Au9540/9560 Smart Card Reader Installation Guide For Mac

Leave a comment

I'm military and so the use of my smart card reader is a necessity. Likely, those reading this who have a solution probably understand or have a similar issue.Here's what I've got:.

ACR39U Smart Card Reader ushers in new and modern technology to the world of smart card readers. This compact smart card reader brings together sophisticated technology and modern design to meet rigorous requirements of smart card–based applications. It also features a USB Full Speed interface and a smart card read/write speed of up to 600 Kbps.

All necessary DoD certificates have been installed on the system and register with the Certificate Manager. Accessing CAC enabled websites is prohibited because there is no communication between ANY of my web browswers and my CAC itself. Under 'Settings'Internet Options'Content' Tab'Certificates' Button'Personal' Tab: None of my certificates registerfrom my card reader. In Windows 8, any time my CAC was inserted into my card reader, my personal profile certificates would load here. Currently none load. I have the latest Smart Card utility update from Windows Update.

Device Manager shows my card reader is installed and properly functioning. SOLUTION FOUND!!!There is an opensource software called 'Smart Card Manager' which is referenced on militarycac.com as an alternative to using ActivClient 6.2 (AKA for those of us that can't access a CAC secured site to download a program designed to enable the use of aCAC card needed for said site).I'm not totally sure what the program actually did, however, it seems to have re-established the link between my card reader and my internet browser/certificate management software. Below is the link to the program:.And below is the link to the page on militarycac.com (Also a wonderful resource for anyone military for finding the latest drivers and certificate packs for your computer and card reader).Finally, make sure (if you're military) that you have all of the appropriate DoD PKI Root Certificates installed and have uninstalled old/conflicting certificates. Instructions for this can be found by clicking the Navy Knowledge Online (NKO) website ( )and clicking the CAC Login Help link below the login button in the center of the page.

The link will pop up a window with instructions for things to do on the DISA website. Make sure you complete the following:. Follow the instructions to run the Cross-Certificate remover (instructions are found in the popup on NKO. INSTALL 'Installroot 4' on your machine.

To do this choose the 'Trust Store' tab instead of the 'Certificate Validation' tab on the Tools page of the DISA site. 'Installroot 4: NIPR Windows Installer' is the DoD PKI certificate installer that you thenneed to download and install.Following all of that, you should be up and running.

It's taken me a lot of digging to find this solution and I've done a lot of the working with solutions from militarycac.com in the past and it seems every time windows changes, something about smartcardlogin on government sites breaks. Hopefully this will save some of the rest of you that headache that we all hate.This method has successfully restored my access to all of the military sites I had access to in the past. (MyPay, BUPERS, NFAS, DEERS, NSIPS, NKO, MOVE.MIL) hopefully it works for you as well.

Individuals who have a valid authorized need to access DoD Public Key Infrastructure (PKI)- protected information but do not have access to a government site or government-furnished equipment will need to configure their systems to access PKI-protected content.Accessing DoD PKI-protected information is most commonly achieved using the PKI certificates stored on your Common Access Card (CAC). The certificates on your CAC can allow you to perform routine activities such as accessing OWA, signing documents, and viewing other PKI-protected information online. For more information about your CAC and the information stored on it, visit.Before you begin, make sure you know your organization’s policies regarding remote use. To get started you will need:. CAC. Card reader. Middleware (if necessary, depending on your operating system version)You can get started using your CAC by following these basic steps:.

Get a card reader.At this time, the best advice for obtaining a card reader is to work with your home component to get one. In addition, please review the for more information regarding the requirements for a card reader. Install middleware, if necessary.You may need additional middleware, depending on the operating system you use. Please contact your CC/S/A for more information on the middlew​are requirements for your organization.

You can find their contact information on our tab. Install DoD root certificates with InstallRoot (, or ).In order for your machine to recognize your CAC certificates and DoD websites as trusted, run the InstallRoot utility (, or ) to install the DoD CA certificates on Microsoft operating systems. If you’re running an alternate operating system such as Mac OS or Linux, you can import certificates from the. The is available here.

Make certificates available to your operating system and/or browser, if necessary.for specific instructions. To get started you will need:.

CAC (see below). Card readerYou can get started using your CAC on your Mac OS X system by following these basic steps:. Get a card readerTypically Macs do not come with card readers and therefore an external card reader is necessary.

At this time, the best advice for obtaining a card reader is through working with your home component. In addition, please review the for more information regarding card reader requirements.

Download and install the OS X Smartcard Services packageThe OS X Smartcard Services Package allows a Mac to read and communicate with a smart card. In order for your machine to recognize your CAC certificates and DoD websites as trusted, the installer will load the DoD CA certificates on OS X.

Please refer to for specific installation instructions. Address the cross-certificate chaining IssueThese walk through adjusting the trust settings on the Interoperability Root CA (IRCA) DoD Root CA 2 and the US DoD CCEB IRCA 1 DoD Root CA 2 certificates to prevent cross-certificate chaining issues. This can make it appear that your certificates are issued by roots other than the DoD Root CA 2 and can prevent access to DoD websites. Configure Chrome and Safari, if necessarySafari and Google Chrome rely on Keychain Access properly recognizing your CAC certificates. In Finder, navigate to Go Utilities and launch KeychainAccess.app.

Verify that your CAC certificates are recognized and displayed in Keychain AccessNote: CACs are currently made of different kinds of card stock. To determine what card stock you have, look at the back of your CAC above the magnetic strip. Most CACs are supported by the Smartcard Services package, however Oberthur ID One 128 v5.5 CACs are not.

Third party middleware is available that will support these CACS; two such options are Thursby Software’s PKard and Centrify’s Express for Smart Card. To get started you will need:.

CAC. Card reader. MiddlewareYou can get started using your CAC with Firefox on Linux machines by following these basic steps:. Get a card reader.At this time, the best advice for obtaining a card reader is to work with your home component to get one. In addition, please review the for more information regarding the requirements for a card reader.

Activate speed meter pro license key. Obtain middleware.You will need middleware for Linux to communicate with the CAC. The CoolKey PKCS#11 module provides access to the CAC and can be installed using Linux package management commands. For Debian-based distributions, use the command apt-get install coolkey. For Fedora-based distributions, use the command yum install coolkey.

The CoolKey PKCS #11 module version 1.1.0 release 15 ships with RHEL 5.7 and above and is located at /usr/lib/pkcs11/libcoolkeypk11.so.If you prefer to build CoolKey from source, instructions are included in the guide.To configure Firefox to communicate with the CAC, follow to install the DoD root and intermediate CA certificates into the Firefox NSS trust store, load the CoolKey library, and ensure the Online Certificate Status Protocol (OCSP) is being used to perform revocation checking.