![Thales ProtectToolkit 5.9.1 Installation And Configuration Manual Download Page 19](http://html1.mh-extra.com/html/thales/protecttoolkit-5-9-1/protecttoolkit-5-9-1_installation-and-configuration-manual_1099198019.webp)
CHAPTER 2:
ProtectServer External 2
Installation and Configuration
These steps summarize the overall procedure of setting up a cryptographic service provider using a
ProtectServer External 2 in network mode. Relevant links to more detailed documentation are provided at each
step.
1.
Install the ProtectServer External 2 (See
"Installing the ProtectServer External 2 Hardware" on page 25
).
2.
Check that the ProtectServer External 2 is operating correctly (see
"First Login and System Test" on
).
3.
Configure the ProtectServer External 2 network settings (see
"Network Configuration" on page 31
).
4.
Install and configure the ProtectServer HSM Access Provider software and ProtectToolkit software on your
operating system. See the following sections:
•
"Installing ProtectToolkit on Windows" on page 63
•
"Installing ProtectToolkit on Unix/Linux" on page 68
•
"Installing ProtectToolkit on Linux Manually" on page 73
5.
Configure the high-level cryptographic API to allow preferred operating modes. Some of these tasks may
include:
•
establishing a trusted channel or secure messaging system (SMS) between the API and the
ProtectServer External 2.
•
establishing communication between the network client and the ProtectServer External 2.
Please refer to the relevant high-level cryptographic API documentation:
•
ProtectToolkit-C Administration Guide
•
ProtectToolkit-J Reference Guide
•
ProtectToolkit-M User Guide
Thales ProtectServer HSM 5.9.1 ProtectServer HSM and ProtectToolkit Installation and Configuration Guide
2021-11-02 08:51:40-04:00 Copyright 2009-2021 Thales Group
19