This section covers the following integration configuration tasks:Documentation Index
Fetch the complete documentation index at: https://docs.futurex.com/llms.txt
Use this file to discover all available pages before exploring further.
- Create an HSM connector and generate a key
- Enable CyberArk Advanced Key Protect
- Generate an HSM private key
- Configure code signing
Create a connector and generate a key
Perform the following steps to create an HSM connector and generate an HSM-Protected encryption key:For Cryptoki Dll Path, select [ Browse… ] and select the Futurex PKCS #11 DLL file at the following path:
Text
Select the slot number configured in the FXPKCS11 configuration file (the default is slot 0). This is where CyberArk Trust Protection Foundation accesses the encryption keys.
For User Type, leave the default option selected, Crypto Officer (User). CyberArk TPF uses the identity configured inside the FXPKCS11 configuration file when connecting to the CryptoHub.
For Pin, enter the CryptoHub identity password configured inside the
<CRYPTO-OPR-PASS> tag in the fxpkcs11.cfg file.Select [ Verify ].
If the connection to the CryptoHub is successful, a new Permitted Keys section populates in the window.
In the Create New HSM Key window, enter a Name and select the Type for the key, and select [ Create ].
If key creation is successful, the key is now viewable inside the CyberArk Trust Protection Foundation service on the CryptoHub. The name of the key is shown in the list of Permitted Keys in the Create New HSM Key window.
If you plan to use CyberArk CodeSign Protect to store private code signing keys on the CryptoHub, select the Allow Key Storage checkbox here.
Enable CyberArk Advanced Key Protect
HSM Private Key Generation and CyberArk Code Signing Certificate Private Key Storage require you to enable CyberArk Advanced Key Protect. Perform the following steps to do this:Perform the following steps to restart the IIS, Venafi Platform, and Logging services:
- Select the Product node.
- Select Website and then select [ Restart ] in the Actions panel.
- Select Venafi Platform and then select [ Restart ] in the Actions panel.
- Select Logging and then select [ Restart ] in the Actions panel.
Generate HSM Private Key
CyberArk Trust Protection Foundation uses the CryptoHub for private key generation for SSH keys and certificates.CyberArk Trust Protection Foundation uses Certificate Authority (CA) template objects to manage the certificate life cycle. Creating one is a prerequisite to HSM Key Generation. See Venafi documentation for more information.
Configure the Venafi platform policy
Perform the following steps to configure the Venafi platform policy to enable the CryptoHub for HSM key generation:Under Other Information, perform the following steps:
- Select the name of the HSM Connector you created for the CryptoHub in the Key Generation drop-down menu.
- Select the name of the HSM-Protected Encryption Key you created on the CryptoHub.
Generate the certificate
Perform the following steps to generate the certificate:On the left-side menu, select [ Add ] under the Policy drop-down menu and select Certificates > Certificate.
Under General Information, enter the required information, and for Management Type, select Provisioning or Enrollment.
Under CSR Handling, leave Service Generated CSR selected for CSR Generation, and leave Generate Key/CSR on Application set to
No.Configure code signing
CyberArk CodeSign Protect can store private code signing keys in the CryptoHub. This section describes the basic steps to configure this functionality for the integration. See Venafi documentation for more details.Certificate Authority (CA) template objects are used in CyberArk Trust Protection Foundation to manage the certificate lifecycle. Creating one is a prerequisite to CodeSign. See Venafi documentation for more information.
To use an HSM for key storage, you must enable Key Storage on the HSM Connector.
Assign permissions
Perform the following steps to assign permissions to a Code Signing administrator:Create a Code Signing flow
Perform the following steps to create a Code Signing flow:Create an environment template
Perform the following steps to create an environment template for the Code Signing Project:In the Settings tab of the Properties window, enter a Description and select a Certificate Container and Signing Flow.
Create a Code Signing Project
Perform the following steps to create a new Code Signing Project:Create an environment
Perform the following steps to create an environment for the project with a new HSM private key and certificate:Inside the newly created Code Signing Project, go to the Environments tab and select Add Environment > Certificate & Key.
For Creation Type, select Create New.
The Key Storage Location should now list the Futurex HSM Connector.

