Configuring Network HSMs

This section provides details on how to configure Thales network HSMs for use with ActivID CMS. For network HSMs (Thales SafeNet Network HSM / Thales TCT Luna SA for Government HSM), where the Thales / Thales TCT client software is operated, you must use a vendor-provided utility to prepare the HSM for ActivID KMS (and later ActivID CMS).

Network HSM Product Versions

Refer to ActivID CMS System Environment for the list of supported Thales (formerly Gemalto) SafeNet Network / Thales TCT (formerly SafeNet AT) Luna SA HSMs.

Note:  
  • PKI key escrow/recovery requires specific Thales SafeNet / Thales TCT Luna models that support Key Export (KE), also referred to as Cloning Key Export (CKE). By default, Thales SafeNet / Thales TCT Luna HSMs do not support KE. Make sure to order a Thales SafeNet / Thales TCT Luna HSM model that supports KE/CKE.

  • Two models of these HSMs exist on the market: Trusted Path Authentication with PED (PIN Entry Device) or Password Authentication without PED.

Thales SafeNet PED PIN Entry Device

Connect to and Set Up the HSM

Note: In the rest of this section, HID Global is providing instructions for using Thales (formerly Gemalto) SafeNet Network / Thales TCT (formerly SafeNet AT) Luna SA hardware and software. These instructions were written based on materials available to HID Global when this documentation was edited. You may need to adapt these steps based on the specific version of Thales SafeNet / Thales TCT Luna hardware and software that you are using. Please refer to the Thales SafeNet / Thales Trusted Cyber Technologies Luna documentation applicable to your deployment in parallel to using this documentation.

This section assumes that the Thales / Thales TCT client software has been installed in your specific environment (for example: on a Windows, Linux®, or Solaris™ platform). To verify, check the contents on the Client Software installation package delivered with the HSM. It will have specific instructions about installing the vendor software.

Before you attempt to set up the HSM for the first time, establish a serial connection between the workstation and the HSM. A Terminal Emulation tool (for example, TeraTermPro) must be used for setting up the serial communication using the following settings:

  • Serial port baud rate: 115200 

  • N, 8, 1 (no parity, 8 data-bits, one stop-bit)

  • VT-100 terminal emulation

During the first login attempt, you will be required to set up a new password for the HSM. Remember that both username and password are case-sensitive. The following operations are the responsibility of the HSM administrator:

  • Set up,

  • Record and assign partitions, and

  • Exchange the certificates.

The set of commands listed in Procedure 1: Set Date, Time, and Timezone provides an example of the code required to perform the operation. These values change for each HSM being set up and reflect the settings in which the network HSM will operate.

Important: It is recommended that you follow the sequence of tasks in Procedure 1: Set Date, Time, and Timezone.

Managing HSM Partitions

A partition is a secure, independent, protected area in the HSM where sensitive attributes can be stored (for example, cryptographic keys, certificate strings, or access passwords). Each partition has its own data, access controls, security policies, and separate administration access. The HSM implements a form of firewall between all partitions.

At a minimum, a partition connects to a client machine. In practice, each partition can connect to one or more clients. Each partition is assigned to a Partition Owner who holds an iKey (Black PED Key) that controls access to the partition.

Important: The black iKey must be plugged into the PED device whenever the Partition Owner needs to authenticate through his or her PIN.

Each partition is set with the following:

  • A client password (password generated by the PED device and used by the client application to authenticate against the partition).

  • A black PED key (USB key holding the Partition Owner PIN).

There are two partition types:

  • Physical partitions are also known as standard partitions.

  • Virtual partitions, for High Availability (HA) mode. This partition type does not physically exist in the HSM. It is a partition type that is visible from the client, but it points to a group of physical partitions present in the HSM that comprises this HA group. For details, see About High Availability Mode.

As delivered, Thales SafeNet Network HSMs / Thales TCT Luna SA HSMs can support a number of partitions (1, 2, or more). Each partition can store a high number of data objects (certificates or key-pairs), the exact number depends on the memory configuration. For details, contact your Thales / Thales TCT representative.

Note: Partitions are created using the Thales / Thales TCT client software. They are not created by ActivID KMS.

Exchanging Certificates between the Client System and the HSM

One certificate is attached to the HSM (which is generated internally), and a second certificate is generated on the client system. These certificates are used to mutually authenticate the HSM and the client, and thus encrypt the transport of sensitive data between them using the NTL protocol. To perform the exchange of certificates between the client system and the HSM, complete the following procedures.

About High Availability Mode

The Thales SafeNet Network HSM / Thales TCT Luna SA HSM implements a High Availability (HA) mode that connects one or more HSMs together to form a virtual device. The client application accesses only the virtual partition exposed by the HA group. It does not access each HSM individually. All HSMs involved in the HA belong to that group. A virtual partition consists of a phantom partition that identifies physical partitions existing in one or more HSMs.

HA provides load balancing across all the HSMs from this virtual group. HA load balancing provides improved performance and reduces the overall response time during HSM access. In case of failure in any HSM part of the group, the HA mode automatically redirects the requests to the other remaining operational HSMs. From the client perspective, there is no interruption of services.

Using HA is an option that requires the physical presence of several HSMs during deployment. These HSMs must be of the same type: either Trusted Path Authentication or Password Authentication.

Note: Based on the Thales SafeNet Network HSM / Thales TCT Luna HSM design, HSMs configured in Key Export mode (as required for ActivID CMS key escrow and recovery) do not support backup and have limitations in High Availability mode: it is not possible to perform key escrow/recovery for private keys that are stored in the partitions that form an HA group.

Accessing Partitions from ActivID KMS/CMS

Depending upon how the HSM was configured using the Thales / Thales TCT tools, the HSM may expose one or more partitions to ActivID KMS and ActivID CMS.

Upgrading Firmware

You can check for new firmware versions as they become available on the customer website for Thales / Thales TCT, where you can download them. Downloading firmware requires that you complete the following two steps.

  1. Use the ctp utility to transfer the new firmware to the HSM.

  2. Use the update firmware command as shown in the following sample:

    Copy
    [ade_luna_sa] lunash:>hsm update firmware
Note:
  • The HSM Administrator/Security Officer must be logged in prior to performing the firmware upgrade (using the blue PED key).

  • Any partition that is activated prior to the firmware update must be reactivated following the firmware update.

The following code sample illustrates the completion of a firmware update request, which displays the process for an earlier firmware release (4.5.3) and is presented for information purposes only.

Copy
[ade_luna_sa] lunash:>hsm login
Luna PED operation required to login as HSM Administrator - use blue PED key.
'hsm login' successful.
[ade_luna_sa] lunash:>hsm update firmware 
CAUTION:  This command updates the HSM firmware. This process cannot be reversed.
          Any connected clients will have their connections closed.
          All clients should disconnect and the NTLS should be stopped before 
proceeding.   
          Type 'proceed' to continue, or type 'quit' to quit now.
proceed
Update Result: 0 (Success)
Command Result: 0 (Success)
 
[ade_luna_sa] lunash:>hsm show
             
Appliance Details:
   ==================
   Software Version:                3.3.0-5
   HSM Details: 
   ============
   HSM Label:                       ade_luna_sa
   Serial #:                        902514
   Firmware:                        4.5.3
   Hardware Model:                  Luna K3
   Authentication Method:           PED keys
   HSM Admin login status:          Not Logged In
   HSM Admin login attempts left:   3 before HSM zeroization!
   MofN activation status:          M of N not used
   Partitions created on HSM: 
   ==========================
   There are no partitions.
   FIPS 140-2 Operation:
   ==========================
   The HSM is NOT in FIPS 140-2 approved operation mode.