iii
About This Guide v
1. What Is in This Guide ..................................................................................................... v
2. Additional Reading .......................................................................................................... v
3. Examples and Formatting ............................................................................................... vi
3.1. Formatting for Examples and Commands .............................................................. vi
3.2. Tool Locations ..................................................................................................... vi
3.3. Guide Formatting ................................................................................................. vi
4. Giving Feedback ............................................................................................................ vii
5. Document History ......................................................................................................... viii
1. Introduction to the Enterprise Security Client 1
1.1. Red Hat Enterprise Linux, Single Sign-On, and Authentication ........................................ 1
1.2. Red Hat Certificate System and the Enterprise Security Client ........................................ 2
1.3. The Enterprise Security Client and the Windows Cryptographic Service Provider .............. 3
2. Installing the Enterprise Security Client 5
2.1. Supported Platforms for the Client ................................................................................ 5
2.2. Supported Smart Cards ................................................................................................ 5
2.3. Installing and Uninstalling the Enterprise Security Client on Red Hat Enterprise Linux ........ 5
2.3.1. Installing the Client ............................................................................................ 5
2.3.2. Uninstalling on Red Hat Enterprise Linux ............................................................ 6
2.4. Installing and Uninstalling on Windows .......................................................................... 7
2.4.1. Installing the Client ............................................................................................ 7
2.4.2. Uninstalling the Client ...................................................................................... 14
3. Using the Enterprise Security Client 15
3.1. Tray Icons for the Enterprise Security Client ................................................................ 15
3.2. Launching Enterprise Security Client ........................................................................... 15
3.2.1. Opening the Enterprise Security Client on Red Hat Enterprise Linux .................... 15
3.2.2. Opening the Enterprise Security Client on Microsoft Windows ............................. 16
3.3. Configuring Phone Home ............................................................................................ 16
3.3.1. About Phone Home Profiles ............................................................................. 17
3.3.2. Setting Global Phone Home Information ............................................................ 17
3.3.3. Adding Phone Home Information to a Token Manually ........................................ 18
3.3.4. Configuring the TPS to Use Phone Home ......................................................... 19
3.4. Setting up Users to Be Enrolled .................................................................................. 20
3.5. Enrolling a Smart Card Automatically .......................................................................... 20
3.6. Managing Smart Cards ............................................................................................... 24
3.6.1. Formatting the Smart Card ............................................................................... 25
3.6.2. Resetting a Smart Card Password .................................................................... 26
3.6.3. Viewing Certificates ......................................................................................... 26
3.6.4. Importing CA Certificates ................................................................................. 28
3.6.5. Adding Exceptions for Servers ......................................................................... 30
3.6.6. Enrolling Smart Cards ...................................................................................... 32
3.6.7. Re-Enrolling Tokens ......................................................................................... 33
3.7. Diagnosing Problems .................................................................................................. 33
3.7.1. Errors .............................................................................................................. 35
3.7.2. Events ............................................................................................................. 37
3.7.3. Information about the Smart Card ..................................................................... 37
4. Using Security Officer Mode 39
4.1. Enabling Security Officer Mode ................................................................................... 39
4.2. Enrolling a New Security Officer .................................................................................. 42