Documentation Index
Fetch the complete documentation index at: https://docs.futurex.com/llms.txt
Use this file to discover all available pages before exploring further.
Download the FxPKCS11 package from your CryptoHub deployment (the ZIP file from the previous step).
Install FxPKCS11 on the Access Server host
Perform the following steps to install and configure FxPKCS11 on your Access Server Linux host.Step 1: Extract the CryptoHub package and create the FxPKCS11 directory
Extract the ZIP file. The ZIP contains:
PKCS11Manager: Program to test the connection to the CryptoHub and perform basic functions through the FxPKCS11 module (login, RNG, etc.)configTest: Program to test configuration and connection to the CryptoHub.libfxpkcs11.so: FxPKCS11 module.fxpkcs11.cfg: Preconfigured FxPKCS11 configuration file for connecting/authenticating to CryptoHub.client-cert.pem: Client TLS certificate.client.p12: Full Client PKI in encrypted PKCS #12 format (CA chain + client cert + client private key).ca-chain.pem: CA certificate bundle (Futurex Test CAs + auto-generated service CA).CryptoHub 1234567890.cer: Auto-generated self-signed CA certificate used to issue client endpoint TLS certs (number is random).Futurex Test Root CA (ECC).cerorFuturex Test Root SSL CA.cer: Futurex Test Root CA for embedded Futurex Test TLS certs (ECC or RSA, based on the algorithm configured for the connection pair).
Step 2: Move the extracted files
Optional: Use a custom configuration location
If you prefer to store the configuration file elsewhere, define the environment variable. Ensure the TLS files listed above are also placed in the same directory as the config file:Shell
fxpkcs11.cfg
By default, the FxPKCS11 module expects certificate files to be in the same directory as the fxpkcs11.cfg file (whether at the default /etc/ location or your custom location via FXPKCS11_CFG). You can customize the paths to your certificate files directly in the fxpkcs11.cfg file by modifying the following settings:
PROD-TLS-KEY: Path to theclient.p12PKCS#12 filePROD-TLS-CA: Path to theCryptoHub 1234567890.cerfilePROD-TLS-CA: Path to theFuturex Test Root CA (ECC).cerorFuturex Test Root SSL CA.cerfile (depending on your CryptoHub connection type)
Step 3: Enable automatic PIN loading (required)
Automatic PIN loading lets the PKCS#11 library authenticate without manual PIN entry.Extract the PIN value from
fxpkcs11.cfg (between <CRYPTO-OPR-PASS> and </CRYPTO-OPR-PASS>) and write it to a file:Shell
Step 4: Configure secrets (PKCS #12 password)
Extract the password from
fxpkcs11.cfg (between <PROD-TLS-KEY-PASS> and </PROD-TLS-KEY-PASS>) and write it to a file:Shell
Confirm the file contains
export PKCS11_P12=password where password is the password value between <PROD-TLS-KEY-PASS> and </PROD-TLS-KEY-PASS>:Shell
- This takes effect for new login shells. To apply it, either:
- Sign out and back in
- Start a new shell session
- Do this prior to validating or running applications that rely on
PKCS11_P12.
Step 5: Validate with configTest (recommended)
Step 6: Troubleshoot validation issues
IfconfigTest fails:
Check the FxPKCS11 log file:
- Default location: same directory as
fxpkcs11.cfg. - To customize, modify the
LOG-FILEsetting infxpkcs11.cfg.
- The PKCS #11 PIN is correct.
fxpkcs11.cfgresides at/etc/fxpkcs11.cfg(or confirmFXPKCS11_CFGpoints to the correct location).- All TLS files sit in the same directory as
fxpkcs11.cfg, or in the location defined infxpkcs11.cfgif you customized the paths:client.p12CryptoHub 1234567890.cerFuturex Test Root CA (ECC).cer(for ECC connections) orFuturex Test Root SSL CA.cer(for RSA connections)
PKCS11_P12has the correct value.

