Introduction
This guide describes:
-
The procedure to install and configure Entrust KeySafe 5.
-
The procedure to install and configure Entrust KeyControl Compliance Manager.
-
The procedure to integrate Entrust KeySafe 5 and Entrust KeyControl Compliance Manager.
When all of these procedures are performed, the combined solution facilitates regulatory compliance with specific policies and documentation templates on security objects protected in KeySafe 5.
Product configuration
Entrust has successfully tested Entrust KeySafe 5 with Entrust KeyControl Compliance Manager in the following configurations:
Product | Version |
---|---|
KeySafe 5 |
1.4.0 |
KeyControl Compliance Manager |
10.3.1 |
Operating System |
RedHat 9 |
Security World |
13.6.3 |
nShield HSM hardware |
Connect XC, nShield 5C |
FIPS 140 Level 3 |
Yes |