Reputation: 490
How Safenet Luna SA HSM clients are verified when the clients are registered using hostname ?
Upvotes: 4
Views: 3981
Reputation: 111
HSM verifies clients based on the NTL ((Network Trust Link) connection. Establishing NTL connection is mandatory before clients makes a call to HSM via Crytoki. The procedure to establish NTL connection is explained by @Keith Bucher
Upvotes: 0
Reputation: 109
Looking at you comments after Keith helped with the process of trust/cert exchange. Below is the command that you might need-
ntls ipcheck disable
Upvotes: 2
Reputation: 161
Safenet Luna HSMs use certificate based authentication for clients. The certificate must be copied to the HSM and have a filename that matches the hostname used in the client register command on the HSM.
A typical process for registration is:
Copy the server certificate to the client installation.
scp [email protected]:server.pem /usr/lunasa/cert/server
Register the server locally
vtl addServer -n 10.10.10.10 -c /usr/lunasa/cert/server/server.pem
Create the client certificate on the client:
vtl createCert -n HOSTNAME
This creates a certificate and private key in the cert/client directory named:
HOSTNAME.pem (certificate)
HOSTNAMEKey.pem (private key)
Copy the client certificate to the Luna SA HSM using scp.
scp /usr/lunasa/cert/client/HOSTNAME.pem [email protected]:
On the HSM, register the client and assign it to a partition.
client register -client HOSTNAME -hostname HOSTNAME
client assignPartition -client HOSTNAME -partition PARTITIONNAME
On the client, verify that the client is registered and operating properly:
$ vtl verify
The following Luna SA Slots/Partitions were found:
Slot Serial # Label
==== ======== =====
1 123456789 myPartition1
Upvotes: 3