Service guides
16 min
cryptohub logo the services page contains a list of available and deployed third party integrations and custom tools to enhance your {{ch}} 's function this section provides detailed technical documentation to help integrate third party applications with the {{futurex}} {{ch}} what is a service? services are deployable {{ch}} tools that you can add to your unit most services add third party features to your unit, enabling you to incorporate functions like google cloud key management and more other services include {{ch}} tools built by our engineers to support complicated workflows, such as our payment key injection services that simplify ped injections these services can be managed in the services page, but they're also accessible in their relevant tool page in the left side menu see docid\ hr9jogf4zsmtombpuq6sr and docid\ ay77mxxr4dvlgt9trrp7y for administrative guides and documentation futurex certification process the {{futurex}} certification process is a rigorous and standardized approach to testing and certifying integrations between third party applications and the {{futurex}} {{ch}} the certification process ensures that we fully test and validate third party application integrations in a lab environment before deploying them in a production environment our integration engineering team implements this process so that you can be confident that third party applications integrate seamlessly with {{futurex}} {{ch}} devices and that all operations result in the expected behavior the certification process involves several steps, including research, testing, troubleshooting, and certification, and is fully documented in an integration guide for each integration the full process includes the following steps research the third party application to gain a general understanding of the solution and the protocol it uses to integrate with an hsm or kms device (such as pkcs #11, microsoft cng, jce, openssl engine, and kmip) determine the scope of the third party application use of the hsm or kms device, including the specific functionalities it uses (for example, data encryption, key protection, entropy, and so on) install and configure the third party application in a lab environment, where all testing and validation take place establish a connection between the third party application and the {{ch}} , which typically involves configuring tls certificates and creating roles and identities that the third party application uses to connect and authenticate to {{ch}} initiate a request from the third party application to the {{ch}} , such as generating keys or certificates, encrypting or decrypting data, or performing other cryptographic functions if any errors occur during the testing process, the integration engineering team diagnoses the issues and takes necessary corrective actions if necessary, the team also documents the errors by creating engineering change requests (ecrs) to ensure all issues are addressed and resolved before certification after any necessary engineering changes have been made, the team performs a new end to end test to ensure that all errors are resolved and all operations are successful certify the integration by creating an integration guide that covers all necessary prerequisites, lists configurations required in both the third party application and {{ch}} , and provides instructions to test functionality by following these steps, we ensure that the integration between the third party application and the {{futurex}} {{ch}} is fully tested and validated and that we resolve any errors or issues before we certify the integration as fully supported integration guide organization this section contains guides that result from a rigorous certification process in which our integration engineering team thoroughly tests and validates each integration in a lab environment before certifying it for customer deployment each integration guide is specific to a particular third party application and explains how to integrate those applications with the {{ch}} by using supported protocols such as pkcs #11, microsoft cng, jce, openssl engine, kmip, and more this guide assumes you have a solid technical understanding of the third party application, cryptographic concepts, and basic networking the following process shows the typical organization of our integration guides before you start covers supported hardware models, os versions, third party software, and other prerequisites deploy the integration in cryptohub provides a straightforward wizard based deployment for the integration service you are deploying create an endpoint for the service explains how to create new endpoints for the service, making it easy for the third party application to connect and authenticate to the cryptohub configure the third party application shows how to configure the application to connect to the {{futurex}} device and use its cryptographic functionalities test the integration provides test cases and expected results to validate that the integration works end to end for key use cases properly troubleshoot common issues offers tips for diagnosing and resolving common errors or issues seen with the integration integration guides by application a docid\ st4xwiviz9wf8zckcf1y1 docid\ m2rrdd50nr0u7bx7d6vma docid 8n4ix1j8myngjnq5wzpgp docid\ vviqz wpgqcakvezh2vos docid\ ockzldzfbdrciffyes61s docid\ rgdr0vakbhlkhpblhnz2e docid\ h2kzrugvwphwutfujulrr docid\ rutkz778oygnxjvqmngez b docid 4bxiicdba5xky94jfzozv docid\ md47rf433v2lv2szuw0sc docid\ wgmfuuxjpdcfqh3m6cxwz c docid\ ureg6yibgumqmgwh4c2xf docid\ oocidv0dobahiocazy3dm docid\ ukzjglhx1yyx rptzdbcd d docid 5ew44pazfbbn hlbj7kmm e docid\ oyokcng8qg3ivibhxmqop f docid\ qfhccnz7c aoymudfibh0 g docid\ anczm5rijebklgib0kmns docid\ wy 22yfmijsr6 anafaba docid\ g0wjfxdysyhdg9c0mri3h docid 2xvs rpfwedcvkryuxegf docid\ i3vwfk9eddgwvtr7ejtwu docid\ jd0zfbiu1m9wjojxm rvx docid\ eoky6ux 6gagourkczgoq h docid\ a0e3veczeknffmqhihd8j docid\ dyrc7aurvnnrbgcl0lilf i docid 3okkklkmcba z3dq0gz5i docid\ jlwqwvzgafubgtc0f3d1z j docid\ o fnoocv1y34hrwxdgzay docid\ aegzghvki2aedlx oabce k docid\ jx90x66g6193z44pe nhv m docid\ y9jqtfhhx yrrddpwp5aq docid\ cs661xtw9umwc0p grrgy docid\ xa77numl0tnaxbly7z48d docid goiry7wgdsnis1pbdvpp docid\ khg1k ver8vzgg8x4yryb docid\ f9gab1m0 ywvc6odbd 0q docid\ f9daovqj6awoybzrwu ta n docid\ rcbndskvx65ijq hqfdi docid\ reqmcqd03lefaaho ragw o docid\ skhd2ldzp7afll iip7tz docid\ nroiy4agwtddvbzlkbezz docid\ uq 0zjmjrqrkzroaellor p docid 6xfo3gshcdpbb8qdrwiuf docid\ p8y9n4tj1mkcextcetvop docid\ ytmqxq0n3drt9vbc2 hbp r docid\ cgaqgx4vn30ldpcyh9wyf s docid\ rzttobmyzmct4qoaqeekh t docid\ pkxw7tmoqvh2v2z4 guud v docid 5imaiwtcxvbuiyrfo7 qi docid\ oansnttwch 23ecmxq c docid\ ruu9cipjus93qvjwaa1wt docid lkr hwebyic9 rdhdsl w docid\ ozaa062o8ddkkyazcdmep z docid\ avqg4xz3q8h vw0kj1omq docid\ crnap67izpmpbl05as3zn