DSM Installation and Configuration Guide
Copyright 2009 - 2020 Thales Group. All rights reserved.
101
Luna SA HSM
Add a Luna SA HSM to an HA Cluster
Configuring an HA Cluster with a Luna SA HSM
Add a Luna to the Initial Node of the HA Cluster
Add DSM Nodes to a Luna-enabled HA Cluster
Join a (missing or bad snippet) Node to an HA Cluster
Upgrading a DSM attached to a Luna
This chapter describes how to set up a Luna SA HSM (Hardware Security Module) with a DSM virtual cluster or a
V6000. (The V6100 already contains an HSM. It cannot be configured with a Luna SA HSM). The purpose of an HSM
is to protect sensitive data from being stolen by providing a highly secure operation structure. HSMs are fully
contained and complete solutions for cryptographic processing, key generation, and key storage.
An HSM manages cryptographic keys used to lock and unlock access to digitized information over their lifecycle. This
includes generation, distribution, rotation, storage, termination, and archival functions. An HSM also engages in
cryptographic processing, which produces the dual benefits of isolation and offloading cryptographic processing from
application servers.
The Luna SA has two different authentication forms:
l
Password
: DSM manages the Luna partition password internally.
l
Pin Entry Device (PED)
: The PED model offers tighter validation for keys in use within an organization. The
PED is attached to the Luna HSM server or configured to be remotely accessible. Once its remotely accessible
the user can connect it to their computer. Users are required to enter a user-controlled password to access the
Luna partition.
Luna Compatibility
The DSM is compatible with Luna HSMs with the following specifications:
Luna
Model
Luna HSM Firmware
Version
Luna Software
Version
Authentication
Model
Luna Network
HSM
Luna K7
7.0.3
7.2.0.220
Password
Luna Network
HSM
Luna K7
7.0.3
7.2.0.220
PED (Pin Entry
Device)