Skip to content
Bots!
Bots!
  • About
    • Myself
    • আমার দোয়া
  • Bookmarks
    • Bookmarks
    • My OCI Bookmarks
    • Useful Proxmox Commands & Links
    • Learning Nano
    • Useful Sites
    • Useful Virtualbox Command
    • Useful MySQL Command
    • Useful Linux Command
    • BTT-CAS
  • Resources
    • Webinar on Cloud Adoption for Project Managers
  • Photos
  • Videos
  • Downloads
Bots!

Using an Aladdin eToken with firefox

Rumi, August 25, 2012

A very easy method for importing (or removing) keys in your eToken is to add the eToken as a Security Device in Firefox. The procedure for Thunderbird and Mozilla/Seamonkey is nearly identical. To add your eToken as a security device , follow these steps

  • Start Firefox
  • (Linux) Go to Edit->Preferences->Advanced->Tab "Encryption"
  • (Windows) Go to Tools->Options->Advanced->Tab "Encryption"
  • Click on 'Security Devices'

You should see a screen similar to

this.

  • Click on 'Load'
  • In the next screen, enter a (possibly useful) name for this module and Click on 'Browse' to select the appropriate PKCS11 module

Cert firefox load pkcs11.png

  • (Linux) choose /usr/local/lib/libetpkcs11.so
  • (Windows) choose $WINDIR\system32\etpkcs11.dll where $WINDIR is the location where Windows is installed. For most Windows XP systems, this will be c:\windows, for Windows 2000 this usually is c:\winnt.
  • Click 'OK'
  • The eToken PKCS11 module is now ready for use. If your eToken is inserted in the computer then it will appear in the list of

security devices

Note that the name (label) of your eToken is the name that you gave it when your eToken was initialized.

  • Note that you are not logged into your eToken at this time. You can do so by clicking on the 'Login' button, after which you'll be prompted for your eToken password:

token master password

  • The next step is to store your existing grid certificate on your eToken. First, convert your grid certificate to PKCS12 format:
 # openssl pkcs12 -export -in ~/.globus/usercert.pem -inkey ~/.globus/userkey.pem -out globus.p12
 Enter pass phrase for userkey.pem:
 Enter Export Password:
 Verifying - Enter Export Password:

You will be asked for your grid certificate passphrase first and then for the (new) Export Password and then once more to verify your newly chosen export password.

NOTE This Export Password is as important as your grid certificate passphrase, as both can be used to decrypt your private key. Guard them both safely!

  • Go back to the "Encryption" preferences screen
    • (Linux) Go to Edit->Preferences->Advanced->Tab "Encryption"
    • (Windows) Go to Tools->Options->Advanced->Tab "Encryption"

preferences

and click on 'View Certificates'. You will see a screen similar to

cert manager before

  • Click on 'Import' and browse to the location of your globus.p12 file:

(Linux users: remember to select the 'Show hidden files and directories' checkbox)

import certificate

  • Select your eToken as the device on which to store the certificate:

choose token

  • Enter the password (User PIN) for your eToken:

master password

  • Enter the 'Export password' that you choose to export the PKCS12 file with:

import password

If all went well, Firefox will report success:

successfull import

after which your grid certificate should be stored on your eToken:

cert manager after

Src: http://wiki.nikhef.nl/grid/Using_an_Aladdin_eToken_with_firefox

DSC Tools PKI eToken

Post navigation

Previous post
Next post

Myself…

Hi, I am Hasan T. Emdad Rumi, an IT Project Manager & Consultant, Virtualization & Cloud Savvyfrom Dhaka, Bangladesh. I have prior experience in managing numerous local and international projects in the area of Telco VAS & NMC, National Data Center & PKI Naitonal Root and CA Infrastructure. Also engaged with several Offshore Software Development Team.

Worked with Orascom Telecom-Banglalink, Network Elites as VAS partner, BTRC, BTT (Turkey) , Mango Teleservices Limited and Access to Informaiton (A2I-UNDP)

Currently working at Oracle Corporation as Principal Technology Solution and Cloud Architect.

You can reach me [h.t.emdad at gmail.com] and I will be delighted to exchange my views.

Tags

Apache Bind Cacti CentOS CentOS 6 CentOS 7 Debain Debian Debian 10 Debian 11 Debian 12 DKIM Docker endian icinga iptables Jitsi LAMP Letsencrypt Linux Munin MySQL Nagios Nextcloud NFS nginx pfsense php Postfix powerdns Proxmox RDP squid SSH SSL Ubuntu Ubuntu 16 Ubuntu 18 Ubuntu 20 Varnish virtualbox vpn Webmin XCP-NG zimbra

Topics

Recent Posts

  • Install Jitsi on Ubuntu 22.04 / 22.10 April 30, 2025
  • Key Lessons in life April 26, 2025
  • Create Proxmox Backup Server (PBS) on Debian 12 April 19, 2025
  • Add Physical Drive in Proxmox VM Guest April 19, 2025
  • Mount a drive permanently with fstab in Linux April 16, 2025
  • Proxmox 1:1 NAT routing March 30, 2025
  • Installation steps of WSL – Windows Subsystem for Linux March 8, 2025
  • Enabling Nested Virtualization In Proxmox March 8, 2025
  • How to Modify/Change console/SSH login banner for Proxmox Virtual Environment (Proxmox VE / PVE) March 3, 2025
  • Install Proxmox Backup Server on Debian 12 February 12, 2025

Archives

Top Posts & Pages

  • Install Jitsi on Ubuntu 22.04 / 22.10
©2025 Bots! | WordPress Theme by SuperbThemes