5
Chapter 3
Implementation overview
Implementation architecture
To implement a hardware based cryptographic service provider, essentially three
elements are required.
1.
One or more hardware security modules (HSMs) for key processing and storage.
2.
High level cryptographic API software. This software uses HSM services when
providing “cryptographic service provider” functionality to applications.
3.
Access provider software to implement the connection between the cryptographic
API software and the HSMs.
Where key processing and storage is to be implemented using a standalone SafeNet
Protect Server External 2 (PSE2) HSM, the cryptographic service provider will
operate in network mode.
In network mode, Network HSM Access Provider software is installed on the same
machine used to host the cryptographic API software. It is used to implement the
connection between and the PSE2 and the cryptographic host using a TCP/IP network
connection. The PSE2 can then be located at any distance from the machine hosting
the access provider, cryptographic API and application software.
A network mode implementation of a cryptographic service provider using the PSE2
is shown in the next figure.
PC
– Network Client and Application Host
Crypto
API
Application
Network
Network HSM
Access
Provider
ProtectServer External 2
Summary of Contents for ProtectServer External 2
Page 1: ...i ProtectServer External 2 PSE2 Installation Guide...
Page 5: ......
Page 6: ......
Page 22: ...END OF DOCUMENT...