Managing Mobile App Certificates

Mobile app certificates are managed similarly to smart cards, in that:

  • They can be enrolled in the User Portal. (This setting must be enabled; for details, see Setting Parameters for Devices.)

  • They can be managed in the Help Desk.

However, they differ with respect to smart cards in that:

  • Only basic Help Desk operations (Hold/Resume/Applications Update/Terminate) are available.

  • Only basic operations are available in the User Portal (for example, device update, but no reporting of a lost device).

  • There is no PIN application.

  • Enrollment of mobile app certificates is not available in the Operator Portal.

Mobile devices containing mobile app certificates are considered “secondary” devices, as opposed to smart cards or smart USB keys being “primary” devices. This means that mobile app certificates can only be issued for users that already have a primary device. In a FIPS 201 Federal Information Processing Standard 201 (NIST standard for HSPD-12/PIV).-compliant environment, these mobile app certificates are considered “derived PIV Personal Identity Verification (technical standard of "HSPD-12") credentials.” For more information, refer to About Derived Credentials.

Note:
  • For mobile app certificates, this version of ActivID CMS supports Apple devices (phones, tablets) running iOS 10 or higher.

  • For the issuance of mobile app certificates, this version of ActivID CMS supports both the Microsoft and Entrust Certificate Authorities. Please contact your HID Global reseller for information about extended environment support.

Prerequisites for Using Mobile App Certificates

For details about issuing credentials (mobile app certificates) for mobile devices on the User Portal, refer to the ActivID CMS User online documentation.

Mobile Device Profile (for Mobile App Certificates)

ActivID CMS provides a dedicated profile for mobile app certificates used on mobile devices.

ActivID CMS Mobile Device Profile

Item

Description

Profile name

PIV 1024-2048 Profile for Mobile Devices

Profile description

Profile with PIV Personal Identity Verification (technical standard of "HSPD-12") AUTH, PIV DIGSIG, PIV ENC keys for Mobile Devices

Supported feature(s)

  • One PKI application named PIV_AUTHENTICATION (mandatory)

  • One PKI application named PIV_DIGITAL_SIGNATURE (optional)

  • One PKI application named PIV_ENCRYPTION (optional)

PIN Policy

  • No PIN application

Note:
  • To support the issuance of mobile app certificates for mobile devices, a CA of the “Microsoft Certificate Authority” or “Entrust Certificate Authority” type is required.

  • When configuring the applications of the mobile device profile, only the certificate templates that do not archive the subject's encryption private key are available for selection.

For more details about this device profile, refer to Device Profiles and Hardware Devices.

About Derived Credentials

In ActivID CMS, the ability to issue credentials (mobile app certificates) on a mobile device depends on the existence of another credential managed by ActivID CMS, considered a “primary” credential: a smart card or a virtual smart card (VSC). The enrollment process required for the issuance of the primary credential, such as capturing user data (name, email address, phone number, picture, fingerprint, ID or passport documents, etc.) and the following vetting system (background check, identity proofing), does not need to be repeated when issuing new credentials to the same user. Instead, ActivID CMS can issue a new credential (“derived credential”) to the same user based on the validity of the earlier credential (“primary credential”).

ActivID CMS will maintain a link between the primary and derived credentials – but each credential will contain separate certificates and have their own lifecycle. For example, a user may get a replacement device and keep the same mobile app certificates unchanged; or vice versa, a user may get a new phone, without impacting his/her smart card.

In the case of encryption certificates, ActivID CMS will issue the same encryption certificate on all devices assigned to a given user, to enable viewing encrypted emails whatever system is used to access them (for example, a Windows PC or a mobile phone).

ActivID CMS is designed for compliance with “Derived PIV Credentials,” as defined in NIST National Institute of Standards and TechnologyFIPS Federal Information Processing Standard 201-2 and NIST SP 800-157. In this model, the “primary credential” is a PIV Personal Identity Verification (technical standard of "HSPD-12"), PIV-I Personal Identity Verification - Interoperable or CIV Commercial Identity Verification card, containing Authentication, Signature and Encryption certificates, and the associated mobile device (phone or tablet) is a “derived PIV credential” also containing Authentication, Signature and Encryption certificates.

For each user, the primary device (PIV, PIV-I or CIV card) must be issued first. New authentication, signature and encryption certificates are present on each card; the encryption certificate is escrowed on the CA The Certificate Authority (CA) issues and manages security credentials and public keys for message encryption in a networks environment. by ActivID CMS and now considered a “shared encryption credential.” When the mobile app certificates are issued, new signature and authentication certificates are created for the mobile device; the “shared encryption” certificate is recovered on the mobile device.

For added security, the system checks the validity of the primary device (PIV device) again 7 days after the issuance of a PIV derived credential. If the PIV device had been reported as stolen during that period, the mobile device is then terminated.

The link between a primary device and its derived device(s) is managed automatically by ActivID CMS: no additional operation is required from a Help Desk operator.

More specifically, this means:

  • Any revocation action performed on a shared encryption certificate automatically revokes the encryption certificates on all devices where it is present (card or mobile device).

  • When a user name changes, requiring a PIV device update, an operator can also request similar updates for any derived credentials.

  • Terminating a primary device (with no replacement issued) also terminates all its derived devices automatically.

Important: To avoid inadvertent termination of derived credentials, it is not recommended to issue a derived credential from a temporary card or, in a FIPS 201-compliant environment, when the primary PIV credential is going to expire in less than 7 days.

Examples of Typical Use Cases for Mobile App Certificates

In all the following cases, both the primary PIV Personal Identity Verification (technical standard of "HSPD-12") device and the derived mobile device are intended to each have 3 certificates:

  • 1 authentication (AUTH) certificate

  • 1 signature (SIGN) certificate

  • 1 encryption (ENC) certificate.

The encryption certificate is shared between the PIV device and the mobile device.

The PIV device initially contains 3 credentials:

  • AUTH_1: authentication certificate

  • SIGN_1: signature certificate

  • ENC_1: encryption certificate

The PIV device also stores historical encryption certificates whereas the mobile device stores only the newest shared encryption certificate.

The certificate status is indicated by its color:

  • Active

  • On Hold

  • Revoked