Configuring the ActivID Appliance for the Entrust HSM
Using the ActivID Console:
-
Configure the HSM settings
-
Migrate the cryptography to the external HSM
Configure the External HSM
The ActivID Authentication Services application is installed on the appliance
The External HSM is prepared as described in Preparing an Entrust HSM for the ActivID Appliance and running
The existing cryptographic type is ‘Software’
The appliance is in single mode
-
Log on to the ActivID Console and, under System in the left menu, select Cryptography.
-
Under External HSM, click Configure External HSM.
-
Select Entrust nShield Connect HSM as the HSM type and click Next.
-
Enter the HSM Parameters and click Next:
-
IPv4 Address
-
Port
The ActivID Console obtains the ESN and KNETI hash values from the HSM and displays them:
-
ESN – represents the Electronic Serial Number of the HSM unit
-
KNETI – represents the key used to authenticate the HSM unit to the clients
-
-
Click Yes, continue to confirm that the ESN and KNETI hash values are valid to ensure that the correct HSM is configured.
If the values are not correct, click No, go back and enter the correct HSM Parameters.
-
When the ActivID Console has configured the HSM, enter the Remote File System Parameters and click Save:
-
IPv4 Address
-
Port
The ActivID Console applies the RFS configuration and performs the RFS synchronization.
It checks if the expected IDP keys/certificates (that should match the defined existing security domains) and ActivID Appliance keys are present in the external HSM (verifying the key type and key length).
If these checks fail, an error message is displayed listing the missing ActivID IDP keys/certificates and the process exits.
-
-
When the RFS is successfully configured, click Return to Cryptography.
-
If the ActivID Appliance keys will be protected by the configured OCS card set (instead of by the Entrust module only), under OCS, select Use OCS protected keys.
-
Enter the details of the required OCS card set and click Apply:
-
OCS Card PIN
-
OCS Card Label
Important: Make sure that you configure the correct OCS card set. Once the OCS card set is configured, it cannot be updated/modified. Only the OCS Card PIN can be updated.If you configure the wrong OCS card set, you must restart the external HSM process – reset the ActivID Appliance, restore from a backup, and then perform the migration again with the correct OCS card set.
-
-
You can now migrate to the external HSM.
Migrate to the External HSM
The duration of the migration process depends on the size of the data to be signed with the new encryption keys. For a migration with existing domains, users and configuration, this could take several hours.
After migration to the external HSM, you will only be able to revert to the Software cryptographic mode by restoring from a backup of your appliance created before migration when the cryptographic type was Software.
The External HSM is configured as described Configure the External HSM
The existing cryptographic type is ‘Software’
The appliance is in single mode
Before performing a cryptographic migration, it is strongly recommended that you:
Back up the appliance to be able to revert to the Software cryptographic type if necessary
Archive the Audit records (as the Audit data is not migrated)
-
Click Yes, proceed.
Note: The migration process archives all the non-archived audit records and generates a .csv file on the appliance’s file system (named according to the Archive Now conventions). This file will be pushed to the S/FTP server and deleted from the file system at the next scheduled or on-demand archive operation.
-
Click Done when the migration process is complete.
The ActivID Appliance configuration is updated and the ActivID applications and ActivID Console are restarted.
After successful migration, the cryptographic type is now Entrust nShield Connect HSM.
-
In the ActivID Console Configuration menu, select Key Stores and verify that the ActivID IDP certificates are present in the ActivID Appliance keystore.
Important: After a cryptographic migration to the external HSM, the ActivID Authentication Portal Metadata must be re-imported on each configured service provider as new IDP certificates have been created in the external HSM.
Configure Entrust HSMs for High Availability
The ActivID Appliance supports multiple HSM modules in a cluster. This allows automatic failover to another HSM module if one fails.
Failover is supported in deployments with both HSM and OCS-protected keys although the failover transparency differs:
-
Module-protected keys – in HSM pool mode, the failover is transparent to the ActivID Appliance so there is no need for the supervisor to restart the applications.
-
OCS-protected keys – the failover is not transparent. The ActivID Appliance supervisor watchdog will automatically probe the authentication services and might restart the application services if necessary. In this case, the authentication services will be unavailable during the restart process (on average, for five minutes).
For further information about the required configuration, see Managing Clusters (Entrust HSMs Only).
In High Availability deployments, the HSM configuration must be applied on both appliances as follows:
-
On the first appliance only, configure and migrate the cryptography.
The second appliance will automatically switch to Entrust HSM cryptography when you move both appliances back to Dual Mode.
-
On the second appliance, repeat the ActivID Console HSM and RFS configuration to match that of the first appliance.
-
Set Dual Mode between the appliances.
-
Back up the appliances.
For further information, see Managing a High Availability Deployment.
See also: