<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en-gb">
<link rel="self" type="application/atom+xml" href="https://forum.yubico.com/feed.php?f=26&amp;t=2031" />

<title>Yubico Forum</title>
<subtitle>...visit our web-store at</subtitle>
<link href="https://forum.yubico.com/index.php" />
<updated>2016-10-19T16:34:39+01:00</updated>

<author><name><![CDATA[Yubico Forum]]></name></author>
<id>https://forum.yubico.com/feed.php?f=26&amp;t=2031</id>
<entry>
<author><name><![CDATA[ChrisHalos]]></name></author>
<updated>2016-10-19T16:34:39+01:00</updated>
<published>2016-10-19T16:34:39+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=2031&amp;p=9106#p9106</id>
<link href="https://forum.yubico.com/viewtopic.php?t=2031&amp;p=9106#p9106"/>
<title type="html"><![CDATA[Re: [Question] Smartcard certificate creation]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=2031&amp;p=9106#p9106"><![CDATA[
YubiKey PIV Manager sets a CCC automatically when initializing with the application and setting the PIN (see version 1.3.0 - <!-- m --><a class="postlink" href="https://developers.yubico.com/yubikey-piv-manager/Release_Notes.html">https://developers.yubico.com/yubikey-p ... Notes.html</a><!-- m -->). The CHUID is set when you generate the key from the application. The application was developed to request certificates for logging into an Active Directory domain environment, and that continues to be the primary use. <br /><br />If you're on a Mac and you download Yubico PIV Tool (<!-- m --><a class="postlink" href="https://developers.yubico.com/yubikey-piv-manager/Releases/">https://developers.yubico.com/yubikey-p ... /Releases/</a><!-- m -->), it goes into your default downloads directory, and the name of the folder is yubico-piv-tool-1 (check your default downloads directory to confirm). On my Mac that means...<br /><br /><em>cd ./Downloads/yubico-piv-tool-1/bin</em><br /><em>./yubico-piv-tool [command]</em> (I generally run <em>./yubico-piv-tool -a status</em> most often)<br /><br />You should not mix use of the YubiKey PIV Manager and Yubico PIV Tool (unless you're starting with Yubico PIV Tool and you at minimum change the default management key). If the management key is left at default and you make any other changes with PIV Tool (change PIN, change PUK, etc.), YubiKey PIV Manager thinks nothing else has been done to the applet as the management key hasn't changed from the default (so if you run PIV Manager, you will get the initialize dialogue and it will force you to try and change your PIN).<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=3140">ChrisHalos</a> — Wed Oct 19, 2016 4:34 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[Chrontius]]></name></author>
<updated>2016-10-19T03:24:14+01:00</updated>
<published>2016-10-19T03:24:14+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=2031&amp;p=9104#p9104</id>
<link href="https://forum.yubico.com/viewtopic.php?t=2031&amp;p=9104#p9104"/>
<title type="html"><![CDATA[Re: [Question] Smartcard certificate creation]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=2031&amp;p=9104#p9104"><![CDATA[
<div class="quotetitle">TheRealSnafu wrote:</div><div class="quotecontent"><br />Hi again,<br /><div class="quotetitle"><b>Quote:</b></div><div class="quotecontent">I'm still trying to figure out how to import it onto my Neo, though.<br /></div><br />I did that with the PIV Manager GUI tool as well. Simply choose the right slot (as far as I can remember it is &quot;Digital Signature&quot;) and hit &quot;Import from file...&quot;, then choose the certificate and it should be stored onto the NEO.<br /><br />Regards,<br />Gerhard</div>So much easier with the GUI utility!  Thank you.<br /><br /><div class="quotetitle">mouse008 wrote:</div><div class="quotecontent"><br />Since you seem to be using NEO in PIV mode, you need to fully initialize the token. <div class="codetitle"><b>Code:</b></div><div class="codecontent">yubico-piv-tool</div> has the capability to create CHUID and CCC data objects that must be present on a PIV card before software that expects PIV can work with it. The command would be something like<br /><div class="codetitle"><b>Code:</b></div><div class="codecontent">yubico-piv-tool -a set-chuid -a set-ccc</div><br /><br />Please post here it that helped.<br /></div>I'm disappointed that this isn't in the GUI PIV tool.  Also, I'm not sure how to get the CLI tool to run.  I'll fiddle with it, but if you have advice, I'd appreciate it.<br /><br />Is there any software I'll need - Centrify Express or something like it - to pass the certificate on the Yubikey to Apple Mail?<br /><br />Edit:  When I go to the directory, and type in &quot;yubico-piv-tool&quot; I get the following:<br /><div class="codetitle"><b>Code:</b></div><div class="codecontent">computer:bin user$ yubico-piv-tool<br />-bash: yubico-piv-tool: command not found</div><br /><br />When I drag the executable directly to the terminal window, I get this:<br /><div class="codetitle"><b>Code:</b></div><div class="codecontent">computer:bin user$ /Users/user\ 1/Downloads/yubico-piv-tool-1.4.2-mac/bin/yubico-piv-tool -s 9c -a set-chuid<br />Failed authentication with the application.</div><br /><br />I've found it - <a href="https://www.yubico.com/wp-content/uploads/2016/05/Yubico_PIV_Tool_Command_Line_Guide_en.pdf" class="postlink">from the PDF:</a><br /><div class="quotetitle"><b>Quote:</b></div><div class="quotecontent"><br /><strong><span style="text-decoration: underline">Failed authentication with the application</span></strong><br />This error message occurs when authentication with the management key fails. If you previously reset the management key, be sure you provide the new management key with the -k switch in every command line where YubiKey authentication is required.<br />This error also occurs if the PIN is required and is typed incorrectly.<br />For example:<br />     yubico-piv-tool -a change-pin -P 123456 -N $pin -k<br />     010203040506070801020304050607080102031234597899<br />where 010203040506070801020304050607080102031234597899 is the new management key.<br /></div><p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=4439">Chrontius</a> — Wed Oct 19, 2016 3:24 am</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[mouse008]]></name></author>
<updated>2016-08-21T04:35:06+01:00</updated>
<published>2016-08-21T04:35:06+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=2031&amp;p=8891#p8891</id>
<link href="https://forum.yubico.com/viewtopic.php?t=2031&amp;p=8891#p8891"/>
<title type="html"><![CDATA[Re: [Question] Smartcard certificate creation]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=2031&amp;p=8891#p8891"><![CDATA[
Since you seem to be using NEO in PIV mode, you need to fully initialize the token. <div class="codetitle"><b>Code:</b></div><div class="codecontent">yubico-piv-tool</div> has the capability to create CHUID and CCC data objects that must be present on a PIV card before software that expects PIV can work with it. The command would be something like<br /><div class="codetitle"><b>Code:</b></div><div class="codecontent">yubico-piv-tool -a set-chuid -a set-ccc</div><br /><br />Please post here it that helped.<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=4029">mouse008</a> — Sun Aug 21, 2016 4:35 am</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[TheRealSnafu]]></name></author>
<updated>2016-08-19T06:57:04+01:00</updated>
<published>2016-08-19T06:57:04+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=2031&amp;p=8889#p8889</id>
<link href="https://forum.yubico.com/viewtopic.php?t=2031&amp;p=8889#p8889"/>
<title type="html"><![CDATA[Re: [Question] Smartcard certificate creation]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=2031&amp;p=8889#p8889"><![CDATA[
Hi again,<br /><div class="quotetitle"><b>Quote:</b></div><div class="quotecontent"><br />I'm still trying to figure out how to import it onto my Neo, though.<br /></div><br />I did that with the PIV Manager GUI tool as well. Simply choose the right slot (as far as I can remember it is &quot;Digital Signature&quot;) and hit &quot;Import from file...&quot;, then choose the certificate and it should be stored onto the NEO.<br /><br />Regards,<br />Gerhard<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=4424">TheRealSnafu</a> — Fri Aug 19, 2016 6:57 am</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[TheRealSnafu]]></name></author>
<updated>2016-08-19T06:52:35+01:00</updated>
<published>2016-08-19T06:52:35+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=2031&amp;p=8888#p8888</id>
<link href="https://forum.yubico.com/viewtopic.php?t=2031&amp;p=8888#p8888"/>
<title type="html"><![CDATA[Re: [Question] Smartcard certificate creation]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=2031&amp;p=8888#p8888"><![CDATA[
Hi,<br /><div class="quotetitle"><b>Quote:</b></div><div class="quotecontent"><br />You could try getting a free S/MIME cert from StartSSL<br /></div><br />those StartSSL S/MIME certificates didn't work for Bitlocker for me. But you can indeed use self-signed certificates for Windows 10 by adding this DWORD &quot;SelfSignedCertificates&quot; to HKLM\Software\Policies\Microsoft\FVE. The value is originally not there, so simply add it, restart the PC and it should work. You can also use the PIV Manager GUI to create a certificate, it's easier than certreq.exe etc.<br /><br />Cheers,<br />Gerhard<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=4424">TheRealSnafu</a> — Fri Aug 19, 2016 6:52 am</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[Chrontius]]></name></author>
<updated>2016-08-16T01:41:48+01:00</updated>
<published>2016-08-16T01:41:48+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=2031&amp;p=8880#p8880</id>
<link href="https://forum.yubico.com/viewtopic.php?t=2031&amp;p=8880#p8880"/>
<title type="html"><![CDATA[Re: [Question] Smartcard certificate creation]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=2031&amp;p=8880#p8880"><![CDATA[
I got a free S/MIME cert from Comodo, and it was all of ten minutes until I had encrypted mail set up on my macbook.<br /><br /><!-- m --><a class="postlink" href="https://www.comodo.com/home/email-security/free-email-certificate.php">https://www.comodo.com/home/email-secur ... ficate.php</a><!-- m --><br /><br />I'm still trying to figure out how to import it onto my Neo, though.<br /><br />Any instructions for that?<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=4439">Chrontius</a> — Tue Aug 16, 2016 1:41 am</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[genealogyxie]]></name></author>
<updated>2016-05-06T07:37:38+01:00</updated>
<published>2016-05-06T07:37:38+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=2031&amp;p=8610#p8610</id>
<link href="https://forum.yubico.com/viewtopic.php?t=2031&amp;p=8610#p8610"/>
<title type="html"><![CDATA[Re: [Question] Smartcard certificate creation]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=2031&amp;p=8610#p8610"><![CDATA[
<div class="quotetitle">T4cC0re wrote:</div><div class="quotecontent"><br />You could try getting a free S/MIME cert from StartSSL. They are not self-signed/globally trusted and maybe that is enough for bitlocker.<br /></div><br /><br /><br />What are the exact steps in doing that? I tried getting a certificate from them (using the generated by myself option as the other option gave me an error) and it didn't work. Am I missing something?<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=4302">genealogyxie</a> — Fri May 06, 2016 7:37 am</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[T4cC0re]]></name></author>
<updated>2016-05-03T23:43:08+01:00</updated>
<published>2016-05-03T23:43:08+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=2031&amp;p=8597#p8597</id>
<link href="https://forum.yubico.com/viewtopic.php?t=2031&amp;p=8597#p8597"/>
<title type="html"><![CDATA[Re: [Question] Smartcard certificate creation]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=2031&amp;p=8597#p8597"><![CDATA[
<div class="quotetitle">genealogyxie wrote:</div><div class="quotecontent"><br />The above method of enabling self-signed certificates doesn't work for Windows 10. How do I do this for Windows 10?<br /></div><br /><br /><br />You could try getting a free S/MIME cert from StartSSL. They are not self-signed/globally trusted and maybe that is enough for bitlocker.<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=4310">T4cC0re</a> — Tue May 03, 2016 11:43 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[genealogyxie]]></name></author>
<updated>2016-04-29T05:30:12+01:00</updated>
<published>2016-04-29T05:30:12+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=2031&amp;p=8581#p8581</id>
<link href="https://forum.yubico.com/viewtopic.php?t=2031&amp;p=8581#p8581"/>
<title type="html"><![CDATA[Re: [Question] Smartcard certificate creation]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=2031&amp;p=8581#p8581"><![CDATA[
The above method of enabling self-signed certificates doesn't work for Windows 10. How do I do this for Windows 10?<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=4302">genealogyxie</a> — Fri Apr 29, 2016 5:30 am</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[Kingbob]]></name></author>
<updated>2015-09-15T07:30:41+01:00</updated>
<published>2015-09-15T07:30:41+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=2031&amp;p=7803#p7803</id>
<link href="https://forum.yubico.com/viewtopic.php?t=2031&amp;p=7803#p7803"/>
<title type="html"><![CDATA[Re: [Question] Smartcard certificate creation]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=2031&amp;p=7803#p7803"><![CDATA[
After finding a guide on certificate creation for smartcards on a rival products website, and doing some experimentation, i discovered that I needed to add the following registry key to enable self-signed certificates:<br /><br />HKLM\Software\Policies\Microsoft\FVE<br /><br />And then added a new DWORD called “SelfSignedCertificates”, with a value of 1 to it.<br /><br />Then, worked out I had to omit the following line from the request:<br /><br />ProviderName = &quot;Microsoft Smart Card Key Storage Provider&quot;<br /><br />By removing that line, when running &quot;certreq -new certrequest.txt&quot; at a command prompt, as well as signing the certificate, it allows it to be saved as a file instead of directly to the card. Then by accessing the MMC -&gt; certificates snap in I can export the certificate as a .pfx, and import the certificate onto the NEO using the PIV manager.<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=3924">Kingbob</a> — Tue Sep 15, 2015 7:30 am</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[Kingbob]]></name></author>
<updated>2015-09-15T06:28:57+01:00</updated>
<published>2015-09-15T06:28:57+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=2031&amp;p=7802#p7802</id>
<link href="https://forum.yubico.com/viewtopic.php?t=2031&amp;p=7802#p7802"/>
<title type="html"><![CDATA[[Question] Smartcard certificate creation]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=2031&amp;p=7802#p7802"><![CDATA[
I've got a new NEO which i want to use as a smartcard for Bitlocker on windows 7 64bit. Following a Microsoft guide on certificate creation using certreq.exe i've tried to create a certificate with the following parameter file:<br /><br />[NewRequest]<br />Subject = &quot;CN=BitLocker&quot;<br />KeyLength = 2048<br />ProviderName = &quot;Microsoft Smart Card Key Storage Provider&quot;<br />KeySpec = &quot;AT_KEYEXCHANGE&quot; <br />KeyUsage = &quot;CERT_KEY_ENCIPHERMENT_KEY_USAGE&quot;<br />KeyUsageProperty = &quot;NCRYPT_ALLOW_DECRYPT_FLAG&quot;<br />RequestType = Cert<br />SMIME = FALSE<br />[EnhancedKeyUsageExtension]<br />OID=1.3.6.1.4.1.311.67.1.1<br /><br />From here: <a href="https://technet.microsoft.com/en-us/library/dd875530(v=ws.10).aspx#BKMK_sscert" class="postlink">https://technet.microsoft.com/en-us/library/dd875530(v=ws.10).aspx#BKMK_sscert</a><br /><br />But when i do that, it prompts me to insert a smartcard, even though the NEO is plugged in, and the PIV manager can see it.<br />CCID is enabled on the NEO, Windows control panel shows the smart card reader installed as a &quot;Microsoft Usbccid Smartcard Reader (WUDF)&quot;, and shows the smart card installed as an &quot;identity Device (NIST SP 800-73 [PIV])&quot;, both of which as far as i can tell from reading documentation are correct.<br /><br />card.jpg<br /><br />But i get a prompt saying: &quot;A smart card was detected but is not the one required for the current operation. The smart card you are using may be missing required driver software or a required certificate&quot;. This box shows the NEO as the reader and the correct identity device.<br /><br />Am i missing something?<br /><br /><br />If i instead use the Yubikey PIV manager (1.0.2), click certificates, and click generate new key. Select a 2048bit self signed certificate, enter PIN and management key, it generates a new key in slot 91, and loads a self signed certificate. But if I then go to a bitlocker protected volume and try to use the smartcard, it says a certificate suitable for Bitlocker cannot be found on my smartcard.<br /><br />Ive been through various guides, but cant find a solution.<br /><br />Am i missing something?<br /><br />Thanks.<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=3924">Kingbob</a> — Tue Sep 15, 2015 6:28 am</p><hr />
]]></content>
</entry>
</feed>