Skip to main content

REST API & Transaction Security Broker

To perform cryptographic operations, applications use APIs to interact with the Primus HSM. The Securosys Primus HSM provides three APIs natively: Java JCE, Microsoft CNG, and PKCS#11. However, many modern applications prefer REST APIs. REST APIs are language-agnostic, since they generally run over HTTP(S). A REST API also doesn't require the installation of a client-side API provider library.

To address this need, Securosys provides the Transaction Security Broker (TSB).

Architecture

The TSB is a Java application that internally communicates with the Primus HSM over JCE. Externally, the TSB exposes a REST API that applications can consume.

Usage Modes

The TSB can be used as:

  • A translation layer, or
  • As a workflow engine.

The TSB allows applications to perform cryptographic operations (such as signing and decrypting) and key management operations on the HSM over a REST API. In this case, the TSB functions as a simple translation layer from REST to JCE. This feature is controlled by the REST-API license.

The TSB can also function as a workflow engine for Smart Key Attribute (SKA) workflows. In this case, the TSB is responsible for managing the state of an SKA key operations, such as managing approvers, collecting signatures from all approvers, and forwarding them to the HSM. This feature is controlled by the TSB license.

Deployment Modes

The TSB operates outside the HSM and uses an external database to store its state. All cryptographic operations are performed on the HSM, while the TSB orchestrates and forwards requests - ensuring that the confidentiality and integrity protections of the HSM remain intact. Each TSB instance connects to a single HSM partition, enabling scalability and load balancing by deploying multiple TSB instances that connect to the same partition. The partition can be served by an HSM cluster for high availability.

In CloudHSM, Securosys deploys and manages the TSB for you.

You can deploy the TSB in two ways, depending on your environment and operational requirements:

Docker

  • Purpose: Lightweight, standalone deployment for evaluation, development, or isolated on-premise environments.
  • Ideal for: Quick setup, testing SKA workflows, development environments, and small-scale production deployments.
  • Setup: Deploy TSB as a container using the Docker quickstart guide, then configure authentication and select a TSB application profile.

Kubernetes

  • Purpose: Scalable, production-grade deployment for enterprise or cloud environments with high availability.
  • Ideal for: Enterprise production environments, Securosys CloudHSM integration, and deployments requiring automated orchestration, scaling, and self-healing capabilities.
  • Setup: Deploy TSB using the official Helm Charts, then configure authentication and select a TSB application profile.

Security Consideration

TSB can manage and backup the Approvers, if used the TSB becomes relevant for security, in particular for the access control to the approver keys (and hence the SKA keys). To manage these, the TSB creates its own keys on the HSM partition, acting like a normal application (from the view of the HSM). For details, see the SKA documentation.

What's next?

Get started withCloudHSM for free.
Other questions?Ask Sales.
Feedback
Need help?