007-013842-001 - SafeNet Authentication Client - 10.0 - Post GA - Linux - Administrator - Guide - Rev B PDF
007-013842-001 - SafeNet Authentication Client - 10.0 - Post GA - Linux - Administrator - Guide - Rev B PDF
007-013842-001 - SafeNet Authentication Client - 10.0 - Post GA - Linux - Administrator - Guide - Rev B PDF
Client (Linux)
Version 10.0 (Post GA)
Administrator Guide
Table of Contents
1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6
SafeNet Authentication Client Main Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6
What’s New. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7
Supported Browsers and Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8
Supported Platforms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8
Supported Tokens and Smart Cards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8
Certificate-based USB Tokens . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8
Software Tokens . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8
External Smart Card Readers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10
License Activation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10
IDPrime MD Applet 4.0 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10
Number and Type of Key Containers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11
API Adjustments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11
SafeNet eToken devices vs Gemalto IDPrime MD devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12
2 Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
Installation Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .13
Installing SAC on Linux Standard Package . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14
Installing on Ubuntu and Debian. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15
Installing the Core Package . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .16
Installing on Red Hat Enterprise, SUSE, CentOS and Fedora . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .16
Installing on Ubuntu and Debian . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17
Linux External Dependencies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .18
Installing the Firefox Security Module on Linux . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .18
Installing the Thunderbird Security Module. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .19
3 Uninstall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
Uninstalling Linux Standard Package . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .20
Uninstalling on Red Hat Enterprise, SUSE, CentOS and Fedora . . . . . . . . . . . . . . . . . . . . . . . . . . . . .20
Uninstalling on Ubuntu and Debian. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .20
Uninstalling the Core Package . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .21
Uninstalling on Red Hat Enterprise, SUSE, CentOS and Fedora . . . . . . . . . . . . . . . . . . . . . . . . . . . . .21
Uninstalling on Ubuntu or Debian . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .21
4 Configuration Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
eToken Configuration Keys. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .22
General Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .22
Initialization Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .25
SafeNet Authentication Client Tools UI Initialization Settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .29
Additional Documentation
The following publications are available:
• 007-013843-001 SafeNet Authentication Client 10.0 Linux (Post GA) User Guide (Rev B)
• 007-013841-001 SafeNet Authentication Client 10.0 Linux (Post GA) Release Notes (RN - Rev B)
Introduction
SafeNet Authentication Client (SAC) is a middleware client that manages Gemalto’s extensive SafeNet portfolio
of certificate-based authenticators, including eToken, IDPrime smart cards, iKey smart card, USB and software-
based devices.
With full backward compatibility and incorporating features from previous middleware versions, SafeNet
Authentication Client ensures complete support for all currently deployed eToken and iKey devices, as well as
IDPrime MD and .NET smart cards.
Overview
SafeNet Authentication Client is Public Key Infrastructure (PKI) middleware that provides a secure method for
exchanging information based on public key cryptography, enabling trusted third-party verification of user
identities. It utilizes a system of digital certificates, Certificate Authorities, and other registration authorities that
verify and authenticate the validity of each party involved in an internet transaction.
The SafeNet Authentication Client Tools application and the SafeNet Authentication Client tray icon application
are installed with SafeNet Authentication Client, providing easy-to-use configuration tools for users and
administrators.
NOTE:
The term Token is used throughout the document and is applicable to both Smart
Cards and Tokens.
What’s New
SafeNet Authentication Client 10.0 Linux (Post GA) offers the following new features:
• Rebranding: SAC Linux UI and documentation have Gemalto branding.
• Support for the following IDPrime cards:
• IDPrime MD 830-FIPS
• IDPrime MD 830-ICP
• IDPrime MD 830 B
• IDPrime MD 3810 Dual Interface Card
• IDPrime MD 3810 MIFARE 1K (Contact and Contactless mode)
• IDPrime MD 3811
• Support for IDPrime .NET cards
• Support for the following IDPrime MD Common Criteria cards:
• IDPrime MD 840
• IDPrime MD 840 B
• IDPrime MD 3840 - Dual Interface Card
• IDPrime MD 3840 B
• Support for SafeNet eToken 5110 Common Criteria
• Support for SafeNet eToken 5110 FIPS
• Support for unlocking IDPrime MD card range
• Friendly Admin Password - short user friendly passwords are now supported (on IDPrime MD and
eToken 5110 CC devices) instead of using 48 hexadecimal digits. For more details, see the SafeNet
Authentication Client 10.0 Linux (Post GA) User Guide.
1.- Some of the features listed under “SafeNet Authentication Client Main Features” may not be supported on
certain IDPrime MD smart cards. For more details refer to the relevant section in this document.
• Support for PKCS#11 Multi-Slots - for Common Criteria devices in unlinked mode. For information on
how to work with Multi-Slots, see the PKCS#11 Digital Signature PIN section in the SafeNet
Authentication Client 10.0 Linux (Post GA) User Guide.
• PIN Quality modifications - for IDPrime MD cards
Supported Platforms
SafeNet Authentication Client 10.0 Linux (Post GA) supports the following operating systems:
• Red Hat 7.3, 6.9
• CentOS 7.3, 6.9
• SUSE 12.2
• Debian 9.0
• Fedora 26
• Ubuntu 16.04 and 17.04
Software Tokens
• SafeNet Virtual Token
• SafeNet Rescue Token
Smart Cards
• Gemalto IDCore 30B eToken
• Gemalto IDPrime MD 840
• Gemalto IDPrime MD 840 B
• Gemalto IDPrime MD 3840
• Gemalto IDPrime MD 3840 B
• Gemalto IDPrime MD 830-FIPS
• Gemalto IDPrime MD 830-ICP
• Gemalto IDPrime MD 830 B
• Gemalto IDPrime MD 3810
• Gemalto IDPrime MD 3811
• Gemalto IDPrime .NET
NOTE:
For more information on IDPrime MD Smart Cards, see the IDPrime MD Configuration
Guide.
NOTE:
SC Reader drivers must be compatible with the extended APDU format in order to
be used with RSA-2048.
License Activation
SafeNet Authentication Client 10.0 Linux (Post GA) is installed by default as non-licensed.
NOTE:
SafeNet Authentication Client retrieves the license file (SACLicense.lic) automatically, if the license
file is located in the following default path:
Linux (per user): /home/<user name>
Linux (per machine): /etc/
API Adjustments
The table below provides a high-level description of the adjustments that can be made to the Standard and
Extended PKCS#11 API to work with IDPrime MD CC devices. For more detailed information, see the code
samples.
The C_InitToken function must receive the current The C_InitToken function must receive the current
Security Officer (SO) Password Security Officer (SO) Password
When the C_InitToken function is called, you can To initialize the IDPrime MD CC device, the ETCKA_CC
enable linked mode on the IDPrime MD CC device by attribute must be set to CK_TRUE.
using the following setting:
To initialize a device in linked mode, set the
Set the linked mode value to 1 in ETCKA_IDP_CC_LINK attribute to 1.
/etc/eToken.conf under the [Init] section
and the device must be in the factory initialized state To pass the current Digital Signature PUK value, use the
(Admin key = 48 zeros, PUK = 6 zeros) ETCKA_IDP_CURRENT_PUK attribute.
To revert a device back to unlinked mode after it was To revert a device back to unlinked mode after it was initialized
initialized in linked mode, use the PKCS#11 Extended in linked mode, set the ETCKA_IDP_CC_LINK attribute to 0
API, or by using SAC Tools initialization process. and use the ETCKA_PUK attribute to set the new Digital
Signature PUK value.
If a device is not configured to use linked mode, the If a device is not configured to use linked mode, use
C_InitToken function ignores the Digital Signature the ETCKA_PUK attribute to set the new Digital Signature
PUK and Digital Signature PIN. PUK value.
After the device has been initialized in linked mode, the If the device is initialized to use linked mode, the C_InitPIN
C_InitPIN function initializes the Digital Signature function and C_SetPIN function behaves the same as
PIN and the User PIN. Both PIN's are set to the same described in the Standard PKCS#11 section.
value.
3 Roles (Initialization key, Admin 2 Roles (Admin PIN and User PIN)
PIN, User PIN)
Device erased by using the Device is cleared by using the Admin PIN (no changes
Initialization
Initialization key are made to the scheme)
Initialization key is used only for If the Admin PIN is locked, the device cannot be cleared
initializing the device.
Dynamic profile that allows an FIPS based devices - Dynamic profile limited to 15 key
Profile unlimited number of keys depending containers
on the devices memory capacity
CC based devices - Static profile defined by perso
Digital Signature PIN is derived from Linked mode - User PIN and Digital Signature PIN are
the User PIN and the Digital identical and Digital Signature PUK is derived from
Common Criteria Signature PUK is derived from the Admin PIN
Administrator PIN
Unlinked mode - each role has a different value
Installation
Follow the installation procedures below to install SafeNet Authentication Client 10.0 Linux. Local administrator
rights are required to install or uninstall SafeNet Authentication Client.
NOTE:
• If IDGo 800 PKCS#11 is installed, be sure to remove it before installing SAC 10.0 Linux.
Installation Files
The software package provided by SafeNet includes files for installing or upgrading to SafeNet Authentication
Client 10.0 Linux (Post GA). The following Linux installation and documentation files are provided:
File Description/Use
RPM-GPG-KEYSafenetAuthenticationClient 32-bit This file is the public signature (GnuPG) for SafeNet rpm files.
64-bit Relevant only for RPM. The signature confirms that the package
was signed by an authorized party and also confirms the
integrity and origin of your file. Use this file to verify the signature
of the RPM files before installing them to ensure that they have
not been altered from the original source of the packages.
Documentation Files
007-013841-001_SafeNet Authentication SafeNet Authentication Client 10.0 Linux (Post GA) Release
Client_10.0_Linux_Post GA_RN_Revision B Notes
007-013843-001_SafeNet Authentication SafeNet Authentication Client 10.0 Linux (Post GA) User Guide
Client_10.0_Linux_Post GA_User_Guide_Revision B
File Description/Use
where: -hi is the parameter for installation and x is the version number.
NOTE:
For the PKCS#11 module to be installed automatically on a Firefox browser during the
SAC installation, make sure the nss-tools package is installed prior to installing SAC.
NOTE:
To enable the tray icon menu in the notification area, log out and log back in for the icon
to appear.
4. To run the SafeNet Authentication Client Quick Menu, go to: Applications > SafeNet >SafeNet
Authentication Client > SafeNet Authentication Client Tools.
NOTE:
Ensure you log out and log back in to see the tray icon menu.
where: -hi is the parameter for installation and x is the version number.
The installation packaging for SafeNet Authentication Client running on Ubuntu is the Debian software package
(.deb).
The following is the SafeNet Authentication Client .deb package:
• .deb Package Name:
• 32-bit: SafenetAuthenticationClient-core-10.0.xx-0_i386.deb
• 64-bit: SafenetAuthenticationClient-core-10.0.xx-0_amd64.deb
where: xx is the build number
Ubuntu
• PCSC (Smart Card Resource manager): libpcsclite1
NOTE:
• To work with CC devices in unlinked mode, enter the following string for Multi-Slot support:
for 32-bit: /usr/lib/libIDPrimePKCS11.so
for 64-bit: /usr/lib64/libIDPrimePKCS11.so
• For information on how to work with Multi-Slots, see the PKCS#11 Digital Signature PIN
Authentication section of the SafeNet Authentication Client User Guide.
NOTE:
• To work with CC devices in unlinked mode, enter the following string for Multi-Slot support:
for 32-bit: /usr/lib/libIDPrimePKCS11.so
for 64-bit: /usr/lib64/libIDPrimePKCS11.so
• For information on how to work with Multi-Slots, see the PKCS#11 Digital Signature PIN
Authentication section of the SafeNet Authentication Client User Guide.
Uninstall
After SafeNet Authentication Client 10.0 Linux has been installed, it can be uninstalled. Local administrator rights
are required to uninstall SafeNet Authentication Client. When SafeNet Authentication Client is uninstalled, user
configuration and policy files may be deleted.
Configuration Properties
SafeNet Authentication Client properties are stored on the computer as ini files which can be added and changed
to determine SafeNet Authentication Client behavior. Depending on where an ini value is written, it will apply
globally, or be limited to a specific user or application.
NOTE:
All properties can be manually set and edited.
General Settings
The following settings are written to the [General] section in: /etc/eToken.conf
NOTE:
On a Linux, the number of slots is determined by the PcscSlots and SoftwareSlots configuration
keys described here. The Reader Settings window in SafeNet Authentication Client Linux Tools
displays the number of slots that have been configured, but does not allow the user to change the
settings.
Description Value
Defines the number of virtual readers for SafeNet Virtual Tokens. Values: >=0
(0 = SafeNet Virtual Token is disabled; only
Note: Can be modified in ‘Reader Settings’ in SafeNet Authenti- physical tokens are enabled)
cation Client Tools also.
On Windows Vista 64-bit and on systems later than Windows 7 Default: 2
and Window 2008 R2, the total number of readers is limited to 10
from among: iKey readers, eToken readers, third-party readers,
and reader emulations.
Defines the total number of PC/SC slots for all USB tokens and Values: >=0
smartcards. (0 = Physical tokens are disabled; only SafeNet
Included in this total: Virtual Token is enabled)
• the number of allocated readers for third-party providers
• the number of allocated iKey readers, which is defined during Default: 8
installation and cannot be changed
• the number of allocated readers for other SafeNet physical
tokens, which can be modified in ‘Reader Settings’ in SafeNet
Authentication Client Tools
Note: On Windows Vista 64-bit and on systems later than
Windows 7 and Window 2008 R2, the total number of readers,
consisting of this value and any enabled reader emulations, is
limited to 10.
Defines the total number of HID slots for all HID USB tokens. Values: =0, =4, >=0
Default: 4 slots
Default: 0 (False)
Default: 0 (False)
Default: 0 (False)
Initialization Settings
The following settings are written to the [INIT] section in: /etc/eToken.conf
NOTE:
All setting in this section are not relevant to IDPrime MD cards, except for the LinkMode setting.
Description Value
Default: 15
Default: 15
Default:
4, for CardOS tokens
5, for 4.20B FIPS and Java Card -based tokens
Default: 0 (False)
Note: Can be set in SafeNet Authentication Client Tools. Default: 1 (True), for OTP tokens. 0 (False), for
other tokens
For CardOS-based tokens, defines the default size, in bytes, of Default: depends on the token size:
the area to reserve for RSA keys. • For 16 K tokens, enough bytes for three 1024-bit
• The size of the area allocated on the token is determined keys
during token initialization, and cannot be modified without • For 32 K tokens, enough bytes for five 1024-bit
initializing the token. keys
• RSA-Area-Size is not relevant when Legacy-Format-Version is • For larger tokens, enough bytes for seven 1024-
set to 5. bit keys
Note: Can be set in SafeNet Authentication Client Tools.
Default: My Token
Default: 1 (True)
Note: Previous to SAC 8.2, the default setting was 0
(False). As CardOS 4.2 does not support both FIPS
and RSA-2048, failure to take this into account this
may lead to token initialization failure when using
PKCS#11. To prevent this, ensure that the default is
set to False, or else ensure that the application
provides both the required FIPS and RSA-2048
settings.
Default: 0 (Always)
Default: 0 (False)
Default: 0 (Admin)
Default: 0 -(Never)
Default: 0 (False)
Use the same token and administrator passwords for digital Value Name:
signature operations. LinkMode
Values:
1 (True) - Linked
0 (False) - Unlinked
Default: 0 (False)
Description Value
Default: 1
The following settings are written to the [InitApp] section in: /etc/eToken.conf/
Description Value
Default: 1234567890
Note: Default: 1
This option is selected by default. If the option is de-selected, it
can be selected again only by setting the registry key.
Note: Default: 1
This option is not supported by iKey.
Default: 0
Default: 0
Default: 1
Defines the amount of space to reserve on the token for Common Values:
Criteria certificates that use 1024 -bit RSA keys. 0-16 certificates
Note: This option is not supported by IDPrime MD cards.
Default: 0
Description Value
Default: o (False)
Defines the term used for the token's user password. Values (String):
Note: If a language other than English is used, ensure Password
that PIN
Passcode
Passphrase
Default: Password
Default: 0
Default: 0
Default: 1
Default: 1
Default: 1 (True)
Default: 0
Default:
14 days
Default: 30 days
Default: 0
No default
Default: 1 (True)
If not empty, defines a string that replaces the default Values: String
password policy description displayed in the Unlock
and Change Password windows.
Default: 0
Default: 0
NOTE:
These settings are not relevant to IDPrime MD cards and eToken 5110 CC, as the password quality
settings reside on the card itself.
Description Value
Default: 6
Default: 16
Default: 0
Default: 1
Note: Default: 0
We recommend that this policy not be set when tokens
are enrolled using SafeNet Authentication Manager.
Default:
0, for tokens with an Administrator Password.
1, for tokens without an Administrator Password.
Default:
1 (True), for administrator-owned tokens
0 (False), for user owned tokens.
NOTE:
All access control features are enabled by default, except where indicated in the table.
Change Token Password ChangePassword Enables/Disables the Change Token Password feature in
SafeNet Authentication Client Tools.
Delete Token Content ClearEToken Enables/Disables the Delete Token Content feature in SafeNet
Authentication Client Tools.
View Token Information ViewTokenInfo Enables/Disables the View Token Information feature in SafeNet
Authentication Client Tools.
Disconnect SafeNet DisconnectVirtual Enables/Disables the Disconnect SafeNet Virtual Token feature
Virtual Token in SafeNet Authentication Client Tools.
Help ShowHelp Determines if the user can open the Help file in SafeNet
Authentication Client Tools.
Advanced View OpenAdvancedView Determines if the user can open the Advanced View in SafeNet
Authentication Client Tools.
Connect SafeNet Virtual AddeTokenVirtual Enables/Disables the Connect SafeNet Virtual Token feature in
Token SafeNet Authentication Client Tools.
Reset Default Certificate ClearDefaultCert Enables/Disables the Reset Default Certificate Selection feature
Selection in SafeNet Authentication Client Tools.
Copy Certificate Data to CopyCertificateData Enables/Disables the Copy Certificate Data to Clipboard feature
Clipboard in SafeNet Authentication Client Tools.
Set Certificate as Default SetCertificateAsDefault Enables/Disables the Set Certificate as Default feature in
SafeNet Authentication Client Tools.
Set Certificate as Auxiliary SetCertificateAsAuxilary Enables/Disables the Set Certificate as Auxiliary feature in
SafeNet Authentication Client Tools.
Set Token Password SetUserPassword Enables/Disables the Set Token Password feature in SafeNet
Authentication Client Tools.
Token Password Retries AllowChangeUserMaxR Enables/Disables the Logon retries before token is locked
etry feature (for the Token Password) in SafeNet Authentication
Client Tools.
Administrator Password AllowChangeAdminMax Enables/Disables the Logon retries before token is locked
Retries Retry feature (for the Administrator Password) in SafeNet
Authentication Client Tools.
Advanced Initialization OpenAdvancedModeOfI Enables/Disables the Advanced button in the Token Initialization
Settings nitialize window in SafeNet Authentication Client Tools.
Change Initialization Key ChangeInitializationKey Enables/Disables the Change Initialization key button in the
during Initialization DuringInitialize Advanced Token Initialization Settings window in SafeNet
Authentication Client Tools
Common Criteria Settings CommonCriteriaPasswo Enables/Disables the Common Criteria option in the
rdSetting Certification combo box.
System Tray - Unlock TrayIconUnlockEtoken Enables/Disables the Unlock Token feature in the SafeNet
Token Authentication Client Tray Menu
System Tray - Generate GenerateOTP Enables/Disables the Generate OTP feature in the SafeNet
OTP Authentication Client Tray Menu
System Tray - Delete TrayIconClearEToken Enables/Disables the Delete Token Content feature in the
Token Content SafeNet Authentication Client Tray Menu.
Note: By default, this feature is Disabled
System Tray -Change TrayIconChangePassw Enables/Disables the Change Token Password feature in the
Token Password ord SafeNet Authentication Client Tray Menu.
System Tray - Select SwitcheToken Enables/Disables the Select Token feature in the SafeNet
Token Authentication Client Tray Menu.
System Tray -Synchronize SyncDomainAndTokenP Enables/Disables the Synchronize Domain Token Passwords
Domain-Token Passwords ass feature in the SafeNet Authentication Client Tray Menu.
System Tray - Tools OpeneTokenProperties Enables/Disables the Tools menu item (open SafeNet
Authentication Client Tools) in the SafeNet Authentication Client
Tray Menu.
System Tray - About About Enables/Disables the About menu item in the SafeNet
Authentication Client Tray Menu.
Enable Change IdenTrust IdentrusChangePasswo Enables/Disables the Change IdenTrust PIN feature in SafeNet
Identity rd Authentication Client Tools.
Enable Unblock IdenTrust IdentrusUnlock Enables/Disables the Unlock IdenTrust feature in SafeNet
Passcode Authentication Client Tools.
Delete Data Object DeleteDataObject Enables/Disables the Delete Data Object feature in SafeNet
Authentication Client Tools.
Allow One Factor AllowOneFactor Enables/Disables the Allow One Factor feature in the Advanced
Token Initialization Settings window in SafeNet Authentication
Client Tools.
Note: This property VerisignSerialNumber Enables/Disables the Verisign Serial number feature in SafeNet
cannot be set in the Authentication Client Tools.
Access Control Proper-
ties window. It must be
set in the registry key.
Security Settings
The following settings are written to the [Crypto] section in: /etc/eToken.conf
Description Value
Optimized:
• Disable the generation or creation of exportable keys
• Disable the exporting of keys, regardless of how they were
generated
• Disable the unwrap-PKCS1.5 and unwrap-AES-CBC
Strict:
• Disable the generation or creation of exportable keys
• Disable the exporting of keys, regardless of how they were
generated
• Disable the unwrap-PKCS1.5 and unwrap-AES-CBC
• Disable any usage of symmetric keys off-board including
unwrap
Default: Compatible
Values: (String)
Default: None
NOTE:
Administrators must make sure that the third-party applications used by the organization are
configured accordingly and do no use one of the algorithms listed above, as they will be blocked.
Log Settings
The following settings are written to the [Log] section in: /etc/eToken.conf
Description Value
Default: 0 (Disabled)
Default:
1 day
Defines the total size of all the log files when in debug Value:
mode. (Megabytes). Enter a value in Megabytes.
Default: 0 (Unlimited)