Configure TLS communication
Perform the following tasks to configure TLS communication between the KMES Series 3 and the FX CSP module:- Create a certificate authority.
- Generate a CSR for the System/Host API connection pair.
- Sign the System/Host API CSR.
- Export the Root CA.
- Export the signed System/Host API TLS certificate.
- Load the exported certificates into the System/Host API connection pair.
- Issue a client certificate for Microsoft AD RMS.
- Export the signed Microsoft AD RMS certificate as a PKCS #12 file.
Create a CA
Perform the following steps to create a Certificate Authority (CA):In the Certificate Authority window, enter a name for the Certificate Container, leave all other fields set to the default values, and select [ OK ].
Right-click the certificate container you just created and select Add Certificate > New Certificate.
On the Subject DN tab, select the Classic preset and set a Common Name for the certificate, such as
TLS CA Root.Generate a CSR
Perform the following steps to generate a CSR for the System/Host API connection pair:Under the System/Host API connection pair, uncheck the Use Futurex Certificates checkbox and select [ Edit ] next to PKI keys in the User Certificatessection.
When warned that SSL will not be functional until new certificates are imported, select **[ Yes ]**to continue.
In the PKI Parameters window, leave all fields set to the default values and select [ OK ]*.
You should see that a PKI Key Pair is loaded in the Application Public Keys window.
When prompted that the certificate signing request was successfully written to the file location that was selected, select [ OK ].
Sign the CSR
Perform the following steps to sign the System/Host API CSR:Right-click the System TLS CA Root certificate you created, and select Add Certificate > From Request.
Export the Root CA certificate
Perform the following steps to export the Root CA certificate:In the file browser, go to the location where you want to save the root CA certificate. Specify a name for the file, and select [ Open ].
Select [ OK ].
A message box states that the PEM file was successfully written to the location that you specified.
Export the signed certificate
Perform the following steps to export the signed System/Host API TLS certificate:In the file browser, go to the location where you want to save the signed System/Host API TLS certificate. Specify a name for the file and select [ Open ].
Load the exported certificates
Perform the following steps to load the exported TLS certificates into the System/Host API connection pair:Under the System/Host APIconnection pair, select [ Edit ] next to Certificates in the User Certificates section.
In the file browser, select both the root CA certificate and the signed System/Host API certificate, and select [ Open ].
The certificate chain appears in the Verified section.
Select **[ OK ]**to save the changes.
In the Network Options window, the System/Host API connection pair now shows Signed Loaded next to Certificates in the User Certificates section
Issue a client certificate
Perform the following steps to issue a client certificate for Microsoft AD RMS from the CSR generated from the certreq policy file:On the Subject DN and Basic Info tabs, leave all fields set to the values that auto-populate from the CSR.
Export the signed certificate
Perform the following steps to export the signed Microsoft AD RMS certificate:In the file browser, go to the location where you want to save the signed AD RMS certificate. Specify a name for the file and select [ Open ].
Select [ OK ].
A message box states that the PEM file was successfully written to the location that you specified.
Configure general KMES settings for KMES to AD RMS communication
Perform the following tasks to configure the KMES Series 3 for communication with Microsoft AD RMS:- Add a PKI identity provider.
- Create an AD RMS role with the required permissions.
- Create an AD RMS identity with the correct assigned roles.
- Enable Host API commands.
Add a PKI identity provider
This section shows you how to create a new PKI identity provider, assign it a TLS authentication mechanism, and add it to an identity as a credential. This allows FX CSP to authenticate with the KMES by using the signed Microsoft AD RMS certificate that you exported.On the Info tab of the Identity Provider Editor window, specify a name for the identity provider and uncheck the Enforce Dual Factor checkbox.
On the PKI Options tab, select [ Select ]. In the Certificate Selector window, expand the certificate tree you created, select the CA certificate that signed the ADCS and System/Host API connection pair certificates, and select [ OK ].
Create a role
Perform the following steps to create a role for Microsoft AD RMS and grant it permission to use the PKI identity provider:In the Info tab of the Role Editor window, leave the Role Type set to Application, specify a Name for the role, such as
Microsoft AD RMS, and change the number of Logins Required to 1. Leave all other fields set to the default values.On the Permissions tab, select the following permissions:
| Permission | Subpermissions |
|---|---|
| Certificate Authority | Add, Export, Upload |
| Cryptographic Operations | Sign |
| Keys | Add |
On the Advanced tab, set Allowed Ports to Host API only. Leave the other fields set to the default values and select **[ OK ]**to finish creating the role.
Go to Identity Management > Identity Providers, right-click the PKI identity provider, and select [ Permission ].
In the Set Object-Group Permissions window, select the Show all roles and permissions checkbox, select the drop-down menu next to the MicrosoftAD RMS role, and select the Use permission.
Create a new identity
Perform the following steps to create a new identity and assign it the Microsoft AD RMS role and PKI authentication credentials:In the Info tab of the Identity Editor window, leave the Storage Type set to Application, and specify a Name for the identity. Leave all other fields set to the default values.
Perform the following steps on the Authentication tab:
- Select **[ Add ]**to add a new credential.
- In the Configure Credential window, select TLS Certificate in the Type drop-down list.
- Select the Provider and Mechanism that you created for this integration.
- Select [ OK ] to finish creating a credential.
Enable the Host API commands
Because FX CSP connects to the Host API port on the KMES, you must define which Host API commands to enable FX CSP to execute. To set the enabled Host API commands for the Microsoft AD RMS operation, complete the following steps:Go to Administration > Configuration > Host API Options and enable the following commands:
| Command | Description and subcommands (If applicable) |
|---|---|
| ATKG | Manage HSM-Trusted Asymmetric Key Groups |
| ATTR | Manage Generic Attributes |
| CLKY | Manipulate the application key Enable all subcommands |
| ECHO | Communication Test/Retrieve Version |
| RAFA | Filter for Issuance Policies with USE Permissions |
| RKCP | Retrieve Command Permissions (Enabled Commands) |
| RKGP | Export PKI key pair |
| RKGS | Generate Signature |
| RKLN | Lookup Objects |
| RKPK | Pop Generated Key |

