

- #SAFENET AUTHENTICATION CLIENT FOR MAC .EXE#
- #SAFENET AUTHENTICATION CLIENT FOR MAC INSTALL#
- #SAFENET AUTHENTICATION CLIENT FOR MAC VALIDATION CODE#


#SAFENET AUTHENTICATION CLIENT FOR MAC INSTALL#
Our Windows install has windows-sdk installed which provides signtool.exe at a path similar to C:\Program Files (x86)\Windows Kits\10\bin\2.0\圆4\signtool.exe, I've added an environment variable to our VM which makes finding signtool easier. In the end, the solution was to export the certificate and pass the credentials to signtool with a specific set of arguments (this has since been detailed in this SO post). Create a wrapper program to automatically respond to token pin requests, but it didn't work on Windor newer for me.There are tools such as SafeNetTokenSigner which use Windows calls to unlock the certificate before use, but it didn't work for me ( github thread).Configure the key (through SafeNet's tool) to require unlock once per session, but this still requires a human to login to use graphical pin entry on the Windows VM every fresh boot.The CI Struggleīecause 2FA behaviour for code signing is a 'feature' of the EV token it's somewhat difficult to bypass.Īs mentioned on StackOverflow, there are a few possible workarounds: This prompt is only presented via GUI, with no official (known) manner to bypass this for CLI use. I found that the SafeNet Authentication Client had to be installed for Windows to correctly handle the token as a SmartCard, while the Digicert tool functions as a 'portable' self-contained tool.Īfter that, I could manually invoke signtool from CMD and sign with the token - with a catch! When signtool runs, it unlocks/accesses the token forceing a 2FA token pin prompt. Windows will use it's internal SmartCard suport to unlock/reference the token when invoked with signtool.Digicert Certificate Utility for Windows - their own tool which lets you manually sign files.the SafeNet Authentication Client software - from the HSM OEM, used to view/manage the token.There are two software tools available for the token, both hosted by Digicert through links in their Knowledgebase: We tell Vagrant to configure a VirtualBox USB filter during setup which passes control over the token hardware to our Windows VM. The key activation process is pretty easy and documented by Digicert, so we'll skip to the interesting bits. After some authorisation steps, and waiting a week, this cute little blue USB HSM arrived in the mail. We'll just buy an EV token, add a signing stage to the build server, and move on with our lives.
#SAFENET AUTHENTICATION CLIENT FOR MAC VALIDATION CODE#
Microsoft specifies that Windows binaries/installers are to be signed using their signtool program with an Extended Validation Code Signing Certificate (EV cert).
#SAFENET AUTHENTICATION CLIENT FOR MAC .EXE#
exe to Program Files and add an entry to the PATH. On Windows, we provide an installer (we use go-msi, powered by the wix toolset) to move our.

Our arc CLI tooling is written in Go and distributed as a binary+install script for macOS and Linux.
