This section shows you how to configure TLS communication between the KMES Series 3 and the Microsoft SQL Server instance. Then, it covers general configurations on the KMES to enable Microsoft SQL Server to integrate with the KMES through the FXCL EKM library, for Transparent Data Encryption. Every step in this section requires you to log in to the KMES Series 3 application interface with the default Admin identities.Documentation Index
Fetch the complete documentation index at: https://docs.futurex.com/llms.txt
Use this file to discover all available pages before exploring further.
Configure TLS communication
Perform the following tasks to configure TLS communication between the KMES Series 3 and the Microsoft SQL Server instance:- Create a certificate authority.
- Generate a CSR for the System/Host API connection pair.
- Sign the System/Host API CSR.
- Export the Root CA and signed System/Host API certificates.
- Load the exported certificates into the System/Host API connection pair.
- Issue a client certificate for Microsoft SQL Server.
- Export the signed Microsoft SQL Server certificate.
Create a CA
Perform the following steps to create a Certificate Authority (CA):In the Certificate Authority window, enter a name for the certificate container, leave all other fields set to the default values, and select [ OK ]*.
The certificate container that you just created now displays in the Certificate Authorities menu.
On the Subject DN tab, change the Preset drop-down option to Classic and specify a Common Name for the certificate, such as
System TLS CA Root.Generate a CSR
Perform the following steps to generate a CSR for the System/Host API connection pair:Under the System/Host API connection pair, uncheck the Use Futurex certificates checkbox and select [ Edit ] next to PKI keys in the User Certificates section.
When warned that SSL will not be functional until new certificates are imported, select [ Yes ] to continue.
In the PKI Parameters window, leave the fields set to the default values and select [ OK ]*.
The Application Public Keys window now shows that an HSM-trusted asymmetric key is loaded.
When prompted that the certificate signing request was successfully written to the file location that was selected, select [ OK ].
Select [ OK ] again to save the Application Public Keys settings.
The main Network Options window now shows Loaded next to PKI keys for the System/Host API connection pair.
Sign the CSR
Perform the following steps to sign the System/Host API CSR:Export the Root CA and signed System/Host API certificates
Perform the following steps to export the Root CA and signed System/Host API certificates:In the file browser, go to the location where you want to save the root CA certificate. Specify a unique name for the file, such as
root_cert.pem, and select [ Open ].Select [ OK ].
A message box states that the PEM file was successfully written to the location that you specified.
Move the root CA certificate to the computer where the Microsoft SQL Server instance is running.A later section shows you how to configure and use it for TLS communication with the KMES Series 3.
In the file browser, go to the location where you want to save the signed System/Host API certificate. Specify a unique name for the file, such as
signed_kmes_cert.pem, and select [ Open ].Load the System/Host API connection pair certificates
Perform the following steps to load the exported certificates into the System/Host API connection pair:In the file browser, select both the root CA certificate and the signed System/Host API certificate and select [ Open ]. Select [ OK ] to save the changes.
In the Network Options window, the System/Host API connection pair shows Signed loaded next to Certificates in the User Certificates section.
Issue a client certificate
Perform the following steps to issue a client certificate for Microsoft SQL Server:Export the signed client certificate
To perform the following steps, you must go to Administration > Configuration > Options and enable the Allow export of certificates using passwords option.
Set a password for the PKCS12 file, select the Export Selected Certificate option, and select [ Next ].
Configure general KMES settings
Perform the following tasks to configure the KMES Series 3 for communication with Microsoft SQL Server:- Create a Microsoft SQL Server role and identity with the required permissions and settings.
- Enable Host API commands.
- Grant the Microsoft SQL Server role the “Use” permission on the CA tree.
Create a role and identity
The following sections show you how to create a new role and identity for Microsoft SQL Server on the KMES Series 3:Create a new role
Perform the following steps to create a new role:On the Info tab of the Role Editor window, specify a Name for the role and change the number of logins required to
1. Leave all other fields set to the default values.On the Permissions tab, select the following permissions:
| Permission | Subpermission |
|---|---|
| Certificate Authority | Add, Export |
| Cryptographic Operations | Encrypt, Decrypt |
| Keys | Add, Delete |
On the Advanced tab, set Allowed Ports to only Host API. Leave the other fields set to the default values.
Create a new identity
Perform the following steps to create a new identity:Go to Identity Management > Identities, right-click anywhere in the window, and select Add > Client Application.
On the Info tab, specify
SqlServer in the Name field. Leave all other fields set to the default values.The name you choose for this identity must match the Common Name that you set for the Microsoft SQL Server client certificate.
In the Configure Credential window, select Password in the Type drop-down list. Select [ Change ], set a password for the credential, and select [ Save ].
Enable the Host API commands
Because FXCL EKM connects to the Host API port on the KMES Series 3, you must define which Host API commands to enable for execution by FXCL EKM. To set the enabled commands required for the Microsoft SQL Server operation, complete the following steps:Go to Administration > Configuration > Host API Options and enable the following commands:
| Command | Description or subcommand (if applicable) |
|---|---|
| RKGP | Export Asymmetric Key |
| RKLN | Lookup Objects |
| RKDP | Delete Asymmetric Key |
| RKLO | Login User |
| RKCK | Create Asymmetric Key |
| RKRE | RSA Encrypt |
| RKRD | RSA Decrypt |
| RKPK | Pop Generated Key |
| CLKY | Retrieve HSM protected key
|
Grant the permission
Perform the following steps to grant the Microsoft SQL Server role the Use permission on the CA tree:Right-click the CA container you created in the Create a Certificate Authority (CA) section and select [ Permission ].

