Download Cac Enabler

Please select a browser below to access instructions for configuring your browser to use the certificates on your CAC.

IE and Chrome

  1. Putty-CAC, a fork of the Open Source Putty SSH client, resolves this issue. Note that Van Dyke Secure CRT, a commercial product, also supports PIV SSH login for multiple platforms, including Windows and Mac. Installing PuTTY-CAC. If you have a forge.mil account, download the latest Putty-CAC.
  2. Step 4: Download and install CAC Enabler. A Common Access Card (CAC) and a CAC-enabled computer can now view their OMPF record online by selecting the 'OMPF.
  3. Jun 03, 2020 Step 4: Download and install CAC Enabler. A Common Access Card (CAC) and a CAC-enabled computer can now view their OMPF record online by selecting the 'OMPF.

Ensure your CAC is properly inserted in the reader. Access the secure websites listed on the Certificate Usage Worksheet. Select the DOD Class 3 CAC CA certificate if prompted and click OK. Ensure your CAC is inserted in the reader and double click on the message to be read. With the CAC installed, this function is transparent to. Setting up Firefox to use your CAC on your Windows computer These tweaks are required to utilize your CAC. If you don’t follow these instructions, Firefox(FF) will not know the CAC.

First check whether your certificates are already available to your browser.

For Internet Explorer 8.0 and above:

  1. Navigate to Tools > Internet Options > Content and click Certificates.
  2. On the Personal tab, review the list of certificates to determine if your CAC certificates are in the list. The certificates on your CAC will be issued by a DoD CA.
  3. If the certificates appear in the list, you are finished. If the certificates do not appear in the list, please see the note below.

For Google Chrome:

  1. Navigate to Tools > Options > Under the Hood and click Manage Certificates in the HTTPS/SSL section.
  2. On the Personal tab, review the list of certificates to determine if your CAC certificates are in the list. The certificates on your CAC will be issued by a DoD CA.
  3. If the certificates appear in the list, you are finished. If the certificates do not appear in the list, please see the note below.

NOTE: If your certificates are not in the list and you’re using ActivClient, please make sure it is installed correctly. If your certificates are not in the list and you are using other middleware, you can contact your CC/S/A for more information on the middleware requirements for your organization. You can find their contact information on our Contact Us tab.

Firefox

Below are complete instructions for using Firefox with your CAC. You may also download these instructions.

Install Certificates from InstallRoot

  1. Download and install the InstallRoot tool following the instructions in the InstallRoot User Guide or watch this video to learn how:
  2. Open the InstallRoot tool and select Firefox/Mozilla/Netscape from the Select Trust Store picklist at the bottom of the window.
  3. Ensure only the top Install DoD NIPRNET Certificates box is checked.
  4. Click the Install button and wait for the installation to complete. Please wait until you see a confirmation dialog indicating the tool is finished.
  5. Using Common Access Card (CAC) certificates in Firefox

    These instructions will enable ActivIdentity’s ActivClient software to work within Firefox. Before proceeding, try to ensure the latest version of ActivClient is installed by going to the ActivClient website to check the latest version. Before installing the latest version, please uninstall any previous versions of ActivClient.

    As of version 6.2, ActivClient by default configures Firefox to accept the CAC certificates without any additional configuration. You may use the following instructions to verify that it has been installed properly. If using an older version of ActivClient, these instructions will assist with proper configuration.

    1. Open Firefox
    2. Click on Tools > Options in the menu bar.
    3. In the Options window, go to Advanced > Encryption > Security Devices.
    4. In the new window, click on Load.
    5. Enter “ActivClient(CAC)” for the Module Name.

      Click Browse to the right of the Module Filename field. Browse to the location of the ActivClient PKCS11 library, acpkcs211.dll. This is typically located at C:Program Files (x86)ActivIdentityActivClientacpkcs211.dll in ActivClient 6.2, and C:Windowssystem32acpkcs201-ns.dll in ActivClient 6.1 and earlier.

      Click OK, and then OK again in the confirmation window.

    6. The confirmation message will show that the security device (CAC) was loaded. CAC certificates can now be used with the browser. Click OK to close the window.
    7. Ensure the Online Certificate Status Protocol (OCSP) is Performing Revocation Checking

      With any versions of ActivClient later than 6.2, these settings will be automatically configured. However, these instructions can be used to confirm proper configuration for older versions of ActivClient.

      1. Open Firefox
      2. Click on Tools > Options in the menu bar.
      3. In the Options window, go to Advanced > Encryption > Validation.
      4. Ensure the option Use the OCSP to confirm the current validity of certificates is checked. Also ensure When an OCSP server connection fails, treat the certificate as invalid is checked.

Safari

To get started you will need:

  • CAC (see note below)
  • Card reader

You can get started using your CAC on your Mac OS X system by following these basic steps:

  1. Get a card reader
    Typically Macs do not come with card readers and therefore an external card reader is necessary. At this time, the best advice for obtaining a card reader is through working with your home component. In addition, please review the DoD CAC Reader Specifications for more information regarding card reader requirements.
  2. Download and install the OS X Smartcard Services package
    The OS X Smartcard Services Package allows a Mac to read and communicate with a smart card. In order for your machine to recognize your CAC certificates and DoD websites as trusted, the installer will load the DoD CA certificates on OS X. Please refer to this page for specific installation instructions.
  3. Address the cross-certificate chaining Issue
    These instructions walk through adjusting the trust settings on the Interoperability Root CA (IRCA) > DoD Root CA 2 and the US DoD CCEB IRCA 1 > DoD Root CA 2 certificates to prevent cross-certificate chaining issues. This can make it appear that your certificates are issued by roots other than the DoD Root CA 2 and can prevent access to DoD websites.
  4. Configure Chrome and Safari, if necessary
    Safari and Google Chrome rely on Keychain Access properly recognizing your CAC certificates.
    1. In Finder, navigate to Go > Utilities and launch KeychainAccess.app
    2. Verify that your CAC certificates are recognized and displayed in Keychain Access

Note: CACs are currently made of different kinds of card stock. To determine what card stock you have, look at the back of your CAC above the magnetic strip. Most CACs are supported by the Smartcard Services package, however Oberthur ID One 128 v5.5 CACs are not. Third party middleware is available that will support these CACS; two such options are Thursby Software’s PKard and Centrify’s Express for Smart Card.

By now you’ve likely heard the benefits of two factor authentication. Enabling multi-factor authentication can increase the security of accounts you use to access various social media websites like Twitter, Facebook, or even your Google Account. This post is going to be about a bit more.

The U.S. Armed Services spans millions of military and civilian employees. If you’re a member of these services, you’ve probably been issued a DoD CAC smartcard to access various websites. With the smartcard comes compatibility issues, specific instructions tailored to each operating system, and a host of headaches. It’s difficult to find reliable instructions to access military websites from Linux operating systems. This article shows you how to set up your Fedora system to login to DoD CAC enabled websites.

Download Cac Enabler For Pc

Download

Installing and configuring OpenSC

First, install the opensc package:

This package provides the necessary middleware to interface with the DoD Smartcard. It also includes tools to test and debug the functionality of your smartcard.

With that installed, next set it up under the Security Devices section of Firefox. Open the menu in Firefox, and navigate to Preferences -> Advanced.

In the Certificates tab, select Security Devices. From this page select the Load button on the right side of the page. Now set a module name (“OpenSC” will work fine) and use this screen to browse to the location of the shared library you need to use.

Download Cac Enabler Free

Browse to the /lib64/pkcs11/ directory, select opensc-pkcs11.so, and click Open. If you’re currently a “dual status” employee, you may wish to select the onepin-opensc-pkcs11.so shared library. If you have no idea what “dual status” means, carry on and simply select the former package.

Download Cac Enabler Apk

Click OK to finish the process.

Download Cac Enabler Mac

Now you can navigate to your chosen DoD CAC enabled site and login. You’ll be prompted to enter the PIN for your CAC, then select a certificate to use. If you’re logging into a normal DoD website, select the Authentication certificate. If you’re logging into a webmail service such as https://web.mail.mil, select the Digital Signing certificate. NOTE: “Dual status” personnel should use the Authentication certificate.