Install and configure the Entrust Key Management Vault server

Install the Key Management Vault server

The Entrust Key Management Vault server is a software solution deployed from an OVA or ISO image. Entrust recommends that you read the Entrust Key Management Vault Installation Overview online documentation to fully understand the Key Management Vault server deployment.

To configure a Key Management Vault cluster (active-active configuration is recommended), Entrust recommends the use of the OVA installation method, as described in the Entrust Cryptographic Security Platform Key Management Vault OVA Installation online documentation.

After the Key Management Vault server is deployed, configure the first Key Management Vault node as described in the Entrust Configuring the First Cryptographic Security Platform Key Management Vault Node (OVA Install) online documentation.

After completing this procedure, add the second node as described in the Entrust Adding a New Cryptographic Security Platform Key Management Vault Node to an Existing Cluster (OVA Install) online documentation to create the recommended active-active cluster.

Although an active-active cluster is not a requirement, and a single Key Management Vault node can be deployed to perform its functions, Entrust strongly recommends deploying the solution with a minimum of four nodes in an active-active cluster solution.

Your Key Management Vault license determines how many Key Management Vault nodes you can have in a cluster. Key Management Vault requires the deployment of Cryptographic Security Platform Compliance Manager (CSPCM). CSPCM manages licenses for the various Key Management Vault(s) in the organization. For full information about the Key Management Vault licensing, see the Entrust Upgrading Your Trial License online documentation.

Configure the Key Management Vault Server

After the Entrust Key Management Vault server is deployed and the initial installation is complete, you can configure the network settings, e-mail server preferences and cluster. For these procedures, see the Cryptographic Security Platform Key Management Vault System Configuration in the Administration Guide.