Skip to main content
Skip table of contents

HSM Integration

This article is a step by step guide on how to configure the VeridiumID server to use an HSM instance.

Instructions

  1. Configure VeridiumID to use the private key in the HSM for signing CSR’s, resulting IdentityTokens for authentications:

    1. Navigate to the Admin Dashboard → Settings → Configuration → config.json and set the following:

      1. CODE
        "certStore": {
            "signingKeystore": {
              "alias": "ca",
              "cert": "",
              "pwd": ""
            },
            "ca": {
              "alias": "ca",
              "cert": "",
              "pwd": ""
            }
          }
      2. CODE
        "pkcs11": {
            "propertiesFileContent": "PKCS11_CONTENT",
            "loginPin": "HSM_PASS"
          }
          where PKCS11_CONTENT is the content of pkcs11.cfg specific to the HSM used, can be found in the HSM documentation. Use '\n' instead of new lines, for example: "name = VeridiumID\nlibrary = /usr/lib64/pkcs11/libsofthsm2.so\nslot = -1"
                HSM_PASS is the password set for the HSM during the initialization step
      3. Click on Save

  2. Configure the VeridiumID SAML IDP to use the HSM:

    1. Navigate to the Admin Dashboard → Settings → SAML Configuration → Security & Keys and enable the HSM toggle:

    2. Fill in necessary fields and Save

    3. On each frontend VeridiumID server, run the following commands:

      CODE
      service ver_tomcat restart; service ver_websecadmin restart

 

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.