Configuring the ActivID Appliance for the Thales Luna HSM

Using the ActivID Console:

  • Install the Hot Fix

  • Configure the HSM settings

  • Migrate the cryptography to the external HSM

Install the ActivID Appliance Hot Fix

Install the ActivID Appliance 8.7 hot fix (FIXS2412001) that will enable you to deploy the Thales Luna HSM with the ActivID Appliance.

Important:  
  • The ActivID Appliance must be initialized (that is, set the mode as Full installation or Front-End installation)

  • Upgrades are allowed if you have a maintenance license corresponding to the number of users in your deployment

  • Only software update files (RPM) provided by HID Global as signed and time-stamped RPM files are supported and can be installed. Third-party software update files are not supported

    The hot fix is available for download from the HID Global Customer Portal.

    The hot fix package required for migration is also available from your vendor. Please contact your vendor to obtain the update before starting the migration process.

  • Hot fix installation restarts appliance services

    You must anticipate a service interruption if your appliance is not configured in for high availability (dual mode).

  • While a software update is in progress, you cannot perform any other operation with the ActivID Console (you will be redirected to the software update page)

  1. Create a backup of your existing ActivID Appliance.

  2. Log on to the ActivID Console and, under Appliance in the left menu, select Software Update.

  3. Select the hot fix package and click Upload.

  4. Note: The uploaded file will be verified. If it is not valid, an error is displayed.

    Alternatively, you can click Cancel if you have selected the wrong package.

    Once the software update package has been uploaded successfully and is verified, then the field will be populated with the file name.

  5. Click Apply.

    At this point, the services are interrupted on the node.

    Important:
    • Do NOT interrupt the update process while it is running. You must wait for the Done message to be displayed.
    • Carefully read all the warning messages displayed by the update process, specifically if the process indicates that you need to reboot the ActivID Appliance.
  6. When the update is complete, click Done.

  7. Verify that the product version has been updated:

    • Under Configuration in the left menu, select Applications at least once after the update. This action refreshes the version.

      To check the version of an application after installing a software update, log on to the application, and then select About.

    • Under Monitoring, select Troubleshooting to verify that the ActivID Appliance version and compatibility digest have been updated correctly based on the release notes description.

  8. Archive and purge the audit records on the appliance.

  9. Restart the appliance using the ActivID Console or Terminal Console.

Configure the External HSM

Note: The option is only available when the external HSM is not yet configured on the ActivID Appliance.
Prerequisites:  
  • The ActivID Authentication Services application is installed on the appliance

  • The hot fix (FIXS2412001) is installed

  • The External HSM is prepared as described in Preparing a Thales HSM for the ActivID Appliance and running

  • The existing cryptographic type is ‘Software’

  • The appliance is in single mode

  • Make sure you have a license for the Thales Luna HSM Client

  1. Log on to the ActivID Console and, under System in the left menu, select Cryptography.

  2. Under External HSM, click Configure External HSM.

  1. Select Thales Luna Network HSM as the HSM type and click Next.

    As the Thales Luna Network HSM integration requires the Thales Client product license, you must acknowledge that you have the required license.

    If you click Decline, you will not be able to configure the HSM.

  2. Click Accept to proceed.

    Note:  
    • Click Show instructions to display the relevant commands:

    • The code samples are pre-populated with your parameters where relevant

  3. Click Download to get the ActivID Appliance client certificate that you will need to upload to the HSM later.

    This certificate is valid for 10 years.

  1. Enter the HSM parameters:

    • IPv4 Address

    • Crypto User Credential (as defined during the HSM preparation)

    • HSM server certificate (.pem)

      Note: You can get this certificate from the HSM using one of the following commands:
      Copy

      On a Microsoft Windows host:

      pscp <ADMIN_HSM_USERNAME>@<HSM_IP>:server.pem <HSM_IP>.pem
      Copy

      On a Linux host:

      scp <ADMIN_HSM_USERNAME>@<HSM_IP>:server.pem <HSM_IP>.pem

      Where:

      • <ADMIN_HSM_USERNAME> is the username of the HSM admin user

      • <HSM_IP> is the IP address of your HSM

  2. To register the ActivID Appliance on the HSM:

    1. Copy the client certificate (that you downloaded above) to the HSM using one the following commands:

      Copy

      On a Microsoft Windows host:

      pscp <YOUR_FOLDER>/<APPLIANCE_HOSTNAME>.pem <ADMIN_HSM_USERNAME>@<HSM_IP>:<APPLIANCE_HOSTNAME>.pem
      Copy

      On a Linux host:

      scp <YOUR_FOLDER>/<APPLIANCE_HOSTNAME>.pem <ADMIN_HSM_USERNAME>@<HSM_IP>:<APPLIANCE_HOSTNAME>.pem

      Where:

      • <YOUR_FOLDER> is the directory containing the client certificate

      • <APPLIANCE_HOSTNAME> is the hostname of the ActivID Appliance (pre-populated in the console's code samples for convenience)

      • <ADMIN_HSM_USERNAME> is the username of the HSM admin user

      • <HSM_IP> is the IP address of the HSM

    2. ONLY if the ActivID Appliance is already registered on the HSM, open an SSH terminal on the HSM using the HSM Administrator account and delete the existing registration using the following command:

      Copy
      client delete -client <APPLIANCE_NODE_LABEL>
    3. Open an SSH terminal on the HSM using the HSM Administrator account and register the client certificate using the following commands:

      Copy
      client register -client <APPLIANCE_NODE_LABEL> -hostname <APPLIANCE_HOSTNAME>
      client assignPartition -client <APPLIANCE_NODE_LABEL> -partition <APPLIANCE_PARTITION_NAME>
      Copy

      Map a label to the IP of the ActivID Appliance

      client hostip map -c <APPLIANCE_NODE_LABEL> -i <APPLIANCE_IP>

      Where:

      • <APPLIANCE_NODE_LABEL> is the name of node for the ActivID Appliance on the HSM

      • <APPLIANCE_HOSTNAME> is the hostname of the ActivID Appliance (pre-populated in the console's code sample for convenience)

      • <APPLIANCE_PARTITION_NAME> is the name of the partition you created on the HSM for the ActivID Appliance

      • <APPLIANCE_IP> is the IP address of the ActivID Appliance (pre-populated in the console's code sample for convenience)

  1. Return to the ActivID Console and click Apply.

  2. Click Done.

  3. You can now migrate to the external HSM.

Migrate to the External HSM

Important:  
  • The duration of the migration process depends on the size of the data to be signed with the new encryption keys. For a migration with existing domains, users and configuration, this could take several hours.

  • After migration to the external HSM, you will only be able to revert to the Software cryptographic mode by restoring from a backup of your appliance created before migration when the cryptographic type was Software.

Prerequisites:  
  • The External HSM is configured as described Configure the External HSM

  • The existing cryptographic type is ‘Software’

  • The appliance is in single mode

  • Before performing a cryptographic migration, it is strongly recommended that you:

    • Back up the appliance to be able to revert to the Software cryptographic type if necessary

    • Archive the Audit records (as the Audit data is not migrated)

  1. Log on to the ActivID Console and, under System in the left menu, select Cryptography.

  1. Click Migrate to External HSM.

  1. Click Yes, proceed.

    Note: The migration process archives all the non-archived audit records and generates a .csv file on the appliance’s file system (named according to the Archive Now conventions). This file will be pushed to the S/FTP server and deleted from the file system at the next scheduled or on-demand archive operation.

  1. Click Done when the migration process is complete.

    The ActivID Appliance configuration is updated and the ActivID applications and ActivID Console are restarted.

    After successful migration, the cryptographic type is now Thales Luna HSM.

  1. In the ActivID Console Configuration menu, select Key Stores and verify that the ActivID IDP certificates are present in the ActivID Appliance keystore.

    Important: After a cryptographic migration to the external HSM, the ActivID Authentication Portal Metadata must be re-imported on each configured service provider as new IDP certificates have been created in the external HSM.

See also:

Managing External HSMs

Troubleshooting an External HSM