Configuration Using the RRO Stored in an HSM
This section provides a brief description of the process by which you prepare the ActivID CMS credential provider for UniCERT UPI for use with an HSM A Hardware Security Module (HSM) securely stores secret key material. They are similar to large-storage, multisession smart cards. However, unlike smart cards, they are used mainly on the server side of a system..
To use the RRO stored in an HSM, perform the following steps:
-
Copy the hsmTool folder from <ActivID CMS distribution>\Tools\Verizon to the machine connecting to the HSM. The hsmTool is used for registering the RRO credential in the HSM.
-
Modify the hsmOperatorRegistraton.properties file to specify your specific HSM and certification information as shown below in the sample file:
Copy# HSM information
dll = C:\\Program Files (x86)\\nCipher\\nfast\\bin\\cknfast-64.dll
slot = 0
pin = activcard
# Certificate information
keyLength = 2048
DN = cn=RRO121,ou=Engineering,o=ActivID,c=US
keyAlias = RRO121
certificateFile = RRO121.p7c -
Run the generateKeyPair.cmd file to generate a key pair in the HSM and a .p10 certificate request.
-
Copy the .p10 file to the CA The Certificate Authority (CA) issues and manages security credentials and public keys for message encryption in a networks environment..
-
To register the RRO using the .p10 file: use a profile with the Key Storage property set to Hardware and the Generation Site property set to End Entity.
-
Copy the .p7c certificate file to the machine connecting to the HSM.
-
Run the importCertificate.cmd file to import certificate to the HSM.