Introduction

This guide describes:

  • The procedure to install and configure Entrust KeySafe 5.

  • The procedure to install and configure Entrust KeyControl Compliance Manager.

  • The procedure to integrate Entrust KeySafe 5 and Entrust KeyControl Compliance Manager.

When all of these procedures are performed, the combined solution facilitates regulatory compliance with specific policies and documentation templates on security objects protected in KeySafe 5.

Product configuration

Entrust has successfully tested Entrust KeySafe 5 with Entrust KeyControl Compliance Manager in the following configurations:

Product Version

KeySafe 5

1.4.0

KeyControl Compliance Manager

10.3.1

Operating System

RedHat 9

Security World

13.6.3

nShield HSM hardware

Connect XC, nShield 5C

FIPS 140 Level 3

Yes

Supported nShield hardware and software versions

Entrust has successfully tested with the following nShield hardware and software versions:

HSM Security World Software Firmware Image FIPS 140 Level 3

nShield 5c

13.6.3

13.4.5 (FIPS 140-2 Certified)

13.6.5

Yes

Connect XC

13.6.3

12.72.3 (FIPS 140-2 certified)

13.6.5

Yes