<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Key Store Management on</title><link>https://docs.protegrity.com/10.2/docs/kmg/key_store_management/</link><description>Recent content in Key Store Management on</description><generator>Hugo</generator><language>en</language><atom:link href="https://docs.protegrity.com/10.2/docs/kmg/key_store_management/index.xml" rel="self" type="application/rss+xml"/><item><title>Support Matrix</title><link>https://docs.protegrity.com/10.2/docs/kmg/key_store_management/keystore_support_matrix/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/10.2/docs/kmg/key_store_management/keystore_support_matrix/</guid><description>&lt;h2 id="support-matrix-for-hsm">Support Matrix for HSM&lt;/h2>
&lt;p>The following table for the support matrix describes the hardware requirements, software requirements,
and the compatibility information of the Enterprise Security Administrator (ESA) and the Hardware Security Module (HSM).&lt;/p>
&lt;table>
 &lt;thead>
 &lt;tr>
 &lt;th>System or Appliance&lt;/th>
 &lt;th>Supported Version&lt;/th>
 &lt;/tr>
 &lt;/thead>
 &lt;tbody>
 &lt;tr>
 &lt;td>Enterprise System Administrator (ESA)&lt;/td>
 &lt;td>10.2.0 and later&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>Thales Luna Appliance&lt;/td>
 &lt;td>7.4.0&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>Firmware&lt;/td>
 &lt;td>7.3.3&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>Thales Luna Universal Client&lt;/td>
 &lt;td>10.3.0&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>Thales Data Protection on Demand (DPoD) Universal Client&lt;/td>
 &lt;td>10.7&lt;/td>
 &lt;/tr>
 &lt;/tbody>
&lt;/table>
&lt;h2 id="support-matrix-for-cloud-platforms">Support Matrix for Cloud Platforms&lt;/h2>
&lt;p>The following table provides compatibility information of the cloud platforms, such as Amazon Web Services (AWS), Azure, and
Google Cloud Platform (GCP) with the Protegrity ESA appliance.&lt;/p></description></item><item><title>Configuring the ESA with HSMs supporting PKCS#11 Interface</title><link>https://docs.protegrity.com/10.2/docs/kmg/key_store_management/keystore_configuring_hsm/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/10.2/docs/kmg/key_store_management/keystore_configuring_hsm/</guid><description>&lt;h2 id="verifying-the-prerequisites">Verifying the Prerequisites&lt;/h2>
&lt;p>Ensure that the following prerequisites are met:&lt;/p>
&lt;ol>
&lt;li>
&lt;p>Ensure that you have downloaded HSM Client on your local machine.&lt;/p>
&lt;/li>
&lt;li>
&lt;p>Ensure that the HSM partition is initialized.&lt;/p>
&lt;/li>
&lt;li>
&lt;p>Ensure that you have downloaded the required libraries, configuration files, and certificates required for connecting to the HSM. The certificates can include the server certificate of the HSM, the client certificate for the ESA appliance, and the CA certificate.&lt;br>
For more information required about the files required for connecting to the HSM, refer the documentation for the corresponding HSM.&lt;/p></description></item><item><title>Configuring the ESA with the Thales Luna HSM</title><link>https://docs.protegrity.com/10.2/docs/kmg/key_store_management/keystore_configuring_thales_luna_hsm/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/10.2/docs/kmg/key_store_management/keystore_configuring_thales_luna_hsm/</guid><description>&lt;h2 id="verifying-the-prerequisites">Verifying the Prerequisites&lt;/h2>
&lt;p>Ensure that the following prerequisites are met:&lt;/p>
&lt;ol>
&lt;li>
&lt;p>Ensure that the HSM partition is initialized.&lt;/p>
&lt;/li>
&lt;li>
&lt;p>Ensure that you have downloaded the required libraries, configuration files, and certificates required for connecting to the HSM. The certificates can include the server certificate of the Thales Luna HSM, the client certificate for the ESA appliance, and the CA certificate.&lt;br>
For more information required about the files required for connecting to the Thales Luna HSM, refer to the &lt;a href="https://thalesdocs.com/">Thales Luna documentation&lt;/a>.&lt;/p></description></item><item><title>Configuring the ESA with Thales Data Protection on Demand (DPoD) HSM</title><link>https://docs.protegrity.com/10.2/docs/kmg/key_store_management/keystore_configuring_thales_dpod_hsm/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/10.2/docs/kmg/key_store_management/keystore_configuring_thales_dpod_hsm/</guid><description>&lt;h2 id="verifying-the-prerequisites">Verifying the Prerequisites&lt;/h2>
&lt;p>Ensure that the following prerequisites are met:&lt;/p>
&lt;ol>
&lt;li>
&lt;p>Ensure that the HSM partition is initialized.&lt;/p>
&lt;/li>
&lt;li>
&lt;p>Ensure that you have downloaded the required libraries, configuration files, and certificates required for connecting to the HSM. The certificates can include the server certificate of the Thales DPoD HSM, the client certificate for the ESA appliance, and the CA certificate.&lt;br>
For more information required about the files required for connecting to the Thales DPoD HSM, refer to the &lt;a href="https://thalesdocs.com/dpod/">Thales DPoD documentation&lt;/a>.&lt;/p></description></item><item><title>Configuring the ESA with AWS Key Management System (KMS)</title><link>https://docs.protegrity.com/10.2/docs/kmg/key_store_management/keystore_configuring_aws/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/10.2/docs/kmg/key_store_management/keystore_configuring_aws/</guid><description>&lt;h2 id="verifying-the-prerequisites">Verifying the Prerequisites&lt;/h2>
&lt;p>Ensure that the following prerequisites are met before configuring the ESA with the AWS Key Store.&lt;/p>
&lt;h3 id="authorization">Authorization&lt;/h3>
&lt;p>The Amazon Web Services Key Management Service (AWS KMS) allows you to enable the creation of the data encryption key (DEK). Additionally, you can also encrypt and decrypt the data, and generate random bytes of data using the Key Management Gateway (KMGW) in the ESA.&lt;/p>
&lt;p>To use the AWS KMS as a key store, the following permissions are required by the AWS user or role:&lt;/p></description></item><item><title>Configuring the ESA with Google Cloud KMS</title><link>https://docs.protegrity.com/10.2/docs/kmg/key_store_management/keystore_configuring_gcp/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/10.2/docs/kmg/key_store_management/keystore_configuring_gcp/</guid><description>&lt;h2 id="verifying-the-prerequisites">Verifying the Prerequisites&lt;/h2>
&lt;p>Ensure that the following prerequisites are met before configuring the ESA with the Google Cloud KMS.&lt;/p>
&lt;h3 id="authorization">Authorization&lt;/h3>
&lt;p>The resources are organized into a hierarchy in the GCP Key Store. This hierarchy helps to manage and grant access to the resources at various levels of granularity. The scope of the role depends on the level of the resource hierarchy, where the role is granted to access the Google Cloud resources.&lt;/p></description></item><item><title>Configuring the ESA with Azure Key Vault Managed HSM</title><link>https://docs.protegrity.com/10.2/docs/kmg/key_store_management/keystore_configuring_azure/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/10.2/docs/kmg/key_store_management/keystore_configuring_azure/</guid><description>&lt;h2 id="verifying-the-prerequisites">Verifying the Prerequisites&lt;/h2>
&lt;p>Ensure that the following prerequisites are met before configuring the ESA with the Azure Key Vault Managed HSM.&lt;/p>
&lt;h3 id="configuring-the-managed-hsm">Configuring the Managed HSM&lt;/h3>
&lt;p>Protegrity supports the Managed HSM Key Vault type due to the presence of &lt;strong>Get Random Bytes&lt;/strong> functionality, which is not available in the standard Key Vault.&lt;/p>
&lt;p>Ensure that the Azure Managed HSM is already set up and activated on your system.&lt;/p>
&lt;p>For more information about setting up an Azure Managed HSM, refer to &lt;a href="https://learn.microsoft.com/en-us/azure/key-vault/managed-hsm/quick-create-cli">Quickstart: Provision and activate a Managed HSM using Azure CLI&lt;/a>.&lt;/p></description></item><item><title>Switching Key Stores</title><link>https://docs.protegrity.com/10.2/docs/kmg/key_store_management/keystore_switching/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/10.2/docs/kmg/key_store_management/keystore_switching/</guid><description>&lt;h2 id="verify-individual-vendors-requirement">Verify individual vendor&amp;rsquo;s requirement&lt;/h2>
&lt;p>When using a Key Store (HSM) provided by a specific vendor, consult the vendor to ensure that the infrastructure in place can handle any issues with the Key Store. Issues can include data loss or breakdowns. With the required measures in place, minimal impact to the business critical data and the involved processes can be ensured. Ensure that you follow the best practices specified by the
vendor for business continuity.&lt;/p></description></item><item><title>Troubleshooting</title><link>https://docs.protegrity.com/10.2/docs/kmg/key_store_management/keystore_troubleshooting/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/10.2/docs/kmg/key_store_management/keystore_troubleshooting/</guid><description>&lt;p>The following section provides information about errors that are related to HSM integration with the ESA and the steps to resolve the errors.&lt;/p>
&lt;ul>
&lt;li>
&lt;p>&lt;strong>Known Error or Problem&lt;/strong>: When you try to switch to an HSM, the switch fails.&lt;/p>
&lt;p>&lt;strong>This may happen because&lt;/strong>:&lt;/p>
&lt;p>The HSM does not support or allow the type of key that is used.&lt;/p>
&lt;p>&lt;strong>Recovery&lt;/strong>:&lt;/p>
&lt;p>Verify that the HSM supports creating secret keys with the following attributes:&lt;ul>&lt;li>CKA_PRIVATE: TRUE&lt;li>CKA_SENSITIVE: TRUE&lt;li>CKA_EXTRACTABLE: FALSE&lt;li>CKA_ENCRYPT: TRUE&lt;li>CKA_DECRYPT: TRUE&lt;li>CKA_MODIFIABLE: FALSE&lt;li>CKA_WRAP: TRUE&lt;li>CKA_UNWRAP: TRUE&lt;li>CKA_DERIVE: FALSE&lt;li>CKA_SIGN: FALSE&lt;li>CKA_VERIFY: FALSE&lt;/ul>&lt;/p></description></item><item><title>TAC Replication of Key Store-specific Files and Certificates</title><link>https://docs.protegrity.com/10.2/docs/kmg/key_store_management/keystore_tac_replication/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/10.2/docs/kmg/key_store_management/keystore_tac_replication/</guid><description>&lt;p>A Trusted Appliances cluster (TAC) is a tool, where appliances such as the ESA replicate and maintain information. A trusted channel is created to transfer data between the appliances in a cluster. This section describes the steps that must be followed for replication of the Key Store-specific files and certificates in
a TAC. In addition, it also explains the measures you must take while performing a replication without the Key Store files and certificates.&lt;/p></description></item></channel></rss>