<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en-gb">
<link rel="self" type="application/atom+xml" href="https://forum.yubico.com/feed.php?f=26&amp;t=1780" />

<title>Yubico Forum</title>
<subtitle>...visit our web-store at</subtitle>
<link href="https://forum.yubico.com/index.php" />
<updated>2015-03-19T11:30:26+01:00</updated>

<author><name><![CDATA[Yubico Forum]]></name></author>
<id>https://forum.yubico.com/feed.php?f=26&amp;t=1780</id>
<entry>
<author><name><![CDATA[goldfinger]]></name></author>
<updated>2015-03-19T11:30:26+01:00</updated>
<published>2015-03-19T11:30:26+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=1780&amp;p=7071#p7071</id>
<link href="https://forum.yubico.com/viewtopic.php?t=1780&amp;p=7071#p7071"/>
<title type="html"><![CDATA[Re: [Question] Neo Smartcard Cert &amp; Windows CA with Enroll A]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=1780&amp;p=7071#p7071"><![CDATA[
I can't get the opensc Windows minidriver to work together with Yubikon Neo. <br />But I can't create the private key on Neo or transfer the public certificate.<br />Did someone have success?<br /><br /><div class="codetitle"><b>Code:</b></div><div class="codecontent">Windows Registry Editor Version 5.00<br />&#91;HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\Calais\SmartCards\Identity Device (NIST SP 800-73 &#91;PIV&#93;)&#93;<br />&quot;Crypto Provider&quot;=&quot;Microsoft Base Smart Card Crypto Provider&quot;<br />&quot;Smart Card Key Storage Provider&quot;=&quot;Microsoft Smart Card Key Storage Provider&quot;<br />&quot;80000001&quot;=&quot;msclmd.dll&quot;<br /></div><p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=3586">goldfinger</a> — Thu Mar 19, 2015 11:30 am</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[goldfinger]]></name></author>
<updated>2015-03-19T11:19:29+01:00</updated>
<published>2015-03-19T11:19:29+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=1780&amp;p=7070#p7070</id>
<link href="https://forum.yubico.com/viewtopic.php?t=1780&amp;p=7070#p7070"/>
<title type="html"><![CDATA[Re: [Question] Neo Smartcard Cert &amp; Windows CA with Enroll A]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=1780&amp;p=7070#p7070"><![CDATA[
For enrollment on behalf of other users we need a pkcs10 and signer certificate see the picture above.<br /><img src="http://en-us.sysadmins.lv/Lists/Posts/Attachments/73/image_9e235175-f89b-46ee-9e23-6d396df1acd1_345CF168.png" alt="Image" /><br /><br />Some links for Windows environments:<br />Enrollment<br /><a href="http://secadmins.com/index.php/enroll-for-a-smart-card-certificate-on-behalf-of-other-users/" class="postlink">http://secadmins.com/index.php/enroll-for-a-smart-card-certificate-on-behalf-of-other-users/</a><br /><br />Powershell Code<br /><a href="http://en-us.sysadmins.lv/Lists/Posts/Post.aspx?List=332991f0%2Dbfed%2D4143%2D9eea%2Df521167d287c&amp;ID=77" class="postlink">http://en-us.sysadmins.lv/Lists/Posts/Post.aspx?List=332991f0%2Dbfed%2D4143%2D9eea%2Df521167d287c&amp;ID=77</a><p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=3586">goldfinger</a> — Thu Mar 19, 2015 11:19 am</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[Tom2]]></name></author>
<updated>2015-03-12T16:20:25+01:00</updated>
<published>2015-03-12T16:20:25+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=1780&amp;p=7013#p7013</id>
<link href="https://forum.yubico.com/viewtopic.php?t=1780&amp;p=7013#p7013"/>
<title type="html"><![CDATA[Re: [Question] Neo Smartcard Cert &amp; Windows CA with Enroll A]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=1780&amp;p=7013#p7013"><![CDATA[
Goldfinger, I am no expert so forgive me if my next advice makes no sense.<br /><br />But shouldn't you be able to submit a PKCS10 request  (<!-- m --><a class="postlink" href="https://tools.ietf.org/html/rfc2986">https://tools.ietf.org/html/rfc2986</a><!-- m --> )  and specify on the certificate template the group and the certificate manager approval ?<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=3364">Tom2</a> — Thu Mar 12, 2015 4:20 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[goldfinger]]></name></author>
<updated>2015-03-11T15:33:39+01:00</updated>
<published>2015-03-11T15:33:39+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=1780&amp;p=7003#p7003</id>
<link href="https://forum.yubico.com/viewtopic.php?t=1780&amp;p=7003#p7003"/>
<title type="html"><![CDATA[Re: [Question] Neo Smartcard Cert &amp; Windows CA with Enroll A]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=1780&amp;p=7003#p7003"><![CDATA[
No it's a problem of Microsoft's certreq tool. <br />Creating a certificate request in CMC format can be signed with the enrollment agent. <br />But openssl doesn't support this format.<br /><br />Aim is to have a smardcard enrollment station. An administrator can act on behalf of a user to request and install a Smart Card Logon certificate on the user's smart Card.<br /><br />Is there any commercial minidriver for Neo available?<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=3586">goldfinger</a> — Wed Mar 11, 2015 3:33 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[Tom2]]></name></author>
<updated>2015-03-10T14:33:28+01:00</updated>
<published>2015-03-10T14:33:28+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=1780&amp;p=6993#p6993</id>
<link href="https://forum.yubico.com/viewtopic.php?t=1780&amp;p=6993#p6993"/>
<title type="html"><![CDATA[Re: [Question] Neo Smartcard Cert &amp; Windows CA with Enroll A]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=1780&amp;p=6993#p6993"><![CDATA[
certreq -submit -attrib &quot;CertificateTemplate:SmartCard Logon&quot; request.csr cert.crt<br /><br />SmartCard Logon templates needs to be properly configured, e.g. key size 2048<br /><br />did this help?<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=3364">Tom2</a> — Tue Mar 10, 2015 2:33 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[goldfinger]]></name></author>
<updated>2015-03-10T09:12:48+01:00</updated>
<published>2015-03-10T09:12:48+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=1780&amp;p=6988#p6988</id>
<link href="https://forum.yubico.com/viewtopic.php?t=1780&amp;p=6988#p6988"/>
<title type="html"><![CDATA[[Question] Neo Smartcard Cert &amp; Windows CA with Enroll Agent]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=1780&amp;p=6988#p6988"><![CDATA[
We currently try Neo in a Proof of Concept project.<br />The aim is that the domain user can use the Neo to login on Windows 7 workstations together with Windows 2012 AD Enterprise CA. <br />Unfortunately we get it not to work with a enroll agent and we want to here how other solved this problem.<br /><br />Is there a way to get Neo as a smartcard running in a Windows CA  world?<br /><a href="https://developers.yubico.com/yubico-piv-tool/Windows_certificate.html" class="postlink">https://developers.yubico.com/yubico-piv-tool/Windows_certificate.html</a><br />We think that we need a smardcard and not a user template like the example above.<br />It seems to be Microsoft problem in combination of the Neo tools.<br /><br /><strong>Setup</strong><br />Our neo's have the  firmware version 3.3.6 , Set Mode to CCID + OTP Mode-82<br />We used the Smartcard Template &quot;SmartCard Logon&quot; with <br />Propose: Signature and Smartcard Logon<br />Number of authorizied signatures:1  <br />Application Policy --&gt; Certificate Request Agent<br />An certificate for enrollment user-agent is created.<br />Enroll of this certificate type on behalf of other users is working!<br /><br /><strong>Steps:</strong> <br /><span style="color: #0000FF">yubico-piv-tool -s 9a -a generate –o public.pem</span><br /><span style="color: #008000">Successfully generated a new private key.</span><br /><br />Rem Like certreq -new inf.txt inf.req with Pin Prompt Support<br /><span style="color: #0000FF">yubico-piv-tool -a verify-pin -P 123456 -s 9a -a request-certificate -S &quot;/CN=bob/CN=Users/DC=mic/DC=workshop/DC=zz/&quot; -i public.pem -o request.csr</span><br /><span style="color: #008000">Successfully verified PIN.<br />Successfully generated a certificate request.</span><br /><br /><span style="color: #FF0000">The next step sign with the enrollment signature fails.</span><br />Normally a prompt for the Enrollment Agent in the Cert Store appears.<br /><span style="color: #0000FF">certreq -sign request.csr request2.csr</span><br /><span style="color: #FF0000">Certificate Request Processor: The data is invalid. 0x8007000d (WIN32: 13)<br />request.csr</span><br />Since openssl don't support the other format CMC we can't test it. <br /><br />Rem Request to Windows CA<br /><span style="color: #0000FF">certreq -submit -attrib &quot;CertificateTemplate:SmartcardLogon2&quot; request.csr cert.crt</span><br />Without sign the certificate we got an error as expected because of the missing authority signature from the enrollment agent.<br /><span style="color: #FF0000">Certificate not issued (Denied) Denied by Policy Module The request is missing required signature policy information. 0x80094809 (-2146875383)<br />Certificate Request Processor: The request is missing required signature policy information. 0x80094809 (-2146875383)<br />Denied by Policy Module</span><p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=3586">goldfinger</a> — Tue Mar 10, 2015 9:12 am</p><hr />
]]></content>
</entry>
</feed>