<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en-gb">
<link rel="self" type="application/atom+xml" href="https://forum.yubico.com/feed.php?f=26&amp;t=1567" />

<title>Yubico Forum</title>
<subtitle>...visit our web-store at</subtitle>
<link href="https://forum.yubico.com/index.php" />
<updated>2014-11-19T19:25:54+01:00</updated>

<author><name><![CDATA[Yubico Forum]]></name></author>
<id>https://forum.yubico.com/feed.php?f=26&amp;t=1567</id>
<entry>
<author><name><![CDATA[DavidW]]></name></author>
<updated>2014-11-19T19:25:54+01:00</updated>
<published>2014-11-19T19:25:54+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=1567&amp;p=6266#p6266</id>
<link href="https://forum.yubico.com/viewtopic.php?t=1567&amp;p=6266#p6266"/>
<title type="html"><![CDATA[Re: NEO as smartcard]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=1567&amp;p=6266#p6266"><![CDATA[
<div class="quotetitle">lukegb wrote:</div><div class="quotecontent"><br />Try using the <a href="https://developers.yubico.com/yubico-piv-tool/Releases/" class="postlink">Yubico PIV tool</a> (the new one, version 0.1.1) to do a reset-chuid. You should find it starts to work at that point, if your issue was the same as mine.<br /></div><br /><br />There was a bug in CHUID handling in 0.1.0. I, too, found that once I carried out the reset-chuid operation with a later version of yubico-piv-tool that the PIV certificates started to work correctly in Windows.<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=3289">DavidW</a> — Wed Nov 19, 2014 7:25 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[dmitriys]]></name></author>
<updated>2014-11-19T09:47:34+01:00</updated>
<published>2014-11-19T09:47:34+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=1567&amp;p=6262#p6262</id>
<link href="https://forum.yubico.com/viewtopic.php?t=1567&amp;p=6262#p6262"/>
<title type="html"><![CDATA[Re: NEO as smartcard]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=1567&amp;p=6262#p6262"><![CDATA[
Thanks. PivTool 0.1.2 resolved my issue.<br />And it works fine when I authenticate to VPN and Remote Desktop<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=3233">dmitriys</a> — Wed Nov 19, 2014 9:47 am</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[akatz0813]]></name></author>
<updated>2014-11-10T16:43:58+01:00</updated>
<published>2014-11-10T16:43:58+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=1567&amp;p=6181#p6181</id>
<link href="https://forum.yubico.com/viewtopic.php?t=1567&amp;p=6181#p6181"/>
<title type="html"><![CDATA[Re: NEO as smartcard]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=1567&amp;p=6181#p6181"><![CDATA[
lukegb, thank you!  This resolved my issue.<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=3236">akatz0813</a> — Mon Nov 10, 2014 4:43 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[lukegb]]></name></author>
<updated>2014-11-10T11:51:25+01:00</updated>
<published>2014-11-10T11:51:25+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=1567&amp;p=6175#p6175</id>
<link href="https://forum.yubico.com/viewtopic.php?t=1567&amp;p=6175#p6175"/>
<title type="html"><![CDATA[Re: NEO as smartcard]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=1567&amp;p=6175#p6175"><![CDATA[
Hadn't noticed this thread before I <a href="http://forum.yubico.com/viewtopic.php?f=26&amp;t=1582" class="postlink">posted mine.</a><br /><br />Try using the <a href="https://developers.yubico.com/yubico-piv-tool/Releases/" class="postlink">Yubico PIV tool</a> (the new one, version 0.1.1) to do a reset-chuid. You should find it starts to work at that point, if your issue was the same as mine.<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=3252">lukegb</a> — Mon Nov 10, 2014 11:51 am</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[dmitriys]]></name></author>
<updated>2014-11-05T08:53:24+01:00</updated>
<published>2014-11-05T08:53:24+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=1567&amp;p=6135#p6135</id>
<link href="https://forum.yubico.com/viewtopic.php?t=1567&amp;p=6135#p6135"/>
<title type="html"><![CDATA[Re: NEO as smartcard]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=1567&amp;p=6135#p6135"><![CDATA[
Confirm.<br />Certificate was signed by our enterprise CA.<br /><br />1. <!-- m --><a class="postlink" href="https://corp.domain.com/certsrv/">https://corp.domain.com/certsrv/</a><!-- m --><br />2. Request certificate by using template Smartcard User or Smartcard Logon <br />3. Import certificate<br /><br />It's default path what is useless because by default these templates restrict export certificate with private key.<br /><br />At this point I had tried two different ways: create dublicate of &quot;Smartcard User&quot; template to allow export private keys and repeat the main flow but then export certificate and import to Yubikey NEO. This approach is fail.<br /><br />Than, I tried to reset applet and create a key private key within the key:<br /><br />1. Reset applet<br />2. Initialize private key<br />3. Create certificate request with any subject because CA will issue certificate according to selected template while the request is being processed.<br />4. Open WEB CA (<!-- m --><a class="postlink" href="https://corp.domain.com/certsrv/">https://corp.domain.com/certsrv/</a><!-- m -->)<br />5. Send request and use any template &quot;Smartcard User&quot; or &quot;Smartcard Logon&quot; <br />6. Save respose as BASE64 encoded<br /><br />this flow allow use any template because response is not saved in local certificate storage and our private key is inside the key.<br /><br />7. Import response to the key<br /><br />Unfortunately, this way is faulted.<br /><br />I don't have any other ideas how YubiKey NEO can be used as a smartcard in Windows.<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=3233">dmitriys</a> — Wed Nov 05, 2014 8:53 am</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[akatz0813]]></name></author>
<updated>2014-11-03T17:24:49+01:00</updated>
<published>2014-11-03T17:24:49+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=1567&amp;p=6112#p6112</id>
<link href="https://forum.yubico.com/viewtopic.php?t=1567&amp;p=6112#p6112"/>
<title type="html"><![CDATA[Re: NEO as smartcard]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=1567&amp;p=6112#p6112"><![CDATA[
In my case, the cert has been signed by our corporate CA and is absolutely trusted by my machine, and all machines in the domain.<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=3236">akatz0813</a> — Mon Nov 03, 2014 5:24 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[Tom]]></name></author>
<updated>2014-11-03T11:13:27+01:00</updated>
<published>2014-11-03T11:13:27+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=1567&amp;p=6108#p6108</id>
<link href="https://forum.yubico.com/viewtopic.php?t=1567&amp;p=6108#p6108"/>
<title type="html"><![CDATA[Re: NEO as smartcard]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=1567&amp;p=6108#p6108"><![CDATA[
Hello,<br />certs are signed by a ca trusted or by you machine<br /><br />Are they self-signed?<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=2195">Tom</a> — Mon Nov 03, 2014 11:13 am</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[akatz0813]]></name></author>
<updated>2014-11-01T17:45:38+01:00</updated>
<published>2014-11-01T17:45:38+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=1567&amp;p=6089#p6089</id>
<link href="https://forum.yubico.com/viewtopic.php?t=1567&amp;p=6089#p6089"/>
<title type="html"><![CDATA[Re: NEO as smartcard]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=1567&amp;p=6089#p6089"><![CDATA[
I am having the same exact issue.  Please let me know if you discover a resolution.<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=3236">akatz0813</a> — Sat Nov 01, 2014 5:45 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[dmitriys]]></name></author>
<updated>2014-10-31T11:53:16+01:00</updated>
<published>2014-10-31T11:53:16+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=1567&amp;p=6081#p6081</id>
<link href="https://forum.yubico.com/viewtopic.php?t=1567&amp;p=6081#p6081"/>
<title type="html"><![CDATA[[Solved] - NEO as smartcard]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=1567&amp;p=6081#p6081"><![CDATA[
I have an issue to use NEO as smart card and I would like to get any advice how I can fix my issue.<br /><br />First of all, I had configured NEO to communicate via CCID<br /><br />YubiKey NEO Manager (0.2.4).jpg.jpg<br /><br />Got X.509 certificate in PKCS12 format and import it to the key<br /><br />yubico-piv-tool -s 9e -i dmitriy.pfx -K PKCS12 -p 123 -a set-chuid -a import-key -a import-cert<br /><br />(also I had tried to use 9a slot)<br /><br />OpenSC dump:<br />(pkcs15-tool.exe --dump &gt; c:\temp\sc-dump.txt)<br /><br />======================== DUMP ============================<br />PKCS#15 Card [PIV_II]:<br />Version        : 0<br />Serial number  : d4e739da739ced39ce739d836858210842108421384210c3f5<br />Manufacturer ID: piv_II <br />Flags          : <br /><br />PIN [PIV Card Holder pin]<br />Object Flags   : [0x1], private<br />ID             : 01<br />Flags          : [0x32], local, initialized, needs-padding<br />Length         : min_len:4, max_len:8, stored_len:8<br />Pad char       : 0xFF<br />Reference      : 128 (0x80)<br />Type           : ascii-numeric<br /><br />PIN [PIV PUK]<br />Object Flags   : [0x1], private<br />ID             : 02<br />Flags          : [0xF2], local, initialized, needs-padding, unblockingPin, soPin<br />Length         : min_len:4, max_len:8, stored_len:8<br />Pad char       : 0xFF<br />Reference      : 129 (0x81)<br />Type           : ascii-numeric<br /><br />Private RSA Key [PIV AUTH key]<br />Object Flags   : [0x1], private<br />Usage          : [0x2E], decrypt, sign, signRecover, unwrap<br />Access Flags   : [0x1D], sensitive, alwaysSensitive, neverExtract, local<br />ModLength      : 2048<br />Key ref        : 154 (0x9A)<br />Native         : yes<br />Auth ID        : 01<br />ID             : 01<br />MD:guid        : 0x'36303939393939393939393939393031303130303030303030303030303030300000000000000000'<br />  :cmap flags  : 0x0<br />  :sign        : 0<br />  :key-exchange: 0<br /><br />Private RSA Key [CARD AUTH key]<br />Object Flags   : [0x0]<br />Usage          : [0xC], sign, signRecover<br />Access Flags   : [0x1D], sensitive, alwaysSensitive, neverExtract, local<br />ModLength      : 2048<br />Key ref        : 158 (0x9E)<br />Native         : yes<br />ID             : 04<br />MD:guid        : 0x'36303939393939393939393939393034303130303030303030303030303030300000000000000000'<br />  :cmap flags  : 0x0<br />  :sign        : 0<br />  :key-exchange: 0<br /><br />Public RSA Key [PIV AUTH pubkey]<br />Object Flags   : [0x0]<br />Usage          : [0xD1], encrypt, wrap, verify, verifyRecover<br />Access Flags   : [0x2], extract<br />ModLength      : 2048<br />Key ref        : 154 (0x9A)<br />Native         : yes<br />Auth ID        : 01<br />ID             : 01<br />DirectValue    : &lt;absent&gt;<br /><br />Public RSA Key [CARD AUTH pubkey]<br />Object Flags   : [0x0]<br />Usage          : [0xC0], verify, verifyRecover<br />Access Flags   : [0x2], extract<br />ModLength      : 2048<br />Key ref        : 158 (0x9E)<br />Native         : yes<br />Auth ID        : 00<br />ID             : 04<br />DirectValue    : &lt;absent&gt;<br /><br />X.509 Certificate [Certificate for PIV Authentication]<br />Object Flags   : [0x0]<br />Authority      : no<br />Path           : <br />ID             : 01<br />Encoded serial : 02 13 26000000C8AA0D933412804DC70001000000C8<br />X.509 Certificate [Certificate for Card Authentication]<br />Object Flags   : [0x0]<br />Authority      : no<br />Path           : <br />ID             : 04<br />Encoded serial : 02 13 26000000C8AA0D933412804DC70001000000C8<br />Data object 'Card Capability Container'<br />applicationName: Card Capability Container<br />applicationOID:  2.16.840.1.101.3.7.1.219.0<br />Path:            db00<br />Data object 'Card Holder Unique Identifier'<br />applicationName: Card Holder Unique Identifier<br />applicationOID:  2.16.840.1.101.3.7.2.48.0<br />Path:            3000<br />Data (61 bytes): 533B3019D4E739DA739CED39CE739D836858210842108421384210C3F53401B2B736DF5AAA41FBB8F7A5F2FB2A020035<br />                  0832303330303130313E00FE00<br />Data object 'Unsigned Card Holder Unique Identifier'<br />applicationName: Unsigned Card Holder Unique Identifier<br />applicationOID:  2.16.840.1.101.3.7.2.48.2<br />Path:            3010<br />Data object 'X.509 Certificate for PIV Authentication'<br />applicationName: X.509 Certificate for PIV Authentication<br />applicationOID:  2.16.840.1.101.3.7.2.1.1<br />Path:            0101<br />Data (1615 bytes): 5382064B708206423082063E30820526A003020102021326000000C8AA0D933412804DC70001000000C8300D06092A86<br />                    4886F70D01010B0500305931133011060A0992268993F22C6401191603636F6D3121301F060A0992268993F22C640119<br />                    1611696E7465726E616C2D70726F6A65637473311F301D06035504031316496E7465726E616C2050726F6A6563747320<br />                    496E632E301E170D3134313033313038323033305A170D3135313033313038323033305A3081A631133011060A099226<br />                    8993F22C6401191603636F6D3121301F060A0992268993F22C6401191611696E7465726E616C2D70726F6A6563747331<br />                    143012060A0992268993F22C6401191604636F7270310E300C060355040313055573657273311830160603550403130F<br />                    446D697472697920536F73756E6F76312C302A06092A864886F70D010901161D646D697472697940696E7465726E616C<br />                    2D70726F6A656374732E636F6D30820122300D06092A864886F70D01010105000382010F003082010A0282010100C1B9<br />                    05F8CFD73CDEB6DFD0465D129F230866556D3E34604999EE77635F6D7CF699A26F35FE28E2C81A5C3C7223C32229D5F9<br />                    99A6C9F109063EAD742C24AC6C7C13102B2B346DCD98C5FF94D3393D2A2B281E1E34501E293A49BA65916ED0CD6AEFA6<br />                    1D5EFBA9458D3DB90AAED44075663A69C5BB38BEF6932FA7960326BD35109DA9B504D767F59A9426AC8F7FAA3D8F6939<br />                    F934668C5B7EE858770D1313E987CD20315DD63887CE1321A01866F67A9DE0BAB88D315DDDD17406292EE2410D30D904<br />                    0BA8977E0ADCA2BDD8DEAD41C19DFDEA66FDAA59FE66779F1E6EA352D156A8A1A12B27371EE27FCB83C8214432632C5A<br />                    4F0C7674DBA9190668C28E3128A90203010001A38202AF308202AB300E0603551D0F0101FF0404030205A0303E06092B<br />                    06010401823715070431302F06272B060104018237150884C0DD1F87FAB61482CD991786FFDE4281AA8F35816B87FFFB<br />                    2D8680AA5002016402010630819406092A864886F70D01090F048186308183300E06082A864886F70D03020202008030<br />                    0E06082A864886F70D030402020080300706052B0E030207300A06082A864886F70D0307300B06096086480165030401<br />                    2A300B060960864801650304012D300B0609608648016503040116300B0609608648016503040119300B060960864801<br />                    6503040102300B0609608648016503040105301D0603551D0E04160414155933315DD1DAC21365F2162A3DC9E8B29FB6<br />                    32301F0603551D23041830168014C7A64D6B5F8B374BAE0F1B296169AB92552429B330500603551D1F044930473045A0<br />                    43A041863F687474703A2F2F63726C2E696E7465726E616C2D70726F6A656374732E636F6D2F496E7465726E616C2532<br />                    3050726F6A65637473253230496E632E2E63726C306806082B06010505070101045C305A305806082B06010505073002<br />                    864C687474703A2F2F69702E696E7465726E616C2D70726F6A656374732E636F6D2F6365727469666963617465732F49<br />                    6E7465726E616C2D50726F6A656374735F417574686F726974792E63727430290603551D2504223020060A2B06010401<br />                    823714020206082B0601050507030206082B06010505070304303506092B060104018237150A04283026300C060A2B06<br />                    0104018237140202300A06082B06010505070302300A06082B0601050507030430640603551D11045D305BA03A060A2B<br />                    060104018237140203A02C0C2A646D69747269792E736F73756E6F7640636F72702E696E7465726E616C2D70726F6A65<br />                    6374732E636F6D811D646D697472697940696E7465726E616C2D70726F6A656374732E636F6D300D06092A864886F70D<br />                    01010B0500038201010024C6A0D37375794282C31378C40F5EC77189B1DE1ED31205C942C29914D4F48BF0B0492E0816<br />                    464F9DFE009DDA218CA5146DAF3CACE30C2417C676AFCD1D17744D2E255B39D7D48891127D0BAF9FCAF2A19106CBB784<br />                    602A23D123F92E78224E9D64D13A0435788F2D133F7D921193897F095E027FDF4AEA7569741C9D9FC3D5E63A022790D5<br />                    CC22863813ECB1DCDB5B7C601BD2570F226FFDD2D9D6EE2D570A5117E6AAB54BE678903217F2E3C1F1E5E10176964BD6<br />                    0B353CD4F5730577DC5B8D5033623CDF008BD7414A479BD9DDDACB5A1978F84C7716212EA4F54140EB177BE45EDBBD08<br />                    5AFC6C6532B9C36E8B760AF62B68DDB78C4F783F679B89A649F8710100FE00<br />Data object 'Cardholder Fingerprints'<br />applicationName: Cardholder Fingerprints<br />applicationOID:  2.16.840.1.101.3.7.2.96.16<br />Path:            6010<br />Auth ID:         01<br />Data object 'Printed Information'<br />applicationName: Printed Information<br />applicationOID:  2.16.840.1.101.3.7.2.48.1<br />Path:            3001<br />Auth ID:         01<br />Data object 'Cardholder Facial Image'<br />applicationName: Cardholder Facial Image<br />applicationOID:  2.16.840.1.101.3.7.2.96.48<br />Path:            6030<br />Auth ID:         01<br />Data object 'X.509 Certificate for Digital Signature'<br />applicationName: X.509 Certificate for Digital Signature<br />applicationOID:  2.16.840.1.101.3.7.2.1.0<br />Path:            0100<br />Data object 'X.509 Certificate for Key Management'<br />applicationName: X.509 Certificate for Key Management<br />applicationOID:  2.16.840.1.101.3.7.2.1.2<br />Path:            0102<br />Data object 'X.509 Certificate for Card Authentication'<br />applicationName: X.509 Certificate for Card Authentication<br />applicationOID:  2.16.840.1.101.3.7.2.5.0<br />Path:            0500<br />Data (1615 bytes): 5382064B708206423082063E30820526A003020102021326000000C8AA0D933412804DC70001000000C8300D06092A86<br />                    4886F70D01010B0500305931133011060A0992268993F22C6401191603636F6D3121301F060A0992268993F22C640119<br />                    1611696E7465726E616C2D70726F6A65637473311F301D06035504031316496E7465726E616C2050726F6A6563747320<br />                    496E632E301E170D3134313033313038323033305A170D3135313033313038323033305A3081A631133011060A099226<br />                    8993F22C6401191603636F6D3121301F060A0992268993F22C6401191611696E7465726E616C2D70726F6A6563747331<br />                    143012060A0992268993F22C6401191604636F7270310E300C060355040313055573657273311830160603550403130F<br />                    446D697472697920536F73756E6F76312C302A06092A864886F70D010901161D646D697472697940696E7465726E616C<br />                    2D70726F6A656374732E636F6D30820122300D06092A864886F70D01010105000382010F003082010A0282010100C1B9<br />                    05F8CFD73CDEB6DFD0465D129F230866556D3E34604999EE77635F6D7CF699A26F35FE28E2C81A5C3C7223C32229D5F9<br />                    99A6C9F109063EAD742C24AC6C7C13102B2B346DCD98C5FF94D3393D2A2B281E1E34501E293A49BA65916ED0CD6AEFA6<br />                    1D5EFBA9458D3DB90AAED44075663A69C5BB38BEF6932FA7960326BD35109DA9B504D767F59A9426AC8F7FAA3D8F6939<br />                    F934668C5B7EE858770D1313E987CD20315DD63887CE1321A01866F67A9DE0BAB88D315DDDD17406292EE2410D30D904<br />                    0BA8977E0ADCA2BDD8DEAD41C19DFDEA66FDAA59FE66779F1E6EA352D156A8A1A12B27371EE27FCB83C8214432632C5A<br />                    4F0C7674DBA9190668C28E3128A90203010001A38202AF308202AB300E0603551D0F0101FF0404030205A0303E06092B<br />                    06010401823715070431302F06272B060104018237150884C0DD1F87FAB61482CD991786FFDE4281AA8F35816B87FFFB<br />                    2D8680AA5002016402010630819406092A864886F70D01090F048186308183300E06082A864886F70D03020202008030<br />                    0E06082A864886F70D030402020080300706052B0E030207300A06082A864886F70D0307300B06096086480165030401<br />                    2A300B060960864801650304012D300B0609608648016503040116300B0609608648016503040119300B060960864801<br />                    6503040102300B0609608648016503040105301D0603551D0E04160414155933315DD1DAC21365F2162A3DC9E8B29FB6<br />                    32301F0603551D23041830168014C7A64D6B5F8B374BAE0F1B296169AB92552429B330500603551D1F044930473045A0<br />                    43A041863F687474703A2F2F63726C2E696E7465726E616C2D70726F6A656374732E636F6D2F496E7465726E616C2532<br />                    3050726F6A65637473253230496E632E2E63726C306806082B06010505070101045C305A305806082B06010505073002<br />                    864C687474703A2F2F69702E696E7465726E616C2D70726F6A656374732E636F6D2F6365727469666963617465732F49<br />                    6E7465726E616C2D50726F6A656374735F417574686F726974792E63727430290603551D2504223020060A2B06010401<br />                    823714020206082B0601050507030206082B06010505070304303506092B060104018237150A04283026300C060A2B06<br />                    0104018237140202300A06082B06010505070302300A06082B0601050507030430640603551D11045D305BA03A060A2B<br />                    060104018237140203A02C0C2A646D69747269792E736F73756E6F7640636F72702E696E7465726E616C2D70726F6A65<br />                    6374732E636F6D811D646D697472697940696E7465726E616C2D70726F6A656374732E636F6D300D06092A864886F70D<br />                    01010B0500038201010024C6A0D37375794282C31378C40F5EC77189B1DE1ED31205C942C29914D4F48BF0B0492E0816<br />                    464F9DFE009DDA218CA5146DAF3CACE30C2417C676AFCD1D17744D2E255B39D7D48891127D0BAF9FCAF2A19106CBB784<br />                    602A23D123F92E78224E9D64D13A0435788F2D133F7D921193897F095E027FDF4AEA7569741C9D9FC3D5E63A022790D5<br />                    CC22863813ECB1DCDB5B7C601BD2570F226FFDD2D9D6EE2D570A5117E6AAB54BE678903217F2E3C1F1E5E10176964BD6<br />                    0B353CD4F5730577DC5B8D5033623CDF008BD7414A479BD9DDDACB5A1978F84C7716212EA4F54140EB177BE45EDBBD08<br />                    5AFC6C6532B9C36E8B760AF62B68DDB78C4F783F679B89A649F8710100FE00<br />Data object 'Security Object'<br />applicationName: Security Object<br />applicationOID:  2.16.840.1.101.3.7.2.144.0<br />Path:            9000<br />Data object 'Discovery Object'<br />applicationName: Discovery Object<br />applicationOID:  2.16.840.1.101.3.7.2.96.80<br />Path:            6050<br />Data (20 bytes): 7E124F0BA0000003080000100001005F2F024000<br />Data object 'Cardholder Iris Image'<br />applicationName: Cardholder Iris Image<br />applicationOID:  2.16.840.1.101.3.7.2.16.21<br />Path:            1015<br /><br />======================== END DUMP ============================<br /><br /><br />To check SC I used certutil<br />(certutil –scinfo &gt; certutil.log)<br /><br />========== CERTUTIL LOG ===============================<br />The Microsoft Smart Card Resource Manager is running.<br />Current reader/card status:<br />Readers: 1<br />  0: Yubico Yubikey NEO OTP+CCID 0<br />--- Reader: Yubico Yubikey NEO OTP+CCID 0<br />--- Status: SCARD_STATE_PRESENT | SCARD_STATE_INUSE<br />--- Status: The card is being shared by a process.<br />---   Card: Identity Device (NIST SP 800-73 [PIV])<br />---    ATR:<br />3b fc 13 00 00 81 31 fe  15 59 75 62 69 6b 65 79   ;.....1..Yubikey<br />4e 45 4f 72 33 e1                                  NEOr3.<br /><br /><br />=======================================================<br />Analyzing card in reader: Yubico Yubikey NEO OTP+CCID 0<br /><br />--------------===========================--------------<br />================ Certificate 0 ================<br />--- Reader: Yubico Yubikey NEO OTP+CCID 0<br />---   Card: Identity Device (NIST SP 800-73 [PIV])<br />Provider = Microsoft Base Smart Card Crypto Provider<br />Key Container = (null) [Default Container]<br /><br />Cannot open the AT_SIGNATURE key for reader: Yubico Yubikey NEO OTP+CCID 0<br />Cannot open the AT_KEYEXCHANGE key for reader: Yubico Yubikey NEO OTP+CCID 0<br /><br />--------------===========================--------------<br />================ Certificate 0 ================<br />--- Reader: Yubico Yubikey NEO OTP+CCID 0<br />---   Card: Identity Device (NIST SP 800-73 [PIV])<br />Provider = Microsoft Smart Card Key Storage Provider<br />Key Container = (null) [Default Container]<br /><br />Cannot open the  key for reader: Yubico Yubikey NEO OTP+CCID 0<br /><br />--------------===========================--------------<br /><br />Done.<br />CertUtil: -SCInfo command completed successfully.<br /><br />certutils shows dialog and each click on cancel how in log as <br /><br />YubiKey NEO Manager (0.2.4).jpg.jpg<br /><br />Cannot open the AT_SIGNATURE key for reader: Yubico Yubikey NEO OTP+CCID 0<br />Cannot open the AT_KEYEXCHANGE key for reader: Yubico Yubikey NEO OTP+CCID 0<br /><br />Please help me to use NEO as smart card in Windows.<br /><br />Thanks,<br />Dmitriy<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=3233">dmitriys</a> — Fri Oct 31, 2014 11:53 am</p><hr />
]]></content>
</entry>
</feed>