signature Certificates stored in e-Token can not be copied to any other device thus providing another layer to your identity security.USB e-Token are hardware devices, which are secured by international standards (FIPS). Digital Signature Certificates stored in e-Token can not be copied to any other device. E-Token is hardware mechanism used for password authentication via using identity management technique and provides hacking problem solution to the user.
It fits in the USB port of the computer. A virus cannot affect USB Token, and the digital certificate stored would always be secure. As per CCA's Office Order, with effective from 7th December, 2013, all Class 2 and 3 Digital Signature Certificates (DSC) will be issued only on FIPS 140-2 level 2 certified crypto tokens.