Reinstalling continent ap. Typical mistakes continent ap. To generate a key, click "OK"

💖 Do you like it? Share the link with your friends

Installation of Continent-AP version 3.5.68.0. 2

Installation of AP authentication public key certificates.. 8

Establishing a Continent-AP connection.. 11

Uninstalling the Continent-AP program version 3.5.68.0. 12

Installation of Continent-AP version 3.5.68.0

Attention! Before installing Continent-AP version 3.5.68.0, all older versions of Continent-AP must be removed from the workplace!

Attention! Before installing Continent-AP version 3.5.68.0, you must install the CryptoPro program!

To install Continent-AP you need to run the file setup. exe from the distribution received from the Federal Treasury Department for the Republic of Dagestan. The Continent-AP installation program will start. Click the button Further" to continue installation.

In the next window, the installer prompts you to read the license agreement. Read the license agreement, then select "I accept the terms license agreement» and press the button "Further".

A dialog box for selecting a folder to place the program files will appear on the screen. By default, the installation program copies files to the “C:\Program Files\Security Code\Public Point” directory. It is recommended to leave the default installation path. To install the program in another folder, click the button "Change…" and specify the desired folder in the dialog that opens.

A dialog will appear on the screen to select the installation type. Select Custom and click the button "Further"

In the next window, the installation program prompts you to select the program components to install. You need to left-click on the item "Firewall" and select the item from the context menu "This component will not be available". Then click the button "Further".


Enter in the field " Access server IP address" meaning 78.25.65.11 and click the button Further".

A dialog will appear on the screen informing you that the installer is ready to begin installation. Click the button "Install" to start installation.

The installer will begin copying the files. During the installation process, messages will appear on the screen indicating that the software being installed has not been tested for compatibility with the operating system. In the window of such messages, click the button “Continue anyway.”

Kaspersky antivirus messages may also appear. Click "Allow."

Once the copying is complete, the final window of the installation wizard will appear on the screen. To exit the installation program, click the button "Ready".

"Yes" to restart the computer.

After installing the User Point and restarting the computer:

In the Windows control “Control Panel\Network Connections” a new network connection"Continent-AP";

In the "All Programs" menu of the main Windows menu The submenu “Security Code\Subscriber Point” will appear, which contains the items “Management program”, “Checking checksums”;

The Continent-AP control program loads automatically upon boot operating system and on the panel Windows tasks The subscriber point icon will appear.

Installation of AP authentication public key certificates

2. In the menu "Certificates" activate the command "Install user certificate".

Open" .

5. If the root certificate of the UFK access server for the Republic of Dagestan is not in the certificate store on the computer, a request to install it will appear on the screen. (If the registered user certificate already has a root certificate, the procedure will be completed and a message will appear on the screen indicating that the import of the user certificate is complete - see step 7).

To register a root certificate, click the button "Yes, automatically."

Security systems" href="/text/category/sistemi_bezopasnosti/" rel="bookmark">Windows security systems that the root certificate will now be registered.

Click the button "Yes". The root certificate will be registered.

7. A message will appear on the screen indicating that the import of the user certificate has been completed successfully. Click "OK".

Establishing a Continent-AP connection

1. Call context menu AP (right-click on the icon located on the Windows taskbar).

2. In the menu "Establish/disconnect connection" activate the command "Establish connection Continent-AP".

3. In the window that appears, select the certificate (with the name of your organization).

4. Click OK.

5. When a window appears asking you to add certificates to the lists, click “Yes.”

If the connection is successful, the icon turns blue

Uninstalling the Continent-AP program version 3.5.68.0

To remove the Continent-AP program, you need to go to Start => Control Panel => Add and Remove Programs.

For WindowsVista/7"Programs and Features"


From the list that appears, select Continent-AP and press "Change".

Will start service program for Continent-AP. Click the button "Further".

In the next window select "Delete" and press the button "Further".

Click the button "Delete" to begin the removal process.

Once the removal process is complete, a final window will appear on the screen. To exit the program, click the button "Ready".

A message appears asking you to restart your computer. Click the button "Yes" to restart the computer.

The Continent-AP information cryptographic protection system from the developer “Security Code” is a software and hardware complex that provides remote access to the networks of large municipal organizations, such as the State Automated System “Elections” and the Federal Treasury. To update the Continent-AP CIPF, you must completely remove the previous version of this program from your computer: otherwise, installing new software will not be possible due to conflicts with the system.

Working with the program

Continent-AP provides users with the following features:

  • secure access via RDP to computers and portable devices using a special cryptographic algorithm, certified according to GOST 28147/89 (operates in gamma mode with feedback);
  • creation of a multi-stage authentication algorithm for remote users based on public key certificates of the X.509 standard, which ensures a high degree of security of data transmitted within the framework of the agrarian and industrial complex;
  • support for external VPN clients for Linux and Windows OS, including electronic keys Token, iKey, iButton identifiers, floppy disks and flash drives;
  • communication with the Continent system with mobile devices and stationary PCs with speeds up to 16 MB per second;
  • much more.

To access CIPF, you must use valid certificates from the root certification authority:

  • cer – user certificate;
  • p7b – root certificate.

In order to install a root certificate, you must:

  1. Unzip the file with certificates to a key drive - this can be a disk, flash drive or other removable media with a key container where private keys are stored, which are generated by employees of the relevant authorized agency when generating a request for a user certificate. The key container in its content is a folder with attachments like “header.key”, “masks.key”, etc.
  2. Install the certificate in the “Storage” on your PC. To do this, on the Windows taskbar in the tray, find the shield icon with the inscription “AP” - usually the specified object is located in the lower right corner of the monitor, next to the time and date settings.
  3. If there is no application in the tray, you will need to launch it from the Start menu. Select the section of the “Start” menu that opens - “Programs”, go to the “Security Code” subsection, to the “Continent Subscriber Point” folder and click on the “Management Program” icon.
  4. In the context menu that opens, go to the “Certificates” section: in the drop-down list, select the “Install certificate” option. user".
  5. Go to “Explorer” - press the Win + E combination and go to the removable media on which the key container file certificates are stored.
  6. Select the file “user.cer” and click “Open”.
  7. In the dialog box that opens, the message “Select a key container...” will appear - click on the name of the key container. After the element is highlighted in blue, tap on “OK”.
  8. When the window appears CryptoPro CSP enter the access password for the specified container, then click on “OK”. Password is issued to the user who submitted the application for the certificate. If the password has been forgotten or lost, you will need to create a new application for the key, and the current certificate should be revoked.
  9. A dialog box will appear in which you need to click on “Yes, manually.”
  10. Now you need to download the certificate called “root.p7b” - go to Explorer on the removable drive, right-click on the object and select the “Open” context menu option.
  11. Read the text presented in the “Security Warning” window, and then click on the interactive “Yes” button.
  12. The screen will display “Importing custom certificate.” completed successfully."
  13. After clicking the “OK” button, you can connect to the access server.

To delete certificates in Continent-AP, you will need to perform the following operations:

  1. Right-click on the shield icon in the tray on the bottom toolbar: go to the “Settings” context menu item and select the “CIPF Continent-AP” section.
  2. In the “CIPF Continent-AP Properties” dialog box that opens, go to the “Security” tab.
  3. In the “Advanced (custom parameters)” section, click on the “Options...” interactive button.
  4. In the menu that opens " Extra options Security" in the "Secure Login" section, activate "Properties".
  5. A dialog box will open with the “Server Dostupa” element on the left side and “CA SD” on the right (a specific user may have other key names). To remove the specified certificates, you will need to click on the button located in the lower right part open window, – “Reset the remembered certificate”, then tap on “OK” and exit “Settings”.
  6. Now you need to completely remove the “.cer” Continent-AP file from the key storage. To do this in Windows 7, you will need to open the “Run” window by pressing the Win + R keys or through the “Start” - “Run” menu. In version 10 of the operating system, you need to click on the magnifying glass icon located in the lower left corner of the display to the right of the Start menu and enter the Run command or press the Win + R combination.
  7. Type the command “certmgr.msc” without quotes, then press “Enter”.
  8. If an error like “Cannot find.msc” appears, complete the following 7 steps; if there is no error, go straight to step 18 of the current instructions.
  9. In the “Run” window, enter the code word “mmc” without quotes and click “OK”.
  10. In the “Console” window, go to the leftmost menu item “File”, select the fifth item in the drop-down list - “Add or remove snap-in”.
  11. In the dialog box that opens, go to the “Isolated Equipment” tab and click on the “Add” button located in the lower left corner of the screen.
  12. A list of available accessories will be displayed on the monitor. Click on “Certificates”, and at the bottom of the “Add isolated snap-in” window, click on the “Add” button.
  13. In the “Certificate Manager Snap-in”, check the box next to the “my account..." and click on "Done".
  14. Exit “Adding equipment” by clicking “Close”.
  15. The current user’s certificates will appear in the main part of the active window “Add / Remove...” - click on the “OK” button.
  16. A “Console” window called “Certificates” will appear - select objects with “CA SD” in the “Issued by” column located on the right side of the screen and click on the “Delete” option.
  17. In the left side menu, go to the “Trusted Root Authorities...” - “Certificates” section and uninstall the object called “CA SD”.
  18. Exit "Snap" without saving.
  19. You can reinstall a new “.cr” file.

Uninstalling the program

Before you remove Continent-AP from your computer, you must create a system restore point, since if you uninstall CIPF components incorrectly, problems may arise when you try to install this software and hardware complex on your PC again. To do this you need to do the following:


Now you can safely completely remove Continent-AP 3.6 from your PC and clean the registry of residual files of this program.

Standard uninstallation

In order to remove Continent-AP 3.6 from a PC, it is recommended to follow the instructions:

  1. Exit the program in the tray - click on the shield-shaped icon with the inscription “AP” with the right mouse button, and select the “Exit” option in the context menu.
  2. Make sure that the software is not on the list background processes and in startup. Go to “Task Manager”. Can be done this operation by pressing the combination Ctrl + Alt + Delete and selecting the appropriate “Task Manager” tool or through the “Run” menu: hold down Win + R and enter the passphrase “taskmgr” without quotes, click “Enter”.
  3. In the “Processes” tab, end the executable exe of the uninstalled CIPF - right-click on the object and activate the “End task” option.
  4. Go to the “Startup” tab and disable the uninstalled software by right-clicking and selecting the “Disable” option.
  5. Go to the “System Configuration” window. You can perform this action through the magnifying glass icon located to the right of the Start menu - enter the “Configuration” command or the “msconfig” key. You can also get to the configurator window alternative way: hold down Win + R, in “Run” enter the password “msconfig” without quotes – “Enter”.
  6. Go to the “Services” tab, click on “Do not display Microsoft services”, tap “Disable all” (after completing this action, the entire list of startup programs will be cleared). You can disable only the uninstallable CIPF - to do this, find the specified object in the general list of services and uncheck the box located to the left of its name.
  7. In Windows 7, you will also need to go to the “Startup” tab and disable the executing process using the “Disable” option.
  8. Close the “msconfig” window after pressing the “Apply” button.
  9. Reboot the computer.
  10. In OS 10, you need to go to the Start menu, click on the gear icon. In the “Windows Settings” window, select the “Applications” subsection.
  11. In “Applications and Features”, find the uninstallable “Control Program” using the built-in search bar - right-click on the search result found and initiate removal.
  12. Follow the prompts of the “Installation Wizard” - click “Finish” when the uninstallation process is complete.
  13. Restart your PC.
  14. After turning on the device, go to the “Registry Editor” tool - press Win + R and enter the command “regedit”, tap on “OK”.
  15. In the “Registry Editor” window, select the leftmost menu item “File” - the “Export” section. Specify “All registry” as the export range, then enter any file name and click “Save” in the desired directory. Subsequently, it will be possible to restore data from the specified source using the “Import” option.
  16. Clamp Ctrl combination+ F and look for residual components of the uninstalled application - click “Find Next”.
  17. The monitor will display a list of entries in the registry: clear individual entries located in “HKEY_CURRENT_USER” and “HKEY_LOCAL_MACHINE”.

Note! Inexperienced users are better off skipping the step of manually cleaning the registry, as there is a high chance that their actions may break the OS. You can use a special tool to clean the registry from residual files, which is called Reg Organizer. There is a full version of this software solution, and a portable exe that does not require installation.

In order to remove “junk” keys and files remaining after deletion from the registry Continent-AP versions 3.5, 3.6 and 3.7 using RegOrganizer you will need:


An alternative way to remove a program

If the user is short on time and urgently needs to remove the Continent-AP program from his computer, then he will need one of the specially developed uninstaller utilities. Best solutions:

  • CCleaner;
  • Revo Uninstaller;
  • Advanced SystemCare (iObit);
  • Uninstall Tool.

All of these applications operate on approximately the same principle: they perform a standard removal of the application, and then clean it file system and a registry from residual software components. For example, in order to completely remove Continent-AP 3.7 using the free CCleaner software, you will need to follow the instructions:


I told you how to install the Continent AP program on Windows 7. The fact is that this program uses certificates in its work, with the help of which a secure connection is created and data exchange with the Continent AP access server. In this article I will try to tell you how to create a request to issue a certificate for the AP Continent, as well as how to install this certificate in the program.

I will show you, as always, with pictures, although they were made on a computer, under Windows control XP. So let's get started...

After installing Continent AP, a “gray shield” icon should appear in your tray. If you right-click this “shield”, a context menu will appear, as shown in the picture below:



Here you need to select the “Certificates” menu item, and then “Create a request for a user certificate.” The following window will open (Fig. 2):



This form must be completed. Before doing this, do not forget to insert a clean key carrier. After all, after filling out this form, the generation of private keys will begin, which occurs on the key carrier that is to be rejected. This could be, for example, a flash drive. If you use the Crypto PRO 3.6 or higher program on your computer, then flash drives are enabled by default. And to be more precise, “All removable media”. I do not consider generation to key media of the “Register” type, because This is prohibited in our UFC.


So, let's return to filling out the form (Fig. 2). As you can see, it consists of two blocks. I outlined them in yellow. If everything is intuitive with the upper block (you need to fill in all the fields), then I will dwell in more detail on the lower one. You must immediately check the “paper form” checkbox. It is not installed by default. Using the "Browse" buttons you can select a location to save files. And there will be two of them. *.reg and *.html. File names can be edited as you wish, without changing the file extensions, of course.

By default, the program offers to save under the following name: the name of the computer on the network (I circled it in blue), the date and time the request was created. As can be seen from the figure, the request was created on December 10, 2015 at 9 hours 51 minutes 46 seconds on a computer named “imyacompa”. The last 3 characters are added randomly. They always consist of three digits and I didn’t notice any system in their generation.

It is worth noting that if you downloaded the Continent AP program version 3.5.68.0 from my website, then most likely there is an old printable template. After installing this program, you need to change this template. This is relevant for our region, namely the Chelyabinsk region. Changing the printable template will only affect the printable in *.html format; it will not have any effect on the *.req file.

If your region is using an older template, you must follow the recommendations for your region. Download new template you can use the following link. If you are in our region, then before generating keys and a certificate request, change the template in accordance with the instructions in the attached file.

So, having decided on the name of the files, you can start generating a certificate request by clicking the "OK" button. As mentioned above, we will receive 2 files *.req and *.html, as well as private keys on a flash drive or any other medium.

Next, you must act in accordance with the procedure for submitting requests for a certificate, which is in effect in your UFK. Here we print *. html file on paper, signed by the owner of the certificate and the head of the organization. Then we transfer a paper copy and *.req file to the treasury removable media and in return we receive a certificate.

So, the request was sent to the UFC, we received a certificate. By the way, time may pass between sending the request and receiving the certificate, it’s different for everyone, but the main thing is to wait for the certificate. What's next? And then right-click on the “shield” of the AP Continent and do what is shown in the figure below:



Namely: go again to “Certificates”, and then “Install user certificate”. The arrows in Figure 3 show what needs to be done. Before doing this, insert the key media with private keys, obtained as a result of generation, and also prepare a certificate received from the UFC. I copied it onto key media so that it would always be at hand. You can do it your way: rewrite it anywhere, the main thing is that during installation you can get to it. By the way, along with the user certificate, our UFC also issues the root certificate of the AP Continent. This certificate, when installed, must be located in the same directory as the user one. In general, the figure below shows all this:



The AP Continent root certificate is the root file. This certificate is required when installing Continent AP for the first time. After installing the user certificate, the program installs the root one if it is not installed. Otherwise, it does nothing. But if the program does not find the root one the first time, then there will be problems. Therefore, it is better to always have it together with the user certificate in the same directory.

Here, Figure 4, during installation you must, of course, select a user certificate. I have highlighted it in the picture. And the yellow folder is the private keys obtained when generating the request. There are six files with the *.key extension. By the way, the keys are standard for the Crypto Pro 3.6 program. After all, it is she who generates these keys. So, having selected the user certificate, click the “Open” button and get to the following picture:



The top line is precisely the key container with private keys. And at this stage we must indicate to the program the key container corresponding to our certificate. Namely, the one that was generated when creating the certificate request. In general, let me make a small digression... All digital signatures that are generated using Crypto Pro (you don’t think that the keys are generated by Continent AP) consist of two parts:

  • private key is the key container obtained during generation;
  • The public key is a certificate obtained from the treasury.

These parts are connected (again, using Crypto Pro) only if they match each other. It is not difficult to conclude: if one of the parts is lost or damaged, then the entire digital signature stops working. And it is impossible to correct this situation except by generating a new digital signature. There are ways to make a copy of your digital signature, but I won’t touch on that in this article.

So, back to “our sheep”. In Figure 5, be sure to click on the top line with the key container, and then click “OK”. After all this is done, you will receive the following window:



Well, there’s only “OK”, there are no other ways... Congratulations, the certificate is installed. It's time to check its performance. To do this, we need to do as the following picture tells us:



RMB on the “shield”, go to “Establish/break connection” -> “Establish connection Continent AP” and get into the following window:



Click where the red arrow points (Fig. 8). If you followed these instructions in the previous stages, then at least one certificate will pop up. You must select the one you just installed (see Figure 9):



After selecting it, check the box next to “Always use this certificate when connecting.” In this case, your Continent AP will connect to the server using the specified certificate. Otherwise (if the checkbox is not checked), it will prompt you to select a certificate every time you connect. To find out whether the certificate was selected correctly, you can use the "Properties" button. It will show everything about the selected certificate. At the end, as always, the "OK" button. The process of connecting Continent AP to the access server will begin. If everything is done correctly, then as a result you will see in the tray how the “shield” has changed color from gray to blue:



If you got the same result as I did, then I am glad to congratulate you on the successful installation of the certificate for the AP continent. After you have connected to the access server, you can download the SUFD and start working in it.

P.S. Well, one more thing: I think that I have outlined everything here in sufficient detail. But some questions may still arise. In this case, write them in the comments below. By the way, for registered users of my site, comments appear immediately, without moderation.

And finally... If you liked this article and learned something new from it, you can always express your gratitude in monetary terms. The amount can be any. This does not oblige you to anything, everything is voluntary. If you still decide to support my site, then click on the “Thank” button, which you can see below. You will be redirected to a page on my website where you can transfer any amount of money to my wallet. In this case, a gift awaits you. After a successful money transfer, you will be able to download it.


ORDER

Removing, installing, generating authentication keys for CIPF “Continent-AP”, sending a request to receive an authentication key certificate, issuing a certificate.


  1. Removing a subscriber point of earlier versions
If you have installed on your computer previous versions subscriber point Continent AP, must be removed before installation old version. For this:

Start - Control Panel - Add and remove programs – Continent-AP and press Change.

After successfully deleting the subscriber point, click the button Ready and restart your computer.


  1. Installation of a subscriber point
Log in as a computer administrator.

Note. A user who is logged in has computer administrator rights. local group administrators.

Quit all applications running on your computer.

Execute the file Setup.exe, located in the directory with the distribution kit of the Subscriber Point.

The installer will begin the preparation steps and a message will appear on the screen. After completing the preparatory steps, the start dialog of the installation wizard will be displayed on the screen.


Click the button Further to continue installing the subscriber point

A dialog will appear on the screen containing a license agreement for the use of the software product.

Read the license agreement and, if you accept the terms, check the "I accept the terms of the license agreement" box and click the button Further.


Specify the IP address of the access server


  • to connect viaInternet83. 169.236.3
Click the button Further


Click the button Install

ATTENTION! FOR CORRECT OPERATION OF THE PROGRAM, IT IS NECESSARY TO REPLY POSITIVELY TO ALL WARNINGS THAT MAY APPEAR DURING THE DRIVER INSTALLATION PROCESS!


After installing the subscriber point, click the button Ready

The screen will ask you to restart your computer.



Click the button Yes to immediately restart the computer and start working with the User Point.
  1. Generating private and public (certificate request file) authentication keys.

The generation of authentication keys is carried out on a workstation, defined as a subscriber station of APKSH "Continent-AP", with the following installed on it:

  • cryptoprovider "CryptoPro" CSP 3.6".

  • software "Continent-AP" versions 3.5.68, 3.5.71, 3.6.

To generate private and public keys using "Continent-AP" version 3.x necessary:

Launch "Continent-AP" ( Start - Programs - Information Security - Continent Subscriber Point - Management Program).

Right-click on the icon “Continent-AP” located in the lower right corner of the screen - call the menu “ Certificates – Create a request for a user certificate."

In the window that appears " CIPF Continent-AP » fill in the fields:


In the field “Files for saving a certificate request - electronic form "specifies the path to the file in which the request for issuing an authentication key certificate will be saved. This file (request file with extension req ) will need to be transferred to the UFK for the Republic of Crimea (or the Department of the UFK for the Republic of Crimea).

The “Paper form” field does not need to be checked.

To generate a key, click the button " OK"

In the “CryptoPro” window that appears CSP "you need to select the magnetic media for the key container being created and click the "OK" button (the supported media is a "3.5" floppy disk, OS Registry Windows, Touch Memory DS 1993 – DS 1996, Electronic key with interface USB , Removable media with interface USB).


After pressing the “OK” button, the “CryptoPro CSP” window will appear, in which you can set a password for the created key container (however It is not advisable to set a password, since a lost password cannot be restored!).

The generated request to obtain an authentication key certificate in this case is located on disk C:\k-ap_31-03-2008_151130.req (the name of the request file will be different from the example given), the container with the private part of the key will be located on the selected key media.

The manufactured key container is subject to accounting in accordance with "Instructions on organizing and ensuring the security of storage, processing and transmission via communication channels using means cryptographic protection information with limited access that does not contain information constituting a state secret” put into effect by FAPSI order No. 152 of June 13, 2001.


A generated request for a certificate with the extension *.reqprovide for registration with the UFK for the Republic of Crimea com. No. 110 or in

tell friends