Next: Client Authentication, Previous: Introduction, Up: Top
To use Scute, you first have to install the software. You also have to prepare each card you want to use with Scute before it can be used. Furthermore, you need to configure the application to make use of Scute for cryptographic operations. This chapter explains each of these steps in detail.
• Prerequisites: | Dependencies of Scute. | |
• Building the Source: | How to build Scute. | |
• Certificate Preparation: | Preparing certificates for use with Scute. |