This section starts with general configurations you must make on the KMES to enable Versasec vSEC:CMS to integrate with the KMES for storing the master key(s) used when performing administration key operations with the vSEC:CMS, such as registering a credential or PIN unblock operations. Then, it covers the necessary steps to configure TLS communication between the KMES and the vSEC:CMS instance.Documentation Index
Fetch the complete documentation index at: https://docs.futurex.com/llms.txt
Use this file to discover all available pages before exploring further.
Configure general KMES settings for integration with vSEC:CMS
Perform the following tasks to configure the KMES Series 3 for communication with SignTool:- Create a Verasec role and identity with the correct assigned permissions.
- Enable Host API commands.
Create a role and identity
Perform the following steps to create a new role and identity for vSEC on the KMES Series 3 with the required permissions. A later section shows you how to configure them in the Futurex PKCS #11 configuration file.On the Info tab of the Role Editor window, specify a name for the role and set the number of Logins Required to
1.On the Permissions tab, enable the following permissions:
| Permission | Subpermission |
|---|---|
| Cryptographic Operations | Sign, Verify, Encrypt, Decrypt |
| Keys | Add, Export |
Go to Identity Management > Identities, right-click anywhere in the window, and select Add > Client Application.
On the Info tab of the Identity Editor window, select Application for the storage location and specify a name for the identity.
Enable the Host API commands
Because the Futurex PKCS #11 library connects to the Host API port on the KMES, you must define which Host API commands to enable for the FXPKCS11 library. To enable the eHost API commands required for vSEC:CMS operation, complete the following steps:Go to Administration > Configuration > Host API Options and enable the following commands:
| Command | Description or subcommand (if applicable) |
|---|---|
| ATKG | Manipulate HSM trusted asymmetric key group
|
| ECHO | Communication Test/Retrieve Version |
| RAFA | Filter Issuance Policy |
| RKCP | Get Command Permissions
|
| RKCS | Create Symmetric HSM Trusted Key Group |
| RKDP | Delete Asymmetric HSM Trusted Key |
| RKED | Encrypt or Decrypt Data |
| RKLN | Lookup Objects |
| RKLO | Login User |
| RKPK | Pop Generated Key |
| RKRC | Get HSM Trusted Key |
| RKRU | RSA unwrap the symmetric key |
| TIME | Set Time |
Configure TLS communication
Perform the following tasks to configure TLS communication between the KMES Series 3 and the vSEC:CMS instance:- Create a Certificate Authority.
- Generate a CSR for the System/Host API connection pair.
- Sign the System/Host API CSR.
- Export the Root CA certificate.
- Export the signed System/Host API TLS certificate.
- Load the exported certificates into the System/Host API connection pair.
- Issue a client certificate for vSEC:CMS.
- Export the vSEC:CMS certificate as a PKCS #12 file.
Create a Certificate Authority
Perform the following steps to create a Certificate Authority (CA):In the Certificate Authority window, enter a name for the certificate container, leave all other fields as the default values, and select [ OK ].
The certificate container you created now displays in the Certificate Authorities menu.
Generate a CSR
Perform the following steps to generate a CSR for the System/Host API connection pair:Under the System/Host API connection pair, uncheck the Use Futurex certificates checkbox and select [ Edit ] next to PKI keys in the User Certificates section.
When warned that SSL will not be functional until new certificates are imported, select [ Yes ] to continue.
In the PKI Parameters window, leave the fields set to the default values and select [ OK ].
The Application Public Keys window now shows that a PKI Key Pair is Loaded.
When notified that the certificate signing request was successfully written to the file location that was selected, select [ OK ]*.
Sign the CSR
Perform the following steps to sign the System/Host API CSR:Right-click the System TLS Root CA certificate you created and select Add Certificate > From Request.
Export the Root CA certificate
Perform the following steps to export the Root CA certificate:In the file browser, go to the location where you want to save the Root CA certificate. Specify a name for the file and select [ Open ].
Export the Host API certificate
Perform the following steps to export the signed System/Host API certificate:In the file browser, go to the location where you want to save the System/Host API certificate. Specify a name for the file and select [ Open ].
Load the exported certificates
Perform the following steps to load the exported certificates into the System/Host API connection pair:Under the System/Host API connection pair, select [ Edit ] next to Certificates in the User Certificates section.
In the file browser, select both the root CA certificate and the signed System/Host API certificate, and select [ Open ].
Select [ OK ] to save the changes.
In the Network Options window, the System/Host API connection pair shows Signed loaded next to Certificates in the User Certificates section.
Issue a client certificate
Perform the following steps to issue a client certificate for vSEC:CMS. A later section shows how to configure it in the Futurex PKCS #11 configuration file.Export the vSEC:CMS certificate
To perform the following steps, you must go to Administration > Configuration > Options and enable the Allow export of certificates using passwords option.

