![]() Navigate to 'Trusted Root Certification Authorities' and ensure you have the DOD Root CA certificate installedģ. It also covers a broad array of applications by supporting ISO 7816 Class A, B, and C smart cards microprocessor cards with the T0, T1 protocol and a wide variety of memory cards, including the US Department of Defense Common Access Card (CAC). ![]() Click the start menu/SecureAuth/Tools and select 'Certificates Console'Ģ. This PC-linked smart card reader boasts of greater speed than any of its predecessors. Verify the DOD Certificates were properly installedġ. Right-click 'InstallRoot_v3.13.1A' and select 'Run as administrator'ħ. Click 'Open' so that the file automatically launchesĥ. ![]() You might be prompted to add to your trusted sites to complete the downloadĤ. Download 'InstallRoot 3.13.1a from Militar圜AC'ģ. Open the browser on the server and navigate to 's download section HEREĢ. If you have a specific set of root and intermediate certificates you can install them, if you do not this is the process to install the DOD root and intermediate certificates on the SecureAuth appliance.ġ. In order to check these client side certificates we need to install the root and intermediate certificates on the appliance. When SecureAuth prompts for a CAC or PIV certificate your webserver is actually matching the client side SSL certificates with the certificates that are installed on your SecureAuth appliance. Verify installation of certificates into local computers cert store (not users).Download root/intermediate DOD certificates.The steps for configuring Client side SSL (CSSL) for a SecureAuth appliance setup to validate CAC or PIV Cards
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |