Perform the following tasks to configure key labels on the KMES.Documentation Index
Fetch the complete documentation index at: https://docs.futurex.com/llms.txt
Use this file to discover all available pages before exploring further.
Create a key group
Perform the following steps to create a key group :If the key group has already been created, skip to the Set permissions section.
Select Symmetric or Asymmetric as the Key type, and set HSM Trusted for the storage location. Then, select [ OK ].
Set permissions
Perform the following steps to set permissions:Connect to a Guardian
To use key labels, you must make an authorized connection to the Guardian Series 3, by using one of the following methods:- Log onto a Guardian by using the RKLG command in the Remote Host API.
- Set up a TLS connection to the Guardian by using certificates where the Common Name is the name of an identity under the role authorized to access the correct keys through Key Labeling.
Log on with RLKG
You can execute the RKLG command in the remote host API whenever you make a new connection to the Guardian. Issue the command with the following tokens:| Token | Definition |
|---|---|
| DA | User Name |
| CH | Password |
Shell
Set up a TLS connection
The Guardian can recognize a secure connection between the host application and the Guardian when you use TLS as an authorized connection. However, for the Guardian to recognize the connection as authorized, the client must connect with a valid certificate where the Common Name is a valid user on the Guardian.This method replaces the password authentication method in the following steps.
Ensure the connection for the host application Encryption Device Group for HSMs is set to SSL (under Settings).
The host application creates a CSR with the Common Name set to a valid user to be signed under a Certificate Authority (CA).
If the CA is not on the Guardian accepting the connection, you need to import it on the appropriate Guardian device.
Under Administration > Configuration > Network Options > TLS/SSL Settings, choose the TLS setting defined for the connection on which the host application connects. If you are using the default, this is the Balancer setting.
Go to Identity Management > Identity Providers, right-click the background of the screen, and select Add > Provider > PKI.
In the PKI Options tab, press [ Select ]. Choose the certificate for the CA imported in step 3, and select [ OK ].
Set a name for the mechanism, and leave all other values set to the default values. Select [ OK ].

