Skip to main content
Skip table of contents

Features of Smart ID Desktop App (macOS)

This article describes the main features of Smart ID Desktop App (macOS)

Features

Smart ID Desktop App

Use cases

Use virtual smart cards for securing the day-to-day business.

Out-of-the box life-cycle management of virtual smart cards through Smart ID.

(tick)

Nexus smart card card middleware integration, see Nexus smart card middleware (macOS)

(tick)

One-time passwords (OTP)

There are two different types of one-time passwords (OTP), as defined by the Initiative for Open Authentication (OATH):

  • Time-based OTP (TOTP): A TOTP is renewed after a fix amount of time, for example 30 seconds. The algorithm that generates each password uses the current time of day as one of its factors, ensuring that each password is unique.

  • Event-based OTP (HOTP): An HOTP is valid per authentication. After authentication a new OTP is generated. 

  • Secure OTP creation based on DSKPP. See RFC6063 for more information.

(tick)  

Platform-related use cases, such as these: 

  • Smart card and Virtual smart card pairing via CryptoTokenKit

  • macOS logon

  • TLS client cert authentication via browser

  • Remote access using VPN or direct access

  • Secure email using S/MIME

  • Native app integration of smart card and virtual smart card through CryptoTokenKit

(tick)  

User interface

Modern user interface which allows the user to:

  • View profile and certificate details

  • Delete profiles

  • Change PIN

  • Read logs and manage log level

  • Change layout of profiles

  • English, German, French and Swedish localization

(tick)  

Lifecycle management

Integrated into the overall Nexus Smart ID architecture for:

For more information on use cases, see Virtual smart card management in Smart ID.

(tick)  

Security

Virtual smart cards on macOS adopts the same security mechanisms as virtual smart cards on the mobile

  • Private keys used for cryptographic operations are stored encrypted in the secure keychain as provided by macOS operating system and underlying hardware solution.

  • Private keys are decrypted via either:

    • Server online PIN validation mechanism (network connection required)

    • Biometrics

(tick)  

Use virtual smart cards for securing the day-to-day business.

Out-of-the box life-cycle management of virtual smart cards through Smart ID.

(tick)  

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.