Notice! This document is currently in Archived status.
The content of this document may be incorrect or outdated.

Print this article Edit this article

EMail Security keys (writing Certificates to tokens provided by IdenTrust)

Email encryption

Is a three step process.
 
  1. If and when instructed to do so by the Export Control Office, please follow the guidelines they will provide to you on obtaining your PKI certificate and hardware dongle (HID USB ~$70). This is the first step.
  2. At this time, please send ECN a note via purdue.edu/ecn/contactus and let us know you are expecting to purchase a PKI certificate.
 
Step 3: ECN Staff Internal Notes:
 
 
===========CAUTION=CAUTION=CAUTION=============================
!!!TO BE DONE ONE TIME ONLY - DO NOT OVERWRITE AN EXISTING DONGLE!!!
===========CAUTION=CAUTION=CAUTION=============================
Once the hardware token and certificate have been purchased, please follow the instructions on importing and enabling the certificate into the email client.
  • set up the Active X controls - Internet Explorer only.
Do these as admin on an ECN laptop (because it’ll need admin)
 
         ActiveX filtering = disable
         allow previously unused = enable
         allow Scriptlets = enable
         automatic prompting = enable
         binary and script behaviors enable
         display video and animation = disable
         download signed = prompt
         download unsigned = prompt
         initialize and script not marked = prompt
         only allow approved domains = disable
         run ActiveX controls and plug-ins = enable
         run antimalware = disable
         script ActiveX controls marked = enable
 
- add https://identrust.com to trusted site of IE explorer
- Install the token driver from the media provided by the user (Latest driver for windows 10 machines is located in \\ecn-beldin\Software\IdenTrust)
- Run the installation from site "www.identrust.com/install" - the installer will guide through the setup (it requires the user to change the password, and will ask them to enter the authorization code and passcode several times)
 
- The Certificate will be written to the Dongle and the user should be good to use it on their machine once it finishes
- The driver for the dongle should be also installed on the machine where they are going to use the token and encryption
 
===========CAUTION=CAUTION=CAUTION=============================
!!!TO BE DONE ONE TIME ONLY - DO NOT OVERWRITE AN EXISTING DONGLE!!!
===========CAUTION=CAUTION=CAUTION=============================
Overwriting an existing dongle will make all previously encrypted email completely unavailable
 
 
For troubleshooting access issues from the website, please refer to the PDF document from the following folder.
\\ecn-beldin\Software\IdenTrust
 
 

Last Modified: Apr 17, 2024 11:07 am GMT-4
Created: Aug 26, 2019 1:29 pm GMT-4 by admin
JumpURL: