+ All Categories
Home > Documents > Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1...

Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1...

Date post: 22-Jun-2020
Category:
Upload: others
View: 0 times
Download: 0 times
Share this document with a friend
160
Programmes & SI (PSI) TOUR MARCHAND 41 RUE BERTHELOT - 92411 COURBEVOIE CEDEX TEL : 01.78.66.50.00 - FAX : 01.78.66.50.64 www.rte-france.com/en/ 05-09-00-LONG Access to RTE’s Information System by software certificates under Microsoft Windows Seven PKI User guide Version 3, June 17 th 2016
Transcript
Page 1: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Programmes & SI (PSI)

TOUR MARCHAND 41 RUE BERTHELOT - 92411 COURBEVOIE CEDEX TEL : 01.78.66.50.00 - FAX : 01.78.66.50.64

www.rte-france.com/en/

05-09-00-LONG

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI User guide

Version 3, June 17th 2016

Page 2: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 2/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

SUMMARY

A. Foreword 6

1. Introduction 7

1.1 Purpose of the document 7

1.2 Context 7

1.3 Warning regarding security practices 7

1.4 The actors 8

The client 8

Registration Authority (RA) 8

Certification Authority (CA) 8

B. Certificates management procedures 9

2. Certificates management process 10

2.1 Foreword 10

2.2 Software certificate request 10

Preliminary steps 10

General diagram 11

2.3 Certificates renewal 11

2.4 Revocation of certificates 12

Case of revocation 12

Revocation request 12

C. Workstation configuration 13

3. Installation and configuration of the workstation 14

3.1 Network configuration 14

General configuration 14

Specificity of the VPN access 14

3.2 Software configuration 16

D. Web access to the RTE Information System 17

4. Microsoft Internet Explorer 18

4.1 Preliminary configuration 18

Configuration of the security settings 18

Adding trusted sites 19

4.2 Installing RTE’s CA root certificate 22

Download and install 22

Visualization and verification of RTE’s CA root certificate 26

4.3 Installing your personal certificate 29

Page 3: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 3/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

Authentication on the retrieval interface 29

Downloading of your certificate 31

Installation of your personal certificate 32

Visualization and verification of your software certificate 38

4.4 Using your certificate 41

Authentication and encryption 41

Example of access to an RTE web application 41

4.5 Additional operations 43

Export of your personal certificate 43

Deleting your personal certificate 48

4.6 Connecting to the SSL VPN 51

Foreword 51

Prerequisite 51

First connection 54

Using the SSL VPN 58

5. Mozilla Firefox 61

5.1 Preliminary configuration 61

5.2 Installing RTE’s CA root certificate 61

Download and install 61

Visualization and verification of RTE’s CA root certificate 65

5.3 Installing your personal certificate 68

Authentication on the retrieval interface 68

Downloading of your certificate 70

Installation of your personal certificate 72

Visualization and verification of your software certificate 74

5.4 Using your certificate 77

Authentication and encryption 77

Example of access to an RTE web application 78

5.5 Additional operations 79

Defining the master password for personal security 79

Export of your personal certificate 82

Deleting your personal certificate 85

5.6 Connecting to the SSL VPN 87

Foreword 87

Prerequisite 88

First connection 91

Using the SSL VPN 95

E. Email exchanges with RTE’s Information System 98

6. Using your certificate to exchange emails 99

6.1 Certificate usage principle 99

6.2 Decryption and signature verification of a received message 99

Page 4: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 4/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

6.3 Encryption and signing of a sent message 99

6.4 Steps to configure your email client 100

7. Microsoft Outlook 2013 101

7.1 Installing RTE’s CA root certificate 101

7.2 Installing your personal certificate 101

7.3 Email account configuration 101

7.4 Installing RTE’s application certificate 104

7.5 Using the certificate: sending a signed-encrypted email 107

8. Mozilla Thunderbird 108

8.1 Installing RTE’s CA root certificate 108

Downloading RTE’s CA root certificates 108

Installing RTE’s current CA certificate 109

Visualization of RTE’s CA root certificate 112

8.2 Installing your personal certificate 114

8.3 Email account configuration 119

8.4 Installing RTE’s application certificate 121

8.5 Using the certificate: sending a signed-encrypted email 124

9. Lotus Notes 8.5 125

9.1 Installing RTE’s CA root certificate 125

9.2 Installing your personal certificate 125

Creation of a PKCS#12 file readable by Notes 125

Installing the PKCS#12 file in Notes 126

Visualization of the certificate 133

9.3 Email account configuration 134

9.4 Installing RTE’s application certificate 135

9.5 Using the certificate: sending a signed-encrypted email 137

10. Lotus Notes 9 138

10.1 Installing RTE’s CA root certificate 138

10.2 Installing your personal certificate 138

Creation of a PKCS#12 file readable by Notes 138

Installing the PKCS#12 file in Notes 139

Visualization of the certificate 145

10.3 Email account configuration 146

10.4 Installing RTE’s application certificate 147

10.5 Using the certificate: sending a signed-encrypted email 149

F. Appendixes 150

11. Secure environment (PKI) 151

11.1 Concepts and objects managed by a PKI 151

What is a secure process? 151

The importance of dual-keys 152

Certificates 154

Page 5: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 5/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

11.2 Documentation 156

12. Glossary 157

13. Incidents management and support 159

13.1 Support 159

13.2 Frequently Asked Questions (FAQ) 159

13.3 Error codes returned by email 160

Page 6: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 6/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

A. FOREWORD

Page 7: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 7/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

1. Introduction

1.1 Purpose of the document

This document is intended for the end user who wants to access RTE’s Information System by using software certificates under Microsoft Windows Seven.

This document allows the holder to:

Understand the context and principles of a secure environment (authentication, confidentiality, integrity and non-repudiation) and the general operation of a Public Key management Infrastructure (PKI).

Learn to install and use his software certificates in the following environments:

o Microsoft Windows Seven.

o Browsers: Internet Explorer and Mozilla Firefox for secure accesses via the HTTPS protocol.

o Email Clients: Microsoft Outlook, IBM Lotus Notes, and Mozilla Thunderbird for secure exchanges in S/MIME format (a standard for cryptography and digital signatures concerning emails encapsulated in MIME format).

NOTE

Throughout this document, the word "you" is the user of the certificate.

1.2 Context

Under the law of February 10, 2000 (2000-108) and the implementing decree 2001-630 of 16 July 2001, the operator of the public transport network has an obligation to preserve the confidentiality of economic, commercial, industrial, financial or technical information of which the disclosure would be likely to undermine the rules of free and fair competition and non-discrimination required by law.

1.3 Warning regarding security practices

Each software certificate holder has its own private key, all (certificate and associated private key) is generated by RTE and made available for download by the wearer as a password-protected file (PKCS # 12 file , extension "p12"). Then, each software certificate holder shall take all necessary precautions to prevent:

the violation of his private key,

the loss of his private key,

the divulgation of his private key,

the alteration of his certificate,

the misuse of his certificate.

Each software private key and its associated certificate have to be stored on hard disk and protected by a password known only by the certificate holder.

Page 8: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 8/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

The Certification Authority (CA) "RTE Certification Authority" takes no responsibility for disputes related to misuse of private keys.

1.4 The actors

The life cycle management of a certificate is based on three entities:

the client (i.e. your company),

the Registration Authority (RA),

the Certification Authority (CA).

NOTE

To understand, one can draw a parallel with the allocation of official credentials: the applicant citizen of a credential is the Client; the town is the Registration Authority and the prefecture is the Certification Authority.

The client

The client issues certificates requests for holders. It may also issue requests for revocation of the certificates (see Section B: certificate management procedures).

Registration Authority (RA)

The Registration Authority (RTE’s manager of customer relations and the Operator) collects the certificates requests, affixes a date of validity for certificates and verifies the identity of their holders.

Certification Authority (CA)

The Certification Authority (RTE) is responsible and liable for certificates signed in its name and of the PKI’s operation. It sets policy for the management and use of certificates.

RTE certification authority is called:

CN = RTE Certification Authority, O = RESEAU DE TRANSPORT D'ELECTRICITE

Page 9: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Programmes & SI (PSI)

TOUR MARCHAND 41 RUE BERTHELOT - 92411 COURBEVOIE CEDEX TEL : 01.78.66.50.00 - FAX : 01.78.66.50.64

www.rte-france.com/en/

05-09-00-LONG

B. CERTIFICATES MANAGEMENT PROCEDURES

Page 10: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 10/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

2. Certificates management process

2.1 Foreword

The main processes used to manage all the digital certificates issued to holders are:

obtaining a certificate (obtaining one or more certificates),

renewal of a certificate (replacement by a new certificate for a new validity period and a new key pair)

revocation of a certificate (end of certificate validity).

2.2 Software certificate request

Preliminary steps

Beforehand, the following steps must be performed,

The company representative issues an access request :

The company representative must have completed and signed the request forms “access to RTE IS services and applications" sent by his Customer Relations Manager, and then sent it back to him.

In these forms, the company representative specifies in particular:

o a “Contact email” who will receive all information necessary to retrieve the certificate (see §Erreur ! Source du renvoi introuvable.),

o a “Certificate email”,

o a “Chosen password”, necessary to the retrieval of the certificate by the holder

We have registered your request :

Following receipt of the forms we have created your account(s) to access the applications.

Page 11: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 11/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

General diagram

After the certificate request has been saved and validated by us (within 5 working days), a notification email is sent to the address "Contact Email" entered in the access request form (see § 2.2.1). This mall is entitled "Access to RTE’s IS services" and contains:

a summary of the certificate of removal procedure,

the "Certificate email" and "Retrieval Code" requested by the website to retrieve your certificate,

the “Password" protecting the PKCS # 12 file (a ".p12" extension) that you downloaded when you retrieved your certificate. Please remember that this password is different from the password to retrieve the certificate.

In case of loss or non-receipt of this message, contact the RTE Hotline.

Exchange scenarios

The holder has to connect from his workstation on the certificate retrieval website and download his private key and the associated certificate to his workstation in the form of the PKCS#12 file (extension "p12").

2.3 Certificates renewal

The lifespan of the certificates is limited to 3 years, to ensure a high level of security.

Forty days before the expiration date of a certificate, an electronic message is sent to the contact email to inform the holder of the forthcoming expiry of his software certificate.

In case, changes must be made concerning the holder’s information, then the company representative contacts RTE’s responsible for customer relations to inform him of the changes.

Otherwise, an email is sent to the contact email with the information necessary for the retrieval of his new certificate.

Page 12: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 12/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

2.4 Revocation of certificates

Case of revocation

The company representative must issue a revocation request when any of the following occurs:

Change of the holder,

Loss, theft, compromise or suspected compromise (possible, probable or certain) of his private key or associated certificate,

Death or cessation of business of the certificate holder,

Loss of the activation data, defective or lost support.

Revocation request

To revoke a certificate, the company representative should call the RTE Hotline.

When the certificate is revoked, an email is sent to the contact email to notify the holder of the revocation of his certificate.

Page 13: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 13/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

C. WORKSTATION CONFIGURATION

Page 14: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 14/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

3. Installation and configuration of the workstation

All operations of this chapter are to be performed only once by a computer specialist with Administrator privileges on your workstation, upon receipt of your "PKI Access Kit".

Also note that only a few chapters of this manual concern you: the chapters corresponding to the software you use.

All operations are done under the Windows Session of the certificate holder.

3.1 Network configuration

General configuration

The web browser access uses - in a way that is transparent to the user - a software certificate authentication system for access to the RTE portal and encryption of data exchanged via the Internet (HTTPS protocol).

Mail exchanges between RTE and the user are routed over the Internet (SMTP protocol, S/MIME format).

Specificity of the VPN access

The VPN allows from your workstation to establish a secure connection (based on the authentication to a dedicated site) to RTE’s IS via the Internet.

Access to the SSL VPN requires that your workstation can resolve the address secure.iservices.rte-france.com.

To see if this is the case, open your Start menu, type “run” in the search bar and click the icon "Run."

IMPORTANT NOTE

Messaging and antivirus gateways, firewalls and content analyzers should be configured not to alter or reject messages that are encrypted and signed S/MIME (application / x-pkcs7-mime, .p7s, .p7m) and not to prohibit the flow of HTTPS data (port 443).

The network administrator may be requested to perform these operations.

Page 15: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 15/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

In the window that appears, enter the command:

cmd /k ping secure.iservices.rte-france.com

Click the OK button.

A window appears containing the information:

If the first line begins with "Sending a query 'ping' on secure.iservices.rte-france.com" the address secure.iservices.rte-france.com is resolved. Your workstation is configured properly.

If the first line begins with "Ping request could not find the host secure.iservices.rte-france.com." the address secure.iservices.rte-france.com is not resolved. Please contact your IT support so that they make the necessary changes.

Page 16: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 16/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

In addition to this test, you need to install on your workstation the module JIS (Juniper Installation Service) available on the RTE customer site. Refer to the section concerning the browser you are using for more details:

§ 4.6.2 if you are using Internet Explorer.

§ 5.6.2 if you are using Mozilla Firefox.

3.2 Software configuration

The software configuration required for your workstation is as follows:

Operating Systems:

Microsoft Windows Seven 32 bits without SP or with SP1

Microsoft Windows Seven 64 bits without SP or with SP1

Web browser either:

Microsoft Internet Explorer 11

Mozilla Firefox > 45 ESR

Email client either:

Microsoft Outlook 2013

Mozilla Thunderbird > 45 ESR

IBM Lotus Notes 8.5 or 9

NOTE

In general, consulting messages on a webmail like interface does not allow to sign your messages.

Page 17: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 17/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

D. WEB ACCESS TO THE RTE INFORMATION SYSTEM

Please refer directly to the chapter associated with the browser you are using for your default Web exchanges with RTE:

Chapter 4 if you are using Microsoft Internet Explorer as web browser

Chapter 5 if you are using Mozilla Firefox as web browser

Page 18: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 18/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

4. Microsoft Internet Explorer

4.1 Preliminary configuration

Configuration of the security settings

This section is about the configuration of the workstation to support the SSL standard, allowing access to sites with an encrypted connection (HTTPS protocol).

In the browser, select the menu "Tools> Internet Options":

Page 19: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 19/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

Select the tab “Advanced”:

In the section “Security”, make sure that the boxes TLS 1.0, TLS 1.1 and TLS 1.2 are ticked, as shown above.

Adding trusted sites

In order to log on to the web sites with your software certificate, it is imperative to add these sites to the list of trusted sites.

The Trusted Sites zone allows the declaration of sites’ names you consider safe.

In this section, you must be logged into the workstation with the Windows account that will use the software certificate.

To do this: open Internet Explorer and click the menu "Tools> Internet Options".

Page 20: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 20/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

In the window that appears, click the "Security" tab. select the "Trusted Sites" icon and click the "Sites" button.

Page 21: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 21/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

The following window appears:

In the field “Add this website to the zone”, enter the URL corresponding to the PKI:

https://kregistration-user.certificat2.com

Update this URL when the PKI will be replaced by a new one.

Then click “Add”.

The site then appears in the list “Websites” as shown below.

Proceed in the same way to add the following websites:

https://portail.iservices.rte-france.com: this is the internet portal

https://secure.iservices.rte-france.com: this is the SSL VPN connection portal

Page 22: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 22/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

The 3 websites shall now appear in the list “Websites”.

Click “Close”, then “OK”.

4.2 Installing RTE’s CA root certificate

Download and install

RTE’s CA root certificate must now be installed in your browser so that RTE is recognized as a trusted Certificate Authority

To do so, please go to the following address:

IMPORTANT NOTE

It is imperative to respect the case (upper / lower case) of the site’s address.

https://kregistration-user.certificat2.com/kreg-resources/CSS/RTE/RTE/Certification_Autority_RTE_2048.cer

The download window appears:

Click the "Save" button and choose a location to save the file "Certification_Autority_RTE_2048.cer" containing the root certificate.

Once the download is completed, the following window appears:

Click "Open folder" to go to the directory where you saved the file.

Page 23: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 23/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

Right-click the "Certification_Autority_RTE_2048.cer" file you just downloaded and choose "Install Certificate".

The installation wizard of the certificate is displayed:

Click “Next”. Select "Place all certificates in the following store" and click "Browse".

Page 24: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 24/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

In the window that appears, select "Trusted Root Certification Authorities" and click "OK".

Once you have chosen the certificate store, you get the following window:

Page 25: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 25/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

Click « Next ».

Click "Finish", the next window will display the imported root certificates.

Page 26: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 26/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

Click “OK”.

Visualization and verification of RTE’s CA root certificate

The root certificate that you just imported, is stored in the Trusted Root Certification Authorities store of Internet Explorer.

To view them, click the menu "Tools > Internet Options".

A window appears. Go to the "Content" tab and click the "Certificates" button.

Page 27: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 27/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

Page 28: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 28/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

In the window that appears, go to the tab "Trusted Root Certification Authorities".

Select the certificate "RTE Certification Authority".

Click the button "View" then click the "Details" tab.

Page 29: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 29/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

To ensure the authenticity of this certificate, carefully check that the thumbprint "SHA1" or "MD5" related to the certificate "RTE Certification Authority" is identical to those presented below.

Digital hashes of the certificate «RTE Certification Authority»

SHA1 39:83:D6:10:A2:C4:D5:60:45:A0:C1:D0:E3:FA:E1:42:45:8A:37:12

MD5 77:4C:12:7D:FD:1D:36:9E:8A:21:85:73:7C:2D:44:77

If this is not the case: delete the certificate and call the Hotline.

4.3 Installing your personal certificate

Authentication on the retrieval interface

The software certificate request must have been completed in accordance with the procedure of chapter Erreur ! Source du renvoi introuvable..

To proceed to the retrieval you need the following information (see §Erreur ! Source du renvoi introuvable.):

The chosen password you or your administrator have chosen and supplied to RTE in the form to request access to RTE’s IS (see §Erreur ! Source du renvoi introuvable.).

Certificate email, Retrieval code and Password for the PKCS#12 file included in the email “Access to RTE’s IS services”.

For your convenience you can copy and paste different values being careful not to copy any space at the beginning or end.

To create your certificate and the associated private key, log on the certificate retrieval website:

IMPORTANT NOTE

It is imperative to respect the case (upper / lower case) of the site’s address.

https://kregistration-user.certificat2.com/RTE/RTE/Logiciel3:I

Page 30: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 30/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

Click the button “Retrieval of your personal certificate”.

Fill the field «Certificate email» with the value indicated in the email “Access to RTE’s IS services”.

Click “Send”.

Page 31: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 31/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

Fill the fields:

“Retrieval code” as indicated in the email “Access to RTE’s IS services”.

“Chosen password” which is the password you or your company representative chose and provided to RTE in the form to request access to RTE’s IS (see §2.2.1).

Finally click “Send”.

Downloading of your certificate

The following page appears.

Click “Download”.

In the window that appears, click “Save”.

Choose a directory to save your certificate, then click "Save."

A window shows the progress of the download. Once the download is completed, click "Open Folder".

Page 32: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 32/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

The folder containing your personal certificate appears.

Installation of your personal certificate

Go to the download folder of the file.

Double-Click the "name_certificate.p12" file containing your certificate. If the double-click does not launch the Certificate Installation wizard, right-click the "name_certificate.p12" file and choose "Install PFX".

IMPORTANT NOTE

Once downloaded, the PKCS#12 file (extension ".P12") containing your certificate and its associated private key must be stored on a removable media (USB stick or an external hard drive), that you have to put into a safe in order to protect access to it.

Also keep the mail "Access to RTE's IS services" that contains the password.

Page 33: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 33/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

Click “Next”.

The name of the file containing your certificate is automatically filled, click “Next”.

Page 34: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 34/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

The window below appears:

In the field “Password”, enter the “Password” present in the email “Access to RTE’s IS services”.

The case “Enable strong private key protection. […]” is optional. Tick it if you wish to define a password that will be asked before every use of your private key in Internet Explorer.

The case “Mark this key as exportable. […]” is optional. Tick it if you wish to be able to export you private key later (see chapter 4.5.1 to export).

Tick the case “Include all extended properties”.

Click “Next”.

Page 35: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 35/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

Select "Automatically select the certificate store based on the type of certificate" and click

"Next".

Finally, click “Finish”.

Page 36: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 36/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

If you previously ticked the case “Enable strong private key protection”, then the following window appears:

Click the button “Set security level…”.

Select the case “High” then click “Next”.

Page 37: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 37/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

Enter a name for the private key to protect and a password then click the "Finish" button.

Warning: this password is required upon each use of the certificate.

Click “OK”.

Finally, the following window appears:

Click “OK”.

Your certificate, your private key and RTE’s CA root certificate have been successfully imported in Internet Explorer.

Page 38: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 38/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

Visualization and verification of your software certificate

Regardless of the browser used, the content of the downloaded certificate is obviously the same, only the presentation of information on the screen differs. In the case of downloading with Internet Explorer, open the certificate store via the menu "Tools> Internet Options", "Content" tab, button "Certificates ..."

Select your certificate then click “View”.

Page 39: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 39/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

It is valid for 3 years from the date of withdrawal.

Page 40: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 40/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

The "Certification Path" tab allows checking the validity of your certificate. The "Certificate status" and the complete visualization of the certification path (2 levels) indicate that your certificate has been correctly installed. As well as the root certificate, which confirms that everything has been configured correctly.

The tab "Details" allows you to view the full name of the holder and the email address to which are attached the certificate.

Page 41: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 41/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

4.4 Using your certificate

Authentication and encryption

Steps to follow

run Internet Explorer,

enter the URL to RTE’s application or to “RTE’s customer service portal”: https://portail.iservices.rte-france.com,

during the authentication, the browser will ask you to select the certificate to use for authentication then (if it has been defined) the certificate store protection password,

if multiple certificates are presented, you must choose the one supplied for the application you wish to access (use the button “Display certificate” to visualize its content).

Once authentication is completed, all data you send or receive will be encrypted.

Example of access to an RTE web application

Enter the URL of the application (starting with “https”) in the Internet Explorer address bar then press Return.

Then, Internet Explorer asks you to select a certificate enabling you to authenticate to the requested site.

Page 42: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 42/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

The line “click here to view certificate properties…” lets you view the content of the selected certificate.

Click the “OK” button to access the application.

The window below asks for the password that protects the private key associated with your certificate if it has been set.

The home page is then securely displayed (appearance of the closed padlock to the right of the URL entry field):

Page 43: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 43/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

4.5 Additional operations

Export of your personal certificate

This section explains how to save the certificate with its private key and the root certificate. The procedure is to generate a file in PKCS#12 format (".pfx" extension), protected by a password.

You can only export your certificate and private key if you checked "Mark this key as exportable" when Installing your personal certificate (see §4.3.3).

In Internet Explorer, click the menu "Tools> Internet Options..."

Then, click the "Content" tab and then the "Certificates" button.

Page 44: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 44/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

Page 45: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 45/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

Another window appears. Select your certificate, then click "Export...".

Click “Next”.

Page 46: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 46/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

Select "Yes, export the private key" and then click "Next".

Select the check box "Include all certificates in the certification path if possible" and then click "Next".

Page 47: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 47/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

Enter a password of your choice to protect the PKCS#12 file, and then click "Next".

Select the location of the PKCS#12 file, and then click "Next".

Page 48: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 48/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

Finally, click the "Finish" button.

Click "OK".

You have exported to a file in PKCS#12 format, protected by a password, your certificate's

private key and the root of the CA. These elements have therefore been exported, but

remain present in the Internet Explorer’s store.

Deleting your personal certificate

This section details the procedure to remove a certificate and its private key from Internet Explorer’s Certificate store.

IMPORTANT NOTE

Before deleting your personal certificate, make sure to have a copy. If this is not the case, refer to §4.5.1 to export your certificate and private key as a PKCS#12 file.

Page 49: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 49/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

In Internet Explorer, go to "Tools> Internet Options".

A window appears. Click the “Content” tab, then the “Certificates” button:

Page 50: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 50/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

Select the certificate to delete and click “Remove”.

Click “Yes”.

Page 51: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 51/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

The certificate is removed from the certificates list.

4.6 Connecting to the SSL VPN

Foreword

The connection via SSL VPN is a service for establishing a secure communications channel to RTE’s FrontOffice via the Internet. This channel is established after authenticating with your certificate from a dedicated website (see section 4.4). Once the channel is established all communications with the requested RTE service will be encrypted.

The use of SSL VPN requires the installation of a dedicated tool, installed during the first login to the site. The application is called Windows Secure Application Manager (WSAM).

SSL VPN enables secure access to your mailboxes hosted on RTE’s FrontOffice.

Prerequisite

The website secure.iservices.rte-france.com must be declared as a trusted site (see §4.1.2).

IMPORTANT NOTE

Before your first connection, you must verify that your workstation can resolve the address secure.iservices.rte-france.com (see section 3.1).

Page 52: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 52/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

JIS (Juniper Installation Service) is a Windows service made available on the RTE customer site. This service allows, once installed, to update future WSAM versions without requiring the intervention of a person with administrator privileges on the machine.

To do so, download the executable under the link:

http://clients.rte-france.com/lang/fr/visiteurs/accueil/portail.jsp

And decompress the compressed file:

Once the file is executed, the following window appears, asking you the authorization to start the service. Click “Run”.

Page 53: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 53/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

Once the file is executed , the following window appears. Click « Yes ».

This will enable the service to start installing.

It will be automatically activated at every operating system launch.

Click “Close” to close the window.

Page 54: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 54/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

First connection

This paragraph applies only to your first login to the SSL VPN with Internet Explorer.

IMPORTANT

The first connection must be made by a computer specialist with Administrator rights on your workstation in order to install the WSAM application.

Before continuing, you need to disable ActiveX controls. To do so, press the "Alt" key on your keyboard. A menu bar at the top of the window. Then click the Tools button, and make sure "ActiveX Filtering" is off. "

Launch your browser and go to the following website:

https://secure.iservices.rte-france.com/

The following window appears:

Select your certificate then click “OK”.

Page 55: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 55/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

If necessary, this window will ask for the password that protects the private key associated to your certificate.

The browser displays a link to install WSAM:

Page 56: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 56/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

If no manual intervention is performed, the following installation pop-up appears:

If necessary, the following window appears:

Click “Yes”.

The Juniper client then installs and the installation of the WSAM application starts:

Page 57: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 57/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

Wait during the installation.

If the following window appears, click “Yes”:

Once the installation is completed, the following page appears:

If your Internet access requires authentication to a proxy, a window appears asking your login and password. Enter them and confirm.

Then, the icon appears in your taskbar.

Page 58: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 58/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

Click the "Sign out" button (top right of the page) to end the session:

Using the SSL VPN

4.6.4.1 Establishing the connection

Launch your browser and go to the following website:

https://secure.iservices.rte-france.com/

The following window appears:

Select your certificate then click “OK”.

Page 59: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 59/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

If necessary, a window will ask you the password that protects the private key associated with your certificate.

If necessary, the window below appears. Click “Yes”.

The WSAM application launches automatically and the following page appears:

If your Internet access requires authentication to a proxy, a window appears asking your login and password. Enter them and confirm.

Then, the icon appears in your taskbar.

Notes:

The certificate is only used to establish the connection to the SSL VPN.

To close the SSL VPN session, click the “Sign out” button (top right of the page).

Page 60: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 60/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

4.6.4.2 Use case to access hosted mailboxes

The SSL VPN can be used to access mailboxes hosted on the FrontOffice with a standard email client.

Access to hosted mailboxes requires the SSL VPN connection to be established (see §4.6.4.1).

The Email account configuration in your mail client is then to be made with the following parameters:

Mail server type : POP Server

POP server address : pop.services.rte-france.com

SMTP server address : smtp.services.rte-france.com

When your access to RTE’s FrontOffice is provided, you will receive your login name, your password and your email address.

NOTE

Because the messages are transferred through a secure channel, sending and receiving messages do not require the use of a certificate to encrypt messages.

Page 61: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 61/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

5. Mozilla Firefox

5.1 Preliminary configuration

The SSL standard, allowing access to sites with an encrypted connection (protocol HTTPS) is disabled by default in recent versions of Firefox. The supported versions of Firefox are specified in §Erreur ! Source du renvoi introuvable..

The standards supported by default are: TLS 1.0 to TLS 1.2.

In case of problems, thank you to notify the issue to the support.

5.2 Installing RTE’s CA root certificate

Download and install

RTE’s CA root certificate must now be installed in your browser so that RTE is recognized as a trusted Certificate Authority

To do so, please go to the following address:

https://kregistration-user.certificat2.com/kreg-resources/CSS/RTE/RTE/Certification_Autority_RTE_2048.cer

Select “Save file” then click “OK”. A location to save the file “Certification_Autority_RTE_2048.cer” will eventually be requested.

Page 62: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 62/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

Once the file is downloaded, click the menu “Tools” to right corner of the window then click the icon “Options”:

Page 63: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 63/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

A window appears. Choose the “Advanced” tab then the subcategory “Certificates”.

Click the «View certificates» button.

Select the “Authorities” tab and click “Import…”.

Page 64: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 64/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

Select the previously saved file.

A dialog box is displayed, in which you must select the three check boxes "Trust this CA to identify [...]" to trust RTE's CA.

Page 65: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 65/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

Visualization and verification of RTE’s CA root certificate

Click the "View" button to verify that the certificate that you are going to trust is the RTE root certificate:

To ensure that you have downloaded the real RTE CA's root certificate, check carefully that the "SHA1" or "MD5" hashes displayed is identical to the one shown below.

Hashes of RTE’s CA root certificate are recalled here:

SHA1 39:83:D6:10:A2:C4:D5:60:45:A0:C1:D0:E3:FA:E1:42:45:8A:37:12

MD5 77:4C:12:7D:FD:1D:36:9E:8A:21:85:73:7C:2D:44:77

If this is not the case: click “Close” to go back to the precedent window and click “Cancel” then call RTE’s Hotline.

Page 66: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 66/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

If, after verification, the hash of the certificate that you imported matches the "SHA1" or "MD5" hash above, it is possible to consult the details of the certificate by clicking on the "Details" tab:

By clicking on the "Close" button, you return to the initial window: "Downloading certificate" (see above). In this window, click the "OK" button: the RTE CA's root certificate is then installed in Mozilla Firefox.

To view the certificate later in Mozilla Firefox, go to the "Tools" menu on the top right of the window then click the "Options" icon:

Page 67: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 67/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

A window appears. Select the “Advanced” tab then the subcategory “Certificates”.

Click the “View certificates” button.

Page 68: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 68/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

In the “Authorities” tab you can verify that the root certificate “RTE Certification Authority” is well saved on your PC (“Software Security Device”) and view it by clicking on “View”.

5.3 Installing your personal certificate

Authentication on the retrieval interface

The software certificate request must have been completed in accordance with the procedure of chapter Erreur ! Source du renvoi introuvable..

To proceed to the retrieval you need the following information (see §Erreur ! Source du renvoi introuvable.):

The chosen password you or your administrator have chosen and supplied to RTE in the form to request access to RTE’s IS (see §Erreur ! Source du renvoi introuvable.).

Certificate email, Retrieval code and Password for the PKCS#12 file included in the email “Access to RTE’s IS services”.

For your convenience you can copy and paste different values being careful not to copy any space at the beginning or end.

To create your certificate and the associated private key, log on the certificate retrieval website:

IMPORTANT NOTE

It is imperative to respect the case (upper / lower case) of the site’s address.

https://kregistration-user.certificat2.com/RTE/RTE/Logiciel3:I

Page 69: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 69/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

Click the button “Retrieval of your personal certificate”.

Fill the field «Certificate email» with the value indicated in the email “Access to RTE’s IS services”.

Click “Submit”.

Page 70: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 70/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

Fill the fields:

“Retrieval code” as indicated in the email “Access to RTE’s IS services”.

“Chosen password” which is the password you or your company representative chose and provided to RTE in the form to request access to RTE’s IS (see §2.2.1).

Finally, click “Submit”.

Downloading of your certificate

The following page appears.

Click “Download”.

In the window that appears, click “Save” then “OK”.

Page 71: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 71/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

Choose a directory to save your certificate, then click "Save".

IMPORTANT NOTE

Once downloaded, the PKCS#12 file (extension ".P12") containing your certificate and its associated private key must be stored on a removable media (USB stick, an external hard drive), that you have to put into a safe in order to protect access to it.

Also keep the mall "Access to RTE's IS services" that contains the password.

Page 72: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 72/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

Installation of your personal certificate

In Firefox, go to the menu "Tools" on the top right of the window and click the "Options" icon:

A window appears. Choose the tab “Advanced” then the subcategory “Certificates”.

Click “View Certificates”.

Page 73: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 73/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

Click “Import…”.

Go to the folder you saved your certificate in, select your certificate “name_certificate.p12” and click “Open”.

Page 74: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 74/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

If necessary, the window below will ask you the access password to the Mozilla Firefox certificate store:

Enter it and click “OK”. The window below appears.

Enter the “Password” present in the email “Access to RTE’s IS services” then click “OK”.

Your certificate and its associated private key have been successfully imported in Mozilla Firefox’s certificate store.

Visualization and verification of your software certificate

Regardless of the browser used, the content of the downloaded certificate is obviously the same, only the presentation of information on the screen differs.

Page 75: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 75/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

In the case of Mozilla Firefox, go to the “Tools” menu (top-right corner of the window) then click the “Options” icon:

A window appears. Choose the “Advanced” tab then the “Certificates” subcategory.

Then click the “View Certificates” button.

Page 76: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 76/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

Select the tab “Your Certificates”.

The certificate is a software certificate: indeed, the "Software Security Dev…" indication appears at the right of its name. You can view it by selecting it and clicking "View…”.

The first tab «General» displays the following message “This certificate has been verified for the following uses”. It is valid for 3 years from the date of withdrawal.

Page 77: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 77/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

The second tab «Details» displays the certification hierarchy with RTE's root CA certificate. This ensures that all certificates have been installed correctly, and that all the correct conditions of your certificate are met.

5.4 Using your certificate

Authentication and encryption

Steps to follow

run Mozilla Firefox,

enter the URL to RTE’s application or to “RTE’s customer service portal”: https://portail.iservices.rte-france.com,

during the authentication, the browser will ask you to select the certificate to use for authentication then (if it has been defined) the certificate store protection password,

if multiple certificates are presented, you must choose the one supplied for the application you wish to access (use the button “Display certificate” to visualize its content).

Once authentication is completed, all data you send or receive will be encrypted.

Page 78: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 78/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

Example of access to an RTE web application

When you access the “https” homepage, you will be asked to choose your certificate.

Select your certificate from the drop down list entitled “Choose a certificate to present as identification” then click “OK”. The following window will ask you the access password to the Mozilla Firefox certificate store if it was defined

Page 79: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 79/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

The home page is then securely displayed, (appearance of the closed padlock to the left of the URL entry field):

5.5 Additional operations

Defining the master password for personal security

To protect the private key associated with your certificate it is strongly recommended to set a personal security password.

Page 80: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 80/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

To do this, click the “Tools” menu on the top right of the window and click on the “Options” icon:

A window appears. Choose the “Security” tab.

If “Use a master password” is already checked, it means you already have a personal security password, and you have nothing to do.

Page 81: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 81/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

Otherwise, check the “Use a master password” case. The following window appears:

Enter your new master password in both fields and click “OK”.

Your personal security password is now defined.

You can change your personal security password at any time by going to the menu “Tools” on the top right of the window and clicking the “Options” icon.

Page 82: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 82/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

A window appears. Choose the “Security” tab and click “Change Master Password…”.

Export of your personal certificate

This section explains how to save the certificate with its private key and the root certificate. The procedure is to generate a file in PKCS#12 format (".pfx" extension), protected by a password.

Go the “Tools” menu at the top-right corner of the window then click the “Options” icon:

Page 83: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 83/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

A window appears. Choose the “Advanced” tab then the “Certificates” subcategory.

Then click “View Certificates…”.

Select your certificate and click “Backup…”:

Choose a folder and a name for the output file in PKCS#12 format (extension «.p12»):

Page 84: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 84/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

Click “Save”.

If necessary, the following window will ask you the access password to the Mozilla Firefox certificate store:

Then the following window appears:

Enter a password of your choice to protect access to the PKCS#12 file and click “OK”.

Page 85: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 85/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

Your certificate, your private key and the CA’s root certificate are exported in the PKCS#12 generated file (extension “.p12”).

Deleting your personal certificate

This section details the procedure to remove a certificate and its private key from Mozilla Firefox’s Certificate store.

IMPORTANT NOTE

Before deleting your personal certificate, make sure to have a copy. If this is not the case, refer to §Erreur ! Source du renvoi introuvable. to export your certificate and private key as a PKCS#12 file.

Go to the “Tools” menu at the top-right corner of the window then click the ”Options” icon:

Page 86: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 86/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

A window appears. Choose the “Advanced” tab then the “Certificates” subcategory.

Then click “View Certificates...”.

Select your certificate and click “Delete…”.

Page 87: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 87/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

Validate by clicking “OK”.

The certificate is then removed from the list of certificates.

5.6 Connecting to the SSL VPN

Foreword

The connection via SSL VPN is a service for establishing a secure communications channel to RTE’s FrontOffice via the Internet. This channel is established after authenticating with your certificate from a dedicated website (see section §5.4). Once the channel is established all communications with the requested RTE service will be encrypted.

The use of SSL VPN requires the installation of a dedicated tool, installed during the first login to the site. The application is called Windows Secure Application Manager (WSAM).

SSL VPN enables secure access to your mailboxes hosted on RTE’s FrontOffice.

Page 88: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 88/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

Prerequisite

In order to connect to the SSL VPN with Firefox, Java SE Runtime Environment (JRE) 1.5.07 or higher needs to be installed on your workstation. If this is not the case, you can download the latest version on Oracle’s website:

http://java.com/fr/download/index.jsp

IMPORTANT NOTE

Before your first connection, you must verify that your workstation can resolve the address secure.iservices.rte-france.com (see section 3.1).

Page 89: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 89/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

JIS (Juniper Installation Service) is a Windows service made available on the RTE customer site. This service allows, once installed, to update future WSAM versions without requiring the intervention of a person with administrator privileges on the machine.

To do so, download the executable under the link:

http://clients.rte-france.com/lang/fr/visiteurs/accueil/portail.jsp

And decompress the compressed file:

Once the file is executed, a window appears that asks the authorization to start the service. Click “Execute”:

Page 90: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 90/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

The following window appears. Click “Yes”.

This enables the service installation to start.

This service will be automatically activated at every operating system launch.

Click “Close” to close the window.

Page 91: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 91/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

First connection

This paragraph applies only to your first login to the SSL VPN with Mozilla Firefox.

IMPORTANT

The first connection must be made by a computer specialist with Administrator rights on your workstation in order to install the WSAM application.

Launch your browser and go to the following website:

https://secure.iservices.rte-france.com/

The following window appears:

Select your certificate from the dropdown list entitled “Choose a certificate to present as identification” and click “OK”. If necessary, the following window will ask you the access password to the Mozilla Firefox certificate store.

Page 92: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 92/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

If a window asking you permission to execute a script from “Juniper Network, Inc.” appears, click “Yes”.

If the next red icon appears, click it in the address bar. Then in the dropdown menu of the message, select "Allow and remember».

If necessary, the following window appears:

Page 93: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 93/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

If the window below appears: click “Yes”.

The installation of the WSAM application starts:

If your Internet access requires authentication to a proxy, a window appears asking your login and password. Enter them and confirm.

Then the window below appears:

Then, the icon appears in your taskbar which means you are now connected to the SSL VPN.

Page 94: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 94/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

Click the "Sign out" button (top right of the page) to end the session:

Page 95: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 95/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

Using the SSL VPN

5.6.5.1 Establishing the connection

Run your browser and access the following website:

https://secure.iservices.rte-france.com/

The following window appears:

Select your certificate from the dropdown list entitled “Choose a certificate to present as identification” and click “OK”. If necessary, the following window will ask you the access password to the Mozilla Firefox certificate store.

If a window appears asking you permission to execute a script from “Juniper Network, Inc.”: click “Allow”.

If the window below appears: click “Yes”.

Page 96: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 96/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

If your Internet access requires authentication to a proxy, a window appears asking your login and password. Enter them and confirm.

Then the window below appears:

Then, the icon appears in your taskbar which means you are now connected to the SSL VPN.

Notes:

The certificate is only used to establish the connection to the SSL VPN.

To close the SSL VPN session, click on the “Sign out” button (top right of the page).

Page 97: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 97/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

5.6.5.2 Use to access hosted mailboxes

The SSL VPN can be used to access mailboxes hosted on the FrontOffice with a standard email client.

Access to hosted mailboxes requires the SSL VPN connection to be established (see §Erreur ! Source du renvoi introuvable.).

The Email account configuration in your mail client is then to be made with the following parameters:

Mail server type : POP Server

POP server address : pop.services.rte-france.com

SMTP server address : smtp.services.rte-france.com

When your access to RTE’s FrontOffice is provided, you will receive your login name, your password and your email address.

NOTE

Because the messages are transferred through a secure channel, sending and receiving messages do not require the use of a certificate to encrypt messages.

Page 98: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 98/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

E. EMAIL EXCHANGES WITH RTE’S INFORMATION SYSTEM

This section only applies if you need to exchange signed-encrypted email with RTE applications.

After reading the chapter 6 (overview), directly refer to the chapter associated with the email client that you use for your mail exchanges with RTE:

Chapter 7 if you use Microsoft Outlook 201 as email client.

Chapter 8 if you use Mozilla Thunderbird as email client.

Chapter 9 if you use Lotus Notes 8.5 as email client.

Chapter 10 if you use Lotus Notes 9 as email client.

Page 99: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 99/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

6. Using your certificate to exchange emails

6.1 Certificate usage principle

Using your personal certificate, its associated private key, RTE’s CA certificate and RTE’s application certificate, you can:

decrypt and verify the signature of emails you receive from RTE applications,

encrypt and sign emails you send to RTE applications.

6.2 Decryption and signature verification of a received message

Decryption and verification of the signature of a message are disjoint processes. When you receive an encrypted-signed message:

you decrypt the message with the private key associated to your personal certificate,

you verify the message signature with the certificate of the sender (that of the RTE application) contained in the message, and with the certificate you own of the issuing CA that you trust.

These two processes are done automatically when you open a signed-encrypted email with a properly configured email client that supports the secure email format S/MIME.

IMPORTANT NOTE

To verify the signature of a message you need to own the right certificate and trust the CA that issued the certificate of the sender.

6.3 Encryption and signing of a sent message

Encrypting and signing message are two disjoint processes. When you send an encrypted-signed message:

you sign the message with the private key associated to your personal certificate,

you encrypt the message with the recipient’s certificate (RTE’s application certificate).

The certificate of the recipient can be obtained in several ways. RTE applications transmit to you their certificate by sending a signed message: that is the way you will get their certificate.

In doing so, when you receive a signed message, use "Add sender to contacts" to save at the same time its certificate, which you can use to send encrypted messages to him.

IMPORTANT NOTE

Encrypting a message requires to possess a valid certificate corresponding to the recipient's email address.

Page 100: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 100/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

6.4 Steps to configure your email client

In order to be able to exchange signed-encrypted emails with RTE, the steps are as follows:

Install RTE’s CA certificate, so that your mail client trusts RTE’s applications certificates and is able to verify the signature of signed-encrypted emails you receive from them.

Install your personal certificate, so your mail client can decrypt the messages from RTE and sign messages to RTE.

Configure the email account you will use to exchange with RTE so that your email client always encrypts and signs messages to the RTE applications using the standard S/MIME.

Install RTE’s application certificate, so that your email client can encrypt emails you send to RTE applications.

To perform these steps, please refer directly to one of the following chapters: the one concerning the email client that you use for your mail exchanges with RTE.

Page 101: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 101/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

7. Microsoft Outlook 2013

7.1 Installing RTE’s CA root certificate

Outlook 2013 uses the same certificate store as Internet Explorer.

Install RTE’s CA root certificate in Internet Explorer by following the procedure described in chapter 4.2 if not already done.

7.2 Installing your personal certificate

Outlook 2013 uses the same certificate store as Internet Explorer.

Install your personal certificate in Internet Explorer by following the procedure described in chapter 4.3.3 if not already done.

7.3 Email account configuration

Start Outlook 2013 and click the menu “File > Options > Trust Center” then click “Trust Center Settings…”.

In the left column, click “E-mail security”, then click the “Settings…” button.

Page 102: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 102/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

Click the two ”Choose…” buttons in order to select your personal certificate for signing and encryption. A list of selectable certificates is presented to you (you can also display a certificate from the list to view its contents and make sure you choose the right one).

Page 103: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 103/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

Make sure the settings are similar to the ones above (S/MIME, check boxes, certificates, algorithms); if the field “Security Settings Name” is empty, enter a label such as “RTE Certification”. Finally click “OK”.

Check the boxes “Encrypt contents and attachments for outgoing messages” and “Add digital signature to outgoing messages”, then click “OK”.

Page 104: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 104/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

All your emails sent to RTE applications using the default account will now be encrypted and signed.

7.4 Installing RTE’s application certificate

After receiving the first encrypted and signed message from an application, you must install the certificate of the issuing application. For this, you need to add the email address of the application to your address book by clicking the sender of the email received with the right mouse button and then “Add to Outlook contacts”:

Page 105: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 105/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

Click “General”:

Click “Certificates”:

Page 106: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 106/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

Click “Save & Close” to save.

All your encrypted emails sent to this application will be encrypted automatically with the application’s certificate.

Page 107: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 107/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

7.5 Using the certificate: sending a signed-encrypted email

To encrypt and sign a message: first create a new message by clicking “New”.

To sign and encrypt your message, verify that both icons below are activated or click on them to activate.

Page 108: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 108/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

8. Mozilla Thunderbird

8.1 Installing RTE’s CA root certificate

RTE’s CA root certificate must first be installed for Thunderbird to be able to verify the signature of emails sent by RTE.

IMPORTANT NOTE

It is imperative to respect the case (upper / lower case) of the following websites’ addresses.

Downloading RTE’s CA root certificates

With your web browser go to the address below to download the file “Certification_Autority_RTE_2048.cer” containing RTE’s current CA certificate:

https://kregistration-user.certificat2.com/kreg-resources/CSS/RTE/RTE/Certification_Autority_RTE_2048.cer

With Internet Explorer:

Click the "Save" button and choose a location to save the file "Certification_Autority_RTE_2048.cer"

With Mozilla Firefox:

Select “Save file” then click “OK”. A location to save the file “Certification_Autority_RTE_2048.cer” will eventually be requested.

Page 109: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 109/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

Installing RTE’s current CA certificate

The first certificate you just downloaded must be installed in Thunderbird certificate store.

In the menu "Tools" on the top right of the window click “Options”:

A window appears. Choose the “Advanced” tab then the “Certificates” subcategory.

Click the button “View Certificates”.

Page 110: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 110/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

Select the “Authorities” tab and click “Import…”.

Select the previously saved file “Certification_Autority_RTE_2048.cer” and click “Open”.

Page 111: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 111/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

A dialog box is displayed, in which you must select the three check boxes "Trust this CA to identify [...]" to trust RTE's CA.

Click the "View" button to verify that the certificate that you are going to trust is the RTE root certificate:

To ensure that you have downloaded the real RTE CA's root certificate, check carefully that the "SHA1" or "MD5" hashes displayed is identical to the one shown below.

Page 112: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 112/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

Digital hashes of the certificate «RTE Certification Authority»

SHA1 39:83:D6:10:A2:C4:D5:60:45:A0:C1:D0:E3:FA:E1:42:45:8A:37:12

MD5 77:4C:12:7D:FD:1D:36:9E:8A:21:85:73:7C:2D:44:77

If this is not the case: click “Close” to go back to the precedent window and click “Cancel” then call RTE’s Hotline.

If this is the case, click “Close” to return to the initial window: "Downloading certificate" (see above). In this window click the "OK" button: RTE CA's root certificate is then installed.

Visualization of RTE’s CA root certificate

To view the certificate later in Mozilla Thunderbird, go to the "Tools" menu on the top right of the window then click the "Options" icon:

A window appears. Select the “Advanced” tab then the subcategory “Certificates”.

Page 113: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 113/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

Click the “View Certificates” button.

In the “Authorities” tab you can verify that the root certificate “RTE Certification Authority” is well saved on your PC (“Software Security Device”) and view it by clicking on “View”.

Page 114: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 114/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

8.2 Installing your personal certificate

To be able to import your certificate in Mozilla Thunderbird, you must have the file “name_certificate.p12” downloaded with your browser when retrieving your certificate (see §Erreur ! Source du renvoi introuvable. for Internet Explorer, §Erreur ! Source du renvoi introuvable. for Mozilla Firefox).

Start Mozilla Thunderbird, go to the menu "Tools" on the top right of the window and click the "Options" icon:

A window appears. Choose the “Advanced” tab then the “Certificates” subcategory.

Click “View Certificates”.

Page 115: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 115/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

In the “Your certificates” tab, click “Import”. In the drop-down menu “File type” select “PKCS$12 Files (*.p12;*.pfx)”:

Go to the folder you saved your certificate in, select your certificate “name_certificate.p12” and click “Open”.

Page 116: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 116/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

If necessary, the window below will ask you the access password to the Mozilla Thunderbird certificate store:

Click “OK”.

N.B.: if there is no master password, Thunderbird will ask you to define one.

Enter the password protecting the PKCS#12 file and click ”OK”.

Your certificate and its associated private key have been successfully imported in Mozilla Thunderbird’s certificate store.

Page 117: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 117/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

Verify this is the right certificate by clicking on “View…”.

Page 118: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 118/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

Page 119: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 119/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

8.3 Email account configuration

To sign and encrypt with your certificate, it must be associated with the email account corresponding to the email address specified in the Certificate subject.

For this, start Mozilla Thunderbird, press the “Alt” key on your keyboard, a menu bar appears at the top of the window. Click “Tools” then “Account Settings”.

Page 120: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 120/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

A window appears. Select the “Security” item of the email account you use to exchange with RTE:

Click “Select…” to open the following window:

Select your certificate in the drop-down list and click “OK”. The following message appears:

Page 121: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 121/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

Click “Yes” to automatically define the same certificate to decrypt received emails.

NOTE

Although for encryption, the text indicates that your certificate will be used to “encrypt and decrypt messages sent”, it will not actually be used to decrypt messages received.

All your emails sent to RTE applications using this account will now be encrypted and signed.

8.4 Installing RTE’s application certificate

After receiving the first encrypted and signed message from an application, the application certificate installs automatically. However you can add the application’s email address to your address book by right-clicking the sender of the received email and then clicking “Add to Address Book”:

The contact has been added to the address book.

Page 122: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 122/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

To verify that the application certificate is correctly installed, go to the menu “Tools” (top-right corner of the window) and click ”Options”:

A window appears. Choose the “Advanced” tab then the “Certificates” subcategory.

Then click “View Certificates”.

A window appears. Click the “People” tab.

Page 123: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 123/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

Every time an encrypted email is sent to this application, the application’s certificate will be used automatically to encrypt it.

Page 124: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 124/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

8.5 Using the certificate: sending a signed-encrypted email

To encrypt and sign a message, first create a new message by clicking “Write”.

Click the “Security” tab to verify the options: “Encrypt this message” and ”Digitally sign this message”. These options should be checked by default, if not: check them.

Page 125: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 125/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

9. Lotus Notes 8.5

9.1 Installing RTE’s CA root certificate

RTE’s root certificate will be installed by «crossed certification» when you received your first signed-encrypted email from the application (see §Erreur ! Source du renvoi introuvable.).

Note:

The « Crossed certificate » is a process which makes a user able to install the certificate of another entity while he receives message form that entity. Messages sent to that specific entity will be encrypted with that « Crossed certificate ».

9.2 Installing your personal certificate

Creation of a PKCS#12 file readable by Notes

Lotus Notes can install a certificate and its associated private key only from a PKC #12 file that contains RTE's CA. This is not the case for the file “name_certificate.p12” you downloaded when you retrieved your certificate.

To generate a file accepted by Lotus Notes, install RTE's CA and your certificates in a browser and then export your personal certificate as a PKCS#12 file. Depending on the browser you are using, perform one of the procedures below.

With Microsoft Internet Explorer :

o Install RTE’s CA root certificate, see §4.2.

o Install your personal certificate making sure to check the case “Mark this key as exportable.”, see §4.3.3.

o Export your certificate in a PKCS#12 file making sure to check the case “Include all certificates in the certification path if possible”, see §4.5.1.

With Mozilla Firefox :

o Install RTE’s CA root certificate, see §5.2.

o Install your personal certificate, see §5.3.

o Export your certificate to a PKCS#12 file, see §5.5.2 (RTE’s CA will automatically be included).

Page 126: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 126/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

Installing the PKCS#12 file in Notes

Start Lotus Notes and access to “File > Security > User Security…”:

If requested, enter your Notes password:

Page 127: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 127/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

The following window appears:

Click “Your Identity” then “Your Certificates”:

Select “Your Internet Certificates” in the drop-down list to display the Internet certificates already imported.

Page 128: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 128/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

In general, the list will be empty.

Click the “Get Certificates…” button and select “Import Internet Certificates…”:

A window appears asking you to select a PKCS#12 file (extension ”.pfx” or “.p12”) Select the file you generated at §9.2.1 containing your personal certificate, its private key and RTE’s CA root certificate:

Page 129: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 129/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

Click “Open” and in the window below choose the format: PKCS 12:

Click “Continue”. The PKCS12 file’s password is requested:

Click “OK” and the window below is displayed:

Page 130: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 130/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

Your certificate, you want to import, and the root certificate, are listed. If you click “Advanced Details…” the content of the selected certificate (yours) appears in the window:

Click “Cancel” to go back to the previous window.

Page 131: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 131/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

To see the content of the root certificate, you must select it:

And click “Advanced Details…”:

Page 132: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 132/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

Click “Close” to go back to the main screen:

Click “Accept All”.

Enter your Notes password and click “OK”.

Click “OK”, the window below appears:

Page 133: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 133/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

The certificate, now visible here, has successfully been imported. Click “OK” to end the import.

Visualization of the certificate

To view your certificate, in Lotus Notes access the menu “File > Security > User Security…”, then click the item “Your Identity” and “Your Certificates”. Select “Your Internet Certificates” in the drop-down list.

Select your personal certificate and click the “Advanced Details…” button. The certificate’s details are then presented in the window below:

Page 134: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 134/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

9.3 Email account configuration

If you have multiple certificates used to sign your sent messages, you have to set by default the one that will serve for exchanges with RTE.

In Lotus Notes, open the menu “File > Security > User Security…”, then click “Your Identity” and “Your Certificates”:

Select “Your Internet Certificates” in the drop-down list to display your Internet certificates that are already imported.

Select your certificate and click the “Advanced Details” button.

Page 135: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 135/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

If you only have one certificate, the case “Use this certificate as your default signing certificate” will be grey and checked. If not, check it, as above, and click “OK”.

9.4 Installing RTE’s application certificate

When you select, for the first time, a signed and encrypted message you received a dialog box similar to the one below appears, allowing you to give your trust to the issuer:

For this, you must click on the “Cross certify” button.

Then, when you display this signed received message, you will need to choose the “Add Sender to Contacts…” in the menu by right-clicking on the email, which will add the issuer and its certificate to your book Address.

Page 136: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 136/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

The following window appears:

Only verify that the case “Include X.509 certificates when encountered” is checked and click “OK”.

Whenever an encrypted email will be sent to this application, its installed certificate will now automatically be selected to perform the encryption.

Page 137: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 137/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

9.5 Using the certificate: sending a signed-encrypted email

When composing a message, you can sign and encrypt it if you own your signature certificate (see the import procedure for your certificate above) and that of your correspondent.

For that, when you write a new message, you must click the “Delivery Options” button.

Check the “Sign” and “Encrypt” cases as shown below:

Click “OK”.

The rest of the mailing process has no more particularity, Notes then automatically signs and encrypts your message transparently.

Page 138: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 138/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

10. Lotus Notes 9

10.1 Installing RTE’s CA root certificate

RTE’s root certificate will be installed by “crossed certification” when you received your first signed-encrypted email from the application (see §Erreur ! Source du renvoi introuvable.).

Note:

The « Crossed certificate » is a process which makes a user able to install the certificate of another entity while he receives message form that entity. Messages sent to that specific entity will be encrypted with that « Crossed certificate ».

10.2 Installing your personal certificate

Creation of a PKCS#12 file readable by Notes

Lotus Notes can install a certificate and its associated private key only from a PKC #12 file that contains RTE's CA. This is not the case for the file “name_certificate.p12” you downloaded when you retrieved your certificate.

To generate a file accepted by Lotus Notes, install RTE's CA and your certificates in a browser and then export your personal certificate as a PKCS#12 file. Depending on the browser you are using, perform one of the procedures below.

With Microsoft Internet Explorer :

o Install RTE’s CA root certificate, see §4.2.

o Install your personal certificate making sure to check the case “Mark this key as exportable.” see §4.3.3.

o Export your certificate in a PKCS#12 file making sure to check the case «Include all certificates in the certification path if possible» see §4.5.1.

With Mozilla Firefox :

o Install RTE’s CA root certificate, see §5.2.

o Install your personal certificate, see §5.3.

o Export your certificate to a PKCS#12 file, see §5.5.2 (RTE’s CA will automatically be included).

Page 139: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 139/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

Installing the PKCS#12 file in Notes

Start Lotus Notes and access to “File > Security > User Security…”:

If requested, enter your Notes password.

Page 140: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 140/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

The following window appears:

Click ”Your Identity” then “Your Certificates”:

Select “Your Internet Certificates” in the drop-down list to display the Internet certificates already imported.

In general, the list will be empty.

Page 141: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 141/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

Click the “Get Certificates…” button and select “Import Internet Certificates…”:

A window appears asking you to select a PKCS#12 file (extension “.pfx” or “.p12”). Select the file you generated at §9.2.1 containing your personal certificate, its private key and RTE’s CA root certificate:

Page 142: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 142/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

Click “Open” and in the window below chose the format PKCS 12:

Click “Continue”. The PKCS12 file’s password is requested:

Click “OK” and the window below is displayed:

Your certificate, you want to import, and the root certificate, are listed. If you click “Advanced Details…” the content of the selected certificate (yours) appears in the window:

Page 143: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 143/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

Click “Close” to go back to the previous window.

To see the content of the root certificate, you must select it:

And click “Advanced Details…”:

Page 144: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 144/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

Click “Close” to go back to the main screen:

Click “Accept All”.

If necessary, enter your Notes password and click “OK”.

Click “OK”, the window below appears:

Page 145: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 145/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

The certificate, now visible here, has successfully been imported. Click “OK” to end the import.

Visualization of the certificate

To view your certificate, in Lotus Notes access the menu ”File > Security > User Security…”, then click the item “Your Identity” and “Your Certificates”. Select “Your Internet Certificates” in the drop-down list.

Select your personal certificate and click the “Advanced Details…” button. The certificate’s details are then presented in the window below:

Page 146: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 146/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

10.3 Email account configuration

If you have multiple certificates used to sign your sent messages, you have to set by default the one that will serve for exchanges with RTE.

In Lotus Notes, open the menu “File > Security > User Security…”, then click ”Your Identity” and “Your Certificates”:

Select “Your Internet Certificates” in the drop-down list to display your Internet certificates that are already imported.

Select your certificate and click the “Advanced Details” button.

Page 147: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 147/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

If you only have one certificate, the case “Use this certificate as your default signing certificate” will be grey and checked. If not, check it, as above, and click “OK”.

10.4 Installing RTE’s application certificate

When you select, for the first time, a signed and encrypted message you received a dialog box similar to the one below appears, allowing you to give your trust to the issuer:

For this, you must click on the “Cross certify” button.

Then, when you display this signed received message, you will need to choose the “Add Sender to Contacts…” feature, which will add the issuer and its certificate to your book Address.

Page 148: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 148/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

The following window appears:

Click “OK”.

Page 149: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 149/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

Whenever an encrypted email will be sent to this application, its installed certificate will now automatically be selected to perform the encryption.

10.5 Using the certificate: sending a signed-encrypted email

When composing a message, you can sign and encrypt it if you have your own and correspondent certificate (see the import procedure for your certificate above).

For that, when you write a new message, you must click the “Delivery Options” button and check the “Sign” and “Encrypt” cases as shown below:

Click “OK”.

That is all, Notes then automatically signs and encrypts your message.

Page 150: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 150/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

F. APPENDIXES

Page 151: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 151/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

11. Secure environment (PKI)

This appendix describes the secure environment in which the PKI is operated. It describes in particular:

the concepts of secure environment and the corresponding data objects handled by the PKI,

the role of the various entities involved in the operation process of a PKI.

11.1 Concepts and objects managed by a PKI

This appendix presents the key concepts for understanding the role of objects managed by a PKI:

presentation of the principles structuring a safe process,

the role of dual-keys,

certificates.

What is a secure process?

11.1.1.1 Definition of a PKI

With a PKI (Public Key Infrastructure), each holder has a pair of keys - a private key, known only by his owner, and a public key - linked by a complex mathematical relationship, making it virtually impossible to determine the private key from the only knowledge of the public key. This means that the probability of determining the private key from the public key in a reasonable time is very low.

Data encrypted with a key (typically, the public key) can only be decrypted with the other (typically the private key). It is on the basis of this principle that is particularly assured the confidentiality of messages exchanged. This process is commonly called "asymmetric cryptography" as opposed to "symmetric cryptography" that uses a common key for both encryption and decryption.

11.1.1.2 The four pillars of information exchange security

This electronic identity card aims at establishing an environment of trust whose four pillars are:

authentication identifies parties in a sure and reliable way,

confidentiality prevents non-recipients to read the data,

integrity ensures that data has not been altered,

non-repudiation makes it impossible for a party to refute the transmitted information.

11.1.1.3 The cryptographic solution

Because of the technology used (protocols, architectures, etc.), the information circulating on the Internet is not confidential. The technologies also do not allow to meet the other three security requirements set out above.

To preserve the confidentiality of exchanges via the Internet, the data must be rendered incomprehensible to all, except for the recipients. Encryption is the right solution.

Page 152: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 152/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

Data encryption naturally accompanies system’s users’ authentication. While some data are confidential, it is necessary for issuers and recipients of this information to authenticate safely and unequivocally, to conduct secure exchanges.

Authentication is based on the possession of a certificate. This element is issued by a Certification Authority that stakeholders of a transaction trust (in our case, the Certification Authority is RTE). Thus, the carriers can have confidence in the information provided to them and RTE knows that only authorized holders access the information.

NOTE

In a similar process, in daily life, it is necessary to provide a piece of identification issued by an authority to access certain privileges reserved for citizens of the country (expensive purchases, voting, etc.).

The importance of dual-keys

Each holder has a public key and an associated private key.

The private key is a key that the holder must keep confidential. He is the only one to possess and with the ability to use it. He does not necessarily know it himself (for example: it may be in a smart card of which it cannot come out, but access to the card is protected by a PIN code known only to its owner)

The public key, as its name suggests, is public and can be communicated to all. The public keys of holders are used only to encrypt messages intended for them. If an encrypted message was intercepted, it would be without consequence on its confidentiality as it cannot be decrypted (in a reasonable time) by a person not having the associated private key.

The private key enables its owner to sign a message he sends and to decrypt an encrypted message he receives. In contrast, the public key of a person is used to encrypt a message sent to him and to verify the signature of a message he receives.

11.1.2.1 Encryption and decryption of a message

Each message is encrypted by the recipient's public key that will decrypt it with his private key.

When RTE sends a message to the client A:

1. RTE has the public key of client A (via the public part of the certificate).

2. RTE automatically encrypts the message using the public key of client A and sends it via RTE’s email system.

3. Client A receives the message and automatically decrypts it with his private key.

Page 153: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 153/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

Encryption and decryption with dual-keys.

11.1.2.2 The usage of keys to sign a message

Each message is signed by the private key of the issuer. The origin (the signature) of a message can be controlled by the public key of the issuer, freely accessible via its certificate.

To prove to client A that the received message is actually from RTE, RTE automatically signs the message with its (RTE’s) private key before sending to the client A.

Signing and signature verification with dual-keys.

When the client A receives the message from RTE, it automatically verifies the signature of the received message with the public key of RTE.

Page 154: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 154/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

Certificates

11.1.3.1 Objectives of digital certificates

Since public keys are used to verify electronic signatures and encrypt messages, it is essential for any carrier to be certain of the identity of the owner of a public key: it is the role of the certificate.

11.1.3.2 Characteristics of a certificate

A certificate is a digital ID:

that guarantees the identity of the holder from a remote site,

that includes data facilitating the identification,

that is resistant to counterfeit and issued by a trusted third party: the Certification Authority.

A Certification Authority is an entity that creates and manages certificates. It defines the rules for registration in the various holders’ PKI.

11.1.3.3 Structure of a certificate

A digital certificate contains:

the public key of its holder,

the name of the holder and any other identification information (email address of the person if the certificate is used to sign emails),

the certificate’s period of validity,

the name of the certification authority that issued the certificate,

a unique serial number,

the signature of the certification authority.

Page 155: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 155/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

11.1.3.4 Examples of certificates

A digital certificate on Internet Explorer

Page 156: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 156/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

A digital certificate on Mozilla Firefox

11.2 Documentation

Reference documentation:

Subscription contract to RTE’s secure Information System.

Websites:

http://www.legifrance.gouv.fr/

Law of 13th March 2000 on the adaptation of law of evidence to information technologies and on electronic signature:

http://www.assemblee-nat.fr/

Directive 1999/93/CE of 13th december 1999 on a Community framework for electronic signatures :

http://europa.eu/

Draft decree on electronic signatures :

http://www.internet.gouv.fr/

OpenTrust (formerly Keynectis) :

https://www.opentrust.com/

Page 157: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 157/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

12. Glossary

When the holder will get in touch with his new secure environment, he will be faced with a specific terminology, the terms of which are described in this section:

Authentication

Checking the validity of the claimed identity of a user, a device or other entity in an information or communication system.

Certificate

A digital certificate plays the role of electronic identity (e-passport). It guarantees the identity of its owner in electronic transactions and contains all the information enabling the identification (name, possibly company, address, etc.). A digital certificate is composed of a public key and personal information about the holder, all signed by a Certification Authority.

Certificate store

Secure hardware or software container for storing a user's private and its associated key certificates, website certificates, other users’ certificates and CA certificates. This container is usually protected by a password or PIN that will eventually have to be entered at each use of a private key based on the expected level of safety.

Certification Authority

A Certification Authority (CA) is an entity that issues digital certificates, electronic equivalents of identity documents, to a population. By distributing digital certificates, the Certification Authority or Trust Authority, serves as moral support by committing to the identity of a person through the certificate it issues him. According to the credit of the Certification Authority, the certificate will have a field of more or less extensive applications limited to a company’s internal trade (as a company badge) or be used in relations with other organizations and administrations (such as a national identity card or passport).

Confidentiality

Property of data or information that are not disclosed or made available to unauthorized persons.

Cryptography

Discipline including the principles, means and methods of data processing in order to hide their semantic content, establish their authenticity, prevent that their modification goes unnoticed, prevent repudiation and prevent their unauthorized use.

Electronic signature

The electronic signature of a document is the signing with the private key of a digital summary of this document (obtained by applying a hash function), which cannot then be modified without this being visible. Like a handwritten signature, the signatory is liable for it.

Encryption / Decryption

Data transformation using cryptography to make them unintelligible in order to ensure confidentiality / inverse transformation.

HTTPS

HTTPS is a secure version (S secured to) the HTTP protocol used in all web browsers to exchange information over the Internet.

Page 158: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 158/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

Integrity

Ensuring that data or information have not been modified or altered in an unauthorized manner.

Non-repudiation

Property obtained with cryptographic methods to prevent a person from denying having performed a particular action on the data (for example: non-repudiation of origin, certification requirement, intent or commitment, establishment of property).

PKCS#12

File format used to store a private key and its associated certificate protecting a password. The file extension is usually ".p12" or ".pfx".

Private key

Secret digital quantity attached to a person, allowing him to decrypt encrypted messages received with the corresponding public key or to affix a signature to messages sent.

Public key

Digital quantity attached to a person who passes it out to others people in order to make them able to send him encrypted data or to verify his signature.

Revocation

The revocation is the process that deletes the surety made by the Certification Authority concerning a certificate, made at the request of the subscriber or any other authorized person. The request may be the result of different types of events such as compromise or destruction of the private key, the change of information contained in the certificate, failure to comply with the certificate usage rules.

Root Certification Authority

The certification authority with the highest level of trust in the company is qualified root. This authority is able to certify other certification authorities, which are then qualified as intermediaries. This is the main part of an infrastructure based on security certificates.

S/MIME (Secure / Multipurpose Internet Mail Extensions)

S / MIME is a standard of encryption and digital signature of emails. It provides integrity, authentication, non-repudiation and confidentiality of data.

Trusted site

Determines the security settings applied by a browser when accessing a site. If a site is declared as a "trusted site", the browser will apply for example a lower level of security that a site belonging to the "Internet" zone potentially carrying threats.

Virtual Private Network (VPN)

A VPN (Virtual Private Network) allows an interconnection of local, remote networks via a tunnel technique. The tunnel is a secure communication channel through the internet and wherein data travels in an encrypted manner.

Page 159: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 159/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

13. Incidents management and support

In case of incident, the company manager contacts the hotline (see §13.1) that will diagnose the problem and forward it to the concerned technical correspondent. The hotline will provide the solution to the company manager and if necessary assist in the steps indicated to regain access to the RTE’s Information System.

13.1 Support

For any inquiries, customers can contact the RTE Hotline at:

00 800 80 50 50 50

Or from France at:

08 10 80 50 50

13.2 Frequently Asked Questions (FAQ)

A Frequently asked Questions section is available on the certificates retrieval website at the address:

https://kregistration-user.certificat2.com/kreg-resources/CSS/RTE/RTE/faq_utilisateur_fr.html

Page 160: Access to RTE’s Information System by software ...€¦ · 2. Certificates management process 2.1 Foreword The main processes used to manage all the digital certificates issued

Access to RTE’s Information System by software certificates under Microsoft Windows Seven

PKI user guide

Page : 160/160

Copyright RTE. This document is the property of RTE. Any communication, reproduction, even partial publication is prohibited without the written consent

of the Manager of RTE.

13.3 Error codes returned by email

In an exchange of emails between the user and an application, when the certificate was generated and installed using the procedures described in this document, it is possible that functionality error appears. In this case, the element (a server or a gateway) in question returns an error code by email.

The object of error messages returned by RTE’s cryptographic gateway is as follows:

<ERR:nnn!!<Intitulé-FR>!!<Title-EN>> <Subject-of-the-original-message>

Nnn Description Possible cause

001 The email sent by the client was not

signed nor encrypted

You did not check the boxes "signed" and

"encrypted" in your email program when

sending email

002 The email sent by the client was only

encrypted

You did not check the "signed" box in your

email software

003 The email sent by the client was only

signed

You did not check the "encrypted" box in your

email software

004 The email sent by the client was only

signed and the signature used is

incorrect

You did not check the "encrypted" box in your

email software and the certificate used to sign

is invalid or unknown

005 The email sent by the client was

signed and encrypted, but the

signature used is incorrect

The signing certificate that you used is invalid

or unknown

006 The email sent by the client cannot be

decrypted by RTE

The certificate that you used to encrypt the

email is invalid

007 The email sent by RTE failed to be

delivered to the client because of a

security issue

RTE internal problem

<Intitulé-FR> Error title in French.

<Title-EN> Error title in English.

<Subject-of-the-original-

message>

Subject of the original message that provoked the error.

END OF DOCUMENT


Recommended