Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

MiniSD card as smartcard?

Posted on 2009-05-02
1
Medium Priority
?
443 Views
Last Modified: 2012-05-06
I've never used smartcard technology but i'm interested in learning more. I have a CA in my microsoft domain and I was wondering if I am able to put my user certificate on a MiniSD card so I can use that to login on my workstation.  If I understand correctly, the only thing that defines a smartcard is a certificate assigned to the user. Since the computers have MiniSD card readers is this possible and is it as simple as putting my certificate on the MiniSD card?
0
Comment
Question by:OriNetworks
1 Comment
 
LVL 33

Accepted Solution

by:
Dave Howe earned 2000 total points
ID: 24289376
Pretty much. Smartcards are, well, smarter than that though, they actually carry out the cryptographic operations for you, and all would involve installing drivers for the appropriate APIs (PKCS #11 and #15 are applicable to smartcards) which, if you were rolling your own solution, you would need to write yourself.

the task isn't undoable - in fact, there is a perfectly good PKCS #11 "soft token" provider as part of the mozilla project which can be bent into service - but you would be looking at getting a skilled programmer to turn that into a windows service for you that read from the sd card the pkcs #15 store and did the cryptographic operations for you (I am not aware of any such service prewritten, but if anyone has one, I would be more than happy to be corrected). It would probably be faster/easier to write your own gina (there are sample implementations available) that checks the card for a user certificate, verifies it, extracts the user name, and then prompts for the domain password as normal.
0

Featured Post

Free Tool: Subnet Calculator

The subnet calculator helps you design networks by taking an IP address and network mask and returning information such as network, broadcast address, and host range.

One of a set of tools we're offering as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The Internet has made sending and receiving information online a breeze. But there is also the threat of unauthorized viewing, data tampering, and phoney messages. Surprisingly, a lot of business owners do not fully understand how to use security t…
Phishing emails are a popular malware delivery vehicle for attack.  While there are many ways for an attacker to increase the chances of success for their phishing emails, one of the most effective methods involves spoofing the message to appear to …
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…

916 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question