Smart Card Manager application

This application is made available to users to perform basic cryptographic card or USB key management functions. In addition, it provides a quick and convenient way to
  • Obtain information about the card or USB key, including its identification and capabilities

  • Access information stored on the token, such as keys and certificates

  • Allow content management, such as password profiles, or password modifications

  • Import certificates and digital keys between a computer and a card.

Smart card management is accessed via the following icon in the toolbar :

../_images/tab_manager.png

Smart cards and keys

This section lists the card readers, the cryptographic cards or USB keys inserted, and the certificates present on the cards.

Reader and card icons

reader_empty

Smart card reader without connected card.

reader_card

Smart card reader with supported card connected.

reader_dongle

Cryptographic USB key.

reader_error

Reader with unsupported card, or for which connection to the card was unsuccessful (mute card).

reader_question_mark

Virtual reader containing an card unknown from middleware detected.

Page content

If the selected drive/card pair contains certificates, they are displayed in the tree in the left-hand pane, below the reader:

  • User certificates

  • Certification authority (CA) certificates

When a reader/card pair is selected in the tree, the information below is displayed in the right-hand pane:

  • General information

  • PINs

  • Objects

The "General information" section provides information on the card and reader, such as manufacturer, serial number and card profile.

The PINs section

The PIN section is only displayed when a smart card or key is selected. It is used to unlock the token. Two types of PIN may be present on the card:

  • Card PIN (or global PIN)

  • Signature PIN (reserved for qualified signature operations), for the cards concerned.

PINs are displayed with the following icons:

pin

PIN not verified, with test counter at maximum.

pin_verif

PIN verified (private objects accessible).

pin_warn

PIN with test counter not at maximum.

pin_blocked

PIN whose trial counter is blocked.

Four operations are possible on PINs:

  • Verify: enables access to associated private objects (notably private keys). To do this, you will be asked to enter your PIN. Please note: the number of attempts is generally limited. Removing the card does not reset the counter. Entering the correct code resets the counter.

  • Logout: cancels PIN verification, and therefore remove access to associated private objects.

  • Change: allows you to change the PIN. The current PIN will be requested. Please note: the number of attempts is generally limited (same counter as above). In addition, various constraints may apply to the choice of the new PIN code.

  • Unblock: for cards supporting this operation, allows you to reset a confidential code when the number of attempts has been exhausted. To do this, you will be asked to enter an unlock code. Please note: the number of times you can use this code may be limited. A new confidential code must then be defined.

The Objects section

This section presents the certificates and keys contained in the card. Please note that private objects are only visible if the associated PIN has been verified beforehand.

Objects are presented with the following icons:

certificate

Certificate

key

Key

Trust verification of certificate

For information purposes, trust verification of certificate is represented by the following icons:

cert_check

Valid certificate

cert_cross

Invalid certificate (expired, not approved, revoked, ...)

cert_unknown

Certificate which validity could not be verified (no TSL case)

cert_unknown_tsl

Certificate which validity could not be verified (TSL case)

Note

Both TSL and no TSL cases are defined by the state of Certificate verification policy (cf. User options).

Several rules are taken in account to determine check trust of a certificate:

  • A certificate — if it's not a root certificate — with no private key in the card is always seen as invalid.

  • A certificate is invalid if the certificate is correctly verified (date, signature...) and its certificate chain is also verified. Certificates taken in account for the certificate chain can be present in system certificate store, or in online Trusted Services List or in the card; depending on the Certificate verification policy (cf. User options) setting.

  • Case where validity could not be verified because trust chain could not be verified. There are two cases, depending on the state of Certificate verification policy :

    • no TSL case: if the trust chain is incomplete and the certificate has a valid date.

    • TSL case: if verification could not be done because the online Trusted Services List is not reachable (no network connection...).

  • A certificate is invalid otherwise.

Objects section operations

The section can be structured in different ways:

filter_containers

Displays all objects, sorted by container (linked objects are grouped together)

filter_certs

Only displays certificates

filter_all

Displays all object

The associated menu allows you to :

  • import a certificate, key pair or complete container from a PKCS#8, PKCS#12 or X.509 format file.

  • generate an RSA or Elliptic Curve key pair (for cards supporting it).

These operations may not be available depending on the middleware version deployed, or the operations supported by the card profile.

When hovering over a certificate or key, a + button displays detailed information.

The contextual menu on an object allows you to :

  • export the certificate (in DER or PEM format), or the public key (as a CSR)

  • delete the object

Possible card operations

Note

Not all operations are available on all middleware versions and for all cards.

Import a certificate

This operation allows you to import a PKCS#8, PKCS#12 or X.509 certificate into the card. To do this, you need to enter the card PIN and any certificate password.

operation_import_cert operation_import_cert_password

Generate a key pair

This operation generates an RSA or elliptic key pair directly on the card.

operation_generate_keypair

This operation may take some time. operation_generate_keypair_form

Once the operation is complete, a new key pair is visible on the manager interface.

operation_generate_keypair_generated

Export a certificate

This operation exports a certificate in DER, PEM or PKCS#7 format to the user workstation.

operation_export_cert

You can select the format before exporting:

operation_export_cert_format

Delete an object

You can delete an object (key or certificate) from the menu :

operation_delete_obj

By default, linked objects are also deleted:

operation_delete_obj_dlg

Certificate stores

This section lists the certificates stored in the Microsoft Windows store. These can also be accessed via the certmgr.msc command.

This section may not be available depending on the version of middleware installed.