Procedures
The AppViewX Cloud Connector was set up using the AppViewX Virtual Image, which is an OVA containing all the required software, network, and Docker prerequisites that runs as a deployable virtual machine. It contains a lightweight Kubernetes distribution (K3s). This integration installs nShield Security World software on to the virtual machine, where it can interact with the K3s pods.
Set up the AppViewX virtual machine
-
Deploy the AppViewX OVA virtual image into VMware, see Setting up the AppViewX Cloud Connector via OVA using AppViewX User Interface.
-
Install the nShield Security World software (Linux version) into the AppViewX virtual machine you created in the previous step, see the nShield Security World Software Installation Guide.
-
Add all the relevent nShield 5c HSMs to the Security World, see Add HSMs to a Security World.
-
Add the following line to the
cknfastrc
file:CKNFAST_LOADSHARING=1
See CKNFAST_LOADSHARING for more information.
-
Create a new softcard and give it a password:
ppmk --new <name>
Where <name> is the name you give to the new softcard. See Create a softcard with ppmk for more information.
-
Run the following commands to update permissions on the virtual machine:
usermod -aG nfast appviewx chmod 644 /opt/nfast/chnfastrc chown -Rf appviewx:nfast /opt/nfast/kmdata/local cd /opt/nfast/kmdata/local chmod 644 *
-
Run
ckinfo
to get the slot number and name. This should be slot 1 and the softcard name that you specified in a previous step. -
Run kubectl get to list the K3s pods.
-
Delete the AppViewX pod.
After you delete the pod, Kubernetes automatically redeploys it with the new host files and permission changes.
-
Get a shell to the AppViewX pod using kubectl exec.
-
In the AppViewX shell, run
ckinfo
to check that the output is good and that there are no permission issues.
Add an HSM in the AppViewX user interface
After you integrate AppViewX with an nShield Security World, you can add HSMs to AppViewX. This enables you to use AppViewX to manage and utilise the HSM for tasks such as private key encryption and certificate management.
-
In the AppViewX web client menu, select Inventory > Device.
-
On the HSM tab, select Entrust and then Add HSM.
-
Complete the wizard as required.
-
For HSM usage, select CSR Generation.
-
For Protect type, select Soft card.
-
For the So File Location, enter the path to the
nfast/toolkits/pkcs11/libcknfast.so
file, including any symlinks. -
For the Config file Location field, enter the path to the
nfast/kmdata/config/config
file, including any symlinks.
-
When the connection is ready, it appears as "Available" in the HSM list and the status indicator next to the name turns green.