09.04.2013 Views

DoD CAC Middleware Requirements - IDManagement.gov

DoD CAC Middleware Requirements - IDManagement.gov

DoD CAC Middleware Requirements - IDManagement.gov

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

4.2.1 <strong>Middleware</strong> shall support all card-edge command sets for: ....................11<br />

4.2.2 BSI <strong>Requirements</strong> ...................................................................................11<br />

4.3 PKI <strong>Requirements</strong> ...........................................................................................11<br />

4.3.1 Cryptographic Service Provider (CSP) ....................................................11<br />

4.3.2 PKCS 11..................................................................................................12<br />

4.4 Common Access Card (<strong>CAC</strong>) .........................................................................12<br />

4.4.1 Minimum Supported <strong>CAC</strong>s: .....................................................................12<br />

4.4.2 New Card Types......................................................................................12<br />

4.4.3 Card Applets............................................................................................13<br />

4.4.4 Certificates...............................................................................................13<br />

4.5 <strong>Middleware</strong> Operating Environment ................................................................13<br />

4.6 Card Readers ..................................................................................................13<br />

4.7 Application Support .........................................................................................14<br />

4.7.1 E-mail ......................................................................................................14<br />

4.7.2 Cryptographic Logon ...............................................................................14<br />

4.7.3 Client Authentication................................................................................15<br />

4.7.4 Additional Applications ............................................................................15<br />

4.8 Graphical User Interface .................................................................................15<br />

4.8.1 <strong>Requirements</strong> for a Graphical User Interface (GUI) ................................15<br />

4.9 <strong>Middleware</strong> Resource Parameters ..................................................................15<br />

4.9.1 Disk Space and Workstation <strong>Requirements</strong> ............................................15<br />

4.10 <strong>Middleware</strong> Installation....................................................................................16<br />

4.10.1 <strong>Middleware</strong> Behavior ...............................................................................16<br />

4.11 <strong>Middleware</strong> Configuration................................................................................16<br />

4.11.1 Configurations .........................................................................................16<br />

4.12 PIN Management ............................................................................................17<br />

UNCLASSIFIED 3

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!