Managing External HSMs

Using the ActivID Console, you can manage the configuration (including the encryption keys) of the integrated external HSMs and, optionally, HSM clusters.

Renew the External HSM Keys

Important:  
  • The renewal process might take several minutes during which the audit data will be archived and deleted, the database re-encrypted and the applications restarted.
  • It is recommended that you back up the appliance and archive the audit data before renewing the keys.

The keys are managed in consistent set of five AES-256 symmetric keys with specific roles and naming convention for the key aliases:

<PREFIX>.<Key Role Type>.<version>

Where:

  • <PREFIX> – to make sure that the names remain unique, a specific prefix 'HID-IA-4T’ is used for all the ActivID Appliance key aliases

    This prefix is not configurable.

  • <Key Role Type> – is mandatory and is part of the key set

  • <Version> – number version of the key (increment with renewal)

Based on this convention, the default key set (shared by all domains) that you need to generate using the HSM tools is:

Key Role Key Type Alias – shared Key Usage Key Role

AUDIT

AES 256

HID-IA-4T.AUDIT.1

Signature Audit signature

CREDS

AES 256

HID-IA-4T.CREDS.1

Encryption User credentials encryption (replaces the des and DeviceSecretsKey keys of previous versions of the ActivID Appliance)

DSIGN

AES 256

HID-IA-4T.DSIGN.1

Signature Database row integrity signature

SESSION

AES 256

HID-IA-4T.SESSION.1

Encryption ALSI sessions encryption/decryption

SYS

AES 256

HID-IA-4T.SYS.1

Encryption System credentials encryption/decryption (adapter parameters, replaces the ParameterValueKey key of previous versions of the ActivID Appliance)
Note: The ActivID Appliance server expects the key aliases to be in uppercase characters as defined by the naming convention. However, case-sensitivity in keystores is (soft or HSM) implementation dependent.

Therefore, when the HSM keys are created or renewed using a manual process (using HSM dependent tools), it is recommended that you always use the uppercase key aliases.

  1. On your HSM, create the new set of keys based on the naming convention detailed above and incrementing the version.

    For example:

    Existing Key Set New Key Set

    HID-IA-4T.AUDIT.1

    HID-IA-4T.AUDIT.2

    HID-IA-4T.CREDS.1

    HID-IA-4T.CREDS.2

    HID-IA-4T.DSIGN.1

    HID-IA-4T.DSIGN.2

    HID-IA-4T.SESSION.1

    HID-IA-4T.SESSION.2

    HID-IA-4T.SYS.1

    HID-IA-4T.SYS.2

  2. Log on to the ActivID Console and, under System in the left menu, select Cryptography.

  1. Click Renew Keys.

  1. Click Yes, proceed.

  2. Wait for the renewal process to complete.

  1. Click Done.

Modifying an Entrust HSM Configuration

Note:

Modify the RFS Configuration

  1. Log on to the ActivID Console and, under System in the left menu, select Cryptography.

  1. Under Remote File System, click Update.

  1. Modify the Remote File System Parameters as required and click Save.

    If you modified the RFS configuration, the ActivID Console performs the RFS synchronization.

    Note: If the new security world configuration does not match the existing one, the process exists with an error.

Synchronize the RFS

If you have already created keys on the RFS that will be needed for further operations (for example, you want to add a new domain or renew IDP signing /encryption keys), and you want to check that the keys are successfully configured, you can synchronize with the RFS so that the new key information from the RFS is copied onto the appliance’s file system.

Note:
  • This option is only available when the external HSM has already been configured.

  • When you update IDP signing or encryption keys, to view them in the ActivID Console keystore, simply restart the ActivID Console.

  • RFS synchronization is automatically performed during migration, Set Dual Mode, and Add domain operations.

  1. Log on to the ActivID Console and, under System in the left menu, select Cryptography.

  1. Under Remote File System, click RFS Synchronization.

The ActivID Console performs the RFS synchronization and the new key information from the RFS is copied onto the appliance’s file system.

Update the OCS Card PIN

Note: This only applies if the ActivID Appliance keys are protected by the configured OCS card set (instead of by the Entrust module only).
  1. Log on to the ActivID Console and, under System in the left menu, select Cryptography.

    Note:  
    • You cannot define a different OCS card set.

    • Only the OCS Card PIN can be updated.

  1. Under OCS, enter the new OCS Card PIN and click Apply.

If you need to change the OCS card set, you must restart the external HSM process – reset the ActivID Appliance, restore from a backup, and then perform the migration again with the required OCS card set.

Modifying a Thales HSM Configuration

Warning! Only modify the IP address if the existing HSM's IP address changed or to point to a new HSM that is a clone of the existing one (with exactly the same keys, certificates, etc).

Otherwise, the ActivID Appliance encryption will be broken.

Important:
  • Modifying the HSM configuration will remove the current connection to the HSM and interrupt the services

    Plan the modification to minimize the impact on operations.

  • It is strongly recommended that you create a backup of the ActivID Appliance before modifying the HSM configuration

  1. Log on to the ActivID Console and, under System in the left menu, select Cryptography.

  2. Click Edit.

    Note:  
    • Click Show instructions to display the relevant commands

    • The code samples are pre-populated with your parameters where relevant

  3. Click Download to get the same ActivID Appliance client certificate (valid for 10 years) that was generated when you initially configured the Thales HSM.

  1. Enter the HSM parameters:

    • IPv4 Address

    • Crypto User Credential (as defined during the HSM preparation)

    • HSM server certificate (.pem)

      Note: You can get this certificate from the HSM using one of the following commands:
      Copy

      On a Microsoft Windows host:

      pscp <ADMIN_HSM_USERNAME>@<HSM_IP>:server.pem <HSM_IP>.pem
      Copy

      On a Linux host:

      scp <ADMIN_HSM_USERNAME>@<HSM_IP>:server.pem <HSM_IP>.pem

      Where:

      • <ADMIN_HSM_USERNAME> is the username of the HSM admin user

      • <HSM_IP> is the IP address of your HSM

  2. To register the ActivID Appliance on the HSM:

    1. Copy the client certificate (that you downloaded above) to the HSM using one the following commands:

      Copy

      On a Microsoft Windows host:

      pscp <YOUR_FOLDER>/<APPLIANCE_HOSTNAME>.pem <ADMIN_HSM_USERNAME>@<HSM_IP>:<APPLIANCE_HOSTNAME>.pem
      Copy

      On a Linux host:

      scp <YOUR_FOLDER>/<APPLIANCE_HOSTNAME>.pem <ADMIN_HSM_USERNAME>@<HSM_IP>:<APPLIANCE_HOSTNAME>.pem

      Where:

      • <YOUR_FOLDER> is the directory containing the client certificate

      • <APPLIANCE_HOSTNAME> is the hostname of the ActivID Appliance (pre-populated in the console's code samples for convenience)

      • <ADMIN_HSM_USERNAME> is the username of the HSM admin user

      • <HSM_IP> is the IP address of the HSM

    2. ONLY if the ActivID Appliance is already registered on the HSM, open an SSH terminal on the HSM using the HSM Administrator account and delete the existing registration using the following command:

      Copy
      client delete -client <APPLIANCE_NODE_LABEL>
    3. Open an SSH terminal on the HSM using the HSM Administrator account and register the client certificate using the following commands:

      Copy
      client register -client <APPLIANCE_NODE_LABEL> -hostname <APPLIANCE_HOSTNAME>
      client assignPartition -client <APPLIANCE_NODE_LABEL> -partition <APPLIANCE_PARTITION_NAME>
      Copy

      Map a label to the IP of the ActivID Appliance

      client hostip map -c <APPLIANCE_NODE_LABEL> -i <APPLIANCE_IP>

      Where:

      • <APPLIANCE_NODE_LABEL> is the name of node for the ActivID Appliance on the HSM

      • <APPLIANCE_HOSTNAME> is the hostname of the ActivID Appliance (pre-populated in the console's code sample for convenience)

      • <APPLIANCE_PARTITION_NAME> is the name of the partition you created on the HSM for the ActivID Appliance

      • <APPLIANCE_IP> is the IP address of the ActivID Appliance (pre-populated in the console's code sample for convenience)

  1. Enter the proceed keyword to activate the Apply button and click Apply.

  2. Click Done.

Managing Clusters (Entrust HSMs Only)

This section explains how to configure multiple HSM modules in a cluster for failover.

Important: The HSMs in the cluster must:
  • Be of the same type (that is, Entrust nShield Connect HSM)

  • Use exactly the same keys, not just keys with the same name (for example, by cloning the HSM)

Note:
  • For deployments with Entrust nShield Connect XC, the cluster mode is only available using Entrust firmware version 12.50 or later. Earlier firmware versions do not support the pool mode.

  • The cluster deployment behavior differs if the ActivID Appliance keys are protected by an OCS card set:

    • With OCS-protected keys – the cluster of HSMs are set in load-sharing mode. During the cluster deployment, the ActivID Appliance applications will be restarted automatically so there will be a short interruption of services.

    • With keys not protected by an OCS card set – the cluster of HSMs are configured in Pool mode. Services will not be interrupted.

Add an HSM Module to the Cluster

Note: This option is only available when the external HSM has already been configured.
  1. Make sure that the external HSM is up and running.

  1. Log on to the ActivID Console and, under System in the left menu, select Cryptography.

  1. Under External HSM, click Add.

  1. Click Yes, continue.

  1. Enter the HSM Parameters for the module to be added and click Next.

    The ActivID Console obtains the ESN and KNETI hash values from the HSM module and displays them:

    • ESN – represents the Electronic Serial Number of the HSM unit

    • KNETI – represents the key used to authenticate the HSM unit to the clients

  1. Click Yes, continue to confirm that the ESN and KNETI hash values are valid to ensure that the correct HSM is configured.

    If the values are not correct, click No, go back and enter the correct HSM Parameters.

    The ActivID Console displays the current configuration with the HSM modules.

  1. Under Configuration in the left-hand menu, select Applications.

  2. Click Restart all Applications and then Ok so that the new HSM will be taken into account.

Remove an HSM Module from the Cluster

Important: There must always be at least one HSM module in the cluster. Therefore, you can only remove a module if there are two or more modules in the cluster. The removal will fail if this requirement is not met.
  1. Log on to the ActivID Console and, under System in the left menu, select Cryptography.

  1. Under External HSM, click Remove in the Action column for the HSM module that you want to remove from the cluster.

  1. Click Yes to confirm the removal.

  2. Under Configuration in the left-hand menu, select Applications.

  3. Click Restart all Applications and then Ok.

See also:

Integrating an Entrust® nShield™ Connect HSM

Integrating an Thales® Luna Network HSM

Troubleshooting an External HSM