1. Introduction
This manual serves as a guide to a successfully complete the Bit4id Kit installation process for a l'use of cryptographic cards i the procedure for a accessing i using l'management application. The Bit4id Kit consists of the following components:
- Bit4id Middleware: libraries that allow a any Operating System application to operate with cryptographic cards.
- Bit4id PKI Manager: application for a card management, which allows you to perform operations such as a PIN change o PUK, PIN unlocking, obtaining information about the card, importing o exporting certificates…
This manual will guide you in a simple way through the installation process i using the Bit4id Kit.
1.1 A who is this document addressed to?
End users, who will use chip cards in Linux environments.
2. Before you start
Make sure you have:
- A standard, PC/SC compatible card reader that is properly connected, installed i configured. Follow the instructions provided by the reader manufacturer to a verify its correct installation i operation.
- The latest version of the Bit4id Kit . Link for a <a href="https://cdn.bit4id.com/es/AOC/middleware/Bit4id_AOC_Middleware.zip">download l'latest version.
- To a be able to perform the installation, it is essential to have Administrator permissions . If you do not have them, the installation will be denied.
- If you are using the lGNOME desktop environment, it is essential to enable Wayland. A Below you will find a <a href="https://linuxconfig.org/how-to-enable-disable-wayland-on-ubuntu-22-04-desktop" rel="noopener noreferrer" target="_blank">guide on how to do it. .
3. Installation
If necessary, you will need to download and install the drivers so that your computer can recognize the reader you have purchased. To do this, go to the official website of the reader manufacturer.
Follow the instructions provided by the reader manufacturer to a verify its correct installation i operation.
If you purchase a bit4id reader, if your version of Linux has the PCSC drivers installed by default, it will not be necessary to download any drivers.
3.1. PKI Manager Installation Wizard
- Direct-te a the folder where you downloaded l' DEB.zip compressed file
- Unzip the folder. Inside the folder you will see 2 installers.
- If your operating system is Ubuntu/Debian you will need to run: Bit4id_Middleware.deb
- If your operating system is Fedora/Centos you will need to run: Bit4id_Middleware.rpm
- Follow the steps of l'installer. In this case we will do it with an Ubuntu 22.04.1
Once the PKI Manager installation is complete, restart your computer.
Image without any device connected:
Once the restart is complete, open the l'application.
- With the lapplication open, connect the reader to a USB port i then insert the card. You can also do this process by connecting the token to a USB port.
4. Problems during installation
You may have previous versions of l'Card Management application (Bit4id PKI Manager) installed on your computer, so you will be asked to remove previous versions before running l'installer. Remove these versions i run l'installer again.
How to uninstall a previous version of PKI Manager?
- Go to Software Center (Install Software)
- Search for i select the Installed tab
- Select what you want to delete.
- Press uninstall
- If not, open the command console (Control + Alt + T)
- Type Ubuntu/Debian(sudo apt-get --purge remove libbit4xpki), Fedora/Centos(sudo yum remove libbit4xpki)
- Enter your password i press Enter
5. Firefox a configuration
In order to a be able to use the certificates contained in the smart card in the Mozilla Firefox browser, it is necessary to manually incorporate some Bit4id Universal Middleware libraries.
The automated incorporation of security devices in Firefox was disabled since version 3.5 as a a security measure.
- We open Mozilla Firefox, go to a
Options ? (
Preferences)
- A l'section of
Privacy i Security, search l'certificates section i click a Security Devices
- S'will open l'Device Manager. Click a Load
- When this window opens, you need to find the PKCS#11 device driver. Click a Browse, to a search-it on your computer.
In the previous window, the following data must be entered:
- Module name: Bit4id Universal Middleware
- Module archive: /usr/lib/bit4id/libbit4xpki.so
6. Functionalities
LThe Bit4id PKI Manager application has multiple functionalities available from the main screen.
IMPORTANT: Bit4id PKI Manager comes by default with the user version. To a have all its features, you must switch to the administrator version using the command: Ctrl+A
6.1. Functionality tables
Basic functionalities:
Basic functionality table
Function | Description |
---|---|
Unlock PIN | Function to a unlock the card PIN. |
Change PIN | Function to a change the card PIN. |
Change PUK | Function to a change the card's PUK. |
Login/Logout | Function for a logging in/out of the card. |
Device information | Tab where we will find the description of the device connected to the i card. |
Certificates | Tab where we will find the luser i certificates of the CA loaded on the card. |
To access a the extra features you must click a:
Extra features:
Table of extra features
Function | Description |
---|---|
Login/Logout | Log in/out of card content. |
Refresh | Update the token/card content to a see new certificates. |
Change device name | Define the name under which the device appears. |
Change PIN | Function to a change the card PIN. |
Unlock PIN | Function to a unblock the card's PIN using its PUK. |
Change PUK | Function to a change the card's PUK. |
Import certificate | Function to a import a certificate to your card. |
Erase device | Function to delete ALL i certificates and keys from the card token. |
Log in
To access a any functionality offered by the software, you must enter the card PIN.
- Change PIN
To change your PIN, enter your card PIN i the new PIN. The new PIN must be between 4 i and 8 alphanumeric digits.
- Unlock PIN
To unblock the PIN, enter the PUK of the card i the new PIN. The new PIN must be between 4 i 8 alphanumeric digits.
- Change PUK
Enter the old PUK of the i card and the new PUK. The new PUK must be between 4 i and 8 alphanumeric digits.
- Import
This option allows the import of certificates on the card. The formats accepted by a for the import of certificates on the card are .p12 o .pfx since these formats include the private key of the certificate, essential for a to perform cryptographic operations.
To start the import, first select the certificate from its location, as shown in the following image:
Once the certificate is selected, press “Open”:
The system will ask you for the password of the l'PFX file o P12 (certificate i private key thereof) that you want to import, i which contains its certificate i key pair. Insert-the i complete the import options according to your convenience, where:
– Import certificates without associated key peer: allows you to import the entire certification hierarchy included in the PFX file o P12. It is recommended that you DO NOT CHECK this option.
– Define CKA_AND from PKCS#11: identifier that certain applications use a l'when displaying the certificate. It is recommended to enter a useful identifying value, for example pedro_signature, pedro_access, pedro_encryption, etc.
I the certificate import will be complete:
In the event that you wish to verify that the certificate has been correctly saved, remember that you can review all the certificates stored on the a card through l's “View” option of Bit4id PKI Manager.
- Certificate details
Once the card PIN is entered, you can see the certificates included in it. In the pop-up window that the lapplication displays, you can see information about the previously selected certificate.
- Information
Provides detailed card information: model, serial number, manufacturer label. Support (<a href="mailto:soporte@bit4id.com">soporte@bit4id.com ) requests this information from you to a know the type of card you are using.
7. Frequently asked questions
Can I combine núonly i letters for the núonly PIN of the card?
Sí, there is no problem, as long as the new PIN is between 4 i 8 digits.
Is there a maximum number of PIN entries in case I have any questions i I don't remember my PIN number? When can the card be blocked?
If you enter the PIN code incorrectly more than 3 times, it will be blocked. Follow the "Unblock PIN" steps above to unblock-it.
Is there a maximum number of PUK insertions to a attempt to unblock the PIN? What happens if the card is blocked?
If you enter the PUK code incorrectly more than 3 times, it is blocked. For security reasons, the card is completely blocked.
8. Glossary
Certification Authority: is l'trusted entitya, responsible for issuing i revoke electronic certificates, used in electronic signature. L'Certification Authority, by itself o through the intervention of a Registration Authority, verifies the identity of the applicant for a certificate before its issuance o, in the case of certificates issued with the condition of revoked, eliminates the revocation of the certificates by checking this identity.
Expiration of the digital certificate: the digital certificate has a validity period that is stated in the certificate itself. It is generally 2 years, although by law a validity of up to a 5 years is allowed. Once the certificate has expired, the services offered by l'Administration that require an electronic signature cannot be used, i any electronic signature made a from that moment on will not be valid.
Digital certificate: document on computer media issued i signed by l'Certification Authority, which guarantees the identity of its owner.
Recognized certificate: certificate issued by a Certification Service Provider that meets the requirements established in the Law regarding a verification of the identity i other circumstances of the applicants i a reliability i guarantees of the certification services they provide, in accordance with the provisions of Chapter II of TTitle II of Law 59/2003, of 19 December, on Electronic Signatures.
Electronic signature: set of data, in electronic form, annexed a other electronic data o functionally associated with them, used as a means to a formally identify a l'author o the authors of the document that contains it. There are 3 types of electronic signature: simple electronic signature, advanced i recognized.
Simple electronic signature: set of data, in electronic form, annexes a other data.
Advanced electronic signature: electronic signature that allows the signatory to be identified i to detect any subsequent change to the signed data, which is uniquely linked to the signatory i a the data a to which i refers that has been created by means that the signatory can maintain under their exclusive control.
Recognized electronic signature: an advanced electronic signature based on a recognized i certificate generated by a secure signature creation device is considered a recognized electronic signature. The recognized electronic signature will have the same value with respect to data recorded electronically as a handwritten signature with respect to data recorded on paper.
Hash function: it is an operation that is performed on a data set of any size, so that the result obtained is another data set of fixed size, regardless of the original size, i which has the property of being uniquely associated a with the initial data, that is a to say, it is impossible to find two different messages that generate the same result when applying the hash function.
Hash o Fingerprint: fixed-size result obtained after applying a hash function a to a message i that meets the property of being uniquely associated a with the initial data.
Integrity: integrity is the quality possessed by a document o file that has not been altered i which a also allows verification that no manipulation has occurred in the original document.
Certificate Revocation Lists o Revoked Certificate Lists: list containing exclusively the lists of suspended revoked certificates o (not expired ones).
Non-repudiation: l'sender who electronically signs a document will not be able to deny that he sent the original message, since this is attributable a l'sender through the private key that only he knows i and is obliged a to keep. Non-repudiation also allows a to verify who participated in a transaction.
Non-repudiation o non-repudiation is a security service closely related to l'authentication i that allows to prove the participation of the parties in a communication. The essential difference with l'authentication is that the former occurs between the parties establishing the communication i the non-repudiation service occurs against a third party
Certification Service Provider o PSC: natural person o legal entity that issues electronic certificates o provides other services in relation to electronic signatures. See Certification Authority.
PIN: sequence of characters that allow laccess to certificates. NúPersonal Identification Number, asometimes called NIP.
PUK: sequence of characters that allow the change o unblocking of the PIN. Personal Unblocking Key.
Renewal Renewal consists of a requesting a new certificate using a valid certificate that is a about to expire. In this way, before the expiration of a certificate, renewal can be requested i which implies that a new valid certificate is issued.
Revocation: definitive cancellation of a digital certificate a request of the subscriber, o on the initiative of the l'Certification Authority in case of doubt about the security of the keys. Revocation is an irreversible state. The revocation of a certificate can be requested after a suspension situation o by the will of the authorized persons a requesting-it. Similarly, in the case of a suspended certificate, if the maximum suspension period has passed, if the certificate has not been enabled, it becomes a definitively revoked. When l'certification entity revokes o suspends a certificate, it must make-it appear in the Certificate Revocation Lists (CRL), to a make this fact public. These lists are public and must always be available.
Smart card: any card with integrated circuits that allow the execution of certain programmed logic.