Documentation Index
Fetch the complete documentation index at: https://docs.futurex.com/llms.txt
Use this file to discover all available pages before exploring further.
For this step, you must log in with an identity that has a role with the following permissions: Keys:All Slots, Management Commands:Certificates, Management Commands:Keys, Security:TLS Sign, and TLS Settings:Upload Key. You can use the default Administrator role and Admin identities.
- Enable server-side authentication.
- Create connection certificates for mutual authentication.
Enable server-side authentication
We recommend mutually authenticating to the HSM using client certificates, but the Vectera Plus also supports server-side authentication. The following steps outline the process for enabling server-side authentication. Choose one of the following methods to enable server-side authentication:Excrypt Manager
To use Excrypt Manager to enable server-side authentication, go to the SSL/TLS Setup menu. Then, select the Excrypt Port in the Connection Pair drop-down list, check the Allow Anonymous box, and select [ Save ].FXCLI
To use FXCLI to enable server-side authentication, run the tls-ports set FXCLI command to enable server-side authentication with the Allow Anonymous SSL/TLS setting:FXCLI
Create connection certificates for mutual authentication
As mentioned previously, we recommend mutually authenticating to the HSM by using client certificates, and the system enforces mutual authentication by default. The following example shows how to use FXCLI to generate a CA to sign the HSM server certificate and a client certificate. Then, it shows how to generate the client keys and CSR by using OpenSSL.- For this example, you must connect the computer that is running FXCLI to the front USB port of the HSM.
- If you do not specify a file path for commands that create an output file, FXCLI saves the file to the current working directory.
- Using user-generated certificates requires you to load a PMK on the HSM.
- If you run help by itself, a full list of available commands displays. You can see all options for a command by running the command name followed by help.
Connect your laptop to the HSM by using the USB port on the front, and run the following command.
FXCLI
Run the following command to log in with both default Admin identities. When prompted for the username and password, enter them. You must run this command twice.
FXCLI
To generate client keys and CSR, run the following OpenSSL commands from Windows PowerShell rather than from the FXCLI program:
Powershell
Powershell
For this step, you need to log in with an identity that has a role with the following permissions:
- Keys:All Slots
- Management Commands:Certificates
- Management Commands:Keys
- Security:TLS Sign
- TLS Settings:Upload Key
- Enable server-side authentication.
- Create connection certificates for mutual authentication.
Enable server-side authentication
We recommend mutually authenticating to the HSM using client certificates, but the Vectera Plus also supports server-side authentication. The following steps outline the process for enabling server-side authentication. Choose one of the following methods to enable server-side authentication:Excrypt Manager
To enable server-side authentication in Excrypt Manager, go to the SSL/TLS Setup menu. Then, select the Excrypt Port in the Connection Pair drop-down list, check the Allow Anonymous box, and select [ Save ].FXCLI
To enable server-side authentication in FXCLI, run the tls-ports set FXCLI command to enable server-side authentication with the Allow Anonymous SSL/TLS setting:FXCLI
Create connection certificates, client keypair, and a CSR
As mentioned previously, we recommend mutually authenticating to the HSM by using client certificates, and the system enforces mutual authentication by default. The following example shows how to use FXCLI to generate a CA to sign the HSM server certificate and a Futurex CNG (FXCNG) client certificate. Then, it shows how to generate the client key pair and CSR by using the Windows certreq utility.- For this example, you must connect the computer running FXCLI to the front USB port of the HSM.
- If you do not specify a file path for commands that create an output file, FXCLI saves the file to the current working directory.
- Using user-generated certificates requires you to load a PMK on the HSM.
- If you run help by itself, a full list of available commands displays. You can see the options for a command by running the command name followed by help.
- Create a certreq policy file.
- Generate a CSR from the certreq policy INF file.
- Generate a key pair and CSR for the Excrypt Port on the HSM.
- Sign the CSRs for the Excrypt Port and Futurex CNG.
Create a certreq policy file
Perform the following steps to create a certreq policy file:Generate a CSR
Perform the following steps to generate a CSR from the certreq policy INF file:Generate a key pair and CSR
Perform the following steps to generate a key pair and CSR for the Excrypt Port on the HSM:Connect your laptop to the HSM through the USB port on the front, and run the following command:
FXCLI
Use the following command to log in with the default Admin1 and Admin2 identities. When prompted, enter the username and password. Run the command twice, once for each identity.
FXCLI
Generate a keypair and certificate
Perform the following steps to generate a TLS CA keypair and certificate with FXCLI:Connect your laptop to the HSM through the USB port on the front, and run the following command:
FXCLI
Log in with the default Admin1 and Admin2 identities. When prompted, enter the username and password. Run this command twice, once for each identity.
FXCLI
Sign the CSRs
Perform the following steps to sign the CSRs for the Excrypt Port and Futurex CNG:Connect your laptop to the HSM through the USB port on the front, and run the following command:
FXCLI
Log in with the default Admin1 and Admin2 identities. When prompted, enter the username and password. Run the following command twice, once for each identity:
FXCLI

