Configuring the ActivID Appliance for the HSM

Using the ActivID Console:

  • Configure the HSM and RFS

  • Migrate the cryptography to the external HSM

Configure the External HSM

Note: The option is only available when the external HSM is not yet configured on the ActivID Appliance.
Prerequisites:  
  • Before performing a cryptographic migration, it is strongly recommended that you:

    • Back up the appliance.

    • Archive the Audit records (as the Audit data is not migrated).

  1. Log on to the ActivID Console and, under System in the left menu, select Cryptography.

  1. Under External HSM, click Configure External HSM.

  1. Click Yes, continue.

  1. Enter the HSM Parameters and click Next:

    • IP address

    • Port

    The ActivID Console obtains the ESN and KNETI hash values from the HSM and displays them:

    • ESN – represents the Electronic Serial Number of the HSM unit

    • KNETI – represents the key used to authenticate the HSM unit to the clients

  1. Click Yes, continue to confirm that the ESN and KNETI hash values are valid to ensure that the correct HSM is configured.

    If the values are not correct, click No, go back and enter the correct HSM Parameters.

  1. When the ActivID Console has configured the HSM, enter the Remote File System Parameters and click Save:

    • IP address

    • Port

    The ActivID Console applies the RFS configuration and performs the RFS synchronization.

    It checks if the expected IDP keys/certificates (that should match the defined existing security domains) and ActivID Appliance keys are present in the external HSM (verifying the key type and key length).

    If these checks fail, an error message is displayed listing the missing ActivID IDP keys/certificates and the process exits.

  1. When the RFS is successfully configured, click Return to Cryptography.

  1. If the ActivID Appliance keys will be protected by the configured OCS card set (instead of by the Entrust module only), under OCS, select Use OCS protected keys.

  1. Enter the details of the required OCS card set and click Apply:

    • OCS Card PIN

    • OCS Card Label

    Important: Make sure that you configure the correct OCS card set. Once the OCS card set is configured, it cannot be updated/modified. Only the OCS Card PIN can be updated.

    If you configure the wrong OCS card set, you must restart the external HSM process – reset the ActivID Appliance, restore from a backup, and then perform the migration again with the correct OCS card set.

Migrate to the External HSM

Important: After migration to the external HSM, you will not be able to revert to the Software cryptographic mode except if you restore from a backup of your appliance created before migration when the cryptographic type was Software.
Prerequisites:  
  • The External HSM is configured as described Configure the External HSM.

  • The existing cryptographic type is ‘Software’.

  • The appliance is in single mode.

  • Before performing a cryptographic migration, it is strongly recommended that you:

    • Back up the appliance to be able to revert to the Software cryptographic type if necessary.

    • Archive the Audit records (as the Audit data is not migrated).

  1. Log on to the ActivID Console and, under System in the left menu, select Cryptography.

  1. Click Migrate to External HSM.

  1. Click Yes, proceed.

    Note: The migration process archives all the non-archived audit records and generates a .csv file on the appliance’s file system (named according to the Archive Now conventions). This file will be pushed to the S/FTP server and deleted from the file system at the next scheduled or on-demand archive operation.

  1. Click Done when the migration process is complete.

    The ActivID Appliance configuration is updated and the ActivID applications and ActivID Console are restarted.

    After successful migration, the cryptographic type is now External HSM.

    Important: After a cryptographic migration to the external HSM, the ActivID Authentication Portal Metadata must be re-imported for each configured service provider as new IDP certificates have been created in the external HSM.
  1. In the ActivID Console Configuration menu, select Key Stores and verify that the ActivID IDP certificates are present in the ActivID Appliance keystore.

Configure an External HSM for High Availability

In High Availability deployments:

  1. On the first appliance only, migrate the cryptography.

    The second appliance will automatically switch to External HSM cryptography when you move both appliances back to Dual Mode.

  2. On the second appliance, repeat the ActivID Console HSM and RFS configuration to match that of the first appliance.

  3. Set Dual Mode between the appliances.

  4. Back up the appliances.

For further information, see Managing a High Availability Deployment.

See also:

Managing External HSMs

Troubleshooting an External HSM