This section starts with the general KMES configurations necessary to enable the Futurex PKCS #11 module to integrate with the KMES Series 3. Then, it covers the necessary steps to configure TLS communication between the KMES and the Futurex PKCS #11 Library.Documentation Index
Fetch the complete documentation index at: https://docs.futurex.com/llms.txt
Use this file to discover all available pages before exploring further.
Configure general KMES settings
Perform the following tasks to configure the KMES Series 3 for communication with FXPKCS #11:- Create an FXPKCS #11 role and identity with the correct assigned permissions.
- Enable Host API commands.
Create a role and identity for FXPKCS #11
Perform the following steps to create a new role and identity with the required permissions for Futurex PKCS #11 (FXPKCS11) on the KMES Series 3. A later section shows you how to configure the identity name and password in the Futurex PKCS #11 configuration file.In the Info tab of the Role Editor window, specify a name for the role and set the number of logins required to
1.On the Permissions tab, select the following permissions:
| Permission | Subpermission |
|---|---|
| Cryptographic Operations | Sign, Verify, Encrypt, Decrypt, Wrap, Unwrap, Derive |
| Keys | Add, Export |
| Certificate Authority | Add, Export, Upload |
On the Info tab of the Identity Editor window, select Application for the storage location and specify a name for the identity.
Enable the Host API commands
Because the Futurex PKCS #11 library connects to the Host API port on the KMES, you must define which Host API commands to enable for execution by the FXPKCS11 library. To set the required commands for FXPKCS #11 operation, complete the following steps:Go to Administration > Configuration > Host API Options and enable the following commands:
| Command | Description or subcommand (if applicable) |
|---|---|
| ECHO | Communication Test or Retrieve Version |
| TIME | Set time |
| RAFA | Filter Issuance Policy |
| RAND | Generate a Random Number |
| RKCK | Create HSM Trusted Key |
| RKCP | Get Command Permissions |
| RKCS | Create Symmetric HSM Trusted Key Group |
| RKED | Encrypt or Decrypt Data |
| RKGP | Export Asymmetric HSM Trusted Key |
| RKGS | Generate Signature |
| RKHM | HMAC Data |
| RKLN | Lookup Objects |
| RKLO | Login User |
| RKRC | Get HSM Trusted Key |
| ATTR | Generic Attribute Operations
|
| ATKG | Add HSM trusted asymmetric key group |
| RKPK | Pop Generated Key |
Configure TLS communication
Perform the following tasks to configure TLS communication between the KMES Series 3 and the Futurex PKCS #11 module:- Create a Certificate Authority.
- Generate a CSR for the System/Host API connection pair.
- Sign the System/Host API CSR.
- Export the Root CA.
- Export the signed System/Host API TLS certificate.
- Load the exported certificates into the System/Host API connection pair.
- Issue a client certificate for the Futurex PKCS #11 module.
- Export the client certificate as a PKCS #12 file.
Create a CA
Perform the following steps to create a Certificate Authority (CA):In the Certificate Authority window, enter a name for the certificate container, leave all other fields set to the default values, and select [ OK ].
The certificate container you just created now displays in the Certificate Authorities menu.
Right-click the certificate container you just created and select Add Certificate > New Certificate.
Generate a CSR
Perform the following steps to generate a CSR for the System/Host API connection pair:Under the System/Host API connection pair, uncheck the Use Futurex certificates checkbox and select [ Edit ] next to PKI keys in the User Certificates section.
When warned that SSL will not be functional until new certificates are imported, select [ Yes ] to continue.
In the PKI Parameters window, leave all fields set to the default values and select [ OK ].
You should see that a PKI Key Pair is loaded now in the Application Public Keys window.
When prompted that the certificate signing request was successfully written to the file location that was selected, select [ OK ].
Sign the CSR
Perform the following steps to sign the System/Host API CSR:Export the certificate
Perform the following steps to export the Root CA certificate:In the file browser, go to the location where you want to save the Root CA certificate. Specify the name of the file and select [ Open ].
Export the certificate
Perform the following steps to export the signed System/Host API certificate:In the file browser, go to the location where you want to save the Root CA certificate. Specify the name of the file and select [ Open ].
Load the certificates
Perform the following steps to load the exported certificates into the System/Host API connection pair:Under the System/Host API connection pair, select [ Edit ] next to Certificates in the User Certificates section.
In the file browser, select both the root CA certificate and the signed System/Host API certificate, and select [ Open ].
Issue a client certificate
Perform the following steps to issue a client certificate for the Futurex PKCS #11 module:Export the client certificate
Perform the following steps to export the client certificate as a PKCS #12 file:To perform the following steps, you must go to Configuration > Options and enable the Allow export of certificates using passwords option.
Set a PKCS12 password, leave Export Selected Certificate with Parents selected, and select [ Next ].
Enter a name for the file, select the location where you want to save it, and select [ Open ] to start the export.

