This is great! thank you!

> -----Original Message-----

> From: gunslingor gunslingorsadf

> Sent: Thursday, December 19, 2019 7:51 AM

> To: [email protected]

>

> This are the kind of cards in use: https://www.cac.mil/common-access-

> card/



You are using the JITC test cards -
http://jitc.fhu.disa.mil/projects/pki/pki_lab/obtaining_test_common_access_cards.aspx
[https not happy right now, use curl? Or access via NIPRNet]



>

> There are multiple types of distribution we do: Client Side Apps,

> Server based web pages and some special ones. Everything is java on

> the backend and JS on the front end, even client apps.



The web crypto API is incomplete - having same issue of signing in the
browser right now, patch to firefox is in our backlog. Work around is local
client software.



> No matter what package we

> release, they all use cards like these to login, sign PDFs and

> similar...

> the private key shouldn't



CANNOT



leave the smartcard I agree. What I don't know

> is how these cards really work because I don't have access to them,

> but



Get a PIV key to work with -
https://www.amazon.com/Taglio-Certificate-Authentication-Identification-Contactless/dp/B00SJV2CNK



Some clients also have HID ActivClient 7.x middleware on windows (not
really needed) -
https://www.scbsolutions.com/express/product_info.php?cPath=32&products_id=125
Linux is a different story - google it, no idea about MAC.



> I know internet isn't required to use them and rarely is available on

> the client side apps. I have seen the end user sign a PDF with acrobat

> reader and they seem to do it normally, with a certificate selector.



Acrobat on windows - user sets up security settings, selects certificate
matching card, windows API prompts for pin.



> I

> would guess that these cards act as a sort of keystore themselves and



Yes, but I would not phrase it that way. They are an "external
cryptographic provider" and are almost always configured to never let the
private keys leave the device and require a security pin to perform
privileged operations (e.g. use private key)



> the clients have special software installed that



Not really needed these days, but see above.



> , when the card is

> inserted and authenticated, grants access to the certificate and

> perhaps imports them into the windows keystore



Yes, the middleware can help with that. But modern OS (win 7+) should work
out of the box for PIV (note CAC is inconsequentially different for your
use case).



>  so that apps (like acrobat) know

> where to look when signing... but that is just a laymen guess and I

> could be wrong...

>

>

> Based on my (lack of) knowledge on these cards, javascript seems like



The hardest way, absolutely the hardest way if using smartcards. Again see
above.



> the only way... yet I suspect that would be more limiting in

> functionality than a java solution. Any questions?



If you need, have your PMO reach out to me on the .mil side.



>

>

> > From: Wade Polk

>

> > Sent: Wednesday, December 18, 2019 5:58 PM

>

> >

>

> > Yeah... it's our main use case but we won't have access to the smart

>

> > cards anytime soon. Internet isn't an option so web services won't

> work.

>

> > Javascript solution is the only way to go it would appear... at

> > least

>

> > for these smartcards; still need the keystore approach as well too

>

> > though, not

>

>

>

> Need actual specifics here...

>

>

>

>

>

> > everyone uses them.

>

> >





--

Jason Pyeron  | Architect

Contractor    |

PD Inc        |

10 w 24th St  |

Baltimore, MD |



.mil: [email protected]

.com: [email protected]

tel : 202-741-9397









---------------------------------------------------------------------

To unsubscribe, e-mail: [email protected]

For additional commands, e-mail: [email protected]

Reply via email to