Certificate management
Microsoft Windows Certificate ...

Generate a key pair and certificate on the Vectera Plus

6min

This section shows how to use FXCLI to perform the following tasks:

  1. Log in to the HSM.
  2. Create a new key pair on the .
  3. Generate a CSR from that key pair.
  4. Create a CA
  5. Sign the CSR by using a CA that you also create on the HSM.

1 | Connect and log in to the HSM through FXCLI

1

Run the FXCLI application.

2

Configure TLS certificates for communication between FXCLI and the HSM by using the tls set of commands.

Run tls help to access syntax documentation.

3

Connect to the HSM by using the following command:

FXCLI

4

Log in to the HSM with the default Admin1 and Admin2 identities by running the following command twice (entering the username and password when prompted):

FXCLI


2 | Create a new key pair on the Vectera Plus

1

Create a new key pair in the next available key slot on the HSM, modifying the key usage values to match your specific requirements:

FXCLI

2

Confirm which key slot the private key was added to:

FXCLI

3

Assign a PKCS11 label to the key (certutil needs you to set this external data field so that it can find the key in a later section):

The PKCS11 label value should match the name that was set for the key pair in the generate command.

FXCLI


3 | Generate a CSR

1

Generate a CSR from the new key pair that was created:

FXCLI


4 | Create a Certificate Authority

1

Create a new key pair in the next available key slot on the HSM:

FXCLI

2

Create a certificate from the new key pair that you created:

FXCLI


Note that the CA certificate was output to a file called Ca.pem.

3

Confirm which key slot the private key was added to:

FXCLI

4

Assign a PKCS11 label to the key (certutil needs you to set this external data field so that it can find the key in a later section):

The PKCS11 label value should match the name that was set for the key pair in the generate command.

FXCLI


5 | Sign the CSR using the Certificate Authority

1

Sign the CSR with the CA you just created, modifying the key usage values to match your specific certificate requirements:

FXCLI


Note that the signed leaf certificate was output to a file called IgDemo.pem.