Bulletin d'information
Préférez-vous recevoir les nouvelles de KeyTalk directement dans votre boîte aux lettres ? Inscrivez-vous à notre bulletin d’information !
KeyTalk / Soutien
Des questions ?
Vous avez des questions spécifiques ? La foire aux questions ou les téléchargements vous aideront peut-être.
Vous avez d’autres questions ou vous vous demandez simplement ce que KeyTalk peut faire pour votre organisation ? N’hésitez pas à nous contacter. Nous serions ravis d’y réfléchir ensemble.
Nous offrons également à nos clients une assistance 24 heures sur 24 et 7 jours sur 7.
KeyTalk peut-il gérer des certificats provenant de plusieurs autorités de certification (AC) ?
Je souhaite utiliser une autorité de certification, mais KeyTalk ne semble pas la prendre en charge ! Est-ce possible ?
KeyTalk peut-il gérer des clés cryptographiques asymétriques publiques/privées ?
KeyTalk prend-il en charge les certificats X.509 de courte durée ?
Notre définition des certificats X.509 à courte durée de vie : les certificats qui ne durent pas plus longtemps que le temps nécessaire à la mise à jour et à la distribution d’une liste de révocation de certificats (CRL) à partir du moment où ils ont été émis. Vous travaillez normalement avec des CRL qui sont mises à jour une fois par jour ? Dans ce cas, les certificats à durée de vie courte sont valables 24 heures de moins. Les radiateurs OCSP (Online Certificate Status Protocol) sont théoriquement beaucoup plus rapides à mettre à jour que les CRL, mais dans la pratique, il faut généralement plus de temps que le temps moyen de mise à jour d’une CRL pour établir la nécessité d’inclure un certificat dans un OCSP, jusqu’à l’inclusion effective d’un certificat dans un OCSP. Cela signifie que les OCSP ne sont généralement pas plus pratiques qu’une CRL lorsqu’il s’agit de certificats X.509 de courte durée.
KeyTalk peut attribuer n’importe quelle durée de vie à un certificat à émettre, dans la mesure où l’autorité de certification cible le prend en charge. La durée de validité la plus courte que KeyTalk peut attribuer à un certificat est de 1 seconde.
Téléchargements
Windows: Enterprise KeyTalk agent
Version: 7.8.0
Download: Default
Hashcode: SHA256: b12eddaaa7fdc470323a2551d90f7b4077bf97e60fc11e2a6ae2d1deeae15027
About
KeyTalk Enterprise agent 7.8.0 brings the latest KeyTalk functionality to Windows 10 and 11, as well as Windows Server 2016 – 2022 with IIS 10 and IBM WebSphere 9.x and any other application you can provide a custom PowerShell script for. All default Windows certificate store supporting browsers are supported including Google Chrome, Firefox, Microsoft IE, Edge, Opera, Brave, and Safari.
Enterprise version 7.8.0 adds business logic to support CA/B Forum regulations for S/MIME for Business when using the internal KeyTalk InternalDB as your RA, as well as the ability to provide custom PowerShell scripts for confoguring a certificate and key for any target server application.
This latest release added support for automated recent and historic Shared Mailbox S/MIME fetching, installation and configuration for Outlook
Our latest user interface simplified Secure Email Service Windows agent for use with KeyTalk’s HSES can be found here (SHA256: 4a59f179d43dde8f2d966365c5ab44b76d0c438a09d248e5e06b80b3412679d6
Mac OSX KeyTalk client
Version: 7.7.9
Download: App Store
Hashcode: SHA256:
► Manual
About
KeyTalk agent for Mac version 7.5.2 brings the latest KeyTalk functionality to Apple’s OSX devices.
Our optional hardware recognition adds an additional factor on top of your existing authentication. This client is compatible as of KeyTalk virtual appliance 5.6.5.
Download the previous version 6 DMG here,
__PRESENT
__PRESENT
__PRESENT
__PRESENT
Apple’s iOS KeyTalk client
Version: 7.4.0
Download: App Store
Hashcode: SHA256: B24426A42F661142E8760829FF16028D149EAE4822162D7FE078AC7EC26BD7F5
About
KeyTalk client 7.4.0 for iOS brings KeyTalk’s certificate distribution functionality to Apple’s iPad and iPhone as of iOS 10.3
KeyTalk’s optional hardware recognition leverages your existing authentication and enables you to easily recognize BYOD and Corporate devices to belong to only specific employees, partners, and customers.
Should an IPA be required that incorporates your KeyTalk configuration(s) for easy distribution by means of your MDM solution, it can be downloaded here.
__PRESENT
__PRESENT
Linux and Apache/TomCat KeyTalk agent
Version: 7.5.14
Download: Default
Hashcode: https://keytalk.com/support#
About
KeyTalk’s command prompt client 7.5.14 brings KeyTalk issued and managed certificates to various Linux OS.
7.5.14 for Ubuntu 22.04 adds extended TPM support and TPM key attestation, as well as Chrome bowser support, and supports Kerberos authentication incl automated renewal.
KeyTalk’s optional hardware recognition leverages your existing authentication, and enables you to easily recognize BYOD and Corporate devices to belong to only specific employees, partners, and customers.
Ensure you have a recent configuration file (RCCD) as this client makes use of the YAML standard not found in older KeyTalk configuration files.
KeyTalk virtual application server OVF/VMDK for VMware and AWS
Version: 7.6.1
Download: Default
Hashcode: SHA256: 0F26FC7F0574B3A74172F295889DD732C23D4228039F854B848E34D378271C88
About
KeyTalk 7.6.1 (ZIP = 25.4 GB) virtual appliance (Ubuntu 22.04 LTS based) in OVF/VMDK format brings you the latest KeyTalk X.509 certificate automated life-cycle management and seamless enrollment for client, server and Internet of Things devices. For your internal private CA’s and public CA’s.
Use it to automate replacing your X.509 certificates on any device, and always have up to date strong keys and certificate meta data in your SSL/TLS certificates.
Customers and partners can install this virtual appliance onto their VMWare ESXi environment.
For AWS, simply login to your AWS account, search in public AMI for KeyTalk and launch the KeyTalk CKMS AMI from any region.
Need a production or trial license? Just contact your preferred KeyTalk partner or email us, and we will have you up and running in no time.
To decrypt any created encrypted native KeyTalk backups or Problem reports, you will need a Linux system running this AES-256-GCM decryption tool.
Do check if a new firmware update exists on this page to upgrade this virtual appliance to the latest greatest version.
For High Availablity clustering, you will need a Load Balancer and a MySQL DB to store the shared data between multipkle KeyTalk virtual appliance front-ends.
The latest single (ie non-clustered) stand-alone MySQL 8 virtual appliance (ZIP 5.16 GB), compatible as of KeyTalk firmware 7.6.1 can be downloaded here. SHA256: EE8FF29934D9AB82E12C169B90C7F81706388A9402897358AD80E17EC116DE4D
Should you already have a single or clustered MySQL DB in your network, or wish to make use of an Azure Flexi Server, you can use this documentation to setup your own DB.
KeyTalk virtual application server VHD for Azure and Hyper-V
Version: 7.6.1
Download: Default
Hashcode: SHA256: AA073D9AE22C5320A27328610E0F20F9A7F54889FEE0021A98EFB70F60DFC2E0
About
KeyTalk 7.6.1 (ZIP = 31.2 GB) virtual appliance (Ubuntu 22.04 LTS based) in VHD (GEN-1 DISK) format brings you the latest KeyTalk X.509 certificate automated life-cycle management and seamless enrollment to client, server and Internet of Things devices. For your internal private CA’s and public CA’s.
Use it to automate replacing your X.509 certificates on any device, and always have up to date strong keys and certificate meta data in your SSL/TLS certificates.
Customers and partners can install this virtual appliance onto their Hyper-V and Azure environment.
Need a production or trial license? Just contact your preferred KeyTalk partner or email us, and we will have you up and running in no time.
To decrypt any created encrypted native KeyTalk backups or Problem reports, you will need a Linux system running this AES-256-GCM decryption tool.
Do check if a new firmware update exists on this page to upgrade this virtual appliance to the latest greatest version.
For High Availablity clustering, you will need a Load Balancer and a MySQL DB to store the shared data between multiple KeyTalk virtual appliance front-ends.
The latest single (ie non-clustered) stand-alone MySQL 8 virtual appliance (ZIP 7.66GB), compatible as of KeyTalk firmware 7.6.1 can be downloaded here. SHA256: 2BFC27E002518E7EE11133523D08FB7684B1780A40C5E69808D0CC2EBF45C34F
Should you already have a single or clustered MySQL DB in your network, or wish to make use of an Azure Flexi Server, you can use this documentation to setup your own DB.