DoD CAC Middleware Requirements - IDManagement.gov
DoD CAC Middleware Requirements - IDManagement.gov
DoD CAC Middleware Requirements - IDManagement.gov
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
4.2.1 <strong>Middleware</strong> shall support all card-edge command sets for: ....................11<br />
4.2.2 BSI <strong>Requirements</strong> ...................................................................................11<br />
4.3 PKI <strong>Requirements</strong> ...........................................................................................11<br />
4.3.1 Cryptographic Service Provider (CSP) ....................................................11<br />
4.3.2 PKCS 11..................................................................................................12<br />
4.4 Common Access Card (<strong>CAC</strong>) .........................................................................12<br />
4.4.1 Minimum Supported <strong>CAC</strong>s: .....................................................................12<br />
4.4.2 New Card Types......................................................................................12<br />
4.4.3 Card Applets............................................................................................13<br />
4.4.4 Certificates...............................................................................................13<br />
4.5 <strong>Middleware</strong> Operating Environment ................................................................13<br />
4.6 Card Readers ..................................................................................................13<br />
4.7 Application Support .........................................................................................14<br />
4.7.1 E-mail ......................................................................................................14<br />
4.7.2 Cryptographic Logon ...............................................................................14<br />
4.7.3 Client Authentication................................................................................15<br />
4.7.4 Additional Applications ............................................................................15<br />
4.8 Graphical User Interface .................................................................................15<br />
4.8.1 <strong>Requirements</strong> for a Graphical User Interface (GUI) ................................15<br />
4.9 <strong>Middleware</strong> Resource Parameters ..................................................................15<br />
4.9.1 Disk Space and Workstation <strong>Requirements</strong> ............................................15<br />
4.10 <strong>Middleware</strong> Installation....................................................................................16<br />
4.10.1 <strong>Middleware</strong> Behavior ...............................................................................16<br />
4.11 <strong>Middleware</strong> Configuration................................................................................16<br />
4.11.1 Configurations .........................................................................................16<br />
4.12 PIN Management ............................................................................................17<br />
UNCLASSIFIED 3