6
Implementation steps
The installation and configuration of the PSE2 is part of the setup of the overall
network operating mode.
The following is a summary (with references to the location of detail) of the steps to
setup a cryptographic service provider, using the network operating mode and a PSE2:
1. Install the PSE2
See "Installation" on page 7
2. Test the PSE2
To confirm the correct operation of the unit, test the PSe. See "Testing and
configuration" on page 9 for details.
3. Configure the PSE2 network settings
See "Testing and configuration" on page 9 for details.
4. Install and configure the Network HSM Access Provider software
Network HSM Access Provider software must be installed on the network client
and configured to support operation in network mode. Full details are in the
Hardware Security Module Access Provider Install & Configuration Guide
supplied with the software.
5. Install the high level cryptographic API
Install the high level cryptographic API to be used on the network client. Please
refer to the relevant installation guide supplied with the product for further
details.
6. Configure the high-level cryptographic API
Generally, further operating mode related configuration of the cryptographic API
might be needed to finalize installation. Tasks might include:
establishing a trusted channel (secure messaging system (SMS)) between the
API and the Protect Server External 2.
establishing network communication between the network client and the
Protect Server External 2.
For further information refer to the high-level cryptographic API documentation, such
as the
ProtectToolkit C Administration Guide.
Summary of Contents for ProtectServer External 2
Page 1: ...i ProtectServer External 2 PSE2 Installation Guide...
Page 5: ......
Page 6: ......
Page 22: ...END OF DOCUMENT...