Net iD Access Client

Net iD Access client is the app for end users. There are versions for:

  • Windows

  • macOS

  • Linux

  • Android

  • iOS/iPadOS.

Table 1. Net iD Access Client main features
Description iOS Android

Start page with different information depending of status. The status can for example be:

  • Ready to be used

  • ID soon to expire

  • ID expired

  • No connection activated

  • No token present

  • etc.

000230

000233

PIN dialog for authentication and signing.

000231

000234

Settings with:

  • Token information

  • PIN-change

  • PIN-unlock

  • Start enrollment

  • Language

  • Connections

  • Trace

  • About

000232

000235

When adding a Net iD Access Server connection in Net iD Access Client, it will use the /niac/-interface which has the following methods. These methods will not be described in detail.

  • ArchiveOpen

  • ArchiveSearch

  • GetInfo

  • GetStatistics

  • LoadData

  • LoadRequest

  • Manage

  • ManageUserDevice

  • RequestGetStatus

  • RequestNext

  • RequestProcess

  • RequestRegister

  • UserAdd

Support matrix

Card reader support via standard PC/SC Support for smart cards Support for YubiKeys Support for soft tokens Support for Feitian K9 Support for bluetooth readers Custom packages available[1] Management via GPO or MDM[2]

Windows

yes

yes

yes

yes

yes

yes

yes

no

macOS

yes

yes

yes

yes

yes

yes

yes

no

Linux

yes

yes

yes

yes

yes

yes

yes

no

Android

n/a

no

yes
(USB-C)

yes

no

no

no

no

iOS/iPadOS

n/a

yes
(Tactivo)

yes
(Lightning)

yes

no

no

no

no

Note on the Lightning functionality

The support for the Tactivo card reader to our iOS version of the Net iD Access app follows Apple’s regulations for which apps are allowed to communicate with external hardware via the Lightning port. The support for Yubico’s product YubiKey follows the same regulations. Apple’s regulations in this area are called the "MFi Program", see https://mfi.apple.com/en/faqs.html.

In short, it is based on:

  • The accessory manufacturer must join Apple’s MFi program.

  • Pointsharp contacts the manufacturer of the hardware (formerly Precise Biometrics, now Identos in Germany and Yubico) and get their acceptance to "work together".

  • The accessory manufacturer is given a special "ID" by Apple.

  • In order for Pointsharp to be able to publish an app on the App Store, Pointsharp must provide this ID at each publication (otherwise the app’s publication will be stopped).

  • Apple has some sort of control over the ID numbers provided by Pointsharp (the exact procedures do not concern Pointsharp).

  • If everything is correct, Apple allows Pointsharp to publish their app with support for the hardware that the ID numbers are associated with.

  • This has worked well for many years and Pointsharp updates have always been approved by Apple without objection.

So far so good. But now we come to the transition from the Lightning connector to the USB-C connector. When Apple released the iPad Pro with USB-C connector, Pointsharp asked Identos if they intended to bring out a Tactivo Mini with USB-C. The answer was that they would love to do it but that the MFi program did not include USB-C, only Lightning. The issue was then raised again when one of Pointsharp’s government customers using the YubiKey 5Ci (both Lightning and USB-C model) and USB-C only YubiKeys, wondered if it worked with the Net iD Access app. Our answer was of course: Unfortunately not.

Pointsharp then contacted Yubico again who could only regret that their product YubiKey can only be used with USB-C regarding the OTP generation function, not with YubiKey’s PIV application (PKI part). This is because the MFi program does not currently include USB-C. Pointsharp has also been in contact with Apple Sweden and stated that there are authorities and regions in Sweden that would like to see that the USB-C port could be used.

How to install and uninstall from the command line

EXE file

Install EXE file

$ C:\temp>NetiDAccessSetup.exe -install -silent

Uninstall EXE file

$ C:\temp>NetiDAccessSetup.exe -uninstall -silent

MSI file

Install MSI file

$ msiexec /package iidsetup.msi /qn

Uninstall MSI file

$ msiexec /uninstall iidsetup.msi /qn

1. We are considering several different ways to provide customer specific packages for Android and iOS/iPadOS
2. The product Net iD Enterprise running on Windows can in its current version be configured via registry settings and/or "Net iD GPO”. However, Net iD Access client 7.0/7.1 cannot be configured in the same way. For the Windows version of Net iD Access client, we are considering a concept, as in Net iD Enterprise and for Android/iOS/iPadOS, we will investigate the possibility to enable MDM-configuration of customer specific pre-enabled connections.