Log in to the KMES from Curity
You must configure each run-time node to communicate with the HSM. This requires a PIN or password. You can provide this interactively on the command line during startup, directly on the command line as an argument, or in the environment variableIDSVR_HSM_PIN.
If you don’t provide this PIN to each run-time node, you cannot log in to the KMES Series 3 and use keys that reside on the device. So, you must start the nodes with this credential. The command line argument that you should use is -i. You can also provide --debug-hsm in non-production environments to get extra HSM-related debug log messages in the server log. In this case, run the following command to start a node:
Bash
Enter the password of the identity configured in the
fxpkcs11.cfg file in the preceding command.Use the KMES
To enable using the HSM in Curity, perform the following steps:Log in to the Curity admin UI and go to theSystem tab.
Note: After running the command to start the Curity, the last line of the log will show you which port to connect to.
Scroll down to the Hardware Security Module section and toggle on the HSM.After enabling this, you can enter information about how the run-time nodes connect to the HSM.
Configure Curity TLS settings to use the server key stored in the KMES
Even without committing the changes, configuring the Futurex HSM for SSL enables you to configure keys similar to those in the HSM. To see this, perform the following steps:Go to Keys and Cryptography > TLS, and select the **+**button next to Server SSL Keys.
Here, you have three options, including the Use from HSM option, which is impossible until an HSM is configured.
Now that the HSM is configured, enter the name of the key created earlier,
Curity_Demo_1, into the Name text field.Note:Curity uses the Java Keystore to find the private key stored in the KMES. Make sure it matches what is found in the response of the
keytool command that was ran in the previous section.On the next screen, select rsa from the Type drop-down list and enter the key size used when the key was made in the HSM, namely
2048.Assign the key
Assign the key to a run-time node by running the following steps:The SSL Server KeyStore drop-down should be visible if the node uses the HTTPS protocol. From this list, select the key that you just defined.

