General KMES configurations
Perform the tasks in this section to configure the KMES for this integration.Create a role and identity
Perform the following steps to create a new role and identity for Futurex PKCS #11 (FXPKCS11) with the required permissions on the KMES:A later section shows you how to configure the identity name and password inside of the Futurex PKCS #11 configuration file.
In the Role Editor window, specify a Name for the role and set the number of logins required to 1. Then, go to the Advanced tab and allow authentication to the Host API port only. Leave all other fields set to the default values.
Go to Identity Management > Identities, right-click anywhere in the window, and select Add > Client Application.
In the Info tab of the Identity Editor window, select Application for the storage location and specify a Name for the identity, such as crypto1.
Under Authentication, select the API Key mechanism and then [ Remove ]. Then, select [ Add ] and set the type to Password. Set the password for the identity and then select [ OK ] to finish.
A later section shows you how to configure the password in the Futurex PKCS #11 configuration file.
Enable the Host API commands
Because the Futurex PKCS #11 library connects to the Host API port on the KMES, you must define which Host API commands to enable for execution by the FXPKCS11 library. To enable the Host API commands required for PKCS #11, complete the following steps:Configure TLS communication
Perform the following tasks to configure TLS communications between the KMES Series 3 and the Futurex PKCS #11 module.Create a CA
Perform the following steps to create a Certificate Authority (CA):Select PKI > Certificate Authorities in the left-side menu, and select [ Add CA ] at the bottom of the page.
In the Certificate Authority window, enter a Name for the certificate container, leave all other fields set to the default values, and select [ OK ].
The certificate container you created now displays in the Certificate Authorities menu.
Generate a CSR
Perform the following steps to generate a CSR for the System/Host API connection pair:Under the System/Host APIconnection pair, uncheck Use Futurex certificates, and select [ Edit ] next to PKI Keys in the User Certificates section.
When prompted that* SSL will not be functional until new certificates are imported*, select **[ Yes ]**to continue.
In the PKI Parameters window, leave the fields set to the default values and select [ OK ].
You see that a PKI Key Pair is loaded in the Application Public Keys window.
When prompted that the certificate signing request was successfully written to the file location that was selected, select [ OK ].
Sign the CSR
Perform the following steps to sign the System/Host API CSR:Right-click on the root CA certificate you created for this integration, and select Add Certificate > From Request.
Export the certificate
Perform the following steps to export the Root CA certificate:In the file browser, go to the location where you want to save the Root CA certificate. Specify a name for the file, and select [ Open ].
Export the certificate
Perform the following steps to export the signed System/Host API certificate:In the file browser, go to the location where you want to save the signed System/Host API certificate. Specify a name for the file, and select [ Open ].
Load the exported certificates
Perform the following steps to load the exported certificates into the System/Host API connection pair:In the file browser, select both the root CA certificate and the signed System/Host APIcertificate, and select [ Open ].
The certificate chain appears in the Verified section of the window.
Issue a client certificate
A later section shows you how to configure the client certificate created here inside the Futurex PKCS #11 configuration file.
Export the client certificate
To perform the following steps, you must go to Administration > Configuration > Options and enable the Allow export of certificates using password option.
Set a PKCS #12 password, leave Export Selected Certificate with Parents selected, then select [ Next ].
Enter a name for the file, select the location where you want to save it, and select [ Open ].
You must move the FXPKCS11 Client certificate to the computer where you installed the Futurex PKCS #11 module. A later section shows you how to configure it inside the FXPKCS11 configuration file and use it for TLS communication with the KMES Series 3.

