--
You received this message because you are subscribed to the Google Groups "eID Middleware Dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email to eid-middleware-dev+unsub...@googlegroups.com.
For more options, visit https://groups.google.com/d/optout.
Hi Frederik,
It wasn't untill this year that Google provided an easy to implement interface to be used for smart card authentication.
Which API are you talking about? Our eID Chrome OS application
already supports TLS from the beginning of 2016 (but of course
without the intermediate certificate chain building).
You can test it out via:
https://www.e-contract.be/eid-idp-sp/
Kind Regards,
Frank.
To unsubscribe from this group and stop receiving emails from it, send an email to eid-middleware-...@googlegroups.com.
For more options, visit https://groups.google.com/d/optout.
-- Frank Cornelis e-Contract.be BVBA https://www.e-contract.be
Hi Frank,
Hi Frederik,
It wasn't untill this year that Google provided an easy to implement interface to be used for smart card authentication.Which API are you talking about? Our eID Chrome OS application already supports TLS from the beginning of 2016 (but of course without the intermediate certificate chain building).
https://chrome.google.com/webstore/detail/eid-chrome-os/ahcjlglemcmnjpnkeahidjenglphjnam
Hi Wouter,
What you've done is to implement a CCID driver in JavaScript if I understand correctly, which is, well, possible I guess, but not quite so straightforward.
Unless you want to support Android via Apache Cordova in one go... why do you think I went through all that trouble, for fun?... :)
https://play.google.com/store/apps/details?id=be.e_contract.beid.android
but doesn't work for a TLS mutual authentication in a browser-only OS
Maybe try it out first before making such statement. Here is an example Apache HTTPD config that works for our testing purposes:
<VirtualHost _default_:443>
ServerName local.e-contract.be:443
Include conf.d/ssl.include
# test for eID Chrome OS certificate provider
SSLVerifyClient require
SSLVerifyDepth 2
SSLCACertificateFile conf.d/ca-bundle-client.pem
</VirtualHost>
The point is that the full certificate chain is not communicated
during the TLS handshake. Hence ca-bundle-client.pem also has to
contain the intermediate CA certificates. So this is more of a
server-side issue I guess...
Kind Regards,
Frank.
Hi Joachim,
Hey Frederik,Good to hear that there is some activity.
Would it be possible to mention this on the eid.belgium.be site as this is relevant for all Chrome OS users?
Will I be able to file my taxes online within the deadline this year,
or should I buy another machine?Which criteria are used to decice if an OS is supported for use with eID
and is any deadline set for a "reasonable term" to support a new OS?
As (no) eID support can invalidate major purchases for Belgian families through exclusion of many critical government services, I would expect the support to be top-notch, unambiguous and regulated.
I'm under the impression that the current support is ad hoc, with no transparency or ETAs given, and hurdled if there is "no easy to implement interface".
Hi Cedric,
Make sure you have the Smart Card Connector installed : https://chrome.google.com/webstore/detail/smart-card-connector/khpfeaanjngmcnplbdlpegiifgpfgdco
This is normally not required.
I have an old ACR38U : Does not work !
Because it's not CCID.
Now go to chrome os setting and search for "certif" and click the "manage certificates" option (ignore the prompt window)
I'll see if we can add a button "Import Certificates" within the
eID Chrome OS application that does this thing automagically.
Kind Regards,
Frank.
--
You received this message because you are subscribed to the Google Groups "eID Middleware Dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email to eid-middleware-...@googlegroups.com.
For more options, visit https://groups.google.com/d/optout.