FAQ
To import a certificate in Mozilla Firefox, you have to have backup file (.pfx or .p12) and folow the steps:
From the browser menu, click on the right upper button and select Options, than select the Privacy & Security option from the menu on the left side, go down and click on View Certificates. From tab Your Certificates, select Import, than select the file with your certificate. Enter the password which you have set during the backup procedure for the certificate. You will receive a message that your certificate was successfully imported.
The Certificate should now appear in your list of personal certificates:
To make a backup of your certificate in Internet Explorer, please follow these steps:
From the browser menu click on the Tools button and select Internet Options/Content/Certificates. Then in the Personal tab, choose your certificate and click on the Export button:
By clicking the Export button, a Wizard opens, which will guide you through the procedure of exporting a certificate. To continue, click Next, then choose „Yes, export the private key“. Choose a .PFX format in which the certificate will be exported and choose to export the root certificates:
Enter a password to protect the private key. The password is only known by you, please remember it or write it down in a safe place!
Enter a file name and location to which you will export the certificate. At the end, you will get a message for succesful export.
To import a certificate in Internet Explorer (IE), you have to have backup file (.pfx or .p12) and folow the steps:
From IE, chose Tools/Internet Options/Content/Certificates. Then in Personal tab, click Import, and the wizard will guide you through the procedure of importing a certificate. Choose Browse, select the file with your certificate. Enter the password which you have set during the backup procedure for the certificate. Check Mark the private key as exportable and click Next to continue. Select the “Automatically select the certificate store based on the type of certificate” option, then Next and Finish. You will receive a message that your certificate was successfully imported. The certificate should now appear in your list of personal certificates:
Windows 8/8.1 or Windows 10 users can change the PIN of the Gemalto ID Prime PKI token with the following procedure:
Insert the Gemalto ID Prime PKI token in the PC and press CTRL+ALT+DEL on the keyboard. Several options will be displayed, from which you need to select Change a password
In the next window, in the lower part select Sign-in options
Then select the right picture Smart Card PIN change
In the PIN field insert the current PIN for the Gemalto ID Prime PKI token, and in the next two fields insert the new PIN. The new PIN has to contain exactly 6 digits. For confirmation click
At the end, a message for a successful change of the PIN is displayed and we press OK.
KIBSTrust root certificates you can download from:
You can save them localy on your PC, then you can import them:
1. Open your Mozilla Firefox, click on the right upper button and select Options
2. On the next window, choose Privacy & Security, then View Certificates:
3. On the next window, chose Authorities, then Import and browse the path to the .crt root certificate file that you want to import.
4. After import, you will got message for successful installation.
You can download KIBSTrust root certificates from section Root certificates from https://www.kibstrust.com/en-GB/Home/Support/:
For the acctual certificate's profiles from Private KIBS's infrastructure CA (G2), according eIDAS regulation, the intermediate and root certificate's links are:
KIBSTrust Issuing Qsig CA G2 (install in Intermediate Certificate Authorities)
KIBSTrust Issuing Qseal CA G2 (install in Intermediate Certificate Authorities)
KIBSTrust Root CA G2 (install in Trusted Root Certficate Authorities)
For the previous certificate's profiles from Public KIBS's Infrastructure CA (G1) according eIDAS regulation, issued in period from September 2020 until June 2021, the intermediate and root certificate's links are:
KIBSTrust Issuing CA for e-Signatures (install in Intermediate Certificate Authorities)
KIBSTrust Issuing CA for e-Seals (install in Intermediate Certificate Authorities)
Baltimore CyberTrust Root (install in Trusted Root Certficate Authorities)
Those are the root certificate's links for old certificate profiles, according EU Directive 1999/93/EC:
You can save them localy on your PC, then you can import them:
1. Open Internet explorer, choose Tools, Internet Options, then in Content tab choose Certificates:
2. In Certificates, choose Intermediate or Trusted Root Certificate Authorities, then click Import:
3. On the next window, Browse the path to the .crt root certificate file, that you want to import.
4. Install them into Intermediate or Trusted Root Cerification Authorities:
5. Choose Finish.
Manuals
Verba Sign PKI Token, Verba Sign Pro PKI Token and Verba Seal PKI Token certificates
Verba Sign K2, Verba Sign Pro2 certificates
- How to start using a certificate issued on a Gemalto IDPrime PKI token?
- How to start using a certificate issued on a Gemalto Java PKI token?(legacy)
Verba Sign Adv Verba Sign Pro Adv and Verba Seal Adv certificates
Usage of personal certificates
Software & Drivers
KIBSTrust SafeNet Authentication Client
- KIBSTrust-SAC-x32 v.10.8-R6 or KIBSTrust-SAC-x32 v.10.8-R2 (Older version)
- KIBSTrust-SAC-x64 v.10.8-R6 or KIBSTrust-SAC-x64 v.10.8-R2 (Older version)
Minidrivers for Gemalto ID Prime (.NET & MD) PKI tokens: (Requered for Internet Explorer)
- Windows 10 and Windows Server 2016
32-bit
64-bit - Windows 8 and Windows Server 2012
32-bit
64-bit - Windows 7
32-bit
64-bit
PKCS#11 Library for Gemalto ID Prime (.NET & MD) PKI tokens: (Requered for Mozilla Firefox and for e-tax portal: https://etax-fl.ujp.gov.mk/ )
Software for Gemalto Java PKI token (Requered for Internet expolorer and for Mozilla Firefox)
Root certificates
Root certificates for Private KIBSTrust Infrastructure CA (G2), according eIDAS
- KIBSTrust Root CA G2
- KIBSTrust Issuing Qsig CA G2
- KIBSTrust Issuing Qseal CA G2
- KIBSTrust Issuing QTSA CA G2
Root certificates for Public KIBSTrust Infrastructure CA (G1), according eIDAS
Root certificates for Public KIBSTrust Infrastructure CA, according Directive (EU) 1999/93/EC
Root certificates for Private KIBSTrust CA for SSL, Personal CA and Light Sign certificates
- KIBSTrust Root CA G1
- KIBSTrust SSL OV G1
- KIBSTrust SSL DV G1
- KIBSTrust Personal CA G1
- KIBSTrust Light Sign G1
- KIBSTrust Encrypt G1
- KIBSTrust eSeal G1
Chain certificates for Time Stamping Authority
- KIBSTrust TSU Momentum 2022.crt, validity from 28.09.2022 until 27.09.2027
KIBSTrust Issuing QTSA CA G2
KIBSTrust Root CA G2 - KIBSTrust_Momentum_Timestamp_Responder_20190510_1.crt, validity from 10.05.2019 until 05.10.2022
DigiCertCA.crt
TrustedRoot.crt - KIBSTrust_Momentum_Timestamp_Responder_20161005_1.crt, validity from 05.10.2016 until 05.11.2021
DigiCertCA.crt
TrustedRoot.crt - TSU_KIBS_Momentum_20120426_1.crt, validity from 26.04.2012 until 26.04.2018
Adobe Root CA.crt
Keynectis CDS CA for timestamping.crt
KEYNECTIS CDS CA.crt - TSU_KIBS_Momentum_20141229_1.crt, validity from 29.12.2014 until 26.04.2017
Adobe Root CA.crt
KEYNECTIS_CDS_CA.crt
Keynectis_CDS_CA_for_timestamping.crt - TSU_KIBS_Momentum_20151215_4.crt, validity from 15.12.2015 until 15.12.2017
Adobe Root CA.crt
Keynectis CDS CA for timestamping.crt
KEYNECTIS CDS CA.crt
Services
Services for Qualified certificates
- Request for revocation of qualified certificate
- Certificate holder's authorization letter
- Manager's Authorization letter
- Public Certificate Directory of the issued certificates of KIBS CA
Services for Private Key Infrastructure KIBSTrust (G2), according eIDAS
- CRL for G2 Qualified certificates for electronic signature
- CRL for G2 Qualified certificates for electronic seal
- CRL for G2 Qualified certificates for electronic timestamp
- KIBSTrust OCSP protocol for G2 certificates
Services for Public Key Infrastructure KIBSTrust (G1), according eIDAS
- CRL for G1 Qualified certificates for electronic signature
- CRL for G1 Qualified certificates for electronic seal
- KIBSTrust OCSP protocol for G1 certificates