Create a role and identity
Perform the following steps to create a new role and identity for Vault withe the required permissions on the KMES Series 3 (In the Futurex PKCS #11 configuration file section, you need this identity name for the configuration):Go to the Permissions tab and select the following permissions:
| Permission | Additional modifier |
|---|---|
| Cryptographic Operations | Sign, verify, Encrypt, Decrypt |
| Keys | Add, export |
Go to Identity Management > Identities, right-click anywhere on the window, and select Add> Client Application.
Create a key group
Perform the following steps to create a key group for CyberArk Vault keys on the KMES Series 3 where the Vault can store the encryption keys (In the Futurex PKCS #11 configuration file section, you need this key group name for the configuration):Select [ Permissions ], give the Vault role you created the Use permission, and select **[ OK ]***to save.
Enable the Host API commands
Because the Futurex PKCS #11 library connects to the Host API port on the KMES, you must define which Host API commands to enable for execution by the FXPKCS11 library. To enable the commands, complete the following steps:Go to Administration> Configuration> Host API Options and enable the following commands:
| Command | Description |
|---|---|
| ECHO | Communication test/Retrieve version |
| RAFA | Filter issuance policy |
| RAND | Generate a random number |
| RKCK | Create an HSM trusted key |
| RKCP | Get command permissions |
| RKCS | Create a symmetric HSM trusted key group |
| RKED | Encrypt or decrypt data |
| RKHM | HMAC Data |
| RKLN | Lookup objects |
| RKLO | Login user |
| RKRC | Get an HSM trusted key |
Configure TLS communication
This section covers the necessary tasks to set up TLS communication between the KMES Series 3 and the CyberArk Vault instance.Create a CA
Perform the following steps to create a Certificate Authority (CA):In the Certificate Authority window, enter a name for the certificate container, leave all other fields as the default values, and select [ OK ].
The certificate container you created displays in the Certificate Authorities menu.
Generate a CSR
Perform the following steps to generate a CSR for the System/Host API connection pair:Under the System/Host API connection pair, uncheck Use Futurex Certificates, and select **[ Edit ]**next to PKI Keys in the User Certificates section.
When prompted that SSL will not be functional until new certificates are imported, select **[ Yes ]**to continue.
In the PKI Parameters dialog, leave the default values set and select [ OK ].
The PKI Key Pair displays in the Application Public Keys window.
When prompted that the certificate signing request was successfully written to the selected file location, select [ OK ].
Sign the CSR
Perform the following steps to sign the System/Host API CSR:Export the certificate
Perform the following steps to export the Root CA certificate:In the file browser, go to the location where you want to save the Root CA certificate. Specify a name for the file, and select [ Open ].
Export the signed certificate
Perform the following steps to export the signed System/Host API certificate:In the file browser, go to the location where you want to save the signed System/Host API certificate. Specify a name for the file, and select [ Open ].
Load the exported certificates
Perform the following steps to load the exported certificates into the System/Host API connection pair:In the file browser, select the root CA certificate and the signed System/Host API certificate and select [ Open ].
The certificate chain appears in the window under Verified.
Select **[ OK ]**to save the changes.
In the Network Options dialog, the System/Host API connection pair shows as Signed Loaded next to Certificates in the User Certificates section.
Issue a client certificate
Perform the following steps to issue a client certificate for Vault:Export the Vault certificate
Perform the following steps to export the Vault certificate as a PKCS #12 file:Before beginning the export, go to Configuration > Options and enable the Allow export of certificates using passwords option.

