Skip to main content
This forum is closed to new posts and responses. Individual names altered for privacy purposes. The information contained in this website is provided for informational purposes only and should not be construed as a forum for customer support requests. Any customer support requests should be directed to the official HCL customer support channels below:

HCL Software Customer Support Portal for U.S. Federal Government clients
HCL Software Customer Support Portal

Notes/Domino 6 and 7 Forum

Notes/Domino 6 and 7 Forum


  

PreviousPrevious NextNext

Tested smartcard packages
~Umberto Nongeroson 18.Aug.03 08:18 PM a Web browser
Notes Client All Releases Windows 2000


The most current list of tested smartcard packages is in the release notes for each version of Notes/Domino.

That list isn't exclusive -- it just lists the tokens that we've had the opportunity to test in-house. Any token that provides a PKCS#11 v2.01 or better interface that fulfills the Large Application PKCS#11 Conformance Profile (http://www.rsasecurity.com/rsalabs/pkcs/pkcs-11/pkcs11Conformance.pdf) should work just fine with Notes.

I've included the current release note text at the end of this message. The tokens listed below should work fine with 6.0.2. As always, check the release notes in the version of Notes that you're using for the list that is most applicable to you. :)

dave



Smartcard support was introduced in Lotus Notes 6.

Notes Password on a Smartcard:

It is currently possible to lock an ID file such that a smartcard and smartcard PIN are required, instead of the Notes password. Removing the smartcard from the reader will then log the user out of Notes. This feature can be enabled through the following steps:

1. Ensure that your ID file is recoverable via ID File Recovery, and that your ID file is not configured for password expiration in your person document on your server's public directory.

2. Install the smartcard reader hardware and software, following the instructions provided by the smartcard vendor.

3. Open the User Security Panel (File -> Security -> User Security)

4. Open the Your Identity // Your Smartcard Pane

5. Enter the path or browse to the location of the PKCS #11 library, installed by the smartcard installation. Some sample paths and names are listed below:

c:\WINNT\system32\gclib.dll (GemSAFE 3.1)
c:\WINNT\system32\acpkcs201.dll (ActivCard Gold 2.2)
c:\WINNT\system32\pk2priv.dll (GemSAFE 2.21)
c:\Program Files\Netscape\Communicator\Program\acpkcs.dll
c:\Schlumberger\Smart Cards and Terminals\Cyberflex Access Kits\v4\slbck.dll (Schlumberger Cyberflex Access V4.3)
c:\Schlumberger\Smart Cards and Terminals\Common Files\slbck.dll (Schlumberger Cyberflex Access V2)
c:\WINNT\system32\dkck201.dll (Rainbow iKey 2032)
c:\WINNT\system32\dkck201.dll (Datakey CIP 4.07)

6. Click on the Enable Smartcard Login button to lock the ID file using a key stored on the smartcard instead of a password.


Internet Keys on a Smartcard:

It is currently possible to place an RSA private key from the ID file onto a smartcard and use that key to sign and decrypt S/MIME mail, and to authenticate to "Internet" servers using SSL client certificate authentication.

To place an RSA private key onto a smartcard:

  1. Open the User Security Panel (File -> Security -> User Security)
  2. Open the Your Identity // Your Certificates pane
  3. Select the Internet Certificate associated with the private key that you want to move to the smartcard.
  4. Select Other Actions // Store Private Key on Smartcard.


Tested Smartcard packages:

Smartcard functionality has only been tested under win32-based operating systems. Untested smartcards that include PKCS #11 libraries may work with Notes 6. The following smartcard packages have been tested, and indicated (*) packages have caveats listed below:

Smartcard Package
Login with the token
Removing token will generate 'F5'-style logout
512-bit RSA keys on the token
1024-bit RSA keys on the token
ActivCard Gold 2.2
yes
yes
yes
yes
Datakey CIP 4.07
yes
yes
yes
yes
GemSAFE libraries 3.1 SP4 (GPK16000)
yes
yes
yes
yes
GemSAFE Enterprise Workstation 2.21 (GPK8000) (*)
yes
no
no
yes
GemSAFE Enterprise Workstation 2.0 (GPK4000) (*)
yes
no
no
yes
Rainbow iKey 2032 SDK v4.7.0
yes
yes
yes
yes
Schlumberger Cyberflex Access SDK V4.3
yes
yes
no
yes
Schlumberger Cyberflex Access SDK V2
yes
yes
no
yes

Caveats and Warnings:

  • The only way to recover from losing or breaking a smartcard or to revert a smartcard-protected ID file to a password is through ID File Recovery. ID File Recovery should be configured for an ID file before the ID file is smartcard-enabled. Recovering a smartcard-protected ID file will revert the ID file to use a password and will restore any keys that were pushed onto the smartcard, as long as the recovery information was not changed after the key was pushed down to the smartcard.
  • Password expiration should be disabled in a user's person record before they smartcard-enable their ID file.
  • Password checking will result in only a single smartcard being usable with a given ID file, even across multiple computers or platforms. In this scenario, one copy of the ID file should be smartcard-enabled, and then that version of the ID file should be copied to all of the other respective computers. That single smartcard will now be required for all of the copies of the ID file.
  • Many smartcard packages only support 1024-bit RSA keys. You can find the strength of a given key by selecting an Internet Certificate and pressing the Advanced Details button from the "Your Identity//Your Certificates" pane of the User Security Dialog (File//Security//User Security).
  • Server setup will not function with a smartcard-protected server ID. In order to use a smartcard-protected ID with a server, finish server setup with a password-protected version of the ID file, then add the path to the PKCS #11 library in the server's notes.ini (PKCS11_Library=<path to library>), and finally smartcard-enable the server's ID file on a client using the steps indicated above.
  • Single Logon, which synchronizes the Notes and Windows passwords, cannot be used with a smartcard-protected ID file. You must restart Notes after disabling Single Logon before smartcard-enabling an ID file.
  • The format in which smartcard-related information is stored in the ID file has changed since the earliest beta releases of Notes 6. Using an ID file that was smartcard-enabled with one of these early beta releases will result in an "Incomplete or incorrect smartcard configuration" with Notes 6.
  • Notes uses version 2.01 of the PKCS #11 API to communicate with smartcards and other PKCS#11 devices. PKCS #11 libraries that only implement version 2.0 will not result in an "F5"-style logout when the card is removed from the reader. Updated libraries may be available from the smartcard vendors.
  • Version 2.2 is the required minimum version of ActivCard Gold supported for Notes 6.
  • GemSAFE 2.21's NT Lock Workstation feature has been known to crash some versions of NT and deadlock with Notes. When installing GemSAFE 2.21, the NT lock workstation feature defaults to on. Un-check the box.
  • There may be problems when installing GemSAFE 2.21 on a laptop running NT 4.





. . . . RE: The solution was posted in a pa... (~Lorraine Asanu... 18.Aug.03)
. . . . . . Tested smartcard packages (~Tanita Desweve... 18.Aug.03)
Smart card - pb with Notes 6.02CF1 ... (~Anita Pretooly... 8.Aug.03)
. . The solution was posted in a past t... (~Tanita Desweve... 9.Aug.03)


Document Options






  Document options
Print this pagePrint this page

Search this forum

Forum views and search


  Forum views and search
Date (threaded)
Date (flat)
With excerpt
Category
Platform
Release
Advanced search

Member Tools


RSS Feeds

 RSS feedsRSS
All forum posts RSS
All main topics RSS