beautypg.com

HID Crescendo Mac OSX User Manual

Page 2

background image

Crescendo Integration Guide

MAC OS X

47A3-904, A.0

Contents

About this Guide..........................................................................................................................................3

Purpose ............................................................................................................................................3

Audience...........................................................................................................................................3

1

Introduction.....................................................................................................................................4

1.1

Apple Keychain Services.....................................................................................................4

1.2

TokenLounge.......................................................................................................................4

2

Tested Configurations ...................................................................................................................5

2.1

TokenLounge version ..........................................................................................................5

2.2

SafeSign Identity Client version ..........................................................................................5

2.3

Operating System................................................................................................................5

2.4

Tokens.................................................................................................................................5

2.5

Smart Card Readers............................................................................................................5

2.6

Applications .........................................................................................................................6

3

TokenLounge Functionality...........................................................................................................6

3.1

Keychain Access .................................................................................................................6

3.2

Safari ...................................................................................................................................7

3.3

Mail ......................................................................................................................................8

3.4

VPN .....................................................................................................................................8

3.5

Logon...................................................................................................................................9

4

Installation.....................................................................................................................................10

4.1

Installation Process ...........................................................................................................10

4.2

Verify Installation ...............................................................................................................14

5

Known Issues................................................................................................................................14

List of Figures
Figure 1: Tokend packages: SafeSign.tokend ..............................................................................................4

Figure 2: Keychain Access: Hardware token inserted...................................................................................6

Figure 3: Enter the Keychain password: SafeSign IC Token keychain.........................................................6

Figure 4: Access Control settings..................................................................................................................7

Figure 5: Enter the keychain password: Safari..............................................................................................7

Figure 6: Enter the keychain password: Mail ................................................................................................8

Figure 7: Enter the keychain password: VPN (pppd) ....................................................................................8

Figure 8: TokenLounge .................................................................................................................................9

Figure 9: TokenLounge: User linked to an identity........................................................................................9

Figure 10: Install TokenLounge: Welcome to the TokenLounge Installer...................................................10

Figure 11: Install TokenLounge: Software License Agreement ..................................................................11

Figure 12: Software License Agreement: Agree to the terms .....................................................................11

Figure 13: Install TokenLounge: Select a Destination.................................................................................12

Figure 14: Install TokenLounge: Standard Install........................................................................................12

Figure 15: Install: Authenticate ....................................................................................................................13

Figure 16: Install TokenLounge: Installation completed successfully .........................................................13

Figure 17: Applications: TokenLounge........................................................................................................14

Page 2 of 16

March 23, 2009