Skip to main content

Documentation Index

Fetch the complete documentation index at: https://docs.futurex.com/llms.txt

Use this file to discover all available pages before exploring further.

After deploying the Nutanix AOS service in CryptoHub, set up a client endpoint. An endpoint is a device authorized to access the service. Use the Endpoints menu to view and manage these devices.
1
Navigate to the Endpoints menu for the service you deployed.
2
In the Manage Endpoints menu, select [ Add New ].
3
In the Add Endpoint dialog:
  • Enter a Name for the endpoint (optional).
  • Leave set the CryptoHub Hostname that is auto-populated.
4
Select [ Add Endpoint ]. The browser prompts you to download a zip file which contains the following files:
FileDescription
ca-chain.pemCA certificate bundle
client-cert.pemClient TLS certificate
credential.txtContains the name of the identity CryptoHub created for Nutanix to use when connecting and authenticating via KMIP
info.txtIncludes the service name and address for connecting to the CryptoHub
pki.p12Full Client PKI in encrypted PKCS #12 format (contains the CA chain, client certificate, and client private key)
pki-password.txtContains the password for the PKCS #12 file
CryptoHub <number>.cerAuto-generated self-signed CA certificate used to issue client endpoint TLS certs (number is random)
Futurex Test Root CA (ECC).cer or Futurex Test Root SSL CA.cerFuturex Test Root CA for embedded Futurex Test TLS certs (ECC or RSA, based on the algorithm configured for the KMIP connection pair)
<number>-Prod-App-Alt.cerKMIP server TLS certificate (number is random)
The Futurex Test Root CA (ECC).cer or Futurex Test Root SSL CA.cer file from this zip is the KMIP server root CA certificate. You will need this file when configuring the Certificate Authority in Prism Element.