Chapter 3. Installation and Configuration
5. Select the CA which will issue, renew, and revoke certificates for token operations requested
through the TPS subsystem.
6. Supply information about the TKS which will manage the TPS keys. Select the TKS from the drop-
down menu of TKS subsystems within the security domain.
52