Managing HSM Partitions

A partition is a secure, independent, protected area in the HSM where sensitive attributes can be stored (for example, cryptographic keys, certificate strings, or access passwords). Each partition has its own data, access controls, security policies, and separate administration access. The HSM implements a form of firewall between all partitions.

At a minimum, a partition connects to a client machine. In practice, each partition can connect to one or more clients. Each partition is assigned to a Partition Owner who holds an iKey (Black PED Key) that controls access to the partition.

Important: The black iKey must be plugged into the PED device whenever the Partition Owner needs to authenticate through his or her PIN.

Each partition is set with the following:

  • A client password (password generated by the PED device and used by the client application to authenticate against the partition).

  • A black PED key (USB key holding the Partition Owner PIN).

There are two partition types:

  • Physical partitions are also known as standard partitions.

  • Virtual partitions, for High Availability (HA) mode. This partition type does not physically exist in the HSM. It is a partition type that is visible from the client, but it points to a group of physical partitions present in the HSM that comprises this HA group. For details, see About High Availability Mode.

As delivered, Thales SafeNet Network HSMs / Thales TCT Luna SA HSMs can support a number of partitions (1, 2, or more). Each partition can store a high number of data objects (certificates or key-pairs), the exact number depends on the memory configuration. For details, contact your Thales / Thales TCT representative.

Note: Partitions are created using the Thales / Thales TCT client software. They are not created by ActivID KMS.