Capicom Mac Os

-->Mac

[CAPICOM is a 32-bit only component that is available for use in the following operating systems: Windows Server 2008, Windows Vista and Windows XP. Instead, use the .NET Framework to implement security features. For more information, see Alternatives to Using CAPICOM.]

The CAPICOM COM client provides services that enable application developers to add security based on cryptography to applications. CryptoAPI includes functionality for authentication using digital signatures, for enveloping messages, and for encrypting and decrypting data.

Mac Os Mojave

CategoryDescription
Certificate Store ObjectsObjects available for using certificate stores and the certificates in those stores.
Digital Signature ObjectsObjects used to digitally sign data and to verify digital signatures.
Enveloped Data ObjectsObjects used to create enveloped data messages for privacy and to decrypt data in enveloped messages.
Data Encryption ObjectsObjects used to encrypt data and to decrypt encrypted data.
Auxiliary ObjectsObjects used to change default behaviors and to manage certificates, certificate stores, and user interface (UI) messages.
Interoperability InterfacesInterfaces that allow derivations of CryptoAPI to work together with CAPICOM 2.0.
Enumeration TypesEnumeration types used with CAPICOM.

Certificate Store Objects

Download macOS Big Sur. If you’re using macOS Mojave or later, choose Apple menu System Preferences, then click Software Update. If you’re using an earlier macOS, use the App Store instead.

The following objects work with certificate stores and the certificates in those stores. CAPICOM supports the use of Current User, Local Machine, Memory, and Active Directory certificate stores.

  1. Download the latest driver for your token, install it with a few clicks. Choose the driver depending on your operating system.
  2. Jul 05, 2018 Trusted Windows (PC) download Microsoft Capicom 2.1.0.2. Virus-free and 100% clean download. Get Microsoft Capicom alternative downloads.
ObjectDescription
CertificateA single digital certificate.
CertificatePoliciesA collection of PolicyInformation objects.
CertificatesCollection of Certificate objects.
CertificateStatusProvides status information on a certificate.
ChainCreates and checks a certificate validation chain based on a digital certificate.
ExtendedPropertiesRepresents a collection of ExtendedProperty objects.
ExtendedPropertyRepresents a Microsoft-extended property.
ExtensionRepresents a single certificate extension.
ExtensionsRepresents a collection of Extension objects.
PrivateKeyRepresents a private key.
PublicKeyRepresents a public key in a Certificate object.
StoreProvides the properties and methods to choose, manage, and use certificate stores and the certificates in those stores.
TemplateRepresents the certificate extension template of the certificate.

Digital Signature Objects

The following objects are exported to digitally sign data and to verify digital signatures.

ObjectDescription
SignedCodeProvides functionality for signing content with an Authenticode digital signature.
SignedDataObject used to sign data and to verify the signature on signed data.
SignerInformation on a single data signer, including the signer's certificate.
SignersCollection of Signer objects.

Enveloped Data Objects

The following objects are exported to create enveloped data messages for privacy and to decrypt data in enveloped messages.

ObjectDescription
EnvelopedDataObjects used to create, send, and receive enveloped data. Enveloped data is encrypted so that only the intended recipients can decrypt it.
RecipientsCollection of the Certificate objects of the intended recipients of an enveloped message.

Data Encryption Objects

Capicom mac os 10.13

The following object is exported to encrypt arbitrary data for privacy and to decrypt encrypted data.

ObjectDescription
EncryptedDataObjects used to encrypt data. Encrypted data in an EncryptedData object can be decrypted.

Auxiliary Objects

The following objects are exported to change default behaviors of other objects and to manage certificates, certificate stores, and messages.

ObjectDescription
AlgorithmSets the algorithm and key length to be used in cryptographic operations.
AttributeProvides a single piece of added information about a signature, such as the time of signing.
AttributesCollection of Attribute objects.
BasicConstraintsProvides read-only access to basic constraints on the uses of a certificate.
EKUProvides access to EKU properties of certificates.
EKUsCollection of EKU objects.
EncodedDataRepresents a block of encoded data.
ExtendedKeyUsageProvides read-only access to the extended key usage properties of certificates.
HashedDataProvides functionality for applying a hash algorithm to a string.
KeyUsageProvides read-only access to key usage properties of certificates.
OIDRepresents an object identifier that is used by several CAPICOM properties.
OIDsRepresents a collection of OID objects.
PolicyInformationProvides access to the policy OIDs of an extension.
QualifierRepresents a Certification Practice Statement (CPS) pointer or user notice qualifier.
QualifiersRepresents a collection of qualifiers.
SettingsEnables or disables dialog boxes to prompt for signer or sender identity if that identity is not specified.
UtilitiesProvides functionality for common tasks.

Interoperability Interfaces

The following interfaces allow derivations of CryptoAPI to work together with CAPICOM 2.0.

InterfaceDescription
ICertContextProvides access to the context of a CAPICOM X.509v3 Certificate object. This context allows the CAPICOM certificate to be used in other derivations of CryptoAPI.
ICertStoreProvides access to the context of a CAPICOM Store object. This context allows the CAPICOM certificate store to be used in other derivations of CryptoAPI.
IChainContextProvides access to the context of a CAPICOM Chain object. This context allows the CAPICOM certificate trust chain to be used in other derivations of CryptoAPI.

Enumeration Types

CAPICOM defines the following enumeration types:

-->

[CAPICOM is a 32-bit only component that is available for use in the following operating systems: Windows Server 2008, Windows Vista, Windows XP. Instead, use the .NET Framework to implement security features. For more information, see the alternatives listed below.]

Important

Mac

None of the alternatives to CAPICOM offer a solution for scripts; therefore, you must write your own ActiveX control. For more information, see ActiveX Controls.

Certificate Store Objects

Capicom microsoft add-on

We suggest the following alternatives for working with certificate stores and the certificates in those stores.

ObjectAlternative
CertificateThe Certificate object is available for use in the operating systems specified in the Requirements section. Instead, use the X509Certificate2 Class in the System.Security.Cryptography.X509Certificates namespace.
CertificatePoliciesThe CertificatePolicies object is available for use in the operating systems specified in the Requirements section. Instead, use the X509Extension Class in the System.Security.Cryptography.X509Certificates namespace by calling the constructor that takes an OID as a parameter, and then use the OID for Certificate Policies to retrieve the certificate policies.
CertificatesThe Certificates object is available for use in the operating systems specified in the Requirements section. Instead, use the X509Certificate2Collection Class in the System.Security.Cryptography.X509Certificates namespace.
CertificateStatusThe CertificateStatus object is available for use in the operating systems specified in the Requirements section. Instead, use the X509ChainStatus Structure in the System.Security.Cryptography.X509Certificates namespace.
ChainThe Chain object is available for use in the operating systems specified in the Requirements section. Instead, use the X509Chain Class in the System.Security.Cryptography.X509Certificates namespace.
ExtendedPropertiesThe ExtendedProperties object is available for use in the operating systems specified in the Requirements section. Instead, use Platform Invocation Services (PInvoke) to call the Win32 API function CertGetCertificateContextProperty and obtain the properties. For information about PInvoke, see Platform Invoke Tutorial. The .NET and CryptoAPI via P/Invoke: Part 1 and .NET and CryptoAPI via P/Invoke: Part 2 subsections of Extending .NET Cryptography with CAPICOM and P/Invoke may also be helpful.
ExtendedPropertyThe ExtendedProperty object is available for use in the operating systems specified in the Requirements section. Instead, use Platform Invocation Services (PInvoke) to call the Win32 API function CertGetCertificateContextProperty and obtain the properties. For information about PInvoke, see Platform Invoke Tutorial. The .NET and CryptoAPI via P/Invoke: Part 1 and .NET and CryptoAPI via P/Invoke: Part 2 subsections of Extending .NET Cryptography with CAPICOM and P/Invoke may also be helpful.
ExtensionThe Extension object is available for use in the operating systems specified in the Requirements section. Instead, use the X509Extension Class in the System.Security.Cryptography.X509Certificates namespace.
ExtensionsThe Extensions object is available for use in the operating systems specified in the Requirements section. Instead, use the X509ExtensionCollection Class in the System.Security.Cryptography.X509Certificates namespace.
PrivateKeyThe PrivateKey object is available for use in the operating systems specified in the Requirements section. Instead, use the X509Certificate2.PrivateKey Property in the System.Security.Cryptography.X509Certificates namespace.
PublicKeyThe PublicKey object is available for use in the operating systems specified in the Requirements section. Instead, use the X509Certificate2.PublicKey Property in the System.Security.Cryptography.X509Certificates namespace.
StoreThe Store object is available for use in the operating systems specified in the Requirements section. Instead, use the X509Store Class in the System.Security.Cryptography.X509Certificates namespace.
TemplateThe Template object is available for use in the operating systems specified in the Requirements section. Instead, use the X509Extension Class in the System.Security.Cryptography.X509Certificates namespace by calling the constructor that takes an OID as a parameter, and then use the OID for Certificate Template to retrieve the certificate extension template.
High

Digital Signature Objects

We suggest the following alternatives to digitally sign data and to verify digital signatures.

Mac Os Versions

ObjectAlternative
SignedCodeThe SignedCode object is available for use in the operating systems specified in the Requirements section. Instead, use Platform Invocation Services (PInvoke) to call the Win32 API SignerSignEx, SignerTimeStampEx, and WinVerifyTrust functions to sign content with an Authenticode digital signature. For information about PInvoke, see Platform Invoke Tutorial. The .NET and CryptoAPI via P/Invoke: Part 1 and .NET and CryptoAPI via P/Invoke: Part 2 subsections of Extending .NET Cryptography with CAPICOM and P/Invoke may also be helpful.
SignedDataThe SignedData object is available for use in the operating systems specified in the Requirements section. Instead, use the SignedCms Class in the System.Security.Cryptography.Pkcs namespace.
SignerThe Signer object is available for use in the operating systems specified in the Requirements section. Instead, use the CmsSigner Class in the System.Security.Cryptography.Pkcs namespace.
SignersThe Signers object is available for use in the operating systems specified in the Requirements section. Instead, use a collection of CmsSigner objects. For more information, see the CmsSigner Class in the System.Security.Cryptography.Pkcs namespace.

Enveloped Data Objects

We suggest the following alternatives to create enveloped data messages for privacy and to decrypt data in enveloped messages.

ObjectDescription
EnvelopedDataThe EnvelopedData object is available for use in the operating systems specified in the Requirements section. Instead, use the EnvelopedCms Class in the System.Security.Cryptography.Pkcs namespace.
RecipientsThe Recipients object is available for use in the operating systems specified in the Requirements section. Instead, use the CmsRecipientCollection Class in the System.Security.Cryptography.Pkcs namespace.

Data Encryption Objects

We suggest the following alternatives to encrypt arbitrary data for privacy and to decrypt encrypted data.

ObjectDescription
EncryptedDataThe EncryptedData object is available for use in the operating systems specified in the Requirements section. Instead, use Platform Invocation Services (PInvoke) to call the Win32 API functions CryptEncryptMessage and CryptDecryptMessage to encrypt and decrypt messages. For information about PInvoke, see Platform Invoke Tutorial. The .NET and CryptoAPI via P/Invoke: Part 1 and .NET and CryptoAPI via P/Invoke: Part 2 subsections of Extending .NET Cryptography with CAPICOM and P/Invoke may also be helpful.

Auxiliary Objects

We suggest the following alternatives to change default behaviors of other objects and to manage certificates, certificate stores, and messages.

Capicom Mac Os Mojave

ObjectDescription
AlgorithmThe Algorithm object is available for use in the operating systems specified in the Requirements section. Instead, use the AlgorithmIdentifier Class in the System.Security.Cryptography.Pkcs namespace.
AttributeThe Attribute object is available for use in the operating systems specified in the Requirements section. Instead, use the CryptographicAttributeObject Class in the System.Security.Cryptography namespace.
AttributesThe Attributes object is available for use in the operating systems specified in the Requirements section. Instead, use the CryptographicAttributeObjectCollection Class in the System.Security.Cryptography namespace.
BasicConstraintsThe BasicConstraints object is available for use in the operating systems specified in the Requirements section. Instead, use the X509BasicConstraintsExtension Class in the System.Security.Cryptography.X509Certificates namespace.
EKUThe EKU object is available for use in the operating systems specified in the Requirements section. Instead, use the X509EnhancedKeyUsageExtension Class in the System.Security.Cryptography.X509Certificates namespace.
EKUsThe EKUs object is available for use in the operating systems specified in the Requirements section. Instead, use the X509ExtensionCollection Class in the System.Security.Cryptography.X509Certificates namespace.
EncodedDataThe EncodedData object is available for use in the operating systems specified in the Requirements section. Instead, use the AsnEncodedData Class in the System.Security.Cryptography namespace.
ExtendedKeyUsageThe ExtendedKeyUsage object is available for use in the operating systems specified in the Requirements section. Instead, use the X509EnhancedKeyUsageExtension Class in the System.Security.Cryptography.X509Certificates namespace.
HashedDataThe HashedData object is available for use in the operating systems specified in the Requirements section. Instead, use the HashAlgorithm Class in the System.Security.Cryptography namespace.
KeyUsageThe KeyUsage object is available for use in the operating systems specified in the Requirements section. Instead, use the X509EnhancedKeyUsageExtension Class in the System.Security.Cryptography.X509Certificates namespace.
NoticeNumbersThe NoticeNumbers object is available for use in the operating systems specified in the Requirements section. For more information, see Qualifier.
OIDThe OID object is available for use in the operating systems specified in the Requirements section. Instead, use the Oid Class in the System.Security.Cryptography namespace.
OIDsThe OIDs object is available for use in the operating systems specified in the Requirements section. Instead, use the OidCollection Class in the System.Security.Cryptography namespace.
PolicyInformationThe PolicyInformation object is available for use in the operating systems specified in the Requirements section. Instead, use the X509Extension Class in the System.Security.Cryptography.X509Certificates namespace by calling the constructor that takes an OID as a parameter, and then use the OID for Certificate Policies to process policy information in the Certificate policies extension.
QualifierThe Qualifier object is available for use in the operating systems specified in the Requirements section. Instead, use the X509Extension Class in the System.Security.Cryptography.X509Certificates namespace by calling the constructor that takes an OID as a parameter, and then use the OID for Certificate Policies to process qualifiers that are part of the policy information in the Certificate Policies extension.
QualifiersThe Qualifiers object is available for use in the operating systems specified in the Requirements section. Instead, use the X509Extension Class in the System.Security.Cryptography.X509Certificates namespace by calling the constructor that takes an OID as a parameter, and then use the OID for Certificate Policies to process qualifiers that are part of the policy information in the Certificate Policies extension.
SettingsNo alternative is available.
UtilitiesNo alternative is available.