Setting Token Types for Specified Smart Cards
139
5.4. Setting Token Types for Specified Smart Cards
The TPS can be configured to use specific token profiles to format a new smart card, based on some
attribute of the smart card, such as its answer-to-reset (ATR) message or a range of serial numbers for
the smart cards.
This is useful to manage multiple types of smart card profiles in a single deployment to determine and
assign the smart card profile automatically based on physical distribution of those cards, rather than
some software process change.
There are three steps to configuring type-specific formatting operations:
1. Configure the type-specific TPS profile, as in
Section 5.1, “Configuring TPS Smart Card
Operations”
.
2. Configure the type-specific authentication profile, as in
Section 5.7.3, “Configuring or Disabling
LDAP Authentication”
.
3. Configure the mapping filter and target, as in
Section 5.4.2, “Mapping Token Types to Smart Card
Operation Profiles”
.
5.4.1. Default Token Types
There are several default token types already configured for smart card operations, as listed in
Table 5.6, “Default Token Types”
. There are several profiles available for security officers, regular
users, and devices.
Token Type
Description
cleanToken
For operations for any blank token, without any
other applied token types.
soKey
For operations for generating keys for security
officer stations.
soCleanSOToken
For operations for blank tokens for security
officer stations.
soKeyTemporary
For operations for temporary security officer
tokens.
soCleanUserToken
For operations for blank user tokens for security
officers.
soUserKey
For operations for security officer user tokens.
tokenKey
For operations for generating keys for uses with
servers or devices.
userKey
For operations for regular user tokens.
userKeyTemporary
For operations for temporary user tokens.
Table 5.6. Default Token Types
5.4.2. Mapping Token Types to Smart Card Operation Profiles
Each type of operation contains a parameter
mapping.
#
. containing mapping IDs.
Summary of Contents for CERTIFICATE SYSTEM 8.0 - ADMINISTRATION
Page 42: ...20 ...
Page 43: ...Part I Setting up Certificate Services ...
Page 44: ......
Page 190: ...168 ...
Page 208: ...186 ...
Page 223: ...Part II Additional Configuration to Manage CA Services ...
Page 224: ......
Page 256: ...234 ...
Page 270: ...248 ...
Page 280: ...258 ...
Page 292: ...270 ...
Page 293: ...Part III Managing the Subsystem Instances ...
Page 294: ......
Page 408: ...386 ...
Page 438: ...416 ...
Page 439: ...Part IV References ...
Page 440: ......
Page 503: ...Netscape Defined Certificate Extensions Reference 481 OID 2 16 840 1 113730 13 ...
Page 504: ...482 ...
Page 556: ...534 ...
Page 564: ...542 ...