Key management
Salesforce BYOK
Quick Reference
4 min
this section offers a quick reference to key prerequisites and high level implementation steps pre implementation attain required permissions on salesforce for the account that will be performing the integration manage encryption keys manage certificates customize application admin privileges on the hsm check if openssl is installed on device openssl version install dependencies python 3 x implementation you can complete most tasks in this section by using either excrypt manager or fxcli the exception is the second option of task 7 ( create connection certificates for mutual authentication ), for which you must use fxcli you can optionally complete steps 4 through 6 by using the {{guard}} (see the applicable guide for configuring hsms for pkcs #11 integrations by using the {{guard}} ) if you use a virtual hsm for the integration, you must connect to it over the network through fxcli, the excrypt touch, or the {{guard}} install {{futurex}} pkcs #11 module ( fxpkcs11 ) install {{futurex}} command line interface ( fxcli ) configure vectera connect to the hsm with a usb to enable excrypt manager or fxcli confirm command primary mode is general purpose (gp) , and pkcs #11 feature is enabled configure hsm's network load {{ftk}} , {{pmk}} and {{bek}} major keys configure the transaction processing connection create a new application partition for the integration create a new identity and give it access to the newly created application partition configure tls with either server side or mutual authentication create & download salesforce certificate and upload salesforce public key to hsm upload aes 256 key to hsm and generate hashed & encrypted tenant secrets upload hashed and encrypted tenant secret files to salesforce post implementation