![SafeNet Luna SA Скачать руководство пользователя страница 46](http://html1.mh-extra.com/html/safenet/luna-sa/luna-sa_configuration-manual_798623046.webp)
CHAPTER 3 HSM Initialization
Initializing a PED-Authenticated HSM
In this section, you initialize the HSM portion of the Luna appliance, and set any policies that you require. In normal
operation, you would perform these actions just once, when first commissioning your Luna appliance.
Note:
Perform initialization only after you have set the system-level parameters (time, date,
timezone, use of NTP (Network Time Protocol), etc.) , and configured network and IP settings
to work with your network.
...but there's an exception ...
The statement above applies reliably to a new Luna SA appliance, or one that has been factory
reset. One of the options when initializing an HSM is to forbid changing of time/timezone
without HSM login
(hsm init -label myluna -authtimeconfig)
. If you make that
choice, then it remains in force until you change it. Therefore, if you are following these steps
for a Luna SA appliance that is not fresh from the factory, or freshly factoryReset, then you
might need to take these instructions slightly out of order and perform time-related setting
changes after you initialize, rather than before.
Initialization prepares the HSM for use by setting up the necessary identities, ownership and authentication that are to
be associated with the HSM. You must initialize an HSM one time before you can generate or store objects, allow
clients to connect, or perform cryptographic operations.
If you have not used Luna HSMs and PED Keys before, please read the sub-section "
Managing PED Keys
" in the
Administration Guide
, before you start initializing.
Once you have initialized an HSM, you would return to this section only to clear an entire HSM and all its contents and
HSM Partitions, by re-initializing.
If you received your Luna HSM in Secure Transport Mode, then a preliminary step is required before you can initialize;
see
"Recover the SRK" on page 46
.
Otherwise, go directly to
"Initializing a PED-Authenticated HSM" on page 48
.
Recover the SRK
Note:
This step is required only if your HSM was shipped in Secure Transport Mode. If not,
then proceed to Initializing the HSM. You can read this page later if you choose to enable SRK
and/or to invoke Secure Transport Mode at some future time.
PED-authenticated Luna HSMs can be shipped from the factory in Secure Transport Mode (your option, at the time you
place your order). In this mode, and similar to the state following an HSM tamper event, the Master Tamper Key (MTK)
is invalidated.
Here is a brief summary of how MTK and STM (secure transport) are related.
By default, two pieces of data are stored separately on the HSM, that can be brought together by the HSM to recreate
the Master Tamper Key, which encrypts all HSM content.
If the HSM has both recovery pieces of the Master Tamper Key on-board, then:
1.
It recovers the MTK automatically following any tamper event, when the HSM is restarted. The HSM can carry on
immediately.
Luna SA Configuration Guide
Release 5.4.1 007-011136-007 Rev C July 2014 Copyright 2014 SafeNet, Inc. All rights reserved.
46
Содержание Luna SA
Страница 1: ...Luna SA Configuration Guide ...