Introduction
|
Entrust KeyControl has been rebranded as the Entrust Cryptographic Security Platform (CSP) Key Manager. The Entrust CSP Key Manager continues to provide a comprehensive solution for discovering and managing the lifecycles of cryptographic keys, secrets, certificates, tokens, libraries, protocols, and configurations:
Because the Entrust integrations are tested against specific product versions, this guide is still branded as a "KeyControl" integration. It was tested against a pre-CSP version of KeyControl. Exercise caution when using an Entrust Integration Guide with a product version that does not match the tested version, because your version might not function in exactly the same way. Entrust cannot guarantee the success of integrations in configurations other than those indicated in the guide. This guide remains on the website for customers using pre-CSP versions of KeyControl. |
This guide describes:
-
The procedure to install and configure Entrust KeySafe 5.
-
The procedure to install and configure Entrust KeyControl Compliance Manager.
-
The procedure to integrate Entrust KeySafe 5 and Entrust KeyControl Compliance Manager.
When all of these procedures are performed, the combined solution facilitates regulatory compliance with specific policies and documentation templates on security objects protected in KeySafe 5.
Product configuration
Entrust has successfully tested Entrust KeySafe 5 with Entrust KeyControl Compliance Manager in the following configurations:
| Product | Version |
|---|---|
KeySafe 5 |
1.4.0 |
KeyControl Compliance Manager |
10.3.1 |
Operating System |
RedHat 9 |
Security World |
13.6.3 |
nShield HSM hardware |
Connect XC, nShield 5C |
FIPS 140 Level 3 |
Yes |