The Hitachi VSP requires a PKCS #12 client certificate with x509v3 extensions and a root CA certificate in X.509 format. The client certificate must be signed by a CA trusted by the CryptoHub. Follow the steps below to generate and prepare these certificates.Documentation Index
Fetch the complete documentation index at: https://docs.futurex.com/llms.txt
Use this file to discover all available pages before exploring further.
Generate a private key and CSR
On the SVP or a management workstation with OpenSSL installed, generate a 2048-bit RSA private key:
Bash
Create an OpenSSL configuration file (for example,
openssl-vsp.cnf) that includes x509v3 extensions. At minimum, the configuration should include:openssl-vsp.cnf
Sign the CSR on the CryptoHub
Export the root CA certificate (
cacert.pem) from the CryptoHub. This is the CA certificate that the VSP will use to verify the CryptoHub’s identity during the KMIP TLS handshake.If you deployed a client endpoint, the KMIP server root CA certificate (
Futurex Test Root CA (ECC).cer or Futurex Test Root SSL CA.cer) is already included in the endpoint zip. You can use either that file or the exported cacert.pem.Convert the signed certificate to PKCS #12
After completing this step, you should have:
client.p12— Client certificate in PKCS #12 format (required by the VSP)cacert.pem— CryptoHub root CA certificate in X.509 PEM format

