Engineered PKard for Mac software meets the needs of U.S. DoD and Federal Mac users. PKard for Mac provides two-factor authentication support using a CAC, CAC Dual Persona, PIV, or PIV-I smart card to applications capable of certificate authentication via Apple’s Keychain. Enter to Search. SCR3310 USB Smart Card Reader drivers 8.41. Great software for the CAC reader, it detected my SCR331 right after I installed.
Customers who bought this product also commonly purchased the following combination of items.
Cac Reader For Mac Software
- This Item: MAC Middleware - Thursby PKard™ for Mac OS X *Non-refundable* (WILL NOT WORK WITH MAC OS CATALINA)
- SCR3310 v2 Card Reader (CAC-Approved)$37.00As low as: $31.00
- Identiv SmartFold SCR3500 USB Smart Card Reader
- Precise Tactivo for iPad Mini 1/2/3$149.00
- The Guardian Case for Tactivo for iPad Mini
![Download Download](/uploads/1/2/6/4/126406870/853430866.jpg)
- Web, email & VPN with CAC/PIV for Mac PKard® for Mac replaces the native macOS PKI solution to provide users with a solid product with full, free, U.S. Based support. It is the same commercial code used by the Pentagon, all six DoD services, White House, NIH, and DOI across tens of thousands of Mac users since the mid-2000s. Engineered PKard for Mac software meets the.
- Dec 12, 2005 OS X supports the CAC natively and nothing need be done except have a compatible card reader. I have an ActivCard reader left over from before the NMCI turnover. I had to flash it to be an SCR33x reader.
SCR3310 v2 Card Reader (CAC-Approved)
$37.00As low as: $31.00Identiv SmartFold SCR3500 USB Smart Card Reader
$37.00As low as: $31.00Windows Middleware - ActivClient CAC 6.2 Download for Windows 7, Vista and XP *Non-refundable*
$68.00Precise Tactivo for iPad Mini 1/2/3
$149.00
This article is intended for system administrators who set security policy in enterprise environments that require smart card authentication.
macOS includes a modern architecture that supports smart cards. This architecture is based on the CryptoTokenKit framework, which supports authentication, encryption, and signing functions, plus MDM controls for managing smart cards within Enterprise environments. Starting with macOS Catalina, legacy smart card support that uses TokenD will be disabled by default.
Before you upgrade to macOS Catalina
![Software Software](/uploads/1/2/6/4/126406870/900880653.jpg)
If you want to migrate from legacy TokenD to modern CryptoTokenKit-based smart card services after upgrading to macOS Catalina, follow these steps:
1. Make sure that any third-party apps that you use support CryptoTokenKit.
2. Verify that
com.apple.CryptoTokenKit.pivtoken
doesn't appear in the output of this Terminal command:defaults read /Library/Preferences/com.apple.security.smartcard DisabledTokens
If it does, you can remove the PIV token from the DisabledTokens array by deleting the entire array:
defaults delete /Library/Preferences/com.apple.security.smartcard DisabledTokens
3. If you've installed a driver that relies on TokenD, use the developer's instructions to uninstall it.
If you have any issues using your smart card after upgrading to macOS Catalina, pair the card again. For additional instructions on configuring smart card services, see the macOS Deployment reference and the
SmartCardServices(7)
man page.