Integrate the Entrust nShield HSM with CyberArk PAS EPV
Stop the Vault Server
To stop the Vault Server:
-
Open the PrivateArk Server application.
-
Select the red stoplight button.
-
Select Normal shutdown. Then select OK.
-
Select Yes.
Configure the CyberArk dbparm.ini file
-
In the Vault server, edit the file
C:\Program Files (x86)\PrivateArk\Server\Conf\dbparm.ini
.To comment out items in the
dbparm.ini
file, use an asterisk (*) at the beginning of the line. -
If you are using an nShield Connect XC or nShield 5c, add the following
AllowNonStandardFWAddresses
directives to the end of the[main]
section. This tells the Vault server to create firewall rules for this IP/port combination.AllowNonStandardFWAddresses=[HSM.IP.ADD.RESS],Yes,9004:outbound/tcp AllowNonStandardFWAddresses=[HSM.IP.ADD.RESS],Yes,9005:outbound/tcp
-
Repeat the previous step for each HSM that needs to communicate with the Vault server.
-
Add the location of the PKCS#11 provider for the Entrust nShield HSM at the end of the file.
-
For 12.50.xx and earlier Entrust nShield Security World clients:
[HSM] PKCS11ProviderPath="C:\Program Files (x86)\nCipher\nfast\toolkits\pkcs11\cknfast-64.dll"
-
For 12.60.xx and later Entrust nShield Security World clients:
[HSM] PKCS11ProviderPath="C:\Program Files\nCipher\nfast\toolkits\pkcs11\cknfast.dll"
-
-
Save and close the
dbparm.ini
file.
Start and stop the Vault Server
Start then stop the Vault server to process the new firewall rules from the AllowNonStandardFWAddresses
directives just added to the dbparm.ini
file:
-
Open the PrivateArk Server application.
-
Select the green stoplight button.
-
When the server starts, you should the following output indicating the new firewall rules were processed:
Firewall contains external rules. Firewall is open for client communication Firewall is open for non standard address. Firewall is open for non standard address. Firewall is open for non standard address. Firewall is open for non standard address.
-
Select the red stoplight button after the server comes up.
-
Select Normal shutdown. Then select OK.
-
Select Yes.
-
Validate that the HSM communication works:
-
Run the
enquiry
andnfkminfo
commands in a command prompt. -
Verify that the module is operational and the world state is Usable and Initialized.
-
Configure the CyberArk PAS EPV Vault for OCS key protection
If you are using module-protected keys, skip this section and continue with Regenerate the CyberArk PAS EPV Vault key on the HSM.
If you are using OCS-protected keys:
-
In the Vault server, open a command window as administrator.
-
Make the required directory current:
C:\Users\Administrator>cd "C:\Program Files (x86)\PrivateArk\Server"
-
Run
CAVaultManager
providing the OCS passphrase:C:\Program Files (x86)\PrivateArk\Server>CAVaultManager SecureSecretFiles /SecretType HSM /Secret "<OCS passphrase>" ITADB518W MaxConcurrentUsersByClientID activated in dbparm.ini. ITADB399I Using encryption algorithms: Advanced Encryption Standard (AES), 256 bit, RSA (2048 bit), SHA2-512 (Protocol Integrity), SHA2-512 (Files Integrity). CAVLT146I HSM secret was secured successfully.
This command does not validate the passphrase against the OCS card, it only encrypts the passphrase and adds it to dbparm.ini
. If you want to validate the passphrase against the OCS card to make sure have it correct, usecardpp -m1 --check
and enter the passphrase when prompted. -
Open the
C:\Program Files (x86)\PrivateArk\Server\Conf\dbparm.ini
file and verify that the lineHSMPinCode=<encrypted OCS passphrase>
appears towards the end.For example:
... [HSM] PKCS11ProviderPath="C:\Program Files\nCipher\nfast\toolkits\pkcs11\cknfast.dll" HSMPinCode=A4FEFBD484E3FBB8B14BAC7051F923ACFA73458B22E6DBB082ADFBE46C93626F5E97A11144872DD8BA823321759F41CB
-
Close the
dbparm.ini
file.