Signotaur runs as a Windows Service under a designated service account. For Signotaur to function correctly, this account needs permissions for accessing files, certificate stores, library DLLs and network resources.
Log on as a ServiceNote: This permission is assigned by the installer. Set it manually only if you change the service user account after installation.
C:\ProgramData\vsoft\Signotaur\ServerRead and WriteC:\ProgramData\VSoft\Signotaur\Server\LogsRead and WriteNote: A different log folder location (LogFileLocation) may be specified in the configuration file.
C:\ProgramData\VSoft\Signotaur\Server\FilesRead, Write, and DeleteSignotaur can access both user and system certificate stores to retrieve certificates (including those with private keys).
Read access to the certificate and Read Key access to the private key for any certificates required by Signotaur. See System Certificate Store Permissions for details.To access certificates on PKCS#11 hardware devices, Signotaur loads required library DLLs from device-specific directories.
Example Folders:
%ProgramFiles%\Yubico\Yubico PIV Tool\bin\%SystemRoot%\System32\Permissions Needed: Read and Execute
Purpose: Grants Signotaur access to load and execute the required PKCS#11 libraries, such as libykcs11.dll and eTPKCS11.dll.
Write access to Event LogTo download a trial license or check for updates, Signotaur makes HTTP requests to:
https://www.finalbuilder.comhttps://downloads.finalbuilder.comEnsure network access is available to these URLs through any firewall or proxy to enable this functionality..
Following this guide will ensure that Signotaur has all the necessary permissions to run smoothly. For any additional support, please contact our technical support team.