1. Introduction

This manual serves as a guide to a successfully complete the Bit4id Kit installation process for a l'use of cryptographic cards i the procedure for a accessing i using l'management application. The Bit4id Kit consists of the following components:

  • Bit4id Middleware: libraries that allow a any Operating System application to operate with cryptographic cards.
  • Bit4id PKI Manager: application for a card management, which allows you to perform operations such as a PIN change o PUK, PIN unlocking, obtaining information about the card, importing o exporting certificates…

This manual will guide you in a simple way through the installation process i using the Bit4id Kit.

1.1 A who is this document addressed to?

End users, who will use chip cards in Linux environments.

2. Before you start

Make sure you have:

  • A standard, PC/SC compatible card reader that is properly connected, installed i configured. Follow the instructions provided by the reader manufacturer to a verify its correct installation i operation.
  • The latest version of the Bit4id Kit . Link for a <a href="https://cdn.bit4id.com/es/AOC/middleware/Bit4id_AOC_Middleware.zip">download l'latest version.
  • To a be able to perform the installation, it is essential to have Administrator permissions . If you do not have them, the installation will be denied.
  • If you are using the lGNOME desktop environment, it is essential to enable Wayland. A Below you will find a <a href="https://linuxconfig.org/how-to-enable-disable-wayland-on-ubuntu-22-04-desktop" rel="noopener noreferrer" target="_blank">guide on how to do it. .

3. Installation

If necessary, you will need to download and install the drivers so that your computer can recognize the reader you have purchased. To do this, go to the official website of the reader manufacturer.

Follow the instructions provided by the reader manufacturer to a verify its correct installation i operation.

If you purchase a bit4id reader, if your version of Linux has the PCSC drivers installed by default, it will not be necessary to download any drivers.

3.1. PKI Manager Installation Wizard

  1. Direct-te a the folder where you downloaded l' DEB.zip compressed file

Carpeta d'instal·lació

  1. Unzip the folder. Inside the folder you will see 2 installers.
  • If your operating system is Ubuntu/Debian you will need to run: Bit4id_Middleware.deb
  • If your operating system is Fedora/Centos you will need to run: Bit4id_Middleware.rpm
  1. Follow the steps of l'installer. In this case we will do it with an Ubuntu 22.04.1

Executar instal·lador

Instal·lador de l'aplicació

Procés d'instal·lació

Aplicació instal·lada

  1. Once the PKI Manager installation is complete, restart your computer.

    Logo aplicació Bit4id PKI Manager

  2. Image without any device connected:

    Imatge sense cap dispusitiu conectat

Once the restart is complete, open the l'application.

Logo aplicació Bit4id PKI Manager

Interfície principal PKI Manager

  1. With the lapplication open, connect the reader to a USB port i then insert the card. You can also do this process by connecting the token to a USB port.

PKI Manager amb targeta connectada

4. Problems during installation

You may have previous versions of l'Card Management application (Bit4id PKI Manager) installed on your computer, so you will be asked to remove previous versions before running l'installer. Remove these versions i run l'installer again.

How to uninstall a previous version of PKI Manager?

  1. Go to Software Center (Install Software)
  2. Search for i select the Installed tab
  3. Select what you want to delete.
  4. Press uninstall
  5. If not, open the command console (Control + Alt + T)
  6. Type Ubuntu/Debian(sudo apt-get --purge remove libbit4xpki), Fedora/Centos(sudo yum remove libbit4xpki)
  7. Enter your password i press Enter

5. Firefox a configuration

In order to a be able to use the certificates contained in the smart card in the Mozilla Firefox browser, it is necessary to manually incorporate some Bit4id Universal Middleware libraries.

The automated incorporation of security devices in Firefox was disabled since version 3.5 as a a security measure.

  1. We open Mozilla Firefox, go to a Options ? ( Preferences)

Opciones Firefox

  1. A l'section of Privacy i Security, search l'certificates section i click a Security Devices

Privacitat Firefox

  1. S'will open l'Device Manager. Click a Load

Carregar mòdul criptogràfic en Firefox

  1. When this window opens, you need to find the PKCS#11 device driver. Click a Browse, to a search-it on your computer.

Finestra mòdul PKCS#11

In the previous window, the following data must be entered:

  • Module name: Bit4id Universal Middleware
  • Module archive: /usr/lib/bit4id/libbit4xpki.so

Finestra mòdul PKCS#11

6. Functionalities

LThe Bit4id PKI Manager application has multiple functionalities available from the main screen.

IMPORTANT: Bit4id PKI Manager comes by default with the user version. To a have all its features, you must switch to the administrator version using the command: Ctrl+A

Finestra principal PKI Manager

6.1. Functionality tables

Basic functionalities:

Captura de les funcionalitats bàsiques

Basic functionality table

Function Description
Unlock PIN Function to a unlock the card PIN.
Change PIN Function to a change the card PIN.
Change PUK Function to a change the card's PUK.
Login/Logout Function for a logging in/out of the card.
Device information Tab where we will find the description of the device connected to the i card.
Certificates Tab where we will find the luser i certificates of the CA loaded on the card.

To access a the extra features you must click a:

Click

Extra features:

Captura de les funcionalitats extres

Table of extra features

Function Description
Login/Logout Log in/out of card content.
Refresh Update the token/card content to a see new certificates.
Change device name Define the name under which the device appears.
Change PIN Function to a change the card PIN.
Unlock PIN Function to a unblock the card's PIN using its PUK.
Change PUK Function to a change the card's PUK.
Import certificate Function to a import a certificate to your card.
Erase device Function to delete ALL i certificates and keys from the card token.
  • Log in

    To access a any functionality offered by the software, you must enter the card PIN.

    Iniciar sessión

  • Change PIN
    To change your PIN, enter your card PIN i the new PIN. The new PIN must be between 4 i and 8 alphanumeric digits.

Canviar PIN

  • Unlock PIN

To unblock the PIN, enter the PUK of the card i the new PIN. The new PIN must be between 4 i 8 alphanumeric digits.

Desbloquejar PIN

  • Change PUK

Enter the old PUK of the i card and the new PUK. The new PUK must be between 4 i and 8 alphanumeric digits.

Canviar PUK

  • Import

This option allows the import of certificates on the card. The formats accepted by a for the import of certificates on the card are .p12 o .pfx since these formats include the private key of the certificate, essential for a to perform cryptographic operations.

To start the import, first select the certificate from its location, as shown in the following image:

Seleccionar certificat

Once the certificate is selected, press “Open”:

The system will ask you for the password of the l'PFX file o P12 (certificate i private key thereof) that you want to import, i which contains its certificate i key pair. Insert-the i complete the import options according to your convenience, where:

Contrasenya del certificat

– Import certificates without associated key peer: allows you to import the entire certification hierarchy included in the PFX file o P12. It is recommended that you DO NOT CHECK this option.

– Define CKA_AND from PKCS#11: identifier that certain applications use a l'when displaying the certificate. It is recommended to enter a useful identifying value, for example pedro_signature, pedro_access, pedro_encryption, etc.

I the certificate import will be complete:

Importació OK

In the event that you wish to verify that the certificate has been correctly saved, remember that you can review all the certificates stored on the a card through l's “View” option of Bit4id PKI Manager.

  • Certificate details

Once the card PIN is entered, you can see the certificates included in it. In the pop-up window that the lapplication displays, you can see information about the previously selected certificate.

Info certificat

  • Information

Provides detailed card information: model, serial number, manufacturer label. Support (<a href="mailto:soporte@bit4id.com">soporte@bit4id.com ) requests this information from you to a know the type of card you are using.

Info targeta

7. Frequently asked questions

Can I combine núonly i letters for the núonly PIN of the card?
Sí, there is no problem, as long as the new PIN is between 4 i 8 digits.

Is there a maximum number of PIN entries in case I have any questions i I don't remember my PIN number? When can the card be blocked?
If you enter the PIN code incorrectly more than 3 times, it will be blocked. Follow the "Unblock PIN" steps above to unblock-it.

Is there a maximum number of PUK insertions to a attempt to unblock the PIN? What happens if the card is blocked?
If you enter the PUK code incorrectly more than 3 times, it is blocked. For security reasons, the card is completely blocked.

8. Glossary

Certification Authority: is l'trusted entitya, responsible for issuing i revoke electronic certificates, used in electronic signature. L'Certification Authority, by itself o through the intervention of a Registration Authority, verifies the identity of the applicant for a certificate before its issuance o, in the case of certificates issued with the condition of revoked, eliminates the revocation of the certificates by checking this identity.

Expiration of the digital certificate: the digital certificate has a validity period that is stated in the certificate itself. It is generally 2 years, although by law a validity of up to a 5 years is allowed. Once the certificate has expired, the services offered by l'Administration that require an electronic signature cannot be used, i any electronic signature made a from that moment on will not be valid.

Digital certificate: document on computer media issued i signed by l'Certification Authority, which guarantees the identity of its owner.

Recognized certificate: certificate issued by a Certification Service Provider that meets the requirements established in the Law regarding a verification of the identity i other circumstances of the applicants i a reliability i guarantees of the certification services they provide, in accordance with the provisions of Chapter II of TTitle II of Law 59/2003, of 19 December, on Electronic Signatures.

Electronic signature: set of data, in electronic form, annexed a other electronic data o functionally associated with them, used as a means to a formally identify a l'author o the authors of the document that contains it. There are 3 types of electronic signature: simple electronic signature, advanced i recognized.

Simple electronic signature: set of data, in electronic form, annexes a other data.

Advanced electronic signature: electronic signature that allows the signatory to be identified i to detect any subsequent change to the signed data, which is uniquely linked to the signatory i a the data a to which i refers that has been created by means that the signatory can maintain under their exclusive control.

Recognized electronic signature: an advanced electronic signature based on a recognized i certificate generated by a secure signature creation device is considered a recognized electronic signature. The recognized electronic signature will have the same value with respect to data recorded electronically as a handwritten signature with respect to data recorded on paper.

Hash function: it is an operation that is performed on a data set of any size, so that the result obtained is another data set of fixed size, regardless of the original size, i which has the property of being uniquely associated a with the initial data, that is a to say, it is impossible to find two different messages that generate the same result when applying the hash function.

Hash o Fingerprint: fixed-size result obtained after applying a hash function a to a message i that meets the property of being uniquely associated a with the initial data.

Integrity: integrity is the quality possessed by a document o file that has not been altered i which a also allows verification that no manipulation has occurred in the original document.

Certificate Revocation Lists o Revoked Certificate Lists: list containing exclusively the lists of suspended revoked certificates o (not expired ones).

Non-repudiation: l'sender who electronically signs a document will not be able to deny that he sent the original message, since this is attributable a l'sender through the private key that only he knows i and is obliged a to keep. Non-repudiation also allows a to verify who participated in a transaction.

Non-repudiation o non-repudiation is a security service closely related to l'authentication i that allows to prove the participation of the parties in a communication. The essential difference with l'authentication is that the former occurs between the parties establishing the communication i the non-repudiation service occurs against a third party

Certification Service Provider o PSC: natural person o legal entity that issues electronic certificates o provides other services in relation to electronic signatures. See Certification Authority.

PIN: sequence of characters that allow laccess to certificates. NúPersonal Identification Number, asometimes called NIP.

PUK: sequence of characters that allow the change o unblocking of the PIN. Personal Unblocking Key.

Renewal Renewal consists of a requesting a new certificate using a valid certificate that is a about to expire. In this way, before the expiration of a certificate, renewal can be requested i which implies that a new valid certificate is issued.

Revocation: definitive cancellation of a digital certificate a request of the subscriber, o on the initiative of the l'Certification Authority in case of doubt about the security of the keys. Revocation is an irreversible state. The revocation of a certificate can be requested after a suspension situation o by the will of the authorized persons a requesting-it. Similarly, in the case of a suspended certificate, if the maximum suspension period has passed, if the certificate has not been enabled, it becomes a definitively revoked. When l'certification entity revokes o suspends a certificate, it must make-it appear in the Certificate Revocation Lists (CRL), to a make this fact public. These lists are public and must always be available.

Smart card: any card with integrated circuits that allow the execution of certain programmed logic.