![SafeNet Luna SA Скачать руководство пользователя страница 13](http://html1.mh-extra.com/html/safenet/luna-sa/luna-sa_configuration-manual_798623013.webp)
CHAPTER 1 Planning Your Configuration
HSM Partition Owner has control of one or more Partitions (virtual HSMs) within the Luna HSM appliance. To
access HSM Partition Owner functions, you must first be logged in as appliance admin.
In addition to all the other appliance functions, a user who has authenticated with the HSM Partition Owner (black)
PED Key (for a Luna HSM with Trusted Path Authentication) can:
–
modify partition policies
–
activate a partition for use by Clients
–
backup and restore Partition contents
Note:
Both a Luna HSM with Password Authentication and a Luna HSM with Trusted Path
Authentication have at least two layers of access control for an HSM Partition:
- the appliance admin login
- the Partition authentication
Note: Luna HSM with PED (Trusted Path) Authentication
, splits the Partition access into
two layers. The HSM Partition Owner (a concept that exists only for a Luna HSM with PED
Authentication) first authenticates to the Partition with the appropriate black PED Key, then
activates the Partition for Clients. Thereafter, each Client must further authenticate with the
Partition Password (generated by Luna PED when the Partition is created).
Note:
For
Luna HSM with Password Authentication
, the Partition Password is the only
layer of authentication to a Partition. Therefore, any Client with that password has access to
the Partition. What prevents a Client from manipulating objects on the Partition and performing
Partition administration activities is the need to access the lunash command shell.
Note:
Therefore, in both access-control models, a Client with the Password can connect and
perform object generation and deletion, and can use objects (sign, verify, encrypt, decrypt), but
they cannot perform Partition management operations unless they can also login to Luna Shell
(lunash) as admin.
•
Client
A Client is a "working" or "production" user of one or more Luna SA HSM Partitions, that connects from a client
computer (one that has set up NTLS by exchanging certificates and registering with the Luna SA). If a Client can
provide the Partition Password, it can generate, delete, and use cryptographic objects (keys and certificates) on the
Partition, as long as the Partition is prepared to accept the connection.
In the case of Luna SA with Password Authentication (assuming the HSM Partition has been previously created
with the Password), the appliance simply needs to be powered on.
In the case of Luna SA with Trusted Path Authentication (assuming the HSM Partition has been previously created
and the Client given the Partition Password), the Partition must also be activated by the Partition Owner. That is, a
Client, even with the proper Password cannot access a Luna SA HSM Partition unless that Partition has been
placed in "activated" state by the HSM Partition Owner (using the black PED Key).
That authentication model continues unaffected, for those who prefer it. However an optional, enhanced Cryptoki model
is also available, to separate the Partition Owner or Partition User role into a read-write entity and a separate read-only
entity:
Luna SA Configuration Guide
Release 5.4.1 007-011136-007 Rev C July 2014 Copyright 2014 SafeNet, Inc. All rights reserved.
13
Содержание Luna SA
Страница 1: ...Luna SA Configuration Guide ...