Authenticating with Certificate on eToken or Smartcard
Put the client certificate and the client private key on the eToken or smartcard.
Optional: Put the CA certificate on the eToken or smartcard.
In Setup, go to Security > Smartcard > PC/SC.
Enable Activate PC/SC Daemon.
In Setup, go to Security > Smartcard > Middleware.
Activate the matching PKCS#11 module for your eToken / smartcard.
In Setup, go to Network > VPN > OpenVPN and create a new connection.
In the Session section for the new connection, enter the name or public IP address of the OpenVPN Server.
Select Certificate on eToken or Smartcard as the Authentication Type.
Select the Location of CA certificate:
File: Use the text input field for entering either an absolute file path or one relative to /wfs/OpenVPN/. Alternatively, use the file picker.
eToken or Smartcard: The CA certificate is provided on the eToken or smartcard.
Systemwide store: The CA Certificate is either pre-installed by IGEL (see *._CA-certificates.txt files on http://www.myigel.biz) or has been deployed as a file with the classification SSL Certificate via UMS.
Optional: If there is more than one certificate on the eToken or smartcard, the following fields can be used to match the desired certificate:
Client certificate CN or DN: Enter the client certificate Common Name (CN), its Distinguished Name (DN) or parts thereof.
The PKCS#11 token label or OpenVPN Serialized ID may also be used.
Click an icon for the newly created session (e.g. in the Start Menu)to initiate the connection.
The user will be prompted for the PIN of the eToken (alphanumeric) or smartcard (digits only) if necessary.