Menu
Click Cancel so that the 3SKey token is not paired to your MAC user account. How to verify that the certificate is detected on your MAC: When the Safenet software has been installed on the MAC you can plug your token and verify that the certificate is detected properly: Click the Safenet Authentication client icon to open the menu. SafeNet Authentication Client (Mac) 8.0 supports Mac OS X 10.6 (Snow Leopard) on both Intel 32-bit and Intel 64-bit platforms. Note: Mac Power PC is not supported in this release. New Features The following features were introduced in SafeNet Authentication Client 8.0 (Mac): User Interface is branded with SafeNet Branding.
- Safenet Authentication Client Mac Os X Download 10.11
- Safenet Authentication Client 10.2
- Safenet Authentication Client Mac Os X Download Windows 7
To download and install the Safenet Authentication Client software for use the COMODO EV Codesigning Certificate, perform the following steps: Note: The SafeNet drivers below are compatible with Microsoft Windows 8, 8.1 and 10 for both 32-bit and 64-bit systems, Mac OSX and Linux.
The SafeNet Authentication client (SAC) must be installed on all MacOSX desktop computers on which the eToken will be used. This document describes the procedure for installing and configuring the MacOSX client.
***Current Information on MacOSX eToken Client Compatibility***
The currently available version of the SAC MacOSX client (version 10.2) provides support for MacOSX versions up to 10.15.x.
Desktop Installation and Configuration:
Safenet Authentication Client Mac Os X Download 10.11
![Client Client](/uploads/1/2/8/3/128394835/108777692.png)
- The SAC is packaged in .dmg format and can be downloaded from https://secure.sis.utoronto.ca/ or https://isops.noc.utoronto.ca/download/ (student access)
- If you are planning to upgrade MacOSX, please do so before upgrading the SAC client. Run the installer to do a new install or upgrade the existing version.
- Once installed, a SAC icon is displayed indicating client operation.
Usage:
Safenet Authentication Client 10.2
- Insert an eToken into a USB port. Right click on the SAC icon and select ‘Tools’ for a GUI which shows the contents of the eToken.
- Select ‘Change password’ to change an eToken password.
To use PKI, you must specify a PKCS#11 module for your PKI device. To do this, perform the following steps:
Safenet Authentication Client Mac Os X Download Windows 7
- Open the configuration file based on the operating system:
- Microsoft Windows: C:ProgramDataNetIQDevice Serviceconfig.properties.
- Linux: /opt/NetIQ/Device Service/config.properties.
- Apple Mac OS X: For 6.3 Service Pack 1 and newer versions, open /Library/Application Support/NetIQ/DeviceServiceTool.app/Contents/Resources/config.properties. For prior versions, open /Library/LaunchDaemons/NetIQ/Device Service/config.properties.
- Remove the hash sign(#) before vendorModule to remove any comments from the parameter.
- Set the vendor module specific dll file name to the parameter.pki.vendorModule: <filename>.dllFor example, pki.vendorModule: rtPKCS11.dll.NOTE:You can specify more than one PKCS#11 library with semicolon in the format: pki.vendorModule: eToken.dll;rtPKCS11.dllIf a vendor module is not located in the system32 directory, use to specify the path. If there are any spaces in the path, ensure not to replace the space with in the path.For example, pki.vendorModule: C:Program FilesActivIdentityActivClientacpkcs211.dll.NOTE:If you have specified some pki.vendorModules separated by a semicolon, you must specify the same number of values for the parameter pki.blockingMode.For example, pki.blockingMode: true;false.PKI plug-in of the Device Service supports the automatic mode, where a few known vendor modules are auto-detected. You must specify: pki.vendorModule: auto.
- (Optional) Specify the additional parameters:Table 3-1MethodSyntaxDescriptionHashpki.hashMethod: SHA256The default value is SHA256 and you can specify this value, if a parameter is not presented. The following methods are also supported: SHA224, SHA384, SHA512. To set the methods, ensure that the PKCS#11 module supports the required hash method.Paddingpki.padding: PKCS#1The default value is PKCS#1 and you can specify this value, if a parameter is not presented.The following options are also supported: PSS, OAEP.Key sizepki.modulusBits: 2048The default value is 2048 bit. For example, eToken PRO 32k does not support it and you need to set 1024 to use it.Blocking modepki.blockingMode: trueThis parameter is used to detect and monitor the token connected to your system. It is set to true by default. OpenSC does not support the 'waiting for card' mechanism and it requires to change the option to False. Most of the vendors module work appropriately in the default mode.NOTE:If you specify the pki.vendorModule: auto and pki.blockingMode parameters, the pki.blockingMode parameter does not overwrite a blocking mode that is pre-defined for an auto-detectable vendor module.
- Save the changes.
- Restart the Device Service.