ID-software administrator view

Eesti keeles (In Estonian)

Version: 26.04/1

Published by: RIA

Version information

Date Version Changes/Notices
21/01/2019 19.01/1 Public version, based on the 18.12 software.
24/07/2019 19.7/1 Added the .exe installation key for automatic activation of the Chrome signing support and updated to software version 19.7. — Changed by: Kristel Merilain
20/11/2019 19.10/1 Changed the default installation of the AWP component OTCertSynchronizer and updated to software version 19.10. — Changed by: Kristjan Vaikla
31/01/2020 20.01/1 Added the print summary registry location for the default view in DigiDoc4 client and updated to software version 20.01. — Changed by: Kristjan Vaikla
02/07/2020 20.05/1 Added the AWP 5.3.4 SR1 component parameter for the registration key, which includes translation for Windows servers, and updated to software version 20.05. — Changed by: Kristjan Vaikla
11/10/2020 20.10/1 Removed the TeRa timestamping application and updated to software version 20.10. — Changed by: Kristjan Vaikla
28/02/2022 22.02/1 Added the Web eID update, removed outdated information, added information about new installation options, described the central deployment of browser extensions. Updated to software version 22.02/1. — Changed by: Urmas Vanem
29/03/2022 22.03/1 Fixed the Chrome Web eID extension value in the chapter on the central deployment of extensions. — Changed by: Urmas Vanem
13/04/2022 22.04/1 Changed the default location for adding Web eID extensions. — Changed by: Tarmo Nurmela
21/04/2022 22.04/2 Added the possibility to install the Idemia minidriver automatically with the MSI package (without card/reader, RDP case). — Changed by: Urmas Vanem
13/06/2022 22.06/1 Added a chapter about the software update logic and a description of Chrome policies Configure native messaging blocklist/allowlist. — Changed by: Urmas Vanem
29/07/2022 22.07/1 The base version of the software described in the document has now been updated to 22.06.0.1930, changes related to the new version have been described and outdated information has been removed. Added information about the central policies of Firefox. — Changed by: Kristel Merilain, Urmas Vanem
11/08/2022 22.08/1 Added a description of the ID-software update process. — Changed by: Urmas Vanem
31/08/2022 22.08/2 Corrected the information in the tables in the chapter ‘The behaviour of browser extensions by extension during installation’. — Changed by: Kristel Merilain
14/12/2022 22.12/1 Changed the description of the behaviour of Edge and Chrome web browsers during installation and updated to software version 22.11. — Changed by: Kristjan Vaikla
29/12/2022 22.12/1 Updated the information in the transform files of the ‘AWP’, Digidoc_ShellExt, and Web eID chapters. — Changed by: Märt Hirtentreu
24/10/2024 24.10/1 Removed Gemalto minidriver, updated installation logic, changed how web browsers install extensions, etc. — Changed by: Urmas Vanem
16/06/2025 25.06/1 Replaced AWP with IDPlug. — Changed by: Raul Metsma
31/10/2025 25.10/1 Added SmartCard Client. — Changed by: Raul Kaidro
19/05/2026 26.04/1 Published as online documentation. Added Edge NativeMessagingAllowlist configuration. — Changed by: Raul Metsma

Introduction

This document covers ID-software installation and management from an IT administrator perspective. The images are illustrative and based on version 26.4.20.8412.

The ID-software supports the following operating systems and browsers:

  • Operating systems: Windows 10, Windows 11, Windows Server 2019, Windows Server 2022, Windows Server 2025.
  • Browsers: versions of Mozilla Firefox, Google Chrome and Microsoft Edge Chromium supported by the aforementioned operating systems.

More detailed information about the changes in the latest ID-software version can be found at https://www.id.ee/en/article/id-software-versions-info-release-notes/.

ID-software overview

The ID-software installer is a single offline EXE file, Open-EID-26.4.20.8412.exe, which no longer supports the /layout command to extract MSI packages. MSI files can be downloaded separately from https://installer.id.ee/media/win/Open-EID.zip.

To install interactively with default settings, run the EXE file. To install only certain components, select Customize in the welcome window at the start of installation:

Customize the installation

The customization options are:

Default options

Brief overview of the components

The components are available separately as MSI packages from https://installer.id.ee/media/win/Open-EID.zip.

IDPlug

IDPlug is the software for the Idemia card, which also installs the minidriver for Idemia cards.

The component IDPlug Services is also part of the IDPlug. When it is installed and the smart card is removed from the card reader, all ID-card certificates are deleted from the Windows user certificate store. By default, the EXE installation will not install IDPlug Services and ID-card certificates are not removed from the certificate store. To install this component, the EXE installation must be started with the command line parameter InstallCertSynchronizer=1.

SmartCard Client

SmartCard Client is the software for the Thales card, which also installs the minidriver for Thales cards.

CertDelApp

When it is installed and the smart card is removed from the card reader, all ID-card certificates are deleted from the Windows user certificate store. By default, the EXE installation will not install CertDelApp and ID-card certificates are not removed from the certificate store when removing the card from the reader. To install this component, the exe installation must start with the command line parameter InstallCertSynchronizer=1.

Digidoc_ShellExt

This component allows starting signing and encryption in DigiDoc4 by right-clicking on the file.

DigiDoc4

DigiDoc4 is an application that enables the signing, validation, encryption, and decryption of documents as well as managing the PINs and PUKs of ID-cards.

ID-updater

ID-updater is a mandatory component that bundles shared third-party libraries (Qt, OpenSSL, etc.) required by other ID-software components. During installation, the task scheduler task id updater task is created, which checks the availability of new software once per week and suggests any identified updates to the user.

Example: ID-updater found a newer version of the software (EST)

Web eID

Web eID allows Estonian ID-cards to be used for online authentication and signing. The Web eID component consists of a native app and extensions for the well-known web browsers Google Chrome, Mozilla Firefox and Microsoft Edge.

In enterprises

In large and medium enterprises, the ID-software is usually installed and controlled centrally by a central management solution. SCCM1 and AD/GP2 are most common.

SCCM

In addition to the configuration options available in the GUI, the following command-line parameters can be used for unattended installations:

  1. ChromeSupport=0 — the Chrome extension is not added, 1 by default.
  2. EdgeSupport=0 — the Edge extension is not added, 1 by default.
  3. ForceChromeExtensionActivation2=1 — the Chrome extension is activated automatically, 1 by default.
  4. ForceEdgeExtensionActivation2=1 — the Edge extension is activated automatically, 1 by default.
  5. FirefoxSupport=0 — the Firefox extension is not added, 1 by default.
  6. InstallCertSynchronizer=1 — installs the component OTCertSynchronizer, 0 by default3.
  7. MinidriverInstall=0 — the minidriver is not installed, 1 by default.
  8. Qdigidoc4Install=0 — the DigiDoc software is not installed, 1 by default.
  9. IconsDesktop=0 — the DigiDoc icon is not put on the desktop, 1 by default.
  10. AutoUpdate=0id updater task is not added to the task scheduler, 1 by default.

Note: The installation keys shown above are case sensitive.

For example, the command line Open-EID-<version>.exe /quiet AutoUpdate=0 IconsDesktop=0 installs the ID-software in unattended mode, does not activate automatic updates, and does not add the ID-software icons to the desktop.

By default, running the EXE installs the software with default settings.

When using SCCM for ID-software installation, the simplest way is to create an installation package and install it into the computer with the default command line Open-EID-<version>.exe /quiet AutoUpdate=0.

As a result of this normal installation, the ID-software appears as usual in the software list:

ID-software in list

AD/GPO

If you do not have a central software management system in the enterprise, but you can use the Group Policy functionality, you can also use MSI-based installations. It is recommended to make GPO installations computer-based.

Note: By default, MSI installations are intended only for new installations. MSI components do not remove any previous (or current) versions of EXE installations.

For an overview of the MSI components, see Brief overview of the components above.

The MSI packages are embedded in the EXE but cannot be extracted from it. They can be downloaded separately from https://installer.id.ee/media/win/Open-EID.zip.

The following files are available as MSI packages:

Zipped MSI file

The MST files described below in the manual can be downloaded from the location https://www.id.ee/en/article/administrators-guide-for-administration-and-installation-of-open-eid/.

Note: MST files are updated alongside new MSI versions — always use the latest ones, as older versions will not work.

Below is a brief overview about how to configure GPO-MSI installations.

ID-updater

ID-updater is a mandatory component. It is recommended to install it first.

Options:

  • If you do not want to activate the automatic software update functionality (deferred id updater task), use the transform file 2410-no_autoupdate.mst with this MSI installation. And it probably makes sense to disable it, since MSI installations don’t support software update checking in this way.

Sample about adding a transform file to the MSI installation

IDPlug

IDPlug is the minidriver and basic software for Idemia cards.

Unlike EXE installation (check the IDPlug component description), MSI install adds the component IDPlug Services by default. If you do not want to enable this component, you must use a transform file.

Options:

  • To disable the component IDPlug Services:
    • Add the transform file DisableIDPlugServices.mst.
SmartCard Client

SmartCard Client is the minidriver and basic software for Thales cards.

CertDelApp

When installed, ID-card certificates are deleted from the Windows user certificate store when the smart card is removed from the card reader.

DigiDoc4

DigiDoc4 is a necessary component if you want to sign and encrypt documents as well as manage the PINs and PUKs of ID-cards.

Options:

  • For GPO-MSI installations, it is necessary to use the transform file 2410-DD-Location.mst. In this case, the software is installed in the same folder PROGRAM FILES\Open-EID as the necessary drivers.
  • The default MSI installation does not install the necessary icons on the desktop. However, if desktop icons are required, the transform file 2410-DD-Shortcut must also be added to the installation.

Adding transform files for MSI installation

Adding right-click signing and encryption to Windows

Enables right-click signing and encryption of files in Windows Explorer.

Options:

  • For GPO-MSI installations, it is necessary to use the transform file 2410-DD-Shell-Location.mst. In this case, the software is installed in the same folder PROGRAM FILES\Open-EID as the necessary drivers.

Sample of adding a transform file to a GPO-MSI installation

Web eID

Browser extensions and native app. For GPO-MSI installations, it is necessary to use the transform file 2410-Web-Location.mst. In this case, the software is installed in the same folder PROGRAM FILES\Open-EID as the necessary drivers.

Sample of adding a transform file to a GPO-MSI installation

The list of MSI custom packages in the GPMC management console looks like this:

Sample of en-US MSI GPO installation

For GPO-MSI installations, all installed programs also appear in the software list:

MSI installations in the program list of the Control Panel

Note: The order of MSI installation components is not important, but all components depend on the MSI Open-EID updater. The minidriver is also important, as other components depend on it.

Note: MST files can be downloaded from https://www.id.ee/en/article/administrators-guide-for-administration-and-installation-of-open-eid/.

Note: It is also recommended to publish the related root and intermediate certificates in the domain to all servers and workstations automatically through the group policies.

Deploying extensions centrally

Browser extensions can also be deployed centrally via Group Policy.

Please test configurations described below in your specific environment(s) before deployment.

Chromium Edge

For Edge, you need to download the newest Edge policy framework from https://www.microsoft.com/en-us/edge/business/download and integrate it into your environment.

After enabling policies, you can create a new policy that makes the use of the Web eID extension automatic in the domain. For that, set the value of the field CC/Administrative Templates/Microsoft Edge/Extensions — 'Control which extensions are installed silently' to gnmckgbandlkacikdndelhfghdejfido.

The Edge extension ID is gnmckgbandlkacikdndelhfghdejfido

The Edge Web eID extension is enabled centrally

Policy information in the registry

Additional possible configuration in the ‘native messaging’ view

By default, all native messaging hosts are allowed in Edge. However, if the NativeMessagingBlocklist policy is set to *, Web eID signing will not work. To resolve this, eu.webeid must be added to the NativeMessagingAllowlist policy. For more information, see the NativeMessagingAllowlist Edge policy documentation.

Google Chrome

The Chrome policy is set during the installation of the ID-software. The following information written to the registry enables the Web eID extension in Chrome automatically:

Chrome policy in the registry after installation

However, if you want to centrally manage policies in Chrome, the following instructions may help.

To enable the Chrome extensions policies centrally, you need to download the newest template files from https://chromeenterprise.google/browser/download/#windows-tab and integrate those into the domain solution.

After enabling policies, you can create a new policy that makes the use of the Web eID extension automatic in the domain. For that, set the value of the field CC/Administrative Templates/Google/Google Chrome/Extensions — 'Configure the list of force-installed apps and extensions' to ncibgoaomkmdpilpocfeponihegamlic.

Chrome Web eID extension ID is ncibgoaomkmdpilpocfeponihegamlic

The Chrome Web eID extension is enabled centrally

Policy information in the registry

Additional possible configuration in the ‘native messaging’ view

If the Configure native messaging blocklist property is set to * with Chrome policies, signing using the Chrome extension described above will not work. For example, on the test page https://hwcrypto.github.io/hwcrypto.js/sign.html, the result when attempting to sign is the error getCertificate() failed: Error: technical_error.

Error while attempting to sign

To overcome this problem, the host eu.webeid must be allowed in the Chrome policy Configure native messaging allowlist:

Enabling eu.webeid in the Chrome policy

After applying the policy, signing on the webpage succeeds.

Signing on the page succeeds

Mozilla Firefox

The Firefox policy is already set during the installation of the ID-software; the information reflected in the following image is written into the Windows registry. Using the aforementioned policy, the Web eID extension is automatically installed on Firefox:

Firefox policy in the registry after ID-software installation

However, if you want to centrally manage policies for Firefox, the information below can be helpful.

To use central policies for Firefox, you need to download the newest Firefox administrative templates from https://github.com/mozilla/policy-templates/releases and integrate them to the domain solution.

After introducing the policies to the domain environment, you can create a new policy that makes the use of the Web eID extension for Firefox automatic in the domain. There are several options for this, but it is perhaps advisable to overwrite the policy already described during the installation. To do this, set the value of the field CC/Administrative Templates/Mozilla/Firefox/Extensions — 'Extension Management' to the following text:

{
  "{e68418bc-f2b0-4459-a9ea-3e72b6751b07}": {
    "installation_mode": "normal_installed",
    "install_url": "https://addons.mozilla.org/firefox/downloads/latest/web-eid-webextension/latest.xpi"
  }
}

Central Firefox policy to enable Web eID functionality

The Firefox Web eID extension is installed and enabled

The corresponding information is written into the registry in the same place as during the installation of ID-software.

If you want to prevent the user from turning off the Web eID extension independently, one of the actions from the following list must be performed:

  1. Replace the text normal_installed with the text force_installed in the value of the field described above;
  2. Add the line {e68418bc-f2b0-4459-a9ea-3e72b6751b07} to the list CC/Administrative Templates/Mozilla/Firefox/Extensions — 'Prevent extensions from being disabled or removed'.

Preventing the Firefox Web eID extension from being disabled

After applying either of these policies, the user can no longer disable the Firefox Web eID extension:

The Web eID extension is always on

In addition, you can install the extension using the list CC/Administrative Templates/Mozilla/Firefox/Extensions — 'Extensions to install', but for the current configuration, it is preferred to overwrite the existing value.

Updating the software

Central configuration is used for checking ID-software updates. The process compares the software version in use with the latest version available and, in the case of DigiDoc4, also with the latest supported software version. The central configuration can be found at https://id.eesti.ee/config.json. There are three different ways to start checking for software updates:

  1. Using the scheduled task id updater task;
  2. Starting the DigiDoc4 program;
  3. Running a manual search for software updates when launching the DigiDoc4 application.

Scheduled task ‘id updater task’

Note: This method only works with EXE installations — the registry values described below are not created with an MSI installation.

By default, during installation, the scheduled task id updater task is created, which checks the availability of a newer software version. If a newer version of the software is available, it will be offered to the user.

id updater task

For ID-software version 26.4.20.8412, the version of the software can be found in the registry in the DisplayVersion field under the key HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{5FBF3885-332F-4E02-B7C8-589775D00818}.

ID-software version 26.4.20.8412 in the registry

The generated unique key (here: {DF5112B3-AAE7-44E3-8F9B-B9F33CDE0DC9}) is different for each ID-software version. When the scheduled task id updater task is started, the central configuration is loaded into the computer’s memory, the WIN-LATEST parameter is read from there and compared with the DisplayVersion parameter in the registry. If the WIN-LATEST is greater than the value of the DisplayVersion field in the registry, the user is offered a software update.

Starting DigiDoc4

Also when starting the DigiDoc4 program, the software version is checked and compared with the version in the central configuration. The first time the DigiDoc4 program is started, the central configuration file config.json is downloaded to the folder %APPDATA%\RIA\qdigidoc4. At the first start, the LastCheck field is also written to the user’s registry, which, as expected, describes the time when the last request for a new version of the central configuration file was successful.

User-based information on DigiDoc4

At each subsequent start of the DigiDoc4 application, the current date is compared with the LastCheck value mentioned above, and if this difference is greater than 4 days, the availability of new software is automatically checked. In the case of a successful check, the LastCheck field is also updated.

Outdated software

If the DigiDoc4 version in the LastVersion field in the user’s registry section is smaller than the one described in the QDIGIDOC4-SUPPORTED line in the central configuration file, the user will be informed of this every time the DigiDoc4 program is started: Your ID-software has expired. To download the latest software version, go to ….

Newer version of software

If the DigiDoc4 version in the LastVersion field of the user’s registry section is smaller than the one described in the QDIGIDOC4-LATEST line of the central configuration file, the user will be informed of this after starting the DigiDoc4 program: An ID-software update has been found. To download the update, go to …. The user is notified of the update the first time a version difference is found, and subsequent notifications are only sent when changes have been made to the central configuration file.4

To manually search for ID-software updates, open the settings in the DigiDoc4 program and then click the Refresh configuration text at the bottom. As a result, the process always checks for a new configuration file, downloads it if necessary, and then compares the version there with the software version on the computer. The computer version is read analogously to the scheduled task id updater task, from the DisplayVersion registry field under the key HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{5FBF3885-332F-4E02-B7C8-589775D00818}.

Refresh configuration under DigiDoc4 settings (EST)

If a software update is available, it will be offered to the user. The user will also be notified if no ID-software updates are available:

The latest version is already installed

Note: This method also works correctly only for EXE installations.

  1. System Center Configuration Manager 

  2. Active Directory / Group Policy 

  3. If this setting is enabled, the user’s certificates are removed from the Windows certificate store when the EID card is removed. 

  4. Usually, changes are made to the central configuration file once a month. 


This site uses Just the Docs, a documentation theme for Jekyll.