guides:workstation_configuration
Differences
This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| guides:workstation_configuration [2023/07/11 00:42] – brett.zamora | guides:workstation_configuration [2025/10/23 20:58] (current) – 216.9.23.34 | ||
|---|---|---|---|
| Line 2: | Line 2: | ||
| - | Once you have acquired your ERDS and/or G2G workstation, | + | Once you have acquired your ERDS and/or G2G workstation |
| + | These tasks include: | ||
| {{tablelayout? | {{tablelayout? | ||
| ^ Task ^ Description ^ | ^ Task ^ Description ^ | ||
| - | | Physically Secure The Workstation \\ (Standalone workstations only.) | Certified ERDS workstations must be physically secured. Per CeRTNA’s HW / SW, CeRTNA recommends using a locking workstation security cabinet that can be secured to a wall or floor. \\ . \\ G2G workstations are not required to be kept in a locking security cabinet, however, many CeRTNA clients do secure their G2G workstations as well. | | + | | Physically Secure The Workstation \\ (Standalone workstations only.) | Certified ERDS workstations must be physically secured. Per CeRTNA’s HW / SW, CeRTNA recommends using a locking workstation security cabinet that can be secured to a wall or floor. \\ . \\ G2G workstations are not required to be kept in a locking security cabinet, however, many CeRTNA clients do secure their G2G workstations as well. \\ . \\ Notes regarding Virtual Machine (VM) installation are provided further down in this document. | |
| - | | Workstation Configuration | ERDS workstations need to pass a system security audit in order to be certified for transmitting ERDS transactions. This document provides recommendations on how to configure a variety of operating system components on your local workstations, | + | | Workstation Configuration | ERDS workstations |
| - | | Network / Firewall Configuration | Per regulations, | + | | Network / Firewall Configuration | Per regulations, |
| | Software Installation | There is a limited amount of software that needs to be installed. Currently these include: \\ . \\ - SafeNet Authentication Client (SAC) \\ - APEX \\ . \\ APEX is CeRTNA’s client application software that is used to interact with the CeRTNA ERDS & G2G platforms. \\ . \\ The SafeNet Authentication Client (SAC) contains USB token drivers and APEX uses the token drivers to access the token based PKI certificates that are used for authentication, | | Software Installation | There is a limited amount of software that needs to be installed. Currently these include: \\ . \\ - SafeNet Authentication Client (SAC) \\ - APEX \\ . \\ APEX is CeRTNA’s client application software that is used to interact with the CeRTNA ERDS & G2G platforms. \\ . \\ The SafeNet Authentication Client (SAC) contains USB token drivers and APEX uses the token drivers to access the token based PKI certificates that are used for authentication, | ||
| + | | Certificate Installation | The CeRTNA Root CA certificate needs to be installed to support out Private Key Infrastructure. | ||
| Line 25: | Line 27: | ||
| * Ensure the anti-virus/ | * Ensure the anti-virus/ | ||
| * Ensure that a local Windows Firewall is running on the ERDS/G2G workstation. Some 3rd party antivirus solutions override the built-in Windows Firewall and this is acceptable as long as the firewall is enabled and protecting the computer. | * Ensure that a local Windows Firewall is running on the ERDS/G2G workstation. Some 3rd party antivirus solutions override the built-in Windows Firewall and this is acceptable as long as the firewall is enabled and protecting the computer. | ||
| + | |||
| + | |||
| + | == Install the CeRTNA Root CA certificate == | ||
| + | |||
| + | INstallation instructions can be found at LINK | ||
guides/workstation_configuration.1689036125.txt.gz · Last modified: by brett.zamora
