Hardware Security Module
encrypt enabled
decrypt enabled
sensitive
derive
Other attribute settings are optional.
13.1.5 Replicate to required slots
If using multiple Hardware Security Modules with IDENTIKEY ApplianceIDENTIKEY Appliance, the keys created
above must be replicated to the other HSMs. This process must be performed each time a key change occurs and
consistency among HSMs is required.
The exact steps for this procedure will depend on attributes specific to your HSM setup. For instructions, refer to
the sections discussing
Trust Management
and
Token Replication
in the
ProtectToolKit C Administration Manual
.
The
ProtectToolKit C Administration Manual
is included in your HSM documentation suite, and is typically named
ptk_c_administration_manual_rev-c.pdf
.
IDENTIKEY Appliance Installation and Maintenance
104