Putty is the defacto preferred SSH client and toolset for Windows. It includes functionality for Secure Copy, Secure FTP, Key Generation tools, Authentication Agent and more. It comes with support for password and Public Key authentication.
Putty-SC is a Smart Card enabled version of Putty, which extends its Public Key support for hardware cards and keys. It includes a usable PKCS#11 API that requires a card-specific interface typically provided by a middleware manufacturer. It is able to read the public and private keys from the hardware device.
Putty-CAC is built on Putty-SC (and Putty 0.62). Improvements include:
ActivClient
ActivClient is the leader in Windows Smart Card (and PIV/CAC) enabling software. Many U.S. government agencies provide licenses and installations for their users as part of their standard baseline.
OpenSC
OpenSC is an open source Smart Card middleware provider that supports many varieties of Smart Cards and tokens, including CAC and PIV cards. It also includes command line utilities to interact with the Smart Cards.
CACKEY
CACKEY software is another open source middleware tool. Unlike OpenSC, this has the ability to change the PIN on PIV cards.
Microsoft Windows comes with a Graphical Tool, the Certificate Manager to browse certificates stored on the system and associated smart cards. You can navigate the tree to Certificates - Current User/Personal/Certificates. See the example below.
You can select each card to get more details, including the intended usage.
Putty-CAC provides an interface to get to the OpenSSH-formatted Public Key. From the putty interface, navigate to Connection/SSH/CAPI, and click the browse button (red outline in the image below) next to the "Cert" textbox. This will prompt you to select the certificate from your smart cad to use(identified earlier, see Accessing Certificates from Microsoft Windows), and it will fill the SSH keystring textbox.
Certificate Manager allows you to identify your cert ThumbPrint Certificates/Personal/My You want the cert that is issued by DOD CA, not DOD Email CA
#List Cert ThumbPrint via PowerShell
PowerShell
Get-ChildItem cert:\CurrentUser\My --
--
You received this message because you are subscribed to the "Military Open Source Software" Google Group.
To post to this group, send email to mil...@googlegroups.com
To unsubscribe from this group, send email to mil-oss+u...@googlegroups.com
For more options, visit this group at http://groups.google.com/group/mil-oss?hl=en
www.mil-oss.org
---
You received this message because you are subscribed to the Google Groups "Military Open Source Software" group.
To unsubscribe from this group and stop receiving emails from it, send an email to mil-oss+u...@googlegroups.com.
For more options, visit https://groups.google.com/d/optout.
CAC is an NSS database. It has A signed x509 Cert in it
While normal openssh does not support x509 based AUTH, Red hat builds do. So, if you are sshing to a RH based server you should be able to enable it.
--