Install Futurex PKCS #11 (FXPKCS11) on the machine where you installed the application with which you are integrating.Documentation Index
Fetch the complete documentation index at: https://docs.futurex.com/llms.txt
Use this file to discover all available pages before exploring further.
Linux
Perform the following steps to install FXPKCS11 on Linux:Extract the Endpoint zip file downloaded from CryptoHub. The zip file contains the following files:
PKCS11Manager | Program to test the connection to the CryptoHub and perform basic functions through the FXPKCS11 module, such as logging in and generating random data. |
|---|---|
ca-chain.pem | CA certificate bundle |
client-cert.pem | Client TLS certificate |
client.p12 | Full Client PKI in encrypted PKCS #12 format (contains the CA chain, client certificate, and client private key) |
configTest | Program to test the configuration and connection to the CryptoHub |
fxpkcs11.cfg | Configuration file for the Futurex PKCS #11 library |
libfxpkcs11.so | The Futurex PKCS #11 library file. |
CryptoHub <number>.cer | Auto-generated self-signed CA certificate used to issue client endpoint TLS certs (number is random) |
Futurex Test Root CA (ECC).cer or Futurex Test Root SSL CA.cer | Futurex Test Root CA for embedded Futurex Test TLS certs (ECC or RSA, based on the algorithm configured for the connection pair) |
Move all the preceding files to one of the following locations:
- To make the FXPKCS11 library accessible system-wide, use sudo to move the files to the
/usr/local/lib/fxpkcs11directory. - To make the FXPKCS11 library accessible only for the current user, move the files to the
$HOME/lib/fxpkcs11directory.
You can find the PKCS11 PIN in the
<CRYPTO-OPR-PASS> parameter in the Futurex PKCS #11 configuration file (fxpkcs11.cfg).For PKCS #11 integrations that enable you to define the PKCS11 PIN inside the integrating application, we recommend removing the <CRYPTO-OPR-PASS> line from the FXPKCS11 configuration file.
