HP Bc1500 Implementing Gemalto Smart Card for Use with HP Compaq t5720 and HP - Page 1

HP Bc1500 - BladeSystem - Blade PC Manual

Page 1 highlights

Implementing Gemalto Smart Card for Use with HP Compaq t5720 and HP CCI Introduction 2 Prerequisites 2 Reference hardware and software 3 Reference Documents 4 Installing GemSafe Libraries 5.0 SE to Server and Client PCs (Optional 5 Installing Microsoft Certificate Services 9 Configuring a Certificate Authority (CA) service 13 Configuring Microsoft Certificate Authority to Issue Smart Card User Certificate 18 Manually issue Smart Card User Certificate 24 Testing the Smart Card 27 Creating Customized User Install Packages for Clients PCs (Optional 30 Additional Information 36 Using a Smart Card For Windows Network Login 36 Administration of the GemSafe Smart Card 36 Working with GemSafe Libraries 36 Usage cases 37 Usage case 1: User authentication from blade PC to Active Directory Domain 37 Usage case 2: User authentication from client device to blade PC or Active Directory Server using RDP 38 Usage case 3: User authentication from client device to blade PC or Active Directory Server using HPSAM client 38 Usage case 4: Accessing secure Web site 39 Usage case 5: User authentication using VPN through firewall to blade PC or Active Directory Server 40 Usage case 6: User authentication from client device using Citrix server 43 Service and Support 45

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45

Implementing Gemalto Smart Card for Use with HP Compaq
t5720 and HP CCI
Introduction
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2
Reference hardware and software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3
Reference Documents
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4
Installing GemSafe Libraries 5.0 SE to Server and Client PCs (Optional)
. . . . . . . . . . . . . . . . . .5
Installing Microsoft Certificate Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9
Configuring a Certificate Authority (CA) service
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .13
Configuring Microsoft Certificate Authority to Issue Smart Card User Certificate
. . . . . . . . . . . .18
Manually issue Smart Card User Certificate
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .24
Testing the Smart Card
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .27
Creating Customized User Install Packages for Clients PCs (Optional) . . . . . . . . . . . . . . . . . . .30
Additional Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .36
Using a Smart Card For Windows Network Login . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .36
Administration of the GemSafe Smart Card
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .36
Working with GemSafe Libraries
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .36
Usage cases . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .37
Usage case 1: User authentication from blade PC to Active Directory Domain
. . . . . . . . . .37
Usage case 2: User authentication from client device to blade PC or
Active Directory Server using RDP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .38
Usage case 3: User authentication from client device to blade PC or
Active Directory Server using HPSAM client
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .38
Usage case 4: Accessing secure Web site . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .39
Usage case 5: User authentication using VPN through firewall to blade PC or
Active Directory Server
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .40
Usage case 6: User authentication from client device using Citrix server
. . . . . . . . . . . . . .43
Service and Support
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .45