ActivClient Administration Guide
ActivClient Administration Guide
Table of Contents
Workflow . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 150
Environment Considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 151
Interactive Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 151
Audit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 152
Auto-Contact . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 154
Auto-Decrypt . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 156
List of Tables
List of Figures
Chapter 1: Introduction
In This Chapter This guide explains how to customize, deploy and manage ActivClient™
according to your organization’s specific requirements.
12 About ActivClient
ActivIdentity uses industry standards whenever possible so that you can use off-
13 ActivClient Deployment the-shelf products.
14 ActivClient Management
ActivClient customization can be performed before deploying the software in
order to create a “corporate image”. You can also customize ActivClient after it
has been deployed, as you update your corporate policies, or as you deploy
additional capabilities onto your smart cards and smart card middleware.
• ActivClient 32-bit
• ActivClient 64-bit
• ActivClient CAC 32-bit
• ActivClient CAC 64-bit
About ActivClient
ActivClient is the latest smart card and USB token middleware from ActivIdentity
that allows enterprise and government customers to easily use smart cards and
USB tokens for a wide variety of desktop, network security and productivity
applications.
ActivClient enables the use of PKI certificates and keys, one-time password and
static password credentials on a smart card or USB token to secure:
ActivClient Deployment
The following sections outline the main stages of the deployment process and the
decisions to be taken.
For details on specific ActivClient capabilities and the associated policies, see the
following chapters:
Preparation
• Customize the setup to meet your organization’s needs in terms of features and
policies.
For further information, see Chapter 3, "Setup Customization," on page 89.
Deployment
• Select the deployment method - remote or local - so that either users can perform
an interactive setup, or you can automate software installation and configuration
using corporate software management technology.
Upgrading
For further information, see Chapter 5, "Upgrading and Updating," on page 124.
ActivClient Management
Once ActivClient is successfully deployed and users are using their smart cards for
authentication, digital signature or encryption services, the main administrative tasks
are to:
• ActivCard Gold password export utility - tool designed to help customers upgrade
from ActivCard Gold to ActivClient 6.2 by accessing passwords that they might
have stored on their smart card. For further information, see the readme.txt in
the folder.
83 Import/Export ActivClient Advanced Configuration Provides a user interface to view and modify
ActivClient Manager, described in "Using the the ActivClient registry settings.
Configurations Advanced Configuration Manager" on
page 16 This tool is accessible from the Start menu
85 Configurations for or from ActivClient Agent right-click menu.
Remote Session
Windows Registry Editors (regedit.exe), Used to view and edit local and remote
Support
described in "Using Microsoft Windows registries.
Registry Editor" on page 18
You also can use the editors to remotely
import .reg files with the appropriate
settings to several computers.
Windows Group Policy, described in: Allows you to remotely set the configuration
on a group of computers or users.
• "Using Active Directory Group
Policy Objects on Windows 2000
Server and Server 2003" on page
18
• "Using Active Directory Group
Policy Objects on Windows Server
2008" on page 22
Users with administrator privileges can use the Advanced Configuration Manager
to configure specific ActivClient policies and standard GSC smart card policies.
The settings that you can modify using the Advanced Configuration Manager are
described in "ActivClient Policy Settings" on page 25. Some of these policies are Note
defined and standardized by the United States Government in the Government Smart To ensure your changes are taken
Card—Interoperability Specifications, GSC-IS. For details on this specification, go to into account, click Apply before
navigating to other configuration
http://smartcard.nist.gov/.
categories.
2. To modify a setting, select the corresponding Value and either enter the value
manually or select an option from the drop-down list.
For information on the settings and their values, read the description displayed at
the bottom of the window each time you select an option.
If you intend to customize ActivClient for a large-scale rollout program, prepare the
rollout by customizing and testing the product customization for your specific
environment. The customization must meet the needs of your user population.
By default, ActivClient creates its configuration with an ACL that allows every user to
read those registry keys. Only members of the administrator group can modify the
registry keys.
The Active Directory Group Policy allows you to remotely set the configuration for a
group of computers or users. The ActivClient Administrative Template file is delivered
in the setup package and you can define the values with the Active Directory Group
Policy Editor. You can then push the values to all ActivClient users in the domain.
The ActivClient Administrative Template for Windows 2000 Server and Windows
Notes
Server 2003 is available in the ADM format.
• You must have domain
administration access rights to
For Windows Server 2008, it is also available in the ADMX format (see "Using Active deploy the Group Policy.
Directory Group Policy Objects on Windows Server 2008" on page 22).
• The ActivClient Administrative
template defines only ActivClient
The policy deployed using the GPO overwrites the values configured locally. policies. It does not provided
configuration values.
The policy must be deployed after ActivClient has been installed on all the required • You can define custom
machines. If the policy is deployed before installation, the setup will overwrite the configuration values with the
customized settings, replacing them with the default settings. You can also customize Active Directory Group Policy
Editor. The Active Directory Group
the setup to install the modified policy settings at installation. For further information, Policy Editor is an administrative
see Chapter 3, "Setup Customization," on page 89. tool of the Windows 2000, 2003
and 2008 servers.
Setting an Active Directory Group Policy Object (GPO) with default permissions
causes the application to deploy for every user or computer within the domain.
To deploy ActivClient policies you must first load ActivClient policies as a new
Administrative Template. Then you need to ensure that only specified users receive
the application.
– Start the Microsoft Management Console (MMC) by entering mmc in the Run
window, then select Active Directory Users and Computers snap-in.
– From the Start menu, go to Programs, Administrative Tools, and select
Active Directory Users and Computers.
2. In the console tree, right-click your domain, and select Properties.
4. Enter the name that you want to call this policy (for example, ActivClient 6.2 or
ActivClient CAC 6.2), and press Enter.
a. From the Name list, select the security groups to which you do not want to
apply this policy, and then clear the Allow option for Apply Group Policy.
b. From the Name list, select the security groups to which you want to apply this
policy, select the Allow option for Apply Group Policy, and click OK.
Once the group policy object has been created, you must configure Active
Directory to load the ActivClient default template (ActivClient.adm) so that the
ActivClient settings can be propagated to the newly created group policy object.
2. From the Start menu, go to Programs, Administrative Tools, and then select
Active Directory Users and Computers.
3. In the console tree, right-click the domain or Organizational Unit that you want to
configure, then select Properties.
4. Click the Group Policy tab. Drag the pointer to select the group policy setting that
you want to edit, then click Edit.
5. In the console tree, click the plus sign (+) next to Computer Configuration in
order to expand the list.
7. Click the Add icon, then drag the pointer to select the ActivClient template and
click Open.
Note
8. Click Close.
Only configured policies will be
propagated. Other policies will keep
When you add the ActivClient template file to the group policy, by default only the
their current configuration as set at
settings contained in genuine group policy trees are visible in the console. You must ActivClient installation.
change the default user preferences. To do so:
1. From the Group Policy Object Editor’s administrative templates, right-click the
ActivClient node.
– If you are using Windows Server 2003, clear the Only show policy settings
that can be fully managed option.
– If you are using Windows 2000 Server, clear the Show Policies Only and
Show Configured Policies Only option.
For more details, go to http://download.microsoft.com/download/0/0/4/0044470e-5f3a-
4569-9255-91f932e4da3b/gpintro.doc.
Once the ActivClient Administrative Template is loaded, you can use the Active
Directory Group Policy Editor interface to configure specific settings with custom
values.
The Setting and State table is displayed with the Standard tab selected.
2. Either:
– In the Standard tab, right-click on the required property or setting and click
Properties.
– In the Extended tab, select the required property or setting and click
Properties.
The setting Properties page is displayed.
4. For each setting, you can also set the status with the following options:
Status Description
Not Configured When the status is Not Configured and you click Apply, the
setting is disabled and any previous values are cleared from the
system registry.
Enabled When the status is Enabled and you click Apply, the values you
enter are stored in the system registry.
Disabled When the status is Disabled and you click Apply, the setting is
disabled. Any values remain in the system registry and are used
when the setting is Enabled.
The Active Directory Group Policy allows you to remotely set the configuration for a
group of computers or users. The ActivClient Administrative Template file is delivered Notes
in the setup package and you can define the values with the Active Directory Group • You must have domain
Policy Editor. You can then push the values to all ActivClient users in the domain. administration access rights to
deploy the Group Policy.
The ActivClient Administrative Template for Windows Server 2008 is available in the • The ActivClient Administrative
template defines only ActivClient
ADMX format.
policies. It does not provided
configuration values.
For Windows 2000 Server and Windows Server 2003, it is also available in the ADM
• You can define custom
format (see "Using Active Directory Group Policy Objects on Windows 2000 Server configuration values with the
and Server 2003" on page 18). Active Directory Group Policy
Editor. The Active Directory Group
The policy deployed using the GPO overwrites the values configured locally. Policy Editor is an administrative
tool of the Windows 2000, 2003
and 2008 servers.
The policy must be deployed after ActivClient has been installed on all the required
machines. If the policy is deployed before installation, the setup will overwrite the
customized settings, replacing them with the default settings. You can also customize
the setup to install the modified policy settings at installation. For further information,
see Chapter 3, "Setup Customization," on page 89.
Setting an Active Directory Group Policy Object (GPO) with default permissions
causes the application to deploy for every user or computer within the domain.
To deploy ActivClient policies you must first load ActivClient policies as a new
Administrative Template. Then you need to ensure that only specified users receive
the application.
Add the ActivClient administrative template and create the group policy
3. From the Start menu, go to Programs, Administrative Tools, and then select
Group Policy Management.
4. In the console tree, right-click the domain or Organizational Unit that you want to
configure, then select Create a GPO in this domain....
5. Create a Group Policy Object (GPO) called, for example, ActivClient, and click
OK.
3. Expand the directory for the ActivClient policy to display the available settings.
4. Double-click on a policy setting (for example, Behavior when the card is removed)
to display the properties.
6. For each setting, you can also set the status with the following options:
Status Description
Not Configured When the status is Not Configured and you click Apply, the
setting is disabled and any previous values are cleared from the
system registry.
Enabled When the status is Enabled and you click Apply, the values you
enter are stored in the system registry.
Disabled When the status is Disabled and you click Apply, the setting is
disabled. Any values remain in the system registry and are used
when the setting is Enabled.
7. To apply the policy to specific users or group of users, return to the Group Policy
Management console and select your group policy.
8. In the Security Filtering section, add the users and/or groups to which you want
to apply this policy.
For details on how to modify these settings at the time of installation, see Chapter 3,
"Setup Customization," on page 89.
The ActivClient policy settings are divided into the following categories:
"Check Point Secure Authentication Agent API" on page 61 Reboot the workstation
The following sections detail the settings in each category and state what action you
must take for a policy change to be taken into account.
This setting only applies if the smart card was used to log on to Windows, either with a
digital certificate or with a static password when using the ActivIdentity Authentication
Client Smart Card Password Login feature.
Description Defines what happens when the user removes the smart card
that was used to log on to Windows.
No action: 0
Log off: 1
Type DWORD
The ActivClient feature is especially useful on workstations where several smart cards
might be inserted (for example, at a smart card issuance station), in order to
guarantee that only the removal of the card used to log on to Windows will trigger the
session lock.
• On operating systems prior to Windows Vista, use the Microsoft Group Policy
MMC snap-in:
a. Select Computer Configuration, Windows Settings, Security Settings,
Local Policies and then Security Options.
• On operating systems starting with Windows Vista, stop the Smart Card
Removal Policy service.
The exception to this rule is when ActivClient is installed on a server with Terminal
Service or Citrix Presentation Server. In these cases:
Description When enabled, users are asked to initialize their smart card as
soon as the non-initialized smart card is inserted into the
reader. It is advised to disable this setting for deployments
with ActivIdentity 4TRESS or ActivID CMS servers, as these Note
products manage the PIN instead of ActivClient. Only available if the PIN
Initialization Tool is installed.
Values No = 1 (default)
Yes = 0
Type DWORD
Description If the user inserts a locked smart card, the Unlock Card
window is displayed automatically. Disable this feature if it
does not match your deployment scenarios (for example, if
you do not provide a card unlock service via the telephone).
No = 1
Type DWORD
No: Does not prevent entry of PIN code shorter than the
minimum PIN length even in the PIN verification dialogs.
No = 0
Type DWORD
Values Yes = 1
No = 0 (default)
Type DWORD
Description Prevents users from canceling the Change PIN process when
using their smart card for the first time.
Note
No (default): Does not prevent end users from cancelling
Change PIN dialog that may display at smart card first use. If users cancel the Change PIN
prompt, they will see the prompt
Yes: Prevents end users from cancelling Change PIN dialog again at each logon until the PIN
that may display at smart card first use. change is performed.
Values Yes = 1
No = 0 (default)
Type DWORD
Allow PIN verification against the smart card regardless of the PIN
length
No = 0
Type DWORD
Values Yes = 1
No = 0 (default)
Type DWORD
No = 0
Type DWORD
This involves the use of a PIN Caching Service, that is flexible and that you can
configure with a variety of settings, ranging from very easy-to-use to more complex
secure settings.
For a full description of the ActivClient PIN Caching Service, see Chapter 8, "PIN
Caching Service," on page 157.
The following sections detail the PIN Caching Service policy settings:
No = 0
Type DWORD
Always prompt for the PIN code before performing any private key
signature operation
Values Yes = 0
No = 1(default)
Type DWORD
Always prompt for the PIN code before performing any private key
decryption operation
Values Yes = 0
No = 1(default)
Type DWORD
Always prompt for the PIN code before performing any other operation
Note
Description Forces PIN authentication for any PIN protected operation ActivIdentity recommends keeping
except for private key signature and private key decryption the default setting (Other = 1). If you
operations. enable this option (Other = 0), the
user experience might not be
Values Yes = 0 acceptable, as some functional
operations (1 user click) cause
No = 1(default) several card-level operations
(several read commands), which
Registry Key HKEY_LOCAL_MACHINE\Software\GSC\Policies\PIN\ would cause repeated PIN prompts
Authentication\Other to display.
Type DWORD
Values 15 (default)
Type DWORD
Values Yes = 1
No = 0 (default)
Type DWORD
No = 0
Type DWORD
Type REG_SZ
Values Yes = 1
No = 0 (default)
Type DWORD
Description Lists the applications that are not allowed access to the PIN
cache. The applications listed behave as if PIN caching was
disabled.
Type REG_SZ
No = 0
Type DWORD
Type REG_SZ
Other applications (for example, Internet Explorer and Microsoft Outlook) require the
certificates to be available in Windows (specifically registered to the Windows CAPI
store) prior to using them.
ActivClient provides several features you can customize to make those steps
automatic and improve the user experience:
No = 0
Type DWORD
Values Yes = 1
No = 0 (default)
Type DWORD
Values Yes = 1
No = 0 (default)
Type DWORD
Values Yes = 1
No = 0 (default)
Type DWORD
Yes : 1
Type DWORD
Outlook Enhancements
Restart Outlook
For a full description of Outlook enhancements, see Chapter 7, "Outlook Usability For the Outlook Enhancements
policy changes to be applied, you
Enhancements," on page 140. must restart Outlook.
No : 0
Type DWORD
Check CRL for Outlook security profile creation and Publish to GAL
Values 0: Disabled
Type DWORD
Check CRL timeout for Outlook security profile creation and Publish to
GAL
Values 0 (default)
Type DWORD
Values Yes: 1
No: 0 (default)
Type DWORD
Enable audit for Outlook security profile creation and Publish to GAL
No = 0
Type DWORD
Values Yes = 1
No = 0 (default)
Type DWORD
No = 0
Type DWORD
Description Turns on the "Send clear text signed message when sending
signed messages" option at the next Outlook security profile
update.
No = 0
Type DWORD
Description Turns on the "Request S/MIME receipt for all S/MIME signed
messages" option at the next Outlook security profile update
(only available with Outlook 2002 and later).
Values Yes = 1
No = 0 (default)
Type DWORD
No = 0
Type DWORD
Values Contacts
Type REG_SZ
Values Yes = 1
No = 0 (default)
Type DWORD
Note: This setting does not apply to Outlook 2003 and later.
No = 0
Type DWORD
User Console
Restart User Console
These policies are available if the User Console is installed. For the User Console policy
changes to be applied, you must
restart the User Console.
Some policies are only available if the associated ActivClient components are
installed. For example, the policy to access the Advanced Configuration Manager:
from the User Console is available only if both the User Console and the Advanced
Configuration Manager are installed.
Display Help
Description Allows displaying the main "Help" standard tool bar button and
the "ActivClient Help" command in the "Help" menu in the
User Console.
No = 0
Type DWORD
Description Allows displaying the Tree View of the Explorer toolbar in the
User Console. If disabled, the Tasks View is the only view
available. If both the Tasks and Tree views are disabled, the
Explorer toolbar is not displayed.
No = 0
Type DWORD
Description Allows displaying the Tasks View of the Explorer toolbar in the
User Console. If disabled, the Tree View is the only view
available. If both the Tasks and Tree views are disabled, the
Explorer toolbar is not displayed.
No = 0
Type DWORD
• Large Icons
• Small Icons
• List
• Details
No = 0
Type DWORD
Values None
Type REG_SZ
No = 0
Type DWORD
Description Allows displaying the "Use Reader" menu and the "Reader
List" toolbar icon in the User Console.
No = 0
Type DWORD
Description Allows displaying the "Smart Card Info" icon in the right pane
of the User Console. The Smart Card Info window displays
information such as smart card user name, manufacturer,
model and serial number.
No = 0
Type DWORD
Description Allows to access the Unlock card feature in order to unlock the
smart card.
No = 0
Type DWORD
Description Allows a user to display their unlock code. Only applicable for
standalone smart cards.
No = 0
Type DWORD
Description Allows a user to reset their smart cards. Only applicable for
standalone smart cards.
No = 0
Type DWORD
Description Allows to access and use the Change PIN feature from the
User Console Tools menu.
No = 0
Type DWORD
Description Allows a user to access and use the PIN Initialization Tool
feature from the User Console New Card menu.
No = 0
Type DWORD
Description Allows users to access the Check for Card Update feature that Note
checks with ActivID CMS if an update is available for the
inserted smart card. If the Smart Card Update feature is
installed, the User Console menu is
Values Yes = 1 (default when Auto-Update feature is installed) unavailable until the feature is
configured with the ActivID CMS
No = 0 (default when Auto-Update feature is not installed) URL.
Type DWORD
No = 0
Type DWORD
No = 0
Type DWORD
No = 0
Type DWORD
Description Allows users to import a certificate onto their smart card from
the User Console.
No = 0
Type DWORD
No = 0
Type DWORD
No = 0
Type DWORD
No = 0
Type DWORD
No = 0
Type DWORD
No = 0
Type DWORD
No = 0
Type DWORD
Type DWORD
No = 0
Type DWORD
Description Allows to access and use the Advanced Diagnostics tool from
the User Console Standard toolbar.
No = 0
Type DWORD
Display Troubleshooting
Description Allows to access and use the Troubleshooting Wizard from the
User Console Standard toolbar.
No = 0
Type DWORD
No = 0
Type DWORD
Description Allows displaying the "PIN Initialization Tool" menu item in the
ActivClient Agent menu. It starts the PIN Initialization Tool,
allowing users to initialize smart cards.
No = 0
Type DWORD
Description Allows displaying the "PIN Change Tool" menu item in the
ActivClient Agent menu. It starts the PIN Change Tool,
allowing users to change their smart card PIN.
No = 0
Type DWORD
No = 0
Type DWORD
No = 0
Type DWORD
Description Allows displaying the "Exit" menu item in the ActivClient Agent
menu. It closes the ActivClient Agent application.
No = 0
Type DWORD
No = 0
Type DWORD
No = 0
Type DWORD
Values 10 (default)
Type DWORD
No = 0
Type DWORD
Values 30 (default)
Type DWORD
Reboot workstation
Check Point Secure Authentication Agent API For the Check Point SAA API policy
changes to be applied, you must
reboot the workstation.
The following sections detail the policy settings to configure the ActivClient SAA API
behavior:
Challenge/Response = 2
Type DWORD
Values Challenge
Type REG_SZ
Values Challenge
Type REG_SZ
This message is displayed when a card with a blocked card manager is inserted.
Description Displays a message when users insert a smart card with the
card manager blocked.
No = 0
Type DWORD
Description Message displayed when users insert a smart card with the
Card Manager blocked.
Type REG_SZ
No = 0
Type DWORD
Type REG_SZ
Description Defines how long (in seconds) the No Smart Card Reader
Alert is displayed.
Values 5 (default)
Type DWORD
Description Warns users if their smart card is still inserted in the smart
card reader upon log off or screen lock.
You can configure ActivClient to notify the user upon log off
and screen lock (default behavior), upon log off only, or never.
Type DWORD
Description Message displayed when the user's smart card is still inserted
in the smart card reader upon log off, screen lock, or session
disconnect.
Type REG_SZ
Description Defines how long (in seconds) the Unattended Smart Card
Alert is displayed.
Values 5 (default)
Type DWORD
Description Defines how long (in seconds) the Smart Card Update Alert is
displayed.
Values 5 (default)
Type DWORD
Description Notifies users when their smart card has expired or will expire
soon
Type DWORD
Type DWORD
Values "Contact the person or organization who gave you this smart
card."
Type REG_SZ
Description Defines how long (in days) before smart card or certificate
expiration the warning should display. The default is 60 days
before expiration.
Values 60 (default)
Type DWORD
Description Defines for how long (in days) the card or certificate expiration
warning is displayed once the smart card or certificate has
expired.
Values 5 (default)
Type DWORD
Description Defines the full path to the Expiration Warning dialog box.
Help file When no value is specified, the ActivClient Help file is
used.
Values None
Type REG_SZ
Default delay after card insertion for expiration check (in seconds)
Description Defines how long (in seconds) ActivClient should wait after
smart card insertion or Windows logon/unlock before
ActivClient checks for smart card or certificate expiration.
Values 20 (default)
Type DWORD
Logon Window
Reboot workstation
For the Logon Window policy
changes to be applied, you must
reboot the workstation.
Size = 413*72.
Size = 413*5.
You can use graphics (in bitmap (.BMP) format) of a different size as the logon
window will adjust automatically.
The following section detail the Logon Window policy settings that enable you to
customize the smart card PIN authentication dialog box defaults and select the
banner you want to apply:
Values None
Type REG_SZ
Description Thin moving line displayed under the banner in the Enter PIN
window.
Values None
Type REG_SZ
The following sections detail the ActivClient auto-update policy settings that you can
configure:
Values None
Type REG_SZ
Type REG_SZ
Values 3 (default)
Type DWORD
Values 15 (default)
Type DWORD
Values 1 (default)
Type DWORD
For a full description of the Smart Card Auto-Update feature, see Chapter 9, "Auto- Prerequisite
Update with ActivID CMS," on page 173. The Smart Card Auto-Update is only
available if "Enable smart card
discovery information caching" on
The following sections detail the ActivClient auto-update policy settings that you can
page 76 is enabled.
configure:
Type DWORD
Values 7 (default)
Type DWORD
Type DWORD
Values 5 (default)
Type DWORD
Description Connection URL for the CMS server (see the ActivIdentity
CMS documentation). The port number is included in the URL.
Example: http://www.mycompany.com:89898
Values None
Type STRING
Values 5 (default)
Type DWORD
Values 2 (default)
Type DWORD
Type DWORD
Smart Card
The following sections detail the Smart Card middleware policy settings:
Reboot workstation
• "Prefer GSC-IS over PIV End Point" on page 76 For the Smart Card policy changes
to be applied, you must reboot the
• "Enable smart card discovery information caching" on page 76 workstation.
Description For smart cards that comply with both the US government
GSC-IS and PIV standards, allows specifying which standard
takes precedence for the middleware.
Type DWORD
No: 0
Type DWORD
Devices
The following section details the Devices policy setting that allows you to customize
ActivClient behavior regarding hardware devices: Reboot workstation
For the Devices policy changes to
be applied, you must reboot the
Authorized smart card readers workstation.
Values None
Type Multi-string
Terminal Services
The following section details the Terminal Services policy setting to configure
ActivClient to improve support in remote session environments. Reboot workstation
For the Terminal Services policy
changes to be applied, you must
Enable caching of the selected applet reboot the workstation.
ActivIdentity recommends enabling the caching of the selected applet (the default
behavior). Disable caching only when recommended to do so by ActivIdentity
customer support. Note
For read-only smart cards (such as
the DOD Common Access Card or
Description Allows improving performance by enabling caching of the PIV cards for the US Government),
applet selected on the smart card. this policy has no effect.
Caution is required when using Terminal Services or Remote
Desktop with more than one instance of ActivClient accessing
the smart card: this option must then be disabled (No) to
prevent risks of smart card data corruption.
Type DWORD
Performance Optimizations
The following sections detail the Performance Optimizations policy setting to disable Reboot workstation
certificate caching and card auto registration at card insertion: For the Performance Optimizations
policy changes to be applied, you
must reboot the workstation.
• "Disable certificate caching on card-insertion" on page 79
• "Disable card auto-registration on card-insertion" on page 79
Values Yes: 1
No: 0 (default)
Type DWORD
Advanced Diagnostics
The Advanced Diagnostics tool is designed to help diagnose issues with ActivIdentity
software installed on your computer. Restart Advanced Diagnostics
Tool
You can configure the Advanced Diagnostics tool to send troubleshooting results by For the Advanced Diagnostics
email. This decreases the risk that information is lost or modified once it is generated. policy changes to be applied, you
must restart the tool.
The following sections detail the Advanced Diagnostics policy settings:
Values None
Type REG_SZ
No = 0
Type DWORD
No = 0
Type DWORD
The ActivClient User Console provides users an interface to enable / disable logging Note
and configure a couple of policies. Additional policies are available and presented in ActivClient allows you to configure
this chapter. log files without necessarily having
administrator rights (other
ActivClient policies can only be
The following sections detail the Logging policy settings:
updated with administrative rights).
Description Allows users to create log files for every action performed by
the product. No security sensitive information is logged. This
may affect performance and should be activated only when
required by Technical Support for troubleshooting purposes.
Values Yes = 1
No = 0 (default)
Type DWORD
Values None
Type REG_SZ
Description Specifies the maximum size (in megabytes) of the log file. The
default size is 5 MB..
Values 5 (default)
Type DWORD
Values 1 (default)
Type DWORD
Values Yes = 1
No = 0 (default)
Type DWORD
ActivClient configuration files are either registry (.reg) or text (.txt) files and are
independent of the operating system and processor type.
The configuration files are stored in the Configuration folder in the Advanced
Configuration Manager installation directory.
The setup also installs a default.reg file that contains the default values for the
ActivClient settings.
Import a Configuration
By importing a configuration file, you can update several or all of the local
configuration settings in a single operation.
Export a Configuration
By exporting a configuration file, you can save the local Advanced Configuration
Manager settings.
Note
Installation using the Registry Editor
or double-clicking overwrites the
2. Select a configuration file to overwrite an existing configuration file or define a file existing keys. If if a sub-key is not
name to create a new one and click Save. listed in the file, it will be erased. As
a result, all the keys exported are
either:
All the settings displayed in the Advanced Configuration Manager can be saved
the registry (.reg) file format or text file (.txt) format. • Keys without sub-keys (values)
• Keys for which all the sub-keys
The generated configuration file can be safely installed using the Windows are exported as well
Registry Editor or by double-clicking the file.
2. From the Edit menu, select Add Value and enter the following:
Data: 80000000
3. From the Edit menu, select Add Value and enter the following:
Data: scardhook.dll
The ActivClient setting "Behavior at card removal" must be set to "No action" and the
Microsoft setting "Behavior at card removal” must be set to “Lock workstation.”
Associated key:
HKLM\SOFTWARE\ActivCard\_
ActivClient\
EventService\_
RunEventServiceAsSystem
This chapter explains how to customize the ActivClient setup. It describes the
possible customization methods and details the ActivClient setup options. It also
explains how to customize the Device Installer.
Start the ActivClient setup program with a pre-defined "Hide Features" on page 90
list of features to install, to not install, or to hide from the
setup-installation option tree.
Start ActivClient setup program in blind mode i.e. default "Run a Blind Setup" on page
features installation without any user interface displayed 96
ActivClient Setup applications are MSI files. ActivClient Setup file names depend
on the ActivClient edition, as listed in Table 3.1.
In all command line examples provided in the following sections, the ActivClient
setup file name is referenced as <ActivClient setup>.msi, where
<ActivClient setup> is the appropriate name for the ActivClient edition in use,
as listed in Table 3.1.
This command allows installation of the default ActivClient setup, just as when double-
clicking ActivClient setup file.
Note
Hide Features Once ActivClient is installed, you
can modify the installed
To hide one or several features in the setup program, use the following command: components using the “Add or
Remove Programs” applet in the
msiexec.exe /i "<path>\<ActivClient setup>.msi <feature1>=-1 Windows Control Panel.
<feature2>=-1”
Features hidden during initial
installation (that is, the features that
where:
are not installed) will display in the
ActivClient Custom Setup screen,
• <path> is the ActivClient setup path. where you can select them for
installation.
• <ActivClient setup> is the ActivClient setup .msi file name.
• <feature n> is the public property of the feature to hide. See "Customize the
Feature Installation" on page 98 for more information.
The quotation marks shown in the above command line are necessary when there are
spaces in the file name.
Examples
To hide the ActivClient Agent feature in ActivClient 32-bit edition 6.2, use the following
command:
The first two steps in this procedure are Orca tool retrieval and installation.
http://www.microsoft.com/downloads/details.aspx?familyid=e96f8abc-62c3-4cc3-
93ad-bfc98e3ae4a3&displaylang=en
2. Install the Windows Installer SDK from the Web site, and then install Orca by
double-clicking the Orca.msi file from the \Program Files\Microsoft SDK\Bin
directory.
After the Orca installation completes, a shortcut is available in your Start menu.
3. Start the Orca tool and open one of the following ActivClient setup files,
depending on edition:
Important
4. Select Property in the Tables column.
• Public Properties names might be
very similar. Only those without
5. Locate and select the property you want to change. underscores will be taken into
consideration.
You can refer to the Public Properties list in "Customize the Feature Installation"
• When a property value is changed
on page 93. to -1, the feature is hidden. That
is, it does not display at
6. Change the property's value to -1 (to hide it) or 1 (to force it to display). ActivClient installation, nor does it
display if you try to modify the
installed components using the
7. Repeat the procedure for all other properties you want to edit.
“Add/Remove Programs” applet in
the Windows Control Panel.
8. Save the file.
You can then place this setup program on the network for use by all end users.
You can use either InstallShield Admin Studio or Wize Package Studio to customize
the ActivClient msi setup and to generate Transforms files (MST files).
InstallShield Admin studio and Wize Package Studio allow setup customization (MSI
and MST management) and packages integrity validation. Note
If MSI customization is applied to
InstallShield Admin studio and Wize Package Studio user interfaces hide typical setup the signed MSI, the update will
complexity for the following customization operations: invalidate the MSI digital signature.
For further information, see InstallShield Admin studio and Wize Package Studio
documentation.
ActivClient Setup allows you to customize the behavior of different features one at a Note
time. That is, it is possible to disable or hide a feature during the installation, or force it The ActivClient base services node
to be installed. and feature are a mandatory part of
ActivClient installation and cannot
be removed from it; thus, they do not
The registry keys default values defined in the MSI can also be customized. MSI
have a public property.
customization must be done on the unsigned MSI file (located in the \Admin\Unsigned
setups folder on the ActivClient CDROM). If it is done on the signed MSI, the update
will invalidate the MSI digital signature.
The following table lists the features and their associated public property that you use
to customize the setup program. Their installation values are:
• No installation value = -1
• Default installation value = 0
• Forced installation value = 1
The name of the CSP is customizable using the Public Property CSPNAME. By
default its value is “ActivClient Cryptographic Service Provider.” For example, you can
update this name to take into account product re-branding.
To set the installation directory, use the property INSTALLDIR in the following
command:
Suppress Suppresses prompts for a restart at the end of the installation, but
still prompts the user with an option to restart whenever the
ForceReboot action is present.
where:
where:
These options can be combined with other Windows Installer command line options
as described in the table below. This table is available in the Windows Installer
documentation (http://msdn2.microsoft.com/EN-US/library/aa367988.aspx).
q , qn No UI.
qb Basic UI.
Certificate formats
Install Root Certificates Automatically
These certificate files (with .cer file
extensions) must be "DER encoded
During ActivClient installation, ActivClient checks a folder named Certificates and
binary X.509".
automatically installs the root certificates found in it. To set this up:
"Base-64 encoded binary X.509"
1. Copy the ActivClient .msi file from the CD to the location from which you will files are not supported.
perform the installation.
Note
2. In the folder to which you copy the ActivClient .msi file, create a folder named You need domain administrative
access rights during setup to
Certificates.
properly install root certificates.
3. Copy all root certificate files that must be installed into the Certificates folder.
MSI customization must be done on the unsigned MSI file (located in the
\Admin\Unsigned setups\ActivIdentity Device Installer folder on the ActivClient
CDROM). If it is done on the signed MSI, the update will invalidate the MSI digital
signature.
The following table lists the features and their associated public property that you use
to customize the setup program. Their installation values are as followed:
• No installation value = -1
• Default installation value = 0
• Forced installation value = 1
To properly install the ActivIdentity Serial Smart Card Reader, the COM port on which
the ActivIdentity Serial Smart Card Reader is connected must be specified if it is
different from COM1 (the default value). You can do this either by updating the public
property PORTCOM in the .msi file with the Orca tool or by specifying the COM port
in the command, as in this example:
To set the installation directory, use the property INSTALLDIR in the following
command line
This chapter explains how to deploy ActivClient once you have customized the
options and setup.
You can use Active Directory push to do the following actions in the order given
below:
The following table lists the tasks associated with distributing ActivClient in the order
they are to be performed and where to find information about each task:
2. Create a shared network folder in which to place an ActivClient msi file for each
ActivClient edition to be deployed.
3. Set permissions on the shared network folder to allow access to the distribution
point.
4. Copy each ActivClient edition msi file (ActivClient x86 6.2.msi, ActivClient
x64 6.2.msi, or both) to the distribution point.
Assign a Package
2. Click the Start button, point to Programs, point to Administrative Tools, and
select Active Directory Users and Computers.
4. Click the Group Policy tab, drag the pointer to select the group policy object to
which you want to assign this package, and click Edit.
5. In the console tree, click the plus sign (+) to expand Computer Configuration,
and then click on the plus sign (+) to expand Software Settings.
When the client computer starts, the managed software package is automatically
installed.
Test a Package
To validate the package, you can force package installation on a computer from the
target Organizational Unit (OU) and verify that the installation has completed
successfully. To do so:
2. Click the Start button, point to Settings, and select Control Panel.
3. Select Start, then Settings. From the Control Panel menu, go to the Add/
Remove Programs window, then click Add New Program.
4. In the Add programs from your network list, select the ActivClient edition that
you published, then click Add.
Redeploy a Package
In some cases, you might want to redeploy a package. For example, you can use the
redeploy function to upgrade to a more recent version.
2. Click the Start button, point to Programs, point to Administrative Tools, and
point to Active Directory Users and Computers.
4. Click the Group Policy tab, drag the pointer to select the group policy object with
which you deployed the package, and click Edit.
5. Click the plus sign (+) to expand the Software Settings item that contains the
Software Installation container with the package you used to deploy ActivClient.
7. In the right pane of the Group Policy window, right-click the package, select All
Tasks, and point to Redeploy Application.
9. Close the Group Policy window, click OK, and close the Active Directory Users
and Computers window.
Note
Deploying Using Systems Management Server The information in this section
applies to both the 32-bit and 64-bit
versions of ActivClient. To deploy
This section describes how to deploy ActivClient with Microsoft Systems Management both you must perform the
Server (SMS). procedure twice, remotely installing
the two ActivClient versions to
different set of computers.
As an administrator you can remotely install ActivClient for a set of users or
computers. This reduces the total cost of ownership of ActivClient because
administrators are not required to perform installation in person at every workstation.
Also, users do not require instruction on how to install the product, thereby eliminating
on-site installation support and associated help desk calls.
Here are the tasks to follow in order deploy a program using SMS:
Task Description
Run the advertised program on See "Run an Advertised Program on a Client" on Prerequisites
the client page 118 • Microsoft SMS 2003 (with the
latest service pack) is installed on
the distribution server.
• All client computers are
connected in the same domain.
An SMS package contains files and instructions that direct the software distribution • The product (CD image) is stored
process. Each package contains a program, an msiexec command line that runs on on the server in a shared folder.
each targeted computer, as well as the package source files that are used by the
program when it runs (that is, software installation files).
An advertisement defines the collection of client computers that will receive the
advertisement, the programs they will receive, and the schedule.
You must configure the client computers and the server to create an SMS package.
Before configuring the clients computers, you must first initialize client discovery.
• Modify the logon scripts to start the discovery process when the users log on.
• Run the System Management Installation Wizard on the computer that you want
to discover or to install as a SMS client (SMSman.exe).
1. Start the SMS Administration Console, click the Start button, point to
Programs, point to System Management Server, point to SMS, and point to
Administration Console.
2. In the console tree, click the plus sign (+) to expand Site Settings, and drag the
pointer to select Discovery Methods.
3. Select the discovery method you want to use from the Name list.
The General tab of the Windows Networking Logon Discovery Properties window
is displayed.
4. If not already selected, click the General tab and select both:
The Logon Settings tab of the Active Directory System Discovery Properties
window is displayed.
c. At the Logon point update schedule section, click on the up and down
arrows to select the number of hours you want to pass before the next update.
8. Click on the OK button. The General tab of the Windows User Account Discovery
Properties window is displayed.
b. From the Domain list, highlight the domain you want to target.
The General tab of the Windows User Group Discovery Properties window is
displayed.
11. Repeat step 9 in the General tab of the Windows NT User Group Discovery
Properties.
12. Click OK. The General tab of the Active Directory User Discovery Properties
window is displayed.
14. Manage (add, delete or move) your container in the Active Directory Containers Note
section. Your container can be a selection of
specific users of the domain or just
the whole domain itself.
15. Click OK.
Once the SMS client software is installed, the SMS client service is available on the
client computer. The Control Panel contains the following files:
The following table lists the tasks that you must complete when configuring the server.
It also lists where to find more information about each task.
1. Start the SMS Administrator Console, click the Start button, point to Programs,
point to System Management Server, point to SMS, and point to Administration
Console.
2. In the console tree, click the plus sign (+) to expand Site Settings, and drag the
pointer to select Client Agents.
4. Click the General tab and select the Enable software distribution to clients
option.
Prepare Collections
Use the following procedure to prepare collections:
1. Start the SMS Administrator Console, click the Start button, point to Programs,
point to System Management Server, point to SMS, and point to Administration
Console.
2. In the console tree, click the plus sign (+) to expand Site Settings, and drag the
pointer to select Select Collections.
3. Right click to create a new collection that contains the clients where you want to
remotely install the package, and click OK or use the default collection.
The Collection Properties window for the collection you created is displayed.
4. Click the Membership Rules tab and enter the membership rules.
Create a Package
1. Start the SMS Administrator Console, click the Start button, point to Programs,
point to System Management Server, point to SMS, and point to Administration
Console.
2. In the console tree, click the plus sign (+) to expand Site Database, and drag the
pointer to select Packages. The Package Properties window is displayed.
3. Create a new package by performing the following: Click the General tab if not
already selected.
5. Click on the Data source tab, then specify the directory containing the source
files.
7. To configure a schedule:
a. In the Start box, click the drop-down arrow and select a date and time that
you want to start the distribution points update.
c. In the Recur every section, click the up-down arrows to select a number and
unit of time for the updates to recur, and click OK.
9. Select the Access distribution folder through common SMS package share
option.
12. From the drop-down lists, select the Sending priority (medium by default) and
Preferred sender settings.
14. Select Use package properties for status MIF matching option.
Create a Program
Use the following procedure to create a program.
a. In the Name field, enter a name for the program, for example Install
ActivClient.
b. In the Command line field, enter the command line. This is the Windows
Installer line that you want to be executed on the client.
d. In the After running field, select SMS restarts computer from the drop-
down list.
a. Click the Estimated disk space drop-down to set the number and unit of
measurement for the disk space you estimate is required to store this
program.
b. Click the drop-down arrow next to Estimated run time to set the run time you
estimate is required to run this program.
a. Click the Program can run drop-down arrow to select when the program can
run.
b. Update the check box Allow users to interact with this program according
to your company software deployment policy.
c. Select the Run with administrative rights and Runs with UNC name
options.
a. If this is an update, check the Run another program first check box and click
the drop-down arrows for Package and Program to select the package and
program that must be run before running the current program. For example,
the uninstall program.
To... Then...
Install ActivClient Use one of following command lines depending of your operating
system:
-or-
b. Click the drop-down arrow for When program is assigned to select when the
program will run.
To make a program in a package available to a client, you must advertise the program
to the targeted collection.
About advertisements
An advertisement defines the:
2. If not already selected, click the General tab, and enter the name, package,
program, and collection
3. To remove a program from the list of available programs after a specified period of
time, click the Schedule tab, and click Select Advertisement will expire and
specify the date.
When a new program is advertised, a warning message displays on the client. You
must then run the advertised program on the client.
2. You can use the Advertised Programs Wizard to select the how and where the
desired programs are installed.
3. Click Next to display the Package page, choose the package you want to push,
and click Next.
4. Select an existing package, or create a new package, and then click Next.
9. Select the collection you want to distribute the package, for example All Windows
XP System, and click Next.
10. Select if you want to distribute software to only the specified collection or the
subcollection, and click Next.
The steps to deploy ActivClient using SCCM are similar to those of the SMS
deployment procedure (see "Deploying Using Systems Management Server" on page
103). The deployment process involves a new wizard-based user interface specific to
SCCM with the following steps:
1. Create a package.
This chapter explains how yo upgrade ActivClient and to use the Auto-Update
feature.
ActivClient 6.2 and ActivClient CAC 6.2 (64-bit editions) support upgrade from:
If you had customized the previous ActivClient version (by specifying which
components to install, or by updating some configuration options), relevant
settings will be preserved after the upgrade. However, this is not applicable to
upgrades from ActivCard Gold.
For all other versions not mentioned in the above list, you need to uninstall them
prior to installing ActivClient 6.2.
Upgrading Methods
There are several ways to upgrade ActivClient, depending on how you initially
installed the product:
• If you used the interactive setup, see the ActivClient for Windows Installation
Guide.
• If you deployed a previous version of ActivClient with Microsoft SMS or SCCM,
then you can deploy the new package with the same methodology. For more
information, see "Deploying Using Systems Management Server" on page 103 or
"Deploying using Microsoft System Center Configuration Manager" on page 123.
• If you deployed a previous version of ActivClient with Active Directory Push, then
you can deploy the new package with the same methodology. For more
information, see "Deploying Using Active Directory Push" on page 100.
• If you used the ActivClient Auto-Update feature, see "Using ActivClient Auto-
Update" on page 125.
For a detailed description of the prerequisites and upgrade procedure, see the
ActivClient for Windows Installation Guide.
The Auto-Update system uses a standard Web server to publish ActivClient software
updates. The Auto-Update client uses the HTTP and HTTPS protocols to
communicate with the web server. The Web server can reside on your company
intranet, the DMZ, or on the Internet. You can use any standard web server.
ActivClient periodically checks your company’s Web site for new versions and acts as
Important
follows:
In order to update ActivClient, the
Auto-Update service runs with
If... Then... elevated privileges. Always use the
Auto-Update service with an SSL
ActivClient is already upgraded. Nothing is done. protected AutoUpdate server.
A new version is available. The new version (or patch) is downloaded, and Using the Auto-Update service
then automatically installed. without SSL protection could lead to
malicious software being installed
The Auto-Update client runs with elevated on the client workstation.
privileges as a service. Therefore, even if the end
user does not have enough privileges to run the Use the Auto-Update service
installer, the client software is updated without SSL protection only for
successfully. testing and troubleshooting
purposes.
On the user workstation, the following tasks are performed by the Auto-Update tool:
The Auto-Update server can be configured to apply updates using either the:
• Microsoft Install (using an .msi file) method, see "Configure ActivClient Auto-
Update for MSI Updates" on page 127
• Microsoft Patch (using an .msp file) method, see "Configure ActivClient Auto-
Update for MSP Updates" on page 128
To configure auto-updates for ActivClient 6.2 (32-bit edition) and ActivClient 6.2 (64-
bit edition) on the same server, you must create two different configuration files.
Select the Web server you want to use and, if you are using HTTPS, configure SSL on
the server by following these steps:
Example:
[AUTOUPDATE]
BuildNumber=6.2.0.40
[AUTOUPDATE]
BuildNumber=6.2.0.40
Use the Windows Installer command line when installing patches. Using this option
allows you to control the user interface displayed during the update process.
• Refer to published hot fixes and patches. Patches are cumulative, so only the
latest ones need to be on the Auto-Update server.
• Check the version number needed for the Auto-Update client.
Chapter 6: Uninstallation
In the referenced sections, the following information is provided for each element:
• Element's identifier
• Comment or description of the element
• Consequence of leaving the element of the workstation
• Action you can take to cleanup the machine
Action None. Removing these files may prevent other applications to work
properly.
Comment When using ActivClient User Console, the user interface configuration is
stored on the workstation such as menus or icons. This allows displaying
the User Console with the desired user preference each time it displays.
Setup cannot / does not uninstall such user preferences.
Element HKCU\Software\ActivCard\ActivClient\Diagnostics\
And sub-keys
Element HKCU\Software\ActivCard\ActivClient\GlobalConfig\
And sub-keys
Element HKCU\Software\ActivCard\ActivClient\SmartCardAgent\
And sub-keys.
Element HKLM\SOFTWARE\Microsoft\SystemCertificates\CA\Certific
ates\xxxxx
Comment Root certificates installed by the setup are not removed. To remove
them, use Internet Explorer options.
Consequence None.
Comment None.
Consequence None.
Comment None.
Consequence None.
Comment This file is created when installing a hot-fix or upgrading from ActivClient
5.5. This is a backup of the configuration. Not applicable to ActivClient
x64.
Consequence None (except using disk space). This file is overwritten when installing a
hot-fix.
Action You may delete this file with no impact to the system.
Comment This will occur during an upgrade from ActivClient 5.4. It is a limitation of
ActivClient 5.4. Not applicable to ActivClient x64.
Consequence None (expect using disk space). This directory is no more used.
Action You may delete this directory with no impact to the system.
Comment This will occur during an upgrade from ActivClient 5.4. Not applicable to
ActivClient x64.
Consequence None (except using disk space). This file is overwritten when installing
ActivClient 6.2.
Action You may delete this file with no impact to the system.
Comment This will occur during an upgrade from ActivClient 5.4. It is a limitation of
ActivClient 5.4. Not applicable to ActivClient x64.
Action You may delete this directory (if empty) with no impact to the system.
Note that the directory may be used by other ActivIdentity applications
(if it is not be empty), in which case you must not delete it.
Comment This will occur during an upgrade from ActivCard Gold 3.0. Not
applicable to ActivClient x64.
Action You may delete this file with no impact to the system.
Element HKLM\SYSTEM\CurrentControlSet\Services\Eventlog\Applic
ation\ ActivCard Auto-Update Service
HKLM\SYSTEM\CurrentControlSet\Services\Eventlog\Applic
ation\ ActivClient Authentication
HKLM\SYSTEM\CurrentControlSet\Services\Eventlog\Applic
ation\ ActivClient Event Service
Comment These registry keys are used by Microsoft event viewer to display
ActivClient information.
Consequence None. As the file are no longer stored on the machine, event viewer will
display only ID information (expected behavior as ActivClient is no
longer present).
Action You may delete these registry keys with no impact to the system.
Element HKEY_CLASSES_ROOT\TypeLib\{14693D63-AD77-11D3-
A629-00104BB6307C}
And sub-keys
Action You may delete these registry keys with no impact to the system.
Element HKLM\SOFTWARE\GSC\Policies\PIN\Authentication\ActivC
ard\Include
"lsass"="C:\\WINNT\\system32\\lsass.exe"
"acdiagcd"="C:\\Program
Files\\ActivCard\\ActivClient\\acdiagcd.exe"
Comment This will occur during an upgrade from ActivClient 5.4. It is a limitation of
ActivClient 5.4. Not applicable to ActivClient x64.
Consequence None. These registry keys are used only by ActivClient. Installing
ActivClient will overwrite this information.
Action You may delete these registry keys with no impact to the system.
Element HKLM\SOFTWARE\Microsoft\Cryptography\Calais\SmartCar
ds\ActivCard ActivClient (Oberthur CosmopolIC 32K V4 Fast
ATR)
HKLM\SOFTWARE\Microsoft\Cryptography\Calais\SmartCar
ds\ActivCard ActivClient (Oberthur CosmopolIC 32K V4)
HKLM\SOFTWARE\Microsoft\Cryptography\Calais\SmartCar
ds\ActivCard ActivClient (Oberthur CosmopolIC 64K v5)
HKLM\SOFTWARE\Microsoft\Cryptography\Calais\SmartCar
ds\ActivCard ActivClient (Oberthur CosmopolIC 64K V5.2)
And sub-keys
Comment This will occur during an upgrade from ActivClient 5.4. Not applicable to
ActivClient x64.
Consequence None. The error message that displays when trying to use these cards
for a Windows PKI logon may differ, but it is no longer possible to use
them (as ActivClient is uninstalled).ient. Installing ActivClient will
overwrite this information.
Action You may delete these registry keys with no impact to the system.
Element HKLM\SOFTWARE\GSC\Cryptography\Certificate
Registration\ActivCard
"AutoRegOutlook"=dword:00000001
Comment This will occur during an upgrade from ActivClient 5.4. Not applicable to
ActivClient x64.
Consequence None. These registry keys are used only by ActivClient. Installing
ActivClient will overwrite this information.
Action You may delete these registry keys with no impact to the system.
Element HKLM\SYSTEM\CurrentControlSet\Services\acautsrv
Comment This will occur during an upgrade from ActivClient 5.4. Not applicable to
ActivClient x64.
Consequence None. As sub-keys are not set, Windows ignores this service.
Action You may delete these registry keys with no impact to the system.
Element HKLM\Software\ActivCard\ASPCOM
Comment This will occur during an upgrade from ActivCard Gold for CAC 2.2. Not
applicable to ActivClient x64.
Consequence None. These registry keys are used only by ActivClient. Installing
ActivClient will overwrite this information.
Action You may delete these registry keys with no impact to the system.
Comment This will occur during an upgrade from ActivCard Gold or ActivClient. It
is a limitation of ActivCard Gold and previous versions of ActivClient.
Not applicable to ActivClient x64.
Consequence None. No more files (used only by ActivClient) are stored in these
directories.
Action You may remove these values from PATH with no impact to the system.
Consequence None. Windows will try to find the target when trying to use them (just
cancel the dialog box).
Action You may remove these shortcuts with no impact to the system
Element C:\Config.Msi\xxx.rbf
Comment Windows Installer 3.0 backup files when installing an ActivClient hot fix in
MSP format (see http://filext.com/detaillist.php?extdetail=RBF for
further information).
Consequence None (except using disk space). Files will be overwritten by Windows
Installer when installing another MSP.
Element C:\WINDOWS\Prefetch\
ACACHSRV.EXE-1012A658.pf
ACADVCFM.EXE-08294250.pf
ACADVCFM.EXE-2D5D2F84.pf
ACAUTOUP.EXE-25F623E1.pf
ACCOCA.EXE-0B1B0F17.pf
Note
ACCRDSUB.EXE-35F4282C.pf
ACDIAGWZ.EXE-302FC847.pf The identifers (such as,
ACEVENTS.EXE-0E8FEC57.pf 1012A658) of the .exe files will
vary for each workstation but the
ACREGCRT.EXE-0634B271.pf
names will be the same (such as,
ACSAGENT.EXE-309F3296.pf
acachsrv.exe).
ACTSWZDG.EXE-2B2673C5.pf
ACUSCONS.EXE-0613D964.pf
AIPINCH.EXE-19F1D0A8.pf
Action None. It is possible to delete all files in this directory (see http://
support.microsoft.com/default.aspx/kb/915163/us), Windows will
recreate automatically all necessary files whenever needed.
Element HKLM\SYSTEM\ControlSet001\Services\Eventlog\Appl
ication\ActivCard Auto-Update Service
HKLM\SYSTEM\ControlSet001\Services\Eventlog\Appl
ication\ActivClient Authentication
HKLM\SYSTEM\ControlSet001\Services\Eventlog\Appl
ication\ActivClient Event Service
HKLM\SYSTEM\ControlSet002\Services\Eventlog\Appl
ication\ActivCard Auto-Update Service
HKLM\SYSTEM\ControlSet002\Services\Eventlog\Appl
ication\ActivClient Authentication
HKLM\SYSTEM\ControlSet002\Services\Eventlog\Appl
ication\ActivClient Event Service
Consequence None.
Action Do not remove these registry keys. This may prevent Windows to
boot to the last known configuration.
• Supported environments
140 Environment
• Outlook security profile configuration and Publish to GAL, on card insertion
142 Outlook Security Profile
Configuration • Auto-Contact
156 Auto-Decrypt The purpose of the ActivClient Microsoft Outlook Usability Enhancements is to
ease the configuration and usage of Microsoft Outlook for email signature,
encryption and decryption using certificates stored on a smart card.
Environment
This section details the ActivClient Microsoft Outlook Usability Enhancements
environment, including supported software versions and configurations.
Overview
The environment involved in email exchanges using Microsoft Outlook and ActivClient
Outlook Usability Enhancements are:
• The end user’s Microsoft Outlook client (on any supported Windows platform), (for
the complete list of supported versions, see "Microsoft Outlook Email Clients" on
page 141).
• Microsoft Outlook Exchange Server (for the complete list of supported versions,
see "Microsoft Exchange Server" on page 142).
• Emails from and to any email client on any platform (for examples, see "Emails
From and To Any Email Client on Any Platform" on page 142).
There is no limitation regarding the email client sending the incoming managed emails
and receiving the outgoing managed emails.
• Microsoft Outlook
• Outlook Web Access: OWA as a feature of Exchange 2003 SP2 and 2007 (SP1
optional)
• Outlook Express
• Windows Mail
• Netscape Messenger
• AppleMail
• Microsoft Entourage (on MacOS)
• Thunderbird
1. The view the security settings for Outlook 2007, open the Trust Center.
Outlook 2003
If you use Outlook 2003, you will
find the same information in the
Security tab of the Options dialog
box.
• Settings from the user’s Outlook profile related to the Security Profile:
– Security settings name
– Signature certificate and hash algorithm
– Cryptography format
• Encryption and signature options:
– Encryption certificate and encryption algorithm
– Outgoing email and attachment encryption
– Outgoing email signature and format for signature sent
– S/MIME receipt request for outgoing emails
• Additional settings fully managed by ActivClient:
– Automatically add sender’s certificates to Outlook Contacts
– Outlook Auto-Contact Destination Folder
– Automatically decrypt encrypted e-mails
– Add Outlook Security icons in the compose e-mail windows
These settings are configured automatically at smart card insertion depending on the
smart card inserted and ActivClient MS Outlook Usability Enhancements settings and
environment conditions as described in following section.
• A signature certificate on the smart card inserted meets the following conditions (if
several certificates meet the conditions, the most recent one (Valid From date) is
selected):
– Key usage - the certificate key usage must contain the value “Digital
Signature”
– Extended Key usage - the certificate extended key usage must contain the
value "Secure Email" or "<All>"
– Validity - current date being between Valid From and Valid To date
– User account - the certificate email address corresponds to the email address
configured for the Exchange account. The comparison is performed by
retrieving the email address in the certificate from the subjectaltName
attribute, or if missing, from the “E=” value in the subject attribute. On the
Exchange side, the comparison is performed by checking all email addresses
defined in the Exchange account (prefixed by “SMTP:” or “smtp:”). This allows
supporting email aliases.
– The certificate is valid (the certificate status is verified via CRL checking). A
configuration option allows some flexibility:
- CRL check may be disabled
- CRL check may be enabled and enforced
- CRL check may be enabled but not enforced (an event is then created
mentioning that the certificate is used even though CRL check failed: timeout,
certificate expired or on hold).
The description above applies if the workstation is connected to the corporate network
(Active Directory is accessible). If it is not and the Active Directory is not accessible,
then the automatic configuration is still performed but with two differences:
Once the conditions above are met, the security profile and the encryption/signature
options are always updated:
Note
• If a security profile named “ActivClient Certificates” already exists, it is overwritten. The security profile is updated only
The default profile setting is unchanged if it was: if the user certificates are updated. It
is not updated if only the profile
– The default profile, it remains the default profile policies (such as "Add digital
– Not the default profile; it is not set as the default profile signature to outgoing messages")
are updated.
• If no security profile named “ActivClient Certificates” exists, the profile is created
and set as default.
• All other security profiles (not named “ActivClient Certificates”) are not altered.
The profile creation or update is executed whether Outlook is running or not, yet
Outlook needs to be restarted to see the updates in effect.
Send clear text signed message Value configured in ActivClient MS Outlook Usability
when sending signed messages Enhancements setting “Send clear text signed message
when sending signed messages”. Default is enabled
Request S/MIME receipt for all S/ Value configured in ActivClient MS Outlook Usability
MIME signed messages Enhancements setting “Auto-request return receipt for
outgoing emails”. Default is disabled
‘Default security setting for this Checked (always – not configurable through
cryptographic message format’ ActivClient)
check box
‘Default security setting for all Checked (always – not configurable through
cryptographic messages’ check ActivClient)
box
Signing Certificate selected The selected certificate is the most recent certificate
(the most recent Valid From date) from the smart card Note
that verifies the conditions: The security profile is updated only
if the user certificates are updated. It
• Key usage - the certificate key usage must contain is not updated if only the profile
the value “Digital Signature” policies (such as "Add digital
• Extended Key usage - the certificate extended key signature to outgoing messages")
usage must contain the value "Secure Email" or are updated.
"<All>"
• Validity - current date being between Valid From
and Valid To date
• User account (only if workstation is online) - the
certificate email address corresponds to the email
address configured for the Exchange account. The
comparison is performed by retrieving the email
address in the certificate from the subjectaltName
attribute, or if missing, from the “E=” value in the
subject attribute. On the Exchange side, the
comparison is performed by checking all email
addresses defined in the Exchange account
(prefixed by “SMTP:” or “smtp:”). This allows
supporting email aliases
• The certificate is valid (the certificate status is
verified via CRL checking). Only if workstation is
online. This CRL check can be configured with an
ActivClient policy
Encryption certificate selected The selected certificate is the most recent certificate
(the most recent Valid From date) from the smart card
that verifies the conditions: Note
The security profile is updated only
• Key usage - the certificate key usage must contain if the user certificates are updated. It
the value “Key Encipherment” is not updated if only the profile
• Extended Key usage - the certificate extended key policies (such as "Add digital
usage must contain the value "Secure Email" or signature to outgoing messages")
"<All>" are updated.
• Validity - current date being between Valid From
and Valid To date
• User account (only if workstation is online) - the
certificate email address corresponds to the email
address configured for the Exchange account. The
comparison is performed by retrieving the email
address in the certificate from the subjectaltName
attribute, or if missing, from the “E=” value in the
subject attribute. On the Exchange side, the
comparison is performed by checking all email
addresses defined in the Exchange account
(prefixed by “SMTP:” or “smtp:”). This allows
supporting email aliases
• The certificate is valid (the certificate status is
verified via CRL checking). Only if workstation is
online. This CRL check can be configured with an
ActivClient policy
Add Outlook Security icons in the Value configured in ActivClient MS Outlook Usability
compose e-mail windows Enhancements setting “Add Outlook Security icons in
the compose e-mail windows”. Default is enabled.
Applicable to MS Outlook 2000 and MS Outlook 2002
only.
The ActivClient Publish Certificate to GAL feature consists of publishing the user's
encryption certificate used for secure e-mail to the user's object in the Active
Directory. This allows other Exchange users using Outlook or Outlook Web Access to
automatically access the encryption certificate to send the user encrypted emails.
The feature is the equivalent of the “Publish to GAL” option that can be found on the
Outlook Security tab of the Options dialog box (Outlook 2003) or in the Trust Center
(Outlook 2007). Note
In full Microsoft environments (that
Profile Selection and Email Account is, using Windows-based CA), the
Active Directory attributes are
automatically updated when the
The email account selection is the same as for the security profile update: applicable
certificates are created.
to Exchange accounts (that is, not applicable for Outlook accounts configured for a
third-party server or using a POP3 configuration). In this case, the ActivClient Publish
to GAL and the Outlook Publish to
GAL features are not necessary. On
Configuration the contrary, they could lead to
mismatched certificates. This is why
The “Automatically publishes certificates to the Global Address List” setting is the ActivClient Publish to GAL
applicable only if the setting “Setup Email certificates in Outlook on card insertion” is feature is disabled by default.
enabled (that is, to enable ActivClient Publish to GAL, the administrator must
configure both settings to 1).
Workflow
On card insertion, the certificate publication to the GAL is executed after the Outlook
security profile automatic update:
If the smart card content is appropriate, the Outlook security profile is updated (see
"Security Profile Updated Values" on page 147), then, if the Publish to GAL feature is
enabled, ActivClient publishes the user's encryption certificate that has been set in the
Outlook security profile to the GAL by updating the certificate in the following
locations:
Interactive Process
In addition to the Publish to GAL operations described above (performed in the
background on card insertion), an option is available in the ActivClient User Console
(in the Tools, Advanced menu) that provides a similar feature which.
• Performs both the Outlook profile configuration and the Publish to GAL as
described above (whether these features are enabled or disabled in the
ActivClient configuration).
• Displays success or errors via dialog boxes (in addition to the Event Viewer).
• If necessary, it prompts the user to authenticate to the Active Directory.
• The CRL checks follow the same configuration options as used in the automatic
mode.
Audit Note
You can also audit changes
performed directly in Active
ActivClient enables the auditing of the two operations described earlier: Outlook
Directory (changes performed
security profile configuration and Publish certificate to GAL. during the Publish to GAL
operation).
ActivClient audits the successes and failures of these operations and logs them in the
Windows Event Viewer. To do so, on the domain controller,
open the "Default Domain Controller
Security Settings", Security
To be notified of unexpected events, we recommend filtering the audited information Settings, Local Policies, Audit
using the Event Viewer filters. Policy, and enable "Audit directory
service access".
By default, the ActivClient auditing function is enabled. To disable the option, see
Then, for each user, specify the
"Enable audit for Outlook security profile creation and Publish to GAL" on page 43. attributes that should be audited:
open the Advanced Security
The ActivClient events are formatted following Microsoft logging guidelines and are: Settings for the user, Auditing tab,
and select "Write
• On Windows XP: userSMIMECertificate" and "Write
userCertificate".
– Logged in the Application section of the Windows Event Viewer display
– Labeled with ActivClient as the Source For further information, see the
Microsoft documentation.
• On Windows Vista, Windows 7, Windows Server 2003, Windows Server 2008:
– Logged in the ActivIdentity section of the Applications and Services Logs of
the Windows Event Viewer
– Labeled with ActivClient as the Source
• Event Type:
– Information
– Warning
– Error
• Event ID
For the complete list of ID codes, see Table7.2 on page 153.
• Event Description
Specifies the username and domain; and reason of failure when applicable.
515 Warning Outlook Profile Update CRL check failed for signing certificate for the following
reason: Revoked, Offline, or Other
516 Warning Outlook Profile Update CRL check failed for encryption certificate for the following
reason: Revoked, Offline, or Other
517 Warning Publish to GAL CRL check failed for signing certificate for the following
reason: Revoked, Offline, or Other
518 Warning Publish to GAL CRL check failed for encryption certificate for the following
reason: Revoked, Offline, or Other
521 Warning Publish to GAL Your certificates were not published to the Global Address
List.To publish successfully, start the Publish to GAL operation
again, and enter the PIN when prompted to do so.
771 Error Outlook Profile Update No valid email address in signing certificate
772 Error Outlook Profile Update No valid email address in encryption certificate
774 Error Outlook Profile Update CRL check failed for signing certificate for the following
reason: Revoked, Offline, or Other
775 Error Outlook Profile Update CRL check failed for encryption certificate for the following
reason: Revoked, Offline, or Other
776 Error Publish to GAL CRL check failed for signing certificate for the following
reason: Revoked, Offline, or Other
777 Error Publish to GAL CRL check failed for encryption certificate for the following
reason: Revoked, Offline, or Other
778 Error Publish to GAL Your certificates were not published to the Global Address
List. MAPI error code
Auto-Contact
When the “Automatically add sender’s certificates to Outlook Contacts” policy is
enabled (see page 45), ActivClient enables saving your contact certificate to your
Outlook account.
When you receive a signed email, the encryption email of the sender is attached to the
email – when you open this email, ActivClient allows you to automatically save this
certificate to the “Contact” associated to the sender. This contact is created or
updated in a specific Contacts folder that you can also configure: “Outlook Auto-
Contact Destination Folder” (see page 45).
Depending on the scenario, ActivClient asks the user to confirm the operation:
• Scenario 1: If a contact already exists in the Contacts folder with the same email
address and without any associated certificate, the following window is displayed.
The user can view the certificate before adding it to the Contacts. It then becomes
the default certificate for this contact.
• Scenario 2: If a Contact already exists in the Contacts folder with the same email
address and has a default certificate that is different from the received email
encryption certificate, the following window is displayed.
The user can easily compare the 2 certificates. By accepting the update, the new
certificate is added to the Contact and it becomes the default certificate for this
Contact.
• Scenario 3: If a Contact already exists in the Contacts folder with the same email
address and has a default certificate identical to the received email encryption
certificate, ActivClient does not modify the contact.
The user can confirm that the new Contact should be created in the Contacts
folder. If the user accepts and creates the Contact, then another window displays
to confirm the addition of the certificate to this user (same as in scenario 1). The
user can view the certificate before accepting that it is added to the Contact. It
then becomes the default certificate for this Contact.
Auto-Decrypt
When the “Automatically decrypt encrypted e-mails” policy is enabled (see page 46),
ActivClient saves a decrypted version of encrypted emails in order to provide access
to the email later, even when the decryption key is no longer available. This feature is
specifically useful for deployments that do not have a key backup and recovery
mechanism in place.
2. Email and attachment are decrypted (it might require PIN authentication).
3. A decrypted copy of the encrypted email is saved in the current folder. Any, email Note
digital signature is preserved. Depending on ActivClient PIN
caching configuration, PIN
4. The encrypted version of the email is moved to the Deleted Items folder. authentication might be required
several times.
These steps apply to the initial email, regardless of its location, including when the
initial email is in the Deleted Items folder. In the latter case, both the decrypted and
encrypted versions of the email are located in the Deleted Items folder at the end of
the process.
In This Chapter The purpose of ActivClient PIN Caching service is to enable users to use the
smart card without entering the PIN for every card operation, while preserving the
157 Overview security of the smart card solution.
158 Enabling or Disabling ActivClient PIN Cache is configurable to enable customers to determine the best
PIN Caching
compromise between security (more PIN prompts) and usability (less PIN
159 Per Session or Per prompts), as needed for their specific business requirements.
Process PIN Caching
Chapter 2 provides a list of the policies relevant to PIN Cache configuration
161 PIN Cache Timeout
(starting on page 31). This chapter provides more in-depth information about this
163 Force PIN Re- ActivClient component.
authentication
Some smart card middleware leave the card open after a PIN entry, meaning that
any application can then use the card without the user entering the PIN again.
This provides a high level of usability (only one PIN entry is required until the card
is removed from the reader), but lacks in terms of security. For example, a virus
or Trojan horse could use the card to perform an authentication to a secure site,
or sign a financial transaction, or decrypt sensitive documents – without the
user’s consent or even knowledge. Non repudiation cannot be guaranteed.
Other middleware might “close” the card after each operation, meaning that once
the user has entered the PIN and the card operation has been performed (for
example an authentication to a secure site), the card is closed. The user will need
to enter the PIN again for the next card operation: access to another site, sign a
transaction, etc. As some functional operations require several actual card
operations (for example, a Windows smart card logon requires four digital
signatures), this can easily lead to repeated PIN prompts, causing user
frustration. This model is very secure, but highly inconvenient to the user.
ActivClient PIN cache has been designed to address these two concerns:
• The PIN authentication status is reset (that is, the card is closed) after the
user has authenticated to the card with the PIN, the PIN entry could be in
ActivClient user interface or in a third-party interface (such as Windows
Logon or Firefox).
• The PIN value is cached securely by ActivClient until the user logs off, the
workstation is locked, the workstation shuts down, the card is removed, or the PIN
cache timeout is reached.
• ActivClient seamlessly re-authenticates to the card using the cached PIN before
each PIN protected operation.
• The PIN authentication status is reset (that is, the card is closed) after each PIN
protected operation.
• ActivClient PIN cache includes policies to further customize whether the PIN
cache will submit the PIN seamlessly to applications, or whether it will request the
user to enter the PIN – this enables a more granular control of the PIN prompts.
For example, you can configure ActivClient to force a PIN prompt for specific
applications (for example, Microsoft Outlook), or for specific operations (for
example, signature operations).
The default ActivClient behavior is to enable the PIN caching; this provides a higher
level of security and usability.
When you disable the ActivClient PIN caching, ActivClient does not cache the PIN and
leaves the card open after the PIN authentication – until the user removes the card
from the reader, or until an application specifically logs off / disconnects the card.
The ActivClient policies described in this chapter are only applicable if the PIN caching
service is enabled.
No = 0
Type DWORD
ActivClient PIN cache can be configured to apply either per session (this refers to the
Windows session) or per process (this refers to a Windows process).
Per session mode (the default configuration) allows all the processes in the user’s
Windows session to share the same PIN cache (that is, user authentication is required
once for the entire session whatever the applications used during the session).
In per process mode, the PIN cache is separate for each Windows process (that is,
users need to enter their PIN at least once per process that will use the card).
In both modes, you can further customize the PIN cache behavior for specific
applications by using the Include list, Exclude list and Open card list (see the following
tables).
Values Yes = 1
No = 0 (default)
Type DWORD
1. Set ‘AllowPerProcess’ to 1.
3. Send a signed email, you are prompted for the PIN, and you type the correct PIN.
4. Send a second signed email, you are not prompted for the PIN because it is
already cached.
5. Close Outlook.
7. Send a signed email, you are prompted for the PIN again because it is a different
Windows process.
The same behavior would occur if one process was Outlook and the other was
Internet Explorer (running simultaneously), or if two Internet Explorer processes were
running simultaneously.
1. Set ‘AllowPerProcess’ to 0.
4. Send a second signed email, you are not prompted for the PIN because it is
already cached.
5. Close Outlook.
7. Send a signed email, you are not prompted for the PIN because it is cached and
shared between processes.
3. Send a signed email, you are prompted for the PIN, and you type the correct PIN.
4. Send a second signed email, you are not prompted for the PIN because it is
already cached.
5. Close Outlook.
6. Open the session to Terminal Server. In this remote session, open Outlook.
7. Send a signed email, you are prompted for the PIN again because it is cached
only for the local workstation. ActivClient running on Terminal Server has a
separate Windows session with its separate PIN cache.
Whether the PIN cache is configured per session or per process, the PIN cache is set
to expire after a period of smart card inactivity. This is designed to guarantee that, if a
user leaves their desk without locking their workstation, an intruder would not be able
to perform any PIN-protected operation with the smart card.
The timeout corresponds to the period (in minutes) without any PIN protected
operation performed on the smart card. When the timeout expires, the PIN is deleted
from the PIN cache. The user will be prompted for the PIN at the next PIN-protected
operation.
Note that the timer is reset each time a PIN protected operation occurs.
Values 15 (default)
Type DWORD
Exceptions:
• ‘Minutes’=0
When ‘Minutes’ is set to 0, the expiration is immediate. In this case, the user will
see a PIN prompt every time a protected card operation occurs, regardless if the
PIN was previously cached. This configuration might cause some issues with
applications that manage their own user interface and do not allow ActivClient to
prompt the user for PIN authentication as often as needed.
However, processes in the ‘Include’ list (described below) have a special behavior
when ‘Minutes’ is set to 0. In this case, the PIN cache reacts internally as if
‘Minutes’ is set to 0x80000000 and sets an infinite expiry on the credential. The
PIN stored in the cache is then only accessible by processes in the ‘Include’ list.
Processes not in the ‘Include’ list are not able to access the cached PIN. Note that
this is required for example by the Windows processes involved in Windows
Logon (which performs four digital signature operations and only one PIN prompt
is used, displayed by Windows).
• ‘Minutes’=0x80000000
When ‘Minutes’ is set to 0x80000000, the maximum PIN inactivity period is
infinite. In this case, no timer is maintained: the PIN cache is cleared at
workstation lock, Windows log off, Windows shutdown, Windows session
disconnect, card removal and explicit card logout.
3. Send a signed email, you are prompted for the PIN, and you type the correct PIN.
5. Send a second signed email, you are not prompted for the PIN because it is
already cached.
7. Send a third signed email, you are not prompted for the PIN because it is already
cached.
9. Send a fourth signed email, you are prompted for the PIN because the PIN cache
timeout expired and the cached PIN was deleted.
Various policies allow ActivClient to provide access, or deny access, to the cached
PIN for certain types of card operations and not for others, offering greater granularity
of control when PIN caching is used.
If an organization decides that private key signing operations must be treated in a very
secure manner, then setting ‘Sign’=0 forces the user to enter the PIN every time a
signing operation occurs, regardless if the PIN is already cached. The same behavior
can be specified for private key decryption and other (that is, everything except
signing and decryption) PIN-protected operations.
The ‘Sign’ policy means controls access to the cached PIN for digital signature
operations. If the policy is disabled (‘Sign’ = 1, the default configuration), then the user
will see a PIN prompt depending only on other PIN cache policies (for example, per
process, timeout, etc). If the policy is enabled (‘Sign’ = 0), then the user will see a PIN
prompt for every digital signature operation.
Policy name: Always prompt for the PIN code before performing any private key Note
signature operation Per FIPS 201 compliance, for PIV
cards used in PIV mode (it does not
Description apply to CAC PIV cards used in
Forces PIN authentication for any private key signature
GSC-IS mode), the digital signature
operation.
key is configured for PIN Always.
Values Yes = 0
This means that a user will see a
No = 1(default) PIN prompt every time the digital
signature key is used.
Registry Key HKEY_LOCAL_MACHINE\Software\GSC\Policies\PIN\
Authentication\Sign This behavior is enforced in
ActivClient. It is independent of this
Type DWORD ActivClient PIN cache policy; this
means that for PIV cards, the ‘Sign’
policy does not matter; ActivClient
will always behave as if ‘Sign’ was
The ‘Decrypt’ policy controls access to the cached PIN for decryption operations. If the
enabled (set to 0).
policy is disabled (‘Decrypt’ = 1, the default configuration), then the user will see a PIN
prompt depending only on other PIN cache policies (for example, per process,
timeout, etc). If the policy is enabled (‘Decrypt’ = 0), then the user will see a PIN
prompt for every decryption operation.
Policy name: Always prompt for the PIN code before performing any private key
decryption operation
Values Yes = 0
No = 1(default)
Type DWORD
The ‘Other’ policy controls access to the cached PIN for all other operations requiring
a PIN (that is, operations other than digital signature and decryption operations). This
applies for example to reading PIN-protected personal information stored on PIV
cards. If the policy is disabled (‘Other’ = 1, the default configuration), then the user will
see a PIN prompt depending only on other PIN cache policies (for example, per
process, timeout, etc). If the policy is enabled (‘Other’ = 0), then the user will see a
PIN prompt for every PIN-protected operation other than signature and decryption.
Policy name: Always prompt for the PIN code before performing any other operation
Note
Description Forces PIN authentication for any PIN protected operation ActivIdentity recommends keeping
except for private key signature and private key decryption the default setting (Other = 1). If you
operations. enable this option (Other = 0), the
user experience might not be
Values Yes = 0 acceptable, as some functional
operations (1 user click) cause
No = 1(default) several card-level operations
Registry Key (several read commands), which
HKEY_LOCAL_MACHINE\Software\GSC\Policies\PIN\
would cause repeated PIN prompts
Authentication\Other
to display.
Type DWORD
3. Send a signed email, you are prompted for the PIN, and you type the correct PIN.
4. Decrypt an encrypted email that you received, you are not prompted for the PIN
because it is already cached.
5. Send a second signed email, you are prompted for the PIN because the sign
operation is not allowed to access the cache.
6. Decrypt a second encrypted email, you are not prompted for the PIN because it is
already cached.
8. Access the personal information (CAC and PIV cards), you are not prompted for
the PIN because it is already cached because it is already cached.
This policy enables organizations to improve the security with regards to specific un-
trusted applications.
The complete full path name of the application must be in the ‘Exclude’ list to enable
this feature.
In the default configuration, the Exclude policy is disabled and the Exclude list is
empty.
Values Yes = 1
No = 0 (default)
Type DWORD
Description Lists the applications that are not allowed access to the PIN
cache. The applications listed behave as if PIN caching was
disabled.
Type REG_SZ
5. Send a signed email, you are prompted for the PIN, and you type the correct PIN.
6. Send a second signed email, you are prompted for the PIN again because
processes in the 'Exclude' list are never allowed to access the PIN cache.
Include List
Applications listed in the 'Include' list always have access to the PIN cache, regardless
of other ActivClient PIN cache policies.
This policy enables organizations to improve the ease of use with regards to specific
trusted applications.
The complete full path name of the application must be in the 'Include' list to enable
this feature.
In the default configuration, the Include policy is enabled and the Include list contains
specific Windows and ActivClient processes that are considered trusted.
No = 0
Type DWORD
Description Lists the applications that have permanent access to the PIN
cache, including in the per-process mode.
Type REG_SZ
Exceptions:
• Processes in the 'Include' list also have a special behavior with regards to the PIN
cache timeout ('Minutes' registry entry). When 'Minutes' is set to 0, and when we
consider a process in the 'Include' list, the PIN cache reacts internally as if
'Minutes' is set to 0x80000000 and sets an infinite expiry on the credential. The
PIN stored in the cache is then only accessible by processes in the 'Include' list.
Processes not in the 'Include' list are not able to access the cached PIN. Note that
this is required for example by the Windows processes involved in Windows
Logon (which performs four digital signature operations and only one PIN prompt
is used, displayed by Windows).
• The 'Exclude' list has higher priority than the 'Include' list. This means that when a
process is part of both 'Exclude' and 'Include' lists, it has the behavior of an
'Exclude' list process and the presence of the process in the 'Include' list is
ignored.
3. Set 'Sign' to 0, 'Decrypt' to 0 and 'Other' to 0 (meaning that all card operations
would require a PIN prompt).
5. Send a signed email, you are prompted for the PIN, and you type the correct PIN.
6. Send a second signed email, you are not prompted for the PIN because
processes in the 'Include' list are always allowed to access the PIN cache.
OpenCard List
Applications listed in the 'OpenCard' list are allowed within a limited period (two
seconds) to perform successive PIN protected operations without resetting the card
authentication status (that is, without "closing" the card) after each operation. The
authentication state of the card is actually reset (the card is "closed") following a
period of two seconds without any card operation.
This policy improves the performance of certain critical and trusted applications that
perform many protected card operations in a very short period of time (such as the
Windows Logon process).
The complete full path name of the application must be in the 'OpenCard' list to enable
this feature.
In the default configuration, the OpenCard policy is enabled and the OpenCard list
contains specific Windows processes that are considered trusted and that require
multiple card operations without intermediate PIN prompts.
No = 0
Type DWORD
3. Perform a Windows smart card (PKI-based) logon operation, enter the PIN at the
Windows prompt.
5. Two seconds pass before the Windows desktop is fully enabled and the
authentication state of the card is reset.
7. Send a signed email, you are not prompted for the PIN because it is already
cached.
In This Chapter The purpose of ActivClient Smart Card Auto-Update feature is to automate
updating the smart card content, for cards managed by ActivID Card
173 Overview Management System (CMS). This removes the need for administrators to send
emails to end users, asking them to click on a link in order to access the CMS self
174 Configuration help portal.
174 Card Auto-Update
Policies
Overview
180 Card Auto-Update
Experience ActivClient Smart Card Auto-Update is a component providing a high level of
integration with ActivIdentity card management system: ActivID CMS version 4.2
and higher. When card updates are available in CMS (for example, a
replacement certificate for a certificate about to expire, or the addition of new
certificates on the card), administrators would typically need to inform users to
access CMS self help portal; this would traditionally be achieved by sending
emails to end users, with a link to the relevant URL. This model has its limits, as it
requires users to actually read emails, and to click on the URL when they are
connected to the corporate network.
The smart card auto update component automates the process: when a smart
card is inserted, ActivClient automatically contacts CMS to determine if a card
update request is available for the smart card. This process happens on a regular
basis (by default, weekly), to guarantee that updates happen in a timely manner.
If no update is available, there is no disruption to the user: the process happens
behind the scenes. If an update is available, ActivClient lets the user decide if the
update should be performed or not.
For example, if the user is about to disconnect from the network, about to remove
the card, or if it's just "a bad time", ActivClient offers to cancel the update. In this
case, ActivClient will offer the update again a bit later (after the next card
insertion).
If the user is ready to perform the update, ActivClient opens a window connected
to the CMS self-help portal. The user can then authenticate and easily perform
the card update. At the end of the process, the card is ready for usage with the
updated content, and with minimal disruption to the user's activities.
In addition, users can start this card update process from the ActivClient User
Console (from the Tools, Advanced menu). This provides a mechanism to
connect to CMS to check for card updates without waiting for the recurrent
(weekly) automatic check. This capability is mostly designed for troubleshooting
purposes.
Configuration
If an organization intends to use the card auto-update feature, they should follow
these steps:
1. Configure CMS to enable the card auto-update (see the CMS technical
documentation).
2. Install the ActivClient "Card auto-update with ActivID CMS" feature on user
workstations (it is not installed in the default ActivClient setup).
4. Configure the user workstations to support CMS self help portal (My Digital ID
Card). See the CMS documentation for details for the following steps.
You can do this either in advance (for example, installing the ActiveX at the
same time you install ActivClient), or you can automatically install the ActiveX
component when the user first accesses CMS My Digital ID Card (this might
not be possible depending on your workstation configuration - for example, if
users do not have local administrative privileges, they migt not be able to
install the ActiveX component - the specific behavior depends on the user's
access rights, Windows UAC configuration and Internet Explorer version and
security configuration).
When the "Card auto-update with ActivID CMS" component is installed during
ActivClient setup, it:
However, card auto-update is operational only after you configure the CMS
connection information with the data specific to your environment.
Type DWORD
The ActivClient card auto-update feature contacts CMS to check if a card update
request is available for the inserted smart card. This check starts shortly after card
insertion.
For corporations that use the smart card for Windows Logon, we expect that many
users will insert their card at about the same time, when they arrive at their desk and
connect to the network (between 8am and 9am). As many processes start at Windows
Logon, they compete for resources. To avoid this resource constraint, ActivClient
delays the connection to CMS by a few minutes. Also, to avoid overloading CMS with
too many simultaneous connections, ActivClient automatically spreads the load:
ActivClient will contact CMS after a randomized number of minutes after card
insertion; this random number is between 0 (that is, at card insertion) and a
configurable number. The default is 120 minutes (two hours), which means that
ActivClient will contact CMS between 0 and 120 minutes after Windows Logon.
We recommend selecting the maximum value between five minutes and 120 minutes.
If a value higher than 120 minutes is selected, we expect that many users will remove
their card from the reader before ActivClient connects to CMS, therefore losing the
opportunity to check for a card update.
If the user removes the card before the check is performed, then the process happens
again at the next card insertion - with a different random delay.
Policy name: Maximum delay for card update check after Windows Logon
Type DWORD
Note
For corporations that do not use the smart card for Windows Logon, we expect that
This policy also includes the case of
the smart card will be inserted only for few minutes, that is only when the smart card- a card used for Windows screen
enabled application is used (for example, VPN client for smart card authentication, unlock.
email client for email signature / decryption, internet browser for secure web access).
To cater for this type of use cases, ActivClient uses another policy to define when to
contact CMS: ActivClient checks if card updates are available after a randomized
number of minutes after card insertion. This random number is between 0 (that is, at
card insertion) and a configurable number. The default is five minutes, which means
that ActivClient will contact CMS between 0 and five minutes after card insertion.
We recommend selecting the maximum value between one minute and ten minutes. If
a value higher than ten minutes is selected, we expect that many users will remove
their card from the reader before ActivClient connects to CMS, therefore losing the
opportunity to check for a card update.
If the user removes the card before the check is performed, then the process happens
again at the next card insertion - with a different random delay.
Policy name: Maximum delay for card update check after card insertion
Values 5 (default)
Type DWORD
ActivClient includes a policy to define the frequency to check for card updates. The
default value is seven days, which represents a weekly check.
When the number of days has passed, ActivClient will contact CMS a few minutes
after card insertion - delay defined in the policies described above. If the card is
removed before the check happens, or if CMS is not available, or if the user cancels
the card update request, then ActivClient will contact CMS again at the next card
insertion (after the usual delay).
If ActivClient manages to contact CMS, where an update is available, and if the user
proceeds with the card update, then ActivClient resets the "counter" for the frequency.
The next check will be performed a week later.
If ActivClient manages to contact CMS, where an update is available, but if the user
does not proceed with the card update, then ActivClient will repeat the process at the
next card insertion (after the usual delay).
Values 7 (default)
Type DWORD
To use the ActivClient card auto-update feature, you need to configure the connection
information for your ActivID CMS installation: the connection URL.
Until this URL is defined, the card auto-update will not operate.
Description Connection URL for the CMS server (see the ActivIdentity
CMS documentation). The port number is included in the URL.
Example: http://www.mycompany.com:89898
Values None
Type STRING
The following policies configure additional CMS connection parameters. The default
values apply to most configurations. For further information, see the CMS technical
documentation.
If CMS does not answer the "CMS check" request sent by ActivClient (timeout
reached, defined by "CMS Synchronization Manager timeout"), then other connection
attempts are performed (the number of attempts is defined by "CMS Synchronization
Manager retry"). The attempts are performed immediately after failure. If the multiple
attempts fail, then they will be restarted at the next card insertion.
Values 5 (default)
Type DWORD
Values 2 (default)
Type DWORD
If ActivClient manages to contact CMS, and identifies that a card update request is
available, ActivClient opens a window connecting to CMS My Digital ID Card
(MDIDC). If the card update in MDIDC is not performed after a certain time (CMS
MDIDC timeout), then the update is not done. There is no repeated attempt performed
that would disrupt the user. The next attempt will be performed at the next card
insertion.
Type DWORD
When the card update process is running, the user should make sure that they:
When the card update is complete, MDIDC informs the user that he should remove
and re-insert the card in order to use it. This operation guarantees that all ActivClient
and Windows components are aware of the new credentials present on the card. For
example, if the Windows Logon certificate is updated, removing and re-inserting the
card publishes the new certificate to the Windows CAPI store, a requirement for a
successful Windows Logon.
183 Isolate the Error For more information, see the ActivClient for Windows User Guide.
Condition and
Reproduce the Error
ActivClient Diagnostics Wizard
183 Ask for Technical
Support Resources
The ActivClient Diagnostics wizard provides advanced information for the help
desk and administrators, such as
The output of the diagnostics can be viewed on the screen, printed, saved to a
file, or sent by email.
The Advanced Diagnostics tool is available from the ActivClient User Console,
the ActivClient Agent left or right-click menu, or the Start menu.
For more information, see the ActivClient for Windows User Guide.
To help diagnose problems, you can configure ActivClient to generate log files. You
can enable it using either:
• User Console - from the Tools menu, select Advanced and the Log File
Options
• Advanced Configuration Manager - configure the Logging settings
Log files do not require any change in installed DLLs and do not compromise the
system's security - PIN code and personal information are never exposed.
Troubleshooting Strategies
To troubleshoot a problem in ActivClient, follow these basic steps:
3. "Isolate the Error Condition and Reproduce the Error" on page 183
• Has the default configuration been modified from the original installation?
• Has the system ever worked? Is there a similar working system in the same
environment?
• Are the operating system and service packs listed in the ActivClient supported
configurations?
• Which ActivClient previous version has the system been upgraded with?
• Is there another application using the smart card?
To isolate and, if possible, reproduce the error, consider the following checklist:
Run the Advanced Diagnostics Wizard, save the result file, and contact your
ActivIdentity reseller’s technical support organization for analysis.
In This Chapter The ActivClient Help file is provided in the .chm format and accessible from
various ActivClient user interfaces, such as the User Console or the Advanced
184 Extract the HTML Files Diagnostics tool.
187 Create a New Help As well as the standard HTML files, the Help also contains context-sensitive
Project
content linked to ActivClient functions.
187 Configure the Context-
Sensitive Controls The Help can be fully customized, from the actual content to the look and feel of
the pages. You can customize some ActivClient help pages to match your
194 Integrate Customized
internal processes (for example, you can customize the smart card unlock help
Help
page to describe your own help desk process).
You can also customize the dimensions of the Help viewer if necessary.
To customize the Help file, you can either create a version from scratch based on
your organization’s requirements, or you can modify the existing files.
While the creation of a Help system from scratch is outside the scope of this
guide, the context-sensitive and integration procedures must still be applied.
In order to modify the Help, you must first extract (or decompile) the HTML files
from the ActivClient.chm. During the extraction process, the HTML files are
copied to a specified directory without modifying the original help file.
To extract the files, there are several tools available, such as Microsoft’s HTML
Help Workshop (used as the example in this chapter), and a simple command
line switch.
2. From the Start menu, point to All Programs, HTML Help Workshop and click
HTML Help Workshop.
http://www.microsoft.com/
downloads/
details.aspx?familyid=00535334
-c8a6-452f-9aa0-
d597d16580cc&displaylang=en
4. In the Destination folder field, browse to the folder you created above.
5. In the Compiled help file field, browse to the ActivClient.chm file in the
ActivClient program directory.
6. Click OK.
The contents of the ActivClient Help are extracted and copied to the specified
folder, maintaining the hierarchy established by the table of contents.
7. Go to the destination folder and verify that the help file was decompiled
successfully.
where:
– <folder> is the path to and name of the destination folder for the extracted
files.
– <chm> is path to and filename of the ActivClient.chm compiled help file in
the ActivClient program directory.
By default, this is C:\Program Files\ActivIdentity\ActivClient\Docs.
For example:
The contents of the ActivClient Help are extracted and copied to the specified
folder, maintaining the hierarchy established by the table of contents.
3. Go to the destination folder and verify that the help file was decompiled
successfully.
• The header file (or map) lists the map names and corresponding numerical IDs for
all the content-sensitive controls in a program. The file extension is .h.
A copy of the ActivClient Help header file, contexthelp.h, is provided in the
Admin/Custom Help folder on the ActivClient distribution.
• The Alias file associates the context-sensitive HTML files with the map and IDs. Note
The alias paths to the linked help
A text file containing the list of aliases, Alias.txt, is provided in the Admin/ files in Table 11.1 on page 188
Custom Help folder on the ActivClient distribution. assume that your help project file is
stored at the same directory level as
the extracted help files. For
example, your project file is stored
Table 11.1 on page 188 lists the map names, identifiers and linked files of the in c:\Help_Files.
ActivClient context-sensitive help topics.
If your directory organization differs,
you must adjust the alias paths
Table 11.1: Context-sensitive identifiers and files accordingly.
Table 11.2 on page 189 lists the actions required to call each context-sensitive help
topic.
• Help menu
• F1
• Alt+H shortcut
• Help icon in the window title bar
• F1
• Help icon in the window title bar
• Help menu
• F1
• Alt+H shortcut
• Help icon in the window title bar
Calls the topic describing the Advanced Diagnostic Tool and how to
generate reports.
• F1
• Help icon in the window title bar
• F1
• Help icon in the window title bar
Calls the topic describing the PIN Initialization Tool and how to
initialize a smart card.
• F1
• Help icon in the window title bar
Calls the topic describing the PIN Initialization Tool and how to
initialize a smart card.
• F1
• Help icon in the window title bar
Calls the topic describing the PIN Initialization Tool and how to
initialize a smart card.
Calls the topic describing the PIN Initialization Tool and how to
initialize a smart card.
CHELP_PININITOOL_RESET 1008 From the PIN Initialization Tool interface when ActivClient detects that
the smart card is already initialized:
• F1
• Help icon in the window title bar
Calls the topic explaining how to reset a smart card using the PIN
Initialization Tool.
CHELP_USRCONS_GENOTP 1009 From the User Console interface when the One-Time Passwords
folder is open:
• Help menu
• F1
• Alt+H shortcut
• Help icon on the toolbar
CHELP_USRCONS_CONFGOTP 1010 From the User Console interface when the Configure One-Time
Password window is open:
• Help menu
• F1
• Alt+H shortcut
• Help icon on the toolbar
Calls the topic explaining how to configure the username for remote
access.
CHELP_USRCONS_UNLOCKCODE 1011 From the User Console interface when the Unlock card window is
open:
• Help menu
• F1
• Alt+H shortcut
• Help icon on the toolbar
• F1
• Help icon in the window title bar
• F1
• Help icon in the window title bar
CHELP_NOTIF_CARDMGRBLOCKED 1014 From the smart card manager blocked notification message:
• F1
• Help icon in the window title bar
Calls the topic describing the smart card manager blocked status.
• F1
• Help icon in the window title bar
CHELP_NOTIF_NOREADER 1017 The Learn more about this link in the No smart card reader
notification message:
Calls the topic describing the no smart card reader detected status.
• Help menu
• F1
• Alt+H shortcut
• Help icon on the toolbar
Calls the topic describing the User Console, its menus and toolbars.
CHELP_USRCONS_CERTIFICATES 1019 From the User Console interface when the My Certificates or CA
Certificates folder is open:
• Help menu
• F1
• Alt+H shortcut
• Help icon on the toolbar
Calls the topic describing digital certificates and how to view certificate
information.
CHELP_USRCONS_PERSODATA 1020 From the User Console interface when the My Personal Info folder is
open:
• Help menu
• F1
• Alt+H shortcut
• Help icon on the toolbar
CHELP_USRCONS_RESET 1021 From the User Console interface when the Reset card window is
open:
• Help menu
• F1
• Alt+H shortcut
• Help icon on the toolbar
Calls the topic explaining how to reset a smart card using the User
Console.
• F1
• Help icon in the window title bar
Calls the topic explaining how to log on to Check Point VPN with a
one-time password.
• F1
• Help icon in the window title bar
Calls the topic explaining how to log on to Check Point VPN with a
one-time password.
CHELP_USRCONS_SYNCOTP 1024 From the User Console interface when the Synchronize One-Time
Password window is open:
• Help menu
• F1
• Alt+H shortcut
• Help icon on the toolbar
Calls the topic explaining how to synchronize a smart card for remote
access.
CHELP_ACAGENT_GENOTP 1025 The Learn more about this link in the Generate a One-Time
Password notification message.
• F1
• Help icon in the window title bar
Copy the ActivClient Help header file, contexthelp.h, from the Admin/Custom Help
folder on the ActivClient distribution to the required location in your help project
directory.
You can also create the file using the information provided in Table 11.1 on page 188.
Set each context-sensitive control with the following format:
For example:
The procedure to configure the context-sensitive alias links depends on the help
authoring tool being used. For further details, see the documentation provided with
the tool.
Using the information provided in Table 11.1 on page 188, set the link to the required
help topic for each map name/identifier.
3. Compile your customized help project, making sure the output is called
ActivClient.chm.
Important
4. Paste the compiled help into the ActivClient program directory.
Due to Microsoft security
restrictions, the content of the
5. Open the ActivClient User Console and verify that the customized help is working customized help file might not
correctly. display correctly.
Appendix A: Packages
This appendix describes the ActivClient distribution packages, including the DoD root certificates provided with the CAC
editions.
ActivClient Packages
ActivClient comes in four different packages:
• ActivClient x86
• ActivClient x64
In the 64-bit editions of ActivClient, there are small functional differences compared to the 32-bit editions:
• In addition to the 64-bit ActivClient APIs, 32-bit wrappers are available for the
ActivClient APIs in order to support compatibility with 32-bit applications running
on the 64-bit operating system.
• The Entrust Desktop Solution support module is not available in the 64-bit edition.
• The Check Point SAA support module is not available in the 64-bit edition.
• Netscape, Mozilla, Firefox, and Thunderbird are supported with the ActivClient
PKCS#11 library (64- or 32-bit). However, ActivClient 64-bit does not automatically
register the PKCS#11 library to these applications. Manual registration is required.
• DODCA_11.cer
• DODCA_12.cer
• DODCA_13.cer
• DODCA_14.cer
• DODCA_15.cer
• DODCA_16.cer
• DODCA_17.cer
• DODCA_18.cer
• DODCLASS3CA_3.cer
• DODCLASS3CA_4.cer
• DODCLASS3CA_5.cer
• DODCLASS3CA_6.cer
• DODCLASS3CA_7.cer
• DODCLASS3CA_8.cer
• DODCLASS3CA_9.cer
• DODCLASS3CA_10.cer
• DODCLASS3EMAILCA_3.cer
• DODCLASS3EMAILCA_4.cer
• DODCLASS3EMAILCA_5.cer
• DODCLASS3EMAILCA_6.cer
• DODCLASS3EMAILCA_7.cer
• DODCLASS3EMAILCA_8.cer
• DODCLASS3EMAILCA_9.cer
• DODCLASS3EMAILCA_10.cer
• DoDClass3RootCA.cer
• DoDEMAILCA_11.cer
• DoDEMAILCA_12.cer
• DoDEMAILCA_13.cer
• DoDEMAILCA_14.cer
• DoDEMAILCA_15.cer
• DoDEMAILCA_16.cer
• DoDEMAILCA_17.cer
• DoDEMAILCA_18.cer
• DoDRootCA2.cer
This appendix describes files installed and used by ActivClient. It also provides an overview of the key ActivClient
processes.
Installed Files
The installed files are presented here in two tables.
• Table B.1 lists the files in the ActivClient 6.2 32-bit edition
• Table B.2 lists the files in the ActivClient 6.2 64-bit edition
Location Name
CommonFilesFolder\ActivIdentity acadvcfm.exe
CommonFilesFolder\ActivIdentity acdiagwz.exe
CommonFilesFolder\ActivIdentity\Resources
CommonFilesFolder\ActivIdentity\Resources\ acadvcrc_common.dll
Common
CommonFilesFolder\ActivIdentity\Resources\ acdiazrc_common.dll
Common
CommonFilesFolder\ActivIdentity\Resources\ acadvcrc.dll
Localized
CommonFilesFolder\ActivIdentity\Resources\ acdiazrc.dll
Localized
CommonFilesFolder\ActivIdentity\Resources\
Merged
ProgramFilesFolder\ActivIdentity
INSTALLDIR acacia.dll
INSTALLDIR acautoup.exe
INSTALLDIR acbcgpro.dll
INSTALLDIR accoca.exe
INSTALLDIR accocaps.dll
INSTALLDIR accrdsub.exe
Location Name
INSTALLDIR accrypto.dll
INSTALLDIR accuvoplite.dll
INSTALLDIR acdiagno.dll
INSTALLDIR acdiagtoolplugin.dll
INSTALLDIR acevents.exe
INSTALLDIR acnstool.exe
INSTALLDIR acregcrt.exe
INSTALLDIR acsagent.exe
INSTALLDIR actse.dll
INSTALLDIR actsinit.exe
INSTALLDIR actswzdg.exe
INSTALLDIR acunlock.dll
INSTALLDIR acuscons.exe
INSTALLDIR acvop.dll
INSTALLDIR acvopsm.cfg
INSTALLDIR acvopsm.dll
INSTALLDIR acvopsvr.dll
INSTALLDIR aicfgreg.dll
INSTALLDIR aipinch.exe
INSTALLDIR aipinit.exe
INSTALLDIR aiwjpg.dll
INSTALLDIR apduengine.dll
INSTALLDIR libnspr4.dll
INSTALLDIR libplc4.dll
INSTALLDIR libplds4.dll
INSTALLDIR modutil.exe
INSTALLDIR nspr4.dll
INSTALLDIR nss3.dll
Location Name
INSTALLDIR persodatasnapin.dll
INSTALLDIR plc4.dll
INSTALLDIR plds4.dll
INSTALLDIR skisnapin.dll
INSTALLDIR smime3.dll
INSTALLDIR softokn3.dll
INSTALLDIR ucsnapinhelper
INSTALLDIR\Certificates
INSTALLDIR\Docs ActivClient.chm
INSTALLDIR\Profiles ACMini-2011000000000000000000B9-
AxaltoV2C.ini
INSTALLDIR\Profiles ACMini-2011000000000000000000B9-
GnD64K.ini
INSTALLDIR\Profiles ACMini-2011000000000000000000B9-
OCS5.2D.ini
INSTALLDIR\Profiles ACMini-2011000000000000000000BA-
ATMEL-09.FA.ini
INSTALLDIR\Profiles ACMini-2011000000000000000000BA-
AxaltoV1SM2.1.ini
INSTALLDIR\Profiles ACMini-2011000000000000000000BA-
GXP3-64K-STD-VERSION.ini
INSTALLDIR\Profiles ACMini-Blank-ATMEL-09.FA.ini
INSTALLDIR\Profiles ACMini-Blank-AxaltoV1SM2.1.ini
INSTALLDIR\Profiles ACMini-Blank-AxaltoV2C.ini
INSTALLDIR\Profiles ACMini-Blank-GnD64K.ini
INSTALLDIR\Profiles ACMini-Blank-GXP3-64K-STD-
VERSION.ini
Location Name
INSTALLDIR\Profiles ACMini-Blank-OCS5.2D.ini
INSTALLDIR\Profiles ZIN-201100000000000000000052.ini
INSTALLDIR\Profiles\Capfiles GCapplet_SLB_1_0_0_31.cry
INSTALLDIR\Profiles\Capfiles IDapplet_SLB_1_0_0_27.cry
INSTALLDIR\Profiles\Capfiles PKIapplet_SLB_1_0_0_34.cry
INSTALLDIR\Profiles\Capfiles SKIapplet_SLB_1_0_0_20.cry
INSTALLDIR\Resources acautrc.dll
INSTALLDIR\Resources acc16krc.dll
INSTALLDIR\Resources acc8krc.dll
INSTALLDIR\Resources accobapirc.dll
INSTALLDIR\Resources accocarc.dll
INSTALLDIR\Resources acdiagnorc.dll
INSTALLDIR\Resources acdiagtoolplgrc.dll
INSTALLDIR\Resources acjavarc.dll
INSTALLDIR\Resources acjpivrc.dll
INSTALLDIR\Resources acjsc2rc.dll
INSTALLDIR\Resources acpkcs201-en6rc.dll
INSTALLDIR\Resources acpkcs201-nsrc.dll
INSTALLDIR\Resources acpkcs201rc.dll
INSTALLDIR\Resources acpkcs211rc.dll
INSTALLDIR\Resources acsaarc.dll
INSTALLDIR\Resources persodatasnapinrc.dll
INSTALLDIR\Resources\Common accsprc_common.dll
INSTALLDIR\Resources\Common acerrmrc_common.dll
INSTALLDIR\Resources\Common acexchrc_common.dll
INSTALLDIR\Resources\Common acsagtrc_common.dll
INSTALLDIR\Resources\Common actswzrc_common.dll
INSTALLDIR\Resources\Common acunlockrc_common.dll
Location Name
INSTALLDIR\Resources\Common aicfgregrc_common.dll
INSTALLDIR\Resources\Common aipinchrc_common.dll
INSTALLDIR\Resources\Common aipinguirc_common.dll
INSTALLDIR\Resources\Common aipinitrc_common.dll
INSTALLDIR\Resources\Common asphatrc_common.dll
INSTALLDIR\Resources\Common skisnapinrc_common.dll
INSTALLDIR\Resources\Localized accsprc.dll
INSTALLDIR\Resources\Localized acerrmrc.dll
INSTALLDIR\Resources\Localized acexchrc.dll
INSTALLDIR\Resources\Localized acsagtrc.dll
INSTALLDIR\Resources\Localized actswzrc.dll
INSTALLDIR\Resources\Localized acunlockrc.dll
INSTALLDIR\Resources\Localized aicfgregrc.dll
INSTALLDIR\Resources\Localized aipinchrc.dll
INSTALLDIR\Resources\Localized aipinguirc.dll
INSTALLDIR\Resources\Localized aipinitrc.dll
INSTALLDIR\Resources\Localized asphatrc.dll
INSTALLDIR\Resources\Localized skisnapinrc.dll
INSTALLDIR\Resources\Merged
ProgramFilesFolder\ActivIdentity\CheckPoint
ProgramFilesFolder\ActivIdentity\CheckPoint\
SecuRemote
ProgramFilesFolder\ActivIdentity\CheckPoint\ acsaa.dll
SecuRemote\bin
SystemFolder acbsi21.dll
SystemFolder acbsij.dll
SystemFolder acbsiprov.dll
SystemFolder accsp.dll
SystemFolder accsp.sig
Location Name
SystemFolder acerrmes.dll
SystemFolder acevtsub.dll
SystemFolder acexchex.dll
SystemFolder acflex16.dll
SystemFolder acflex8.dll
SystemFolder acfscrfs.dll
SystemFolder acjavasc.dll
SystemFolder acjscpiv.dll
SystemFolder acjscrfs.dll
SystemFolder acjsys.jar
SystemFolder acjvscv2.dll
SystemFolder ackpbsc.dll
SystemFolder aclibeay.dll
SystemFolder aclog.dll
SystemFolder acomx.dll
SystemFolder acoutcom.dll
SystemFolder acpicom.dll
SystemFolder acpimeta.dll
SystemFolder acpipint.dll
SystemFolder acpipint.jar
SystemFolder acpivapi.dll
SystemFolder acpkcs201-en6.dll
SystemFolder acpkcs201-ns.dll
SystemFolder acpkcs201.dll
SystemFolder acpkcs211.dll
SystemFolder acwpipint.dll
SystemFolder aijnipiv.dll
SystemFolder aijnipiv.jar
Location Name
SystemFolder aipingui.dll
SystemFolder aspcom.dll
SystemFolder asphat32.dll
SystemFolder bsi21classes.jar
SystemFolder bsi21interf.jar
SystemFolder jnibsi21.dll
SystemFolder xsi.jar
SystemFolder xsi.zip
Location Name
CommonFilesFolder\ActivIdentity acadvcfm.exe
CommonFilesFolder\ActivIdentity acdiagwz.exe
CommonFilesFolder\ActivIdentity\Resources
CommonFilesFolder\ActivIdentity\Resources\ acadvcrc_common.dll
Common
CommonFilesFolder\ActivIdentity\Resources\ acdiazrc_common.dll
Common
CommonFilesFolder\ActivIdentity\Resources\ acadvcrc.dll
Localized
CommonFilesFolder\ActivIdentity\Resources\ acdiazrc.dll
Localized
CommonFilesFolder\ActivIdentity\Resources\
Merged
ProgramFilesFolder\ActivIdentity
INSTALLDIR acacia.dll
INSTALLDIR acautoup.exe
INSTALLDIR acbcgpro.dll
INSTALLDIR accoca.exe
Location Name
INSTALLDIR accocaps.dll
INSTALLDIR acCOMacomx.exe
INSTALLDIR acCOMbsi21.exe
INSTALLDIR acCOMcsp.exe
INSTALLDIR acCOMpiv.exe
INSTALLDIR acCOMpkcs.exe
INSTALLDIR acCOMpkcscallback.dll
INSTALLDIR accrdsub.exe
INSTALLDIR accrypto.dll
INSTALLDIR accuvoplite.dll
INSTALLDIR acdiagno.dll
INSTALLDIR acdiagtoolplugin.dll
INSTALLDIR acevents.exe
INSTALLDIR acjsys.jar
INSTALLDIR acnstool.exe
INSTALLDIR acregcrt.exe
INSTALLDIR acsagent.exe
INSTALLDIR actse.dll
INSTALLDIR actsinit.exe
INSTALLDIR actswzdg.exe
INSTALLDIR acunlock.dll
INSTALLDIR acuscons.exe
INSTALLDIR acvop.dll
INSTALLDIR acvopsm.cfg
INSTALLDIR acvopsm.dll
INSTALLDIR acvopsvr.dll
INSTALLDIR aicfgreg.dll
INSTALLDIR aijnipiv.jar
Location Name
INSTALLDIR aipinch.exe
INSTALLDIR aipinit.exe
INSTALLDIR aiwjpg.dll
INSTALLDIR apduengine.dll
INSTALLDIR bsi21classes.jar
INSTALLDIR bsi21interf.jar
INSTALLDIR persodatasnapin.dll
INSTALLDIR skisnapin.dll
INSTALLDIR ucsnapinhelper
INSTALLDIR xsi.jar
INSTALLDIR xsi.zip
INSTALLDIR\Certificates
INSTALLDIR\Docs ActivClient.chm
INSTALLDIR\Profiles ACMini-2011000000000000000000
B9-AxaltoV2C.ini
INSTALLDIR\Profiles ACMini-2011000000000000000000
B9-GnD64K.ini
INSTALLDIR\Profiles ACMini-2011000000000000000000
B9-OCS5.2D.ini
INSTALLDIR\Profiles ACMini-2011000000000000000000
BA-ATMEL-09.FA.ini
INSTALLDIR\Profiles ACMini-2011000000000000000000
BA-AxaltoV1SM2.1.ini
INSTALLDIR\Profiles ACMini-2011000000000000000000
BA-GXP3-64K-STD-VERSION.ini
INSTALLDIR\Profiles ACMini-Blank-ATMEL-09.FA.ini
INSTALLDIR\Profiles ACMini-Blank-AxaltoV1SM2.1.ini
Location Name
INSTALLDIR\Profiles ACMini-Blank-AxaltoV2C.ini
INSTALLDIR\Profiles ACMini-Blank-GnD64K.ini
INSTALLDIR\Profiles ACMini-Blank-GXP3-64K-STD-
VERSION.ini
INSTALLDIR\Profiles ACMini-Blank-OCS5.2D.ini
INSTALLDIR\Profiles ZIN-201100000000000000000052.ini
INSTALLDIR\Profiles\Capfiles GCapplet_SLB_1_0_0_31.cry
INSTALLDIR\Profiles\Capfiles IDapplet_SLB_1_0_0_27.cry
INSTALLDIR\Profiles\Capfiles PKIapplet_SLB_1_0_0_34.cry
INSTALLDIR\Profiles\Capfiles SKIapplet_SLB_1_0_0_20.cry
INSTALLDIR\Resources acautrc.dll
INSTALLDIR\Resources acc16krc.dll
INSTALLDIR\Resources acc8krc.dll
INSTALLDIR\Resources accobapirc.dll
INSTALLDIR\Resources accocarc.dll
INSTALLDIR\Resources acdiagnorc.dll
INSTALLDIR\Resources acdiagtoolplgrc.dll
INSTALLDIR\Resources acjavarc.dll
INSTALLDIR\Resources acjpivrc.dll
INSTALLDIR\Resources acjsc2rc.dll
INSTALLDIR\Resources acpkcs201-en6rc.dll
INSTALLDIR\Resources acpkcs201-nsrc.dll
INSTALLDIR\Resources acpkcs201rc.dll
INSTALLDIR\Resources acpkcs211rc.dll
INSTALLDIR\Resources persodatasnapinrc.dll
INSTALLDIR\Resources\Common accsprc_common.dll
INSTALLDIR\Resources\Common acerrmrc_common.dll
INSTALLDIR\Resources\Common acsagtrc_common.dll
Location Name
INSTALLDIR\Resources\Common actswzrc_common.dll
INSTALLDIR\Resources\Common acunlockrc_common.dll
INSTALLDIR\Resources\Common aicfgregrc_common.dll
INSTALLDIR\Resources\Common aipinchrc_common.dll
INSTALLDIR\Resources\Common aipinguirc_common.dll
INSTALLDIR\Resources\Common aipinitrc_common.dll
INSTALLDIR\Resources\Common asphatrc_common.dll
INSTALLDIR\Resources\Common skisnapinrc_common.dll
INSTALLDIR\Resources\Localized accsprc.dll
INSTALLDIR\Resources\Localized acerrmrc.dll
INSTALLDIR\Resources\Localized acsagtrc.dll
INSTALLDIR\Resources\Localized actswzrc.dll
INSTALLDIR\Resources\Localized acunlockrc.dll
INSTALLDIR\Resources\Localized aicfgregrc.dll
INSTALLDIR\Resources\Localized aipinchrc.dll
INSTALLDIR\Resources\Localized aipinguirc.dll
INSTALLDIR\Resources\Localized aipinitrc.dll
INSTALLDIR\Resources\Localized asphatrc.dll
INSTALLDIR\Resources\Localized skisnapinrc.dll
INSTALLDIR\Resources\Merged
INSTALLDIR\x64 acCOMacomxPS.dll
INSTALLDIR\x64 acCOMbsi21PS.dll
INSTALLDIR\x64 acCOMcspPS.dll
INSTALLDIR\x64 acCOMpivPS.dll
INSTALLDIR\x64 acCOMpkcscallbackPS.dll
INSTALLDIR\x64 acCOMpkcsPS.dll
INSTALLDIR\x86 acCOMacomxPS.dll
INSTALLDIR\x86 acCOMbsi21PS.dll
Location Name
INSTALLDIR\x86 acCOMcspPS.dll
INSTALLDIR\x86 acCOMpivPS.dll
INSTALLDIR\x86 acCOMpkcscallbackPS.dll
INSTALLDIR\x86 acCOMpkcsPS.dll
System64Folder acbsi21.dll
System64Folder acbsij.dll
System64Folder acbsiprov.dll
System64Folder accsp.dll
System64Folder accsp.sig
System64Folder acerrmes.dll
System64Folder acevtsub.dll
System64Folder acflex16.dll
System64Folder acflex8.dll
System64Folder acfscrfs.dll
System64Folder acjavasc.dll
System64Folder acjscpiv.dll
System64Folder acjscrfs.dll
System64Folder acjvscv2.dll
System64Folder ackpbsc.dll
System64Folder aclibeay.dll
System64Folder aclog.dll
System64Folder acomx.dll
System64Folder acpicom.dll
System64Folder acpimeta.dll
System64Folder acpipint.dll
System64Folder acpivapi.dll
System64Folder acpkcs201-en6.dll
System64Folder acpkcs201-ns.dll
Location Name
System64Folder acpkcs201.dll
System64Folder acpkcs211.dll
System64Folder acwpipint.dll
System64Folder aijnipiv.dll
System64Folder aipingui.dll
System64Folder aspcom.dll
System64Folder asphat32.dll
System64Folder jnibsi21.dll
SystemFolder acacia.dll
SystemFolder acbsi21.dll
SystemFolder accsp.dll
SystemFolder accsp.sig
SystemFolder acexchex.dll
SystemFolder aclog.dll
SystemFolder acomx.dll
SystemFolder acpivapi.dll
SystemFolder acpkcs211.dll
SystemFolder aijnipiv.dll
SystemFolder jnibsi21.dll
As ActivClient involves several components that run concurrently, the data cache mechanism is used to improve
performance, especially when reading data from the smart card. For instance, reading a certificate from a smart card might
take much more time than reading it from memory.
In ActivClient operations, the first component that needs a certificate, reads it from the smart card and then stores it in the
data cache for further access. The data cache is invalidated after the card has been removed or after Windows events
such as workstation lock or log off. The cached data is limited to certificate, static password and middleware management
information.
Process Description
ac.sharedstore.exe This is the component in charge of managing the data and PIN cache. This component implements COM
interfaces and is configured to run as a service called ActivIdentity Shared Store Service.
(Shared Store)
This component is used both by ActivClient and by the ActivIdentity Authentication Client.
It stores the PIN (encrypted) and the material needed to properly manage per session and per process
configuration.
accrdsub.exe This is a user component started at logon. It subscribes to acevents through a COM interface and
manages SCard events and OS events on notification, such as:
• Card insertion - registers certificates in the Internet Explorer store, configures Outlook and EFS,
publishes certificates to GAL, checks card and certificate expiration, checks for available smart card
updates (in CMS), displays relevant prompts in the case of blank card or locked card or change PIN at
first use
• Card removal - unregisters certificates, locks the workstation of logs the user off
• Session lock - removes data and PIN from cache, notification if the card is still inserted
On Windows XP and later, this component implements a COM object, instantiated by the OS when
needed (that is, when a client application subscribes through its COM interface). There is one
acevents.exe instance running per session which is why you can see two instances running
simultaneously (SYSTEM + user dependent).
Note: In a Terminal Server environment, you will see as many instances as users logged in to the TSE
server.
On Windows 2000, there is a single instance of acevents.exe running from a service.
acsagent.exe This is a user interface-based component started at logon. It displays the ActivClient smart card icon in the
notification area/system tray.
To do so, ActivClient software requires write permission to the INSTALLDIR\Downloads directory. The default folder is
\Program Files\ActivIdentity\ActivClient\Downloads This folder is used to store downloaded hot-fixes if the ActivClient Auto-
Update feature is used.
This appendix describes all the Windows registry keys used (for read or write) by ActivClient, in two sections:
Note: Only the registry keys described in Chapter 2, "Policy Definition," page 16, are supported for updates. All other
registry keys are mentioned only for reference. If you want to use reduced permissions for registry access, you must allow
the ActivClient software access to (that is, read permission for) these registries.
[HKEY_CLASSES_ROOT\aicfgreg.CBackupRestore.1\CLSID]
[HKEY_CLASSES_ROOT\ACEventService.EventNotifier]
[HKEY_CLASSES_ROOT\ACEventService.EventNotifier\CLSID]
[HKEY_CLASSES_ROOT\ACEventService.EventNotifier\CurVer]
[HKEY_CLASSES_ROOT\ACEventService.EventNotifier.1]
[HKEY_CLASSES_ROOT\ACEventService.EventNotifier.1\CLSID]
[HKEY_CLASSES_ROOT\ACEventSubscriber.Subscriber]
[HKEY_CLASSES_ROOT\ACEventSubscriber.Subscriber\CLSID]
[HKEY_CLASSES_ROOT\ACEventSubscriber.Subscriber\CurVer]
[HKEY_CLASSES_ROOT\ACEventSubscriber.Subscriber.1]
[HKEY_CLASSES_ROOT\ACEventSubscriber.Subscriber.1\CLSID]
[HKEY_CLASSES_ROOT\aicfgreg.CBackupRestore]
[HKEY_CLASSES_ROOT\aicfgreg.CBackupRestore\CurVer]
[HKEY_CLASSES_ROOT\aicfgreg.CBackupRestore\CLSID]
[HKEY_CLASSES_ROOT\Interface\{F2255E01-7804-42D2-AB6F-F3DC4B17875C}]
[HKEY_CLASSES_ROOT\Interface\{F2255E01-7804-42D2-AB6F-F3DC4B17875C}\TypeLib]
[HKEY_CLASSES_ROOT\Interface\{F2255E01-7804-42D2-AB6F-F3DC4B17875C}\ProxyStubClsid32]
[HKEY_CLASSES_ROOT\Interface\{F2255E01-7804-42D2-AB6F-F3DC4B17875C}\ProxyStubClsid]
[HKEY_CLASSES_ROOT\Interface\{3D9C1CF1-7AA4-4ED7-9B8A-EC57B4F76DD8}]
[HKEY_CLASSES_ROOT\Interface\{3D9C1CF1-7AA4-4ED7-9B8A-EC57B4F76DD8}\ProxyStubClsid]
[HKEY_CLASSES_ROOT\Interface\{3D9C1CF1-7AA4-4ED7-9B8A-EC57B4F76DD8}\ProxyStubClsid32]
[HKEY_CLASSES_ROOT\Interface\{3D9C1CF1-7AA4-4ED7-9B8A-EC57B4F76DD8}\TypeLib]
[HKEY_CLASSES_ROOT\Interface\{CC49D6C0-98F0-4320-B3F2-87C3393DECA1}]
[HKEY_CLASSES_ROOT\Interface\{CC49D6C0-98F0-4320-B3F2-87C3393DECA1}\TypeLib]
[HKEY_CLASSES_ROOT\Interface\{CC49D6C0-98F0-4320-B3F2-87C3393DECA1}\ProxyStubClsid32]
[HKEY_CLASSES_ROOT\Interface\{CC49D6C0-98F0-4320-B3F2-87C3393DECA1}\ProxyStubClsid]
[HKEY_CLASSES_ROOT\Interface\{83DA5E0D-61FA-4102-9D19-00DF4E435171}]
[HKEY_CLASSES_ROOT\Interface\{83DA5E0D-61FA-4102-9D19-00DF4E435171}\ProxyStubClsid32]
[HKEY_CLASSES_ROOT\Interface\{83DA5E0D-61FA-4102-9D19-00DF4E435171}\NumMethods]
[HKEY_CLASSES_ROOT\Interface\{80E03EC1-5D9F-440A-B139-AF13D1DF8A0E}]
[HKEY_CLASSES_ROOT\Interface\{80E03EC1-5D9F-440A-B139-AF13D1DF8A0E}\ProxyStubClsid32]
[HKEY_CLASSES_ROOT\Interface\{80E03EC1-5D9F-440A-B139-AF13D1DF8A0E}\NumMethods]
[HKEY_CLASSES_ROOT\Interface\{14693D70-AD77-11D3-A629-00104BB6307C}]
[HKEY_CLASSES_ROOT\Interface\{14693D70-AD77-11D3-A629-00104BB6307C}\ProxyStubClsid32]
[HKEY_CLASSES_ROOT\Interface\{14693D70-AD77-11D3-A629-00104BB6307C}\NumMethods]
[HKEY_CLASSES_ROOT\Interface\{B109E525-FCE1-4894-B80A-4ABEF00EB54A}]
[HKEY_CLASSES_ROOT\Interface\{B109E525-FCE1-4894-B80A-4ABEF00EB54A}\TypeLib]
[HKEY_CLASSES_ROOT\Interface\{B109E525-FCE1-4894-B80A-4ABEF00EB54A}\ProxyStubClsid32]
[HKEY_CLASSES_ROOT\Interface\{B109E525-FCE1-4894-B80A-4ABEF00EB54A}\ProxyStubClsid]
[HKEY_CLASSES_ROOT\TypeLib\{C89A2418-4FB7-47BE-A1A6-206379EE0449}]
[HKEY_CLASSES_ROOT\TypeLib\{C89A2418-4FB7-47BE-A1A6-206379EE0449}\1.0]
[HKEY_CLASSES_ROOT\TypeLib\{C89A2418-4FB7-47BE-A1A6-206379EE0449}\1.0\0]
[HKEY_CLASSES_ROOT\TypeLib\{C89A2418-4FB7-47BE-A1A6-206379EE0449}\1.0\0\win32]
[HKEY_CLASSES_ROOT\TypeLib\{C89A2418-4FB7-47BE-A1A6-206379EE0449}\1.0\FLAGS]
[HKEY_CLASSES_ROOT\TypeLib\{C89A2418-4FB7-47BE-A1A6-206379EE0449}\1.0\HELPDIR]
[HKEY_CLASSES_ROOT\CLSID\{5E248397-8614-4EC5-8926-BD242DC9830A}]
[HKEY_CLASSES_ROOT\CLSID\{5E248397-8614-4EC5-8926-BD242DC9830A}\LocalServer32]
[HKEY_CLASSES_ROOT\CLSID\{5E248397-8614-4EC5-8926-BD242DC9830A}\ProgID]
[HKEY_CLASSES_ROOT\CLSID\{5E248397-8614-4EC5-8926-BD242DC9830A}\TypeLib]
[HKEY_CLASSES_ROOT\CLSID\{5E248397-8614-4EC5-8926-BD242DC9830A}\VersionIndependentProgID]
[HKEY_CLASSES_ROOT\CLSID\{7A8DD2B5-D2A7-4F8B-A9AC-09FEA003113B}]
[HKEY_CLASSES_ROOT\CLSID\{7A8DD2B5-D2A7-4F8B-A9AC-09FEA003113B}\VersionIndependentProgID]
[HKEY_CLASSES_ROOT\CLSID\{7A8DD2B5-D2A7-4F8B-A9AC-09FEA003113B}\TypeLib]
[HKEY_CLASSES_ROOT\CLSID\{7A8DD2B5-D2A7-4F8B-A9AC-09FEA003113B}\Programmable]
[HKEY_CLASSES_ROOT\CLSID\{7A8DD2B5-D2A7-4F8B-A9AC-09FEA003113B}\ProgID]
[HKEY_CLASSES_ROOT\CLSID\{7A8DD2B5-D2A7-4F8B-A9AC-09FEA003113B}\InprocServer32]
[HKEY_CLASSES_ROOT\CLSID\{78D3D4FD-B8BB-429C-8563-2FC9ADF0AC12}]
[HKEY_CLASSES_ROOT\CLSID\{78D3D4FD-B8BB-429C-8563-2FC9ADF0AC12}\Programmable]
[HKEY_CLASSES_ROOT\CLSID\{78D3D4FD-B8BB-429C-8563-2FC9ADF0AC12}\TypeLib]
[HKEY_CLASSES_ROOT\CLSID\{F7C82795-14F3-47D2-ADA4-3183AD6ED9D9}]
[HKEY_CLASSES_ROOT\CLSID\{F7C82795-14F3-47D2-ADA4-3183AD6ED9D9}\Programmable]
[HKEY_CLASSES_ROOT\CLSID\{F7C82795-14F3-47D2-ADA4-3183AD6ED9D9}\TypeLib]
[HKEY_CLASSES_ROOT\CLSID\{F7C82795-14F3-47D2-ADA4-3183AD6ED9D9}\InprocServer32]
[HKEY_CLASSES_ROOT\CLSID\{14693D72-AD77-11D3-A629-00104BB6307C}]
[HKEY_CLASSES_ROOT\CLSID\{83DA5E0D-61FA-4102-9D19-00DF4E435171}]
[HKEY_CLASSES_ROOT\CLSID\{83DA5E0D-61FA-4102-9D19-00DF4E435171}\InProcServer32]
[HKEY_CLASSES_ROOT\CLSID\{C824992C-2940-40C6-9A56-EB40E29C5D47}]
[HKEY_CLASSES_ROOT\CLSID\{D97C28A7-D1A3-4718-9E65-E71C2FFC2555}]
[HKEY_CLASSES_ROOT\CLSID\{D97C28A7-D1A3-4718-9E65-E71C2FFC2555}\InprocServer32]
[HKEY_CLASSES_ROOT\CLSID\{D97C28A7-D1A3-4718-9E65-E71C2FFC2555}\VERSION]
[HKEY_CLASSES_ROOT\CLSID\{D97C28A7-D1A3-4718-9E65-E71C2FFC2555}\Programmable]
[HKEY_CLASSES_ROOT\CLSID\{D97C28A7-D1A3-4718-9E65-E71C2FFC2555}\TypeLib]
[HKEY_CLASSES_ROOT\CLSID\{D97C28A7-D1A3-4718-9E65-E71C2FFC2555}\ProgID]
[HKEY_CLASSES_ROOT\CLSID\{D97C28A7-D1A3-4718-9E65-E71C2FFC2555}\Implemented Categories]
[HKEY_CLASSES_ROOT\CLSID\{D97C28A7-D1A3-4718-9E65-E71C2FFC2555}\Implemented Categories\{40FC6ED5-
2438-11CF-A3DB-080036F12502}]
[HKEY_CLASSES_ROOT\ACOutCom.ConnectOutlook]
[HKEY_CLASSES_ROOT\ACOutCom.ConnectOutlook\Clsid]
[HKEY_CLASSES_ROOT\AppID\{CFDD1051-06E1-4446-BFA1-3D63B5CB2B5A}]
[HKEY_CLASSES_ROOT\AppID\acevents.EXE]
[HKEY_CLASSES_ROOT\AppID\{4C94073B-F8E2-41F1-AC23-B7BA8A08B188}]
[HKEY_CLASSES_ROOT\AppID\aicfgreg.DLL]
[HKEY_CLASSES_ROOT\AppID\{14693D64-AD77-11D3-A629-00104BB6307C}]
[HKEY_CLASSES_ROOT\AppID\accoca.EXE]
[HKEY_CURRENT_USER\Software\Microsoft]
[HKEY_CURRENT_USER\Software\Microsoft\Office]
[HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook]
[HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\Addins]
[HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\Addins\ACOutCom.ConnectOutlook]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivIdentity]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivIdentity\SnapIns]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivIdentity\SnapIns\AdvancedConfigurationManager]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivIdentity\SnapIns\AdvancedDiagnostics]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivIdentity\ActivClient]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivIdentity\ActivClient\Cards]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivIdentity\ActivClient\Card Discovery]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivIdentity\ActivClient\Card Discovery\Data
Model\STANDARD\ServiceList]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivIdentity\ActivClient\Card Discovery\Profiles]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivIdentity\ActivClient\Card Discovery\Profiles\CSV1
Profile5\MANAGER]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivIdentity\ActivClient\Card Discovery\Profiles\CSV1
Profile5\STATIC1]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivIdentity\ActivClient\Card Discovery\Profiles\CSV1
Profile5\STATIC2]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivIdentity\ActivClient\Card Discovery\Profiles\CSV1
Profile5\STATIC3]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivIdentity\ActivClient\Card Discovery\Profiles\CSV1
Profile5\STATIC9]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivIdentity\ActivClient\Card Discovery\Profiles\CSV1
Profile5\STATIC8]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivIdentity\ActivClient\Card Discovery\Profiles\CSV1
Profile5\STATIC7]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivIdentity\ActivClient\Card Discovery\Profiles\CSV1
Profile5\STATIC6]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivIdentity\ActivClient\Card Discovery\Profiles\CSV1
Profile5\STATIC5]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivIdentity\ActivClient\Card Discovery\Profiles\CSV1
Profile5\STATIC4]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivIdentity\ActivClient\Card Discovery\Profiles\CSV1
Profile5\STATIC10]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivIdentity\ActivClient\Card Discovery\Profiles\CAC
Profile1\DEMOGRAPHIC4]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivIdentity\ActivClient\Card Discovery\Profiles\CAC
Profile1\DEMOGRAPHIC3]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivIdentity\ActivClient\Card Discovery\Profiles\CAC
Profile1\DEMOGRAPHIC2]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivIdentity\ActivClient\Card Discovery\Profiles\CAC
Profile1\DEMOGRAPHIC1]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivIdentity\ActivClient\Card Discovery\Profiles\CSV1
Profile1\STATIC11]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivIdentity\ActivClient\Card Discovery\Profiles\CSV1
Profile1\STATIC6]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivIdentity\ActivClient\Card Discovery\Profiles\CSV1
Profile1\STATIC7]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivIdentity\ActivClient\Card Discovery\Profiles\CSV1
Profile1\STATIC8]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivIdentity\ActivClient\Card Discovery\Profiles\CSV1
Profile1\STATIC9]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivIdentity\ActivClient\Card Discovery\Profiles\CSV1
Profile1\STATIC5]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivIdentity\ActivClient\Card Discovery\Profiles\CSV1
Profile1\STATIC4]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivIdentity\ActivClient\Card Discovery\Profiles\CSV1
Profile1\STATIC3]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivIdentity\ActivClient\Card Discovery\Profiles\CSV1
Profile1\STATIC2]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivIdentity\ActivClient\Card Discovery\Profiles\CSV1
Profile1\STATIC1]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivIdentity\ActivClient\Card Discovery\Profiles\CSV1
Profile1\STATIC19]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivIdentity\ActivClient\Card Discovery\Profiles\CSV1
Profile1\STATIC18]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivIdentity\ActivClient\Card Discovery\Profiles\CSV1
Profile1\STATIC17]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivIdentity\ActivClient\Card Discovery\Profiles\CSV1
Profile1\STATIC16]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivIdentity\ActivClient\Card Discovery\Profiles\CSV1
Profile1\STATIC15]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivIdentity\ActivClient\Card Discovery\Profiles\CSV1
Profile1\STATIC14]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivIdentity\ActivClient\Card Discovery\Profiles\CSV1
Profile1\STATIC13]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivIdentity\ActivClient\Card Discovery\Profiles\CSV1
Profile1\STATIC12]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivIdentity\ActivClient\Card Discovery\Profiles\CSV1
Profile1\STATIC10]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivIdentity\ActivClient\Card Discovery\Profiles\CSV1
Profile1\MANAGER]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivIdentity\ActivClient\Card Discovery\Profiles\CSV1
Profile2\STATIC3]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivIdentity\ActivClient\Card Discovery\Profiles\CSV1
Profile2\STATIC2]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivIdentity\ActivClient\Card Discovery\Profiles\CSV1
Profile2\STATIC1]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivIdentity\ActivClient\Card Discovery\Profiles\CSV1
Profile2\MANAGER]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivIdentity\ActivClient\Card Discovery\Profiles\CSV1
Profile3\MANAGER]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivIdentity\ActivClient\Card Discovery\Profiles\CSV1
Profile3\STATIC1]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivIdentity\ActivClient\Card Discovery\Profiles\CSV1
Profile3\STATIC2]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivIdentity\ActivClient\Card Discovery\Profiles\CSV1
Profile6\STATIC3]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivIdentity\ActivClient\Card Discovery\Profiles\CSV1
Profile6\STATIC2]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivIdentity\ActivClient\Card Discovery\Profiles\CSV1
Profile6\STATIC1]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivIdentity\ActivClient\Card Discovery\Profiles\CSV1
Profile6\MANAGER]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivIdentity\ActivClient\Card Discovery\Profiles\CSV1
Profile6\DEMOGRAPHIC2]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivIdentity\ActivClient\Card Discovery\Profiles\CSV1
Profile6\DEMOGRAPHIC1]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivIdentity\ActivClient\Card Discovery\Profiles\CSV1
Profile4\STATIC3]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivIdentity\ActivClient\Card Discovery\Profiles\CSV1
Profile4\STATIC2]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivIdentity\ActivClient\Card Discovery\Profiles\CSV1
Profile4\STATIC1]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivIdentity\ActivClient\Card Discovery\Profiles\CSV1
Profile4\MANAGER]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivIdentity\ActivClient\SnapIns]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivIdentity\ActivClient\SnapIns\UserConsole]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\Outlook]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\Outlook\Addins]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\Outlook\Addins\AcOutCom.ConnectOutlook]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Exchange]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Exchange\Client]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Exchange\Client\Extensions]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\Defaults]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\Defaults\Provider]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\ackpbsc]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\acunlock]
[HKEY_LOCAL_MACHINE\SOFTWARE\GSC]
[HKEY_LOCAL_MACHINE\SOFTWARE\GSC\Policies]
[HKEY_LOCAL_MACHINE\SOFTWARE\GSC\Policies\PIN]
[HKEY_LOCAL_MACHINE\SOFTWARE\GSC\Policies\PIN\Authentication]
[HKEY_LOCAL_MACHINE\SOFTWARE\GSC\Policies\PIN\Authentication\ActivCard]
[HKEY_LOCAL_MACHINE\SOFTWARE\GSC\Policies\PIN\Authentication\ActivCard\Include]
[HKEY_LOCAL_MACHINE\SOFTWARE\GSC\Policies\PIN\Authentication\ActivCard\OpenCard]
[HKEY_LOCAL_MACHINE\SOFTWARE\GSC\Policies\PIN\Authentication\ActivCard\Exclude]
[HKEY_LOCAL_MACHINE\SOFTWARE\GSC\Cryptography]
[HKEY_LOCAL_MACHINE\SOFTWARE\GSC\Cryptography\Certificate Registration]
[HKEY_LOCAL_MACHINE\SOFTWARE\GSC\Cryptography\Certificate Registration\ActivCard]
[HKEY_LOCAL_MACHINE\SOFTWARE\GSC\Cryptography\Certificate Registration\ActivCard\Outlook]
[HKEY_LOCAL_MACHINE\SOFTWARE\GSC\Cryptography\PKCS#11]
[HKEY_LOCAL_MACHINE\SOFTWARE\GSC\Cryptography\PKCS#11\ActivCard]
[HKEY_LOCAL_MACHINE\SOFTWARE\GSC\BSI]
[HKEY_LOCAL_MACHINE\SOFTWARE\GSC\BSI\2.1]
[HKEY_LOCAL_MACHINE\SOFTWARE\GSC\BSI\2.1\ActivCard]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\Diagnostic]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\Logging]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\AutoUpdate]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\AutoUpdate\ActivClient]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\EventService]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\ASPCOM]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\ASPH]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\ASPH\AspCards]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\ASPH\AspCards\COSMOPOLIC]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\ASPH\AspCards\COSMOPOLIC\CARD6]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\ASPH\AspCards\COSMOPOLIC\CARD7]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\ASPH\AspCards\COSMOPOLIC\CARD1]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\ASPH\AspCards\COSMOPOLIC\CARD5]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\ASPH\AspCards\COSMOPOLIC\CARD4]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\ASPH\AspCards\COSMOPOLIC\CARD8]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\ASPH\AspCards\COSMOPOLIC\CARD3]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\ASPH\AspCards\COSMOPOLIC\CARD2]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\ASPH\AspCards\GALACTIC]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\ASPH\AspCards\GALACTIC\CARD2]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\ASPH\AspCards\GALACTIC\CARD1]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\ASPH\AspCards\GEMXPRESSO]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\ASPH\AspCards\GEMXPRESSO\CARD6]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\ASPH\AspCards\GEMXPRESSO\CARD1]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\ASPH\AspCards\GEMXPRESSO\CARD5]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\ASPH\AspCards\GEMXPRESSO\CARD4]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\ASPH\AspCards\GEMXPRESSO\CARD3]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\ASPH\AspCards\GEMXPRESSO\CARD2]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\ASPH\AspCards\GEMXPRESSO\CARD11]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\ASPH\AspCards\GEMXPRESSO\CARD10]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\ASPH\AspCards\GEMXPRESSO\CARD7]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\ASPH\AspCards\GEMXPRESSO\CARD8]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\ASPH\AspCards\GEMXPRESSO\CARD9]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\ASPH\AspCards\GND]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\ASPH\AspCards\GND\CARD6]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\ASPH\AspCards\GND\CARD5]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\ASPH\AspCards\GND\CARD3]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\ASPH\AspCards\GND\CARD4]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\ASPH\AspCards\GND\CARD1]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\ASPH\AspCards\GND\CARD2]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\ASPH\AspCards\GND\CARD7]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\ASPH\AspCards\GND\CARD8]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\ASPH\AspCards\MULTOS]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\ASPH\AspCards\MULTOS\CARD1]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\ASPH\AspCards\SAGEM]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\ASPH\AspCards\SAGEM\CARD1]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\ASPH\AspCards\SHARP]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\ASPH\AspCards\SHARP\CARD1]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\ASPH\AspCards\CFLEX16]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\ASPH\AspCards\CFLEX16\CARD1]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\ASPH\AspCards\MFLEX]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\ASPH\AspCards\MFLEX\CARD4]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\ASPH\AspCards\MFLEX\CARD3]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\ASPH\AspCards\MFLEX\CARD2]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\ASPH\AspCards\MFLEX\CARD1]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\ASPH\AspCards\ACCESS]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\ASPH\AspCards\ACCESS\CARD10]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\ASPH\AspCards\ACCESS\CARD2]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\ASPH\AspCards\ACCESS\CARD9]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\ASPH\AspCards\ACCESS\CARD1]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\ASPH\AspCards\ACCESS\CARD8]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\ASPH\AspCards\ACCESS\CARD7]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\ASPH\AspCards\ACCESS\CARD6]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\ASPH\AspCards\ACCESS\CARD5]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\ASPH\AspCards\ACCESS\CARD4]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\ASPH\AspCards\ACCESS\CARD3]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\ASPH\AspCards\ATMEL]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\ASPH\AspCards\ATMEL\CARD2]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\ASPH\AspCards\ATMEL\CARD1]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\SmartCardAgent]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\CSP]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\GlobalConfig]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\AuthenticationDialog]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\PINInitTool]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\PINInitTool\Card1]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\PINInitTool\Card2]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\PINInitTool\Card3]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\PINInitTool\Card4]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\PINInitTool\Card5]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\PINInitTool\Card7]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\PINInitTool\Card8]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\PINInitTool\Card9]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\PINInitTool\Card10]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\PINInitTool\Card11]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\SAA]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\UserConsole]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\Notification]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\Notification\NoReaderWarning]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\Notification\SmartCardPresenceWarning]
64-bit Registry
[HKEY_CLASSES_ROOT\aicfgreg.CBackupRestore.1]
[HKEY_CLASSES_ROOT\aicfgreg.CBackupRestore.1\CLSID]
[HKEY_CLASSES_ROOT\ACEventService.EventNotifier]
[HKEY_CLASSES_ROOT\ACEventService.EventNotifier\CLSID]
[HKEY_CLASSES_ROOT\ACEventService.EventNotifier\CurVer]
[HKEY_CLASSES_ROOT\ACEventService.EventNotifier.1]
[HKEY_CLASSES_ROOT\ACEventService.EventNotifier.1\CLSID]
[HKEY_CLASSES_ROOT\ACEventSubscriber.Subscriber]
[HKEY_CLASSES_ROOT\ACEventSubscriber.Subscriber\CLSID]
[HKEY_CLASSES_ROOT\ACEventSubscriber.Subscriber\CurVer]
[HKEY_CLASSES_ROOT\ACEventSubscriber.Subscriber.1]
[HKEY_CLASSES_ROOT\ACEventSubscriber.Subscriber.1\CLSID]
[HKEY_CLASSES_ROOT\aicfgreg.CBackupRestore]
[HKEY_CLASSES_ROOT\aicfgreg.CBackupRestore\CurVer]
[HKEY_CLASSES_ROOT\aicfgreg.CBackupRestore\CLSID]
[HKEY_CLASSES_ROOT\Interface\{F2255E01-7804-42D2-AB6F-F3DC4B17875C}]
[HKEY_CLASSES_ROOT\Interface\{F2255E01-7804-42D2-AB6F-F3DC4B17875C}\TypeLib]
[HKEY_CLASSES_ROOT\Interface\{F2255E01-7804-42D2-AB6F-F3DC4B17875C}\ProxyStubClsid32]
[HKEY_CLASSES_ROOT\Interface\{F2255E01-7804-42D2-AB6F-F3DC4B17875C}\ProxyStubClsid]
[HKEY_CLASSES_ROOT\Interface\{3D9C1CF1-7AA4-4ED7-9B8A-EC57B4F76DD8}]
[HKEY_CLASSES_ROOT\Interface\{3D9C1CF1-7AA4-4ED7-9B8A-EC57B4F76DD8}\ProxyStubClsid]
[HKEY_CLASSES_ROOT\Interface\{3D9C1CF1-7AA4-4ED7-9B8A-EC57B4F76DD8}\ProxyStubClsid32]
[HKEY_CLASSES_ROOT\Interface\{3D9C1CF1-7AA4-4ED7-9B8A-EC57B4F76DD8}\TypeLib]
[HKEY_CLASSES_ROOT\Interface\{CC49D6C0-98F0-4320-B3F2-87C3393DECA1}]
[HKEY_CLASSES_ROOT\Interface\{CC49D6C0-98F0-4320-B3F2-87C3393DECA1}\TypeLib]
[HKEY_CLASSES_ROOT\Interface\{CC49D6C0-98F0-4320-B3F2-87C3393DECA1}\ProxyStubClsid32]
[HKEY_CLASSES_ROOT\Interface\{CC49D6C0-98F0-4320-B3F2-87C3393DECA1}\ProxyStubClsid]
[HKEY_CLASSES_ROOT\Interface\{83DA5E0D-61FA-4102-9D19-00DF4E435171}]
[HKEY_CLASSES_ROOT\Interface\{83DA5E0D-61FA-4102-9D19-00DF4E435171}\ProxyStubClsid32]
[HKEY_CLASSES_ROOT\Interface\{83DA5E0D-61FA-4102-9D19-00DF4E435171}\NumMethods]
[HKEY_CLASSES_ROOT\Interface\{80E03EC1-5D9F-440A-B139-AF13D1DF8A0E}]
[HKEY_CLASSES_ROOT\Interface\{80E03EC1-5D9F-440A-B139-AF13D1DF8A0E}\ProxyStubClsid32]
[HKEY_CLASSES_ROOT\Interface\{80E03EC1-5D9F-440A-B139-AF13D1DF8A0E}\NumMethods]
[HKEY_CLASSES_ROOT\Interface\{14693D70-AD77-11D3-A629-00104BB6307C}]
[HKEY_CLASSES_ROOT\Interface\{14693D70-AD77-11D3-A629-00104BB6307C}\ProxyStubClsid32]
[HKEY_CLASSES_ROOT\Interface\{14693D70-AD77-11D3-A629-00104BB6307C}\NumMethods]
[HKEY_CLASSES_ROOT\Interface\{B109E525-FCE1-4894-B80A-4ABEF00EB54A}]
[HKEY_CLASSES_ROOT\Interface\{B109E525-FCE1-4894-B80A-4ABEF00EB54A}\TypeLib]
[HKEY_CLASSES_ROOT\Interface\{B109E525-FCE1-4894-B80A-4ABEF00EB54A}\ProxyStubClsid32]
[HKEY_CLASSES_ROOT\Interface\{B109E525-FCE1-4894-B80A-4ABEF00EB54A}\ProxyStubClsid]
[HKEY_CLASSES_ROOT\TypeLib\{C89A2418-4FB7-47BE-A1A6-206379EE0449}]
[HKEY_CLASSES_ROOT\TypeLib\{C89A2418-4FB7-47BE-A1A6-206379EE0449}\1.0]
[HKEY_CLASSES_ROOT\TypeLib\{C89A2418-4FB7-47BE-A1A6-206379EE0449}\1.0\0]
[HKEY_CLASSES_ROOT\TypeLib\{C89A2418-4FB7-47BE-A1A6-206379EE0449}\1.0\0\win32]
[HKEY_CLASSES_ROOT\TypeLib\{C89A2418-4FB7-47BE-A1A6-206379EE0449}\1.0\FLAGS]
[HKEY_CLASSES_ROOT\TypeLib\{C89A2418-4FB7-47BE-A1A6-206379EE0449}\1.0\HELPDIR]
[HKEY_CLASSES_ROOT\CLSID\{5E248397-8614-4EC5-8926-BD242DC9830A}]
[HKEY_CLASSES_ROOT\CLSID\{5E248397-8614-4EC5-8926-BD242DC9830A}\LocalServer32]
[HKEY_CLASSES_ROOT\CLSID\{5E248397-8614-4EC5-8926-BD242DC9830A}\ProgID]
[HKEY_CLASSES_ROOT\CLSID\{5E248397-8614-4EC5-8926-BD242DC9830A}\TypeLib]
[HKEY_CLASSES_ROOT\CLSID\{5E248397-8614-4EC5-8926-BD242DC9830A}\VersionIndependentProgID]
[HKEY_CLASSES_ROOT\CLSID\{7A8DD2B5-D2A7-4F8B-A9AC-09FEA003113B}]
[HKEY_CLASSES_ROOT\CLSID\{7A8DD2B5-D2A7-4F8B-A9AC-09FEA003113B}\VersionIndependentProgID]
[HKEY_CLASSES_ROOT\CLSID\{7A8DD2B5-D2A7-4F8B-A9AC-09FEA003113B}\TypeLib]
[HKEY_CLASSES_ROOT\CLSID\{7A8DD2B5-D2A7-4F8B-A9AC-09FEA003113B}\Programmable]
[HKEY_CLASSES_ROOT\CLSID\{7A8DD2B5-D2A7-4F8B-A9AC-09FEA003113B}\ProgID]
[HKEY_CLASSES_ROOT\CLSID\{7A8DD2B5-D2A7-4F8B-A9AC-09FEA003113B}\InprocServer32]
[HKEY_CLASSES_ROOT\CLSID\{78D3D4FD-B8BB-429C-8563-2FC9ADF0AC12}]
[HKEY_CLASSES_ROOT\CLSID\{78D3D4FD-B8BB-429C-8563-2FC9ADF0AC12}\Programmable]
[HKEY_CLASSES_ROOT\CLSID\{78D3D4FD-B8BB-429C-8563-2FC9ADF0AC12}\TypeLib]
[HKEY_CLASSES_ROOT\CLSID\{F7C82795-14F3-47D2-ADA4-3183AD6ED9D9}]
[HKEY_CLASSES_ROOT\CLSID\{F7C82795-14F3-47D2-ADA4-3183AD6ED9D9}\Programmable]
[HKEY_CLASSES_ROOT\CLSID\{F7C82795-14F3-47D2-ADA4-3183AD6ED9D9}\TypeLib]
[HKEY_CLASSES_ROOT\CLSID\{F7C82795-14F3-47D2-ADA4-3183AD6ED9D9}\InprocServer32]
[HKEY_CLASSES_ROOT\CLSID\{14693D72-AD77-11D3-A629-00104BB6307C}]
[HKEY_CLASSES_ROOT\CLSID\{83DA5E0D-61FA-4102-9D19-00DF4E435171}]
[HKEY_CLASSES_ROOT\CLSID\{83DA5E0D-61FA-4102-9D19-00DF4E435171}\InProcServer32]
[HKEY_CLASSES_ROOT\CLSID\{C824992C-2940-40C6-9A56-EB40E29C5D47}]
[HKEY_CLASSES_ROOT\CLSID\{D97C28A7-D1A3-4718-9E65-E71C2FFC2555}]
[HKEY_CLASSES_ROOT\CLSID\{D97C28A7-D1A3-4718-9E65-E71C2FFC2555}\InprocServer32]
[HKEY_CLASSES_ROOT\CLSID\{D97C28A7-D1A3-4718-9E65-E71C2FFC2555}\VERSION]
[HKEY_CLASSES_ROOT\CLSID\{D97C28A7-D1A3-4718-9E65-E71C2FFC2555}\Programmable]
[HKEY_CLASSES_ROOT\CLSID\{D97C28A7-D1A3-4718-9E65-E71C2FFC2555}\TypeLib]
[HKEY_CLASSES_ROOT\CLSID\{D97C28A7-D1A3-4718-9E65-E71C2FFC2555}\ProgID]
[HKEY_CLASSES_ROOT\CLSID\{D97C28A7-D1A3-4718-9E65-E71C2FFC2555}\Implemented Categories]
[HKEY_CLASSES_ROOT\CLSID\{D97C28A7-D1A3-4718-9E65-E71C2FFC2555}\Implemented Categories\{40FC6ED5-
2438-11CF-A3DB-080036F12502}]
[HKEY_CLASSES_ROOT\ACOutCom.ConnectOutlook]
[HKEY_CLASSES_ROOT\ACOutCom.ConnectOutlook\Clsid]
[HKEY_CLASSES_ROOT\AppID\{CFDD1051-06E1-4446-BFA1-3D63B5CB2B5A}]
[HKEY_CLASSES_ROOT\AppID\acevents.EXE]
[HKEY_CLASSES_ROOT\AppID\{4C94073B-F8E2-41F1-AC23-B7BA8A08B188}]
[HKEY_CLASSES_ROOT\AppID\aicfgreg.DLL]
[HKEY_CLASSES_ROOT\AppID\{14693D64-AD77-11D3-A629-00104BB6307C}]
[HKEY_CLASSES_ROOT\AppID\accoca.EXE]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivIdentity]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivIdentity\SnapIns]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivIdentity\SnapIns\AdvancedConfigurationManager]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivIdentity\SnapIns\AdvancedDiagnostics]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivIdentity\ActivClient]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivIdentity\ActivClient\Cards]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivIdentity\ActivClient\Card Discovery]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivIdentity\ActivClient\Card Discovery\Data
Model\STANDARD\ServiceList]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivIdentity\ActivClient\Card Discovery\Profiles]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivIdentity\ActivClient\Card Discovery\Profiles\CSV1
Profile5\MANAGER]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivIdentity\ActivClient\Card Discovery\Profiles\CSV1
Profile5\STATIC1]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivIdentity\ActivClient\Card Discovery\Profiles\CSV1
Profile5\STATIC2]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivIdentity\ActivClient\Card Discovery\Profiles\CSV1
Profile5\STATIC3]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivIdentity\ActivClient\Card Discovery\Profiles\CSV1
Profile5\STATIC9]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivIdentity\ActivClient\Card Discovery\Profiles\CSV1
Profile5\STATIC8]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivIdentity\ActivClient\Card Discovery\Profiles\CSV1
Profile5\STATIC7]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivIdentity\ActivClient\Card Discovery\Profiles\CSV1
Profile5\STATIC6]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivIdentity\ActivClient\Card Discovery\Profiles\CSV1
Profile5\STATIC5]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivIdentity\ActivClient\Card Discovery\Profiles\CSV1
Profile5\STATIC4]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivIdentity\ActivClient\Card Discovery\Profiles\CSV1
Profile5\STATIC10]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivIdentity\ActivClient\Card Discovery\Profiles\CAC
Profile1\DEMOGRAPHIC4]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivIdentity\ActivClient\Card Discovery\Profiles\CAC
Profile1\DEMOGRAPHIC3]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivIdentity\ActivClient\Card Discovery\Profiles\CAC
Profile1\DEMOGRAPHIC2]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivIdentity\ActivClient\Card Discovery\Profiles\CAC
Profile1\DEMOGRAPHIC1]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivIdentity\ActivClient\Card Discovery\Profiles\CSV1
Profile1\STATIC11]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivIdentity\ActivClient\Card Discovery\Profiles\CSV1
Profile1\STATIC6]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivIdentity\ActivClient\Card Discovery\Profiles\CSV1
Profile1\STATIC7]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivIdentity\ActivClient\Card Discovery\Profiles\CSV1
Profile1\STATIC8]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivIdentity\ActivClient\Card Discovery\Profiles\CSV1
Profile1\STATIC9]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivIdentity\ActivClient\Card Discovery\Profiles\CSV1
Profile1\STATIC5]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivIdentity\ActivClient\Card Discovery\Profiles\CSV1
Profile1\STATIC4]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivIdentity\ActivClient\Card Discovery\Profiles\CSV1
Profile1\STATIC3]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivIdentity\ActivClient\Card Discovery\Profiles\CSV1
Profile1\STATIC2]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivIdentity\ActivClient\Card Discovery\Profiles\CSV1
Profile1\STATIC1]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivIdentity\ActivClient\Card Discovery\Profiles\CSV1
Profile1\STATIC19]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivIdentity\ActivClient\Card Discovery\Profiles\CSV1
Profile1\STATIC18]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivIdentity\ActivClient\Card Discovery\Profiles\CSV1
Profile1\STATIC17]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivIdentity\ActivClient\Card Discovery\Profiles\CSV1
Profile1\STATIC16]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivIdentity\ActivClient\Card Discovery\Profiles\CSV1
Profile1\STATIC15]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivIdentity\ActivClient\Card Discovery\Profiles\CSV1
Profile1\STATIC14]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivIdentity\ActivClient\Card Discovery\Profiles\CSV1
Profile1\STATIC13]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivIdentity\ActivClient\Card Discovery\Profiles\CSV1
Profile1\STATIC12]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivIdentity\ActivClient\Card Discovery\Profiles\CSV1
Profile1\STATIC10]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivIdentity\ActivClient\Card Discovery\Profiles\CSV1
Profile1\MANAGER]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivIdentity\ActivClient\Card Discovery\Profiles\CSV1
Profile2\STATIC3]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivIdentity\ActivClient\Card Discovery\Profiles\CSV1
Profile2\STATIC2]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivIdentity\ActivClient\Card Discovery\Profiles\CSV1
Profile2\STATIC1]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivIdentity\ActivClient\Card Discovery\Profiles\CSV1
Profile2\MANAGER]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivIdentity\ActivClient\Card Discovery\Profiles\CSV1
Profile3\MANAGER]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivIdentity\ActivClient\Card Discovery\Profiles\CSV1
Profile3\STATIC1]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivIdentity\ActivClient\Card Discovery\Profiles\CSV1
Profile3\STATIC2]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivIdentity\ActivClient\Card Discovery\Profiles\CSV1
Profile6\STATIC3]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivIdentity\ActivClient\Card Discovery\Profiles\CSV1
Profile6\STATIC2]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivIdentity\ActivClient\Card Discovery\Profiles\CSV1
Profile6\STATIC1]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivIdentity\ActivClient\Card Discovery\Profiles\CSV1
Profile6\MANAGER]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivIdentity\ActivClient\Card Discovery\Profiles\CSV1
Profile6\DEMOGRAPHIC2]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivIdentity\ActivClient\Card Discovery\Profiles\CSV1
Profile6\DEMOGRAPHIC1]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivIdentity\ActivClient\Card Discovery\Profiles\CSV1
Profile4\STATIC3]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivIdentity\ActivClient\Card Discovery\Profiles\CSV1
Profile4\STATIC2]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivIdentity\ActivClient\Card Discovery\Profiles\CSV1
Profile4\STATIC1]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivIdentity\ActivClient\Card Discovery\Profiles\CSV1
Profile4\MANAGER]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivIdentity\ActivClient\SnapIns]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivIdentity\ActivClient\SnapIns\UserConsole]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\Outlook]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\Outlook\Addins]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\Outlook\Addins\AcOutCom.ConnectOutlook]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Exchange]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Exchange\Client]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Exchange\Client\Extensions]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\Defaults]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\Defaults\Provider]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\ackpbsc]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\acunlock]
[HKEY_LOCAL_MACHINE\SOFTWARE\GSC]
[HKEY_LOCAL_MACHINE\SOFTWARE\GSC\Policies]
[HKEY_LOCAL_MACHINE\SOFTWARE\GSC\Policies\PIN]
[HKEY_LOCAL_MACHINE\SOFTWARE\GSC\Policies\PIN\Authentication]
[HKEY_LOCAL_MACHINE\SOFTWARE\GSC\Policies\PIN\Authentication\ActivCard]
[HKEY_LOCAL_MACHINE\SOFTWARE\GSC\Policies\PIN\Authentication\ActivCard\Include]
[HKEY_LOCAL_MACHINE\SOFTWARE\GSC\Policies\PIN\Authentication\ActivCard\OpenCard]
[HKEY_LOCAL_MACHINE\SOFTWARE\GSC\Policies\PIN\Authentication\ActivCard\Exclude]
[HKEY_LOCAL_MACHINE\SOFTWARE\GSC\Cryptography]
[HKEY_LOCAL_MACHINE\SOFTWARE\GSC\Cryptography\Certificate Registration]
[HKEY_LOCAL_MACHINE\SOFTWARE\GSC\Cryptography\Certificate Registration\ActivCard]
[HKEY_LOCAL_MACHINE\SOFTWARE\GSC\Cryptography\Certificate Registration\ActivCard\Outlook]
[HKEY_LOCAL_MACHINE\SOFTWARE\GSC\Cryptography\PKCS#11]
[HKEY_LOCAL_MACHINE\SOFTWARE\GSC\Cryptography\PKCS#11\ActivCard]
[HKEY_LOCAL_MACHINE\SOFTWARE\GSC\BSI]
[HKEY_LOCAL_MACHINE\SOFTWARE\GSC\BSI\2.1]
[HKEY_LOCAL_MACHINE\SOFTWARE\GSC\BSI\2.1\ActivCard]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\Diagnostic]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\Logging]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\AutoUpdate]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\AutoUpdate\ActivClient]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\EventService]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\ASPCOM]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\ASPH]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\ASPH\AspCards]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\ASPH\AspCards\COSMOPOLIC]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\ASPH\AspCards\COSMOPOLIC\CARD6]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\ASPH\AspCards\COSMOPOLIC\CARD7]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\ASPH\AspCards\COSMOPOLIC\CARD1]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\ASPH\AspCards\COSMOPOLIC\CARD5]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\ASPH\AspCards\COSMOPOLIC\CARD4]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\ASPH\AspCards\COSMOPOLIC\CARD8]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\ASPH\AspCards\COSMOPOLIC\CARD3]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\ASPH\AspCards\COSMOPOLIC\CARD2]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\ASPH\AspCards\GALACTIC]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\ASPH\AspCards\GALACTIC\CARD2]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\ASPH\AspCards\GALACTIC\CARD1]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\ASPH\AspCards\GEMXPRESSO]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\ASPH\AspCards\GEMXPRESSO\CARD6]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\ASPH\AspCards\GEMXPRESSO\CARD1]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\ASPH\AspCards\GEMXPRESSO\CARD5]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\ASPH\AspCards\GEMXPRESSO\CARD4]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\ASPH\AspCards\GEMXPRESSO\CARD3]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\ASPH\AspCards\GEMXPRESSO\CARD2]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\ASPH\AspCards\GEMXPRESSO\CARD11]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\ASPH\AspCards\GEMXPRESSO\CARD10]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\ASPH\AspCards\GEMXPRESSO\CARD7]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\ASPH\AspCards\GEMXPRESSO\CARD8]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\ASPH\AspCards\GEMXPRESSO\CARD9]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\ASPH\AspCards\GND]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\ASPH\AspCards\GND\CARD6]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\ASPH\AspCards\GND\CARD5]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\ASPH\AspCards\GND\CARD3]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\ASPH\AspCards\GND\CARD4]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\ASPH\AspCards\GND\CARD1]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\ASPH\AspCards\GND\CARD2]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\ASPH\AspCards\GND\CARD7]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\ASPH\AspCards\GND\CARD8]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\ASPH\AspCards\MULTOS]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\ASPH\AspCards\MULTOS\CARD1]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\ASPH\AspCards\SAGEM]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\ASPH\AspCards\SAGEM\CARD1]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\ASPH\AspCards\SHARP]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\ASPH\AspCards\SHARP\CARD1]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\ASPH\AspCards\CFLEX16]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\ASPH\AspCards\CFLEX16\CARD1]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\ASPH\AspCards\MFLEX]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\ASPH\AspCards\MFLEX\CARD4]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\ASPH\AspCards\MFLEX\CARD3]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\ASPH\AspCards\MFLEX\CARD2]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\ASPH\AspCards\MFLEX\CARD1]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\ASPH\AspCards\ACCESS]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\ASPH\AspCards\ACCESS\CARD10]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\ASPH\AspCards\ACCESS\CARD2]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\ASPH\AspCards\ACCESS\CARD9]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\ASPH\AspCards\ACCESS\CARD1]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\ASPH\AspCards\ACCESS\CARD8]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\ASPH\AspCards\ACCESS\CARD7]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\ASPH\AspCards\ACCESS\CARD6]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\ASPH\AspCards\ACCESS\CARD5]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\ASPH\AspCards\ACCESS\CARD4]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\ASPH\AspCards\ACCESS\CARD3]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\ASPH\AspCards\ATMEL]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\ASPH\AspCards\ATMEL\CARD2]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\ASPH\AspCards\ATMEL\CARD1]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\SmartCardAgent]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\CSP]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\GlobalConfig]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\AuthenticationDialog]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\PINInitTool]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\PINInitTool\Card1]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\PINInitTool\Card2]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\PINInitTool\Card3]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\PINInitTool\Card4]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\PINInitTool\Card5]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\PINInitTool\Card7]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\PINInitTool\Card8]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\PINInitTool\Card9]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\PINInitTool\Card10]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\PINInitTool\Card11]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\UserConsole]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\Notification]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\Notification\NoReaderWarning]
[HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\ActivClient\Notification\SmartCardPresenceWarning]
[HKEY_CLASSES_ROOT\acCOMpkcscallback.PKCScallbackInterface]
[HKEY_CLASSES_ROOT\acCOMpkcscallback.PKCScallbackInterface\CurVer]
[HKEY_CLASSES_ROOT\acCOMpkcscallback.PKCScallbackInterface\CLSID]
[HKEY_CLASSES_ROOT\acCOMpkcscallback.PKCScallbackInterfa.1]
[HKEY_CLASSES_ROOT\acCOMpkcscallback.PKCScallbackInterfa.1\CLSID]
[HKEY_CLASSES_ROOT\Interface\{D147D7C6-41F8-45E5-96C5-216657A9C173}]
[HKEY_CLASSES_ROOT\Interface\{D147D7C6-41F8-45E5-96C5-216657A9C173}\ProxyStubClsid32]
[HKEY_CLASSES_ROOT\Interface\{D147D7C6-41F8-45E5-96C5-216657A9C173}\NumMethods]
[HKEY_CLASSES_ROOT\Interface\{D147D7C6-41F8-45E5-96C5-216657A9C173}\TypeLib]
[HKEY_CLASSES_ROOT\Interface\{D147D7C6-41F8-45E5-96C5-216657A9C173}\ProxyStubClsid]
[HKEY_CLASSES_ROOT\Interface\{668456A8-24D6-4243-B106-B8F53F944640}]
[HKEY_CLASSES_ROOT\Interface\{668456A8-24D6-4243-B106-B8F53F944640}\NumMethods]
[HKEY_CLASSES_ROOT\Interface\{668456A8-24D6-4243-B106-B8F53F944640}\ProxyStubClsid32]
[HKEY_CLASSES_ROOT\Interface\{668456A8-24D6-4243-B106-B8F53F944640}\ProxyStubClsid]
[HKEY_CLASSES_ROOT\Interface\{668456A8-24D6-4243-B106-B8F53F944640}\TypeLib]
[HKEY_CLASSES_ROOT\Interface\{05EEE5A9-F903-4D54-999C-A43C547EF034}]
[HKEY_CLASSES_ROOT\Interface\{05EEE5A9-F903-4D54-999C-A43C547EF034}\NumMethods]
[HKEY_CLASSES_ROOT\Interface\{05EEE5A9-F903-4D54-999C-A43C547EF034}\ProxyStubClsid32]
[HKEY_CLASSES_ROOT\Interface\{05EEE5A9-F903-4D54-999C-A43C547EF034}\TypeLib]
[HKEY_CLASSES_ROOT\Interface\{05EEE5A9-F903-4D54-999C-A43C547EF034}\ProxyStubClsid]
[HKEY_CLASSES_ROOT\Interface\{2599E050-87CD-49F0-9A49-92DAED39D313}]
[HKEY_CLASSES_ROOT\Interface\{2599E050-87CD-49F0-9A49-92DAED39D313}\TypeLib]
[HKEY_CLASSES_ROOT\Interface\{2599E050-87CD-49F0-9A49-92DAED39D313}\ProxyStubClsid]
[HKEY_CLASSES_ROOT\Interface\{2599E050-87CD-49F0-9A49-92DAED39D313}\NumMethods]
[HKEY_CLASSES_ROOT\Interface\{2599E050-87CD-49F0-9A49-92DAED39D313}\ProxyStubClsid32]
[HKEY_CLASSES_ROOT\Interface\{193795BC-B81F-4900-B391-349EA9019C0F}]
[HKEY_CLASSES_ROOT\Interface\{193795BC-B81F-4900-B391-349EA9019C0F}\NumMethods]
[HKEY_CLASSES_ROOT\Interface\{193795BC-B81F-4900-B391-349EA9019C0F}\ProxyStubClsid32]
[HKEY_CLASSES_ROOT\Interface\{193795BC-B81F-4900-B391-349EA9019C0F}\TypeLib]
[HKEY_CLASSES_ROOT\Interface\{193795BC-B81F-4900-B391-349EA9019C0F}\ProxyStubClsid]
[HKEY_CLASSES_ROOT\Interface\{7006647C-AB15-49D5-AC04-AF39A8BAC71B}]
[HKEY_CLASSES_ROOT\Interface\{7006647C-AB15-49D5-AC04-AF39A8BAC71B}\TypeLib]
[HKEY_CLASSES_ROOT\Interface\{7006647C-AB15-49D5-AC04-AF39A8BAC71B}\ProxyStubClsid]
[HKEY_CLASSES_ROOT\Interface\{7006647C-AB15-49D5-AC04-AF39A8BAC71B}\NumMethods]
[HKEY_CLASSES_ROOT\Interface\{7006647C-AB15-49D5-AC04-AF39A8BAC71B}\ProxyStubClsid32]
[HKEY_CLASSES_ROOT\Interface\{88FA504A-1B4F-42B1-9848-AE6209F09447}]
[HKEY_CLASSES_ROOT\Interface\{88FA504A-1B4F-42B1-9848-AE6209F09447}\TypeLib]
[HKEY_CLASSES_ROOT\Interface\{88FA504A-1B4F-42B1-9848-AE6209F09447}\NumMethods]
[HKEY_CLASSES_ROOT\Interface\{88FA504A-1B4F-42B1-9848-AE6209F09447}\ProxyStubClsid32]
[HKEY_CLASSES_ROOT\Interface\{D1C5856D-FE18-4DA5-B29B-6CE61B9D2A26}]
[HKEY_CLASSES_ROOT\Interface\{D1C5856D-FE18-4DA5-B29B-6CE61B9D2A26}\TypeLib]
[HKEY_CLASSES_ROOT\Interface\{D1C5856D-FE18-4DA5-B29B-6CE61B9D2A26}\ProxyStubClsid]
[HKEY_CLASSES_ROOT\Interface\{D1C5856D-FE18-4DA5-B29B-6CE61B9D2A26}\NumMethods]
[HKEY_CLASSES_ROOT\Interface\{D1C5856D-FE18-4DA5-B29B-6CE61B9D2A26}\ProxyStubClsid32]
[HKEY_CLASSES_ROOT\Interface\{67228205-C4C6-45D6-AAAE-CBF72A35D1B3}]
[HKEY_CLASSES_ROOT\Interface\{67228205-C4C6-45D6-AAAE-CBF72A35D1B3}\TypeLib]
[HKEY_CLASSES_ROOT\Interface\{67228205-C4C6-45D6-AAAE-CBF72A35D1B3}\ProxyStubClsid]
[HKEY_CLASSES_ROOT\Interface\{67228205-C4C6-45D6-AAAE-CBF72A35D1B3}\NumMethods]
[HKEY_CLASSES_ROOT\Interface\{67228205-C4C6-45D6-AAAE-CBF72A35D1B3}\ProxyStubClsid32]
[HKEY_CLASSES_ROOT\Interface\{DA84C1FE-6148-4676-9D5E-0D92C576248C}]
[HKEY_CLASSES_ROOT\Interface\{DA84C1FE-6148-4676-9D5E-0D92C576248C}\TypeLib]
[HKEY_CLASSES_ROOT\Interface\{DA84C1FE-6148-4676-9D5E-0D92C576248C}\ProxyStubClsid]
[HKEY_CLASSES_ROOT\Interface\{DA84C1FE-6148-4676-9D5E-0D92C576248C}\NumMethods]
[HKEY_CLASSES_ROOT\Interface\{DA84C1FE-6148-4676-9D5E-0D92C576248C}\ProxyStubClsid32]
[HKEY_CLASSES_ROOT\Interface\{EE59FE67-46FB-4435-A2DD-8277AEAD3D12}]
[HKEY_CLASSES_ROOT\Interface\{EE59FE67-46FB-4435-A2DD-8277AEAD3D12}\TypeLib]
[HKEY_CLASSES_ROOT\Interface\{EE59FE67-46FB-4435-A2DD-8277AEAD3D12}\ProxyStubClsid]
[HKEY_CLASSES_ROOT\Interface\{EE59FE67-46FB-4435-A2DD-8277AEAD3D12}\NumMethods]
[HKEY_CLASSES_ROOT\Interface\{EE59FE67-46FB-4435-A2DD-8277AEAD3D12}\ProxyStubClsid32]
[HKEY_CLASSES_ROOT\Interface\{CEAC0E85-53CE-4C93-A481-2FAB9DE41D8D}]
[HKEY_CLASSES_ROOT\Interface\{CEAC0E85-53CE-4C93-A481-2FAB9DE41D8D}\TypeLib]
[HKEY_CLASSES_ROOT\Interface\{CEAC0E85-53CE-4C93-A481-2FAB9DE41D8D}\ProxyStubClsid]
[HKEY_CLASSES_ROOT\Interface\{CEAC0E85-53CE-4C93-A481-2FAB9DE41D8D}\NumMethods]
[HKEY_CLASSES_ROOT\Interface\{CEAC0E85-53CE-4C93-A481-2FAB9DE41D8D}\ProxyStubClsid32]
[HKEY_CLASSES_ROOT\Interface\{A88CA4D6-D6F2-445F-9008-E79564B48D5E}]
[HKEY_CLASSES_ROOT\Interface\{A88CA4D6-D6F2-445F-9008-E79564B48D5E}\TypeLib]
[HKEY_CLASSES_ROOT\Interface\{A88CA4D6-D6F2-445F-9008-E79564B48D5E}\ProxyStubClsid]
[HKEY_CLASSES_ROOT\Interface\{A88CA4D6-D6F2-445F-9008-E79564B48D5E}\NumMethods]
[HKEY_CLASSES_ROOT\Interface\{A88CA4D6-D6F2-445F-9008-E79564B48D5E}\ProxyStubClsid32]
[HKEY_CLASSES_ROOT\Interface\{092C6063-2247-4C0E-B2D2-E961D1486FDD}]
[HKEY_CLASSES_ROOT\Interface\{092C6063-2247-4C0E-B2D2-E961D1486FDD}\TypeLib]
[HKEY_CLASSES_ROOT\Interface\{092C6063-2247-4C0E-B2D2-E961D1486FDD}\ProxyStubClsid]
[HKEY_CLASSES_ROOT\Interface\{092C6063-2247-4C0E-B2D2-E961D1486FDD}\NumMethods]
[HKEY_CLASSES_ROOT\Interface\{092C6063-2247-4C0E-B2D2-E961D1486FDD}\ProxyStubClsid32]
[HKEY_CLASSES_ROOT\Interface\{DF978174-43D7-4DAC-8290-6791468C9456}]
[HKEY_CLASSES_ROOT\Interface\{DF978174-43D7-4DAC-8290-6791468C9456}\TypeLib]
[HKEY_CLASSES_ROOT\Interface\{DF978174-43D7-4DAC-8290-6791468C9456}\ProxyStubClsid]
[HKEY_CLASSES_ROOT\Interface\{DF978174-43D7-4DAC-8290-6791468C9456}\NumMethods]
[HKEY_CLASSES_ROOT\Interface\{DF978174-43D7-4DAC-8290-6791468C9456}\ProxyStubClsid32]
[HKEY_CLASSES_ROOT\Interface\{AE06D5D4-FB02-4248-9043-349D130B644C}]
[HKEY_CLASSES_ROOT\Interface\{AE06D5D4-FB02-4248-9043-349D130B644C}\TypeLib]
[HKEY_CLASSES_ROOT\Interface\{AE06D5D4-FB02-4248-9043-349D130B644C}\ProxyStubClsid]
[HKEY_CLASSES_ROOT\Interface\{AE06D5D4-FB02-4248-9043-349D130B644C}\NumMethods]
[HKEY_CLASSES_ROOT\Interface\{AE06D5D4-FB02-4248-9043-349D130B644C}\ProxyStubClsid32]
[HKEY_CLASSES_ROOT\Interface\{250E0ABC-E9A3-40D4-A556-E91384C372DA}]
[HKEY_CLASSES_ROOT\Interface\{250E0ABC-E9A3-40D4-A556-E91384C372DA}\TypeLib]
[HKEY_CLASSES_ROOT\Interface\{250E0ABC-E9A3-40D4-A556-E91384C372DA}\ProxyStubClsid]
[HKEY_CLASSES_ROOT\Interface\{250E0ABC-E9A3-40D4-A556-E91384C372DA}\NumMethods]
[HKEY_CLASSES_ROOT\Interface\{250E0ABC-E9A3-40D4-A556-E91384C372DA}\ProxyStubClsid32]
[HKEY_CLASSES_ROOT\Interface\{F595C96B-A35E-4A6E-A40A-0C940961B1EA}]
[HKEY_CLASSES_ROOT\Interface\{F595C96B-A35E-4A6E-A40A-0C940961B1EA}\TypeLib]
[HKEY_CLASSES_ROOT\Interface\{F595C96B-A35E-4A6E-A40A-0C940961B1EA}\ProxyStubClsid]
[HKEY_CLASSES_ROOT\Interface\{F595C96B-A35E-4A6E-A40A-0C940961B1EA}\NumMethods]
[HKEY_CLASSES_ROOT\Interface\{F595C96B-A35E-4A6E-A40A-0C940961B1EA}\ProxyStubClsid32]
[HKEY_CLASSES_ROOT\Interface\{9D0FA17A-55A5-4EA4-B687-2286C4D5E9E9}]
[HKEY_CLASSES_ROOT\Interface\{9D0FA17A-55A5-4EA4-B687-2286C4D5E9E9}\TypeLib]
[HKEY_CLASSES_ROOT\Interface\{9D0FA17A-55A5-4EA4-B687-2286C4D5E9E9}\ProxyStubClsid]
[HKEY_CLASSES_ROOT\Interface\{9D0FA17A-55A5-4EA4-B687-2286C4D5E9E9}\NumMethods]
[HKEY_CLASSES_ROOT\Interface\{9D0FA17A-55A5-4EA4-B687-2286C4D5E9E9}\ProxyStubClsid32]
[HKEY_CLASSES_ROOT\Interface\{87CC499D-B2AB-4800-8301-0A7CB6665411}]
[HKEY_CLASSES_ROOT\Interface\{87CC499D-B2AB-4800-8301-0A7CB6665411}\TypeLib]
[HKEY_CLASSES_ROOT\Interface\{87CC499D-B2AB-4800-8301-0A7CB6665411}\ProxyStubClsid]
[HKEY_CLASSES_ROOT\Interface\{87CC499D-B2AB-4800-8301-0A7CB6665411}\NumMethods]
[HKEY_CLASSES_ROOT\Interface\{87CC499D-B2AB-4800-8301-0A7CB6665411}\ProxyStubClsid32]
[HKEY_CLASSES_ROOT\Interface\{2B25B7EE-C875-40DC-AA05-991149DB87B6}]
[HKEY_CLASSES_ROOT\Interface\{2B25B7EE-C875-40DC-AA05-991149DB87B6}\TypeLib]
[HKEY_CLASSES_ROOT\Interface\{2B25B7EE-C875-40DC-AA05-991149DB87B6}\ProxyStubClsid]
[HKEY_CLASSES_ROOT\Interface\{2B25B7EE-C875-40DC-AA05-991149DB87B6}\NumMethods]
[HKEY_CLASSES_ROOT\Interface\{2B25B7EE-C875-40DC-AA05-991149DB87B6}\ProxyStubClsid32]
[HKEY_CLASSES_ROOT\Interface\{60AC9FBA-C720-4D04-8A29-67821B1D118A}]
[HKEY_CLASSES_ROOT\Interface\{60AC9FBA-C720-4D04-8A29-67821B1D118A}\TypeLib]
[HKEY_CLASSES_ROOT\Interface\{60AC9FBA-C720-4D04-8A29-67821B1D118A}\ProxyStubClsid]
[HKEY_CLASSES_ROOT\Interface\{60AC9FBA-C720-4D04-8A29-67821B1D118A}\NumMethods]
[HKEY_CLASSES_ROOT\Interface\{60AC9FBA-C720-4D04-8A29-67821B1D118A}\ProxyStubClsid32]
[HKEY_CLASSES_ROOT\Interface\{2B48F33B-F761-405F-A7C0-F7CD719A4856}]
[HKEY_CLASSES_ROOT\Interface\{2B48F33B-F761-405F-A7C0-F7CD719A4856}\TypeLib]
[HKEY_CLASSES_ROOT\Interface\{2B48F33B-F761-405F-A7C0-F7CD719A4856}\ProxyStubClsid]
[HKEY_CLASSES_ROOT\Interface\{2B48F33B-F761-405F-A7C0-F7CD719A4856}\NumMethods]
[HKEY_CLASSES_ROOT\Interface\{2B48F33B-F761-405F-A7C0-F7CD719A4856}\ProxyStubClsid32]
[HKEY_CLASSES_ROOT\Interface\88FA504A-1B4F-42B1-9848-AE6209F09447]
[HKEY_CLASSES_ROOT\Interface\88FA504A-1B4F-42B1-9848-AE6209F09447\ProxyStubClsid]
[HKEY_CLASSES_ROOT\TypeLib\{1C58E335-7C7F-4ED7-B4AB-2020BC5C23B3}]
[HKEY_CLASSES_ROOT\TypeLib\{1C58E335-7C7F-4ED7-B4AB-2020BC5C23B3}\1.0]
[HKEY_CLASSES_ROOT\TypeLib\{1C58E335-7C7F-4ED7-B4AB-2020BC5C23B3}\1.0\HELPDIR]
[HKEY_CLASSES_ROOT\TypeLib\{1C58E335-7C7F-4ED7-B4AB-2020BC5C23B3}\1.0\FLAGS]
[HKEY_CLASSES_ROOT\TypeLib\{1C58E335-7C7F-4ED7-B4AB-2020BC5C23B3}\1.0\0]
[HKEY_CLASSES_ROOT\TypeLib\{1C58E335-7C7F-4ED7-B4AB-2020BC5C23B3}\1.0\0\win32]
[HKEY_CLASSES_ROOT\TypeLib\{A6BF8CB6-5D50-4378-9C6C-F9AF402620EC}]
[HKEY_CLASSES_ROOT\TypeLib\{A6BF8CB6-5D50-4378-9C6C-F9AF402620EC}\1.0]
[HKEY_CLASSES_ROOT\TypeLib\{A6BF8CB6-5D50-4378-9C6C-F9AF402620EC}\1.0\FLAGS]
[HKEY_CLASSES_ROOT\TypeLib\{A6BF8CB6-5D50-4378-9C6C-F9AF402620EC}\1.0\HELPDIR]
[HKEY_CLASSES_ROOT\TypeLib\{A6BF8CB6-5D50-4378-9C6C-F9AF402620EC}\1.0\0]
[HKEY_CLASSES_ROOT\TypeLib\{A6BF8CB6-5D50-4378-9C6C-F9AF402620EC}\1.0\0\win64]
[HKEY_CLASSES_ROOT\TypeLib\{5E46E9DF-D73E-4EFC-BB9A-07597C6801E2}]
[HKEY_CLASSES_ROOT\TypeLib\{5E46E9DF-D73E-4EFC-BB9A-07597C6801E2}\1.0]
[HKEY_CLASSES_ROOT\TypeLib\{5E46E9DF-D73E-4EFC-BB9A-07597C6801E2}\1.0\FLAGS]
[HKEY_CLASSES_ROOT\TypeLib\{5E46E9DF-D73E-4EFC-BB9A-07597C6801E2}\1.0\HELPDIR]
[HKEY_CLASSES_ROOT\TypeLib\{5E46E9DF-D73E-4EFC-BB9A-07597C6801E2}\1.0\0]
[HKEY_CLASSES_ROOT\TypeLib\{5E46E9DF-D73E-4EFC-BB9A-07597C6801E2}\1.0\0\win64]
[HKEY_CLASSES_ROOT\TypeLib\{DF79E2F5-15E2-4DC6-8C88-B40BB33C7C4B}]
[HKEY_CLASSES_ROOT\TypeLib\{DF79E2F5-15E2-4DC6-8C88-B40BB33C7C4B}\1.0]
[HKEY_CLASSES_ROOT\TypeLib\{DF79E2F5-15E2-4DC6-8C88-B40BB33C7C4B}\1.0\FLAGS]
[HKEY_CLASSES_ROOT\TypeLib\{DF79E2F5-15E2-4DC6-8C88-B40BB33C7C4B}\1.0\HELPDIR]
[HKEY_CLASSES_ROOT\TypeLib\{DF79E2F5-15E2-4DC6-8C88-B40BB33C7C4B}\1.0\0]
[HKEY_CLASSES_ROOT\TypeLib\{DF79E2F5-15E2-4DC6-8C88-B40BB33C7C4B}\1.0\0\win64]
[HKEY_CLASSES_ROOT\TypeLib\{B2F63BD5-2901-4BDA-8A19-1DC20D1F28F9}]
[HKEY_CLASSES_ROOT\TypeLib\{B2F63BD5-2901-4BDA-8A19-1DC20D1F28F9}\1.0]
[HKEY_CLASSES_ROOT\TypeLib\{B2F63BD5-2901-4BDA-8A19-1DC20D1F28F9}\1.0\FLAGS]
[HKEY_CLASSES_ROOT\TypeLib\{B2F63BD5-2901-4BDA-8A19-1DC20D1F28F9}\1.0\HELPDIR]
[HKEY_CLASSES_ROOT\TypeLib\{B2F63BD5-2901-4BDA-8A19-1DC20D1F28F9}\1.0\0]
[HKEY_CLASSES_ROOT\TypeLib\{B2F63BD5-2901-4BDA-8A19-1DC20D1F28F9}\1.0\0\win64]
[HKEY_CLASSES_ROOT\TypeLib\{D16964CE-4858-47F3-A339-3A42CC5BA327}]
[HKEY_CLASSES_ROOT\TypeLib\{D16964CE-4858-47F3-A339-3A42CC5BA327}\1.0]
[HKEY_CLASSES_ROOT\TypeLib\{D16964CE-4858-47F3-A339-3A42CC5BA327}\1.0\FLAGS]
[HKEY_CLASSES_ROOT\TypeLib\{D16964CE-4858-47F3-A339-3A42CC5BA327}\1.0\HELPDIR]
[HKEY_CLASSES_ROOT\TypeLib\{D16964CE-4858-47F3-A339-3A42CC5BA327}\1.0\0]
[HKEY_CLASSES_ROOT\TypeLib\{D16964CE-4858-47F3-A339-3A42CC5BA327}\1.0\0\win64]
[HKEY_CLASSES_ROOT\CLSID\{05EEE5A9-F903-4D54-999C-A43C547EF034}]
[HKEY_CLASSES_ROOT\CLSID\{05EEE5A9-F903-4D54-999C-A43C547EF034}\InProcServer32]
[HKEY_CLASSES_ROOT\CLSID\{D147D7C6-41F8-45E5-96C5-216657A9C173}]
[HKEY_CLASSES_ROOT\CLSID\{D147D7C6-41F8-45E5-96C5-216657A9C173}\InProcServer32]
[HKEY_CLASSES_ROOT\CLSID\{A33DFD8D-B211-4E41-8BA9-C176EF0BD17C}]
[HKEY_CLASSES_ROOT\CLSID\{A33DFD8D-B211-4E41-8BA9-C176EF0BD17C}\VersionIndependentProgID]
[HKEY_CLASSES_ROOT\CLSID\{A33DFD8D-B211-4E41-8BA9-C176EF0BD17C}\TypeLib]
[HKEY_CLASSES_ROOT\CLSID\{A33DFD8D-B211-4E41-8BA9-C176EF0BD17C}\Programmable]
[HKEY_CLASSES_ROOT\CLSID\{A33DFD8D-B211-4E41-8BA9-C176EF0BD17C}\ProgID]
[HKEY_CLASSES_ROOT\CLSID\{A33DFD8D-B211-4E41-8BA9-C176EF0BD17C}\InprocServer32]
[HKEY_CLASSES_ROOT\CLSID\{668456A8-24D6-4243-B106-B8F53F944640}]
[HKEY_CLASSES_ROOT\CLSID\{668456A8-24D6-4243-B106-B8F53F944640}\InProcServer32]
[HKEY_CLASSES_ROOT\CLSID\{070695CD-CB20-4254-B3EF-6D89228DE220}]
[HKEY_CLASSES_ROOT\CLSID\{070695CD-CB20-4254-B3EF-6D89228DE220}\ProgID]
[HKEY_CLASSES_ROOT\CLSID\{070695CD-CB20-4254-B3EF-6D89228DE220}\TypeLib]
[HKEY_CLASSES_ROOT\CLSID\{070695CD-CB20-4254-B3EF-6D89228DE220}\VersionIndependentProgID]
[HKEY_CLASSES_ROOT\CLSID\{070695CD-CB20-4254-B3EF-6D89228DE220}\LocalServer32]
[HKEY_CLASSES_ROOT\CLSID\{070695CD-CB20-4254-B3EF-6D89228DE220}\Programmable]
[HKEY_CLASSES_ROOT\CLSID\{30E61CBC-8DF2-4ED6-9FD8-D977B5698C66}]
[HKEY_CLASSES_ROOT\CLSID\{30E61CBC-8DF2-4ED6-9FD8-D977B5698C66}\VersionIndependentProgID]
[HKEY_CLASSES_ROOT\CLSID\{30E61CBC-8DF2-4ED6-9FD8-D977B5698C66}\TypeLib]
[HKEY_CLASSES_ROOT\CLSID\{30E61CBC-8DF2-4ED6-9FD8-D977B5698C66}\ProgID]
[HKEY_CLASSES_ROOT\CLSID\{30E61CBC-8DF2-4ED6-9FD8-D977B5698C66}\LocalServer32]
[HKEY_CLASSES_ROOT\CLSID\{30E61CBC-8DF2-4ED6-9FD8-D977B5698C66}\Programmable]
[HKEY_CLASSES_ROOT\CLSID\{2599E050-87CD-49F0-9A49-92DAED39D313}]
[HKEY_CLASSES_ROOT\CLSID\{2599E050-87CD-49F0-9A49-92DAED39D313}\InProcServer32]
[HKEY_CLASSES_ROOT\CLSID\{8EB55F9F-C5DE-4727-BF28-7EA42AADE077}]
[HKEY_CLASSES_ROOT\CLSID\{8EB55F9F-C5DE-4727-BF28-7EA42AADE077}\LocalServer32]
[HKEY_CLASSES_ROOT\CLSID\{8EB55F9F-C5DE-4727-BF28-7EA42AADE077}\ProgID]
[HKEY_CLASSES_ROOT\CLSID\{8EB55F9F-C5DE-4727-BF28-7EA42AADE077}\Programmable]
[HKEY_CLASSES_ROOT\CLSID\{8EB55F9F-C5DE-4727-BF28-7EA42AADE077}\TypeLib]
[HKEY_CLASSES_ROOT\CLSID\{8EB55F9F-C5DE-4727-BF28-7EA42AADE077}\VersionIndependentProgID]
[HKEY_CLASSES_ROOT\CLSID\{193795BC-B81F-4900-B391-349EA9019C0F}]
[HKEY_CLASSES_ROOT\CLSID\{193795BC-B81F-4900-B391-349EA9019C0F}\InProcServer32]
[HKEY_CLASSES_ROOT\CLSID\{CF323C11-8F18-4500-8301-0F99CCC2D054}]
[HKEY_CLASSES_ROOT\CLSID\{CF323C11-8F18-4500-8301-0F99CCC2D054}\Programmable]
[HKEY_CLASSES_ROOT\CLSID\{CF323C11-8F18-4500-8301-0F99CCC2D054}\ProgID]
[HKEY_CLASSES_ROOT\CLSID\{CF323C11-8F18-4500-8301-0F99CCC2D054}\VersionIndependentProgID]
[HKEY_CLASSES_ROOT\CLSID\{CF323C11-8F18-4500-8301-0F99CCC2D054}\LocalServer32]
[HKEY_CLASSES_ROOT\CLSID\{CF323C11-8F18-4500-8301-0F99CCC2D054}\TypeLib]
[HKEY_CLASSES_ROOT\CLSID\{5B985AAD-0DC3-4230-BC40-E62AC276FF03}]
[HKEY_CLASSES_ROOT\CLSID\{5B985AAD-0DC3-4230-BC40-E62AC276FF03}\VersionIndependentProgID]
[HKEY_CLASSES_ROOT\CLSID\{5B985AAD-0DC3-4230-BC40-E62AC276FF03}\TypeLib]
[HKEY_CLASSES_ROOT\CLSID\{5B985AAD-0DC3-4230-BC40-E62AC276FF03}\ProgID]
[HKEY_CLASSES_ROOT\CLSID\{5B985AAD-0DC3-4230-BC40-E62AC276FF03}\LocalServer32]
[HKEY_CLASSES_ROOT\CLSID\{5B985AAD-0DC3-4230-BC40-E62AC276FF03}\Programmable]
[HKEY_CLASSES_ROOT\CLSID\{0D77058D-09A6-4D40-B3C2-FDBA8E77288B}]
[HKEY_CLASSES_ROOT\CLSID\{0D77058D-09A6-4D40-B3C2-FDBA8E77288B}\VersionIndependentProgID]
[HKEY_CLASSES_ROOT\CLSID\{0D77058D-09A6-4D40-B3C2-FDBA8E77288B}\TypeLib]
[HKEY_CLASSES_ROOT\CLSID\{0D77058D-09A6-4D40-B3C2-FDBA8E77288B}\ProgID]
[HKEY_CLASSES_ROOT\CLSID\{0D77058D-09A6-4D40-B3C2-FDBA8E77288B}\LocalServer32]
[HKEY_CLASSES_ROOT\CLSID\{0D77058D-09A6-4D40-B3C2-FDBA8E77288B}\Programmable]
[HKEY_CLASSES_ROOT\CLSID\{38CC0AC0-170A-4FD0-8441-9BD7C7FE6883}]
[HKEY_CLASSES_ROOT\CLSID\{38CC0AC0-170A-4FD0-8441-9BD7C7FE6883}\VersionIndependentProgID]
[HKEY_CLASSES_ROOT\CLSID\{38CC0AC0-170A-4FD0-8441-9BD7C7FE6883}\TypeLib]
[HKEY_CLASSES_ROOT\CLSID\{38CC0AC0-170A-4FD0-8441-9BD7C7FE6883}\ProgID]
[HKEY_CLASSES_ROOT\CLSID\{38CC0AC0-170A-4FD0-8441-9BD7C7FE6883}\LocalServer32]
[HKEY_CLASSES_ROOT\CLSID\{38CC0AC0-170A-4FD0-8441-9BD7C7FE6883}\Programmable]
[HKEY_CLASSES_ROOT\CLSID\{8F5330A7-4214-45F4-8736-0ED72C96DEB0}]
[HKEY_CLASSES_ROOT\CLSID\{8F5330A7-4214-45F4-8736-0ED72C96DEB0}\VersionIndependentProgID]
[HKEY_CLASSES_ROOT\CLSID\{8F5330A7-4214-45F4-8736-0ED72C96DEB0}\TypeLib]
[HKEY_CLASSES_ROOT\CLSID\{8F5330A7-4214-45F4-8736-0ED72C96DEB0}\ProgID]
[HKEY_CLASSES_ROOT\CLSID\{8F5330A7-4214-45F4-8736-0ED72C96DEB0}\LocalServer32]
[HKEY_CLASSES_ROOT\CLSID\{8F5330A7-4214-45F4-8736-0ED72C96DEB0}\Programmable]
[HKEY_CLASSES_ROOT\CLSID\{876DD103-9F92-4960-A705-4EC69B8B0ADA}]
[HKEY_CLASSES_ROOT\CLSID\{876DD103-9F92-4960-A705-4EC69B8B0ADA}\VersionIndependentProgID]
[HKEY_CLASSES_ROOT\CLSID\{876DD103-9F92-4960-A705-4EC69B8B0ADA}\TypeLib]
[HKEY_CLASSES_ROOT\CLSID\{876DD103-9F92-4960-A705-4EC69B8B0ADA}\ProgID]
[HKEY_CLASSES_ROOT\CLSID\{876DD103-9F92-4960-A705-4EC69B8B0ADA}\LocalServer32]
[HKEY_CLASSES_ROOT\CLSID\{876DD103-9F92-4960-A705-4EC69B8B0ADA}\Programmable]
[HKEY_CLASSES_ROOT\CLSID\{6AAF1B76-370B-427E-9D45-729A56826BD3}]
[HKEY_CLASSES_ROOT\CLSID\{6AAF1B76-370B-427E-9D45-729A56826BD3}\VersionIndependentProgID]
[HKEY_CLASSES_ROOT\CLSID\{6AAF1B76-370B-427E-9D45-729A56826BD3}\TypeLib]
[HKEY_CLASSES_ROOT\CLSID\{6AAF1B76-370B-427E-9D45-729A56826BD3}\ProgID]
[HKEY_CLASSES_ROOT\CLSID\{6AAF1B76-370B-427E-9D45-729A56826BD3}\LocalServer32]
[HKEY_CLASSES_ROOT\CLSID\{6AAF1B76-370B-427E-9D45-729A56826BD3}\Programmable]
[HKEY_CLASSES_ROOT\CLSID\{2E03C01D-D9A2-419D-BF56-FCFDA14FF879}]
[HKEY_CLASSES_ROOT\CLSID\{2E03C01D-D9A2-419D-BF56-FCFDA14FF879}\VersionIndependentProgID]
[HKEY_CLASSES_ROOT\CLSID\{2E03C01D-D9A2-419D-BF56-FCFDA14FF879}\TypeLib]
[HKEY_CLASSES_ROOT\CLSID\{2E03C01D-D9A2-419D-BF56-FCFDA14FF879}\ProgID]
[HKEY_CLASSES_ROOT\CLSID\{2E03C01D-D9A2-419D-BF56-FCFDA14FF879}\LocalServer32]
[HKEY_CLASSES_ROOT\CLSID\{2E03C01D-D9A2-419D-BF56-FCFDA14FF879}\Programmable]
[HKEY_CLASSES_ROOT\CLSID\{C0879BC8-FE3C-49CB-9D6F-3295F514E12A}]
[HKEY_CLASSES_ROOT\CLSID\{C0879BC8-FE3C-49CB-9D6F-3295F514E12A}\VersionIndependentProgID]
[HKEY_CLASSES_ROOT\CLSID\{C0879BC8-FE3C-49CB-9D6F-3295F514E12A}\TypeLib]
[HKEY_CLASSES_ROOT\CLSID\{C0879BC8-FE3C-49CB-9D6F-3295F514E12A}\ProgID]
[HKEY_CLASSES_ROOT\CLSID\{C0879BC8-FE3C-49CB-9D6F-3295F514E12A}\LocalServer32]
[HKEY_CLASSES_ROOT\CLSID\{C0879BC8-FE3C-49CB-9D6F-3295F514E12A}\Programmable]
[HKEY_CLASSES_ROOT\CLSID\{A082D824-693A-47D0-832A-918F160F839F}]
[HKEY_CLASSES_ROOT\CLSID\{A082D824-693A-47D0-832A-918F160F839F}\VersionIndependentProgID]
[HKEY_CLASSES_ROOT\CLSID\{A082D824-693A-47D0-832A-918F160F839F}\TypeLib]
[HKEY_CLASSES_ROOT\CLSID\{A082D824-693A-47D0-832A-918F160F839F}\ProgID]
[HKEY_CLASSES_ROOT\CLSID\{A082D824-693A-47D0-832A-918F160F839F}\LocalServer32]
[HKEY_CLASSES_ROOT\CLSID\{A082D824-693A-47D0-832A-918F160F839F}\Programmable]
[HKEY_CLASSES_ROOT\CLSID\{7030D479-1A29-4935-8B42-B4B619992DFF}]
[HKEY_CLASSES_ROOT\CLSID\{7030D479-1A29-4935-8B42-B4B619992DFF}\VersionIndependentProgID]
[HKEY_CLASSES_ROOT\CLSID\{7030D479-1A29-4935-8B42-B4B619992DFF}\TypeLib]
[HKEY_CLASSES_ROOT\CLSID\{7030D479-1A29-4935-8B42-B4B619992DFF}\ProgID]
[HKEY_CLASSES_ROOT\CLSID\{7030D479-1A29-4935-8B42-B4B619992DFF}\LocalServer32]
[HKEY_CLASSES_ROOT\CLSID\{7030D479-1A29-4935-8B42-B4B619992DFF}\Programmable]
[HKEY_CLASSES_ROOT\CLSID\{BD1E4BC3-204A-4937-8D1B-62DF084CE8B0}]
[HKEY_CLASSES_ROOT\CLSID\{BD1E4BC3-204A-4937-8D1B-62DF084CE8B0}\VersionIndependentProgID]
[HKEY_CLASSES_ROOT\CLSID\{BD1E4BC3-204A-4937-8D1B-62DF084CE8B0}\TypeLib]
[HKEY_CLASSES_ROOT\CLSID\{BD1E4BC3-204A-4937-8D1B-62DF084CE8B0}\ProgID]
[HKEY_CLASSES_ROOT\CLSID\{BD1E4BC3-204A-4937-8D1B-62DF084CE8B0}\LocalServer32]
[HKEY_CLASSES_ROOT\CLSID\{BD1E4BC3-204A-4937-8D1B-62DF084CE8B0}\Programmable]
[HKEY_CLASSES_ROOT\CLSID\{08049768-774A-4B91-8B39-87FFBB2BF28E}]
[HKEY_CLASSES_ROOT\CLSID\{08049768-774A-4B91-8B39-87FFBB2BF28E}\VersionIndependentProgID]
[HKEY_CLASSES_ROOT\CLSID\{08049768-774A-4B91-8B39-87FFBB2BF28E}\TypeLib]
[HKEY_CLASSES_ROOT\CLSID\{08049768-774A-4B91-8B39-87FFBB2BF28E}\ProgID]
[HKEY_CLASSES_ROOT\CLSID\{08049768-774A-4B91-8B39-87FFBB2BF28E}\LocalServer32]
[HKEY_CLASSES_ROOT\CLSID\{08049768-774A-4B91-8B39-87FFBB2BF28E}\Programmable]
[HKEY_CLASSES_ROOT\CLSID\{9359DF4E-50D2-419E-989F-FF113D304593}]
[HKEY_CLASSES_ROOT\CLSID\{9359DF4E-50D2-419E-989F-FF113D304593}\VersionIndependentProgID]
[HKEY_CLASSES_ROOT\CLSID\{9359DF4E-50D2-419E-989F-FF113D304593}\TypeLib]
[HKEY_CLASSES_ROOT\CLSID\{9359DF4E-50D2-419E-989F-FF113D304593}\ProgID]
[HKEY_CLASSES_ROOT\CLSID\{9359DF4E-50D2-419E-989F-FF113D304593}\LocalServer32]
[HKEY_CLASSES_ROOT\CLSID\{9359DF4E-50D2-419E-989F-FF113D304593}\Programmable]
[HKEY_CLASSES_ROOT\CLSID\{1C1451BA-4F87-4944-8111-5E4078C87C87}]
[HKEY_CLASSES_ROOT\CLSID\{1C1451BA-4F87-4944-8111-5E4078C87C87}\VersionIndependentProgID]
[HKEY_CLASSES_ROOT\CLSID\{1C1451BA-4F87-4944-8111-5E4078C87C87}\TypeLib]
[HKEY_CLASSES_ROOT\CLSID\{1C1451BA-4F87-4944-8111-5E4078C87C87}\ProgID]
[HKEY_CLASSES_ROOT\CLSID\{1C1451BA-4F87-4944-8111-5E4078C87C87}\LocalServer32]
[HKEY_CLASSES_ROOT\CLSID\{1C1451BA-4F87-4944-8111-5E4078C87C87}\Programmable]
[HKEY_CLASSES_ROOT\CLSID\{190E1E02-263E-4CF5-8978-F6B5838E0090}]
[HKEY_CLASSES_ROOT\CLSID\{190E1E02-263E-4CF5-8978-F6B5838E0090}\VersionIndependentProgID]
[HKEY_CLASSES_ROOT\CLSID\{190E1E02-263E-4CF5-8978-F6B5838E0090}\TypeLib]
[HKEY_CLASSES_ROOT\CLSID\{190E1E02-263E-4CF5-8978-F6B5838E0090}\ProgID]
[HKEY_CLASSES_ROOT\CLSID\{190E1E02-263E-4CF5-8978-F6B5838E0090}\LocalServer32]
[HKEY_CLASSES_ROOT\CLSID\{190E1E02-263E-4CF5-8978-F6B5838E0090}\Programmable]
[HKEY_CLASSES_ROOT\CLSID\{729F85AE-A18C-42F4-8FF1-2861E829866D}]
[HKEY_CLASSES_ROOT\CLSID\{729F85AE-A18C-42F4-8FF1-2861E829866D}\VersionIndependentProgID]
[HKEY_CLASSES_ROOT\CLSID\{729F85AE-A18C-42F4-8FF1-2861E829866D}\TypeLib]
[HKEY_CLASSES_ROOT\CLSID\{729F85AE-A18C-42F4-8FF1-2861E829866D}\ProgID]
[HKEY_CLASSES_ROOT\CLSID\{729F85AE-A18C-42F4-8FF1-2861E829866D}\LocalServer32]
[HKEY_CLASSES_ROOT\CLSID\{729F85AE-A18C-42F4-8FF1-2861E829866D}\Programmable]
[HKEY_CLASSES_ROOT\CLSID\{0D095E72-4D30-42A1-8FEB-DB3F3546D3C0}]
[HKEY_CLASSES_ROOT\CLSID\{0D095E72-4D30-42A1-8FEB-DB3F3546D3C0}\VersionIndependentProgID]
[HKEY_CLASSES_ROOT\CLSID\{0D095E72-4D30-42A1-8FEB-DB3F3546D3C0}\TypeLib]
[HKEY_CLASSES_ROOT\CLSID\{0D095E72-4D30-42A1-8FEB-DB3F3546D3C0}\ProgID]
[HKEY_CLASSES_ROOT\CLSID\{0D095E72-4D30-42A1-8FEB-DB3F3546D3C0}\LocalServer32]
[HKEY_CLASSES_ROOT\CLSID\{0D095E72-4D30-42A1-8FEB-DB3F3546D3C0}\Programmable]
[HKEY_CLASSES_ROOT\CLSID\{46E61AEF-B3AE-48E9-B67E-2E9EA4BCF359}]
[HKEY_CLASSES_ROOT\CLSID\{46E61AEF-B3AE-48E9-B67E-2E9EA4BCF359}\VersionIndependentProgID]
[HKEY_CLASSES_ROOT\CLSID\{46E61AEF-B3AE-48E9-B67E-2E9EA4BCF359}\TypeLib]
[HKEY_CLASSES_ROOT\CLSID\{46E61AEF-B3AE-48E9-B67E-2E9EA4BCF359}\ProgID]
[HKEY_CLASSES_ROOT\CLSID\{46E61AEF-B3AE-48E9-B67E-2E9EA4BCF359}\LocalServer32]
[HKEY_CLASSES_ROOT\CLSID\{46E61AEF-B3AE-48E9-B67E-2E9EA4BCF359}\Programmable]
[HKEY_CLASSES_ROOT\CLSID\{67228205-C4C6-45D6-AAAE-CBF72A35D1B3}]
[HKEY_CLASSES_ROOT\CLSID\{67228205-C4C6-45D6-AAAE-CBF72A35D1B3}\InProcServer32]
[HKEY_CLASSES_ROOT\acCOMbsi21.BSI21]
[HKEY_CLASSES_ROOT\acCOMbsi21.BSI21\CurVer]
[HKEY_CLASSES_ROOT\acCOMbsi21.BSI21\CLSID]
[HKEY_CLASSES_ROOT\acCOMbsi21.BSI21.1]
[HKEY_CLASSES_ROOT\acCOMbsi21.BSI21.1\CLSID]
[HKEY_CLASSES_ROOT\acCOMpiv.PIVInterface]
[HKEY_CLASSES_ROOT\acCOMpiv.PIVInterface\CurVer]
[HKEY_CLASSES_ROOT\acCOMpiv.PIVInterface\CLSID]
[HKEY_CLASSES_ROOT\acCOMpiv.PIVInterface.1]
[HKEY_CLASSES_ROOT\acCOMpiv.PIVInterface.1\CLSID]
[HKEY_CLASSES_ROOT\acCOMpkcs.PKCSInterface]
[HKEY_CLASSES_ROOT\acCOMpkcs.PKCSInterface\CLSID]
[HKEY_CLASSES_ROOT\acCOMpkcs.PKCSInterface\CurVer]
[HKEY_CLASSES_ROOT\acCOMpkcs.PKCSInterface.1]
[HKEY_CLASSES_ROOT\acCOMpkcs.PKCSInterface.1\CLSID]
[HKEY_CLASSES_ROOT\acCOMcsp.CSPInterface.1]
[HKEY_CLASSES_ROOT\acCOMcsp.CSPInterface.1\CLSID]
[HKEY_CLASSES_ROOT\acCOMcsp.CSPInterface]
[HKEY_CLASSES_ROOT\acCOMcsp.CSPInterface\CurVer]
[HKEY_CLASSES_ROOT\acCOMcsp.CSPInterface\CLSID]
[HKEY_CLASSES_ROOT\acCOMacomx.Acomx]
[HKEY_CLASSES_ROOT\acCOMacomx.Acomx\CurVer]
[HKEY_CLASSES_ROOT\acCOMacomx.Acomx\CLSID]
[HKEY_CLASSES_ROOT\acCOMacomx.Acomx.1]
[HKEY_CLASSES_ROOT\acCOMacomx.Acomx.1\CLSID]
[HKEY_CLASSES_ROOT\acCOMacomx.ACStatic]
[HKEY_CLASSES_ROOT\acCOMacomx.ACStatic\CurVer]
[HKEY_CLASSES_ROOT\acCOMacomx.ACStatic\CLSID]
[HKEY_CLASSES_ROOT\acCOMacomx.ACStatic.1]
[HKEY_CLASSES_ROOT\acCOMacomx.ACStatic.1\CLSID]
[HKEY_CLASSES_ROOT\acCOMacomx.Card]
[HKEY_CLASSES_ROOT\acCOMacomx.Card\CurVer]
[HKEY_CLASSES_ROOT\acCOMacomx.Card\CLSID]
[HKEY_CLASSES_ROOT\acCOMacomx.Card.1]
[HKEY_CLASSES_ROOT\acCOMacomx.Card.1\CLSID]
[HKEY_CLASSES_ROOT\acCOMacomx.CardAccessor]
[HKEY_CLASSES_ROOT\acCOMacomx.CardAccessor\CurVer]
[HKEY_CLASSES_ROOT\acCOMacomx.CardAccessor\CLSID]
[HKEY_CLASSES_ROOT\acCOMacomx.CardAccessor.1]
[HKEY_CLASSES_ROOT\acCOMacomx.CardAccessor.1\CLSID]
[HKEY_CLASSES_ROOT\acCOMacomx.CardCriteria]
[HKEY_CLASSES_ROOT\acCOMacomx.CardCriteria\CurVer]
[HKEY_CLASSES_ROOT\acCOMacomx.CardCriteria\CLSID]
[HKEY_CLASSES_ROOT\acCOMacomx.CardCriteria.1]
[HKEY_CLASSES_ROOT\acCOMacomx.CardCriteria.1\CLSID]
[HKEY_CLASSES_ROOT\acCOMacomx.PIN]
[HKEY_CLASSES_ROOT\acCOMacomx.PIN\CurVer]
[HKEY_CLASSES_ROOT\acCOMacomx.PIN\CLSID]
[HKEY_CLASSES_ROOT\acCOMacomx.PIN.1]
[HKEY_CLASSES_ROOT\acCOMacomx.PIN.1\CLSID]
[HKEY_CLASSES_ROOT\acCOMacomx.PINAccessor]
[HKEY_CLASSES_ROOT\acCOMacomx.PINAccessor\CurVer]
[HKEY_CLASSES_ROOT\acCOMacomx.PINAccessor\CLSID]
[HKEY_CLASSES_ROOT\acCOMacomx.PINAccessor.1]
[HKEY_CLASSES_ROOT\acCOMacomx.PINAccessor.1\CLSID]
[HKEY_CLASSES_ROOT\acCOMacomx.PINLogicalCriteria]
[HKEY_CLASSES_ROOT\acCOMacomx.PINLogicalCriteria\CurVer]
[HKEY_CLASSES_ROOT\acCOMacomx.PINLogicalCriteria\CLSID]
[HKEY_CLASSES_ROOT\acCOMacomx.PINLogicalCriteria.1]
[HKEY_CLASSES_ROOT\acCOMacomx.PINLogicalCriteria.1\CLSID]
[HKEY_CLASSES_ROOT\acCOMacomx.Reader]
[HKEY_CLASSES_ROOT\acCOMacomx.Reader\CurVer]
[HKEY_CLASSES_ROOT\acCOMacomx.Reader\CLSID]
[HKEY_CLASSES_ROOT\acCOMacomx.Reader.1]
[HKEY_CLASSES_ROOT\acCOMacomx.Reader.1\CLSID]
[HKEY_CLASSES_ROOT\acCOMacomx.ReaderManager]
[HKEY_CLASSES_ROOT\acCOMacomx.ReaderManager\CurVer]
[HKEY_CLASSES_ROOT\acCOMacomx.ReaderManager\CLSID]
[HKEY_CLASSES_ROOT\acCOMacomx.ReaderManager.1]
[HKEY_CLASSES_ROOT\acCOMacomx.ReaderManager.1\CLSID]
[HKEY_CLASSES_ROOT\acCOMacomx.SDKCardServiceFactory]
[HKEY_CLASSES_ROOT\acCOMacomx.SDKCardServiceFactory\CurVer]
[HKEY_CLASSES_ROOT\acCOMacomx.SDKCardServiceFactory\CLSID]
[HKEY_CLASSES_ROOT\acCOMacomx.SDKCardServiceFactory.1]
[HKEY_CLASSES_ROOT\acCOMacomx.SDKCardServiceFactory.1\CLSID]
[HKEY_CLASSES_ROOT\acCOMacomx.SKI]
[HKEY_CLASSES_ROOT\acCOMacomx.SKI\CurVer]
[HKEY_CLASSES_ROOT\acCOMacomx.SKI\CLSID]
[HKEY_CLASSES_ROOT\acCOMacomx.SKI.1]
[HKEY_CLASSES_ROOT\acCOMacomx.SKI.1\CLSID]
[HKEY_CLASSES_ROOT\acCOMacomx.SKIAccessor]
[HKEY_CLASSES_ROOT\acCOMacomx.SKIAccessor\CurVer]
[HKEY_CLASSES_ROOT\acCOMacomx.SKIAccessor\CLSID]
[HKEY_CLASSES_ROOT\acCOMacomx.SKIAccessor.1]
[HKEY_CLASSES_ROOT\acCOMacomx.SKIAccessor.1\CLSID]
[HKEY_CLASSES_ROOT\acCOMacomx.SKILogicalCriteria]
[HKEY_CLASSES_ROOT\acCOMacomx.SKILogicalCriteria\CurVer]
[HKEY_CLASSES_ROOT\acCOMacomx.SKILogicalCriteria\CLSID]
[HKEY_CLASSES_ROOT\acCOMacomx.SKILogicalCriteria.1]
[HKEY_CLASSES_ROOT\acCOMacomx.SKILogicalCriteria.1\CLSID]
[HKEY_CLASSES_ROOT\acCOMacomx.SmartCardConnection]
[HKEY_CLASSES_ROOT\acCOMacomx.SmartCardConnection\CurVer]
[HKEY_CLASSES_ROOT\acCOMacomx.SmartCardConnection\CLSID]
[HKEY_CLASSES_ROOT\acCOMacomx.SmartCardConnection.1]
[HKEY_CLASSES_ROOT\acCOMacomx.SmartCardConnection.1\CLSID]
[HKEY_CLASSES_ROOT\acCOMacomx.SmartCardConnectionManager]
[HKEY_CLASSES_ROOT\acCOMacomx.SmartCardConnectionManager\CurVer]
[HKEY_CLASSES_ROOT\acCOMacomx.SmartCardConnectionManager\CLSID]
[HKEY_CLASSES_ROOT\acCOMacomx.SmartCardConnectionManager.1]
[HKEY_CLASSES_ROOT\acCOMacomx.SmartCardConnectionManager.1\CLSID]
[HKEY_CLASSES_ROOT\acCOMacomx.StaticAccessor]
[HKEY_CLASSES_ROOT\acCOMacomx.StaticAccessor\CurVer]
[HKEY_CLASSES_ROOT\acCOMacomx.StaticAccessor\CLSID]
[HKEY_CLASSES_ROOT\acCOMacomx.StaticAccessor.1]
[HKEY_CLASSES_ROOT\acCOMacomx.StaticAccessor.1\CLSID]
[HKEY_CLASSES_ROOT\acCOMacomx.StaticLogicalCriteria]
[HKEY_CLASSES_ROOT\acCOMacomx.StaticLogicalCriteria\CurVer]
[HKEY_CLASSES_ROOT\acCOMacomx.StaticLogicalCriteria\CLSID]
[HKEY_CLASSES_ROOT\acCOMacomx.StaticLogicalCriteria.1]
[HKEY_CLASSES_ROOT\acCOMacomx.StaticLogicalCriteria.1\CLSID]
[HKEY_CLASSES_ROOT\AppID\{194FA587-F460-4E6B-8E20-90212C1851F7}]
[HKEY_CLASSES_ROOT\AppID\acCOMpkcscallback.DLL]
[HKEY_CLASSES_ROOT\AppID\acCOMpiv.EXE]
[HKEY_CLASSES_ROOT\AppID\{884A0BCF-1E9D-4485-97A2-CD1F958B3003}]
[HKEY_CLASSES_ROOT\AppID\acCOMbsi21.EXE]
[HKEY_CLASSES_ROOT\AppID\{2FE87B63-6C6D-457C-B161-4AE6DD6D2D0A}]
[HKEY_CLASSES_ROOT\AppID\{3EA348A7-99E9-4E93-9A24-273081580B17}]
[HKEY_CLASSES_ROOT\AppID\acCOMpkcs.EXE]
[HKEY_CLASSES_ROOT\AppID\{4C77A80A-10BB-47C5-8A4D-C0417965CDBD}]
[HKEY_CLASSES_ROOT\AppID\acCOMcsp.EXE]
[HKEY_CLASSES_ROOT\AppID\{2B2D0DFE-BF90-4DBD-BD09-E44C17586E80}]
[HKEY_CLASSES_ROOT\AppID\acCOMacomx.EXE]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\Defaults\Provider\ActivClient Cryptographic
Service Provider]
32-bit Registry
[HKEY_CLASSES_ROOT\Wow6432Node\CLSID\{193795BC-B81F-4900-B391-349EA9019C0F}]
[HKEY_CLASSES_ROOT\Wow6432Node\CLSID\{193795BC-B81F-4900-B391-349EA9019C0F}\InProcServer32]
[HKEY_CLASSES_ROOT\Wow6432Node\Interface\{193795BC-B81F-4900-B391-349EA9019C0F}]
[HKEY_CLASSES_ROOT\Wow6432Node\Interface\{193795BC-B81F-4900-B391-349EA9019C0F}\NumMethods]
[HKEY_CLASSES_ROOT\Wow6432Node\Interface\{193795BC-B81F-4900-B391-349EA9019C0F}\ProxyStubClsid32]
[HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Cryptography]
[HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Cryptography\Defaults]
[HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Cryptography\Defaults\Provider]
[HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Cryptography\Defaults\Provider\ActivClient
Cryptographic Service Provider]
[HKEY_CLASSES_ROOT\Wow6432Node\acCOMpkcscallback.PKCScallbackInterface]
[HKEY_CLASSES_ROOT\Wow6432Node\acCOMpkcscallback.PKCScallbackInterface\CurVer]
[HKEY_CLASSES_ROOT\Wow6432Node\acCOMpkcscallback.PKCScallbackInterface\CLSID]
[HKEY_CLASSES_ROOT\Wow6432Node\acCOMpkcscallback.PKCScallbackInterfa.1]
[HKEY_CLASSES_ROOT\Wow6432Node\acCOMpkcscallback.PKCScallbackInterfa.1\CLSID]
[HKEY_CLASSES_ROOT\Wow6432Node\AppID\{194FA587-F460-4E6B-8E20-90212C1851F7}]
[HKEY_CLASSES_ROOT\Wow6432Node\AppID\acCOMpkcscallback.DLL]
[HKEY_CLASSES_ROOT\Wow6432Node\Interface\{D147D7C6-41F8-45E5-96C5-216657A9C173}]
[HKEY_CLASSES_ROOT\Wow6432Node\Interface\{D147D7C6-41F8-45E5-96C5-216657A9C173}\TypeLib]
[HKEY_CLASSES_ROOT\Wow6432Node\Interface\{D147D7C6-41F8-45E5-96C5-216657A9C173}\ProxyStubClsid]
[HKEY_CLASSES_ROOT\Wow6432Node\Interface\{D147D7C6-41F8-45E5-96C5-216657A9C173}\ProxyStubClsid32]
[HKEY_CLASSES_ROOT\Wow6432Node\CLSID\{A33DFD8D-B211-4E41-8BA9-C176EF0BD17C}]
[HKEY_CLASSES_ROOT\Wow6432Node\CLSID\{A33DFD8D-B211-4E41-8BA9-
C176EF0BD17C}\VersionIndependentProgID]
[HKEY_CLASSES_ROOT\Wow6432Node\CLSID\{A33DFD8D-B211-4E41-8BA9-C176EF0BD17C}\TypeLib]
[HKEY_CLASSES_ROOT\Wow6432Node\CLSID\{A33DFD8D-B211-4E41-8BA9-C176EF0BD17C}\Programmable]
[HKEY_CLASSES_ROOT\Wow6432Node\CLSID\{A33DFD8D-B211-4E41-8BA9-C176EF0BD17C}\ProgID]
[HKEY_CLASSES_ROOT\Wow6432Node\CLSID\{A33DFD8D-B211-4E41-8BA9-C176EF0BD17C}\InprocServer32]
[HKEY_CLASSES_ROOT\Wow6432Node\TypeLib\{1C58E335-7C7F-4ED7-B4AB-2020BC5C23B3}]
[HKEY_CLASSES_ROOT\Wow6432Node\TypeLib\{1C58E335-7C7F-4ED7-B4AB-2020BC5C23B3}\1.0]
[HKEY_CLASSES_ROOT\Wow6432Node\TypeLib\{1C58E335-7C7F-4ED7-B4AB-2020BC5C23B3}\1.0\HELPDIR]
[HKEY_CLASSES_ROOT\Wow6432Node\TypeLib\{1C58E335-7C7F-4ED7-B4AB-2020BC5C23B3}\1.0\FLAGS]
[HKEY_CLASSES_ROOT\Wow6432Node\TypeLib\{1C58E335-7C7F-4ED7-B4AB-2020BC5C23B3}\1.0\0]
[HKEY_CLASSES_ROOT\Wow6432Node\TypeLib\{1C58E335-7C7F-4ED7-B4AB-2020BC5C23B3}\1.0\0\win32]
[HKEY_CLASSES_ROOT\Wow6432Node\CLSID\{D147D7C6-41F8-45E5-96C5-216657A9C173}]
[HKEY_CLASSES_ROOT\Wow6432Node\CLSID\{D147D7C6-41F8-45E5-96C5-216657A9C173}\InProcServer32]
[HKEY_CLASSES_ROOT\Wow6432Node\Interface\{D147D7C6-41F8-45E5-96C5-216657A9C173}]
[HKEY_CLASSES_ROOT\Wow6432Node\Interface\{D147D7C6-41F8-45E5-96C5-216657A9C173}\ProxyStubClsid32]
[HKEY_CLASSES_ROOT\Wow6432Node\Interface\{D147D7C6-41F8-45E5-96C5-216657A9C173}\NumMethods]
[HKEY_CLASSES_ROOT\Wow6432Node\CLSID\{2599E050-87CD-49F0-9A49-92DAED39D313}]
[HKEY_CLASSES_ROOT\Wow6432Node\CLSID\{2599E050-87CD-49F0-9A49-92DAED39D313}\InProcServer32]
[HKEY_CLASSES_ROOT\Wow6432Node\Interface\{2599E050-87CD-49F0-9A49-92DAED39D313}]
[HKEY_CLASSES_ROOT\Wow6432Node\Interface\{2599E050-87CD-49F0-9A49-92DAED39D313}\NumMethods]
[HKEY_CLASSES_ROOT\Wow6432Node\Interface\{2599E050-87CD-49F0-9A49-92DAED39D313}\ProxyStubClsid32]
[HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\GSC]
[HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\GSC\Cryptography]
[HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\GSC\Cryptography\PKCS#11]
[HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\GSC\Cryptography\PKCS#11\ActivCard]
[HKEY_CLASSES_ROOT\Wow6432Node\CLSID\{05EEE5A9-F903-4D54-999C-A43C547EF034}]
[HKEY_CLASSES_ROOT\Wow6432Node\CLSID\{05EEE5A9-F903-4D54-999C-A43C547EF034}\InProcServer32]
[HKEY_CLASSES_ROOT\Wow6432Node\Interface\{05EEE5A9-F903-4D54-999C-A43C547EF034}]
[HKEY_CLASSES_ROOT\Wow6432Node\Interface\{05EEE5A9-F903-4D54-999C-A43C547EF034}\NumMethods]
[HKEY_CLASSES_ROOT\Wow6432Node\Interface\{05EEE5A9-F903-4D54-999C-A43C547EF034}\ProxyStubClsid32]
[HKEY_LOCAL_MACHINE\Software\Wow6432Node\GSC]
[HKEY_LOCAL_MACHINE\Software\Wow6432Node\GSC\BSI]
[HKEY_LOCAL_MACHINE\Software\Wow6432Node\GSC\BSI\2.1]
[HKEY_LOCAL_MACHINE\Software\Wow6432Node\GSC\BSI\2.1\ActivCard]
[HKEY_CLASSES_ROOT\Wow6432Node\CLSID\{668456A8-24D6-4243-B106-B8F53F944640}]
[HKEY_CLASSES_ROOT\Wow6432Node\CLSID\{668456A8-24D6-4243-B106-B8F53F944640}\InProcServer32]
[HKEY_CLASSES_ROOT\Wow6432Node\Interface\{668456A8-24D6-4243-B106-B8F53F944640}]
[HKEY_CLASSES_ROOT\Wow6432Node\Interface\{668456A8-24D6-4243-B106-B8F53F944640}\NumMethods]
[HKEY_CLASSES_ROOT\Wow6432Node\Interface\{668456A8-24D6-4243-B106-B8F53F944640}\ProxyStubClsid32]
[HKEY_CLASSES_ROOT\Wow6432Node\CLSID\{67228205-C4C6-45D6-AAAE-CBF72A35D1B3}]
[HKEY_CLASSES_ROOT\Wow6432Node\CLSID\{67228205-C4C6-45D6-AAAE-CBF72A35D1B3}\InProcServer32]
[HKEY_CLASSES_ROOT\Wow6432Node\Interface\{7006647C-AB15-49D5-AC04-AF39A8BAC71B}]
[HKEY_CLASSES_ROOT\Wow6432Node\Interface\{7006647C-AB15-49D5-AC04-AF39A8BAC71B}\NumMethods]
[HKEY_CLASSES_ROOT\Wow6432Node\Interface\{7006647C-AB15-49D5-AC04-AF39A8BAC71B}\ProxyStubClsid32]
[HKEY_CLASSES_ROOT\Wow6432Node\Interface\{88FA504A-1B4F-42B1-9848-AE6209F09447}]
[HKEY_CLASSES_ROOT\Wow6432Node\Interface\{88FA504A-1B4F-42B1-9848-AE6209F09447}\NumMethods]
[HKEY_CLASSES_ROOT\Wow6432Node\Interface\{88FA504A-1B4F-42B1-9848-AE6209F09447}\ProxyStubClsid32]
[HKEY_CLASSES_ROOT\Wow6432Node\Interface\{D1C5856D-FE18-4DA5-B29B-6CE61B9D2A26}]
[HKEY_CLASSES_ROOT\Wow6432Node\Interface\{D1C5856D-FE18-4DA5-B29B-6CE61B9D2A26}\NumMethods]
[HKEY_CLASSES_ROOT\Wow6432Node\Interface\{D1C5856D-FE18-4DA5-B29B-6CE61B9D2A26}\ProxyStubClsid32]
[HKEY_CLASSES_ROOT\Wow6432Node\Interface\{67228205-C4C6-45D6-AAAE-CBF72A35D1B3}]
[HKEY_CLASSES_ROOT\Wow6432Node\Interface\{67228205-C4C6-45D6-AAAE-CBF72A35D1B3}\NumMethods]
[HKEY_CLASSES_ROOT\Wow6432Node\Interface\{67228205-C4C6-45D6-AAAE-CBF72A35D1B3}\ProxyStubClsid32]
[HKEY_CLASSES_ROOT\Wow6432Node\Interface\{DA84C1FE-6148-4676-9D5E-0D92C576248C}]
[HKEY_CLASSES_ROOT\Wow6432Node\Interface\{DA84C1FE-6148-4676-9D5E-0D92C576248C}\NumMethods]
[HKEY_CLASSES_ROOT\Wow6432Node\Interface\{DA84C1FE-6148-4676-9D5E-0D92C576248C}\ProxyStubClsid32]
[HKEY_CLASSES_ROOT\Wow6432Node\Interface\{EE59FE67-46FB-4435-A2DD-8277AEAD3D12}]
[HKEY_CLASSES_ROOT\Wow6432Node\Interface\{EE59FE67-46FB-4435-A2DD-8277AEAD3D12}\NumMethods]
[HKEY_CLASSES_ROOT\Wow6432Node\Interface\{EE59FE67-46FB-4435-A2DD-8277AEAD3D12}\ProxyStubClsid32]
[HKEY_CLASSES_ROOT\Wow6432Node\Interface\{CEAC0E85-53CE-4C93-A481-2FAB9DE41D8D}]
[HKEY_CLASSES_ROOT\Wow6432Node\Interface\{CEAC0E85-53CE-4C93-A481-2FAB9DE41D8D}\NumMethods]
[HKEY_CLASSES_ROOT\Wow6432Node\Interface\{CEAC0E85-53CE-4C93-A481-2FAB9DE41D8D}\ProxyStubClsid32]
[HKEY_CLASSES_ROOT\Wow6432Node\Interface\{A88CA4D6-D6F2-445F-9008-E79564B48D5E}]
[HKEY_CLASSES_ROOT\Wow6432Node\Interface\{A88CA4D6-D6F2-445F-9008-E79564B48D5E}\NumMethods]
[HKEY_CLASSES_ROOT\Wow6432Node\Interface\{A88CA4D6-D6F2-445F-9008-E79564B48D5E}\ProxyStubClsid32]
[HKEY_CLASSES_ROOT\Wow6432Node\Interface\{092C6063-2247-4C0E-B2D2-E961D1486FDD}]
[HKEY_CLASSES_ROOT\Wow6432Node\Interface\{092C6063-2247-4C0E-B2D2-E961D1486FDD}\NumMethods]
[HKEY_CLASSES_ROOT\Wow6432Node\Interface\{092C6063-2247-4C0E-B2D2-E961D1486FDD}\ProxyStubClsid32]
[HKEY_CLASSES_ROOT\Wow6432Node\Interface\{DF978174-43D7-4DAC-8290-6791468C9456}]
[HKEY_CLASSES_ROOT\Wow6432Node\Interface\{DF978174-43D7-4DAC-8290-6791468C9456}\NumMethods]
[HKEY_CLASSES_ROOT\Wow6432Node\Interface\{DF978174-43D7-4DAC-8290-6791468C9456}\ProxyStubClsid32]
[HKEY_CLASSES_ROOT\Wow6432Node\Interface\{AE06D5D4-FB02-4248-9043-349D130B644C}]
[HKEY_CLASSES_ROOT\Wow6432Node\Interface\{AE06D5D4-FB02-4248-9043-349D130B644C}\NumMethods]
[HKEY_CLASSES_ROOT\Wow6432Node\Interface\{AE06D5D4-FB02-4248-9043-349D130B644C}\ProxyStubClsid32]
[HKEY_CLASSES_ROOT\Wow6432Node\Interface\{250E0ABC-E9A3-40D4-A556-E91384C372DA}]
[HKEY_CLASSES_ROOT\Wow6432Node\Interface\{250E0ABC-E9A3-40D4-A556-E91384C372DA}\NumMethods]
[HKEY_CLASSES_ROOT\Wow6432Node\Interface\{250E0ABC-E9A3-40D4-A556-E91384C372DA}\ProxyStubClsid32]
[HKEY_CLASSES_ROOT\Wow6432Node\Interface\{F595C96B-A35E-4A6E-A40A-0C940961B1EA}]
[HKEY_CLASSES_ROOT\Wow6432Node\Interface\{F595C96B-A35E-4A6E-A40A-0C940961B1EA}\NumMethods]
[HKEY_CLASSES_ROOT\Wow6432Node\Interface\{F595C96B-A35E-4A6E-A40A-0C940961B1EA}\ProxyStubClsid32]
[HKEY_CLASSES_ROOT\Wow6432Node\Interface\{9D0FA17A-55A5-4EA4-B687-2286C4D5E9E9}]
[HKEY_CLASSES_ROOT\Wow6432Node\Interface\{9D0FA17A-55A5-4EA4-B687-2286C4D5E9E9}\NumMethods]
[HKEY_CLASSES_ROOT\Wow6432Node\Interface\{9D0FA17A-55A5-4EA4-B687-2286C4D5E9E9}\ProxyStubClsid32]
[HKEY_CLASSES_ROOT\Wow6432Node\Interface\{87CC499D-B2AB-4800-8301-0A7CB6665411}]
[HKEY_CLASSES_ROOT\Wow6432Node\Interface\{87CC499D-B2AB-4800-8301-0A7CB6665411}\NumMethods]
[HKEY_CLASSES_ROOT\Wow6432Node\Interface\{87CC499D-B2AB-4800-8301-0A7CB6665411}\ProxyStubClsid32]
[HKEY_CLASSES_ROOT\Wow6432Node\Interface\{2B25B7EE-C875-40DC-AA05-991149DB87B6}]
[HKEY_CLASSES_ROOT\Wow6432Node\Interface\{2B25B7EE-C875-40DC-AA05-991149DB87B6}\NumMethods]
[HKEY_CLASSES_ROOT\Wow6432Node\Interface\{2B25B7EE-C875-40DC-AA05-991149DB87B6}\ProxyStubClsid32]
[HKEY_CLASSES_ROOT\Wow6432Node\Interface\{60AC9FBA-C720-4D04-8A29-67821B1D118A}]
[HKEY_CLASSES_ROOT\Wow6432Node\Interface\{60AC9FBA-C720-4D04-8A29-67821B1D118A}\ProxyStubClsid32]
[HKEY_CLASSES_ROOT\Wow6432Node\Interface\{2B48F33B-F761-405F-A7C0-F7CD719A4856}]
[HKEY_CLASSES_ROOT\Wow6432Node\Interface\{2B48F33B-F761-405F-A7C0-F7CD719A4856}\NumMethods]
[HKEY_CLASSES_ROOT\Wow6432Node\Interface\{2B48F33B-F761-405F-A7C0-F7CD719A4856}\ProxyStubClsid32]
• HKEY_LOCAL_MACHINE\SOFTWARE\ActivIdentity\ActivClient\Cards
(used for performance optimization)
• HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\Logging
(used for logging)
• HKEY_LOCAL_MACHINE\SOFTWARE\ActivCard\Diagnostic
(used for diagnostics)
In This Appendix This appendix lists terms and acronyms used throughout the full set of
ActivIdentity ActivClient for Windows technical publications. Not all terms and
Terms acronyms appear in all documents.
272
273 Acronyms
Terms
Certificate Authority (CA) - The CA issues and manages security credentials
and public keys for message encryption in a networked environment. As part of a
Public Key Infrastructure (PKI), a CA checks with a registration authority (RA) to
verify information provided by the requestor of a digital certificate. If the RA
verifies the requestor's information, the CA issues a certificate.
Federal Information Processing Standard 201 (FIPS 201) - FIPS 201 is the
standard for Personal Identity Verification (PIV) cards defined for US Government
employees and contractors.
My Digital ID Card (MDIDC) - This CMS component allows end users to access
the self-service CMS functions, which includes card and credential management.
Public Key Infrastructure (PKI) - PKI describes the laws, policies, standards, and
software that regulate or manipulate certificates and public and private keys.
Symmetric Key Infrastructure (SKI) - SKI keys are used to perform strong
authentication on remote applications. SKI keys encrypt passwords in:
- Synchronous mode (generates 1 password without any challenge. The server uses
the same method to create a password than the smart card)
- Asynchronous: encrypts a challenge
Standalone smart card - Smart card with pre-loaded applets issued by the
manufacturer.
Acronyms
Acronym
What does it stand for
CA
Certificate Authority
CAC
Common Access Card (for the United States Department of Defense)
CSP
Cryptographic Service Provider
FIPS
Federal Information Processing Standard
GAL
Global Address List
GP
GlobalPlatform
OTP
One-Time Password
PKI
Public Key Infrastructure
PIV
Personal Identity Verification
Smart card issued by the United States government to federal employees and contractors.
RA
Registration Authority
SKI
Symmetric Key Infrastructure
Document Information
ActivIdentity, Inc. welcomes your comments and suggestions.
Your input is an important factor in future revisions of this publication. Please let us know
your opinion.
Please send your feedback via email to: tpd@actividentity.com. If you find errors or have
general suggestions for improvement, please indicate the chapter, section and page
number. If you would like a reply, please include your name, company, email address, and
telephone number.
Americas +1 510.574.0100 ActivIdentity Intellectual Property: This document or deliverable(s) contain proprietary
US Federal +1 571.522.1000 information of ActivIdentity Corporation and/or its subsidiaries and affiliates (collectively,
Europe +33 (0) 1.42.04.84.00 “ActivIdentity”) embodying confidential information, ideas, and expressions, no part of which may
Asia Pacific +61 (0) 2.6208.4888 be reproduced or transmitted in any form or by any means, electronic, mechanical, or otherwise,
without prior written permission from ActivIdentity. This document may not be modified, copied,
Email info@actividentity.com
distributed, transmitted, displayed, performed, reproduced, published, licensed, used to create
Web www.actividentity.com
derivative works therefrom, transferred, or sold unless expressly agreed by ActivIdentity. The
furnishing of this document does not imply or expressly provide a license to any of the ActivIdentity
intellectual property.