Red Hat CERTIFICATE SYSTEM 8 Install Manual page 66

Hide thumbs Also See for CERTIFICATE SYSTEM 8:
Table of Contents

Advertisement

Chapter 3. Installation and Configuration
IMPORTANT
Any hardware tokens used with the instance must be configured before configuring
the subsystem instance. If the HSM is not properly configured, it may not be listed in
the key stores panel or the instance may not function properly. HSM configuration is
described in
To determine whether a token is detected by the Certificate System, use the TokenInfo tool, as
Section 2.5.4, "Detecting
described in
The Certificate System automatically discovers Safenet's LunaSA and nCipher's netHSM
hardware security modules. The discovery process assumes that the client software installations
for these modules are local to the Certificate System subsystem and are in the following locations:
• LunaSA: /usr/lunasa/lib/libCryptoki2.so
• nCipher: /opt/nfast/toolkits/pkcs11/libcknfast.so
11. Set the key size.
56
Section 2.5.2, "Using Hardware Security Modules with
Tokens".
Subsystems".

Advertisement

Table of Contents
loading

This manual is also suitable for:

System 8 - install guide 25-03-2010

Table of Contents