Establishment of HSM Connectivity
Open a command shell and utilize the comand line tool ppin
to:
- manage the connection credentials for secure HSM communication,
- set the proxy password (only for CloudHSM),
- fetch the permanent secret from HSM,
- test HSM and partition connectivity (assuming the permanent secret was already fetched),
- list the connected partitions
- retrieve the partition log from configured HSMs (if allowed by HSM configuration),
- show the installed provider version.
For the connection establishment of the Primus PKCS#11 Provider installed on the CyberArk PAM with the on-premises HSM or CloudHSM system obtain the credentials from your HSM administrator or CloudHSM Support:
pkcs11-password
, setup-password
, and additionally for CloudHSM proxy-password
.
Setup Connection with on-premise Primus HSM
- Follow the instructions in the Primus PKCS#11 Provider User Guide - Permanent Secrets Fetching to setup the credentials to establish a connection with the HSM.
Setup Connection with CloudHSM
- Follow the instructions in the Primus PKCS#11 Provider User Guide - Setting up CloudHSM Access to fetch the permanent secret using the
ppin
tool and establish a connection with the HSM.
Example Configuration
Following our example, the connection establishment steps illustrate connecting to the partition named DEMO_PARTITION
residing on the CloudHSM service with the proxy user name SERVICE_USER
.
Set Proxy Password
For CloudHSM, all connections undergo authentication on a proxy before being forwarded to the HSM. Therefore, the Service Proxy Password must be configured prior to retrieving the HSM permanent secret. Execute the below ppin
tool command in a command shell.
If you're setting up the connection with an on-premises Primus HSM, you can skip this step.
ppin -p -e SERVICE_USER
********************
Primus Permanent PIN
********************
Provide proxy password for 'SERVICE_USER' : <enter Service Proxy Password, no echo>
********************
Primus Permanent PIN
********************
[01] slot-id 0: user 'DEMO_PARTITION' permanent secret: MISSING
[02] slot-id 0: user 'DEMO_PARTITION' permanent secret: MISSING
[01] service/proxy user 'SERVICE_USER' permanent secret: Configured
[02] service/proxy user 'SERVICE_USER' permanent secret: Configured
Retrieving Permanent Secret
Retrieve the permanent secret for DEMO_PARTITION
via the service proxy, by using the ppin
tool with User Setup password and PKCS#11 password:
ppin -a -e DEMO_PARTITION
********************
Primus Permanent PIN
********************
Provide setup password for 'DEMO_PARTITION': <enter User Setup Password, no echo>
Provide PKCS11 password for 'DEMO_PARTITION': <enter PKCS#11 PIN/Password, no echo>
********************
Primus Permanent PIN
********************
[01] slot-id 0: user 'DEMO_PARTITION' permanent secret: Configured
[02] slot-id 0: user 'DEMO_PARTITION' permanent secret: Configured
[01] service/proxy user 'SERVICE_USER' permanent secret: Configured
[02] service/proxy user 'SERVICE_USER' permanent secret: Configured