This section shows you how to configure TLS communication between the KMES Series 3 and the Futurex PKCS #11 (FXPKCS11) module installed on the computer that runs CyberArk TPF. Then, it covers general configurations on the KMES Series 3 to enable CyberArk TPF to use the KMES as a Root of Trust for storage encryption and to protect private keys through the Futurex PKCS #11 (FXPKCS11) module.Documentation Index
Fetch the complete documentation index at: https://docs.futurex.com/llms.txt
Use this file to discover all available pages before exploring further.
Configure TLS communication
Perform the following tasks to configure TLS communication between the KMES Series 3 and the CyberArk TPF instance:- Create a certificate authority (CA).
- Generate a CSR for the System/Host API connection pair.
- Sign the System/Host API CSR.
- Export the Root CA and signed System/Host API certificates.
- Load the exported certificates into the System/Host API connection pair.
- Issue a client certificate for CyberArk TPF.
- Export the signed CyberArk TPF certificate.
Create a CA
Perform the following steps to create a CA:In the Certificate Authority window, enter a name for the certificate container, leave all other fields set to the default values, and select [ OK ].
Right-click the certificate container you just created and select Add Certificate > New Certificate.
On the Subject DN tab, select the Classic preset and set a Common Name for the certificate, such as
System TLS CA Root.Generate a CSR
Perform the following steps to generate a CSR for the System/Host API connection pair:Under the System/Host API connection pair, uncheck the Use Futurex Certificates checkbox and select [ Edit ] next to PKI Keys in the User Certificates section.
When warned that SSL will not be functional until new certificates are imported, select [ Yes ] to continue.
In the PKI Parameters window, leave the fields set to the default values and select [ OK ].
The Application Public Keys window now shows that a PKI Key Pair is Loaded.
When notified that the certificate signing request was successfully written to the location you specified, select [ OK ].
Select [ OK ] again to save the Application Public Keys settings.
In the main Network Options window, the System/Host API connection pair now shows Loaded next to PKI keys.
Sign the CSR
Perform the following steps to sign the System/Host API CSR:Export the certificate
Perform the following steps to export the Root CA certificate:In the file browser, go to the location where you want to save the root CA certificate. Specify a name for the file and select [ Open ].
Export the TLS certificate
Perform the following steps to export the signed System/Host API TLS certificate:In the file browser, navigate to the location where you want to save the signed System/Host API TLS certificate. Specify a name for the file and select [ Open ].
Load the TLS certificate
Perform the following steps to load the exported TLS certificate into the System/Host API connection pair:Under the System/Host API connection pair, select [ Edit ] next to Certificates in the User Certificates section.
In a file browser, select both the root CA certificate and the signed System/Host API certificate, and select [ Open ].
The certificate chain appears in the Verified section.
Issue a client certificate
Perform the following steps to issue a client certificate for CyberArk TPF:On the V3 Extensions tab, select the TLS Client Certificate profile and select [ OK ]*.
The Venafi certificate now displays under the System TLS CA Root certificate.A later section of the guide shows you how to modify the Futurex PKCS #11 configuration file to use the client certificate you create for CyberArk TPF in this section.
Export the certificate
Perform the following steps to export the Venafi client certificate as a PKCS #12 file:To export the Venafi client certificate as a PKCS #12 file, you must go to Administration > Configuration > Options and enable the Allow export of certificates using passwords setting before continuing.
In the file browser, select a location for the PKCS #12 file and select [ Open ].
A message box notifies you that the PKCS #12 export was successful.
Configure general KMES Series 3 settings for KMES to the CyberArk TPF instance
Perform the following tasks to configure the KMES Series 3 for communication with the CyberArk TPF instance:- Create a new role and identity with the required permissions.
- Create a new instance with the Venafi role.
- Enable Host API commands.
Create a new role
Perform the following steps to create a new role with the permissions Venafi requires:On the Info tab of the Role Editor window, set the Type to Application, the Name to
Venafi, select the Hardened checkbox, and set the Logins Required to 1.On the Permissions tab, enable the following permissions:
| Permission | Subpermission |
|---|---|
| Certificate Authority | Add, Export |
| Cryptographic Operations | Encrypt, Decrypt, Wrap, Unwrap |
| Keys | Add, Export |
| Secure Key Functions | Import PKI, No Usage Wrap, Remove Security, Strength Bypass |
Create a new identity
Perform the following steps to create a new identity and assign it the Venafi role:On the Info tab of the Identity Editor window, set the Storage type to HSM and specify a Name for the identity.
In the Configure Credential window, the Hardened Password mechanism populates by default. Select [ Change ], configure a password, and select [ Save ]. Select [ OK ] to finish configuring the new credential.
Enable the Host API commands required for CyberArk TPF operation
Because the Futurex PKCS #11 library connects to the Host API port on the KMES, you must define which Host API commands to enable for Futurex PKCS #11. To enable the Host API commands required for CyberArk TPF operation, complete the following steps:Enable the following commands:
| Command | Description and subcommand (if applicable) |
|---|---|
| ATKG | Manipulate HSM trusted asymmetric key group
|
| ATTR | Generic Attribute Operations
|
| ECHO | Echo text |
| RAFA | Filter Issuance Policy |
| RAND | Generate Random Number |
| RKCK | Create HSM Trusted Key |
| RKCP | Get Command Permissions
|
| RKCS | Create Symmetric HSM Trusted Key Group |
| RKDK | Delete HSM Trusted Key |
| RKDP | Delete Asymmetric HSM Trusted Key |
| RKED | Encrypt or Decrypt Data |
| RKEP | PKI Encrypt Public Key |
| RKGP | Export Asymmetric HSM Trusted Key |
| RKLN | Lookup Objects |
| RKLO | Login User |
| RKPK | Pop Generated Key |
| RKRC | Get HSM Trusted Key |
| RKRW | Get HSM Trusted Key |
| TIME | Set Time |

