- Cac Enabler For Mac
- Cac Enabler For Mac Os Sierra Os
- Cac Enabler Program
- Cac Enabler For Mac Os Sierra 10.13
- Cac Enabler For Mac Os Sierra 10.12
- Cac Enabler For Mac Os Sierra Mac
- I too have a problem with my CAC Card reader no longer working on DOD websites. I have a 15' 2017 MBP that shipped with OS Sierra and the same CAC Card reader works just fine on it. In the last month I upgraded this current laptop i am using a 13' late 2013 MBP from OS Sierra to High Sierra and can no longer use this CAC reader on this laptop.
- APPLE MACINTOSH COMPUTER SUPPORT PAGE for HIGH SIERRA (currently 10.13.6) High Sierra 10.13.x Released on 25 September 2017. Look here for installation steps. Verify in Table 1 the specific CAC enabler you need to install to use your CAC with Mac OS High Sierra.
- In order to get the right enabler, be sure to visit our trusty guide to Mac CAC Enablers! It’ll walk you through exactly which enabler is right for you. CAC Access at Home Success Now that you have a CAC reader, certificates, and a CAC Enabler, you should now be able to access any CAC-enabled website and log on using your CAC password and data.
In order for your machine to recognize your CAC certificates and DoD websites as trusted, run the InstallRoot utility (32-bit, 64-bit or Non Administrator) to install the DoD CA certificates on Microsoft operating systems. If you’re running an alternate operating system such as Mac OS or Linux, you can import certificates from the PKCS 7 bundle.
NOTE:
Between mid October 2019 and mid February 2020 everyone in the Army was migrated to use their PIV Authentication certificate for Email access. You no longer use the Email certificate for Enterprise Email or any CAC enabled websites
Mac users who choose to upgrade (or already have upgraded) to Mac OS Catalina (10.15.x) or Big Sur (11.xx.x) will need to uninstall all 3rd Party CAC enablers per https://militarycac.com/macuninstall.htm AND reenable the native smart card ability (very bottom of macuninstall link above)
If you purchased your Mac with OS Catalina (10.15.x) or Big Sur (11.xx.x) already installed, you can skip the uninstall part above and follow the instructions below.
6 'high level' steps needed, follow down the page to make this a painless systematic process
1. | Is your CAC reader 'Mac friendly'? |
2. | Can your Mac 'see' the reader? |
3. | Verify which version of Mac OS you have |
4. | Figure out which CAC (ID card) you have |
5. | Install the DoD certificates |
5a. | Additional DoD certificate installation instructions for Firefox users |
6. | Decide which CAC enabler you want to use (except for 10.12-.15 & 11) |
Step 1: Is your CAC reader Mac friendly?
Visit the USB Readers page to verify the CAC reader you have is Mac friendly.
Visit the USB-C Readers page to verify the CAC reader you have is Mac friendly.
'Some, not all' CAC readers may need to have a driver installed to make it work.
NOTE: Readers such as: SCR-331 & SCR-3500A may need a firmware update (NO OTHER Readers need firmware updates).
Information about these specific readers are in Step 2
Step 2: Can your Mac 'see' the reader?
Plug the CAC reader into an open USB port before proceeding, give it a few moments to install
Step 2a: Click the Apple Icon in the upper left corner of the desktop, select 'About This Mac'
Step 2b: Click 'System Report...' (button)
Step 2c: Verify the CAC reader shows in Hardware, USB, under USB Device Tree. Different readers will show differently, most readers have no problem in this step. See Step 2c1 for specific reader issues.
Step 2c1: Verify firmware version on your SCR-331, SCR-3310 v.20, GSR-202, 202V, 203, or SCR-3500a reader. If you have a reader other than these 6, Proceed directly to step 3
Step 2c1a-SCR-331 reader
If your reader does not look like this, go to the next step.
In the 'Hardware' drop down, click 'USB.' On the right side of the screen under 'USB Device Tree' the window will display all hardware plugged into the USB ports on your Mac. Look for “SCRx31 USB Smart Card Reader.” If the Smart Card reader is present, look at 'Version' in the lower right corner of this box: If you have a number below 5.25, you need to update your firmware to 5.25. If you are already at 5.25, your reader is installed on your system, and no further hardware changes are required. You can now Quit System Profiler and continue to Step 3.
Step 2c1b-SCR-3310 v2.0 reader
If your reader does not look like this, go to the next step.
In the 'Hardware' drop down, click 'USB.' On the right side of the screen under 'USB Device Tree' the window will display all hardware plugged into the USB ports on your Mac. Look for “SCR3310 v2.0 USB Smart Card Reader.” If the Smart Card reader is present, look at 'Version' in the lower right corner of this box: If you have a number below 6.02, it will not read the 'G+D FIPS 201 SCE 7.0' CAC on Mac OS 11.xx.x or 10.15.7. I contacted HID (the company that makes these readers) on 14 DEC 2020 to find a way to update the firmware to 6.02. They said there is not firmware update for the reader. If your reader is older, you may need a new one. Please look at: https://militarycac.com/usbreaders.htm to find a compatible one. If you are already at version 6.02, your reader should work fine on your Mac and no further hardware changes are required. You can now Quit System Profiler and continue to Step 3.
Step 2c1c-SCR-3500A reader
If you have the SCR3500A P/N:905430-1 CAC reader,you may need to install this driver, as the one that installs automatically will not work on most Macs. Hold the control key [on your keyboard] when clicking the .pkg file [with your mouse], select [the word] Open
Step 3: Verify which version of MacOS you have?
(You need to know this information for step 6)
Step 3a: Click the Apple Icon in the upper left corner of your desktop and select 'About This Mac'
Step 3b: Look below Mac OS X for: Example: Version 10.X.X, or 11.X
Step 4: Figure out which CAC (ID Card) you have
(You need to know this information for step 6)
Look at the top back of your ID card for these card types. If you have any version other than the six shown below, you need to visit an ID card office and have it replaced. All CACs [other than these six] were supposed to be replaced prior to 1 October 2012.
Find out how to flip card over video
Step 5: Install the DoD certificates (for Safari and Chrome Users)
Go to Keychain Access
Click: Go (top of screen), Utilities, double click Keychain Access.app
Cac Enabler For Mac
(You can also type: keychain access using Spotlight (this is my preferred method))
Select login (under Keychains),and All Items (under Category).
Download the 5 files via links below (you may need to <ctrl> click, select Download Linked File As... on each link) Save to your downloads folder
Please know... IF You have any DoD certificates already located in your keychain access, you will need to delete them prior to running the AllCerts.p7b file below.
https://militarycac.com/maccerts/AllCerts.p7b,
https://militarycac.com/maccerts/RootCert2.cer,
https://militarycac.com/maccerts/RootCert3.cer,
https://militarycac.com/maccerts/RootCert4.cer, and
Double click each of the files to install certificates into the login section of keychain
Select the Kind column, verify the arrow is pointing up, scroll down to certificate, look for all of the following certificates:
DOD EMAIL CA-33 through DOD EMAIL CA-34,
DOD EMAIL CA-39 through DOD EMAIL CA-44,
DOD EMAIL CA-49 through DOD EMAIL CA-52,
DOD EMAIL CA-59,
DOD ID CA-33 through DOD ID CA-34,
DOD ID CA-39 through DOD ID CA-44,
DOD ID CA-49 through DOD ID CA-52,
DOD ID CA-59
DOD ID SW CA-35 through DOD ID SW CA-38,
DOD ID SW CA-45 through DOD ID SW CA-48,
DoD Root CA 2 through DoD Root CA 5,
DOD SW CA-53 through DOD SW CA-58, and
DOD SW CA-60 through DOD SW CA-61
NOTE: If you are missing any of the above certificates, you have 2 choices,
1. Delete all of them, and re-run the 5 files above, or
Cac Enabler For Mac Os Sierra Os
2. Download the allcerts.zip file and install each of the certificates you are missing individually.
Errors:
Error 100001 Solution
Error 100013 Solution
You may notice some of the certificates will have a red circle with a white X . This means your computer does not trust those certificates
You need to manually trust the DoD Root CA 2, 3, 4, & 5 certificates
Double click each of the DoD Root CA certificates, select the triangle next to Trust, in the When using this certificate: select Always Trust, repeat until all 4 do not have the red circle with a white X.
You may be prompted to enter computer password when you close the window
Once you select Always Trust, your icon will have a light blue circle with a white + on it.
The 'bad certs' that have caused problems for Windows users may show up in the keychain access section on some Macs. These need to be deleted / moved to trash.
The DoD Root CA 2 & 3 you are removing has a light blue frame, leave the yellow frame version. The icons may or may not have a red circle with the white x
or | DoD Interoperability Root CA 1 or CA 2 | certificate | |
DoD Root CA 2 or 3 (light blue frame ONLY) | certificate | ||
or | Federal Bridge CA 2016 or 2013 | certificate | |
or | Federal Common Policy CA | certificate | |
or | or | SHA-1 Federal Root CA G2 | certificate |
or | US DoD CCEB Interoperability Root CA 1 | certificate |
If you have tried accessing CAC enabled sites prior to following these instructions, please go through this page before proceeding
Clearing the keychain (opens a new page)
Please come back to this page to continue installation instructions.
Step 5a: DoD certificate installation instructions for Firefox users
Cac Enabler Program
NOTE: Firefox will not work on Catalina (10.15.x), or last 4 versions of Mac OS if using the native Apple smartcard ability
Download AllCerts.zip, [remember where you save it].
double click the allcerts.zip file (it'll automatically extract into a new folder)
Option 1 to install the certificates (semi automated):
From inside the AllCerts extracted folder, select all of the certificates
<control> click (or Right click) the selected certificates, select Open With, Other...
In the Enable (selection box), change to All Applications
Select Firefox, then Open
You will see several dozen browser tabs open up, let it open as many as it wants..
You will eventually start seeing either of the 2 messages shown next
If the certificate is not already in Firefox, a window will pop up stating 'You have been asked to trust a new Certificate Authority (CA).'
Check all three boxes to allow the certificate to: identify websites, identify email users, and identify software developers
or
'Alert This certificate is already installed as a certificate authority.' Click OK
Once you've added all of the certificates...
• Click Firefox (word) (upper left of your screen)
• Preferences
• Advanced (tab)
• Press Network under the Advanced Tab
• In the Cached Web Content section, click Clear Now (button).
• Quit Firefox and restart it
Option 2 to install the certificates (very tedious manual):
Click Firefox (word) (upper left of your screen)
Preferences
Advanced (tab on left side of screen)
Certificates (tab)
View Certificates (button)
Authorities (tab)
Import (button)
Browse to the DoD certificates (AllCerts) extracted folder you downloaded and extracted above.
Note: You have to do this step for every single certificate
Note2: If the certificate is already in Firefox, a window will pop up stating: 'Alert This certificate is already installed as a certificate authority (CA).' Click OK
Note3: If the certificate is not already in Firefox, a window will pop up stating 'You have been asked to trust a new Certificate Authority (CA).'
Check all three boxes to allow the certificate to: identify websites, identify email users, and identify software developers
Once you've added all of the certificates...
• Click Firefox (word) (upper left of your screen)
• Preferences
• Advanced (tab)
• Press Network under the Advanced Tab
• In the Cached Web Content section, click Clear Now (button).
• Quit Firefox and restart it
Cac Enabler For Mac Os Sierra 10.13
Step 6: Decide which CAC enabler you can / want to use
Only for Mac El Capitan (10.11.x or older)
Cac Enabler For Mac Os Sierra 10.12
After installing the CAC enabler, restart the computer and go to a CAC enabled website
NOTE: Mac OS Sierra (10.12.x), High Sierra (10.13.x), Mojave (10.14.x) or Catalina (10.15.x) computers no longer need a CAC Enabler.
Try to access the CAC enabled site you need to access now
Mac support provided by: Michael Danberry
These are the installers for the larger Smart Card Services project as well as smaller specific installers for individual components, for various macOS releases as noted.
These are forward thinking (and sometimes unstable) services and enhancements that are not supported by Apple’s customer support division, AppleCare, so please do not call them if you are using anything from this site. If you absolutely must receive AppleCare support, it is highly suggested you do not use any of the installers or instructions posted to this project.
If you experience any issues or have questions pertaining to their installation or use, please post that to the relevant Smart Card Services mailing lists. Members of the mailing lists will make every attempt to assist you, but that too is not a replacement for a support contract.
Smart Card Services Releases
Note: Starting with the October 1, 2015 release of the installer for macOS El Capitan v10.11, we will be signing the installers and TokenD bundles for integrity assurance. The installer will be recognized and install properly with Gatekeeper set to default or higher and are installed in a new location (/Library/Security/tokend) to work with System Integrity Protection (SIP) enabled on El Capitan or later. Installers for older versions of macOS have been re-posted, incremented to v2.1.2, and digitally signed. The installation location remains as they were on those OS releases.
Target OS | Installer (.zip) | SHA-256 Hash of .zip File |
---|---|---|
macOS Sierra v10.12 | SmartCardServices2.1.2-OSX10.12.zip | ae927e6f547f77b70b5ecd4ffcb8930e420361b633e00f099a65ad094cd937a4 |
macOS El Capitan v10.11 | SmartCardServices2.1.2-OSX10.11.zip | b32a5381c7465f225f88393d957e66109f11ddfe0c8106956d1ba39d9415558c |
macOS Yosemite v10.10 | SmartCardServices2.1.2-OSX10.10.zip | 0943f65bfed25ca1bc7f5890ac25e50775f0fe1793f3f1cae1b6659e5647207f |
macOS Mavericks v10.9 | SmartCardServices2.1.2-OSX10.09.zip | c8f1c42b0fabb67c0fdca24045f70773656742f6252d1add4248249138dd003c |
macOS Mountain Lion v10.8 | SmartCardServices2.1.2-OSX10.08.zip | 08a23baf5cff5f33100dbc85d6030d0ee9e80e5765f148b3348d8200da9055af |
macOS Lion v10.7 | SmartCardServices2.1.2-OSX10.07.zip | ccf24e88d2273698f55adb09005b444f616dbcd8a644e3289de5b112d6a93792 |
macOS Snow Leopard v10.6 | SmartCardServices2.1.2-OSX10.06.zip | 4133a0a93bcd9d46371c33ed9089edbb1f997c0cc7607331e9b23b1feac44b7f |
These installers provide the TokenD modules which no longer ship directly from Apple as part of macOS beginning with Lion v10.7. Note that these installers will only install onto the corresponding macOS version. The TokenD modules available for installation are: BELPIC, CAC, CACNG, JPKI and PIV, which have all been updated to build 50000 and bundle IDs of org.macosforge.smartcardservices.tokend.<Token Type>
. Previous bundle IDs were configured as com.apple.tokend.<Token Type>
.
New to this release:
- JPKI.tokend - Add support for JPKI.
- cacloginconfig.plist - Default configuration file for those using Attribute Matching or PKINIT configurations.
- SystemCACertificates.keychain - Automatically added to the Keychain Search List if not already present.
- TokenD modules and the Installer are now digitally signed with an Apple DeveloperID.
Security Update SCSSU-201401
Addresses CVE-2013-1867
CVE-2013-1867 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1867
Full Disclosure - http://seclists.org/fulldisclosure/2013/Mar/189
Bug Traq ID: 58618 - http://www.securityfocus.com/bid/58618
Note to JPKI.token Users
Installers updated to v2.0.1 to include an updated JPKI.tokend due to build configuration errors specific to this TokenD. The previous JPKI.token provided in installer v2.0 will fail operational testing and use, so please replace it immediately. If you experience any failure in replacing the previously installed JPKI.tokend, please execute the following command, requiring admin privileges, to remove the currently installed TokenD and re-run the installer:
Smart Card CCID Releases
None at this time
Other TokenD Releases
CAC-NG v1.0 beta for Snow Leopard March 21, 2011
CAC-NG 1.0 shipped in macOS Snow Leopard v10.6.7 and is no longer available as a beta.
OS Requirement: macOS Snow Leopard v10.6.0–10.6.6
Cac Enabler For Mac Os Sierra Mac
This build supports the Gemalto TOPDLGX4 144 cards, but does not yet support the Oberthur ID One 128 v5.5 Dual card. Subsequent builds will provide support needed for the Oberthur card. If you attempt to access this newer Oberthur card, it will be picked up by the original CAC.tokend and will show no certs/keys within Keychain Access, indicating a lack of support.
CAC-NG v0.96 beta for LeopardFeb 2, 2010
OS Requirement: macOS Leopard v10.5.6–10.5.8
SHA-1 Hash: bfa96cccd380b54fbb81dada44897c5d0ff5fa39
All issues reported with the previous installers (v.90 & v.95) have now been fixed!
The Smart Card Services project team is pleased to provide access to the BETA for CAC Next Generation (a.k.a. CAC-NG) TokenD support for macOS Leopard v10.5. Support for Snow Leopard is forthcoming, but you can proceed to test with your macOS 10.5.6+ machines with this installation.
Additional Helpful Tools
SetIdentityPreference.zipJune 28, 2009
OS Requirement: macOS Tiger v10.4
SHA-1 Hash: 231e7c1999ab4fc9cc134b99d4227801eba14e07
This is an AppleScript tool which allows you to set an Identity Preference for mapping a URI (e.g. URL or email address) to one of multiple valid certificates. Beginning with macOS Leopard v10.5.0, this capability was built into the Keychain Access utility, so this tool is not necessary if you are running Leopard or later.