Configure the Futurex PKCS #11 integration
This section covers general configurations you must make on the KMES Series 3 to enable the Futurex PKCS #11 module to integrate for SSH Key Offloading.Create a role and identity
Perform the following steps to create a new role and identity for SSH on the KMES Series 3:A later section configures the identity name and password in the Futurex PKCS #11 configuration file.
In the Role Editor window, configure the following settings:
- Specify a name for the role.
- Set the number of logins required to 1.
- Go to the Advanced tab.
- Allow authentication to the Host API port only.
- Leave all other fields set to the default values.
Go to the Permissions tab and select the following permissions:
| Permission | Subpermission |
|---|---|
| Certificate Authority | Export, Upload |
| Keys | Top-level permission only |
| Signing Approval | Add |
Go to Identity Management > Identities, right-click anywhere in the window, and select Add > Client Application.
In the Info tab of the Identity Editor window, select Application for the storage location and specify a name for the identity, such as
crypto1.Under Authentication, select the API Key mechanism and then [ Remove ]. Then select [ Add ] and set the type to Password. Set the password for the identity and then select [ OK ] to finish.
A later section configures the password in the Futurex PKCS #11 configuration file.
Enable the Host API commands required for PKCS #11
Because the Futurex PKCS #11 library connects to the Host API port on the KMES, you must define which Host API commands to enable for execution by the FXPKCS11 library. To set the allowed commands, complete the following steps:Configure TLS communication
This section covers the steps required to configure TLS communication between the KMES and the Futurex PKCS #11 library.Create a CA
Perform the following steps to create a certificate authority (CA):Select PKI > Certificate Authorities in the left menu, and select [ Add CA ] at the bottom of the page.
In the Certificate Authority window, enter a name for the certificate container, leave all other fields as the default values, and then select [ OK ].
The new certificate container now displays in the Certificate Authorities menu.
Generate a CSR
Perform the following steps to generate a CSR for the System/Host API connection pair:Under the System/Host APIconnection pair, uncheck Use Futurex certificates, and select [ Edit ] next to PKI Keys in the User Certificates section.
When warned that SSL will not be functional until new certificates are imported, select **[ Yes ]**to continue.
In the PKI Parameters window, leave the default values set and select [ OK ].
A message states that a PKI Key Pair is loaded in the Application Public Keys window.
In the PKCS #10 Info tab, select a save location for the CSR, and select [ OK ].
A message states that the certificate signing request was successfully written to the file location selected.
Sign the System/Host API CSR
Perform the following steps to sign the System/Host API CSR:Right-click on the root CA certificate you created for this integration, and select Add Certificate > From Request.
Export the Root CA certificate
Perform the following steps to export the Root CA certificate:In the file browser, go to the directory to save the Root CA certificate. Specify a name for the file and select [ Open ].
Export the signed certificate
Perform the following steps to export the signed System/Host API certificate:In the file browser, go to the directory where you want to save the signed System/Host API certificate. Specify a name for the file and select [ Open ].
Load the exported certificates
Perform the following steps to load the exported certificates into the System/Host API connection pair:Select the root CA certificate and the signed System/Host APIcertificate in the file browser and select [ Open ].
The certificate chain displays in the Verified section of the window.
Issue a client certificate
Perform the following steps to issue a client certificate for the Futurex PKCS #11 module:You configure the client certificate created here in the Futurex PKCS #11 configuration file.
Export the client certificate
Perform the following steps to export the client certificate as a PKCS #12 file:To perform the following steps, go to Administration > Configuration > Options and enable the Allow export of certificates using password option.
Set a PKCS #12 password, leave Export Selected Certificate with Parents selected, and select [ Next ].
Enter a name for the file, select the location where you want to save it, and select [ Open ].
You must move the FXPKCS11 Client certificate to the computer where the Futurex PKCS #11 module is installed. A later section configures it in the FXPKCS11 configuration file and uses it for TLS communication with the KMES Series 3.
General KMES configurations for SSH key offloading
This section covers general KMESSSH key offloading configuration.Create a CA for the SSH key pair
Perform the following steps to create a CA for the SSH key pair:Set the name of the certificate container, such as
SSH Key Offloading, and set the Owner group to the role you created for this integration. Then select [ OK ].In the Subject DN tab of the Create X.509 Certificate window, select the Classic Preset in the drop-down list and specify
SSH as the certificate Common Name.
