This section covers the general KMES configurations that enable Bitwarden to integrate with the KMES and describes the necessary steps to configure TLS communication between the KMES and the Bitwarden instance.Documentation Index
Fetch the complete documentation index at: https://docs.futurex.com/llms.txt
Use this file to discover all available pages before exploring further.
Configure the general KMES Series 3 settings
Perform the following tasks to complete the general KMES Series 3 configuration:- Create a role and identity for Bitwarden.
- Enable Host API commands.
Create a role and identity
Perform the following steps to create a new role and identity for Bitwarden with the required permissions on the KMES Series 3:A later section shows you how to configure the name of this identity in the Futurex PKCS #11 configuration file.
Go to the Advanced tab and allow authentication to the Host API port only. Leave all other fields set to the default values.
Go to the Permissions tab and select the following permissions:
| Permission | Sub-permission |
|---|---|
| Certificate Authority | Add, Delete, Export, Export Private Key, Modify, Upload |
| Cryptographic Operations | Sign, Verify, Encrypt, Decrypt, Wrap, Unwrap |
| Keys | Add, Delete, Export, Modify |
Go to Identity Management> Identities, right-click anywhere in the window, and select Add> Client Application.
On the Info tab of the Identity Editor window, select Application for the storage location, and specify a name for the identity.
Enable the Host API commands
Because the Futurex PKCS #11 library connects to the Host API port on the KMES, you must define which Host API commands (required for the Bitwarden operation) to enable for the FXPKCS11 library. To set the enabled commands, complete the following steps:Configure TLS communication
Perform the following tasks to configure TLS communications between the KMES Series 3 and Bitwarden:- Create a CA.
- Create a CSR for the connection pair.
- Sign the CSR.
- Export the Root CA certificate.
- Export the signed System/Host API certificate.
- Load the exported certificates to the connection pair.
- Issue a client certificate for Bitwarden.
- Export the Bitwarden certificate as a PKCS #12 file.
Create a CA
Perform the following steps to create a Certificate Authority (CA):In the Certificate Authority window, enter a name for the certificate container, leave all other fields set to the default values, and select [ OK ].
The certificate container now displays in the Certificate Authorities menu.
Generate a CSR
Perform the following steps to generate a CSR for the System/Host API connection pair:Under the System/Host API connection pair, uncheck the Use Futurex certificates checkbox, and select [ Edit ] next to PKI Keys in the User Certificates section.
When warned that SSL will not be functional until new certificates are imported, select [ Yes ] to continue.
In the PKI Parameters window, leave the fields set to the default values and select [ OK ].
The PKI Key pair now shows as loaded in the Application Public Keys window.
When notified that the certificate signing request was successfully written to the file location that was selected, select [ OK ].
Sign the System/Host API CSR
Perform the following steps to sign the System/Host API CSR:In the file browser, find and select the CSR that you generated for the System/Host API connection pair.
Export the certificate
Perform the following steps to export the Root CA certificate:In the file browser, go to the location where you want to save the signed System/Host API certificate. Specify
tls_ca.pem as the name for the file, and select [ Open ].Export the signed System/Host API certificate
Perform the following steps to export the signed System/Host API certificate:In the file browser, go to the location where you want to save the signed System/Host API certificate. Specify
tls_kmes.pem as the name for the file, and select [ Open ].Load the exported certificates
Perform the following steps to load the exported certificates into the System/Host API connection pair:In the file browser, select both the root CA certificate and the signed System/Host API certificate and select [ Open ].
Select [ OK ] to save the changes.
In the Network Options window, the System/Host API connection pair now shows Signed loaded next to Certificates in the User Certificates section.
Issue a client certificate
Perform the following steps to issue a client certificate for Bitwarden:Export the certificate
Perform the following steps to export the Bitwarden certificate as a PKCS #12 file:To perform the following steps, go to Configuration > Options and enable the Allow export of certificates using passwords option.

