
About This Guide ...................................................................................................... vii
1. What Is in This Guide .................................................................................... vii
2. Additional Reading ........................................................................................ vii
3. Examples and Formatting ............................................................................. viii
4. Giving Feedback ............................................................................................ix
5. Revision History ..............................................................................................x
1. Overview of the Enterprise Security Client ............................................................... 1
1. About Smart Card Management ...................................................................... 1
2. Features ........................................................................................................ 2
2. Installing the Enterprise Security Client .................................................................... 5
1. Supported Platforms for the Client ................................................................... 5
2. Supported Smart Cards .................................................................................. 5
3. Installing and Uninstalling the Enterprise Security Client on Red Hat Enterprise
Linux ................................................................................................................. 5
3.1. Installing the Client .............................................................................. 5
3.2. Uninstalling on Red Hat Enterprise Linux .............................................. 6
4. Installing and Uninstalling on Windows ............................................................ 7
4.1. Installing the Client .............................................................................. 7
4.2. Uninstalling the Client .........................................................................14
5. Installing and Uninstalling the Enterprise Security Client on Mac OS X .............14
5.1. Installing the Client .............................................................................14
5.2. Uninstalling the Client .........................................................................18
3. Using the Enterprise Security Client .......................................................................19
1. Launching Enterprise Security Client ..............................................................19
2. Phone Home ................................................................................................19
2.1. About Phone Home Profiles ................................................................20
2.2. Setting Global Phone Home Information ..............................................20
2.3. Adding Phone Home Information to a Token Manually ..........................21
2.4. Configuring the TPS to Use Phone Home ............................................22
3. Windows Cryptographic Service Provider .......................................................23
4. Smart Card Auto Enrollment ..........................................................................24
5. Customizing the Smart Card Enrollment User Interface ...................................28
6. Managing Smart Cards ..................................................................................30
6.1. Formatting the Smart Card ..................................................................31
6.2. Resetting a Smart Card Password .......................................................32
6.3. Viewing Certificates ............................................................................32
6.4. Enrolling Smart Cards ........................................................................33
7. Security Officer Mode ....................................................................................34
7.1. Enabling Security Officer Mode ...........................................................35
7.2. Managing Security Officers .................................................................36
7.3. Managing Regular Users ....................................................................38
8. Diagnosing Problems ....................................................................................42
4. Using Enterprise Security Client Keys for SSL Client Authentication and S/MIME ......45
1. Using the Certificates on the Token for SSL ....................................................45
2. S/MIME Applications .....................................................................................47
A. Enterprise Security Client Configuration .................................................................49
v
Hey, Are you tired of missing out on potential profits in the volatile world of cryptocurrency trading? Look no further! I've got something special for you. Introducing the "GOD Trading Strategies" e-book, your ultimate guide to mastering successful crypto trading. For a limited time, you can get this comprehensive guide for just $19.95 instead of the regular $49. That's a whopping 60% discount! Here's what you get with "GOD Trading Strategies": In-depth insights into successf